FuxiPenetration Testing Platform
Nim SmbexecSMBExec implementation in Nim - SMBv2 using NTLM Authentication with Pass-The-Hash technique
VulmapVulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Burpsuite CollectionsBurpSuite收集:包括不限于 Burp 文章、破解版、插件(非BApp Store)、汉化等相关教程,欢迎添砖加瓦---burpsuite-pro burpsuite-extender burpsuite cracked-version hackbar hacktools fuzzing fuzz-testing burp-plugin burp-extensions bapp-store brute-force-attacks brute-force-passwords waf sqlmap jar
Sudo killerA tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
PrivesccheckPrivilege Escalation Enumeration Script for Windows
PowerladonLadon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Eyes👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?" 🔍 🕵️
PasshuntPasshunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
HouseA runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
OdatODAT: Oracle Database Attacking Tool
Babysploit👶 BabySploit Beginner Pentesting Toolkit/Framework Written in Python 🐍
Pwncatpwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
1earn个人维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
PerunPerun是一款主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
ExploitpackExploit Pack -The next generation exploit framework
Lockdoor Framework🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
MsdatMSDAT: Microsoft SQL Database Attacking Tool
PrintspooferAbusing Impersonation Privileges on Windows 10 and Server 2019
BigbountyreconBigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
YasuoA ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stowaway👻Stowaway -- Multi-hop Proxy Tool for pentesters
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
DirbleFast directory scanning and scraping tool
Sn1perAttack Surface Management Platform | Sn1perSecurity LLC
NullinuxInternal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB.
JusttryharderJustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)
EhtoolsWi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
PacketwhisperPacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Top25 ParameterFor basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙
Envizonnetwork visualization & vulnerability management/reporting
RdpasssprayPython3 tool to perform password spraying using RDP
Impost3r👻Impost3r -- A linux password thief
WatchdogWatchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
KaboomA tool to automate penetration tests
GetaltnameExtract subdomains from SSL certificates in HTTPS sites.
VajraVajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
WebkillerTool Information Gathering Write By Python.
DotdotslashSearch for Directory Traversal Vulnerabilities
SusanooA REST API security testing framework.