Reconspider🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
Stars: ✭ 621 (+639.29%)
BillcipherInformation Gathering tool for a Website or IP address
Stars: ✭ 332 (+295.24%)
DjangohunterTool designed to help identify incorrectly configured Django applications that are exposing sensitive information.
Stars: ✭ 212 (+152.38%)
Jenkins Rce😈 Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!
Stars: ✭ 262 (+211.9%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (+50%)
Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (+320.24%)
Shodan DorksDorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (+40.48%)
Kill RouterFerramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-32.14%)
Awesome Shodan Queries🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
Stars: ✭ 2,758 (+3183.33%)
Cam HackersHack Cameras CCTV FREE
Stars: ✭ 368 (+338.1%)
Pwn jenkinsNotes about attacking Jenkins servers
Stars: ✭ 841 (+901.19%)
Redmine jenkinsA Redmine plugin which makes building your Jenkins projects easy ;)
Stars: ✭ 69 (-17.86%)
PillagerPillage filesystems for sensitive information with Go.
Stars: ✭ 64 (-23.81%)
BlackwormBlack Worm Offical Repo
Stars: ✭ 80 (-4.76%)
Envinject PluginThis plugin makes it possible to setup a custom environment for your jobs
Stars: ✭ 74 (-11.9%)
B1tifissh management tool to provides commandline access to a remote system running SSH server
Stars: ✭ 65 (-22.62%)
Movies For Hackers🎬 A curated list of movies every hacker & cyberpunk must watch.
Stars: ✭ 8,884 (+10476.19%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+1252.38%)
Beef Over WanBrowser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-2.38%)
Webhackersweapons⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 1,205 (+1334.52%)
Shodanz🔭 A modern, async Ruby gem for Shodan, the world's first search engine for Internet-connected devices.
Stars: ✭ 74 (-11.9%)
Chaos🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Stars: ✭ 1,168 (+1290.48%)
Griefing MethodsA documentation about how to hack Minecraft servers
Stars: ✭ 76 (-9.52%)
Netmap.jsFast browser-based network discovery module
Stars: ✭ 70 (-16.67%)
MetasearchSearch aggregator for Slack, Google Docs, GitHub, and more 🔍
Stars: ✭ 81 (-3.57%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+1277.38%)
Geo ReconAn OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts.
Stars: ✭ 82 (-2.38%)
Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (-20.24%)
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+1314.29%)
Rhme 2017Riscure Hack Me embedded hardware CTF 2017-2018.
Stars: ✭ 65 (-22.62%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-5.95%)
XshockXSHOCK Shellshock Exploit
Stars: ✭ 65 (-22.62%)
Devops ResourcesDevOps resources - Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP
Stars: ✭ 1,194 (+1321.43%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+1247.62%)
Jenkins Pipeline📈 Learn how to implement container technologies with your Jenkins CI/CD workflows to make them easier to manage in this tutorial.
Stars: ✭ 83 (-1.19%)
SeginfofaqFAQ del mundo de la seguridad informática en español.
Stars: ✭ 73 (-13.1%)
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-25%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-26.19%)
DeadtrapAn OSINT tool to gather information about the real owner of a phone number
Stars: ✭ 73 (-13.1%)
PyhawkSearches the directory of choice for interesting files. Such as database files and files with passwords stored on them
Stars: ✭ 60 (-28.57%)
Notifyqq基于Mojo-WebQQ的Jenkins构建后QQ提醒插件
Stars: ✭ 59 (-29.76%)
GithacktoolsThe best Hacking and PenTesting tools installer on the world
Stars: ✭ 78 (-7.14%)
SandmapNmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (+1304.76%)
WebwhatsappbotCore to automatize whatsapp - working 11/2018
Stars: ✭ 59 (-29.76%)
HackphilesBruteForce Tool For both Instagram and Facebook
Stars: ✭ 57 (-32.14%)
Lor Axe🪓 a multi-threaded, low-bandwidth HTTP DOS tool
Stars: ✭ 72 (-14.29%)
PapersPapers about known hacking, security, hardware, software, computer, network and other ressources.
Stars: ✭ 58 (-30.95%)