hacking tools
☆14Jan 29, 2023Updated 3 years ago
Alternatives and similar repositories for Hacking-tools
Users that are interested in Hacking-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [QRS'22] TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by Fuzzing☆16Aug 24, 2023Updated 2 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- ☆19Mar 4, 2023Updated 3 years ago
- PoC for CVE-2023-20126☆24Jun 20, 2023Updated 2 years ago
- Leakuidator+ helps users to protect themselves against cross-site leaks, a class of vulnerabilities derived from side-channels built into…☆12Jun 19, 2022Updated 3 years ago
- A custom Google search (to bypass some limitations on google and VPNs)☆116Jul 7, 2023Updated 2 years ago
- 这是一个 XXE 漏洞检测工具(This is an XXE vulnerability detection tool)☆17Dec 10, 2024Updated last year
- Make level up and forgot about termux☆13Jan 29, 2021Updated 5 years ago
- ☆20Jul 7, 2024Updated last year
- List of fresh and validated DNS resolvers updated every 12h.☆24Updated this week
- ☆49Jul 31, 2023Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- DareDevil is a Cloner Tool. That Help You to Clone Different Varieties of Latest, Updated, Working Tools In One Click..☆10Nov 25, 2022Updated 3 years ago
- Часто задаваемые вопросы для русскоязычного сообщества Blender | FAQ for Blender3d for Russian community☆21Oct 20, 2024Updated last year
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- ☆13Feb 21, 2022Updated 4 years ago
- Rust in-memory dumper☆108Jul 26, 2023Updated 2 years ago
- Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Feb 12, 2024Updated 2 years ago
- Python script to parse a Telegram chat history backup (JSON) into tabular format (CSV). Modified to optionally process only messages from…☆18Oct 14, 2022Updated 3 years ago
- web指纹识别☆16Dec 27, 2022Updated 3 years ago
- ICMP隧道,用于内网渗透工具☆10Mar 13, 2019Updated 7 years ago
- Web app tool for helping compose advance search operators (aka Google dorking AKA boolean searches) for a variety of search engines☆35May 9, 2023Updated 2 years ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Mar 6, 2023Updated 3 years ago
- Powerful Python DDoS Script☆10May 17, 2022Updated 3 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- GHHC-HACKBAR is an Advanced Web Penetration Testing Tool. Modified from Anon HackBar.☆14Jun 15, 2023Updated 2 years ago
- @wifi.id Account Extractor & Checker☆24May 24, 2018Updated 7 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- 一款微信小程序源码包信息收集工具,根据已有项目改编☆24Feb 11, 2025Updated last year
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated 11 months ago
- This is a Cheatsheet for eJPT.☆16Jan 26, 2021Updated 5 years ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆16Dec 18, 2021Updated 4 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- DASH is deep osint Scanner. You just need username to start osint scan.☆54Oct 29, 2022Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago