DNSExplorerBash script that automates the enumeration of domains and DNS servers in the active information gathering.
Stars: ✭ 33 (-69.16%)
LscriptThe LAZY script will make your life easier, and of course faster.
Stars: ✭ 3,056 (+2756.07%)
oscp-omnibusA collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (-57.01%)
DnsmorphDomain name permutation engine written in Go
Stars: ✭ 148 (+38.32%)
Babysploit👶 BabySploit Beginner Pentesting Toolkit/Framework Written in Python 🐍
Stars: ✭ 883 (+725.23%)
EastExploits and Security Tools Framework 2.0.1
Stars: ✭ 283 (+164.49%)
GtfonowAutomatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: ✭ 68 (-36.45%)
xmlrpc-bruteforcerAn XMLRPC brute forcer targeting Wordpress written in Python 3. (DISCONTINUED)
Stars: ✭ 62 (-42.06%)
Pwncatpwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
Stars: ✭ 904 (+744.86%)
PasshuntPasshunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
Stars: ✭ 961 (+798.13%)
Stowaway👻Stowaway -- Multi-hop Proxy Tool for pentesters
Stars: ✭ 500 (+367.29%)
KnaryA simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams & Pushover support
Stars: ✭ 187 (+74.77%)
Fudgec2FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (+78.5%)
Gtfobins.github.ioGTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+5535.51%)
RaccoonA high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+2060.75%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+7144.86%)
PakuriPenetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (+16.82%)
Msploitego Pentesting suite for Maltego based on data in a Metasploit database
Stars: ✭ 124 (+15.89%)
TrigmapA wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (+23.36%)
VhostscanA virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+616.82%)
sqlscanQuick SQL Scanner, Dorker, Webshell injector PHP
Stars: ✭ 140 (+30.84%)
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+342.99%)
Awesome OscpA curated list of awesome OSCP resources
Stars: ✭ 804 (+651.4%)
Eyes👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?" 🔍 🕵️
Stars: ✭ 38 (-64.49%)
FuxiPenetration Testing Platform
Stars: ✭ 1,103 (+930.84%)
OseeCollection of resources for my preparation to take the OSEE certification.
Stars: ✭ 98 (-8.41%)
Imscripta collection of small and standalone utilities for image processing, written in C
Stars: ✭ 86 (-19.63%)
Ssh Connect🐙 simple ssh manager based on bash/zsh history
Stars: ✭ 86 (-19.63%)
Gitzonegit-based zone management tool for static and dynamic domains
Stars: ✭ 100 (-6.54%)
VsauditVOIP Security Audit Framework
Stars: ✭ 97 (-9.35%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+1085.05%)
SidedoorSSH connection daemon for Debian/Raspbian/Ubuntu/etc
Stars: ✭ 97 (-9.35%)
Gvccicolor extraction to turn images into 16 color palettes
Stars: ✭ 86 (-19.63%)
CoviseCollaborative Visualization and Simulation Environment, OpenCOVER and OddLOT
Stars: ✭ 101 (-5.61%)
Iap DesktopIAP Desktop is a Windows application that provides zero-trust Remote Desktop and SSH access to Linux and Windows VMs on Google Cloud.
Stars: ✭ 96 (-10.28%)
Zynix Fusionzynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
Stars: ✭ 84 (-21.5%)
Xnotifyread notifications from stdin and pop them up on the screen
Stars: ✭ 97 (-9.35%)
TomahawkA simple ssh wrapper to execute commands into many hosts.
Stars: ✭ 83 (-22.43%)
Gitjacker🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (+1067.29%)
Security ScriptsA collection of public offensive and defensive security related scripts for InfoSec students.
Stars: ✭ 101 (-5.61%)
Docker Tunnela (simple) dockerized ssh tunnel
Stars: ✭ 96 (-10.28%)
Monday⚡️ A dev tool for microservice developers to run local applications and/or forward others from/to Kubernetes SSH or TCP
Stars: ✭ 1,246 (+1064.49%)
Jjg Ansible Windows[DEPRECATED] Windows shell provisioning script to bootstrap Ansible from within a Vagrant VM.
Stars: ✭ 82 (-23.36%)
Win PortfwdPowershell script to setup windows port forwarding using native netsh client
Stars: ✭ 95 (-11.21%)
Beef Over WanBrowser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-23.36%)
Dnsubdnsub一款好用的子域名扫描工具
Stars: ✭ 106 (-0.93%)
MinishellAs beautiful as a shell
Stars: ✭ 105 (-1.87%)
KeyeKeye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-5.61%)
Mssqli DuetSQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing
Stars: ✭ 82 (-23.36%)
HoundsploitAn advanced graphical search engine for Exploit-DB
Stars: ✭ 81 (-24.3%)
ParamgmtA parallel SSH-based remote machine management system
Stars: ✭ 80 (-25.23%)
VenomVenom - A Multi-hop Proxy for Penetration Testers
Stars: ✭ 1,228 (+1047.66%)
Awa SshPurely functional SSH library in ocaml.
Stars: ✭ 80 (-25.23%)
Groovy SshSSH automation tool based on Groovy DSL
Stars: ✭ 100 (-6.54%)
BadpodsA collection of manifests that will create pods with elevated privileges.
Stars: ✭ 93 (-13.08%)
Alfred SshSSH workflow for Alfred for Mac with powerful hostname expansion/completion
Stars: ✭ 78 (-27.1%)
StegextractDetect hidden files and text in images
Stars: ✭ 79 (-26.17%)