DracnmapDracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+2432.35%)
TorbotDark Web OSINT Tool
Stars: ✭ 821 (+2314.71%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+2147.06%)
BitsA bite sized library for dealing with bytes.
Stars: ✭ 16 (-52.94%)
Drv3 Tools(Not actively maintained, use DRV3-Sharp) Tools for extracting and re-injecting files for Danganronpa V3 for PC.
Stars: ✭ 13 (-61.76%)
Androidsdk🐳 Full-fledged Android SDK Docker Image
Stars: ✭ 776 (+2182.35%)
Pwn jenkinsNotes about attacking Jenkins servers
Stars: ✭ 841 (+2373.53%)
Packer FuzzerPacker Fuzzer is a fast and efficient scanner for security detection of websites constructed by javascript module bundler such as Webpack.
Stars: ✭ 753 (+2114.71%)
Naive HashcatCrack password hashes without the fuss 🐈
Stars: ✭ 726 (+2035.29%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+2538.24%)
ScriptsScripts I use during pentest engagements.
Stars: ✭ 834 (+2352.94%)
SpeedhackSpeedhack coded in C++, inspired by Cheat Engine's own speedhack.
Stars: ✭ 29 (-14.71%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+22700%)
Kubernetes GoatKubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
Stars: ✭ 868 (+2452.94%)
TrapePeople tracker on the Internet: OSINT analysis and research tool by Jose Pino
Stars: ✭ 6,753 (+19761.76%)
HammingHamming distance and bit counting primitives in Go (golang)
Stars: ✭ 30 (-11.76%)
InterlaceEasily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+2135.29%)
V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+2391.18%)
Ics Security ToolsTools, tips, tricks, and more for exploring ICS Security.
Stars: ✭ 749 (+2102.94%)
TaikTool hack Dark FB tanpa lisensi
Stars: ✭ 21 (-38.24%)
HackingtoolALL IN ONE Hacking Tool For Hackers
Stars: ✭ 7,521 (+22020.59%)
ChronicelOur super sweet hacker management system, built for HackTCNJ 2017+ | Used by [email protected] 2018!
Stars: ✭ 18 (-47.06%)
Risa simple cross-platform resource compiler for c++ projects
Stars: ✭ 15 (-55.88%)
Jsql InjectionjSQL Injection is a Java application for automatic SQL database injection.
Stars: ✭ 891 (+2520.59%)
Reverse EngineeringThis repository contains some of the executables that I've cracked.
Stars: ✭ 29 (-14.71%)
Binary.dartUtilities for working with binary data and bit manipulation in Dart.
Stars: ✭ 16 (-52.94%)
Awesome HackingA curated list of awesome Hacking tutorials, tools and resources
Stars: ✭ 7,756 (+22711.76%)
Ciphey⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Stars: ✭ 9,116 (+26711.76%)
FiercephishFiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.
Stars: ✭ 960 (+2723.53%)
Pi Pwnbox RogueapHomemade Pwnbox 🚀 / Rogue AP 📡 based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap 💡
Stars: ✭ 798 (+2247.06%)
PrivescA collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+2211.76%)
Tic TacClient not paid ? This is the solution of your problem
Stars: ✭ 29 (-14.71%)
SimplyemailEmail recon made fast and easy, with a framework to build on
Stars: ✭ 779 (+2191.18%)
ShuffleWebShell Backdoor Framework
Stars: ✭ 11 (-67.65%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+2179.41%)
Badusb botnet👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-5.88%)
VhostscanA virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+2155.88%)
PhonesploitUsing open Adb ports we can exploit a Andriod Device
Stars: ✭ 854 (+2411.76%)
CatchmeCatchME - WiFi Fun Box "Having Fun with ESP8266"
Stars: ✭ 28 (-17.65%)
Crazy WeekendMengobati rasa ingin tahu atau kadang hanya iseng
Stars: ✭ 9 (-73.53%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+2032.35%)
PxenumA shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-11.76%)
Php BitmapBitmap representation with bitwise operations
Stars: ✭ 7 (-79.41%)
Lambda PackagesVarious popular python libraries, pre-compiled to be compatible with AWS Lambda
Stars: ✭ 713 (+1997.06%)
WsshWSSH Is a tool for brute forcing servers that has port 22 open via ssh, wssh is probably the fastest ssh brute forcer available
Stars: ✭ 21 (-38.24%)
ScodecScala combinator library for working with binary data
Stars: ✭ 709 (+1985.29%)
Frostyserialize native Nim types to strings, streams, or sockets ⛄
Stars: ✭ 25 (-26.47%)
Spytrojan keylogger[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-5.88%)
GoridgeHigh-performance PHP-to-Golang IPC bridge
Stars: ✭ 950 (+2694.12%)
BroxyAn HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (+2582.35%)