PakuriPenetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (-90.28%)
MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (-69.83%)
trolotrolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-96.5%)
Hack ToolsThe all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+113.84%)
AutopwnA simple bash based metasploit automation tool!
Stars: ✭ 99 (-92.3%)
MouseMouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-85.54%)
One Lin3rGives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (-2.1%)
credcheckCredentials Checking Framework
Stars: ✭ 50 (-96.11%)
CnC-detectionDetecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation
Stars: ✭ 15 (-98.83%)
LAZYPARIAHA tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (-90.59%)
GetaltnameExtract subdomains from SSL certificates in HTTPS sites.
Stars: ✭ 320 (-75.12%)
AutosploitAutomated Mass Exploiter
Stars: ✭ 4,500 (+249.92%)
YasuoA ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (-59.8%)
Msploitego Pentesting suite for Maltego based on data in a Metasploit database
Stars: ✭ 124 (-90.36%)
Sec ToolsDocker images for infosec tools
Stars: ✭ 135 (-89.5%)
PLtools整理一些内网常用渗透小工具
Stars: ✭ 227 (-82.35%)
TechnowhorseTechNowHorse is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3.
Stars: ✭ 189 (-85.3%)
revshfuzzA tool for fuzzing for ports that allow outgoing connections
Stars: ✭ 18 (-98.6%)
YAPSYet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-97.28%)
DotdotslashSearch for Directory Traversal Vulnerabilities
Stars: ✭ 297 (-76.91%)
KaboomA tool to automate penetration tests
Stars: ✭ 322 (-74.96%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-70.3%)
JusttryharderJustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)
Stars: ✭ 450 (-65.01%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-97.05%)
crawleetWeb Recon & Exploitation Tool.
Stars: ✭ 48 (-96.27%)
HerculesHERCULES is a special payload generator that can bypass antivirus softwares.
Stars: ✭ 526 (-59.1%)
WpforceWordpress Attack Suite
Stars: ✭ 633 (-50.78%)
ChimeraChimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (-64%)
IosMost usable tools for iOS penetration testing
Stars: ✭ 563 (-56.22%)
Lockdoor Framework🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (-47.36%)
VailynA phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-91.99%)
WinpwnAutomation for internal Windows Penetrationtest / AD-Security
Stars: ✭ 1,303 (+1.32%)
HrshellHRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (-84.99%)
CrosslinkedLinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping
Stars: ✭ 223 (-82.66%)
TigersharkBilingual PhishingKit. TigerShark intergrates a vast array of various phishing tools and frameworks, from C2 servers, backdoors and delivery methods in multiple scripting languages in order to suit whatever your deployment needs may be.
Stars: ✭ 212 (-83.51%)
PupyPupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+423.87%)
wifibangwifi attacks suite
Stars: ✭ 56 (-95.65%)
Sn1perAttack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+280.79%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (-43.39%)
Pwncatpwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
Stars: ✭ 904 (-29.7%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (-11.66%)
RopperDisplay information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper uses the awesome Capstone Framework.
Stars: ✭ 1,218 (-5.29%)
Fwdsh3llForward shell generation framework
Stars: ✭ 62 (-95.18%)
TinkerershellA simple python reverse shell written just for fun.
Stars: ✭ 62 (-95.18%)
In Spectre MeltdownThis tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-93.31%)
WinpayloadsUndetectable Windows Payload Generation
Stars: ✭ 1,211 (-5.83%)
FuxiPenetration Testing Platform
Stars: ✭ 1,103 (-14.23%)
Ldap searchPython3 script to perform LDAP queries and enumerate users, groups, and computers from Windows Domains. Ldap_Search can also perform brute force/password spraying to identify valid accounts via LDAP.
Stars: ✭ 78 (-93.93%)
Nim SmbexecSMBExec implementation in Nim - SMBv2 using NTLM Authentication with Pass-The-Hash technique
Stars: ✭ 59 (-95.41%)
Ail FrameworkAIL framework - Analysis Information Leak framework
Stars: ✭ 1,091 (-15.16%)
Griefing MethodsA documentation about how to hack Minecraft servers
Stars: ✭ 76 (-94.09%)
VulmapVulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (-16.1%)