Poet[unmaintained] Post-exploitation tool
Stars: ✭ 184 (-57.31%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+1698.61%)
BlackmambaC2/post-exploitation framework
Stars: ✭ 544 (+26.22%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (-6.5%)
BifrostBifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-91.42%)
GetaltnameExtract subdomains from SSL certificates in HTTPS sites.
Stars: ✭ 320 (-25.75%)
GdogA fully featured Windows backdoor that uses Gmail as a C&C server
Stars: ✭ 399 (-7.42%)
Pentest LabPentest Lab on OpenStack with Heat, Chef provisioning and Docker
Stars: ✭ 353 (-18.1%)
LazyreconAn automated approach to performing recon for bug bounty hunting and penetration testing.
Stars: ✭ 282 (-34.57%)
PivotsuiteNetwork Pivoting Toolkit
Stars: ✭ 329 (-23.67%)
Awesome Windows Red Team A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams
Stars: ✭ 308 (-28.54%)
MerlinMerlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Stars: ✭ 3,522 (+717.17%)
Objection📱 objection - runtime mobile exploration
Stars: ✭ 4,404 (+921.81%)
WhatwebNext generation web scanner
Stars: ✭ 3,503 (+712.76%)
PwndocPentest Report Generator
Stars: ✭ 417 (-3.25%)
GocaGoca Scanner
Stars: ✭ 281 (-34.8%)
Cve 2019 07083389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)
Stars: ✭ 350 (-18.79%)
BlacknetFree advanced and modern Windows botnet with a nice and secure PHP panel.
Stars: ✭ 271 (-37.12%)
SubscraperSubdomain enumeration through various techniques
Stars: ✭ 265 (-38.52%)
Ss7maperSS7 MAP (pen-)testing toolkit. DISCONTINUED REPO, please use: https://github.com/0xc0decafe/ss7MAPer/
Stars: ✭ 394 (-8.58%)
OrcOrc is a post-exploitation framework for Linux written in Bash
Stars: ✭ 349 (-19.03%)
DorknetSelenium powered Python script to automate searching for vulnerable web apps.
Stars: ✭ 256 (-40.6%)
Offensive DockerOffensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-23.9%)
Slackor A Golang implant that uses Slack as a command and control server
Stars: ✭ 392 (-9.05%)
KaboomA tool to automate penetration tests
Stars: ✭ 322 (-25.29%)
IoxTool for port forwarding & intranet proxy
Stars: ✭ 411 (-4.64%)
Findom XssA fast DOM based XSS vulnerability scanner with simplicity.
Stars: ✭ 310 (-28.07%)
K8toolsK8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Stars: ✭ 4,173 (+868.21%)
Emp3r0rlinux post-exploitation framework made by linux user
Stars: ✭ 419 (-2.78%)
CcatCloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Stars: ✭ 300 (-30.39%)
Windows Post ExploitationWindows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (-31.32%)
GosintOSINT Swiss Army Knife
Stars: ✭ 401 (-6.96%)
PywerviewA (partial) Python rewriting of PowerSploit's PowerView
Stars: ✭ 292 (-32.25%)
Swap digger swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (-17.87%)
CovertutilsA framework for Backdoor development!
Stars: ✭ 424 (-1.62%)
MimipenguinA tool to dump the login password from the current linux user
Stars: ✭ 3,151 (+631.09%)
Dnsbrutea fast domain brute tool
Stars: ✭ 352 (-18.33%)
CloudbunnyCloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search engines to search domain information: Shodan, Censys and Zoomeye.
Stars: ✭ 273 (-36.66%)
Mr.sipSIP-Based Audit and Attack Tool
Stars: ✭ 266 (-38.28%)
Enum4linux NgA next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for security professionals and CTF players.
Stars: ✭ 349 (-19.03%)
OverlordOverlord - Red Teaming Infrastructure Automation
Stars: ✭ 258 (-40.14%)
ToratToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Stars: ✭ 415 (-3.71%)
Suid3numA standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)
Stars: ✭ 342 (-20.65%)
Project BlackPentest/BugBounty progress control with scanning modules
Stars: ✭ 257 (-40.37%)
tomcter😹 Tomcter is a python tool developed to bruteforce Apache Tomcat manager login with Apache Tomcat default credentials.
Stars: ✭ 18 (-95.82%)
PyckA collection of useful Python hacking scripts for beginners
Stars: ✭ 334 (-22.51%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-85.85%)
gtfoSearch for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (-79.58%)
Black Hat RustApplied offensive security with Rust - Early access - https://academy.kerkour.com/black-hat-rust?coupon=GITHUB
Stars: ✭ 331 (-23.2%)
Wahh extrasThe Web Application Hacker's Handbook - Extra Content
Stars: ✭ 428 (-0.7%)