Viral-patel703's Stars
harismuneer/Ultimate-Social-Scrapers
🤖 Top-rated tools to scrape all major sections from Facebook, Instagram, and Twitter (X) including posts (likes/comments), photos/videos, contact information, followers, following and much more.
codingforentrepreneurs/30-Days-of-Python
Learn Python for the next 30 (or so) Days.
P1kachu/ProgrammingLearning
Learning new programming languages, the easy way.
pihomeserver/Kupiki-Hotspot-Script
Create automatically a full Wifi Hotspot on Raspberry Pi including a Captive Portal
3ndG4me/AutoBlue-MS17-010
This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010
paulpierre/informer
A Telegram Mass Surveillance Bot in Python
alo7/rebirth
Record a web page on the server
visitishan/Dynamic_DNS
A homemade Dynamic DNS tool for personal servers having dynamic IP.
audibleblink/passdb-frontend
Pivoting Frontend for Pre-Seeded Password Databases
projectdiscovery/subfinder
Fast passive subdomain enumeration tool.
nymea/berrylan
Raspberry Pi WiFi setup
chenwei791129/Huawei-LTE-Router-SMS-to-E-mail-Sender
Check and send Huawei LTE router SMS by gmail smtp.
samdenty/huawei-mifi-indicator
blaCCkHatHacEEkr/PENTESTING-BIBLE
articles
Experience-Monks/ffmpeg-gif
shell script to convert video to high quality GIF with ffmpeg
yeyintminthuhtut/Awesome-Red-Teaming
List of Awesome Red Teaming Resources
ctfs/write-ups-2017
Wiki-like CTF write-ups repository, maintained by the community. 2017
samyk/poisontap
Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
dylancaponi/ESP8266-HTTP-IR-Blaster
ESP8266 Compatible IR Blaster that accepts HTTP commands for use with services like Amazon Echo
samyk/Awesome-Hacking-Resources
A collection of hacking / penetration testing resources to make you better!
jivoi/pentest
:no_entry: offsec batteries included
Arno0x/DBC2
DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any machine, powershell modules, and Dropbox servers as a means of communication.
threat9/routersploit
Exploitation Framework for Embedded Devices
dysfunc/animat.io
A CSS Animations & Effects Library
dysfunc/ascii-emoji
Essential Emoji
leebaird/discover
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.
bp2008/HikPasswordHelper
A tool which exploits a backdoor in Hikvision camera firmwares circa 2014-2016 to help the owner change a forgotten password.
zzz66686/CVE-2017-14263
tothi/pwn-hisilicon-dvr
tothi/ctfs
some example ctf writeups