ilcapone / Hack-Comands
Compilation of commands for hacking tasks and security tools as a bit of everything
☆15Updated 2 months ago
Alternatives and similar repositories for Hack-Comands:
Users that are interested in Hack-Comands are comparing it to the libraries listed below
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆12Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆16Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Updated 2 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 3 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali☆9Updated 2 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆14Updated last month
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆11Updated 2 years ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆14Updated 2 months ago
- Maltego transform with Keskivonfer☆14Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 6 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Burp Suite extension for extracting metadata from files☆19Updated 4 years ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆15Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- Spider or repeater to find all links.☆13Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 4 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆13Updated 2 years ago
- Find open databases - Powered by Binaryedge.io☆12Updated 5 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆11Updated 2 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago