NmapNmap - the Network Mapper. Github mirror of official SVN repository.
Stars: ✭ 5,792 (+628.55%)
GoohakAutomatically Launch Google Hacking Queries Against A Target Domain
Stars: ✭ 432 (-45.66%)
MetabigorIntelligence tool but without API key
Stars: ✭ 424 (-46.67%)
DawsAdvanced Web Shell
Stars: ✭ 551 (-30.69%)
Dref DNS Rebinding Exploitation Framework
Stars: ✭ 423 (-46.79%)
ReverseapkQuickly analyze and reverse engineer Android packages
Stars: ✭ 419 (-47.3%)
AwspxA graph-based tool for visualizing effective access and resource relationships in AWS environments.
Stars: ✭ 546 (-31.32%)
DirsearchWeb path scanner
Stars: ✭ 7,246 (+811.45%)
ApkurlgrepExtract endpoints from APK files
Stars: ✭ 405 (-49.06%)
Red Teaming ToolkitThis repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Stars: ✭ 5,615 (+606.29%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (-49.31%)
PerunPerun是一款主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架
Stars: ✭ 773 (-2.77%)
Top25 ParameterFor basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙
Stars: ✭ 388 (-51.19%)
YasuoA ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (-34.97%)
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+765.66%)
Langhost👻 A LAN dropbox chatbot controllable via Telegram
Stars: ✭ 324 (-59.25%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (-35.97%)
SqlmapAutomatic SQL injection and database takeover tool
Stars: ✭ 21,907 (+2655.6%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (-8.43%)
SecuritymanageframworkSecurity Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Stars: ✭ 378 (-52.45%)
Linkedin2usernameOSINT Tool: Generate username lists for companies on LinkedIn
Stars: ✭ 504 (-36.6%)
Security whitepapersCollection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQLi
Stars: ✭ 644 (-18.99%)
ReconnoteWeb Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
Stars: ✭ 322 (-59.5%)
AiodnsbrutePython 3.5+ DNS asynchronous brute force utility
Stars: ✭ 370 (-53.46%)
Stowaway👻Stowaway -- Multi-hop Proxy Tool for pentesters
Stars: ✭ 500 (-37.11%)
PupyPupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+747.42%)
Impost3r👻Impost3r -- A linux password thief
Stars: ✭ 355 (-55.35%)
HabuHacking Toolkit
Stars: ✭ 635 (-20.13%)
Cobalt strike extension kitAttempting to be an all in one repo for others' userful aggressor scripts as well as things we've found useful during Red Team Operations.
Stars: ✭ 345 (-56.6%)
Juice ShopOWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+688.68%)
CansinaWeb Content Discovery Tool
Stars: ✭ 709 (-10.82%)
Suid3numA standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)
Stars: ✭ 342 (-56.98%)
CelerystalkAn asynchronous enumeration & vulnerability scanner. Run all the tools on all the hosts.
Stars: ✭ 333 (-58.11%)
SuboverA Powerful Subdomain Takeover Tool
Stars: ✭ 607 (-23.65%)
NatlasScaling Network Scanning. Changes prior to 1.0 may cause difficult to avoid backwards incompatibilities. You've been warned.
Stars: ✭ 333 (-58.11%)
Sn1perAttack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+515.97%)
Htrace.shMy simple Swiss Army knife for http/https troubleshooting and profiling.
Stars: ✭ 3,465 (+335.85%)
Offensive DockerOffensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-58.74%)
PentestkitUseful tools and scripts during Penetration Testing engagements
Stars: ✭ 463 (-41.76%)
HashviewA web front-end for password cracking and analytics
Stars: ✭ 601 (-24.4%)
GetaltnameExtract subdomains from SSL certificates in HTTPS sites.
Stars: ✭ 320 (-59.75%)
KaboomA tool to automate penetration tests
Stars: ✭ 322 (-59.5%)
OctopusOpen source pre-operation C2 server based on python and powershell
Stars: ✭ 449 (-43.52%)
AutordpwnThe Shadow Attack Framework
Stars: ✭ 688 (-13.46%)
InjuredandroidA vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
Stars: ✭ 317 (-60.13%)
SilverMass scan IPs for vulnerable services
Stars: ✭ 588 (-26.04%)
NullinuxInternal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB.
Stars: ✭ 451 (-43.27%)
AirgeddonThis is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (+381.76%)
NmapguiAdvanced Graphical User Interface for NMap
Stars: ✭ 318 (-60%)
Passphrase WordlistPassphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (-30.06%)
Dradis CeDradis Framework: Colllaboration and reporting for IT Security teams
Stars: ✭ 443 (-44.28%)