All Projects → Grecon → Similar Projects or Alternatives

996 Open source projects that are alternatives of or similar to Grecon

OffensiveCloudDistribution
Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.
Stars: ✭ 86 (-27.73%)
Mutual labels:  recon, bugbounty
aquatone
A Tool for Domain Flyovers
Stars: ✭ 43 (-63.87%)
Mutual labels:  bugbounty, hacking-tool
leaky-paths
A collection of special paths linked to major web CVEs, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to scan passively for high-quality endpoints and quick-wins.
Stars: ✭ 507 (+326.05%)
Mutual labels:  recon, bugbounty
Reconspider
🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
Stars: ✭ 621 (+421.85%)
Mutual labels:  hacking, recon
Webhackersweapons
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 1,205 (+912.61%)
Mutual labels:  hacking, bugbounty
Deksterecon
Web Application recon automation
Stars: ✭ 109 (-8.4%)
Mutual labels:  recon, bugbounty
Reconky-Automated Bash Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (+40.34%)
Mutual labels:  recon, bugbounty
Cloudscraper
CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.
Stars: ✭ 276 (+131.93%)
Mutual labels:  hacking, bugbounty
Bopscrk
Tool to generate smart and powerful wordlists
Stars: ✭ 273 (+129.41%)
Mutual labels:  hacking, hacking-tool
Recon My Way
This repository created for personal use and added tools from my latest blog post.
Stars: ✭ 271 (+127.73%)
Mutual labels:  recon, bugbounty
Windows Post Exploitation
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (+148.74%)
Mutual labels:  hacking, hacking-tool
Cheatsheet God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+2858.82%)
Mutual labels:  hacking, hacking-tool
Quack
Quack Toolkit is a set of tools to provide denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools.
Stars: ✭ 305 (+156.3%)
Mutual labels:  hacking, hacking-tool
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-62.18%)
Mutual labels:  bugbounty, hacking-tool
Offensive Docker
Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (+175.63%)
Mutual labels:  hacking, bugbounty
Oneforall
OneForAll是一款功能强大的子域收集工具
Stars: ✭ 4,202 (+3431.09%)
Mutual labels:  recon, bugbounty
Katana
A Python Tool For google Hacking
Stars: ✭ 355 (+198.32%)
Mutual labels:  hacking, hacking-tool
Osint tips
OSINT
Stars: ✭ 322 (+170.59%)
Mutual labels:  hacking, bugbounty
Chromepass
Chromepass - Hacking Chrome Saved Passwords
Stars: ✭ 364 (+205.88%)
Mutual labels:  hacking, hacking-tool
Anymethodlog
Log any method call of object in Objective-C
Stars: ✭ 361 (+203.36%)
Mutual labels:  hacking, hacking-tool
Xeexe Topantivirusevasion
Undetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (+225.21%)
Mutual labels:  hacking, hacking-tool
Vajra
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (+126.05%)
Mutual labels:  hacking, recon
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+247.06%)
Mutual labels:  hacking, hacking-tool
Search That Hash
🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+291.6%)
Mutual labels:  hacking, hacking-tool
Hellraiser
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (+247.06%)
Mutual labels:  hacking, hacking-tool
Hack Tools
hack tools
Stars: ✭ 488 (+310.08%)
Mutual labels:  hacking, hacking-tool
Redteamtools
记录自己编写、修改的部分工具
Stars: ✭ 752 (+531.93%)
Mutual labels:  hacking, hacking-tool
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (-29.41%)
Mutual labels:  bugbounty, hacking-tool
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+542.02%)
Mutual labels:  hacking, hacking-tool
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+551.26%)
Mutual labels:  hacking, hacking-tool
Xspear
Powerfull XSS Scanning and Parameter analysis tool&gem
Stars: ✭ 583 (+389.92%)
Mutual labels:  hacking, bugbounty
Beef Over Wan
Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-31.09%)
Mutual labels:  hacking, hacking-tool
Redcloud
Automated Red Team Infrastructure deployement using Docker
Stars: ✭ 551 (+363.03%)
Mutual labels:  hacking, bugbounty
Security whitepapers
Collection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQLi
Stars: ✭ 644 (+441.18%)
Mutual labels:  hacking, bugbounty
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+434.45%)
Mutual labels:  hacking, hacking-tool
Payloadsallthethings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+27554.62%)
Mutual labels:  hacking, bugbounty
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+6414.29%)
Mutual labels:  hacking, hacking-tool
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+509.24%)
Mutual labels:  hacking, hacking-tool
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+468.91%)
Mutual labels:  hacking, hacking-tool
Trape
People tracker on the Internet: OSINT analysis and research tool by Jose Pino
Stars: ✭ 6,753 (+5574.79%)
Mutual labels:  hacking, hacking-tool
Xattacker
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+653.78%)
Mutual labels:  hacking, hacking-tool
Shuffle
WebShell Backdoor Framework
Stars: ✭ 11 (-90.76%)
Mutual labels:  hacking, hacking-tool
Sql Injection Payload List
🎯 SQL Injection Payload List
Stars: ✭ 716 (+501.68%)
Mutual labels:  hacking, bugbounty
Privesc
A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+560.5%)
Mutual labels:  hacking, bugbounty
Simplyemail
Email recon made fast and easy, with a framework to build on
Stars: ✭ 779 (+554.62%)
Mutual labels:  hacking, recon
Urlhunter
a recon tool that allows searching on URLs that are exposed via shortener services
Stars: ✭ 934 (+684.87%)
Mutual labels:  recon, bugbounty
Impulse
💣 Impulse Denial-of-service ToolKit
Stars: ✭ 538 (+352.1%)
Mutual labels:  hacking, hacking-tool
Web Brutator
Fast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-18.49%)
Mutual labels:  hacking, hacking-tool
Sandmap
Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (+891.6%)
Mutual labels:  hacking, hacking-tool
Wifipassword Stealer
Get All Registered Wifi Passwords from Target Computer.
Stars: ✭ 97 (-18.49%)
Mutual labels:  hacking, hacking-tool
Swift Keylogger
Keylogger for mac written in Swift using HID
Stars: ✭ 995 (+736.13%)
Mutual labels:  hacking, hacking-tool
Deepweb Scappering
Discover hidden deepweb pages
Stars: ✭ 40 (-66.39%)
Mutual labels:  hacking, hacking-tool
Givingstorm
Infection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-39.5%)
Mutual labels:  hacking, hacking-tool
Cfw2ofw Helper
Providing aid in converting video games.
Stars: ✭ 44 (-63.03%)
Mutual labels:  hacking, hacking-tool
Vulnx
vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+747.9%)
Mutual labels:  hacking, hacking-tool
Chaos
🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Stars: ✭ 1,168 (+881.51%)
Mutual labels:  hacking, hacking-tool
Brutex
Automatically brute force all services running on a target.
Stars: ✭ 974 (+718.49%)
Mutual labels:  hacking, bugbounty
Websocket Connection Smuggler
websocket-connection-smuggler
Stars: ✭ 40 (-66.39%)
Mutual labels:  hacking, bugbounty
Slowloris
Asynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-57.14%)
Mutual labels:  hacking, hacking-tool
Project Tauro
A Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-56.3%)
Mutual labels:  hacking, hacking-tool
61-120 of 996 similar projects