nullsecuritynet / site
Public Nullsecurity Website
☆14Updated 4 months ago
Related projects: ⓘ
- Papers about known hacking, security, hardware, software, computer, network and other ressources.☆77Updated 4 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Updated 7 years ago
- ☆69Updated this week
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆48Updated 7 years ago
- ☆49Updated this week
- Some wordpress user enumeration scripts.☆38Updated 7 years ago
- simple script that helps you to Embed a Payload into an Apk easly☆20Updated 5 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆84Updated 10 years ago
- Small backdoor using cookie.☆59Updated 7 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 7 years ago
- ☆74Updated this week
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆30Updated 7 years ago
- FUZZBUNCH - NSA security tools☆67Updated 7 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆56Updated last year
- ☆74Updated this week
- The router hacking repo.☆32Updated 9 years ago
- Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity☆196Updated 2 years ago
- Script to generate malicious debian packages (debain trojans).☆117Updated 5 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Post-Exploitation Framework☆74Updated 7 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆19Updated 8 years ago
- Metakitty, The Metasploit Resource Portal☆17Updated 6 months ago
- Tools that are related to pentest and network security☆94Updated 3 years ago
- Automated Tools Pentest☆5Updated last year
- ElevenPaths EternalBlue Metasploit module - works better than Rapid 7☆56Updated 7 years ago
- Fake AccessPoint Attack☆28Updated 6 years ago
- Massive arsenal of hacker tools...☆75Updated 6 years ago
- scripts for pentesting☆83Updated 5 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆59Updated 9 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and reroutin…☆10Updated 9 years ago