BlackratBlackRAT - Java Based Remote Administrator Tool
Stars: ✭ 87 (-77.92%)
Ethical HackingThis repository contains reference material & links for people willing to learn Ethical Hacking
Stars: ✭ 160 (-59.39%)
Blackphish🔱 [ Phishing Made Easy ] 🔱 (In Beta)
Stars: ✭ 133 (-66.24%)
Hooksolinux动态链接库的注入修改查找工具 A tool for injection, modification and search of linux dynamic link library
Stars: ✭ 87 (-77.92%)
ThreadboatProgram Uses Thread Execution Hijacking To Inject Native Shell-code Into a Standard Win32 Application
Stars: ✭ 132 (-66.5%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+221.83%)
Horn3tPowerful Visual Subdomain Enumeration at the Click of a Mouse
Stars: ✭ 120 (-69.54%)
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-84.01%)
T14m4tAutomated brute-forcing attack tool.
Stars: ✭ 160 (-59.39%)
TrigmapA wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (-66.5%)
ThecollectiveThe Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-78.43%)
GoaltdnsA permutation generation tool written in golang
Stars: ✭ 119 (-69.8%)
Cehv10 Notes📕 Both personal and public notes for EC-Council's CEHv10 312-50, because its thousands of pages/slides of boredom, and a braindump to many
Stars: ✭ 170 (-56.85%)
PyhawkSearches the directory of choice for interesting files. Such as database files and files with passwords stored on them
Stars: ✭ 60 (-84.77%)
UrlcrazyGenerate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (-61.93%)
HackphilesBruteForce Tool For both Instagram and Facebook
Stars: ✭ 57 (-85.53%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-70.56%)
MemjectSimple Dll injector loading from memory. Supports PE header and entry point erasure. Written in C99.
Stars: ✭ 176 (-55.33%)
Kill RouterFerramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-85.53%)
SkaSimple Karma Attack
Stars: ✭ 55 (-86.04%)
Privilege EscalationThis cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Stars: ✭ 2,117 (+437.31%)
JaelesThe Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+172.34%)
Jenkins ShellAutomating Jenkins Hacking using Shodan API
Stars: ✭ 84 (-78.68%)
Project TauroA Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-86.8%)
BbreconPython library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-57.11%)
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-87.06%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+2179.44%)
DnsfookupDNS rebinding toolkit
Stars: ✭ 150 (-61.93%)
Best Hacking ToolsBEST HACKING TOOLS..For more tools visit our blog for Hackers
Stars: ✭ 46 (-88.32%)
ArissploitArissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (-71.07%)
Owasp MasvsThe Mobile Application Security Verification Standard (MASVS) is a standard for mobile app security.
Stars: ✭ 1,030 (+161.42%)
Nndefacctsnnposter's alternate fingerprint dataset for Nmap script http-default-accounts
Stars: ✭ 180 (-54.31%)
EzxssezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
Stars: ✭ 1,022 (+159.39%)
BrutemapLet's find someone's account
Stars: ✭ 113 (-71.32%)
Cfw2ofw HelperProviding aid in converting video games.
Stars: ✭ 44 (-88.83%)
HackercampEnine boyuna siber güvenlik
Stars: ✭ 149 (-62.18%)
AndtrojA tool for integrating the Metasploit payload with Android's healthy programs and bypassing antivirus
Stars: ✭ 43 (-89.09%)
Wooyunwooyun public information backup
Stars: ✭ 112 (-71.57%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+156.09%)
JsshellJSshell - JavaScript reverse/remote shell
Stars: ✭ 167 (-57.61%)
KeyloggerA simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (+155.58%)
CtfrAbusing Certificate Transparency logs for getting HTTPS websites subdomains.
Stars: ✭ 1,535 (+289.59%)
Zeebsploitweb scanner - exploitation - information gathering
Stars: ✭ 159 (-59.64%)
Zynix Fusionzynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
Stars: ✭ 84 (-78.68%)
Hack ToolsThe all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+597.97%)
TcpproxyIntercepting TCP proxy to modify raw TCP streams using modules on incoming or outgoing traffic
Stars: ✭ 176 (-55.33%)
H8mailEmail OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (+448.98%)
Geo ReconAn OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts.
Stars: ✭ 82 (-79.19%)
HardentheworldHarden the world is a community driven project to develop hardening guidelines and checklists for common software and devices.
Stars: ✭ 158 (-59.9%)
Mssqli DuetSQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing
Stars: ✭ 82 (-79.19%)
HoundsploitAn advanced graphical search engine for Exploit-DB
Stars: ✭ 81 (-79.44%)