CHackA_Hacking_Books
☆49May 17, 2025Updated 11 months ago
Alternatives and similar repositories for Hacking_Books
Users that are interested in Hacking_Books are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository_Software☆11Aug 26, 2023Updated 2 years ago
- thelinuxchoice/blackeye☆12Jul 26, 2020Updated 5 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- Record X11 keypress events to a log file☆27Mar 19, 2018Updated 8 years ago
- awesome、python、C++、linux、database、php、sql、penetration、security、infosec、javascript、tips...☆13Jul 6, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Burp extension to use updated token values, such as a bearer token☆24Dec 2, 2022Updated 3 years ago
- Spymax_4.0_Full Version By blackcat99999999☆14Jan 24, 2024Updated 2 years ago
- Asynchronous MSF RPC API wrapper☆21Dec 8, 2022Updated 3 years ago
- A multi-functional toolkit for social engineering, phishing, email spoofing, SMS/OTP bombing, keylogging, and security audits — built for…☆33Mar 11, 2026Updated last month
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆57May 1, 2025Updated last year
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆35Apr 14, 2025Updated last year
- Script to change all MAC Addresses☆12Oct 3, 2013Updated 12 years ago
- 👈 lightning-fast cd and command execution☆11Apr 2, 2026Updated last month
- ☆15Sep 11, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An OSINT tool to find data leaks on a targeted website☆17Mar 30, 2021Updated 5 years ago
- Python nmap scripts☆22Oct 5, 2020Updated 5 years ago
- Add AI to the Linux terminal☆10Apr 28, 2024Updated 2 years ago
- Control an Android device from Arduino or vice versa☆22May 8, 2022Updated 4 years ago
- Android Testing☆16Mar 24, 2014Updated 12 years ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 5 months ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- PIP Manager written in python Tkinter☆13Jul 19, 2024Updated last year
- A little explanation about this tool, Lazymux is a remote that works to automatically download and install a tool ,, what content do I me…☆20Jan 4, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Plugin based information gathering library☆28Apr 16, 2026Updated 3 weeks ago
- Intagram Image And Video Downloader☆14Oct 1, 2020Updated 5 years ago
- Automated GitHub secret scanning with smart alerting & monitoring.☆31Jan 15, 2026Updated 3 months ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- Enrich your investigations on IPs, Domains etc. with OSINT☆65Apr 4, 2024Updated 2 years ago
- Kali NetHunter for Xiaomi Redmi Note 3 Pro☆10May 25, 2017Updated 8 years ago
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 10 months ago
- A PNG file-smuggling tool and library!☆27Mar 15, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 4 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- trakttv everywhere☆27Mar 31, 2013Updated 13 years ago
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago
- book source codes from _Hacking: The Art of Exploitation_ 2nd edition by Jon Erickson☆22Sep 28, 2012Updated 13 years ago
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆12Oct 17, 2020Updated 5 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago