noraj / the-hacking-troveLinks
The hacker technical cheat sheet
☆43Updated 4 months ago
Alternatives and similar repositories for the-hacking-trove
Users that are interested in the-hacking-trove are comparing it to the libraries listed below
Sorting:
- Lightweight Bash Script To Automate Some Useful Information Gathering On IP Address Using Different API's☆26Updated 3 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆42Updated 5 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Updated 4 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆92Updated 2 months ago
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆22Updated 3 years ago
- pwndb is a tool that looks for leaked passwords from a dark web breach database given a user or domain.☆36Updated 5 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆56Updated 5 years ago
- Install popular tools used while pentesting & playing labs☆13Updated 4 years ago
- Customized Password/Passphrase List inputting Target Info☆96Updated last year
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Python API wrapper for DarkSearch (darksearch.io).☆34Updated 3 years ago
- GREP FOR OSINT is a set of very simple shell scripts that will help you quickly analyze a text or a folder with files for data useful for…☆120Updated 2 years ago
- Automated Pentest Recon Scanner☆14Updated 8 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Who We Are☆20Updated last year
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆111Updated 2 years ago
- List of sources for cybersecurity news☆39Updated 2 years ago
- Mobile Pentesting Guide (WIP)☆25Updated 5 years ago
- Low Interaction Mobile Honeypot☆96Updated 5 months ago
- Search .git folders for emails and URL's that should otherwise be hidden☆34Updated 4 years ago
- Source of swisskyrepo.github.io - Public☆26Updated 4 months ago
- Information gathering tool - OSINT☆39Updated 6 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Fast subdomains enumeration tool for penetration testers☆14Updated 5 years ago
- Top password lists generated from leaks collected from different paste sites☆31Updated 2 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 4 years ago
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆54Updated 7 months ago
- Evildork targeting your fiancee👁️☆88Updated 2 years ago
- Passwords Recovery Tool☆20Updated 6 years ago