All Projects β†’ Evillimiter β†’ Similar Projects or Alternatives

1947 Open source projects that are alternatives of or similar to Evillimiter

Habu
Hacking Toolkit
Stars: ✭ 635 (-16.88%)
Lockdoor Framework
πŸ” Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (-11.39%)
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+48.69%)
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-76.18%)
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (-37.96%)
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+848.43%)
Sn1per
Attack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+540.97%)
Cameradar
Cameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+263.22%)
Cheatsheet God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+360.86%)
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (-44.11%)
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+343.85%)
Sippts
Set of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-84.82%)
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+1.44%)
Scilla
πŸ΄β€β˜ οΈ Information Gathering tool πŸ΄β€β˜ οΈ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-84.82%)
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+13.87%)
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (-5.1%)
Vault
swiss army knife for hackers
Stars: ✭ 346 (-54.71%)
Mutual labels:  networking, hacking, pentesting, hacking-tool
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+358.51%)
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+138.74%)
Awesome Shodan Queries
πŸ” A collection of interesting, funny, and depressing search queries to plug into shodan.io πŸ‘©β€πŸ’»
Stars: ✭ 2,758 (+260.99%)
Yasuo
A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (-32.33%)
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+0.39%)
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-91.88%)
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+64.79%)
Rustscan
πŸ€– The Modern Port Scanner πŸ€–
Stars: ✭ 5,218 (+582.98%)
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-50%)
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+82.2%)
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+152.36%)
Minesweeper
A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-78.8%)
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (-16.75%)
Webmap
A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generation during a Web Penetration Testing
Stars: ✭ 188 (-75.39%)
Packetwhisper
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (-46.99%)
Fdsploit
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (-73.95%)
Jwtxploiter
A tool to test security of json web token
Stars: ✭ 130 (-82.98%)
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+202.62%)
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-75.13%)
Interlace
Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (-0.52%)
Pentestkit
Useful tools and scripts during Penetration Testing engagements
Stars: ✭ 463 (-39.4%)
Capsulecorp Pentest
Vagrant VirtualBox environment for conducting an internal network penetration test
Stars: ✭ 214 (-71.99%)
Icg Autoexploiterbot
Wordpress πŸ”₯ Joomla πŸ”₯ Drupal πŸ”₯ OsCommerce πŸ”₯ Prestashop πŸ”₯ Opencart πŸ”₯
Stars: ✭ 242 (-68.32%)
Penetration Testing Study Notes
Penetration Testing notes, resources and scripts
Stars: ✭ 461 (-39.66%)
Deep-Inside
Command line tool that allows you to explore IoT devices by using Shodan API.
Stars: ✭ 22 (-97.12%)
YAPS
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-95.42%)
Exploitpack
Exploit Pack -The next generation exploit framework
Stars: ✭ 728 (-4.71%)
Blackhat Arsenal Tools
Official Black Hat Arsenal Security Tools Repository
Stars: ✭ 2,639 (+245.42%)
Mutual labels:  hacking, security-tools, hacking-tool
Network Threats Taxonomy
Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-89.66%)
Mutual labels:  networking, hacking, security-tools
Goby
Attack surface mapping
Stars: ✭ 446 (-41.62%)
Mutual labels:  networking, hacking, security-tools
Hackerpro
All in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog
Stars: ✭ 474 (-37.96%)
Susanoo
A REST API security testing framework.
Stars: ✭ 287 (-62.43%)
Webkiller
Tool Information Gathering Write By Python.
Stars: ✭ 300 (-60.73%)
Stowaway
πŸ‘»Stowaway -- Multi-hop Proxy Tool for pentesters
Stars: ✭ 500 (-34.55%)
Justtryharder
JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)
Stars: ✭ 450 (-41.1%)
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (-33.38%)
Mutual labels:  hacking, security-tools, pentesting
Evil Ssdp
Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.
Stars: ✭ 204 (-73.3%)
Cloudbrute
Awesome cloud enumerator
Stars: ✭ 268 (-64.92%)
Mutual labels:  hacking, pentesting, pentest-tool
Hackerenv
Stars: ✭ 309 (-59.55%)
Mutual labels:  pentesting, hacking-tool, pentest-tool
Linkedin2username
OSINT Tool: Generate username lists for companies on LinkedIn
Stars: ✭ 504 (-34.03%)
Thc Hydra
hydra
Stars: ✭ 5,645 (+638.87%)
Badkarma
network reconnaissance toolkit
Stars: ✭ 353 (-53.8%)
Impost3r
πŸ‘»Impost3r -- A linux password thief
Stars: ✭ 355 (-53.53%)
1-60 of 1947 similar projects