HOOK-Worm Pentest the Modern Web
☆115Feb 9, 2025Updated last year
Alternatives and similar repositories for hook-pentester
Users that are interested in hook-pentester are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Dec 13, 2023Updated 2 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- Archive of leaked Equation Group materials☆15Aug 17, 2016Updated 9 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆19Aug 4, 2023Updated 2 years ago
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆25Mar 22, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Dec 3, 2015Updated 10 years ago
- ☆12Apr 14, 2021Updated 5 years ago
- A python tool that scans files in a given directory looking for Bitcoin private keys☆21Dec 6, 2025Updated 5 months ago
- Multi-functional Web Recon & Vulnerability Scanner Tool☆35May 2, 2022Updated 4 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- Updates the Emerging Threats open ruleset for Suricata☆10Sep 20, 2015Updated 10 years ago
- A set of tools, procedures, and playbooks for performing bug bounties☆18Dec 2, 2018Updated 7 years ago
- ☆10May 25, 2023Updated 2 years ago
- Pentesting tool to automate common op tasks and organize discovered data.☆14Mar 26, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Nov 12, 2016Updated 9 years ago
- Brand New Code Injection for Windows☆13Oct 28, 2016Updated 9 years ago
- A tool to discover domains using crt.sh site (certificate transparency logs).☆15Aug 1, 2019Updated 6 years ago
- Growtopia stealer written at C# that steal save.dat, mac address, IP information, etc...☆10Aug 17, 2021Updated 4 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Nov 14, 2016Updated 9 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆19Dec 23, 2024Updated last year
- Subdomain discovery using Sublist3r, certspotter, crt.sh , censys and amass . Subdomain bruteforcing using Gobuster and Resolve hosts usi…☆16Oct 8, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆17Nov 9, 2023Updated 2 years ago
- A plugin for Burp Suite Pro to work with attacker payloads and automatically generate check digits for credit card numbers and similar nu…☆11Jun 3, 2015Updated 10 years ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 3 months ago
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- Showcasing the design patterns you can use alongside Model-View-ViewModel (MVVM).☆13Apr 21, 2021Updated 5 years ago
- Unity SDK for Aptabase: Open Source, Privacy-First and Simple Analytics for Mobile, Desktop and Web Apps☆20Feb 22, 2026Updated 2 months ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆47Updated this week
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆45Apr 14, 2026Updated 3 weeks ago
- Adds a Spy option to the React Native development menu☆14Jan 2, 2019Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A host-based IDS and network monitoring system (My graduation project)☆27Jul 6, 2021Updated 4 years ago
- The last Golang ORM you'll ever need, built like Active Record (with 1.18 Generics)☆10Nov 20, 2024Updated last year
- ☆16Mar 25, 2023Updated 3 years ago
- check multiple ip reputation☆13Jun 7, 2023Updated 2 years ago
- Silly Android app to bypass stupid Facebook's limitation that forces user to use Messenger app to chat with contacts, instead of normal b…☆10Jun 15, 2016Updated 9 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆16Aug 10, 2016Updated 9 years ago
- This project is a server-side solution for seamless URL redirection when a QR code is scanned. It redirects users to a specified URL and …☆15Aug 18, 2024Updated last year