Skip to content
View PwnSecc's full-sized avatar

Block or report PwnSecc

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
485 results for forked starred repositories
Clear filter

Passwords Recovery Tool

C 21 1 Updated Feb 10, 2019

Information gathering tool - OSINT

Python 37 4 Updated Feb 10, 2019

Addons to Code::Blocks to support Arduinos and ATtinys

Python 4 Updated Jan 17, 2013

Ha3Mrx Pentesting and Security Hacking

Python 1 Updated Apr 4, 2020

The most complete Phishing Tool, with 32 templates +1 customizable

HTML 1 Updated Jul 2, 2021

Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}

HTML 1 Updated Mar 19, 2024

fsociety Hacking Tools Pack – A Penetration Testing Framework

Python 1 Updated Mar 20, 2024

Accurately Locate Smartphones using Social Engineering

CSS 1 Updated Apr 14, 2024

Ghidra is a software reverse engineering (SRE) framework

Java 2 Updated Aug 12, 2024

Metasploit Framework

Ruby 9 7 Updated Mar 14, 2020

Payloads for the Hak5 Bash Bunny

Python 10 5 Updated Mar 12, 2017

A Huge Learning Resources with Labs For Offensive Security Players

4 1 Updated Oct 27, 2021

Miscellaneous tools for BloodHound

Python 18 4 Updated Jan 26, 2022

The universal proxy toolchain for Android

Kotlin 3 Updated Jun 16, 2022

⭐️ A proxy scraper made using Protractor | Proxy list Updates every three hour 🔥

JavaScript 2 Updated Feb 26, 2022

A small POC to make defender useless by removing its token privileges and lowering the token integrity

C++ 2 Updated Feb 19, 2022

SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strin…

PHP 2 Updated Feb 19, 2022

Leaked hacking tools found in vulnerable SSH servers.

C 3 1 Updated Jun 6, 2022

APT & CyberCriminal Campaign Collection

YARA 2 1 Updated Dec 7, 2022
2 Updated Mar 15, 2022

Best DDoS Attack Script Python3, Cyber Attack With 40 Methods

Python 2 Updated Mar 1, 2022

PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)

C# 2 Updated Jan 7, 2021

Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant

Python 2 Updated Jan 12, 2021

The Magic Mask for Android

C++ 1 Updated Mar 8, 2022

Tool to identify routers on the local LAN and paths to the Internet

Python 8 2 Updated Dec 14, 2020

Script collection to bypass Network Access Control (NAC, 802.1x)

Shell 8 4 Updated Jan 25, 2022

OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.

C# 91 13 Updated Mar 2, 2022

Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely

C# 4 3 Updated Apr 22, 2022
C# 3 1 Updated Jul 5, 2022
Next