Trending repositories for topic hacking-code
🌏 A tiny 0-dependency thread-safe Java™ lib for setting/viewing dns programmatically without touching host file, make unit/integration testing portable; and a tiny tool for setting/viewing dns of run...
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
🌏 A tiny 0-dependency thread-safe Java™ lib for setting/viewing dns programmatically without touching host file, make unit/integration testing portable; and a tiny tool for setting/viewing dns of run...
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Complete Listing and Usage of Tools used for Ethical Hacking
🌏 A tiny 0-dependency thread-safe Java™ lib for setting/viewing dns programmatically without touching host file, make unit/integration testing portable; and a tiny tool for setting/viewing dns of run...
Python network worm that spreads on the local network and gives the attacker control of these machines.
🌏 A tiny 0-dependency thread-safe Java™ lib for setting/viewing dns programmatically without touching host file, make unit/integration testing portable; and a tiny tool for setting/viewing dns of run...
Complete Listing and Usage of Tools used for Ethical Hacking
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Python network worm that spreads on the local network and gives the attacker control of these machines.
Install Metasploit And Repair Metasploit In Termux With Easy Steps
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Complete Listing and Usage of Tools used for Ethical Hacking
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Python network worm that spreads on the local network and gives the attacker control of these machines.
🌏 A tiny 0-dependency thread-safe Java™ lib for setting/viewing dns programmatically without touching host file, make unit/integration testing portable; and a tiny tool for setting/viewing dns of run...
🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
Complete Listing and Usage of Tools used for Ethical Hacking
Python network worm that spreads on the local network and gives the attacker control of these machines.
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
🌏 A tiny 0-dependency thread-safe Java™ lib for setting/viewing dns programmatically without touching host file, make unit/integration testing portable; and a tiny tool for setting/viewing dns of run...
🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Install Metasploit And Repair Metasploit In Termux With Easy Steps
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Complete Listing and Usage of Tools used for Ethical Hacking
🌏 A tiny 0-dependency thread-safe Java™ lib for setting/viewing dns programmatically without touching host file, make unit/integration testing portable; and a tiny tool for setting/viewing dns of run...
Python network worm that spreads on the local network and gives the attacker control of these machines.
🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures from various AV engines. It also has a handful of additional b...
Proof -Of-Concept Brute Force Login on a web-site with a good dictionary of words
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Find host header injections and perform Host Header attacks with other kind of bugs like web cache poisoning
Am just Someone who Loves 💕 Programming and Hacking ... for fun, kindly give me a star ⭐ (♥ω♥*)
wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures from various AV engines. It also has a handful of additional b...
Find host header injections and perform Host Header attacks with other kind of bugs like web cache poisoning
🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
Complete Listing and Usage of Tools used for Ethical Hacking
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Am just Someone who Loves 💕 Programming and Hacking ... for fun, kindly give me a star ⭐ (♥ω♥*)
Python network worm that spreads on the local network and gives the attacker control of these machines.
🌏 A tiny 0-dependency thread-safe Java™ lib for setting/viewing dns programmatically without touching host file, make unit/integration testing portable; and a tiny tool for setting/viewing dns of run...
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Proof -Of-Concept Brute Force Login on a web-site with a good dictionary of words
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.