NetwormPython network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-89.35%)
GoaltdnsA permutation generation tool written in golang
Stars: ✭ 119 (-90.62%)
V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (-33.2%)
MettaAn information security preparedness tool to do adversarial simulation.
Stars: ✭ 867 (-31.62%)
Bot18Bot18 is a high-frequency cryptocurrency trading bot developed by Zenbot creator @carlos8f
Stars: ✭ 157 (-87.62%)
UrlcrazyGenerate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (-88.17%)
AntidebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (-87.3%)
JalescJust Another Linux Enumeration Script: A Bash script for locally enumerating a compromised Linux box
Stars: ✭ 152 (-88.01%)
Attiny85RubberDucky like payloads for DigiSpark Attiny85
Stars: ✭ 169 (-86.67%)
BbreconPython library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-86.67%)
RaccoonA high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+82.33%)
Riceteacatpandarepo with challenge material for riceteacatpanda (2020)
Stars: ✭ 18 (-98.58%)
Kubernetes GoatKubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
Stars: ✭ 868 (-31.55%)
Drv3 Tools(Not actively maintained, use DRV3-Sharp) Tools for extracting and re-injecting files for Danganronpa V3 for PC.
Stars: ✭ 13 (-98.97%)
WebmapA Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generation during a Web Penetration Testing
Stars: ✭ 188 (-85.17%)
PxenumA shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-97.63%)
Reverse EngineeringThis repository contains some of the executables that I've cracked.
Stars: ✭ 29 (-97.71%)
Project TauroA Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-95.9%)
Hack ToolsThe all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+116.88%)
IkyOSINT Project
Stars: ✭ 203 (-83.99%)
FfufFast web fuzzer written in Go
Stars: ✭ 5,687 (+348.5%)
Badusb botnet👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-97.48%)
Fsocietyfsociety Hacking Tools Pack – A Penetration Testing Framework
Stars: ✭ 7,224 (+469.72%)
SnoopSnoop — инструмент разведки на основе открытых данных (OSINT world)
Stars: ✭ 886 (-30.13%)
WhatpulseWhatPulse reverse engineered
Stars: ✭ 30 (-97.63%)
Zynix Fusionzynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
Stars: ✭ 84 (-93.38%)
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-95.98%)
BabasslA Brisk and Better Assured Cryptographic Toolkit
Stars: ✭ 68 (-94.64%)
OscpMy OSCP journey
Stars: ✭ 50 (-96.06%)
Waf A MoleA guided mutation-based fuzzer for ML-based Web Application Firewalls
Stars: ✭ 51 (-95.98%)
PlasoSuper timeline all the things
Stars: ✭ 1,055 (-16.8%)
Gurvygurvy implements Elliptic Curve Cryptography (+Pairing) for BLS12-381, BLS12-377, BW6-761, and BN256. Originally developed (and used) by gnark
Stars: ✭ 66 (-94.79%)
OpensvpOpensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.
Stars: ✭ 50 (-96.06%)
OpenmoonstoneOpen source reimplementation of Moonstone: A Hard Day's Knight
Stars: ✭ 50 (-96.06%)
PillagerPillage filesystems for sensitive information with Go.
Stars: ✭ 64 (-94.95%)
CognicryptCogniCrypt is an Eclipse plugin that supports Java developers in using Java Cryptographic APIs.
Stars: ✭ 50 (-96.06%)
V2ray CoreA platform for building proxies to bypass network restrictions.
Stars: ✭ 13,438 (+959.78%)
SsrfmapSimple Server Side Request Forgery services enumeration tool.
Stars: ✭ 50 (-96.06%)
HomeboxA Toolbox for Home Local Networks
Stars: ✭ 78 (-93.85%)
Crypto BenchBenchmarks for crypto libraries (in Rust, or with Rust bindings)
Stars: ✭ 67 (-94.72%)
PnetHigh level Java network library
Stars: ✭ 49 (-96.14%)
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (-1.18%)
ThemisEasy to use cryptographic framework for data protection: secure messaging with forward secrecy and secure data storage. Has unified APIs across 14 platforms.
Stars: ✭ 1,232 (-2.84%)
YsfYSF Server Functions
Stars: ✭ 77 (-93.93%)
CtfCTF Field Guide
Stars: ✭ 1,145 (-9.7%)
WslreverseExperiments with hidden COM interface and LxBus IPC mechanism in WSL
Stars: ✭ 47 (-96.29%)
Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (-94.72%)
MilkyA .NET Standard library for pentesting web apps against credential stuffing attacks.
Stars: ✭ 49 (-96.14%)
DockerscanDocker security analysis & hacking tools
Stars: ✭ 1,046 (-17.51%)
PokepinballDisassembly of Pokémon Pinball
Stars: ✭ 77 (-93.93%)
RedasmThe OpenSource Disassembler
Stars: ✭ 1,042 (-17.82%)