nomi-sec / Hacker-TrendsLinks
Trends Website (URL) from Twitter hackers.
☆104Updated this week
Alternatives and similar repositories for Hacker-Trends
Users that are interested in Hacker-Trends are comparing it to the libraries listed below
Sorting:
- Cloud Exploit Framework☆114Updated 3 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- Memory Scaner☆63Updated 3 years ago
- Simple Latest CVE Collector Written in Python☆59Updated last year
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆118Updated 2 years ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆75Updated 2 years ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆121Updated last year
- CVE-2024-3400☆72Updated last year
- Repository of CVE found by OCD people☆80Updated 3 months ago
- An Interface for AI built for cybersecurity professionals☆92Updated 7 months ago
- Notes, red team materials, testing tools, etc.☆145Updated 11 months ago
- ☆194Updated 2 years ago
- APK Infrastructure Investigator☆65Updated 2 years ago
- ☆113Updated last year
- OpenSSH 9.1 vulnerability mass scan and exploit☆104Updated 2 years ago
- D3Ext's Forward Shell☆120Updated last year
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated 2 years ago
- Uses python3.10, Debian, python-Nmap, OpenaAI, and flask framework to create a Nmap API that can do scans with a good speed online and is…☆80Updated 8 months ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆51Updated last year
- Fortinet FortiClient EMS SQL Injection☆50Updated last year
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Updated last year
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆58Updated 2 years ago
- Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage…☆104Updated last week
- This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.☆118Updated 2 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆57Updated 2 years ago
- Personal notes from Red teamer for Blue/Red/Purple.☆55Updated last year
- PoC_CVEs☆163Updated this week
- Repository to store exploits created by Assetnotes Security Research team☆180Updated last year
- ☆42Updated last year
- Classic Web shell upload techniques & Web RCE techniques☆42Updated this week