All Projects → Binary Hacking Course → Similar Projects or Alternatives

705 Open source projects that are alternatives of or similar to Binary Hacking Course

Reverse Engineering Tutorials
Some Reverse Engineering Tutorials for Beginners
Stars: ✭ 217 (+538.24%)
Mutual labels:  binary, hacking
Dracnmap
Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+2432.35%)
Mutual labels:  hacking
Torbot
Dark Web OSINT Tool
Stars: ✭ 821 (+2314.71%)
Mutual labels:  hacking
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+2147.06%)
Mutual labels:  hacking
Bits
A bite sized library for dealing with bytes.
Stars: ✭ 16 (-52.94%)
Mutual labels:  binary
Drv3 Tools
(Not actively maintained, use DRV3-Sharp) Tools for extracting and re-injecting files for Danganronpa V3 for PC.
Stars: ✭ 13 (-61.76%)
Mutual labels:  hacking
Androidsdk
🐳 Full-fledged Android SDK Docker Image
Stars: ✭ 776 (+2182.35%)
Mutual labels:  hacking
Intranet penetration cheetsheets
做redteam时使用,修改自Ridter的https://github.com/Ridter/Intranet_Penetration_Tips
Stars: ✭ 29 (-14.71%)
Mutual labels:  hacking
Pwn jenkins
Notes about attacking Jenkins servers
Stars: ✭ 841 (+2373.53%)
Mutual labels:  hacking
Packer Fuzzer
Packer Fuzzer is a fast and efficient scanner for security detection of websites constructed by javascript module bundler such as Webpack.
Stars: ✭ 753 (+2114.71%)
Mutual labels:  hacking
Naive Hashcat
Crack password hashes without the fuss 🐈
Stars: ✭ 726 (+2035.29%)
Mutual labels:  hacking
Xattacker
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+2538.24%)
Mutual labels:  hacking
Pythonhackingbook1
Python黑客编程之极速入门
Stars: ✭ 882 (+2494.12%)
Mutual labels:  hacking
Scripts
Scripts I use during pentest engagements.
Stars: ✭ 834 (+2352.94%)
Mutual labels:  hacking
Speedhack
Speedhack coded in C++, inspired by Cheat Engine's own speedhack.
Stars: ✭ 29 (-14.71%)
Mutual labels:  hacking
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+22700%)
Mutual labels:  hacking
Kubernetes Goat
Kubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
Stars: ✭ 868 (+2452.94%)
Mutual labels:  hacking
Trape
People tracker on the Internet: OSINT analysis and research tool by Jose Pino
Stars: ✭ 6,753 (+19761.76%)
Mutual labels:  hacking
Hamming
Hamming distance and bit counting primitives in Go (golang)
Stars: ✭ 30 (-11.76%)
Mutual labels:  binary
Interlace
Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+2135.29%)
Mutual labels:  hacking
V3n0m Scanner
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+2391.18%)
Mutual labels:  hacking
Ics Security Tools
Tools, tips, tricks, and more for exploring ICS Security.
Stars: ✭ 749 (+2102.94%)
Mutual labels:  hacking
Taik
Tool hack Dark FB tanpa lisensi
Stars: ✭ 21 (-38.24%)
Mutual labels:  hacking
Awesome Ethical Hacking Resources
🔗 All the resources I could find for learning Ethical Hacking and Penetration Testing.
Stars: ✭ 933 (+2644.12%)
Mutual labels:  hacking
Hackingtool
ALL IN ONE Hacking Tool For Hackers
Stars: ✭ 7,521 (+22020.59%)
Mutual labels:  hacking
Unity Game Hacking
A guide for hacking unity games
Stars: ✭ 710 (+1988.24%)
Mutual labels:  hacking
Chronicel
Our super sweet hacker management system, built for HackTCNJ 2017+ | Used by [email protected] 2018!
Stars: ✭ 18 (-47.06%)
Mutual labels:  hacking
Ris
a simple cross-platform resource compiler for c++ projects
Stars: ✭ 15 (-55.88%)
Mutual labels:  binary
Jsql Injection
jSQL Injection is a Java application for automatic SQL database injection.
