esc0rtd3w / cracking-tutorials
Random Software That I Have Reverse-Engineered. Includes notes, patches, and all other related files for each.
☆34Updated 6 years ago
Alternatives and similar repositories for cracking-tutorials:
Users that are interested in cracking-tutorials are comparing it to the libraries listed below
- Sponsored By Mr ROBOT☆14Updated 4 years ago
- An advance keylogger that works and also logs special keys.☆19Updated 2 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆64Updated 4 years ago
- Using open Adb ports we can exploit a Andriod Device☆19Updated 5 years ago
- Python tools for ethical hacking☆39Updated 5 years ago
- Find usernames☆25Updated 4 years ago
- Generate word list by combining inputted words or by permutaing characters.☆13Updated 7 years ago
- Simple tool to scanning sql injection vulnerability, easy to use!!☆15Updated 5 years ago
- Get details about a phone number by simply highlighting, right clicking, and choosing a site to look the number up on.☆12Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆16Updated 3 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆15Updated 3 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆16Updated 4 years ago
- Access Windows 10 without password☆13Updated 4 years ago
- ☆15Updated 3 years ago
- Repository of tools used in my blog☆51Updated last year
- Payload delivery via URL and some social engineering.☆17Updated 9 months ago
- Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showe…☆41Updated 5 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆15Updated 5 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆13Updated 3 years ago
- Hacking Tools For All Debian-based OS☆50Updated 7 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆52Updated 7 years ago
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆14Updated 6 years ago
- Geolocation Spy (GeoSpy) is an OSINT analysis and research tool that is used to track and execute intelligent social engineering attacks …☆19Updated 4 years ago
- Official Black Hat Arsenal Security Tools Repository☆13Updated 7 years ago
- Espia trafico de la red NETSPY.sh ( hackingyseguridad.com )☆22Updated 2 months ago
- The WiFi Penetration Toolkit☆27Updated 3 years ago
- ☆13Updated 7 years ago
- Automating the SQL Injection through Google dorks.☆24Updated 2 years ago
- Collections of Tools, Bookmarks, and other guides created to aid in OSINT collection☆17Updated 3 years ago
- AutoKali automatically installs useful programs and scripts for recon, enumeration and exploitation for Kali Linux that aren't included b…☆16Updated last year