APT, Cyber warfare, Penetration testing, Zero-day,Exploiting, Spyware,Malwares evade anti-virus detection, Rookit CYPTER, Antiviruses Bypassing-av, WORMS,Sandbox-Escape, Memory-injection, Ethical,Gray,White,RedTeam...
☆315Nov 30, 2018Updated 7 years ago
Alternatives and similar repositories for hackingLibrary
Users that are interested in hackingLibrary are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Mar 6, 2019Updated 7 years ago
- Hacker, ready for more of our story ! 🚀☆585May 20, 2023Updated 2 years ago
- Keylogger for ethical hackers☆14Aug 25, 2021Updated 4 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- Collection of tools that aid in red team operations☆25Aug 23, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- Ha3Mrx Pentesting and Security Hacking☆440Nov 15, 2024Updated last year
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- Use to perform Microsoft exchange account brute-force.☆73Apr 17, 2021Updated 4 years ago
- 😎 🔗 Awesome list about all kinds of resources for learning Ethical Hacking and Penetration Testing.☆3,412Dec 15, 2024Updated last year
- Complete Listing and Usage of Tools used for Ethical Hacking☆2,013Oct 23, 2023Updated 2 years ago
- Free Security and Hacking eBooks☆4,834Jul 10, 2019Updated 6 years ago
- Community driven computer worm☆71Aug 15, 2022Updated 3 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Richkware is a modern C++20 framework for building educational malware agents. It provides a comprehensive, secure, and modular architect…☆539Jan 4, 2026Updated 3 months ago
- Exploit pack for pentesters and ethical hackers.☆120Jan 13, 2017Updated 9 years ago
- Awesome hacking is an awesome collection of hacking tools.☆3,801Apr 2, 2026Updated last week
- Handy script to automate the attack☆22Dec 19, 2019Updated 6 years ago
- Awesome-Cellular-Hacking☆3,672Mar 21, 2026Updated 2 weeks ago
- gui uac bypass (netplwiz.exe)☆66Sep 2, 2019Updated 6 years ago
- Exhaustive list of hacking tools☆319May 15, 2020Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Jun 4, 2019Updated 6 years ago
- A collection of spywares for education scopes☆44Apr 4, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This is the list of all rootkits found so far on github and other sites.☆1,438Aug 29, 2025Updated 7 months ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆205Aug 15, 2023Updated 2 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆13Mar 3, 2022Updated 4 years ago
- Setup HiddenEye Inside Of Termux☆10Jun 9, 2019Updated 6 years ago
- ImperiumRAT is an advanced remote administration tool with features like (Remote desktop, Disable CMD, Turn on/off webcam, and more!)☆12Dec 7, 2022Updated 3 years ago
- Articles accumulated by the 360Quake team.☆15Jun 18, 2021Updated 4 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆179Feb 14, 2026Updated last month
- Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Keylogger | Botnets | Worms | Other Network Tools☆189Jan 27, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- redteam☆152Aug 21, 2020Updated 5 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆111Aug 23, 2021Updated 4 years ago
- Network Pivoting Toolkit☆458Aug 26, 2023Updated 2 years ago
- Hacking Toolkit☆974Dec 30, 2025Updated 3 months ago
- Official Black Hat Arsenal Security Tools Repository☆4,250Aug 26, 2024Updated last year
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago