All Projects → Hacking → Similar Projects or Alternatives

2338 Open source projects that are alternatives of or similar to Hacking

polscan
Zero-setup SSH-based scanner with extensive visualizations for Debian server inventory, policy compliance and vulnerabilities
Stars: ✭ 57 (-86.2%)
Mutual labels:  scanner, vulnerabilities
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (-81.84%)
Mutual labels:  attack, hacking-tool
PocOrExp in Github
聚合Github上已有的Poc或者Exp,CVE信息来自CVE官网。Auto Collect Poc Or Exp from Github by CVE ID.
Stars: ✭ 544 (+31.72%)
Mutual labels:  poc, vulnerabilities
WPCracker
WordPress pentest tool
Stars: ✭ 34 (-91.77%)
Mutual labels:  attack, hacking-tool
Ethical Hacking Tools
Complete Listing and Usage of Tools used for Ethical Hacking
Stars: ✭ 272 (-34.14%)
Mutual labels:  hacking, hacking-tool
CVE-2020-11651
CVE-2020-11651: Proof of Concept
Stars: ✭ 41 (-90.07%)
Mutual labels:  poc, vulnerability
refluxion
Refluxion -- MITM WPA attacks tool
Stars: ✭ 25 (-93.95%)
Mutual labels:  attack, hacking-tool
ochrona-cli
A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs
Stars: ✭ 46 (-88.86%)
Linux Soft Exploit Suggester
Search Exploitable Software on Linux
Stars: ✭ 187 (-54.72%)
Mutual labels:  hacking-tool, vulnerabilities
Instahack
Best Tool For instagram bruteforce hacking Tool By EvilDevil
Stars: ✭ 139 (-66.34%)
Mutual labels:  hacking-tool, attack
Adb Toolkit
ADB-Toolkit V2 for easy ADB tricks with many perks in all one. ENJOY!
Stars: ✭ 217 (-47.46%)
Mutual labels:  hacking-tool, tools
Phonesploit
A tool for remote ADB exploitation in Python3 for all Machines.
Stars: ✭ 122 (-70.46%)
Mutual labels:  hacking-tool, tool
Joomscan
OWASP Joomla Vulnerability Scanner Project
Stars: ✭ 640 (+54.96%)
Mutual labels:  scanner, vulnerability-scanners
Routeros
RouterOS Security Research Tooling and Proof of Concepts
Stars: ✭ 603 (+46%)
Mutual labels:  scanner, poc
Mhddos
Best DDoS Attack Script Python3, Cyber Attack With 36 Method
Stars: ✭ 55 (-86.68%)
Mutual labels:  hacking-tool, attack
Dnsbrute
DNS Sub-domain brute forcer, in Python + gevent
Stars: ✭ 40 (-90.31%)
Mutual labels:  scanner, tool
Blackwidow
A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.
Stars: ✭ 887 (+114.77%)
Mutual labels:  scanner, vulnerability
quick-scripts
A collection of my quick and dirty scripts for vulnerability POC and detections
Stars: ✭ 73 (-82.32%)
Mutual labels:  scanner, vulnerability
TokenBreaker
JSON RSA to HMAC and None Algorithm Vulnerability POC
Stars: ✭ 51 (-87.65%)
Mutual labels:  vulnerability, hacking-tool
Billcipher
Information Gathering tool for a Website or IP address
Stars: ✭ 332 (-19.61%)
Mutual labels:  hacking, scanner
Gohacktools
Hacker tools on Go (Golang)
Stars: ✭ 1,303 (+215.5%)
Mutual labels:  scanner, tools
Skyrat
SkyRAT - Powershell Remote Administration Tool
Stars: ✭ 21 (-94.92%)
Mutual labels:  hacking-tool, tool
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (-38.98%)
Mutual labels:  hacking, tools
akamai-arl-hack
Script to test open Akamai ARL vulnerability.
