koutto / hacktricksLinks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
☆10Updated 4 years ago
Alternatives and similar repositories for hacktricks
Users that are interested in hacktricks are comparing it to the libraries listed below
Sorting:
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆63Updated 2 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆68Updated 2 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆22Updated 2 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated 11 months ago
- Collection of extra pentest tools for Kali Linux☆108Updated 2 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated 10 months ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- ☆70Updated 2 years ago
- Arkhota, a web brute forcer for Android.☆20Updated 2 years ago
- Customized Password/Passphrase List inputting Target Info☆90Updated 8 months ago
- A tool designed to analyse email headers☆35Updated 2 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Updated 4 years ago
- Subdomain Bruteforce - Bounty Quick Code☆31Updated 10 months ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆90Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- An Effiecent Tool To Change Tor IP's in Seconds,change mac address and clean all logs☆36Updated 3 years ago
- An automated e-mail OSINT tool☆23Updated 3 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆54Updated 4 years ago
- Command Execution exploiter with an auto connection handling☆33Updated 3 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated 2 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- ☆28Updated 2 years ago
- xdebug 2.5.5 RCE exploit☆31Updated 6 months ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆56Updated last year
- ☆42Updated 3 years ago
- Generate Undetectable Metasploit Payload in a simple way☆39Updated last year
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆13Updated 2 months ago
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆44Updated 11 months ago