An offensive and defensive security toolset for Microsoft 365 Power Platform
-
Updated
May 19, 2024 - Python
An offensive and defensive security toolset for Microsoft 365 Power Platform
DDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file system of websites.. Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities.) Web Spider: For gathering web application hacking in…
Hunt down 565 social media accounts
Cyberpunk 2077 Netrunner Hacking Tool (Easy to use and install). Don't use it on illegal and malicious activity. Inspired by the game CyberPunk 2077 https://www.cyberpunk.net/
Hacx GPT a powerful, evil brother of WormGPT.
Monitoring Registry and File Changes in Windows
Mac and hostname random changer
VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute force and other things... You have many choices. If you want to learn penetration , VOID may be a teacher for you. Because its open source code project. Please look VOID's source code and examine commands! And…
hacking tool menu!
Mail Spammer sends 500 mails in few secs! does not require anything just proxies! Join discord server > https://discord.gg/bVy4mZXX
Hax is a mini-tool with really useful hacking tools.
Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation
A simple script to detect unescaped characters in a web application for e.g. Cross Site Scripting (XSS) attacks.
👀 Intercept requests passively of DHCP from own network! 👀
CyberSecurity Resources and Tools
Access remote user shell through a socket server to run shell commands remote from a server or a local machine and for data interchange
An opensource backdoor tool for connecting to machines and executing commands! This tool is for educational purposes and I am not responsible for any potentially malicious use.
Log your victims keys through sockets
T-DoS Attack Tool
Add a description, image, and links to the hackingtool topic page so that developers can more easily learn about it.
To associate your repository with the hackingtool topic, visit your repo's landing page and select "manage topics."