Jok3rJok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (+1333.33%)
ChangemeA default credential scanner.
Stars: ✭ 928 (+1962.22%)
PowerexploitPost-Exploitation 😎 module for Penetration Tester and Hackers.
Stars: ✭ 26 (-42.22%)
ArchstrikeAn Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (+791.11%)
Searpy🥀 Search Engine Tookit,URL采集、Favicon哈希值查找真实IP、子域名查找
Stars: ✭ 104 (+131.11%)
Powershell RatPython based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+1313.33%)
VulWebajuVulWebaju is a platform that automates setting up your pen-testing environment for learning purposes.
Stars: ✭ 53 (+17.78%)
GdogA fully featured Windows backdoor that uses Gmail as a C&C server
Stars: ✭ 399 (+786.67%)
Awesome Windows Red Team A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams
Stars: ✭ 308 (+584.44%)
RedcloudAutomated Red Team Infrastructure deployement using Docker
Stars: ✭ 551 (+1124.44%)
Ctf NotesEverything needed for doing CTFs
Stars: ✭ 304 (+575.56%)
PhirauteeA proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
Stars: ✭ 96 (+113.33%)
rsmReverse shell manager using tmux and ncat
Stars: ✭ 29 (-35.56%)
Scanlessonline port scan scraper
Stars: ✭ 875 (+1844.44%)
VhostscanA virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+1604.44%)
BadintentIntercept, modify, repeat and attack Android's Binder transactions using Burp Suite
Stars: ✭ 303 (+573.33%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (+66.67%)
GhostwriterThe SpecterOps project management and reporting engine
Stars: ✭ 394 (+775.56%)
iSecureOSAn iOS Security assessment app for jailbroken iOS Devices.
Stars: ✭ 111 (+146.67%)
WebkillerTool Information Gathering Write By Python.
Stars: ✭ 300 (+566.67%)
oscp-omnibusA collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (+2.22%)
InterlaceEasily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+1588.89%)
CcatCloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Stars: ✭ 300 (+566.67%)
SonarsearchA MongoDB importer and API for Project Sonars DNS datasets
Stars: ✭ 297 (+560%)
BroxyAn HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (+1926.67%)
dwnd(ockerp)wn - a docker pwn tool manager
Stars: ✭ 154 (+242.22%)
spellbookFramework for rapid development and reusable of security tools
Stars: ✭ 67 (+48.89%)
ConstoleScan for and exploit Consul agents
Stars: ✭ 37 (-17.78%)
BusterAn advanced tool for email reconnaissance
Stars: ✭ 387 (+760%)
MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (+762.22%)
BrutusA Python-powered exploitation framework and botnet.
Stars: ✭ 17 (-62.22%)
GadgetprobeProbe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.
Stars: ✭ 381 (+746.67%)
hack-scriptsscripts to setup pentesting system and use during pentest
Stars: ✭ 16 (-64.44%)
Penetration Testing ToolsA collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (+1264.44%)
docusAndroid application for scanning and managing documents.
Stars: ✭ 39 (-13.33%)
IMAPLoginTesterA simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by trying to login on IMAP servers.
Stars: ✭ 47 (+4.44%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+2142.22%)
NightingaleIt's a Docker Environment for pentesting which having all the required tool for VAPT.
Stars: ✭ 119 (+164.44%)
Kalirouterintercepting kali router
Stars: ✭ 374 (+731.11%)
Pwdlyser-CLIPython-based CLI Password Analyser (Reporting Tool)
Stars: ✭ 29 (-35.56%)
BeeloggerGenerate Gmail Emailing Keyloggers to Windows.
Stars: ✭ 605 (+1244.44%)
Rustscan🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+11495.56%)
Teamviewer permissions hook v1A proof of concept injectable C++ dll, that uses naked inline hooking and direct memory modification to change your TeamViewer permissions.
Stars: ✭ 297 (+560%)
BlackmambaC2/post-exploitation framework
Stars: ✭ 544 (+1108.89%)
NugetdefenseAn MSBuildTask that checks for known vulnerabilities. Inspired by OWASP SafeNuGet.
Stars: ✭ 44 (-2.22%)
Eyes👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?" 🔍 🕵️
Stars: ✭ 38 (-15.56%)
WhonowA "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
Stars: ✭ 533 (+1084.44%)
Dnscat2 PowershellA Powershell client for dnscat2, an encrypted DNS command and control tool.
Stars: ✭ 295 (+555.56%)
Cheatsheet GodPenetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+7724.44%)
BurpsuitehttpsmugglerA Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques
Stars: ✭ 529 (+1075.56%)