CameradarCameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+1028.05%)
HrshellHRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (-21.54%)
SmartrenameA Windows Shell Extension for more advanced bulk renaming using search and replace or regular expressions
Stars: ✭ 190 (-22.76%)
PayloadsGit All the Payloads! A collection of web attack payloads.
Stars: ✭ 2,862 (+1063.41%)
GetjsA tool to fastly get all javascript sources/files
Stars: ✭ 190 (-22.76%)
TwitterxKeeping Twitter for macOS alive with code injection
Stars: ✭ 187 (-23.98%)
Secbox🖤 网络安全与渗透测试工具导航
Stars: ✭ 222 (-9.76%)
HackercouchHospitality for Hackers
Stars: ✭ 185 (-24.8%)
BrutedumBruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack
Stars: ✭ 212 (-13.82%)
Awesome Shodan Queries🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
Stars: ✭ 2,758 (+1021.14%)
HatchHatch is a brute force tool that is used to brute force most websites
Stars: ✭ 242 (-1.63%)
ApicheckThe DevSecOps toolset for REST APIs
Stars: ✭ 184 (-25.2%)
Tool XTool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install almost 370+ hacking tools in termux app and other linux based distributions.
Stars: ✭ 3,361 (+1266.26%)
Re2dfaTransform regular expressions into finite state machines and output Go source code. This repository has migrated to https://gitlab.com/opennota/re2dfa
Stars: ✭ 182 (-26.02%)
Cl PpcreCommon Lisp regular expression library
Stars: ✭ 224 (-8.94%)
Hack ToolsThe all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+1017.89%)
PandwarfPandwaRF: RF analysis tool with a sub-1 GHz wireless transceiver controlled by a smartphone or
Stars: ✭ 206 (-16.26%)
Docker WafAn NGINX and ModSecurity based Web Application Firewall for Docker
Stars: ✭ 181 (-26.42%)
TangalangaTangalanga: the Zoom conference scanner hacking tool
Stars: ✭ 236 (-4.07%)
Facebook CrackerFacebook Cracker Version 1.0 can crack into Facebook Database 100% without Interruption By Facebook Firewall
Stars: ✭ 171 (-30.49%)
SitedorksSearch Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term with a default set of websites, bug bounty programs or a custom collection.
Stars: ✭ 221 (-10.16%)
MemjectSimple Dll injector loading from memory. Supports PE header and entry point erasure. Written in C99.
Stars: ✭ 176 (-28.46%)
WhatcmsCMS Detection and Exploit Kit based on Whatcms.org API
Stars: ✭ 205 (-16.67%)
HacktricksWelcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Stars: ✭ 3,741 (+1420.73%)
CaesarAn HTTP based RAT (Remote Administration Tool) that allows you to remotely control devices from your browser
Stars: ✭ 240 (-2.44%)
RaccoonA high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+839.84%)
Effective ShellText, samples and website for my 'Effective Shell' series.
Stars: ✭ 204 (-17.07%)
Remote Desktop CachingThis tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: ✭ 171 (-30.49%)
RoninRonin is a Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of code, Exploits or Payloads, Scanners, etc, via Repositories.
Stars: ✭ 220 (-10.57%)
MobilehackersweaponsMobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 170 (-30.89%)
Evil SsdpSpoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.
Stars: ✭ 204 (-17.07%)
Cehv10 Notes📕 Both personal and public notes for EC-Council's CEHv10 312-50, because its thousands of pages/slides of boredom, and a braindump to many
Stars: ✭ 170 (-30.89%)
BugbountyscannerA Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.
Stars: ✭ 229 (-6.91%)
BbreconPython library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-31.3%)
Pine🌲 Aimbot powered by real-time object detection with neural networks, GPU accelerated with Nvidia. Optimized for use with CS:GO.
Stars: ✭ 202 (-17.89%)
Dymerge🔓 A dynamic dictionary merger for successful dictionary based attacks.
Stars: ✭ 167 (-32.11%)
Wafw00fWAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.
Stars: ✭ 2,983 (+1112.6%)
AboutsecurityA list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-32.52%)
HawkeyeHawkeye filesystem analysis tool
Stars: ✭ 202 (-17.89%)
Ip AttackAuto IP or Domain Attack Tool ( #1 )
Stars: ✭ 162 (-34.15%)
Juice Shop CtfCapture-the-Flag (CTF) environment setup tools for OWASP Juice Shop
Stars: ✭ 238 (-3.25%)
AsnlookupLeverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-33.74%)
Mad MetasploitMetasploit custom modules, plugins, resource script and.. awesome metasploit collection
Stars: ✭ 200 (-18.7%)
NetelfRun executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.
Stars: ✭ 220 (-10.57%)
MinesweeperA Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-34.15%)
Ethical HackingThis repository contains reference material & links for people willing to learn Ethical Hacking
Stars: ✭ 160 (-34.96%)
RubyfuRubyfu, where Ruby goes evil!
Stars: ✭ 228 (-7.32%)
UniversalropSmall tool for generating ropchains using unicorn and z3
Stars: ✭ 196 (-20.33%)
TrackerjackerLike nmap for mapping wifi networks you're not connected to, plus device tracking
Stars: ✭ 2,307 (+837.8%)
ThechoiceThe linux choice collection tools
Stars: ✭ 245 (-0.41%)
Icg AutoexploiterbotWordpress 🔥 Joomla 🔥 Drupal 🔥 OsCommerce 🔥 Prestashop 🔥 Opencart 🔥
Stars: ✭ 242 (-1.63%)
RatpoisonLatest Ver: 1.7; Default Menu Key is F1; Charlatano's Successor; dn
Stars: ✭ 239 (-2.85%)
DccwbypassuacWindows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".
Stars: ✭ 227 (-7.72%)