🚀 Bring your favorite shell wherever you go through the ssh. Xonsh shell, fish, zsh, osquery and so on.
-
Updated
Apr 4, 2025 - Python
🚀 Bring your favorite shell wherever you go through the ssh. Xonsh shell, fish, zsh, osquery and so on.
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
Awesome hacking is an awesome collection of hacking tools.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Projects for security students
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Internet traffic
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
All in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Tookie is a advanced OSINT information gathering tool that finds social media accounts based on inputs.
This Script will help you to gather information about your victim or friend.
REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event s…
AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Xteam All in one Instagram,Android,phishing osint and wifi hacking tool available
Your target's phone's front and back cameras📸 can be accessed by sending a link🔗.
Add a description, image, and links to the hacking-tools topic page so that developers can more easily learn about it.
To associate your repository with the hacking-tools topic, visit your repo's landing page and select "manage topics."