All Projects → Awesome Hacking Resources → Similar Projects or Alternatives

2298 Open source projects that are alternatives of or similar to Awesome Hacking Resources

Name That Hash
🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 3000+ other hashes ☄ Comes with a neat web app 🔥
Stars: ✭ 540 (-95.29%)
Mutual labels:  hacking, ctf
Linkedin2username
OSINT Tool: Generate username lists for companies on LinkedIn
Stars: ✭ 504 (-95.6%)
Mutual labels:  hacking, penetration-testing
Nishang
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: ✭ 5,943 (-48.17%)
Mutual labels:  hacking, penetration-testing
Search Libc
Web wrapper of niklasb/libc-database
Stars: ✭ 124 (-98.92%)
Mutual labels:  exploit, ctf
Katanaframework
The New Hacking Framework
Stars: ✭ 502 (-95.62%)
Mutual labels:  hacking, penetration-testing
Habu
Hacking Toolkit
Stars: ✭ 635 (-94.46%)
Mutual labels:  hacking, penetration-testing
Phonesploit
Using open Adb ports we can exploit a Andriod Device
Stars: ✭ 854 (-92.55%)
Mutual labels:  hacking, exploit
Ollydbg Scripts
Unpacking scripts for Ollydbg.
Stars: ✭ 109 (-99.05%)
Mutual labels:  hacking, reverse-engineering
Ios Debug Hacks
🎯 Advanced debugging skills used in the iOS project development process, involves the dynamic debugging, static analysis and decompile of third-party libraries. iOS 项目开发过程中用到的高级调试技巧,涉及三方库动态调试、静态分析和反编译等领域
Stars: ✭ 595 (-94.81%)
Mutual labels:  hacking, reverse-engineering
Brutal
Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (-94.09%)
Mutual labels:  hacking, penetration-testing
Dirsearch
Web path scanner
Stars: ✭ 7,246 (-36.8%)
Mutual labels:  hacking, penetration-testing
Sublert
Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (-93.9%)
Mutual labels:  hacking, penetration-testing
Hack Tools
hack tools
Stars: ✭ 488 (-95.74%)
Mutual labels:  hacking, exploit
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (-93.31%)
Mutual labels:  hacking, penetration-testing
Interlace
Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (-93.37%)
Mutual labels:  hacking, penetration-testing
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (-32.39%)
Mutual labels:  hacking, penetration-testing
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (-93.68%)
Mutual labels:  hacking, malware
Brutus
A Python-powered exploitation framework and botnet.
Stars: ✭ 17 (-99.85%)
Mutual labels:  penetration-testing, malware
Drv3 Tools
(Not actively maintained, use DRV3-Sharp) Tools for extracting and re-injecting files for Danganronpa V3 for PC.
Stars: ✭ 13 (-99.89%)
Mutual labels:  hacking, reverse-engineering
Broxy
An HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (-92.05%)
Mutual labels:  hacking, penetration-testing
Xattacker
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (-92.18%)
Mutual labels:  hacking, exploit
Oscp
Collection of things made during my OSCP journey
Stars: ✭ 709 (-93.82%)
Mutual labels:  exploit, privilege-escalation
V3n0m Scanner
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (-92.61%)
Mutual labels:  hacking, exploit
Androl4b
A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
Stars: ✭ 908 (-92.08%)
Pwn jenkins
Notes about attacking Jenkins servers
Stars: ✭ 841 (-92.67%)
Mutual labels:  hacking, exploit
Spytrojan keylogger
[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-99.72%)
Mutual labels:  hacking, malware
Nettacker
Automated Penetration Testing Framework
Stars: ✭ 982 (-91.44%)
Mutual labels:  penetration-testing, owasp
Powerladon
Ladon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Stars: ✭ 39 (-99.66%)
Mutual labels:  hacking, exploit
Iprotate burp extension
Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.
