Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (+104.05%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (+132.95%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-32.95%)
Yotteryotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage
Stars: ✭ 118 (-31.79%)
JwtxploiterA tool to test security of json web token
Stars: ✭ 130 (-24.86%)
ArachniWeb Application Security Scanner Framework
Stars: ✭ 2,942 (+1600.58%)
Reconky-Automated Bash ScriptReconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (-3.47%)
Git HoundReconnaissance tool for GitHub code search. Finds exposed API keys using pattern matching, commit history searching, and a unique result scoring system.
Stars: ✭ 602 (+247.98%)
HabuHacking Toolkit
Stars: ✭ 635 (+267.05%)
SqliscannerAutomatic SQL injection with Charles and sqlmap api
Stars: ✭ 674 (+289.6%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+319.08%)
DirsearchWeb path scanner
Stars: ✭ 7,246 (+4088.44%)
BrakemanA static analysis security vulnerability scanner for Ruby on Rails applications
Stars: ✭ 6,281 (+3530.64%)
default-http-login-hunterLogin hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.
Stars: ✭ 285 (+64.74%)
InterlaceEasily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+339.31%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+341.62%)
OssaOpen-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (+360.12%)
Sn0intSemi-automatic OSINT framework and package manager
Stars: ✭ 814 (+370.52%)
V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+389.6%)
Zap CliA simple tool for interacting with OWASP ZAP from the commandline.
Stars: ✭ 166 (-4.05%)
ChangemeA default credential scanner.
Stars: ✭ 928 (+436.42%)
SudomySudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 859 (+396.53%)
Babysploit👶 BabySploit Beginner Pentesting Toolkit/Framework Written in Python 🐍
Stars: ✭ 883 (+410.4%)
Social AnalyzerAPI, CLI & Web App for analyzing & finding a person's profile across +1000 social media \ websites (Detections are updated regularly by automated systems)
Stars: ✭ 8,449 (+4783.82%)
Eyes👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?" 🔍 🕵️
Stars: ✭ 38 (-78.03%)
WhourTool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.
Stars: ✭ 18 (-89.6%)
BroxyAn HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (+427.17%)
Intrigue CoreDiscover Your Attack Surface!
Stars: ✭ 1,013 (+485.55%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+483.24%)
BrokenlinkhijackerA Fast Broken Link Hijacker Tool written in Python
Stars: ✭ 45 (-73.99%)
DnsbruteDNS Sub-domain brute forcer, in Python + gevent
Stars: ✭ 40 (-76.88%)
Github ReconGitHub Recon — and what you can achieve with it!
Stars: ✭ 47 (-72.83%)
HydrafwHydraFW official firmware for HydraBus/HydraNFC for researcher, hackers, students, embedded software developers or anyone interested in debugging/hacking/developing/penetration testing
Stars: ✭ 165 (-4.62%)
NebulousadNebulousAD automated credential auditing tool.
Stars: ✭ 158 (-8.67%)
Pythempentest framework
Stars: ✭ 1,060 (+512.72%)
FierceA DNS reconnaissance tool for locating non-contiguous IP space.
Stars: ✭ 1,072 (+519.65%)
Recon RavenReconnaissance tool of Penetration test & Bug Bounty
Stars: ✭ 18 (-89.6%)
ReconftwreconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+463.01%)
HoperSecurity tool to trace URL's jumps across the rel links to obtain the last URL
Stars: ✭ 50 (-71.1%)
ShellshockhunterIt's a simple tool for test vulnerability shellshock
Stars: ✭ 52 (-69.94%)
JaelesThe Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+520.23%)
Fhe Toolkit LinuxIBM Fully Homomorphic Encryption Toolkit For Linux. This toolkit is a Linux based Docker container that demonstrates computing on encrypted data without decrypting it! The toolkit ships with two demos including a fully encrypted Machine Learning inference with a Neural Network and a Privacy-Preserving key-value search.
Stars: ✭ 1,123 (+549.13%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+556.65%)
VulmapVulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+523.7%)
DnsbinThe request.bin of DNS request
Stars: ✭ 157 (-9.25%)
Osint Tools👀 Some of my favorite OSINT tools.
Stars: ✭ 155 (-10.4%)
PurifyAll-in-one tool for managing vulnerability reports from AppSec pipelines
Stars: ✭ 72 (-58.38%)
Audit scriptsScripts to gather system configuration information for offline/remote auditing
Stars: ✭ 55 (-68.21%)
Gscan本程序旨在为安全应急响应人员对Linux主机排查时提供便利,实现主机侧Checklist的自动全面化检测,根据检测结果自动数据聚合,进行黑客攻击路径溯源。
Stars: ✭ 1,177 (+580.35%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-58.38%)
DirsearchA Go implementation of dirsearch.
Stars: ✭ 164 (-5.2%)
Webhackersweapons⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 1,205 (+596.53%)
Web exploit detectorThe Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
Stars: ✭ 81 (-53.18%)