Stars: ✭ 70 (-83.05%)
Mutual labels:  vulnerabilities, hacking-tool
DNS-Fender
A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
Stars: ✭ 47 (-88.62%)
Mutual labels:  attack, poc
TIGER
Python toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
Stars: ✭ 103 (-75.06%)
Mutual labels:  attack, vulnerability
Xunfeng
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Stars: ✭ 3,131 (+658.11%)
Mutual labels:  scanner, vulnerability-scanners
Arachni
Web Application Security Scanner Framework
Stars: ✭ 2,942 (+612.35%)
Mutual labels:  hacking, scanner
Pycurity
Python Security Scripts
Stars: ✭ 218 (-47.22%)
Mutual labels:  scanner, hacking-tool
Bluescan
A powerful Bluetooth scanner
Stars: ✭ 206 (-50.12%)
Mutual labels:  scanner, hacking-tool
Brutesploit
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (+2.66%)
Mutual labels:  hacking, hacker
sec-scannode
SEC分布式资产扫描系统
Stars: ✭ 8 (-98.06%)
Mutual labels:  scanner, vulnerability-scanners
Pentestkit
Useful tools and scripts during Penetration Testing engagements
Stars: ✭ 463 (+12.11%)
Mutual labels:  hacking, tools
hacking-resources
Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
Stars: ✭ 1,386 (+235.59%)
Mutual labels:  vulnerability, hacker
Pinaak
A vulnerability fuzzing tool written in bash, it contains the most commonly used tools to perform vulnerability scan
Stars: ✭ 69 (-83.29%)
iskan
Kubernetes Native, Runtime Container Image Scanning
Stars: ✭ 35 (-91.53%)
icestick-lpc-tpm-sniffer
FPGA-based LPC bus sniffing tool for Lattice iCEstick Evaluation Kit
Stars: ✭ 41 (-90.07%)
Mutual labels:  attack, security-vulnerability
vulnerablecode
A free and open vulnerabilities database and the packages they impact. And the tools to aggregate and correlate these vulnerabilities. Sponsored by NLnet https://nlnet.nl/project/vulnerabilitydatabase/ for https://www.aboutcode.org/ Chat at https://gitter.im/aboutcode-org/vulnerablecode Docs at https://vulnerablecode.readthedocs.org/
Stars: ✭ 269 (-34.87%)
Phirautee
A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
Stars: ✭ 96 (-76.76%)
Mutual labels:  poc, hacking-tool
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+46.25%)
Mutual labels:  hacking, hacking-tool
CVE-2021-33766
ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit
Stars: ✭ 37 (-91.04%)
Mutual labels:  poc, vulnerability
phomber
Phomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (-85.71%)
Mutual labels:  hacker, hacking-tool
CVE-2020-1611
Juniper Junos Space (CVE-2020-1611) (PoC)
Stars: ✭ 25 (-93.95%)
Mutual labels:  poc, vulnerability
lachesis
👨‍💻 A work-in-progress web services mass scanner written in Rust
Stars: ✭ 55 (-86.68%)
Mutual labels:  scanner, vulnerability
Faraday
Faraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit.
Stars: ✭ 3,198 (+674.33%)
Brutal
Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (+64.16%)
Mutual labels:  hacking, hacker
SQL Injection Payload
SQL Injection Payload List
Stars: ✭ 62 (-84.99%)
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+75.54%)
Mutual labels:  hacking, hacking-tool
crawleet
Web Recon & Exploitation Tool.
Stars: ✭ 48 (-88.38%)
Deep-Inside
Command line tool that allows you to explore IoT devices by using Shodan API.
Stars: ✭ 22 (-94.67%)
Mutual labels:  scanner, hacking-tool
Interlace
Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+84.02%)
Mutual labels:  hacking, hacking-tool
Hackingtool
ALL IN ONE Hacking Tool For Hackers
Stars: ✭ 7,521 (+1721.07%)
Mutual labels:  hacking, hacker
007-TheBond
This Script will help you to gather information about your victim or friend.
Stars: ✭ 371 (-10.17%)
Mutual labels:  tools, hacking-tool
log4jscanwin
Log4j Vulnerability Scanner for Windows
Stars: ✭ 142 (-65.62%)
Mutual labels:  scanner, vulnerability
log4shelldetect
Rapidly scan filesystems for Java programs potentially vulnerable to Log4Shell (CVE-2021-44228) or "that Log4j JNDI exploit" by inspecting the class paths inside files
Stars: ✭ 40 (-90.31%)
Mutual labels:  scanner, vulnerability-scanners
mondoo
🕵️‍♀️ Mondoo Cloud-Native Security & Vulnerability Risk Management
Stars: ✭ 60 (-85.47%)
Mutual labels:  scanner, vulnerability
klustair
(Deprecated) Submit all images in your Kubernetes cluster to Anchore for a vulnerability check and check your configuration with kubeaudit
Stars: ✭ 15 (-96.37%)
Vulnfanatic
A Binary Ninja plugin for vulnerability research.
Stars: ✭ 203 (-50.85%)
Pub
Vulnerability Notes, PoC Exploits and Write-Ups for security issues disclosed by tintinweb
Stars: ✭ 217 (-47.46%)
Mutual labels:  vulnerability, poc
Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-71.91%)
Mutual labels:  hacking, hacking-tool
241-300 of 2338 similar projects