SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-95.65%)
Mutual labels: hacking, pentest
Capsulecorp PentestVagrant VirtualBox environment for conducting an internal network penetration test
Stars: ✭ 214 (-91.98%)
Mutual labels: hacking, pentest
Shodan DorksDorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (-95.58%)
Mutual labels: hacking, pentest
KeyeKeye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-96.21%)
Mutual labels: hacking, pentest
AsnlookupLeverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-93.89%)
Mutual labels: hacking, pentest
Collection DocumentCollection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (-48.01%)
Mutual labels: hacking, pentest
Evil WinrmThe ultimate WinRM shell for hacking/pentesting
Stars: ✭ 2,251 (-15.63%)
Mutual labels: hacking, pentest
Burp Bounty ProfilesBurp Bounty profiles compilation, feel free to contribute!
Stars: ✭ 76 (-97.15%)
Mutual labels: hacking, pentest
PortiaPortia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
Stars: ✭ 154 (-94.23%)
Mutual labels: hacking, pentest
Offensive DockerfilesOffensive tools as Dockerfiles. Lightweight & Ready to go
Stars: ✭ 150 (-94.38%)
Mutual labels: hacking, pentest
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-96.36%)
Mutual labels: hacking, pentest
TechnowloggerTechNowLogger is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info
Stars: ✭ 172 (-93.55%)
Mutual labels: hacking, pentest
Cve 2019 0604cve-2019-0604 SharePoint RCE exploit
Stars: ✭ 91 (-96.59%)
Mutual labels: hacking, pentest
Hacker ContainerContainer with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-96.06%)
Mutual labels: hacking, pentest
ShellpopPop shells like a master.
Stars: ✭ 1,279 (-52.06%)
Mutual labels: hacking, pentest
PidrilaPython Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (-95.31%)
Mutual labels: hacking, pentest
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (-57.57%)
Mutual labels: hacking, pentest
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (-57.42%)
Mutual labels: hacking, pentest
Ntlmscanscan for NTLM directories
Stars: ✭ 141 (-94.72%)
Mutual labels: hacking, pentest
AboutsecurityA list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-93.78%)
Mutual labels: hacking, pentest