All Projects → Eggshell → Similar Projects or Alternatives

639 Open source projects that are alternatives of or similar to Eggshell

Babysploit
👶 BabySploit Beginner Pentesting Toolkit/Framework Written in Python 🐍
Stars: ✭ 883 (-31.34%)
Mutual labels:  pentest-tool
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (-11.66%)
Mutual labels:  pentest-tool
Hacking With Golang
Golang安全资源合集
Stars: ✭ 876 (-31.88%)
Mutual labels:  reverse-shell
Ropper
Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper uses the awesome Capstone Framework.
Stars: ✭ 1,218 (-5.29%)
Mutual labels:  exploitation
Metasploit Modules
Various Metasploit Modules
Stars: ✭ 12 (-99.07%)
Mutual labels:  metasploit
Tinkerershell
A simple python reverse shell written just for fun.
Stars: ✭ 62 (-95.18%)
Mutual labels:  reverse-shell
Volumebar9
A jailbreak tweak to change the stock volume HUD
Stars: ✭ 10 (-99.22%)
Mutual labels:  jailbreak
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-93.31%)
Mutual labels:  pentest-tool
V3n0m Scanner
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (-34.14%)
Mutual labels:  metasploit
Wechatpri
个人版微信
Stars: ✭ 59 (-95.41%)
Mutual labels:  jailbreak
Awesome Ethical Hacking Resources
🔗 All the resources I could find for learning Ethical Hacking and Penetration Testing.
Stars: ✭ 933 (-27.45%)
Mutual labels:  exploitation
Ldap search
Python3 script to perform LDAP queries and enumerate users, groups, and computers from Windows Domains. Ldap_Search can also perform brute force/password spraying to identify valid accounts via LDAP.
Stars: ✭ 78 (-93.93%)
Mutual labels:  pentest-tool
Ail Framework
AIL framework - Analysis Information Leak framework
Stars: ✭ 1,091 (-15.16%)
Mutual labels:  information-security
Venom
venom - shellcode generator/compiler/handler (metasploit)
Stars: ✭ 904 (-29.7%)
Mutual labels:  metasploit
Reverse Shell
Reverse Shell as a Service
Stars: ✭ 1,281 (-0.39%)
Mutual labels:  reverse-shell
Finalrecon
The Last Web Recon Tool You'll Need
Stars: ✭ 888 (-30.95%)
Mutual labels:  pentest-tool
Burpsuite Collections
BurpSuite收集:包括不限于 Burp 文章、破解版、插件(非BApp Store)、汉化等相关教程,欢迎添砖加瓦---burpsuite-pro burpsuite-extender burpsuite cracked-version hackbar hacktools fuzzing fuzz-testing burp-plugin burp-extensions bapp-store brute-force-attacks brute-force-passwords waf sqlmap jar
Stars: ✭ 1,081 (-15.94%)
Mutual labels:  pentest-tool
Fsociety
fsociety Hacking Tools Pack – A Penetration Testing Framework
Stars: ✭ 7,224 (+461.74%)
Mutual labels:  exploitation
Papergram
Set Instagram backgrounds on iOS
Stars: ✭ 5 (-99.61%)
Mutual labels:  jailbreak
Yookiterm Slides
Exploitation and Mitigation Slides
Stars: ✭ 74 (-94.25%)
Mutual labels:  exploitation
Ska
Simple Karma Attack
Stars: ✭ 55 (-95.72%)
Mutual labels:  pentest-scripts
Atscan
Advanced dork Search & Mass Exploit Scanner
Stars: ✭ 817 (-36.47%)
Mutual labels:  exploitation
Windows
Awesome tools to exploit Windows !
Stars: ✭ 816 (-36.55%)
Mutual labels:  exploitation
Nmap Nse Info
Browse and search through nmap's NSE scripts.
Stars: ✭ 54 (-95.8%)
Mutual labels:  pentest-tool
Kindle Dash
Power efficient dashboard for Kindle 4 NT devices
Stars: ✭ 806 (-37.33%)
Mutual labels:  jailbreak
Msfpc
MSFvenom Payload Creator (MSFPC)
Stars: ✭ 808 (-37.17%)
Mutual labels:  metasploit
Shodanz
🔭 A modern, async Ruby gem for Shodan, the world's first search engine for Internet-connected devices.
