All Projects → Hackercamp → Similar Projects or Alternatives

854 Open source projects that are alternatives of or similar to Hackercamp

Hack Tools
The all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+1745.64%)
Mutual labels:  hacking, cybersecurity, hacker
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+6914.09%)
Mutual labels:  hacking, cybersecurity, hacker
Payloads
Git All the Payloads! A collection of web attack payloads.
Stars: ✭ 2,862 (+1820.81%)
Mutual labels:  hacking, cybersecurity
Richkware
Framework for building Windows malware, written in C++
Stars: ✭ 315 (+111.41%)
Mutual labels:  hacking, hacker
W5
Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (+146.31%)
Mutual labels:  hacking, hacker
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (+24.83%)
Mutual labels:  hacking, hacker
Hfish
安全、可靠、简单、免费的企业级蜜罐
Stars: ✭ 2,977 (+1897.99%)
Mutual labels:  hacking, hacker
Oxidtools
200 TOOLS BY 0XID4FF0X FOR TERMUX
Stars: ✭ 143 (-4.03%)
Mutual labels:  hacking, hacker
Xxe Injection Payload List
🎯 XML External Entity (XXE) Injection Payload List
Stars: ✭ 304 (+104.03%)
Mutual labels:  hacking, cybersecurity
Brutal
Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (+355.03%)
Mutual labels:  hacking, hacker
Slowloris
Asynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-65.77%)
Mutual labels:  hacking, cybersecurity
Whitehat
Information about my experiences on ethical hacking 💀
Stars: ✭ 54 (-63.76%)
Mutual labels:  hacking, hacker
Bbrecon
Python library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (+13.42%)
Mutual labels:  hacking, cybersecurity
Cehv10 Notes
📕 Both personal and public notes for EC-Council's CEHv10 312-50, because its thousands of pages/slides of boredom, and a braindump to many
Stars: ✭ 170 (+14.09%)
Mutual labels:  hacking, hacker
Phonia
Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any international phone numbers with a very good accuracy.
Stars: ✭ 221 (+48.32%)
Mutual labels:  hacking, hacker
Lockphish
Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.
Stars: ✭ 186 (+24.83%)
Mutual labels:  hacking, cybersecurity
phomber
Phomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (-60.4%)
Mutual labels:  cybersecurity, hacker
Blacknet
Free advanced and modern Windows botnet with a nice and secure PHP panel.
Stars: ✭ 271 (+81.88%)
Mutual labels:  hacking, hacker
Reverse Engineering Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+3767.79%)
Mutual labels:  hacking, cybersecurity
Icg Autoexploiterbot
Wordpress 🔥 Joomla 🔥 Drupal 🔥 OsCommerce 🔥 Prestashop 🔥 Opencart 🔥
Stars: ✭ 242 (+62.42%)
Mutual labels:  hacking, hacker
Instainsane
Multi-threaded Instagram Brute Forcer (100 attemps at once)
Stars: ✭ 475 (+218.79%)
Mutual labels:  hacking, hacker
Logkeys
📝 ⌨️ A GNU/Linux keylogger that works!
Stars: ✭ 518 (+247.65%)
Mutual labels:  hacking, cybersecurity
Dracnmap
Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+477.85%)
Mutual labels:  hacking, hacker
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+354.36%)
Mutual labels:  hacking, cybersecurity
Aura Botnet
A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Bash, and Powershell.
Stars: ✭ 95 (-36.24%)
Mutual labels:  hacking, cybersecurity
Ecommerce Website Security Checklist
List of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built into the Techinical Specific Document, or will be checked in the Security testing phases.
