All Projects → Zeebsploit → Similar Projects or Alternatives

2134 Open source projects that are alternatives of or similar to Zeebsploit

Ctftools
Personal CTF Toolkit
Stars: ✭ 312 (+96.23%)
Mutual labels:  hacking, hacking-tool
Katana
A Python Tool For google Hacking
Stars: ✭ 355 (+123.27%)
Mutual labels:  hacking, hacking-tool
Badkarma
network reconnaissance toolkit
Stars: ✭ 353 (+122.01%)
Mutual labels:  hacking, information-gathering
Hackerenv
Stars: ✭ 309 (+94.34%)
Wpintel
Chrome extension designed for WordPress Vulnerability Scanning and information gathering!
Stars: ✭ 70 (-55.97%)
Chaos
🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Stars: ✭ 1,168 (+634.59%)
Mutual labels:  hacking, hacking-tool
Paradoxiarat
ParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (+148.43%)
Mutual labels:  hacking, hacking-tool
Xeexe Topantivirusevasion
Undetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (+143.4%)
Mutual labels:  hacking, hacking-tool
Cthackframework
游戏外挂通用框架,快速构建外挂程序。
Stars: ✭ 78 (-50.94%)
Mutual labels:  framework, hacking
Solr Injection
Apache Solr Injection Research
Stars: ✭ 464 (+191.82%)
Mutual labels:  hacking, vulnerability
Hacking Tools Repository
A list of security/hacking tools that have been collected from the internet. Suggestions are welcomed.
Stars: ✭ 448 (+181.76%)
Mutual labels:  hacking, hacking-tool
Hackerpro
All in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog
Stars: ✭ 474 (+198.11%)
Mutual labels:  hacking, hacking-tool
Quack
Quack Toolkit is a set of tools to provide denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools.
Stars: ✭ 305 (+91.82%)
Mutual labels:  hacking, hacking-tool
Oxidtools
200 TOOLS BY 0XID4FF0X FOR TERMUX
Stars: ✭ 143 (-10.06%)
Mutual labels:  hacking, hacking-tool
Saint
👁 (s)AINT is a Spyware Generator for Windows systems written in Java. [Discontinued]
Stars: ✭ 522 (+228.3%)
Mutual labels:  hacking, hacking-tool
Impulse
💣 Impulse Denial-of-service ToolKit
Stars: ✭ 538 (+238.36%)
Mutual labels:  hacking, hacking-tool
Katanaframework
The New Hacking Framework
Stars: ✭ 502 (+215.72%)
Mutual labels:  framework, hacking
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+279.87%)
Mutual labels:  hacking, hacking-tool
Shellshockhunter
It's a simple tool for test vulnerability shellshock
Stars: ✭ 52 (-67.3%)
Mutual labels:  hacking, vulnerability
Givingstorm
Infection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-54.72%)
Mutual labels:  hacking, hacking-tool
Beef Over Wan
Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-48.43%)
Mutual labels:  hacking, hacking-tool
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-45.91%)
Mutual labels:  hacking, vulnerability
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+300%)
Mutual labels:  hacking, hacking-tool
Reconpi
ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.
Stars: ✭ 490 (+208.18%)
Mutual labels:  hacking, hacking-tool
Sublert
Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (+339.62%)
Mutual labels:  hacking, information-gathering
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+325.79%)
Mutual labels:  hacking, hacking-tool
Interlace
Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+377.99%)
Mutual labels:  hacking, hacking-tool
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+4457.23%)
Mutual labels:  hacking, hacking-tool
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+387.42%)
Mutual labels:  hacking, hacking-tool
Webkiller
Tool Information Gathering Write By Python.
Stars: ✭ 300 (+88.68%)
Mutual labels:  hacking, information-gathering
Enteletaor
Message Queue & Broker Injection tool
Stars: ✭ 139 (-12.58%)
Mutual labels:  hacking, hacking-tool
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+447.17%)
Mutual labels:  hacking, hacking-tool
Trivy
Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues
Stars: ✭ 9,673 (+5983.65%)
Phpvuln
Audit tool to find common vulnerabilities in PHP source code
Stars: ✭ 146 (-8.18%)
Mutual labels:  hacking, vulnerability
Deepweb Scappering
Discover hidden deepweb pages
Stars: ✭ 40 (-74.84%)
Mutual labels:  hacking, hacking-tool
Web Brutator
Fast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-38.99%)
Mutual labels:  hacking, hacking-tool
Ctfr
Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
Stars: ✭ 1,535 (+865.41%)
Mutual labels:  hacking, information-gathering
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+614.47%)
Mutual labels:  hacking, hacking-tool
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+611.95%)
Mutual labels:  hacking, hacking-tool
Grecon
Your Google Recon is Now Automated
Stars: ✭ 119 (-25.16%)
Mutual labels:  hacking, hacking-tool
Project Tauro
A Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-67.3%)
Mutual labels:  hacking, hacking-tool
Deadtrap
An OSINT tool to gather information about the real owner of a phone number
Stars: ✭ 73 (-54.09%)
Mutual labels:  hacking, information-gathering
Arissploit
Arissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (-28.3%)
Gofingerprint
GoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fingerprints.
Stars: ✭ 120 (-24.53%)
Mutual labels:  hacking, hacking-tool
M3m0
M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 124 (-22.01%)
Mutual labels:  hacking, hacking-tool
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+691.82%)
Mutual labels:  hacking, hacking-tool
Wifipassword Stealer
Get All Registered Wifi Passwords from Target Computer.
Stars: ✭ 97 (-38.99%)
Mutual labels:  hacking, hacking-tool
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+775.47%)
Mutual labels:  hacking, hacking-tool
Instabruteforce
hacking-tool termux-tools termux noob-friendly instagram-bot bruteforce-password-cracker wordlist-technique
Stars: ✭ 86 (-45.91%)
Mutual labels:  hacking, hacking-tool
Sippts
Set of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-27.04%)
Mutual labels:  hacking, hacking-tool
Cr3dov3r
Know the dangers of credential reuse attacks.
Stars: ✭ 1,700 (+969.18%)
Mutual labels:  hacking, hacking-tool
Eviltwinframework
A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities
Stars: ✭ 122 (-23.27%)
Mutual labels:  framework, hacking
Rvd
Robot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (-45.28%)
Mutual labels:  hacking, vulnerability
Dark Fantasy Hack Tool
DDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file system of websites.. Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities.) Web Spider: For gathering web application hacking information. Email scraper: To get all emails related to a webpage IMDB Rating: Easy way to access the movie database. Both .exe(compressed as zip) and .py versions are available in files.
Stars: ✭ 131 (-17.61%)
Mutual labels:  hacking, hacking-tool
Intelspy
Perform automated network reconnaissance scans
Stars: ✭ 134 (-15.72%)
Mutual labels:  hacking, information-gathering
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+1047.17%)
Mutual labels:  hacking, hacking-tool
Vbscan
OWASP VBScan is a Black Box vBulletin Vulnerability Scanner
Stars: ✭ 295 (+85.53%)
Windows Post Exploitation
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (+86.16%)
Mutual labels:  hacking, hacking-tool
Xattacker
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+464.15%)
Mutual labels:  hacking, hacking-tool
Ble Security Attack Defence
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Stars: ✭ 88 (-44.65%)
Mutual labels:  hacking, vulnerability
61-120 of 2134 similar projects