purvasingh96 / GHCI-2019Links
This repository contains slides and notes from my workshop at the Grace Hopper Conference, India (2019).
β5Updated 4 years ago
Alternatives and similar repositories for GHCI-2019
Users that are interested in GHCI-2019 are comparing it to the libraries listed below
Sorting:
- A collection of scripts to run on a fresh install of kali linuxβ37Updated 7 years ago
- !!!WORLD'S π #1π₯ TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most toβ¦β47Updated 2 years ago
- It uploads user photos without user permission to serverβ15Updated 6 years ago
- Get files from Android directoriesβ11Updated 6 years ago
- you just need kali linux os or windows thats all it is automation tool which i prepared privatelyβ12Updated 6 years ago
- CUPP - Common User Passwords Profiler !β12Updated last year
- β22Updated 7 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Androidβ30Updated 7 years ago
- GSM hacking tools and scriptsβ54Updated 4 years ago
- Collection of white, grey and blackHat tools - for use playing around. setting up and operating pentesting linux builds - Primarily Kali-β¦β19Updated 7 years ago
- Ducky Script for Arduino Leonardo Mini & Arduino Uno + Payload to Arduino Converterβ34Updated 7 years ago
- Silently logs and E-mails all incoming/outgoing calls and text messages while doubling up as a flashlight app. The app also has the abiliβ¦β21Updated 4 years ago
- Tools and scripts dedicated to Android application securityβ50Updated 4 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)β19Updated 3 years ago
- Smart pentesting toolkit for modern WPA/WPA2 networks βοΈπ‘β28Updated 5 years ago
- Spy-Bot: A Cloud Penetration Testing Approach for Wireless Penetration Testing.β18Updated 7 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentesβ¦β11Updated 2 years ago
- Ferramenta para criaΓ§Γ£o de payloads HID (human interface device) para android sem nethunter ou rubber duckyβ20Updated 6 years ago
- Password Attack Toolkitβ16Updated 6 years ago
- A Conky For parrot Osβ9Updated 6 years ago
- E-mails, subdomains and names Harvester - OSINTβ13Updated 7 years ago
- Tutorials about ANDRAX Mobile Penetration Testing platformβ27Updated 6 years ago
- Keylogger for ethical hackersβ15Updated 3 years ago
- β17Updated 7 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.β23Updated 4 years ago
- Detects near-by devices such as cell phones, tablets, and laptops. Does this through 802.11, Bluetooth, cell phone protocols, etc..β16Updated 11 years ago
- Gmail shell, for hackers execute commands via gmailβ19Updated 4 years ago
- wireless crack scriptβ10Updated 5 years ago
- Most advanced framework yet! From spoofing to cryptography, Trity has it all!β42Updated 8 years ago
- Search exploits in multiple exploit databases!β11Updated 9 years ago