hacking-tutorials
☆358Apr 16, 2021Updated 4 years ago
Alternatives and similar repositories for hacking-tutorials
Users that are interested in hacking-tutorials are comparing it to the libraries listed below
Sorting:
- Reverse Engineering Tutorials☆525Sep 2, 2018Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆3,290Sep 4, 2022Updated 3 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆197Aug 15, 2023Updated 2 years ago
- Exhaustive list of hacking tools☆314May 15, 2020Updated 5 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- Collection of tips, tools and tutorials around infosec☆29May 18, 2017Updated 8 years ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 6 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- 🗝 Socat with SSL v2/3 Support☆13May 27, 2024Updated last year
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- DHCP fingerprints database and related tools☆19Nov 14, 2014Updated 11 years ago
- An tool for search IOT MQTT vulnerable with shodan☆20Sep 15, 2017Updated 8 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆54Dec 5, 2018Updated 7 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Jun 22, 2018Updated 7 years ago
- Misc. Public Reports of Penetration Testing and Security Audits.☆35Jan 8, 2021Updated 5 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆16Jun 8, 2020Updated 5 years ago
- PowerShell based Microsoft DNS management tool set☆19May 26, 2016Updated 9 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Kernel Hacking study materials collection☆108Jul 14, 2016Updated 9 years ago
- Generate image payloads in JS to bypass filters☆39Mar 16, 2021Updated 4 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Mar 2, 2020Updated 5 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- Checks an IP:Port list of SOCKS4/5 and outputs working proxies to a file.s☆35Aug 27, 2022Updated 3 years ago
- ☆177Jul 5, 2023Updated 2 years ago
- Slide deck for DefCon Beijing☆39May 15, 2018Updated 7 years ago
- Cross-Site-Scripting (XSS) Automatic Scanner☆44Oct 6, 2020Updated 5 years ago
- Tools and scripts for penetration testing☆19Jun 28, 2020Updated 5 years ago
- Asynchronous MSF RPC API wrapper☆20Dec 8, 2022Updated 3 years ago
- Awesome-Cellular-Hacking☆3,616Jun 8, 2025Updated 8 months ago
- ☆12Jul 13, 2020Updated 5 years ago
- Metasploit Framework☆10Apr 3, 2017Updated 8 years ago
- A NEW 64-bit JAILBREAK FOR iOS 10.3,10.3.1,10.3.2,10.3.x. (Untethered).☆45Jun 3, 2017Updated 8 years ago
- IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]☆34Nov 4, 2018Updated 7 years ago
- hack tools☆1,179Sep 23, 2024Updated last year
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- ☆21Jul 18, 2017Updated 8 years ago
- All the resources I could find for learning Ethical Hacking and penetration testing.☆330Oct 3, 2020Updated 5 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Feb 24, 2019Updated 7 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting, Spyware,Malwares evade anti-virus detection, Rookit CYPTER, An…☆310Nov 30, 2018Updated 7 years ago