NekoA self hosted virtual browser (rabb.it clone) that runs in docker.
Stars: ✭ 1,957 (+935.45%)
RemminaMirror of https://gitlab.com/Remmina/Remmina The GTK+ Remmina Remote Desktop Client
Stars: ✭ 1,705 (+802.12%)
WavecrackWavestone's web interface for password cracking with hashcat
Stars: ✭ 135 (-28.57%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+931.22%)
Xssor2XSS'OR - Hack with JavaScript.
Stars: ✭ 1,969 (+941.8%)
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (-23.81%)
Pentestsome pentest scripts & tools by [email protected]
Stars: ✭ 136 (-28.04%)
VulrecVulnerability Recurrence:漏洞复现记录
Stars: ✭ 109 (-42.33%)
AsnlookupLeverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-13.76%)
Awesome VulnerableA curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.
Stars: ✭ 133 (-29.63%)
Intrec PackIntelligence and Reconnaissance Package/Bundle installer.
Stars: ✭ 177 (-6.35%)
OscprepoA list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and reading material in 'BookmarkList' CherryTree. Reconscan Py2 and Py3. Custom ISO building.
Stars: ✭ 1,916 (+913.76%)
SpotcommanderThe most intuitive and feature-rich remote control for Spotify for Linux
Stars: ✭ 152 (-19.58%)
HookishHooks in to interesting functions and helps reverse the web app faster.
Stars: ✭ 129 (-31.75%)
SocialfishPhishing Tool & Information Collector
Stars: ✭ 2,522 (+1234.39%)
Nraynray distributed port scanner
Stars: ✭ 125 (-33.86%)
Stb TesterAutomated Testing for Set-Top Boxes and Smart TVs
Stars: ✭ 148 (-21.69%)
Ssrf TestingSSRF (Server Side Request Forgery) testing resources
Stars: ✭ 1,718 (+808.99%)
SanderlingAPIs and libraries to read information directly from the EVE Online game client.
Stars: ✭ 169 (-10.58%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-38.62%)
Ntlmscanscan for NTLM directories
Stars: ✭ 141 (-25.4%)
RttyAccess your terminal from anywhere via the web.
Stars: ✭ 2,434 (+1187.83%)
CatnipCat-Nip Automated Basic Pentest Tool - Designed For Kali Linux
Stars: ✭ 108 (-42.86%)
PasscatPasswords Recovery Tool
Stars: ✭ 164 (-13.23%)
Sec ToolsDocker images for infosec tools
Stars: ✭ 135 (-28.57%)
EnigmaMultiplatform payload dropper
Stars: ✭ 180 (-4.76%)
O365sprayUsername enumeration and password spraying tool aimed at Microsoft O365.
Stars: ✭ 133 (-29.63%)
Ws ScrcpyWeb client prototype for scrcpy.
Stars: ✭ 164 (-13.23%)
TrigmapA wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (-30.16%)
MouseMouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-1.59%)
Evil WinrmThe ultimate WinRM shell for hacking/pentesting
Stars: ✭ 2,251 (+1091.01%)
PortiaPortia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
Stars: ✭ 154 (-18.52%)
PentaOpen source all-in-one CLI tool to semi-automate pentesting.
Stars: ✭ 130 (-31.22%)
TuktukTool for catching and logging different types of requests.
Stars: ✭ 174 (-7.94%)
JwtxploiterA tool to test security of json web token
Stars: ✭ 130 (-31.22%)
Obs WebsocketRemote-control of OBS Studio through WebSocket
Stars: ✭ 2,425 (+1183.07%)
Cloud BusterA Cloudflare resolver that works
Stars: ✭ 128 (-32.28%)
PidrilaPython Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (-33.86%)
Angular5 Iot DashboardMultipurpose dashboard admin for IoT softwares, remote control, user interface. Develop your client dashboards in Angular 5 with vast variety of components available.
Stars: ✭ 148 (-21.69%)
C2hackC2Hack, sharing tips and tricks for pentesters
Stars: ✭ 124 (-34.39%)
TechnowloggerTechNowLogger is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info
Stars: ✭ 172 (-8.99%)
PurplecloudAn Infrastructure as Code (IaC) deployment of a small Active Directory pentest lab in the cloud. The deployment simulates a semi-realistic corporate enterprise Active Directory with a DC and endpoints. Purple team goals include blue team detection capabilities and R&D for detection engineering new approaches.
Stars: ✭ 122 (-35.45%)
StuffUnsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
Stars: ✭ 146 (-22.75%)
RatelRAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-35.98%)
Poet[unmaintained] Post-exploitation tool
Stars: ✭ 184 (-2.65%)
Shodan DorksDorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (-37.57%)
ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-24.87%)
BeefwebWeb interface plugin for DeaDBeeF and foobar2000 players
Stars: ✭ 116 (-38.62%)
PymetaPymeta will search the web for files on a domain to download and extract metadata. This technique can be used to identify: domains, usernames, software/version numbers and naming conventions.
Stars: ✭ 170 (-10.05%)
Remote Control PcControl Laptop using Android. Remote control PC consists of android as well as desktop app written in Java to control laptop using phone.
Stars: ✭ 136 (-28.04%)
Android RemoteControl Clementine from your Android device
Stars: ✭ 188 (-0.53%)
DebinjectInject malicious code into *.debs
Stars: ✭ 187 (-1.06%)
UmbrellaA Phishing Dropper designed to Pentest.
Stars: ✭ 180 (-4.76%)
AboutsecurityA list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-12.17%)
Irremoteesp8266Infrared remote library for ESP8266/ESP32: send and receive infrared signals with multiple protocols. Based on: https://github.com/shirriff/Arduino-IRremote/
Stars: ✭ 1,964 (+939.15%)