reverieAutomated Pentest Tools Designed For Parrot Linux
Stars: ✭ 77 (-88.63%)
wifibangwifi attacks suite
Stars: ✭ 56 (-91.73%)
Penetration Testing ToolsA collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (-9.31%)
TaipanWeb application vulnerability scanner
Stars: ✭ 359 (-46.97%)
DnstrickerA simple dns resolver of dns-record and web-record log server for pentesting
Stars: ✭ 128 (-81.09%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (-57.61%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (-87.59%)
TokenBreakerJSON RSA to HMAC and None Algorithm Vulnerability POC
Stars: ✭ 51 (-92.47%)
1earnffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+448.74%)
Dark Fantasy Hack ToolDDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file system of websites.. Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities.) Web Spider: For gathering web application hacking information. Email scraper: To get all emails related to a webpage IMDB Rating: Easy way to access the movie database. Both .exe(compressed as zip) and .py versions are available in files.
Stars: ✭ 131 (-80.65%)
Buffer overflowDon't let buffer overflows overflow your mind
Stars: ✭ 131 (-80.65%)
SCANNER-INURLBRAdvanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.
Stars: ✭ 90 (-86.71%)
EnteletaorMessage Queue & Broker Injection tool
Stars: ✭ 139 (-79.47%)
WpreconWPrecon (WordPress Recon), is a vulnerability recognition tool in CMS Wordpress, developed in Go and with scripts in Lua.
Stars: ✭ 135 (-80.06%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-94.39%)
Okadminfinder3[ Admin panel finder / Admin Login Page Finder ] ¢σ∂є∂ ву 👻 (❤-❤) 👻
Stars: ✭ 279 (-58.79%)
HackercampEnine boyuna siber güvenlik
Stars: ✭ 149 (-77.99%)
FaradayFaraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit.
Stars: ✭ 3,198 (+372.38%)
NetwormPython network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-80.06%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (-39%)
Instagram HackerThis is an advanced script for Instagram bruteforce attacks. WARNING THIS IS A REAL TOOL!
Stars: ✭ 156 (-76.96%)
PortiaPortia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
Stars: ✭ 154 (-77.25%)
BopscrkTool to generate smart and powerful wordlists
Stars: ✭ 273 (-59.68%)
Awesome-CyberSec-ResourcesAn awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (-59.68%)
ligolo-ngAn advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (-38.26%)
AshokAshok is a OSINT Recon Tool , a.k.a 😍 Swiss Army knife .
Stars: ✭ 109 (-83.9%)
Red-Rabbit-V4The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate other peoples tools like the aircrack suite or the wifite framework, it rather has its own code and is raw source with over 270+ options. This framework might just be your everyday key to your workflow
Stars: ✭ 123 (-81.83%)
RedBook基于Threathunting-book基础上完善的狩猎视角红队handbook
Stars: ✭ 56 (-91.73%)
KatanaA Python Tool For google Hacking
Stars: ✭ 355 (-47.56%)
ConstoleScan for and exploit Consul agents
Stars: ✭ 37 (-94.53%)
ArachniWeb Application Security Scanner Framework
Stars: ✭ 2,942 (+334.56%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (-40.47%)
AboutsecurityA list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-75.48%)
HostEnumeratorA tool that automates the process of enumeration
Stars: ✭ 29 (-95.72%)
transportc2PoC Command and Control Server. Interact with clients through a private web interface, add new users for team sharing and more.
Stars: ✭ 22 (-96.75%)
Juice ShopOWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+826.14%)
awesome-pentest-toolsList of Security Archives Tools and software, generally for facilitate security & penetration research. Opening it up to everyone will facilitate a knowledge transfer. Hopefully the initial set will grow and expand.
Stars: ✭ 34 (-94.98%)
ObsidianSailboatNmap and NSE command line wrapper in the style of Metasploit
Stars: ✭ 36 (-94.68%)
hackipyHacking, pen-testing, and cyber-security related tools built with Python.
Stars: ✭ 26 (-96.16%)
NightingaleIt's a Docker Environment for pentesting which having all the required tool for VAPT.
Stars: ✭ 119 (-82.42%)
MailRipV3SMTP and IMAP checker / cracker for mailpass combolists with a user-friendly GUI, automated inbox test and many more features.
Stars: ✭ 28 (-95.86%)
Cobalt strike extension kitAttempting to be an all in one repo for others' userful aggressor scripts as well as things we've found useful during Red Team Operations.
Stars: ✭ 345 (-49.04%)
phomberPhomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (-91.29%)
UptuxLinux privilege escalation checks (systemd, dbus, socket fun, etc)
Stars: ✭ 260 (-61.6%)
Top25 ParameterFor basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙
Stars: ✭ 388 (-42.69%)
OverlordOverlord - Red Teaming Infrastructure Automation
Stars: ✭ 258 (-61.89%)
Awesome Hacking ListsProject transferred to: https://github.com/taielab/awesome-hacking-lists
Stars: ✭ 203 (-70.01%)
WhatcmsCMS Detection and Exploit Kit based on Whatcms.org API
Stars: ✭ 205 (-69.72%)
O365reconretrieve information via O365 with a valid cred
Stars: ✭ 204 (-69.87%)
HawkeyeHawkeye filesystem analysis tool
Stars: ✭ 202 (-70.16%)
revshfuzzA tool for fuzzing for ports that allow outgoing connections
Stars: ✭ 18 (-97.34%)
LiteOTPMulti OTP Spam Amp/Paralell threads
Stars: ✭ 50 (-92.61%)
aquatoneA Tool for Domain Flyovers
Stars: ✭ 43 (-93.65%)
SimpleKeyloggerSimple Keylogger with smtp to send emails on your account using python works on linux and Windows
Stars: ✭ 32 (-95.27%)
anubisCaptive wifi hotspot bypass tool for Linux
Stars: ✭ 46 (-93.21%)
trjExecute any command in other's computer using a trojan horse coded and compiled in C. Just for educational purpose.
Stars: ✭ 21 (-96.9%)
goblin一款适用于红蓝对抗中的仿真钓鱼系统
Stars: ✭ 844 (+24.67%)
Security whitepapersCollection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQLi
Stars: ✭ 644 (-4.87%)