SubtakeAutomatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.
Stars: ✭ 104 (-54.19%)
WebmapA Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generation during a Web Penetration Testing
Stars: ✭ 188 (-17.18%)
Powershell Red TeamCollection of PowerShell functions a Red Teamer may use to collect data from a machine
Stars: ✭ 155 (-31.72%)
Ransom0Ransom0 is a open source ransomware made with Python, designed to find and encrypt user data.
Stars: ✭ 105 (-53.74%)
KarmaFind leaked emails with your passwords
Stars: ✭ 154 (-32.16%)
Go Deliver Go-deliver is a payload delivery tool coded in Go.
Stars: ✭ 103 (-54.63%)
Watf BankWaTF Bank - What a Terrible Failure Mobile Banking Application for Android and iOS
Stars: ✭ 87 (-61.67%)
OpenctiAuthors
Stars: ✭ 2,165 (+853.74%)
BlackratBlackRAT - Java Based Remote Administrator Tool
Stars: ✭ 87 (-61.67%)
Hack ToolsThe all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+1111.45%)
Atomic Red Team Intelligence C2ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (-61.67%)
Sqlite LabThis code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is for fun. Just enjoy it \m/
Stars: ✭ 140 (-38.33%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+458.59%)
PdlistA passive subdomain finder
Stars: ✭ 204 (-10.13%)
MalwarepersistencescriptsA collection of scripts I've written to help red and blue teams with malware persistence techniques.
Stars: ✭ 103 (-54.63%)
KeepassbrowserimporterKeePass 2.x plugin which imports credentials from various browsers.
Stars: ✭ 139 (-38.77%)
CheckDevelopment environment for Meedan Check, a collaborative media annotation platform
Stars: ✭ 84 (-63%)
Twitter IntelligenceTwitter Intelligence OSINT project performs tracking and analysis of the Twitter
Stars: ✭ 179 (-21.15%)
Gitjacker🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (+450.22%)
NetwormPython network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-40.53%)
MalwlessTest Blue Team detections without running any attack.
Stars: ✭ 215 (-5.29%)
Danderspritz docsThe goal of this project is to examine, reverse, and document the different modules available in the Equation Group's DanderSpritz post-exploitation framework leaked by the ShadowBrokers
Stars: ✭ 225 (-0.88%)
CrosslinkedLinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping
Stars: ✭ 223 (-1.76%)
LnkupGenerates malicious LNK file payloads for data exfiltration
Stars: ✭ 205 (-9.69%)
KnaryA simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams & Pushover support
Stars: ✭ 187 (-17.62%)
Sherlock JsFind usernames across over 170 social networks - Fast & flexible remake of sdushantha/sherlock
Stars: ✭ 153 (-32.6%)
Smtptestersmall python3 tool to check common vulnerabilities in SMTP servers
Stars: ✭ 102 (-55.07%)
Digital Privacy一个关于数字隐私搜集、保护、清理集一体的方案,外加开源信息收集(OSINT)对抗
Stars: ✭ 1,231 (+442.29%)
SilentbridgeSilentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.
Stars: ✭ 136 (-40.09%)
GitmadMonitor, Alert, and Discover sensitive info and data leakage on Github.
Stars: ✭ 81 (-64.32%)
Netstalking CatalogueКаталог нетсталкерских ресурсов, команд, инструментов, источников контента.
Stars: ✭ 134 (-40.97%)
Decoder Plus PlusAn extensible application for penetration testers and software developers to decode/encode data into various formats.
Stars: ✭ 79 (-65.2%)
XorpassEncoder to bypass WAF filters using XOR operations
Stars: ✭ 134 (-40.97%)
PoshkeepassPowerShell module for KeePass
Stars: ✭ 177 (-22.03%)
RsfThe Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
Stars: ✭ 76 (-66.52%)
Awesome CsirtAwesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (-41.85%)
RogueAn extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.
Stars: ✭ 225 (-0.88%)
SubjackSubdomain Takeover tool written in Go
Stars: ✭ 1,194 (+425.99%)
DeadtrapAn OSINT tool to gather information about the real owner of a phone number
Stars: ✭ 73 (-67.84%)
VailynA phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-54.63%)
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-68.28%)
TrigmapA wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (-41.85%)
OscpOur OSCP repo: from popping shells to mental health.
Stars: ✭ 71 (-68.72%)
PwnbackBurp Extender plugin that generates a sitemap of a website using Wayback Machine
Stars: ✭ 203 (-10.57%)
Tlosint LiveTrace Labs OSINT Linux Distribution based on Kali.
Stars: ✭ 151 (-33.48%)
Collection DocumentCollection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+511.01%)
ArcherysecCentralize Vulnerability Assessment and Management for DevSecOps Team
Stars: ✭ 1,802 (+693.83%)
Awesome Cobaltstrikecobaltstrike的相关资源汇总 / List of Awesome CobaltStrike Resources
Stars: ✭ 1,157 (+409.69%)
IvreNetwork recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,331 (+926.87%)
Burp ParamalyzerParamalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.
Stars: ✭ 102 (-55.07%)
NetzDiscover internet-wide misconfigurations while drinking coffee
Stars: ✭ 159 (-29.96%)
Web2attackWeb hacking framework with tools, exploits by python
Stars: ✭ 152 (-33.04%)
Security ScriptsA collection of public offensive and defensive security related scripts for InfoSec students.
Stars: ✭ 101 (-55.51%)
HackvaultA container repository for my public web hacks!
Stars: ✭ 1,364 (+500.88%)
UrlcrazyGenerate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (-33.92%)
BettercapThe Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Stars: ✭ 10,735 (+4629.07%)
ArsenalExtensible Red Team Framework
Stars: ✭ 99 (-56.39%)