Lists (32)
Sort Name ascending (A-Z)
Ai
Android
Awesome
bastion-host
BSD
DEVOPS
DNS
Firewall
Forensic
Front-end
Hack
Hardening
Kubernetes
Linux
OSINT
Pentest Windows
Prox
Proxy
Ressources
Ressources Hacking Pentest List
Scanners
Self-hosted
SSH
Telegram
Tools
Tor
TTS
VM Windows
WAF
Wordlist Mdp
Yubikey
- All languages
- Assembly
- Astro
- AutoIt
- Batchfile
- C
- C#
- C++
- CSS
- Clojure
- Dart
- Dockerfile
- Elixir
- Elm
- Fluent
- GDScript
- Go
- HCL
- HTML
- Hack
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- LLVM
- Lua
- MDX
- Makefile
- Markdown
- Nim
- OCaml
- Objective-C
- OpenSCAD
- PHP
- Perl
- PowerShell
- Python
- Rich Text Format
- Ruby
- Rust
- SCSS
- Shell
- Smarty
- Svelte
- Swift
- Text
- TypeScript
- VBA
- Vue
- XSLT
- YARA
Starred repositories
Simple password/cookies/history/bookmarks stealer/dumper for chrome all version (includes 80+), microsoft edge browser,includes all chromium based browsers, and all gecko based browser (firefox etc.).
CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrator.
Manage your logitech device on Linux using GUI. Lightweight and user-friendly. (not yet)
Convert your shellcode into an ASCII string
Reverse shell listener and payload generator designed to work on most Linux targets
A ring0 Loadable Kernel Module (Linux) for latest kernels 6.x
Curated list of public penetration test reports released by several consulting firms and academic security groups
A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.
Backdoor that leverages Nmap with setuid permissions to execute commands as root through a Lua-loaded C library
PoC for downloading data by injecting into processes to evade firewalls