Stars
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Text-based steganography that uses whitespace to conceal information
Rewrite of the popular wireless network auditor, "wifite"
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" fo…
w3af: web application attack and audit framework, the open source web vulnerability scanner.
Automatic SQL injection and database takeover tool
Curated list of public penetration test reports released by several consulting firms and academic security groups
The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWA…
This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), AI security,…
This project is based upon the trick that, how to hack WI-FI with CMD. The main purpose behind, creating wifi hacking tool with cmd tool is to make everyone aware that how easy it is to break a sim…