Lists (3)
Sort Name ascending (A-Z)
Stars
Notes about tinkering with Android Project Treble
All-in-One Hacking Tools For Hackers! And more hacking tools! For termux.
Install Metasploit Framework 6 in Termux
Cross-platform GUI written in Rust using ADB to debloat non-rooted android devices. Improve your privacy, the security and battery life of your device.
Network, recon and offensive-security tool for Linux.
A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.
A Proof-Of-Concept for the CVE-2021-44228 vulnerability.
A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228
A python based tool for finding SQL vulnerable sites.
A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.
Install a simple, fast and beautiful desktop in termux
🔥 Web-application firewalls (WAFs) from security standpoint.
Z4nzu / fakeap
Forked from evil5hadow/fakeapFake-AP to perform Evil Twin Attack
tplink wn7225n Driver conversion from v2/v3 to v1, to use monitor mode in kali linux.
Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for Android devices! (no root, no adb)
40X/HTTP bypasser in Go. Features: Verb tampering, headers, #bugbountytips, User-Agents, extensions, default credentials...
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
khansaad1275 / maskphish
Forked from jaykali/maskphishGive a Mask to Phishing URL like a PRO
The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.
Find domains and subdomains related to a given domain
Fetch all the URLs that the Wayback Machine knows about for a domain
A fast, simple, recursive content discovery tool written in Rust.