FinalreconThe Last Web Recon Tool You'll Need
Stars: ✭ 888 (-64.79%)
Oscp Prepmy oscp prep collection
Stars: ✭ 105 (-95.84%)
PycatPython network tool, similar to Netcat with custom features.
Stars: ✭ 162 (-93.58%)
HashtopolisA Hashcat wrapper for distributed hashcracking
Stars: ✭ 835 (-66.89%)
SubtakeAutomatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.
Stars: ✭ 104 (-95.88%)
NexphisherAdvanced Phishing tool for Linux & Termux
Stars: ✭ 822 (-67.41%)
O365sprayUsername enumeration and password spraying tool aimed at Microsoft O365.
Stars: ✭ 133 (-94.73%)
Sn0intSemi-automatic OSINT framework and package manager
Stars: ✭ 814 (-67.72%)
GirshAutomatically spawn a reverse shell fully interactive for Linux or Windows victim
Stars: ✭ 66 (-97.38%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-92.78%)
GoscanInteractive Network Scanner
Stars: ✭ 795 (-68.48%)
Smtptestersmall python3 tool to check common vulnerabilities in SMTP servers
Stars: ✭ 102 (-95.96%)
CelestiaReal-time 3D visualization of space.
Stars: ✭ 785 (-68.87%)
XorpassEncoder to bypass WAF filters using XOR operations
Stars: ✭ 134 (-94.69%)
Collection DocumentCollection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (-45%)
EnumdbRelational database brute force and post exploitation tool for MySQL and MSSQL
Stars: ✭ 167 (-93.38%)
DnsmorphDomain name permutation engine written in Go
Stars: ✭ 148 (-94.13%)
Reactive TurtleScala and Akka for kids. A Functional Programming approach for the well known LOGO.
Stars: ✭ 122 (-95.16%)
Netmap.jsFast browser-based network discovery module
Stars: ✭ 70 (-97.22%)
PerunPerun是一款主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架
Stars: ✭ 773 (-69.35%)
Topocm contentCourse on topology in condensed matter
Stars: ✭ 161 (-93.62%)
Security ScriptsA collection of public offensive and defensive security related scripts for InfoSec students.
Stars: ✭ 101 (-96%)
Awesome CsirtAwesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (-94.77%)
KeyeKeye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-96%)
KillchainA unified console to perform the "kill chain" stages of attacks.
Stars: ✭ 172 (-93.18%)
Linuxprivcheckerlinuxprivchecker.py -- a Linux Privilege Escalation Check Script
Stars: ✭ 715 (-71.65%)
HackvaultA container repository for my public web hacks!
Stars: ✭ 1,364 (-45.92%)
Cr3dov3rKnow the dangers of credential reuse attacks.
Stars: ✭ 1,700 (-32.59%)
SublertSublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (-72.28%)
KratosknifeKratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
Stars: ✭ 97 (-96.15%)
Git ScannerA tool for bug hunting or pentesting for targeting websites that have open .git repositories available in public
Stars: ✭ 157 (-93.77%)
Lockdoor Framework🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (-73.16%)
SsrfmapAutomatic SSRF fuzzer and exploitation tool
Stars: ✭ 1,344 (-46.71%)
PentestingazureappsScript samples from the book Pentesting Azure Applications (2018, No Starch Press)
Stars: ✭ 69 (-97.26%)
Spaces FinderA tool to hunt for publicly accessible DigitalOcean Spaces
Stars: ✭ 122 (-95.16%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (-54%)
PhishingkithunterFind phishing kits which use your brand/organization's files and image.
Stars: ✭ 177 (-92.98%)
Security whitepapersCollection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQLi
Stars: ✭ 644 (-74.46%)
PhisherTool designed for performing various social engineering attacks, for phishing.
Stars: ✭ 66 (-97.38%)
CrackmapextremeFor all your network pentesting needs
Stars: ✭ 148 (-94.13%)
PurplecloudAn Infrastructure as Code (IaC) deployment of a small Active Directory pentest lab in the cloud. The deployment simulates a semi-realistic corporate enterprise Active Directory with a DC and endpoints. Purple team goals include blue team detection capabilities and R&D for detection engineering new approaches.
Stars: ✭ 122 (-95.16%)
Red Team Curation ListA list to discover work of red team tooling and methodology for penetration testing and security assessment
Stars: ✭ 68 (-97.3%)
Pocsuite3pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.
Stars: ✭ 2,213 (-12.25%)
Reconspider🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
Stars: ✭ 621 (-75.38%)
Url ClassificationMachine learning to classify Malicious (Spam)/Benign URL's
Stars: ✭ 95 (-96.23%)
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (-75.77%)
Firecrack🔥 Firecrack pentest tools: Facebook hacking random attack, deface, admin finder, bing dorking:
Stars: ✭ 157 (-93.77%)
GtfonowAutomatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: ✭ 68 (-97.3%)
ReconcatA small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any year or complete list of all years possible. Made Specially for penetration testing purpose.
Stars: ✭ 66 (-97.38%)
Zap CliA simple tool for interacting with OWASP ZAP from the commandline.
Stars: ✭ 166 (-93.42%)
StuffUnsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
Stars: ✭ 146 (-94.21%)
EtherscamdbKeep track of all current ethereum scams in a large database
Stars: ✭ 121 (-95.2%)
Attack Surface Detector BurpThe Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters
Stars: ✭ 63 (-97.5%)