Socialbox TermuxSocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By init__0 for termux on android
Stars: ✭ 324 (-94.26%)
winallenumThis powershell script has got to run in remote hacked windows host, even for pivoting
Stars: ✭ 13 (-99.77%)
Sec ToolsDocker images for infosec tools
Stars: ✭ 135 (-97.61%)
PowerladonLadon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Stars: ✭ 39 (-99.31%)
PayloadsallthethingsA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+482.98%)
PatatorPatator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
Stars: ✭ 2,792 (-50.54%)
d00rSimple directory brute-force tool written with python.
Stars: ✭ 35 (-99.38%)
goLazagneGo library for credentials recovery
Stars: ✭ 177 (-96.86%)
wifi-sploitWi-Fi sploit is a password cracker for an admin page of a Wi-Fi Router.
Stars: ✭ 29 (-99.49%)
NightingaleIt's a Docker Environment for pentesting which having all the required tool for VAPT.
Stars: ✭ 119 (-97.89%)
OsmedeusFully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (-39.93%)
QnsmQNSM is network security monitoring framework based on DPDK.
Stars: ✭ 334 (-94.08%)
cracker-ngZIP cracker, CCRYPT cracker, and others to come.
Stars: ✭ 60 (-98.94%)
IoxTool for port forwarding & intranet proxy
Stars: ✭ 411 (-92.72%)
ViPERWeb App Pen Tester (Web Interface)
Stars: ✭ 19 (-99.66%)
CitadelCollection of pentesting scripts
Stars: ✭ 333 (-94.1%)
what-vpnIdentify servers running various SSL VPNs based on protocol-specific behaviors
Stars: ✭ 24 (-99.57%)
Colabcat😺 Running Hashcat on Google Colab with session backup and restore.
Stars: ✭ 407 (-92.79%)
quick-recon.pyDo some quick reconnaissance on a domain-based web-application
Stars: ✭ 13 (-99.77%)
CTF-WriteupsRepository of my CTF writeups
Stars: ✭ 25 (-99.56%)
DnsliveryEasy files and payloads delivery over DNS
Stars: ✭ 332 (-94.12%)
FacebookBugFacebook Write-ups, PoC, and exploitation codes:
Stars: ✭ 28 (-99.5%)
ORtesterOpen Redirect scanner - (out of date)
Stars: ✭ 24 (-99.57%)
CoogleA shot-for-shot remake of the Google Login Page.
Stars: ✭ 34 (-99.4%)
PivotsuiteNetwork Pivoting Toolkit
Stars: ✭ 329 (-94.17%)
serverHashtopolis - A Hashcat wrapper for distributed hashcracking
Stars: ✭ 954 (-83.1%)
Commando VmComplete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution.
[email protected] Stars: ✭ 5,030 (-10.89%)
SecurityExplainedSecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to create informational content in multiple formats and share with the community to enable knowledge creation and learning.
Stars: ✭ 301 (-94.67%)
ApkurlgrepExtract endpoints from APK files
Stars: ✭ 405 (-92.83%)
juice-shop-ctfCapture-the-Flag (CTF) environment setup tools for OWASP Juice Shop supporting CTFd, FBCTF and RootTheBox
Stars: ✭ 287 (-94.92%)
Langhost👻 A LAN dropbox chatbot controllable via Telegram
Stars: ✭ 324 (-94.26%)
gonidsgonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that you can join on Google Groups: https://groups.google.com/forum/#!topic/gonids/
Stars: ✭ 140 (-97.52%)
ReconnoteWeb Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
Stars: ✭ 322 (-94.3%)
BrutusBotnet targeting Windows machines written entirely in Python & open source security project.
Stars: ✭ 37 (-99.34%)
penetration testing🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.
Stars: ✭ 57 (-98.99%)
OneforallOneForAll是一款功能强大的子域收集工具
Stars: ✭ 4,202 (-25.56%)
wertherAn Identity Provider for ORY Hydra over LDAP
Stars: ✭ 103 (-98.18%)
Bruteforce ListsSome files for bruteforcing certain things.
Stars: ✭ 320 (-94.33%)
SimpleKeyloggerSimple Keylogger with smtp to send emails on your account using python works on linux and Windows
Stars: ✭ 32 (-99.43%)
WireBugWireBug is a toolset for Voice-over-IP penetration testing
Stars: ✭ 142 (-97.48%)
network-pipelineNetwork traffic data pipeline for real-time predictions and building datasets for deep neural networks
Stars: ✭ 36 (-99.36%)
0d1nTool for automating customized attacks against web applications. Fully made in C language with pthreads, it has fast performance.
Stars: ✭ 506 (-91.04%)
HTB-writeupPassword-protected writeups of HTB platform (challenges and boxes) https://cesena.github.io/
Stars: ✭ 21 (-99.63%)
linklink is a command and control framework written in rust
Stars: ✭ 345 (-93.89%)
Censys Subdomain Finder⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.
Stars: ✭ 402 (-92.88%)
InjuredandroidA vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
Stars: ✭ 317 (-94.38%)
ShellBotAn advanced reverse shell written in Python3.
Stars: ✭ 20 (-99.65%)
AirgeddonThis is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (-32.15%)
PowEnumExecutes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.
Stars: ✭ 62 (-98.9%)
GosintOSINT Swiss Army Knife
Stars: ✭ 401 (-92.9%)
pytorch tempestMy repo for training neural nets using pytorch-lightning and hydra
Stars: ✭ 124 (-97.8%)