• Android
    Android
    Dockerized Android Running an Android Emulator inside Docker

    Dockerized Android: Running an Android Emulator inside Docker

    DroidDetective Malware Analysis Framework for Android Apps

    DroidDetective: A Malware Analysis Framework for Android Apps

    Androidqf Forensic Evidence from Android Devices

    Androidqf: Forensic Evidence from Android Devices

  • Linux
    Linux
    XClicker Fast GUI Autoclicker for x11 Linux Desktops

    XClicker: Fast GUI Autoclicker for x11 Linux Desktops

    Glances is a cross-platform monitoring tool

    Glances: A top/htop Alternative for GNU/Linux, BSD, Mac OS and Windows

    Fhex A Full-Featured HexEditor

    Fhex: A Full-Featured HexEditor

  • Security
    Hayabusa Analysis for Windows Event Logs

    Hayabusa: Analysis for Windows Event Logs

    Athena OS: Arch Linux-based distro focused on Cybersecurity

    Athena OS: Arch Linux-based distro focused on Cybersecurity

    Afrog A Tool for Finding Vulnerabilities

    Afrog: A Tool for Finding Vulnerabilities

    BruteShark A Network Forensic Analysis Tool (NFAT)

    BruteShark: A Network Forensic Analysis Tool (NFAT)

  • Windows
    Windows
    PSItems PowerShell Module that Finds Files and Folders

    PSItems: A PowerShell Module that Finds Files & Folders

    Squalr Game Hacking Tool Written in C#

    Squalr: Game Hacking Tool Written in C#

    Invoker Penetration Testing Utility Windows

    Invoker: Penetration Testing Utility for Windows

  • Web
    Web
    ppfuzz Prototype Pollution Fuzzer

    ppfuzz: Prototype Pollution Fuzzer

    OctopusWAF WAF (Web Application Firewall) with High Performance

    OctopusWAF: WAF (Web Application Firewall) with High Performance

    ImHex Hex Editor for Reverse Engineers & Programmers

    ImHex: Hex Editor for Reverse Engineers & Programmers

  • Pages
    • Contact
    • Cookie Policy
    • Privacy Policy
    • Terms and Conditions
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Exploits

toxssin An XSS Exploitation Command-line Interface and Payload Generator
Hacking

toxssin: An XSS Exploitation Command-line Interface and Payload Generator

toxssin is an open-source penetration testing tool that automates the process of exploiting Cross-Site Scripting (XSS) vulnerabilities. It consists of...
Read More
OverRide Binary Exploitation and Reverse-Engineering
Hacking

OverRide: Binary Exploitation and Reverse-Engineering

Explore disassembly, binary exploitation & reverse-engineering through 10 little challenges. In the folder for each level you will find: flag –...
Read More
Avyukt Exploitation Framework & Exploit Windows OS
Hacking

Avyukt: Exploitation Framework & Exploit Windows OS

Avyukt is a Exploitation Framework which can be used to generate Malicious Payloads and exploit Windows OS. For now, I...
Read More
SpoolSploit Collection of Windows Print Spooler Exploits
Hacking

SpoolSploit: Collection of Windows Print Spooler Exploits

A collection of Windows print spooler exploits containerized with other utilities for practical exploitation. Summary SpoolSploit is a collection of...
Read More
HoundSploit Advanced Graphical Search Engine for Exploit-DB
Web

HoundSploit: An Advanced Graphical Search Engine for Exploit-DB

HoundSploit is an advanced search engine for Exploit-DB developed in Python using Flask as micro web framework, born with the aim...
Read More
Goploit Finder Tool made in Go search for Exploits
Hacking

Goploit Finder: Tool made in Go search for Exploits

Go Search, this is a tool made in go search for exploits. Compile Before using the Goploit Finder, we need...
Read More
Penelope Advanced Shell Handler for Exploiting
Hacking

Penelope: Advanced Shell Handler for Exploiting

Penelope is an advanced shell handler. Its main aim is to replace netcat as shell catcher during exploiting RCE vulnerabilities....
Read More
Fuxploider File Upload Vulnerability Scanner Exploitation Tool
Hacking

