dx7er / ResourcesLinks
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
☆11Updated 2 years ago
Alternatives and similar repositories for Resources
Users that are interested in Resources are comparing it to the libraries listed below
Sorting:
- Directory with Bluetooth exploits that is used in BlueToolkit☆17Updated 2 months ago
- ☆14Updated 3 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆16Updated 2 years ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆18Updated last year
- A Simple Script For SSH BruteForce☆38Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 5 years ago
- Rockyou for web fuzzing☆15Updated 3 years ago
- A automated Meterpreter payload generator script in Bash That can start Listener automatically for specified payload. (only for KALI Linu…☆16Updated 4 years ago
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆37Updated 3 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆52Updated last year
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated last week
- Repository of tools used in my blog☆52Updated last year
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆14Updated 5 years ago
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆34Updated 9 months ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Updated 2 years ago
- A small tool to find admin panel of the website☆17Updated 3 years ago
- Search Google Dorks like Chad. / Broken link hijacking tool.☆30Updated 2 months ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Updated 2 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Updated 3 years ago
- ☆19Updated 3 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Updated 3 years ago
- Who We Are☆20Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆22Updated 3 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆26Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Burp suite Certificate modification tool☆18Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Updated 3 years ago
- web based c2 🏴☠️☆15Updated last year