UnChainA tool to find redirection chains in multiple URLs
Stars: ✭ 77 (+102.63%)
OctopusOpen source pre-operation C2 server based on python and powershell
Stars: ✭ 449 (+1081.58%)
ScriptsScripts I use during pentest engagements.
Stars: ✭ 834 (+2094.74%)
SQLbitJust another script for automatize boolean-based blind SQL injections. (Demo)
Stars: ✭ 30 (-21.05%)
AriaCloudA Docker container for remote penetration testing.
Stars: ✭ 105 (+176.32%)
auth analyzerBurp Extension for testing authorization issues. Automated request repeating and parameter value extraction on the fly.
Stars: ✭ 77 (+102.63%)
wifi-deautherA fully automatic wifi deauther coded in Python
Stars: ✭ 25 (-34.21%)
Shotlootera recon tool that finds sensitive data inside the screenshots uploaded to prnt.sc
Stars: ✭ 451 (+1086.84%)
EvilUSBQuick utility to craft executables for pentesting and managing reverse shells
Stars: ✭ 33 (-13.16%)
SwiftnessxA cross-platform note-taking & target-tracking app for penetration testers.
Stars: ✭ 673 (+1671.05%)
FbiFacebook Information
Stars: ✭ 660 (+1636.84%)
WitnessmeWeb Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to make life easier.
Stars: ✭ 436 (+1047.37%)
WiFi-ProjectPre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (-42.11%)
Raven-StormRaven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.
Stars: ✭ 235 (+518.42%)
FfufFast web fuzzer written in Go
Stars: ✭ 5,687 (+14865.79%)
tenssensTenssens framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources.
Stars: ✭ 19 (-50%)
SessiongopherSessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.
Stars: ✭ 833 (+2092.11%)
BruteCredential stuffing engine built for security professionals
Stars: ✭ 435 (+1044.74%)
CVE-2020-0688-ScannerQuick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.
Stars: ✭ 38 (+0%)
xss-chefA web application for generating custom XSS payloads
Stars: ✭ 70 (+84.21%)
FireelffireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (+1044.74%)
xssmapIntelligent XSS detection tool that uses human techniques for looking for reflected cross-site scripting (XSS) vulnerabilities
Stars: ✭ 107 (+181.58%)
GoohakAutomatically Launch Google Hacking Queries Against A Target Domain
Stars: ✭ 432 (+1036.84%)
Fsocietyfsociety Hacking Tools Pack – A Penetration Testing Framework
Stars: ✭ 7,224 (+18910.53%)
ViPERWeb App Pen Tester (Web Interface)
Stars: ✭ 19 (-50%)
avainA Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
Stars: ✭ 56 (+47.37%)
AquatoneA Tool for Domain Flyovers
Stars: ✭ 4,405 (+11492.11%)
CTF-WriteupsRepository of my CTF writeups
Stars: ✭ 25 (-34.21%)
Security whitepapersCollection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQLi
Stars: ✭ 644 (+1594.74%)
MetabigorIntelligence tool but without API key
Stars: ✭ 424 (+1015.79%)
FacebookBugFacebook Write-ups, PoC, and exploitation codes:
Stars: ✭ 28 (-26.32%)
CovertutilsA framework for Backdoor development!
Stars: ✭ 424 (+1015.79%)
ORtesterOpen Redirect scanner - (out of date)
Stars: ✭ 24 (-36.84%)
CoogleA shot-for-shot remake of the Google Login Page.
Stars: ✭ 34 (-10.53%)
Ciphey⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Stars: ✭ 9,116 (+23889.47%)
WpforceWordpress Attack Suite
Stars: ✭ 633 (+1565.79%)
Dref DNS Rebinding Exploitation Framework
Stars: ✭ 423 (+1013.16%)
serverHashtopolis - A Hashcat wrapper for distributed hashcracking
Stars: ✭ 954 (+2410.53%)
SecurityExplainedSecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to create informational content in multiple formats and share with the community to enable knowledge creation and learning.
Stars: ✭ 301 (+692.11%)
juice-shop-ctfCapture-the-Flag (CTF) environment setup tools for OWASP Juice Shop supporting CTFd, FBCTF and RootTheBox
Stars: ✭ 287 (+655.26%)
ReverseapkQuickly analyze and reverse engineer Android packages
Stars: ✭ 419 (+1002.63%)
sherlock🔎 Find usernames across social networks.
Stars: ✭ 47 (+23.68%)
Cloud enumMulti-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.
Stars: ✭ 420 (+1005.26%)
BrutusBotnet targeting Windows machines written entirely in Python & open source security project.
Stars: ✭ 37 (-2.63%)
Kubernetes GoatKubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
Stars: ✭ 868 (+2184.21%)
JackhammerJackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
Stars: ✭ 633 (+1565.79%)
PwndocPentest Report Generator
Stars: ✭ 417 (+997.37%)
SimpleKeyloggerSimple Keylogger with smtp to send emails on your account using python works on linux and Windows
Stars: ✭ 32 (-15.79%)
007-TheBondThis Script will help you to gather information about your victim or friend.
Stars: ✭ 371 (+876.32%)
WebspoiltThis script will you help to find the information about the website and to help in penetrating testing
Stars: ✭ 34 (-10.53%)