NosqlmapAutomated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+1054.49%)
Hacking ToolSocial media & camera hacking & whatsapp virus & SMS bombing
Stars: ✭ 157 (-5.99%)
Cve 2020 0688 expCVE-2020-0688_EXP Auto trigger payload & encrypt method
Stars: ✭ 134 (-19.76%)
UrlcrazyGenerate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (-10.18%)
IntelspyPerform automated network reconnaissance scans
Stars: ✭ 134 (-19.76%)
Cr3dov3rKnow the dangers of credential reuse attacks.
Stars: ✭ 1,700 (+917.96%)
Ip AttackAuto IP or Domain Attack Tool ( #1 )
Stars: ✭ 162 (-2.99%)
Xssor2XSS'OR - Hack with JavaScript.
Stars: ✭ 1,969 (+1079.04%)
JalescJust Another Linux Enumeration Script: A Bash script for locally enumerating a compromised Linux box
Stars: ✭ 152 (-8.98%)
Webrtc LeakCheck if your VPN leaks your IP address via the WebRTC technology
Stars: ✭ 133 (-20.36%)
Dark Fantasy Hack ToolDDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file system of websites.. Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities.) Web Spider: For gathering web application hacking information. Email scraper: To get all emails related to a webpage IMDB Rating: Easy way to access the movie database. Both .exe(compressed as zip) and .py versions are available in files.
Stars: ✭ 131 (-21.56%)
Privilege EscalationThis cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Stars: ✭ 2,117 (+1167.66%)
Blackphish🔱 [ Phishing Made Easy ] 🔱 (In Beta)
Stars: ✭ 133 (-20.36%)
ThreadboatProgram Uses Thread Execution Hijacking To Inject Native Shell-code Into a Standard Win32 Application
Stars: ✭ 132 (-20.96%)
Ethical HackingThis repository contains reference material & links for people willing to learn Ethical Hacking
Stars: ✭ 160 (-4.19%)
Xss Payload List🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List
Stars: ✭ 2,617 (+1467.07%)
Buffer overflowDon't let buffer overflows overflow your mind
Stars: ✭ 131 (-21.56%)
H8mailEmail OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (+1195.21%)
Bluemondaybluemonday: a fast golang HTML sanitizer (inspired by the OWASP Java HTML Sanitizer) to scrub user generated content of XSS
Stars: ✭ 2,135 (+1178.44%)
Evil WinrmThe ultimate WinRM shell for hacking/pentesting
Stars: ✭ 2,251 (+1247.9%)
AboutsecurityA list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-0.6%)
LazybeeCreate Best Wordlist From Python Tool In Termux
Stars: ✭ 161 (-3.59%)
WascanWAScan - Web Application Scanner
Stars: ✭ 1,895 (+1034.73%)
IsoallocA general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good performance
Stars: ✭ 130 (-22.16%)
HookishHooks in to interesting functions and helps reverse the web app faster.
Stars: ✭ 129 (-22.75%)
DnsfookupDNS rebinding toolkit
Stars: ✭ 150 (-10.18%)
DnstrickerA simple dns resolver of dns-record and web-record log server for pentesting
Stars: ✭ 128 (-23.35%)
T14m4tAutomated brute-forcing attack tool.
Stars: ✭ 160 (-4.19%)
Pwninitpwninit - automate starting binary exploit challenges
Stars: ✭ 127 (-23.95%)
Spectre Meltdown PocA semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities
Stars: ✭ 127 (-23.95%)
PhonesploitA tool for remote ADB exploitation in Python3 for all Machines.
Stars: ✭ 122 (-26.95%)
HackercampEnine boyuna siber güvenlik
Stars: ✭ 149 (-10.78%)
Awesome Mobile SecurityAn effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+1000%)
AsnlookupLeverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-2.4%)
Zeebsploitweb scanner - exploitation - information gathering
Stars: ✭ 159 (-4.79%)
PidrilaPython Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (-25.15%)
N00bratRemote Administration Toolkit (or Trojan) for POSiX (Linux/Unix) system working as a Web Service
Stars: ✭ 148 (-11.38%)
Blueborne ScannerBluetooth scanner for local devices that may be vulnerable to Blueborne exploit
Stars: ✭ 125 (-25.15%)
Lpecollection of verified Linux kernel exploits
Stars: ✭ 159 (-4.79%)
Search LibcWeb wrapper of niklasb/libc-database
Stars: ✭ 124 (-25.75%)
EviltwinframeworkA framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities
Stars: ✭ 122 (-26.95%)
StuffUnsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
Stars: ✭ 146 (-12.57%)
Destructivefarm📢 🔒 Exploit farm for attack-defense CTF competitions
Stars: ✭ 122 (-26.95%)
TelekillerA Tools Session Hijacking And Stealer Local Passcode Telegram Windows
Stars: ✭ 122 (-26.95%)
Dymerge🔓 A dynamic dictionary merger for successful dictionary based attacks.
Stars: ✭ 167 (+0%)
Uac exploitEscalate as Administrator bypassing the UAC affecting administrator accounts only.
Stars: ✭ 165 (-1.2%)
VulscanAdvanced vulnerability scanning with Nmap NSE
Stars: ✭ 2,305 (+1280.24%)
HardentheworldHarden the world is a community driven project to develop hardening guidelines and checklists for common software and devices.
Stars: ✭ 158 (-5.39%)
DustcloudXiaomi Smart Home Device Reverse Engineering and Hacking
Stars: ✭ 1,907 (+1041.92%)
Flux Keylogger🔖 Modern Javascript keylogger with web panel
Stars: ✭ 122 (-26.95%)
RatelRAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-27.54%)
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (-13.77%)
0l4bsCross-site scripting labs for web application security enthusiasts
Stars: ✭ 119 (-28.74%)
GofingerprintGoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fingerprints.
Stars: ✭ 120 (-28.14%)
Burpsuite XkeysA Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.
Stars: ✭ 144 (-13.77%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+1067.07%)
GoaltdnsA permutation generation tool written in golang
Stars: ✭ 119 (-28.74%)