All Projects → Hawkeye → Similar Projects or Alternatives

1117 Open source projects that are alternatives of or similar to Hawkeye

Blackworm
Black Worm Offical Repo
Stars: ✭ 80 (-60.4%)
Mutual labels:  hacking
Pocsuite3
pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.
Stars: ✭ 2,213 (+995.54%)
Mutual labels:  pentesting
Network Threats Taxonomy
Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-60.89%)
Mutual labels:  hacking
Instabruteforce
hacking-tool termux-tools termux noob-friendly instagram-bot bruteforce-password-cracker wordlist-technique
Stars: ✭ 86 (-57.43%)
Mutual labels:  hacking
Silentbridge
Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.
Stars: ✭ 136 (-32.67%)
Mutual labels:  pentesting
Redteam vul
红队作战中比较常遇到的一些重点系统漏洞整理。
Stars: ✭ 1,271 (+529.21%)
Mutual labels:  hacking
Aboutsecurity
A list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-17.82%)
Mutual labels:  hacking
Eyes.sh
Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?"
Stars: ✭ 89 (-55.94%)
Mutual labels:  pentesting
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+802.97%)
Mutual labels:  hacking
Mad Metasploit
Metasploit custom modules, plugins, resource script and.. awesome metasploit collection
Stars: ✭ 200 (-0.99%)
Mutual labels:  hacking
Webhackersweapons
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 1,205 (+496.53%)
Mutual labels:  hacking
Ble Security Attack Defence
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Stars: ✭ 88 (-56.44%)
Mutual labels:  hacking
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+854.46%)
Mutual labels:  hacking
Watf Bank
WaTF Bank - What a Terrible Failure Mobile Banking Application for Android and iOS
Stars: ✭ 87 (-56.93%)
Mutual labels:  pentesting
Hackthebox
Notes Taken for HTB Machines & InfoSec Community.
Stars: ✭ 167 (-17.33%)
Mutual labels:  infosec
Dns Persist
DNS-Persist is a post-exploitation agent which uses DNS for command and control.
Stars: ✭ 191 (-5.45%)
Mutual labels:  pentesting
Blackhat Python Book
Code from Blackhat Python book
Stars: ✭ 178 (-11.88%)
Mutual labels:  pentesting
Antidebugging
A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (-20.3%)
Mutual labels:  hacking
Kurukshetra
Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.
Stars: ✭ 131 (-35.15%)
Mutual labels:  infosec
Ldap search
Python3 script to perform LDAP queries and enumerate users, groups, and computers from Windows Domains. Ldap_Search can also perform brute force/password spraying to identify valid accounts via LDAP.
Stars: ✭ 78 (-61.39%)
Mutual labels:  pentesting
Xssmap
XSSMap 是一款基于 Python3 开发用于检测 XSS 漏洞的工具
Stars: ✭ 134 (-33.66%)
Mutual labels:  pentesting
Cve 2019 0708 Tool
A social experiment
Stars: ✭ 87 (-56.93%)
Mutual labels:  hacking
Jwtcat
A CPU-based JSON Web Token (JWT) cracker and - to some extent - scanner.
Stars: ✭ 181 (-10.4%)
Mutual labels:  pentesting
Intelspy
Perform automated network reconnaissance scans
Stars: ✭ 134 (-33.66%)
Mutual labels:  hacking
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-57.43%)
Mutual labels:  hacking
Pspy
Monitor linux processes without root permissions
Stars: ✭ 2,470 (+1122.77%)
Mutual labels:  pentesting
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+523.27%)
Mutual labels:  hacking
Awesome Csirt
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (-34.65%)
Mutual labels:  pentesting
Cintruder
Captcha Intruder (CIntrud3r) is an automatic pentesting tool to bypass captchas.
Stars: ✭ 192 (-4.95%)
Mutual labels:  pentesting
Geo Recon
An OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts.
