BxssbXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.
Stars: ✭ 331 (-94.11%)
GobusterDirectory/File, DNS and VHost busting tool written in Go
Stars: ✭ 5,356 (-4.61%)
paradoxiaRATParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 583 (-89.62%)
ConfusedTool to check for dependency confusion vulnerabilities in multiple package management systems
Stars: ✭ 314 (-94.41%)
1earnffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (-33.84%)
HellraiserVulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (-92.64%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (-94.89%)
gwdomainssub domain wild card filtering tool
Stars: ✭ 38 (-99.32%)
ReconnoteWeb Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
Stars: ✭ 322 (-94.27%)
MacOS-WPA-PSKPoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.
Stars: ✭ 29 (-99.48%)
RichkwareFramework for building Windows malware, written in C++
Stars: ✭ 315 (-94.39%)
oscp-omnibusA collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (-99.18%)
KaboomA tool to automate penetration tests
Stars: ✭ 322 (-94.27%)
NetcatNetCat for Windows
Stars: ✭ 463 (-91.75%)
massurlA simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau
Stars: ✭ 14 (-99.75%)
InjuredandroidA vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
Stars: ✭ 317 (-94.35%)
Python-KeyloggerPython Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||
Stars: ✭ 55 (-99.02%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+2.64%)
honeykuA Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).
Stars: ✭ 56 (-99%)
XENAXENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ulti…
Stars: ✭ 127 (-97.74%)
Stowaway👻Stowaway -- Multi-hop Proxy Tool for pentesters
Stars: ✭ 500 (-91.1%)
AggressorscriptsAggressor scripts for use with Cobalt Strike 3.0+
Stars: ✭ 501 (-91.08%)
StegcrackerSteganography brute-force utility to uncover hidden data inside files
Stars: ✭ 396 (-92.95%)
CtftoolsPersonal CTF Toolkit
Stars: ✭ 312 (-94.44%)
Sub-DrillA very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Stars: ✭ 70 (-98.75%)
DDTTXDDTTX Tabletop Trainings
Stars: ✭ 22 (-99.61%)
termux-snippetsAn integrated tool and a collection of snippets which helps in the various aspects of the terminal.
Stars: ✭ 28 (-99.5%)
ArgosThis script will automatically set up an OSINT workstation starting from a Ubuntu OS.
Stars: ✭ 73 (-98.7%)
Ghost👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (-94.44%)
adalancheActive Directory ACL Visualizer and Explorer - who's really Domain Admin?
Stars: ✭ 862 (-84.65%)
WebanalyzePort of Wappalyzer (uncovers technologies used on websites) to automate mass scanning.
Stars: ✭ 311 (-94.46%)
AstraAstra is a tool to find URLs and secrets inside a webpage/files
Stars: ✭ 187 (-96.67%)
Top25 ParameterFor basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙
Stars: ✭ 388 (-93.09%)
OctopusOctopus - Network Scan/Infos & Web Scan
Stars: ✭ 25 (-99.55%)
Findom XssA fast DOM based XSS vulnerability scanner with simplicity.
Stars: ✭ 310 (-94.48%)
Saint👁 (s)AINT is a Spyware Generator for Windows systems written in Java. [Discontinued]
Stars: ✭ 522 (-90.7%)
TIWAPTotally Insecure Web Application Project (TIWAP)
Stars: ✭ 137 (-97.56%)
fame modulesCommunity modules for FAME
Stars: ✭ 55 (-99.02%)
GhostwriterThe SpecterOps project management and reporting engine
Stars: ✭ 394 (-92.98%)
ja3transportImpersonating JA3 signatures
Stars: ✭ 200 (-96.44%)
goverviewgoverview - Get an overview of the list of URLs
Stars: ✭ 93 (-98.34%)
FuzzdictsWeb Pentesting Fuzz 字典,一个就够了。
Stars: ✭ 4,013 (-28.53%)
rawsec-cybersecurity-inventoryAn inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (-97.28%)
PlumhoundBloodhound for Blue and Purple Teams
Stars: ✭ 452 (-91.95%)
Slackor A Golang implant that uses Slack as a command and control server
Stars: ✭ 392 (-93.02%)
Bugbounty CheatsheetA list of interesting payloads, tips and tricks for bug bounty hunters.
Stars: ✭ 3,644 (-35.1%)
challengesSecurity challenges and CTFs created by the Penultimate team.
Stars: ✭ 13 (-99.77%)
doraFind exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Stars: ✭ 229 (-95.92%)