A collection of various awesome lists for hackers, pentesters and security researchers
☆328Nov 12, 2016Updated 9 years ago
Alternatives and similar repositories for Awesome-Hacking
Users that are interested in Awesome-Hacking are comparing it to the libraries listed below
Sorting:
- zeus-style banking trojan☆14Mar 19, 2017Updated 9 years ago
- Malware exploits☆554Aug 22, 2025Updated 6 months ago
- A curated list of awesome Security Hardening techniques for Windows.☆19Mar 1, 2017Updated 9 years ago
- Cknife☆28Feb 2, 2018Updated 8 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- A list of private and public (more or less) blackhat boards☆276Mar 9, 2019Updated 7 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Mar 12, 2014Updated 12 years ago
- rdp2tcp is a tunneling tool on top of remote desktop protocol (RDP). It uses RDP virtual channel capabilities to multiplex several ports …☆41Jun 26, 2017Updated 8 years ago
- Local File Inclusion Exploitation Tool (mirror)☆127Feb 13, 2017Updated 9 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- A Cross-Platform Forensic Framework for Google Chrome☆70Mar 15, 2015Updated 11 years ago
- My Shellcode Archive☆29Mar 21, 2017Updated 8 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,114Apr 26, 2020Updated 5 years ago
- APT34/OILRIG leak☆232Apr 17, 2019Updated 6 years ago
- This is the reconnaissance script I wrote for my OSCP journey☆14Feb 20, 2018Updated 8 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,824Jan 19, 2020Updated 6 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,234Nov 20, 2025Updated 4 months ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- The Watcher version 5.0☆19Nov 10, 2017Updated 8 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,451Nov 20, 2025Updated 4 months ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- ☆2,319Dec 8, 2023Updated 2 years ago
- The first open source vulnerability scanner for firmwares☆197Jul 18, 2016Updated 9 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- Some tools to automate recon - 003random☆294Jun 5, 2018Updated 7 years ago
- Payload Generation Framework☆1,976Aug 21, 2024Updated last year
- A Generic Windows Memory Scraping Tool☆70Apr 20, 2017Updated 8 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,902Jan 24, 2024Updated 2 years ago
- your offsec knowledge☆485Oct 9, 2019Updated 6 years ago
- Security Tool to Look For Interesting Files in S3 Buckets☆1,458Apr 10, 2024Updated last year
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆239Dec 6, 2018Updated 7 years ago
- List of Awesome Red Teaming Resources☆7,834Dec 28, 2023Updated 2 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Oct 8, 2017Updated 8 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,031Feb 3, 2020Updated 6 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,004Jan 15, 2019Updated 7 years ago
- ☆28Dec 28, 2017Updated 8 years ago