Linuxprivcheckerlinuxprivchecker.py -- a Linux Privilege Escalation Check Script
Stars: ✭ 715 (+80.56%)
Babysploit👶 BabySploit Beginner Pentesting Toolkit/Framework Written in Python 🐍
Stars: ✭ 883 (+122.98%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-3.54%)
Lockdoor Framework🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+70.96%)
ReconcatA small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any year or complete list of all years possible. Made Specially for penetration testing purpose.
Stars: ✭ 66 (-83.33%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+186.87%)
RsfThe Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
Stars: ✭ 76 (-80.81%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-84.34%)
axionA toolkit for CTFs
Stars: ✭ 15 (-96.21%)
ThecollectiveThe Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-78.54%)
GorsairGorsair hacks its way into remote docker containers that expose their APIs
Stars: ✭ 678 (+71.21%)
WPCrackerWordPress pentest tool
Stars: ✭ 34 (-91.41%)
CryptionTool一个CTF+渗透测试工具框架,集成常见加解密,密码、编码转换,端口扫描,字符处理等功能
Stars: ✭ 62 (-84.34%)
Offensive DockerOffensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-17.17%)
Ctf NotesEverything needed for doing CTFs
Stars: ✭ 304 (-23.23%)
VailynA phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-73.99%)
Information Security TasksThis repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (-72.73%)
Security ScriptsA collection of public offensive and defensive security related scripts for InfoSec students.
Stars: ✭ 101 (-74.49%)
Horn3tPowerful Visual Subdomain Enumeration at the Click of a Mouse
Stars: ✭ 120 (-69.7%)
QuiverQuiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-64.65%)
TomatoToolsTomatoTools 一款CTF杂项利器,支持36种常见编码和密码算法的加密和解密,31种密文的分析和识别,支持自动提取flag,自定义插件等。
Stars: ✭ 66 (-83.33%)
EnumdbRelational database brute force and post exploitation tool for MySQL and MSSQL
Stars: ✭ 167 (-57.83%)
SilentbridgeSilentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.
Stars: ✭ 136 (-65.66%)
Cheatsheet GodPenetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+789.14%)
NightingaleIt's a Docker Environment for pentesting which having all the required tool for VAPT.
Stars: ✭ 119 (-69.95%)
bentoBento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.
Stars: ✭ 74 (-81.31%)
Evil SsdpSpoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.
Stars: ✭ 204 (-48.48%)
WstgThe Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
Stars: ✭ 3,873 (+878.03%)
WhatwebNext generation web scanner
Stars: ✭ 3,503 (+784.6%)
FdsploitFile Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (-49.75%)
LscriptThe LAZY script will make your life easier, and of course faster.
Stars: ✭ 3,056 (+671.72%)
Juice Shop CtfCapture-the-Flag (CTF) environment setup tools for OWASP Juice Shop
Stars: ✭ 238 (-39.9%)
HrshellHRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (-51.26%)
CTF-CryptoToolCTF-CryptoTool is a tool written in python, for breaking crypto text of CTF challenges. It tries to decode the cipher by bruteforcing it with all known cipher decoding methods easily. Also works for the cipher which does not have a key.
Stars: ✭ 38 (-90.4%)
DevBrute-A Password Brute ForcerDevBrute is a Password Brute Forcer, It can Brute Force almost all Social Media Accounts or Any Web Application.
Stars: ✭ 91 (-77.02%)
brutekragPenetration tests on SSH servers using brute force or dictionary attacks. Written in Python.
Stars: ✭ 30 (-92.42%)
AperiSolveSteganalysis web platform
Stars: ✭ 268 (-32.32%)
rbusteryet another dirbuster
Stars: ✭ 21 (-94.7%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (-27.53%)
pwnscriptsVery simple script(s) to hasten binary exploit creation
Stars: ✭ 66 (-83.33%)
Crypto封装多种CTF和平时常见加密及编码C#类库
Stars: ✭ 20 (-94.95%)
vulnerabilitiesList of every possible vulnerabilities in computer security.
Stars: ✭ 14 (-96.46%)
ctf4noobsResumão da massa sobre Capture the Flag.
Stars: ✭ 18 (-95.45%)
ggtfobinsGet GTFOBins info about a given exploit from the command line
Stars: ✭ 27 (-93.18%)
BerylEnigma一个为渗透测试与CTF而制作的工具集,主要实现一些加解密的功能。
Stars: ✭ 329 (-16.92%)
ImageStrikeImageStrike是一款用于CTF中图片隐写的综合利用工具
Stars: ✭ 118 (-70.2%)
blackhat-pythonBlack Hat Python workshop for Disobey 2019
Stars: ✭ 27 (-93.18%)
juice-shop-ctfCapture-the-Flag (CTF) environment setup tools for OWASP Juice Shop supporting CTFd, FBCTF and RootTheBox
Stars: ✭ 287 (-27.53%)
Auto-AWD🚩 CTF AWD framework
Stars: ✭ 24 (-93.94%)
somaCross-platform CTF problem container manager
Stars: ✭ 23 (-94.19%)
CTF-GameCapture the flag Game
Stars: ✭ 14 (-96.46%)
ElliotA pentesting tool inspired by mr robot and derived by zphisher
Stars: ✭ 23 (-94.19%)
KaboomA tool to automate penetration tests
Stars: ✭ 322 (-18.69%)
Powershell RatPython based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+60.61%)