Sqlivmassive SQL injection vulnerability scanner
Stars: ✭ 840 (+280.09%)
Google LibphonenumberThe up-to-date and reliable Google's libphonenumber package for node.js.
Stars: ✭ 984 (+345.25%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+348.87%)
Adb ToolkitADB-Toolkit V2 for easy ADB tricks with many perks in all one. ENJOY!
Stars: ✭ 217 (-1.81%)
Cfw2ofw HelperProviding aid in converting video games.
Stars: ✭ 44 (-80.09%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+356.56%)
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-76.92%)
Pythempentest framework
Stars: ✭ 1,060 (+379.64%)
ShellshockhunterIt's a simple tool for test vulnerability shellshock
Stars: ✭ 52 (-76.47%)
WhitehatInformation about my experiences on ethical hacking 💀
Stars: ✭ 54 (-75.57%)
JaelesThe Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+385.52%)
Sane Scan PdfSane command-line scan-to-pdf script on Linux with OCR and deskew support
Stars: ✭ 58 (-73.76%)
Jsql InjectionjSQL Injection is a Java application for automatic SQL database injection.
Stars: ✭ 891 (+303.17%)
Project TauroA Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-76.47%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+414.03%)
XshockXSHOCK Shellshock Exploit
Stars: ✭ 65 (-70.59%)
BlackwormBlack Worm Offical Repo
Stars: ✭ 80 (-63.8%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-67.42%)
Webhackersweapons⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 1,205 (+445.25%)
Beef Over WanBrowser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-62.9%)
Bscanan asynchronous target enumeration tool
Stars: ✭ 207 (-6.33%)
Zbn安全编排与自动化响应平台
Stars: ✭ 201 (-9.05%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+4628.96%)
Chaos🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Stars: ✭ 1,168 (+428.51%)
CloudfailUtilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
Stars: ✭ 1,239 (+460.63%)
Instabruteforcehacking-tool termux-tools termux noob-friendly instagram-bot bruteforce-password-cracker wordlist-technique
Stars: ✭ 86 (-61.09%)
T LoadNew Interface And Loading Screen For Termux Users
Stars: ✭ 207 (-6.33%)
Ecommerce Website Security ChecklistList of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built into the Techinical Specific Document, or will be checked in the Security testing phases.
Stars: ✭ 98 (-55.66%)
Collection DocumentCollection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+527.6%)
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-56.11%)
SocialpwnedSocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and Twitter to find possible credentials leaks in PwnDB.
Stars: ✭ 104 (-52.94%)
Mitmap📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+590.5%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+3407.69%)
PillagerPillage filesystems for sensitive information with Go.
Stars: ✭ 64 (-71.04%)
Linsetmv1 2Linset is a WPA/WPA2 phishing tool (evil twin)
Stars: ✭ 105 (-52.49%)
Yotteryotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage
Stars: ✭ 118 (-46.61%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-47.51%)
EviltwinframeworkA framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities
Stars: ✭ 122 (-44.8%)
PidrilaPython Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (-43.44%)
Flux Keylogger🔖 Modern Javascript keylogger with web panel
Stars: ✭ 122 (-44.8%)
BluescanA powerful Bluetooth scanner
Stars: ✭ 206 (-6.79%)
Asufacebook hacking toolkit
Stars: ✭ 197 (-10.86%)
Dark Fantasy Hack ToolDDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file system of websites.. Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities.) Web Spider: For gathering web application hacking information. Email scraper: To get all emails related to a webpage IMDB Rating: Easy way to access the movie database. Both .exe(compressed as zip) and .py versions are available in files.
Stars: ✭ 131 (-40.72%)
Mini phoneA fast phone number lib for Ruby (binds to Google's C++ libphonenumber)
Stars: ✭ 131 (-40.72%)
Cr3dov3rKnow the dangers of credential reuse attacks.
Stars: ✭ 1,700 (+669.23%)
GofingerprintGoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fingerprints.
Stars: ✭ 120 (-45.7%)
H8mailEmail OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (+878.73%)
Ladon大型内网渗透扫描器&Cobalt Strike,Ladon8.9内置120个模块,包含信息收集/存活主机/端口扫描/服务识别/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010/SMBGhost/Weblogic/ActiveMQ/Tomcat/Struts2,密码口令爆破(Mysql/Oracle/MSSQL)/FTP/SSH(Linux)/VNC/Windows(IPC/WMI/SMB/Netbios/LDAP/SmbHash/WmiHash/Winrm),远程执行命令(smbexec/wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0
Stars: ✭ 2,911 (+1217.19%)
AutosetupAuto setup is a bash script compatible with Debian based distributions to install and setup necessary programs.
Stars: ✭ 140 (-36.65%)
QuiverQuiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-36.65%)
UnimapScan only once by IP address and reduce scan times with Nmap for large amounts of data.
Stars: ✭ 141 (-36.2%)
Ntlmscanscan for NTLM directories
Stars: ✭ 141 (-36.2%)
Device Detector JsA precise user agent parser and device detector written in TypeScript
Stars: ✭ 193 (-12.67%)
NetpwnTool made to automate tasks of pentesting.
Stars: ✭ 152 (-31.22%)