All Projects → Poc → Similar Projects or Alternatives

789 Open source projects that are alternatives of or similar to Poc

Awesome Web Hacking
A list of web application security
Stars: ✭ 3,760 (+900%)
Mutual labels:  hacking, vulnerabilities, metasploit
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+1.6%)
Mutual labels:  hacking, metasploit
Hrshell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (-48.67%)
Mutual labels:  hacking, metasploit
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+9.84%)
Mutual labels:  hacking, vulnerabilities
Redcloud
Automated Red Team Infrastructure deployement using Docker
Stars: ✭ 551 (+46.54%)
Mutual labels:  hacking, metasploit
Hackapk
An Advanced Tool For Complete Apk-Modding In Termux ...
Stars: ✭ 180 (-52.13%)
Mutual labels:  hacking, metasploit
Arissploit
Arissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (-69.68%)
Mutual labels:  vulnerabilities, exploits
Pakuri
Penetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (-66.76%)
Mutual labels:  vulnerabilities, metasploit
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+237.23%)
Mutual labels:  hacking, vulnerabilities
Jaeles
The Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+185.37%)
Mutual labels:  hacking, vulnerabilities
Tools
Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+257.18%)
Mutual labels:  hacking, exploits
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+1961.7%)
Mutual labels:  hacking, vulnerabilities
Privesc
A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+109.04%)
Mutual labels:  hacking, exploits
Hacktheworld
An Python Script For Generating Payloads that Bypasses All Antivirus so far .
Stars: ✭ 527 (+40.16%)
Mutual labels:  hacking, metasploit
Msf Venom Cheatsheet
Single Page Cheatsheet for common MSF Venom One Liners
Stars: ✭ 81 (-78.46%)
Mutual labels:  hacking, metasploit
Hacker ezines
A collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-80.85%)
Mutual labels:  vulnerabilities, exploits
Patrowlhears
PatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-76.33%)
Mutual labels:  vulnerabilities, exploits
Eqgrp
Decrypted content of eqgrp-auction-file.tar.xz
Stars: ✭ 3,743 (+895.48%)
Mutual labels:  hacking, exploits
Findsploit
Find exploits in local and online databases instantly
Stars: ✭ 1,160 (+208.51%)
Mutual labels:  exploits, metasploit
V3n0m Scanner
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+125.27%)
Mutual labels:  hacking, metasploit
Reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+159.04%)
Mutual labels:  hacking, vulnerabilities
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+234.84%)
Mutual labels:  hacking, metasploit
Fail2ban.webexploits
This custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (-82.18%)
Mutual labels:  hacking, exploits
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-50.53%)
Mutual labels:  hacking, metasploit
Hack Tools
The all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+631.38%)
Mutual labels:  hacking, metasploit
Mad Metasploit
Metasploit custom modules, plugins, resource script and.. awesome metasploit collection
Stars: ✭ 200 (-46.81%)
Mutual labels:  hacking, metasploit
Entropy
Entropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-66.49%)
Mutual labels:  hacking, metasploit
Xeexe Topantivirusevasion
Undetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (+2.93%)
Mutual labels:  hacking, metasploit
Spellbook
Micro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-85.9%)
Mutual labels:  hacking, exploits
0days In The Wild
Repository for information about 0-days exploited in-the-wild.
Stars: ✭ 149 (-60.37%)
Mutual labels:  vulnerabilities, exploits
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+2679.52%)
Mutual labels:  hacking, exploits
Exploits
Miscellaneous exploit code
Stars: ✭ 1,157 (+207.71%)
Mutual labels:  hacking, exploits
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-62.23%)
Mutual labels:  hacking, metasploit
Securityexploits
This repo has been migrated to https://github.com/github/security-lab/tree/master/SecurityExploits
Stars: ✭ 239 (-36.44%)
Mutual labels:  vulnerabilities, exploits
Ethical Hacking Tools
Complete Listing and Usage of Tools used for Ethical Hacking
Stars: ✭ 272 (-27.66%)
Mutual labels:  hacking, metasploit
Kernelpop
kernel privilege escalation enumeration and exploitation framework
Stars: ✭ 628 (+67.02%)
Mutual labels:  vulnerabilities, exploits
Poc Exploits
Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.
Stars: ✭ 111 (-70.48%)
Mutual labels:  vulnerabilities, exploits
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+26.06%)
Mutual labels:  hacking, exploits
Docker Vulnerable Dvwa
Damn Vulnerable Web Application Docker container
Stars: ✭ 117 (-68.88%)
Mutual labels:  hacking, vulnerabilities
Zerooo-Exploitation-Framework
异步漏洞利用框架
Stars: ✭ 22 (-94.15%)
Mutual labels:  exploits, vulnerabilities
Android Exploits
A collection of android Exploits and Hacks
Stars: ✭ 290 (-22.87%)
Mutual labels:  hacking, exploits
Ctf
CTF (Capture The Flag) writeups, code snippets, notes, scripts
Stars: ✭ 336 (-10.64%)
Mutual labels:  hacking
Ssrf vulnerable lab
This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Stars: ✭ 361 (-3.99%)
Mutual labels:  hacking
Socialbox Termux
SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By init__0 for termux on android
Stars: ✭ 324 (-13.83%)
Mutual labels:  hacking
Ckss Certified Kubernetes Security Specialist
This repository is a collection of resources to prepare for the Certified Kubernetes Security Specialist (CKSS) exam.
Stars: ✭ 333 (-11.44%)
Mutual labels:  vulnerabilities
Chromepass
Chromepass - Hacking Chrome Saved Passwords
Stars: ✭ 364 (-3.19%)
Mutual labels:  hacking
Technical Whitepapers
Collection of IT whitepapers, presentations, pdfs; hacking, web app security, db, reverse engineering and more; EN/PL.
Stars: ✭ 359 (-4.52%)
Mutual labels:  hacking
Ctf Writeups Public
Writeups for infosec Capture the Flag events by team Galaxians
Stars: ✭ 331 (-11.97%)
Mutual labels:  hacking
Billcipher
Information Gathering tool for a Website or IP address
Stars: ✭ 332 (-11.7%)
Mutual labels:  hacking
Oscp Human Guide
My own OSCP guide
Stars: ✭ 358 (-4.79%)
Mutual labels:  hacking
Dependency Check Sonar Plugin
Integrates Dependency-Check reports into SonarQube
Stars: ✭ 332 (-11.7%)
Mutual labels:  vulnerabilities
Offensive Docker
Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-12.77%)
Mutual labels:  hacking
Rustscan
🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+1287.77%)
Mutual labels:  hacking
Grype
A vulnerability scanner for container images and filesystems
Stars: ✭ 362 (-3.72%)
Mutual labels:  vulnerabilities
Katana
A Python Tool For google Hacking
Stars: ✭ 355 (-5.59%)
Mutual labels:  hacking
Pivotsuite
Network Pivoting Toolkit
Stars: ✭ 329 (-12.5%)
Mutual labels:  hacking
Kubei
Kubei is a flexible Kubernetes runtime scanner, scanning images of worker and Kubernetes nodes providing accurate vulnerabilities assessment, for more information checkout:
Stars: ✭ 353 (-6.12%)
Mutual labels:  vulnerabilities
Langhost
👻 A LAN dropbox chatbot controllable via Telegram
Stars: ✭ 324 (-13.83%)
Mutual labels:  hacking
Osint tips
OSINT
Stars: ✭ 322 (-14.36%)
Mutual labels:  hacking
W5
Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (-2.39%)
Mutual labels:  hacking
1-60 of 789 similar projects