Lists (1)
Sort Name ascending (A-Z)
Starred repositories
Tool to spam comments in Instagram Posts. Useful for winning Giveaways.
A combined docker image for the unified deployment of itsToggle's, yowmamasita's, and ncw's projects -- plex_debrid, zurg, and rclone
NHLauncher is an application that makes it easier and faster to launch pentesting tools
Share, discover, and collect prompts from the community. Free and open source — self-host for your organization with complete privacy.
リアルタイムボイスチェンジャー Realtime Voice Changer
Generate a cross join, also known as a Cartesian product, from the lines of the specified files. This process is useful for creating fuzzing payloads.
A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.
Windows x64 kernel mode rootkit process hollowing POC.
Awesome Incident Response
Takes a list of URLs and returns their HTTP response codes
Simple (relatively) things allowing you to dig a bit deeper than usual.
Mobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoconfiguration enabled by default (every major OS), will start…
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Here is a simple way to evade anti-virus …
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
All about bug bounty (bypasses, payloads, and etc)
Cloning apk for bypassing code tampering detection, Google Safety Net and scanning vulnerable plugins
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Collection of android malware samples
🔪Swiss-army knife for Android testing and development 🔪 ⛺
A collection of android security related resources
Identify virtual hosts by similarity comparison
iCloud Activation iOS 12.5.1 bypass tool for macOS (iOS 12.4, iOS 12.4+, iOS 12.5, iOS 12.5+, iOS 12.5.1, iOS 12.5.2, iOS 12.5.3, iOS 12.5.4, iOS 12.5.5, iOS 12.5.6, iOS 12.5.7, iOS 12.5.8, iOS 12.…
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
This repository is a collection of powershell functions every hacker should know
Threadless Process Injection through entry point hijacking
Run PowerShell command without invoking powershell.exe