Tutorials and Things to Do while Hunting Vulnerability.
☆20Sep 14, 2021Updated 4 years ago
Alternatives and similar repositories for HowToHunt
Users that are interested in HowToHunt are comparing it to the libraries listed below
Sorting:
- This repo contain scripts written for finding subdomains using various available tools☆28Oct 21, 2020Updated 5 years ago
- Find CVEs that don't have a Detectify modules.☆22Mar 28, 2023Updated 2 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- Cross-platform MSR605 / MSR605X GUI and library☆18May 13, 2023Updated 2 years ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Dec 27, 2018Updated 7 years ago
- eBPF program to watch packet drops.☆16Nov 22, 2022Updated 3 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Sep 23, 2015Updated 10 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆21Mar 30, 2018Updated 7 years ago
- use at your own risk☆37Nov 23, 2019Updated 6 years ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆28Mar 11, 2022Updated 4 years ago
- qHooK is very simple python script (dependent on pydbg) which hooks user defined Win32 APIs in any process and monitor then while process…☆21Jan 31, 2015Updated 11 years ago
- An easy to use emulator for Android NFC Intents☆12May 22, 2020Updated 5 years ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- Google image search but NSFW ;)☆12Mar 20, 2020Updated 6 years ago
- Scanner for Log4j RCE CVE-2021-44228☆11Jul 6, 2022Updated 3 years ago
- Ansible replacement, written in pure Sh☆11Dec 2, 2023Updated 2 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- ☆15May 19, 2020Updated 5 years ago
- Truncate strings in a human-friendly way.☆14Dec 5, 2021Updated 4 years ago
- My busybox patches☆11Sep 21, 2012Updated 13 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- An android app used for inventory by scanning RFID card from phone which has a NFC reader.☆11Jul 4, 2017Updated 8 years ago
- EH-Bble☆10Jul 23, 2019Updated 6 years ago
- 3D printed mini circular table saw.☆11Jul 19, 2014Updated 11 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆54Oct 1, 2015Updated 10 years ago
- this is a simple ai chatbot, with python pytorch and natural language processing.☆12Nov 22, 2021Updated 4 years ago
- Find credit card info using BIN/IIN☆12Dec 29, 2025Updated 2 months ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- Automatic Drum Beat Generator using LSTM☆14Jan 12, 2021Updated 5 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 8 years ago
- MEMEX Weapons Pilot for the illegal weapons domain.☆15May 20, 2016Updated 9 years ago
- Sponsored By Mr ROBOT☆14Nov 15, 2020Updated 5 years ago
- A collection of useful scripts to prepare a new windows installation for use☆20Jun 18, 2024Updated last year
- ☆13Oct 1, 2022Updated 3 years ago
- Wordlists generated over the years of penetration testing☆14Mar 18, 2025Updated last year
- An MITM based Social Engineering (Phishing)attack POC!☆10Mar 25, 2014Updated 11 years ago
- This repository includes Android WebView example project.☆10Nov 3, 2020Updated 5 years ago
- automatically crawl every URL and find cross site scripting (XSS)☆41Mar 22, 2022Updated 3 years ago