All Projects → H4cker → Similar Projects or Alternatives

2054 Open source projects that are alternatives of or similar to H4cker

argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (-99.17%)
Blackworm
Black Worm Offical Repo
Stars: ✭ 80 (-99.23%)
Mutual labels:  hacking, hacker, hackers
reconmap
Vulnerability assessment and penetration testing automation and reporting platform for teams.
Stars: ✭ 242 (-97.68%)
Webspoilt
This script will you help to find the information about the website and to help in penetrating testing
Stars: ✭ 34 (-99.67%)
Shiro exploit
Apache Shiro 反序列化漏洞检测与利用工具
Stars: ✭ 252 (-97.59%)
Hackercamp
Enine boyuna siber güvenlik
Stars: ✭ 149 (-98.57%)
Mutual labels:  hacking, cybersecurity, hacker
vulnerablecode
A free and open vulnerabilities database and the packages they impact. And the tools to aggregate and correlate these vulnerabilities. Sponsored by NLnet https://nlnet.nl/project/vulnerabilitydatabase/ for https://www.aboutcode.org/ Chat at https://gitter.im/aboutcode-org/vulnerablecode Docs at https://vulnerablecode.readthedocs.org/
Stars: ✭ 269 (-97.43%)
Xunfeng
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Stars: ✭ 3,131 (-70.04%)
Vulnx
vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (-90.35%)
Awesome Ethical Hacking Resources
🔗 All the resources I could find for learning Ethical Hacking and Penetration Testing.
Stars: ✭ 933 (-91.07%)
Mutual labels:  hacking, penetration-testing, hackers
Purify
All-in-one tool for managing vulnerability reports from AppSec pipelines
Stars: ✭ 72 (-99.31%)
Iblessing
iblessing is an iOS security exploiting toolkit, it mainly includes application information collection, static analysis and dynamic analysis. It can be used for reverse engineering, binary analysis and vulnerability mining.
Stars: ✭ 326 (-96.88%)
Vbscan
OWASP VBScan is a Black Box vBulletin Vulnerability Scanner
Stars: ✭ 295 (-97.18%)
Securitymanageframwork
Security Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Stars: ✭ 378 (-96.38%)
Awesome Hacking Resources
A collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+9.71%)
Mutual labels:  hacking, penetration-testing, exploit
hacking-resources
Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
Stars: ✭ 1,386 (-86.74%)
Mutual labels:  vulnerability, hacker, ethicalhacking
Android Exploits
A collection of android Exploits and Hacks
Stars: ✭ 290 (-97.23%)
Mutual labels:  hacking, exploit, exploits
Archstrike
An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (-96.16%)
Mutual labels:  hacking, penetration-testing, hackers
Hellraiser
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (-96.05%)
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (-95.91%)
Mutual labels:  hacking, penetration-testing
Penetration Testing Study Notes
Penetration Testing notes, resources and scripts
Stars: ✭ 461 (-95.59%)
Mutual labels:  hacking, penetration-testing
Wahh extras
The Web Application Hacker's Handbook - Extra Content
Stars: ✭ 428 (-95.9%)
Mutual labels:  hacking, hacker
Solr Injection
Apache Solr Injection Research
Stars: ✭ 464 (-95.56%)
Mutual labels:  hacking, vulnerability
Pentestkit
Useful tools and scripts during Penetration Testing engagements
Stars: ✭ 463 (-95.57%)
Mutual labels:  hacking, penetration-testing
Poc
Proofs-of-concept
Stars: ✭ 467 (-95.53%)
Mutual labels:  exploit, vulnerability
Search That Hash
🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (-95.54%)
Mutual labels:  hacking, cybersecurity
Hackerpro
All in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog
Stars: ✭ 474 (-95.46%)
Mutual labels:  hacking, penetration-testing
Brutesploit
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (-95.94%)
Mutual labels:  hacking, hacker
Sn1per
Attack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (-53.14%)
Instainsane
Multi-threaded Instagram Brute Forcer (100 attemps at once)
Stars: ✭ 475 (-95.45%)
Mutual labels:  hacking, hacker
Thecollective
The Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-99.19%)
Katanaframework
The New Hacking Framework
Stars: ✭ 502 (-95.2%)
Mutual labels:  hacking, penetration-testing
Linkedin2username
OSINT Tool: Generate username lists for companies on LinkedIn
Stars: ✭ 504 (-95.18%)
Mutual labels:  hacking, penetration-testing
A2sv
Auto Scanning to SSL Vulnerability
Stars: ✭ 524 (-94.99%)
Mutual labels:  hacking, vulnerability
Vulscan
vulscan 扫描系统:最新的poc&exp漏洞扫描,redis未授权、敏感文件、java反序列化、tomcat命令执行及各种未授权扫描等...
