All Projects → Keye → Similar Projects or Alternatives

1206 Open source projects that are alternatives of or similar to Keye

Sublert
Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (+592.08%)
aquatone
A Tool for Domain Flyovers
Stars: ✭ 43 (-57.43%)
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (+88.12%)
Pidrila
Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (+23.76%)
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+40.59%)
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+7074.26%)
Resources For Beginner Bug Bounty Hunters
A list of resources for those interested in getting started in bug bounties
Stars: ✭ 7,185 (+7013.86%)
Mutual labels:  hacking, pentest, bug-bounty
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+7575.25%)
Mutual labels:  hacking, penetration-testing, pentest
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+322.77%)
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+3368.32%)
Mutual labels:  hacking, penetration-testing, pentest
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+3257.43%)
Portia
Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
Stars: ✭ 154 (+52.48%)
Mutual labels:  hacking, penetration-testing, pentest
Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (+14.85%)
Badkarma
network reconnaissance toolkit
Stars: ✭ 353 (+249.5%)
Capsulecorp Pentest
Vagrant VirtualBox environment for conducting an internal network penetration test
Stars: ✭ 214 (+111.88%)
Mutual labels:  hacking, penetration-testing, pentest
flydns
Related subdomains finder
Stars: ✭ 29 (-71.29%)
Mutual labels:  bug-bounty, pentest, reconnaissance
Awesome Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
Stars: ✭ 48,038 (+47462.38%)
Offensive Docker
Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (+224.75%)
Mutual labels:  hacking, pentest, bug-bounty
Penetration Testing Study Notes
Penetration Testing notes, resources and scripts
Stars: ✭ 461 (+356.44%)
Mutual labels:  hacking, penetration-testing, pentest
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+3304.95%)
Collection Document
Collection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+1273.27%)
Mutual labels:  hacking, pentest, bug-bounty
Asnlookup
Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (+61.39%)
Mutual labels:  hacking, pentest, reconnaissance
Hacker101 Ctf
Hacker101 CTF Writeup
Stars: ✭ 295 (+192.08%)
Mutual labels:  hacking, penetration-testing, pentest
Payloadsallthethings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+32483.17%)
Mutual labels:  hacking, penetration-testing, pentest
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+369.31%)
Mutual labels:  hacking, penetration-testing, pentest
Habu
Hacking Toolkit
Stars: ✭ 635 (+528.71%)
Mutual labels:  hacking, penetration-testing, pentest
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+10247.52%)
Mutual labels:  hacking, penetration-testing
Web Brutator
Fast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-3.96%)
Mutual labels:  hacking, pentest
Swiftnessx
A cross-platform note-taking & target-tracking app for penetration testers.
Stars: ✭ 673 (+566.34%)
Mutual labels:  penetration-testing, bug-bounty
Cve 2019 0604
cve-2019-0604 SharePoint RCE exploit
Stars: ✭ 91 (-9.9%)
Mutual labels:  hacking, pentest
Brutal
Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (+571.29%)
Mutual labels:  hacking, penetration-testing
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+570.3%)
Mutual labels:  hacking, penetration-testing
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+617.82%)
Mutual labels:  hacking, pentest
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+659.41%)
Mutual labels:  hacking, penetration-testing
Spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+6713.86%)
Mutual labels:  reconnaissance, pentest
K8cscan
K8Cscan大型内网渗透自定义插件化扫描神器,包含信息收集、网络资产、漏洞扫描、密码爆破、漏洞利用,程序采用多线程批量扫描大型内网多个IP段C段主机,目前插件包含: C段旁注扫描、子域名扫描、Ftp密码爆破、Mysql密码爆破、Oracle密码爆破、MSSQL密码爆破、Windows/Linux系统密码爆破、存活主机扫描、端口扫描、Web信息探测、操作系统版本探测、Cisco思科设备扫描等,支持调用任意外部程序或脚本,支持Cobalt Strike联动
Stars: ✭ 693 (+586.14%)
Mutual labels:  hacking, pentest
Interlace
Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+652.48%)
Mutual labels:  hacking, penetration-testing
Ecommerce Website Security Checklist
List of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built into the Techinical Specific Document, or will be checked in the Security testing phases.
Stars: ✭ 98 (-2.97%)
Mutual labels:  hacking, bug-bounty
Rapidscan
🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+667.33%)
Awesome Oscp
A curated list of awesome OSCP resources
Stars: ✭ 804 (+696.04%)
Mutual labels:  penetration-testing, pentest
Scripts
Scripts I use during pentest engagements.
Stars: ✭ 834 (+725.74%)
Mutual labels:  hacking, penetration-testing
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+667.33%)
Mutual labels:  hacking, pentest
Sn0int
Semi-automatic OSINT framework and package manager
Stars: ✭ 814 (+705.94%)
Mutual labels:  reconnaissance, bug-bounty
Jsql Injection
jSQL Injection is a Java application for automatic SQL database injection.
Stars: ✭ 891 (+782.18%)
Mutual labels:  hacking, pentest
Awesome Ethical Hacking Resources
🔗 All the resources I could find for learning Ethical Hacking and Penetration Testing.
Stars: ✭ 933 (+823.76%)
Mutual labels:  hacking, penetration-testing
Pwncat
pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
Stars: ✭ 904 (+795.05%)
Mutual labels:  penetration-testing, pentest
Pwn jenkins
Notes about attacking Jenkins servers
Stars: ✭ 841 (+732.67%)
Mutual labels:  hacking, pentest
Shellpop
Pop shells like a master.
Stars: ✭ 1,279 (+1166.34%)
Mutual labels:  hacking, pentest
Jok3r
Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (+538.61%)
Mutual labels:  hacking, pentest
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+656.44%)
Mutual labels:  hacking, penetration-testing
Xattacker
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+788.12%)
Mutual labels:  hacking, pentest
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+761.39%)
Mutual labels:  hacking, penetration-testing
Broxy
An HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (+802.97%)
Mutual labels:  hacking, penetration-testing
Reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+864.36%)
Mutual labels:  hacking, pentest
Powerladon
Ladon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Stars: ✭ 39 (-61.39%)
Mutual labels:  hacking, pentest
Vulnx
vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+899.01%)
Mutual labels:  hacking, pentest
Ssh Mitm
SSH man-in-the-middle tool
Stars: ✭ 1,328 (+1214.85%)
Mutual labels:  hacking, penetration-testing
Eyes
👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?" 🔍 🕵️
Stars: ✭ 38 (-62.38%)
Intrigue Core
Discover Your Attack Surface!
Stars: ✭ 1,013 (+902.97%)
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-14.85%)
Mutual labels:  hacking, penetration-testing
1-60 of 1206 similar projects