Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for hacking code
hacking-code
x
32 search results found
Cheatsheet God
⭐
4,729
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Keylogger
⭐
1,634
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Ethical Hacking Tools
⭐
1,159
Complete Listing and Usage of Tools used for Ethical Hacking
Java Dns Cache Manipulator
⭐
830
🌏 A tiny 0-dependency thread-safe Java™ lib for setting/viewing dns programmatically without touching host file, make unit/integration testing portable; and a tiny tool for setting/viewing dns of running JVM process.
Hackingresource
⭐
621
“玄魂工作室--安全圈” 知识星球内资源汇总
M Wiz
⭐
480
Install Metasploit And Repair Metasploit In Termux With Easy Steps
Networm
⭐
186
Python network worm that spreads on the local network and gives the attacker control of these machines.
Crack Pro
⭐
180
NEW FACEBOOK COINING TOOL
Reconky Automated_bash_script
⭐
170
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Shell Backdoor List
⭐
157
🎯 PHP / ASP - Shell Backdoor List 🎯
Brute Force Login
⭐
119
Proof -Of-Concept Brute Force Login on a web-site with a good dictionary of words
Hackingpro
⭐
103
HacKingPro - Hack Like A Pro !
Java8 Guides Tutorials
⭐
101
Java 8 Guides and Tutorials - A lot of awesome examples using Java 8 features like Stream, Lambda, Functional Interface, Date and Time API and much more
Black Hat Python3 Code
⭐
72
🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
Openorchid
⭐
69
Collection of GoPhish templates available for legitimate usage.
Soultaker Multitool
⭐
62
SoulTaker is a Open-Source MultiTool written by myself, contains a lot of things such as a phone spoofer, ip lookup, dox tool etc.
Fingerprint
⭐
56
Monitoring Registry and File Changes in Windows
Chimay Red
⭐
52
Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Gecko
⭐
48
Gecko Backdoor is a most powerful web php backdoor.
The Young Programmer
⭐
41
Am just Someone who Loves 💕 Programming and Hacking ... for fun, kindly give me a star ⭐ (♥ω♥*)
Satanklgr
⭐
39
⛤Keylogger Generator for Windows written in Python⛤
Wildlogger
⭐
36
This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware specs, every button that pushed, screenshots, and copying processes.
Hostpanic
⭐
31
Find host header injections and perform Host Header attacks with other kind of bugs like web cache poissoning
Cdi Guide Tutorials
⭐
24
CDI Guide And Tutorials - Many examples of how to use CDI and CDI 2.0 like Qualifiers, Interceptors, Decorators, Lazy Initialization an much more!
Dc540 0x00001
⭐
24
DC540 hacking challenge 0x00001.
Brutelist
⭐
18
Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several lists from many resources and created them as a single list.
Wmiexec2
⭐
14
wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures from various AV engines. It also has a handful of additional built in modules to help automate some common tasks on Red team engagements.
Stia
⭐
13
Htb Invite Code Generator
⭐
8
Unlimited invite codes for Hack The Box
Multi Client Reverse Shell
⭐
8
A multi-client reverse shell that allows multiple connections from target computers || Hedef bilgisayarlardan gelen birden fazla bağlantıya izin veren çoklu istemcili reverse shell.
Phprecon
⭐
6
Collect information about a domain and use it to plan a attack vector
Auto Postxploit
⭐
5
Windows Auto Post Exploitation - For ReD Team
1-32 of 32 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.