misterch0c / Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
☆328Updated 8 years ago
Alternatives and similar repositories for Awesome-Hacking:
Users that are interested in Awesome-Hacking are comparing it to the libraries listed below
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆975Updated 7 years ago
- Micro$oft Windows Hacking Pack☆520Updated 7 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,210Updated 4 years ago
- Scripts that are useful for me on pen tests☆527Updated 2 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,106Updated 7 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,057Updated 4 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,007Updated 6 years ago
- Network reconnaissance and vulnerability assessment tools.☆399Updated 3 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆507Updated 6 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆725Updated 7 years ago
- PwnWiki - The notes section of the pentesters mind.☆561Updated 6 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆949Updated 5 years ago
- Post Exploitation Wiki☆517Updated 5 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆491Updated 3 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆747Updated 6 years ago
- Github for the scripts utilised during Penetration test☆235Updated 7 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆380Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆438Updated 7 years ago
- Tools, scripts and tips useful during Penetration Testing engagements.☆622Updated 2 months ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆631Updated 6 years ago
- Red Team Tool Kit☆1,119Updated 2 years ago
- Post Exploitation Collection☆1,562Updated 4 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆332Updated 8 months ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆521Updated 7 years ago
- ☆603Updated 6 months ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆498Updated 5 years ago
- offsec batteries included☆1,550Updated last year
- A tool to find and exploit servers vulnerable to Shellshock☆332Updated last year
- collection of articles/books about programing☆567Updated last year
- Pop shells like a master.☆1,455Updated 6 years ago