Webhackersweapons⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
GithacktoolsThe best Hacking and PenTesting tools installer on the world
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
SeginfofaqFAQ del mundo de la seguridad informática en español.
DeadtrapAn OSINT tool to gather information about the real owner of a phone number
SandmapNmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Lor Axe🪓 a multi-threaded, low-bandwidth HTTP DOS tool
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Chaos🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Netmap.jsFast browser-based network discovery module
PillagerPillage filesystems for sensitive information with Go.
Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
B1tifissh management tool to provides commandline access to a remote system running SSH server
Rhme 2017Riscure Hack Me embedded hardware CTF 2017-2018.
XshockXSHOCK Shellshock Exploit
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
PyhawkSearches the directory of choice for interesting files. Such as database files and files with passwords stored on them
HackphilesBruteForce Tool For both Instagram and Facebook
PapersPapers about known hacking, security, hardware, software, computer, network and other ressources.
Kill RouterFerramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Dll hook RsRust code to show how hooking in rust with a dll works.
WhitehatInformation about my experiences on ethical hacking 💀
JaelesThe Swiss Army knife for automated Web Application Testing
SpellbookMicro-framework for rapid development of reusable security tools
Project TauroA Router WiFi key recovery/cracking tool with a twist.
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
DockerscanDocker security analysis & hacking tools
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Usb Keystroke Injector☠️ An Arduino-based USB keyboard simulator which injects keystrokes via Bluetooth protocol or predefined payloads in a SD card.
KeyloggerA simple keylogger for Windows, Linux and Mac
TaketvTakeTV permite descubrir dispositivos de red DLNA/UPnP y ayuda a reproducir archivos multimedia en los televisores inteligentes desde nuestra terminal en Linux.
Arpspoof arpspoof for macOS - intercept packets on a switched LAN
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
ReconftwreconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
PowerladonLadon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
BrutexAutomatically brute force all services running on a target.