Stars: ✭ 98 (-34.23%)
Mutual labels:  hacking, hacker
Ratel
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-18.79%)
Mutual labels:  hacking, cybersecurity
Redteam Hardware Toolkit
🔺 Red Team Hardware Toolkit 🔺
Stars: ✭ 163 (+9.4%)
Mutual labels:  hacking, hacker
Rvd
Robot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (-41.61%)
Mutual labels:  hacking, cybersecurity
Osint San
Framework для сбора данных из открытых источников. В Framework используется большое количество API, их необходимо зарегистрировать самому.​
Stars: ✭ 99 (-33.56%)
Mutual labels:  cybersecurity, hacker
Awesome Hacking Lists
Project transferred to: https://github.com/taielab/awesome-hacking-lists
Stars: ✭ 203 (+36.24%)
Mutual labels:  hacking, hacker
Zbn
安全编排与自动化响应平台
Stars: ✭ 201 (+34.9%)
Mutual labels:  hacking, hacker
Caldera
Automated Adversary Emulation Platform
Stars: ✭ 3,126 (+1997.99%)
Mutual labels:  hacking, cybersecurity
Virtualseccons
An ongoing list of virtual cybersecurity conferences.
Stars: ✭ 113 (-24.16%)
Mutual labels:  hacking, cybersecurity
CyberQueens
CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩‍💻👨‍💻
Stars: ✭ 30 (-79.87%)
Mutual labels:  cybersecurity, hacker
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (+69.13%)
Mutual labels:  hacking, cybersecurity
Phishapi
Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (+82.55%)
Mutual labels:  hacking, cybersecurity
Thechoice
The linux choice collection tools
Stars: ✭ 245 (+64.43%)
Mutual labels:  hacking, hacker
Entropy
Entropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-15.44%)
Mutual labels:  hacking, hacker
Quack
Quack Toolkit is a set of tools to provide denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools.
Stars: ✭ 305 (+104.7%)
Mutual labels:  hacking, hacker
Awesome Hacking Lists
平常看到好的渗透hacking工具和多领域效率工具的集合
Stars: ✭ 311 (+108.72%)
Mutual labels:  hacking, hacker
Wifipassword Stealer
Get All Registered Wifi Passwords from Target Computer.
Stars: ✭ 97 (-34.9%)
Mutual labels:  hacking, cybersecurity
Search That Hash
🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+212.75%)
Mutual labels:  hacking, cybersecurity
Wahh extras
The Web Application Hacker's Handbook - Extra Content
Stars: ✭ 428 (+187.25%)
Mutual labels:  hacking, hacker
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+305.37%)
Mutual labels:  hacking, cybersecurity
Brutesploit
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (+184.56%)
Mutual labels:  hacking, hacker
Packer Fuzzer
Packer Fuzzer is a fast and efficient scanner for security detection of websites constructed by javascript module bundler such as Webpack.
Stars: ✭ 753 (+405.37%)
Mutual labels:  hacking, cybersecurity
Hackingtool
ALL IN ONE Hacking Tool For Hackers
Stars: ✭ 7,521 (+4947.65%)
Mutual labels:  hacking, hacker
M3m0
M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 124 (-16.78%)
Mutual labels:  hacking, hacker
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+177.18%)
Mutual labels:  hacking, hacker
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+156.38%)
Mutual labels:  hacking, cybersecurity
Blackworm
Black Worm Offical Repo
Stars: ✭ 80 (-46.31%)
Mutual labels:  hacking, hacker
Collection Document
Collection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+830.87%)
Mutual labels:  hacking, hacker
Shodan Dorks
Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (-20.81%)
Mutual labels:  hacking, cybersecurity
Threadboat
Program Uses Thread Execution Hijacking To Inject Native Shell-code Into a Standard Win32 Application
Stars: ✭ 132 (-11.41%)
Mutual labels:  hacking
Enteletaor
Message Queue & Broker Injection tool
Stars: ✭ 139 (-6.71%)
Mutual labels:  hacking
Jiff
JavaScript library for building web-based applications that employ secure multi-party computation (MPC).
Stars: ✭ 131 (-12.08%)
Mutual labels:  cybersecurity
Buffer overflow
Don't let buffer overflows overflow your mind
Stars: ✭ 131 (-12.08%)
Mutual labels:  hacking
Opencti
Authors
Stars: ✭ 2,165 (+1353.02%)
Mutual labels:  cybersecurity
Penetration
渗透 超全面的渗透资料💯 包含:0day,xss,sql注入,提权……
Stars: ✭ 1,706 (+1044.97%)
Mutual labels:  hacker
1-60 of 854 similar projects