self-m4de / ToolsLinks
☆14Updated 4 years ago
Alternatives and similar repositories for Tools
Users that are interested in Tools are comparing it to the libraries listed below
Sorting:
- Learn how to set up a fake authentication web page on a fake WiFi network.☆118Updated 2 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆85Updated 4 years ago
- Xfinity / Comcast Wordlist Generator☆72Updated 2 years ago
- capNcook - a dark web exploration tool☆84Updated last year
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆61Updated last year
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆194Updated 2 years ago
- Automate installation of extra pentest tools on Kali Linux☆60Updated 4 years ago
- ☆42Updated 4 years ago
- Collection of GoPhish templates available for legitimate usage.☆159Updated 2 years ago
- 🤖 The Modern Port Scanner 🤖☆20Updated 4 years ago
- ☆46Updated last year
- capNcook - a dark web exploration tool☆118Updated last year
- Enhance your hacking toolkit with my Chrome Extension. Designed for ethical hacking and red team activities, it offers tailored features …☆48Updated 8 months ago
- Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Resea…☆125Updated 3 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Gh…☆72Updated 5 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆64Updated last year
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆182Updated last year
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆50Updated 8 months ago
- Stuff about it-security that might be good to know☆23Updated 6 years ago
- Simple program to steal private files from removable storages☆87Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆56Updated 4 years ago
- PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.☆135Updated 2 months ago
- ☆179Updated 2 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Updated 2 years ago
- Automated solution for nmap'ing☆28Updated 2 years ago
- PrivacyNet: Privacy Network☆53Updated last year
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆51Updated 3 years ago
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆27Updated 4 years ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻☆21Updated 6 years ago
- ☆66Updated 2 years ago