FacebookBugFacebook Write-ups, PoC, and exploitation codes:
Stars: ✭ 28 (-97.29%)
WhatwebNext generation web scanner
Stars: ✭ 3,503 (+239.44%)
PasscatPasswords Recovery Tool
Stars: ✭ 164 (-84.11%)
DirbleFast directory scanning and scraping tool
Stars: ✭ 468 (-54.65%)
PycatPython network tool, similar to Netcat with custom features.
Stars: ✭ 162 (-84.3%)
OsmedeusFully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+228.59%)
Linuxprivcheckerlinuxprivchecker.py -- a Linux Privilege Escalation Check Script
Stars: ✭ 715 (-30.72%)
RescopeRescope is a tool geared towards pentesters and bugbounty researchers, that aims to make life easier when defining scopes for Burp Suite and OWASP ZAP.
Stars: ✭ 156 (-84.88%)
JalescJust Another Linux Enumeration Script: A Bash script for locally enumerating a compromised Linux box
Stars: ✭ 152 (-85.27%)
ORtesterOpen Redirect scanner - (out of date)
Stars: ✭ 24 (-97.67%)
vulnerabilitiesList of every possible vulnerabilities in computer security.
Stars: ✭ 14 (-98.64%)
FaradayFaraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit.
Stars: ✭ 3,198 (+209.88%)
Log Requests To SqliteBURP extension to record every HTTP request send via BURP and create an audit trail log of an assessment.
Stars: ✭ 44 (-95.74%)
PerfusionExploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)
Stars: ✭ 272 (-73.64%)
serverHashtopolis - A Hashcat wrapper for distributed hashcracking
Stars: ✭ 954 (-7.56%)
HouseA runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
Stars: ✭ 910 (-11.82%)
Ciphey⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Stars: ✭ 9,116 (+783.33%)
Powershell RatPython based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (-38.37%)
ApkurlgrepExtract endpoints from APK files
Stars: ✭ 405 (-60.76%)
SecurityExplainedSecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to create informational content in multiple formats and share with the community to enable knowledge creation and learning.
Stars: ✭ 301 (-70.83%)
PentestkitUseful tools and scripts during Penetration Testing engagements
Stars: ✭ 463 (-55.14%)
Sqlite LabThis code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is for fun. Just enjoy it \m/
Stars: ✭ 140 (-86.43%)
CripsIP Tools To quickly get information about IP Address's, Web Pages and DNS records.
Stars: ✭ 272 (-73.64%)
CansinaWeb Content Discovery Tool
Stars: ✭ 709 (-31.3%)
EvilosxAn evil RAT (Remote Administration Tool) for macOS / OS X.
Stars: ✭ 1,826 (+76.94%)
SubscraperSubdomain enumeration through various techniques
Stars: ✭ 265 (-74.32%)
XorpassEncoder to bypass WAF filters using XOR operations
Stars: ✭ 134 (-87.02%)
OctopusOpen source pre-operation C2 server based on python and powershell
Stars: ✭ 449 (-56.49%)
Awesome CsirtAwesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (-87.21%)
ArcherysecCentralize Vulnerability Assessment and Management for DevSecOps Team
Stars: ✭ 1,802 (+74.61%)
OverlordOverlord - Red Teaming Infrastructure Automation
Stars: ✭ 258 (-75%)
ReconnessReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on schedule or events.
Stars: ✭ 131 (-87.31%)
juice-shop-ctfCapture-the-Flag (CTF) environment setup tools for OWASP Juice Shop supporting CTFd, FBCTF and RootTheBox
Stars: ✭ 287 (-72.19%)
DorknetSelenium powered Python script to automate searching for vulnerable web apps.
Stars: ✭ 256 (-75.19%)
Cloud BusterA Cloudflare resolver that works
Stars: ✭ 128 (-87.6%)
AutordpwnThe Shadow Attack Framework
Stars: ✭ 688 (-33.33%)
docker-osmedeusDocker image for Osmedeus, a fully automated offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 78 (-92.44%)
Dradis CeDradis Framework: Colllaboration and reporting for IT Security teams
Stars: ✭ 443 (-57.07%)
Aggressor scriptsA collection of useful scripts for Cobalt Strike
Stars: ✭ 126 (-87.79%)
Red-Team-EssentialsThis repo will contain some basic pentest/RT commands.
Stars: ✭ 22 (-97.87%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (-60.95%)
BrutusBotnet targeting Windows machines written entirely in Python & open source security project.
Stars: ✭ 37 (-96.41%)
GtfoblookupOffline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io) and LOLBAS (https://github.com/LOLBAS-Project/LOLBAS)
Stars: ✭ 123 (-88.08%)
tomcter😹 Tomcter is a python tool developed to bruteforce Apache Tomcat manager login with Apache Tomcat default credentials.
Stars: ✭ 18 (-98.26%)
ArchstrikeAn Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (-61.14%)
SimpleKeyloggerSimple Keylogger with smtp to send emails on your account using python works on linux and Windows
Stars: ✭ 32 (-96.9%)
Sn0intSemi-automatic OSINT framework and package manager
Stars: ✭ 814 (-21.12%)
LiteOTPMulti OTP Spam Amp/Paralell threads
Stars: ✭ 50 (-95.16%)
Censys Subdomain Finder⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.
Stars: ✭ 402 (-61.05%)
revshfuzzA tool for fuzzing for ports that allow outgoing connections
Stars: ✭ 18 (-98.26%)
Behold3r👻Behold3r -- 收集指定网站的子域名,并可监控指定网站的子域名更新情况,发送变更报告至指定邮箱
Stars: ✭ 29 (-97.19%)
winallenumThis powershell script has got to run in remote hacked windows host, even for pivoting
Stars: ✭ 13 (-98.74%)
PrintspooferAbusing Impersonation Privileges on Windows 10 and Server 2019
Stars: ✭ 613 (-40.6%)