Antiddos Systemπ‘οΈβοΈ Protect your web app from DDOS attack or the Dead Ping + CAPTCHA VERIFICATION in one line!
Stars: β 173 (-23.79%)
HackercouchHospitality for Hackers
Stars: β 185 (-18.5%)
Effective ShellText, samples and website for my 'Effective Shell' series.
Stars: β 204 (-10.13%)
Awesome Shodan Queriesπ A collection of interesting, funny, and depressing search queries to plug into shodan.io π©βπ»
Stars: β 2,758 (+1114.98%)
PhoniaPhonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any international phone numbers with a very good accuracy.
Stars: β 221 (-2.64%)
ShodanwaveShodanwave is a tool for exploring and obtaining information from Netwave IP Camera.
Stars: β 183 (-19.38%)
Evil SsdpSpoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.
Stars: β 204 (-10.13%)
Php Antimalware ScannerAMWScan (PHP Antimalware Scanner) is a free tool to scan php files and analyze your project to find any malicious code inside it.
Stars: β 181 (-20.26%)
Angularjs Csti ScannerAutomated client-side template injection (sandbox escape/bypass) detection for AngularJS.
Stars: β 214 (-5.73%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: β 182 (-19.82%)
Pineπ² Aimbot powered by real-time object detection with neural networks, GPU accelerated with Nvidia. Optimized for use with CS:GO.
Stars: β 202 (-11.01%)
Windows HacksCreative and unusual things that can be done with the Windows API.
Stars: β 2,171 (+856.39%)
Nekobotv1NekoBot | Auto Exploiter With 500+ Exploit 2000+ Shell
Stars: β 225 (-0.88%)
Butthaxlovense hush buttplug exploit chain
Stars: β 180 (-20.7%)
HawkeyeHawkeye filesystem analysis tool
Stars: β 202 (-11.01%)
Cod Exploitsβ οΈ Call of Duty - Vulnerabilities and proof-of-concepts
Stars: β 178 (-21.59%)
Capsulecorp PentestVagrant VirtualBox environment for conducting an internal network penetration test
Stars: β 214 (-5.73%)
HeapinspectπHeap analysis tool for CTF pwn.
Stars: β 177 (-22.03%)
Mad MetasploitMetasploit custom modules, plugins, resource script and.. awesome metasploit collection
Stars: β 200 (-11.89%)
MemjectSimple Dll injector loading from memory. Supports PE header and entry point erasure. Written in C99.
Stars: β 176 (-22.47%)
NetelfRun executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.
Stars: β 220 (-3.08%)
HacktricksWelcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Stars: β 3,741 (+1548.02%)
DjangohunterTool designed to help identify incorrectly configured Django applications that are exposing sensitive information.
Stars: β 212 (-6.61%)
RaccoonA high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: β 2,312 (+918.5%)
Cve 2019 9810Exploit for CVE-2019-9810 Firefox on Windows 64-bit.
Stars: β 200 (-11.89%)
Umbrella androidOpen source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to dealing with a kidnap. Umbrella has best practice guides in over 40 topics in multiple languages. Used daily by people working in high risk countries - journalists, activists, diplomats, business travelers etc.
Stars: β 171 (-24.67%)
Remote Desktop CachingThis tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: β 171 (-24.67%)
WesngWindows Exploit Suggester - Next Generation
Stars: β 2,675 (+1078.41%)
TechnowloggerTechNowLogger is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info
Stars: β 172 (-24.23%)
MobilehackersweaponsMobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
Stars: β 170 (-25.11%)
CalderaAutomated Adversary Emulation Platform
Stars: β 3,126 (+1277.09%)
SitedorksSearch Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term with a default set of websites, bug bounty programs or a custom collection.
Stars: β 221 (-2.64%)
BuildapksReally quickly build APKs on handheld device (smartphone or tablet) in Amazon, Android, Chromebook and Windowsπ² See https://buildapks.github.io/docsBuildAPKs/setup to start building APKs.
Stars: β 218 (-3.96%)
BrutedumBruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack
Stars: β 212 (-6.61%)
TrackerjackerLike nmap for mapping wifi networks you're not connected to, plus device tracking
Stars: β 2,307 (+916.3%)
Itraceπ° Trace objc method call for ios and mac
Stars: β 170 (-25.11%)
Cehv10 Notesπ Both personal and public notes for EC-Council's CEHv10 312-50, because its thousands of pages/slides of boredom, and a braindump to many
Stars: β 170 (-25.11%)
FdsploitFile Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: β 199 (-12.33%)
Attiny85RubberDucky like payloads for DigiSpark Attiny85
Stars: β 169 (-25.55%)
ActivereignA Network Enumeration and Attack Toolset for Windows Active Directory Environments.
Stars: β 210 (-7.49%)
Ciscorv320dumpCVE-2019-1652 /CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!
Stars: β 198 (-12.78%)
BbreconPython library and CLI for the Bug Bounty Recon API
Stars: β 169 (-25.55%)
UniversalropSmall tool for generating ropchains using unicorn and z3
Stars: β 196 (-13.66%)
Dymergeπ A dynamic dictionary merger for successful dictionary based attacks.
Stars: β 167 (-26.43%)
ExpdevbadcharsBad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.
Stars: β 167 (-26.43%)
Goatπ GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server
Stars: β 218 (-3.96%)
Pentest Tools FrameworkPentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Stars: β 211 (-7.05%)
IronsquirrelEncrypted exploit delivery for the masses
Stars: β 197 (-13.22%)
AboutsecurityA list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: β 166 (-26.87%)
Uac exploitEscalate as Administrator bypassing the UAC affecting administrator accounts only.
Stars: β 165 (-27.31%)
Asufacebook hacking toolkit
Stars: β 197 (-13.22%)
HydrafwHydraFW official firmware for HydraBus/HydraNFC for researcher, hackers, students, embedded software developers or anyone interested in debugging/hacking/developing/penetration testing
Stars: β 165 (-27.31%)
Ctfsome experience in CTFs
Stars: β 165 (-27.31%)
T LoadNew Interface And Loading Screen For Termux Users
Stars: β 207 (-8.81%)
Ip AttackAuto IP or Domain Attack Tool ( #1 )
Stars: β 162 (-28.63%)
LazybeeCreate Best Wordlist From Python Tool In Termux
Stars: β 161 (-29.07%)
MosintAn automated e-mail OSINT tool
Stars: β 184 (-18.94%)