NightingaleIt's a Docker Environment for pentesting which having all the required tool for VAPT.
Stars: ✭ 119 (-15%)
Reconky-Automated Bash ScriptReconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (+19.29%)
MCPToolPentesting tool for Minecraft
Stars: ✭ 73 (-47.86%)
SandmapNmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (+742.86%)
VulWebajuVulWebaju is a platform that automates setting up your pen-testing environment for learning purposes.
Stars: ✭ 53 (-62.14%)
Hacker-Playbook-UtilityA Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerplaybook.com).
Stars: ✭ 27 (-80.71%)
PayloadsPayload Arsenal for Pentration Tester and Bug Bounty Hunters
Stars: ✭ 421 (+200.71%)
Flux Keylogger🔖 Modern Javascript keylogger with web panel
Stars: ✭ 122 (-12.86%)
JalescJust Another Linux Enumeration Script: A Bash script for locally enumerating a compromised Linux box
Stars: ✭ 152 (+8.57%)
Netmap.jsFast browser-based network discovery module
Stars: ✭ 70 (-50%)
aterminal🎉 An oh-my-zsh plugin for show platform versions
Stars: ✭ 31 (-77.86%)
quick-recon.pyDo some quick reconnaissance on a domain-based web-application
Stars: ✭ 13 (-90.71%)
BrutexAutomatically brute force all services running on a target.
Stars: ✭ 974 (+595.71%)
AriaCloudA Docker container for remote penetration testing.
Stars: ✭ 105 (-25%)
BroxyAn HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (+551.43%)
GogitdumperDump exposed HTTP .git fast
Stars: ✭ 27 (-80.71%)
Eyes👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?" 🔍 🕵️
Stars: ✭ 38 (-72.86%)
sub404A python tool to check subdomain takeover vulnerability
Stars: ✭ 205 (+46.43%)
JWTweakDetects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.
Stars: ✭ 85 (-39.29%)
git-prompt.zshA fast, customizable, pure-shell, asynchronous Git prompt for Zsh
Stars: ✭ 139 (-0.71%)
Lyncsmashlocate and attack Lync/Skype for Business
Stars: ✭ 258 (+84.29%)
ranger-autojumpThe combined magic of autojump, ranger and zsh
Stars: ✭ 59 (-57.86%)
ReconnessReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on schedule or events.
Stars: ✭ 131 (-6.43%)
aquatoneA Tool for Domain Flyovers
Stars: ✭ 43 (-69.29%)
DeckerDeclarative penetration testing orchestration framework
Stars: ✭ 263 (+87.86%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+608.57%)
DevilDevil is a tool that is basically made for facebook to Hack target accounts , BruteForce Attack , grab friendlist accounts , yahoo chacker , Facbook Friend information gathering tool , auto likes reactions & much more i hope you enjoy this tool i'm not responsible if you use this tool for any illegal purpose
Stars: ✭ 88 (-37.14%)
CripsIP Tools To quickly get information about IP Address's, Web Pages and DNS records.
Stars: ✭ 272 (+94.29%)
H8mailEmail OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (+1445%)
UptuxLinux privilege escalation checks (systemd, dbus, socket fun, etc)
Stars: ✭ 260 (+85.71%)
AutoenvAutoenv for zsh
Stars: ✭ 131 (-6.43%)
ReconftwreconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+595.71%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-10%)
EzxssezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
Stars: ✭ 1,022 (+630%)
AwsbucketdumpSecurity Tool to Look For Interesting Files in S3 Buckets
Stars: ✭ 1,021 (+629.29%)
OsintgramOsintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Stars: ✭ 312 (+122.86%)
AirgeddonThis is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (+2635.71%)
Langhost👻 A LAN dropbox chatbot controllable via Telegram
Stars: ✭ 324 (+131.43%)
AsnipASN target organization IP range attack surface mapping for reconnaissance, fast and lightweight
Stars: ✭ 126 (-10%)
KeyloggerA simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (+619.29%)
Pentest⛔️ offsec batteries included
Stars: ✭ 1,063 (+659.29%)
BlackratBlackRAT - Java Based Remote Administrator Tool
Stars: ✭ 87 (-37.86%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-37.86%)
Cc.pyExtracting URLs of a specific target based on the results of "commoncrawl.org"
Stars: ✭ 250 (+78.57%)
Burpsuite XkeysA Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.
Stars: ✭ 144 (+2.86%)
JaelesThe Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+666.43%)
Kill RouterFerramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-59.29%)
Kube AliasesKubernetes Aliases and Bash Functions
Stars: ✭ 40 (-71.43%)