All Projects → Security Tools → Similar Projects or Alternatives

2472 Open source projects that are alternatives of or similar to Security Tools

Karkinos
Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Cracking Hashes / Hashing
Stars: ✭ 115 (-77.41%)
Mutual labels:  pentesting, ctf, ctf-tools
Shellshockhunter
It's a simple tool for test vulnerability shellshock
Stars: ✭ 52 (-89.78%)
Mutual labels:  hacking, security-tools, scanner
Oscp Prep
my oscp prep collection
Stars: ✭ 105 (-79.37%)
Mutual labels:  hacking, pentesting, scanner
Mitmap
📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+199.8%)
Mutual labels:  hacking, pentesting, infosec
Cheatsheet God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+591.75%)
Mutual labels:  hacking, security-tools, pentesting
Rescope
Rescope is a tool geared towards pentesters and bugbounty researchers, that aims to make life easier when defining scopes for Burp Suite and OWASP ZAP.
Stars: ✭ 156 (-69.35%)
Mutual labels:  security-tools, pentesting, bugbounty
Bbr
An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.
Stars: ✭ 142 (-72.1%)
Mutual labels:  security-tools, bugbounty, bug-bounty
Stegseek
⚡️ Worlds fastest steghide cracker, chewing through millions of passwords per second ⚡️
Stars: ✭ 187 (-63.26%)
Mutual labels:  pentesting, ctf, ctf-tools
Passphrase Wordlist
Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (+9.23%)
Mutual labels:  hacking, pentesting, infosec
Red Teaming Toolkit
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Stars: ✭ 5,615 (+1003.14%)
Mutual labels:  hacking, pentesting, infosec
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+258.35%)
Mutual labels:  hacking, security-tools, scanner
Quiver
Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-72.5%)
Mutual labels:  hacking, pentesting, bugbounty
Ctf Writeups Public
Writeups for infosec Capture the Flag events by team Galaxians
Stars: ✭ 331 (-34.97%)
Mutual labels:  hacking, infosec, ctf
Appinfoscanner
一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
Stars: ✭ 424 (-16.7%)
Mutual labels:  hacking, security-tools, scanner
Privesc
A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+54.42%)
Mutual labels:  hacking, pentesting, bugbounty
Mobilehackersweapons
Mobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 170 (-66.6%)
Mutual labels:  hacking, scanner, bugbounty
Di.we.h
Repositório com conteúdo sobre web hacking em português
Stars: ✭ 156 (-69.35%)
Mutual labels:  hacking, bugbounty, bug-bounty
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+354.22%)
Mutual labels:  hacking, pentesting, scanner
Stegcloak
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻‍♂️⭐
Stars: ✭ 2,379 (+367.39%)
Mutual labels:  hacking, security-tools, infosec
Holisticinfosec For Webdevelopers Fascicle0
📚 Overview 🔒 Tooling 🔒 Process 🔒 Physical 🔒 People 📚
Stars: ✭ 37 (-92.73%)
Mutual labels:  hacking, infosec, security-testing
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+70.92%)
Mutual labels:  hacking, pentesting, infosec
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+1664.44%)
Mutual labels:  hacking, pentesting, bugbounty
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+50.1%)
Mutual labels:  hacking, security-tools, pentesting
Vault
swiss army knife for hackers
Stars: ✭ 346 (-32.02%)
Mutual labels:  hacking, pentesting, scanner
Taipan
Web application vulnerability scanner
Stars: ✭ 359 (-29.47%)
Awesome Privilege Escalation
A curated list of awesome privilege escalation
Stars: ✭ 413 (-18.86%)
Mutual labels:  hacking, pentesting, ctf
Onelistforall
Rockyou for web fuzzing
Stars: ✭ 213 (-58.15%)
Mutual labels:  hacking, pentesting, bugbounty
Rebel Framework
Advanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (-64.05%)
Mutual labels:  hacking, security-tools, ctf
Fdsploit
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (-60.9%)
Mutual labels:  hacking, security-tools, pentesting
Watchdog
Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (-32.22%)
Wssat
WEB SERVICE SECURITY ASSESSMENT TOOL
Stars: ✭ 360 (-29.27%)
Awesome Dotnet Security
Awesome .NET Security Resources
Stars: ✭ 325 (-36.15%)
Awesome Java Security
Awesome Java Security Resources 🕶☕🔐
Stars: ✭ 216 (-57.56%)
Asnlookup
Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-67.98%)
Mutual labels:  hacking, infosec, bugbounty
Minesweeper
A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-68.17%)
Mutual labels:  hacking, security-tools, bugbounty
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-24.95%)
Mutual labels:  hacking, security-tools, pentesting
Packetwhisper
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (-20.43%)
Mutual labels:  hacking, security-tools, pentesting
Nmap
Idiomatic nmap library for go developers
Stars: ✭ 391 (-23.18%)
Mutual labels:  hacking, pentesting, infosec
haiti
🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (-43.61%)
Mutual labels:  infosec, ctf, ctf-tools
Infosec reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+717.68%)
Mutual labels:  hacking, pentesting, infosec
Getjs
A tool to fastly get all javascript sources/files
Stars: ✭ 190 (-62.67%)
Mutual labels:  hacking, pentesting, bugbounty
Juice Shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+1131.83%)
Mutual labels:  hacking, pentesting, ctf
Ladon
大型内网渗透扫描器&Cobalt Strike,Ladon8.9内置120个模块,包含信息收集/存活主机/端口扫描/服务识别/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010/SMBGhost/Weblogic/ActiveMQ/Tomcat/Struts2,密码口令爆破(Mysql/Oracle/MSSQL)/FTP/SSH(Linux)/VNC/Windows(IPC/WMI/SMB/Netbios/LDAP/SmbHash/WmiHash/Winrm),远程执行命令(smbexec/wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0
Stars: ✭ 2,911 (+471.91%)
Mutual labels:  hacking, security-tools, scanner
Hellraiser
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (-18.86%)
Mutual labels:  hacking, security-tools, scanner
Goaltdns
A permutation generation tool written in golang
Stars: ✭ 119 (-76.62%)
Mutual labels:  hacking, infosec, bug-bounty
Securitymanageframwork
Security Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Stars: ✭ 378 (-25.74%)
Mutual labels:  pentesting, scanner, infosec
Awesome Python Security
Awesome Python Security resources 🕶🐍🔐
Stars: ✭ 738 (+44.99%)
Apkurlgrep
Extract endpoints from APK files
Stars: ✭ 405 (-20.43%)
Mutual labels:  hacking, pentesting, infosec
Juice Shop Ctf
Capture-the-Flag (CTF) environment setup tools for OWASP Juice Shop
Stars: ✭ 238 (-53.24%)
Mutual labels:  hacking, pentesting, ctf
magicRecon
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (-6.09%)
Mutual labels:  scanner, infosec, bugbounty
flydns
Related subdomains finder
Stars: ✭ 29 (-94.3%)
Mutual labels:  bug-bounty, infosec, bugbounty
YAPS
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-93.12%)
Mutual labels:  pentesting, bugbounty, ctf-tools
aquatone
A Tool for Domain Flyovers
Stars: ✭ 43 (-91.55%)
Mutual labels:  bug-bounty, infosec, bugbounty
sub404
A python tool to check subdomain takeover vulnerability
Stars: ✭ 205 (-59.72%)
Mutual labels:  bug-bounty, pentesting, bugbounty
Rustscan
🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+925.15%)
Mutual labels:  hacking, security-tools, pentesting
Subtake
Automatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.
Stars: ✭ 104 (-79.57%)
Mutual labels:  pentesting, infosec, bug-bounty
Sippts
Set of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-77.21%)
Mutual labels:  hacking, security-tools, pentesting
Ronin
Ronin is a Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of code, Exploits or Payloads, Scanners, etc, via Repositories.
Stars: ✭ 220 (-56.78%)
Mutual labels:  hacking, infosec, ctf-tools
Nightingale
It's a Docker Environment for pentesting which having all the required tool for VAPT.
Stars: ✭ 119 (-76.62%)
Mutual labels:  bug-bounty, bugbounty, ctf-tools
Osint tips
OSINT
Stars: ✭ 322 (-36.74%)
Mutual labels:  hacking, pentesting, bugbounty
61-120 of 2472 similar projects