Linsetmv1 2Linset is a WPA/WPA2 phishing tool (evil twin)
Stars: ✭ 105 (-96.56%)
Antimalware ResearchResearch on Anti-malware and other related security solutions
Stars: ✭ 163 (-94.67%)
Hacker ContainerContainer with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-96.56%)
SubtakeAutomatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.
Stars: ✭ 104 (-96.6%)
ShellabLinux and Windows shellcode enrichment utility
Stars: ✭ 225 (-92.64%)
MinesweeperA Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-94.7%)
Ransom0Ransom0 is a open source ransomware made with Python, designed to find and encrypt user data.
Stars: ✭ 105 (-96.56%)
BellaBella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻
Stars: ✭ 112 (-96.34%)
M4ngl3m3Common password pattern generator using strings list
Stars: ✭ 103 (-96.63%)
Doxboxweb-based OSINT and reconaissance toolkit
Stars: ✭ 202 (-93.39%)
Xssor2XSS'OR - Hack with JavaScript.
Stars: ✭ 1,969 (-35.57%)
Smtptestersmall python3 tool to check common vulnerabilities in SMTP servers
Stars: ✭ 102 (-96.66%)
Burp ParamalyzerParamalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.
Stars: ✭ 102 (-96.66%)
Information Security TasksThis repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (-96.47%)
AndroticklerPenetration testing and auditing toolkit for Android apps.
Stars: ✭ 225 (-92.64%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+238.12%)
PspyMonitor linux processes without root permissions
Stars: ✭ 2,470 (-19.18%)
AnsvifA Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.
Stars: ✭ 107 (-96.5%)
Icg AutoexploiterbotWordpress 🔥 Joomla 🔥 Drupal 🔥 OsCommerce 🔥 Prestashop 🔥 Opencart 🔥
Stars: ✭ 242 (-92.08%)
CrosslinkedLinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping
Stars: ✭ 223 (-92.7%)
MosintAn automated e-mail OSINT tool
Stars: ✭ 184 (-93.98%)
KeyeKeye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-96.7%)
HackvaultA container repository for my public web hacks!
Stars: ✭ 1,364 (-55.37%)
PasscatPasswords Recovery Tool
Stars: ✭ 164 (-94.63%)
Wifi DumperThis is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. This tool will help you in a Wifi penetration testing. Furthermore, it is useful while performing red team or an internal infrastructure engagements.
Stars: ✭ 242 (-92.08%)
ZerodoorA script written lazily for generating cross-platform backdoors on the go :)
Stars: ✭ 163 (-94.67%)
ApkinfectorAdvanced Android AV Evasion Tool Written In Python 3 that can Embed/Bind meterpreter APK to any Legitimate APK
Stars: ✭ 105 (-96.56%)
Powershell Reverse Http😇 A Powershell exploit service that opens a reverse http connection via meterpreter
Stars: ✭ 104 (-96.6%)
PycatPython network tool, similar to Netcat with custom features.
Stars: ✭ 162 (-94.7%)
YamsA collection of Ansible roles for automating infosec builds.
Stars: ✭ 98 (-96.79%)
Invoke ApexA PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
Stars: ✭ 162 (-94.7%)
BetterbackdoorA backdoor with a multitude of features.
Stars: ✭ 195 (-93.62%)
RescopeRescope is a tool geared towards pentesters and bugbounty researchers, that aims to make life easier when defining scopes for Burp Suite and OWASP ZAP.
Stars: ✭ 156 (-94.9%)
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-96.83%)
Put2winScript to automate PUT HTTP method exploitation to get shell
Stars: ✭ 96 (-96.86%)
Physmem2profitPhysmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely
Stars: ✭ 244 (-92.02%)
DeepseaDeepSea Phishing Gear
Stars: ✭ 96 (-96.86%)
Win PortfwdPowershell script to setup windows port forwarding using native netsh client
Stars: ✭ 95 (-96.89%)
ArlARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
Stars: ✭ 1,357 (-55.6%)
Firecrack🔥 Firecrack pentest tools: Facebook hacking random attack, deface, admin finder, bing dorking:
Stars: ✭ 157 (-94.86%)
VsauditVOIP Security Audit Framework
Stars: ✭ 97 (-96.83%)
LockphishLockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.
Stars: ✭ 186 (-93.91%)
FlashsploitExploitation Framework for ATtiny85 Based HID Attacks
Stars: ✭ 155 (-94.93%)
Resource filesmosquito - Automating reconnaissance and brute force attacks
Stars: ✭ 95 (-96.89%)
PayloadHeadless CMS and Application Framework built with Node.js, React and MongoDB
Stars: ✭ 154 (-94.96%)
Ssh MitmSSH man-in-the-middle tool
Stars: ✭ 1,328 (-56.54%)
Awesome BbhtA bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-93.78%)
PortiaPortia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
Stars: ✭ 154 (-94.96%)
SwurgParse OpenAPI documents into Burp Suite for automating OpenAPI-based APIs security assessments (approved by PortSwigger for inclusion in their official BApp Store).
Stars: ✭ 94 (-96.92%)
BadpodsA collection of manifests that will create pods with elevated privileges.
Stars: ✭ 93 (-96.96%)
Scout🔭 Lightweight URL fuzzer and spider: Discover a web server's undisclosed files, directories and VHOSTs
Stars: ✭ 241 (-92.11%)
PhoniaPhonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any international phone numbers with a very good accuracy.
Stars: ✭ 221 (-92.77%)
CintruderCaptcha Intruder (CIntrud3r) is an automatic pentesting tool to bypass captchas.
Stars: ✭ 192 (-93.72%)
Web2attackWeb hacking framework with tools, exploits by python
Stars: ✭ 152 (-95.03%)
UrlcrazyGenerate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (-95.09%)