ArachniWeb Application Security Scanner Framework
Stars: ✭ 2,942 (+135.55%)
Ctf NotesEverything needed for doing CTFs
Stars: ✭ 304 (-75.66%)
Vaultswiss army knife for hackers
Stars: ✭ 346 (-72.3%)
Red Team Curation ListA list to discover work of red team tooling and methodology for penetration testing and security assessment
Stars: ✭ 68 (-94.56%)
PentmenuA bash script for recon and DOS attacks
Stars: ✭ 288 (-76.94%)
AirgeddonThis is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (+206.65%)
VajraVajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (-78.46%)
Langhost👻 A LAN dropbox chatbot controllable via Telegram
Stars: ✭ 324 (-74.06%)
OsintgramOsintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Stars: ✭ 312 (-75.02%)
Black Hat RustApplied offensive security with Rust - Early access - https://academy.kerkour.com/black-hat-rust?coupon=GITHUB
Stars: ✭ 331 (-73.5%)
Offensive DockerOffensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-73.74%)
Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (-71.74%)
CloudbruteAwesome cloud enumerator
Stars: ✭ 268 (-78.54%)
Rustscan🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+317.77%)
AiodnsbrutePython 3.5+ DNS asynchronous brute force utility
Stars: ✭ 370 (-70.38%)
Slackor A Golang implant that uses Slack as a command and control server
Stars: ✭ 392 (-68.61%)
GhostwriterThe SpecterOps project management and reporting engine
Stars: ✭ 394 (-68.45%)
ParadoxiaratParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (-68.37%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+619.06%)
Hunter(l)user hunter using WinAPI calls only
Stars: ✭ 359 (-71.26%)
StegcrackerSteganography brute-force utility to uncover hidden data inside files
Stars: ✭ 396 (-68.29%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (-67.73%)
RsfThe Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
Stars: ✭ 76 (-93.92%)
EhtoolsWi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: ✭ 422 (-66.21%)
ReverseapkQuickly analyze and reverse engineer Android packages
Stars: ✭ 419 (-66.45%)
ReconcatA small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any year or complete list of all years possible. Made Specially for penetration testing purpose.
Stars: ✭ 66 (-94.72%)
GoohakAutomatically Launch Google Hacking Queries Against A Target Domain
Stars: ✭ 432 (-65.41%)
Dradis CeDradis Framework: Colllaboration and reporting for IT Security teams
Stars: ✭ 443 (-64.53%)
JusttryharderJustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)
Stars: ✭ 450 (-63.97%)
UptuxLinux privilege escalation checks (systemd, dbus, socket fun, etc)
Stars: ✭ 260 (-79.18%)
ApkurlgrepExtract endpoints from APK files
Stars: ✭ 405 (-67.57%)
Dns Rebind ToolkitA front-end JavaScript toolkit for creating DNS rebinding attacks.
Stars: ✭ 435 (-65.17%)
NetcatNetCat for Windows
Stars: ✭ 463 (-62.93%)
Sn1perAttack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+292.07%)
SleightEmpire HTTP(S) C2 redirector setup script
Stars: ✭ 44 (-96.48%)
Iprotate burp extensionExtension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.
Stars: ✭ 484 (-61.25%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (-59.25%)
BigbountyreconBigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (-56.69%)
PayloadsallthethingsA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+2534.83%)
HackerproAll in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog
Stars: ✭ 474 (-62.05%)
DawsAdvanced Web Shell
Stars: ✭ 551 (-55.88%)
KeyloggerA simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (-19.38%)
HashviewA web front-end for password cracking and analytics
Stars: ✭ 601 (-51.88%)
Penetration Testing ToolsA collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (-50.84%)
Security whitepapersCollection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQLi
Stars: ✭ 644 (-48.44%)
GorsairGorsair hacks its way into remote docker containers that expose their APIs
Stars: ✭ 678 (-45.72%)
BrutalPayload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (-45.72%)
Juice ShopOWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+402%)
Platypus🔨 A modern multiple reverse shell sessions manager wrote in go
Stars: ✭ 559 (-55.24%)
SublertSublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (-44.04%)
AutordpwnThe Shadow Attack Framework
Stars: ✭ 688 (-44.92%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (-41.95%)
Eyes👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?" 🔍 🕵️
Stars: ✭ 38 (-96.96%)
VhostscanA virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (-38.59%)
PrivescA collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (-37.07%)