GithacktoolsThe best Hacking and PenTesting tools installer on the world
Stars: ✭ 78 (-93.85%)
ArchstrikeAn Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (-68.38%)
HellraiserVulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (-67.43%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (-67.43%)
PwndocPentest Report Generator
Stars: ✭ 417 (-67.11%)
PwndraA collection of pwn/CTF related utilities for Ghidra
Stars: ✭ 417 (-67.11%)
PrismaticaResponsive Command and Control System
Stars: ✭ 81 (-93.61%)
Dref DNS Rebinding Exploitation Framework
Stars: ✭ 423 (-66.64%)
BrutesploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (-66.56%)
EhtoolsWi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: ✭ 422 (-66.72%)
MetabigorIntelligence tool but without API key
Stars: ✭ 424 (-66.56%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (-66.32%)
Dradis CeDradis Framework: Colllaboration and reporting for IT Security teams
Stars: ✭ 443 (-65.06%)
FfufFast web fuzzer written in Go
Stars: ✭ 5,687 (+348.5%)
HyperpwnA hyper plugin to provide a flexible GDB GUI with the help of GEF, pwndbg or peda
Stars: ✭ 387 (-69.48%)
GoohakAutomatically Launch Google Hacking Queries Against A Target Domain
Stars: ✭ 432 (-65.93%)
NetcatNetCat for Windows
Stars: ✭ 463 (-63.49%)
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (-6.31%)
VenomVenom - A Multi-hop Proxy for Penetration Testers
Stars: ✭ 1,228 (-3.15%)
Stowaway👻Stowaway -- Multi-hop Proxy Tool for pentesters
Stars: ✭ 500 (-60.57%)
Linkedin2usernameOSINT Tool: Generate username lists for companies on LinkedIn
Stars: ✭ 504 (-60.25%)
DawsAdvanced Web Shell
Stars: ✭ 551 (-56.55%)
PyexfilA Python Package for Data Exfiltration
Stars: ✭ 554 (-56.31%)
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (-62.62%)
SubjackSubdomain Takeover tool written in Go
Stars: ✭ 1,194 (-5.84%)
NishangNishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: ✭ 5,943 (+368.69%)
Gitjacker🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (-1.5%)
DvwaDamn Vulnerable Web Application (DVWA)
Stars: ✭ 5,727 (+351.66%)
FavfreakMaking Favicon.ico based Recon Great again !
Stars: ✭ 564 (-55.52%)
NetzobNetzob: Protocol Reverse Engineering, Modeling and Fuzzing
Stars: ✭ 584 (-53.94%)
HabuHacking Toolkit
Stars: ✭ 635 (-49.92%)
Ios Debug Hacks🎯 Advanced debugging skills used in the iOS project development process, involves the dynamic debugging, static analysis and decompile of third-party libraries. iOS 项目开发过程中用到的高级调试技巧,涉及三方库动态调试、静态分析和反编译等领域
Stars: ✭ 595 (-53.08%)
Powershell RatPython based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (-49.84%)
Jok3rJok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (-49.13%)
TextractorExtracts text from video games and visual novels. Highly extensible.
Stars: ✭ 656 (-48.26%)
PigA Linux packet crafting tool.
Stars: ✭ 384 (-69.72%)
Search That Hash🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (-63.25%)
Platypus🔨 A modern multiple reverse shell sessions manager wrote in go
Stars: ✭ 559 (-55.91%)
Security whitepapersCollection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQLi
Stars: ✭ 644 (-49.21%)
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+442.74%)
GorsairGorsair hacks its way into remote docker containers that expose their APIs
Stars: ✭ 678 (-46.53%)
SpoilerwallSpoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!
Stars: ✭ 754 (-40.54%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (-42.82%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (-39.75%)
PupyPupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+431.31%)
Fsocietyfsociety Hacking Tools Pack – A Penetration Testing Framework
Stars: ✭ 7,224 (+469.72%)
V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (-33.2%)
HackingtoolALL IN ONE Hacking Tool For Hackers
Stars: ✭ 7,521 (+493.14%)
PrivescA collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (-38.01%)
Riceteacatpandarepo with challenge material for riceteacatpanda (2020)
Stars: ✭ 18 (-98.58%)
Slideswon't maintain
Stars: ✭ 79 (-93.77%)
Drv3 Tools(Not actively maintained, use DRV3-Sharp) Tools for extracting and re-injecting files for Danganronpa V3 for PC.
Stars: ✭ 13 (-98.97%)
StegextractDetect hidden files and text in images
Stars: ✭ 79 (-93.77%)