Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (-57.59%)
The Book Of Secret KnowledgeA collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
Stars: ✭ 55,582 (+35078.48%)
B1tifissh management tool to provides commandline access to a remote system running SSH server
Stars: ✭ 65 (-58.86%)
Cr3dov3rKnow the dangers of credential reuse attacks.
Stars: ✭ 1,700 (+975.95%)
Gda Android Reversing ToolGDA is a new fast and powerful decompiler in C++(working without Java VM) for the APK, DEX, ODEX, OAT, JAR, AAR, and CLASS file. which supports malicious behavior detection, privacy leaking detection, vulnerability detection, path solving, packer identification, variable tracking, deobfuscation, python&java scripts, device memory extraction, dat…
Stars: ✭ 2,332 (+1375.95%)
Rhme 2017Riscure Hack Me embedded hardware CTF 2017-2018.
Stars: ✭ 65 (-58.86%)
XshockXSHOCK Shellshock Exploit
Stars: ✭ 65 (-58.86%)
Project TauroA Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-67.09%)
Hg8045qPwning the Nuro issued Huawei HG8045Q
Stars: ✭ 107 (-32.28%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+618.99%)
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-67.72%)
TimelapseA time lapse app for Sony Alpha camera using the OpenMemories framework
Stars: ✭ 101 (-36.08%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+5584.18%)
Oxidtools200 TOOLS BY 0XID4FF0X FOR TERMUX
Stars: ✭ 143 (-9.49%)
KeyeKeye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-36.08%)
Sshd configK4YT3X's Hardened OpenSSH Server Configuration
Stars: ✭ 49 (-68.99%)
DnstrickerA simple dns resolver of dns-record and web-record log server for pentesting
Stars: ✭ 128 (-18.99%)
BettercapThe Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Stars: ✭ 10,735 (+6694.3%)
Best Hacking ToolsBEST HACKING TOOLS..For more tools visit our blog for Hackers
Stars: ✭ 46 (-70.89%)
Cfw2ofw HelperProviding aid in converting video games.
Stars: ✭ 44 (-72.15%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+538.61%)
Find Sec BugsThe SpotBugs plugin for security audits of Java web applications and Android applications. (Also work with Kotlin, Groovy and Scala projects)
Stars: ✭ 1,748 (+1006.33%)
KeyloggerA simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (+537.34%)
Wg InstallWireguard road warrior installer for Ubuntu, Debian, CentOS and Fedora
Stars: ✭ 99 (-37.34%)
KubetopA top(1)-like tool for Kubernetes.
Stars: ✭ 142 (-10.13%)
BrutesharkNetwork Analysis Tool
Stars: ✭ 1,335 (+744.94%)
ReconftwreconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+516.46%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-20.25%)
Aura BotnetA super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Bash, and Powershell.
Stars: ✭ 95 (-39.87%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+616.46%)
BrutexAutomatically brute force all services running on a target.
Stars: ✭ 974 (+516.46%)
Di.we.hRepositório com conteúdo sobre web hacking em português
Stars: ✭ 156 (-1.27%)
100 Days Of Swiftui👨💻👩💻100 Days Of SwiftUI free course from Hacking with Swift. 👨💻👩💻
Stars: ✭ 35 (-77.85%)
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-38.61%)
Badusb botnet👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-79.75%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+7156.96%)
Rhel8 CisCIS Baseline Ansible Role for RHEL 8
Stars: ✭ 30 (-81.01%)
Rhel6 StigAnsible role for Red Hat 6 DISA STIG
Stars: ✭ 96 (-39.24%)
PxenumA shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-81.01%)
ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-10.13%)
SpeedhackSpeedhack coded in C++, inspired by Cheat Engine's own speedhack.
Stars: ✭ 29 (-81.65%)
Python RansomwarePython Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (-39.24%)
Dark Fantasy Hack ToolDDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file system of websites.. Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities.) Web Spider: For gathering web application hacking information. Email scraper: To get all emails related to a webpage IMDB Rating: Easy way to access the movie database. Both .exe(compressed as zip) and .py versions are available in files.
Stars: ✭ 131 (-17.09%)
Centos7 CisAnsible CentOS 7 - CIS Benchmark Hardening Script
Stars: ✭ 64 (-59.49%)
Linsetmv1 2Linset is a WPA/WPA2 phishing tool (evil twin)
Stars: ✭ 105 (-33.54%)
Knowledge Basepdf,txt,djvu, various useful books
Stars: ✭ 63 (-60.13%)
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-60.13%)
Ssti Payloads🎯 Server Side Template Injection Payloads
Stars: ✭ 150 (-5.06%)
DustcloudXiaomi Smart Home Device Reverse Engineering and Hacking
Stars: ✭ 1,907 (+1106.96%)
Blackphish🔱 [ Phishing Made Easy ] 🔱 (In Beta)
Stars: ✭ 133 (-15.82%)