tsuki-sploit
h4cker
tsuki-sploit | h4cker | |
---|---|---|
1 | 4 | |
43 | 16,658 | |
- | 2.5% | |
3.9 | 9.2 | |
about 1 year ago | 4 days ago | |
C | Jupyter Notebook | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
tsuki-sploit
-
🌟 Introducing tsuki-sploit: A multipurpose USB-based script for Ethical hacking! [FOR EDUCATIONAL PURPOSES ONLY]
You can read more about it in the github repo: https://github.com/Tsujimar/tsuki-sploit
h4cker
- Ciberseguridad / hacking etico
-
Cybersecurity Repositories
The Art of Hacking Series
- What's the "best" coding language to know/learn?
-
How to use a home lab to study Penetration Testing?
https://github.com/The-Art-of-Hacking/h4cker is a good repo
What are some alternatives?
pixiewps - An offline Wi-Fi Protected Setup brute-force utility
Vulnnr - Vulnnr - Vulnerability Scanner And Mass Exploiter, created for pentesting.
thc-ipv6 - IPv6 attack toolkit
Microsoft-365-Defender-Hunting-Queries - Sample queries for Advanced hunting in Microsoft 365 Defender
remote_hacker_probe - Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.
RomBuster - RomBuster is a router exploitation tool that allows to disclosure network router admin password.
UnSAFE_Bank - Vulnerable Banking Suite
Hydroxide - Lua runtime introspection and network capturing tool for games on the Roblox engine.
PhoneSploit-Pro - An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
vulscan - Advanced vulnerability scanning with Nmap NSE
Lockdoor-Framework - 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
dora - Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found