There are 47 repositories under hacking-code topic.
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Complete Listing and Usage of Tools used for Ethical Hacking
🌏 A tiny 0-dependency thread-safe Java™ lib for setting/viewing dns programmatically without touching host file, make unit/integration testing portable; and a tiny tool for setting/viewing dns of running JVM process.
Install Metasploit And Repair Metasploit In Termux With Easy Steps
Go Tutorials - Let's get our hands really dirty by writing a lot of Golang code
Proof -Of-Concept Brute Force Login on a web-site with a good dictionary of words
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Lazymux is a huge list of Many Hacking tools and PEN-TESTING tools! NOTE: Am not Responsible of bad use of this project.
Java 8 Guides and Tutorials - A lot of awesome examples using Java 8 features like Stream, Lambda, Functional Interface, Date and Time API and much more
Collection of GoPhish templates available for legitimate usage.
HacKingPro - Hack Like A Pro !
🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️
Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Gecko Backdoor is a most powerful web php backdoor.
Monitoring Registry and File Changes in Windows
⛤Keylogger Generator for Windows written in Python⛤
Am just Someone who Loves 💕 Programming and Hacking ... for fun, kindly give me a star ⭐ (♥ω♥*)
This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware specs, every button that pushed, screenshots, and copying processes.
CDI Guide And Tutorials - Many examples of how to use CDI and CDI 2.0 like Qualifiers, Interceptors, Decorators, Lazy Initialization an much more!
Based on reading from The Hackers Playbook 3
Collections of way to evade normal detection events.
A multi-client reverse shell that allows multiple connections from target computers || Hedef bilgisayarlardan gelen birden fazla bağlantıya izin veren çoklu istemcili reverse shell.
This Project is for TERMUX Call Flooder 100% Warking This Tool
Aynı ağ içerisinde , ARP Spoofing saldırısı yapılmış hedef bilgisayarın ziyaret ettiği , HTTP protokolünü kullanan web sitelerine kod enjekte ederek manipüle etmenize yarayan bir script.
Windows Auto Post Exploitation - For ReD Team
My notes/solutions to the problems in "The Web Application Hacker's Handbook" (https://portswigger.net/web-security/web-application-hackers-handbook)
Mail Spammer sends 500 mails in few secs! does not require anything just proxies! Join discord server > https://discord.gg/bVy4mZXX
DNS isteklerini veya trafiği kendi istediğiniz yere yönlendirerek hedef web sitesini manipüle etmenize yarayan bir script.
Hacking-Beginner-to-Expert-Guide-by-James-Patterson