!#ack
🧠 Laws, Theories, Principles and Patterns for developers and technologists.
Collection of malware source code for a variety of platforms in an array of different programming languages.
AdaptixC2 is a highly modular advanced redteam toolkit
Bypass Chromium's App-Bound Encryption via Direct Syscall-based Reflective Process Hollowing. Extract cookies, passwords, payment methods & tokens from Chrome, Edge, Brave & Avast - fileless, user-…
Empire is a PowerShell and Python post-exploitation agent.
Lightweight && straight forward command-line tool for searching and downloading exploits from Exploit-DB.
Bruteforcing from various scanner output - Automatically attempts default creds on found services.
A collection of various awesome lists for hackers, pentesters and security researchers
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…
The ultimate WinRM shell for hacking/pentesting
A collection of hacking / penetration testing resources to make you better!
Scrapy, a fast high-level web crawling & scraping framework for Python.
The Browser Exploitation Framework Project
All about bug bounty (bypasses, payloads, and etc)
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Develo…