Compilation of commands for hacking tasks and security tools as a bit of everything
☆14Jul 3, 2025Updated 7 months ago
Alternatives and similar repositories for Hack-Comands
Users that are interested in Hack-Comands are comparing it to the libraries listed below
Sorting:
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- ☆10Apr 18, 2019Updated 6 years ago
- Converts binary files of 1C (1CD, cf, epf, efd, etc.) to grepable CSV☆12Feb 12, 2024Updated 2 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 2 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆11Nov 21, 2022Updated 3 years ago
- A small and fast bash script to automate LFI vulnerability.☆11Nov 21, 2022Updated 3 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- ☆14Mar 8, 2023Updated 2 years ago
- simple bash script to earn bounties☆36Apr 27, 2024Updated last year
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 7 months ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 2 years ago
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆22Jun 12, 2023Updated 2 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Dec 23, 2021Updated 4 years ago
- Source code for Hacker101.com - a free online web and mobile security class.☆15Apr 28, 2022Updated 3 years ago
- hacker Tools cross-platform desktop App, support windows/MacOS/LInux ....☆44May 27, 2024Updated last year
- Damn Small SQLi Scanner. (DSSS)☆15Nov 25, 2017Updated 8 years ago
- huntr.dev public disclosures/hacktivity watcher☆16Nov 5, 2023Updated 2 years ago
- A ddos tool for penetration of websites☆15Dec 13, 2020Updated 5 years ago
- Tool to find stored robots.txt files from the past☆19Jun 4, 2023Updated 2 years ago
- A curated list of blockchain security incidents including exchange hacks, DeFi compromises, blockchain attacks, and others.☆25May 11, 2021Updated 4 years ago
- Private XSS BOMB 16k Payloads The Biggest Payloads List online☆19Dec 31, 2023Updated 2 years ago
- Rockyou for web fuzzing☆15Jan 28, 2022Updated 4 years ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆37Jul 24, 2018Updated 7 years ago
- Totem maltego transform☆29Sep 23, 2020Updated 5 years ago
- 3klector is an automation Recon tool which collecting information about Acquisitions and ASN which related to Big Scope company☆47Sep 19, 2022Updated 3 years ago
- Reverse And Dorking Tools☆26Apr 30, 2021Updated 4 years ago
- Google Hack Database dork automatic tool.☆27Dec 11, 2017Updated 8 years ago
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆25Aug 4, 2023Updated 2 years ago
- An automated e-mail OSINT tool☆23Apr 23, 2022Updated 3 years ago
- A Scampage-Builder tool is a malicious software or program designed to create scam web pages, often used in phishing attacks.☆25Sep 13, 2023Updated 2 years ago
- Other tools developed by CIRT.net☆23Aug 2, 2020Updated 5 years ago
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆18Mar 13, 2023Updated 2 years ago
- my own 2fa bypass methodolgy☆28Sep 22, 2023Updated 2 years ago
- ☆10Aug 20, 2020Updated 5 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- Reverse IP And Subdomain Scanner☆22May 16, 2021Updated 4 years ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Mar 29, 2021Updated 4 years ago