phisherpriceAll In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-62.38%)
Mutual labels: cybersecurity, cyber-security, redteam-tools
SkeletonSkeleton is a Social Engineering tool attack switcher
Stars: ✭ 44 (-56.44%)
Mutual labels: phishing-attacks, social-engineering-attacks, social-engineering
argusArgus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (-13.86%)
Mutual labels: cybersecurity, cyber-security, social-engineering
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-55.45%)
Mutual labels: cybersecurity, redteam-tools
cuc-wiki个人教学 Wiki
Stars: ✭ 83 (-17.82%)
Mutual labels: cybersecurity, cyber-security
phishEyephishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (-53.47%)
Mutual labels: cybersecurity, phishing-attacks
longtongueCustomized Password/Passphrase List inputting Target Info
Stars: ✭ 61 (-39.6%)
Mutual labels: social-engineering-attacks, social-engineering
urlRecon📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (-69.31%)
Mutual labels: cybersecurity, social-engineering
ScareCrow-CobaltStrikeCobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)
Stars: ✭ 387 (+283.17%)
Mutual labels: evasion, bypass-antivirus
sharkBest Tool For Phishing, Future Of Phishing
Stars: ✭ 238 (+135.64%)
Mutual labels: phishing-attacks, phishing-kit
Storm-BreakerSocial engineering tool [Access Webcam & Microphone & Location Finder] With Python
Stars: ✭ 1,489 (+1374.26%)
Mutual labels: social-engineering-attacks, social-engineering
LuciferA Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+199.01%)
Mutual labels: cybersecurity, cyber-security
pentesting-frameworkPentesting Framework is a bundle of penetration testing tools, Includes - security, pentesting, hacking and many more.
Stars: ✭ 90 (-10.89%)
Mutual labels: phishing-attacks, phishing-kit
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-39.6%)
Mutual labels: cybersecurity, cyber-security
CloudFrontierMonitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (+0.99%)
Mutual labels: cybersecurity, cyber-security
who and what to followWho and what to follow in the world of cyber security
Stars: ✭ 124 (+22.77%)
Mutual labels: cybersecurity, cyber-security
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (-16.83%)
Mutual labels: cybersecurity, redteam-tools
Sn1perAttack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+4748.51%)
Mutual labels: cybersecurity, redteam-tools
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+38.61%)
Mutual labels: cybersecurity, cyber-security