All Projects → Awesome Hacking → Similar Projects or Alternatives

1510 Open source projects that are alternatives of or similar to Awesome Hacking

Dirsearch
Web path scanner
Stars: ✭ 7,246 (-84.92%)
Pidrila
Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (-99.74%)
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-99.6%)
Awesome Hacking Resources
A collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (-76.13%)
Keye
Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-99.79%)
vaf
Vaf is a cross-platform very advanced and fast web fuzzer written in nim
Stars: ✭ 294 (-99.39%)
Sublert
Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (-98.54%)
Fdsploit
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (-99.59%)
Mutual labels:  hacking, penetration-testing, fuzzing
Infosec reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (-91.34%)
Netzob
Netzob: Protocol Reverse Engineering, Modeling and Fuzzing
Stars: ✭ 584 (-98.78%)
Mutual labels:  reverse-engineering, fuzzing
Phishing Frenzy
Ruby on Rails Phishing Framework
Stars: ✭ 643 (-98.66%)
Mutual labels:  hacking, penetration-testing
Textractor
Extracts text from video games and visual novels. Highly extensible.
Stars: ✭ 656 (-98.63%)
Mutual labels:  hacking, reverse-engineering
Oscp Prep
my oscp prep collection
Stars: ✭ 105 (-99.78%)
Mutual labels:  hacking, penetration-testing
Nishang
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: ✭ 5,943 (-87.63%)
Mutual labels:  hacking, penetration-testing
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (-98.68%)
Mutual labels:  hacking, penetration-testing
Ios Debug Hacks
🎯 Advanced debugging skills used in the iOS project development process, involves the dynamic debugging, static analysis and decompile of third-party libraries. iOS 项目开发过程中用到的高级调试技巧,涉及三方库动态调试、静态分析和反编译等领域
Stars: ✭ 595 (-98.76%)
Mutual labels:  hacking, reverse-engineering
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (-98.59%)
Mutual labels:  hacking, penetration-testing
Packer Fuzzer
Packer Fuzzer is a fast and efficient scanner for security detection of websites constructed by javascript module bundler such as Webpack.
Stars: ✭ 753 (-98.43%)
Mutual labels:  hacking, fuzzing
Interlace
Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (-98.42%)
Mutual labels:  hacking, penetration-testing
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (-97.1%)
Mutual labels:  hacking, penetration-testing
Swiftnessx
A cross-platform note-taking & target-tracking app for penetration testers.
Stars: ✭ 673 (-98.6%)
Mutual labels:  penetration-testing, bug-bounty
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (-98.4%)
Mutual labels:  hacking, penetration-testing
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (-83.86%)
Mutual labels:  hacking, penetration-testing
Hackingthe.cloud
Content for hackingthe.cloud
Stars: ✭ 101 (-99.79%)
Mutual labels:  hacking, penetration-testing
Reverse Engineering
This repository contains some of the executables that I've cracked.
Stars: ✭ 29 (-99.94%)
Mutual labels:  hacking, reverse-engineering
Baresifter
A bare-metal x86 instruction set fuzzer a la Sandsifter
Stars: ✭ 33 (-99.93%)
Mutual labels:  reverse-engineering, fuzzing
Ecommerce Website Security Checklist
List of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built into the Techinical Specific Document, or will be checked in the Security testing phases.
Stars: ✭ 98 (-99.8%)
Mutual labels:  hacking, bug-bounty
Payloadsallthethings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (-31.49%)
Mutual labels:  hacking, penetration-testing
Whonow
A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
Stars: ✭ 533 (-98.89%)
Mutual labels:  hacking, penetration-testing
Passphrase Wordlist
Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (-98.84%)
Mutual labels:  hacking, penetration-testing
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (-98.94%)
Mutual labels:  hacking, bug-bounty
Habu
Hacking Toolkit
Stars: ✭ 635 (-98.68%)
Mutual labels:  hacking, penetration-testing
Penetration Testing Tools
A collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (-98.72%)
Mutual labels:  hacking, penetration-testing
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads, it has fast performance.
Stars: ✭ 506 (-98.95%)
Mutual labels:  hacking, fuzzing
Brutal
Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (-98.59%)
Mutual labels:  hacking, penetration-testing
Chimay Red
Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-99.87%)
Mutual labels:  hacking, reverse-engineering
Resources For Beginner Bug Bounty Hunters
A list of resources for those interested in getting started in bug bounties
Stars: ✭ 7,185 (-85.04%)
Mutual labels:  hacking, bug-bounty
Spellbook
Micro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-99.89%)
Mutual labels:  hacking, bug-bounty
Givingstorm
Infection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-99.85%)
Mutual labels:  hacking, penetration-testing
Beef Over Wan
Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-99.83%)
Mutual labels:  hacking, penetration-testing
Pbtk
A toolset for reverse engineering and fuzzing Protobuf-based apps
Stars: ✭ 791 (-98.35%)
Mutual labels:  reverse-engineering, fuzzing
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (-98.41%)
Mutual labels:  hacking, penetration-testing
Scripts
Scripts I use during pentest engagements.
Stars: ✭ 834 (-98.26%)
Mutual labels:  hacking, penetration-testing
Linkedin2username
OSINT Tool: Generate username lists for companies on LinkedIn
Stars: ✭ 504 (-98.95%)
Mutual labels:  hacking, penetration-testing
Broxy
An HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (-98.1%)
Mutual labels:  hacking, penetration-testing
Androl4b
A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
Stars: ✭ 908 (-98.11%)
Reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (-97.97%)
Mutual labels:  hacking, fuzzing
Drv3 Tools
(Not actively maintained, use DRV3-Sharp) Tools for extracting and re-injecting files for Danganronpa V3 for PC.
Stars: ✭ 13 (-99.97%)
Mutual labels:  hacking, reverse-engineering
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-99.87%)
Mutual labels:  hacking, penetration-testing
Dll hook Rs
Rust code to show how hooking in rust with a dll works.
Stars: ✭ 57 (-99.88%)
Mutual labels:  hacking, reverse-engineering
Slides
won't maintain
Stars: ✭ 79 (-99.84%)
Mutual labels:  reverse-engineering, fuzzing
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (-98.19%)
Mutual labels:  hacking, penetration-testing
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-99.82%)
Mutual labels:  hacking, penetration-testing
Samsung Trustzone Research
Reverse-engineering tools and exploits for Samsung's implementation of TrustZone
Stars: ✭ 85 (-99.82%)
Mutual labels:  reverse-engineering, fuzzing
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (-97.36%)
Mutual labels:  hacking, reverse-engineering
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (-78.24%)
Mutual labels:  hacking, penetration-testing
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (-97.38%)
Mutual labels:  hacking, penetration-testing
Ble Security Attack Defence
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Stars: ✭ 88 (-99.82%)
Mutual labels:  hacking, fuzzing
Collection Document
Collection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (-97.11%)
Mutual labels:  hacking, bug-bounty
Cazador unr
Hacking tools
Stars: ✭ 95 (-99.8%)
Mutual labels:  hacking, fuzzing
1-60 of 1510 similar projects