Stars: ✭ 484 (-95.78%)
Mutual labels:  hacking, penetration-testing
Htshells
Self contained htaccess shells and attacks
Stars: ✭ 708 (-93.83%)
Mutual labels:  penetration-testing, exploit
Reverse Engineering
This repository contains some of the executables that I've cracked.
Stars: ✭ 29 (-99.75%)
Mutual labels:  hacking, reverse-engineering
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (-91.35%)
Mutual labels:  hacking, exploit
Pwntools
CTF framework and exploit development library
Stars: ✭ 8,585 (-25.13%)
Mutual labels:  exploit, ctf
Slowloris
Asynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-99.56%)
Mutual labels:  hacking, exploit
Reversing List
Reversing list
Stars: ✭ 106 (-99.08%)
Mutual labels:  ctf, reverse-engineering
Hackingthe.cloud
Content for hackingthe.cloud
Stars: ✭ 101 (-99.12%)
Mutual labels:  hacking, penetration-testing
Pythem
pentest framework
Stars: ✭ 1,060 (-90.76%)
Mutual labels:  hacking, exploit
Spellbook
Micro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-99.54%)
Mutual labels:  hacking, ctf
Sudo killer
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (-90.64%)
Mutual labels:  ctf, privilege-escalation
Dll hook Rs
Rust code to show how hooking in rust with a dll works.
Stars: ✭ 57 (-99.5%)
Mutual labels:  hacking, reverse-engineering
Malware Analysis Scripts
Collection of scripts for different malware analysis tasks
Stars: ✭ 61 (-99.47%)
Mutual labels:  malware, reverse-engineering
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (-21.67%)
Mutual labels:  hacking, malware
Ntrghidra
Fully Featured Nintendo DS Loader for Ghidra
Stars: ✭ 56 (-99.51%)
Mutual labels:  exploit, reverse-engineering
Slickermaster Rev4
NSA Hacking Tool Recreation UnitedRake
Stars: ✭ 62 (-99.46%)
Mutual labels:  hacking, exploit
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-99.46%)
Mutual labels:  hacking, penetration-testing
Rhme 2017
Riscure Hack Me embedded hardware CTF 2017-2018.
Stars: ✭ 65 (-99.43%)
Mutual labels:  hacking, ctf
Inferno
🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-99.08%)
Mutual labels:  hacking, malware
Gtfonow
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: ✭ 68 (-99.41%)
Mutual labels:  ctf, privilege-escalation
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (-90.13%)
Mutual labels:  hacking, malware
Solved Hacking Problem
✔️ CTF problems and solutions solved by Qwaz
Stars: ✭ 67 (-99.42%)
Mutual labels:  hacking, ctf
Ctf
Some of my CTF solutions
Stars: ✭ 70 (-99.39%)
Mutual labels:  exploit, ctf
Hacker ezines
A collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-99.37%)
Mutual labels:  exploit, owasp
Givingstorm
Infection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-99.37%)
Mutual labels:  hacking, penetration-testing
Phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (-89.64%)
Mutual labels:  hacking, privilege-escalation
Gitlab rce
RCE for old gitlab version <= 11.4.7 & 12.4.0-12.8.1 and LFI for old gitlab versions 10.4 - 12.8.1
Stars: ✭ 104 (-99.09%)
Mutual labels:  exploit, ctf
Pecli
CLI tool to analyze PE files
Stars: ✭ 46 (-99.6%)
Mutual labels:  malware, reverse-engineering
Cyberweapons
Automated Cyber Offense
Stars: ✭ 64 (-99.44%)
Mutual labels:  penetration-testing, malware
Kernel Exploits
My proof-of-concept exploits for the Linux kernel
Stars: ✭ 1,173 (-89.77%)
Mutual labels:  exploit, privilege-escalation
Stegextract
Detect hidden files and text in images
Stars: ✭ 79 (-99.31%)
Mutual labels:  penetration-testing, ctf
Linux Smart Enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
Stars: ✭ 1,956 (-82.94%)
Mutual labels:  hacking, privilege-escalation
61-120 of 2298 similar projects