All Projects → Evil Ssdp → Similar Projects or Alternatives

1059 Open source projects that are alternatives of or similar to Evil Ssdp

In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-57.84%)
Mutual labels:  hacking, penetration-testing
Netmap.js
Fast browser-based network discovery module
Stars: ✭ 70 (-65.69%)
Mutual labels:  hacking, pentesting
Zynix Fusion
zynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
Stars: ✭ 84 (-58.82%)
Mutual labels:  hacking, pentesting
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+521.57%)
Mutual labels:  hacking, pentesting
Wstg
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
Stars: ✭ 3,873 (+1798.53%)
Mutual labels:  pentesting, penetration-testing
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+1033.33%)
Mutual labels:  hacking, pentesting
Breaking And Pwning Apps And Servers Aws Azure Training
Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands on training!
Stars: ✭ 749 (+267.16%)
Mutual labels:  pentesting, penetration-testing
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+275.98%)
Mutual labels:  hacking, penetration-testing
Security whitepapers
Collection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQLi
Stars: ✭ 644 (+215.69%)
Mutual labels:  hacking, pentesting
Remote Desktop Caching
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: ✭ 171 (-16.18%)
Mutual labels:  hacking, penetration-testing
Privesc
A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+285.29%)
Mutual labels:  hacking, pentesting
Awesome Oscp
A curated list of awesome OSCP resources
Stars: ✭ 804 (+294.12%)
Mutual labels:  pentesting, penetration-testing
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+279.9%)
Mutual labels:  hacking, pentesting
Pwncat
pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
Stars: ✭ 904 (+343.14%)
Mutual labels:  pentesting, penetration-testing
Keylogger
A simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (+393.63%)
Mutual labels:  hacking, pentesting
Eyes
👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?" 🔍 🕵️
Stars: ✭ 38 (-81.37%)
Mutual labels:  pentesting, penetration-testing
Kill Router
Ferramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-72.06%)
Mutual labels:  hacking, pentesting
Broxy
An HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (+347.06%)
Mutual labels:  hacking, penetration-testing
Reconcat
A small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any year or complete list of all years possible. Made Specially for penetration testing purpose.
Stars: ✭ 66 (-67.65%)
Mutual labels:  pentesting, penetration-testing
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+456.86%)
Mutual labels:  hacking, pentesting
Web Brutator
Fast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-52.45%)
Mutual labels:  hacking, pentesting
Hydrafw
HydraFW official firmware for HydraBus/HydraNFC for researcher, hackers, students, embedded software developers or anyone interested in debugging/hacking/developing/penetration testing
Stars: ✭ 165 (-19.12%)
Mutual labels:  hacking, penetration-testing
Rsf
The Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
Stars: ✭ 76 (-62.75%)
Mutual labels:  pentesting, penetration-testing
Givingstorm
Infection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-64.71%)
Mutual labels:  hacking, penetration-testing
Keye
Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-50.49%)
Mutual labels:  hacking, penetration-testing
Awesome Vulnerable Apps
Awesome Vulnerable Applications
Stars: ✭ 180 (-11.76%)
Mutual labels:  hacking, penetration-testing
Thecollective
The Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-58.33%)
Mutual labels:  pentesting, penetration-testing
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+517.16%)
Mutual labels:  hacking, penetration-testing
Minesweeper
A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-20.59%)
Mutual labels:  hacking, penetration-testing
Ssh Mitm
SSH man-in-the-middle tool
Stars: ✭ 1,328 (+550.98%)
Mutual labels:  hacking, penetration-testing
Flask Unsign
Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
Stars: ✭ 90 (-55.88%)
Mutual labels:  pentesting, penetration-testing
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-6.86%)
Mutual labels:  hacking, penetration-testing
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+5023.04%)
Mutual labels:  hacking, penetration-testing
Vailyn
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-49.51%)
Mutual labels:  pentesting, penetration-testing
Security Scripts
A collection of public offensive and defensive security related scripts for InfoSec students.
Stars: ✭ 101 (-50.49%)
Mutual labels:  pentesting, penetration-testing
Hacker Container
Container with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-48.53%)
Mutual labels:  hacking, pentesting
Blackhat Python Book
Code from Blackhat Python book
Stars: ✭ 178 (-12.75%)
Mutual labels:  pentesting, penetration-testing
Eyes.sh
Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?"
Stars: ✭ 89 (-56.37%)
Mutual labels:  pentesting, penetration-testing
Linux Smart Enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
Stars: ✭ 1,956 (+858.82%)
Mutual labels:  hacking, pentesting
Ctfr
Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
Stars: ✭ 1,535 (+652.45%)
Mutual labels:  hacking, pentesting
Burp Send To
Adds a customizable "Send to..."-context-menu to your BurpSuite.
Stars: ✭ 114 (-44.12%)
Mutual labels:  hacking, pentesting
Awesome Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
Stars: ✭ 48,038 (+23448.04%)
Mutual labels:  hacking, penetration-testing
Awesome Hacking
Awesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+783.33%)
Mutual labels:  hacking, penetration-testing
Mitmap
📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+648.04%)
Mutual labels:  hacking, pentesting
Horn3t
Powerful Visual Subdomain Enumeration at the Click of a Mouse
Stars: ✭ 120 (-41.18%)
Mutual labels:  pentesting, penetration-testing
Sippts
Set of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-43.14%)
Mutual labels:  hacking, pentesting
Ratel
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-40.69%)
Mutual labels:  hacking, pentesting
M3m0
M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 124 (-39.22%)
Mutual labels:  hacking, penetration-testing
Pentest Notes
Collection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
Stars: ✭ 89 (-56.37%)
Mutual labels:  pentesting, penetration-testing
Hackingthe.cloud
Content for hackingthe.cloud
Stars: ✭ 101 (-50.49%)
Mutual labels:  hacking, penetration-testing
Oscp Automation
A collection of personal scripts used in hacking excercises.
Stars: ✭ 118 (-42.16%)
Mutual labels:  hacking, penetration-testing
Telekiller
A Tools Session Hijacking And Stealer Local Passcode Telegram Windows
Stars: ✭ 122 (-40.2%)
Mutual labels:  hacking, penetration-testing
Awesome Hacking Resources
A collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+5520.59%)
Mutual labels:  hacking, penetration-testing
Jwtxploiter
A tool to test security of json web token
Stars: ✭ 130 (-36.27%)
Mutual labels:  pentesting, penetration-testing
Evil Winrm
The ultimate WinRM shell for hacking/pentesting
Stars: ✭ 2,251 (+1003.43%)
Mutual labels:  hacking, pentesting
Trigmap
A wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (-35.29%)
Mutual labels:  pentesting, penetration-testing
Dnstricker
A simple dns resolver of dns-record and web-record log server for pentesting
Stars: ✭ 128 (-37.25%)
Mutual labels:  hacking, pentesting
Buffer overflow
Don't let buffer overflows overflow your mind
Stars: ✭ 131 (-35.78%)
Mutual labels:  hacking, penetration-testing
Cr3dov3r
Know the dangers of credential reuse attacks.
Stars: ✭ 1,700 (+733.33%)
Mutual labels:  hacking, pentesting
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+794.12%)
Mutual labels:  hacking, penetration-testing
61-120 of 1059 similar projects