Stars: ✭ 486 (-95.35%)
Logkeys
📝 ⌨️ A GNU/Linux keylogger that works!
Stars: ✭ 518 (-95.04%)
Mutual labels:  hacking, cybersecurity
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (-87.95%)
Mutual labels:  hacking, penetration-testing
Secdevlabs
A laboratory for learning secure web and mobile development in a practical manner.
Stars: ✭ 547 (-94.77%)
Mutual labels:  training, vulnerability
Opcde
OPCDE Cybersecurity Conference Materials
Stars: ✭ 538 (-94.85%)
Mutual labels:  cybersecurity, vulnerability
Rsf
The Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
Stars: ✭ 76 (-99.27%)
Ysoserial
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
Stars: ✭ 4,808 (-53.99%)
Mutual labels:  exploit, vulnerability
Iprotate burp extension
Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.
Stars: ✭ 484 (-95.37%)
Mutual labels:  hacking, penetration-testing
Whonow
A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
Stars: ✭ 533 (-94.9%)
Mutual labels:  hacking, penetration-testing
Easy hack
Hack the World using Termux
Stars: ✭ 549 (-94.75%)
Mutual labels:  penetration-testing, hackers
Scanners Box
A powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑
Stars: ✭ 5,590 (-46.51%)
Dvwa
Damn Vulnerable Web Application (DVWA)
Stars: ✭ 5,727 (-45.2%)
Mutual labels:  training, hacking
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (-94.22%)
Mutual labels:  hacking, cybersecurity
Damn Vulnerable Graphql Application
Damn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
Stars: ✭ 567 (-94.57%)
Ble Security Attack Defence
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Stars: ✭ 88 (-99.16%)
Mutual labels:  hacking, vulnerability
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (-93.91%)
Mutual labels:  hacking, penetration-testing
Joomscan
OWASP Joomla Vulnerability Scanner Project
Stars: ✭ 640 (-93.88%)
Mutual labels:  exploit, vulnerability-scanners
Jok3r
Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (-93.83%)
Mutual labels:  hacking, vulnerability-scanners
Passphrase Wordlist
Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (-94.68%)
Mutual labels:  hacking, penetration-testing
Habu
Hacking Toolkit
Stars: ✭ 635 (-93.92%)
Mutual labels:  hacking, penetration-testing
Phishing Frenzy
Ruby on Rails Phishing Framework
Stars: ✭ 643 (-93.85%)
Mutual labels:  hacking, penetration-testing
Reverse Shell
Reverse Shell as a Service
Stars: ✭ 1,281 (-87.74%)
Mutual labels:  exploit, vulnerability
K8cscan
K8Cscan大型内网渗透自定义插件化扫描神器,包含信息收集、网络资产、漏洞扫描、密码爆破、漏洞利用,程序采用多线程批量扫描大型内网多个IP段C段主机,目前插件包含: C段旁注扫描、子域名扫描、Ftp密码爆破、Mysql密码爆破、Oracle密码爆破、MSSQL密码爆破、Windows/Linux系统密码爆破、存活主机扫描、端口扫描、Web信息探测、操作系统版本探测、Cisco思科设备扫描等,支持调用任意外部程序或脚本,支持Cobalt Strike联动
Stars: ✭ 693 (-93.37%)
Mutual labels:  hacking, exploit
Gitjacker
🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (-88.05%)
Mutual labels:  hacking, penetration-testing
Htshells
Self contained htaccess shells and attacks
Stars: ✭ 708 (-93.23%)
Mutual labels:  penetration-testing, exploit
Sublert
Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (-93.31%)
Mutual labels:  hacking, penetration-testing
61-120 of 2054 similar projects