GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+330.73%)
lazyaircrackAutomated tool for WiFi hacking.
Stars: ✭ 301 (-32.96%)
k8s-harborHarbor in Kubernetes
Stars: ✭ 36 (-91.98%)
frisbeeCollect email addresses by crawling search engine results.
Stars: ✭ 29 (-93.54%)
metagoofilSearch Google and download specific file types
Stars: ✭ 174 (-61.25%)
SonarsearchA MongoDB importer and API for Project Sonars DNS datasets
Stars: ✭ 297 (-33.85%)
crawleetWeb Recon & Exploitation Tool.
Stars: ✭ 48 (-89.31%)
Pentest-Service-EnumerationSuggests programs to run against services found during the enumeration phase of a Pentest
Stars: ✭ 80 (-82.18%)
nekrosNekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive KEY
Stars: ✭ 84 (-81.29%)
pwk scriptsAutomation scripts in preparation for PWK/OSCP labs
Stars: ✭ 16 (-96.44%)
rsmReverse shell manager using tmux and ncat
Stars: ✭ 29 (-93.54%)
EhtoolsWi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: ✭ 422 (-6.01%)
SudomySudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 1,572 (+250.11%)
default-http-login-hunterLogin hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.
Stars: ✭ 285 (-36.53%)
OverlordOverlord - Red Teaming Infrastructure Automation
Stars: ✭ 258 (-42.54%)
ConvertoInstalling Kali linux on Vps Server
Stars: ✭ 100 (-77.73%)
WPA2-FritzBox-Pswd-Wordlist-GeneratorThis Script will produce all of the WPA2 Passwords used by various Router companies aswell as Fritzbox. All of these Passwords will be 16 Numbers in length. So it could get a bit large.
Stars: ✭ 22 (-95.1%)
Awesome InfosecA curated list of awesome infosec courses and training resources.
Stars: ✭ 3,779 (+741.65%)
Black-ToolInstall the tools and start Attacking , black-tool v5.0 ! ⬛
Stars: ✭ 239 (-46.77%)
reconmapVulnerability assessment and penetration testing automation and reporting platform for teams.
Stars: ✭ 242 (-46.1%)
cdCloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities like SQL Injection, Cross-site scripting and other exploitable vulnerabilities.
Stars: ✭ 33 (-92.65%)
OpenVAS-DockerA Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-96.44%)
MailRipV3SMTP and IMAP checker / cracker for mailpass combolists with a user-friendly GUI, automated inbox test and many more features.
Stars: ✭ 28 (-93.76%)
crtfinderFast tool to extract all subdomains from crt.sh website. Output will be up to sub.sub.sub.subdomain.com with standard and advanced search techniques
Stars: ✭ 96 (-78.62%)
BusterAn advanced tool for email reconnaissance
Stars: ✭ 387 (-13.81%)
xecaPowerShell payload generator
Stars: ✭ 103 (-77.06%)
reverse-sshStatically-linked ssh server with reverse shell functionality for CTFs and such
Stars: ✭ 548 (+22.05%)
sshamebrute force SSH public-key authentication
Stars: ✭ 43 (-90.42%)
ViPERWeb App Pen Tester (Web Interface)
Stars: ✭ 19 (-95.77%)
warfWARF is a Web Application Reconnaissance Framework that helps to gather information about the target.
Stars: ✭ 53 (-88.2%)
Reconky-Automated Bash ScriptReconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (-62.81%)
Iblessingiblessing is an iOS security exploiting toolkit, it mainly includes application information collection, static analysis and dynamic analysis. It can be used for reverse engineering, binary analysis and vulnerability mining.
Stars: ✭ 326 (-27.39%)
Intel-OneCommand line tool for passive reconnaissance, able to gather and link public information to a target domain, company or individual. It can make intelligence gathering faster and more effective by drastically reducing manual user interaction. This is achieved through the engineering of a highly customisable single input to multiple output solutio…
Stars: ✭ 23 (-94.88%)
Terminhack👨💻 Impress your friends by pretending to be a real hacker
Stars: ✭ 73 (-83.74%)
Gr3eNoXAdvanced Vulnerability Scanner Tool
Stars: ✭ 42 (-90.65%)
ShellyAutomatic Reverse Shell Generator
Stars: ✭ 38 (-91.54%)
Go DorkThe fastest dork scanner written in Go.
Stars: ✭ 274 (-38.98%)
avainA Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
Stars: ✭ 56 (-87.53%)
scan-cli-pluginDocker Scan is a Command Line Interface to run vulnerability detection on your Dockerfiles and Docker images
Stars: ✭ 135 (-69.93%)
PoweropsPowerShell Runspace Portable Post Exploitation Tool aimed at making Penetration Testing with PowerShell "easier"
Stars: ✭ 412 (-8.24%)
Adb ToolkitADB-Toolkit V2 for easy ADB tricks with many perks in all one. ENJOY!
Stars: ✭ 217 (-51.67%)
vulnerablecodeA free and open vulnerabilities database and the packages they impact. And the tools to aggregate and correlate these vulnerabilities. Sponsored by NLnet https://nlnet.nl/project/vulnerabilitydatabase/ for https://www.aboutcode.org/ Chat at https://gitter.im/aboutcode-org/vulnerablecode Docs at https://vulnerablecode.readthedocs.org/
Stars: ✭ 269 (-40.09%)
Bscanan asynchronous target enumeration tool
Stars: ✭ 207 (-53.9%)
websploitWebsploit is an advanced MITM framework.
Stars: ✭ 105 (-76.61%)
LockphishLockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.
Stars: ✭ 186 (-58.57%)
OsintgramOsintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Stars: ✭ 312 (-30.51%)
TokenBreakerJSON RSA to HMAC and None Algorithm Vulnerability POC
Stars: ✭ 51 (-88.64%)
MCPToolPentesting tool for Minecraft
Stars: ✭ 73 (-83.74%)
Python-For-Ethical-HackingThis is a complete project series on implementing hacking tools available in Kali Linux into python.
Stars: ✭ 29 (-93.54%)
PwndocPentest Report Generator
Stars: ✭ 417 (-7.13%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (-10.24%)
PatrowlmanagerPatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (-19.15%)
Teamviewer permissions hook v1A proof of concept injectable C++ dll, that uses naked inline hooking and direct memory modification to change your TeamViewer permissions.
Stars: ✭ 297 (-33.85%)