crtfinderFast tool to extract all subdomains from crt.sh website. Output will be up to sub.sub.sub.subdomain.com with standard and advanced search techniques
Stars: ✭ 96 (-68%)
Windows HacksCreative and unusual things that can be done with the Windows API.
Stars: ✭ 2,171 (+623.67%)
Jenkins Rce😈 Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!
Stars: ✭ 262 (-12.67%)
patzillaPatZilla is a modular patent information research platform and data integration toolkit with a modern user interface and access to multiple data sources.
Stars: ✭ 71 (-76.33%)
RedTeam toolkitRed Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.
Stars: ✭ 301 (+0.33%)
Recon-XAdvanced Reconnaissance tool to enumerate attacking surface of the target.
Stars: ✭ 27 (-91%)
StegcloakHide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
Stars: ✭ 2,379 (+693%)
anniew.xyzMy Personal Website / Portfolio
Stars: ✭ 41 (-86.33%)
Jwt Hack🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)
Stars: ✭ 172 (-42.67%)
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 424 (+41.33%)
YuktiCTFA Game platform to spread awareness among school and university students about various cyber attacks.
Stars: ✭ 11 (-96.33%)
AnonymousMessage from Anonymous :)
Stars: ✭ 24 (-92%)
BopscrkTool to generate smart and powerful wordlists
Stars: ✭ 273 (-9%)
instagram-profilecrawl📝 quickly crawl the information (e.g. followers, tags etc...) of an instagram profile.
Stars: ✭ 964 (+221.33%)
BbreconPython library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-43.67%)
basicprogramsThis repo contains basics programs of all languages.
Stars: ✭ 17 (-94.33%)
Dymerge🔓 A dynamic dictionary merger for successful dictionary based attacks.
Stars: ✭ 167 (-44.33%)
peneworkPenetration Test Framwork
Stars: ✭ 24 (-92%)
hackipyHacking, pen-testing, and cyber-security related tools built with Python.
Stars: ✭ 26 (-91.33%)
xecaPowerShell payload generator
Stars: ✭ 103 (-65.67%)
tomcter😹 Tomcter is a python tool developed to bruteforce Apache Tomcat manager login with Apache Tomcat default credentials.
Stars: ✭ 18 (-94%)
LazybeeCreate Best Wordlist From Python Tool In Termux
Stars: ✭ 161 (-46.33%)
WPCrackerWordPress pentest tool
Stars: ✭ 34 (-88.67%)
AntidebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (-46.33%)
penetration testing🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.
Stars: ✭ 57 (-81%)
phisherpriceAll In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-87.33%)
Teamviewer permissions hook v1A proof of concept injectable C++ dll, that uses naked inline hooking and direct memory modification to change your TeamViewer permissions.
Stars: ✭ 297 (-1%)
update-kaliScripts to set up Kali Linux with additional tools, and maintain them.
Stars: ✭ 30 (-90%)
Investigo🔎 Find usernames and download their data across social media.
Stars: ✭ 168 (-44%)
Hacker101Source code for Hacker101.com - a free online web and mobile security class.
Stars: ✭ 12,246 (+3982%)
Wifi PassviewAn open source batch script based WiFi Passview for Windows!
Stars: ✭ 157 (-47.67%)
LuciferA Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+0.67%)
ish.appThe iSH website
Stars: ✭ 66 (-78%)
lavaMicrosoft Azure Exploitation Framework
Stars: ✭ 46 (-84.67%)
VulWebajuVulWebaju is a platform that automates setting up your pen-testing environment for learning purposes.
Stars: ✭ 53 (-82.33%)
Bundle BuddyA tool to understand your bundle size and why files are in your bundle
Stars: ✭ 2,868 (+856%)
auth analyzerBurp Extension for testing authorization issues. Automated request repeating and parameter value extraction on the fly.
Stars: ✭ 77 (-74.33%)
evildorkEvildork targeting your fiancee👁️
Stars: ✭ 46 (-84.67%)
wikiXS-Leaks Wiki
Stars: ✭ 115 (-61.67%)
Privilege EscalationThis cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Stars: ✭ 2,117 (+605.67%)
DnsfookupDNS rebinding toolkit
Stars: ✭ 150 (-50%)
clairvoyanceObtain GraphQL API Schema even if the introspection is not enabled
Stars: ✭ 448 (+49.33%)
N00bratRemote Administration Toolkit (or Trojan) for POSiX (Linux/Unix) system working as a Web Service
Stars: ✭ 148 (-50.67%)
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-92.33%)
examplesFuse examples
Stars: ✭ 13 (-95.67%)
SSI Extra MaterialsIn my computer security courses I make extensive usage of cheatsheets for various tools and extra materials to complement the student learning if they are willing to do so. I have decided to share them to enable others to take advantage of them
Stars: ✭ 42 (-86%)
hsploitAn advanced command-line search engine for Exploit-DB
Stars: ✭ 16 (-94.67%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (-53.33%)
storj.ioThe Storj website.
Stars: ✭ 39 (-87%)
lazyaircrackAutomated tool for WiFi hacking.
Stars: ✭ 301 (+0.33%)
Intel-OneCommand line tool for passive reconnaissance, able to gather and link public information to a target domain, company or individual. It can make intelligence gathering faster and more effective by drastically reducing manual user interaction. This is achieved through the engineering of a highly customisable single input to multiple output solutio…
Stars: ✭ 23 (-92.33%)
PLtools整理一些内网常用渗透小工具
Stars: ✭ 227 (-24.33%)
behindflareThis tool was created as a Proof of Concept to reveal the threats related to web service misconfiguration using CloudFlare as reverse proxy and WAF
Stars: ✭ 14 (-95.33%)