lethanhtrung22 / Awesome-HackingView external linksLinks
Awesome Hacking
☆20Nov 9, 2018Updated 7 years ago
Alternatives and similar repositories for Awesome-Hacking
Users that are interested in Awesome-Hacking are comparing it to the libraries listed below
Sorting:
- ☆18Aug 19, 2021Updated 4 years ago
- RECON Notes taking from every fucking book about bugbounty and web-app penetration testing exists☆19Feb 29, 2020Updated 5 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Feb 4, 2021Updated 5 years ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Jan 25, 2017Updated 9 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Jun 10, 2019Updated 6 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- Typodetect☆74Jun 7, 2021Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- Tomcat的Filter型免杀内存马,主要思路是Bypass各种检查手段☆10Nov 26, 2021Updated 4 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Set up your own BurpSuite☆37Oct 29, 2018Updated 7 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97May 28, 2023Updated 2 years ago
- Gradio chat interface for FastMLX☆12Sep 22, 2024Updated last year
- SSH Bruteforce Basic Script created with C++ to Linux☆10Jan 28, 2023Updated 3 years ago
- App for tracking college bunks.☆54Apr 17, 2017Updated 8 years ago
- ☆13Aug 11, 2018Updated 7 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- ☆50Mar 22, 2022Updated 3 years ago
- Arduino driver for nRF24L01 on the iTeadStudio iBoard☆27Jul 24, 2012Updated 13 years ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆14Jul 15, 2025Updated 7 months ago
- Colour Me Cards are your classic holiday cards, with a modern twist.☆15Dec 24, 2018Updated 7 years ago
- Useful git commands for devops☆11Nov 21, 2022Updated 3 years ago
- A few Clio examples☆14Oct 11, 2021Updated 4 years ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆16Nov 18, 2025Updated 2 months ago
- Dockerized TOR socks5☆10Jul 15, 2018Updated 7 years ago
- C# .net Memory Tool library☆13Sep 21, 2022Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- A fork of Gordon Henderson's git://git.drogon.net/wiringPi but with python bindings☆11Jan 2, 2017Updated 9 years ago
- ☆14Dec 6, 2023Updated 2 years ago
- woodpecker-framework sdk☆10May 19, 2021Updated 4 years ago
- Session material from my conference presentation at Live360\Techmentor in Orlando,November 2023☆11Nov 14, 2023Updated 2 years ago
- woodpecker框架专用bcel库☆12Apr 30, 2021Updated 4 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- Wiegand data logger, replay device and micro door-controller☆14Jan 5, 2024Updated 2 years ago
- EVM in python from scratch because why not☆11Aug 22, 2022Updated 3 years ago
- Whatever apt group's js from their scanbox framework☆11Jun 22, 2016Updated 9 years ago
- ☆10Dec 24, 2022Updated 3 years ago