Statistics for topic hacking-tools
RepositoryStats tracks 595,858 Github repositories, of these 228 are tagged with the hacking-tools topic. The most common primary language for repositories using this topic is Python (108). Other languages include: Shell (43)
Stargazers over time for topic hacking-tools
Most starred repositories for topic hacking-tools (view more)
Trending repositories for topic hacking-tools (view more)
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Android shell virus that will reset, brick and corrupt the Android device with a link, also contains Antivirus and now supports Android 10+
PYTHON CODE TO SEARCH BY DORK ON (.onion) WEBSITES , NORMAL WEBSITES AND LEARN HOW DORK WORK.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
Android shell virus that will reset, brick and corrupt the Android device with a link, also contains Antivirus and now supports Android 10+
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
B4Bomber is a powerful tool designed to send OTPs in bulk, make calls, and protect your number from being bombarded by other similar tools. This tool is intended for educational purposes only.
Android KeyLogger and SMS Capture (software is meant for educational)
Incognito Call An Android tool designed for multiple functionalities, leveraging a Telegram bot for seamless operation. It does not require a PC or port forwarding for usage. The primary purpose of th...
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operations.
File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-256 encryption, with the AES key itself being encrypted using RS...
Instagram bruteforce attack tool with 10,000,000 passwords, custom password attack and string attack. Fast cooldown helps to bypass instagram account more effectively.
Android shell virus that will reset, brick and corrupt the Android device with a link, also contains Antivirus and now supports Android 10+
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others Tools