ruped24 / Killchain
A unified console to perform the "kill chain" stages of attacks.
Stars: ✭ 172
Programming Languages
python
139335 projects - #7 most used programming language
Projects that are alternatives of or similar to Killchain
Git Scanner
A tool for bug hunting or pentesting for targeting websites that have open .git repositories available in public
Stars: ✭ 157 (-8.72%)
Mutual labels: pentesting, pentest-tool
Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (-3.49%)
Mutual labels: pentesting, pentest-tool
Sippts
Set of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-32.56%)
Mutual labels: pentesting, pentest-tool
Vailyn
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-40.12%)
Mutual labels: pentesting, pentest-tool
Attiny85
RubberDucky like payloads for DigiSpark Attiny85
Stars: ✭ 169 (-1.74%)
Mutual labels: pentesting, pentest-tool
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+709.3%)
Mutual labels: pentesting, attack
Ssrf Testing
SSRF (Server Side Request Forgery) testing resources
Stars: ✭ 1,718 (+898.84%)
Mutual labels: pentesting, pentest-tool
Ldap search
Python3 script to perform LDAP queries and enumerate users, groups, and computers from Windows Domains. Ldap_Search can also perform brute force/password spraying to identify valid accounts via LDAP.
Stars: ✭ 78 (-54.65%)
Mutual labels: pentesting, pentest-tool
Burpsuite Xkeys
A Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.
Stars: ✭ 144 (-16.28%)
Mutual labels: pentesting, pentest-tool
Trigmap
A wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (-23.26%)
Mutual labels: pentesting, pentest-tool
Winpwn
Automation for internal Windows Penetrationtest / AD-Security
Stars: ✭ 1,303 (+657.56%)
Mutual labels: pentesting, pentest-tool
Docker Security Images
🔐 Docker Container for Penetration Testing & Security
Stars: ✭ 172 (+0%)
Mutual labels: pentesting, pentest-tool
Eyes.sh
Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?"
Stars: ✭ 89 (-48.26%)
Mutual labels: pentesting, pentest-tool
Enumdb
Relational database brute force and post exploitation tool for MySQL and MSSQL
Stars: ✭ 167 (-2.91%)
Mutual labels: pentesting, pentest-tool
Venom
Venom - A Multi-hop Proxy for Penetration Testers
Stars: ✭ 1,228 (+613.95%)
Mutual labels: pentesting, pentest-tool
Ratel
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-29.65%)
Mutual labels: pentesting, pentest-tool
Vulmap
Vulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+527.33%)
Mutual labels: pentesting, pentest-tool
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+560.47%)
Mutual labels: pentesting, pentest-tool
Jwtxploiter
A tool to test security of json web token
Stars: ✭ 130 (-24.42%)
Mutual labels: pentesting, pentest-tool
Airmaster
Use ExpiredDomains.net and BlueCoat to find useful domains for red team.
Stars: ✭ 150 (-12.79%)
Mutual labels: pentesting, pentest-tool
killchain
“Kill Chain” is a unified console with an anonymizer that will perform these stages of attacks:
-
Reconnaissance
-
Weaponization
-
Delivery
-
Exploit
-
Installation
-
Command & Control
-
And Actions
Dependent tool sets are:
-
Tor -- For the console build-in anonymizer.
-
Set -- Social-Engineer Toolkit (SET), attacks against humans.
-
OpenVas -- Vulnerability scanning and vulnerability management.
-
Veil-Evasion -- Generate metasploit payloads bypass anti-virus.
-
Websploit -- WebSploit Advanced MITM Framework.
-
Metasploit -- Executing exploit code against target.
-
WiFite -- Automated wireless auditor, designed for Linux.
Screenshot
killchain Setup
killchain Add-on
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].