suiderThis tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObins
Deep-InsideCommand line tool that allows you to explore IoT devices by using Shodan API.
penetration testing🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.
NarthexModular personalized dictionary generator.
MailRipV3SMTP and IMAP checker / cracker for mailpass combolists with a user-friendly GUI, automated inbox test and many more features.
reverse-sshStatically-linked ssh server with reverse shell functionality for CTFs and such
bentoBento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.
ggtfobinsGet GTFOBins info about a given exploit from the command line
STEWSA Security Tool for Enumerating WebSockets
BCA-PhantomA multi-platform HTTP(S) Reverse Shell Server and Client in Python 3
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
peniotPENIOT: Penetration Testing Tool for IoT
shadow-workersShadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious Service Workers (SW)
webreconAutomated Web Recon Shell Scripts
XposedOrNotXposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of such compromised passwords is detrimental to individual account security.
ctrsploitA penetration toolkit for container environment
default-http-login-hunterLogin hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.