SearchToolkit is advanced collection of tools, hardwares, resources and cheatsheets useful for Pentester, Red Teamer, Bug Hunter, Forensics, LAW enforcement etc.
☆22Feb 15, 2026Updated last month
Alternatives and similar repositories for SearchToolkit
Users that are interested in SearchToolkit are comparing it to the libraries listed below
Sorting:
- My Android SuperHack app source.☆15Nov 14, 2025Updated 4 months ago
- A Python package and command-line interface (CLI) tool for asynchronous OSINT username enumeration using the WhatsMyName dataset☆29Feb 16, 2026Updated last month
- Worm is an Android post exploitation Framework to gain remote access of any Android device by exploiting Android Debug Bridge.☆14Jun 7, 2024Updated last year
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆25Aug 2, 2025Updated 7 months ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- Simple PHP class to get your Envato statement and ratings☆41Aug 28, 2015Updated 10 years ago
- OSINT Intelligence for different areas ( useful for different type of investigations and learning etc)☆14May 20, 2020Updated 5 years ago
- Public Exploits☆10Apr 6, 2021Updated 4 years ago
- This is a Cyhton wrapper for hackrf. It includes both libhackrf and hackrf-tools. It can also work on Android using buildozer installer.☆29Feb 10, 2026Updated last month
- Mirror of Malware Domain List☆11Oct 11, 2020Updated 5 years ago
- Contains information links, articles, research papers, tweets, blog posts, companies etc and everything which is even minutely related to…☆19Aug 17, 2025Updated 7 months ago
- Code to check AWS S3 buckets☆17Dec 19, 2017Updated 8 years ago
- ☆40Aug 25, 2018Updated 7 years ago
- ☆11Jun 4, 2021Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Mar 25, 2023Updated 2 years ago
- exploitpack extracted from a honeynet which is being prepared by intruduers to be used as an exploitation infrastructure☆12Feb 17, 2022Updated 4 years ago
- Social Media, Website, Crypto Hacking 🔥 Hacker, Cyber, Cybersecurity. Instagram, TikTok, YouTube, Telegram, Snapchat Hacking. Cryptocurr…☆60Updated this week
- PSX provides a collection of common operations that rely on PowerShell like encoding and hosting PowerShell-specific payloads☆12Oct 18, 2023Updated 2 years ago
- All kind of frida stuff when needed in pentesting or reverse engineering of an android app - The perfect starter kit☆18Jun 2, 2020Updated 5 years ago
- A continuously curated list of my favorite links and resources relating to Open Source Intelligence gathering.☆18Jul 10, 2018Updated 7 years ago
- My software engineering notes.☆24Nov 12, 2025Updated 4 months ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- Generate the awesome lists in JSON file.☆29Dec 20, 2015Updated 10 years ago
- A curation of awesome portfolio website ideas for developers and designers to draw inspiration from. Raise a pull request to add more. 💜…☆11Apr 10, 2025Updated 11 months ago
- Provides link on a site to where to delete account and informs you how hard it is to delete your account. - No longer maintained.☆22Jan 4, 2024Updated 2 years ago
- A collection of CTF frameworks, libraries, resources, softwares and tutorials, books, resources and cool stuff in Cybersecurity☆17Dec 11, 2021Updated 4 years ago
- Admin interface using twitter bootstrap.☆59Apr 18, 2017Updated 8 years ago
- ☆19Jan 23, 2020Updated 6 years ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆77Apr 6, 2025Updated 11 months ago
- TikTok User Info Scraper allows you to fetch detailed information about TikTok users by their username or user ID, without requiring logi…☆59Oct 28, 2025Updated 4 months ago
- OSCP Notes☆20Aug 14, 2022Updated 3 years ago
- ☆24Feb 1, 2025Updated last year
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated 2 months ago
- ☆18Apr 26, 2025Updated 10 months ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- Old version of mimikatz for OSCP labs☆18Aug 1, 2020Updated 5 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆59Mar 4, 2023Updated 3 years ago
- A technical content explaining Data structures and Algorithms in JavaScript.☆23Oct 30, 2025Updated 4 months ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago