VulscanAdvanced vulnerability scanning with Nmap NSE
Stars: ✭ 2,305 (+1180.56%)
Ssh MitmSSH man-in-the-middle tool
Stars: ✭ 1,328 (+637.78%)
XssmapXSSMap 是一款基于 Python3 开发用于检测 XSS 漏洞的工具
Stars: ✭ 134 (-25.56%)
BadpodsA collection of manifests that will create pods with elevated privileges.
Stars: ✭ 93 (-48.33%)
SmogcloudFind cloud assets that no one wants exposed 🔎 ☁️
Stars: ✭ 168 (-6.67%)
Pentest GuidePenetration tests guide based on OWASP including test cases, resources and examples.
Stars: ✭ 1,316 (+631.11%)
TrigmapA wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (-26.67%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+5706.11%)
DarksideTool Information Gathering & social engineering Write By [Python,JS,PHP]
Stars: ✭ 159 (-11.67%)
Proxifier For LinuxSimple C code with iptables make this tool proxifier which tunnels whole system traffic through the proxy server, without configuring individual application
Stars: ✭ 89 (-50.56%)
Pentest NotesCollection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
Stars: ✭ 89 (-50.56%)
RecsechRecsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected, Subdomain takeovers, Reconnaissance On Github and much more you can see in Features in tools .
Stars: ✭ 173 (-3.89%)
InfinityA lightweight C++ RDMA library for InfiniBand networks.
Stars: ✭ 86 (-52.22%)
OscprepoA list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and reading material in 'BookmarkList' CherryTree. Reconscan Py2 and Py3. Custom ISO building.
Stars: ✭ 1,916 (+964.44%)
One Lin3rGives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+599.44%)
PortiaPortia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
Stars: ✭ 154 (-14.44%)
Beef Over WanBrowser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-54.44%)
PidrilaPython Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (-30.56%)
HoundsploitAn advanced graphical search engine for Exploit-DB
Stars: ✭ 81 (-55%)
Pe LinuxLinux Privilege Escalation Tool By WazeHell
Stars: ✭ 168 (-6.67%)
RsfThe Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
Stars: ✭ 76 (-57.78%)
PakuriPenetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (-30.56%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-60%)
DnsmorphDomain name permutation engine written in Go
Stars: ✭ 148 (-17.78%)
Red Team Curation ListA list to discover work of red team tooling and methodology for penetration testing and security assessment
Stars: ✭ 68 (-62.22%)
Black WidowGUI based offensive penetration testing tool (Open Source)
Stars: ✭ 124 (-31.11%)
TcpproxyIntercepting TCP proxy to modify raw TCP streams using modules on incoming or outgoing traffic
Stars: ✭ 176 (-2.22%)
Fwdsh3llForward shell generation framework
Stars: ✭ 62 (-65.56%)
CorebgpCoreBGP is a BGP library written in Go that implements the BGP FSM with an event-driven, pluggable model.
Stars: ✭ 124 (-31.11%)
AstraAutomated Security Testing For REST API's
Stars: ✭ 1,898 (+954.44%)
TelekillerA Tools Session Hijacking And Stealer Local Passcode Telegram Windows
Stars: ✭ 122 (-32.22%)
Zap CliA simple tool for interacting with OWASP ZAP from the commandline.
Stars: ✭ 166 (-7.78%)
SkaSimple Karma Attack
Stars: ✭ 55 (-69.44%)
Oscp AutomationA collection of personal scripts used in hacking excercises.
Stars: ✭ 118 (-34.44%)
Lotostiny but high-performance HTTP Server
Stars: ✭ 140 (-22.22%)
AwsbucketdumpSecurity Tool to Look For Interesting Files in S3 Buckets
Stars: ✭ 1,021 (+467.22%)
Awesome HackingAwesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+901.11%)
PsattackA portable console aimed at making pentesting with PowerShell a little easier.
Stars: ✭ 1,021 (+467.22%)
RapidpayloadFramework RapidPayload - Metasploit Payload Generator | Crypter FUD AntiVirus Evasion
Stars: ✭ 174 (-3.33%)
Eyes👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?" 🔍 🕵️
Stars: ✭ 38 (-78.89%)
Mitm Scripts🔄 A collection of mitmproxy inline scripts
Stars: ✭ 109 (-39.44%)
XdpPackage xdp allows one to use XDP sockets from the Go programming language.
Stars: ✭ 36 (-80%)
WebserverA C++ Lightweight Web Server based on Linux epoll
Stars: ✭ 135 (-25%)
Punk.pyunix SSH post-exploitation 1337 tool
Stars: ✭ 107 (-40.56%)
BroxyAn HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (+406.67%)
HydrafwHydraFW official firmware for HydraBus/HydraNFC for researcher, hackers, students, embedded software developers or anyone interested in debugging/hacking/developing/penetration testing
Stars: ✭ 165 (-8.33%)
Oscp Prepmy oscp prep collection
Stars: ✭ 105 (-41.67%)
Remote Desktop CachingThis tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: ✭ 171 (-5%)
PacuThe AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Stars: ✭ 2,451 (+1261.67%)
ReconnoitreA security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+913.33%)
VailynA phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-42.78%)