Xssor2XSS'OR - Hack with JavaScript.
Stars: ✭ 1,969 (+970.11%)
Hacker ContainerContainer with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-42.93%)
Awesome VulnerableA curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.
Stars: ✭ 133 (-27.72%)
KeyeKeye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-45.11%)
TechnowloggerTechNowLogger is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info
Stars: ✭ 172 (-6.52%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+959.24%)
GirshAutomatically spawn a reverse shell fully interactive for Linux or Windows victim
Stars: ✭ 66 (-64.13%)
TrigmapA wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (-28.26%)
SsrfmapAutomatic SSRF fuzzer and exploitation tool
Stars: ✭ 1,344 (+630.43%)
PortiaPortia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
Stars: ✭ 154 (-16.3%)
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-47.28%)
OscprepoA list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and reading material in 'BookmarkList' CherryTree. Reconscan Py2 and Py3. Custom ISO building.
Stars: ✭ 1,916 (+941.3%)
FeroxbusterA fast, simple, recursive content discovery tool written in Rust.
Stars: ✭ 1,314 (+614.13%)
Intrec PackIntelligence and Reconnaissance Package/Bundle installer.
Stars: ✭ 177 (-3.8%)
DeautherdroidAdditional android app for SpaceHunn's ESP8266 DeAuther.
Stars: ✭ 93 (-49.46%)
Pentest GuidePenetration tests guide based on OWASP including test cases, resources and examples.
Stars: ✭ 1,316 (+615.22%)
HookishHooks in to interesting functions and helps reverse the web app faster.
Stars: ✭ 129 (-29.89%)
ClientWindows, OS X and linux RAT client
Stars: ✭ 89 (-51.63%)
ZombieantZombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
Stars: ✭ 169 (-8.15%)
React Native KontaktioReact Native (iOS and Android) library for Kontakt.io beacons (and all other beacons)
Stars: ✭ 87 (-52.72%)
Mass RatBasic Multiplatform Remote Administration Tool - Xamarin
Stars: ✭ 127 (-30.98%)
StitchPython Remote Administration Tool (RAT)
Stars: ✭ 2,018 (+996.74%)
Atomic Red Team Intelligence C2ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (-52.72%)
SilenttrinityAn asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Stars: ✭ 1,767 (+860.33%)
Bof RegsaveDumping SAM / SECURITY / SYSTEM registry hives with a Beacon Object File
Stars: ✭ 85 (-53.8%)
UmbrellaA Phishing Dropper designed to Pentest.
Stars: ✭ 180 (-2.17%)
Teleshadow3Telegram Desktop Session Stealer
Stars: ✭ 83 (-54.89%)
C2hackC2Hack, sharing tips and tricks for pentesters
Stars: ✭ 124 (-32.61%)
SpacecowWindows Rootkit written in Python
Stars: ✭ 81 (-55.98%)
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (-21.74%)
Nac bypassScript collection to bypass Network Access Control (NAC, 802.1x)
Stars: ✭ 79 (-57.07%)
PurplecloudAn Infrastructure as Code (IaC) deployment of a small Active Directory pentest lab in the cloud. The deployment simulates a semi-realistic corporate enterprise Active Directory with a DC and endpoints. Purple team goals include blue team detection capabilities and R&D for detection engineering new approaches.
Stars: ✭ 122 (-33.7%)
AboutsecurityA list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-9.78%)
RatCompose shell commands to build interactive terminal applications
Stars: ✭ 1,158 (+529.35%)
RatelRAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-34.24%)
Cloudflair🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.
Stars: ✭ 1,176 (+539.13%)
Ntlmscanscan for NTLM directories
Stars: ✭ 141 (-23.37%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (+530.43%)
Shodan DorksDorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (-35.87%)
GtfonowAutomatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: ✭ 68 (-63.04%)
HerakeyloggerChrome Keylogger Extension | Post Exploitation Tool
Stars: ✭ 138 (-25%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-36.96%)
Beacon broadcastA Flutter plugin for turning your device into a beacon.
Stars: ✭ 66 (-64.13%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+517.39%)
Green Hat SuiteGreen-hat-suite is a tool to generate meterpreter/shell which could evade antivirus.
Stars: ✭ 112 (-39.13%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+515.22%)
Google ratA Remote Access Tool using Google Apps Script as the proxy for command and control.
Stars: ✭ 64 (-65.22%)
NetwormPython network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-26.63%)
BellaBella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻
Stars: ✭ 112 (-39.13%)
TinkerershellA simple python reverse shell written just for fun.
Stars: ✭ 62 (-66.3%)
Outisoutis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) and platforms (like Powershell).
Stars: ✭ 111 (-39.67%)
TeleratTelegram RAT written in Python
Stars: ✭ 56 (-69.57%)
Blazerat🔥 Control your Linux home computer with telegram bot.
Stars: ✭ 60 (-67.39%)