MsfpcMSFvenom Payload Creator (MSFPC)
Stars: β 808 (+2506.45%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: β 126 (+306.45%)
MouseMouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: β 186 (+500%)
Pentest-BookmarkzA collection of useful links for Pentesters
Stars: β 118 (+280.65%)
ChimeraChimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: β 463 (+1393.55%)
LscriptThe LAZY script will make your life easier, and of course faster.
Stars: β 3,056 (+9758.06%)
ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: β 142 (+358.06%)
EhtoolsWi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: β 422 (+1261.29%)
ArmorArmor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
Stars: β 228 (+635.48%)
PentaOpen source all-in-one CLI tool to semi-automate pentesting.
Stars: β 130 (+319.35%)
HackapkAn Advanced Tool For Complete Apk-Modding In Termux ...
Stars: β 180 (+480.65%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: β 84 (+170.97%)
ThefatratThefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softwβ¦
Stars: β 5,944 (+19074.19%)
Terminhackπ¨βπ» Impress your friends by pretending to be a real hacker
Stars: β 73 (+135.48%)
DiscoverCustom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Stars: β 2,548 (+8119.35%)
trolotrolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: β 45 (+45.16%)
Horus-EyeJust Simple Code To Play With Android Payloads (;
Stars: β 54 (+74.19%)
ImgbackdoorHide your payload into .jpg file
Stars: β 87 (+180.65%)
Easy hackHack the World using Termux
Stars: β 549 (+1670.97%)
VirusX5The Most Powerful Fake Page Redirecting tool...
Stars: β 15 (-51.61%)
007-TheBondThis Script will help you to gather information about your victim or friend.
Stars: β 371 (+1096.77%)
Ethical Hacking ToolsComplete Listing and Usage of Tools used for Ethical Hacking
Stars: β 272 (+777.42%)
Hackers Tool KitIts a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on instagram
Stars: β 211 (+580.65%)
AndspoiltRun interactive android exploits in linux.
Stars: β 101 (+225.81%)
AndtrojA tool for integrating the Metasploit payload with Android's healthy programs and bypassing antivirus
Stars: β 43 (+38.71%)
One Lin3rGives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: β 1,259 (+3961.29%)
Gray hat csharp codeThis repository contains full code examples from the book Gray Hat C#
Stars: β 301 (+870.97%)
osint-combinerCombining OSINT sources in Elastic Stack
Stars: β 77 (+148.39%)
Kali-Linux-Tools-InterfaceGraphical Web interface developed to facilitate the use of security information tools.
Stars: β 169 (+445.16%)
Msploitego Pentesting suite for Maltego based on data in a Metasploit database
Stars: β 124 (+300%)
DevilDevil is a tool that is basically made for facebook to Hack target accounts , BruteForce Attack , grab friendlist accounts , yahoo chacker , Facbook Friend information gathering tool , auto likes reactions & much more i hope you enjoy this tool i'm not responsible if you use this tool for any illegal purpose
Stars: β 88 (+183.87%)
Impulseπ£ Impulse Denial-of-service ToolKit
Stars: β 538 (+1635.48%)
Badkarmanetwork reconnaissance toolkit
Stars: β 353 (+1038.71%)
xecaPowerShell payload generator
Stars: β 103 (+232.26%)
termux-wifiBash script which installs and runs the Fluxion tool inside Termux, a wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.
Stars: β 406 (+1209.68%)
assapAnti Shoulder Surfing Attack Platform (ASSAP)
Stars: β 22 (-29.03%)
dheaterD(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: β 142 (+358.06%)
Cheat-Sheet---Active-DirectoryThis cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.
Stars: β 154 (+396.77%)
ipinfoA wrapper around the ipinfo.io services
Stars: β 51 (+64.52%)
ShogunShodan.io Command Line Interface
Stars: β 42 (+35.48%)
MitmMan in the middle tool
Stars: β 30 (-3.23%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: β 296 (+854.84%)
ToRat clientThis is the ToRat client, a part of the ToRat Project.
Stars: β 29 (-6.45%)
SudomySudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: β 1,572 (+4970.97%)
Knockπ Scan the entire internet for SSH and Telnet services. Then hack them.
Stars: β 60 (+93.55%)
MihariA helper to run OSINT queries & manage results continuously
Stars: β 239 (+670.97%)
rubyOfficial Ruby client library for IPinfo API (IP geolocation and other types of IP data)
Stars: β 42 (+35.48%)
Grinderπ Python framework to automatically discover and enumerate hosts from different back-end systems (Shodan, Censys)
Stars: β 209 (+574.19%)
DjangohunterTool designed to help identify incorrectly configured Django applications that are exposing sensitive information.
Stars: β 212 (+583.87%)
common-osint-modelConverting data from services like Censys and Shodan to a common data model
Stars: β 35 (+12.9%)
spectre-attack-demoReproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
Stars: β 87 (+180.65%)
ExpcameraExploit Netwave and GoAhead IP Camera
Stars: β 194 (+525.81%)
Awesome Shodan Queriesπ A collection of interesting, funny, and depressing search queries to plug into shodan.io π©βπ»
Stars: β 2,758 (+8796.77%)