Stars: ✭ 891 (+2520.59%)
Mutual labels:  hacking
Reverse Engineering
This repository contains some of the executables that I've cracked.
Stars: ✭ 29 (-14.71%)
Mutual labels:  hacking
Binary.dart
Utilities for working with binary data and bit manipulation in Dart.
Stars: ✭ 16 (-52.94%)
Mutual labels:  binary
Awesome Hacking
A curated list of awesome Hacking tutorials, tools and resources
Stars: ✭ 7,756 (+22711.76%)
Mutual labels:  hacking
Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Stars: ✭ 9,116 (+26711.76%)
Mutual labels:  hacking
Fiercephish
FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.
Stars: ✭ 960 (+2723.53%)
Mutual labels:  hacking
Pi Pwnbox Rogueap
Homemade Pwnbox 🚀 / Rogue AP 📡 based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap 💡
Stars: ✭ 798 (+2247.06%)
Mutual labels:  hacking
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+2458.82%)
Mutual labels:  hacking
Privesc
A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+2211.76%)
Mutual labels:  hacking
Tic Tac
Client not paid ? This is the solution of your problem
Stars: ✭ 29 (-14.71%)
Mutual labels:  hacking
Simplyemail
Email recon made fast and easy, with a framework to build on
Stars: ✭ 779 (+2191.18%)
Mutual labels:  hacking
Shuffle
WebShell Backdoor Framework
Stars: ✭ 11 (-67.65%)
Mutual labels:  hacking
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+2179.41%)
Mutual labels:  hacking
Badusb botnet
👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-5.88%)
Mutual labels:  hacking
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+2155.88%)
Mutual labels:  hacking
Phonesploit
Using open Adb ports we can exploit a Andriod Device
Stars: ✭ 854 (+2411.76%)
Mutual labels:  hacking
Resources For Beginner Bug Bounty Hunters
A list of resources for those interested in getting started in bug bounties
Stars: ✭ 7,185 (+21032.35%)
Mutual labels:  hacking
Catchme
CatchME - WiFi Fun Box "Having Fun with ESP8266"
Stars: ✭ 28 (-17.65%)
Mutual labels:  hacking
Redteamtools
记录自己编写、修改的部分工具
Stars: ✭ 752 (+2111.76%)
Mutual labels:  hacking
Crazy Weekend
Mengobati rasa ingin tahu atau kadang hanya iseng
Stars: ✭ 9 (-73.53%)
Mutual labels:  hacking
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+2032.35%)
Mutual labels:  hacking
Pxenum
A shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-11.76%)
Mutual labels:  hacking
Sql Injection Payload List
🎯 SQL Injection Payload List
Stars: ✭ 716 (+2005.88%)
Mutual labels:  hacking
Php Bitmap
Bitmap representation with bitwise operations
Stars: ✭ 7 (-79.41%)
Mutual labels:  binary
Lambda Packages
Various popular python libraries, pre-compiled to be compatible with AWS Lambda
Stars: ✭ 713 (+1997.06%)
Mutual labels:  binary
Wssh
WSSH Is a tool for brute forcing servers that has port 22 open via ssh, wssh is probably the fastest ssh brute forcer available
Stars: ✭ 21 (-38.24%)
Mutual labels:  hacking
Scodec
Scala combinator library for working with binary data
Stars: ✭ 709 (+1985.29%)
Mutual labels:  binary
Frosty
serialize native Nim types to strings, streams, or sockets ⛄
Stars: ✭ 25 (-26.47%)
Mutual labels:  binary
Cfg Explorer
CFG explorer for binaries
Stars: ✭ 33 (-2.94%)
Mutual labels:  binary
Spytrojan keylogger
[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-5.88%)
Mutual labels:  hacking
Goridge
High-performance PHP-to-Golang IPC bridge
Stars: ✭ 950 (+2694.12%)
Mutual labels:  binary
Broxy
An HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (+2582.35%)
Mutual labels:  hacking
1-60 of 705 similar projects