Behold3r👻Behold3r -- 收集指定网站的子域名,并可监控指定网站的子域名更新情况,发送变更报告至指定邮箱
Stars: ✭ 29 (-88.26%)
GetPwdIt's a tool which generate a dictionary from a csv containing personals informations. Generate all common passwords based on perso info. (leet transformations and combinatory processing)
Stars: ✭ 46 (-81.38%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+689.07%)
Orwell Rat And BotnetOrwell is a RAT and Botnet designed as a trio of programs by Landon Powell.
Stars: ✭ 27 (-89.07%)
VindicateToolLLMNR/NBNS/mDNS Spoofing Detection Toolkit
Stars: ✭ 40 (-83.81%)
PwndropSelf-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.
Stars: ✭ 878 (+255.47%)
Uac SilentcleanNew UAC bypass for Silent Cleanup for CobaltStrike
Stars: ✭ 117 (-52.63%)
fileless-elf-execExecute ELF files without dropping them on disk
Stars: ✭ 237 (-4.05%)
I See YouISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Stars: ✭ 246 (-0.4%)
sherlock🔎 Find usernames across social networks
Stars: ✭ 52 (-78.95%)
StinkyphishMonitor Certificate Transparency Logs For Phishing Domains
Stars: ✭ 25 (-89.88%)
Damn-Vulnerable-BankDamn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android application security hacking skills.
Stars: ✭ 379 (+53.44%)
Mitmap📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+517.81%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-69.64%)
MooscanA scanner for Moodle LMS
Stars: ✭ 22 (-91.09%)
tridentautomated password spraying tool
Stars: ✭ 133 (-46.15%)
PwnshopExploit Development, Reverse Engineering & Cryptography
Stars: ✭ 167 (-32.39%)
gwdomainssub domain wild card filtering tool
Stars: ✭ 38 (-84.62%)
Rootkits List DownloadThis is the list of all rootkits found so far on github and other sites.
Stars: ✭ 815 (+229.96%)
LolbasLiving Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Stars: ✭ 1,506 (+509.72%)
pyetiPython bindings for Yeti's API
Stars: ✭ 15 (-93.93%)
Attack ToolsUtilities for MITRE™ ATT&CK
Stars: ✭ 810 (+227.94%)
ShellyAutomatic Reverse Shell Generator
Stars: ✭ 38 (-84.62%)
Secure DesktopAnti-keylogger/anti-rat application for Windows
Stars: ✭ 201 (-18.62%)
MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (+57.09%)
TrapePeople tracker on the Internet: OSINT analysis and research tool by Jose Pino
Stars: ✭ 6,753 (+2634.01%)
DictGenerate使用Go语言编写的社工字典生成器(The social engineering dictionary generator written by Go)
Stars: ✭ 64 (-74.09%)
PerunPerun是一款主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架
Stars: ✭ 773 (+212.96%)
wifiqrCreate a QR code with your Wi-Fi login details
Stars: ✭ 207 (-16.19%)
hacking-resourcesHacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
Stars: ✭ 1,386 (+461.13%)
Poshc2A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
Stars: ✭ 747 (+202.43%)
Deploy DeceptionA PowerShell module to deploy active directory decoy objects.
Stars: ✭ 109 (-55.87%)
Search That Hash🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+88.66%)
argusArgus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (-64.78%)
juumla🦁 Juumla is a python tool created to identify Joomla version, scan for vulnerabilities and search for config or backup files.
Stars: ✭ 107 (-56.68%)
AutosqliAn automatic SQL Injection tool which takes advantage of ~DorkNet~ Googler, Ddgr, WhatWaf and sqlmap.
Stars: ✭ 222 (-10.12%)
Powershell Red TeamCollection of PowerShell functions a Red Teamer may use to collect data from a machine
Stars: ✭ 155 (-37.25%)
RpcheckuprpCheckup is an AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, and private resources.
Stars: ✭ 91 (-63.16%)
Go ShellcodeLoad shellcode into a new process
Stars: ✭ 456 (+84.62%)
Awesome Security GistsA collection of various GitHub gists for hackers, pentesters and security researchers
Stars: ✭ 701 (+183.81%)
DDTTXDDTTX Tabletop Trainings
Stars: ✭ 22 (-91.09%)
Information Security TasksThis repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (-56.28%)
PlumhoundBloodhound for Blue and Purple Teams
Stars: ✭ 452 (+83%)
Cvebase.comcvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (-64.37%)
OctopusOpen source pre-operation C2 server based on python and powershell
Stars: ✭ 449 (+81.78%)
PowerzurePowerShell framework to assess Azure security
Stars: ✭ 450 (+82.19%)
DomainedMulti Tool Subdomain Enumeration
Stars: ✭ 688 (+178.54%)
Oprah ProxyGenerate credentials for Opera's "browser VPN"
Stars: ✭ 245 (-0.81%)
RenginereNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+1292.31%)