HawkeyeHawkeye filesystem analysis tool
Stars: ✭ 202 (+69.75%)
DirsearchWeb path scanner
Stars: ✭ 7,246 (+5989.08%)
vafVaf is a cross-platform very advanced and fast web fuzzer written in nim
Stars: ✭ 294 (+147.06%)
CameradarCameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+2231.93%)
RenginereNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+2789.92%)
IkyOSINT Project
Stars: ✭ 203 (+70.59%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+327.73%)
Awesome BbhtA bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (+59.66%)
tugareconPentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+19.33%)
VajraVajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (+126.05%)
flydnsRelated subdomains finder
Stars: ✭ 29 (-75.63%)
NmapIdiomatic nmap library for go developers
Stars: ✭ 391 (+228.57%)
Red Teaming ToolkitThis repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Stars: ✭ 5,615 (+4618.49%)
Name That Hash🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 3000+ other hashes ☄ Comes with a neat web app 🔥
Stars: ✭ 540 (+353.78%)
Passphrase WordlistPassphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (+367.23%)
BrutemapLet's find someone's account
Stars: ✭ 113 (-5.04%)
FavfreakMaking Favicon.ico based Recon Great again !
Stars: ✭ 564 (+373.95%)
VirtualsecconsAn ongoing list of virtual cybersecurity conferences.
Stars: ✭ 113 (-5.04%)
Inferno🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-11.76%)
Scilla🏴☠️ Information Gathering tool 🏴☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-2.52%)
SubtakeAutomatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.
Stars: ✭ 104 (-12.61%)
Search That Hash🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+291.6%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+551.26%)
Yotteryotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage
Stars: ✭ 118 (-0.84%)
Mitmap📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+1182.35%)
Awesome HackingA collection of various awesome lists for hackers, pentesters and security researchers
Stars: ✭ 48,038 (+40268.07%)
NishangNishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: ✭ 5,943 (+4894.12%)
0d1nTool for automating customized attacks against web applications. Fully made in C language with pthreads, it has fast performance.
Stars: ✭ 506 (+325.21%)
Git HoundReconnaissance tool for GitHub code search. Finds exposed API keys using pattern matching, commit history searching, and a unique result scoring system.
Stars: ✭ 602 (+405.88%)
DvwaDamn Vulnerable Web Application (DVWA)
Stars: ✭ 5,727 (+4712.61%)
Reconspider🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
Stars: ✭ 621 (+421.85%)
ReconpiReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.
Stars: ✭ 490 (+311.76%)
Oscp Prepmy oscp prep collection
Stars: ✭ 105 (-11.76%)
SublertSublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (+487.39%)
Hacker ContainerContainer with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-11.76%)
GorsairGorsair hacks its way into remote docker containers that expose their APIs
Stars: ✭ 678 (+469.75%)
Sn0intSemi-automatic OSINT framework and package manager
Stars: ✭ 814 (+584.03%)
SimplyemailEmail recon made fast and easy, with a framework to build on
Stars: ✭ 779 (+554.62%)
Badusb botnet👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-73.11%)
BrutexAutomatically brute force all services running on a target.
Stars: ✭ 974 (+718.49%)
NetsetOperational Security utility and automator.
Stars: ✭ 110 (-7.56%)
Collection DocumentCollection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+1065.55%)
FiercephishFiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.
Stars: ✭ 960 (+706.72%)
ReconftwreconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+718.49%)
SpellbookMicro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-55.46%)
KeyeKeye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-15.13%)
HackphilesBruteForce Tool For both Instagram and Facebook
Stars: ✭ 57 (-52.1%)
WsshWSSH Is a tool for brute forcing servers that has port 22 open via ssh, wssh is probably the fastest ssh brute forcer available
Stars: ✭ 21 (-82.35%)
JaelesThe Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+801.68%)
RoutersploitExploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+8190.76%)
CloudfailUtilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
Stars: ✭ 1,239 (+941.18%)
SubjackSubdomain Takeover tool written in Go
Stars: ✭ 1,194 (+903.36%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+965.55%)