shsingh / blackhat-toolsLinks
This repository contains tools made by completing exercises from various books on blackhat programming. The intent is to learn writing software in Typescript, Go, Rust and Python
☆12Updated 3 weeks ago
Alternatives and similar repositories for blackhat-tools
Users that are interested in blackhat-tools are comparing it to the libraries listed below
Sorting:
- A fast and powerful http toolkit that take a list of domains to find active domains and other information such as status-code, title, res…☆80Updated 3 years ago
- Odinova Digital Tiger is an advanced application designed for Open-Source Intelligence (OSINT), equipped with versatile tools and a user-…☆84Updated 3 months ago
- A Sophisticated, Automated, AI-Driven, State-Sponsored Cyber-Espionage/Counter-Espionage & Zero Click AI-Gen Supply Chain Attack Framewor…☆53Updated 6 months ago
- DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others T…☆161Updated last year
- OSINT automation for hackers.☆16Updated 2 years ago
- Tracer is an OSINT tool that can be used to detect on which websites a username is currently in use☆118Updated 2 years ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆36Updated last year
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆62Updated last year
- A collection of awesome software, OSINT Tools, libraries, learning tutorials, documents, books & technical resources and cool stuff about…☆61Updated last year
- MINOTAUR: The STRONGEST Secure Prompt EVER! Prompt Security Challenge, Impossible GPT Security, Prompts Cybersecurity, Prompting Vulnerab…☆23Updated last year
- Complete Malware Index - Use at your own Risk!☆16Updated last year
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Updated 2 years ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆48Updated last year
- A powerful and customizable ChatGPT-like interface, built for developers.☆118Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆52Updated last year
- 16K+ Unlimited Deep Web / Onion Links + GUIDE☆101Updated last year
- HYDRAX, Advanced Malware Generation, Stealth and Evasion Techniques, Exploit Development, Botnet Command and Control (C&C), Payload Custo…☆20Updated 11 months ago
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Program…☆136Updated last year
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆178Updated last year
- ☆19Updated 2 years ago
- A certificate transparency log keyword sniffer written in python☆82Updated 2 years ago
- 🕵️ Track down social media profiles using a specific username across multiple social network platforms☆61Updated 3 months ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 5 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆42Updated last year
- DASH is deep osint Scanner. You just need username to start osint scan.☆50Updated 3 years ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆104Updated last year
- Web Exploit here ! advanced web hacking and hacker toolkit in your hands☆41Updated last year
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆24Updated 2 years ago