UddupUrls de-duplication tool for better recon.
Stars: ✭ 103 (-33.97%)
DockerscanDocker security analysis & hacking tools
Stars: ✭ 1,046 (+570.51%)
ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-8.97%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+7250%)
BrokenlinkhijackerA Fast Broken Link Hijacker Tool written in Python
Stars: ✭ 45 (-71.15%)
HaliveA fast http and https prober, to check which URLs are alive
Stars: ✭ 47 (-69.87%)
Nuclei TemplatesCommunity curated list of templates for the nuclei engine to find security vulnerabilities.
Stars: ✭ 1,354 (+767.95%)
Bug Bounty ResponsesA collection of response templates for invalid bug bounty reports.
Stars: ✭ 46 (-70.51%)
BroxyAn HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (+484.62%)
Shodan DorksDorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (-24.36%)
Drv3 Tools(Not actively maintained, use DRV3-Sharp) Tools for extracting and re-injecting files for Danganronpa V3 for PC.
Stars: ✭ 13 (-91.67%)
FormationvideoContenus et ressources de la chaîne FormationVidéo (YouTube)
Stars: ✭ 91 (-41.67%)
NetwormPython network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-13.46%)
Best Hacking ToolsBEST HACKING TOOLS..For more tools visit our blog for Hackers
Stars: ✭ 46 (-70.51%)
DracnmapDracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+451.92%)
Aws ScannerScans a list of websites for Cloudfront or S3 Buckets
Stars: ✭ 93 (-40.38%)
PhonesploitUsing open Adb ports we can exploit a Andriod Device
Stars: ✭ 854 (+447.44%)
SwiftnessA note-taking macOS app for penetration-testers.
Stars: ✭ 124 (-20.51%)
TimelapseA time lapse app for Sony Alpha camera using the OpenMemories framework
Stars: ✭ 101 (-35.26%)
Pcwt Stars: ✭ 46 (-70.51%)
Crazy WeekendMengobati rasa ingin tahu atau kadang hanya iseng
Stars: ✭ 9 (-94.23%)
Crlf Injection ScannerCommand line tool for testing CRLF injection on a list of domains.
Stars: ✭ 91 (-41.67%)
N00bratRemote Administration Toolkit (or Trojan) for POSiX (Linux/Unix) system working as a Web Service
Stars: ✭ 148 (-5.13%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+6599.36%)
ChronicelOur super sweet hacker management system, built for HackTCNJ 2017+ | Used by [email protected] 2018!
Stars: ✭ 18 (-88.46%)
Oscp AutomationA collection of personal scripts used in hacking excercises.
Stars: ✭ 118 (-24.36%)
Jsql InjectionjSQL Injection is a Java application for automatic SQL database injection.
Stars: ✭ 891 (+471.15%)
Cve 2019 0604cve-2019-0604 SharePoint RCE exploit
Stars: ✭ 91 (-41.67%)
Ciphey⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Stars: ✭ 9,116 (+5743.59%)
HuntrVulnerability Database | huntr.dev
Stars: ✭ 136 (-12.82%)
Sn0intSemi-automatic OSINT framework and package manager
Stars: ✭ 814 (+421.79%)
Instabruteforcehacking-tool termux-tools termux noob-friendly instagram-bot bruteforce-password-cracker wordlist-technique
Stars: ✭ 86 (-44.87%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+4869.23%)
AcamarA Python3 based single-file subdomain enumerator
Stars: ✭ 89 (-42.95%)
ParamspiderMining parameters from dark corners of Web Archives
Stars: ✭ 781 (+400.64%)
Ssti Payloads🎯 Server Side Template Injection Payloads
Stars: ✭ 150 (-3.85%)
SimplyemailEmail recon made fast and easy, with a framework to build on
Stars: ✭ 779 (+399.36%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+396.79%)
HackeronedbThe unofficial HackerOne disclosure Timeline
Stars: ✭ 117 (-25%)
Hackerone LessonsTranscribed video lessons of HackerOne to pdf's
Stars: ✭ 101 (-35.26%)
DrishtiA fast HTTP Response status checker implemented in Python3
Stars: ✭ 46 (-70.51%)
JalescJust Another Linux Enumeration Script: A Bash script for locally enumerating a compromised Linux box
Stars: ✭ 152 (-2.56%)
AdbsploitA python based tool for exploiting and managing Android devices via ADB
Stars: ✭ 147 (-5.77%)
Ntlmscanscan for NTLM directories
Stars: ✭ 141 (-9.62%)
M3m0M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 124 (-20.51%)
AwsbucketdumpSecurity Tool to Look For Interesting Files in S3 Buckets
Stars: ✭ 1,021 (+554.49%)
EzxssezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
Stars: ✭ 1,022 (+555.13%)
Packer FuzzerPacker Fuzzer is a fast and efficient scanner for security detection of websites constructed by javascript module bundler such as Webpack.
Stars: ✭ 753 (+382.69%)
BlackratBlackRAT - Java Based Remote Administrator Tool
Stars: ✭ 87 (-44.23%)
Ics Security ToolsTools, tips, tricks, and more for exploring ICS Security.
Stars: ✭ 749 (+380.13%)
QuickxssAutomating XSS using Bash
Stars: ✭ 113 (-27.56%)
BettercapThe Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Stars: ✭ 10,735 (+6781.41%)
Cfw2ofw HelperProviding aid in converting video games.
Stars: ✭ 44 (-71.79%)
Legal Bug Bounty#legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.
Stars: ✭ 42 (-73.08%)