Xerrorfully automated pentesting tool
Stars: ✭ 173 (-31.08%)
CalderaAutomated Adversary Emulation Platform
Stars: ✭ 3,126 (+1145.42%)
TelekillerA Tools Session Hijacking And Stealer Local Passcode Telegram Windows
Stars: ✭ 122 (-51.39%)
PwnginxPwn nginx - a nginx backdoor provides shell access, socks5 tunneling, http password sniffing.
Stars: ✭ 173 (-31.08%)
LnkupGenerates malicious LNK file payloads for data exfiltration
Stars: ✭ 205 (-18.33%)
BulwarkAn organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
Stars: ✭ 113 (-54.98%)
VirtualsecconsAn ongoing list of virtual cybersecurity conferences.
Stars: ✭ 113 (-54.98%)
RulerA tool to abuse Exchange services
Stars: ✭ 1,684 (+570.92%)
KalimuxInstall And Use Kali Linux With Gui In Termux
Stars: ✭ 240 (-4.38%)
GoaltdnsA permutation generation tool written in golang
Stars: ✭ 119 (-52.59%)
RecsechRecsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected, Subdomain takeovers, Reconnaissance On Github and much more you can see in Features in tools .
Stars: ✭ 173 (-31.08%)
IkyOSINT Project
Stars: ✭ 203 (-19.12%)
DrozerThe Leading Security Assessment Framework for Android.
Stars: ✭ 2,683 (+968.92%)
Umbrella androidOpen source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to dealing with a kidnap. Umbrella has best practice guides in over 40 topics in multiple languages. Used daily by people working in high risk countries - journalists, activists, diplomats, business travelers etc.
Stars: ✭ 171 (-31.87%)
Effective ShellText, samples and website for my 'Effective Shell' series.
Stars: ✭ 204 (-18.73%)
LolbitsC2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + Dinvoke for EDR user-mode hooking evasion.
Stars: ✭ 170 (-32.27%)
Postexploits(windows) post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass etc..
Stars: ✭ 111 (-55.78%)
Remote Desktop CachingThis tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: ✭ 171 (-31.87%)
TangalangaTangalanga: the Zoom conference scanner hacking tool
Stars: ✭ 236 (-5.98%)
MercuryMercury is a hacking tool used to collect information and use the information to further hurt the target
Stars: ✭ 236 (-5.98%)
ShellabLinux and Windows shellcode enrichment utility
Stars: ✭ 225 (-10.36%)
Bundler AuditPatch-level verification for Bundler
Stars: ✭ 2,393 (+853.39%)
KaitenA Undetectable Payload Generation
Stars: ✭ 169 (-32.67%)
Awesome Malware💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-56.97%)
MobilehackersweaponsMobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 170 (-32.27%)
BrutemapLet's find someone's account
Stars: ✭ 113 (-54.98%)
Cehv10 Notes📕 Both personal and public notes for EC-Council's CEHv10 312-50, because its thousands of pages/slides of boredom, and a braindump to many
Stars: ✭ 170 (-32.27%)
RogueAn extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.
Stars: ✭ 225 (-10.36%)
TweetshellMulti-thread Twitter BruteForcer in Shell Script
Stars: ✭ 112 (-55.38%)
CatnipCat-Nip Automated Basic Pentest Tool - Designed For Kali Linux
Stars: ✭ 108 (-56.97%)
WstgThe Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
Stars: ✭ 3,873 (+1443.03%)
KccssKubernetes Common Configuration Scoring System
Stars: ✭ 111 (-55.78%)
ZombieantZombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
Stars: ✭ 169 (-32.67%)
FawkesFawkes is a tool to search for targets vulnerable to SQL Injection. Performs the search using Google search engine.
Stars: ✭ 108 (-56.97%)
ThechoiceThe linux choice collection tools
Stars: ✭ 245 (-2.39%)
PossumbotA bot that will allow you to destroy discord servers.
Stars: ✭ 106 (-57.77%)
BbreconPython library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-32.67%)
Awesome Hacking ListsProject transferred to: https://github.com/taielab/awesome-hacking-lists
Stars: ✭ 203 (-19.12%)
ProdigymathgamehackingProdigy Hacking Organization: Hacking for the right reasons. | Questions? Ask on our Discord. https://discord.gg/XQDfbfq
Stars: ✭ 108 (-56.97%)
EmbedosEmbedOS - Embedded security testing virtual machine
Stars: ✭ 108 (-56.97%)
Information Security TasksThis repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (-56.97%)
DdoorDDoor - cross platform backdoor using dns txt records
Stars: ✭ 168 (-33.07%)
SocialpwnedSocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and Twitter to find possible credentials leaks in PwnDB.
Stars: ✭ 104 (-58.57%)
Awesome HackingA collection of various awesome lists for hackers, pentesters and security researchers
Stars: ✭ 48,038 (+19038.65%)
Sec Admin分布式资产安全扫描核心管理系统(弱口令扫描,漏洞扫描)
Stars: ✭ 222 (-11.55%)
Pine🌲 Aimbot powered by real-time object detection with neural networks, GPU accelerated with Nvidia. Optimized for use with CS:GO.
Stars: ✭ 202 (-19.52%)
JsshellJSshell - JavaScript reverse/remote shell
Stars: ✭ 167 (-33.47%)
The Book Of Secret KnowledgeA collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
Stars: ✭ 55,582 (+22044.22%)
Dymerge🔓 A dynamic dictionary merger for successful dictionary based attacks.
Stars: ✭ 167 (-33.47%)
AnsvifA Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.
Stars: ✭ 107 (-57.37%)
CommixAutomated All-in-One OS Command Injection Exploitation Tool.
Stars: ✭ 3,016 (+1101.59%)