hacking-tools
There are 1113 repositories under hacking-tools topic.
edoardottt/awesome-hacker-search-engines
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
1N3/Sn1per
Attack Surface Management Platform
yaklang/yakit
Cyber Security ALL-IN-ONE Platform
infoslack/awesome-web-hacking
A list of web application security
S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
urbanadventurer/WhatWeb
Next generation web scanner
xxh/xxh
🚀 Bring your favorite shell wherever you go through the ssh. Xonsh shell, fish, zsh, osquery and so on.
hak5/usbrubberducky-payloads
The Official USB Rubber Ducky Payload Repository
OWASP/Nettacker
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
may215/awesome-termux-hacking
⚡️An awesome list of the best Termux hacking tools
samsesh/SocialBox-Termux
SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By samsesh for termux on android
KuroLabs/stegcloak
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
jekil/awesome-hacking
Awesome hacking is an awesome collection of hacking tools.
vaib25vicky/awesome-mobile-security
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
EntySec/Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
jaykali/maskphish
Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
kurogai/100-redteam-projects
Projects for security students
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
rajkumardusad/IP-Tracer
Track any ip address with IP-Tracer. IP-Tracer is developed for Linux and Termux. you can retrieve any ip address information using IP-Tracer.
aydinnyunus/Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
palahsu/DDoS-Ripper
DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Internet traffic
MegaManSec/SSH-Snake
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
EONRaider/blackhat-python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
thehackingsage/hacktronian
Tools for Pentesting
Fadi002/unshackle
Open-source tool to bypass windows and linux passwords from bootable usb
koutto/pi-pwnbox-rogueap
Homemade Pwnbox :rocket: / Rogue AP :satellite: based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap :bulb:
hhhrrrttt222111/Ethical-Hacking-Tools
Complete Listing and Usage of Tools used for Ethical Hacking
ASHWIN990/ADB-Toolkit
ADB-Toolkit V2 for easy ADB tricks with many perks in all one. ENJOY!
jaykali/hackerpro
All in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog
evildevill/instahack
instahack is a bash & python based script which is officially made to test password strength of Instagram account from termux and kali with bruteforce attack and. it based on tor This tool works on both rooted Android device and Non-rooted Android device. Best Tool For Instagram Bruteforce hacking Tool By Waseem Akram. Made in Bash & python. This is an official repository of instahack
TryCatchHCF/Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Alfredredbird/tookie-osint
Tookie is a advanced OSINT information gathering tool that finds social media accounts based on inputs.
noob-hackers/kalimux
Install And Use Kali Linux With Gui In Termux
SofianeHamlaoui/Lockdoor-Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Deadshot0x7/007-TheBond
This Script will help you to gather information about your victim or friend.