Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+4045.45%)
awesome-pentest-toolsList of Security Archives Tools and software, generally for facilitate security & penetration research. Opening it up to everyone will facilitate a knowledge transfer. Hopefully the initial set will grow and expand.
Stars: ✭ 34 (-81.82%)
akamai-arl-hackScript to test open Akamai ARL vulnerability.
Stars: ✭ 70 (-62.57%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+379.68%)
PyParser-CVEMulti source CVE/exploit parser.
Stars: ✭ 25 (-86.63%)
PhirauteeA proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
Stars: ✭ 96 (-48.66%)
ReconftwreconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+420.86%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+287.7%)
Black-ToolInstall the tools and start Attacking , black-tool v5.0 ! ⬛
Stars: ✭ 239 (+27.81%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-67.38%)
Jok3rJok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (+244.92%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+314.44%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+120.86%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+439.57%)
GetPwdIt's a tool which generate a dictionary from a csv containing personals informations. Generate all common passwords based on perso info. (leet transformations and combinatory processing)
Stars: ✭ 46 (-75.4%)
crawleetWeb Recon & Exploitation Tool.
Stars: ✭ 48 (-74.33%)
PwndocPentest Report Generator
Stars: ✭ 417 (+122.99%)
Awesome VulnerableA curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.
Stars: ✭ 133 (-28.88%)
Xssor2XSS'OR - Hack with JavaScript.
Stars: ✭ 1,969 (+952.94%)
MS17010EXPLadon Moudle MS17010 Exploit for PowerShell
Stars: ✭ 40 (-78.61%)
aquatoneA Tool for Domain Flyovers
Stars: ✭ 43 (-77.01%)
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+153.48%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+505.35%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+507.49%)
minipwnerA script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".
Stars: ✭ 53 (-71.66%)
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-48.13%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-37.97%)
Wifi PassviewAn open source batch script based WiFi Passview for Windows!
Stars: ✭ 157 (-16.04%)
Instagram HackerThis is an advanced script for Instagram bruteforce attacks. WARNING THIS IS A REAL TOOL!
Stars: ✭ 156 (-16.58%)
PortiaPortia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
Stars: ✭ 154 (-17.65%)
UmbrellaA Phishing Dropper designed to Pentest.
Stars: ✭ 180 (-3.74%)
TechnowloggerTechNowLogger is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info
Stars: ✭ 172 (-8.02%)
NetpwnTool made to automate tasks of pentesting.
Stars: ✭ 152 (-18.72%)
InstahackBest Tool For instagram bruteforce hacking Tool By EvilDevil
Stars: ✭ 139 (-25.67%)
PymetaPymeta will search the web for files on a domain to download and extract metadata. This technique can be used to identify: domains, usernames, software/version numbers and naming conventions.
Stars: ✭ 170 (-9.09%)
DragonflyMinecraft (Bedrock Edition) server software written in Go
Stars: ✭ 148 (-20.86%)
SocialfishPhishing Tool & Information Collector
Stars: ✭ 2,522 (+1248.66%)
EnigmaMultiplatform payload dropper
Stars: ✭ 180 (-3.74%)
DaspThe Decentralized Application Security Project
Stars: ✭ 166 (-11.23%)
0days In The WildRepository for information about 0-days exploited in-the-wild.
Stars: ✭ 149 (-20.32%)
M WizInstall Metasploit And Repair Metasploit In Termux With Easy Steps
Stars: ✭ 148 (-20.86%)
AboutsecurityA list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-11.23%)
StuffUnsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
Stars: ✭ 146 (-21.93%)
Intrec PackIntelligence and Reconnaissance Package/Bundle installer.
Stars: ✭ 177 (-5.35%)
MysapadventuresA quick methodology on testing / hacking SAP Applications for n00bz and bug bounty hunters
Stars: ✭ 164 (-12.3%)
VulncostFind security vulnerabilities in open source npm packages while you code
Stars: ✭ 146 (-21.93%)
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (-22.99%)
PasscatPasswords Recovery Tool
Stars: ✭ 164 (-12.3%)
Oxidtools200 TOOLS BY 0XID4FF0X FOR TERMUX
Stars: ✭ 143 (-23.53%)
ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-24.06%)
DebinjectInject malicious code into *.debs
Stars: ✭ 187 (+0%)
Poet[unmaintained] Post-exploitation tool
Stars: ✭ 184 (-1.6%)
StegcloakHide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
Stars: ✭ 2,379 (+1172.19%)
AsnlookupLeverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-12.83%)
SdwannewhopeSD-WAN security and insecurity
Stars: ✭ 141 (-24.6%)