All Projects → Grecon → Similar Projects or Alternatives

996 Open source projects that are alternatives of or similar to Grecon

Awsbucketdump
Security Tool to Look For Interesting Files in S3 Buckets
Stars: ✭ 1,021 (+757.98%)
Mutual labels:  bugbounty
Goby
Attack surface mapping
Stars: ✭ 446 (+274.79%)
Mutual labels:  hacking
Pentestkit
Useful tools and scripts during Penetration Testing engagements
Stars: ✭ 463 (+289.08%)
Mutual labels:  hacking
Learn365
This repo is about @harshbothra_ 365 days of learning Tweet & Mindmap collection
Stars: ✭ 525 (+341.18%)
Mutual labels:  bugbounty
Pythem
pentest framework
Stars: ✭ 1,060 (+790.76%)
Mutual labels:  hacking
Hacktheworld
An Python Script For Generating Payloads that Bypasses All Antivirus so far .
Stars: ✭ 527 (+342.86%)
Mutual labels:  hacking
Redteam vul
红队作战中比较常遇到的一些重点系统漏洞整理。
Stars: ✭ 1,271 (+968.07%)
Mutual labels:  hacking
A2sv
Auto Scanning to SSL Vulnerability
Stars: ✭ 524 (+340.34%)
Mutual labels:  hacking
Hoper
Security tool to trace URL's jumps across the rel links to obtain the last URL
Stars: ✭ 50 (-57.98%)
Mutual labels:  recon
Blackrat
BlackRAT - Java Based Remote Administrator Tool
Stars: ✭ 87 (-26.89%)
Mutual labels:  hacking
Tweak Series
Repo for YouTube series
Stars: ✭ 44 (-63.03%)
Mutual labels:  hacking
Solr Injection
Apache Solr Injection Research
Stars: ✭ 464 (+289.92%)
Mutual labels:  hacking
Dockerscan
Docker security analysis & hacking tools
Stars: ✭ 1,046 (+778.99%)
Mutual labels:  hacking
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads, it has fast performance.
Stars: ✭ 506 (+325.21%)
Mutual labels:  hacking
Csp
Given a list of hosts, this small utility fetches all whitelisted domains from the hosts' CSPs.
Stars: ✭ 89 (-25.21%)
Mutual labels:  bugbounty
Katanaframework
The New Hacking Framework
Stars: ✭ 502 (+321.85%)
Mutual labels:  hacking
31 Days Of Api Security Tips
This challenge is Inon Shkedy's 31 days API Security Tips.
Stars: ✭ 1,038 (+772.27%)
Mutual labels:  bugbounty
Nullinux
Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB.
Stars: ✭ 451 (+278.99%)
Mutual labels:  recon
Awesome Asset Discovery
List of Awesome Asset Discovery Resources
Stars: ✭ 1,017 (+754.62%)
Mutual labels:  recon
Shotlooter
a recon tool that finds sensitive data inside the screenshots uploaded to prnt.sc
Stars: ✭ 451 (+278.99%)
Mutual labels:  recon
Iprotate burp extension
Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.
Stars: ✭ 484 (+306.72%)
Mutual labels:  hacking
Bug Bounty Responses
A collection of response templates for invalid bug bounty reports.
Stars: ✭ 46 (-61.34%)
Mutual labels:  bugbounty
Darthsidious
Building an Active Directory domain and hacking it
Stars: ✭ 479 (+302.52%)
Mutual labels:  hacking
Rvd
Robot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (-26.89%)
Mutual labels:  hacking
Pcwt
Stars: ✭ 46 (-61.34%)
Mutual labels:  bugbounty
Virtualseccons
An ongoing list of virtual cybersecurity conferences.
Stars: ✭ 113 (-5.04%)
Mutual labels:  hacking
Extracttvpasswords
tool to extract passwords from TeamViewer memory using Frida
Stars: ✭ 444 (+273.11%)
Mutual labels:  hacking
Tweetshell
Multi-thread Twitter BruteForcer in Shell Script
Stars: ✭ 112 (-5.88%)
Mutual labels:  hacking
Nuclei Templates
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Stars: ✭ 1,354 (+1037.82%)
Mutual labels:  bugbounty
Hookso
linux动态链接库的注入修改查找工具 A tool for injection, modification and search of linux dynamic link library
Stars: ✭ 87 (-26.89%)
Mutual labels:  hacking
Dns Rebind Toolkit
A front-end JavaScript toolkit for creating DNS rebinding attacks.
