Statistics for topic hacking-tool
RepositoryStats tracks 633,100 Github repositories, of these 428 are tagged with the hacking-tool topic. The most common primary language for repositories using this topic is Python (200). Other languages include: Shell (66), Go (20), HTML (17), C (13), JavaScript (12)
Stargazers over time for topic hacking-tool
Most starred repositories for topic hacking-tool (view more)
Trending repositories for topic hacking-tool (view more)
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
All-in-One Hacking Tools For Hackers! And more hacking tools! For termux.
Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information.
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
All-in-One Hacking Tools For Hackers! And more hacking tools! For termux.
A collection of hacking tools, resources and references to practice ethical hacking.
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.
This tool hacks email account passwords using brute-force attacks, enhancing security testing and password strength evaluation. Ideal for audits and penetration testing.
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
A collection of hacking tools, resources and references to practice ethical hacking.
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operations.
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminating the need for tools like accesschk.exe or other non-native bin...
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
A collection of hacking tools, resources and references to practice ethical hacking.
All-in-One Hacking Tools For Hackers! And more hacking tools! For termux.
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets!
Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
Zeuris is bash based script with 10+ pages which can be used in Termux No root.