HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It allows you to customize the tools list and automate reconnaissance, scanning, exploitation, and post-exploitation analysis.
☆19Mar 6, 2025Updated last year
Alternatives and similar repositories for HACKING-BOT
Users that are interested in HACKING-BOT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 2 months ago
- Rocket News is a Compose Multiplatform (CMP) application that aggregates daily space-related news from APIs such as NASA, SpaceX, and Spa…☆12Apr 21, 2024Updated last year
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- Hack facebook using this python script - Kali Linux☆15Jun 14, 2021Updated 4 years ago
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆58Jan 25, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Burp Suite extension that enhances Burp Active Scan by adding template engine specific SSTI payloads.☆25Feb 20, 2024Updated 2 years ago
- This script will find some basic vulns. I made this script for my daily hunting. The best feature about this script is just run it in bac…☆20Feb 19, 2024Updated 2 years ago
- Worm is an Android post exploitation Framework to gain remote access of any Android device by exploiting Android Debug Bridge.☆17Jun 7, 2024Updated last year
- This repository is a comprehensive collection of SQL Injection Payloads designed for educational, research, and testing purposes. It incl…☆85Mar 31, 2025Updated last year
- This repository is a comprehensive collection of Cross-Site Scripting (XSS) Payloads designed for educational, research, and testing purp…☆26Mar 31, 2025Updated last year
- External C2 is a specification to allow third-party programs to act as a communication layer for Cobalt Strike’s Beacon payload.☆16Jul 17, 2025Updated 8 months ago
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated 2 months ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 10 months ago
- All-in Fuzzer. Burp suite extension for auto fuzzing params, headers, body☆36Apr 9, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Venom is a collaborative C2 framework used by Red Team operators. providing an interactive Web GUI written in Python and PowerShell.☆19Jul 14, 2022Updated 3 years ago
- ☆23Sep 19, 2024Updated last year
- 检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team b…☆10May 8, 2023Updated 2 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Rudimentary IP and URL threat feeds sourced from The Fakelabs Project.☆10Dec 13, 2025Updated 4 months ago
- A small webserver vulnerable to insecure deserialization☆21Nov 30, 2017Updated 8 years ago
- piku experiments with "build a web app fast" prototyping☆13Aug 21, 2021Updated 4 years ago
- 基于http代理的web漏洞扫描器的实现☆10Jul 5, 2015Updated 10 years ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 2 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆22Apr 30, 2023Updated 2 years ago
- An insecure and inconsistent DLL injecting extra sensory perception for CS2 using ImGui-DirectX 11 Kiero Hook☆16Oct 27, 2024Updated last year
- A series of cloud focused KQL queries for threat hunting and DFIR☆12Oct 21, 2025Updated 5 months ago
- ☆11Nov 22, 2021Updated 4 years ago
- This Is The Ultimate Bug Bounty Automation & Web Hacking Tool That I've Created.☆28Feb 27, 2023Updated 3 years ago
- A tool for generating and detecting Unicode domains to identify phishing URLs, aimed at assisting cybersecurity professionals in recogniz…☆30Mar 9, 2026Updated last month
- BaconStringUtils contain utitilies to work with strings.☆27Aug 11, 2016Updated 9 years ago
- The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers …☆53Jan 25, 2026Updated 2 months ago
- ☆13Apr 12, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Symfony 4 Bundle for Atlas 3☆10May 16, 2021Updated 4 years ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆44Feb 24, 2025Updated last year
- Terraform provider for the Netcup SCP webservice.☆13Dec 13, 2022Updated 3 years ago
- AI-based implant feature☆25Apr 28, 2025Updated 11 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 10 months ago
- Bhadra is a Vulnerability Management Platform to handle all security issues☆16Mar 2, 2026Updated last month
- Secure and performant OCI-image builder for Kubernetes☆12Updated this week