All Projects → Taik → Similar Projects or Alternatives

525 Open source projects that are alternatives of or similar to Taik

Hackingtool
ALL IN ONE Hacking Tool For Hackers
Stars: ✭ 7,521 (+35714.29%)
Mutual labels:  hacking
Brutal
Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (+3128.57%)
Mutual labels:  hacking
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+36814.29%)
Mutual labels:  hacking
Ics Security Tools
Tools, tips, tricks, and more for exploring ICS Security.
Stars: ✭ 749 (+3466.67%)
Mutual labels:  hacking
Nsablocklist
HOSTS file and research project to block all known NSA / GCHQ / C.I.A. / F.B.I. spying server
Stars: ✭ 630 (+2900%)
Mutual labels:  hacking
Scripts
Scripts I use during pentest engagements.
Stars: ✭ 834 (+3871.43%)
Mutual labels:  hacking
Keychaincracker
macOS keychain cracking tool
Stars: ✭ 693 (+3200%)
Mutual labels:  hacking
V3n0m Scanner
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+3933.33%)
Mutual labels:  hacking
Phishing Frenzy
Ruby on Rails Phishing Framework
Stars: ✭ 643 (+2961.9%)
Mutual labels:  hacking
Trape
People tracker on the Internet: OSINT analysis and research tool by Jose Pino
Stars: ✭ 6,753 (+32057.14%)
Mutual labels:  hacking
Packer Fuzzer
Packer Fuzzer is a fast and efficient scanner for security detection of websites constructed by javascript module bundler such as Webpack.
Stars: ✭ 753 (+3485.71%)
Mutual labels:  hacking
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+2776.19%)
Mutual labels:  hacking
Xattacker
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+4171.43%)
Mutual labels:  hacking
Naive Hashcat
Crack password hashes without the fuss 🐈
Stars: ✭ 726 (+3357.14%)
Mutual labels:  hacking
Dracnmap
Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+4000%)
Mutual labels:  hacking
Sublert
Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (+3228.57%)
Mutual labels:  hacking
Torbot
Dark Web OSINT Tool
Stars: ✭ 821 (+3809.52%)
Mutual labels:  hacking
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+3123.81%)
Mutual labels:  hacking
Drv3 Tools
(Not actively maintained, use DRV3-Sharp) Tools for extracting and re-injecting files for Danganronpa V3 for PC.
Stars: ✭ 13 (-38.1%)
Mutual labels:  hacking
Textractor
Extracts text from video games and visual novels. Highly extensible.
Stars: ✭ 656 (+3023.81%)
Mutual labels:  hacking
Androidsdk
🐳 Full-fledged Android SDK Docker Image
Stars: ✭ 776 (+3595.24%)
Mutual labels:  hacking
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+2928.57%)
Mutual labels:  hacking
Pwn jenkins
Notes about attacking Jenkins servers
Stars: ✭ 841 (+3904.76%)
Mutual labels:  hacking
Penetration Testing Tools
A collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (+2823.81%)
Mutual labels:  hacking
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+3538.1%)
Mutual labels:  hacking
Resources For Beginner Bug Bounty Hunters
A list of resources for those interested in getting started in bug bounties
Stars: ✭ 7,185 (+34114.29%)
Mutual labels:  hacking
Charlatano
Proves JVM cheats are viable on native games, and demonstrates the longevity against anti-cheat signature detection systems
Stars: ✭ 599 (+2752.38%)
Mutual labels:  hacking
Chronicel
Our super sweet hacker management system, built for HackTCNJ 2017+ | Used by [email protected] 2018!
Stars: ✭ 18 (-14.29%)
Mutual labels:  hacking
Redteamtools
记录自己编写、修改的部分工具
Stars: ✭ 752 (+3480.95%)
Mutual labels:  hacking
Shuffle
WebShell Backdoor Framework
Stars: ✭ 11 (-47.62%)
Mutual labels:  hacking
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+3352.38%)
Mutual labels:  hacking
Jsql Injection
jSQL Injection is a Java application for automatic SQL database injection.
