PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+602.96%)
T14m4tAutomated brute-forcing attack tool.
Stars: ✭ 160 (-5.33%)
KarmaFind leaked emails with your passwords
Stars: ✭ 154 (-8.88%)
Movies For Hackers🎬 A curated list of movies every hacker & cyberpunk must watch.
Stars: ✭ 8,884 (+5156.8%)
Awesome Cybersecurity Blueteam💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Stars: ✭ 2,091 (+1137.28%)
Mobile Security Framework MobsfMobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
Stars: ✭ 10,212 (+5942.6%)
SubjackSubdomain Takeover tool written in Go
Stars: ✭ 1,194 (+606.51%)
SeginfofaqFAQ del mundo de la seguridad informática en español.
Stars: ✭ 73 (-56.8%)
EnteletaorMessage Queue & Broker Injection tool
Stars: ✭ 139 (-17.75%)
QuickxssAutomating XSS using Bash
Stars: ✭ 113 (-33.14%)
Ioc ExplorerExplore Indicators of Compromise Automatically
Stars: ✭ 73 (-56.8%)
BucketlistAmazon S3 bucket spelunking!
Stars: ✭ 72 (-57.4%)
Mitmap📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+802.96%)
SandmapNmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (+598.22%)
Lor Axe🪓 a multi-threaded, low-bandwidth HTTP DOS tool
Stars: ✭ 72 (-57.4%)
Termux OsAll in One Termux Os..!! (New)
Stars: ✭ 150 (-11.24%)
OnionsearchOnionSearch is a script that scrapes urls on different .onion search engines.
Stars: ✭ 135 (-20.12%)
Attack Control Framework MappingsSecurity control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
Stars: ✭ 115 (-31.95%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-57.4%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-59.17%)
Chaos🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Stars: ✭ 1,168 (+591.12%)
GxssA tool to check a bunch of URLs that contain reflecting params.
Stars: ✭ 115 (-31.95%)
Netmap.jsFast browser-based network discovery module
Stars: ✭ 70 (-58.58%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (+586.39%)
Dns DiscoveryDNS-Discovery is a multithreaded subdomain bruteforcer.
Stars: ✭ 114 (-32.54%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+584.62%)
AboutsecurityA list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-1.78%)
PillagerPillage filesystems for sensitive information with Go.
Stars: ✭ 64 (-62.13%)
Jira ScanCVE-2017-9506 - SSRF
Stars: ✭ 159 (-5.92%)
Sherlock JsFind usernames across over 170 social networks - Fast & flexible remake of sdushantha/sherlock
Stars: ✭ 153 (-9.47%)
Personal Security Checklist🔒 A curated checklist of 300+ tips for protecting digital security and privacy in 2021
Stars: ✭ 2,388 (+1313.02%)
Awesome HackingAwesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+966.27%)
Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (-60.36%)
ExploHuman and machine readable web vulnerability testing format
Stars: ✭ 114 (-32.54%)
VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+5133.14%)
ReconcatA small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any year or complete list of all years possible. Made Specially for penetration testing purpose.
Stars: ✭ 66 (-60.95%)
NetwormPython network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-20.12%)
ShurikenCross-Site Scripting (XSS) command line tool for testing lists of XSS payloads on web apps.
Stars: ✭ 114 (-32.54%)
B1tifissh management tool to provides commandline access to a remote system running SSH server
Stars: ✭ 65 (-61.54%)
Rhme 2017Riscure Hack Me embedded hardware CTF 2017-2018.
Stars: ✭ 65 (-61.54%)
Burp Send ToAdds a customizable "Send to..."-context-menu to your BurpSuite.
Stars: ✭ 114 (-32.54%)
XshockXSHOCK Shellshock Exploit
Stars: ✭ 65 (-61.54%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+572.19%)
Tlosint LiveTrace Labs OSINT Linux Distribution based on Kali.
Stars: ✭ 151 (-10.65%)
OpenvehiclediagA rust based cross-platform ECU diagnostics and car hacking application, utilizing the passthru protocol
Stars: ✭ 135 (-20.12%)
Linux Smart EnumerationLinux enumeration tool for pentesting and CTFs with verbosity levels
Stars: ✭ 1,956 (+1057.4%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+569.82%)
Blackhat Python3Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 1,125 (+565.68%)
TinfoleakThe most complete open-source tool for Twitter intelligence analysis
Stars: ✭ 1,593 (+842.6%)
Robust Adv Malware DetectionCode repository for the paper "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware"
Stars: ✭ 63 (-62.72%)
Knowledge Basepdf,txt,djvu, various useful books
Stars: ✭ 63 (-62.72%)
PasktoPaskto - Passive Web Scanner
Stars: ✭ 136 (-19.53%)
BrutemapLet's find someone's account
Stars: ✭ 113 (-33.14%)
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-62.72%)
BulwarkAn organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
Stars: ✭ 113 (-33.14%)
MetaforgeAn OSINT Metadata analyzing tool that filters through tags and creates reports
Stars: ✭ 63 (-62.72%)
Zeebsploitweb scanner - exploitation - information gathering
Stars: ✭ 159 (-5.92%)
ApkleaksScanning APK file for URIs, endpoints & secrets.
Stars: ✭ 2,707 (+1501.78%)
ReconnoitreA security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+979.29%)