Passphrase WordlistPassphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (+355.74%)
Ssh MitmSSH man-in-the-middle tool
Stars: ✭ 1,328 (+988.52%)
M3m0M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 124 (+1.64%)
Linkedin2usernameOSINT Tool: Generate username lists for companies on LinkedIn
Stars: ✭ 504 (+313.11%)
Buffer overflowDon't let buffer overflows overflow your mind
Stars: ✭ 131 (+7.38%)
Oscp Prepmy oscp prep collection
Stars: ✭ 105 (-13.93%)
PidrilaPython Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (+2.46%)
ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (+16.39%)
QuiverQuiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (+14.75%)
PortiaPortia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
Stars: ✭ 154 (+26.23%)
WhonowA "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
Stars: ✭ 533 (+336.89%)
Awesome Shodan Queries🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
Stars: ✭ 2,758 (+2160.66%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+49.18%)
Awesome BbhtA bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (+55.74%)
Evil SsdpSpoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.
Stars: ✭ 204 (+67.21%)
Telegram RatWindows Remote Administration Tool via Telegram. Written in Python
Stars: ✭ 201 (+64.75%)
CameradarCameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+2174.59%)
Remote Desktop CachingThis tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: ✭ 171 (+40.16%)
BlackratBlackRAT - Java Based Remote Administrator Tool
Stars: ✭ 87 (-28.69%)
CaesarAn HTTP based RAT (Remote Administration Tool) that allows you to remotely control devices from your browser
Stars: ✭ 240 (+96.72%)
YAPSYet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-71.31%)
Icg AutoexploiterbotWordpress 🔥 Joomla 🔥 Drupal 🔥 OsCommerce 🔥 Prestashop 🔥 Opencart 🔥
Stars: ✭ 242 (+98.36%)
BlacknetFree advanced and modern Windows botnet with a nice and secure PHP panel.
Stars: ✭ 271 (+122.13%)
RatelRAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-0.82%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+250%)
Ghost👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (+155.74%)
Ctf NotesEverything needed for doing CTFs
Stars: ✭ 304 (+149.18%)
Gitjacker🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (+923.77%)
WebkillerTool Information Gathering Write By Python.
Stars: ✭ 300 (+145.9%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+213.11%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+3311.48%)
NmapIdiomatic nmap library for go developers
Stars: ✭ 391 (+220.49%)
PentestkitUseful tools and scripts during Penetration Testing engagements
Stars: ✭ 463 (+279.51%)
BlackwormBlack Worm Offical Repo
Stars: ✭ 80 (-34.43%)
WhatwebNext generation web scanner
Stars: ✭ 3,503 (+2771.31%)
ThefatratThefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+4772.13%)
BroxyAn HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (+647.54%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-40.98%)
Awesome HackingA collection of various awesome lists for hackers, pentesters and security researchers
Stars: ✭ 48,038 (+39275.41%)
Python RansomwarePython Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (-21.31%)
The Book Of Secret KnowledgeA collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
Stars: ✭ 55,582 (+45459.02%)
Github DorksFind leaked secrets via github search
Stars: ✭ 1,332 (+991.8%)
Spykeyboardkeylogger which sends us the data to our gmail.
Stars: ✭ 95 (-22.13%)
Burp Send ToAdds a customizable "Send to..."-context-menu to your BurpSuite.
Stars: ✭ 114 (-6.56%)
Punk.pyunix SSH post-exploitation 1337 tool
Stars: ✭ 107 (-12.3%)
Hg8045qPwning the Nuro issued Huawei HG8045Q
Stars: ✭ 107 (-12.3%)
ErodirA fast web directory/file enumeration tool written in Rust
Stars: ✭ 94 (-22.95%)
GreconYour Google Recon is Now Automated
Stars: ✭ 119 (-2.46%)
Linux Smart EnumerationLinux enumeration tool for pentesting and CTFs with verbosity levels
Stars: ✭ 1,956 (+1503.28%)
FormationvideoContenus et ressources de la chaîne FormationVidéo (YouTube)
Stars: ✭ 91 (-25.41%)
BadpodsA collection of manifests that will create pods with elevated privileges.
Stars: ✭ 93 (-23.77%)
Pentest GuidePenetration tests guide based on OWASP including test cases, resources and examples.
Stars: ✭ 1,316 (+978.69%)
Linsetmv1 2Linset is a WPA/WPA2 phishing tool (evil twin)
Stars: ✭ 105 (-13.93%)