WhonowA "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
Stars: ✭ 533 (+22.53%)
Dref DNS Rebinding Exploitation Framework
Stars: ✭ 423 (-2.76%)
HrshellHRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (-55.63%)
DustcloudXiaomi Smart Home Device Reverse Engineering and Hacking
Stars: ✭ 1,907 (+338.39%)
Ip AttackAuto IP or Domain Attack Tool ( #1 )
Stars: ✭ 162 (-62.76%)
Collection DocumentCollection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+218.85%)
SliverAdversary Simulation Framework
Stars: ✭ 1,348 (+209.89%)
Red Teaming ToolkitThis repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Stars: ✭ 5,615 (+1190.8%)
Hack ToolsThe all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+532.18%)
Netmap.jsFast browser-based network discovery module
Stars: ✭ 70 (-83.91%)
RubyfuRubyfu, where Ruby goes evil!
Stars: ✭ 228 (-47.59%)
V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+94.71%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+856.78%)
ParadoxiaratParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (-9.2%)
SingularityA DNS rebinding attack framework.
Stars: ✭ 621 (+42.76%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+161.15%)
NishangNishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: ✭ 5,943 (+1266.21%)
AttifyosAttify OS - Distro for pentesting IoT devices
Stars: ✭ 615 (+41.38%)
Awesome Shodan Queries🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
Stars: ✭ 2,758 (+534.02%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+78.16%)
Pi Pwnbox RogueapHomemade Pwnbox 🚀 / Rogue AP 📡 based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap 💡
Stars: ✭ 798 (+83.45%)
CalderaAutomated Adversary Emulation Platform
Stars: ✭ 3,126 (+618.62%)
Gitjacker🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (+187.13%)
AiodnsbrutePython 3.5+ DNS asynchronous brute force utility
Stars: ✭ 370 (-14.94%)
PacketwhisperPacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (-6.9%)
ReverseapkQuickly analyze and reverse engineer Android packages
Stars: ✭ 419 (-3.68%)
External DnsConfigure external DNS servers (AWS Route53, Google CloudDNS and others) for Kubernetes Ingresses and Services
Stars: ✭ 4,749 (+991.72%)
Esp MqttESP32 mqtt component
Stars: ✭ 403 (-7.36%)
Hivemq Mqtt ClientHiveMQ MQTT Client is an MQTT 5.0 and MQTT 3.1.1 compatible and feature-rich high-performance Java client library with different API flavours and backpressure support
Stars: ✭ 402 (-7.59%)
BrutesploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (-2.53%)
Gravity SyncAn easy way to synchronize the blocklist and local DNS configurations of multiple Pi-hole 5.x instances.
Stars: ✭ 406 (-6.67%)
ArchstrikeAn Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (-7.82%)
ArloPython module for interacting with Netgear's Arlo camera system.
Stars: ✭ 401 (-7.82%)
Datascience Ai Machinelearning ResourcesAlex Castrounis' curated set of resources for artificial intelligence (AI), machine learning, data science, internet of things (IoT), and more.
Stars: ✭ 414 (-4.83%)
Dnsclient.netDnsClient.NET is a simple yet very powerful and high performant open source library for the .NET Framework to do DNS lookups
Stars: ✭ 400 (-8.05%)
HulkHULK DoS tool ported to Go with some additional features.
Stars: ✭ 427 (-1.84%)
Encrypted Dns ServerAn easy to install, high-performance, zero maintenance proxy to run an encrypted DNS server.
Stars: ✭ 398 (-8.51%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (-5.06%)
OckamEnd-to-end encrypted messaging and mutual authentication between cloud and edge-device applications
Stars: ✭ 395 (-9.2%)
GhostwriterThe SpecterOps project management and reporting engine
Stars: ✭ 394 (-9.43%)
EdgednsA high performance DNS cache designed for Content Delivery Networks
Stars: ✭ 423 (-2.76%)
Memory.dllC# Hacking library for making PC game trainers.
Stars: ✭ 411 (-5.52%)
Pentesterspecialdict渗透测试人员专用精简化字典 Dictionary for penetration testers happy hacker
Stars: ✭ 391 (-10.11%)
Docker DdnsEasy-to-deploy dynamic DNS with Docker, Go and Bind9
Stars: ✭ 392 (-9.89%)
HellraiserVulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (-5.06%)
Slackor A Golang implant that uses Slack as a command and control server
Stars: ✭ 392 (-9.89%)
CylonJavaScript framework for robotics, drones, and the Internet of Things (IoT)
Stars: ✭ 3,862 (+787.82%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (-1.84%)
Wahh extrasThe Web Application Hacker's Handbook - Extra Content
Stars: ✭ 428 (-1.61%)
Deimosc2DeimosC2 is a Golang command and control framework for post-exploitation.
Stars: ✭ 423 (-2.76%)
Godoh🕳godoh - A DNS-over-HTTPS C2
Stars: ✭ 413 (-5.06%)
SowerSower is a cross-platform intelligent transparent proxy solution.
Stars: ✭ 391 (-10.11%)
NmapIdiomatic nmap library for go developers
Stars: ✭ 391 (-10.11%)
Azure Iot Sdk CA C99 SDK for connecting devices to Microsoft Azure IoT services
Stars: ✭ 412 (-5.29%)
Xeexe TopantivirusevasionUndetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (-11.03%)
PigA Linux packet crafting tool.
Stars: ✭ 384 (-11.72%)