esc0rtd3w / cracking-tutorialsLinks
Random Software That I Have Reverse-Engineered. Includes notes, patches, and all other related files for each.
☆34Updated 6 years ago
Alternatives and similar repositories for cracking-tutorials
Users that are interested in cracking-tutorials are comparing it to the libraries listed below
Sorting:
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆16Updated 4 years ago
- A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.☆15Updated 4 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- Python tools for ethical hacking☆41Updated 5 years ago
- Simple (but working) WEP/WPA/WPA2 Hacking script☆30Updated 9 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆13Updated 3 years ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 6 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆16Updated 5 years ago
- Hack Cameras CCTV FREE☆17Updated 3 years ago
- Packet sniffer using scapy☆18Updated 5 years ago
- OpenVPN VPN Gate Client for Linux, connects you to a random Free VPN in a country of your choice by country code.☆48Updated 8 months ago
- WiFi-Jammer/DoS toolset☆62Updated 5 years ago
- Red Teaming Tactics and Techniques☆11Updated 4 years ago
- A simple Golang program to collect proxies☆12Updated 5 years ago
- Auto IP range scanner & exploit tool for BlueKeep metasploit module☆24Updated 3 years ago
- Reverse/ Bind Shell Generator for cross platform systems☆19Updated 6 years ago
- Password Recovery Toolkit For Windows Written in Python 3☆26Updated last year
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 3 years ago
- Collections of Tools, Bookmarks, and other guides created to aid in OSINT collection☆17Updated 3 years ago
- Geolocation Spy (GeoSpy) is an OSINT analysis and research tool that is used to track and execute intelligent social engineering attacks …☆19Updated 4 years ago
- Scan suspicious applications with over 60 different anti-viruses with a mere two clicks and five seconds!☆40Updated 2 years ago
- List of awesome reverse engineering resources☆7Updated 5 years ago
- Generate word list by combining inputted words or by permutaing characters.☆13Updated 7 years ago
- to grab or steal the password of systemAutomated sticky keys hack. Post exploitation it grabs browser passwords, history, and network pas…☆55Updated 7 years ago
- CMB Mobile Google Hacking App☆39Updated 11 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- Open Penetration Testing Bookmarks Collection☆19Updated 10 years ago
- Find all cool documents on GOV and Info sites☆18Updated 5 years ago
- the venom framework is a framework made in ruby filled with tools for wireless hacking, normal terminal commands, metasploit payloads and…☆20Updated 6 years ago
- Hacking Tools For All Debian-based OS☆51Updated 7 years ago