Pinned Repositories
anonsurf
A port of ParrotSec's stealth and anonsurf modules to Kali Linux
cyber-security-free-pdf
All pdf related to kali Linux 🐲
darkweb
fb-brute
g-dorks
Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites are using. Google dorking could also be used for OSINT
Keralahacker
kochi-workshop-23
notes for Kochi workshop 23
termux3.0
Termux custom script for zshrc , bashrc and welcome page + navigation bar
tiktok-h3k
Villain
Villain is a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other machines running Villain) and share their backdoor sessions, handy for working as a team.
keralahacker's Repositories
keralahacker/Keralahacker
keralahacker/kochi-workshop-23
notes for Kochi workshop 23
keralahacker/anonsurf
A port of ParrotSec's stealth and anonsurf modules to Kali Linux
keralahacker/mvt
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
keralahacker/Mobile-Security-Framework-MobSF
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
keralahacker/rtl8812au
RTL8812AU /21AU and RTL8814AU driver with monitor mode and frame injection
keralahacker/BIT
Bangalore Institute of Technology | note's andďfile URLS
keralahacker/CEH-Exam-Questions
Planning To Take Certified Ethical Hacker (CEH)? Here are github repo with 125 questions and answers to help you prep for the test
keralahacker/GPT-Tools
keralahacker/spiderfoot
SpiderFoot automates OSINT collection so that you can focus on analysis.
keralahacker/wesng
Windows Exploit Suggester - Next Generation
keralahacker/yara
The pattern matching swiss knife for Malware Lab
keralahacker/apache-superset
Basic PoC for CVE-2023-27524: Insecure Default Configuration in Apache Superset
keralahacker/cowrie
Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
keralahacker/cupp
Common User Passwords Profiler (CUPP)
keralahacker/domain-checker
Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydrattack.com), the main idea of which is, based only on the domain name, find almost all of the subdomains and their top 100 open ports
keralahacker/eschalot
Generate a Custom Onion Address with works using wordlists.
keralahacker/evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
keralahacker/Fast-Google-Dorks-Scan
The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information about the specific web-site: common admin panels, the widespread file types and path traversal. The 100% automated.
keralahacker/nmap-report
keralahacker/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
keralahacker/PowerJoker
A random powershell Reverse-Shell in each execution taking LHOST/LPORT
keralahacker/Qu1cksc0pe
All-in-One malware analysis tool integrated with Virus Total
keralahacker/RanSim
Ransomware simulation script. Useful for testing your defenses and backups against real ransomware-like activity in a controlled setting.
keralahacker/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
keralahacker/trivy
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
keralahacker/tryhackme-2023
keralahacker/upload-bypass
File upload restrictions bypass, by using different bug bounty techniques!
keralahacker/vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
keralahacker/wapiti
Web vulnerability scanner written in Python3, read the wiki before use.