hackerschoice / THC-ArchiveLinks
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
☆726Updated 2 years ago
Alternatives and similar repositories for THC-Archive
Users that are interested in THC-Archive are comparing it to the libraries listed below
Sorting:
- Ncrack network authentication tool☆1,146Updated last year
- MSFvenom Payload Creator (MSFPC)☆1,276Updated 4 years ago
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices☆910Updated 2 years ago
- Find exploits in local and online databases instantly☆1,747Updated 3 years ago
- Auto Scanning to SSL Vulnerability☆634Updated 4 years ago
- The New Hacking Framework☆706Updated 4 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆868Updated 6 years ago
- Hacking Toolkit☆928Updated last year
- Advanced reconnaissance utility☆982Updated last year
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆733Updated 2 years ago
- Automatically exported from code.google.com/p/armitage☆550Updated 3 years ago
- EasySploit - Metasploit automation (EASIER and FASTER than EVER)☆378Updated 5 years ago
- GUI frontend to John the Ripper password cracker☆586Updated last year
- crunch wordlist generator from http://sourceforge.net/projects/crunch-wordlist/☆225Updated 6 years ago
- Metasploit custom modules, plugins, resource script and.. awesome metasploit collection☆405Updated 2 years ago
- netdiscover☆395Updated 2 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,315Updated 3 years ago
- A framework for layer 2 attacks☆788Updated last year
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,720Updated 9 months ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆917Updated 2 months ago
- The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers☆458Updated 2 years ago
- Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, recon…☆1,044Updated 9 months ago
- Medusa is a speedy, parallel, and modular, login brute-forcer.☆788Updated 2 months ago
- Damn Small SQLi Scanner☆854Updated 7 months ago
- Tools, scripts and tips useful during Penetration Testing engagements.☆631Updated last week
- network reconnaissance toolkit☆426Updated 6 years ago
- Network Infrastructure Penetration Testing Tool☆1,658Updated 4 years ago
- Module of Metasploit to exploit the vulnerability Eternalblue-Doublepulsar.☆1,125Updated 4 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb-bin-sploits☆1,791Updated 2 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆548Updated 9 months ago