A collection of various awesome lists for hackers, pentesters and security researchers
☆329Nov 12, 2016Updated 9 years ago
Alternatives and similar repositories for Awesome-Hacking
Users that are interested in Awesome-Hacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- zeus-style banking trojan☆14Mar 19, 2017Updated 9 years ago
- Malware exploits☆560Aug 22, 2025Updated 8 months ago
- A curated list of awesome Security Hardening techniques for Windows.☆19Mar 1, 2017Updated 9 years ago
- Cknife☆28Feb 2, 2018Updated 8 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- A list of private and public (more or less) blackhat boards☆278Mar 9, 2019Updated 7 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆72Mar 12, 2014Updated 12 years ago
- rdp2tcp is a tunneling tool on top of remote desktop protocol (RDP). It uses RDP virtual channel capabilities to multiplex several ports …☆41Jun 26, 2017Updated 8 years ago
- Local File Inclusion Exploitation Tool (mirror)☆127Feb 13, 2017Updated 9 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- A Cross-Platform Forensic Framework for Google Chrome☆70Mar 15, 2015Updated 11 years ago
- My Shellcode Archive☆29Mar 21, 2017Updated 9 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Red Team Tips as posted by @vysecurity on Twitter☆1,117Apr 26, 2020Updated 6 years ago
- This is the reconnaissance script I wrote for my OSCP journey☆14Feb 20, 2018Updated 8 years ago
- APT34/OILRIG leak☆232Apr 17, 2019Updated 7 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,836Jan 19, 2020Updated 6 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,284Nov 20, 2025Updated 6 months ago
- Automated, Collection, and Enrichment Platform☆326Nov 14, 2019Updated 6 years ago
- The Watcher version 5.0☆19Nov 10, 2017Updated 8 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,455Nov 20, 2025Updated 5 months ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆2,326Dec 8, 2023Updated 2 years ago
- The first open source vulnerability scanner for firmwares☆197Jul 18, 2016Updated 9 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- Some tools to automate recon - 003random☆295Jun 5, 2018Updated 7 years ago
- Payload Generation Framework☆1,981Aug 21, 2024Updated last year
- A Generic Windows Memory Scraping Tool☆70Apr 20, 2017Updated 9 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,912Jan 24, 2024Updated 2 years ago
- Security Tool to Look For Interesting Files in S3 Buckets☆1,463Apr 10, 2024Updated 2 years ago
- your offsec knowledge☆487Oct 9, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆245Dec 6, 2018Updated 7 years ago
- List of Awesome Red Teaming Resources☆7,916Dec 28, 2023Updated 2 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Oct 8, 2017Updated 8 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,029Feb 3, 2020Updated 6 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,003Jan 15, 2019Updated 7 years ago
- ☆28Dec 28, 2017Updated 8 years ago