Pinned Repositories
2FA-Bypass-Techniques
A comprehensive collection of various techniques and methods for bypassing Two-Factor Authentication (2FA) security mechanisms.
Android-Pentesting
Android Pentesting Zone
android-spyware
Rails c&c web application for spying Android devices
APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
awesome-CISSP-CCSP
CISSP study material repository
awesome-devsecops
Curating the best DevSecOps resources and tooling.
BeeF-Over-Wan
Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
BITB
Browser In The Browser (BITB) Templates
c41n
Automated rogue access point setup tool.
Telegram-OSINT
In-depth repository of Telegram OSINT resources covering, tools, techniques & tradecraft.
EricoPawn's Repositories
EricoPawn/BeeF-Over-Wan
Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
EricoPawn/android-spyware
Rails c&c web application for spying Android devices
EricoPawn/cheatsheets
High quality and text versions of cheat sheets from Cyber Detective Twitter
EricoPawn/cve
Gather and update all available and newest CVEs with their PoC.
EricoPawn/dark_web.py
Dark Web Informationgathering Footprinting Scanner and Recon Tool Release. Dark Web is an Information Gathering Tool I made in python 3. To run Dark Web, it only needs a domain or ip. Dark Web can work with any Linux distros if they support Python 3. Author: AKASHBLACKHAT(help for ethical hackers)
EricoPawn/Defacer
This is an automatic deface tool with a target vuln that I have prepared and you can change the target yourself in target.txt
EricoPawn/EvilSlackbot
A Slack bot phishing framework for Red Teaming exercises
EricoPawn/forensictools
Collection of forensic tools
EricoPawn/Geogramint
An OSINT Geolocalization tool for Telegram that find nearby users and groups 📡🌍🔍
EricoPawn/Hack-cctv
This is a tool for randomly hacking CCTV cameras in various countries that is available in the tools list
EricoPawn/Hacking-Tools
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
EricoPawn/InfosecHouse
Tools & Resources for Cyber Security Operations
EricoPawn/instagrame-hacking
best script for hacking instagram /instagrame-hacking is a bash based script which is officially made to test password strength of instagram account from termux with bruteforce attack and This tool works on both rooted Android device and Non-rooted Android device.
EricoPawn/L-OSINT
Social Media Search Tool
EricoPawn/Live-location.py
EricoPawn/LTESniffer
An Open-source LTE Downlink/Uplink Eavesdropper
EricoPawn/mask-url
A good tool to hide phishing traps or cut links.
EricoPawn/Mobile-Security-Framework-MobSF
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
EricoPawn/MobileHackingCheatSheet
Basics on commands/tools/info on how to assess the security of mobile applications
EricoPawn/OSINT-Cheat-sheet
OSINT cheat sheet, list OSINT tools, dataset, article, book and OSINT tips
EricoPawn/PacketSpy
PacketSpy
EricoPawn/Pantheon
Insecure Camera Parsing and Intelligence
EricoPawn/PowerShell-for-Hackers
This repository is a collection of powershell functions every hacker should know
EricoPawn/SARA
SARA - Simple Android Ransomware Attack
EricoPawn/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
EricoPawn/Socialbrute
Socialbrute is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Mr.X
EricoPawn/SploitScan
SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated proof-of-concept (PoC) exploits.
EricoPawn/Telerecon
A reconnaissance framework for researching and investigating Telegram.
EricoPawn/WhatMail
WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.
EricoPawn/wifi-deauth
A deauth attack that disconnects all devices from the target wifi network (2.4Ghz & 5Ghz)