Exhaustive list of hacking tools
☆314May 15, 2020Updated 5 years ago
Alternatives and similar repositories for HackingTools
Users that are interested in HackingTools are comparing it to the libraries listed below
Sorting:
- A list of security/hacking tools that have been collected from the internet. Suggestions are welcomed.☆558Feb 11, 2021Updated 5 years ago
- tools which can be used by forensics experts and ethical hackers☆182Apr 28, 2016Updated 9 years ago
- A collection of awesome lists for hackers, pentesters & security researchers.☆351May 10, 2023Updated 2 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆197Aug 15, 2023Updated 2 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- Experimental PowerShell tools for Penetration Testing / Red Teaming☆22Jun 28, 2017Updated 8 years ago
- A curated list of tools for incident response☆34Mar 2, 2024Updated last year
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- Low-level MS Windows registry files analysis tools☆19May 5, 2016Updated 9 years ago
- wireless hacking - This is automated wireless hacking tool☆1,278Oct 27, 2022Updated 3 years ago
- hack tools☆1,179Sep 23, 2024Updated last year
- hacking-tutorials☆358Apr 16, 2021Updated 4 years ago
- The demo on Windows☆21Mar 6, 2016Updated 9 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Micro$oft Windows Hacking Pack☆525Mar 6, 2018Updated 7 years ago
- Awesome hacking is an awesome collection of hacking tools.☆3,751Feb 18, 2026Updated last week
- A collection of various hacking and exploitation tools for hackers and pentesters.☆177Aug 4, 2016Updated 9 years ago
- My Personal Library for CTF's☆12Apr 3, 2018Updated 7 years ago
- WIreless Hacking Tools☆167Aug 5, 2013Updated 12 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 3 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting, Spyware,Malwares evade anti-virus detection, Rookit CYPTER, An…☆310Nov 30, 2018Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Jan 17, 2020Updated 6 years ago
- A collection of Open Data for the data freaks out there.☆37Jan 4, 2018Updated 8 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Nov 18, 2022Updated 3 years ago
- ☆10Sep 29, 2019Updated 6 years ago
- ☆13Aug 12, 2015Updated 10 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Enumerates very, very large directories quickly by directly using kernel syscalls. For POSIX and Windows. WARNING THIS IS OBSOLETE. USE B…☆15Aug 13, 2014Updated 11 years ago
- SQLC2 is a PowerShell script for deploying and managing a command and control system that uses SQL Server as both the control server and …☆77Nov 5, 2022Updated 3 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆65Nov 4, 2012Updated 13 years ago
- A curated list of awesome Hacking tutorials, tools and resources☆15,729Jun 2, 2024Updated last year
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Dec 14, 2018Updated 7 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago
- Using Deviare to Cheat on Games: Intercepting Direct3D COM objects and making walls invisible☆13Jul 1, 2013Updated 12 years ago
- Fork of Afronanny's SendProxy Manager extension☆10Jan 19, 2016Updated 10 years ago
- Just another tool to download specify Symbol (.pdb) files☆39Sep 4, 2019Updated 6 years ago