V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (-25.18%)
MemzA trojan made for Danooct1's User Made Malware Series.
Stars: ✭ 524 (-53.71%)
PyhawkSearches the directory of choice for interesting files. Such as database files and files with passwords stored on them
Stars: ✭ 60 (-94.7%)
MhddosBest DDoS Attack Script Python3, Cyber Attack With 36 Method
Stars: ✭ 55 (-95.14%)
SmershSmersh is a pentest oriented collaborative tool used to track the progress of your company's missions.
Stars: ✭ 43 (-96.2%)
Crazy WeekendMengobati rasa ingin tahu atau kadang hanya iseng
Stars: ✭ 9 (-99.2%)
Autoblue Ms17 010This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010
Stars: ✭ 522 (-53.89%)
Logkeys📝 ⌨️ A GNU/Linux keylogger that works!
Stars: ✭ 518 (-54.24%)
YasuoA ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (-54.33%)
KalitorifyTransparent proxy through Tor for Kali Linux OS
Stars: ✭ 513 (-54.68%)
AndtrojA tool for integrating the Metasploit payload with Android's healthy programs and bypassing antivirus
Stars: ✭ 43 (-96.2%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (-55.04%)
0d1nTool for automating customized attacks against web applications. Fully made in C language with pthreads, it has fast performance.
Stars: ✭ 506 (-55.3%)
SentelloSentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.
Stars: ✭ 54 (-95.23%)
AppserverA multithreaded application server for PHP, written in PHP.
Stars: ✭ 930 (-17.84%)
RansomwareA POC Windows crypto-ransomware (Academic)
Stars: ✭ 504 (-55.48%)
Linkedin2usernameOSINT Tool: Generate username lists for companies on LinkedIn
Stars: ✭ 504 (-55.48%)
MxtractmXtract - Memory Extractor & Analyzer
Stars: ✭ 499 (-55.92%)
Usb Keystroke Injector☠️ An Arduino-based USB keyboard simulator which injects keystrokes via Bluetooth protocol or predefined payloads in a SD card.
Stars: ✭ 42 (-96.29%)
StinkyphishMonitor Certificate Transparency Logs For Phishing Domains
Stars: ✭ 25 (-97.79%)
MultiscannerModular file scanning/analysis framework
Stars: ✭ 494 (-56.36%)
Sledthe champagne of beta embedded databases
Stars: ✭ 5,423 (+379.06%)
Dictionary Of PentestingDictionary collection project such as Pentesing, Fuzzing, Bruteforce and BugBounty. 渗透测试、SRC漏洞挖掘、爆破、Fuzzing等字典收集项目。
Stars: ✭ 492 (-56.54%)
TinkerershellA simple python reverse shell written just for fun.
Stars: ✭ 62 (-94.52%)
Xor crypterXOR encryption, malware crypter
Stars: ✭ 59 (-94.79%)
WhitehatInformation about my experiences on ethical hacking 💀
Stars: ✭ 54 (-95.23%)
KeyloggerA simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (-11.04%)
Awvs DecodeThe best and easiest way to decode and repack AWVS scripts. AWVS 最好、最简单、最新的解码/再打包方法,仅15行代码!
Stars: ✭ 488 (-56.89%)
Pwncatpwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
Stars: ✭ 904 (-20.14%)
Iprotate burp extensionExtension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.
Stars: ✭ 484 (-57.24%)
TaketvTakeTV permite descubrir dispositivos de red DLNA/UPnP y ayuda a reproducir archivos multimedia en los televisores inteligentes desde nuestra terminal en Linux.
Stars: ✭ 41 (-96.38%)
ChronicelOur super sweet hacker management system, built for HackTCNJ 2017+ | Used by [email protected] 2018!
Stars: ✭ 18 (-98.41%)
DarthsidiousBuilding an Active Directory domain and hacking it
Stars: ✭ 479 (-57.69%)
GitpreySearching sensitive files and contents in GitHub associated to company name or other key words
Stars: ✭ 478 (-57.77%)
Base MvvmApp built to showcase basic Android View components like ViewPager, RecyclerView(homogeneous and heterogeneous items), NavigationDrawer, Animated Vector Drawables, Collapsing Toolbar Layout etc. housed in a MVVM architecture
Stars: ✭ 18 (-98.41%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (-57.77%)
Sudo killerA tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (-5.21%)
Recon RavenReconnaissance tool of Penetration test & Bug Bounty
Stars: ✭ 18 (-98.41%)
ChromebackdoorChromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malicious extension or script on most popular browsers, and send all DOM datas on command and control.
Stars: ✭ 476 (-57.95%)
InstainsaneMulti-threaded Instagram Brute Forcer (100 attemps at once)
Stars: ✭ 475 (-58.04%)
MalwaresourcecodeCollection of malware source code for a variety of platforms in an array of different programming languages.
Stars: ✭ 8,666 (+665.55%)
Arpspoof arpspoof for macOS - intercept packets on a switched LAN
Stars: ✭ 40 (-96.47%)
VolatilityAn advanced memory forensics framework
Stars: ✭ 5,042 (+345.41%)
Juice ShopOWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+453.89%)
JaelesThe Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (-5.21%)
DronesploitDrone pentesting framework console
Stars: ✭ 473 (-58.22%)
DirbleFast directory scanning and scraping tool
Stars: ✭ 468 (-58.66%)
Linux.miraiLeaked Linux.Mirai Source Code for Research/IoC Development Purposes
Stars: ✭ 466 (-58.83%)
VuldashVulnerability Dashboard
Stars: ✭ 16 (-98.59%)