Skip to content
#

hacking

Here are 2,266 public repositories matching this topic...

samuele-mattiuzzo
samuele-mattiuzzo commented Dec 24, 2019

This is more of a question with a potential follow-up suggestion: in the genre column, we do have drama/thriller and thriller/drama

Is there a valid reason behind this? If not, I would suggest making it more consistent (eg: pick one between the two and use it consistently across the list), so that sorting it properly groups them.

Also: since we do have categories already, why the column

This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.

  • Updated Sep 9, 2020
  • Python
PENTESTING-BIBLE

Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.

  • Updated Sep 8, 2020
commjoen
commjoen commented Jan 11, 2019

Add 8.7 and 8.8 for android and ios: show how you can delay the attacker or report tampering to the backend as a response to a tamper detected
8.7: The app implements multiple mechanisms in each defense category (8.1 to 8.6). Note that resiliency scales with the amount, diversity of the originality of the mechanisms used.
8.8: The detection mechanisms trigger responses of different types, includ

urh
BSAsecure
BSAsecure commented Feb 12, 2020
Expected Behavior

Better control over GAIN for LimeSDR device (not mini).
Please use example of the SDR Console Gain Control.

Actual Behavior

Signal really weak on the low frequencies even if GAIN is maximized.

Steps To Reproduce
  1. Go to URH
  2. Click on Spectrum Analyzer
  3. Refresh device, select sampling rate to 2.5M and Gain to above middle point (also tested maxim
jofpin
jofpin commented Jan 22, 2020

It has been a pleasure for me to contribute to all of you 2 versions of this tool.

I've been working on other open source projects that I'm about to release for you, so I haven't finished trape version 3.0.

But, I invite you and the entire community that has used this project, to collaborate with some lines of code, implementing your own ideas and improving trape, turning it into a project o

TheFatRat

Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .

  • Updated Jul 18, 2020
  • C
Ciphey

Improve this page

Add a description, image, and links to the hacking topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the hacking topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.