UmbrellaA Phishing Dropper designed to Pentest.
Stars: ✭ 180 (-92.86%)
Ntlmscanscan for NTLM directories
Stars: ✭ 141 (-94.41%)
Sqlite LabThis code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is for fun. Just enjoy it \m/
Stars: ✭ 140 (-94.45%)
QuiverQuiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-94.45%)
TuktukTool for catching and logging different types of requests.
Stars: ✭ 174 (-93.1%)
HydrafwHydraFW official firmware for HydraBus/HydraNFC for researcher, hackers, students, embedded software developers or anyone interested in debugging/hacking/developing/penetration testing
Stars: ✭ 165 (-93.46%)
DragnetYour Social Engineering Sidekick
Stars: ✭ 139 (-94.49%)
NetwormPython network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-94.65%)
PspyMonitor linux processes without root permissions
Stars: ✭ 2,470 (-2.06%)
Recreator PhishingPROFESSIONAL TOOL ORIENTED IN THE RECREATION OF PHISHING WEBSITES SCENARIOS
Stars: ✭ 136 (-94.61%)
EnigmaMultiplatform payload dropper
Stars: ✭ 180 (-92.86%)
HacktricksWelcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Stars: ✭ 3,741 (+48.33%)
Pentestsome pentest scripts & tools by [email protected]
Stars: ✭ 136 (-94.61%)
SilentbridgeSilentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.
Stars: ✭ 136 (-94.61%)
Sec ToolsDocker images for infosec tools
Stars: ✭ 135 (-94.65%)
AsnlookupLeverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-93.54%)
WavecrackWavestone's web interface for password cracking with hashcat
Stars: ✭ 135 (-94.65%)
Django DersleriYouTube Django Dersleri için proje kaynak kodu
Stars: ✭ 135 (-94.65%)
ZerodoorA script written lazily for generating cross-platform backdoors on the go :)
Stars: ✭ 163 (-93.54%)
ZiglearnRepo for https://ziglearn.org content. Get up to speed with Zig quickly.
Stars: ✭ 135 (-94.65%)
EvilosxAn evil RAT (Remote Administration Tool) for macOS / OS X.
Stars: ✭ 1,826 (-27.6%)
PycatPython network tool, similar to Netcat with custom features.
Stars: ✭ 162 (-93.58%)
XssmapXSSMap 是一款基于 Python3 开发用于检测 XSS 漏洞的工具
Stars: ✭ 134 (-94.69%)
O365sprayUsername enumeration and password spraying tool aimed at Microsoft O365.
Stars: ✭ 133 (-94.73%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-92.78%)
EvabsAn open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security beginners.
Stars: ✭ 173 (-93.14%)
Invoke ApexA PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
Stars: ✭ 162 (-93.58%)
Awesome VulnerableA curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.
Stars: ✭ 133 (-94.73%)
XorpassEncoder to bypass WAF filters using XOR operations
Stars: ✭ 134 (-94.69%)
Topocm contentCourse on topology in condensed matter
Stars: ✭ 161 (-93.62%)
Nimscan🚀 Fast Port Scanner 🚀
Stars: ✭ 134 (-94.69%)
Awesome CsirtAwesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (-94.77%)
KillchainA unified console to perform the "kill chain" stages of attacks.
Stars: ✭ 172 (-93.18%)
Xssor2XSS'OR - Hack with JavaScript.
Stars: ✭ 1,969 (-21.93%)
DedsploitNetwork protocol auditing framework
Stars: ✭ 133 (-94.73%)
Cr3dov3rKnow the dangers of credential reuse attacks.
Stars: ✭ 1,700 (-32.59%)
Git ScannerA tool for bug hunting or pentesting for targeting websites that have open .git repositories available in public
Stars: ✭ 157 (-93.77%)
Blackphish🔱 [ Phishing Made Easy ] 🔱 (In Beta)
Stars: ✭ 133 (-94.73%)
PhishingkithunterFind phishing kits which use your brand/organization's files and image.
Stars: ✭ 177 (-92.98%)
RaccoonA high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (-8.33%)
C Plus PlusCollection of various algorithms in mathematics, machine learning, computer science and physics implemented in C++ for educational purposes.
Stars: ✭ 17,151 (+580.06%)
Pocsuite3pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.
Stars: ✭ 2,213 (-12.25%)
Firecrack🔥 Firecrack pentest tools: Facebook hacking random attack, deface, admin finder, bing dorking:
Stars: ✭ 157 (-93.77%)
ArcherysecCentralize Vulnerability Assessment and Management for DevSecOps Team
Stars: ✭ 1,802 (-28.55%)
Jsonpjsonp is a Burp Extension which attempts to reveal JSONP functionality behind JSON endpoints. This could help reveal cross-site script inclusion vulnerabilities or aid in bypassing content security policies.
Stars: ✭ 131 (-94.81%)
RescopeRescope is a tool geared towards pentesters and bugbounty researchers, that aims to make life easier when defining scopes for Burp Suite and OWASP ZAP.
Stars: ✭ 156 (-93.81%)
ReconnessReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on schedule or events.
Stars: ✭ 131 (-94.81%)
PortiaPortia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
Stars: ✭ 154 (-93.89%)
Poet[unmaintained] Post-exploitation tool
Stars: ✭ 184 (-92.7%)
Hack ToolsThe all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+9.04%)
OscprepoA list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and reading material in 'BookmarkList' CherryTree. Reconscan Py2 and Py3. Custom ISO building.
Stars: ✭ 1,916 (-24.03%)
TechnowloggerTechNowLogger is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info
Stars: ✭ 172 (-93.18%)
Web2attackWeb hacking framework with tools, exploits by python
Stars: ✭ 152 (-93.97%)
PentaOpen source all-in-one CLI tool to semi-automate pentesting.
Stars: ✭ 130 (-94.85%)
UrlcrazyGenerate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (-94.05%)