YasuoA ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (+153.43%)
Linkedin2usernameOSINT Tool: Generate username lists for companies on LinkedIn
Stars: ✭ 504 (+147.06%)
RecsechRecsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected, Subdomain takeovers, Reconnaissance On Github and much more you can see in Features in tools .
Stars: ✭ 173 (-15.2%)
RvdRobot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (-57.35%)
Sniff ProbesPlug-and-play bash script for sniffing 802.11 probes requests 👃
Stars: ✭ 200 (-1.96%)
HardentheworldHarden the world is a community driven project to develop hardening guidelines and checklists for common software and devices.
Stars: ✭ 158 (-22.55%)
CtfrAbusing Certificate Transparency logs for getting HTTPS websites subdomains.
Stars: ✭ 1,535 (+652.45%)
On PwningMy solutions to some CTF challenges and a list of interesting resources about pwning stuff
Stars: ✭ 87 (-57.35%)
InstainsaneMulti-threaded Instagram Brute Forcer (100 attemps at once)
Stars: ✭ 475 (+132.84%)
BlackratBlackRAT - Java Based Remote Administrator Tool
Stars: ✭ 87 (-57.35%)
DustcloudXiaomi Smart Home Device Reverse Engineering and Hacking
Stars: ✭ 1,907 (+834.8%)
Css Flexbox CheatsheetVS Code extension that lets you open a CSS Flexbox cheatsheet directly in the editor.
Stars: ✭ 87 (-57.35%)
Pdb CheatsheetA cheatsheet for the Python Debugger (pdb)
Stars: ✭ 171 (-16.18%)
Awesome HackingA curated list of awesome Hacking tutorials, tools and resources
Stars: ✭ 7,756 (+3701.96%)
GlobbingIntroduction to "globbing" or glob matching, a programming concept that allows "filepath expansion" and matching using wildcards.
Stars: ✭ 86 (-57.84%)
MbeCourse materials for Modern Binary Exploitation by RPISEC
Stars: ✭ 4,674 (+2191.18%)
Burpsuite XkeysA Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.
Stars: ✭ 144 (-29.41%)
Sn1perAttack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+2300.49%)
Drv3 Tools(Not actively maintained, use DRV3-Sharp) Tools for extracting and re-injecting files for Danganronpa V3 for PC.
Stars: ✭ 13 (-93.63%)
O365reconretrieve information via O365 with a valid cred
Stars: ✭ 204 (+0%)
Techinterview💎 Cheat sheet to prep for technical interviews.
Stars: ✭ 454 (+122.55%)
OmeglemiddlemanLets you connect strangers to each other, and intercept messages AKA Man in the Middle Attack
Stars: ✭ 85 (-58.33%)
PandocsThe infamous Pan Docs historical document: the single, most comprehensive Game Boy technical reference.
Stars: ✭ 158 (-22.55%)
FawkesFawkes is a tool to search for targets vulnerable to SQL Injection. Performs the search using Google search engine.
Stars: ✭ 108 (-47.06%)
Kubernetes GoatKubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
Stars: ✭ 868 (+325.49%)
Mecfor mass exploiting
Stars: ✭ 448 (+119.61%)
Jenkins ShellAutomating Jenkins Hacking using Shodan API
Stars: ✭ 84 (-58.82%)
Dns Rebind ToolkitA front-end JavaScript toolkit for creating DNS rebinding attacks.
Stars: ✭ 435 (+113.24%)
Reverse Shell Manager🔨 A multiple reverse shell session/client manager via terminal
Stars: ✭ 171 (-16.18%)
PossumbotA bot that will allow you to destroy discord servers.
Stars: ✭ 106 (-48.04%)
Defcon 2018DEFCON 2018 Qualification writeups
Stars: ✭ 12 (-94.12%)
HulkHULK DoS tool ported to Go with some additional features.
Stars: ✭ 427 (+109.31%)
Gitjacker🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (+512.25%)
DracnmapDracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+322.06%)
Hacker101Source code for Hacker101.com - a free online web and mobile security class.
Stars: ✭ 12,246 (+5902.94%)
Pyspark Cheatsheet🐍 Quick reference guide to common patterns & functions in PySpark.
Stars: ✭ 108 (-47.06%)
AnalysissummaryVorlesung Analysis für Informatiker WS16/17 an der TUM
Stars: ✭ 10 (-95.1%)
0x00sec codeCode for my 0x00sec.org posts
Stars: ✭ 190 (-6.86%)
Geo ReconAn OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts.
Stars: ✭ 82 (-59.8%)
Print My ShellPython script wrote to automate the process of generating various reverse shells.
Stars: ✭ 140 (-31.37%)
PhonesploitUsing open Adb ports we can exploit a Andriod Device
Stars: ✭ 854 (+318.63%)
ProdigymathgamehackingProdigy Hacking Organization: Hacking for the right reasons. | Questions? Ask on our Discord. https://discord.gg/XQDfbfq
Stars: ✭ 108 (-47.06%)
V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+315.2%)
Crazy WeekendMengobati rasa ingin tahu atau kadang hanya iseng
Stars: ✭ 9 (-95.59%)
SocialpwnedSocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and Twitter to find possible credentials leaks in PwnDB.
Stars: ✭ 104 (-49.02%)
Pwn jenkinsNotes about attacking Jenkins servers
Stars: ✭ 841 (+312.25%)