pirate / hack-tools
hack tools
β15Updated 6 years ago
Alternatives and similar repositories for hack-tools:
Users that are interested in hack-tools are comparing it to the libraries listed below
- AIL framework - Analysis Information Leak frameworkβ8Updated 7 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Toolβ13Updated 7 years ago
- π°A bash script to check if you have a gateway that could get you somewhere nice.β14Updated 5 years ago
- WPScan is a black box WordPress vulnerability scanner.β11Updated 7 years ago
- A simple script for translating IP addresses to GeoLocationsβ42Updated 2 years ago
- Exploitation Tool For Windows Using Batch and Powershellβ22Updated 4 months ago
- Local Transforms for the Maltego OSINT investigative tool that act on FetLife.com.β40Updated 4 years ago
- Sniff every types of files you want on your network interface and save it.β16Updated 9 years ago
- βΌοΈList of leaked NSO Pegasus's hosts, that uses to surveil.β10Updated 3 years ago
- Get trails tool: Get all urls indexed of targetβ22Updated 3 years ago
- Created by Denis Podgurskiy via the GitHub Connectorβ12Updated 3 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.β18Updated 11 years ago
- Cryptocurrencies related Security resourcesβ14Updated last year
- misc scriptsβ21Updated last week
- The great patator tool compiled for Windowsβ26Updated 8 years ago
- Check your email(s) using popular online services to see if it appears in any data-breachβ29Updated 9 months ago
- scripts to setup pentesting system and use during pentestβ18Updated 2 years ago
- A small Php package to fetch archive url snapshots from archive.org. Using it you can fetch complete list of snapshot urls of any year orβ¦β19Updated 3 years ago
- Build tools to generate vagrant images used by metasploit-framework CIβ13Updated 2 months ago
- A fully featured Windows backdoor that uses email as a C&C serverβ16Updated 7 years ago
- Steal xfinity-comcast subscriber credentials.β32Updated 9 years ago
- A very powerful tool for All kind of MITM attacksβ14Updated last year
- GPLv2 tool that auto-reverse-engineers Android applications and rips out sensitive API calls. Its awesome.β21Updated 12 years ago
- Man-in-the-middle against Tor bridgesβ26Updated 5 years ago
- Fast subdomains enumeration tool for penetration testersβ11Updated 8 years ago
- Pull A List Of 1000 Most Popular Containers On Docker Hubβ15Updated 4 years ago
- Network white noise collectorβ19Updated 9 years ago
- personal fork of OSINT tool recon-ngβ18Updated 7 years ago
- Collection of cracked malwareβ14Updated 6 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricksβ11Updated 7 years ago