flydnsRelated subdomains finder
Stars: ✭ 29 (-89.06%)
leetspeekOpen and collaborative content from leet hackers!
Stars: ✭ 11 (-95.85%)
vulnerabilitiesList of every possible vulnerabilities in computer security.
Stars: ✭ 14 (-94.72%)
kumasia./kumasia php simple backdoor
Stars: ✭ 13 (-95.09%)
centCommunity edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place
Stars: ✭ 315 (+18.87%)
xmlrpc-bruteforcerAn XMLRPC brute forcer targeting Wordpress written in Python 3. (DISCONTINUED)
Stars: ✭ 62 (-76.6%)
Pwdlyser-CLIPython-based CLI Password Analyser (Reporting Tool)
Stars: ✭ 29 (-89.06%)
warfWARF is a Web Application Reconnaissance Framework that helps to gather information about the target.
Stars: ✭ 53 (-80%)
VulWebajuVulWebaju is a platform that automates setting up your pen-testing environment for learning purposes.
Stars: ✭ 53 (-80%)
Awesome BbhtA bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-28.3%)
crackena fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust
Stars: ✭ 192 (-27.55%)
WebmapA Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generation during a Web Penetration Testing
Stars: ✭ 188 (-29.06%)
linklink is a command and control framework written in rust
Stars: ✭ 345 (+30.19%)
Andrax Mobile PentestANDRAX The first and unique Penetration Testing platform for Android smartphones
Stars: ✭ 394 (+48.68%)
TokenBreakerJSON RSA to HMAC and None Algorithm Vulnerability POC
Stars: ✭ 51 (-80.75%)
GarudAn automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and scans for some low hanging vulnerabilities automatically.
Stars: ✭ 183 (-30.94%)
lazyaircrackAutomated tool for WiFi hacking.
Stars: ✭ 301 (+13.58%)
Nndefacctsnnposter's alternate fingerprint dataset for Nmap script http-default-accounts
Stars: ✭ 180 (-32.08%)
PPNPentester's Promiscuous Notebook
Stars: ✭ 221 (-16.6%)
auth analyzerBurp Extension for testing authorization issues. Automated request repeating and parameter value extraction on the fly.
Stars: ✭ 77 (-70.94%)
DevBrute-A Password Brute ForcerDevBrute is a Password Brute Forcer, It can Brute Force almost all Social Media Accounts or Any Web Application.
Stars: ✭ 91 (-65.66%)
TcpproxyIntercepting TCP proxy to modify raw TCP streams using modules on incoming or outgoing traffic
Stars: ✭ 176 (-33.58%)
oscpMy notebook for OSCP Lab
Stars: ✭ 22 (-91.7%)
anubisCaptive wifi hotspot bypass tool for Linux
Stars: ✭ 46 (-82.64%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-76.98%)
dark-lord-obamaAV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities
Stars: ✭ 61 (-76.98%)
RapidpayloadFramework RapidPayload - Metasploit Payload Generator | Crypter FUD AntiVirus Evasion
Stars: ✭ 174 (-34.34%)
Spray365Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The built-in execution plan features options that attempt to bypass Azure Smart Lockout and insecure conditional access policies.
Stars: ✭ 233 (-12.08%)
SmogcloudFind cloud assets that no one wants exposed 🔎 ☁️
Stars: ✭ 168 (-36.6%)
PowEnumExecutes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.
Stars: ✭ 62 (-76.6%)
ComPPCompany Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.
Stars: ✭ 44 (-83.4%)
HydrafwHydraFW official firmware for HydraBus/HydraNFC for researcher, hackers, students, embedded software developers or anyone interested in debugging/hacking/developing/penetration testing
Stars: ✭ 165 (-37.74%)
Kali-Linux-EbooksTop 20 Kali Linux Related E-books (Free Download)
Stars: ✭ 134 (-49.43%)
VulscanAdvanced vulnerability scanning with Nmap NSE
Stars: ✭ 2,305 (+769.81%)
pentest-toolsGeneral stuff for pentesting - password cracking, phishing, automation, Kali, etc.
Stars: ✭ 52 (-80.38%)
ARL-NPoC集漏洞验证和任务运行的一个框架
Stars: ✭ 73 (-72.45%)
hathiA dictionary attack tool for PostgreSQL and MSSQL
Stars: ✭ 33 (-87.55%)
CoogleA shot-for-shot remake of the Google Login Page.
Stars: ✭ 34 (-87.17%)
NTPDoserNTP Doser is a NTP Amplification DoS/DDoS attack tool for penttesting
Stars: ✭ 96 (-63.77%)
frisbeeCollect email addresses by crawling search engine results.
Stars: ✭ 29 (-89.06%)
peneworkPenetration Test Framwork
Stars: ✭ 24 (-90.94%)
AstraAutomated Security Testing For REST API's
Stars: ✭ 1,898 (+616.23%)
AntiEye:.IP webcam penetration test suit.:
Stars: ✭ 21 (-92.08%)
QuiverQuiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-47.17%)
revshfuzzA tool for fuzzing for ports that allow outgoing connections
Stars: ✭ 18 (-93.21%)
one-scan多合一网站指纹扫描器,轻松获取网站的 IP / DNS 服务商 / 子域名 / HTTPS 证书 / WHOIS / 开发框架 / WAF 等信息
Stars: ✭ 44 (-83.4%)
Information SecurityA place where I can create, collect and share tooling, resources and knowledge about information security.
Stars: ✭ 135 (-49.06%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-71.7%)
brutekragPenetration tests on SSH servers using brute force or dictionary attacks. Written in Python.
Stars: ✭ 30 (-88.68%)
SudomySudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 1,572 (+493.21%)
Learning-Node.js-SecurityA Collection of articles, videos, blogs, talks and other materials on Node.js Security
Stars: ✭ 25 (-90.57%)
ggtfobinsGet GTFOBins info about a given exploit from the command line
Stars: ✭ 27 (-89.81%)
default-http-login-hunterLogin hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.
Stars: ✭ 285 (+7.55%)
teatimeAn RPC attack framework for Blockchain nodes.
Stars: ✭ 88 (-66.79%)
rustcatRustcat(rcat) - The modern Port listener and Reverse shell
Stars: ✭ 505 (+90.57%)
WPA2-FritzBox-Pswd-Wordlist-GeneratorThis Script will produce all of the WPA2 Passwords used by various Router companies aswell as Fritzbox. All of these Passwords will be 16 Numbers in length. So it could get a bit large.
Stars: ✭ 22 (-91.7%)