Pythempentest framework
Stars: ✭ 1,060 (+488.89%)
EvilurlGenerate unicode evil domains for IDN Homograph Attack and detect them.
Stars: ✭ 654 (+263.33%)
SocialfishPhishing Tool & Information Collector
Stars: ✭ 2,522 (+1301.11%)
Awesome Windows Red Team A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams
Stars: ✭ 308 (+71.11%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+528.89%)
DnsmorphDomain name permutation engine written in Go
Stars: ✭ 148 (-17.78%)
MiteruAn experimental phishing kit detection tool
Stars: ✭ 125 (-30.56%)
C2hackC2Hack, sharing tips and tricks for pentesters
Stars: ✭ 124 (-31.11%)
PasscatPasswords Recovery Tool
Stars: ✭ 164 (-8.89%)
DragnetYour Social Engineering Sidekick
Stars: ✭ 139 (-22.78%)
King Phisher TemplatesTemplates for the King Phisher open source phishing campaign toolkit.
Stars: ✭ 119 (-33.89%)
OscprepoA list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and reading material in 'BookmarkList' CherryTree. Reconscan Py2 and Py3. Custom ISO building.
Stars: ✭ 1,916 (+964.44%)
HookishHooks in to interesting functions and helps reverse the web app faster.
Stars: ✭ 129 (-28.33%)
PidrilaPython Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (-30.56%)
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (-20%)
Ssrf TestingSSRF (Server Side Request Forgery) testing resources
Stars: ✭ 1,718 (+854.44%)
Shodan DorksDorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (-34.44%)
Pentestsome pentest scripts & tools by [email protected]
Stars: ✭ 136 (-24.44%)
Phish CollectPython script to hunt phishing kits
Stars: ✭ 113 (-37.22%)
Analyzer🔍 Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: ✭ 108 (-40%)
Xssor2XSS'OR - Hack with JavaScript.
Stars: ✭ 1,969 (+993.89%)
WavecrackWavestone's web interface for password cracking with hashcat
Stars: ✭ 135 (-25%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+5640.56%)
Evil WinrmThe ultimate WinRM shell for hacking/pentesting
Stars: ✭ 2,251 (+1150.56%)
SharkFuture Of Phishing With less delay
Stars: ✭ 150 (-16.67%)
PentaOpen source all-in-one CLI tool to semi-automate pentesting.
Stars: ✭ 130 (-27.78%)
PymetaPymeta will search the web for files on a domain to download and extract metadata. This technique can be used to identify: domains, usernames, software/version numbers and naming conventions.
Stars: ✭ 170 (-5.56%)
JwtxploiterA tool to test security of json web token
Stars: ✭ 130 (-27.78%)
OpensquatDetection of phishing domains and domain squatting. Supports permutations such as homograph attack, typosquatting and bitsquatting.
Stars: ✭ 149 (-17.22%)
Cloud BusterA Cloudflare resolver that works
Stars: ✭ 128 (-28.89%)
TuktukTool for catching and logging different types of requests.
Stars: ✭ 174 (-3.33%)
PhishingkittrackerLet's track phishing kits to give to research community raw material to study !
Stars: ✭ 126 (-30%)
StuffUnsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
Stars: ✭ 146 (-18.89%)
Nraynray distributed port scanner
Stars: ✭ 125 (-30.56%)
AboutsecurityA list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-7.78%)
PurplecloudAn Infrastructure as Code (IaC) deployment of a small Active Directory pentest lab in the cloud. The deployment simulates a semi-realistic corporate enterprise Active Directory with a DC and endpoints. Purple team goals include blue team detection capabilities and R&D for detection engineering new approaches.
Stars: ✭ 122 (-32.22%)
Ntlmscanscan for NTLM directories
Stars: ✭ 141 (-21.67%)
EtherscamdbKeep track of all current ethereum scams in a large database
Stars: ✭ 121 (-32.78%)
PhishingkithunterFind phishing kits which use your brand/organization's files and image.
Stars: ✭ 177 (-1.67%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+982.78%)
Recreator PhishingPROFESSIONAL TOOL ORIENTED IN THE RECREATION OF PHISHING WEBSITES SCENARIOS
Stars: ✭ 136 (-24.44%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-35.56%)
AsnlookupLeverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-9.44%)
VulrecVulnerability Recurrence:漏洞复现记录
Stars: ✭ 109 (-39.44%)
Sec ToolsDocker images for infosec tools
Stars: ✭ 135 (-25%)
CatnipCat-Nip Automated Basic Pentest Tool - Designed For Kali Linux
Stars: ✭ 108 (-40%)
TechnowloggerTechNowLogger is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info
Stars: ✭ 172 (-4.44%)
OwtfOffensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.org https://twitter.com/owtfp
Stars: ✭ 1,516 (+742.22%)
O365sprayUsername enumeration and password spraying tool aimed at Microsoft O365.
Stars: ✭ 133 (-26.11%)
PortiaPortia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
Stars: ✭ 154 (-14.44%)
Awesome VulnerableA curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.
Stars: ✭ 133 (-26.11%)
Hacker ContainerContainer with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-41.67%)
Collection DocumentCollection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+670.56%)
Blackphish🔱 [ Phishing Made Easy ] 🔱 (In Beta)
Stars: ✭ 133 (-26.11%)