Backfuzzprotocol fuzzing toolkit
Stars: ✭ 106 (-36.53%)
NetpwnTool made to automate tasks of pentesting.
Stars: ✭ 152 (-8.98%)
Oscp Prepmy oscp prep collection
Stars: ✭ 105 (-37.13%)
Pyiris BackdoorPyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (-13.17%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+1067.07%)
Ethical HackingThis repository contains reference material & links for people willing to learn Ethical Hacking
Stars: ✭ 160 (-4.19%)
Security TxtA proposed standard that allows websites to define security policies.
Stars: ✭ 1,393 (+734.13%)
NosqlmapAutomated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+1054.49%)
SteganographerSteganograpy in Python | Hide files or data in Image Files
Stars: ✭ 104 (-37.72%)
Amitt frameworkRepo replaced by cogsec-collaborative/AMITT
Stars: ✭ 152 (-8.98%)
M4ngl3m3Common password pattern generator using strings list
Stars: ✭ 103 (-38.32%)
Cr3dov3rKnow the dangers of credential reuse attacks.
Stars: ✭ 1,700 (+917.96%)
LazybeeCreate Best Wordlist From Python Tool In Termux
Stars: ✭ 161 (-3.59%)
Hackerone LessonsTranscribed video lessons of HackerOne to pdf's
Stars: ✭ 101 (-39.52%)
Blackphish🔱 [ Phishing Made Easy ] 🔱 (In Beta)
Stars: ✭ 133 (-20.36%)
BettercapThe Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Stars: ✭ 10,735 (+6328.14%)
Bot18Bot18 is a high-frequency cryptocurrency trading bot developed by Zenbot creator @carlos8f
Stars: ✭ 157 (-5.99%)
BinsnitchDetect silent (unwanted) changes to files on your system
Stars: ✭ 144 (-13.77%)
Shodan DorksDorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (-29.34%)
Yalu Jailbreak Ios 10.2My own fork of (Beta) Yalu Jailbreak for iOS 10.0 to 10.2 by @kpwn and @marcograss with custom UI and other features.
Stars: ✭ 99 (-40.72%)
KurukshetraKurukshetra - A framework for teaching secure coding by means of interactive problem solving.
Stars: ✭ 131 (-21.56%)
Zeebsploitweb scanner - exploitation - information gathering
Stars: ✭ 159 (-4.79%)
Dark FbHack Facebook
Stars: ✭ 98 (-41.32%)
Aura BotnetA super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Bash, and Powershell.
Stars: ✭ 95 (-43.11%)
AdbsploitA python based tool for exploiting and managing Android devices via ADB
Stars: ✭ 147 (-11.98%)
H8mailEmail OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (+1195.21%)
Gf SecretsSecret and/ credential patterns used for gf.
Stars: ✭ 96 (-42.51%)
Evil WinrmThe ultimate WinRM shell for hacking/pentesting
Stars: ✭ 2,251 (+1247.9%)
Spykeyboardkeylogger which sends us the data to our gmail.
Stars: ✭ 95 (-43.11%)
PhpvulnAudit tool to find common vulnerabilities in PHP source code
Stars: ✭ 146 (-12.57%)
Oob ServerA Bind9 server for pentesters to use for Out-of-Band vulnerabilities
Stars: ✭ 125 (-25.15%)
FormationvideoContenus et ressources de la chaîne FormationVidéo (YouTube)
Stars: ✭ 91 (-45.51%)
Slack WatchmanMonitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (-4.79%)
RpcheckuprpCheckup is an AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, and private resources.
Stars: ✭ 91 (-45.51%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-24.55%)
InstabruteInstagram password bruteforcer
Stars: ✭ 91 (-45.51%)
Proof Of ConceptsA little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
Stars: ✭ 148 (-11.38%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+6158.08%)
PidrilaPython Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (-25.15%)
AntidebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (-3.59%)
Breach.twA service that can track data breaches like "Have I Been Pwned", but it is specific for Taiwan.
Stars: ✭ 144 (-13.77%)
GreconYour Google Recon is Now Automated
Stars: ✭ 119 (-28.74%)
Instabruteforcehacking-tool termux-tools termux noob-friendly instagram-bot bruteforce-password-cracker wordlist-technique
Stars: ✭ 86 (-48.5%)
M3m0M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 124 (-25.75%)
Redteam vul红队作战中比较常遇到的一些重点系统漏洞整理。
Stars: ✭ 1,271 (+661.08%)
MyriamA vulnerable iOS App with Security Challenges for the Security Researcher inside you.
Stars: ✭ 146 (-12.57%)
MinesweeperA Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-2.99%)
LinkfinderA python script that finds endpoints in JavaScript files
Stars: ✭ 2,268 (+1258.08%)
Burpsuite XkeysA Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.
Stars: ✭ 144 (-13.77%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-30.54%)
PydictorA powerful and useful hacker dictionary builder for a brute-force attack
Stars: ✭ 2,055 (+1130.54%)