OsmedeusFully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+1041.75%)
Log KillerClear all your logs in [linux/windows] servers 🛡️
Stars: ✭ 252 (-15.15%)
PhishapiComprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (-8.42%)
Raptor wafRaptor - WAF - Web application firewall using DFA [ Current version ] - Beta
Stars: ✭ 246 (-17.17%)
WcshadowrocketiOS Shadowrocket(砸壳重签,仅供参考,添加节点存在问题)。另一个fq项目potatso源码参见:https://github.com/we11cheng/WCPotatso
Stars: ✭ 291 (-2.02%)
CaesarAn HTTP based RAT (Remote Administration Tool) that allows you to remotely control devices from your browser
Stars: ✭ 240 (-19.19%)
ProcspyPython tool that monitors and logs user-run commands on a Linux system for either offensive or defensive purposes..
Stars: ✭ 272 (-8.42%)
HatchHatch is a brute force tool that is used to brute force most websites
Stars: ✭ 242 (-18.52%)
Freki🐺 Malware analysis platform
Stars: ✭ 285 (-4.04%)
RatpoisonLatest Ver: 1.7; Default Menu Key is F1; Charlatano's Successor; dn
Stars: ✭ 239 (-19.53%)
CripsIP Tools To quickly get information about IP Address's, Web Pages and DNS records.
Stars: ✭ 272 (-8.42%)
Reverse Shell GeneratorHosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
Stars: ✭ 238 (-19.87%)
Windows Post ExploitationWindows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (-0.34%)
MercuryMercury is a hacking tool used to collect information and use the information to further hurt the target
Stars: ✭ 236 (-20.54%)
ArachniWeb Application Security Scanner Framework
Stars: ✭ 2,942 (+890.57%)
PhishmailerGenerate Professional Phishing Emails Fast And Easy
Stars: ✭ 227 (-23.57%)
SmaliscaStatic Code Analysis for Smali files
Stars: ✭ 284 (-4.38%)
DccwbypassuacWindows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".
Stars: ✭ 227 (-23.57%)
CalderaAutomated Adversary Emulation Platform
Stars: ✭ 3,126 (+952.53%)
Gametracking Csgo📥 Game Tracker: Counter-Strike: Global Offensive
Stars: ✭ 286 (-3.7%)
SitedorksSearch Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term with a default set of websites, bug bounty programs or a custom collection.
Stars: ✭ 221 (-25.59%)
MicrocodeMicrocode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode
Stars: ✭ 268 (-9.76%)
RoninRonin is a Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of code, Exploits or Payloads, Scanners, etc, via Repositories.
Stars: ✭ 220 (-25.93%)
Can reverse engineeringAutomated Payload Reverse Engineering Pipeline for the Controller Area Network (CAN) protocol
Stars: ✭ 282 (-5.05%)
Pentest WikiPENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.
Stars: ✭ 2,668 (+798.32%)
BoomerangBoomerang Decompiler - Fighting the code-rot :)
Stars: ✭ 265 (-10.77%)
BuildapksReally quickly build APKs on handheld device (smartphone or tablet) in Amazon, Android, Chromebook and Windows📲 See https://buildapks.github.io/docsBuildAPKs/setup to start building APKs.
Stars: ✭ 218 (-26.6%)
HalHAL – The Hardware Analyzer
Stars: ✭ 298 (+0.34%)
Jenkins Rce😈 Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!
Stars: ✭ 262 (-11.78%)
QuineQuine Museum
Stars: ✭ 263 (-11.45%)
T LoadNew Interface And Loading Screen For Termux Users
Stars: ✭ 207 (-30.3%)
Xss LoaderXss Payload Generator ~ Xss Scanner ~ Xss Dork Finder
Stars: ✭ 215 (-27.61%)
XelfviewerELF file viewer/editor for Windows, Linux and MacOS.
Stars: ✭ 279 (-6.06%)
WtfjhOne-step iOS binary runtime instrumentation for the lazy ones
Stars: ✭ 265 (-10.77%)
BrutedumBruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack
Stars: ✭ 212 (-28.62%)
Tool XTool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install almost 370+ hacking tools in termux app and other linux based distributions.
Stars: ✭ 3,361 (+1031.65%)
DeckerDeclarative penetration testing orchestration framework
Stars: ✭ 263 (-11.45%)
PandwarfPandwaRF: RF analysis tool with a sub-1 GHz wireless transceiver controlled by a smartphone or
Stars: ✭ 206 (-30.64%)
Ladon大型内网渗透扫描器&Cobalt Strike,Ladon8.9内置120个模块,包含信息收集/存活主机/端口扫描/服务识别/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010/SMBGhost/Weblogic/ActiveMQ/Tomcat/Struts2,密码口令爆破(Mysql/Oracle/MSSQL)/FTP/SSH(Linux)/VNC/Windows(IPC/WMI/SMB/Netbios/LDAP/SmbHash/WmiHash/Winrm),远程执行命令(smbexec/wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0
Stars: ✭ 2,911 (+880.13%)
MercureMercure is a tool for security managers who want to train their colleague to phishing.
Stars: ✭ 262 (-11.78%)
WhatcmsCMS Detection and Exploit Kit based on Whatcms.org API
Stars: ✭ 205 (-30.98%)
IkyOSINT Project
Stars: ✭ 203 (-31.65%)
Wifi Pumpkin DeprecatedDEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3
Stars: ✭ 2,964 (+897.98%)
B2r2B2R2 is a collection of useful algorithms, functions, and tools for binary analysis.
Stars: ✭ 262 (-11.78%)
Effective ShellText, samples and website for my 'Effective Shell' series.
Stars: ✭ 204 (-31.31%)
O365reconretrieve information via O365 with a valid cred
Stars: ✭ 204 (-31.31%)
VacSource code of Valve Anti-Cheat obtained from disassembly of compiled modules
Stars: ✭ 254 (-14.48%)
Evil SsdpSpoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.
Stars: ✭ 204 (-31.31%)
Awesome Hacking ListsProject transferred to: https://github.com/taielab/awesome-hacking-lists
Stars: ✭ 203 (-31.65%)
PlasmaPlasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.
Stars: ✭ 2,956 (+895.29%)