ZenFind emails of Github users
Stars: ✭ 343 (-41.37%)
reverieAutomated Pentest Tools Designed For Parrot Linux
Stars: ✭ 77 (-86.84%)
WatchADAD Security Intrusion Detection System
Stars: ✭ 967 (+65.3%)
samba4-l1🔴 Curso GRÁTIS SAMBA 4 Level 1 REPOSITÓRIO CONGELADO - Esse repositório não irá mais receber atualizações.
Stars: ✭ 60 (-89.74%)
GotandaGotanda is browser Web Extension for OSINT.
Stars: ✭ 149 (-74.53%)
httpx authAuthentication classes to be used with httpx
Stars: ✭ 59 (-89.91%)
ADMMutateClassic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia.edu/sites/default/files/ccs07poly.pdf :) If I ever port this to 64 or implement a few other suggestions (sorry I lost ppc code version contributed) it will be orders of magnitude more difficult to spot, so I h…
Stars: ✭ 69 (-88.21%)
Socialbox TermuxSocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By init__0 for termux on android
Stars: ✭ 324 (-44.62%)
orbitaldumpA simple multi-threaded distributed SSH brute-forcing tool written in Python
Stars: ✭ 405 (-30.77%)
Horus-EyeJust Simple Code To Play With Android Payloads (;
Stars: ✭ 54 (-90.77%)
Damn Vulnerable Graphql ApplicationDamn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
Stars: ✭ 567 (-3.08%)
FisherManCLI program that collects information from facebook user profiles via Selenium.
Stars: ✭ 117 (-80%)
GmailBruterV2Simple tool written in python3 to perform limited brute-force attacks on gmail accounts.
Stars: ✭ 264 (-54.87%)
BillcipherInformation Gathering tool for a Website or IP address
Stars: ✭ 332 (-43.25%)
FazPortFazPort is an advanced Perl Port Scanner. Scan and Detect open port in every website(s) you want.
Stars: ✭ 16 (-97.26%)
BFSGBFSG - BruteForce String Generator 😾
Stars: ✭ 16 (-97.26%)
GoPhish-TemplatesGoPhish Templates that I have retired and/or templates I've recreated.
Stars: ✭ 76 (-87.01%)
JusttryharderJustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)
Stars: ✭ 450 (-23.08%)
mec-ngpentest toolbox
Stars: ✭ 28 (-95.21%)
xmlrpc-bruteforcerAn XMLRPC brute forcer targeting Wordpress written in Python 3. (DISCONTINUED)
Stars: ✭ 62 (-89.4%)
IRIS🔍 IRIS: An open-source intelligence framework
Stars: ✭ 79 (-86.5%)
Ssh AuditorThe best way to scan for weak ssh passwords on your network
Stars: ✭ 516 (-11.79%)
k8s-idm-labKubernetes Identity Management Lab
Stars: ✭ 20 (-96.58%)
hathiA dictionary attack tool for PostgreSQL and MSSQL
Stars: ✭ 33 (-94.36%)
HamburglarHamburglar -- collect useful information from urls, directories, and files
Stars: ✭ 321 (-45.13%)
Learning-Node.js-SecurityA Collection of articles, videos, blogs, talks and other materials on Node.js Security
Stars: ✭ 25 (-95.73%)
gentle-forceBrute-force, error and request rate limiting
Stars: ✭ 45 (-92.31%)
VanquishVanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Stars: ✭ 449 (-23.25%)
gosintGosint is a distributed asset information collection and vulnerability scanning platform
Stars: ✭ 344 (-41.2%)
NarthexModular personalized dictionary generator.
Stars: ✭ 156 (-73.33%)
VajraVajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (-54.02%)
urlbruteDirectory/Subdomain scanner developed in GoLang.
Stars: ✭ 37 (-93.68%)
go-adalunofficial Active Directory Authentication Library for go
Stars: ✭ 14 (-97.61%)
PayloadsPayload Arsenal for Pentration Tester and Bug Bounty Hunters
Stars: ✭ 421 (-28.03%)
Gmail-HackGmail account using brute force attack
Stars: ✭ 69 (-88.21%)
Brute-Force-Password-CrackerA brute force attacker with packages for development in Python 3, Kotlin, C#, Go, Vala, and C++.
Stars: ✭ 29 (-95.04%)
active-directory-lookupSimplest Java API (and CLI) for authenticating and searching in Active Directory
Stars: ✭ 15 (-97.44%)
cdCloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities like SQL Injection, Cross-site scripting and other exploitable vulnerabilities.
Stars: ✭ 33 (-94.36%)
hinjectHost Header Injection Checker
Stars: ✭ 64 (-89.06%)
PSPasswordExpiryNotificationsFollowing PowerShell Module provides different approach to scheduling password notifications for expiring Active Directory based accounts. While most of the scripts require knowledge on HTML... this one is just one config file and a bit of tingling around with texts. Whether this is good or bad it's up to you to decide. I do plan to add an optio…
Stars: ✭ 38 (-93.5%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (-27.01%)
BusterAn advanced tool for email reconnaissance
Stars: ✭ 387 (-33.85%)
DisruptionTerraform script to deploy AD-based environment on Azure
Stars: ✭ 34 (-94.19%)
AlfredA friendly Toolkit for Beginner CTF players
Stars: ✭ 39 (-93.33%)
smbauditPerform various SMB-related attacks, particularly useful for testing large Active Directory environments.
Stars: ✭ 31 (-94.7%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-89.57%)
Red-Rabbit-V4The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate other peoples tools like the aircrack suite or the wifite framework, it rather has its own code and is raw source with over 270+ options. This framework might just be your everyday key to your workflow
Stars: ✭ 123 (-78.97%)
Upash🔒Unified API for password hashing algorithms
Stars: ✭ 484 (-17.26%)
FYIMy last 10 year's material collection on offensive & defensive security, GRC, risk management, technical security guidelines and much more.
Stars: ✭ 194 (-66.84%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-91.79%)