All Projects → Enigma → Similar Projects or Alternatives

382 Open source projects that are alternatives of or similar to Enigma

project-black
Pentest/BugBounty progress control with scanning modules
Stars: ✭ 279 (+55%)
Mutual labels:  pentest
PXXTF
Framework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-87.22%)
Mutual labels:  pentest
Hookish
Hooks in to interesting functions and helps reverse the web app faster.
Stars: ✭ 129 (-28.33%)
Mutual labels:  pentest
payload
A javascript single page application (SPA) driver for REST API payload management.
Stars: ✭ 16 (-91.11%)
Mutual labels:  payload
Hercules
HERCULES is a special payload generator that can bypass antivirus softwares.
Stars: ✭ 526 (+192.22%)
Mutual labels:  payload
PayloadsAll
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 31 (-82.78%)
Mutual labels:  pentest
Burp Bounty Profiles
Burp Bounty profiles compilation, feel free to contribute!
Stars: ✭ 76 (-57.78%)
Mutual labels:  pentest
Lauschgeraet
Gets in the way of your victim's traffic and out of yours
Stars: ✭ 25 (-86.11%)
Mutual labels:  pentest
Dictionary Of Pentesting
Dictionary collection project such as Pentesing, Fuzzing, Bruteforce and BugBounty. 渗透测试、SRC漏洞挖掘、爆破、Fuzzing等字典收集项目。
Stars: ✭ 492 (+173.33%)
Mutual labels:  pentest
Docker Security Images
🔐 Docker Container for Penetration Testing & Security
Stars: ✭ 172 (-4.44%)
Mutual labels:  pentest
Offensive-Reverse-Shell-Cheat-Sheet
Offensive Reverse Shell (Cheat Sheet)
Stars: ✭ 138 (-23.33%)
Mutual labels:  pentest
skweez
Fast website scraper and wordlist generator
Stars: ✭ 49 (-72.78%)
Mutual labels:  pentest
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+163.33%)
Mutual labels:  pentest
PeekABoo
PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses PowerShell remoting to perform this task. Note: Remote desktop is disabled by default on all Windows operating systems.
Stars: ✭ 120 (-33.33%)
Mutual labels:  pentest
Cloudflair
🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.
Stars: ✭ 1,176 (+553.33%)
Mutual labels:  pentest
docker-bloodhound
BloodHound Docker Ready to Use
Stars: ✭ 48 (-73.33%)
Mutual labels:  pentest
Chimera
Chimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (+157.22%)
Mutual labels:  payload
LAZYPARIAH
A tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (-32.78%)
Mutual labels:  pentest
Entropy
Entropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-30%)
Mutual labels:  payload
VNCPwn
VNC pentest tool with bruteforce and ducky script execution features
Stars: ✭ 21 (-88.33%)
Mutual labels:  pentest
Penetration Testing Study Notes
Penetration Testing notes, resources and scripts
Stars: ✭ 461 (+156.11%)
Mutual labels:  pentest
flydns
Related subdomains finder
Stars: ✭ 29 (-83.89%)
Mutual labels:  pentest
Chaos
🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Stars: ✭ 1,168 (+548.89%)
Mutual labels:  payload
PyParser-CVE
Multi source CVE/exploit parser.
Stars: ✭ 25 (-86.11%)
Mutual labels:  pentest
Hershell
Hershell is a simple TCP reverse shell written in Go.
Stars: ✭ 442 (+145.56%)
Mutual labels:  pentest
ToRat client
This is the ToRat client, a part of the ToRat Project.
