wchen-r7 / Awesome-HackingLinks
A collection of various awesome lists for hackers, pentesters and security researchers
☆51Updated 8 years ago
Alternatives and similar repositories for Awesome-Hacking
Users that are interested in Awesome-Hacking are comparing it to the libraries listed below
Sorting:
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63Updated 2 years ago
- A OSINT tool to obtain a target's phone number just by having his email address☆31Updated 6 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆44Updated 2 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- Windows Keylogger in C++☆19Updated 3 years ago
- Simple script for the WHID injector - a rubberducky wifi☆115Updated last year
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 4 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆116Updated 2 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- Collection of extra pentest tools for Kali Linux☆109Updated last month
- Windows Hacking FrameWork using Reverse Shell☆106Updated 7 months ago
- Pentesting Tools to Automatize Active Directory Hacking☆22Updated 3 years ago
- BEST HACKING TOOLS..For more tools visit our blog for Hackers☆138Updated last month
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- The hacker technical cheat sheet☆42Updated 4 months ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆96Updated 4 years ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- Automated rogue access point setup tool.☆199Updated 4 years ago
- 🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️☆124Updated last year
- Repository of tools used in my blog☆52Updated last year
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆84Updated 4 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15Updated 5 years ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 7 years ago
- It is a tool that brings together exploits and news about security and vulnerabilities, with the intention of contributing to the open so…☆64Updated 6 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Easy brute forcing to whatever you want - Jose Pino☆65Updated 10 years ago
- Automated Pentest Recon Scanner☆14Updated 8 years ago
- A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. Non…☆73Updated 9 months ago
- A collection of tools created for computer security research purposes.☆131Updated 5 years ago
- Customized Password/Passphrase List inputting Target Info☆95Updated last year