COLLECTED BY
Organization:
Internet Archive
Focused crawls are collections of frequently-updated webcrawl data from narrow (as opposed to broad or wide) web crawls, often focused on a single domain or subdomain.
The Wayback Machine - https://web.archive.org/web/20200830152607/https://github.com/topics/hacking-code
Here are
40 public repositories
matching this topic...
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Updated
Aug 18, 2020
Python
Go Tutorials - Let's get our hands really dirty by writing a lot of Golang code
Complete Listing and Usage of Tools used for Ethical Hacking
Python network worm that spreads on the local network and gives the attacker control of these machines.
Updated
Dec 7, 2019
Python
Java 8 Guides and Tutorials - A lot of awesome examples using Java 8 features like Stream, Lambda, Functional Interface, Date and Time API and much more
Updated
May 28, 2020
Java
Proof -Of-Concept Brute Force Login on a web-site with a good dictionary of words
Updated
May 12, 2020
Python
Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Updated
Jun 11, 2018
Python
A new automated script for metasploit users
Updated
Feb 28, 2020
Shell
Lazymux is a huge list of Many Hacking tools and PEN-TESTING tools! NOTE: Am not Responsible of bad use of this project.
Updated
Mar 4, 2020
Python
CDI Guide And Tutorials - Many examples of how to use CDI and CDI 2.0 like Qualifiers, Interceptors, Decorators, Lazy Initialization an much more!
Monitoring Registry and File Changes in Windows
Updated
Jul 14, 2020
Python
code version py3 of Black Hat Python book🏴☠️
Updated
Aug 24, 2020
Python
Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several lists from many resources and created them as a single list.
Windows Auto Post Exploitation - For ReD Team
Updated
Jul 21, 2019
Python
Collection of GoPhish templates available for legitimate usage.
This Project is for TERMUX Call Flooder 100% Warking This Tool
Updated
Apr 10, 2020
JavaScript
Hack windows os with TrojanP (written in python3)
Updated
Apr 26, 2020
Python
Aynı ağ içerisinde , ARP Spoofing saldırısı yapılmış hedef bilgisayarın ziyaret ettiği , HTTP protokolünü kullanan web sitelerine kod enjekte ederek manipüle etmenize yarayan bir script.
Updated
Jun 24, 2020
Python
DNS isteklerini veya trafiği kendi istediğiniz yere yönlendirerek hedef web sitesini manipüle etmenize yarayan bir script.
Updated
Jun 24, 2020
Python
Based on reading from The Hackers Playbook 3
Updated
May 20, 2020
Shell
Hacking Code - Mockito Guide and Tutorials
Spring Guide and Tutorials - A lot of examples using Spring Boot, Spring Security, Spring Data and much more!
JUnit 5 Guide and Tutorials - A lot of great examples of how to use the newest version of JUnit 5
This project will contain all the hacking-related interactive challenges.
Docker Guides and Tutorials - Let's learn a lot about one of the most important and famous technology in the World!
Updated
Apr 13, 2018
Batchfile
Improve this page
Add a description, image, and links to the
hacking-code
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
hacking-code
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.