All Projects → Whatweb → Similar Projects or Alternatives

2175 Open source projects that are alternatives of or similar to Whatweb

Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (-92.81%)
Mutual labels:  hacking, recon
Rspet
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Stars: ✭ 251 (-92.83%)
Mutual labels:  hacking, pentesting
leaky-paths
A collection of special paths linked to major web CVEs, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to scan passively for high-quality endpoints and quick-wins.
Stars: ✭ 507 (-85.53%)
Mutual labels:  recon, pentest
Webhackersweapons
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 1,205 (-65.6%)
Mutual labels:  hacking, scanner
Quack
Quack Toolkit is a set of tools to provide denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools.
Stars: ✭ 305 (-91.29%)
Mutual labels:  kali-linux, hacking
Writeups
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-98.26%)
Mutual labels:  penetration-testing, pentest
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-97.54%)
Mutual labels:  hacking, penetration-testing
Zynix Fusion
zynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
Stars: ✭ 84 (-97.6%)
Mutual labels:  hacking, pentesting
Shellpop
Pop shells like a master.
Stars: ✭ 1,279 (-63.49%)
Mutual labels:  hacking, pentest
Ssh Mitm
SSH man-in-the-middle tool
Stars: ✭ 1,328 (-62.09%)
Mutual labels:  hacking, penetration-testing
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+198.34%)
Mutual labels:  hacking, penetration-testing
Awesome Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
Stars: ✭ 48,038 (+1271.34%)
Mutual labels:  hacking, penetration-testing
Hackingthe.cloud
Content for hackingthe.cloud
Stars: ✭ 101 (-97.12%)
Mutual labels:  hacking, penetration-testing
Impulse
💣 Impulse Denial-of-service ToolKit
Stars: ✭ 538 (-84.64%)
Mutual labels:  kali-linux, hacking
Onex
onex is a hacking tool installer and package manager for hackers. Onex is a library of all hacking tools for Termux and other Linux distributions. onex can install any third party tool or any hacking tool for you.
Stars: ✭ 537 (-84.67%)
Mutual labels:  kali-linux, hacking
Yuki Chan The Auto Pentest
Automate Pentest Tool
Stars: ✭ 556 (-84.13%)
Mutual labels:  kali-linux, pentest
Oscp Automation
A collection of personal scripts used in hacking excercises.
Stars: ✭ 118 (-96.63%)
Mutual labels:  hacking, penetration-testing
ReversePowerShell
Functions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-98.63%)
Chimera
Chimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (-86.78%)
Mutual labels:  kali-linux, penetration-testing
Cloudbrute
Awesome cloud enumerator
Stars: ✭ 268 (-92.35%)
Mutual labels:  hacking, pentesting
Offensive-Reverse-Shell-Cheat-Sheet
Offensive Reverse Shell (Cheat Sheet)
Stars: ✭ 138 (-96.06%)
Mutual labels:  penetration-testing, pentest
Shodan Dorks
Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (-96.63%)
Mutual labels:  hacking, pentest
Pentest Env
Pentest environment deployer (kali linux + targets) using vagrant and chef.
Stars: ✭ 610 (-82.59%)
Mutual labels:  kali-linux, pentest
Vanquish
Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Stars: ✭ 449 (-87.18%)
Mutual labels:  kali-linux, penetration-testing
Thefatrat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+69.68%)
Mutual labels:  kali-linux, hacking
Penetration Testing And Hacking
Collection of tips, tools and tutorials around infosec
Stars: ✭ 25 (-99.29%)
Mutual labels:  kali-linux, penetration-testing
Kali-Linux-Tools-Interface
Graphical Web interface developed to facilitate the use of security information tools.
Stars: ✭ 169 (-95.18%)
Mutual labels:  kali-linux, hacking-tools
M3m0
M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 124 (-96.46%)
Mutual labels:  hacking, penetration-testing
Buffer overflow
Don't let buffer overflows overflow your mind
Stars: ✭ 131 (-96.26%)
Mutual labels:  hacking, penetration-testing
H8mail
Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (-38.25%)
Mutual labels:  hacking, recon
juumla
🦁 Juumla is a python tool created to identify Joomla version, scan for vulnerabilities and search for config or backup files.