Stars: ✭ 82 (-59.41%)
Mutual labels:  hacking
Lazybee
Create Best Wordlist From Python Tool In Termux
Stars: ✭ 161 (-20.3%)
Mutual labels:  hacking
Beef Over Wan
Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-59.41%)
Mutual labels:  hacking
Blackphish
🔱 [ Phishing Made Easy ] 🔱 (In Beta)
Stars: ✭ 133 (-34.16%)
Mutual labels:  hacking
Awesome Vulnerable Apps
Awesome Vulnerable Applications
Stars: ✭ 180 (-10.89%)
Mutual labels:  hacking
Cthackframework
游戏外挂通用框架,快速构建外挂程序。
Stars: ✭ 78 (-61.39%)
Mutual labels:  hacking
Venom
Venom - A Multi-hop Proxy for Penetration Testers
Stars: ✭ 1,228 (+507.92%)
Mutual labels:  pentesting
Trigmap
A wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (-34.65%)
Mutual labels:  pentesting
Deathstar
Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive TTPs.
Stars: ✭ 1,221 (+504.46%)
Mutual labels:  pentesting
Wireshark Cheatsheet
Wireshark Cheat Sheet
Stars: ✭ 131 (-35.15%)
Mutual labels:  infosec
Ysf
YSF Server Functions
Stars: ✭ 77 (-61.88%)
Mutual labels:  hacking
Decoder Plus Plus
An extensible application for penetration testers and software developers to decode/encode data into various formats.
Stars: ✭ 79 (-60.89%)
Mutual labels:  pentesting
Archerysec
Centralize Vulnerability Assessment and Management for DevSecOps Team
Stars: ✭ 1,802 (+792.08%)
Mutual labels:  pentesting
Winpayloads
Undetectable Windows Payload Generation
Stars: ✭ 1,211 (+499.5%)
Mutual labels:  netsec
Asu
facebook hacking toolkit
Stars: ✭ 197 (-2.48%)
Mutual labels:  hacking
Cve 2018 20555
Social Network Tabs Wordpress Plugin Vulnerability - CVE-2018-20555
Stars: ✭ 78 (-61.39%)
Mutual labels:  infosec
Buffer overflow
Don't let buffer overflows overflow your mind
Stars: ✭ 131 (-35.15%)
Mutual labels:  hacking
Zerodoor
A script written lazily for generating cross-platform backdoors on the go :)
Stars: ✭ 163 (-19.31%)
Mutual labels:  pentesting
Griefing Methods
A documentation about how to hack Minecraft servers
Stars: ✭ 76 (-62.38%)
Mutual labels:  hacking
Rsf
The Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
Stars: ✭ 76 (-62.38%)
Mutual labels:  pentesting
Intrec Pack
Intelligence and Reconnaissance Package/Bundle installer.
Stars: ✭ 177 (-12.38%)
Mutual labels:  pentesting
Burp Bounty Profiles
Burp Bounty profiles compilation, feel free to contribute!
Stars: ✭ 76 (-62.38%)
Mutual labels:  hacking
Redteam Hardware Toolkit
🔺 Red Team Hardware Toolkit 🔺
Stars: ✭ 163 (-19.31%)
Mutual labels:  hacking
Reconness
ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on schedule or events.
Stars: ✭ 131 (-35.15%)
Mutual labels:  pentesting
Phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+488.12%)
Mutual labels:  hacking
H8mail
Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (+970.79%)
Mutual labels:  hacking
Movies For Hackers
🎬 A curated list of movies every hacker & cyberpunk must watch.
Stars: ✭ 8,884 (+4298.02%)
Mutual labels:  hacking
Stegseek
⚡️ Worlds fastest steghide cracker, chewing through millions of passwords per second ⚡️
Stars: ✭ 187 (-7.43%)
Mutual labels:  pentesting
Facebook Cracker
Facebook Cracker Version 1.0 can crack into Facebook Database 100% without Interruption By Facebook Firewall
Stars: ✭ 171 (-15.35%)
Mutual labels:  hacking
Minesweeper
A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-19.8%)
Mutual labels:  hacking
Jwtxploiter
A tool to test security of json web token
Stars: ✭ 130 (-35.64%)
Mutual labels:  pentesting
301-360 of 1117 similar projects