project-blackPentest/BugBounty progress control with scanning modules
Stars: ✭ 279 (+55%)
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-87.22%)
HookishHooks in to interesting functions and helps reverse the web app faster.
Stars: ✭ 129 (-28.33%)
payloadA javascript single page application (SPA) driver for REST API payload management.
Stars: ✭ 16 (-91.11%)
HerculesHERCULES is a special payload generator that can bypass antivirus softwares.
Stars: ✭ 526 (+192.22%)
PayloadsAllA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 31 (-82.78%)
Burp Bounty ProfilesBurp Bounty profiles compilation, feel free to contribute!
Stars: ✭ 76 (-57.78%)
LauschgeraetGets in the way of your victim's traffic and out of yours
Stars: ✭ 25 (-86.11%)
Dictionary Of PentestingDictionary collection project such as Pentesing, Fuzzing, Bruteforce and BugBounty. 渗透测试、SRC漏洞挖掘、爆破、Fuzzing等字典收集项目。
Stars: ✭ 492 (+173.33%)
skweezFast website scraper and wordlist generator
Stars: ✭ 49 (-72.78%)
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+163.33%)
PeekABooPeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses PowerShell remoting to perform this task. Note: Remote desktop is disabled by default on all Windows operating systems.
Stars: ✭ 120 (-33.33%)
Cloudflair🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.
Stars: ✭ 1,176 (+553.33%)
ChimeraChimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (+157.22%)
LAZYPARIAHA tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (-32.78%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-30%)
VNCPwnVNC pentest tool with bruteforce and ducky script execution features
Stars: ✭ 21 (-88.33%)
flydnsRelated subdomains finder
Stars: ✭ 29 (-83.89%)
Chaos🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Stars: ✭ 1,168 (+548.89%)
PyParser-CVEMulti source CVE/exploit parser.
Stars: ✭ 25 (-86.11%)
HershellHershell is a simple TCP reverse shell written in Go.
Stars: ✭ 442 (+145.56%)
ToRat clientThis is the ToRat client, a part of the ToRat Project.
Stars: ✭ 29 (-83.89%)
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (-20%)
tugareconPentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (-21.11%)
GoohakAutomatically Launch Google Hacking Queries Against A Target Domain
Stars: ✭ 432 (+140%)
sqlscanQuick SQL Scanner, Dorker, Webshell injector PHP
Stars: ✭ 140 (-22.22%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (+544.44%)
sx🖖 Fast, modern, easy-to-use network scanner
Stars: ✭ 1,267 (+603.89%)
Wahh extrasThe Web Application Hacker's Handbook - Extra Content
Stars: ✭ 428 (+137.78%)
report-ngGenerate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.
Stars: ✭ 62 (-65.56%)
Nraynray distributed port scanner
Stars: ✭ 125 (-30.56%)
mobilehacktoolsA repository for scripting a mobile attack toolchain
Stars: ✭ 61 (-66.11%)
EhtoolsWi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: ✭ 422 (+134.44%)
keyscopeKeyscope is a key and secret workflow (validation, invalidation, etc.) tool built in Rust
Stars: ✭ 369 (+105%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+528.89%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (-22.22%)
PwndocPentest Report Generator
Stars: ✭ 417 (+131.67%)
PasscatPasswords Recovery Tool
Stars: ✭ 164 (-8.89%)
PupyPupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+3642.78%)
GetPwdIt's a tool which generate a dictionary from a csv containing personals informations. Generate all common passwords based on perso info. (leet transformations and combinatory processing)
Stars: ✭ 46 (-74.44%)
OblivionData leak checker & OSINT Tool
Stars: ✭ 237 (+31.67%)
PatatorPatator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
Stars: ✭ 2,792 (+1451.11%)
Rfd CheckerRFD Checker - security CLI tool to test Reflected File Download issues
Stars: ✭ 56 (-68.89%)
RunascsRunasCs - Csharp and open version of windows builtin runas.exe
Stars: ✭ 216 (+20%)
IoxTool for port forwarding & intranet proxy
Stars: ✭ 411 (+128.33%)
Cracker-ToolAll in One CRACKER911181's Tool. This Tool For Hacking and Pentesting. 🎭
Stars: ✭ 181 (+0.56%)
GosintOSINT Swiss Army Knife
Stars: ✭ 401 (+122.78%)
HackapkAn Advanced Tool For Complete Apk-Modding In Termux ...
Stars: ✭ 180 (+0%)
TuktukTool for catching and logging different types of requests.
Stars: ✭ 174 (-3.33%)
Attiny85RubberDucky like payloads for DigiSpark Attiny85
Stars: ✭ 169 (-6.11%)
Ssti Payloads🎯 Server Side Template Injection Payloads
Stars: ✭ 150 (-16.67%)
TrigmapA wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (-26.67%)
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-46.11%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+330.56%)
winallenumThis powershell script has got to run in remote hacked windows host, even for pivoting
Stars: ✭ 13 (-92.78%)