CatnipCat-Nip Automated Basic Pentest Tool - Designed For Kali Linux
Stars: ✭ 108 (-95.79%)
TcpproxyIntercepting TCP proxy to modify raw TCP streams using modules on incoming or outgoing traffic
Stars: ✭ 176 (-93.14%)
PythonPython cheatsheet
Stars: ✭ 25 (-99.03%)
Awesome HackingA collection of various awesome lists for hackers, pentesters and security researchers
Stars: ✭ 48,038 (+1772.1%)
ChangemeA default credential scanner.
Stars: ✭ 928 (-63.83%)
Ds CheatsheetsList of Data Science Cheatsheets to rule the world
Stars: ✭ 9,452 (+268.36%)
Evil WinrmThe ultimate WinRM shell for hacking/pentesting
Stars: ✭ 2,251 (-12.28%)
Apache Spark Hands OnEducational notes,Hands on problems w/ solutions for hadoop ecosystem
Stars: ✭ 74 (-97.12%)
OwtfOffensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.org https://twitter.com/owtfp
Stars: ✭ 1,516 (-40.92%)
Cheat SheetsCheat sheets for various stuff
Stars: ✭ 201 (-92.17%)
BrutusA Python-powered exploitation framework and botnet.
Stars: ✭ 17 (-99.34%)
VuldashVulnerability Dashboard
Stars: ✭ 16 (-99.38%)
Punk.pyunix SSH post-exploitation 1337 tool
Stars: ✭ 107 (-95.83%)
Python CheatsheetCollection of Python code snippets and cheatsheets (made for humans)
Stars: ✭ 176 (-93.14%)
Poet[unmaintained] Post-exploitation tool
Stars: ✭ 184 (-92.83%)
Zap CliA simple tool for interacting with OWASP ZAP from the commandline.
Stars: ✭ 166 (-93.53%)
ColorsList of 256 color codes for Xterm including an example of the color, Xterm Name, Xterm Number, HEX, RGB and HSL code.
Stars: ✭ 73 (-97.16%)
1earn个人维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 776 (-69.76%)
DocsOpenBMC Documentation
Stars: ✭ 105 (-95.91%)
Privilege EscalationThis cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Stars: ✭ 2,117 (-17.5%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (-70.23%)
Hacker ContainerContainer with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-95.91%)
SpoilerwallSpoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!
Stars: ✭ 754 (-70.62%)
PhpvulnAudit tool to find common vulnerabilities in PHP source code
Stars: ✭ 146 (-94.31%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (-71.75%)
VailynA phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-95.99%)
HtshellsSelf contained htaccess shells and attacks
Stars: ✭ 708 (-72.41%)
Security ScriptsA collection of public offensive and defensive security related scripts for InfoSec students.
Stars: ✭ 101 (-96.06%)
Cloudflair🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.
Stars: ✭ 1,176 (-54.17%)
Py2rsA quick reference guide for the Pythonista in the process of becoming a Rustacean
Stars: ✭ 690 (-73.11%)
WsmanagerWebshell Manager
Stars: ✭ 99 (-96.14%)
BrutalPayload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (-73.58%)
Awesome BbhtA bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-92.6%)
DirsearchWeb path scanner
Stars: ✭ 7,246 (+182.39%)
YamsA collection of Ansible roles for automating infosec builds.
Stars: ✭ 98 (-96.18%)
SwiftnessxA cross-platform note-taking & target-tracking app for penetration testers.
Stars: ✭ 673 (-73.77%)
FuseA penetration testing tool for finding file upload bugs (NDSS 2020)
Stars: ✭ 147 (-94.27%)
EvilurlGenerate unicode evil domains for IDN Homograph Attack and detect them.
Stars: ✭ 654 (-74.51%)
VsauditVOIP Security Audit Framework
Stars: ✭ 97 (-96.22%)
RecsechRecsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected, Subdomain takeovers, Reconnaissance On Github and much more you can see in Features in tools .
Stars: ✭ 173 (-93.26%)
PentaOpen source all-in-one CLI tool to semi-automate pentesting.
Stars: ✭ 130 (-94.93%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-97.19%)
GirshAutomatically spawn a reverse shell fully interactive for Linux or Windows victim
Stars: ✭ 66 (-97.43%)
How📝 Impressive Linux commands cheat sheet (Python).
Stars: ✭ 69 (-97.31%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (-54.79%)
Red Team Curation ListA list to discover work of red team tooling and methodology for penetration testing and security assessment
Stars: ✭ 68 (-97.35%)
Insanity FrameworkGenerate Payloads and Control Remote Machines. [Discontinued]
Stars: ✭ 189 (-92.63%)