Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).
-
Updated
Jul 7, 2024 - Go
Hacking refers to the practice of gaining unauthorized access to data in a system or computer. This topic encompasses various forms of hacking, including black-hat and grey-hat hacking, which involve malicious or non-malicious intent. It explores the tools and techniques used by hackers, the motivations behind hacking, and the measures organizations can take to protect themselves.
Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Fast passive subdomain enumeration tool.
A Workflow Engine for Offensive Security
An automated e-mail OSINT tool
Cameradar hacks its way into RTSP videosurveillance cameras
🔥 CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.
Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application
The Swiss Army knife for automated Web Application Testing
HERCULES is a special payload generator that can bypass antivirus softwares.
Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries.
Awesome cloud enumerator
Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/).
Statically-linked ssh server with reverse shell functionality for CTFs and such
SSH based reverse shell
🔪 Leak git repositories from misconfigured websites
Mobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
Idiomatic nmap library for go developers