All Projects → Quiver → Similar Projects or Alternatives

1803 Open source projects that are alternatives of or similar to Quiver

Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+205%)
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+5075.71%)
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+30%)
Webkiller
Tool Information Gathering Write By Python.
Stars: ✭ 300 (+114.29%)
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+2402.14%)
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+6315%)
Mutual labels:  kali-linux, hacking, pentesting, bugbounty
Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 859 (+513.57%)
Mutual labels:  kali-linux, pentesting, kali, bugbounty
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-55.71%)
Free Security Ebooks
Free Security and Hacking eBooks
Stars: ✭ 3,132 (+2137.14%)
Oscp Prep
my oscp prep collection
Stars: ✭ 105 (-25%)
Cheatsheet God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+2415%)
wifi-deauther
A fully automatic wifi deauther coded in Python
Stars: ✭ 25 (-82.14%)
Mutual labels:  pentesting, kali-linux, kali
Cloudbrute
Awesome cloud enumerator
Stars: ✭ 268 (+91.43%)
Mutual labels:  hacking, pentesting, bugbounty
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+894.29%)
Ethical Hacking Tools
Complete Listing and Usage of Tools used for Ethical Hacking
Stars: ✭ 272 (+94.29%)
Mutual labels:  kali-linux, hacking, kali
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+172.86%)
Infosec reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+2872.86%)
Learn Web Hacking
Study Notes For Web Hacking / Web安全学习笔记
Stars: ✭ 2,326 (+1561.43%)
Penetration Testing Study Notes
Penetration Testing notes, resources and scripts
Stars: ✭ 461 (+229.29%)
Chimera
Chimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (+230.71%)
Mutual labels:  kali-linux, penetration-testing, kali
Archstrike
An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (+186.43%)
Pentestkit
Useful tools and scripts during Penetration Testing engagements
Stars: ✭ 463 (+230.71%)
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+238.57%)
Mitmap
📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+990%)
Mutual labels:  kali-linux, hacking, pentesting
Habu
Hacking Toolkit
Stars: ✭ 635 (+353.57%)
Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-17.14%)
YAPS
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-75%)
Webspoilt
This script will you help to find the information about the website and to help in penetrating testing
Stars: ✭ 34 (-75.71%)
Mutual labels:  penetration-testing, kali-linux, kali
Hacking Security Ebooks
Top 100 Hacking & Security E-Books (Free Download)
Stars: ✭ 3,232 (+2208.57%)
KaliIntelligenceSuite
Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standard penetration testing tools. The collected data is internally stored in a structured manner to allow the fast identification and visualisation of the collected information.
Stars: ✭ 58 (-58.57%)
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+1277.14%)
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+2322.14%)
Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 1,572 (+1022.86%)
Mutual labels:  bugbounty, kali-linux, kali
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+383.57%)
Badkarma
network reconnaissance toolkit
Stars: ✭ 353 (+152.14%)
Offensive Docker
Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (+134.29%)
Mutual labels:  hacking, pentesting, bugbounty
Nmap
Idiomatic nmap library for go developers
Stars: ✭ 391 (+179.29%)
Osint tips
OSINT
Stars: ✭ 322 (+130%)
Mutual labels:  hacking, pentesting, bugbounty
Security whitepapers
Collection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQLi
Stars: ✭ 644 (+360%)
Mutual labels:  hacking, pentesting, bugbounty
Interlace
Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+442.86%)
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+445.71%)
Ehtools
Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: ✭ 422 (+201.43%)
Mutual labels:  kali-linux, hacking, pentesting
Lscript
The LAZY script will make your life easier, and of course faster.
Stars: ✭ 3,056 (+2082.86%)
Passphrase Wordlist
Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (+297.14%)
Redcloud
Automated Red Team Infrastructure deployement using Docker
Stars: ✭ 551 (+293.57%)
Mutual labels:  hacking, kali, bugbounty
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+354.29%)
Payloadsallthethings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+23406.43%)
Phishing Frenzy
Ruby on Rails Phishing Framework
Stars: ✭ 643 (+359.29%)
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+447.86%)
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+263.57%)
Mutual labels:  hacking, pentesting, bugbounty
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+521.43%)
Babysploit
👶 BabySploit Beginner Pentesting Toolkit/Framework Written in Python 🐍
Stars: ✭ 883 (+530.71%)
Mutual labels:  pentesting, penetration-testing, kali
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+1202.86%)
Pidrila
Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (-10.71%)
Awesome Mobile Security
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+1212.14%)
Mutual labels:  hacking, pentesting, bugbounty
Cameradar
Cameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+1882.14%)
Armor
Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
Stars: ✭ 228 (+62.86%)
Mutual labels:  kali-linux, penetration-testing, kali
Linkedin2username
OSINT Tool: Generate username lists for companies on LinkedIn
Stars: ✭ 504 (+260%)
Privesc
A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+461.43%)
Mutual labels:  hacking, pentesting, bugbounty
Gitjacker
🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (+792.14%)
1-60 of 1803 similar projects