Lists (5)
Sort Name ascending (A-Z)
Stars
Creating a pocket-sized network pentesting device, offering standalone power, an LCD touch display, and flexibility to conduct on-the-go hacking procedures.📟🥷
A Text Editor inside a keyboard, drawing it's inspiration from 8pen and Vim.
Shakil-Shahadat / TorrentParts
Forked from leoherzog/TorrentParts📑 A website to inspect and edit what's in your Torrent file or Magnet link
A list of Free and Open Source Software (FOSS) for Android – saving Freedom and Privacy.
A curated list of GPT agents for cybersecurity
ShoRAK Recon is a comprehensive tool designed for vulnerability discovery and exploitation, tailored for penetration testers and bug bounty hunters. It integrates multiple well-known cybersecurity …
Jailbreaks GPT, Sora, Claude, Gemini ,deepseek this prompt unlocks rage mode
AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.
Cheat sheets to help you in daily hands-on tasks of trouble shooting, configuration, and diagnostics with Fortinet, HP/Aruba, Cisco, Checkpoint and others' gear.
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
Simple python OSINT tool for urls recon thanks to the waybackmachine.
Ch0pin / androguard
Forked from androguard/androguardReverse engineering and pentesting for Android applications
A FREE comprehensive reverse engineering course covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
This is a android spy app, android remote administration tool, android RAT which uploads user data such as contacts, messages, call log, send message(s), photos, videos, open a browser link etc.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Bypass 4xx HTTP response status codes and more. The tool is based on Python Requests, PycURL, and HTTP Client.
Search Google Dorks like Chad. / Broken link hijacking tool.
Work in progress...
Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.
A visualized overview of the Initial Access Broker (IAB) cybercrime landscape
pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
Free universal database tool and SQL client
Java decompiler, assembler, and disassembler
Android Mobile app to rule all Flipper's family
The new generation chameleon based on NRF52840 makes the performance of card emulation more stable. And gave the chameleon the ability to read, write, and decrypt cards.