Awesome BbhtA bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-64.62%)
Awesome Hacking ListsProject transferred to: https://github.com/taielab/awesome-hacking-lists
Stars: ✭ 203 (-62.2%)
VirusX5The Most Powerful Fake Page Redirecting tool...
Stars: ✭ 15 (-97.21%)
Mr.Holmes🔍 A Complete Osint Tool
Stars: ✭ 307 (-42.83%)
InfectCreate you virus in termux!
Stars: ✭ 33 (-93.85%)
HellraiserVulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (-23.09%)
DirsearchWeb path scanner
Stars: ✭ 7,246 (+1249.35%)
Jok3rJok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (+20.11%)
ParadoxiaratParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (-26.44%)
Powershell RatPython based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+18.44%)
IpdroneTrack Location With Live Address And Accuracy In Termux
Stars: ✭ 286 (-46.74%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+42.27%)
NosqlmapAutomated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+259.03%)
WhatwebNext generation web scanner
Stars: ✭ 3,503 (+552.33%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+67.04%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+1343.58%)
Swift KeyloggerKeylogger for mac written in Swift using HID
Stars: ✭ 995 (+85.29%)
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-90.5%)
TrapePeople tracker on the Internet: OSINT analysis and research tool by Jose Pino
Stars: ✭ 6,753 (+1157.54%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-86.59%)
Chaos🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Stars: ✭ 1,168 (+117.5%)
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-81.94%)
XshockXSHOCK Shellshock Exploit
Stars: ✭ 65 (-87.9%)
BopscrkTool to generate smart and powerful wordlists
Stars: ✭ 273 (-49.16%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-78.4%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-66.11%)
EnteletaorMessage Queue & Broker Injection tool
Stars: ✭ 139 (-74.12%)
InfectInfect Any Android Device With Virus From Link In Termux
Stars: ✭ 409 (-23.84%)
CtftoolsPersonal CTF Toolkit
Stars: ✭ 312 (-41.9%)
Zeebsploitweb scanner - exploitation - information gathering
Stars: ✭ 159 (-70.39%)
WpreconWPrecon (WordPress Recon), is a vulnerability recognition tool in CMS Wordpress, developed in Go and with scripts in Lua.
Stars: ✭ 135 (-74.86%)
RaccoonA high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+330.54%)
UserFinderOSINT tool for finding profiles by username
Stars: ✭ 379 (-29.42%)
anubisCaptive wifi hotspot bypass tool for Linux
Stars: ✭ 46 (-91.43%)
Search That Hash🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (-13.22%)
FreeFire-PhishingFree Fire Phishing Tool ID Hack Tool For Online Hacking
Stars: ✭ 140 (-73.93%)
GrabcamA tool to hack camera from termux for video tutorial visit youtube.com/noobhackers
Stars: ✭ 296 (-44.88%)
PacketwhisperPacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (-24.58%)
GobyAttack surface mapping
Stars: ✭ 446 (-16.95%)
Ctf NotesEverything needed for doing CTFs
Stars: ✭ 304 (-43.39%)
ArchstrikeAn Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (-25.33%)
LambdaguardAWS Serverless Security
Stars: ✭ 300 (-44.13%)
0d1nTool for automating customized attacks against web applications. Fully made in C language with pthreads, it has fast performance.
Stars: ✭ 506 (-5.77%)
ChimeraChimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (-13.78%)
Termux StyleSimple script to change color-schemes and fonts for Termux.
Stars: ✭ 400 (-25.51%)
Gta ReversedReversed code of GTA:SA executable (gta_sa.exe) 1.0 US
Stars: ✭ 297 (-44.69%)
BadmodCMS auto detect and exploit.
Stars: ✭ 296 (-44.88%)
Sn1perAttack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+811.92%)
NmapIdiomatic nmap library for go developers
Stars: ✭ 391 (-27.19%)