hackerschoice / THC-Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
☆708Updated last year
Alternatives and similar repositories for THC-Archive:
Users that are interested in THC-Archive are comparing it to the libraries listed below
- MSFvenom Payload Creator (MSFPC)☆1,255Updated 3 years ago
- Ncrack network authentication tool☆1,119Updated 11 months ago
- Miscellaneous exploit code☆1,548Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,718Updated 2 months ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,282Updated 6 months ago
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices☆896Updated 2 years ago
- Pop shells like a master.☆1,454Updated 6 years ago
- Find exploits in local and online databases instantly☆1,720Updated 3 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,643Updated 4 months ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,701Updated 5 months ago
- Advanced reconnaissance utility☆968Updated last year
- Module of Metasploit to exploit the vulnerability Eternalblue-Doublepulsar.☆1,112Updated 4 years ago
- Veil Evasion is no longer supported, use Veil 3.0!☆1,835Updated 3 years ago
- ☆545Updated last year
- DMitry (Deepmagic Information Gathering Tool)☆215Updated 8 months ago
- SigPloit: Telecom Signaling Exploitation Framework - SS7, GTP, Diameter & SIP☆153Updated 5 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆722Updated 2 years ago
- NSE script based on Vulners.com API☆3,288Updated last year
- Auto Scanning to SSL Vulnerability☆631Updated 4 years ago
- EasySploit - Metasploit automation (EASIER and FASTER than EVER)☆375Updated 5 years ago
- Vulnerability Labs for security analysis☆1,166Updated 4 years ago
- IPv6 attack toolkit☆1,074Updated last month
- Undetectable Windows Payload Generation☆1,584Updated 2 years ago
- GUI frontend to John the Ripper password cracker☆563Updated last year
- Network Infrastructure Penetration Testing Tool☆1,635Updated 3 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,308Updated 3 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,200Updated this week
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,404Updated 6 years ago
- Automatically exported from code.google.com/p/ghost-phisher☆359Updated 4 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆487Updated 3 years ago