Stars: ✭ 74 (-94.25%)
Mutual labels:  information-security
Sudo killer
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (-16.56%)
Mutual labels:  pentest-tool
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+502.8%)
Mutual labels:  exploitation
Shellen
🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (-37.87%)
Mutual labels:  exploitation
Macro pack
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to final document generation. It also provides a lot of helpful features useful for redteam or security research.
Stars: ✭ 1,072 (-16.64%)
Mutual labels:  meterpreter
Pompem
Find exploit tool
Stars: ✭ 786 (-38.88%)
Mutual labels:  pentest-tool
Cloudflair
🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.
Stars: ✭ 1,176 (-8.55%)
Mutual labels:  pentest-tool
Slowloris
Asynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-96.03%)
Mutual labels:  information-security
1earn
个人维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 776 (-39.66%)
Mutual labels:  pentest-tool
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (-39.74%)
Mutual labels:  pentest-tool
Flextotheos
Turn Flex patches into Theos projects
Stars: ✭ 50 (-96.11%)
Mutual labels:  jailbreak
Perun
Perun是一款主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架
Stars: ✭ 773 (-39.89%)
Mutual labels:  pentest-tool
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (-40.59%)
Mutual labels:  pentest-tool
Eyes.sh
Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?"
Stars: ✭ 89 (-93.08%)
Mutual labels:  pentest-tool
On Pwning
My solutions to some CTF challenges and a list of interesting resources about pwning stuff
Stars: ✭ 87 (-93.23%)
Mutual labels:  exploitation
Iostrace
alternative strace for iOS device(64bit) on frida
Stars: ✭ 84 (-93.47%)
Mutual labels:  jailbreak
Hacker ezines
A collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-94.4%)
Mutual labels:  information-security
Binary Exploitation
Good to know, easy to forget information about binaries and their exploitation!
Stars: ✭ 47 (-96.35%)
Mutual labels:  exploitation
Binexp
Linux Binary Exploitation
Stars: ✭ 742 (-42.3%)
Mutual labels:  exploitation
Privesccheck
Privilege Escalation Enumeration Script for Windows
Stars: ✭ 1,032 (-19.75%)
Mutual labels:  pentest-tool
Chashell
Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
Stars: ✭ 742 (-42.3%)
Mutual labels:  reverse-shell
Anubis
🔓Subdomain enumeration and information gathering tool
Stars: ✭ 722 (-43.86%)
Mutual labels:  information-security
Baf
Blind Attacking Framework
Stars: ✭ 71 (-94.48%)
Mutual labels:  exploitation
Write Ups
📚 VoidHack CTF write-ups
Stars: ✭ 45 (-96.5%)
Mutual labels:  exploitation
Paper collection
Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
Stars: ✭ 710 (-44.79%)
Mutual labels:  exploitation
Hardening
Hardening Ubuntu. Systemd edition.
Stars: ✭ 705 (-45.18%)
Mutual labels:  information-security
Mitsuhaxi
Universal iOS 11 audio visualizer
Stars: ✭ 44 (-96.58%)
Mutual labels:  jailbreak
Morpheus
Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)
Stars: ✭ 685 (-46.73%)
Mutual labels:  metasploit
Msf Venom Cheatsheet
Single Page Cheatsheet for common MSF Venom One Liners
Stars: ✭ 81 (-93.7%)
Mutual labels:  metasploit
Girsh
Automatically spawn a reverse shell fully interactive for Linux or Windows victim
Stars: ✭ 66 (-94.87%)
Mutual labels:  reverse-shell
Vulnx
vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (-21.54%)
Mutual labels:  exploitation
Serverscan
ServerScan一款使用Golang开发的高并发网络扫描、服务探测工具。
Stars: ✭ 674 (-47.59%)
Mutual labels:  pentest-tool
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+463.45%)
Mutual labels:  pentest-tool
Foxpwn
Exploit code for CVE-2016-9066
Stars: ✭ 39 (-96.97%)
Mutual labels:  exploitation
61-120 of 639 similar projects