lethanhtrung22 / Awesome-Hacking
Awesome Hacking
☆20Updated 6 years ago
Alternatives and similar repositories for Awesome-Hacking:
Users that are interested in Awesome-Hacking are comparing it to the libraries listed below
- A JavaScript components vulnerability scanner, based on RetireJS☆36Updated 4 years ago
- Subdomain Enumeration and Scanner☆33Updated 4 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 6 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆27Updated 5 years ago
- This is a beginner level session to train you into using SSH more effectively. While pentesters may benefit (especially if they are plan…☆15Updated 6 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆19Updated 2 years ago
- Scrap Latest Information Security Resources☆32Updated 4 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- Scripts for OSCE☆18Updated 6 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- ☆20Updated 5 years ago
- HTML5 Training material for Attack and Secure training sessions.☆43Updated 2 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 5 years ago
- A ping detection tool for linux☆24Updated 5 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 7 years ago
- Security checks for your researches☆33Updated 4 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- ☆25Updated 4 years ago
- Bug Bounty Clipboard☆17Updated 5 years ago
- Wordlists for intelligent directory brute-forcing☆29Updated 3 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated last year
- Pythonize Intruder Payload☆13Updated 4 years ago
- Clickjacking PoC Generator☆35Updated 4 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- Unique wordlist generator of unique wordlists.☆42Updated last year