BillcipherInformation Gathering tool for a Website or IP address
Stars: ✭ 332 (-21.33%)
Jenkins Rce😈 Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!
Stars: ✭ 262 (-37.91%)
PeekABooPeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses PowerShell remoting to perform this task. Note: Remote desktop is disabled by default on all Windows operating systems.
Stars: ✭ 120 (-71.56%)
WiCrackFiPython Script to help/automate the WiFi hacking exercises.
Stars: ✭ 61 (-85.55%)
Esp Rfid ToolA tool for logging data/testing devices with a Wiegand Interface. Can be used to create a portable RFID reader or installed directly into an existing installation. Provides access to a web based interface using WiFi in AP or Client mode. Will work with nearly all devices that contain a standard 5V Wiegand interface. Primary target group is 26-37bit HID Cards. Similar to the Tastic RFID Thief, Blekey, and ESPKey.
Stars: ✭ 262 (-37.91%)
overload📡 Overload DoS Tool (Layer 7)
Stars: ✭ 167 (-60.43%)
ApeXUsing Social Engineering To Obtain WiFi Passwords
Stars: ✭ 87 (-79.38%)
IpapatchPatch iOS Apps, The Easy Way, Without Jailbreak.
Stars: ✭ 3,837 (+809.24%)
CitadelCollection of pentesting scripts
Stars: ✭ 333 (-21.09%)
QuineQuine Museum
Stars: ✭ 263 (-37.68%)
KaliIntelligenceSuiteKali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standard penetration testing tools. The collected data is internally stored in a structured manner to allow the fast identification and visualisation of the collected information.
Stars: ✭ 58 (-86.26%)
DeckerDeclarative penetration testing orchestration framework
Stars: ✭ 263 (-37.68%)
ligolo-ngAn advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (-0.95%)
LAZYPARIAHA tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (-71.33%)
AwesomexssAwesome XSS stuff
Stars: ✭ 3,664 (+768.25%)
RoguesploitPowerfull Wi-Fi trap!
Stars: ✭ 262 (-37.91%)
kali-my-linuxInstall Kali Linux Tools & Others on your Linux.
Stars: ✭ 37 (-91.23%)
PyParser-CVEMulti source CVE/exploit parser.
Stars: ✭ 25 (-94.08%)
MercureMercure is a tool for security managers who want to train their colleague to phishing.
Stars: ✭ 262 (-37.91%)
CloakCloak can backdoor any python script with some tricks.
Stars: ✭ 411 (-2.61%)
StegcrackerSteganography brute-force utility to uncover hidden data inside files
Stars: ✭ 396 (-6.16%)
DnsliveryEasy files and payloads delivery over DNS
Stars: ✭ 332 (-21.33%)
ToRat clientThis is the ToRat client, a part of the ToRat Project.
Stars: ✭ 29 (-93.13%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+358.29%)
exe2hexInline file transfer using in-built Windows tools (DEBUG.exe or PowerShell).
Stars: ✭ 284 (-32.7%)
nekrosNekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive KEY
Stars: ✭ 84 (-80.09%)
OverlordOverlord - Red Teaming Infrastructure Automation
Stars: ✭ 258 (-38.86%)
termux-wifiBash script which installs and runs the Fluxion tool inside Termux, a wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.
Stars: ✭ 406 (-3.79%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (-29.86%)
SudomySudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 1,572 (+272.51%)
MemoryjsRead and write process memory in Node.js (Windows API functions exposed via Node bindings)
Stars: ✭ 371 (-12.09%)
sqlscanQuick SQL Scanner, Dorker, Webshell injector PHP
Stars: ✭ 140 (-66.82%)
Droid Hunter(deprecated) Android application vulnerability analysis and Android pentest tool
Stars: ✭ 256 (-39.34%)
vafVaf is a cross-platform very advanced and fast web fuzzer written in nim
Stars: ✭ 294 (-30.33%)
rustcatRustcat(rcat) - The modern Port listener and Reverse shell
Stars: ✭ 505 (+19.67%)
DorknetSelenium powered Python script to automate searching for vulnerable web apps.
Stars: ✭ 256 (-39.34%)
purelovePurelove is a lightweight penetration testing framework, in order to better security testers testing holes with use.
Stars: ✭ 52 (-87.68%)
Black-ToolInstall the tools and start Attacking , black-tool v5.0 ! ⬛
Stars: ✭ 239 (-43.36%)
HOUDINIHundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
Stars: ✭ 791 (+87.44%)
h1-searchTool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.
Stars: ✭ 58 (-86.26%)
AndspoiltRun interactive android exploits in linux.
Stars: ✭ 101 (-76.07%)
FatratFatrat -A cloud based Remote Android Managment Suite, Powered by NodeJS
Stars: ✭ 31 (-92.65%)
credcheckCredentials Checking Framework
Stars: ✭ 50 (-88.15%)
AiodnsbrutePython 3.5+ DNS asynchronous brute force utility
Stars: ✭ 370 (-12.32%)
badcharsBad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.
Stars: ✭ 178 (-57.82%)
docker-osmedeusDocker image for Osmedeus, a fully automated offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 78 (-81.52%)
xecaPowerShell payload generator
Stars: ✭ 103 (-75.59%)
QuickScanPort scanning and domain utility.
Stars: ✭ 26 (-93.84%)
phisherpriceAll In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-91%)
PLtools整理一些内网常用渗透小工具
Stars: ✭ 227 (-46.21%)
ReconnoteWeb Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
Stars: ✭ 322 (-23.7%)
Red-Team-EssentialsThis repo will contain some basic pentest/RT commands.
Stars: ✭ 22 (-94.79%)
Terminhack👨💻 Impress your friends by pretending to be a real hacker
Stars: ✭ 73 (-82.7%)
Android Pin BruteforceUnlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for Android devices! (no root, no adb)
Stars: ✭ 217 (-48.58%)
Tradfri HackingHacking IKEA TRÅDFRI products, such as light bulbs, window blinds and other accessories.
Stars: ✭ 367 (-13.03%)