BlackwormBlack Worm Offical Repo
Stars: ✭ 80 (+196.3%)
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (+166.67%)
WhitehatInformation about my experiences on ethical hacking 💀
Stars: ✭ 54 (+100%)
Minion Ciminimalist, decentralized, flexible Continuous Integration Server for hackers.
Stars: ✭ 44 (+62.96%)
DracnmapDracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+3088.89%)
HackingtoolALL IN ONE Hacking Tool For Hackers
Stars: ✭ 7,521 (+27755.56%)
BrutalPayload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (+2411.11%)
Pocorgtfoa "Proof of Concept or GTFO" mirror with extra article index, direct links and clean PDFs.
Stars: ✭ 560 (+1974.07%)
Opencanary webThe web management platform of honeypot
Stars: ✭ 547 (+1925.93%)
No More SecretsA command line tool that recreates the famous data decryption effect seen in the 1992 movie Sneakers.
Stars: ✭ 5,042 (+18574.07%)
InstainsaneMulti-threaded Instagram Brute Forcer (100 attemps at once)
Stars: ✭ 475 (+1659.26%)
Wahh extrasThe Web Application Hacker's Handbook - Extra Content
Stars: ✭ 428 (+1485.19%)
BrutesploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (+1470.37%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+1429.63%)
Pentesterspecialdict渗透测试人员专用精简化字典 Dictionary for penetration testers happy hacker
Stars: ✭ 391 (+1348.15%)
MaskphishGive a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
Stars: ✭ 370 (+1270.37%)
W5Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (+1259.26%)
JugglerA system that may trick hackers. 一个也许能骗到黑客的系统。
Stars: ✭ 321 (+1088.89%)
RichkwareFramework for building Windows malware, written in C++
Stars: ✭ 315 (+1066.67%)
QuackQuack Toolkit is a set of tools to provide denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools.
Stars: ✭ 305 (+1029.63%)
Hackermind渗透步骤,web安全,CTF,业务安全,人工智能,区块链安全,安全开发,无线安全,社会工程学,二进制安全,移动安全,红蓝对抗,运维安全,风控安全,linux安全
Stars: ✭ 284 (+951.85%)
BlacknetFree advanced and modern Windows botnet with a nice and secure PHP panel.
Stars: ✭ 271 (+903.7%)
PingPing! Share show ideas, feedback, or general questions. Just create an issue.
Stars: ✭ 267 (+888.89%)
NyxtNyxt - the hacker's power-browser.
Stars: ✭ 7,038 (+25966.67%)
Gmail-HackGmail account using brute force attack
Stars: ✭ 69 (+155.56%)
BruteSploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 26 (-3.7%)
owtUpdate Version 3.1 added free SMS messaging.
Stars: ✭ 339 (+1155.56%)
phomberPhomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (+118.52%)
singlefilefeatured cs:go internal hack, one file and less than 1000 lines.
Stars: ✭ 47 (+74.07%)
hacking-resourcesHacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
Stars: ✭ 1,386 (+5033.33%)
transwinMake window/frame transparent.
Stars: ✭ 22 (-18.52%)
DecoyMini🐝 A highly scalable, safe, free enterprise honeypots 一款高可扩展、安全、免费的企业级蜜罐系统
Stars: ✭ 213 (+688.89%)
XessMy minimal Gruvbox CSS file I've been keeping multiple places
Stars: ✭ 144 (+433.33%)
Spy-QuizHacker Challenge 👾
Stars: ✭ 17 (-37.04%)
mystars精选了千余项目,包括机器学习、深度学习、NLP、GNN、推荐系统、生物医药、机器视觉等内容。
Stars: ✭ 112 (+314.81%)
CyberPunkNetrunnerCyberpunk 2077 Netrunner Hacking Tool (Easy to use and install). Don't use it on illegal and malicious activity. Inspired by the game CyberPunk 2077 https://www.cyberpunk.net/
Stars: ✭ 69 (+155.56%)
CEHExam Prep for the Ec-council Certified Ethical Hacker 312-50
Stars: ✭ 71 (+162.96%)
mec-ngpentest toolbox
Stars: ✭ 28 (+3.7%)
foss-eventsA simple website with a collection of open-source events happening across the globe. This is a beginner-friendly repository that helps you learn git and contribute to web projects. Happy Hacktober!
Stars: ✭ 123 (+355.56%)
Blackeye-for-WindowsThis is a Phishing tool. Phishing is a type of hacking also called credential harvesting. It creates fake websites for victims to login which saves their login info which includes IP, User-Agent, Username and Password to a file in the computer running Blackeye. This tool has been there for Linux and even Android via Termux. I converted it to Win…
Stars: ✭ 38 (+40.74%)
CyberQueensCyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨💻
Stars: ✭ 30 (+11.11%)