ScriptsScripts I use during pentest engagements.
Stars: ✭ 834 (+1934.15%)
IptvCollection of publicly available IPTV channels from all over the world
Stars: ✭ 45,053 (+109785.37%)
PhonesploitUsing open Adb ports we can exploit a Andriod Device
Stars: ✭ 854 (+1982.93%)
TrapePeople tracker on the Internet: OSINT analysis and research tool by Jose Pino
Stars: ✭ 6,753 (+16370.73%)
Tic TacClient not paid ? This is the solution of your problem
Stars: ✭ 29 (-29.27%)
ExhibitExhibit is a managed screensaver App for tvOS.
Stars: ✭ 19 (-53.66%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+18807.32%)
ShuffleWebShell Backdoor Framework
Stars: ✭ 11 (-73.17%)
InterlaceEasily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+1753.66%)
Reverse EngineeringThis repository contains some of the executables that I've cracked.
Stars: ✭ 29 (-29.27%)
Crazy WeekendMengobati rasa ingin tahu atau kadang hanya iseng
Stars: ✭ 9 (-78.05%)
BrutexAutomatically brute force all services running on a target.
Stars: ✭ 974 (+2275.61%)
CatchmeCatchME - WiFi Fun Box "Having Fun with ESP8266"
Stars: ✭ 28 (-31.71%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+2087.8%)
ReconftwreconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+2275.61%)
TorbotDark Web OSINT Tool
Stars: ✭ 821 (+1902.44%)
WsshWSSH Is a tool for brute forcing servers that has port 22 open via ssh, wssh is probably the fastest ssh brute forcer available
Stars: ✭ 21 (-48.78%)
Androidsdk🐳 Full-fledged Android SDK Docker Image
Stars: ✭ 776 (+1792.68%)
Spytrojan keylogger[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-21.95%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+1763.41%)
Drv3 Tools(Not actively maintained, use DRV3-Sharp) Tools for extracting and re-injecting files for Danganronpa V3 for PC.
Stars: ✭ 13 (-68.29%)
EpisoderTV episode reminder
Stars: ✭ 11 (-73.17%)
Show DownCommand line utility to download latest episodes of TV show just by typing name of show. Also we can schedule to automatically download latest episodes of TV shows.
Stars: ✭ 29 (-29.27%)
DracnmapDracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+2000%)
V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+1965.85%)
SpeedhackSpeedhack coded in C++, inspired by Cheat Engine's own speedhack.
Stars: ✭ 29 (-29.27%)
Pwn jenkinsNotes about attacking Jenkins servers
Stars: ✭ 841 (+1951.22%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+2319.51%)
NakamoriNakamori is Kodi addon that use Shoko (known as Japanese Media Manager (JMM)) Server as back-end for metadata information.
Stars: ✭ 24 (-41.46%)
FloxSelf Hosted Movie, Series and Anime Watch List
Stars: ✭ 901 (+2097.56%)
100 Days Of Swiftui👨💻👩💻100 Days Of SwiftUI free course from Hacking with Swift. 👨💻👩💻
Stars: ✭ 35 (-14.63%)
ChronicelOur super sweet hacker management system, built for HackTCNJ 2017+ | Used by [email protected] 2018!
Stars: ✭ 18 (-56.1%)
DuckietvA web application built with AngularJS to track your favorite tv-shows with semi-automagic torrent integration
Stars: ✭ 942 (+2197.56%)
Jsql InjectionjSQL Injection is a Java application for automatic SQL database injection.
Stars: ✭ 891 (+2073.17%)
Arpspoof arpspoof for macOS - intercept packets on a switched LAN
Stars: ✭ 40 (-2.44%)
Ciphey⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Stars: ✭ 9,116 (+22134.15%)
TaikTool hack Dark FB tanpa lisensi
Stars: ✭ 21 (-48.78%)
Pi Pwnbox RogueapHomemade Pwnbox 🚀 / Rogue AP 📡 based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap 💡
Stars: ✭ 798 (+1846.34%)
Badusb botnet👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-21.95%)
PrivescA collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+1817.07%)
BroxyAn HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (+2124.39%)
SimplyemailEmail recon made fast and easy, with a framework to build on
Stars: ✭ 779 (+1800%)
Swift KeyloggerKeylogger for mac written in Swift using HID
Stars: ✭ 995 (+2326.83%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+1790.24%)
Awesome HackingA curated list of awesome Hacking tutorials, tools and resources
Stars: ✭ 7,756 (+18817.07%)
VhostscanA virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+1770.73%)
FiercephishFiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.
Stars: ✭ 960 (+2241.46%)
PowerladonLadon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Stars: ✭ 39 (-4.88%)
PxenumA shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-26.83%)
Kubernetes GoatKubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
Stars: ✭ 868 (+2017.07%)