HershellHershell is a simple TCP reverse shell written in Go.
Stars: ✭ 442 (-40.43%)
GorshA Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
Stars: ✭ 97 (-86.93%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-94.88%)
1earnffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+400.67%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-91.78%)
MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (-47.71%)
WsmanagerWebshell Manager
Stars: ✭ 99 (-86.66%)
SnoopSnoop — инструмент разведки на основе открытых данных (OSINT world)
Stars: ✭ 886 (+19.41%)
GirshAutomatically spawn a reverse shell fully interactive for Linux or Windows victim
Stars: ✭ 66 (-91.11%)
AboutsecurityA list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-77.63%)
IosMost usable tools for iOS penetration testing
Stars: ✭ 563 (-24.12%)
AsnlookupLeverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-78.03%)
NishangNishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: ✭ 5,943 (+700.94%)
sx🖖 Fast, modern, easy-to-use network scanner
Stars: ✭ 1,267 (+70.75%)
tugareconPentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (-80.86%)
LAZYPARIAHA tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (-83.69%)
dummyDLLUtility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.
Stars: ✭ 35 (-95.28%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-89.35%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (-61.32%)
JiraffeOne stop place for exploiting Jira instances in your proximity
Stars: ✭ 157 (-78.84%)
juumla🦁 Juumla is a python tool created to identify Joomla version, scan for vulnerabilities and search for config or backup files.
Stars: ✭ 107 (-85.58%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (-2.29%)
linkedinscraperLinkedinScraper is an another information gathering tool written in python. You can scrape employees of companies on Linkedin.com and then create these employee names, titles and emails.
Stars: ✭ 22 (-97.04%)
aquatoneA Tool for Domain Flyovers
Stars: ✭ 43 (-94.2%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+162.67%)
PasscatPasswords Recovery Tool
Stars: ✭ 164 (-77.9%)
Hacker ContainerContainer with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-85.85%)
awesome-api-securityA collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.
Stars: ✭ 2,079 (+180.19%)
DoxycannonA poorman's proxycannon and botnet, using docker, ovpn files, and a dante socks5 proxy
Stars: ✭ 216 (-70.89%)
github-watchmanMonitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (-91.91%)
Collection DocumentCollection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+86.93%)
rejigTurn your VPS into an attack box
Stars: ✭ 33 (-95.55%)
flydnsRelated subdomains finder
Stars: ✭ 29 (-96.09%)
PayloadsallthethingsA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+4335.18%)
PyParser-CVEMulti source CVE/exploit parser.
Stars: ✭ 25 (-96.63%)
HellgateLoader CSharpLoad shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.
Stars: ✭ 73 (-90.16%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-93.53%)
YAPSYet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-95.28%)
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+827.49%)
ShellyAutomatic Reverse Shell Generator
Stars: ✭ 38 (-94.88%)
PentestingMisc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-96.77%)
ConstoleScan for and exploit Consul agents
Stars: ✭ 37 (-95.01%)
gtfoSearch for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (-88.14%)
moonwalkCover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (-26.68%)
DorknetSelenium powered Python script to automate searching for vulnerable web apps.
Stars: ✭ 256 (-65.5%)
GetaltnameExtract subdomains from SSL certificates in HTTPS sites.
Stars: ✭ 320 (-56.87%)
GosintOSINT Swiss Army Knife
Stars: ✭ 401 (-45.96%)
CloudbruteAwesome cloud enumerator
Stars: ✭ 268 (-63.88%)
Awesome InfosecA curated list of awesome infosec courses and training resources.
Stars: ✭ 3,779 (+409.3%)
PwndocPentest Report Generator
Stars: ✭ 417 (-43.8%)
Nac bypassScript collection to bypass Network Access Control (NAC, 802.1x)
Stars: ✭ 79 (-89.35%)
ReverseShellDllC++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked
Stars: ✭ 69 (-90.7%)