All Categories → Security → hacking

Top 861 hacking open source projects

Webhackersweapons
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Cthackframework
游戏外挂通用框架,快速构建外挂程序。
Githacktools
The best Hacking and PenTesting tools installer on the world
Griefing Methods
A documentation about how to hack Minecraft servers
Burp Bounty Profiles
Burp Bounty profiles compilation, feel free to contribute!
Phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Movies For Hackers
🎬 A curated list of movies every hacker & cyberpunk must watch.
Seginfofaq
FAQ del mundo de la seguridad informática en español.
✭ 73
hacking
Deadtrap
An OSINT tool to gather information about the real owner of a phone number
Sandmap
Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Lor Axe
🪓 a multi-threaded, low-bandwidth HTTP DOS tool
Givingstorm
Infection vector that bypasses AV, IDS, and IPS. (For now...)
Chaos
🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Netmap.js
Fast browser-based network discovery module
Pillager
Pillage filesystems for sensitive information with Go.
Solved Hacking Problem
✔️ CTF problems and solutions solved by Qwaz
Fail2ban.webexploits
This custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
B1tifi
ssh management tool to provides commandline access to a remote system running SSH server
Rhme 2017
Riscure Hack Me embedded hardware CTF 2017-2018.
Xshock
XSHOCK Shellshock Exploit
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Knowledge Base
pdf,txt,djvu, various useful books
Chimay Red
Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Slickermaster Rev4
NSA Hacking Tool Recreation UnitedRake
Pyhawk
Searches the directory of choice for interesting files. Such as database files and files with passwords stored on them
Webwhatsappbot
Core to automatize whatsapp - working 11/2018
Papers
Papers about known hacking, security, hardware, software, computer, network and other ressources.
Kill Router
Ferramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Dll hook Rs
Rust code to show how hooking in rust with a dll works.
Jaeles
The Swiss Army knife for automated Web Application Testing
Spellbook
Micro-framework for rapid development of reusable security tools
Shellshockhunter
It's a simple tool for test vulnerability shellshock
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Dockerscan
Docker security analysis & hacking tools
Best Hacking Tools
BEST HACKING TOOLS..For more tools visit our blog for Hackers
Tweak Series
Repo for YouTube series
Cfw2ofw Helper
Providing aid in converting video games.
Vulnx
vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Usb Keystroke Injector
☠️ An Arduino-based USB keyboard simulator which injects keystrokes via Bluetooth protocol or predefined payloads in a SD card.
Keylogger
A simple keylogger for Windows, Linux and Mac
Taketv
TakeTV permite descubrir dispositivos de red DLNA/UPnP y ayuda a reproducir archivos multimedia en los televisores inteligentes desde nuestra terminal en Linux.
Arpspoof
arpspoof for macOS - intercept packets on a switched LAN
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Swift Keylogger
Keylogger for mac written in Swift using HID
Powerladon
Ladon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Brutex
Automatically brute force all services running on a target.
100 Days Of Swiftui
👨‍💻👩‍💻100 Days Of SwiftUI free course from Hacking with Swift. 👨‍💻👩‍💻