misterch0c / Awesome-HackingLinks
A collection of various awesome lists for hackers, pentesters and security researchers
☆330Updated 9 years ago
Alternatives and similar repositories for Awesome-Hacking
Users that are interested in Awesome-Hacking are comparing it to the libraries listed below
Sorting:
- Micro$oft Windows Hacking Pack☆525Updated 7 years ago
- Scripts that are useful for me on pen tests☆537Updated 3 years ago
- This repository is to make life of the pentester easy as it is a collection of the websites that can be used by pentesters for day to day…☆378Updated last year
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆383Updated 8 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,215Updated 5 years ago
- PwnWiki - The notes section of the pentesters mind.☆564Updated 7 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆654Updated last year
- Mirror of Shadowbrokers release from https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation☆480Updated 8 years ago
- Personal Collection of Operating Systems Scripts☆569Updated last year
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆340Updated last year
- Github for the scripts utilised during Penetration test☆235Updated 8 years ago
- Tools, scripts and tips useful during Penetration Testing engagements.☆634Updated 2 weeks ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆510Updated 7 years ago
- Penetration Testing tools - one repo to clone them all... containing latest pen testing tools☆538Updated 6 years ago
- List of awesome penetration testing resources, tools and other shiny things☆343Updated 7 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆978Updated 8 years ago
- just for fun ¯\_(ツ)_/¯☆272Updated 9 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆526Updated 8 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆437Updated 8 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆241Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆493Updated 4 years ago
- Malware exploits☆554Updated 4 months ago
- Network reconnaissance and vulnerability assessment tools.☆401Updated 3 years ago
- NSA finest tool☆986Updated 8 years ago
- Exploits and Security Tools Framework 2.0.1☆306Updated 3 years ago
- transform your payload.exe into one fake word doc (.ppt)☆468Updated 6 years ago
- collection of articles/books about programing☆581Updated 2 years ago
- A ton of helpful tools☆343Updated 4 years ago
- Post Exploitation Collection☆1,575Updated 5 years ago
- Created by Jin Qian via the GitHub Connector☆436Updated 2 years ago