Tutorials and Things to Do while Hunting Vulnerability.
☆10May 15, 2025Updated 9 months ago
Alternatives and similar repositories for HowToHunt
Users that are interested in HowToHunt are comparing it to the libraries listed below
Sorting:
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 9 months ago
- Fully FUD keylogger that can bypass windows 11 & windows 10 defender protection and all kinds of Antivirus protections also.☆20Oct 9, 2021Updated 4 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆27Nov 17, 2021Updated 4 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Aug 4, 2023Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆37Dec 19, 2023Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Jul 4, 2020Updated 5 years ago
- Metasploit Exploiting Tool For Linux☆21Sep 27, 2021Updated 4 years ago
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The …☆45Mar 3, 2022Updated 3 years ago
- ☆70Aug 19, 2024Updated last year
- A very user friendly and advanced phishing toolkit made for hackers☆35Dec 2, 2021Updated 4 years ago
- A Simple Script For SSH BruteForce☆38Aug 4, 2023Updated 2 years ago
- A simple reconnaissance framework for bug bounty hunting☆37Oct 16, 2020Updated 5 years ago
- 💸 1st place at Hack The Job 2022 - A chrome extension that automatically tracks purchases and budgets, alerting users if they go over t…☆15May 30, 2022Updated 3 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 5 months ago
- Generate Emails for a company/website from a given list of names.☆31Oct 16, 2022Updated 3 years ago
- ☆11May 30, 2021Updated 4 years ago
- ☆22Dec 10, 2025Updated 2 months ago
- NSA tool hacking☆15May 20, 2018Updated 7 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- NSA-Proof Secure P2P Chat client☆11Jul 15, 2015Updated 10 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 11 years ago
- A XSS Payload in a gif file☆48Apr 7, 2017Updated 8 years ago
- Payloads for the Hak5 Bash Bunny☆13May 23, 2019Updated 6 years ago
- $5 Cyber Weapons & How to Use Them☆11Jul 25, 2022Updated 3 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- A collection of hacks and one-off scripts☆11Apr 6, 2020Updated 5 years ago
- XTS block mode implementation in rust☆12May 23, 2025Updated 9 months ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- Detection: Identify the presence of the Ploutus malware by checking for known indicators of compromise (IoCs) such as specific files, reg…☆11Sep 5, 2024Updated last year
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- decompiled pegasus_spyware☆14Jul 31, 2021Updated 4 years ago
- ☆10Oct 1, 2016Updated 9 years ago
- This repository holds scripts to build quantum neural networks with a variety of encoding methods, parametric layer architectures, and me…☆12Jun 13, 2022Updated 3 years ago