Fuxploider: File Upload Vulnerability Scanner and Exploitation Tool

Fuxploider is an open source penetration testing tool that automates the process of detecting and exploiting file upload forms flaws....
Read More
Storm Framework Exploits Windows PowerShell Vulnerability
Hacking

Storm Framework: Exploits Windows PowerShell Vulnerability

Storm Framework is a Windows post-exploitation framework that exploits Windows PowerShell vulnerability to get shell-like connection. Storm Framework has the...
Read More
Copyright 2023 GeekScripts
  • Contact
  • Cookie Policy
  • Privacy Policy
  • Terms and Conditions
Start typing to see results or hit ESC to close
Pentesting Hacking Tools OSINT Reconnaissance Vulnerabilities
See all results
Cookies To make this site work properly, we sometimes place small data files called cookies on your device. Most big websites do this too.
Accept
Read more
Cookies Settings
Cookie Box Settings
Cookie Box Settings

Privacy settings

Decide which cookies you want to allow. You can change these settings at any time. However, this can result in some functions no longer being available. For information on deleting the cookies, please consult your browser’s help function. Learn more about the cookies we use.

With the slider, you can enable or disable different types of cookies:

  • Block all
  • Essential
  • Functionality
  • Analytics
  • Advertising

This website will

  • Essential: Remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather information you input into a contact forms newsletter and other forms across all pages
  • Essential: Keep track of what you input in a shopping cart
  • Essential: Authenticate that you are logged into your user account
  • Essential: Remember language version you selected

This website won't

  • Remember your login details
  • Functionality: Remember social media settings
  • Functionality: Remember selected region and country
  • Analytics: Keep track of your visited pages and interaction taken
  • Analytics: Keep track about your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: Increase the data quality of the statistics functions
  • Advertising: Tailor information and advertising to your interests based on e.g. the content you have visited before. (Currently we do not use targeting or targeting cookies)
  • Advertising: Gather personally identifiable information such as name and location

This website will

  • Essential: Remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather information you input into a contact forms newsletter and other forms across all pages
  • Essential: Keep track of what you input in a shopping cart
  • Essential: Authenticate that you are logged into your user account
  • Essential: Remember language version you selected
  • Functionality: Remember social media settings
  • Functionality: Remember selected region and country

This website won't

  • Analytics: Keep track of your visited pages and interaction taken
  • Analytics: Keep track about your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: Increase the data quality of the statistics functions
  • Advertising: Tailor information and advertising to your interests based on e.g. the content you have visited before. (Currently we do not use targeting or targeting cookies)
  • Advertising: Gather personally identifiable information such as name and location

This website will

  • Essential: Remember your cookie permission setting
  • Essential: Allow session cookies
  • Essential: Gather information you input into a contact forms newsletter and other forms across all pages
  • Essential: Keep track of what you input in a shopping cart
  • Essential: Authenticate that you are logged into your user account
  • Essential: Remember language version you selected
  • Functionality: Remember social media settings
  • Functionality: Remember selected region and country
  • Analytics: Keep track of your visited pages and interaction taken
  • Analytics: Keep track about your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: Increase the data quality of the statistics functions

This website won't

  • Advertising: Tailor information and advertising to your interests based on e.g. the content you have visited before. (Currently we do not use targeting or targeting cookies)
  • Advertising: Gather personally identifiable information such as name and location

This website will

  • Functionality: Remember social media settings
  • Functionality: Remember selected region and country
  • Analytics: Keep track of your visited pages and interaction taken
  • Analytics: Keep track about your location and region based on your IP number
  • Analytics: Keep track of the time spent on each page
  • Analytics: Increase the data quality of the statistics functions
  • Advertising: Tailor information and advertising to your interests based on e.g. the content you have visited before. (Currently we do not use targeting or targeting cookies)
  • Advertising: Gather personally identifiable information such as name and location

This website won't

  • Remember your login details
Save & Close