All Projects → Hrshell → Similar Projects or Alternatives

2561 Open source projects that are alternatives of or similar to Hrshell

Web Brutator
Fast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-49.74%)
Mutual labels:  hacking, pentesting
Security Scripts
A collection of public offensive and defensive security related scripts for InfoSec students.
Stars: ✭ 101 (-47.67%)
Mutual labels:  pentesting, penetration-testing
Go Deliver
Go-deliver is a payload delivery tool coded in Go.
Stars: ✭ 103 (-46.63%)
Mutual labels:  pentesting, red-team
Vajra
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (+39.38%)
Mutual labels:  hacking, pentesting
Swap digger
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (+83.42%)
Mutual labels:  hacking, post-exploitation
Badkarma
network reconnaissance toolkit
Stars: ✭ 353 (+82.9%)
Mutual labels:  hacking, penetration-testing
Vault
swiss army knife for hackers
Stars: ✭ 346 (+79.27%)
Mutual labels:  hacking, pentesting
Hacker Container
Container with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-45.6%)
Mutual labels:  hacking, pentesting
Hackingthe.cloud
Content for hackingthe.cloud
Stars: ✭ 101 (-47.67%)
Mutual labels:  hacking, penetration-testing
Rustscan
🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+2603.63%)
Mutual labels:  hacking, pentesting
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-55.44%)
Mutual labels:  hacking, penetration-testing
Ssh Mitm
SSH man-in-the-middle tool
Stars: ✭ 1,328 (+588.08%)
Mutual labels:  hacking, penetration-testing
Andrax Mobile Pentest
ANDRAX The first and unique Penetration Testing platform for Android smartphones
Stars: ✭ 394 (+104.15%)
Mutual labels:  hacking, penetration-testing
Punk.py
unix SSH post-exploitation 1337 tool
Stars: ✭ 107 (-44.56%)
Phpvuln
Audit tool to find common vulnerabilities in PHP source code
Stars: ✭ 146 (-24.35%)
Mutual labels:  hacking, penetration-testing
Paradoxiarat
ParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (+104.66%)
Mutual labels:  hacking, red-team
Ehtools
Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: ✭ 422 (+118.65%)
Mutual labels:  hacking, pentesting
Reverseapk
Quickly analyze and reverse engineer Android packages
Stars: ✭ 419 (+117.1%)
Mutual labels:  hacking, pentesting
Stegcracker
Steganography brute-force utility to uncover hidden data inside files
Stars: ✭ 396 (+105.18%)
Mutual labels:  pentesting, penetration-testing
Dns Rebind Toolkit
A front-end JavaScript toolkit for creating DNS rebinding attacks.
Stars: ✭ 435 (+125.39%)
Mutual labels:  hacking, red-team
Goohak
Automatically Launch Google Hacking Queries Against A Target Domain
Stars: ✭ 432 (+123.83%)
Mutual labels:  hacking, pentesting
Bulwark
An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
Stars: ✭ 113 (-41.45%)
Mutual labels:  pentesting, red-team
Brutemap
Let's find someone's account
Stars: ✭ 113 (-41.45%)
Mutual labels:  hacking, https
Awesome Hacking
Awesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+833.68%)
Mutual labels:  hacking, penetration-testing
Bella
Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻
Stars: ✭ 112 (-41.97%)
Mutual labels:  pentesting, post-exploitation
Burp Send To
Adds a customizable "Send to..."-context-menu to your BurpSuite.
Stars: ✭ 114 (-40.93%)
Mutual labels:  hacking, pentesting
Mitmap
📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+690.67%)
Mutual labels:  hacking, pentesting
Hackerpro
All in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog
Stars: ✭ 474 (+145.6%)
Mutual labels:  hacking, penetration-testing
Gtfobins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+3024.35%)
Mutual labels:  post-exploitation, reverse-shell
Karkinos
Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Cracking Hashes / Hashing
Stars: ✭ 115 (-40.41%)
Mutual labels:  pentesting, reverse-shell
Juice Shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+3148.7%)
Mutual labels:  hacking, pentesting
Docker Nginx Gunicorn Flask Letsencrypt
Boilerplate code for setting up Nginx + Gunicorn + Flask + automated LetsEncrypt certificates (https) using docker-compose.
