WebwhatsappbotCore to automatize whatsapp - working 11/2018
Stars: ✭ 59 (-51.64%)
Inferno🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-13.93%)
Mitm Scripts🔄 A collection of mitmproxy inline scripts
Stars: ✭ 109 (-10.66%)
StegextractDetect hidden files and text in images
Stars: ✭ 79 (-35.25%)
Androl4bA Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
Stars: ✭ 908 (+644.26%)
PapersPapers about known hacking, security, hardware, software, computer, network and other ressources.
Stars: ✭ 58 (-52.46%)
RedcloudAutomated Red Team Infrastructure deployement using Docker
Stars: ✭ 551 (+351.64%)
Apac ConferencesA community contributed consolidated list of InfoSec meetups in the Asia Pacific region.
Stars: ✭ 90 (-26.23%)
Impulse💣 Impulse Denial-of-service ToolKit
Stars: ✭ 538 (+340.98%)
GofingerprintGoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fingerprints.
Stars: ✭ 120 (-1.64%)
Onexonex is a hacking tool installer and package manager for hackers. Onex is a library of all hacking tools for Termux and other Linux distributions. onex can install any third party tool or any hacking tool for you.
Stars: ✭ 537 (+340.16%)
Dll hook RsRust code to show how hooking in rust with a dll works.
Stars: ✭ 57 (-53.28%)
Redteam vul红队作战中比较常遇到的一些重点系统漏洞整理。
Stars: ✭ 1,271 (+941.8%)
HacktheworldAn Python Script For Generating Payloads that Bypasses All Antivirus so far .
Stars: ✭ 527 (+331.97%)
WhitehatInformation about my experiences on ethical hacking 💀
Stars: ✭ 54 (-55.74%)
A2svAuto Scanning to SSL Vulnerability
Stars: ✭ 524 (+329.51%)
PakcrackAll in 1 Pakisthani Facebook Cloner [ 7/8/9/10/11 DIGIT ]
Stars: ✭ 105 (-13.93%)
Autoblue Ms17 010This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010
Stars: ✭ 522 (+327.87%)
SpellbookMicro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-56.56%)
Logkeys📝 ⌨️ A GNU/Linux keylogger that works!
Stars: ✭ 518 (+324.59%)
RoadmapGitBook: OSCP RoadMap
Stars: ✭ 89 (-27.05%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+317.21%)
ShellshockhunterIt's a simple tool for test vulnerability shellshock
Stars: ✭ 52 (-57.38%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-35.25%)
Babysploit👶 BabySploit Beginner Pentesting Toolkit/Framework Written in Python 🐍
Stars: ✭ 883 (+623.77%)
Commando VmComplete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution.
[email protected] Stars: ✭ 5,030 (+4022.95%)
Pythempentest framework
Stars: ✭ 1,060 (+768.85%)
ReconpiReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.
Stars: ✭ 490 (+301.64%)
Pentest NotesCollection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
Stars: ✭ 89 (-27.05%)
DockerscanDocker security analysis & hacking tools
Stars: ✭ 1,046 (+757.38%)
Awesome HackingA curated list of awesome Hacking tutorials, tools and resources
Stars: ✭ 7,756 (+6257.38%)
YamsA collection of Ansible roles for automating infosec builds.
Stars: ✭ 98 (-19.67%)
Webhackersweapons⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 1,205 (+887.7%)
Drv3 Tools(Not actively maintained, use DRV3-Sharp) Tools for extracting and re-injecting files for Danganronpa V3 for PC.
Stars: ✭ 13 (-89.34%)
InstainsaneMulti-threaded Instagram Brute Forcer (100 attemps at once)
Stars: ✭ 475 (+289.34%)
Ble Security Attack Defence✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Stars: ✭ 88 (-27.87%)
Search That Hash🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+281.97%)
AwsbucketdumpSecurity Tool to Look For Interesting Files in S3 Buckets
Stars: ✭ 1,021 (+736.89%)
ChimeraChimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (+279.51%)
Kubernetes GoatKubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
Stars: ✭ 868 (+611.48%)
Shodan DorksDorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (-3.28%)
ShuffleWebShell Backdoor Framework
Stars: ✭ 11 (-90.98%)
FawkesFawkes is a tool to search for targets vulnerable to SQL Injection. Performs the search using Google search engine.
Stars: ✭ 108 (-11.48%)
Ecommerce Website Security ChecklistList of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built into the Techinical Specific Document, or will be checked in the Security testing phases.
Stars: ✭ 98 (-19.67%)
GithacktoolsThe best Hacking and PenTesting tools installer on the world
Stars: ✭ 78 (-36.07%)
DracnmapDracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+605.74%)
Rat Via TelegramWindows Remote Administration Tool via Telegram
Stars: ✭ 453 (+271.31%)
DroidjackEste troyano para Android es uno de los más completos. Con él vamos a poder tener acceso a remoto a todo el dispositivo infectado, desde la agenda, las llamadas y los SMS hasta el micrófono y las cámaras del smartphone. Todo.
Stars: ✭ 44 (-63.93%)
VanquishVanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Stars: ✭ 449 (+268.03%)
VailynA phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-15.57%)
YsfYSF Server Functions
Stars: ✭ 77 (-36.89%)
Ripv6Random IPv6 - circumvents restrictive IP address-based filter and blocking rules
Stars: ✭ 10 (-91.8%)
PhonesploitUsing open Adb ports we can exploit a Andriod Device
Stars: ✭ 854 (+600%)