Hack-UtilsScript to facilitate different functions and checks
Stars: ✭ 27 (-98.05%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+654.04%)
Osint SanFramework для сбора данных из открытых источников. В Framework используется большое количество API, их необходимо зарегистрировать самому.
Stars: ✭ 99 (-92.86%)
FIDLA sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
Stars: ✭ 421 (-69.62%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+547.98%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (-18.33%)
PhoniaPhonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any international phone numbers with a very good accuracy.
Stars: ✭ 221 (-84.05%)
UrlextractorInformation gathering & website reconnaissance | https://phishstats.info/
Stars: ✭ 341 (-75.4%)
RichkwareFramework for building Windows malware, written in C++
Stars: ✭ 315 (-77.27%)
Open-source-tools-for-CTIPublic Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-93.43%)
TrapePeople tracker on the Internet: OSINT analysis and research tool by Jose Pino
Stars: ✭ 6,753 (+387.23%)
CEHExam Prep for the Ec-council Certified Ethical Hacker 312-50
Stars: ✭ 71 (-94.88%)
IvreNetwork recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,331 (+68.18%)
Aliens eyeSocial media hunter
Stars: ✭ 105 (-92.42%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (-70.2%)
MaltrailMalicious traffic detection system
Stars: ✭ 4,296 (+209.96%)
QuackQuack Toolkit is a set of tools to provide denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools.
Stars: ✭ 305 (-77.99%)
SocialpwnedSocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and Twitter to find possible credentials leaks in PwnDB.
Stars: ✭ 104 (-92.5%)
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-94.81%)
MaskphishGive a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
Stars: ✭ 370 (-73.3%)
TweetFeedCollecting IOCs posted on Twitter
Stars: ✭ 181 (-86.94%)
FidlA sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
Stars: ✭ 319 (-76.98%)
BlackwidowA Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.
Stars: ✭ 887 (-36%)
osintDocker image for osint
Stars: ✭ 92 (-93.36%)
ivreNetwork recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,712 (+95.67%)
hackKubernetes security and vulnerability tools and utilities.
Stars: ✭ 56 (-95.96%)
DecoyMini🐝 A highly scalable, safe, free enterprise honeypots 一款高可扩展、安全、免费的企业级蜜罐系统
Stars: ✭ 213 (-84.63%)
metagoofilSearch Google and download specific file types
Stars: ✭ 174 (-87.45%)
warfWARF is a Web Application Reconnaissance Framework that helps to gather information about the target.
Stars: ✭ 53 (-96.18%)
Android-LDoSNo description or website provided.
Stars: ✭ 15 (-98.92%)
SkeletonSkeleton is a Social Engineering tool attack switcher
Stars: ✭ 44 (-96.83%)
facebook totemTotem allows you to retrieve information about ads of a facebook page , we can retrieve the number of people targeted, how much the ad cost and a lot of other information.
Stars: ✭ 51 (-96.32%)
ArgosThis script will automatically set up an OSINT workstation starting from a Ubuntu OS.
Stars: ✭ 73 (-94.73%)
ScrummageThe Ultimate OSINT and Threat Hunting Framework
Stars: ✭ 355 (-74.39%)
malware-writeupsPersonal research and publication on malware families
Stars: ✭ 104 (-92.5%)
argusArgus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (-93.72%)
SwitHak.github.ioSwitHak' Security Place for my Opinions and Work
Stars: ✭ 30 (-97.84%)
OasisLMFLoss modelling framework.
Stars: ✭ 84 (-93.94%)
testmynids.orgA website and framework for testing NIDS detection
Stars: ✭ 55 (-96.03%)
Docker-OSINTContenido de herramientas OSINT con Docker. Tambien nos podes visitar en el canal de youtube (https://www.youtube.com/user/marcospr74/)
Stars: ✭ 15 (-98.92%)
memscrimperCode for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"
Stars: ✭ 25 (-98.2%)
cerberus researchResearch tools for analysing Cerberus banking trojan.
Stars: ✭ 110 (-92.06%)
E4GL30S1NTE4GL30S1NT - Simple Information Gathering Tool
Stars: ✭ 139 (-89.97%)
mailcatFind existing email addresses by nickname using API/SMTP checking methods without user notification. Please, don't hesitate to improve cat's job! 🐱🔎 📬
Stars: ✭ 219 (-84.2%)
scan-cli-pluginDocker Scan is a Command Line Interface to run vulnerability detection on your Dockerfiles and Docker images
Stars: ✭ 135 (-90.26%)
thedevilseyeThe Devils Eye is an OSINT tool that extracts onion links and descriptions that match with the users query from the Darkweb, without requiring the use for Tor.
Stars: ✭ 100 (-92.78%)
Reverse-EngineeringA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+421.93%)
TokenBreakerJSON RSA to HMAC and None Algorithm Vulnerability POC
Stars: ✭ 51 (-96.32%)
macOS-Security-UpdatesNotifies the user when macOS Security components like Gatekeeper and XProtect have been updated
Stars: ✭ 53 (-96.18%)
Mr.Holmes🔍 A Complete Osint Tool
Stars: ✭ 307 (-77.85%)
transwinMake window/frame transparent.
Stars: ✭ 22 (-98.41%)
ThreadBoatProgram Uses Thread Execution Hijacking To Inject Native Shell-code Into a Standard Win32 Application
Stars: ✭ 162 (-88.31%)
prl guest to hostGuest to host VM escape exploit for Parallels Desktop
Stars: ✭ 26 (-98.12%)
cumulusCumulus is web application weakness monitoring, it would be working by add just 3 codelines
Stars: ✭ 43 (-96.9%)
QuiescisQuescis is a powerful Remote Access Trojan for windows 💻 on C++
Stars: ✭ 56 (-95.96%)
Python-KeyloggerPython Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||
Stars: ✭ 55 (-96.03%)