Trending repositories for topic hacking-tool
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
A collection of hacking tools, resources and references to practice ethical hacking.
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
Zero-attacker is an multipurpose hacking tool with over 15+ multifunction tools
All-in-One Hacking Tools For Hackers! And more hacking tools! For termux.
Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites. Contact us via contact@wpscan.com
SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By samsesh for termux on android
People tracker on the Internet: OSINT analysis and research tool by Jose Pino
A curated collection of top-tier penetration testing tools and productivity utilities across multiple domains. Join us to explore, contribute, and enhance your hacking toolkit!
ADB-Toolkit V2 for easy ADB tricks with many perks in all one. ENJOY!
Tookie is a advanced OSINT information gathering tool that finds social media accounts based on inputs.
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them ...
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.
Zero-attacker is an multipurpose hacking tool with over 15+ multifunction tools
SPY BOMB is a tool used to generate various payloads for android,windows,ios,mac and many more it is very user friendly tool.
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cl...
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
A Burp extension helps identifying injection flaws (LFI, RCE, SQLi), authentication/authorization issues, and HTTP 403 access violations, while also converting HTTP requests to JavaScript for enhanced...
A curated collection of top-tier penetration testing tools and productivity utilities across multiple domains. Join us to explore, contribute, and enhance your hacking toolkit!
Tookie is a advanced OSINT information gathering tool that finds social media accounts based on inputs.
All-in-One Hacking Tools For Hackers! And more hacking tools! For termux.
ADB-Toolkit V2 for easy ADB tricks with many perks in all one. ENJOY!
Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen c...
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
A collection of hacking tools, resources and references to practice ethical hacking.
All-in-One Hacking Tools For Hackers! And more hacking tools! For termux.
Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites. Contact us via contact@wpscan.com
Zero-attacker is an multipurpose hacking tool with over 15+ multifunction tools
Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information.
Tookie is a advanced OSINT information gathering tool that finds social media accounts based on inputs.
SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By samsesh for termux on android
A multifunctional Telegram based Android RAT without port forwarding.
Albanian Hacking Tool!! Tools to help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery, Anonymous-sms, Webcam Hack • Powerful DDOS attack too...
A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.
This tool hacks email account passwords using brute-force attacks, enhancing security testing and password strength evaluation. Ideal for audits and penetration testing.
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
A flexible Android RAT integrated with Telegram without port forwarding.
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cl...
Net Strike is a powerful multi-protocol DDoS tool written in Python. It uses IP spoofing for anonymity and maximizes attack speed with multi-threading and asynchronous programming.
WebSift is an OSINT ethical hacking tool designed to scrape and extract emails, phone numbers, and social media links or other URLs from websites. It is developed for Termux and Linux-based systems
Zero-attacker is an multipurpose hacking tool with over 15+ multifunction tools
Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information.
Albanian Hacking Tool!! Tools to help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery, Anonymous-sms, Webcam Hack • Powerful DDOS attack too...
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
A collection of hacking tools, resources and references to practice ethical hacking.
All-in-One Hacking Tools For Hackers! And more hacking tools! For termux.
WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites. Contact us via contact@wpscan.com
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By samsesh for termux on android
Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}
Tookie is a advanced OSINT information gathering tool that finds social media accounts based on inputs.
Albanian Hacking Tool!! Tools to help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery, Anonymous-sms, Webcam Hack • Powerful DDOS attack too...
A multifunctional Telegram based Android RAT without port forwarding.
Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information.
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
This tool hacks email account passwords using brute-force attacks, enhancing security testing and password strength evaluation. Ideal for audits and penetration testing.
WebSift is an OSINT ethical hacking tool designed to scrape and extract emails, phone numbers, and social media links or other URLs from websites. It is developed for Termux and Linux-based systems
A flexible Android RAT integrated with Telegram without port forwarding.
This Tool can Hack and Grab data of Camera, Voice, Clipboard, Location.It can Grab As much info as Possible from Victims Device.All this requires Just a Malicious Link
-= Has features =- =============== -DDoS -Web Scanning -Phone Hunter -CCTV Hunter -Deface -Mass Deface -Deface Maker -Bypass Maker -Auto Bypasser -Database Dump -Dorking -Admin Finder -Wifi Jammer -E...
Zeuris is bash based script with 10+ pages which can be used in Termux No root.
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operations.
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminating the need for tools like accesschk.exe or other non-native bin...
Instagram bruteforce attack tool with 10,000,000 passwords, custom password attack and string attack. Fast cooldown helps to bypass instagram account more effectively.
Android shell virus that will reset, brick and corrupt the Android device with a link, also contains Antivirus and now supports Android 10+
WebSift is an OSINT ethical hacking tool designed to scrape and extract emails, phone numbers, and social media links or other URLs from websites. It is developed for Termux and Linux-based systems
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity...
Net Strike is a powerful multi-protocol DDoS tool written in Python. It uses IP spoofing for anonymity and maximizes attack speed with multi-threading and asynchronous programming.
A flexible Android RAT integrated with Telegram without port forwarding.
A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.
This tool hacks email account passwords using brute-force attacks, enhancing security testing and password strength evaluation. Ideal for audits and penetration testing.
Zeuris is bash based script with 10+ pages which can be used in Termux No root.
Marlowe Malwares is a comprehensive repository dedicated to the aggregation, analysis, and management of malware samples written in various programming languages.
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
A collection of hacking tools, resources and references to practice ethical hacking.
All-in-One Hacking Tools For Hackers! And more hacking tools! For termux.
(⌐■_■) - Raspberry Pi instrumenting Bettercap for Wi-Fi pwning.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By samsesh for termux on android
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites. Contact us via contact@wpscan.com
Albanian Hacking Tool!! Tools to help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery, Anonymous-sms, Webcam Hack • Powerful DDOS attack too...
Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets!
Tookie is a advanced OSINT information gathering tool that finds social media accounts based on inputs.
Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
Cyber Security Tool For Hacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2/TKIP/IES)
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets!
Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
Zeuris is bash based script with 10+ pages which can be used in Termux No root.
Albanian Hacking Tool!! Tools to help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery, Anonymous-sms, Webcam Hack • Powerful DDOS attack too...
HARRYv6 - New Facebook Old/New/Mix Id Cracker Tool | Public Cracker | File Cracker | Love From Nepal ❤️
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cl...
-= Has features =- =============== -DDoS -Web Scanning -Phone Hunter -CCTV Hunter -Deface -Mass Deface -Deface Maker -Bypass Maker -Auto Bypasser -Database Dump -Dorking -Admin Finder -Wifi Jammer -E...
Phishing tool for Instagram, cloaked as the NGL - Anonymous question links app 😈🔗
ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminating the need for tools like accesschk.exe or other non-native bin...