PrivescA collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+976.71%)
OtsecaOpen source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
Stars: ✭ 416 (+469.86%)
AtscanAdvanced dork Search & Mass Exploit Scanner
Stars: ✭ 817 (+1019.18%)
Edittext MaskThe custom masks for EditText. The solution for input phone numbers, SSN, and so on for Android
Stars: ✭ 413 (+465.75%)
Osint collectionMaintained collection of OSINT related resources. (All Free & Actionable)
Stars: ✭ 809 (+1008.22%)
HulkHULK DoS tool ported to Go with some additional features.
Stars: ✭ 427 (+484.93%)
TaketvTakeTV permite descubrir dispositivos de red DLNA/UPnP y ayuda a reproducir archivos multimedia en los televisores inteligentes desde nuestra terminal en Linux.
Stars: ✭ 41 (-43.84%)
Androidsdk🐳 Full-fledged Android SDK Docker Image
Stars: ✭ 776 (+963.01%)
Memory.dllC# Hacking library for making PC game trainers.
Stars: ✭ 411 (+463.01%)
BrutesploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (+480.82%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-1.37%)
WpsekuWPSeku - Wordpress Security Scanner
Stars: ✭ 791 (+983.56%)
EhtoolsWi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: ✭ 422 (+478.08%)
OpenscanOpenScan is an open-source app that enables users to scan hard copies of documents or notes and convert it into a PDF file. No ads. No data collection. We respect your privacy.
Stars: ✭ 785 (+975.34%)
KonanKonan - Advanced Web Application Dir Scanner
Stars: ✭ 412 (+464.38%)
PassportscannerScan the MRZ code of a passport and extract the firstname, lastname, passport number, nationality, date of birth, expiration date and personal numer.
Stars: ✭ 417 (+471.23%)
VulmapVulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+1378.08%)
ParamspiderMining parameters from dark corners of Web Archives
Stars: ✭ 781 (+969.86%)
Kill RouterFerramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-21.92%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+1258.9%)
Awesome Osint😱 A curated list of amazingly awesome OSINT
Stars: ✭ 7,830 (+10626.03%)
ApkurlgrepExtract endpoints from APK files
Stars: ✭ 405 (+454.79%)
SimplyemailEmail recon made fast and easy, with a framework to build on
Stars: ✭ 779 (+967.12%)
Vue Phone Number InputA phone number input made with Vue JS (format & valid phone number)
Stars: ✭ 407 (+457.53%)
XshockXSHOCK Shellshock Exploit
Stars: ✭ 65 (-10.96%)
PacketwhisperPacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (+454.79%)
Ip TracerTrack any ip address with IP-Tracer. IP-Tracer is developed for Linux and Termux. you can retrieve any ip address information using IP-Tracer.
Stars: ✭ 399 (+446.58%)
ArchstrikeAn Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (+449.32%)
Censys Subdomain Finder⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.
Stars: ✭ 402 (+450.68%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+961.64%)
GosintOSINT Swiss Army Knife
Stars: ✭ 401 (+449.32%)
Dll hook RsRust code to show how hooking in rust with a dll works.
Stars: ✭ 57 (-21.92%)
Swift KeyloggerKeylogger for mac written in Swift using HID
Stars: ✭ 995 (+1263.01%)
PerunPerun是一款主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架
Stars: ✭ 773 (+958.9%)
ParadoxiaratParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (+441.1%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+946.58%)
Libphonenumber CsharpOffical C# port of https://github.com/googlei18n/libphonenumber
Stars: ✭ 396 (+442.47%)
PowerladonLadon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Stars: ✭ 39 (-46.58%)
BelatiThe Traditional Swiss Army Knife for OSINT
Stars: ✭ 397 (+443.84%)
NmapIdiomatic nmap library for go developers
Stars: ✭ 391 (+435.62%)
Xeexe TopantivirusevasionUndetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (+430.14%)
InterlaceEasily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+941.1%)
BusterAn advanced tool for email reconnaissance
Stars: ✭ 387 (+430.14%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+1484.93%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+1456.16%)
Wbmwbm is an unofficial API to send bulk messages in whatsapp.
Stars: ✭ 55 (-24.66%)
Open Semantic SearchOpen Source research tool to search, browse, analyze and explore large document collections by Semantic Search Engine and Open Source Text Mining & Text Analytics platform (Integrates ETL for document processing, OCR for images & PDF, named entity recognition for persons, organizations & locations, metadata management by thesaurus & ontologies, search user interface & search apps for fulltext search, faceted search & knowledge graph)
Stars: ✭ 386 (+428.77%)
AllaboutbugbountyAll about bug bounty (bypasses, payloads, and etc)
Stars: ✭ 758 (+938.36%)
PigA Linux packet crafting tool.
Stars: ✭ 384 (+426.03%)
JflexThe fast scanner generator for Java™ with full Unicode support
Stars: ✭ 380 (+420.55%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+423.29%)