adalancheActive Directory ACL Visualizer and Explorer - who's really Domain Admin?
Stars: ✭ 862 (-38.07%)
ggtfobinsGet GTFOBins info about a given exploit from the command line
Stars: ✭ 27 (-98.06%)
auto-recon-ngAutomated script to run all modules for a specified list of domains, netblocks or company name
Stars: ✭ 17 (-98.78%)
HostEnumeratorA tool that automates the process of enumeration
Stars: ✭ 29 (-97.92%)
Red-Rabbit-V4The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate other peoples tools like the aircrack suite or the wifite framework, it rather has its own code and is raw source with over 270+ options. This framework might just be your everyday key to your workflow
Stars: ✭ 123 (-91.16%)
HashviewA web front-end for password cracking and analytics
Stars: ✭ 601 (-56.82%)
SsrfmapSimple Server Side Request Forgery services enumeration tool.
Stars: ✭ 50 (-96.41%)
Linux-Active-Directory-join-scriptActive directory Join script for Ubuntu, Debian, CentOS, Linux Mint, Fedora, Kali, Elementary OS and Raspbian with built in failchcheck and debugmode for Ubuntu. "The most advanced and updated AD join script on GITHUB for Linux"
Stars: ✭ 97 (-93.03%)
Security ScriptsA collection of public offensive and defensive security related scripts for InfoSec students.
Stars: ✭ 101 (-92.74%)
EnteletaorMessage Queue & Broker Injection tool
Stars: ✭ 139 (-90.01%)
aquatoneA Tool for Domain Flyovers
Stars: ✭ 43 (-96.91%)
PowEnumExecutes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.
Stars: ✭ 62 (-95.55%)
YAPSYet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-97.49%)
crawleetWeb Recon & Exploitation Tool.
Stars: ✭ 48 (-96.55%)
Penetration Testing ToolsA collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (-55.89%)
ElliotA pentesting tool inspired by mr robot and derived by zphisher
Stars: ✭ 23 (-98.35%)
moonwalkCover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (-60.92%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (-63.43%)
Damn Vulnerable Graphql ApplicationDamn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
Stars: ✭ 567 (-59.27%)
AttifyosAttify OS - Distro for pentesting IoT devices
Stars: ✭ 615 (-55.82%)
Security whitepapersCollection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQLi
Stars: ✭ 644 (-53.74%)
Jok3rJok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (-53.66%)
Dumpall一款信息泄漏利用工具,适用于.git/.svn源代码泄漏和.DS_Store泄漏
Stars: ✭ 250 (-82.04%)
V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (-39.15%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-94.61%)
ProcspyPython tool that monitors and logs user-run commands on a Linux system for either offensive or defensive purposes..
Stars: ✭ 272 (-80.46%)
CripsIP Tools To quickly get information about IP Address's, Web Pages and DNS records.
Stars: ✭ 272 (-80.46%)
ArachniWeb Application Security Scanner Framework
Stars: ✭ 2,942 (+111.35%)
SonarsearchA MongoDB importer and API for Project Sonars DNS datasets
Stars: ✭ 297 (-78.66%)
BadmodCMS auto detect and exploit.
Stars: ✭ 296 (-78.74%)
Windows Post ExploitationWindows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (-78.74%)
WebanalyzePort of Wappalyzer (uncovers technologies used on websites) to automate mass scanning.
Stars: ✭ 311 (-77.66%)
ErodirA fast web directory/file enumeration tool written in Rust
Stars: ✭ 94 (-93.25%)
Langhost👻 A LAN dropbox chatbot controllable via Telegram
Stars: ✭ 324 (-76.72%)
AutordpwnThe Shadow Attack Framework
Stars: ✭ 688 (-50.57%)
EmagnetAutomated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password together from recent uploads from https://pastebin.com. Bruteforce support for spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts
Stars: ✭ 688 (-50.57%)
Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (-74.64%)
KaboomA tool to automate penetration tests
Stars: ✭ 322 (-76.87%)
PrivesccheckPrivilege Escalation Enumeration Script for Windows
Stars: ✭ 1,032 (-25.86%)
BrutalPayload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (-51.29%)
SublertSublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (-49.78%)
GorsairGorsair hacks its way into remote docker containers that expose their APIs
Stars: ✭ 678 (-51.29%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (-47.7%)
AwsbucketdumpSecurity Tool to Look For Interesting Files in S3 Buckets
Stars: ✭ 1,021 (-26.65%)
TrapePeople tracker on the Internet: OSINT analysis and research tool by Jose Pino
Stars: ✭ 6,753 (+385.13%)