All Projects → Rspet → Similar Projects or Alternatives

1152 Open source projects that are alternatives of or similar to Rspet

Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+102.79%)
Mutual labels:  hacking, pentesting
Daws
Advanced Web Shell
Stars: ✭ 551 (+119.52%)
Mutual labels:  hacking, pentesting
Attacking And Auditing Docker Containers And Kubernetes Clusters
Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters
Stars: ✭ 509 (+102.79%)
Mutual labels:  pentesting, security-audit
Passphrase Wordlist
Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (+121.51%)
Mutual labels:  hacking, pentesting
Linkedin2username
OSINT Tool: Generate username lists for companies on LinkedIn
Stars: ✭ 504 (+100.8%)
Mutual labels:  hacking, pentesting
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+169.72%)
Mutual labels:  hacking, pentesting
Mosint
An automated e-mail OSINT tool
Stars: ✭ 184 (-26.69%)
Mutual labels:  hacking, pentesting
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+205.58%)
Mutual labels:  hacking, security-audit
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+2786.85%)
Mutual labels:  hacking, pentesting
Evil Winrm
The ultimate WinRM shell for hacking/pentesting
Stars: ✭ 2,251 (+796.81%)
Mutual labels:  hacking, pentesting
Cr3dov3r
Know the dangers of credential reuse attacks.
Stars: ✭ 1,700 (+577.29%)
Mutual labels:  hacking, pentesting
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+208.76%)
Mutual labels:  hacking, pentesting
Sn0int
Semi-automatic OSINT framework and package manager
Stars: ✭ 814 (+224.3%)
Mutual labels:  pentesting, security-audit
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (+90.44%)
Mutual labels:  backdoor, post-exploitation
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+246.61%)
Mutual labels:  hacking, pentesting
Kubernetes Goat
Kubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
Stars: ✭ 868 (+245.82%)
Mutual labels:  hacking, pentesting
Shuffle
WebShell Backdoor Framework
Stars: ✭ 11 (-95.62%)
Mutual labels:  hacking, backdoor
Evil Ssdp
Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.
Stars: ✭ 204 (-18.73%)
Mutual labels:  hacking, pentesting
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+3478.09%)
Mutual labels:  hacking, pentesting
Kill Router
Ferramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-77.29%)
Mutual labels:  hacking, pentesting
V3n0m Scanner
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+237.45%)
Mutual labels:  hacking, pentesting
Gtfonow
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: ✭ 68 (-72.91%)
Mutual labels:  pentesting, post-exploitation
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+352.59%)
Mutual labels:  hacking, pentesting
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+351%)
Mutual labels:  hacking, backdoor
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+626.69%)
Mutual labels:  hacking, security-audit
Web Brutator
Fast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-61.35%)
Mutual labels:  hacking, pentesting
Ratel
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-51.79%)
Mutual labels:  hacking, pentesting
Quiver
Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-44.22%)
Mutual labels:  hacking, pentesting
Sqlite Lab
This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is for fun. Just enjoy it \m/
Stars: ✭ 140 (-44.22%)
Mutual labels:  pentesting, security-audit
Gtfobins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+2302.39%)
Mutual labels:  post-exploitation, reverse-shell
Hg8045q
Pwning the Nuro issued Huawei HG8045Q
Stars: ✭ 107 (-57.37%)
Mutual labels:  hacking, backdoor
Oscp Prep
my oscp prep collection
Stars: ✭ 105 (-58.17%)
Mutual labels:  hacking, pentesting
Linux Smart Enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
Stars: ✭ 1,956 (+679.28%)
Mutual labels:  hacking, pentesting
Hacker Container
Container with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-58.17%)
Mutual labels:  hacking, pentesting
Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-53.78%)
Mutual labels:  hacking, pentesting
Mitmap
📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+507.97%)
Mutual labels:  hacking, pentesting
Dns Persist
DNS-Persist is a post-exploitation agent which uses DNS for command and control.
Stars: ✭ 191 (-23.9%)
Mutual labels:  pentesting, post-exploitation
Dnstricker
A simple dns resolver of dns-record and web-record log server for pentesting
Stars: ✭ 128 (-49%)
Mutual labels:  hacking, pentesting
Awesome Mobile Security
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+631.87%)
Mutual labels:  hacking, pentesting
Learn Web Hacking
Study Notes For Web Hacking / Web安全学习笔记
Stars: ✭ 2,326 (+826.69%)
Mutual labels:  hacking, pentesting
Pidrila
Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (-50.2%)
Mutual labels:  hacking, pentesting
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+668.13%)
Mutual labels:  hacking, security-audit
Minesweeper
A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-35.46%)
Mutual labels:  hacking, security-audit
Zap Cli
A simple tool for interacting with OWASP ZAP from the commandline.
Stars: ✭ 166 (-33.86%)
Mutual labels:  pentesting, security-audit
Hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Stars: ✭ 3,741 (+1390.44%)
Mutual labels:  hacking, pentesting
Hardentheworld
Harden the world is a community driven project to develop hardening guidelines and checklists for common software and devices.
Stars: ✭ 158 (-37.05%)
Mutual labels:  hacking, security-audit
Git Scanner
A tool for bug hunting or pentesting for targeting websites that have open .git repositories available in public
Stars: ✭ 157 (-37.45%)
Mutual labels:  pentesting, security-audit
Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (-33.86%)
Mutual labels:  pentesting, post-exploitation
Jalesc
Just Another Linux Enumeration Script: A Bash script for locally enumerating a compromised Linux box
Stars: ✭ 152 (-39.44%)
Mutual labels:  hacking, pentesting
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+821.12%)
Mutual labels:  hacking, pentesting
Attiny85
RubberDucky like payloads for DigiSpark Attiny85
Stars: ✭ 169 (-32.67%)
Mutual labels:  hacking, pentesting
Burpsuite Xkeys
A Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.
Stars: ✭ 144 (-42.63%)
Mutual labels:  hacking, pentesting
Getjs
A tool to fastly get all javascript sources/files
Stars: ✭ 190 (-24.3%)
Mutual labels:  hacking, pentesting
Enumdb
Relational database brute force and post exploitation tool for MySQL and MSSQL
Stars: ✭ 167 (-33.47%)
Mutual labels:  pentesting, post-exploitation
Http Asynchronous Reverse Shell
[POC] Asynchronous reverse shell using the HTTP protocol.
Stars: ✭ 177 (-29.48%)
Mutual labels:  pentesting, reverse-shell
Androrat
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Stars: ✭ 187 (-25.5%)
Mutual labels:  backdoor, reverse-shell
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+88.84%)
Mutual labels:  hacking, pentesting
Juice Shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+2398.01%)
Mutual labels:  hacking, pentesting
Github Dorks
Find leaked secrets via github search
Stars: ✭ 1,332 (+430.68%)
Mutual labels:  hacking, security-audit
Awesome Shodan Queries
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩‍💻
Stars: ✭ 2,758 (+998.8%)
Mutual labels:  hacking, pentesting
61-120 of 1152 similar projects