All Categories → Security → hacker

Top 79 hacker open source projects

Icg Autoexploiterbot
Wordpress 🔥 Joomla 🔥 Drupal 🔥 OsCommerce 🔥 Prestashop 🔥 Opencart 🔥
Phonia
Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any international phone numbers with a very good accuracy.
Hackers Tool Kit
Its a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on instagram
Awesome Hacking Lists
Project transferred to: https://github.com/taielab/awesome-hacking-lists
Hack Movie
黑客相关的电视剧/电影/纪录片
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Cehv10 Notes
📕 Both personal and public notes for EC-Council's CEHv10 312-50, because its thousands of pages/slides of boredom, and a braindump to many
Hackercamp
Enine boyuna siber güvenlik
Penetration
渗透 超全面的渗透资料💯 包含:0day,xss,sql注入,提权……
Ahrid
AHRID - Analysis Hacker's Real-ID Platform 黑客攻击画像分析系统(停止运营)
Entropy
Entropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
M3m0
M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
2018 Qwb Ctf
2018强网杯CTF___题目整理
Osint San
Framework для сбора данных из открытых источников. В Framework используется большое количество API, их необходимо зарегистрировать самому.​
Ecommerce Website Security Checklist
List of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built into the Techinical Specific Document, or will be checked in the Security testing phases.
Netuser
使用windows api添加用户,可用于net无法使用时
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Jacobappelbaumleavestor
🔍 An investigation into Jacob Appelbaum leaving the Tor Project
Hacker ezines
A collection of electronic hacker magazines carefully curated over the years from multiple sources
Minion Ci
minimalist, decentralized, flexible Continuous Integration Server for hackers.
Dracnmap
Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Hacker Job Trends
Play with hackernews' "who is hiring"
Brutal
Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Pocorgtfo
a "Proof of Concept or GTFO" mirror with extra article index, direct links and clean PDFs.
Powershell Attack Guide
Powershell攻击指南----黑客后渗透之道
Opencanary web
The web management platform of honeypot
No More Secrets
A command line tool that recreates the famous data decryption effect seen in the 1992 movie Sneakers.
Instainsane
Multi-threaded Instagram Brute Forcer (100 attemps at once)
Linux Basics For Hackers
书籍《Linux Basics for Hackers》2019版中文翻译版
✭ 430
linuxhacker
Wahh extras
The Web Application Hacker's Handbook - Extra Content
Brutesploit
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Pentesterspecialdict
渗透测试人员专用精简化字典 Dictionary for penetration testers happy hacker
Maskphish
Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
W5
Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Juggler
A system that may trick hackers. 一个也许能骗到黑客的系统。
Awesome Hacking Lists
平常看到好的渗透hacking工具和多领域效率工具的集合
Richkware
Framework for building Windows malware, written in C++
Quack
Quack Toolkit is a set of tools to provide denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools.
Hackermind
渗透步骤,web安全,CTF,业务安全,人工智能,区块链安全,安全开发,无线安全,社会工程学,二进制安全,移动安全,红蓝对抗,运维安全,风控安全,linux安全
Blacknet
Free advanced and modern Windows botnet with a nice and secure PHP panel.
Ping
Ping! Share show ideas, feedback, or general questions. Just create an issue.
BruteSploit
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
1-60 of 79 hacker projects