V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+317.24%)
Termux OsAll in One Termux Os..!! (New)
Stars: ✭ 150 (-26.11%)
Pwn jenkinsNotes about attacking Jenkins servers
Stars: ✭ 841 (+314.29%)
Awesome HackingA collection of various awesome lists for hackers, pentesters and security researchers
Stars: ✭ 48,038 (+23564.04%)
Hg8045qPwning the Nuro issued Huawei HG8045Q
Stars: ✭ 107 (-47.29%)
BrutusA Python-powered exploitation framework and botnet.
Stars: ✭ 17 (-91.63%)
NetpwnTool made to automate tasks of pentesting.
Stars: ✭ 152 (-25.12%)
ScriptsScripts I use during pentest engagements.
Stars: ✭ 834 (+310.84%)
Linsetmv1 2Linset is a WPA/WPA2 phishing tool (evil twin)
Stars: ✭ 105 (-48.28%)
Sniff ProbesPlug-and-play bash script for sniffing 802.11 probes requests 👃
Stars: ✭ 200 (-1.48%)
Oscp Prepmy oscp prep collection
Stars: ✭ 105 (-48.28%)
Zynix Fusionzynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
Stars: ✭ 84 (-58.62%)
Gitjacker🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (+515.27%)
PrivescA collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+287.19%)
InstahackBest Tool For instagram bruteforce hacking Tool By EvilDevil
Stars: ✭ 139 (-31.53%)
Hacker ContainerContainer with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-48.28%)
BbreconPython library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-16.75%)
Geo ReconAn OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts.
Stars: ✭ 82 (-59.61%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-61.08%)
JsshellJSshell - JavaScript reverse/remote shell
Stars: ✭ 167 (-17.73%)
IntelspyPerform automated network reconnaissance scans
Stars: ✭ 134 (-33.99%)
Webhackersweapons⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 1,205 (+493.6%)
0x00sec codeCode for my 0x00sec.org posts
Stars: ✭ 190 (-6.4%)
Naive HashcatCrack password hashes without the fuss 🐈
Stars: ✭ 726 (+257.64%)
Hackerone LessonsTranscribed video lessons of HackerOne to pdf's
Stars: ✭ 101 (-50.25%)
GithacktoolsThe best Hacking and PenTesting tools installer on the world
Stars: ✭ 78 (-61.58%)
AdbsploitA python based tool for exploiting and managing Android devices via ADB
Stars: ✭ 147 (-27.59%)
SublertSublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (+244.33%)
BettercapThe Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Stars: ✭ 10,735 (+5188.18%)
Antiddos System🛡️⚔️ Protect your web app from DDOS attack or the Dead Ping + CAPTCHA VERIFICATION in one line!
Stars: ✭ 173 (-14.78%)
Dymerge🔓 A dynamic dictionary merger for successful dictionary based attacks.
Stars: ✭ 167 (-17.73%)
YsfYSF Server Functions
Stars: ✭ 77 (-62.07%)
Griefing MethodsA documentation about how to hack Minecraft servers
Stars: ✭ 76 (-62.56%)
WpscanWPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites.
Stars: ✭ 6,244 (+2975.86%)
Burp Bounty ProfilesBurp Bounty profiles compilation, feel free to contribute!
Stars: ✭ 76 (-62.56%)
AhridAHRID - Analysis Hacker's Real-ID Platform 黑客攻击画像分析系统(停止运营)
Stars: ✭ 133 (-34.48%)
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+485.22%)
Security whitepapersCollection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQLi
Stars: ✭ 644 (+217.24%)
Dark FbHack Facebook
Stars: ✭ 98 (-51.72%)
N00bratRemote Administration Toolkit (or Trojan) for POSiX (Linux/Unix) system working as a Web Service
Stars: ✭ 148 (-27.09%)
NsablocklistHOSTS file and research project to block all known NSA / GCHQ / C.I.A. / F.B.I. spying server
Stars: ✭ 630 (+210.34%)
Aura BotnetA super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Bash, and Powershell.
Stars: ✭ 95 (-53.2%)
Penetration Testing ToolsA collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (+202.46%)
Python ScriptsCollection of Various Python Script's.💻
Stars: ✭ 195 (-3.94%)
HackercouchHospitality for Hackers
Stars: ✭ 185 (-8.87%)
AboutsecurityA list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-18.23%)
Blackphish🔱 [ Phishing Made Easy ] 🔱 (In Beta)
Stars: ✭ 133 (-34.48%)
Movies For Hackers🎬 A curated list of movies every hacker & cyberpunk must watch.
Stars: ✭ 8,884 (+4276.35%)
SeginfofaqFAQ del mundo de la seguridad informática en español.
Stars: ✭ 73 (-64.04%)
Wpscan V3THIS REPOSITORY HAS BEEN MOVED TO https://github.com/wpscanteam/wpscan USE THAT!!!
Stars: ✭ 132 (-34.98%)
DeadtrapAn OSINT tool to gather information about the real owner of a phone number
Stars: ✭ 73 (-64.04%)
HydrafwHydraFW official firmware for HydraBus/HydraNFC for researcher, hackers, students, embedded software developers or anyone interested in debugging/hacking/developing/penetration testing
Stars: ✭ 165 (-18.72%)