organonThis program focuses on automating the download, installation and compilation of pentest tools from source
Stars: ✭ 36 (-98.12%)
Reconspider🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
Stars: ✭ 621 (-67.59%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (-40.71%)
Penetration Testing ToolsA collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (-67.95%)
hinjectHost Header Injection Checker
Stars: ✭ 64 (-96.66%)
HershellHershell is a simple TCP reverse shell written in Go.
Stars: ✭ 442 (-76.93%)
hackipyHacking, pen-testing, and cyber-security related tools built with Python.
Stars: ✭ 26 (-98.64%)
BeeloggerGenerate Gmail Emailing Keyloggers to Windows.
Stars: ✭ 605 (-68.42%)
hsploitAn advanced command-line search engine for Exploit-DB
Stars: ✭ 16 (-99.16%)
HashviewA web front-end for password cracking and analytics
Stars: ✭ 601 (-68.63%)
SmershSmersh is a pentest oriented collaborative tool used to track the progress of your company's missions.
Stars: ✭ 43 (-97.76%)
GraphqlmapGraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes.
Stars: ✭ 434 (-77.35%)
Kali-Linux-EbooksTop 20 Kali Linux Related E-books (Free Download)
Stars: ✭ 134 (-93.01%)
OpendoorOWASP WEB Directory Scanner
Stars: ✭ 586 (-69.42%)
awesome-pentest-toolsList of Security Archives Tools and software, generally for facilitate security & penetration research. Opening it up to everyone will facilitate a knowledge transfer. Hopefully the initial set will grow and expand.
Stars: ✭ 34 (-98.23%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-96.76%)
MonkeyInfection Monkey - An automated pentest tool
Stars: ✭ 5,572 (+190.81%)
KratosknifeKratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
Stars: ✭ 97 (-94.94%)
GoohakAutomatically Launch Google Hacking Queries Against A Target Domain
Stars: ✭ 432 (-77.45%)
XspearPowerfull XSS Scanning and Parameter analysis tool&gem
Stars: ✭ 583 (-69.57%)
BadpodsA collection of manifests that will create pods with elevated privileges.
Stars: ✭ 93 (-95.15%)
PsattackA portable console aimed at making pentesting with PowerShell a little easier.
Stars: ✭ 1,021 (-46.71%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (-77.71%)
log4j-detectorLog4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!
Stars: ✭ 622 (-67.54%)
Damn Vulnerable Graphql ApplicationDamn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
Stars: ✭ 567 (-70.41%)
vsauditVOIP Security Audit Framework
Stars: ✭ 104 (-94.57%)
OscpMy OSCP notes
Stars: ✭ 117 (-93.89%)
MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (-79.75%)
Passphrase WordlistPassphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (-70.98%)
GurpBurp Commander written in Go
Stars: ✭ 56 (-97.08%)
hack-scriptsscripts to setup pentesting system and use during pentest
Stars: ✭ 16 (-99.16%)
pentestmindmapa mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty
Stars: ✭ 179 (-90.66%)
SsrfmapAutomatic SSRF fuzzer and exploitation tool
Stars: ✭ 1,344 (-29.85%)
RedcloudAutomated Red Team Infrastructure deployement using Docker
Stars: ✭ 551 (-71.24%)
Pwdlyser-CLIPython-based CLI Password Analyser (Reporting Tool)
Stars: ✭ 29 (-98.49%)
ScantronA distributed nmap / masscan scanning framework complete with an API client for automation workflows
Stars: ✭ 542 (-71.71%)
BifrostBifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-98.07%)
Black WidowGUI based offensive penetration testing tool (Open Source)
Stars: ✭ 124 (-93.53%)
PowerhubA post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Stars: ✭ 431 (-77.51%)
Rfd CheckerRFD Checker - security CLI tool to test Reflected File Download issues
Stars: ✭ 56 (-97.08%)
Intrigue CoreDiscover Your Attack Surface!
Stars: ✭ 1,013 (-47.13%)
Wahh extrasThe Web Application Hacker's Handbook - Extra Content
Stars: ✭ 428 (-77.66%)
C2hackC2Hack, sharing tips and tricks for pentesters
Stars: ✭ 124 (-93.53%)
Mitm Scripts🔄 A collection of mitmproxy inline scripts
Stars: ✭ 109 (-94.31%)
ReverseapkQuickly analyze and reverse engineer Android packages
Stars: ✭ 419 (-78.13%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (-47.34%)
Cloud enumMulti-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.
Stars: ✭ 420 (-78.08%)
ReconftwreconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (-49.16%)
PoweropsPowerShell Runspace Portable Post Exploitation Tool aimed at making Penetration Testing with PowerShell "easier"
Stars: ✭ 412 (-78.5%)
Flask UnsignCommand line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
Stars: ✭ 90 (-95.3%)