FfmFreedom Fighting Mode: open source hacking harness
Stars: ✭ 302 (+74.57%)
java-reverse-tcpJAR, Java, and JSP shells that work on Linux OS, macOS, and Windows OS.
Stars: ✭ 19 (-89.02%)
OscpMy OSCP journey
Stars: ✭ 50 (-71.1%)
InfosecHouseInfosec resource center for offensive and defensive security operations.
Stars: ✭ 61 (-64.74%)
CorsmeCross Origin Resource Sharing MisConfiguration Scanner
Stars: ✭ 118 (-31.79%)
BifrostBifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-78.61%)
VhostscanA virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+343.35%)
VanquishVanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Stars: ✭ 449 (+159.54%)
GopherC# tool to discover low hanging fruits
Stars: ✭ 73 (-57.8%)
ThecollectiveThe Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-50.87%)
Vaultswiss army knife for hackers
Stars: ✭ 346 (+100%)
Black WidowGUI based offensive penetration testing tool (Open Source)
Stars: ✭ 124 (-28.32%)
EastExploits and Security Tools Framework 2.0.1
Stars: ✭ 283 (+63.58%)
Pathwar☠️ The Pathwar Project ☠️
Stars: ✭ 58 (-66.47%)
empirectfEmpireCTF – write-ups, capture the flag, cybersecurity
Stars: ✭ 122 (-29.48%)
ReconnoitreA security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+954.34%)
oscp-omnibusA collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (-73.41%)
Awesome OscpA curated list of awesome OSCP resources
Stars: ✭ 804 (+364.74%)
php-reverse-shellPHP shells that work on Linux OS, macOS, and Windows OS.
Stars: ✭ 274 (+58.38%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (-65.32%)
BlackmambaC2/post-exploitation framework
Stars: ✭ 544 (+214.45%)
ChimeraChimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (+167.63%)
DNSExplorerBash script that automates the enumeration of domains and DNS servers in the active information gathering.
Stars: ✭ 33 (-80.92%)
Atomic Red Team Intelligence C2ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (-49.71%)
Oscp PwkThis is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.
Stars: ✭ 406 (+134.68%)
Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (+104.05%)
Zynix Fusionzynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
Stars: ✭ 84 (-51.45%)
Black Hat RustApplied offensive security with Rust - Early access - https://academy.kerkour.com/black-hat-rust?coupon=GITHUB
Stars: ✭ 331 (+91.33%)
Pwk Oscp Preparation RoadmapRoadmap for preparing for OSCP, anyone is free to use this, and also feedback and contributions are welcome
Stars: ✭ 142 (-17.92%)
RmiscoutRMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities
Stars: ✭ 296 (+71.1%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+1026.59%)
keyloggerWindows OS keylogger with a hook mechanism (i.e. with a keyboard hook procedure).
Stars: ✭ 37 (-78.61%)
Pentest⛔️ offsec batteries included
Stars: ✭ 1,063 (+514.45%)
007-TheBondThis Script will help you to gather information about your victim or friend.
Stars: ✭ 371 (+114.45%)
Invoke ApexA PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
Stars: ✭ 162 (-6.36%)
vbsminVBScript minifier
Stars: ✭ 19 (-89.02%)
ShellyAutomatic Reverse Shell Generator
Stars: ✭ 38 (-78.03%)
Punk.pyunix SSH post-exploitation 1337 tool
Stars: ✭ 107 (-38.15%)
meteorA cross-platform C2/teamserver supporting multiple transport protocols, written in Go.
Stars: ✭ 31 (-82.08%)
Rapidscan🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+347.98%)
WireBirbA scapy based module for programming offensive and defensive networking tools easier than before.
Stars: ✭ 16 (-90.75%)
NosqlmapAutomated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+1014.45%)
KeyloggerGet Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+249.13%)
AutoWinAutowin is a framework that helps organizations simulate custom attack scenarios in order to improve detection and response capabilities.
Stars: ✭ 18 (-89.6%)
OseeCollection of resources for my preparation to take the OSEE certification.
Stars: ✭ 98 (-43.35%)
BigbountyreconBigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+212.72%)
RaccoonA high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+1236.42%)
Buffer overflowDon't let buffer overflows overflow your mind
Stars: ✭ 131 (-24.28%)
Pentest NotesCollection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
Stars: ✭ 89 (-48.55%)
Oscp Exam Report TemplateModified template for the OSCP Exam and Labs. Used during my passing attempt
Stars: ✭ 506 (+192.49%)