HashviewA web front-end for password cracking and analytics
Stars: ✭ 601 (+298.01%)
serverHashtopolis - A Hashcat wrapper for distributed hashcracking
Stars: ✭ 954 (+531.79%)
DuplicutRemove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)
Stars: ✭ 352 (+133.11%)
Wifi CrackingCrack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat
Stars: ✭ 9,546 (+6221.85%)
HashtopolisA Hashcat wrapper for distributed hashcracking
Stars: ✭ 835 (+452.98%)
Colabcat😺 Running Hashcat on Google Colab with session backup and restore.
Stars: ✭ 407 (+169.54%)
Sn1perAttack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+3143.05%)
Stowaway👻Stowaway -- Multi-hop Proxy Tool for pentesters
Stars: ✭ 500 (+231.13%)
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+4457.62%)
Naive HashcatCrack password hashes without the fuss 🐈
Stars: ✭ 726 (+380.79%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+413.25%)
Pantagrulelarge hashcat rulesets generated from real-world compromised passwords
Stars: ✭ 146 (-3.31%)
GadgetprobeProbe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.
Stars: ✭ 381 (+152.32%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+152.98%)
OtsecaOpen source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
Stars: ✭ 416 (+175.5%)
Passphrase WordlistPassphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (+268.21%)
HabuHacking Toolkit
Stars: ✭ 635 (+320.53%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+405.96%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+237.09%)
SpellbookMicro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-64.9%)
VulmapVulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+614.57%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+652.32%)
Flask UnsignCommand line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
Stars: ✭ 90 (-40.4%)
Pentesting CookbookA set of recipes useful in pentesting and red teaming scenarios
Stars: ✭ 82 (-45.7%)
Security ScriptsA collection of public offensive and defensive security related scripts for InfoSec students.
Stars: ✭ 101 (-33.11%)
M4ngl3m3Common password pattern generator using strings list
Stars: ✭ 103 (-31.79%)
Rustscan🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+3355.63%)
AiodnsbrutePython 3.5+ DNS asynchronous brute force utility
Stars: ✭ 370 (+145.03%)
PacketwhisperPacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (+168.21%)
KaonashiWordlist, rules and masks from Kaonashi project (RootedCON 2019)
Stars: ✭ 353 (+133.77%)
FireelffireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (+188.08%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+182.78%)
MxtractmXtract - Memory Extractor & Analyzer
Stars: ✭ 499 (+230.46%)
Impost3r👻Impost3r -- A linux password thief
Stars: ✭ 355 (+135.1%)
CloudtopolisZero Infrastructure Password Cracking
Stars: ✭ 137 (-9.27%)
YasuoA ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (+242.38%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+380.13%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (+382.12%)
SprayingtoolkitScripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
Stars: ✭ 802 (+431.13%)
Scilla🏴☠️ Information Gathering tool 🏴☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-23.18%)
ChasmA CHaracter Aware Splitting Method for producing password candidates.
Stars: ✭ 37 (-75.5%)
DirhuntFind web directories without bruteforce
Stars: ✭ 983 (+550.99%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-58.94%)
Social AnalyzerAPI, CLI & Web App for analyzing & finding a person's profile across +1000 social media \ websites (Detections are updated regularly by automated systems)
Stars: ✭ 8,449 (+5495.36%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-23.18%)
Awesome Mobile SecurityAn effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+1116.56%)
Pentest NotesCollection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
Stars: ✭ 89 (-41.06%)
Nimscan🚀 Fast Port Scanner 🚀
Stars: ✭ 134 (-11.26%)
BulwarkAn organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
Stars: ✭ 113 (-25.17%)
EmbedosEmbedOS - Embedded security testing virtual machine
Stars: ✭ 108 (-28.48%)
Horn3tPowerful Visual Subdomain Enumeration at the Click of a Mouse
Stars: ✭ 120 (-20.53%)
HashcatWorld's fastest and most advanced password recovery utility
Stars: ✭ 11,014 (+7194.04%)
Cheatsheet GodPenetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+2231.79%)
ReconnoteWeb Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
Stars: ✭ 322 (+113.25%)
Pocsuite3pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.
Stars: ✭ 2,213 (+1365.56%)
Hacker ContainerContainer with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-30.46%)
JwtxploiterA tool to test security of json web token
Stars: ✭ 130 (-13.91%)