LuciferA Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+542.55%)
Lo0sRLo0sR is a simple python Keylogger with many functions.
Stars: ✭ 48 (+2.13%)
fluxionWiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)
Stars: ✭ 115 (+144.68%)
octovyTrivy based vulnerability management service
Stars: ✭ 51 (+8.51%)
Web-TrackerStand alone program that Tracks/Logs all the opened websites in the Chrome Browser. Even incognito! *No need to install anything in browser*
Stars: ✭ 34 (-27.66%)
evildorkEvildork targeting your fiancee👁️
Stars: ✭ 46 (-2.13%)
smartbugsSmartBugs: A Framework to Analyze Solidity Smart Contracts
Stars: ✭ 222 (+372.34%)
termux-dockerTermux environment packaged as Docker image.
Stars: ✭ 284 (+504.26%)
PythonScrapyBasicSetupBasic setup with random user agents and IP addresses for Python Scrapy Framework.
Stars: ✭ 57 (+21.28%)
ochrona-cliA command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs
Stars: ✭ 46 (-2.13%)
SCANNER-INURLBRAdvanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.
Stars: ✭ 90 (+91.49%)
Master-BomberThe ultimate bomber be it mail, SMS or call. Anonymous mail and SMS sending options are also available :)
Stars: ✭ 197 (+319.15%)
HostPanicFind host header injections and perform Host Header attacks with other kind of bugs like web cache poissoning
Stars: ✭ 23 (-51.06%)
dep-scanFully open-source security audit for project dependencies based on known vulnerabilities and advisories. Supports both local repos and container images. Integrates with various CI environments such as Azure Pipelines, CircleCI and Google CloudBuild. No server required!
Stars: ✭ 346 (+636.17%)
BinV👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.
Stars: ✭ 25 (-46.81%)
CVE-2020-1611Juniper Junos Space (CVE-2020-1611) (PoC)
Stars: ✭ 25 (-46.81%)
AthenaTest your Security Skills, and Clean Code Development as a Pythonist, Hacker & Warrior 🥷🏻
Stars: ✭ 43 (-8.51%)
onionshareSecurely and anonymously share files, host websites, and chat with friends using the Tor network
Stars: ✭ 5,222 (+11010.64%)
uberduckyWireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)
Stars: ✭ 80 (+70.21%)
refluxionRefluxion -- MITM WPA attacks tool
Stars: ✭ 25 (-46.81%)
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (+170.21%)
hackXhackX for hackers of the professional and beginner
Stars: ✭ 21 (-55.32%)
LogMePwnA fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.
Stars: ✭ 362 (+670.21%)
KeyLyA powerfull and awesome Keylogger(Your keyboard and your mouse) realy helpfull for hackers! :-P (C/C++)
Stars: ✭ 17 (-63.83%)
CVE-2019-8449CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4
Stars: ✭ 66 (+40.43%)
tor-ip-changerrequest new identity every X seconds interval using TOR client
Stars: ✭ 233 (+395.74%)
vulristicsExtensible framework for analyzing publicly available information about vulnerabilities
Stars: ✭ 46 (-2.13%)
termux-goExamples of running Go on Android (via Termux AP)
Stars: ✭ 29 (-38.3%)
dheaterD(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (+202.13%)
battack©SMS BOMBING & CALL BOMBING TOOL FOR TERMUX
Stars: ✭ 336 (+614.89%)
PasTermGenera combos a base de Keywords con Termux
Stars: ✭ 36 (-23.4%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+89.36%)
onionize-dockerTor v3 onion services (hidden services) for Docker containers
Stars: ✭ 61 (+29.79%)
gvm-toolsRemote control your Greenbone Community Edition or Greenbone Enterprise Appliance
Stars: ✭ 143 (+204.26%)
Terminhack👨💻 Impress your friends by pretending to be a real hacker
Stars: ✭ 73 (+55.32%)
WPCrackerWordPress pentest tool
Stars: ✭ 34 (-27.66%)
InvizibleAndroid application for Internet privacy and security
Stars: ✭ 251 (+434.04%)
peeling-onionsA repository to store Deep Web (onion domain) crawler, scraper, and NLP tools for Tor network.
Stars: ✭ 18 (-61.7%)
APSoft-Web-Scanner-v2Powerful dork searcher and vulnerability scanner for windows platform
Stars: ✭ 96 (+104.26%)
sudohulktry privilege escalation changing sudo command
Stars: ✭ 114 (+142.55%)
TermuxPRootSetupTermuxPRoot.sh 📲 shall install Linux distributions in Termux on Android and Chrome. This setup script will attempt to set Linux distributions up in your Termux environment.
Stars: ✭ 59 (+25.53%)
cloudrasp-log4j2一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.
Stars: ✭ 105 (+123.4%)
TorghostngTorghostNG - Make your internet traffic anonymized through Tor network and Privoxy. Rewritten from TorGhost with Python 3
Stars: ✭ 241 (+412.77%)
trolotrolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-4.26%)
Torunofficial git repo -- report bugs/issues/pull requests on https://gitlab.torproject.org/ --
Stars: ✭ 2,809 (+5876.6%)
peniotPENIOT: Penetration Testing Tool for IoT
Stars: ✭ 164 (+248.94%)
Tenable.io-SDK-for-PythonTenable.io SDK offers a scalable and safe way to integrate with the Tenable.io platform.
Stars: ✭ 83 (+76.6%)
youtifyInstalls and configures youtube-dl and spotdl for music and videos downloading in android termux
Stars: ✭ 21 (-55.32%)
torchestratorSpin up Tor containers and then proxy HTTP requests via these Tor instances
Stars: ✭ 32 (-31.91%)
termux-elf-cleanerUtility to remove unused ELF sections causing warnings.
Stars: ✭ 145 (+208.51%)
turing-machineA Python program implementing and exploiting the Minsky Turing machine considered in the paper "Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine" as per CVE-2021-32471 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32471)
Stars: ✭ 70 (+48.94%)