👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?" 🔍 🕵️
Stars: ✭ 38 (-57.3%)
A wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (+48.31%)
JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)
Stars: ✭ 450 (+405.62%)
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+660.67%)
Attack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+5402.25%)
Web path scanner
Stars: ✭ 7,246 (+8041.57%)
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-60.67%)
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (-3.37%)
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (+15.73%)
pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
Stars: ✭ 904 (+915.73%)
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+432.58%)
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+3764.04%)
🏴☠️ Information Gathering tool 🏴☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (+30.34%)
Stars: ✭ 635 (+613.48%)
A tool to test security of json web token
Stars: ✭ 130 (+46.07%)
A tool to automate penetration tests
Stars: ✭ 322 (+261.8%)
👶 BabySploit Beginner Pentesting Toolkit/Framework Written in Python 🐍
Stars: ✭ 883 (+892.13%)
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+758.43%)
The LAZY script will make your life easier, and of course faster.
Stars: ✭ 3,056 (+3333.71%)
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+2497.75%)
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+3710.11%)
Tool Information Gathering Write By Python.
Stars: ✭ 300 (+237.08%)
🌔 Official Repository for DarkSpiritz Penetration Framework | Written in Python 🐍
Stars: ✭ 219 (+146.07%)
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (+202.25%)
network reconnaissance toolkit
Stars: ✭ 353 (+296.63%)
Useful tools and scripts during Penetration Testing engagements
Stars: ✭ 463 (+420.22%)
NetCat for Windows
Stars: ✭ 463 (+420.22%)
Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB.
Stars: ✭ 451 (+406.74%)
👻Stowaway -- Multi-hop Proxy Tool for pentesters
Stars: ✭ 500 (+461.8%)
A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (+480.9%)
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+507.87%)
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-3.37%)
OSINT Tool: Generate username lists for companies on LinkedIn
Stars: ✭ 504 (+466.29%)
Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (+524.72%)
Red Team Curation List
A list to discover work of red team tooling and methodology for penetration testing and security assessment
Stars: ✭ 68 (-23.6%)
Venom - A Multi-hop Proxy for Penetration Testers
Stars: ✭ 1,228 (+1279.78%)
A small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any year or complete list of all years possible. Made Specially for penetration testing purpose.
Stars: ✭ 66 (-25.84%)
The Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-4.49%)
A web front-end for password cracking and analytics
Stars: ✭ 601 (+575.28%)
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+614.61%)
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+1176.4%)
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+7632.58%)
Gorsair hacks its way into remote docker containers that expose their APIs
Stars: ✭ 678 (+661.8%)
Dradis Framework: Colllaboration and reporting for IT Security teams
Stars: ✭ 443 (+397.75%)
Collection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
Stars: ✭ 89 (+0%)
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+1314.61%)
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-30.34%)
Python3 script to perform LDAP queries and enumerate users, groups, and computers from Windows Domains. Ldap_Search can also perform brute force/password spraying to identify valid accounts via LDAP.
Stars: ✭ 78 (-12.36%)
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+770.79%)
Stars: ✭ 773 (+768.54%)
Penetration Testing Platform
Stars: ✭ 1,103 (+1139.33%)
The Last Web Recon Tool You'll Need
Stars: ✭ 888 (+897.75%)
A curated list of awesome OSCP resources
Stars: ✭ 804 (+803.37%)