84 results for “topic:hacking-code”
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Complete Listing and Usage of Tools used for Ethical Hacking
🌏 A tiny 0-dependency thread-safe Java™ lib for setting/viewing dns programmatically without touching host file, make unit/integration testing portable; and a tiny tool for setting/viewing dns of running JVM process.
Install Metasploit And Repair Metasploit In Termux With Easy Steps
Python network worm that spreads on the local network and gives the attacker control of these machines.
Go Tutorials - Let's get our hands really dirty by writing a lot of Golang code
Proof -Of-Concept Brute Force Login on a web-site with a good dictionary of words
NEW FACEBOOK COINING TOOL
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Collection of GoPhish templates available for legitimate usage.
HacKingPro - Hack Like A Pro !
Gecko Backdoor is a most powerful web php backdoor.
🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
Java 8 Guides and Tutorials - A lot of awesome examples using Java 8 features like Stream, Lambda, Functional Interface, Date and Time API and much more
This tool hacks email account passwords using brute-force attacks, enhancing security testing and password strength evaluation. Ideal for audits and penetration testing.
Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Monitoring Registry and File Changes in Windows
wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures from various AV engines. It also has a handful of additional built in modules to help automate some common tasks on Red team engagements.
⛤Keylogger Generator for Windows written in Python⛤
Am just Someone who Loves 💕 Programming and Hacking ... for fun, kindly give me a star ⭐ (♥ω♥*)
This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware specs, every button that pushed, screenshots, and copying processes.
Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several lists from many resources and created them as a single list.
No description provided.
Based on reading from The Hackers Playbook 3
My notes/solutions to the problems in "The Web Application Hacker's Handbook" (https://portswigger.net/web-security/web-application-hackers-handbook)
CDI Guide And Tutorials - Many examples of how to use CDI and CDI 2.0 like Qualifiers, Interceptors, Decorators, Lazy Initialization an much more!
Collections of way to evade normal detection events.
This Project is for TERMUX Call Flooder 100% Warking This Tool
A multi-client reverse shell that allows multiple connections from target computers