All Projects → Hrshell → Similar Projects or Alternatives

2561 Open source projects that are alternatives of or similar to Hrshell

Pentest Book
Stars: ✭ 266 (+37.82%)
Mutual labels:  hacking, pentesting, oscp
Offensive-Reverse-Shell-Cheat-Sheet
Offensive Reverse Shell (Cheat Sheet)
Stars: ✭ 138 (-28.5%)
Evil Ssdp
Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.
Stars: ✭ 204 (+5.7%)
Pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+3390.67%)
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+297.41%)
Mutual labels:  hacking, penetration-testing, oscp
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+3916.58%)
Pwncat
pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
Stars: ✭ 904 (+368.39%)
Nmap
Idiomatic nmap library for go developers
Stars: ✭ 391 (+102.59%)
Pidrila
Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (-35.23%)
Justtryharder
JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)
Stars: ✭ 450 (+133.16%)
Mutual labels:  pentesting, penetration-testing, oscp
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+295.85%)
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+350.78%)
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-67.88%)
Netmap.js
Fast browser-based network discovery module
Stars: ✭ 70 (-63.73%)
Mutual labels:  hacking, pentesting, red-team
Phishing Frenzy
Ruby on Rails Phishing Framework
Stars: ✭ 643 (+233.16%)
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+621.24%)
Quiver
Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-27.46%)
ShonyDanza
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (-55.44%)
Passphrase Wordlist
Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (+188.08%)
V3n0m Scanner
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+338.86%)
Mutual labels:  hacking, pentesting, metasploit
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+488.6%)
Mutual labels:  hacking, pentesting, red-team
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+845.08%)
Mutual labels:  hacking, penetration-testing, oscp
Zynix Fusion
zynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
Stars: ✭ 84 (-56.48%)
Mutual labels:  hacking, pentesting
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-55.44%)
Mutual labels:  hacking, penetration-testing
Hookso
linux动态链接库的注入修改查找工具 A tool for injection, modification and search of linux dynamic link library
Stars: ✭ 87 (-54.92%)
Mutual labels:  hacking, injection
Reverse Shell
Reverse Shell as a Service
Stars: ✭ 1,281 (+563.73%)
Mutual labels:  pentesting, reverse-shell
Blackrat
BlackRAT - Java Based Remote Administrator Tool
Stars: ✭ 87 (-54.92%)
Mutual labels:  hacking, pentesting
Http Asynchronous Reverse Shell
[POC] Asynchronous reverse shell using the HTTP protocol.
Stars: ✭ 177 (-8.29%)
Mutual labels:  pentesting, reverse-shell
Eyes.sh
Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?"
Stars: ✭ 89 (-53.89%)
Mutual labels:  pentesting, penetration-testing
Pentest Notes
Collection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
Stars: ✭ 89 (-53.89%)
Mutual labels:  pentesting, penetration-testing
Badssl.com
🔒 Memorable site for testing clients against bad SSL configs.
Stars: ✭ 2,234 (+1057.51%)
Mutual labels:  https, tls
Flask Unsign
Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
Stars: ✭ 90 (-53.37%)
Mutual labels:  pentesting, penetration-testing
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+5315.03%)
Mutual labels:  hacking, penetration-testing
Memject
Simple Dll injector loading from memory. Supports PE header and entry point erasure. Written in C99.
Stars: ✭ 176 (-8.81%)
Mutual labels:  hacking, injection
Work At Olist
Apply for a job at Olist's Development Team: https://bit.ly/olist-webdev
Stars: ✭ 93 (-51.81%)
Mutual labels:  flask, tornado
Eggshell
iOS/macOS/Linux Remote Administration Tool
Stars: ✭ 1,286 (+566.32%)
Mutual labels:  metasploit, reverse-shell
Tls Inspector
Easily view and inspect X.509 certificates on your iOS device.
Stars: ✭ 92 (-52.33%)
Mutual labels:  https, tls
Msf Auxiliarys
My collection of metasploit auxiliary post-modules
Stars: ✭ 183 (-5.18%)
Mutual labels:  post-exploitation, metasploit
Koa Sslify
Enforce HTTPS in node.js koa apps
Stars: ✭ 100 (-48.19%)
Mutual labels:  https, tls
Web Brutator
Fast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-49.74%)
Mutual labels:  hacking, pentesting
Keye
Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-47.67%)
Mutual labels:  hacking, penetration-testing
Security Scripts
A collection of public offensive and defensive security related scripts for InfoSec students.
Stars: ✭ 101 (-47.67%)
Mutual labels:  pentesting, penetration-testing
Beef Over Wan
Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-57.51%)
Mutual labels:  hacking, penetration-testing
Roadmap
GitBook: OSCP RoadMap
Stars: ✭ 89 (-53.89%)
Mutual labels:  penetration-testing, oscp
Ssh Mitm
SSH man-in-the-middle tool
Stars: ✭ 1,328 (+588.08%)
Mutual labels:  hacking, penetration-testing
Sslsplit
Transparent SSL/TLS interception
Stars: ✭ 1,371 (+610.36%)
Mutual labels:  https, tls
Revshellgen
Reverse shell generator written in Python 3.
Stars: ✭ 190 (-1.55%)
Mutual labels:  oscp, reverse-shell
Hacker Container
Container with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-45.6%)
Mutual labels:  hacking, pentesting
Hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Stars: ✭ 3,741 (+1838.34%)
Mutual labels:  hacking, pentesting
Hackingthe.cloud
Content for hackingthe.cloud
Stars: ✭ 101 (-47.67%)
Mutual labels:  hacking, penetration-testing
Punk.py
unix SSH post-exploitation 1337 tool
Stars: ✭ 107 (-44.56%)
Bella
Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻
Stars: ✭ 112 (-41.97%)
Mutual labels:  pentesting, post-exploitation
Ctfr
Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
Stars: ✭ 1,535 (+695.34%)
Mutual labels:  hacking, pentesting
Bulwark
An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
Stars: ✭ 113 (-41.45%)
Mutual labels:  pentesting, red-team
Go Deliver
Go-deliver is a payload delivery tool coded in Go.
Stars: ✭ 103 (-46.63%)
Mutual labels:  pentesting, red-team
Awesome Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
Stars: ✭ 48,038 (+24790.16%)
Mutual labels:  hacking, penetration-testing
Brutemap
Let's find someone's account
Stars: ✭ 113 (-41.45%)
Mutual labels:  hacking, https
Mitmap
📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+690.67%)
Mutual labels:  hacking, pentesting
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+1097.93%)
Mutual labels:  hacking, pentesting
Awesome Hacking
Awesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+833.68%)
Mutual labels:  hacking, penetration-testing
61-120 of 2561 similar projects