uberscanSecurity program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.
Stars: ✭ 31 (-98.89%)
K8toolsK8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Stars: ✭ 4,173 (+49.46%)
Pythempentest framework
Stars: ✭ 1,060 (-62.03%)
Ladon大型内网渗透扫描器&Cobalt Strike,Ladon8.9内置120个模块,包含信息收集/存活主机/端口扫描/服务识别/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010/SMBGhost/Weblogic/ActiveMQ/Tomcat/Struts2,密码口令爆破(Mysql/Oracle/MSSQL)/FTP/SSH(Linux)/VNC/Windows(IPC/WMI/SMB/Netbios/LDAP/SmbHash/WmiHash/Winrm),远程执行命令(smbexec/wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0
Stars: ✭ 2,911 (+4.26%)
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-96.53%)
ProxenetThe ONLY hacker friendly proxy for webapp pentests.
Stars: ✭ 193 (-93.09%)
Dymerge🔓 A dynamic dictionary merger for successful dictionary based attacks.
Stars: ✭ 167 (-94.02%)
PasscatPasswords Recovery Tool
Stars: ✭ 164 (-94.13%)
PulseBrute Force For Facebook,Instagram & Twitter
Stars: ✭ 173 (-93.8%)
IsectSegments intersection detection library
Stars: ✭ 199 (-92.87%)
TechnowloggerTechNowLogger is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info
Stars: ✭ 172 (-93.84%)
BerserkerA list of useful payloads for Web Application Security and Pentest/CTF
Stars: ✭ 212 (-92.41%)
EnumdbRelational database brute force and post exploitation tool for MySQL and MSSQL
Stars: ✭ 167 (-94.02%)
Stegseek⚡️ Worlds fastest steghide cracker, chewing through millions of passwords per second ⚡️
Stars: ✭ 187 (-93.3%)
Hackers Tool KitIts a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on instagram
Stars: ✭ 211 (-92.44%)
Xssor2XSS'OR - Hack with JavaScript.
Stars: ✭ 1,969 (-29.48%)
PandwarfPandwaRF: RF analysis tool with a sub-1 GHz wireless transceiver controlled by a smartphone or
Stars: ✭ 206 (-92.62%)
PortiaPortia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
Stars: ✭ 154 (-94.48%)
StuffUnsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
Stars: ✭ 146 (-94.77%)
DebinjectInject malicious code into *.debs
Stars: ✭ 187 (-93.3%)
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (-94.84%)
Ntlmscanscan for NTLM directories
Stars: ✭ 141 (-94.95%)
FilebusterAn extremely fast and flexible web fuzzer
Stars: ✭ 176 (-93.7%)
TuktukTool for catching and logging different types of requests.
Stars: ✭ 174 (-93.77%)
BrutedumBruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack
Stars: ✭ 212 (-92.41%)
FaceboomA Python script for Brute Force Attack On Facebook Account :)
Stars: ✭ 194 (-93.05%)
PymetaPymeta will search the web for files on a domain to download and extract metadata. This technique can be used to identify: domains, usernames, software/version numbers and naming conventions.
Stars: ✭ 170 (-93.91%)
Oscp Cheat SheetThis is my OSCP cheat sheet made by combining a lot of different resources online with a little bit of tweaking. I used this cheat sheet during my exam (Fri, 13 Sep 2019) and during the labs. I can proudly say it helped me pass so I hope it can help you as well ! Good Luck and Try Harder
Stars: ✭ 216 (-92.26%)
SpypiAn (un-)ethical hacking-station based on Raspberry Pi and Python
Stars: ✭ 167 (-94.02%)
WsuspenduImplement WSUSpendu attack
Stars: ✭ 191 (-93.16%)
AboutsecurityA list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-94.05%)
DirstalkModern alternative to dirbuster/dirb
Stars: ✭ 210 (-92.48%)
AsnlookupLeverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-94.16%)
Insanity FrameworkGenerate Payloads and Control Remote Machines. [Discontinued]
Stars: ✭ 189 (-93.23%)
T14m4tAutomated brute-forcing attack tool.
Stars: ✭ 160 (-94.27%)
RunascsRunasCs - Csharp and open version of windows builtin runas.exe
Stars: ✭ 216 (-92.26%)
H4rpyAutomated WPA/WPA2 PSK attack tool.
Stars: ✭ 185 (-93.37%)
3d Bin Container PackingA variant of the Largest Area Fit First (LAFF) algorithm + brute force algorithm
Stars: ✭ 145 (-94.81%)
CanisrufusA stealthy Python based Windows backdoor that uses Github as a command and control server
Stars: ✭ 207 (-92.59%)
Poet[unmaintained] Post-exploitation tool
Stars: ✭ 184 (-93.41%)
PydictorA powerful and useful hacker dictionary builder for a brute-force attack
Stars: ✭ 2,055 (-26.4%)
SocialfishPhishing Tool & Information Collector
Stars: ✭ 2,522 (-9.67%)
Pentestsome pentest scripts & tools by [email protected]
Stars: ✭ 136 (-95.13%)
Capsulecorp PentestVagrant VirtualBox environment for conducting an internal network penetration test
Stars: ✭ 214 (-92.34%)
Sec ToolsDocker images for infosec tools
Stars: ✭ 135 (-95.16%)
SnmpwnAn SNMPv3 User Enumerator and Attack tool
Stars: ✭ 183 (-93.45%)
WavecrackWavestone's web interface for password cracking with hashcat
Stars: ✭ 135 (-95.16%)
StegbruteFast Steganography bruteforce tool written in Rust useful for CTF's
Stars: ✭ 134 (-95.2%)
LimitrrLight NodeJS rate limiting and response delaying using Redis - including Express middleware.
Stars: ✭ 203 (-92.73%)
UmbrellaA Phishing Dropper designed to Pentest.
Stars: ✭ 180 (-93.55%)
O365sprayUsername enumeration and password spraying tool aimed at Microsoft O365.
Stars: ✭ 133 (-95.24%)
Awesome VulnerableA curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.
Stars: ✭ 133 (-95.24%)