White Hat Arsenal is a collection of very useful scripts, exploits and books.
☆13Dec 4, 2019Updated 6 years ago
Alternatives and similar repositories for WHA
Users that are interested in WHA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- [Disclaimer FireROOT] This repository is for research purposes only, the use of this code is your responsibility. CONTACT ME: Attack@dark…☆13Jan 24, 2023Updated 3 years ago
- Replacement for the old Unix crypt☆16Sep 17, 2019Updated 6 years ago
- GitHub repository for the API Security for White Hat Hackers book☆15May 31, 2024Updated last year
- Catalog of modern iOS tools☆25May 31, 2015Updated 10 years ago
- ☆15Mar 21, 2025Updated last year
- Reverse Shell for Android☆24Apr 12, 2014Updated 11 years ago
- Web app that calculates various powerlifting scores☆16Jan 7, 2023Updated 3 years ago
- A simple phishing tool that can phish almost any website☆76Nov 6, 2018Updated 7 years ago
- SUID systemctl exploit ( MSF - Metasploit module )☆17Oct 26, 2019Updated 6 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- This is a cross-platform Python 2.x Remote Access Trojan (RAT)☆14Mar 11, 2017Updated 9 years ago
- Dockerizing a fullstack app (frontend+backend) with Postgres + Redis + Nginx. Build and deploy with docker-compose.yml file.☆25Dec 7, 2021Updated 4 years ago
- Hello my friends, it is my repo about sql injections. Call me in Telegram: @anakein☆43Feb 17, 2021Updated 5 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- It is demonstration tool that contains collection techniques to detect the virtualisation environment in Linux Operating System.☆22Sep 23, 2018Updated 7 years ago
- A java based google hacking tool that allows to do advanced search on google, also to search in google hacking database and exploit datab…☆23Dec 7, 2016Updated 9 years ago
- Web attack vectors collection☆20Nov 1, 2020Updated 5 years ago
- ☆13Sep 8, 2024Updated last year
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- ☆14Jun 26, 2025Updated 8 months ago
- ☆12Jun 16, 2021Updated 4 years ago
- Apple wireless research and tools☆19Jul 19, 2020Updated 5 years ago
- bypass 401/403☆13Sep 13, 2022Updated 3 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Jun 3, 2014Updated 11 years ago
- ☆13Aug 10, 2022Updated 3 years ago
- This is A Simple TweetBot For Twitter☆24Dec 26, 2020Updated 5 years ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆11Aug 15, 2024Updated last year
- OpenVAS / Greenbone Vulnerability Manager (GVM) 11 Install Script for Kali Linux☆24Oct 1, 2020Updated 5 years ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- XSS Payload Cheat Sheet☆11Sep 1, 2024Updated last year
- SCRIPT TERMUX HACK AKUN FACEBOOK☆17Jul 27, 2024Updated last year
- WebApp for BugBounty Hunters☆14Mar 24, 2017Updated 9 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆31Apr 15, 2018Updated 7 years ago
- Alfred 3 workflow to find to projects in github☆14Oct 26, 2021Updated 4 years ago