New Interface And Loading Screen For Termux Users terminal hacking termux hacking-tool termux-recommended-for-android kali-scripts termux-banner hackingtools termux-hacking termux-tools noob-hackers bashscripts
SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By samsesh for termux on android androidlinuxinstagramfacebooktwitterterminalhackhackingbruteforcebrute-forcecrackingtermuxkali-linuxhacking-toolbruteforce-attackshacking-toolstermux-hacking...
8. 后期利用工具 (Post exploitation tools) Vegile - Ghost In The Shell Chrome Keylogger 9. 取证工具 (Forensic tools) Autopsy Wireshark Bulk extractor Disk Clone and ISO Image Acquire Toolsley 10. 有效载荷创建工具 (Payload creation tools) ...
https://github.com/dxa4481/truffleHog (自动化对指定域名进行Google hacking搜索并收集信息) https://github.com/1N3/Goohak (用于搜索git的承诺中的敏感信息,例如密码,私钥等的客户端工具) https://github.com/UKHomeOffice/repo-security-scanner (Github敏感信息泄露扫描) https://github.com/FeeiCN/GSIL (...
Armitage - Metasploit框架的基于Java的GUI前端。(http://fastandeasyhacking.com/) Faraday -安全审计和风险评估的多用户集成测试环境。(https://github.com/infobyte/faraday) ExploitPack - 用于自动化渗透测试的图形工具,附带许多预先打包的漏洞。(https://github.com/juansacco/exploitpack) ...
5Branches0Tags Code This branch is3841 commits ahead of,6 commits behindOnePlusOSS/android_kernel_oneplus_msm8996:oneplus3/6.0.1. Repository files navigation README License Linux kernel release 3.x <http://kernel.org/> These are the release notes for Linux version 3. Read them carefully, as...
18、icon-workshop:移动应用图标生成工具。能够一键生成多种尺寸的 iOS/Android 应用图标和 APP 启动图 Python 项目 19、moviepy:用于处理视频的 Python 库,它支持视频剪辑、自定义效果、视频合成、格式转化、插入文字等功能。专于注视频但不局限于此,还支持处理音频和 GIF 图片。虽然现在视频剪辑的工具很丰富,但如...
这是基于Awesome-Hacking列表工具中的一部分工具,需要注册用户或是不常用的工具不进行记录。 1.1 梳理恶意软件分析的工具集合 匿名软件 Shadowsocks 这是我常用的 蜜罐 目前没有需要用到蜜罐的需求 恶意软件样本库 Contagio - 近期的恶意软件样本和分析的收集(注意:需要FQ) ...
pentestingfridahacking-toolfrida-serverpythontoolsandroid-pentestingfrida-gadgetandroidhackingfrida-setup UpdatedMar 28, 2025 Python LocHawk is a location phishing tool that captures the IP address and geolocation details of users who click the URL and sends them to your machine ...
This topic encompasses various forms of hacking, including black-hat and grey-hat hacking, which involve malicious or non-malicious intent. It explores the tools and techniques used by hackers, the motivations behind hacking, and the measures organizations can take to protect themselves. Here are ...