trendy77 / madHatter
Collection of white, grey and blackHat tools - for use playing around. setting up and operating pentesting linux builds - Primarily Kali-Linux/WSL and Parrot
☆18Updated 6 years ago
Alternatives and similar repositories for madHatter:
Users that are interested in madHatter are comparing it to the libraries listed below
- Hacking Tools For All Debian-based OS☆47Updated 6 years ago
- Hacking Tools☆44Updated 6 years ago
- Python Security/Hacking Kit☆43Updated 5 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆29Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆51Updated 7 years ago
- A collection of scripts to run on a fresh install of kali linux☆32Updated 7 years ago
- ☆32Updated 8 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Updated 7 years ago
- A curated list of awesome warez and piracy links☆26Updated 4 years ago
- Detects near-by devices such as cell phones, tablets, and laptops. Does this through 802.11, Bluetooth, cell phone protocols, etc..☆16Updated 10 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11Updated last year
- Download airgeddon's required files from github, optionally specify branch and save location☆34Updated 2 years ago
- sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking o…☆26Updated 7 years ago
- E-mails, subdomains and names Harvester - OSINT☆14Updated 7 years ago
- A little explanation about this tool, Lazymux is a remote that works to automatically download and install a tool ,, what content do I me…☆18Updated 7 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆44Updated 2 years ago
- Portable Hacking Machine with Raspberry Pi☆80Updated 6 years ago
- RouterBrute can Bruteforce/Dictionary attack the login for the Router's Login page☆15Updated 7 years ago
- SMS Spoofer for Social Engineering/Pentest Engagements☆44Updated 7 years ago
- A script that creates a wifi hotspot on kali linux that can view usernames and passwords of ssl logins.☆60Updated 9 years ago
- Bash script using hcxdumptool, hcxtools and hashcat to collect WPA2 handshakes and/or PMKIDs, convert them to hashcat format and perform …☆15Updated 5 years ago
- Wireless Security Testing v1.0☆11Updated 7 years ago
- Tutorials about ANDRAX Mobile Penetration Testing platform☆26Updated 5 years ago
- Most advanced framework yet! From spoofing to cryptography, Trity has it all!☆42Updated 8 years ago
- E-ntel is a tool gathering email accounts informations (ip,hostname,country,...) from different public source (search engines, pgp key se…☆29Updated 6 years ago
- M-dork, google dorking with mdork☆57Updated 6 years ago
- This project is aimed to automate hacking by a USB. Currently for Windows, different platforms coming soon☆12Updated 5 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- This project is a continuation of the Moriarty project. But this osint website, has more feautres than Moriarty has☆33Updated 3 years ago
- Handshake cracker☆50Updated last year