securitytube / hack-of-the-dayLinks
SecurityTube Hack of the Day
☆17Updated 12 years ago
Alternatives and similar repositories for hack-of-the-day
Users that are interested in hack-of-the-day are comparing it to the libraries listed below
Sorting:
- Offensives network security framework for Wireless and MiTM style hacking☆61Updated 8 years ago
- Your last stop for password list generation needs!☆27Updated 10 years ago
- Useful pentesting scripts☆84Updated 10 months ago
- Passive Vulnerability Auditor☆135Updated 9 years ago
- Framework for Man-In-The-Middle attacks☆189Updated 8 years ago
- Scripts for Kali Linux☆17Updated 8 years ago
- Bash script to fully setup your kali system.☆51Updated 5 years ago
- Reliable Teensy Penetration Testing Payload☆182Updated 13 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- Metasploit AV Evasion Tool☆257Updated 10 years ago
- A Web Application to Send and Track Spear Phishing Campaigns☆103Updated 8 years ago
- NoobSecToolkit is a Python Based Tool kit that brings together powerful security and anonymity tools and scripts with predefined security…☆114Updated last year
- Meterpreter Scripts that I'm working on☆171Updated 6 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆59Updated 10 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Updated 11 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- Poison, reset, spoof, redirect MITM script☆126Updated 2 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆247Updated 11 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆259Updated 9 years ago
- Reddit XSS Gather Tool☆20Updated 10 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Updated 10 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆335Updated 5 years ago
- ☆195Updated 7 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆192Updated 6 years ago
- Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.☆139Updated 9 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆58Updated 10 years ago
- ☆152Updated 2 years ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆93Updated 6 years ago
- Proof of Concept - Using squid url rewrite feature to "hijack" proxy traffic and inject BeEF payload into it.☆13Updated 10 years ago
- A web interface for Hashcat/oclHashcat☆29Updated 9 years ago