hackerschoice / THC-Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
☆705Updated last year
Alternatives and similar repositories for THC-Archive:
Users that are interested in THC-Archive are comparing it to the libraries listed below
- MSFvenom Payload Creator (MSFPC)☆1,242Updated 3 years ago
- Ncrack network authentication tool☆1,103Updated 10 months ago
- Find exploits in local and online databases instantly☆1,696Updated 3 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,303Updated 3 years ago
- IPv6 attack toolkit☆1,059Updated last week
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,261Updated 4 months ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆332Updated 6 months ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,400Updated 6 years ago
- Hacking Toolkit☆911Updated last year
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆721Updated 2 years ago
- The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers☆454Updated 2 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,583Updated 4 years ago
- Undetectable Windows Payload Generation☆1,576Updated 2 years ago
- Network Attack Tool☆1,452Updated last year
- Advanced reconnaissance utility☆965Updated last year
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,603Updated 3 months ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,690Updated 4 months ago
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices☆894Updated 2 years ago
- Veil Evasion is no longer supported, use Veil 3.0!☆1,834Updated 3 years ago
- EasySploit - Metasploit automation (EASIER and FASTER than EVER)☆373Updated 5 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,084Updated this week
- fireELF - Fileless Linux Malware Framework☆661Updated 5 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,708Updated 3 weeks ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆487Updated 3 years ago
- Network Infrastructure Penetration Testing Tool☆1,631Updated 3 years ago
- Auto Root Exploit Tool☆530Updated last year
- AntiVirus Evasion Tool☆1,679Updated last year
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,132Updated 4 years ago
- network reconnaissance toolkit☆421Updated 6 years ago
- Auto Scanning to SSL Vulnerability☆630Updated 4 years ago