WirespyFramework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
Stars: ✭ 293 (-36.72%)
goLazagneGo library for credentials recovery
Stars: ✭ 177 (-61.77%)
Docker Ipsec Vpn ServerDocker image to run an IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2
Stars: ✭ 4,356 (+840.82%)
clairvoyanceObtain GraphQL API Schema even if the introspection is not enabled
Stars: ✭ 448 (-3.24%)
Dnscat2 PowershellA Powershell client for dnscat2, an encrypted DNS command and control tool.
Stars: ✭ 295 (-36.29%)
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-95.03%)
Vulnerable AdCreate a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
Stars: ✭ 360 (-22.25%)
Cidr.xyzWeb-based CIDR / netmask / IP address visualizer
Stars: ✭ 293 (-36.72%)
Open5gsOpen5GS is a C-language Open Source implementation for 5G Core and EPC, i.e. the core network of LTE/NR network (Release-16)
Stars: ✭ 457 (-1.3%)
Dref DNS Rebinding Exploitation Framework
Stars: ✭ 423 (-8.64%)
GhostwriterThe SpecterOps project management and reporting engine
Stars: ✭ 394 (-14.9%)
Awesome InfosecA curated list of awesome infosec courses and training resources.
Stars: ✭ 3,779 (+716.2%)
graphw00fgraphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology is behind a given GraphQL endpoint.
Stars: ✭ 260 (-43.84%)
S3ScanScript to spider a website and find publicly open S3 buckets
Stars: ✭ 21 (-95.46%)
SitadelWeb Application Security Scanner
Stars: ✭ 360 (-22.25%)
BURN[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Stars: ✭ 13 (-97.19%)
IdentywafBlind WAF identification tool
Stars: ✭ 291 (-37.15%)
webreconAutomated Web Recon Shell Scripts
Stars: ✭ 48 (-89.63%)
GcpingMeasure your latency to GCP regions
Stars: ✭ 405 (-12.53%)
Tcp Shaker💓 Performing TCP handshake without ACK in Go, useful for health checking, that is SYN, SYN-ACK, RST.
Stars: ✭ 289 (-37.58%)
filter-var-sqliBypassing FILTER_SANITIZE_EMAIL & FILTER_VALIDATE_EMAIL filters in filter_var for SQL Injection ( xD )
Stars: ✭ 29 (-93.74%)
Hunter(l)user hunter using WinAPI calls only
Stars: ✭ 359 (-22.46%)
remote-adb-scanpure python remote adb scanner + nmap scan module
Stars: ✭ 19 (-95.9%)
NknOfficial Go implementation of NKN full node.
Stars: ✭ 287 (-38.01%)
toolsTools used for Penetration testing / Red Teaming
Stars: ✭ 63 (-86.39%)
QsimpleupdaterUpdater system for Qt applications
Stars: ✭ 429 (-7.34%)
GoPhish-TemplatesGoPhish Templates that I have retired and/or templates I've recreated.
Stars: ✭ 76 (-83.59%)
minipwnerA script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".
Stars: ✭ 53 (-88.55%)
PyParser-CVEMulti source CVE/exploit parser.
Stars: ✭ 25 (-94.6%)
DevBrute-A Password Brute ForcerDevBrute is a Password Brute Forcer, It can Brute Force almost all Social Media Accounts or Any Web Application.
Stars: ✭ 91 (-80.35%)
tugareconPentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (-69.33%)
brutekragPenetration tests on SSH servers using brute force or dictionary attacks. Written in Python.
Stars: ✭ 30 (-93.52%)
default-http-login-hunterLogin hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.
Stars: ✭ 285 (-38.44%)
EastExploits and Security Tools Framework 2.0.1
Stars: ✭ 283 (-38.88%)
WPA2-FritzBox-Pswd-Wordlist-GeneratorThis Script will produce all of the WPA2 Passwords used by various Router companies aswell as Fritzbox. All of these Passwords will be 16 Numbers in length. So it could get a bit large.
Stars: ✭ 22 (-95.25%)
TwistedEvent-driven networking engine written in Python.
Stars: ✭ 4,442 (+859.4%)
xecaPowerShell payload generator
Stars: ✭ 103 (-77.75%)
Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (-23.76%)
EiskaltdcppFile sharing program using DC and ADC protocols
Stars: ✭ 277 (-40.17%)
PacketwhisperPacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (-12.53%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-86.83%)
DnsliveryEasy files and payloads delivery over DNS
Stars: ✭ 332 (-28.29%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-89.63%)
Slackor A Golang implant that uses Slack as a command and control server
Stars: ✭ 392 (-15.33%)
Offensive DockerOffensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-29.16%)
wifi-deautherA fully automatic wifi deauther coded in Python
Stars: ✭ 25 (-94.6%)
PowerProxyPowerShell SOCKS proxy with reverse proxy capabilities
Stars: ✭ 29 (-93.74%)
Daisynet1. - Alamofire与Cache封装 , 更容易存储请求数据. 2. - 封装Alamofire下载,使用更方便
Stars: ✭ 331 (-28.51%)
PandorasBoxSecurity tool to quickly audit Public Box files and folders.
Stars: ✭ 56 (-87.9%)