Stars: ✭ 635 (+568.42%)
👻Stowaway -- Multi-hop Proxy Tool for pentesters
Stars: ✭ 500 (+426.32%)
A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
Stars: ✭ 910 (+857.89%)
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+612.63%)
Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: ✭ 422 (+344.21%)
Privilege Escalation Enumeration Script for Windows
Stars: ✭ 1,032 (+986.32%)
Stars: ✭ 544 (+472.63%)
XSHOCK Shellshock Exploit
Stars: ✭ 65 (-31.58%)
Fast directory scanning and scraping tool
Stars: ✭ 468 (+392.63%)
pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
Stars: ✭ 904 (+851.58%)
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+704.21%)
network visualization & vulnerability management/reporting
Stars: ✭ 382 (+302.11%)
Nmap Nse Info
Browse and search through nmap's NSE scripts.
Stars: ✭ 54 (-43.16%)
Web path scanner
Stars: ✭ 7,246 (+7527.37%)
Python3 script to perform LDAP queries and enumerate users, groups, and computers from Windows Domains. Ldap_Search can also perform brute force/password spraying to identify valid accounts via LDAP.
Stars: ✭ 78 (-17.89%)
Abusing Impersonation Privileges on Windows 10 and Server 2019
Stars: ✭ 613 (+545.26%)
👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?" 🔍 🕵️
Stars: ✭ 38 (-60%)
Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?"
Stars: ✭ 89 (-6.32%)
👶 BabySploit Beginner Pentesting Toolkit/Framework Written in Python 🐍
Stars: ✭ 883 (+829.47%)
Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB.
Stars: ✭ 451 (+374.74%)
Penetration Testing Platform
Stars: ✭ 1,103 (+1061.05%)
Censys Subdomain Finder
⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.
Stars: ✭ 402 (+323.16%)
Find exploit tool
Stars: ✭ 786 (+727.37%)
Stars: ✭ 773 (+713.68%)
Python3 tool to perform password spraying using RDP
Stars: ✭ 368 (+287.37%)
BurpSuite收集：包括不限于 Burp 文章、破解版、插件(非BApp Store)、汉化等相关教程，欢迎添砖加瓦---burpsuite-pro burpsuite-extender burpsuite cracked-version hackbar hacktools fuzzing fuzz-testing burp-plugin burp-extensions bapp-store brute-force-attacks brute-force-passwords waf sqlmap jar
Stars: ✭ 1,081 (+1037.89%)
Exploit Pack -The next generation exploit framework
Stars: ✭ 728 (+666.32%)
Venom - A Multi-hop Proxy for Penetration Testers
Stars: ✭ 1,228 (+1192.63%)
Stars: ✭ 674 (+609.47%)
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+1029.47%)
Wordpress Attack Suite
Stars: ✭ 633 (+566.32%)
iOS/macOS/Linux Remote Administration Tool
Stars: ✭ 1,286 (+1253.68%)
MSDAT: Microsoft SQL Database Attacking Tool
Stars: ✭ 621 (+553.68%)
Ladon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Stars: ✭ 39 (-58.95%)
🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.
Stars: ✭ 1,176 (+1137.89%)
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+469.47%)
Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
Stars: ✭ 961 (+911.58%)
A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (+444.21%)
foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV
Stars: ✭ 93 (-2.11%)
WeirdAAL (AWS Attack Library)
Stars: ✭ 503 (+429.47%)
ODAT: Oracle Database Attacking Tool
Stars: ✭ 906 (+853.68%)
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+398.95%)
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+1095.79%)
Attack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+5054.74%)
JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)
Stars: ✭ 450 (+373.68%)
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-9.47%)
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (+326.32%)
The Last Web Recon Tool You'll Need
Stars: ✭ 888 (+834.74%)
For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙
Stars: ✭ 388 (+308.42%)
SMBExec implementation in Nim - SMBv2 using NTLM Authentication with Pass-The-Hash technique
Stars: ✭ 59 (-37.89%)
Stars: ✭ 776 (+716.84%)
A fast web directory/file enumeration tool written in Rust
Stars: ✭ 94 (-1.05%)
Automation for internal Windows Penetrationtest / AD-Security
Stars: ✭ 1,303 (+1271.58%)
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+1225.26%)
Vulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+1035.79%)
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+715.79%)