Msploitego Pentesting suite for Maltego based on data in a Metasploit database
Stars: ✭ 124 (-8.15%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (+759.26%)
TrigmapA wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (-2.22%)
PentaOpen source all-in-one CLI tool to semi-automate pentesting.
Stars: ✭ 130 (-3.7%)
crawleetWeb Recon & Exploitation Tool.
Stars: ✭ 48 (-64.44%)
uberscanSecurity program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.
Stars: ✭ 31 (-77.04%)
GetaltnameExtract subdomains from SSL certificates in HTTPS sites.
Stars: ✭ 320 (+137.04%)
KaboomA tool to automate penetration tests
Stars: ✭ 322 (+138.52%)
Envizonnetwork visualization & vulnerability management/reporting
Stars: ✭ 382 (+182.96%)
DirbleFast directory scanning and scraping tool
Stars: ✭ 468 (+246.67%)
JwtxploiterA tool to test security of json web token
Stars: ✭ 130 (-3.7%)
awesome-pentest-toolsList of Security Archives Tools and software, generally for facilitate security & penetration research. Opening it up to everyone will facilitate a knowledge transfer. Hopefully the initial set will grow and expand.
Stars: ✭ 34 (-74.81%)
YAPSYet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-74.07%)
winallenumThis powershell script has got to run in remote hacked windows host, even for pivoting
Stars: ✭ 13 (-90.37%)
Ethical Hacking ToolsComplete Listing and Usage of Tools used for Ethical Hacking
Stars: ✭ 272 (+101.48%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+182.96%)
offensive-docker-vpsCreate a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.
Stars: ✭ 66 (-51.11%)
MsdatMSDAT: Microsoft SQL Database Attacking Tool
Stars: ✭ 621 (+360%)
ServerscanServerScan一款使用Golang开发的高并发网络扫描、服务探测工具。
Stars: ✭ 674 (+399.26%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+474.07%)
OdatODAT: Oracle Database Attacking Tool
Stars: ✭ 906 (+571.11%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-14.07%)
ObsidianSailboatNmap and NSE command line wrapper in the style of Metasploit
Stars: ✭ 36 (-73.33%)
MailRipV3SMTP and IMAP checker / cracker for mailpass combolists with a user-friendly GUI, automated inbox test and many more features.
Stars: ✭ 28 (-79.26%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+741.48%)
MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (+187.41%)
searchscanSearch Nmap and Metasploit scanning scripts.
Stars: ✭ 51 (-62.22%)
LiteOTPMulti OTP Spam Amp/Paralell threads
Stars: ✭ 50 (-62.96%)
Cloudflair🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.
Stars: ✭ 1,176 (+771.11%)
One Lin3rGives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+832.59%)
SubscraperSubdomain enumeration through various techniques
Stars: ✭ 265 (+96.3%)
OverlordOverlord - Red Teaming Infrastructure Automation
Stars: ✭ 258 (+91.11%)
Ssrf TestingSSRF (Server Side Request Forgery) testing resources
Stars: ✭ 1,718 (+1172.59%)
tomcter😹 Tomcter is a python tool developed to bruteforce Apache Tomcat manager login with Apache Tomcat default credentials.
Stars: ✭ 18 (-86.67%)
Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (+161.48%)
JusttryharderJustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)
Stars: ✭ 450 (+233.33%)
BifrostBifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-72.59%)
Easy hackHack the World using Termux
Stars: ✭ 549 (+306.67%)
RedcloudAutomated Red Team Infrastructure deployement using Docker
Stars: ✭ 551 (+308.15%)
HabuHacking Toolkit
Stars: ✭ 635 (+370.37%)
BlackmambaC2/post-exploitation framework
Stars: ✭ 544 (+302.96%)
Pwncatpwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
Stars: ✭ 904 (+569.63%)
1earn个人维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 776 (+474.81%)
PowerladonLadon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Stars: ✭ 39 (-71.11%)
Nmap Nse InfoBrowse and search through nmap's NSE scripts.
Stars: ✭ 54 (-60%)
Sudo killerA tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+694.81%)
CatnipCat-Nip Automated Basic Pentest Tool - Designed For Kali Linux
Stars: ✭ 108 (-20%)
1earnffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+2651.85%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-71.85%)
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+251.11%)
Pcwt Stars: ✭ 46 (-65.93%)
EggshelliOS/macOS/Linux Remote Administration Tool
Stars: ✭ 1,286 (+852.59%)
PakuriPenetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (-7.41%)