qvm-create-windows-qubeSpin up new Windows qubes quickly, effortlessly and securely on Qubes OS
Stars: ✭ 267 (+345%)
introspectorA schema and set of tools for using SQL to query cloud infrastructure.
Stars: ✭ 61 (+1.67%)
pwn-pulseExploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Stars: ✭ 126 (+110%)
DcRatA simple remote tool in C#.
Stars: ✭ 709 (+1081.67%)
adalancheActive Directory ACL Visualizer and Explorer - who's really Domain Admin?
Stars: ✭ 862 (+1336.67%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (+1.67%)
wildpwnunix wildcard attacks
Stars: ✭ 119 (+98.33%)
tugareconPentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+136.67%)
goverviewgoverview - Get an overview of the list of URLs
Stars: ✭ 93 (+55%)
BruteForceA simple brute forcer written in GO for SHA1, SHA256, SHA512, MD5 and bcrypt
Stars: ✭ 49 (-18.33%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+31.67%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+393.33%)
ArgosThis script will automatically set up an OSINT workstation starting from a Ubuntu OS.
Stars: ✭ 73 (+21.67%)
vafVaf is a cross-platform very advanced and fast web fuzzer written in nim
Stars: ✭ 294 (+390%)
S3ScanScript to spider a website and find publicly open S3 buckets
Stars: ✭ 21 (-65%)
sx🖖 Fast, modern, easy-to-use network scanner
Stars: ✭ 1,267 (+2011.67%)
Python-KeyloggerPython Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||
Stars: ✭ 55 (-8.33%)
Leakfa.comA simple way to know if you are on the list of major security breaches like "HIBP", but it is specific for Iran.
Stars: ✭ 106 (+76.67%)
Blue-Team-NotesYou didn't think I'd go and leave the blue team out, right?
Stars: ✭ 899 (+1398.33%)
fuzzmostall manner of wordlists
Stars: ✭ 23 (-61.67%)
BrutegramInstagram multi-bruteforce Platfrom
Stars: ✭ 183 (+205%)
evtx-hunterevtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.
Stars: ✭ 122 (+103.33%)
MercuryMercury is a hacking tool used to collect information and use the information to further hurt the target
Stars: ✭ 236 (+293.33%)
smbauditPerform various SMB-related attacks, particularly useful for testing large Active Directory environments.
Stars: ✭ 31 (-48.33%)
rustpadMulti-threaded Padding Oracle attacks against any service. Written in Rust.
Stars: ✭ 75 (+25%)
Pentest Tools FrameworkPentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Stars: ✭ 211 (+251.67%)
CrackerjackMultiprocessing brute-force script written in Python 3
Stars: ✭ 22 (-63.33%)
H4rpyAutomated WPA/WPA2 PSK attack tool.
Stars: ✭ 185 (+208.33%)
sgCheckupsgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.
Stars: ✭ 77 (+28.33%)
SnmpwnAn SNMPv3 User Enumerator and Attack tool
Stars: ✭ 183 (+205%)
honeykuA Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).
Stars: ✭ 56 (-6.67%)
Zydra Stars: ✭ 178 (+196.67%)
RedLoginRed Login: SSH Brute-force Tools
Stars: ✭ 99 (+65%)
DirsearchA Go implementation of dirsearch.
Stars: ✭ 164 (+173.33%)
psolving-paradigmsCommon problems of dynamic programming methods and techniques, including prerequisites, for competitive programmers.
Stars: ✭ 34 (-43.33%)
Instagram HackerThis is an advanced script for Instagram bruteforce attacks. WARNING THIS IS A REAL TOOL!
Stars: ✭ 156 (+160%)
pdfbruterThis is an offline password cracking Tools which cracks any PDF which are password protected using an inbuilt wordlist Dictionary.!
Stars: ✭ 30 (-50%)
instabruteInstagram Brute Forcer
Stars: ✭ 135 (+125%)
Facebash TermuxFacebook BruteForce [ By Tor ] Tool For Termux.
Stars: ✭ 141 (+135%)
InfoPhishInfoPath Phishing Repo Resource
Stars: ✭ 68 (+13.33%)
Lazy RdpScript for automatic scanning & brute-force RDP
Stars: ✭ 118 (+96.67%)
Node Rate Limiter FlexibleNode.js rate limit requests by key with atomic increments in single process or distributed environment.
Stars: ✭ 1,950 (+3150%)
toolkitThe essential toolkit for reversing, malware analysis, and cracking
Stars: ✭ 176 (+193.33%)
TIWAPTotally Insecure Web Application Project (TIWAP)
Stars: ✭ 137 (+128.33%)
tutorialsAdditional Resources For Securing The Stack Tutorials
Stars: ✭ 36 (-40%)
urlbusterPowerful mutable web directory fuzzer to bruteforce existing and/or hidden files or directories.
Stars: ✭ 144 (+140%)
termux-snippetsAn integrated tool and a collection of snippets which helps in the various aspects of the terminal.
Stars: ✭ 28 (-53.33%)
1earnffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+6091.67%)
xmlrpc-bruteforcerMulti-threaded XMLRPC brute forcer using amplification attacks targeting WordPress installations prior to version 4.4.
Stars: ✭ 71 (+18.33%)
urldedupePass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
Stars: ✭ 208 (+246.67%)