NishangNishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: ✭ 5,943 (+843.33%)
BrutesploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (-32.7%)
GasmaskInformation gathering tool - OSINT
Stars: ✭ 518 (-17.78%)
Countly Sdk IosCountly Product Analytics iOS SDK with macOS, watchOS and tvOS support.
Stars: ✭ 585 (-7.14%)
ReverseapkQuickly analyze and reverse engineer Android packages
Stars: ✭ 419 (-33.49%)
OsifOpen Source Information Facebook
Stars: ✭ 511 (-18.89%)
OtsecaOpen source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
Stars: ✭ 416 (-33.97%)
AmassIn-depth Attack Surface Mapping and Asset Discovery
Stars: ✭ 6,284 (+897.46%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (-34.44%)
0d1nTool for automating customized attacks against web applications. Fully made in C language with pthreads, it has fast performance.
Stars: ✭ 506 (-19.68%)
HellraiserVulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (-34.44%)
KeyloggerGet Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (-4.13%)
PacketwhisperPacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (-35.71%)
Ip TracerTrack any ip address with IP-Tracer. IP-Tracer is developed for Linux and Termux. you can retrieve any ip address information using IP-Tracer.
Stars: ✭ 399 (-36.67%)
DawsAdvanced Web Shell
Stars: ✭ 551 (-12.54%)
Nrol 39 LogoA vector PDF of the official mission logo of NROL-39 released via FOIA
Stars: ✭ 398 (-36.83%)
XspearPowerfull XSS Scanning and Parameter analysis tool&gem
Stars: ✭ 583 (-7.46%)
Xeexe TopantivirusevasionUndetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (-38.57%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-39.37%)
PayloadsallthethingsA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+5123.65%)
KithackHacking tools pack & backdoors generator.
Stars: ✭ 377 (-40.16%)
HackerproAll in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog
Stars: ✭ 474 (-24.76%)
EqgrpDecrypted content of eqgrp-auction-file.tar.xz
Stars: ✭ 3,743 (+494.13%)
Penetration Testing ToolsA collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (-2.54%)
Cam HackersHack Cameras CCTV FREE
Stars: ✭ 368 (-41.59%)
Juice ShopOWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+895.24%)
IpapatchPatch iOS Apps, The Easy Way, Without Jailbreak.
Stars: ✭ 3,837 (+509.05%)
Name That Hash🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 3000+ other hashes ☄ Comes with a neat web app 🔥
Stars: ✭ 540 (-14.29%)
Sharpapp💩⭐️🚀A #app with cutting edge technology to #minimize windows-10 telemetry and #maximize privacy plus many more
Stars: ✭ 474 (-24.76%)
MemoryjsRead and write process memory in Node.js (Windows API functions exposed via Node bindings)
Stars: ✭ 371 (-41.11%)
DronebridgeDroneBridge is a system based on the WifiBroadcast approach. A bidirectional digital radio link between two endpoints is established using standard WiFi hardware and a custom protocol. DroneBridge is optimized for use in UAV applications and is a complete system. It is intended be a real alternative to other similar systems, such as DJI Lightbridge or OcuSync.
Stars: ✭ 370 (-41.27%)
Tradfri HackingHacking IKEA TRÅDFRI products, such as light bulbs, window blinds and other accessories.
Stars: ✭ 367 (-41.75%)
ThefatratThefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+843.49%)
Onexonex is a hacking tool installer and package manager for hackers. Onex is a library of all hacking tools for Termux and other Linux distributions. onex can install any third party tool or any hacking tool for you.
Stars: ✭ 537 (-14.76%)
DronesploitDrone pentesting framework console
Stars: ✭ 473 (-24.92%)
ZinesMirror of my favourite hacking Zines for the lulz, nostalgy, and reference
Stars: ✭ 370 (-41.27%)
ChromepassChromepass - Hacking Chrome Saved Passwords
Stars: ✭ 364 (-42.22%)
Search That Hash🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (-26.03%)
W5Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (-41.75%)
Red Teaming ToolkitThis repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Stars: ✭ 5,615 (+791.27%)
Gr SatellitesGNU Radio decoders for several Amateur satellites
Stars: ✭ 472 (-25.08%)
K8toolsK8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Stars: ✭ 4,173 (+562.38%)
AnymethodlogLog any method call of object in Objective-C
Stars: ✭ 361 (-42.7%)
GobyAttack surface mapping
Stars: ✭ 446 (-29.21%)
TaipanWeb application vulnerability scanner
Stars: ✭ 359 (-43.02%)
Ssrf vulnerable labThis Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Stars: ✭ 361 (-42.7%)
ZipA portable, simple zip library written in C
Stars: ✭ 596 (-5.4%)
DvwaDamn Vulnerable Web Application (DVWA)
Stars: ✭ 5,727 (+809.05%)
OsrframeworkOSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accurate online researches.
Stars: ✭ 534 (-15.24%)
BertyBerty is a secure peer-to-peer messaging app that works with or without internet access, cellular data or trust in the network
Stars: ✭ 5,101 (+709.68%)
Technical WhitepapersCollection of IT whitepapers, presentations, pdfs; hacking, web app security, db, reverse engineering and more; EN/PL.
Stars: ✭ 359 (-43.02%)
PentestkitUseful tools and scripts during Penetration Testing engagements
Stars: ✭ 463 (-26.51%)
KatanaA Python Tool For google Hacking
Stars: ✭ 355 (-43.65%)