cracking WPA/WPA2 secured WiFi networks with the aircrack-ng suite
-
Updated
Oct 6, 2024 - Shell
Hacking refers to the practice of gaining unauthorized access to data in a system or computer. This topic encompasses various forms of hacking, including black-hat and grey-hat hacking, which involve malicious or non-malicious intent. It explores the tools and techniques used by hackers, the motivations behind hacking, and the measures organizations can take to protect themselves.
cracking WPA/WPA2 secured WiFi networks with the aircrack-ng suite
EMBA - The firmware security analyzer
My useful files for penetration tests, security assessments, bug bounty and other security related stuff
Hastly written Tools & Scripts for Personal Use Cases & Bug Bounties
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
This is a multi-use bash script for Linux systems to audit wireless networks.
Starter hacking lab environment designed for Capture The Flag (CTF) competitions and penetration testing.
The "Uh-Recon" tools used by Unhackers for pre-engagement reconnaissance
Script collection
Ransomwares Collection. Don't Run Them on Your Device.
Just Another Repo
hacking tools using basic linux command line tools instead of complex frameworks
🐳 VMs are bloat. Dockerise your VAPT environment
Asset inventory of over 800 public bug bounty programs.
Hacking Methodology, Cheatsheats, Conceptual-Breakdowns
Spirit - Network Pentest Tools