☆25Mar 1, 2023Updated 3 years ago
Alternatives and similar repositories for Keralahacker
Users that are interested in Keralahacker are comparing it to the libraries listed below
Sorting:
- BugBounty_CheatSheet☆264May 11, 2023Updated 2 years ago
- Hacking Tools For Termux☆335Jul 1, 2025Updated 8 months ago
- This is only for information about top hacking tools in termux☆459Jan 29, 2023Updated 3 years ago
- Auto IP or Domain Attack Tool ( #1 )☆426Jul 1, 2025Updated 8 months ago
- Termux Banner Maker Script by Parixit Sutariya (BullAnonymous)☆611Jul 1, 2025Updated 8 months ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆656Aug 4, 2025Updated 7 months ago
- Check your WAF before an attacker does☆1,468Jul 17, 2025Updated 7 months ago
- Tips and Tutorials for Bug Bounty and also Penetration Tests.☆1,707Oct 7, 2025Updated 5 months ago
- A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for id…☆1,777Sep 11, 2025Updated 5 months ago
- Bug Bounty Roadmaps☆1,716Jun 12, 2021Updated 4 years ago
- A simple script just made for self use for bypassing 403☆2,032May 30, 2024Updated last year
- venom - C2 shellcode generator/compiler/handler☆1,936Dec 9, 2023Updated 2 years ago
- Single-file PHP shell☆2,734Aug 11, 2025Updated 6 months ago
- Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for P…☆3,038Sep 16, 2025Updated 5 months ago
- Take a list of domains and probe for working HTTP and HTTPS servers☆3,089Jun 22, 2024Updated last year
- Find domains and subdomains related to a given domain☆3,537Jun 7, 2024Updated last year
- Grab cam shots & GPS location from target's phone front camera or PC webcam just sending a link.☆4,584Apr 29, 2025Updated 10 months ago
- Framework for Man-In-The-Middle attacks☆3,636Aug 28, 2018Updated 7 years ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆6,022Feb 12, 2023Updated 3 years ago
- Top 100 Hacking & Security E-Books (Free Download)☆6,271Jul 26, 2024Updated last year
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,385Sep 14, 2023Updated 2 years ago
- Defeating Windows User Account Control☆7,414Feb 17, 2026Updated 2 weeks ago
- Accurately Locate Smartphones using Social Engineering☆9,119May 7, 2025Updated 10 months ago
- A list of resources for those interested in getting started in bug bounties☆11,884Jul 23, 2024Updated last year
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆14,066Jan 11, 2026Updated last month
- The Rogue Access Point Framework☆14,485Feb 4, 2025Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,424Updated this week
- A collection of awesome penetration testing resources, tools and other shiny things☆25,470Jan 25, 2026Updated last month
- Automatic SQL injection and database takeover tool☆36,768Feb 26, 2026Updated last week
- PowerShell for every system!☆51,731Updated this week
- OBS Studio - Free and open source software for live streaming and screen recording☆70,734Updated this week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,690Mar 2, 2026Updated last week
- Fast and extensible multi-platform HTTP/1-2-3 web server with automatic HTTPS☆70,525Updated this week
- library binary for media codec☆12Jun 19, 2015Updated 10 years ago
- Binary code size profiler for WebAssembly☆13Aug 11, 2022Updated 3 years ago
- Naga is a minimal yet spicy service framework for Go.☆14Feb 17, 2025Updated last year
- PowerShell module for Office 365 and Azure log collection☆279Sep 22, 2025Updated 5 months ago
- Linkgen is an Open Source static Link in Bio generator☆15May 17, 2022Updated 3 years ago
- Glue workflow to convert CloudTrail logs to Athena-friendly Parquet format☆48Apr 25, 2024Updated last year