#
hack
Here are 2,096 public repositories matching this topic...
proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained proxychains project. the sf.net page is currently not updated, use releases from github release page instead.
-
Updated
Jul 28, 2022 - C
Exploit Development and Reverse Engineering with GDB Made Easy
python
linux
debugging
hack
reverse-engineering
malware
disassembler
gdb
ctf
peda
gdbinit
pwndbg
gef
ida-pro
binary-ninja
defcon
pwnable
capture-the-flag
malware-analysis
-
Updated
Aug 22, 2022 - Python
an enhancer/customiser for the all-in-one productivity workspace notion.so (app)
windows
macos
linux
productivity
integrations
hack
extensions
mod
themes
mods
enhancer
notion
mod-loader
notion-enhancer
-
Updated
Jun 5, 2022 - JavaScript
The all-in-one Red Team extension for Web Pentester 🛠
chrome-extension
hack
reverse-shell
firefox-addon
hacking
cybersecurity
pentesting
msfvenom
payloads
red-team
metasploit
pentest-tool
hacktools
hacking-tools
red-teaming
hackbar
xss-payloads
hack-tools
web-pentesters
-
Updated
May 4, 2022 - TypeScript
大型内网渗透扫描器&Cobalt Strike,Ladon9.1.8内置160个模块,包含信息收集/存活主机/端口扫描/服务识别/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010/SMBGhost/Weblogic/ActiveMQ/Tomcat/Struts2,密码口令爆破(Mysql/Oracle/MSSQL)/FTP/SSH(Linux)/VNC/Windows(IPC/WMI/SMB/Netbios/LDAP/SmbHash/WmiHash/Winrm),远程执行命令(smbexec/wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0
security
tools
hack
exploit
scanner
hacking
password
poc
brute-force
pentest
portscan
security-scanner
exp
security-tools
ladon
ipscanner
getshell
netscan
-
Updated
Jul 28, 2022 - C#
Web Application Security Scanner Framework
javascript
ruby
crawler
security-audit
modular
hack
dom
analysis
scanner
detection
hacking
xss
audit
web-application
penetration-testing
sql-injection
vulnerability-detection
arachni
scanners
-
Updated
May 29, 2022 - Ruby
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
hack
hacking
cheatsheet
ctf-writeups
ctf
vulnhub
privilege-escalation
oscp
ctf-challenges
oscp-journey
oscp-prep
-
Updated
May 1, 2022
Creative and unusual things that can be done with the Windows API.
-
Updated
Aug 22, 2022 - C#
XSS'OR - Hack with JavaScript.
-
Updated
Dec 12, 2021 - JavaScript
Unofficial GoPro WiFi API Documentation - HTTP GET requests for commands, status, livestreaming and media query.
-
Updated
Aug 13, 2022
Generate releases based on semantic version labels on pull requests.
-
Updated
Aug 8, 2022 - TypeScript
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
android
hack
backdoor
adb
exploit
hacking
android-device
rat
remote-shell
post-exploitation
android-debug-bridge
kali-linux
exploitation-framework
remote-access
android-rat
hacking-tools
android-hacking
android-hack
android-exploit
entysec
-
Updated
Jul 16, 2022 - Python
Alias is a teachable “parasite” that is designed to give users more control over their smart assistants, both when it comes to customisation and privacy. Through a simple app the user can train Alias to react on a custom wake-word/sound, and once trained, Alias can take control over your home assistant by activating it for you.
raspberry-pi
machine-learning
hack
smarthome
microphone
speech-recognition
classification
alias
sound-synthesis
wakeword
-
Updated
Apr 5, 2020 - Python
Grab cam shots from target's phone front camera or PC webcam just sending a link.
-
Updated
Jun 11, 2022 - HTML
Improve this page
Add a description, image, and links to the hack topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the hack topic, visit your repo's landing page and select "manage topics."