Code Monkey home page Code Monkey logo

Hack the Box's Projects

mitm-router icon mitm-router

☠ Man-in-the-middle wireless access point inside a docker container 🐳

mitmproxy icon mitmproxy

An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.

morpheus icon morpheus

Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)

nxcrypt icon nxcrypt

NXcrypt - 'python backdoor' framework

pentest-wiki icon pentest-wiki

PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.

pentesting-bible icon pentesting-bible

Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.

pentestlab icon pentestlab

Fast and easy script to manage pentesting training apps

pgpcrack-ng icon pgpcrack-ng

PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.

phoneinfoga icon phoneinfoga

Advanced information gathering & OSINT framework for phone numbers

powershell-rat icon powershell-rat

Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.

powershx icon powershx

Run Powershell without software restrictions.

powersploit icon powersploit

PowerSploit - A PowerShell Post-Exploitation Framework

prism icon prism

PRISM is an user space stealth reverse shell backdoor, written in pure C.

probable-wordlists icon probable-wordlists

Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!

pydictor icon pydictor

A powerful and useful hacker dictionary builder for a brute-force attack

pyflooder icon pyflooder

A http flood python script that could stop a normal website in 10s

pyloggy icon pyloggy

A python keylogger that does more than any other keylogger - Key logger, Clicks logger and Screenshots

queensono icon queensono

Golang binary for data exfiltration with ICMP protocol

rastleak icon rastleak

Tool to automatic leak information using Hacking with engine searches

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.