All Projects → Dumpall → Similar Projects or Alternatives

1929 Open source projects that are alternatives of or similar to Dumpall

Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+154.4%)
Mutual labels:  hacking, pentesting
Ics Security Tools
Tools, tips, tricks, and more for exploring ICS Security.
Stars: ✭ 749 (+199.6%)
Mutual labels:  hacking, tools
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+190%)
Mutual labels:  hacking, pentesting
Resources For Beginner Bug Bounty Hunters
A list of resources for those interested in getting started in bug bounties
Stars: ✭ 7,185 (+2774%)
Mutual labels:  hacking, bug-bounty
Habu
Hacking Toolkit
Stars: ✭ 635 (+154%)
Mutual labels:  hacking, pentesting
Privesc
A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+214.4%)
Mutual labels:  hacking, pentesting
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+210%)
Mutual labels:  hacking, pentesting
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+205.6%)
Mutual labels:  hacking, pentesting
Quiver
Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-44%)
Mutual labels:  hacking, pentesting
Reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+289.6%)
Mutual labels:  hacking, scanner
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+248%)
Mutual labels:  hacking, pentesting
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+3492.4%)
Mutual labels:  hacking, pentesting
Reconspider
🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
Stars: ✭ 621 (+148.4%)
Mutual labels:  hacking, scanner
Kill Router
Ferramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-77.2%)
Mutual labels:  hacking, pentesting
Jaeles
The Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+329.2%)
Mutual labels:  hacking, scanner
Pillager
Pillage filesystems for sensitive information with Go.
Stars: ✭ 64 (-74.4%)
Mutual labels:  hacking, scanner
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+629.6%)
Mutual labels:  hacking, scanner
Ntlmscan
scan for NTLM directories
Stars: ✭ 141 (-43.6%)
Mutual labels:  hacking, scanner
Oxidtools
200 TOOLS BY 0XID4FF0X FOR TERMUX
Stars: ✭ 143 (-42.8%)
Mutual labels:  hacking, tools
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+407.2%)
Mutual labels:  hacking, pentesting
Shellshockhunter
It's a simple tool for test vulnerability shellshock
Stars: ✭ 52 (-79.2%)
Mutual labels:  hacking, scanner
Collection Document
Collection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+454.8%)
Mutual labels:  hacking, bug-bounty
Keye
Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-59.6%)
Mutual labels:  hacking, bug-bounty
Attiny85
RubberDucky like payloads for DigiSpark Attiny85
Stars: ✭ 169 (-32.4%)
Mutual labels:  hacking, pentesting
Hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Stars: ✭ 3,741 (+1396.4%)
Mutual labels:  hacking, pentesting
Hack Tools
The all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+1000%)
Mutual labels:  hacking, pentesting
Linux Smart Enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
Stars: ✭ 1,956 (+682.4%)
Mutual labels:  hacking, pentesting
Ctfr
Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
Stars: ✭ 1,535 (+514%)
Mutual labels:  hacking, pentesting
Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-53.6%)
Mutual labels:  hacking, pentesting
Penetration Testing Tools
A collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (+145.6%)
Mutual labels:  hacking, tools
Dnstricker
A simple dns resolver of dns-record and web-record log server for pentesting
Stars: ✭ 128 (-48.8%)
Mutual labels:  hacking, pentesting
Awesome Mobile Security
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+634.8%)
Mutual labels:  hacking, pentesting
Cr3dov3r
Know the dangers of credential reuse attacks.
Stars: ✭ 1,700 (+580%)
Mutual labels:  hacking, pentesting
Enteletaor
Message Queue & Broker Injection tool
Stars: ✭ 139 (-44.4%)
Mutual labels:  hacking, scanner
Networm
Python network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-46%)
Mutual labels:  hacking, pentesting
Dailyhack
🐱‍💻 Tiny Tiny Hacks we use in our daily life.
Stars: ✭ 142 (-43.2%)
Mutual labels:  hacking, tools
Ratel
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-51.6%)
Mutual labels:  hacking, pentesting
Di.we.h
Repositório com conteúdo sobre web hacking em português
Stars: ✭ 156 (-37.6%)
Mutual labels:  hacking, bug-bounty
Getjs
A tool to fastly get all javascript sources/files
Stars: ✭ 190 (-24%)
Mutual labels:  hacking, pentesting
Jalesc
Just Another Linux Enumeration Script: A Bash script for locally enumerating a compromised Linux box
Stars: ✭ 152 (-39.2%)
Mutual labels:  hacking, pentesting
Burpsuite Xkeys
A Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.
Stars: ✭ 144 (-42.4%)
Mutual labels:  hacking, pentesting
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-27.2%)
Mutual labels:  hacking, pentesting
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-24%)
Mutual labels:  hacking, bug-bounty
Mosint
An automated e-mail OSINT tool
Stars: ✭ 184 (-26.4%)
Mutual labels:  hacking, pentesting
Webmap
A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generation during a Web Penetration Testing
Stars: ✭ 188 (-24.8%)
Mutual labels:  hacking, pentesting
Awesome Shodan Queries
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩‍💻
Stars: ✭ 2,758 (+1003.2%)
Mutual labels:  hacking, pentesting
Hrshell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (-22.8%)
Mutual labels:  hacking, pentesting
Goaltdns
A permutation generation tool written in golang
Stars: ✭ 119 (-52.4%)
Mutual labels:  hacking, bug-bounty
O365recon
retrieve information via O365 with a valid cred
Stars: ✭ 204 (-18.4%)
Mutual labels:  hacking, pentesting
Evil Ssdp
Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.
Stars: ✭ 204 (-18.4%)
Mutual labels:  hacking, pentesting
Whatcms
CMS Detection and Exploit Kit based on Whatcms.org API
Stars: ✭ 205 (-18%)
Mutual labels:  hacking, scanner
Onelistforall
Rockyou for web fuzzing
Stars: ✭ 213 (-14.8%)
Mutual labels:  hacking, pentesting
Capsulecorp Pentest
Vagrant VirtualBox environment for conducting an internal network penetration test
Stars: ✭ 214 (-14.4%)
Mutual labels:  hacking, pentesting
Cameradar
Cameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+1010%)
Mutual labels:  hacking, pentesting
Hfish
安全、可靠、简单、免费的企业级蜜罐
Stars: ✭ 2,977 (+1090.8%)
Mutual labels:  hacking, tools
Juice Shop Ctf
Capture-the-Flag (CTF) environment setup tools for OWASP Juice Shop
Stars: ✭ 238 (-4.8%)
Mutual labels:  hacking, pentesting
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (+0.8%)
Mutual labels:  hacking, tools
Zbn
安全编排与自动化响应平台
Stars: ✭ 201 (-19.6%)
Mutual labels:  hacking, tools
Phonia
Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any international phone numbers with a very good accuracy.
Stars: ✭ 221 (-11.6%)
Mutual labels:  hacking, scanner
Rspet
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Stars: ✭ 251 (+0.4%)
Mutual labels:  hacking, pentesting
61-120 of 1929 similar projects