UserFinderOSINT tool for finding profiles by username
Stars: ✭ 379 (+1014.71%)
PatatorPatator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
Stars: ✭ 2,792 (+8111.76%)
Recon RavenReconnaissance tool of Penetration test & Bug Bounty
Stars: ✭ 18 (-47.06%)
Tetra3dTetra3D is a 3D hybrid software/hardware renderer made for games written in Go with Ebitengine.
Stars: ✭ 271 (+697.06%)
BoopsuiteA Suite of Tools written in Python for wireless auditing and security testing.
Stars: ✭ 807 (+2273.53%)
RunascsRunasCs - Csharp and open version of windows builtin runas.exe
Stars: ✭ 216 (+535.29%)
Project BlackPentest/BugBounty progress control with scanning modules
Stars: ✭ 257 (+655.88%)
AlanFrameworkA C2 post-exploitation framework
Stars: ✭ 405 (+1091.18%)
InterlaceEasily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+2135.29%)
Oscp Cheat SheetThis is my OSCP cheat sheet made by combining a lot of different resources online with a little bit of tweaking. I used this cheat sheet during my exam (Fri, 13 Sep 2019) and during the labs. I can proudly say it helped me pass so I hope it can help you as well ! Good Luck and Try Harder
Stars: ✭ 216 (+535.29%)
SILVERDUMPA wrapping script to query the default password list maintained by cirn.net... << Thank them.
Stars: ✭ 24 (-29.41%)
HailScalable genomic data analysis.
Stars: ✭ 706 (+1976.47%)
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+20141.18%)
Capsulecorp PentestVagrant VirtualBox environment for conducting an internal network penetration test
Stars: ✭ 214 (+529.41%)
Powershell RatPython based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+1770.59%)
CarpunkThe CAN Injection Toolkit
Stars: ✭ 111 (+226.47%)
PixloadImage Payload Creating/Injecting tools
Stars: ✭ 586 (+1623.53%)
BerserkerA list of useful payloads for Web Application Security and Pentest/CTF
Stars: ✭ 212 (+523.53%)
Burpextension Whatsapp Decryption CheckpointThis tool was created during our research at Checkpoint Software Technologies on Whatsapp Protocol (This repository will be updated after BlackHat 2019)
Stars: ✭ 562 (+1552.94%)
BrutegramInstagram multi-bruteforce Platfrom
Stars: ✭ 183 (+438.24%)
Onexonex is a hacking tool installer and package manager for hackers. Onex is a library of all hacking tools for Termux and other Linux distributions. onex can install any third party tool or any hacking tool for you.
Stars: ✭ 537 (+1479.41%)
Ladon大型内网渗透扫描器&Cobalt Strike,Ladon8.9内置120个模块,包含信息收集/存活主机/端口扫描/服务识别/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010/SMBGhost/Weblogic/ActiveMQ/Tomcat/Struts2,密码口令爆破(Mysql/Oracle/MSSQL)/FTP/SSH(Linux)/VNC/Windows(IPC/WMI/SMB/Netbios/LDAP/SmbHash/WmiHash/Winrm),远程执行命令(smbexec/wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0
Stars: ✭ 2,911 (+8461.76%)
malleable.systemsWebsite for the malleable systems and software community
Stars: ✭ 49 (+44.12%)
FedyFedy makes it easy to install third-party software in Fedora.
Stars: ✭ 622 (+1729.41%)
Hacking Tools RepositoryA list of security/hacking tools that have been collected from the internet. Suggestions are welcomed.
Stars: ✭ 448 (+1217.65%)
WsuspenduImplement WSUSpendu attack
Stars: ✭ 191 (+461.76%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+1155.88%)
NTPDoserNTP Doser is a NTP Amplification DoS/DDoS attack tool for penttesting
Stars: ✭ 96 (+182.35%)
Emp3r0rlinux post-exploitation framework made by linux user
Stars: ✭ 419 (+1132.35%)
DebinjectInject malicious code into *.debs
Stars: ✭ 187 (+450%)
HellraiserVulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (+1114.71%)
usefuluseful pentest note
Stars: ✭ 59 (+73.53%)
ParadoxiaratParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (+1061.76%)
Poet[unmaintained] Post-exploitation tool
Stars: ✭ 184 (+441.18%)
Cerberus一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能
Stars: ✭ 389 (+1044.12%)
rockstar-cliBecome a Github Rockstar in less than 10 seconds
Stars: ✭ 18 (-47.06%)
MaskphishGive a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
Stars: ✭ 370 (+988.24%)
EnigmaMultiplatform payload dropper
Stars: ✭ 180 (+429.41%)
ChromepassChromepass - Hacking Chrome Saved Passwords
Stars: ✭ 364 (+970.59%)
schemaorgpython functions for applied use of schema.org
Stars: ✭ 25 (-26.47%)
TaipanWeb application vulnerability scanner
Stars: ✭ 359 (+955.88%)
TuktukTool for catching and logging different types of requests.
Stars: ✭ 174 (+411.76%)
fleexFleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.
Stars: ✭ 181 (+432.35%)
AzureAD Autologon BruteBrute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-active-directory-password-brute-forcing-flaw-has-no-fix/
Stars: ✭ 90 (+164.71%)
McubootSecure boot for 32-bit Microcontrollers!
Stars: ✭ 572 (+1582.35%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (+79.41%)
FilemastaA search application to explore, discover and share online files
Stars: ✭ 571 (+1579.41%)
fluxionWiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)
Stars: ✭ 115 (+238.24%)
imeals-projectiMeals is a Open Source Restaurant Software for Food Delivery and Restaurant Management
Stars: ✭ 31 (-8.82%)
GurpBurp Commander written in Go
Stars: ✭ 56 (+64.71%)
nero-phishing-serverAn full HTTP server for Phishing. Downloads recursively the entire webpage.
Stars: ✭ 108 (+217.65%)
TokenBreakerJSON RSA to HMAC and None Algorithm Vulnerability POC
Stars: ✭ 51 (+50%)