Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (-52.36%)
SkyratSkyRAT - Powershell Remote Administration Tool
Stars: ✭ 21 (-97.89%)
Wifi PassviewAn open source batch script based WiFi Passview for Windows!
Stars: ✭ 157 (-84.22%)
Zeebsploitweb scanner - exploitation - information gathering
Stars: ✭ 159 (-84.02%)
Oxidtools200 TOOLS BY 0XID4FF0X FOR TERMUX
Stars: ✭ 143 (-85.63%)
WebmapA Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generation during a Web Penetration Testing
Stars: ✭ 188 (-81.11%)
DirsearchWeb path scanner
Stars: ✭ 7,246 (+628.24%)
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-94.87%)
ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-85.73%)
CameradarCameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+178.89%)
TangalangaTangalanga: the Zoom conference scanner hacking tool
Stars: ✭ 236 (-76.28%)
Keylogger🔐 Open Source Python Keylogger Collection
Stars: ✭ 97 (-90.25%)
ReconnoitreA security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+83.32%)
ReconpiReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.
Stars: ✭ 490 (-50.75%)
Logkeys📝 ⌨️ A GNU/Linux keylogger that works!
Stars: ✭ 518 (-47.94%)
XshockXSHOCK Shellshock Exploit
Stars: ✭ 65 (-93.47%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+14.17%)
SandmapNmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (+18.59%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+13.77%)
WpforceWordpress Attack Suite
Stars: ✭ 633 (-36.38%)
Instabruteforcehacking-tool termux-tools termux noob-friendly instagram-bot bruteforce-password-cracker wordlist-technique
Stars: ✭ 86 (-91.36%)
Project TauroA Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-94.77%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-88.34%)
Scilla🏴☠️ Information Gathering tool 🏴☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-88.34%)
GofingerprintGoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fingerprints.
Stars: ✭ 120 (-87.94%)
Inferno🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-89.45%)
Teardroid-phprat🇮🇳 🤖 It's easy to use android botnet work without port forwarding, vps and android studio
Stars: ✭ 417 (-58.09%)
Windows Post ExploitationWindows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (-70.25%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (-58.49%)
Onexonex is a hacking tool installer and package manager for hackers. Onex is a library of all hacking tools for Termux and other Linux distributions. onex can install any third party tool or any hacking tool for you.
Stars: ✭ 537 (-46.03%)
Impulse💣 Impulse Denial-of-service ToolKit
Stars: ✭ 538 (-45.93%)
ExhibitExhibit is a managed screensaver App for tvOS.
Stars: ✭ 19 (-98.09%)
JuiceMake your battery information a bit more interesting.
Stars: ✭ 688 (-30.85%)
WsshWSSH Is a tool for brute forcing servers that has port 22 open via ssh, wssh is probably the fastest ssh brute forcer available
Stars: ✭ 21 (-97.89%)
BlueEasily switch bluetooth peripherals between multiple macs
Stars: ✭ 18 (-98.19%)
StructXcode projects on steroids
Stars: ✭ 684 (-31.26%)
AtlasQuick SQLMap Tamper Suggester
Stars: ✭ 679 (-31.76%)
ChronicelOur super sweet hacker management system, built for HackTCNJ 2017+ | Used by [email protected] 2018!
Stars: ✭ 18 (-98.19%)
BrutalPayload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (-31.86%)
FiercephishFiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.
Stars: ✭ 960 (-3.52%)
BroxyAn HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (-8.34%)
Recon RavenReconnaissance tool of Penetration test & Bug Bounty
Stars: ✭ 18 (-98.19%)
WpscanWPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites.
Stars: ✭ 6,244 (+527.54%)
CorianderBuild NVIDIA® CUDA™ code for OpenCL™ 1.2 devices
Stars: ✭ 665 (-33.17%)
ThorSwitch the right application ASAP.
Stars: ✭ 660 (-33.67%)
BriskA macOS app for submitting radars
Stars: ✭ 659 (-33.77%)
Go Cpu LoadGenerate CPU load on Windows/Linux/Mac
Stars: ✭ 20 (-97.99%)
Os X YosemiteGTK theme based on the flat appearance of OS X 10.10 Yosemite
Stars: ✭ 17 (-98.29%)
TextractorExtracts text from video games and visual novels. Highly extensible.
Stars: ✭ 656 (-34.07%)
Awesome Swift Korean Lecture훌륭한 Swift 세션 동영상(강좌), 한글 자막있는 혹은 한국어 강의 정보 링크 모음 (Awesome Swift Korean lecture information)
Stars: ✭ 649 (-34.77%)
Nord Iterm2An arctic, north-bluish clean and elegant iTerm2 color scheme.
Stars: ✭ 651 (-34.57%)
JwtKotlin JWT 🔑 implementation (Json Web Token) as required by APNs 🔔 (Apple Push Notifications) or Sign in with Apple 🍏
Stars: ✭ 31 (-96.88%)
Linkliar🔗 Link-Layer MAC spoofing GUI for macOS
Stars: ✭ 885 (-11.06%)
BrutusA Python-powered exploitation framework and botnet.
Stars: ✭ 17 (-98.29%)
NetaddrA network address manipulation library for Python
Stars: ✭ 648 (-34.87%)