Stars: ✭ 29 (-83.89%)
Mutual labels:  payload
Mida Multitool
Bash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (-20%)
Mutual labels:  pentest
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (-21.11%)
Mutual labels:  pentest
Goohak
Automatically Launch Google Hacking Queries Against A Target Domain
Stars: ✭ 432 (+140%)
Mutual labels:  pentest
sqlscan
Quick SQL Scanner, Dorker, Webshell injector PHP
Stars: ✭ 140 (-22.22%)
Mutual labels:  pentest
Findsploit
Find exploits in local and online databases instantly
Stars: ✭ 1,160 (+544.44%)
Mutual labels:  pentest
sx
🖖 Fast, modern, easy-to-use network scanner
Stars: ✭ 1,267 (+603.89%)
Mutual labels:  pentest
Wahh extras
The Web Application Hacker's Handbook - Extra Content
Stars: ✭ 428 (+137.78%)
Mutual labels:  pentest
report-ng
Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.
Stars: ✭ 62 (-65.56%)
Mutual labels:  pentest
Nray
nray distributed port scanner
Stars: ✭ 125 (-30.56%)
Mutual labels:  pentest
mobilehacktools
A repository for scripting a mobile attack toolchain
Stars: ✭ 61 (-66.11%)
Mutual labels:  pentest
Ehtools
Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: ✭ 422 (+134.44%)
Mutual labels:  payload
keyscope
Keyscope is a key and secret workflow (validation, invalidation, etc.) tool built in Rust
Stars: ✭ 369 (+105%)
Mutual labels:  pentest
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+528.89%)
Mutual labels:  pentest
tryhackme-ctf
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (-22.22%)
Mutual labels:  pentest
Pwndoc
Pentest Report Generator
Stars: ✭ 417 (+131.67%)
Mutual labels:  pentest
Passcat
Passwords Recovery Tool
Stars: ✭ 164 (-8.89%)
Mutual labels:  pentest
Pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+3642.78%)
Mutual labels:  payload
GetPwd
It's a tool which generate a dictionary from a csv containing personals informations. Generate all common passwords based on perso info. (leet transformations and combinatory processing)
Stars: ✭ 46 (-74.44%)
Mutual labels:  pentest
Oblivion
Data leak checker & OSINT Tool
Stars: ✭ 237 (+31.67%)
Mutual labels:  pentest
Awesome Privilege Escalation
A curated list of awesome privilege escalation
Stars: ✭ 413 (+129.44%)
Mutual labels:  pentest
Patator
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
Stars: ✭ 2,792 (+1451.11%)
Mutual labels:  pentest
Rfd Checker
RFD Checker - security CLI tool to test Reflected File Download issues
Stars: ✭ 56 (-68.89%)
Mutual labels:  pentest
Runascs
RunasCs - Csharp and open version of windows builtin runas.exe
Stars: ✭ 216 (+20%)
Mutual labels:  pentest
Iox
Tool for port forwarding & intranet proxy
Stars: ✭ 411 (+128.33%)
Mutual labels:  pentest
Cracker-Tool
All in One CRACKER911181's Tool. This Tool For Hacking and Pentesting. 🎭
Stars: ✭ 181 (+0.56%)
Mutual labels:  pentest
Gosint
OSINT Swiss Army Knife
Stars: ✭ 401 (+122.78%)
Mutual labels:  pentest
Hackapk
An Advanced Tool For Complete Apk-Modding In Termux ...
Stars: ✭ 180 (+0%)
Mutual labels:  payload
Tuktuk
Tool for catching and logging different types of requests.
Stars: ✭ 174 (-3.33%)
Mutual labels:  pentest
Attiny85
RubberDucky like payloads for DigiSpark Attiny85
Stars: ✭ 169 (-6.11%)
Mutual labels:  payload
Ssti Payloads
🎯 Server Side Template Injection Payloads
Stars: ✭ 150 (-16.67%)
Mutual labels:  payload
Trigmap
A wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (-26.67%)
Mutual labels:  pentest
Web Brutator
Fast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-46.11%)
Mutual labels:  pentest
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+330.56%)
Mutual labels:  pentest
winallenum
This powershell script has got to run in remote hacked windows host, even for pivoting
Stars: ✭ 13 (-92.78%)
Mutual labels:  pentest
301-360 of 382 similar projects