wchen-r7 / Awesome-HackingLinks
A collection of various awesome lists for hackers, pentesters and security researchers
☆50Updated 7 years ago
Alternatives and similar repositories for Awesome-Hacking
Users that are interested in Awesome-Hacking are comparing it to the libraries listed below
Sorting:
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆61Updated 2 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆113Updated 2 years ago
- Windows Keylogger in C++☆19Updated 2 years ago
- A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. Non…☆67Updated 7 months ago
- 🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️☆126Updated 9 months ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆39Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆109Updated 2 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆90Updated last year
- The hacker technical cheat sheet☆41Updated last month
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆83Updated 4 years ago
- Automated rogue access point setup tool.☆196Updated 4 years ago
- How long will it take to crack a hash ?☆28Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆42Updated 2 years ago
- A collection of tools created for computer security research purposes.☆126Updated 5 years ago
- Simple program to steal private files from removable storages☆88Updated 3 years ago
- Source of swisskyrepo.github.io - Public☆26Updated last month
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- A new and improved DeadTrap with more efficient time span for scanning a number☆30Updated 4 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆50Updated 4 years ago
- Session scripts.☆48Updated 3 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 4 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆96Updated 3 years ago
- A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numb…☆157Updated 5 months ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 7 years ago
- ☆21Updated 3 months ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- Pentesting Tools to Automatize Active Directory Hacking☆22Updated 2 years ago
- Simple script for the WHID injector - a rubberducky wifi☆115Updated last year