Hack ToolsThe all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+2172.73%)
BigbountyreconBigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+347.11%)
BlackmambaC2/post-exploitation framework
Stars: ✭ 544 (+349.59%)
BifrostBifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-69.42%)
YAPSYet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-71.07%)
Pwncatpwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
Stars: ✭ 904 (+647.11%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+838.84%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+137.19%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-60.33%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+540.5%)
argusArgus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (-28.1%)
inceptorTemplate-Driven AV/EDR Evasion Framework
Stars: ✭ 730 (+503.31%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-70.25%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-49.59%)
Lockdoor Framework🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+459.5%)
PasshuntPasshunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
Stars: ✭ 961 (+694.21%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+8537.19%)
SmershSmersh is a pentest oriented collaborative tool used to track the progress of your company's missions.
Stars: ✭ 43 (-64.46%)
Shodan DorksDorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (-2.48%)
PyParser-CVEMulti source CVE/exploit parser.
Stars: ✭ 25 (-79.34%)
Slack WatchmanMonitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (+31.4%)
Satelliteeasy-to-use payload hosting
Stars: ✭ 193 (+59.5%)
Sn1perAttack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+3947.11%)
VuldashVulnerability Dashboard
Stars: ✭ 16 (-86.78%)
CcatCloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Stars: ✭ 300 (+147.93%)
ThecollectiveThe Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-29.75%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+1510.74%)
Adversary emulation libraryAn open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Stars: ✭ 295 (+143.8%)
github-watchmanMonitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (-50.41%)
Powershell Red TeamCollection of PowerShell functions a Red Teamer may use to collect data from a machine
Stars: ✭ 155 (+28.1%)
PayloadsGit All the Payloads! A collection of web attack payloads.
Stars: ✭ 2,862 (+2265.29%)
Gitlab WatchmanMonitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (+4.96%)
OblivionData leak checker & OSINT Tool
Stars: ✭ 237 (+95.87%)
CalderaAutomated Adversary Emulation Platform
Stars: ✭ 3,126 (+2483.47%)
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+5587.6%)
php-reverse-shellPHP shells that work on Linux OS, macOS, and Windows OS.
Stars: ✭ 274 (+126.45%)
RatelRAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (+0%)
Oscp Cheat SheetThis is my OSCP cheat sheet made by combining a lot of different resources online with a little bit of tweaking. I used this cheat sheet during my exam (Fri, 13 Sep 2019) and during the labs. I can proudly say it helped me pass so I hope it can help you as well ! Good Luck and Try Harder
Stars: ✭ 216 (+78.51%)
trolotrolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-62.81%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+144.63%)
java-reverse-tcpJAR, Java, and JSP shells that work on Linux OS, macOS, and Windows OS.
Stars: ✭ 19 (-84.3%)
sqlscanQuick SQL Scanner, Dorker, Webshell injector PHP
Stars: ✭ 140 (+15.7%)
HershellHershell is a simple TCP reverse shell written in Go.
Stars: ✭ 442 (+265.29%)
Platypus🔨 A modern multiple reverse shell sessions manager wrote in go
Stars: ✭ 559 (+361.98%)
ChashellChashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
Stars: ✭ 742 (+513.22%)
InlineWhispers2Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
Stars: ✭ 156 (+28.93%)
GirshAutomatically spawn a reverse shell fully interactive for Linux or Windows victim
Stars: ✭ 66 (-45.45%)
MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (+220.66%)
WpforceWordpress Attack Suite
Stars: ✭ 633 (+423.14%)
Fwdsh3llForward shell generation framework
Stars: ✭ 62 (-48.76%)
EggshelliOS/macOS/Linux Remote Administration Tool
Stars: ✭ 1,286 (+962.81%)
JALSIJALSI - Just Another Lame Shellcode Injector
Stars: ✭ 29 (-76.03%)
BetterbackdoorA backdoor with a multitude of features.
Stars: ✭ 195 (+61.16%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+15.7%)