All Projects → Scilla → Similar Projects or Alternatives

2373 Open source projects that are alternatives of or similar to Scilla

Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+448.28%)
Sublert
Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (+502.59%)
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+483.62%)
Vault
swiss army knife for hackers
Stars: ✭ 346 (+198.28%)
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+525%)
Jok3r
Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (+456.03%)
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (+117.24%)
Mutual labels:  hacking, reconnaissance, recon, enumeration
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+568.1%)
Habu
Hacking Toolkit
Stars: ✭ 635 (+447.41%)
Flask Unsign
Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
Stars: ✭ 90 (-22.41%)
evildork
Evildork targeting your fiancee👁️
Stars: ✭ 46 (-60.34%)
querytool
Querytool is an OSINT framework based on Google Spreadsheets. With this tool you can perform complex search of terms, people, email addresses, files and many more.
Stars: ✭ 104 (-10.34%)
auto-recon-ng
Automated script to run all modules for a specified list of domains, netblocks or company name
Stars: ✭ 17 (-85.34%)
phomber
Phomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (-49.14%)
Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Stars: ✭ 9,116 (+7758.62%)
Mutual labels:  hacking, pentesting, ctf-tools
Hacker Container
Container with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-9.48%)
Mutual labels:  hacking, security-tools, pentesting
Xattacker
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+673.28%)
Mutual labels:  hacking, security-tools, hacking-tool
Recon Raven
Reconnaissance tool of Penetration test & Bug Bounty
Stars: ✭ 18 (-84.48%)
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-61.21%)
aquatone
A Tool for Domain Flyovers
Stars: ✭ 43 (-62.93%)
YAPS
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-69.83%)
Deep-Inside
Command line tool that allows you to explore IoT devices by using Shodan API.
Stars: ✭ 22 (-81.03%)
Procspy
Python tool that monitors and logs user-run commands on a Linux system for either offensive or defensive purposes..
Stars: ✭ 272 (+134.48%)
Mutual labels:  hacking, reconnaissance, enumeration
Recon My Way
This repository created for personal use and added tools from my latest blog post.
Stars: ✭ 271 (+133.62%)
Mutual labels:  security-tools, reconnaissance, recon
Recon Pipeline
An automated target reconnaissance pipeline.
Stars: ✭ 278 (+139.66%)
Mutual labels:  security-tools, reconnaissance, recon
Ctftools
Personal CTF Toolkit
Stars: ✭ 312 (+168.97%)
Mutual labels:  hacking, hacking-tool, ctf-tools
Sn0int
Semi-automatic OSINT framework and package manager
Stars: ✭ 814 (+601.72%)
Mutual labels:  pentesting, reconnaissance, recon
Ashok
Ashok is a OSINT Recon Tool , a.k.a 😍 Swiss Army knife .
Stars: ✭ 109 (-6.03%)
Crips
IP Tools To quickly get information about IP Address's, Web Pages and DNS records.
Stars: ✭ 272 (+134.48%)
Webkiller
Tool Information Gathering Write By Python.
Stars: ✭ 300 (+158.62%)
Gitgot
Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.
Stars: ✭ 964 (+731.03%)
Mutual labels:  security-tools, reconnaissance, recon
Oneforall
OneForAll是一款功能强大的子域收集工具
Stars: ✭ 4,202 (+3522.41%)
Reconnote
Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
Stars: ✭ 322 (+177.59%)
Mutual labels:  security-tools, pentesting, recon
Offensive Docker
Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (+182.76%)
Mutual labels:  hacking, pentesting, ctf-tools
Taipan
Web application vulnerability scanner
Stars: ✭ 359 (+209.48%)
Mutual labels:  hacking, security-tools, hacking-tool
Rustscan
🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+4398.28%)
Mutual labels:  hacking, security-tools, pentesting
Katana
A Python Tool For google Hacking
Stars: ✭ 355 (+206.03%)
Mutual labels:  hacking, security-tools, hacking-tool
Infosec reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+3487.93%)
Stegcracker
Steganography brute-force utility to uncover hidden data inside files
Stars: ✭ 396 (+241.38%)
Nmap
Idiomatic nmap library for go developers
Stars: ✭ 391 (+237.07%)
Github Recon
GitHub Recon — and what you can achieve with it!
Stars: ✭ 47 (-59.48%)
Cerberus
一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能
Stars: ✭ 389 (+235.34%)
Archstrike
An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (+245.69%)
Ip Tracer
Track any ip address with IP-Tracer. IP-Tracer is developed for Linux and Termux. you can retrieve any ip address information using IP-Tracer.
Stars: ✭ 399 (+243.97%)
Security Scripts
A collection of public offensive and defensive security related scripts for InfoSec students.
Stars: ✭ 101 (-12.93%)
IP-Tracker
Track any ip address with IP-Tracker. IP-Tracker is developed for Linux and Termux. you can retrieve any ip address information using IP-Tracker.
Stars: ✭ 53 (-54.31%)
Osintgram
Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Stars: ✭ 312 (+168.97%)
Packetwhisper
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (+249.14%)
Mutual labels:  hacking, security-tools, pentesting
Awesome Hacking
Awesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+1453.45%)
Keye
Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-12.93%)
Nullinux
Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB.
Stars: ✭ 451 (+288.79%)
Mutual labels:  pentesting, recon, enumeration
Penetration Testing Study Notes
Penetration Testing notes, resources and scripts
Stars: ✭ 461 (+297.41%)
Netcat
NetCat for Windows
Stars: ✭ 463 (+299.14%)
Reconpi
ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.
Stars: ✭ 490 (+322.41%)
Mutual labels:  hacking, hacking-tool, recon
Katanaframework
The New Hacking Framework
Stars: ✭ 502 (+332.76%)
Mutual labels:  network, hacking, penetration-testing
Hackerpro
All in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog
Stars: ✭ 474 (+308.62%)
Linkedin2username
OSINT Tool: Generate username lists for companies on LinkedIn
Stars: ✭ 504 (+334.48%)
Givingstorm
Infection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-37.93%)
Bigbountyrecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+366.38%)
Mutual labels:  pentesting, reconnaissance, recon
Payloadsallthethings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+28269.83%)
61-120 of 2373 similar projects