Stars: ✭ 117 (-39.38%)
Mutual labels:  flask, https
Oscp Automation
A collection of personal scripts used in hacking excercises.
Stars: ✭ 118 (-38.86%)
Mutual labels:  hacking, penetration-testing
Katanaframework
The New Hacking Framework
Stars: ✭ 502 (+160.1%)
Mutual labels:  hacking, penetration-testing
Thc Hydra
hydra
Stars: ✭ 5,645 (+2824.87%)
Mutual labels:  pentesting, penetration-testing
Ctfr
Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
Stars: ✭ 1,535 (+695.34%)
Mutual labels:  hacking, pentesting
Tlslite Ng
TLS implementation in pure python, focused on interoperability testing
Stars: ✭ 119 (-38.34%)
Mutual labels:  https, tls
Sippts
Set of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-39.9%)
Mutual labels:  hacking, pentesting
Horn3t
Powerful Visual Subdomain Enumeration at the Click of a Mouse
Stars: ✭ 120 (-37.82%)
Mutual labels:  pentesting, penetration-testing
Blackmamba
C2/post-exploitation framework
Stars: ✭ 544 (+181.87%)
Mutual labels:  red-team, post-exploitation
Cppserver
Ultra fast and low latency asynchronous socket server & client C++ library with support TCP, SSL, UDP, HTTP, HTTPS, WebSocket protocols and 10K connections problem solution
Stars: ✭ 528 (+173.58%)
Mutual labels:  https, tls
Evil Winrm
The ultimate WinRM shell for hacking/pentesting
Stars: ✭ 2,251 (+1066.32%)
Mutual labels:  hacking, pentesting
Redcloud
Automated Red Team Infrastructure deployement using Docker
Stars: ✭ 551 (+185.49%)
Mutual labels:  hacking, metasploit
Penetration Testing Tools
A collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (+218.13%)
Mutual labels:  hacking, penetration-testing
Msploitego
Pentesting suite for Maltego based on data in a Metasploit database
Stars: ✭ 124 (-35.75%)
Mutual labels:  penetration-testing, metasploit
Hashview
A web front-end for password cracking and analytics
Stars: ✭ 601 (+211.4%)
Mutual labels:  pentesting, penetration-testing
M3m0
M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 124 (-35.75%)
Mutual labels:  hacking, penetration-testing
Pakuri
Penetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (-35.23%)
Mutual labels:  penetration-testing, metasploit
Devcert
Local HTTPS development made easy
Stars: ✭ 655 (+239.38%)
Mutual labels:  https, tls
Telekiller
A Tools Session Hijacking And Stealer Local Passcode Telegram Windows
Stars: ✭ 122 (-36.79%)
Mutual labels:  hacking, penetration-testing
Awesome Hacking Resources
A collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+5840.93%)
Mutual labels:  hacking, penetration-testing
Siris
DEPRECATED: The community driven fork of Iris. The fastest web framework for Golang!
Stars: ✭ 146 (-24.35%)
Mutual labels:  https, tls
Awesome Mobile Security
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+851.81%)
Mutual labels:  hacking, pentesting
Aggressor scripts
A collection of useful scripts for Cobalt Strike
Stars: ✭ 126 (-34.72%)
Mutual labels:  pentesting, red-team
Enumdb
Relational database brute force and post exploitation tool for MySQL and MSSQL
Stars: ✭ 167 (-13.47%)
Mutual labels:  pentesting, post-exploitation
Caldera
Automated Adversary Emulation Platform
Stars: ✭ 3,126 (+1519.69%)
Mutual labels:  hacking, red-team
Netcoreserver
Ultra fast and low latency asynchronous socket server & client C# .NET Core library with support TCP, SSL, UDP, HTTP, HTTPS, WebSocket protocols and 10K connections problem solution
Stars: ✭ 799 (+313.99%)
Mutual labels:  https, tls
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-1.55%)
Mutual labels:  hacking, penetration-testing
Awesome Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
Stars: ✭ 48,038 (+24790.16%)
Mutual labels:  hacking, penetration-testing
Ratel
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-37.31%)
Mutual labels:  hacking, pentesting
301-360 of 2561 similar projects