Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for hack cybersecurity
cybersecurity
x
hack
x
27 search results found
Phonesploit Pro
⭐
3,899
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
Hacking Windows
⭐
1,014
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Hack A Sat Library
⭐
549
Public library of space documents and tutorials
Offensive Resources
⭐
498
A Huge Learning Resources with Labs For Offensive Security Players
Exiflooter
⭐
395
ExifLooter finds geolocation on all image urls and directories also integrates with OpenStreetMap
Nivos
⭐
369
NIVOS is a hacking tool that allows you to scan deeply , crack wifi, see people on your network. It applies to all linux operating systems. And it is improving every day, new packages are added. Thank You For Using NIVOS :> [NIVOS Created By NIVO Team]
Wifipassword Stealer
⭐
313
Get All Registered Wifi Passwords from Target Computer.
Jpgtomalware
⭐
220
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganograp
Slash
⭐
201
The Slash OSINT Tool
Edu Resources
⭐
169
An awesome list of cybersecurity educational resources
Hacking Rust
⭐
133
A FREE comprehensive online Rust hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of reverse engineering Rust from scratch.
Go Hacking
⭐
99
A FREE comprehensive online Go hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of reverse engineering Golang from scratch.
Turbo Attack
⭐
87
A turbo traffic generator pentesting tool to generate random traffic with random mac and ip addresses in addition to random sequence numbers to a particular ip and port.
Embedded Hacking
⭐
74
A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering.
Adlabsreview
⭐
71
Active Directory Labs/exams Review
Vector
⭐
56
Open source osint project.
Puwr
⭐
54
Pivot your way deeper into computer networks with SSH compromised machines.
Zeek Network Security Monitor
⭐
42
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Reosploit
⭐
39
A Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Hackbox
⭐
22
Hackbox is an open-source, container-based platform that makes it easy to launch vulnerable systems to test your hacking skill!
Embedded Assembler
⭐
19
A FREE comprehensive step-by-step embedded Assembler tutorial covering the basics including coding your own vector table and linker script from scratch, I/O programming all the way to up to developing and hacking IoT.
Dc540 0x00005b
⭐
16
DC540 hacking challenge 0x00005b.
Phisheye
⭐
12
phishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok.
Pentesting
⭐
11
Cyber Security
Stealthlink
⭐
9
With StealthLink, you can easily create a convincing mask for your phishing URLs, making them indistinguishable from legitimate websites. This tool is designed to provide a professional-level of obfuscation to any phishing URL, making it virtually impossible for users to detect.
Corexital Multitool
⭐
9
Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation
Invoke Mathfuscation
⭐
8
A quick command line utility that generates uses simple addition to obfuscate individual characters, then executes it
Steal All Files
⭐
8
Python script to automatically steal all the files and information from a computer using an USB device. Created just for educational purposes.
Bash For Ethical Hackers
⭐
5
Bash For Ethical Hacking
Sink
⭐
5
Fish generator (Credentials) for Phishers ⛵
Screenmirror
⭐
5
this is repository for screen mirror from android to laptop
Related Searches
Javascript Hack (1,516)
Python Hack (1,090)
Python Cybersecurity (791)
Security Cybersecurity (402)
1-27 of 27 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.