GopherC# tool to discover low hanging fruits
Stars: ✭ 73 (+10.61%)
PythonadvancedhttpreverseshellAdvanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.
Stars: ✭ 22 (-66.67%)
nclnuclei framework scripts
Stars: ✭ 25 (-62.12%)
GetaltnameExtract subdomains from SSL certificates in HTTPS sites.
Stars: ✭ 320 (+384.85%)
skweezFast website scraper and wordlist generator
Stars: ✭ 49 (-25.76%)
NishangNishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: ✭ 5,943 (+8904.55%)
EzpzShellCollection Of Reverse Shell that can easily generate using Python3
Stars: ✭ 46 (-30.3%)
Red Team Curation ListA list to discover work of red team tooling and methodology for penetration testing and security assessment
Stars: ✭ 68 (+3.03%)
IoxTool for port forwarding & intranet proxy
Stars: ✭ 411 (+522.73%)
MailRipV3SMTP and IMAP checker / cracker for mailpass combolists with a user-friendly GUI, automated inbox test and many more features.
Stars: ✭ 28 (-57.58%)
Gray hat csharp codeThis repository contains full code examples from the book Gray Hat C#
Stars: ✭ 301 (+356.06%)
OffensiveCloudDistributionLeverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.
Stars: ✭ 86 (+30.3%)
EvilurlGenerate unicode evil domains for IDN Homograph Attack and detect them.
Stars: ✭ 654 (+890.91%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (+510.61%)
reverse-sshStatically-linked ssh server with reverse shell functionality for CTFs and such
Stars: ✭ 548 (+730.3%)
GoPhish-TemplatesGoPhish Templates that I have retired and/or templates I've recreated.
Stars: ✭ 76 (+15.15%)
CcatCloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Stars: ✭ 300 (+354.55%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+1259.09%)
flydnsRelated subdomains finder
Stars: ✭ 29 (-56.06%)
Sherlock🔎 Hunt down social media accounts by username across social networks
Stars: ✭ 28,569 (+43186.36%)
LiffyLocal file inclusion exploitation tool
Stars: ✭ 290 (+339.39%)
OSINTBookmarksOSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (-48.48%)
BlackmambaC2/post-exploitation framework
Stars: ✭ 544 (+724.24%)
BlueTeam.LabBlue Team detection lab created with Terraform and Ansible in Azure.
Stars: ✭ 82 (+24.24%)
LazyreconAn automated approach to performing recon for bug bounty hunting and penetration testing.
Stars: ✭ 282 (+327.27%)
NTPDoserNTP Doser is a NTP Amplification DoS/DDoS attack tool for penttesting
Stars: ✭ 96 (+45.45%)
VuldashVulnerability Dashboard
Stars: ✭ 16 (-75.76%)
rsGenrsGen is a Reverse Shell Payload Generator for hacking.
Stars: ✭ 71 (+7.58%)
CloudbunnyCloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search engines to search domain information: Shodan, Censys and Zoomeye.
Stars: ✭ 273 (+313.64%)
sqlscanQuick SQL Scanner, Dorker, Webshell injector PHP
Stars: ✭ 140 (+112.12%)
HerculesHERCULES is a special payload generator that can bypass antivirus softwares.
Stars: ✭ 526 (+696.97%)
BlacknetFree advanced and modern Windows botnet with a nice and secure PHP panel.
Stars: ✭ 271 (+310.61%)
PwnedPasswordsCheckerSearch (offline) if your password (NTLM or SHA1 format) has been leaked (HIBP passwords list v8)
Stars: ✭ 52 (-21.21%)
Rfd CheckerRFD Checker - security CLI tool to test Reflected File Download issues
Stars: ✭ 56 (-15.15%)
CloudbruteAwesome cloud enumerator
Stars: ✭ 268 (+306.06%)
Vipermetasploit-framework 图形界面 / 图形化内网渗透工具
Stars: ✭ 487 (+637.88%)
mobilehacktoolsA repository for scripting a mobile attack toolchain
Stars: ✭ 61 (-7.58%)
GosintOSINT Swiss Army Knife
Stars: ✭ 401 (+507.58%)
AzureCLI-ExtractorA tool to extract and abuse access tokens from AzureCLI for bypassing 2FA/MFA.
Stars: ✭ 43 (-34.85%)
Attack ToolsUtilities for MITRE™ ATT&CK
Stars: ✭ 810 (+1127.27%)
dwnd(ockerp)wn - a docker pwn tool manager
Stars: ✭ 154 (+133.33%)
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+10327.27%)
GdogA fully featured Windows backdoor that uses Gmail as a C&C server
Stars: ✭ 399 (+504.55%)
shellPython 3 Reverse Shell
Stars: ✭ 22 (-66.67%)
log4j-detectorLog4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!
Stars: ✭ 622 (+842.42%)
spellbookFramework for rapid development and reusable of security tools
Stars: ✭ 67 (+1.52%)
Project BlackPentest/BugBounty progress control with scanning modules
Stars: ✭ 257 (+289.39%)