quickbundle / hacking
☆12Updated 8 years ago
Alternatives and similar repositories for hacking:
Users that are interested in hacking are comparing it to the libraries listed below
- ☆12Updated 8 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- ☆17Updated 10 years ago
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 8 years ago
- Set of Python scripts to perform SecRules language evaluation on a given http request.☆14Updated 7 years ago
- Network white noise collector☆18Updated 9 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Updated 3 years ago
- ☆15Updated 8 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Updated 5 years ago
- Automatic detection of hashing algorithms☆21Updated 8 years ago
- Malware visualization on earth map☆40Updated 10 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- ZynOS tool for automated attack on a range of IPs, find more informations at :☆74Updated 11 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- [Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.☆13Updated 7 years ago
- Encrypt your personal files without giving up the convenience of cloud storage like Dropbox/OneDrive/Google Drive etc.☆19Updated 6 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- NSA - NoScript Anywhere (Firefox Mobile add-on)☆8Updated 8 years ago
- Phishing Toolkit☆20Updated 7 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Updated 7 years ago
- Detect passive activity in the Tor-network☆13Updated 9 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 9 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 9 years ago
- A bot that'll monitor the number of followers of its followers and tweet when the counter gets to interesting values.☆13Updated 6 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆10Updated 9 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- Try various exploits to get root☆19Updated 11 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 10 years ago
- Advice on how to do computer things securely for non-experts☆59Updated 4 years ago