DiscoverCustom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Stars: ✭ 2,548 (+4896.08%)
PentaOpen source all-in-one CLI tool to semi-automate pentesting.
Stars: ✭ 130 (+154.9%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+649.02%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (+2174.51%)
Easy hackHack the World using Termux
Stars: ✭ 549 (+976.47%)
Terminhack👨💻 Impress your friends by pretending to be a real hacker
Stars: ✭ 73 (+43.14%)
Msploitego Pentesting suite for Maltego based on data in a Metasploit database
Stars: ✭ 124 (+143.14%)
showmeRapid diagnostic system status tool (performance monitoring, network scanning, mysql performance monitoring, kubectl status)
Stars: ✭ 24 (-52.94%)
Sec ToolsDocker images for infosec tools
Stars: ✭ 135 (+164.71%)
OctopusOctopus - Network Scan/Infos & Web Scan
Stars: ✭ 25 (-50.98%)
MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (+660.78%)
massnmapScans an internal network using massscan and nmap
Stars: ✭ 18 (-64.71%)
trolotrolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-11.76%)
ivreNetwork recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,712 (+5217.65%)
sharinganOffensive Security recon tool
Stars: ✭ 88 (+72.55%)
HostEnumeratorA tool that automates the process of enumeration
Stars: ✭ 29 (-43.14%)
rest-apiREST API backend for Reconmap
Stars: ✭ 48 (-5.88%)
porteyeDetect alive host and open port .
Stars: ✭ 17 (-66.67%)
altprobecollector for XDR and security posture service
Stars: ✭ 62 (+21.57%)
Kali-Linux-EbooksTop 20 Kali Linux Related E-books (Free Download)
Stars: ✭ 134 (+162.75%)
asnapasnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the user to automate initial port and service scanning.
Stars: ✭ 28 (-45.1%)
REW-sploitEmulate and Dissect MSF and *other* attacks
Stars: ✭ 115 (+125.49%)
MassVulScanBash script which quickly identifies open network ports and any associated vulnerabilities / Script Bash qui permet d'identifier rapidement les ports réseaux ouverts et les éventuelles vulnérabilités associées.
Stars: ✭ 56 (+9.8%)
RedTeam toolkitRed Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.
Stars: ✭ 301 (+490.2%)
Mis-Comandos-Linux📋 Lista descrita de mis 💯 comandos favoritos ⭐ en GNU/Linux 💻
Stars: ✭ 28 (-45.1%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (+1078.43%)
webnettoolsWeb Net Tools is a web frontend for some useful command line tooling. It provides especially an web frontend for tools like testssl.sh and nmap.
Stars: ✭ 33 (-35.29%)
nmap-log4shellNmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)
Stars: ✭ 54 (+5.88%)
d9scanNetwork Scanner with Backdoor Detection, other Nmap resources and syn-protection detection
Stars: ✭ 23 (-54.9%)
sgCheckupsgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.
Stars: ✭ 77 (+50.98%)
hassh-utilshassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hassh)
Stars: ✭ 41 (-19.61%)
default-http-login-hunterLogin hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.
Stars: ✭ 285 (+458.82%)
nmap-formatterA tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot). Simply put it's nmap converter.
Stars: ✭ 129 (+152.94%)
N-WEBWEB PENETRATION TESTING TOOL 💥
Stars: ✭ 56 (+9.8%)
Nmap-ParserParse nmap scan data with Perl (official repo)
Stars: ✭ 30 (-41.18%)
nmap-nse-scriptsNmap NSE scripts that have been customised or created
Stars: ✭ 73 (+43.14%)
ForerunnerFast and extensible network scanning library featuring multithreading, ping probing, and scan fetchers.
Stars: ✭ 39 (-23.53%)
VirusX5The Most Powerful Fake Page Redirecting tool...
Stars: ✭ 15 (-70.59%)
JALSIJALSI - Just Another Lame Shellcode Injector
Stars: ✭ 29 (-43.14%)
MimirOSINT Threat Intel Interface - CLI for HoneyDB
Stars: ✭ 104 (+103.92%)
Drupalgeddon3Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)
Stars: ✭ 18 (-64.71%)
AndspoiltRun interactive android exploits in linux.
Stars: ✭ 101 (+98.04%)
Net-MonGet notified for new devices on your network
Stars: ✭ 22 (-56.86%)
ObsidianSailboatNmap and NSE command line wrapper in the style of Metasploit
Stars: ✭ 36 (-29.41%)
CnC-detectionDetecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation
Stars: ✭ 15 (-70.59%)
Recon-XAdvanced Reconnaissance tool to enumerate attacking surface of the target.
Stars: ✭ 27 (-47.06%)
cherrymapImport Nmap scans to Cherrytree
Stars: ✭ 37 (-27.45%)
secist scriptNo description or website provided.
Stars: ✭ 86 (+68.63%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+64.71%)