CEHExam Prep for the Ec-council Certified Ethical Hacker 312-50
Stars: ✭ 71 (-38.79%)
BillcipherInformation Gathering tool for a Website or IP address
Stars: ✭ 332 (+186.21%)
Telegram Scrapertelegram group scraper tool. fetch all information about group members
Stars: ✭ 450 (+287.93%)
WhonowA "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
Stars: ✭ 533 (+359.48%)
Mitmap📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+1215.52%)
ArchivefuzzHunt down the secrets from the WebArchives for Fun and Profit
Stars: ✭ 108 (-6.9%)
AirgeddonThis is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (+3201.72%)
BlackratBlackRAT - Java Based Remote Administrator Tool
Stars: ✭ 87 (-25%)
Sherlock🔎 Hunt down social media accounts by username across social networks
Stars: ✭ 28,569 (+24528.45%)
DawsAdvanced Web Shell
Stars: ✭ 551 (+375%)
NishangNishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: ✭ 5,943 (+5023.28%)
Enum4linux NgA next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for security professionals and CTF players.
Stars: ✭ 349 (+200.86%)
MonkeyInfection Monkey - An automated pentest tool
Stars: ✭ 5,572 (+4703.45%)
Impulse💣 Impulse Denial-of-service ToolKit
Stars: ✭ 538 (+363.79%)
Awesome HackingA collection of various awesome lists for hackers, pentesters and security researchers
Stars: ✭ 48,038 (+41312.07%)
HackvaultA container repository for my public web hacks!
Stars: ✭ 1,364 (+1075.86%)
IpapatchPatch iOS Apps, The Easy Way, Without Jailbreak.
Stars: ✭ 3,837 (+3207.76%)
M4ngl3m3Common password pattern generator using strings list
Stars: ✭ 103 (-11.21%)
In Spectre MeltdownThis tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-25.86%)
KeyloggerGet Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+420.69%)
PigA Linux packet crafting tool.
Stars: ✭ 384 (+231.03%)
Penetration Testing ToolsA collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (+429.31%)
ThecollectiveThe Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-26.72%)
Security whitepapersCollection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQLi
Stars: ✭ 644 (+455.17%)
Scanners BoxA powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑
Stars: ✭ 5,590 (+4718.97%)
NsablocklistHOSTS file and research project to block all known NSA / GCHQ / C.I.A. / F.B.I. spying server
Stars: ✭ 630 (+443.1%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+256.03%)
GorsairGorsair hacks its way into remote docker containers that expose their APIs
Stars: ✭ 678 (+484.48%)
BrutalPayload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (+484.48%)
ArlARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
Stars: ✭ 1,357 (+1069.83%)
ParadoxiaratParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (+240.52%)
Anubis🔓Subdomain enumeration and information gathering tool
Stars: ✭ 722 (+522.41%)
FireelffireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (+275%)
EhtoolsWi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: ✭ 422 (+263.79%)
Hacking Tools RepositoryA list of security/hacking tools that have been collected from the internet. Suggestions are welcomed.
Stars: ✭ 448 (+286.21%)
Dradis CeDradis Framework: Colllaboration and reporting for IT Security teams
Stars: ✭ 443 (+281.9%)
NatlasScaling Network Scanning. Changes prior to 1.0 may cause difficult to avoid backwards incompatibilities. You've been warned.
Stars: ✭ 333 (+187.07%)
Linuxprivcheckerlinuxprivchecker.py -- a Linux Privilege Escalation Check Script
Stars: ✭ 715 (+516.38%)
Zynix Fusionzynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
Stars: ✭ 84 (-27.59%)
SwiftnessxA cross-platform note-taking & target-tracking app for penetration testers.
Stars: ✭ 673 (+480.17%)
HackingtoolALL IN ONE Hacking Tool For Hackers
Stars: ✭ 7,521 (+6383.62%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (+527.59%)
Juice ShopOWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+5305.17%)
ScapyScapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Stars: ✭ 6,932 (+5875.86%)
Geo ReconAn OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts.
Stars: ✭ 82 (-29.31%)
CloudfailUtilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
Stars: ✭ 1,239 (+968.1%)
TrapePeople tracker on the Internet: OSINT analysis and research tool by Jose Pino
Stars: ✭ 6,753 (+5721.55%)
Name That Hash🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 3000+ other hashes ☄ Comes with a neat web app 🔥
Stars: ✭ 540 (+365.52%)
Pentesting CookbookA set of recipes useful in pentesting and red teaming scenarios
Stars: ✭ 82 (-29.31%)
SimplyemailEmail recon made fast and easy, with a framework to build on
Stars: ✭ 779 (+571.55%)
EsdEnumeration sub domains(枚举子域名)
Stars: ✭ 785 (+576.72%)
TorbotDark Web OSINT Tool
Stars: ✭ 821 (+607.76%)
ScriptsScripts I use during pentest engagements.
Stars: ✭ 834 (+618.97%)