WebspoiltThis script will you help to find the information about the website and to help in penetrating testing
Stars: ✭ 34 (+25.93%)
BrutusBotnet targeting Windows machines written entirely in Python & open source security project.
Stars: ✭ 37 (+37.04%)
hacking-resourcesHacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
Stars: ✭ 1,386 (+5033.33%)
ElliotA pentesting tool inspired by mr robot and derived by zphisher
Stars: ✭ 23 (-14.81%)
FreeFire-PhishingFree Fire Phishing Tool ID Hack Tool For Online Hacking
Stars: ✭ 140 (+418.52%)
Aliens eyeSocial media hunter
Stars: ✭ 105 (+288.89%)
community-id-specAn open standard for hashing network flows into identifiers, a.k.a "Community IDs".
Stars: ✭ 137 (+407.41%)
masscannedLet's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-hosted alternative to GreyNoise.
Stars: ✭ 50 (+85.19%)
BrutegramInstagram multi-bruteforce Platfrom
Stars: ✭ 183 (+577.78%)
007-TheBondThis Script will help you to gather information about your victim or friend.
Stars: ✭ 371 (+1274.07%)
ArachneAn always-on framework that performs end-to-end functional network testing for reachability, latency, and packet loss
Stars: ✭ 353 (+1207.41%)
CocoadebugiOS Debugging Tool 🚀
Stars: ✭ 3,769 (+13859.26%)
anon.landopen source Imageboard just like was Voxed.net
Stars: ✭ 16 (-40.74%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+2729.63%)
minipwnerA script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".
Stars: ✭ 53 (+96.3%)
pyhtoolsA Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester credential harvester, keylogger, download&execute, ransomware, data harvestors, etc.
Stars: ✭ 166 (+514.81%)
ehtkEthical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Researchers etc. It contains almost all tools mentioned in CEH, OSCP, eCPPT and PNPT
Stars: ✭ 59 (+118.52%)
testmynids.orgA website and framework for testing NIDS detection
Stars: ✭ 55 (+103.7%)
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (+66.67%)
argusArgus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (+222.22%)
HostEnumeratorA tool that automates the process of enumeration
Stars: ✭ 29 (+7.41%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (+177.78%)
HashExploitHashExpoit is Great Tool For Cracking Hash
Stars: ✭ 17 (-37.04%)
Vaultswiss army knife for hackers
Stars: ✭ 346 (+1181.48%)
NsotNetwork Source of Truth is an open source IPAM and network inventory database
Stars: ✭ 337 (+1148.15%)
PigA Linux packet crafting tool.
Stars: ✭ 384 (+1322.22%)
PoseidonPoseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a number of machine learning techniques. The machine learning algorithms classify and predict the type of device.
Stars: ✭ 310 (+1048.15%)
Go PingA simple ping library using ICMP echo requests.
Stars: ✭ 158 (+485.19%)
Bmonbandwidth monitor and rate estimator
Stars: ✭ 787 (+2814.81%)
phishEyephishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (+74.07%)
NetfoxA lightweight, one line setup, iOS / OSX network debugging library! 🦊
Stars: ✭ 3,188 (+11707.41%)
d4-coreD4 core software (server and sample sensor client)
Stars: ✭ 40 (+48.15%)
Black-ToolInstall the tools and start Attacking , black-tool v5.0 ! ⬛
Stars: ✭ 239 (+785.19%)
redshellguidepython script allow red teaming , hackthebox Pwners , OSCP lovers to shorten their time by these useful shells
Stars: ✭ 32 (+18.52%)
hackarsenaltoolkitHacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools
Stars: ✭ 39 (+44.44%)
trolotrolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (+66.67%)
ivreNetwork recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,712 (+9944.44%)
TORhunterDesigned to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .onion
Stars: ✭ 47 (+74.07%)
Kali-Linux-Tools-InterfaceGraphical Web interface developed to facilitate the use of security information tools.
Stars: ✭ 169 (+525.93%)
Awesome HackingAwesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+6574.07%)
TokenBreakerJSON RSA to HMAC and None Algorithm Vulnerability POC
Stars: ✭ 51 (+88.89%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+211.11%)
dorkScannerA typical search engine dork scanner scrapes search engines with dorks that you provide in order to find vulnerable URLs.
Stars: ✭ 93 (+244.44%)
matrixmirror of https://mypdns.org/my-privacy-dns/matrix as it is obviously no longer safe to do Girhub nor have we no longer any trust in them. See https://mypdns.org/my-privacy-dns/porn-records/-/issues/1347
Stars: ✭ 32 (+18.52%)
pycommunityidA Python implementation of the Community ID flow hashing standard
Stars: ✭ 18 (-33.33%)
BGP-RankingBGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)
Stars: ✭ 49 (+81.48%)
hide-meMac and hostname random changer
Stars: ✭ 33 (+22.22%)
AdbNetA tool that allows you to search for vulnerable android devices across the world and exploit them.
Stars: ✭ 112 (+314.81%)
SpywarePython-based spyware for Windows that logs the foreground window activites, keyboard inputs. Furthermore it is able to take screenshots and and run shell commands in the background.
Stars: ✭ 31 (+14.81%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+33162.96%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+4092.59%)
4chan-nodejsA 4chan clone written in node.js
Stars: ✭ 36 (+33.33%)
fluxionWiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)
Stars: ✭ 115 (+325.93%)
cyber-securityCybersecurity stuff for both the blue team and the red team, mostly red though.
Stars: ✭ 34 (+25.93%)
Zeek-Network-Security-MonitorA Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (+40.74%)