Lists (1)
Sort Name ascending (A-Z)
Stars
DamyG-a / WebHackersWeapons
Forked from hahwul/WebHackersWeapons⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Android security insights in full spectrum.
Free hands-on digital forensics labs for students and faculty
⭐️ A curated list of awesome forensic analysis tools and resources
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
Get all passwords stored by Chrome on WINDOWS.
Exploits USB HID to steal passwords saved in Google Chrome
Project to implement and automate juice jacking: the stealing of phone data through USB connections
Automatically hacking usb stick (gets passwords + keylogger)
Code for Malware which spreads by injecting pendrive and sends IP address and MAC ID to Attackers Email
Automatic USB drive malware scanning tool for the security-minded person
erwincatt / hackingtool
Forked from torvalds/linuxAll in one complete professional hacking toolkit for termux, kali and any other linux distro
the hacker sends a binary SMS to the target's phone. The SMS contains a special payload executed by the operating system of the phone's SIM card
Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)
Firefox Decrypt is a tool to extract passwords from Mozilla (Firefox™, Waterfox™, Thunderbird®, SeaMonkey®) profiles
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 solely and completely with "BurpSuite".
An insane list of all dorks taken from everywhere from various different sources.
tool used to change your IP every second your want
SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.