crawleetWeb Recon & Exploitation Tool.
Stars: ✭ 48 (-9.43%)
MsdatMSDAT: Microsoft SQL Database Attacking Tool
Stars: ✭ 621 (+1071.7%)
BlackmambaC2/post-exploitation framework
Stars: ✭ 544 (+926.42%)
BifrostBifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-30.19%)
TrigmapA wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (+149.06%)
LiteOTPMulti OTP Spam Amp/Paralell threads
Stars: ✭ 50 (-5.66%)
JusttryharderJustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)
Stars: ✭ 450 (+749.06%)
Sudo killerA tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+1924.53%)
Ssrf TestingSSRF (Server Side Request Forgery) testing resources
Stars: ✭ 1,718 (+3141.51%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+441.51%)
LAZYPARIAHA tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (+128.3%)
1earnffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+6909.43%)
winallenumThis powershell script has got to run in remote hacked windows host, even for pivoting
Stars: ✭ 13 (-75.47%)
MailRipV3SMTP and IMAP checker / cracker for mailpass combolists with a user-friendly GUI, automated inbox test and many more features.
Stars: ✭ 28 (-47.17%)
GetaltnameExtract subdomains from SSL certificates in HTTPS sites.
Stars: ✭ 320 (+503.77%)
offensive-docker-vpsCreate a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.
Stars: ✭ 66 (+24.53%)
OdatODAT: Oracle Database Attacking Tool
Stars: ✭ 906 (+1609.43%)
PowerladonLadon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Stars: ✭ 39 (-26.42%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (+118.87%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+2043.4%)
Xssor2XSS'OR - Hack with JavaScript.
Stars: ✭ 1,969 (+3615.09%)
PyParser-CVEMulti source CVE/exploit parser.
Stars: ✭ 25 (-52.83%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-28.3%)
PymetaPymeta will search the web for files on a domain to download and extract metadata. This technique can be used to identify: domains, usernames, software/version numbers and naming conventions.
Stars: ✭ 170 (+220.75%)
uberscanSecurity program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.
Stars: ✭ 31 (-41.51%)
awesome-pentest-toolsList of Security Archives Tools and software, generally for facilitate security & penetration research. Opening it up to everyone will facilitate a knowledge transfer. Hopefully the initial set will grow and expand.
Stars: ✭ 34 (-35.85%)
YAPSYet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-33.96%)
SubscraperSubdomain enumeration through various techniques
Stars: ✭ 265 (+400%)
OverlordOverlord - Red Teaming Infrastructure Automation
Stars: ✭ 258 (+386.79%)
KaboomA tool to automate penetration tests
Stars: ✭ 322 (+507.55%)
tomcter😹 Tomcter is a python tool developed to bruteforce Apache Tomcat manager login with Apache Tomcat default credentials.
Stars: ✭ 18 (-66.04%)
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+794.34%)
DirbleFast directory scanning and scraping tool
Stars: ✭ 468 (+783.02%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+1362.26%)
Pwncatpwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
Stars: ✭ 904 (+1605.66%)
PeekABooPeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses PowerShell remoting to perform this task. Note: Remote desktop is disabled by default on all Windows operating systems.
Stars: ✭ 120 (+126.42%)
1earn个人维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 776 (+1364.15%)
CatnipCat-Nip Automated Basic Pentest Tool - Designed For Kali Linux
Stars: ✭ 108 (+103.77%)
Cloudflair🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.
Stars: ✭ 1,176 (+2118.87%)
JwtxploiterA tool to test security of json web token
Stars: ✭ 130 (+145.28%)
HabuHacking Toolkit
Stars: ✭ 635 (+1098.11%)
Sec ToolsDocker images for infosec tools
Stars: ✭ 135 (+154.72%)
sqlscanQuick SQL Scanner, Dorker, Webshell injector PHP
Stars: ✭ 140 (+164.15%)
puppet-nfsInstalls and configures NFS server and clients
Stars: ✭ 14 (-73.58%)
rpcRPC-like client-service implementation over messaging queue
Stars: ✭ 26 (-50.94%)
project-blackPentest/BugBounty progress control with scanning modules
Stars: ✭ 279 (+426.42%)
huntkitDocker - Ubuntu with a bunch of PenTesting tools and wordlists
Stars: ✭ 51 (-3.77%)
PayloadsAllA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 31 (-41.51%)
usefuluseful pentest note
Stars: ✭ 59 (+11.32%)
Ether1Official Go implementation of The Etho Protocol
Stars: ✭ 41 (-22.64%)
nfsdtopDisplay top I/O on NFS servers using bpftrace on Linux and DTrace on FreeBSD
Stars: ✭ 27 (-49.06%)