Lists (1)
Sort Name ascending (A-Z)
Stars
📚 Freely available programming books
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Hunt down social media accounts by username across social networks
E-mails, subdomains and names Harvester - OSINT
Prowler is the Open Cloud Security for AWS, Azure, GCP, Kubernetes, M365 and more. As agent-less, it helps for continuous monitoring, security assessments & audits, incident response, compliance, h…
The recursive internet scanner for hackers. 🧡
RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Fast and powerful SSL/TLS scanning library.
This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.
A Python based ingestor for BloodHound
A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automate your pentest reports with ease.
Orange Cyberdefense mindmaps
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!
Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling
PoC Exploit for the NTLM reflection SMB flaw.
Partial python implementation of SharpGPOAbuse
WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities.
PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC
A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresses, and more.
A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily