java-reverse-tcpJAR, Java, and JSP shells that work on Linux OS, macOS, and Windows OS.
Stars: ✭ 19 (-26.92%)
DNSExplorerBash script that automates the enumeration of domains and DNS servers in the active information gathering.
Stars: ✭ 33 (+26.92%)
php-reverse-shellPHP shells that work on Linux OS, macOS, and Windows OS.
Stars: ✭ 274 (+953.85%)
keyloggerWindows OS keylogger with a hook mechanism (i.e. with a keyboard hook procedure).
Stars: ✭ 37 (+42.31%)
Zynix Fusionzynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
Stars: ✭ 84 (+223.08%)
RaccoonA high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+8792.31%)
Pentest⛔️ offsec batteries included
Stars: ✭ 1,063 (+3988.46%)
Rapidscan🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+2880.77%)
ReconnoitreA security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+6915.38%)
BigbountyreconBigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+1980.77%)
Atomic Red Team Intelligence C2ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (+234.62%)
InvokerPenetration testing utility, and antivirus assessment tool.
Stars: ✭ 178 (+584.62%)
KeyloggerGet Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+2223.08%)
atermIt records your terminal, then lets you upload to ASHIRT
Stars: ✭ 17 (-34.62%)
ChimeraChimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (+1680.77%)
Buffer overflowDon't let buffer overflows overflow your mind
Stars: ✭ 131 (+403.85%)
Oscp PwkThis is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.
Stars: ✭ 406 (+1461.54%)
Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (+1257.69%)
Black WidowGUI based offensive penetration testing tool (Open Source)
Stars: ✭ 124 (+376.92%)
Black Hat RustApplied offensive security with Rust - Early access - https://academy.kerkour.com/black-hat-rust?coupon=GITHUB
Stars: ✭ 331 (+1173.08%)
Pentest NotesCollection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
Stars: ✭ 89 (+242.31%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+600%)
ThecollectiveThe Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (+226.92%)
InlineWhispers2Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
Stars: ✭ 156 (+500%)
Awae PreparationThis repository will contain all trainings and tutorials I have done/read to prepare for OSWE / AWAE.
Stars: ✭ 173 (+565.38%)
Pathwar☠️ The Pathwar Project ☠️
Stars: ✭ 58 (+123.08%)
xssfinderToolset for detecting reflected xss in websites
Stars: ✭ 105 (+303.85%)
OscpMy OSCP journey
Stars: ✭ 50 (+92.31%)
Invoke ApexA PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
Stars: ✭ 162 (+523.08%)
Awesome OscpA curated list of awesome OSCP resources
Stars: ✭ 804 (+2992.31%)
VhostscanA virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+2850%)
Pwk Oscp Preparation RoadmapRoadmap for preparing for OSCP, anyone is free to use this, and also feedback and contributions are welcome
Stars: ✭ 142 (+446.15%)
BlackmambaC2/post-exploitation framework
Stars: ✭ 544 (+1992.31%)
LAZYPARIAHA tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (+365.38%)
Oscp Exam Report TemplateModified template for the OSCP Exam and Labs. Used during my passing attempt
Stars: ✭ 506 (+1846.15%)
NosqlmapAutomated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+7315.38%)
VanquishVanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Stars: ✭ 449 (+1626.92%)
ehtkEthical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Researchers etc. It contains almost all tools mentioned in CEH, OSCP, eCPPT and PNPT
Stars: ✭ 59 (+126.92%)
Vaultswiss army knife for hackers
Stars: ✭ 346 (+1230.77%)
CorsmeCross Origin Resource Sharing MisConfiguration Scanner
Stars: ✭ 118 (+353.85%)
FfmFreedom Fighting Mode: open source hacking harness
Stars: ✭ 302 (+1061.54%)
RmiscoutRMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities
Stars: ✭ 296 (+1038.46%)
EastExploits and Security Tools Framework 2.0.1
Stars: ✭ 283 (+988.46%)
Fudgec2FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (+634.62%)
Punk.pyunix SSH post-exploitation 1337 tool
Stars: ✭ 107 (+311.54%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+7396.15%)
ligolo-ngAn advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (+1507.69%)