SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-41.38%)
Ciphey⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Stars: ✭ 9,116 (+10378.16%)
PrivescA collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+803.45%)
DockerscanDocker security analysis & hacking tools
Stars: ✭ 1,046 (+1102.3%)
SimplyemailEmail recon made fast and easy, with a framework to build on
Stars: ✭ 779 (+795.4%)
PillagerPillage filesystems for sensitive information with Go.
Stars: ✭ 64 (-26.44%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+790.8%)
Best Hacking ToolsBEST HACKING TOOLS..For more tools visit our blog for Hackers
Stars: ✭ 46 (-47.13%)
VhostscanA virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+781.61%)
Cfw2ofw HelperProviding aid in converting video games.
Stars: ✭ 44 (-49.43%)
Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (-22.99%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+733.33%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+1059.77%)
Gitjacker🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (+1335.63%)
HackingtoolALL IN ONE Hacking Tool For Hackers
Stars: ✭ 7,521 (+8544.83%)
KeyloggerA simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (+1057.47%)
SublertSublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (+703.45%)
Rhme 2017Riscure Hack Me embedded hardware CTF 2017-2018.
Stars: ✭ 65 (-25.29%)
YsfYSF Server Functions
Stars: ✭ 77 (-11.49%)
BrutalPayload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (+679.31%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+1205.75%)
Jok3rJok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (+641.38%)
ReconftwreconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+1019.54%)
Security whitepapersCollection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQLi
Stars: ✭ 644 (+640.23%)
One Lin3rGives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+1347.13%)
HabuHacking Toolkit
Stars: ✭ 635 (+629.89%)
PowerladonLadon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Stars: ✭ 39 (-55.17%)
Reconspider🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
Stars: ✭ 621 (+613.79%)
Knowledge Basepdf,txt,djvu, various useful books
Stars: ✭ 63 (-27.59%)
Penetration Testing ToolsA collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (+605.75%)
Wifi duckyUpload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4
Stars: ✭ 991 (+1039.08%)
KeyloggerGet Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+594.25%)
Griefing MethodsA documentation about how to hack Minecraft servers
Stars: ✭ 76 (-12.64%)
ZipA portable, simple zip library written in C
Stars: ✭ 596 (+585.06%)
PinceA reverse engineering tool that'll supply the place of Cheat Engine for linux
Stars: ✭ 987 (+1034.48%)
PixloadImage Payload Creating/Injecting tools
Stars: ✭ 586 (+573.56%)
ReflexilThe .NET Assembly Editor
Stars: ✭ 1,117 (+1183.91%)
ThefatratThefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+6732.18%)
100 Days Of Swiftui👨💻👩💻100 Days Of SwiftUI free course from Hacking with Swift. 👨💻👩💻
Stars: ✭ 35 (-59.77%)
FavfreakMaking Favicon.ico based Recon Great again !
Stars: ✭ 564 (+548.28%)
Beef Over WanBrowser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-5.75%)
Svg Inject A tiny, intuitive, robust, caching solution for injecting SVG files inline into the DOM.
Stars: ✭ 559 (+542.53%)
RedcloudAutomated Red Team Infrastructure deployement using Docker
Stars: ✭ 551 (+533.33%)
KoinKoin - a pragmatic lightweight dependency injection framework for Kotlin
Stars: ✭ 7,142 (+8109.2%)
Pythempentest framework
Stars: ✭ 1,060 (+1118.39%)
TorbotDark Web OSINT Tool
Stars: ✭ 821 (+843.68%)
Pi Pwnbox RogueapHomemade Pwnbox 🚀 / Rogue AP 📡 based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap 💡
Stars: ✭ 798 (+817.24%)
Spytrojan keylogger[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-63.22%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+1357.47%)
Patchy⚓️ Patch the inner source of python functions at runtime.
Stars: ✭ 84 (-3.45%)
Zynix Fusionzynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
Stars: ✭ 84 (-3.45%)