Trending repositories for topic hacking-code
Python network worm that spreads on the local network and gives the attacker control of these machines.
Python network worm that spreads on the local network and gives the attacker control of these machines.
Complete Listing and Usage of Tools used for Ethical Hacking
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Python network worm that spreads on the local network and gives the attacker control of these machines.
Python network worm that spreads on the local network and gives the attacker control of these machines.
Complete Listing and Usage of Tools used for Ethical Hacking
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Complete Listing and Usage of Tools used for Ethical Hacking
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
This tool hacks email account passwords using brute-force attacks, enhancing security testing and password strength evaluation. Ideal for audits and penetration testing.
Python network worm that spreads on the local network and gives the attacker control of these machines.
🌏 A tiny 0-dependency thread-safe Java™ lib for setting/viewing dns programmatically without touching host file, make unit/integration testing portable; and a tiny tool for setting/viewing dns of run...
🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
This tool hacks email account passwords using brute-force attacks, enhancing security testing and password strength evaluation. Ideal for audits and penetration testing.
Complete Listing and Usage of Tools used for Ethical Hacking
🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Python network worm that spreads on the local network and gives the attacker control of these machines.
Install Metasploit And Repair Metasploit In Termux With Easy Steps
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
🌏 A tiny 0-dependency thread-safe Java™ lib for setting/viewing dns programmatically without touching host file, make unit/integration testing portable; and a tiny tool for setting/viewing dns of run...
This tool hacks email account passwords using brute-force attacks, enhancing security testing and password strength evaluation. Ideal for audits and penetration testing.
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Complete Listing and Usage of Tools used for Ethical Hacking
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
🌏 A tiny 0-dependency thread-safe Java™ lib for setting/viewing dns programmatically without touching host file, make unit/integration testing portable; and a tiny tool for setting/viewing dns of run...
Python network worm that spreads on the local network and gives the attacker control of these machines.
This tool hacks email account passwords using brute-force attacks, enhancing security testing and password strength evaluation. Ideal for audits and penetration testing.
🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
Proof -Of-Concept Brute Force Login on a web-site with a good dictionary of words
wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures from various AV engines. It also has a handful of additional b...
My notes/solutions to the problems in "The Web Application Hacker's Handbook" (https://portswigger.net/web-security/web-application-hackers-handbook)
Am just Someone who Loves 💕 Programming and Hacking ... for fun, kindly give me a star ⭐ (♥ω♥*)
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware specs, every button that pushed, screenshots, and copying proc...
My notes/solutions to the problems in "The Web Application Hacker's Handbook" (https://portswigger.net/web-security/web-application-hackers-handbook)
wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures from various AV engines. It also has a handful of additional b...
Complete Listing and Usage of Tools used for Ethical Hacking
🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Python network worm that spreads on the local network and gives the attacker control of these machines.
Am just Someone who Loves 💕 Programming and Hacking ... for fun, kindly give me a star ⭐ (♥ω♥*)
This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware specs, every button that pushed, screenshots, and copying proc...
🌏 A tiny 0-dependency thread-safe Java™ lib for setting/viewing dns programmatically without touching host file, make unit/integration testing portable; and a tiny tool for setting/viewing dns of run...
Proof -Of-Concept Brute Force Login on a web-site with a good dictionary of words
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.