Collection DocumentCollection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (-80.7%)
Mutual labels: hacking, pentest, xss, bug-bounty
Hacker101Source code for Hacker101.com - a free online web and mobile security class.
Stars: ✭ 12,246 (+70.44%)
Mutual labels: education, hacking, xss, web-security
ReconftwreconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (-86.44%)
Mutual labels: hacking, pentest, xss
Pythempentest framework
Stars: ✭ 1,060 (-85.25%)
Mutual labels: hacking, pentest, xss
KeyeKeye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-98.59%)
Mutual labels: hacking, pentest, bug-bounty
SublertSublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (-90.27%)
Mutual labels: hacking, pentest, bug-bounty
PidrilaPython Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (-98.26%)
Mutual labels: hacking, pentest, bug-bounty
diwaA Deliberately Insecure Web Application
Stars: ✭ 32 (-99.55%)
Mutual labels: education, xss, web-security
XspearPowerfull XSS Scanning and Parameter analysis tool&gem
Stars: ✭ 583 (-91.89%)
Mutual labels: hacking, pentest, xss
PayloadsGit All the Payloads! A collection of web attack payloads.
Stars: ✭ 2,862 (-60.17%)
Mutual labels: hacking, pentest, xss
tugareconPentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (-98.02%)
Mutual labels: hackers, bug-bounty, pentest
Offensive DockerOffensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-95.43%)
Mutual labels: hacking, pentest, bug-bounty
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (-89.91%)
Mutual labels: hacking, pentest
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (-93.4%)
Mutual labels: hacking, pentest
GoohakAutomatically Launch Google Hacking Queries Against A Target Domain
Stars: ✭ 432 (-93.99%)
Mutual labels: hacking, pentest
Solr InjectionApache Solr Injection Research
Stars: ✭ 464 (-93.54%)
Mutual labels: hacking, pentest
K8cscanK8Cscan大型内网渗透自定义插件化扫描神器,包含信息收集、网络资产、漏洞扫描、密码爆破、漏洞利用,程序采用多线程批量扫描大型内网多个IP段C段主机,目前插件包含: C段旁注扫描、子域名扫描、Ftp密码爆破、Mysql密码爆破、Oracle密码爆破、MSSQL密码爆破、Windows/Linux系统密码爆破、存活主机扫描、端口扫描、Web信息探测、操作系统版本探测、Cisco思科设备扫描等,支持调用任意外部程序或脚本,支持Cobalt Strike联动
Stars: ✭ 693 (-90.35%)
Mutual labels: hacking, pentest
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (-92.92%)
Mutual labels: hacking, bug-bounty
PayloadsallthethingsA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+358.02%)
Mutual labels: hacking, pentest