Babysploit👶 BabySploit Beginner Pentesting Toolkit/Framework Written in Python 🐍
Stars: ✭ 883 (-70.38%)
Scanlessonline port scan scraper
Stars: ✭ 875 (-70.65%)
O365reconretrieve information via O365 with a valid cred
Stars: ✭ 204 (-93.16%)
DeathstarUses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive TTPs.
Stars: ✭ 1,221 (-59.04%)
SudomySudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 859 (-71.18%)
Opunit🕵️♂️ Sanity checking containers, vms, and servers
Stars: ✭ 176 (-94.1%)
V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (-71.59%)
Gitlab WatchmanMonitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (-95.74%)
Mobileapp Pentest CheatsheetThe Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
Stars: ✭ 3,051 (+2.35%)
CommoncrawlparserSimple multi threaded tool to extract domain related data from commoncrawl.org
Stars: ✭ 25 (-99.16%)
BackstageBackstage is an open platform for building developer portals
Stars: ✭ 14,296 (+379.57%)
Clia lightweight, security focused, BDD test framework against terraform.
Stars: ✭ 918 (-69.2%)
HacktricksWelcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Stars: ✭ 3,741 (+25.49%)
FinalreconThe Last Web Recon Tool You'll Need
Stars: ✭ 888 (-70.21%)
GtfoblookupOffline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io) and LOLBAS (https://github.com/LOLBAS-Project/LOLBAS)
Stars: ✭ 123 (-95.87%)
GetjsA tool to fastly get all javascript sources/files
Stars: ✭ 190 (-93.63%)
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (-95.17%)
Decoder Plus PlusAn extensible application for penetration testers and software developers to decode/encode data into various formats.
Stars: ✭ 79 (-97.35%)
Ciphey⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Stars: ✭ 9,116 (+205.8%)
MitogenDistributed self-replicating programs in Python
Stars: ✭ 1,779 (-40.32%)
Sn0intSemi-automatic OSINT framework and package manager
Stars: ✭ 814 (-72.69%)
EvabsAn open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security beginners.
Stars: ✭ 173 (-94.2%)
SprayingtoolkitScripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
Stars: ✭ 802 (-73.1%)
GontrollerGo library to create resilient feedback loop/control controllers.
Stars: ✭ 121 (-95.94%)
Pi Pwnbox RogueapHomemade Pwnbox 🚀 / Rogue AP 📡 based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap 💡
Stars: ✭ 798 (-73.23%)
CatalystAccelerated deep learning R&D
Stars: ✭ 2,804 (-5.94%)
PrivescA collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (-73.63%)
Horn3tPowerful Visual Subdomain Enumeration at the Click of a Mouse
Stars: ✭ 120 (-95.97%)
RaccoonA high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (-22.44%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (-74.37%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (-34.62%)
SpoilerwallSpoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!
Stars: ✭ 754 (-74.71%)
LyraOpen Source Workflow Engine for Cloud Native Infrastructure
Stars: ✭ 203 (-93.19%)
Ansible Best PractisesA project structure that outlines some best practises of how to use ansible
Stars: ✭ 735 (-75.34%)
PaastaAn open, distributed platform as a service
Stars: ✭ 1,569 (-47.37%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (-75.68%)
VividusVividus is all in one test automation tool
Stars: ✭ 170 (-94.3%)
Linuxprivcheckerlinuxprivchecker.py -- a Linux Privilege Escalation Check Script
Stars: ✭ 715 (-76.01%)
KyuaTesting framework for infrastructure software
Stars: ✭ 117 (-96.08%)
Juice Shop CtfCapture-the-Flag (CTF) environment setup tools for OWASP Juice Shop
Stars: ✭ 238 (-92.02%)
Scilla🏴☠️ Information Gathering tool 🏴☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-96.11%)
Lockdoor Framework🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (-77.29%)
Attiny85RubberDucky like payloads for DigiSpark Attiny85
Stars: ✭ 169 (-94.33%)
DirsearchWeb path scanner
Stars: ✭ 7,246 (+143.07%)
ExploHuman and machine readable web vulnerability testing format
Stars: ✭ 114 (-96.18%)
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+130.86%)
Temporal☄️ Temporal is an easy-to-use, enterprise-grade interface into distributed and decentralized storage
Stars: ✭ 202 (-93.22%)
Ldap searchPython3 script to perform LDAP queries and enumerate users, groups, and computers from Windows Domains. Ldap_Search can also perform brute force/password spraying to identify valid accounts via LDAP.
Stars: ✭ 78 (-97.38%)
GithacktoolsThe best Hacking and PenTesting tools installer on the world
Stars: ✭ 78 (-97.38%)
HelmA native Scala client for interacting with Consul
Stars: ✭ 76 (-97.45%)
Capsulecorp PentestVagrant VirtualBox environment for conducting an internal network penetration test
Stars: ✭ 214 (-92.82%)
WebmapA Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generation during a Web Penetration Testing
Stars: ✭ 188 (-93.69%)
Burpsuite XkeysA Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.
Stars: ✭ 144 (-95.17%)
RsfThe Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
Stars: ✭ 76 (-97.45%)
SubjackSubdomain Takeover tool written in Go
Stars: ✭ 1,194 (-59.95%)