Cfw2ofw HelperProviding aid in converting video games.
Stars: ✭ 44 (-75.82%)
KeyloggerA simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (+453.3%)
EzxssezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
Stars: ✭ 1,022 (+461.54%)
Bug Bounty ResponsesA collection of response templates for invalid bug bounty reports.
Stars: ✭ 46 (-74.73%)
SsrfmapSimple Server Side Request Forgery services enumeration tool.
Stars: ✭ 50 (-72.53%)
PortiaPortia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
Stars: ✭ 154 (-15.38%)
OscpMy OSCP journey
Stars: ✭ 50 (-72.53%)
Pythempentest framework
Stars: ✭ 1,060 (+482.42%)
SqliscannerAutomatic SQL injection with Charles and sqlmap api
Stars: ✭ 674 (+270.33%)
ShellshockhunterIt's a simple tool for test vulnerability shellshock
Stars: ✭ 52 (-71.43%)
Project TauroA Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-71.43%)
Remote Desktop CachingThis tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: ✭ 171 (-6.04%)
SuboverA Powerful Subdomain Takeover Tool
Stars: ✭ 607 (+233.52%)
Pentest⛔️ offsec batteries included
Stars: ✭ 1,063 (+484.07%)
Audit scriptsScripts to gather system configuration information for offline/remote auditing
Stars: ✭ 55 (-69.78%)
Rfd CheckerRFD Checker - security CLI tool to test Reflected File Download issues
Stars: ✭ 56 (-69.23%)
NetwormPython network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-25.82%)
InqlInQL - A Burp Extension for GraphQL Security Testing
Stars: ✭ 715 (+292.86%)
Dymerge🔓 A dynamic dictionary merger for successful dictionary based attacks.
Stars: ✭ 167 (-8.24%)
VulmapVulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+492.86%)
UrlcrazyGenerate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (-17.58%)
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-71.98%)
Kill RouterFerramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-68.68%)
EnumdbRelational database brute force and post exploitation tool for MySQL and MSSQL
Stars: ✭ 167 (-8.24%)
MobilehackersweaponsMobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 170 (-6.59%)
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-65.38%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+521.98%)
ReconcatA small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any year or complete list of all years possible. Made Specially for penetration testing purpose.
Stars: ✭ 66 (-63.74%)
TrapePeople tracker on the Internet: OSINT analysis and research tool by Jose Pino
Stars: ✭ 6,753 (+3610.44%)
MetaforgeAn OSINT Metadata analyzing tool that filters through tags and creates reports
Stars: ✭ 63 (-65.38%)
XshockXSHOCK Shellshock Exploit
Stars: ✭ 65 (-64.29%)
WebhashcatHashcat web interface
Stars: ✭ 151 (-17.03%)
AirmasterUse ExpiredDomains.net and BlueCoat to find useful domains for red team.
Stars: ✭ 150 (-17.58%)
Ssti Payloads🎯 Server Side Template Injection Payloads
Stars: ✭ 150 (-17.58%)
BrutusA Python-powered exploitation framework and botnet.
Stars: ✭ 17 (-90.66%)
MarsnakeSystem Optimizer and Monitoring, Security Auditing, Vulnerability scanner for Linux, macOS, and UNIX-based systems
Stars: ✭ 16 (-91.21%)
Mongoaudit🔥 A powerful MongoDB auditing and pentesting tool 🔥
Stars: ✭ 1,174 (+545.05%)
Golang TlsSimple Golang HTTPS/TLS Examples
Stars: ✭ 857 (+370.88%)
V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+365.38%)
Chaos🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Stars: ✭ 1,168 (+541.76%)
ScriptsScripts I use during pentest engagements.
Stars: ✭ 834 (+358.24%)
GitgrabergitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...
Stars: ✭ 1,164 (+539.56%)
HacktricksWelcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Stars: ✭ 3,741 (+1955.49%)
Kubernetes GoatKubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
Stars: ✭ 868 (+376.92%)
GogitdumperDump exposed HTTP .git fast
Stars: ✭ 27 (-85.16%)
ShuffleWebShell Backdoor Framework
Stars: ✭ 11 (-93.96%)
SandmapNmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (+548.35%)
Gscan本程序旨在为安全应急响应人员对Linux主机排查时提供便利,实现主机侧Checklist的自动全面化检测,根据检测结果自动数据聚合,进行黑客攻击路径溯源。
Stars: ✭ 1,177 (+546.7%)
NotrulerThe opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.
Stars: ✭ 72 (-60.44%)
ReconftwreconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+435.16%)
LyricpassPassword wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security research.
Stars: ✭ 58 (-68.13%)
Netmap.jsFast browser-based network discovery module
Stars: ✭ 70 (-61.54%)