Flux Keylogger🔖 Modern Javascript keylogger with web panel
Stars: ✭ 122 (-19.74%)
FeroxbusterA fast, simple, recursive content discovery tool written in Rust.
Stars: ✭ 1,314 (+764.47%)
GogitdumperDump exposed HTTP .git fast
Stars: ✭ 27 (-82.24%)
O365sprayUsername enumeration and password spraying tool aimed at Microsoft O365.
Stars: ✭ 133 (-12.5%)
WsshWSSH Is a tool for brute forcing servers that has port 22 open via ssh, wssh is probably the fastest ssh brute forcer available
Stars: ✭ 21 (-86.18%)
Resource filesmosquito - Automating reconnaissance and brute force attacks
Stars: ✭ 95 (-37.5%)
Awesome HackingA curated list of awesome Hacking tutorials, tools and resources
Stars: ✭ 7,756 (+5002.63%)
Ssh MitmSSH man-in-the-middle tool
Stars: ✭ 1,328 (+773.68%)
Privilege EscalationThis cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Stars: ✭ 2,117 (+1292.76%)
PrismaticaResponsive Command and Control System
Stars: ✭ 81 (-46.71%)
VenomVenom - A Multi-hop Proxy for Penetration Testers
Stars: ✭ 1,228 (+707.89%)
ErodirA fast web directory/file enumeration tool written in Rust
Stars: ✭ 94 (-38.16%)
BlackwormBlack Worm Offical Repo
Stars: ✭ 80 (-47.37%)
Flask UnsignCommand line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
Stars: ✭ 90 (-40.79%)
Pocsuite3pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.
Stars: ✭ 2,213 (+1355.92%)
BrutemapLet's find someone's account
Stars: ✭ 113 (-25.66%)
DeathstarUses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive TTPs.
Stars: ✭ 1,221 (+703.29%)
Crazy WeekendMengobati rasa ingin tahu atau kadang hanya iseng
Stars: ✭ 9 (-94.08%)
AutoenumAutomatic Service Enumeration Script
Stars: ✭ 134 (-11.84%)
StretcherTool designed to help identify open Elasticsearch servers that are exposing sensitive information
Stars: ✭ 91 (-40.13%)
CommoncrawlparserSimple multi threaded tool to extract domain related data from commoncrawl.org
Stars: ✭ 25 (-83.55%)
RulerA tool to abuse Exchange services
Stars: ✭ 1,684 (+1007.89%)
Pwncatpwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
Stars: ✭ 904 (+494.74%)
Wifi CrackingCrack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat
Stars: ✭ 9,546 (+6180.26%)
Posta🐙 Cross-document messaging security research tool powered by https://enso.security
Stars: ✭ 143 (-5.92%)
Jsql InjectionjSQL Injection is a Java application for automatic SQL database injection.
Stars: ✭ 891 (+486.18%)
Cve 2019 0604cve-2019-0604 SharePoint RCE exploit
Stars: ✭ 91 (-40.13%)
ScriptsScripts I use during pentest engagements.
Stars: ✭ 834 (+448.68%)
GoaltdnsA permutation generation tool written in golang
Stars: ✭ 119 (-21.71%)
Instabruteforcehacking-tool termux-tools termux noob-friendly instagram-bot bruteforce-password-cracker wordlist-technique
Stars: ✭ 86 (-43.42%)
TorbotDark Web OSINT Tool
Stars: ✭ 821 (+440.13%)
Nimscan🚀 Fast Port Scanner 🚀
Stars: ✭ 134 (-11.84%)
SprayingtoolkitScripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
Stars: ✭ 802 (+427.63%)
Tidos FrameworkThe Offensive Manual Web Application Penetration Testing Framework.
Stars: ✭ 1,290 (+748.68%)
Pi Pwnbox RogueapHomemade Pwnbox 🚀 / Rogue AP 📡 based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap 💡
Stars: ✭ 798 (+425%)
AcamarA Python3 based single-file subdomain enumerator
Stars: ✭ 89 (-41.45%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-48.03%)
Androidsdk🐳 Full-fledged Android SDK Docker Image
Stars: ✭ 776 (+410.53%)
PhpvulnAudit tool to find common vulnerabilities in PHP source code
Stars: ✭ 146 (-3.95%)
TrapePeople tracker on the Internet: OSINT analysis and research tool by Jose Pino
Stars: ✭ 6,753 (+4342.76%)
RvdRobot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (-42.76%)
BulwarkAn organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
Stars: ✭ 113 (-25.66%)
Decoder Plus PlusAn extensible application for penetration testers and software developers to decode/encode data into various formats.
Stars: ✭ 79 (-48.03%)
Reverse ShellReverse Shell as a Service
Stars: ✭ 1,281 (+742.76%)
Sqlite LabThis code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is for fun. Just enjoy it \m/
Stars: ✭ 140 (-7.89%)
ArcherysecCentralize Vulnerability Assessment and Management for DevSecOps Team
Stars: ✭ 1,802 (+1085.53%)
VirtualsecconsAn ongoing list of virtual cybersecurity conferences.
Stars: ✭ 113 (-25.66%)
Webhackersweapons⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 1,205 (+692.76%)
BellaBella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻
Stars: ✭ 112 (-26.32%)
YsfYSF Server Functions
Stars: ✭ 77 (-49.34%)
Buffer overflowDon't let buffer overflows overflow your mind
Stars: ✭ 131 (-13.82%)
TweetshellMulti-thread Twitter BruteForcer in Shell Script
Stars: ✭ 112 (-26.32%)
Griefing MethodsA documentation about how to hack Minecraft servers
Stars: ✭ 76 (-50%)
RsfThe Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
Stars: ✭ 76 (-50%)