ihebski / hacksLinks
Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....
☆33Updated 7 months ago
Alternatives and similar repositories for hacks
Users that are interested in hacks are comparing it to the libraries listed below
Sorting:
- Automated HTTP Request Repeating With Burp Suite☆39Updated 2 years ago
- C2Matrix Automation☆12Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 4 years ago
- SMTP Open Relay Exploitation☆15Updated 4 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Simple recon tool automates your recon process☆17Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- ☆19Updated last year
- A BASH Script to automate the installation of the most popular bug bounty tools☆21Updated 11 months ago
- Automate Auxiliary Module in Metasploit☆19Updated 4 years ago
- XSS scanning with Dalfox on Github-action☆25Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆20Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Repository of useful payloads and tips for pentesting/bug bounty.☆27Updated 9 months ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆19Updated 7 months ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆36Updated 4 years ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆72Updated last year
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆49Updated 10 months ago
- Site fast fuzzing with chorme extension.☆25Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- ☆12Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- Exploits project Hacking Command Center☆51Updated last year
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆21Updated 11 months ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last week
- This repository contains random Nuclei templates I've created. Most of them based on recent security issues and exploits.☆15Updated last year