juice-shop-ctfCapture-the-Flag (CTF) environment setup tools for OWASP Juice Shop supporting CTFd, FBCTF and RootTheBox
Stars: ✭ 287 (-7.12%)
DevilDevil is a tool that is basically made for facebook to Hack target accounts , BruteForce Attack , grab friendlist accounts , yahoo chacker , Facbook Friend information gathering tool , auto likes reactions & much more i hope you enjoy this tool i'm not responsible if you use this tool for any illegal purpose
Stars: ✭ 88 (-71.52%)
Burp ParamalyzerParamalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.
Stars: ✭ 102 (-66.99%)
magicReconMagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+54.69%)
HolyTipsA Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.
Stars: ✭ 1,210 (+291.59%)
ApeXUsing Social Engineering To Obtain WiFi Passwords
Stars: ✭ 87 (-71.84%)
DeepseaDeepSea Phishing Gear
Stars: ✭ 96 (-68.93%)
PowerProxyPowerShell SOCKS proxy with reverse proxy capabilities
Stars: ✭ 29 (-90.61%)
SwurgParse OpenAPI documents into Burp Suite for automating OpenAPI-based APIs security assessments (approved by PortSwigger for inclusion in their official BApp Store).
Stars: ✭ 94 (-69.58%)
spicescriptA Handy-Dandy Personal Toolkit for Enumeration and a headstart on attacking a machine!
Stars: ✭ 20 (-93.53%)
OSCP-PrepContained is all my reference material for my OSCP preparation. Designed to be a one stop shop for code, guides, command syntax, and high level strategy. One simple clone and you have access to some of the most popular tools used for pentesting.
Stars: ✭ 33 (-89.32%)
KaliIntelligenceSuiteKali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standard penetration testing tools. The collected data is internally stored in a structured manner to allow the fast identification and visualisation of the collected information.
Stars: ✭ 58 (-81.23%)
Pentest NotesCollection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
Stars: ✭ 89 (-71.2%)
PerfusionExploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)
Stars: ✭ 272 (-11.97%)
Watf BankWaTF Bank - What a Terrible Failure Mobile Banking Application for Android and iOS
Stars: ✭ 87 (-71.84%)
vulnscanA static binary vulnerability scanner
Stars: ✭ 47 (-84.79%)
oscpMy notebook for OSCP Lab
Stars: ✭ 22 (-92.88%)
ThecollectiveThe Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-72.49%)
nero-phishing-serverAn full HTTP server for Phishing. Downloads recursively the entire webpage.
Stars: ✭ 108 (-65.05%)
Unfollow PlusAutomated Instagram Unfollower Bot
Stars: ✭ 79 (-74.43%)
Pentesting CookbookA set of recipes useful in pentesting and red teaming scenarios
Stars: ✭ 82 (-73.46%)
GmailBruterV2Simple tool written in python3 to perform limited brute-force attacks on gmail accounts.
Stars: ✭ 264 (-14.56%)
Libellux-Up-and-RunningLibellux: Up & Running provides documentation on how-to install open-source software from source. The focus is Zero Trust Network to enhance the security for existing applications or install tools to detect and prevent threats.
Stars: ✭ 19 (-93.85%)
argusArgus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (-71.84%)
InstaburstBrute force Instagram
Stars: ✭ 76 (-75.4%)
DumbDumain Bruteforcer - a fast and flexible domain bruteforcer
Stars: ✭ 54 (-82.52%)
juumla🦁 Juumla is a python tool created to identify Joomla version, scan for vulnerabilities and search for config or backup files.
Stars: ✭ 107 (-65.37%)
LyricpassPassword wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security research.
Stars: ✭ 58 (-81.23%)
SubjackSubdomain Takeover tool written in Go
Stars: ✭ 1,194 (+286.41%)
Brute-Force-LoginProof -Of-Concept Brute Force Login on a web-site with a good dictionary of words
Stars: ✭ 231 (-25.24%)
OscpOur OSCP repo: from popping shells to mental health.
Stars: ✭ 71 (-77.02%)
organonThis program focuses on automating the download, installation and compilation of pentest tools from source
Stars: ✭ 36 (-88.35%)
VNCPwnVNC pentest tool with bruteforce and ducky script execution features
Stars: ✭ 21 (-93.2%)
ElliotA pentesting tool inspired by mr robot and derived by zphisher
Stars: ✭ 23 (-92.56%)
kali-my-linuxInstall Kali Linux Tools & Others on your Linux.
Stars: ✭ 37 (-88.03%)
NeedleThe iOS Security Testing Framework
Stars: ✭ 1,122 (+263.11%)
Phisher-manSamples Phishing tools made for Linux it contains 30 different type of Phishing Pages made with flask
Stars: ✭ 69 (-77.67%)
instagram-hacking-toolInstagram Hacking Tool is a phishing tool, it will help you to hack Instagram Accounts using fake login page.
Stars: ✭ 350 (+13.27%)
dorkScannerA typical search engine dork scanner scrapes search engines with dorks that you provide in order to find vulnerable URLs.
Stars: ✭ 93 (-69.9%)
AndtrojA tool for integrating the Metasploit payload with Android's healthy programs and bypassing antivirus
Stars: ✭ 43 (-86.08%)
Kill RouterFerramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-81.55%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+221.04%)
SpellbookMicro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-82.85%)
Ge.mine.nuCode from my old page ge.mine.nu
Stars: ✭ 31 (-89.97%)
Gray hat csharp codeThis repository contains full code examples from the book Gray Hat C#
Stars: ✭ 301 (-2.59%)
Windows Post ExploitationWindows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (-4.21%)
Project BlackPentest/BugBounty progress control with scanning modules
Stars: ✭ 257 (-16.83%)
SCANNER-INURLBRAdvanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.
Stars: ✭ 90 (-70.87%)
MsfpcMSFvenom Payload Creator (MSFPC)
Stars: ✭ 808 (+161.49%)
Wpa2 WordlistsA collection of wordlists dictionaries for password cracking
Stars: ✭ 597 (+93.2%)