All Projects → Pentesting_toolkit → Similar Projects or Alternatives

2942 Open source projects that are alternatives of or similar to Pentesting_toolkit

Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (-10.41%)
Infosec reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+228.23%)
Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Stars: ✭ 9,116 (+618.93%)
Mutual labels:  hacking, cryptography, pentesting, ctf
Stegcloak
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻‍♂️⭐
Stars: ✭ 2,379 (+87.62%)
Mutual labels:  hacking, cryptography, infosec, steganography
Rebel Framework
Advanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (-85.57%)
Mutual labels:  hacking, ctf, forensics, reverse-engineering
Ctf Tools
Useful CTF Tools
Stars: ✭ 190 (-85.02%)
Packetwhisper
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (-68.06%)
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (-59.86%)
Mutual labels:  hacking, pentesting, infosec, ctf
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+511.36%)
Awesome Mobile Security
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+44.87%)
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (-31.39%)
Mutual labels:  hacking, pentesting, infosec
Stegseek
⚡️ Worlds fastest steghide cracker, chewing through millions of passwords per second ⚡️
Stars: ✭ 187 (-85.25%)
Mutual labels:  pentesting, ctf, steganography
Pwnshop
Exploit Development, Reverse Engineering & Cryptography
Stars: ✭ 167 (-86.83%)
Awesome Hacking Resources
A collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+804.26%)
Mutual labels:  hacking, ctf, reverse-engineering
Basecrack
Decode All Bases - Base Scheme Decoder
Stars: ✭ 196 (-84.54%)
Mutual labels:  cryptography, infosec, ctf
Fdsploit
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (-84.31%)
Mutual labels:  hacking, pentesting, web-security
Hrshell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (-84.78%)
Mutual labels:  hacking, pentesting, post-exploitation
Ctf All In One
CTF竞赛权威指南
Stars: ✭ 2,807 (+121.37%)
Mutual labels:  hacking, ctf, reverse-engineering
Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-90.85%)
Mutual labels:  network, hacking, pentesting
Write Ups
📚 VoidHack CTF write-ups
Stars: ✭ 45 (-96.45%)
Mutual labels:  cryptography, ctf, reverse-engineering
Cameradar
Cameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+118.85%)
Mutual labels:  hacking, pentesting, infosec
Cloudbrute
Awesome cloud enumerator
Stars: ✭ 268 (-78.86%)
Mutual labels:  hacking, pentesting, infosec
Phishapi
Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (-78.55%)
Mutual labels:  hacking, pentesting, infosec
Jaeles
The Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (-15.38%)
Mutual labels:  hacking, infosec, vulnerabilities
Nmap
Idiomatic nmap library for go developers
Stars: ✭ 391 (-69.16%)
Mutual labels:  hacking, pentesting, infosec
Spellbook
Micro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-95.82%)
Mutual labels:  hacking, pentesting, ctf
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (-38.88%)
Mutual labels:  hacking, pentesting, infosec
Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (-86.91%)
Mutual labels:  pentesting, ctf, post-exploitation
Information Security Tasks
This repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (-91.48%)
Mutual labels:  pentesting, forensics, steganography
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-95.11%)
Mutual labels:  hacking, pentesting, infosec
Mitmap
📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+20.35%)
Mutual labels:  hacking, pentesting, infosec
Hacker Container
Container with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-91.72%)
Mutual labels:  hacking, pentesting, infosec
Stegcracker
Steganography brute-force utility to uncover hidden data inside files
Stars: ✭ 396 (-68.77%)
Mutual labels:  pentesting, ctf, steganography
Apkurlgrep
Extract endpoints from APK files
Stars: ✭ 405 (-68.06%)
Mutual labels:  hacking, pentesting, infosec
Bramble
Bramble is a hacking Open source suite.
Stars: ✭ 60 (-95.27%)
Mutual labels:  cryptography, forensics, steganography
Thoron
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-93.14%)
Awesome Shodan Queries
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩‍💻
Stars: ✭ 2,758 (+117.51%)
Mutual labels:  hacking, pentesting, infosec
Hawkeye
Hawkeye filesystem analysis tool
Stars: ✭ 202 (-84.07%)
Mutual labels:  hacking, pentesting, infosec
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-85.65%)
Mutual labels:  hacking, pentesting, infosec
Rspet
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Stars: ✭ 251 (-80.21%)
Mutual labels:  hacking, pentesting, post-exploitation
Juice Shop Ctf
Capture-the-Flag (CTF) environment setup tools for OWASP Juice Shop
Stars: ✭ 238 (-81.23%)
Mutual labels:  hacking, pentesting, ctf
Awesome Nodejs Security
Awesome Node.js Security resources
Stars: ✭ 1,294 (+2.05%)
Mutual labels:  infosec, vulnerabilities, web-security
Swap digger
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (-72.08%)
Mutual labels:  hacking, forensics, post-exploitation
Ctf Writeups Public
Writeups for infosec Capture the Flag events by team Galaxians
Stars: ✭ 331 (-73.9%)
Mutual labels:  hacking, infosec, ctf
Awesome Web Hacking
A list of web application security
Stars: ✭ 3,760 (+196.53%)
Mutual labels:  hacking, vulnerabilities, web-security
Gtfonow
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: ✭ 68 (-94.64%)
Mutual labels:  pentesting, ctf, post-exploitation
Juice Shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+394.48%)
Mutual labels:  hacking, pentesting, ctf
Red Teaming Toolkit
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Stars: ✭ 5,615 (+342.82%)
Mutual labels:  hacking, pentesting, infosec
Sifter
Sifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (-68.22%)
Mutual labels:  network, pentesting, post-exploitation
Osint tips
OSINT
Stars: ✭ 322 (-74.61%)
Mutual labels:  network, hacking, pentesting
Pentestkit
Useful tools and scripts during Penetration Testing engagements
Stars: ✭ 463 (-63.49%)
Mutual labels:  network, hacking, pentesting
Covertutils
A framework for Backdoor development!
Stars: ✭ 424 (-66.56%)
Passphrase Wordlist
Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (-56.15%)
Mutual labels:  hacking, pentesting, infosec
Reverseapk
Quickly analyze and reverse engineer Android packages
Stars: ✭ 419 (-66.96%)
Injuredandroid
A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
Stars: ✭ 317 (-75%)
Mutual labels:  pentesting, ctf, vulnerabilities
Awesome Privilege Escalation
A curated list of awesome privilege escalation
Stars: ✭ 413 (-67.43%)
Mutual labels:  hacking, pentesting, ctf
Name That Hash
🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 3000+ other hashes ☄ Comes with a neat web app 🔥
Stars: ✭ 540 (-57.41%)
Mutual labels:  hacking, infosec, ctf
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+471.45%)
Mutual labels:  hacking, pentesting, infosec
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (-39.75%)
Mutual labels:  hacking, pentesting
Pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+431.31%)
Mutual labels:  pentesting, post-exploitation
1-60 of 2942 similar projects