3hakx's Stars
ABrandau/Shattered-Paradise-SDK-old
Shattered Paradise's main repository and installation Kit.
k0r0pt/Project-Tauro
A Router WiFi key recovery/cracking tool with a twist.
trevatk/Wifi-Cracker
Wifi Cracking
aress31/wirespy
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
wiire-a/pixiewps
An offline Wi-Fi Protected Setup brute-force utility
derv82/wifite2
Rewrite of the popular wireless network auditor, "wifite"
jhaddix/pentest-bookmarks
a collection of handy bookmarks
jhaddix/tbhm
The Bug Hunters Methodology
toolswatch/vFeed
The Correlated CVE Vulnerability And Threat Intelligence Database API
XiphosResearch/exploits
Miscellaneous exploit code
auraphp/Aura.Payload
A Domain Payload implementation.
utoni/bufflow
A collection of code examples e.g. a buffer overflow + exploit, crypter, shellcodes and more.
ash47/OmegleMiddleMan
Lets you connect strangers to each other, and intercept messages AKA Man in the Middle Attack
Gexos/Hacking-Tools-Repository
A list of security/hacking tools that have been collected from the internet. Suggestions are welcomed.
ChadSki/SharpNeedle
Inject C# code into a running process
osh/gr-eventstream
gr-eventstream is a set of GNU Radio blocks for creating precisely timed events and either inserting them into, or extracting them from normal data-streams precisely. It allows for the definition of high speed time-synchronous c++ burst event handlers, as well as bridging to standard GNU Radio Async PDU messages with precise timing easily.
DE-IBH/putts
Probe Uptime by Tcp TimeStamps
0xsauby/yasuo
A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
byt3bl33d3r/WitnessMe
Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to make life easier.
evilsocket/joe
The Swiss Army knife for backend engineers.
rfunix/Pompem
Find exploit tool
bettercap/bettercap
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
ricardojoserf/wpa2-enterprise-attack
Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC
vulhub/vulhub
Pre-Built Vulnerable Environments Based on Docker-Compose
1N3/IntruderPayloads
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.