wchen-r7 / Awesome-HackingLinks
A collection of various awesome lists for hackers, pentesters and security researchers
☆52Updated 8 years ago
Alternatives and similar repositories for Awesome-Hacking
Users that are interested in Awesome-Hacking are comparing it to the libraries listed below
Sorting:
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63Updated 2 years ago
- Source of swisskyrepo.github.io - Public☆26Updated 6 months ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- The hacker technical cheat sheet☆43Updated 6 months ago
- Collection of extra pentest tools for Kali Linux☆113Updated 4 months ago
- A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. Non…☆75Updated last year
- Learn how to set up a fake authentication web page on a fake WiFi network.☆120Updated 2 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆93Updated 4 months ago
- A collection of tools created for computer security research purposes.☆135Updated 6 years ago
- Proof of concept denial of service over TOR stress test tool☆42Updated 7 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Updated 7 years ago
- Simple program to steal private files from removable storages☆86Updated 3 years ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆30Updated 2 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆87Updated 5 years ago
- Miscellaneous tools for BloodHound☆18Updated 4 years ago
- 🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️☆125Updated last year
- Simple script for the WHID injector - a rubberducky wifi☆116Updated last year
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆98Updated 4 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- Windows Hacking FrameWork using Reverse Shell☆108Updated 10 months ago
- It is a tool that brings together exploits and news about security and vulnerabilities, with the intention of contributing to the open so…☆66Updated 7 years ago
- Windows Keylogger in C++☆19Updated 3 years ago
- Who We Are☆21Updated last year
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆62Updated 2 months ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 4 years ago
- Legba recipes.☆51Updated last year
- Session scripts.☆50Updated 3 years ago
- A lightweight ducky script generator written in python.☆36Updated 4 years ago