Stars: ✭ 891 (+4142.86%)
Mutual labels:  hacking
Sql Injection Payload List
🎯 SQL Injection Payload List
Stars: ✭ 716 (+3309.52%)
Mutual labels:  hacking
Awesome Hacking
A curated list of awesome Hacking tutorials, tools and resources
Stars: ✭ 7,756 (+36833.33%)
Mutual labels:  hacking
Unity Game Hacking
A guide for hacking unity games
Stars: ✭ 710 (+3280.95%)
Mutual labels:  hacking
Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Stars: ✭ 9,116 (+43309.52%)
Mutual labels:  hacking
K8cscan
K8Cscan大型内网渗透自定义插件化扫描神器,包含信息收集、网络资产、漏洞扫描、密码爆破、漏洞利用,程序采用多线程批量扫描大型内网多个IP段C段主机,目前插件包含: C段旁注扫描、子域名扫描、Ftp密码爆破、Mysql密码爆破、Oracle密码爆破、MSSQL密码爆破、Windows/Linux系统密码爆破、存活主机扫描、端口扫描、Web信息探测、操作系统版本探测、Cisco思科设备扫描等,支持调用任意外部程序或脚本,支持Cobalt Strike联动
Stars: ✭ 693 (+3200%)
Mutual labels:  hacking
Phonesploit
Using open Adb ports we can exploit a Andriod Device
Stars: ✭ 854 (+3966.67%)
Mutual labels:  hacking
Emagnet
Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password together from recent uploads from https://pastebin.com. Bruteforce support for spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts
Stars: ✭ 688 (+3176.19%)
Mutual labels:  hacking
Pi Pwnbox Rogueap
Homemade Pwnbox 🚀 / Rogue AP 📡 based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap 💡
Stars: ✭ 798 (+3700%)
Mutual labels:  hacking
Atlas
Quick SQLMap Tamper Suggester
Stars: ✭ 679 (+3133.33%)
Mutual labels:  hacking
Broxy
An HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (+4242.86%)
Mutual labels:  hacking
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+34404.76%)
Mutual labels:  hacking
Privesc
A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+3642.86%)
Mutual labels:  hacking
Jok3r
Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (+2971.43%)
Mutual labels:  hacking
Crazy Weekend
Mengobati rasa ingin tahu atau kadang hanya iseng
Stars: ✭ 9 (-57.14%)
Mutual labels:  hacking
Security whitepapers
Collection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQLi
Stars: ✭ 644 (+2966.67%)
Mutual labels:  hacking
Simplyemail
Email recon made fast and easy, with a framework to build on
Stars: ✭ 779 (+3609.52%)
Mutual labels:  hacking
Habu
Hacking Toolkit
Stars: ✭ 635 (+2923.81%)
Mutual labels:  hacking
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+4042.86%)
Mutual labels:  hacking
Reconspider
🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
Stars: ✭ 621 (+2857.14%)
Mutual labels:  hacking
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+3590.48%)
Mutual labels:  hacking
Attifyos
Attify OS - Distro for pentesting IoT devices
Stars: ✭ 615 (+2828.57%)
Mutual labels:  hacking
Awesome Ethical Hacking Resources
🔗 All the resources I could find for learning Ethical Hacking and Penetration Testing.
Stars: ✭ 933 (+4342.86%)
Mutual labels:  hacking
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+3552.38%)
Mutual labels:  hacking
Wssh
WSSH Is a tool for brute forcing servers that has port 22 open via ssh, wssh is probably the fastest ssh brute forcer available
Stars: ✭ 21 (+0%)
Mutual labels:  hacking
Pythonhackingbook1
Python黑客编程之极速入门
Stars: ✭ 882 (+4100%)
Mutual labels:  hacking
Kubernetes Goat
Kubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
Stars: ✭ 868 (+4033.33%)
Mutual labels:  hacking
Mirror Textfiles.com
TextFiles.com mirror
Stars: ✭ 23 (+9.52%)
Mutual labels:  hacking
Interlace
Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+3519.05%)
Mutual labels:  hacking
1-60 of 525 similar projects