VirtualsecconsAn ongoing list of virtual cybersecurity conferences.
Stars: ✭ 113 (-42.35%)
Termux OsAll in One Termux Os..!! (New)
Stars: ✭ 150 (-23.47%)
CtfrAbusing Certificate Transparency logs for getting HTTPS websites subdomains.
Stars: ✭ 1,535 (+683.16%)
Remote Desktop CachingThis tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: ✭ 171 (-12.76%)
FawkesFawkes is a tool to search for targets vulnerable to SQL Injection. Performs the search using Google search engine.
Stars: ✭ 108 (-44.9%)
JalescJust Another Linux Enumeration Script: A Bash script for locally enumerating a compromised Linux box
Stars: ✭ 152 (-22.45%)
ProdigymathgamehackingProdigy Hacking Organization: Hacking for the right reasons. | Questions? Ask on our Discord. https://discord.gg/XQDfbfq
Stars: ✭ 108 (-44.9%)
Awesome Shodan Queries🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
Stars: ✭ 2,758 (+1307.14%)
Awesome HackingA collection of various awesome lists for hackers, pentesters and security researchers
Stars: ✭ 48,038 (+24409.18%)
Privilege EscalationThis cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Stars: ✭ 2,117 (+980.1%)
Hg8045qPwning the Nuro issued Huawei HG8045Q
Stars: ✭ 107 (-45.41%)
MobilehackersweaponsMobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 170 (-13.27%)
Linsetmv1 2Linset is a WPA/WPA2 phishing tool (evil twin)
Stars: ✭ 105 (-46.43%)
DnsfookupDNS rebinding toolkit
Stars: ✭ 150 (-23.47%)
Inferno🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-46.43%)
ExropAutomatic ROPChain Generation
Stars: ✭ 191 (-2.55%)
PakcrackAll in 1 Pakisthani Facebook Cloner [ 7/8/9/10/11 DIGIT ]
Stars: ✭ 105 (-46.43%)
HackercampEnine boyuna siber güvenlik
Stars: ✭ 149 (-23.98%)
SteganographerSteganograpy in Python | Hide files or data in Image Files
Stars: ✭ 104 (-46.94%)
Cehv10 Notes📕 Both personal and public notes for EC-Council's CEHv10 312-50, because its thousands of pages/slides of boredom, and a braindump to many
Stars: ✭ 170 (-13.27%)
Collection DocumentCollection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+607.65%)
N00bratRemote Administration Toolkit (or Trojan) for POSiX (Linux/Unix) system working as a Web Service
Stars: ✭ 148 (-24.49%)
Hackerone LessonsTranscribed video lessons of HackerOne to pdf's
Stars: ✭ 101 (-48.47%)
Rebel FrameworkAdvanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (-6.63%)
BettercapThe Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Stars: ✭ 10,735 (+5377.04%)
BbreconPython library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-13.78%)
Dark FbHack Facebook
Stars: ✭ 98 (-50%)
Burpsuite XkeysA Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.
Stars: ✭ 144 (-26.53%)
Aura BotnetA super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Bash, and Powershell.
Stars: ✭ 95 (-51.53%)
FacebashFacebook Brute Forcer in shellscript using TOR
Stars: ✭ 195 (-0.51%)
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-50.51%)
Posta🐙 Cross-document messaging security research tool powered by https://enso.security
Stars: ✭ 143 (-27.04%)
Python RansomwarePython Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (-51.02%)
Dymerge🔓 A dynamic dictionary merger for successful dictionary based attacks.
Stars: ✭ 167 (-14.8%)
Spykeyboardkeylogger which sends us the data to our gmail.
Stars: ✭ 95 (-51.53%)
ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-27.55%)
Ssh MitmSSH man-in-the-middle tool
Stars: ✭ 1,328 (+577.55%)
Hack ToolsThe all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+1303.06%)
StretcherTool designed to help identify open Elasticsearch servers that are exposing sensitive information
Stars: ✭ 91 (-53.57%)
QuiverQuiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-28.57%)
Wifi CrackingCrack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat
Stars: ✭ 9,546 (+4770.41%)
AboutsecurityA list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-15.31%)
Apac ConferencesA community contributed consolidated list of InfoSec meetups in the Asia Pacific region.
Stars: ✭ 90 (-54.08%)
Arm exploitationExploitation on ARM-based Systems (Troopers18)
Stars: ✭ 139 (-29.08%)
Redteam vul红队作战中比较常遇到的一些重点系统漏洞整理。
Stars: ✭ 1,271 (+548.47%)
GetjsA tool to fastly get all javascript sources/files
Stars: ✭ 190 (-3.06%)
Ble Security Attack Defence✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Stars: ✭ 88 (-55.1%)
NetwormPython network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-31.12%)
BlackratBlackRAT - Java Based Remote Administrator Tool
Stars: ✭ 87 (-55.61%)
Ctfsome experience in CTFs
Stars: ✭ 165 (-15.82%)
Linux Smart EnumerationLinux enumeration tool for pentesting and CTFs with verbosity levels
Stars: ✭ 1,956 (+897.96%)
ReconnoitreA security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+830.61%)
Asufacebook hacking toolkit
Stars: ✭ 197 (+0.51%)
MosintAn automated e-mail OSINT tool
Stars: ✭ 184 (-6.12%)
Awesome BbhtA bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-3.06%)
Andrax Mobile PentestANDRAX The first and unique Penetration Testing platform for Android smartphones
Stars: ✭ 394 (+101.02%)
Umbrella androidOpen source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to dealing with a kidnap. Umbrella has best practice guides in over 40 topics in multiple languages. Used daily by people working in high risk countries - journalists, activists, diplomats, business travelers etc.
Stars: ✭ 171 (-12.76%)
PortiaPortia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
Stars: ✭ 154 (-21.43%)