Offensive DockerOffensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (+268.54%)
Scout🔭 Lightweight URL fuzzer and spider: Discover a web server's undisclosed files, directories and VHOSTs
Stars: ✭ 241 (+170.79%)
CommixAutomated All-in-One OS Command Injection Exploitation Tool.
Stars: ✭ 3,016 (+3288.76%)
EzxssezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
Stars: ✭ 1,022 (+1048.31%)
centCommunity edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place
Stars: ✭ 315 (+253.93%)
ReconnoteWeb Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
Stars: ✭ 322 (+261.8%)
AutordpwnThe Shadow Attack Framework
Stars: ✭ 688 (+673.03%)
VanquishVanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Stars: ✭ 449 (+404.49%)
Pwdlyser-CLIPython-based CLI Password Analyser (Reporting Tool)
Stars: ✭ 29 (-67.42%)
ShellabLinux and Windows shellcode enrichment utility
Stars: ✭ 225 (+152.81%)
Mr.Holmes🔍 A Complete Osint Tool
Stars: ✭ 307 (+244.94%)
anubisCaptive wifi hotspot bypass tool for Linux
Stars: ✭ 46 (-48.31%)
BrutalPayload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (+661.8%)
asnapasnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the user to automate initial port and service scanning.
Stars: ✭ 28 (-68.54%)
ARL-NPoC集漏洞验证和任务运行的一个框架
Stars: ✭ 73 (-17.98%)
InjuredandroidA vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
Stars: ✭ 317 (+256.18%)
CloudfailUtilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
Stars: ✭ 1,239 (+1292.13%)
SandmapNmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (+1225.84%)
BifrostBifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-58.43%)
BrutusA Python-powered exploitation framework and botnet.
Stars: ✭ 17 (-80.9%)
FfufFast web fuzzer written in Go
Stars: ✭ 5,687 (+6289.89%)
argusArgus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (-2.25%)
ServerscanServerScan一款使用Golang开发的高并发网络扫描、服务探测工具。
Stars: ✭ 674 (+657.3%)
ggtfobinsGet GTFOBins info about a given exploit from the command line
Stars: ✭ 27 (-69.66%)
BruteCredential stuffing engine built for security professionals
Stars: ✭ 435 (+388.76%)
teatimeAn RPC attack framework for Blockchain nodes.
Stars: ✭ 88 (-1.12%)
CintruderCaptcha Intruder (CIntrud3r) is an automatic pentesting tool to bypass captchas.
Stars: ✭ 192 (+115.73%)
ConptyshellConPtyShell - Fully Interactive Reverse Shell for Windows
Stars: ✭ 309 (+247.19%)
Stegseek⚡️ Worlds fastest steghide cracker, chewing through millions of passwords per second ⚡️
Stars: ✭ 187 (+110.11%)
Thc Ipv6IPv6 attack toolkit
Stars: ✭ 673 (+656.18%)
DumbDumain Bruteforcer - a fast and flexible domain bruteforcer
Stars: ✭ 54 (-39.33%)
SecuritySome of my security stuff and vulnerabilities. Nothing advanced. More to come.
Stars: ✭ 835 (+838.2%)
FireelffireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (+388.76%)
auto-recon-ngAutomated script to run all modules for a specified list of domains, netblocks or company name
Stars: ✭ 17 (-80.9%)
PhotonIncredibly fast crawler designed for OSINT.
Stars: ✭ 8,332 (+9261.8%)
FuzzdictsWeb Pentesting Fuzz 字典,一个就够了。
Stars: ✭ 4,013 (+4408.99%)
bug-bountyMy personal bug bounty toolkit.
Stars: ✭ 127 (+42.7%)
FbiFacebook Information
Stars: ✭ 660 (+641.57%)
GoohakAutomatically Launch Google Hacking Queries Against A Target Domain
Stars: ✭ 432 (+385.39%)
E4GL30S1NTE4GL30S1NT - Simple Information Gathering Tool
Stars: ✭ 139 (+56.18%)
BadintentIntercept, modify, repeat and attack Android's Binder transactions using Burp Suite
Stars: ✭ 303 (+240.45%)
GtfonowAutomatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: ✭ 68 (-23.6%)
Xerrorfully automated pentesting tool
Stars: ✭ 173 (+94.38%)
SkaSimple Karma Attack
Stars: ✭ 55 (-38.2%)
ScriptsScripts I use during pentest engagements.
Stars: ✭ 834 (+837.08%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-57.3%)
STEWSA Security Tool for Enumerating WebSockets
Stars: ✭ 154 (+73.03%)
AutoPentest-DRLAutoPentest-DRL: Automated Penetration Testing Using Deep Reinforcement Learning
Stars: ✭ 196 (+120.22%)
MetabigorIntelligence tool but without API key
Stars: ✭ 424 (+376.4%)
Offensive-Security-CayuqueoScripts usados en mi formación de Offensive Security por medio de la suscripción Learn Unlimited
Stars: ✭ 14 (-84.27%)
FlashRoute🚀 Takes minutes to explore the topology of all routable /24 prefixes in IPv4 address space. Now supports IPv6 scan!
Stars: ✭ 26 (-70.79%)
HashtopolisA Hashcat wrapper for distributed hashcracking
Stars: ✭ 835 (+838.2%)
CovertutilsA framework for Backdoor development!
Stars: ✭ 424 (+376.4%)
AlfredA friendly Toolkit for Beginner CTF players
Stars: ✭ 39 (-56.18%)
Red-Rabbit-V4The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate other peoples tools like the aircrack suite or the wifite framework, it rather has its own code and is raw source with over 270+ options. This framework might just be your everyday key to your workflow
Stars: ✭ 123 (+38.2%)
Dref DNS Rebinding Exploitation Framework
Stars: ✭ 423 (+375.28%)