LeakscraperLeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to help penetration testers and redteamers doing OSINT by gathering credentials belonging to their target.
Stars: ✭ 227 (-92.39%)
SlurpEvaluate the security of S3 buckets
Stars: ✭ 183 (-93.86%)
DartDART is a test documentation tool created by the Lockheed Martin Red Team to document and report on penetration tests, especially in isolated network environments.
Stars: ✭ 207 (-93.06%)
Pulumi AwsAn Amazon Web Services (AWS) Pulumi resource package, providing multi-language access to AWS
Stars: ✭ 169 (-94.33%)
RenginereNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+15.36%)
FoggManage Infrastructure as Code with less pain.
Stars: ✭ 181 (-93.93%)
LnkupGenerates malicious LNK file payloads for data exfiltration
Stars: ✭ 205 (-93.12%)
CameradarCameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (-6.91%)
O365reconretrieve information via O365 with a valid cred
Stars: ✭ 204 (-93.16%)
Opunit🕵️♂️ Sanity checking containers, vms, and servers
Stars: ✭ 176 (-94.1%)
Mobileapp Pentest CheatsheetThe Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
Stars: ✭ 3,051 (+2.35%)
HacktricksWelcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Stars: ✭ 3,741 (+25.49%)
EvabsAn open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security beginners.
Stars: ✭ 173 (-94.2%)
CatalystAccelerated deep learning R&D
Stars: ✭ 2,804 (-5.94%)
RaccoonA high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (-22.44%)
LyraOpen Source Workflow Engine for Cloud Native Infrastructure
Stars: ✭ 203 (-93.19%)
VividusVividus is all in one test automation tool
Stars: ✭ 170 (-94.3%)
Juice Shop CtfCapture-the-Flag (CTF) environment setup tools for OWASP Juice Shop
Stars: ✭ 238 (-92.02%)
Attiny85RubberDucky like payloads for DigiSpark Attiny85
Stars: ✭ 169 (-94.33%)
Temporal☄️ Temporal is an easy-to-use, enterprise-grade interface into distributed and decentralized storage
Stars: ✭ 202 (-93.22%)
AndroticklerPenetration testing and auditing toolkit for Android apps.
Stars: ✭ 225 (-92.45%)
HawkeyeHawkeye filesystem analysis tool
Stars: ✭ 202 (-93.22%)
Foremanan application that automates the lifecycle of servers
Stars: ✭ 2,102 (-29.49%)
EnumdbRelational database brute force and post exploitation tool for MySQL and MSSQL
Stars: ✭ 167 (-94.4%)
DiscoverCustom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Stars: ✭ 2,548 (-14.53%)
Zap CliA simple tool for interacting with OWASP ZAP from the commandline.
Stars: ✭ 166 (-94.43%)
Cc.pyExtracting URLs of a specific target based on the results of "commoncrawl.org"
Stars: ✭ 250 (-91.61%)
AboutsecurityA list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-94.43%)
Awesome DigitaloceanA curated list of amazingly awesome DigitalOcean resources inspired by Awesome Sysadmin
Stars: ✭ 236 (-92.08%)
RogueAn extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.
Stars: ✭ 225 (-92.45%)
PspyMonitor linux processes without root permissions
Stars: ✭ 2,470 (-17.14%)
CovenantCovenant is a collaborative .NET C2 framework for red teamers.
Stars: ✭ 2,747 (-7.85%)
PasscatPasswords Recovery Tool
Stars: ✭ 164 (-94.5%)
ZerodoorA script written lazily for generating cross-platform backdoors on the go :)
Stars: ✭ 163 (-94.53%)
ShellabLinux and Windows shellcode enrichment utility
Stars: ✭ 225 (-92.45%)
FdsploitFile Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (-93.32%)
PycatPython network tool, similar to Netcat with custom features.
Stars: ✭ 162 (-94.57%)
CoreThe safe post-production pipeline - https://getavalon.github.io/2.0
Stars: ✭ 162 (-94.57%)
DeploykitA toolkit for creating and managing declarative, self-healing infrastructure.
Stars: ✭ 2,237 (-24.96%)
Invoke ApexA PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
Stars: ✭ 162 (-94.57%)
AutospottingSaves up to 90% of AWS EC2 costs by automating the use of spot instances on existing AutoScaling groups. Installs in minutes using CloudFormation or Terraform. Convenient to deploy at scale using StackSets. Uses tagging to avoid launch configuration changes. Automated spot termination handling. Reliable fallback to on-demand instances.
Stars: ✭ 2,014 (-32.44%)
CommixAutomated All-in-One OS Command Injection Exploitation Tool.
Stars: ✭ 3,016 (+1.17%)
AaiaAWS Identity and Access Management Visualizer and Anomaly Finder
Stars: ✭ 218 (-92.69%)
BetterbackdoorA backdoor with a multitude of features.
Stars: ✭ 195 (-93.46%)
TerribleAn Ansible playbook that apply the principle of the Infrastructure as Code on a QEMU/KVM environment.
Stars: ✭ 161 (-94.6%)
MosintAn automated e-mail OSINT tool
Stars: ✭ 184 (-93.83%)
Infra AnsibleTooling / Ansible to support the many aspects of infrastructure installation, setup and configuration.
Stars: ✭ 158 (-94.7%)
Iot PtA Virtual environment for Pentesting IoT Devices
Stars: ✭ 218 (-92.69%)
Satelliteeasy-to-use payload hosting
Stars: ✭ 193 (-93.53%)
Slack WatchmanMonitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (-94.67%)
Git ScannerA tool for bug hunting or pentesting for targeting websites that have open .git repositories available in public
Stars: ✭ 157 (-94.73%)
Firecrack🔥 Firecrack pentest tools: Facebook hacking random attack, deface, admin finder, bing dorking:
Stars: ✭ 157 (-94.73%)