GoGhost - a High Performance, lightweight, portable Open Source tool for mass...
GoGhost is a High Performance, lightweight, portable Open Source tool for mass SMBGhost Scan. Installation You can download Windows Binary or Linux Binary. Alternatively, GoGhost uses native Golang...
View Articlefaxhell - A Bind Shell Using the Fax Service and a DLL Hijack
A Proof-of-Concept bind shell using the Fax service and a DLL hijack based on Ualapi.dll. See our writeup at: https://windows-internals.com/faxing-your-way-to-system/ How to use Build Ualapi.dll and...
View Articlepythem - Penetration Testing Framework
pythem is a multi-purpose pentest framework written in Python. It has been developed to be used by security researchers and security professionals. The tool intended to be used only for acts within the...
View ArticleBrutemap - Let's find someone's account...
Brutemap is an open source penetration testing tool that automates testing accounts to the site's login page, based on Dictionary Attack. With this, you no longer need to search for other bruteforce...
View ArticleSnowcrash - A polyglot payload generator
SNOWCRASH creates a script that can be launched on both Linux and Windows machines. Payload selected by the user (in this case combined Bash and Powershell code) is embedded into a single polyglot...
View ArticleStegCloak - Hide secrets with invisible characters in plain text securely...
StegCloak is a pure JavaScript steganography module designed in functional programming style, to hide secrets inside the text by compressing and encrypting the secret before cloaking it with special...
View ArticleWiFi Passview - An open source batch script based WiFi Passview for Windows
WiFi Passview is an open-source batch script-based program that can recover your WiFi Password easily in seconds. This is for Windows OS only. Basically, this scripted program has the same function as...
View ArticleGIVINGSTORM - Infection vector that bypasses AV, IDS, and IPS. (For now...)
The beginnings of a C2 framework. Currently without all the C2 stuff so far. Generates a dual-stage VBS infection vector, and a dual-stage HTA infection vector. The variables take into account C2...
View Articlehackingtool - All in One Hacking tool For Hackers
All in One Hacking tool For Hackers Your favorite tool is not in hackingtool or Suggestions Please CLICK HERE Update Available Added New Tools Fix Errors Uninstall hackingtool Script Available Removed...
View ArticleParamSpider - Mining parameters from dark corners of Web Archives
Key Features: Finds parameters from web archives of the entered domain. Finds parameters from subdomains as well. Gives support to exclude URLs with specific extensions. Saves the output result in a...
View Articleshhgit - find secrets and sensitive files across GitHub (including Gists),...
Love shhgit? Help me reach my goal by sponsoring me via GitHub: https://github.com/sponsors/eth0izzle/ NEW: LIVE VERSION. Find secrets find from your browser! Finding secrets in GitHub is nothing new....
View ArticlereNgine - An automated recon framework for web applications
reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine has customizable scan engines, which can be used to scan the...
View ArticleICMP Analysis with Wireshark [FREE COURSE CONTENT]
In this video from our Packet Analysis with Wireshark course by Atul Tiwari we learn how to perform ICMP analysis in Wireshark. Eavesdropping on ICMP traffic can provide a lot of data to a savvy...
View ArticleScrummage - tool that centralises search functionality from powerful, yet...
Scrummage is the ultimate OSINT framework. It is an OSINT tool that centralises search functionality from powerful, yet simple OSINT sites. This project draws inspiration mainly from two other...
View ArticleInjuredAndroid - A vulnerable Android application that shows simple examples...
InjuredAndroid - A vulnerable Android application with CTF examples based on bug bounty findings, exploitation concepts, and pure creativity. Setup for a physical device Download the latest debug or...
View Articlepbtk - A toolset for reverse engineering and fuzzing Protobuf-based apps
pbtk - Reverse engineering Protobuf apps. Protobuf is a serialization format developed by Google and used in an increasing number of Android, web, desktop, and more applications. It consists of a...
View ArticleBramble - hacking Open source suite.
Bramble software has been designed for the bramble project. It incorporates many features of pentesting and IT Security. It's easy to use and completely editable. It allows beginners to learn to hack...
View Articlet14m4t - Automated brute-forcing attack tool.
t14m4t is an automated brute-forcing attack tool, the wrapper of THC-Hydra and Nmap Security Scanner. t14m4t is scanning a user-defined target (or a document containing targets) for open ports of...
View ArticleADB-Toolkit - Tool for testing your android device and hack someone android...
ADB-Toolkit is a BASH Script with 28 options and an METASPLOIT Section which has 6 options which is made to do easy penetration testing in Android Device. You can do pretty much anything with this...
View ArticlehackerEnv - automation tool that quickly and easily sweep IPs and scan ports,...
hackerEnv is an automation tool that quickly and easily sweeps IPs and scan ports, vulnerabilities, and exploit them. Then, it hands you an interactive shell for further testing. Also, it generates...
View Article