wchen-r7 / Awesome-HackingLinks
A collection of various awesome lists for hackers, pentesters and security researchers
☆52Updated 8 years ago
Alternatives and similar repositories for Awesome-Hacking
Users that are interested in Awesome-Hacking are comparing it to the libraries listed below
Sorting:
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆64Updated 2 years ago
- Windows Keylogger in C++☆19Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆112Updated 3 months ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆86Updated 4 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆92Updated 3 months ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- A collection of tools created for computer security research purposes.☆135Updated 5 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆150Updated 4 years ago
- The hacker technical cheat sheet☆43Updated 5 months ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- A OSINT tool to obtain a target's phone number just by having his email address☆32Updated 6 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆15Updated 2 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆72Updated 4 years ago
- Zero-Day Code Injection and Persistence Technique☆34Updated 8 years ago
- A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. Non…☆73Updated 11 months ago
- Simple script for the WHID injector - a rubberducky wifi☆116Updated last year
- Learn how to set up a fake authentication web page on a fake WiFi network.☆118Updated 2 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- Source of swisskyrepo.github.io - Public☆26Updated 5 months ago
- Automated rogue access point setup tool.☆200Updated 4 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆108Updated 2 years ago
- 🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️☆123Updated last year
- This python script uses TOR to get a new IP address.. For whatever reason you might need that☆45Updated 3 weeks ago
- Repository of tools used in my blog☆51Updated last year
- Interactive shell to execute commands anonymously using Proxychains and Tor☆49Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Windows Hacking FrameWork using Reverse Shell☆105Updated 9 months ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- Undetectable payload for Windows 10 and 11☆40Updated 2 years ago