Stars: ✭ 435 (+265.55%)
Mutual labels:  hacking
Goohak
Automatically Launch Google Hacking Queries Against A Target Domain
Stars: ✭ 432 (+263.03%)
Mutual labels:  hacking
Burpbounty
Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the active and passive scanner by means of personalized rules through a very intuitive graphical interface.
Stars: ✭ 1,026 (+762.18%)
Mutual labels:  bugbounty
Shellpop
Pop shells like a master.
Stars: ✭ 1,279 (+974.79%)
Mutual labels:  hacking
Sn1per
Attack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+4015.13%)
Mutual labels:  hacking-tool
Ezxss
ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
Stars: ✭ 1,022 (+758.82%)
Mutual labels:  bugbounty
Hackerone Reports
Top disclosed reports from HackerOne
Stars: ✭ 458 (+284.87%)
Mutual labels:  bugbounty
Collection Document
Collection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+1065.55%)
Mutual labels:  hacking
Penetration Testing Study Notes
Penetration Testing notes, resources and scripts
Stars: ✭ 461 (+287.39%)
Mutual labels:  hacking
Cve 2019 0708 Tool
A social experiment
Stars: ✭ 87 (-26.89%)
Mutual labels:  hacking
Mec
for mass exploiting
Stars: ✭ 448 (+276.47%)
Mutual labels:  hacking-tool
Legal Bug Bounty
#legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.
Stars: ✭ 42 (-64.71%)
Mutual labels:  bugbounty
Mitmap
📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+1182.35%)
Mutual labels:  hacking
Usb Keystroke Injector
☠️ An Arduino-based USB keyboard simulator which injects keystrokes via Bluetooth protocol or predefined payloads in a SD card.
Stars: ✭ 42 (-64.71%)
Mutual labels:  hacking
Keylogger
A simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (+746.22%)
Mutual labels:  hacking
Wahh extras
The Web Application Hacker's Handbook - Extra Content
Stars: ✭ 428 (+259.66%)
Mutual labels:  hacking
Hulk
HULK DoS tool ported to Go with some additional features.
Stars: ✭ 427 (+258.82%)
Mutual labels:  hacking
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+965.55%)
Mutual labels:  hacking
Metabigor
Intelligence tool but without API key
Stars: ✭ 424 (+256.3%)
Mutual labels:  bugbounty
Taketv
TakeTV permite descubrir dispositivos de red DLNA/UPnP y ayuda a reproducir archivos multimedia en los televisores inteligentes desde nuestra terminal en Linux.
Stars: ✭ 41 (-65.55%)
Mutual labels:  hacking
Brutesploit
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (+256.3%)
Mutual labels:  hacking
Timelapse
A time lapse app for Sony Alpha camera using the OpenMemories framework
Stars: ✭ 101 (-15.13%)
Mutual labels:  hacking
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-27.73%)
Mutual labels:  hacking
Dref
DNS Rebinding Exploitation Framework
Stars: ✭ 423 (+255.46%)
Mutual labels:  hacking
Security Notes
📓 Some security related notes
Stars: ✭ 422 (+254.62%)
Mutual labels:  hacking
Arpspoof
arpspoof for macOS - intercept packets on a switched LAN
Stars: ✭ 40 (-66.39%)
Mutual labels:  hacking
Ehtools
Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: ✭ 422 (+254.62%)
Mutual labels:  hacking
Ctfr
Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
Stars: ✭ 1,535 (+1189.92%)
Mutual labels:  hacking
Hackerone Lessons
Transcribed video lessons of HackerOne to pdf's
Stars: ✭ 101 (-15.13%)
Mutual labels:  hacking
Bugbounty Starter Notes
bug bounty hunters starter notes
Stars: ✭ 85 (-28.57%)
Mutual labels:  recon
301-360 of 996 similar projects