CameradarCameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+9468.97%)
Oscp Cheat SheetThis is my OSCP cheat sheet made by combining a lot of different resources online with a little bit of tweaking. I used this cheat sheet during my exam (Fri, 13 Sep 2019) and during the labs. I can proudly say it helped me pass so I hope it can help you as well ! Good Luck and Try Harder
Stars: ✭ 216 (+644.83%)
LscriptThe LAZY script will make your life easier, and of course faster.
Stars: ✭ 3,056 (+10437.93%)
CommixAutomated All-in-One OS Command Injection Exploitation Tool.
Stars: ✭ 3,016 (+10300%)
ShellabLinux and Windows shellcode enrichment utility
Stars: ✭ 225 (+675.86%)
avainA Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
Stars: ✭ 56 (+93.1%)
LnkupGenerates malicious LNK file payloads for data exfiltration
Stars: ✭ 205 (+606.9%)
Scout🔭 Lightweight URL fuzzer and spider: Discover a web server's undisclosed files, directories and VHOSTs
Stars: ✭ 241 (+731.03%)
FdsploitFile Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (+586.21%)
SecurityExplainedSecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to create informational content in multiple formats and share with the community to enable knowledge creation and learning.
Stars: ✭ 301 (+937.93%)
LeakscraperLeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to help penetration testers and redteamers doing OSINT by gathering credentials belonging to their target.
Stars: ✭ 227 (+682.76%)
xssmapIntelligent XSS detection tool that uses human techniques for looking for reflected cross-site scripting (XSS) vulnerabilities
Stars: ✭ 107 (+268.97%)
AndroticklerPenetration testing and auditing toolkit for Android apps.
Stars: ✭ 225 (+675.86%)
YAPSYet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (+20.69%)
Iot PtA Virtual environment for Pentesting IoT Devices
Stars: ✭ 218 (+651.72%)
EvilUSBQuick utility to craft executables for pentesting and managing reverse shells
Stars: ✭ 33 (+13.79%)
O365reconretrieve information via O365 with a valid cred
Stars: ✭ 204 (+603.45%)
CTF-WriteupsRepository of my CTF writeups
Stars: ✭ 25 (-13.79%)
Doxboxweb-based OSINT and reconaissance toolkit
Stars: ✭ 202 (+596.55%)
Cc.pyExtracting URLs of a specific target based on the results of "commoncrawl.org"
Stars: ✭ 250 (+762.07%)
Txtoolan easy pentesting tool.
Stars: ✭ 246 (+748.28%)
BetterbackdoorA backdoor with a multitude of features.
Stars: ✭ 195 (+572.41%)
serverHashtopolis - A Hashcat wrapper for distributed hashcracking
Stars: ✭ 954 (+3189.66%)
Juice Shop CtfCapture-the-Flag (CTF) environment setup tools for OWASP Juice Shop
Stars: ✭ 238 (+720.69%)
CVE-2020-0688-ScannerQuick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.
Stars: ✭ 38 (+31.03%)
FrackerPHP function tracker
Stars: ✭ 234 (+706.9%)
juice-shop-ctfCapture-the-Flag (CTF) environment setup tools for OWASP Juice Shop supporting CTFd, FBCTF and RootTheBox
Stars: ✭ 287 (+889.66%)
FilesensorDynamic file detection tool based on crawler 基于爬虫的动态敏感文件探测工具
Stars: ✭ 227 (+682.76%)
Raven-StormRaven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.
Stars: ✭ 235 (+710.34%)
DrozerThe Leading Security Assessment Framework for Android.
Stars: ✭ 2,683 (+9151.72%)
BrutusBotnet targeting Windows machines written entirely in Python & open source security project.
Stars: ✭ 37 (+27.59%)
RogueAn extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.
Stars: ✭ 225 (+675.86%)
Deep-InsideCommand line tool that allows you to explore IoT devices by using Shodan API.
Stars: ✭ 22 (-24.14%)
AaiaAWS Identity and Access Management Visualizer and Anomaly Finder
Stars: ✭ 218 (+651.72%)
SimpleKeyloggerSimple Keylogger with smtp to send emails on your account using python works on linux and Windows
Stars: ✭ 32 (+10.34%)
Darkspiritz🌔 Official Repository for DarkSpiritz Penetration Framework | Written in Python 🐍
Stars: ✭ 219 (+655.17%)
ElliotA pentesting tool inspired by mr robot and derived by zphisher
Stars: ✭ 23 (-20.69%)
Capsulecorp PentestVagrant VirtualBox environment for conducting an internal network penetration test
Stars: ✭ 214 (+637.93%)
KeyfinderKeyfinder🔑 is a tool that let you find keys while surfing the web!
Stars: ✭ 250 (+762.07%)
SharpattackA simple wrapper for C# tools
Stars: ✭ 211 (+627.59%)
quick-recon.pyDo some quick reconnaissance on a domain-based web-application
Stars: ✭ 13 (-55.17%)
DecryptteamviewerEnumerate and decrypt TeamViewer credentials from Windows registry
Stars: ✭ 205 (+606.9%)
InsectsawakeNetwork Vulnerability Scanner
Stars: ✭ 252 (+768.97%)
Evil SsdpSpoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.
Stars: ✭ 204 (+603.45%)
WiFi-ProjectPre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (-24.14%)
WstgThe Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
Stars: ✭ 3,873 (+13255.17%)
RspetRSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Stars: ✭ 251 (+765.52%)
HawkeyeHawkeye filesystem analysis tool
Stars: ✭ 202 (+596.55%)
FacebookBugFacebook Write-ups, PoC, and exploitation codes:
Stars: ✭ 28 (-3.45%)
Mobileapp Pentest CheatsheetThe Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
Stars: ✭ 3,051 (+10420.69%)
offensive-docker-vpsCreate a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.
Stars: ✭ 66 (+127.59%)
SQLbitJust another script for automatize boolean-based blind SQL injections. (Demo)
Stars: ✭ 30 (+3.45%)
vulnerabilitiesList of every possible vulnerabilities in computer security.
Stars: ✭ 14 (-51.72%)
Physmem2profitPhysmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely
Stars: ✭ 244 (+741.38%)