JsshellJSshell - JavaScript reverse/remote shell
Stars: ✭ 167 (-55.59%)
exploitsExploits developed by me.
Stars: ✭ 35 (-90.69%)
AboutsecurityA list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-55.85%)
Offensive DockerOffensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-12.77%)
Ip AttackAuto IP or Domain Attack Tool ( #1 )
Stars: ✭ 162 (-56.91%)
dependency-check-pluginJenkins plugin for OWASP Dependency-Check. Inspects project components for known vulnerabilities (e.g. CVEs).
Stars: ✭ 107 (-71.54%)
AsnlookupLeverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-56.65%)
Ictf FrameworkThe iCTF Framework, presented by Shellphish!
Stars: ✭ 281 (-25.27%)
browser-exploitationA collection of curated resources and CVEs I use for research.
Stars: ✭ 71 (-81.12%)
Hacking ToolSocial media & camera hacking & whatsapp virus & SMS bombing
Stars: ✭ 157 (-58.24%)
Rustscan🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+1287.77%)
T14m4tAutomated brute-forcing attack tool.
Stars: ✭ 160 (-57.45%)
HardentheworldHarden the world is a community driven project to develop hardening guidelines and checklists for common software and devices.
Stars: ✭ 158 (-57.98%)
Kickthemout💤 Kick devices off your network by performing an ARP Spoof attack.
Stars: ✭ 2,005 (+433.24%)
Bot18Bot18 is a high-frequency cryptocurrency trading bot developed by Zenbot creator @carlos8f
Stars: ✭ 157 (-58.24%)
Di.we.hRepositório com conteúdo sobre web hacking em português
Stars: ✭ 156 (-58.51%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (-77.66%)
Termux OsAll in One Termux Os..!! (New)
Stars: ✭ 150 (-60.11%)
Vps个人笔记汇总
Stars: ✭ 276 (-26.6%)
JalescJust Another Linux Enumeration Script: A Bash script for locally enumerating a compromised Linux box
Stars: ✭ 152 (-59.57%)
RC-exploiterNOT SUPORTED ANYMORE -- try resource_files repository (mosquito)
Stars: ✭ 50 (-86.7%)
KubeiKubei is a flexible Kubernetes runtime scanner, scanning images of worker and Kubernetes nodes providing accurate vulnerabilities assessment, for more information checkout:
Stars: ✭ 353 (-6.12%)
AdbsploitA python based tool for exploiting and managing Android devices via ADB
Stars: ✭ 147 (-60.9%)
PhpvulnAudit tool to find common vulnerabilities in PHP source code
Stars: ✭ 146 (-61.17%)
CloudscraperCloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.
Stars: ✭ 276 (-26.6%)
ochrona-cliA command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs
Stars: ✭ 46 (-87.77%)
Burpsuite XkeysA Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.
Stars: ✭ 144 (-61.7%)
Posta🐙 Cross-document messaging security research tool powered by https://enso.security
Stars: ✭ 143 (-61.97%)
trolotrolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-88.03%)
Pentest WikiPENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.
Stars: ✭ 2,668 (+609.57%)
PhishapiComprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (-27.66%)
QuiverQuiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-62.77%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (+59.84%)
WpreconWPrecon (WordPress Recon), is a vulnerability recognition tool in CMS Wordpress, developed in Go and with scripts in Lua.
Stars: ✭ 135 (-64.1%)
W5Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (-2.39%)
OpenvehiclediagA rust based cross-platform ECU diagnostics and car hacking application, utilizing the passthru protocol
Stars: ✭ 135 (-64.1%)
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-93.88%)
ProcspyPython tool that monitors and logs user-run commands on a Linux system for either offensive or defensive purposes..
Stars: ✭ 272 (-27.66%)
IntelspyPerform automated network reconnaissance scans
Stars: ✭ 134 (-64.36%)
allsafeIntentionally vulnerable Android application.
Stars: ✭ 135 (-64.1%)
Dark Fantasy Hack ToolDDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file system of websites.. Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities.) Web Spider: For gathering web application hacking information. Email scraper: To get all emails related to a webpage IMDB Rating: Easy way to access the movie database. Both .exe(compressed as zip) and .py versions are available in files.
Stars: ✭ 131 (-65.16%)
AirgeddonThis is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (+918.62%)
WssatWEB SERVICE SECURITY ASSESSMENT TOOL
Stars: ✭ 360 (-4.26%)
ExploitsA handy collection of my public exploits, all in one place.
Stars: ✭ 342 (-9.04%)
QuackQuack Toolkit is a set of tools to provide denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools.
Stars: ✭ 305 (-18.88%)
phdctf-2017PHDays Online CTF 2017. Developed with ♥ by Hackerdom team
Stars: ✭ 22 (-94.15%)
NetelfRun executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.
Stars: ✭ 220 (-41.49%)
BuildapksReally quickly build APKs on handheld device (smartphone or tablet) in Amazon, Android, Chromebook and Windows📲 See https://buildapks.github.io/docsBuildAPKs/setup to start building APKs.
Stars: ✭ 218 (-42.02%)
exploitJust some exploits :P
Stars: ✭ 38 (-89.89%)
Goat🐐 GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server
Stars: ✭ 218 (-42.02%)