girishramnani / hacking-toolsLinks
tools which can be used by forensics experts and ethical hackers
☆181Updated 9 years ago
Alternatives and similar repositories for hacking-tools
Users that are interested in hacking-tools are comparing it to the libraries listed below
Sorting:
- PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo☆529Updated 9 years ago
- A list of security/hacking tools that have been collected from the internet. Suggestions are welcomed.☆554Updated 4 years ago
- NoobSecToolkit is a Python Based Tool kit that brings together powerful security and anonymity tools and scripts with predefined security…☆114Updated last year
- This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. This…☆291Updated 8 years ago
- Repository for the Smartphone Pentest Framework (SPF)☆458Updated 8 years ago
- The Hacker's ToolBox☆190Updated 8 years ago
- Social engineering tool for human hacking☆125Updated 9 years ago
- SpeedPhishing Framework☆448Updated 6 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 4 years ago
- A Simple ARP Spoofer using Scapy☆107Updated 10 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆256Updated 8 years ago
- Some usefull scripts for KaliLinux☆473Updated 3 years ago
- Find your wireless network password in Windows , Linux and Mac OS☆355Updated 5 years ago
- Passive Vulnerability Auditor☆135Updated 9 years ago
- Chat with hacker assistant☆195Updated 8 years ago
- Advanced Hash Manipulation☆175Updated 6 years ago
- information gathering via dorks☆400Updated 3 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆224Updated 4 years ago
- Command line go0gle dorking tool☆140Updated 12 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆379Updated 8 years ago
- Unofficial Kali Documentation Project☆159Updated 10 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 8 years ago
- Automated digital reconnaissance☆203Updated 3 years ago
- Metasploit AV Evasion Tool☆256Updated 10 years ago
- Create fake AP in Kali with 1 command☆269Updated 10 years ago
- Python Pastebin Webcrawler that returns list of public pastebins containing keywords☆437Updated 4 years ago
- Specify targets and run sets of tools against them☆386Updated 6 years ago
- Linux bash script automation for metasploit☆269Updated 6 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆192Updated 6 years ago
- The Credential Mapper☆448Updated 8 years ago