best tool for hacking via windows cmd
☆13Jan 4, 2019Updated 7 years ago
Alternatives and similar repositories for FishCracker
Users that are interested in FishCracker are comparing it to the libraries listed below
Sorting:
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- ☆23Mar 28, 2021Updated 4 years ago
- ☆10Feb 19, 2023Updated 3 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- ☆10Jan 26, 2023Updated 3 years ago
- ☆11Nov 29, 2018Updated 7 years ago
- Magic mirror module to help with the "perfect breath"☆11Jan 7, 2021Updated 5 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆18Mar 30, 2021Updated 4 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Aug 5, 2022Updated 3 years ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆13Jan 12, 2025Updated last year
- App to quickly add Physical Machines into VMware Horizon Manual Pool☆11Mar 23, 2020Updated 5 years ago
- There's Some Scripts That Can Hack Windows Macos And Android All Made By Me And Some Code Forked From Other Scripts☆14Jan 24, 2025Updated last year
- "RansomPKP" proof of concept.☆11Aug 8, 2016Updated 9 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- Music Player Deamon module for Magic Mirror☆14Oct 21, 2020Updated 5 years ago
- ettercap for android☆12Nov 29, 2015Updated 10 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Use Mycroft voice commands to control a MagicMirror via the MMM-RemoteControl module☆11Nov 24, 2020Updated 5 years ago
- Session Manager and Middleware for Go net/http☆11Feb 11, 2025Updated last year
- List of useful OSINT tools for information gathering. Especially for pentesters 🖖☆11May 10, 2024Updated last year
- Documentación sobre sistemas embebidos☆12Nov 15, 2024Updated last year
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11May 6, 2020Updated 5 years ago
- ☆11Jul 5, 2016Updated 9 years ago
- Rubber Ducky arming script wizard : Setup quickly your Rubber Ducky☆10Jan 18, 2018Updated 8 years ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- Cutting-edge research in a practical way☆12Jul 26, 2019Updated 6 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago