nomi-sec / Hacker-TrendsLinks
Trends Website (URL) from Twitter hackers.
☆107Updated this week
Alternatives and similar repositories for Hacker-Trends
Users that are interested in Hacker-Trends are comparing it to the libraries listed below
Sorting:
- Cloud Exploit Framework☆114Updated 3 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- Simple Latest CVE Collector Written in Python☆59Updated last year
- Memory Scaner☆63Updated 3 years ago
- An Interface for AI built for cybersecurity professionals☆92Updated 9 months ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆123Updated last year
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆75Updated 2 years ago
- D3Ext's Forward Shell☆120Updated 2 years ago
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆57Updated 2 years ago
- Uses python3.10, Debian, python-Nmap, OpenaAI, and flask framework to create a Nmap API that can do scans with a good speed online and is…☆80Updated 9 months ago
- Personal notes from Red teamer for Blue/Red/Purple.☆56Updated last year
- ☆113Updated 2 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆119Updated last year
- Citrix Scanner for CVE-2023-3519☆52Updated 2 years ago
- CVE-2023-20198 & 0Day Implant Scanner☆32Updated 6 months ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52Updated last year
- CVE-2024-3400☆73Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆54Updated 2 years ago
- Postfix SMTP Smuggling - Expect Script POC☆23Updated last year
- NetworkAssessment: Network Compromise Assessment Tool☆94Updated last year
- ☆195Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆57Updated 2 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated 2 years ago
- Repository to store exploits created by Assetnotes Security Research team☆180Updated 2 years ago
- ☆42Updated last year
- Fortinet FortiClient EMS SQL Injection☆51Updated last year
- PowerShell Asynchronous TCP Reverse Shell☆159Updated 2 years ago
- Information stealer logs parser☆86Updated last year