Offensive DockerOffensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-39.71%)
NullinuxInternal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB.
Stars: ✭ 451 (-17.1%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (-12.13%)
Cookie crimesRead local Chrome cookies without root or decrypting
Stars: ✭ 434 (-20.22%)
kumasia./kumasia php simple backdoor
Stars: ✭ 13 (-97.61%)
IoxTool for port forwarding & intranet proxy
Stars: ✭ 411 (-24.45%)
organonThis program focuses on automating the download, installation and compilation of pentest tools from source
Stars: ✭ 36 (-93.38%)
Red Teaming ToolkitThis repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Stars: ✭ 5,615 (+932.17%)
paradoxiaRATParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 583 (+7.17%)
EastExploits and Security Tools Framework 2.0.1
Stars: ✭ 283 (-47.98%)
Searpy🥀 Search Engine Tookit,URL采集、Favicon哈希值查找真实IP、子域名查找
Stars: ✭ 104 (-80.88%)
Cerberus一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能
Stars: ✭ 389 (-28.49%)
LazyreconAn automated approach to performing recon for bug bounty hunting and penetration testing.
Stars: ✭ 282 (-48.16%)
LiquidSnakeLiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript
Stars: ✭ 266 (-51.1%)
ModlishkaModlishka. Reverse Proxy.
Stars: ✭ 3,634 (+568.01%)
VanquishVanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Stars: ✭ 449 (-17.46%)
PhirauteeA proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
Stars: ✭ 96 (-82.35%)
modern-loginA simple login form built with PyQt 5
Stars: ✭ 35 (-93.57%)
Censys Subdomain Finder⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.
Stars: ✭ 402 (-26.1%)
MimipenguinA tool to dump the login password from the current linux user
Stars: ✭ 3,151 (+479.23%)
Findom XssA fast DOM based XSS vulnerability scanner with simplicity.
Stars: ✭ 310 (-43.01%)
FireelffireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (-20.04%)
Race The WebTests for race conditions in web applications. Includes a RESTful API to integrate into a continuous integration pipeline.
Stars: ✭ 385 (-29.23%)
GocaGoca Scanner
Stars: ✭ 281 (-48.35%)
wavebin∿ Oscilloscope waveform capture viewer and converter.
Stars: ✭ 31 (-94.3%)
GdogA fully featured Windows backdoor that uses Gmail as a C&C server
Stars: ✭ 399 (-26.65%)
ProwlerProwler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+738.42%)
HershellHershell is a simple TCP reverse shell written in Go.
Stars: ✭ 442 (-18.75%)
oscp-omnibusA collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (-91.54%)
PolichombrCollaborative malware analysis framework
Stars: ✭ 307 (-43.57%)
dwnd(ockerp)wn - a docker pwn tool manager
Stars: ✭ 154 (-71.69%)
Pyfladeskcreate desktop application by using Flask and QtWebKit
Stars: ✭ 399 (-26.65%)
log4j-detectorLog4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!
Stars: ✭ 622 (+14.34%)
Ethereum ListsA repository for maintaining lists of things like malicious URLs, fake token addresses, and so forth. We love lists.
Stars: ✭ 300 (-44.85%)
ConstoleScan for and exploit Consul agents
Stars: ✭ 37 (-93.2%)
Npq🎖safely* install packages with npm or yarn by auditing them as part of your install process
Stars: ✭ 513 (-5.7%)
GurpBurp Commander written in Go
Stars: ✭ 56 (-89.71%)
hack-scriptsscripts to setup pentesting system and use during pentest
Stars: ✭ 16 (-97.06%)
ParadoxiaratParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (-27.39%)
transportc2PoC Command and Control Server. Interact with clients through a private web interface, add new users for team sharing and more.
Stars: ✭ 22 (-95.96%)
SalusSecurity scanner coordinator
Stars: ✭ 441 (-18.93%)
CloudfruntA tool for identifying misconfigured CloudFront domains
Stars: ✭ 281 (-48.35%)
SecurecodeboxsecureCodeBox (SCB) - continuous secure delivery out of the box
Stars: ✭ 279 (-48.71%)
Okadminfinder3[ Admin panel finder / Admin Login Page Finder ] ¢σ∂є∂ ву 👻 (❤-❤) 👻
Stars: ✭ 279 (-48.71%)
Gtfobins.github.ioGTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+1008.46%)
GraphqlmapGraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes.
Stars: ✭ 434 (-20.22%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-29.78%)
Kube Psp AdvisorHelp building an adaptive and fine-grained pod security policy
Stars: ✭ 280 (-48.53%)
DgfraudA Deep Graph-based Toolbox for Fraud Detection
Stars: ✭ 281 (-48.35%)
Fwanalyzera tool to analyze filesystem images for security
Stars: ✭ 382 (-29.78%)