Stars: ✭ 107 (-96.95%)
Mutual labels:  scanner, pentest
Wprecon
WPrecon (WordPress Recon), is a vulnerability recognition tool in CMS Wordpress, developed in Go and with scripts in Lua.
Stars: ✭ 135 (-96.15%)
Mutual labels:  hacking, recon
Networm
Python network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-96.15%)
Mutual labels:  hacking, pentesting
Lyricpass
Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security research.
Stars: ✭ 58 (-98.34%)
Mutual labels:  kali-linux, penetration-testing
Kalitoolsmanual
Kali Linux 工具合集中文说明书
Stars: ✭ 70 (-98%)
Mutual labels:  kali-linux, security-tools
Offensive Dockerfiles
Offensive tools as Dockerfiles. Lightweight & Ready to go
Stars: ✭ 150 (-95.72%)
Mutual labels:  hacking, pentest
Subscraper
Subdomain enumeration through various techniques
Stars: ✭ 265 (-92.44%)
Mutual labels:  penetration-testing, pentest
Pentest
⛔️ offsec batteries included
Stars: ✭ 1,063 (-69.65%)
Mutual labels:  kali-linux, pentesting
Sandmap
Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (-66.31%)
Mutual labels:  kali-linux, hacking
wifi-deauther
A fully automatic wifi deauther coded in Python
Stars: ✭ 25 (-99.29%)
Mutual labels:  pentesting, kali-linux
Bbrecon
Python library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-95.18%)
Mutual labels:  hacking, recon
Aboutsecurity
A list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-95.26%)
Mutual labels:  hacking, pentest
Collection Document
Collection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (-60.41%)
Mutual labels:  hacking, pentest
AdbNet
A tool that allows you to search for vulnerable android devices across the world and exploit them.
Stars: ✭ 112 (-96.8%)
Mutual labels:  hacking-tools, pentesting-tools
Thoron
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-97.52%)
Mutual labels:  kali-linux, pentesting
Linsetmv1 2
Linset is a WPA/WPA2 phishing tool (evil twin)
Stars: ✭ 105 (-97%)
Mutual labels:  kali-linux, hacking
sqlinjection-training-app
A simple PHP application to learn SQL Injection detection and exploitation techniques.
Stars: ✭ 56 (-98.4%)
Mutual labels:  application-security, appsec
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-95.95%)
Mutual labels:  kali-linux, hacking
Entropy
Entropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-96.4%)
Mutual labels:  kali-linux, hacking
Autosetup
Auto setup is a bash script compatible with Debian based distributions to install and setup necessary programs.
Stars: ✭ 140 (-96%)
Mutual labels:  kali-linux, recon
frida setup
One-click installer for Frida and Burp certs for SSL Pinning bypass
Stars: ✭ 47 (-98.66%)
Mutual labels:  hacking-tools, pentesting-tools
Termux Os
All in One Termux Os..!! (New)
Stars: ✭ 150 (-95.72%)
Mutual labels:  kali-linux, hacking
Rapidpayload
Framework RapidPayload - Metasploit Payload Generator | Crypter FUD AntiVirus Evasion
Stars: ✭ 174 (-95.03%)
Mutual labels:  kali-linux, penetration-testing
Sitedorks
Search Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term with a default set of websites, bug bounty programs or a custom collection.
Stars: ✭ 221 (-93.69%)
Mutual labels:  hacking, recon
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (-71.68%)
Mutual labels:  kali-linux, hacking
Flux Keylogger
🔖 Modern Javascript keylogger with web panel
Stars: ✭ 122 (-96.52%)
Mutual labels:  kali-linux, hacking
Urlcrazy
Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (-95.72%)
Mutual labels:  kali-linux, hacking
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-94.69%)
Mutual labels:  kali-linux, hacking
Lockphish
Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.
Stars: ✭ 186 (-94.69%)
Mutual labels:  kali-linux, hacking
Armor
Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
Stars: ✭ 228 (-93.49%)
Mutual labels:  kali-linux, penetration-testing
301-360 of 2175 similar projects