ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-94.33%)
ThefatratThefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+287.23%)
PxenumA shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-98.05%)
Platypus🔨 A modern multiple reverse shell sessions manager wrote in go
Stars: ✭ 559 (-63.58%)
ShellshockhunterIt's a simple tool for test vulnerability shellshock
Stars: ✭ 52 (-96.61%)
TheharvesterE-mails, subdomains and names Harvester - OSINT
Stars: ✭ 6,175 (+302.28%)
Hooksolinux动态链接库的注入修改查找工具 A tool for injection, modification and search of linux dynamic link library
Stars: ✭ 87 (-94.33%)
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-96.68%)
Ldap searchPython3 script to perform LDAP queries and enumerate users, groups, and computers from Windows Domains. Ldap_Search can also perform brute force/password spraying to identify valid accounts via LDAP.
Stars: ✭ 78 (-94.92%)
InfogaInfoga - Email OSINT
Stars: ✭ 947 (-38.31%)
Sherlock🔎 Hunt down social media accounts by username across social networks
Stars: ✭ 28,569 (+1761.17%)
PossumbotA bot that will allow you to destroy discord servers.
Stars: ✭ 106 (-93.09%)
AwspxA graph-based tool for visualizing effective access and resource relationships in AWS environments.
Stars: ✭ 546 (-64.43%)
Pythempentest framework
Stars: ✭ 1,060 (-30.94%)
Reverse EngineeringThis repository contains some of the executables that I've cracked.
Stars: ✭ 29 (-98.11%)
SsrfmapSimple Server Side Request Forgery services enumeration tool.
Stars: ✭ 50 (-96.74%)
Spykeyboardkeylogger which sends us the data to our gmail.
Stars: ✭ 95 (-93.81%)
SpeedhackSpeedhack coded in C++, inspired by Cheat Engine's own speedhack.
Stars: ✭ 29 (-98.11%)
OsrframeworkOSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accurate online researches.
Stars: ✭ 534 (-65.21%)
PkiThe Dogtag Certificate System is an enterprise-class Certificate Authority (CA) which supports all aspects of certificate lifecycle management, including key archival, OCSP and smartcard management.
Stars: ✭ 97 (-93.68%)
HacktheworldAn Python Script For Generating Payloads that Bypasses All Antivirus so far .
Stars: ✭ 527 (-65.67%)
DockerscanDocker security analysis & hacking tools
Stars: ✭ 1,046 (-31.86%)
A2svAuto Scanning to SSL Vulnerability
Stars: ✭ 524 (-65.86%)
ThecollectiveThe Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-94.46%)
Autoblue Ms17 010This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010
Stars: ✭ 522 (-65.99%)
PrivesccheckPrivilege Escalation Enumeration Script for Windows
Stars: ✭ 1,032 (-32.77%)
GasmaskInformation gathering tool - OSINT
Stars: ✭ 518 (-66.25%)
SubtakeAutomatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.
Stars: ✭ 104 (-93.22%)
YasuoA ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (-66.32%)
Best Hacking ToolsBEST HACKING TOOLS..For more tools visit our blog for Hackers
Stars: ✭ 46 (-97%)
Cfw2ofw HelperProviding aid in converting video games.
Stars: ✭ 44 (-97.13%)
Tic TacClient not paid ? This is the solution of your problem
Stars: ✭ 29 (-98.11%)
CrackmapexecA swiss army knife for pentesting networks
Stars: ✭ 5,445 (+254.72%)
Log Requests To SqliteBURP extension to record every HTTP request send via BURP and create an audit trail log of an assessment.
Stars: ✭ 44 (-97.13%)
MxtractmXtract - Memory Extractor & Analyzer
Stars: ✭ 499 (-67.49%)
Hg8045qPwning the Nuro issued Huawei HG8045Q
Stars: ✭ 107 (-93.03%)
Smtptestersmall python3 tool to check common vulnerabilities in SMTP servers
Stars: ✭ 102 (-93.36%)
Resource filesmosquito - Automating reconnaissance and brute force attacks
Stars: ✭ 95 (-93.81%)
YsfYSF Server Functions
Stars: ✭ 77 (-94.98%)
CatchmeCatchME - WiFi Fun Box "Having Fun with ESP8266"
Stars: ✭ 28 (-98.18%)
The Book Of Secret KnowledgeA collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
Stars: ✭ 55,582 (+3520.98%)
Iprotate burp extensionExtension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.
Stars: ✭ 484 (-68.47%)
DarthsidiousBuilding an Active Directory domain and hacking it
Stars: ✭ 479 (-68.79%)
CloudfailUtilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
Stars: ✭ 1,239 (-19.28%)
DnsbruteDNS Sub-domain brute forcer, in Python + gevent
Stars: ✭ 40 (-97.39%)
GogitdumperDump exposed HTTP .git fast
Stars: ✭ 27 (-98.24%)
Griefing MethodsA documentation about how to hack Minecraft servers
Stars: ✭ 76 (-95.05%)
TaikTool hack Dark FB tanpa lisensi
Stars: ✭ 21 (-98.63%)
WsshWSSH Is a tool for brute forcing servers that has port 22 open via ssh, wssh is probably the fastest ssh brute forcer available
Stars: ✭ 21 (-98.63%)
BughunterTools for Bug Hunting
Stars: ✭ 95 (-93.81%)
RsfThe Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
Stars: ✭ 76 (-95.05%)
BroxyAn HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (-40.59%)
Burp Bounty ProfilesBurp Bounty profiles compilation, feel free to contribute!
Stars: ✭ 76 (-95.05%)