Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+9769.23%)
SpoilerwallSpoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!
Stars: ✭ 754 (+728.57%)
Search That Hash🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+412.09%)
Tic TacClient not paid ? This is the solution of your problem
Stars: ✭ 29 (-68.13%)
ByepgDefeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI
Stars: ✭ 467 (+413.19%)
GobyAttack surface mapping
Stars: ✭ 446 (+390.11%)
CatchmeCatchME - WiFi Fun Box "Having Fun with ESP8266"
Stars: ✭ 28 (-69.23%)
Drupalgeddon2Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 / CVE-2018-7600 / SA-CORE-2018-002)
Stars: ✭ 464 (+409.89%)
HershellMultiplatform reverse shell generator
Stars: ✭ 456 (+401.1%)
Trackray溯光 (TrackRay) 3 beta⚡渗透测试框架(资产扫描|指纹识别|暴力破解|网页爬虫|端口扫描|漏洞扫描|代码审计|AWVS|NMAP|Metasploit|SQLMap)
Stars: ✭ 1,295 (+1323.08%)
Hacking Tools RepositoryA list of security/hacking tools that have been collected from the internet. Suggestions are welcomed.
Stars: ✭ 448 (+392.31%)
WsshWSSH Is a tool for brute forcing servers that has port 22 open via ssh, wssh is probably the fastest ssh brute forcer available
Stars: ✭ 21 (-76.92%)
Extracttvpasswordstool to extract passwords from TeamViewer memory using Frida
Stars: ✭ 444 (+387.91%)
HvmiHypervisor Memory Introspection Core Library
Stars: ✭ 438 (+381.32%)
OdatODAT: Oracle Database Attacking Tool
Stars: ✭ 906 (+895.6%)
YsfYSF Server Functions
Stars: ✭ 77 (-15.38%)
Ics Security ToolsTools, tips, tricks, and more for exploring ICS Security.
Stars: ✭ 749 (+723.08%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+369.23%)
SnoopSnoop — инструмент разведки на основе открытых данных (OSINT world)
Stars: ✭ 886 (+873.63%)
Appinfoscanner一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
Stars: ✭ 424 (+365.93%)
PyhawkSearches the directory of choice for interesting files. Such as database files and files with passwords stored on them
Stars: ✭ 60 (-34.07%)
Cve 2017 0065Exploiting Edge's read:// urlhandler
Stars: ✭ 15 (-83.52%)
DockerscanDocker security analysis & hacking tools
Stars: ✭ 1,046 (+1049.45%)
Python O365A simple python library to interact with Microsoft Graph and Office 365 API
Stars: ✭ 742 (+715.38%)
BrutesploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (+365.93%)
One Lin3rGives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+1283.52%)
Awesome HackingA curated list of awesome Hacking tutorials, tools and resources
Stars: ✭ 7,756 (+8423.08%)
Cve 2020 0796CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
Stars: ✭ 1,102 (+1110.99%)
NxloaderMy first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)
Stars: ✭ 417 (+358.24%)
Customization GuideCustomize SharePoint with technologies that you can safely rely on for the foreseeable future
Stars: ✭ 13 (-85.71%)
Lor Axe🪓 a multi-threaded, low-bandwidth HTTP DOS tool
Stars: ✭ 72 (-20.88%)
LdapcpThis claims provider connects SharePoint 2019 / 2016 / 2013 with Active Directory and LDAP servers to enhance people picker with a great search experience in federated authentication (typically ADFS)
Stars: ✭ 48 (-47.25%)
ChashellChashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
Stars: ✭ 742 (+715.38%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+353.85%)
HellraiserVulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (+353.85%)
PapersPapers about known hacking, security, hardware, software, computer, network and other ressources.
Stars: ✭ 58 (-36.26%)
CloakCloak can backdoor any python script with some tricks.
Stars: ✭ 411 (+351.65%)
Reverse ShellReverse Shell as a Service
Stars: ✭ 1,281 (+1307.69%)
ApkurlgrepExtract endpoints from APK files
Stars: ✭ 405 (+345.05%)
DracnmapDracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+846.15%)
VulmapVulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+1085.71%)
Naive HashcatCrack password hashes without the fuss 🐈
Stars: ✭ 726 (+697.8%)
ArchstrikeAn Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (+340.66%)
Twitter Follow ExploitAutomated Twitter mass account creation and follow using Selenium and Tor VPN
Stars: ✭ 47 (-48.35%)
GdogA fully featured Windows backdoor that uses Gmail as a C&C server
Stars: ✭ 399 (+338.46%)
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+1205.49%)
HackingtoolALL IN ONE Hacking Tool For Hackers
Stars: ✭ 7,521 (+8164.84%)
JscpwnPoC exploit for CVE-2016-4622
Stars: ✭ 89 (-2.2%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-4.4%)
CloudfailUtilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
Stars: ✭ 1,239 (+1261.54%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-20.88%)
ScriptingPS / Bash / Python / Other scripts For FUN!
Stars: ✭ 47 (-48.35%)
OscpCollection of things made during my OSCP journey
Stars: ✭ 709 (+679.12%)