RaccoonA high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+50.62%)
Mutual labels: hacking, pentesting, information-gathering
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+485.08%)
Mutual labels: hacking, pentesting, information-gathering
Vaultswiss army knife for hackers
Stars: ✭ 346 (-77.46%)
Mutual labels: hacking, pentesting, information-gathering
Scilla🏴☠️ Information Gathering tool 🏴☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-92.44%)
Mutual labels: hacking, pentesting, information-gathering
CripsIP Tools To quickly get information about IP Address's, Web Pages and DNS records.
Stars: ✭ 272 (-82.28%)
Mutual labels: hacking, pentesting, information-gathering
VajraVajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (-82.48%)
Mutual labels: hacking, pentesting, information-gathering
SublertSublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (-54.46%)
Mutual labels: hacking, information-gathering, certificate-transparency
Kill RouterFerramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-96.29%)
Mutual labels: hacking, pentesting
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-95.96%)
Mutual labels: hacking, pentesting
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (-25.99%)
Mutual labels: hacking, pentesting
DeadtrapAn OSINT tool to gather information about the real owner of a phone number
Stars: ✭ 73 (-95.24%)
Mutual labels: hacking, information-gathering
Oscp Prepmy oscp prep collection
Stars: ✭ 105 (-93.16%)
Mutual labels: hacking, pentesting
SpellbookMicro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-96.55%)
Mutual labels: hacking, pentesting
Hacker ContainerContainer with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-93.16%)
Mutual labels: hacking, pentesting
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (-34.27%)
Mutual labels: hacking, information-gathering
Netmap.jsFast browser-based network discovery module
Stars: ✭ 70 (-95.44%)
Mutual labels: hacking, pentesting
GithacktoolsThe best Hacking and PenTesting tools installer on the world
Stars: ✭ 78 (-94.92%)
Mutual labels: hacking, pentesting
SandmapNmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (-23.13%)
Mutual labels: hacking, information-gathering
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (-17.39%)
Mutual labels: hacking, pentesting
Zynix Fusionzynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
Stars: ✭ 84 (-94.53%)
Mutual labels: hacking, pentesting