DirsearchWeb path scanner
Stars: ✭ 7,246 (+2970.34%)
BrutesploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (+79.66%)
WebmapA Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generation during a Web Penetration Testing
Stars: ✭ 188 (-20.34%)
Socialbox TermuxSocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By init__0 for termux on android
Stars: ✭ 324 (+37.29%)
PhoniaPhonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any international phone numbers with a very good accuracy.
Stars: ✭ 221 (-6.36%)
BruteSploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 26 (-88.98%)
Ciphey⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Stars: ✭ 9,116 (+3762.71%)
BrutexAutomatically brute force all services running on a target.
Stars: ✭ 974 (+312.71%)
HackphilesBruteForce Tool For both Instagram and Facebook
Stars: ✭ 57 (-75.85%)
Inferno🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-55.51%)
PUPI🛅 Passwords using personal information
Stars: ✭ 65 (-72.46%)
WebCrypto.swiftA small collection of cryptographic functions based on the JavaScript WebCrypto API.
Stars: ✭ 16 (-93.22%)
express-ipAn Express Middleware for getting IP information
Stars: ✭ 28 (-88.14%)
Name That Hash🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 3000+ other hashes ☄ Comes with a neat web app 🔥
Stars: ✭ 540 (+128.81%)
Passphrase WordlistPassphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (+135.59%)
WsshWSSH Is a tool for brute forcing servers that has port 22 open via ssh, wssh is probably the fastest ssh brute forcer available
Stars: ✭ 21 (-91.1%)
Ipdata🌐 An IP lookup system utilizing open datasets
Stars: ✭ 58 (-75.42%)
Hackers Tool KitIts a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on instagram
Stars: ✭ 211 (-10.59%)
Country Ip BlocksCIDR country-level IP data, straight from the Regional Internet Registries, updated hourly.
Stars: ✭ 100 (-57.63%)
BrutemapLet's find someone's account
Stars: ✭ 113 (-52.12%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-46.61%)
Dark Fantasy Hack ToolDDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file system of websites.. Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities.) Web Spider: For gathering web application hacking information. Email scraper: To get all emails related to a webpage IMDB Rating: Easy way to access the movie database. Both .exe(compressed as zip) and .py versions are available in files.
Stars: ✭ 131 (-44.49%)
Instagram HackerThis is an advanced script for Instagram bruteforce attacks. WARNING THIS IS A REAL TOOL!
Stars: ✭ 156 (-33.9%)
BruteForceA simple brute forcer written in GO for SHA1, SHA256, SHA512, MD5 and bcrypt
Stars: ✭ 49 (-79.24%)
ComPPCompany Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.
Stars: ✭ 44 (-81.36%)
ipinfoA wrapper around the ipinfo.io services
Stars: ✭ 51 (-78.39%)
cache-namesCracked Old School RuneScape cache file names
Stars: ✭ 25 (-89.41%)
crypthash-netCryptHash.NET is a .NET multi-target library to encrypt/decrypt/hash/encode/decode strings and files, with an optional .NET Core multiplatform console utility.
Stars: ✭ 33 (-86.02%)
BopscrkTool to generate smart and powerful wordlists
Stars: ✭ 273 (+15.68%)
0d1nTool for automating customized attacks against web applications. Fully made in C language with pthreads, it has fast performance.
Stars: ✭ 506 (+114.41%)
Search That Hash🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+97.46%)
T14m4tAutomated brute-forcing attack tool.
Stars: ✭ 160 (-32.2%)
Ip AttackAuto IP or Domain Attack Tool ( #1 )
Stars: ✭ 162 (-31.36%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+80.93%)
SnoopSnoop — инструмент разведки на основе открытых данных (OSINT world)
Stars: ✭ 886 (+275.42%)
Java Crypto UtilsJava Cryptographic, Encoding and Hash Utilities
Stars: ✭ 15 (-93.64%)
DirsearchA Go implementation of dirsearch.
Stars: ✭ 164 (-30.51%)
BrutesharkNetwork Analysis Tool
Stars: ✭ 1,335 (+465.68%)
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-58.9%)
PakcrackAll in 1 Pakisthani Facebook Cloner [ 7/8/9/10/11 DIGIT ]
Stars: ✭ 105 (-55.51%)
Geo ReconAn OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts.
Stars: ✭ 82 (-65.25%)
EviltwinframeworkA framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities
Stars: ✭ 122 (-48.31%)
GoaltdnsA permutation generation tool written in golang
Stars: ✭ 119 (-49.58%)
CloudfailUtilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
Stars: ✭ 1,239 (+425%)
DagonAdvanced Hash Manipulation
Stars: ✭ 155 (-34.32%)
Track IpAdvanced Ip Tracker Tool
Stars: ✭ 150 (-36.44%)
IplocationGet ip location information.
Stars: ✭ 70 (-70.34%)
PydictorA powerful and useful hacker dictionary builder for a brute-force attack
Stars: ✭ 2,055 (+770.76%)
Asufacebook hacking toolkit
Stars: ✭ 197 (-16.53%)
Xrtk CoreThe Official Mixed Reality Framework for Unity
Stars: ✭ 219 (-7.2%)
RoninRonin is a Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of code, Exploits or Payloads, Scanners, etc, via Repositories.
Stars: ✭ 220 (-6.78%)
Clone DeepRecursively (deep) clone JavaScript native types, like Object, Array, RegExp, Date as well as primitives. Used by superstruct, merge-deep, and many others!
Stars: ✭ 229 (-2.97%)