Statistics for topic hacking-tools
RepositoryStats tracks 592,850 Github repositories, of these 229 are tagged with the hacking-tools topic. The most common primary language for repositories using this topic is Python (108). Other languages include: Shell (43)
Stargazers over time for topic hacking-tools
Most starred repositories for topic hacking-tools (view more)
Trending repositories for topic hacking-tools (view more)
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
Most Powerfull 😈Crash any android device with virus from any link using termux or kali linux
🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
Hack Victim android Camera Using Link with Termux/Kali-linux
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
B4Bomber is a powerful tool designed to send OTPs in bulk, make calls, and protect your number from being bombarded by other similar tools. This tool is intended for educational purposes only.
This Is A Simple Undetected Tool That Can Mass Report Tiktok Accounts & Videos Aggressively
Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
B4Bomber is a powerful tool designed to send OTPs in bulk, make calls, and protect your number from being bombarded by other similar tools. This tool is intended for educational purposes only.
Android KeyLogger and SMS Capture (software is meant for educational)
Android shell virus that will reset, brick and corrupt the Android device with a link, also contains Antivirus and now supports Android 10+
Instagram bruteforce attack tool with 10,000,000 passwords, custom password attack and string attack. Fast cooldown helps to bypass instagram account more effectively.
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operations.
File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-256 encryption, with the AES key itself being encrypted using RS...
Instagram bruteforce attack tool with 10,000,000 passwords, custom password attack and string attack. Fast cooldown helps to bypass instagram account more effectively.
Android shell virus that will reset, brick and corrupt the Android device with a link, also contains Antivirus and now supports Android 10+
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others Tools