Compilation of commands for hacking tasks and security tools as a bit of everything
☆14Jul 3, 2025Updated 8 months ago
Alternatives and similar repositories for Hack-Comands
Users that are interested in Hack-Comands are comparing it to the libraries listed below
Sorting:
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- ☆10Apr 18, 2019Updated 6 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 3 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- Tool to find stored robots.txt files from the past☆19Jun 4, 2023Updated 2 years ago
- A small and fast bash script to automate LFI vulnerability.☆11Nov 21, 2022Updated 3 years ago
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 8 months ago
- huntr.dev public disclosures/hacktivity watcher☆17Nov 5, 2023Updated 2 years ago
- ☆14Mar 8, 2023Updated 3 years ago
- hacker Tools cross-platform desktop App, support windows/MacOS/LInux ....☆44May 27, 2024Updated last year
- Converts binary files of 1C (1CD, cf, epf, efd, etc.) to grepable CSV☆12Feb 12, 2024Updated 2 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- simple bash script to earn bounties☆36Apr 27, 2024Updated last year
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- An automated e-mail OSINT tool☆23Apr 23, 2022Updated 3 years ago
- Threat Modeling Tool Extension for Penetration Tester (TMTe4PT)☆12Mar 2, 2022Updated 4 years ago
- Programs I Made while learning python for pentesters.☆20Aug 26, 2022Updated 3 years ago
- Send Emails from another account☆28Mar 8, 2024Updated 2 years ago
- Rockyou for web fuzzing☆15Jan 28, 2022Updated 4 years ago
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 2 years ago
- Reverse And Dorking Tools☆26Apr 30, 2021Updated 4 years ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆36Jul 24, 2018Updated 7 years ago
- My personal repository☆13Jan 18, 2026Updated 2 months ago
- 'Software Asset Management' PowerShell library to extract software licensing relevant information from enterprise software systems☆13Aug 26, 2020Updated 5 years ago
- 3klector is an automation Recon tool which collecting information about Acquisitions and ASN which related to Big Scope company☆47Sep 19, 2022Updated 3 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Dec 23, 2021Updated 4 years ago
- Damn Small SQLi Scanner. (DSSS)☆15Nov 25, 2017Updated 8 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- Source code for Hacker101.com - a free online web and mobile security class.☆16Apr 28, 2022Updated 3 years ago
- Google Hack Database dork automatic tool.☆27Dec 11, 2017Updated 8 years ago
- Do recon in single click☆21Jan 22, 2025Updated last year
- Active/passive network scanner and autonomous vulnerability assessment application.☆74Jun 25, 2020Updated 5 years ago
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆13Feb 19, 2022Updated 4 years ago
- GUI SQL Injection scannig tool☆31Oct 24, 2025Updated 4 months ago
- A ddos tool for penetration of websites☆15Dec 13, 2020Updated 5 years ago
- ☆13Jan 18, 2017Updated 9 years ago
- Scalable, OctopusDeploy-powered webfarm using Windows Azure Web Roles.☆25Mar 3, 2018Updated 8 years ago
- Example of using poetry-lock-package to create a docker container☆14Nov 13, 2021Updated 4 years ago