crawleetWeb Recon & Exploitation Tool.
Stars: ✭ 48 (-32.39%)
Awesome BbhtA bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (+167.61%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+10818.31%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+25.35%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (+77.46%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+1321.13%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+1163.38%)
DevBrute-A Password Brute ForcerDevBrute is a Password Brute Forcer, It can Brute Force almost all Social Media Accounts or Any Web Application.
Stars: ✭ 91 (+28.17%)
Deep-InsideCommand line tool that allows you to explore IoT devices by using Shodan API.
Stars: ✭ 22 (-69.01%)
BrambleBramble is a hacking Open source suite.
Stars: ✭ 60 (-15.49%)
Recon RavenReconnaissance tool of Penetration test & Bug Bounty
Stars: ✭ 18 (-74.65%)
BrutusA Python-powered exploitation framework and botnet.
Stars: ✭ 17 (-76.06%)
AtscanAdvanced dork Search & Mass Exploit Scanner
Stars: ✭ 817 (+1050.7%)
Kill RouterFerramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-19.72%)
BoopsuiteA Suite of Tools written in Python for wireless auditing and security testing.
Stars: ✭ 807 (+1036.62%)
Shellen🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (+1025.35%)
Swift KeyloggerKeylogger for mac written in Swift using HID
Stars: ✭ 995 (+1301.41%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+991.55%)
VhostscanA virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+980.28%)
XshockXSHOCK Shellshock Exploit
Stars: ✭ 65 (-8.45%)
Project TauroA Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-26.76%)
PysploitRemote exploitation framework written in Python
Stars: ✭ 37 (-47.89%)
Bayonetbayonet是一款src资产管理系统,从子域名、端口服务、漏洞、爬虫等一体化的资产管理系统
Stars: ✭ 925 (+1202.82%)
Cfw2ofw HelperProviding aid in converting video games.
Stars: ✭ 44 (-38.03%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+921.13%)
InfogaInfoga - Email OSINT
Stars: ✭ 947 (+1233.8%)
Paper collectionAcademic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
Stars: ✭ 710 (+900%)
Fsocietyfsociety Hacking Tools Pack – A Penetration Testing Framework
Stars: ✭ 7,224 (+10074.65%)
Sdwan Harvester🌐 Automatically enumerate and fingerprint SD-WAN nodes on the internet
Stars: ✭ 42 (-40.85%)
WindowsAwesome tools to exploit Windows !
Stars: ✭ 816 (+1049.3%)
PixiewpsAn offline Wi-Fi Protected Setup brute-force utility
Stars: ✭ 1,149 (+1518.31%)
FoxpwnExploit code for CVE-2016-9066
Stars: ✭ 39 (-45.07%)
TrapePeople tracker on the Internet: OSINT analysis and research tool by Jose Pino
Stars: ✭ 6,753 (+9411.27%)
MhddosBest DDoS Attack Script Python3, Cyber Attack With 36 Method
Stars: ✭ 55 (-22.54%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+976.06%)
InterlaceEasily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+970.42%)
PwinSecurity Evaluation of Dynamic Binary Instrumentation Engines
Stars: ✭ 70 (-1.41%)
BinexpLinux Binary Exploitation
Stars: ✭ 742 (+945.07%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (+925.35%)
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-28.17%)
SkyratSkyRAT - Powershell Remote Administration Tool
Stars: ✭ 21 (-70.42%)
My Shodan ScriptsCollection of Scripts for shodan searching stuff.
Stars: ✭ 679 (+856.34%)
Lockdoor Framework🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+853.52%)
DirsearchWeb path scanner
Stars: ✭ 7,246 (+10105.63%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+1500%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+12549.3%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+1133.8%)
WpscanWPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites.
Stars: ✭ 6,244 (+8694.37%)
Exploit WriteupsA collection where my current and future writeups for exploits/CTF will go
Stars: ✭ 676 (+852.11%)
RizinUNIX-like reverse engineering framework and command-line toolset.
Stars: ✭ 673 (+847.89%)
Exploit meVery vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
Stars: ✭ 665 (+836.62%)
Binary ExploitationGood to know, easy to forget information about binaries and their exploitation!
Stars: ✭ 47 (-33.8%)
ShuffleWebShell Backdoor Framework
Stars: ✭ 11 (-84.51%)
Jok3rJok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (+808.45%)