GitpreySearching sensitive files and contents in GitHub associated to company name or other key words
Stars: ✭ 478 (+635.38%)
BoopsuiteA Suite of Tools written in Python for wireless auditing and security testing.
Stars: ✭ 807 (+1141.54%)
IP-TrackerTrack any ip address with IP-Tracker. IP-Tracker is developed for Linux and Termux. you can retrieve any ip address information using IP-Tracker.
Stars: ✭ 53 (-18.46%)
HashExploitHashExpoit is Great Tool For Cracking Hash
Stars: ✭ 17 (-73.85%)
InstainsaneMulti-threaded Instagram Brute Forcer (100 attemps at once)
Stars: ✭ 475 (+630.77%)
paradoxiaRATParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 583 (+796.92%)
evildorkEvildork targeting your fiancee👁️
Stars: ✭ 46 (-29.23%)
Dref DNS Rebinding Exploitation Framework
Stars: ✭ 423 (+550.77%)
refluxionRefluxion -- MITM WPA attacks tool
Stars: ✭ 25 (-61.54%)
behindflareThis tool was created as a Proof of Concept to reveal the threats related to web service misconfiguration using CloudFlare as reverse proxy and WAF
Stars: ✭ 14 (-78.46%)
PhirauteeA proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
Stars: ✭ 96 (+47.69%)
Spytrojan keylogger[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-50.77%)
ReverseapkQuickly analyze and reverse engineer Android packages
Stars: ✭ 419 (+544.62%)
GobyAttack surface mapping
Stars: ✭ 446 (+586.15%)
PrivescA collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+1109.23%)
Emp3r0rlinux post-exploitation framework made by linux user
Stars: ✭ 419 (+544.62%)
transportc2PoC Command and Control Server. Interact with clients through a private web interface, add new users for team sharing and more.
Stars: ✭ 22 (-66.15%)
PentestkitUseful tools and scripts during Penetration Testing engagements
Stars: ✭ 463 (+612.31%)
osint-notesGood info about DeepWeb and OSINT
Stars: ✭ 24 (-63.08%)
100 Days Of Swiftui👨💻👩💻100 Days Of SwiftUI free course from Hacking with Swift. 👨💻👩💻
Stars: ✭ 35 (-46.15%)
NightingaleIt's a Docker Environment for pentesting which having all the required tool for VAPT.
Stars: ✭ 119 (+83.08%)
ARL-NPoC集漏洞验证和任务运行的一个框架
Stars: ✭ 73 (+12.31%)
Androidsdk🐳 Full-fledged Android SDK Docker Image
Stars: ✭ 776 (+1093.85%)
BifrostBifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-43.08%)
JusttryharderJustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)
Stars: ✭ 450 (+592.31%)
FiercephishFiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.
Stars: ✭ 960 (+1376.92%)
Packer FuzzerPacker Fuzzer is a fast and efficient scanner for security detection of websites constructed by javascript module bundler such as Webpack.
Stars: ✭ 753 (+1058.46%)
SCANNER-INURLBRAdvanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.
Stars: ✭ 90 (+38.46%)
Mecfor mass exploiting
Stars: ✭ 448 (+589.23%)
FlashRoute🚀 Takes minutes to explore the topology of all routable /24 prefixes in IPv4 address space. Now supports IPv6 scan!
Stars: ✭ 26 (-60%)
CVE-2020-5902exploit code for F5-Big-IP (CVE-2020-5902)
Stars: ✭ 37 (-43.08%)
Dns Rebind ToolkitA front-end JavaScript toolkit for creating DNS rebinding attacks.
Stars: ✭ 435 (+569.23%)
Memory.dllC# Hacking library for making PC game trainers.
Stars: ✭ 411 (+532.31%)
PerunPerun是一款主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架
Stars: ✭ 773 (+1089.23%)
PasshuntPasshunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
Stars: ✭ 961 (+1378.46%)
Ics Security ToolsTools, tips, tricks, and more for exploring ICS Security.
Stars: ✭ 749 (+1052.31%)
ApkurlgrepExtract endpoints from APK files
Stars: ✭ 405 (+523.08%)
MCPToolPentesting tool for Minecraft
Stars: ✭ 73 (+12.31%)
HulkHULK DoS tool ported to Go with some additional features.
Stars: ✭ 427 (+556.92%)
Nim SmbexecSMBExec implementation in Nim - SMBv2 using NTLM Authentication with Pass-The-Hash technique
Stars: ✭ 59 (-9.23%)
RPCScanTool to communicate with RPC services and check misconfigurations on NFS shares
Stars: ✭ 53 (-18.46%)
BrutesploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (+552.31%)
BrutegramInstagram multi-bruteforce Platfrom
Stars: ✭ 183 (+181.54%)
Ip TracerTrack any ip address with IP-Tracer. IP-Tracer is developed for Linux and Termux. you can retrieve any ip address information using IP-Tracer.
Stars: ✭ 399 (+513.85%)
ArchstrikeAn Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (+516.92%)
Censys Subdomain Finder⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.
Stars: ✭ 402 (+518.46%)
PapersPapers about known hacking, security, hardware, software, computer, network and other ressources.
Stars: ✭ 58 (-10.77%)
Pythempentest framework
Stars: ✭ 1,060 (+1530.77%)
PxenumA shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-53.85%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (+1020%)