NarthexModular personalized dictionary generator.
Stars: ✭ 156 (-33.05%)
MailRipV3SMTP and IMAP checker / cracker for mailpass combolists with a user-friendly GUI, automated inbox test and many more features.
Stars: ✭ 28 (-87.98%)
reverse-sshStatically-linked ssh server with reverse shell functionality for CTFs and such
Stars: ✭ 548 (+135.19%)
bentoBento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.
Stars: ✭ 74 (-68.24%)
ggtfobinsGet GTFOBins info about a given exploit from the command line
Stars: ✭ 27 (-88.41%)
STEWSA Security Tool for Enumerating WebSockets
Stars: ✭ 154 (-33.91%)
BCA-PhantomA multi-platform HTTP(S) Reverse Shell Server and Client in Python 3
Stars: ✭ 80 (-65.67%)
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-80.69%)
peniotPENIOT: Penetration Testing Tool for IoT
Stars: ✭ 164 (-29.61%)
shadow-workersShadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious Service Workers (SW)
Stars: ✭ 168 (-27.9%)
webreconAutomated Web Recon Shell Scripts
Stars: ✭ 48 (-79.4%)
XposedOrNotXposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of such compromised passwords is detrimental to individual account security.
Stars: ✭ 120 (-48.5%)
KaliIntelligenceSuiteKali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standard penetration testing tools. The collected data is internally stored in a structured manner to allow the fast identification and visualisation of the collected information.
Stars: ✭ 58 (-75.11%)
DevBrute-A Password Brute ForcerDevBrute is a Password Brute Forcer, It can Brute Force almost all Social Media Accounts or Any Web Application.
Stars: ✭ 91 (-60.94%)
ctrsploitA penetration toolkit for container environment
Stars: ✭ 47 (-79.83%)
default-http-login-hunterLogin hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.
Stars: ✭ 285 (+22.32%)
ModlishkaModlishka. Reverse Proxy.
Stars: ✭ 3,634 (+1459.66%)
WhatwebNext generation web scanner
Stars: ✭ 3,503 (+1403.43%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-79.4%)
suiderThis tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObins
Stars: ✭ 21 (-90.99%)
Deep-InsideCommand line tool that allows you to explore IoT devices by using Shodan API.
Stars: ✭ 22 (-90.56%)
penetration testing🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.
Stars: ✭ 57 (-75.54%)