Zap CliA simple tool for interacting with OWASP ZAP from the commandline.
Stars: ✭ 166 (-96.61%)
QuiverQuiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-97.14%)
M4ngl3m3Common password pattern generator using strings list
Stars: ✭ 103 (-97.9%)
Red-Rabbit-V4The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate other peoples tools like the aircrack suite or the wifite framework, it rather has its own code and is raw source with over 270+ options. This framework might just be your everyday key to your workflow
Stars: ✭ 123 (-97.49%)
URL-obfuscatorPython Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (-97.94%)
StegcrackerSteganography brute-force utility to uncover hidden data inside files
Stars: ✭ 396 (-91.91%)
HrshellHRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (-96.06%)
LnkupGenerates malicious LNK file payloads for data exfiltration
Stars: ✭ 205 (-95.81%)
Ldap searchPython3 script to perform LDAP queries and enumerate users, groups, and computers from Windows Domains. Ldap_Search can also perform brute force/password spraying to identify valid accounts via LDAP.
Stars: ✭ 78 (-98.41%)
SubcertSubcert is an subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.
Stars: ✭ 58 (-98.82%)
PompemFind exploit tool
Stars: ✭ 786 (-83.95%)
PerunPerun是一款主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架
Stars: ✭ 773 (-84.21%)
Mr.Holmes🔍 A Complete Osint Tool
Stars: ✭ 307 (-93.73%)
ConstoleScan for and exploit Consul agents
Stars: ✭ 37 (-99.24%)
OpenVAS-DockerA Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-99.67%)
RedTeam toolkitRed Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.
Stars: ✭ 301 (-93.85%)
PayloadsPayload Arsenal for Pentration Tester and Bug Bounty Hunters
Stars: ✭ 421 (-91.4%)
goblin一款适用于红蓝对抗中的仿真钓鱼系统
Stars: ✭ 844 (-82.76%)
NetpwnTool made to automate tasks of pentesting.
Stars: ✭ 152 (-96.9%)
peniotPENIOT: Penetration Testing Tool for IoT
Stars: ✭ 164 (-96.65%)
Red-Team-EssentialsThis repo will contain some basic pentest/RT commands.
Stars: ✭ 22 (-99.55%)
hackipyHacking, pen-testing, and cyber-security related tools built with Python.
Stars: ✭ 26 (-99.47%)
PentestkitUseful tools and scripts during Penetration Testing engagements
Stars: ✭ 463 (-90.55%)
NullinuxInternal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB.
Stars: ✭ 451 (-90.79%)
Open-source-tools-for-CTIPublic Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-98.14%)
ApplicationinspectorA source code analyzer built for surfacing features of interest and other characteristics to answer the question 'What's in the code?' quickly using static analysis with a json based rules engine. Ideal for scanning components before use or detecting feature level changes.
Stars: ✭ 3,873 (-20.91%)
Htrace.shMy simple Swiss Army knife for http/https troubleshooting and profiling.
Stars: ✭ 3,465 (-29.24%)
tomcter😹 Tomcter is a python tool developed to bruteforce Apache Tomcat manager login with Apache Tomcat default credentials.
Stars: ✭ 18 (-99.63%)
JWTweakDetects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.
Stars: ✭ 85 (-98.26%)
Awesome InfosecA curated list of awesome infosec courses and training resources.
Stars: ✭ 3,779 (-22.83%)
MetabigorIntelligence tool but without API key
Stars: ✭ 424 (-91.34%)
DnsliveryEasy files and payloads delivery over DNS
Stars: ✭ 332 (-93.22%)
Offensive DockerOffensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-93.3%)
FakeUSBMake your own BadUSB device!
Stars: ✭ 14 (-99.71%)
Xeexe TopantivirusevasionUndetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (-92.1%)
WatcherWatcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Stars: ✭ 324 (-93.38%)
InfosecHouseInfosec resource center for offensive and defensive security operations.
Stars: ✭ 61 (-98.75%)
CybersecurityA curriculum for a high school cyber security course.
Stars: ✭ 329 (-93.28%)
youtube-metadataA quick way to gather all the metadata about a video, playlist, or channel from the YouTube API.
Stars: ✭ 58 (-98.82%)
SalusSecurity scanner coordinator
Stars: ✭ 441 (-90.99%)
CovertutilsA framework for Backdoor development!
Stars: ✭ 424 (-91.34%)
PowerProxyPowerShell SOCKS proxy with reverse proxy capabilities
Stars: ✭ 29 (-99.41%)
PivotsuiteNetwork Pivoting Toolkit
Stars: ✭ 329 (-93.28%)
FreeFire-PhishingFree Fire Phishing Tool ID Hack Tool For Online Hacking
Stars: ✭ 140 (-97.14%)
PandorasBoxSecurity tool to quickly audit Public Box files and folders.
Stars: ✭ 56 (-98.86%)
SQLbitJust another script for automatize boolean-based blind SQL injections. (Demo)
Stars: ✭ 30 (-99.39%)
AriaCloudA Docker container for remote penetration testing.
Stars: ✭ 105 (-97.86%)
Langhost👻 A LAN dropbox chatbot controllable via Telegram
Stars: ✭ 324 (-93.38%)
auth analyzerBurp Extension for testing authorization issues. Automated request repeating and parameter value extraction on the fly.
Stars: ✭ 77 (-98.43%)
Dref DNS Rebinding Exploitation Framework
Stars: ✭ 423 (-91.36%)
Race The WebTests for race conditions in web applications. Includes a RESTful API to integrate into a continuous integration pipeline.
Stars: ✭ 385 (-92.14%)
Raven-StormRaven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.
Stars: ✭ 235 (-95.2%)
EvilUSBQuick utility to craft executables for pentesting and managing reverse shells
Stars: ✭ 33 (-99.33%)