indetectables-net / manualsLinks
Conjunto de manuales para reversa/analisis/cracking
☆67Updated 3 years ago
Alternatives and similar repositories for manuals
Users that are interested in manuals are comparing it to the libraries listed below
Sorting:
- Mirror de las teorias numeradas del sitio de Narvaja☆24Updated 7 months ago
- Red Team Guides☆144Updated 2 years ago
- Here are +200 different rats some with source code☆144Updated 2 years ago
- NetRadar is a Networking tool focused on mapping local and WiFi networks. It provides detailed information about connected devices, open …☆141Updated 2 years ago
- ☆133Updated 3 years ago
- Algunos #OSINT_TIPS para sus excelentes investigaciones en fuentes abiertas (#OSINT). Hello! I share some #OSINT_TIPS for your excellent …☆26Updated 2 years ago
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆89Updated last year
- Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is int…☆49Updated last year
- This repository contains a few leaked files of HookBot.☆106Updated 2 years ago
- ☆124Updated last year
- RansomwareSim is a simulated ransomware☆169Updated last year
- 🔮 Python Remote administration tool via telegram☆55Updated 9 months ago
- Repo containing cracked red teaming tools.☆216Updated 2 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Updated 9 months ago
- NetworkAssessment: Network Compromise Assessment Tool☆94Updated last year
- Remote persistent 🔑Logger for Windows and Linux☆294Updated 2 years ago
- Hardware Hacking ES Comunidad☆126Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated 2 years ago
- Windows And Ways To Break It☆100Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated 2 years ago
- CryptChat: Beyond Secure Messaging 🛡️☆71Updated 2 years ago
- Rapid Deployment Infrastructure for Red Teaming and Penetration Testing☆44Updated 3 years ago
- ☆204Updated 2 years ago
- Fork from @rsmudge/armitage☆140Updated 3 years ago
- Undetectable payload for Windows 10 and 11☆39Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- on-the-fly☆85Updated last year
- GUI Osint Framework with Kali Linux☆170Updated 2 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆346Updated last year