DomainkerBugBounty Tool
Stars: ✭ 40 (+122.22%)
Adb ToolkitADB-Toolkit V2 for easy ADB tricks with many perks in all one. ENJOY!
Stars: ✭ 217 (+1105.56%)
TheharvesterE-mails, subdomains and names Harvester - OSINT
Stars: ✭ 6,175 (+34205.56%)
PycurityPython Security Scripts
Stars: ✭ 218 (+1111.11%)
trjExecute any command in other's computer using a trojan horse coded and compiled in C. Just for educational purpose.
Stars: ✭ 21 (+16.67%)
T LoadNew Interface And Loading Screen For Termux Users
Stars: ✭ 207 (+1050%)
MaskphishGive a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
Stars: ✭ 370 (+1955.56%)
SILVERDUMPA wrapping script to query the default password list maintained by cirn.net... << Thank them.
Stars: ✭ 24 (+33.33%)
OneShotRun WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant
Stars: ✭ 223 (+1138.89%)
BlackbirdSubdomain Enumeration and Scanner
Stars: ✭ 16 (-11.11%)
JackhammerJackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
Stars: ✭ 633 (+3416.67%)
WitnessmeWeb Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to make life easier.
Stars: ✭ 436 (+2322.22%)
UnChainA tool to find redirection chains in multiple URLs
Stars: ✭ 77 (+327.78%)
spicescriptA Handy-Dandy Personal Toolkit for Enumeration and a headstart on attacking a machine!
Stars: ✭ 20 (+11.11%)
Awesome Hacking ListsProject transferred to: https://github.com/taielab/awesome-hacking-lists
Stars: ✭ 203 (+1027.78%)
MaryamMaryam: Open-source Intelligence(OSINT) Framework
Stars: ✭ 371 (+1961.11%)
MouseMouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (+933.33%)
Sherlock🔎 Hunt down social media accounts by username across social networks
Stars: ✭ 28,569 (+158616.67%)
InfectCreate you virus in termux!
Stars: ✭ 33 (+83.33%)
ChromepassChromepass - Hacking Chrome Saved Passwords
Stars: ✭ 364 (+1922.22%)
Free-ProxyHi there will be a lot of proxies here.
Stars: ✭ 135 (+650%)
KeyLyA powerfull and awesome Keylogger(Your keyboard and your mouse) realy helpfull for hackers! :-P (C/C++)
Stars: ✭ 17 (-5.56%)
T14m4tAutomated brute-forcing attack tool.
Stars: ✭ 160 (+788.89%)
AttacksurfacemapperAttackSurfaceMapper is a tool that aims to automate the reconnaissance process.
Stars: ✭ 702 (+3800%)
Wifi PassviewAn open source batch script based WiFi Passview for Windows!
Stars: ✭ 157 (+772.22%)
sudohulktry privilege escalation changing sudo command
Stars: ✭ 114 (+533.33%)
NetpwnTool made to automate tasks of pentesting.
Stars: ✭ 152 (+744.44%)
PatrowlmanagerPatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (+1916.67%)
M WizInstall Metasploit And Repair Metasploit In Termux With Easy Steps
Stars: ✭ 148 (+722.22%)
PhirauteeA proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
Stars: ✭ 96 (+433.33%)
ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (+688.89%)
BigbountyreconBigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+2905.56%)
Wifi HackingCyber Security Tool For Hacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2/TKIP/IES)
Stars: ✭ 138 (+666.67%)
VirusX5The Most Powerful Fake Page Redirecting tool...
Stars: ✭ 15 (-16.67%)
Hack-UtilsScript to facilitate different functions and checks
Stars: ✭ 27 (+50%)
mqttinfoAttempts to determine the configuration, behavior, and type of a remote MQTT broker
Stars: ✭ 17 (-5.56%)
Cr3dov3rKnow the dangers of credential reuse attacks.
Stars: ✭ 1,700 (+9344.44%)
awesome-pentest-toolsList of Security Archives Tools and software, generally for facilitate security & penetration research. Opening it up to everyone will facilitate a knowledge transfer. Hopefully the initial set will grow and expand.
Stars: ✭ 34 (+88.89%)
GmailBruterV2Simple tool written in python3 to perform limited brute-force attacks on gmail accounts.
Stars: ✭ 264 (+1366.67%)
ShonyDanzaA customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (+377.78%)
hunter🐺 Command-line application and golang client library for hunter.io
Stars: ✭ 28 (+55.56%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (+600%)
fluxionWiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)
Stars: ✭ 115 (+538.89%)
GofingerprintGoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fingerprints.
Stars: ✭ 120 (+566.67%)
Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (+1861.11%)
recceDomain availbility checker
Stars: ✭ 30 (+66.67%)
ElpscrkA Common User Passwords generator script that looks like the tool Eliot used it in Mr.Robot Series Episode 01 :D :v
Stars: ✭ 113 (+527.78%)
Saint👁 (s)AINT is a Spyware Generator for Windows systems written in Java. [Discontinued]
Stars: ✭ 522 (+2800%)
urlRecon📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (+72.22%)
FreeFire-PhishingFree Fire Phishing Tool ID Hack Tool For Online Hacking
Stars: ✭ 140 (+677.78%)
pyhtoolsA Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester credential harvester, keylogger, download&execute, ransomware, data harvestors, etc.
Stars: ✭ 166 (+822.22%)
docker-wallarm-node⚡️ Docker official image for Wallarm Node. API security platform agent.
Stars: ✭ 18 (+0%)
dirbpyThis is the new version of dirb in python
Stars: ✭ 36 (+100%)
BrutusA Python-powered exploitation framework and botnet.
Stars: ✭ 17 (-5.56%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+42966.67%)
InterlaceEasily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+4122.22%)
KeyloggerGet Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+3255.56%)