WebmapA Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generation during a Web Penetration Testing
Stars: ✭ 188 (-17.18%)
Ipa DictMonolingual wordlists with pronunciation information in IPA
Stars: ✭ 139 (-38.77%)
Wpa2 WordlistsA collection of wordlists dictionaries for password cracking
Stars: ✭ 597 (+163%)
PydictorA powerful and useful hacker dictionary builder for a brute-force attack
Stars: ✭ 2,055 (+805.29%)
MercuryMercury is a hacking tool used to collect information and use the information to further hurt the target
Stars: ✭ 236 (+3.96%)
ComPPCompany Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.
Stars: ✭ 44 (-80.62%)
PUPI🛅 Passwords using personal information
Stars: ✭ 65 (-71.37%)
BruteSploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 26 (-88.55%)
DirsearchA Go implementation of dirsearch.
Stars: ✭ 164 (-27.75%)
DirstalkModern alternative to dirbuster/dirb
Stars: ✭ 210 (-7.49%)
BrutesploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (+86.78%)
DirsearchWeb path scanner
Stars: ✭ 7,246 (+3092.07%)
Dark Fantasy Hack ToolDDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file system of websites.. Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities.) Web Spider: For gathering web application hacking information. Email scraper: To get all emails related to a webpage IMDB Rating: Easy way to access the movie database. Both .exe(compressed as zip) and .py versions are available in files.
Stars: ✭ 131 (-42.29%)
Emoji Ime Dictionary日本語で絵文字入力をするための IME 追加辞書 📙 Google 日本語入力などで日本語から絵文字への変換を可能にする IME 拡張辞書です
Stars: ✭ 172 (-24.23%)
Node Rate Limiter FlexibleNode.js rate limit requests by key with atomic increments in single process or distributed environment.
Stars: ✭ 1,950 (+759.03%)
Faitagram(Doesn't work anymore)
Stars: ✭ 117 (-48.46%)
GoaltdnsA permutation generation tool written in golang
Stars: ✭ 119 (-47.58%)
Sdcv Stars: ✭ 171 (-24.67%)
Yotteryotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage
Stars: ✭ 118 (-48.02%)
BrutemapLet's find someone's account
Stars: ✭ 113 (-50.22%)
Inferno🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-53.74%)
RoutersploitExploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+4246.26%)
JwtcatA CPU-based JSON Web Token (JWT) cracker and - to some extent - scanner.
Stars: ✭ 181 (-20.26%)
Instagram HackerThis is an advanced script for Instagram bruteforce attacks. WARNING THIS IS A REAL TOOL!
Stars: ✭ 156 (-31.28%)
BrutesharkNetwork Analysis Tool
Stars: ✭ 1,335 (+488.11%)
BoxPython dictionaries with advanced dot notation access
Stars: ✭ 1,804 (+694.71%)
DynamictranslatorInstant translation application for windows in .NET 🎪
Stars: ✭ 131 (-42.29%)
H4rpyAutomated WPA/WPA2 PSK attack tool.
Stars: ✭ 185 (-18.5%)
ZattPython implementation of the Raft algorithm for distributed consensus
Stars: ✭ 119 (-47.58%)
AddictThe Python Dict that's better than heroin.
Stars: ✭ 2,141 (+843.17%)
Pentest Tools FrameworkPentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Stars: ✭ 211 (-7.05%)
ElpscrkA Common User Passwords generator script that looks like the tool Eliot used it in Mr.Robot Series Episode 01 :D :v
Stars: ✭ 113 (-50.22%)
BitextorBitextor generates translation memories from multilingual websites.
Stars: ✭ 168 (-25.99%)
SnmpwnAn SNMPv3 User Enumerator and Attack tool
Stars: ✭ 183 (-19.38%)
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-57.27%)
D4n155OWASP D4N155 - Intelligent and dynamic wordlist using OSINT
Stars: ✭ 105 (-53.74%)
T14m4tAutomated brute-forcing attack tool.
Stars: ✭ 160 (-29.52%)
Hackers Tool KitIts a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on instagram
Stars: ✭ 211 (-7.05%)
Glom☄️ Python's nested data operator (and CLI), for all your declarative restructuring needs. Got data? Glom it! ☄️
Stars: ✭ 1,341 (+490.75%)
DagonAdvanced Hash Manipulation
Stars: ✭ 155 (-31.72%)
DictmakerA stand-alone web server app for rapidly building and publishing full fledged dictionary websites and APIs for any language.
Stars: ✭ 97 (-57.27%)
Zydra Stars: ✭ 178 (-21.59%)
Flask UnsignCommand line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
Stars: ✭ 90 (-60.35%)
InstabruteInstagram password bruteforcer
Stars: ✭ 91 (-59.91%)
GohacktoolsHacker tools on Go (Golang)
Stars: ✭ 1,303 (+474.01%)
Xdxf makedictXDXF — a dictionary format, that stores word definitions that are free from representation
Stars: ✭ 177 (-22.03%)
Facebash TermuxFacebook BruteForce [ By Tor ] Tool For Termux.
Stars: ✭ 141 (-37.89%)
CmseekCMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs
Stars: ✭ 1,296 (+470.93%)
Adidas Multi Session(Python) Program to simulate multiple sessions on adidas queue pages.
Stars: ✭ 90 (-60.35%)
EthaddrgenCustom Ethereum vanity address generator made in Rust
Stars: ✭ 84 (-63%)
CloudfailUtilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
Stars: ✭ 1,239 (+445.81%)
CuppThe most common form of authentication is the combination of a username
and a password or passphrase. If both match values stored within a locally
stored table, the user is authenticated for a connection. Password strength is
a measure of the difficulty involved in guessing or breaking the password
through cryptographic techniques or library-based automated testing of
alternate values.
Stars: ✭ 2,493 (+998.24%)
InstagramBruteforce attack for Instagram
Stars: ✭ 2,296 (+911.45%)
Koa2 RatelimitRate-limiting middleware for Koa2 ES6. Use to limit repeated requests to APIs and/or endpoints such as password reset.
Stars: ✭ 81 (-64.32%)