Hackings style defence tricks
☆64Dec 30, 2025Updated 4 months ago
Alternatives and similar repositories for defence
Users that are interested in defence are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- karma WiFi attack implementation☆56Oct 23, 2024Updated last year
- Finding secrets in various (non-text) popular files.☆55Oct 21, 2025Updated 6 months ago
- 📧 [Research] E-Mail Injection: Vulnerable applications☆17May 26, 2024Updated last year
- exfiltration/infiltration toolkit☆50Oct 31, 2024Updated last year
- About PIVOting☆13Dec 19, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The TRU protocol is the UDP based protocol for real time communications that allows sending messages with low latency and provides protoc…☆15Feb 13, 2024Updated 2 years ago
- Tool to obtain hash using MS-SNTP for user accounts☆30Jan 22, 2025Updated last year
- Automated SUID Privilege Escalation Checker☆19Oct 15, 2023Updated 2 years ago
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated 2 years ago
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- "Network Programming" books code☆20Dec 10, 2025Updated 4 months ago
- Yandex browser password recovery☆11Apr 9, 2025Updated last year
- So you've decided to ruin your life and work with Bluetooth on windows☆13Jul 1, 2021Updated 4 years ago
- My Wi-Fi scripts☆58Apr 8, 2026Updated 3 weeks ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Best Practices for Automated Testing (Excerpts from the "Angry Tests" Book)☆33Updated this week
- Network Privacy and Security Tool- Change MAC addresses, randomizing internal IP addresses, and renewing IP addresses☆43Dec 1, 2025Updated 5 months ago
- Set To-Do list as windows wallpaper☆16Feb 3, 2025Updated last year
- Anti-forensics tool Inspired by NSA's Marble framework.☆10Apr 17, 2025Updated last year
- Platform independent library for interfacing windows security descriptors☆23Jan 2, 2026Updated 4 months ago
- CPUID powered by Python.☆20Mar 9, 2021Updated 5 years ago
- Phanto is a utility that specializes in UAC bypass and privilege escalation, enabling it to bypass User Account Control on Windows 10 and…☆10Nov 28, 2023Updated 2 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆11Sep 22, 2023Updated 2 years ago
- CrabCrypt is a secure file encryption tool with GUI, designed for effortlessly encrypting and decrypting any file. With AES encryption an…☆25Mar 17, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Bypasses App-Bound Encryption to extract cookies, passwords, browsing history, autofill data, and payment info from Chromium-based browse…☆19Feb 27, 2026Updated 2 months ago
- ☆18Apr 9, 2024Updated 2 years ago
- The ultimate cheat sheet that will refresh (or teach you) everything you need to know about data structures and algorithms in Java.☆17Oct 15, 2019Updated 6 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Sep 4, 2015Updated 10 years ago
- Badusb DM-3212☆19May 10, 2022Updated 3 years ago
- TG Spam☆25Jan 29, 2025Updated last year
- Some exploits to bypass Safer Mode in Ghostscript☆19Oct 24, 2020Updated 5 years ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆15Jun 8, 2023Updated 2 years ago
- GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)☆15Mar 11, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- OsintIA_Tools.py is an automated tool for collecting and analyzing public information that combines OSINT techniques with artificial inte…☆62Mar 11, 2025Updated last year
- Low-interaction Postgres Honeypot☆20May 20, 2024Updated last year
- create customized .onion addresses for your hidden service,make shallot and eschalot tools☆13Jan 18, 2022Updated 4 years ago
- go-utils☆12Nov 22, 2025Updated 5 months ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 4 months ago
- Simple Authenticated Vulnerability Scanner for Linux hosts and Docker images☆44Mar 13, 2023Updated 3 years ago
- Frontend for s-ui☆51Apr 15, 2026Updated 3 weeks ago