Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
A Red Teamer Diaries | 1,294 | 8 months ago | ||||||||
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements. | ||||||||||
Hackingtoolkit | 220 | 4 months ago | 2 | mit | Python | |||||
ALL IN ONE Hacking Tool For Hackers, Penetration Tester and Cybersecurity. New Version Beginner to Advanced Tool. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit ! | ||||||||||
Cyber Sploit | 76 | 4 months ago | 1 | Python | ||||||
A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules will be added time to time. | ||||||||||
Autosploit | 47 | 5 years ago | 2 | other | Ruby | |||||
Autosploit = Automating Metasploit Modules. | ||||||||||
Sherlock | 46 | 3 months ago | gpl-3.0 | Shell | ||||||
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.) | ||||||||||
Metasploit Tutorial | 15 | 4 months ago | mit | |||||||
👽 Metasploit is the most widely used open-source exploitation framework. Learn how to use it and unlock its full potential. | ||||||||||
Virusx5 | 15 | 2 years ago | gpl-3.0 | HTML | ||||||
The Most Powerful Fake Page Redirecting tool... | ||||||||||
Jasmin Ransomware | 14 | 3 years ago | C# | |||||||
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks. | ||||||||||
Turtle | 6 | 3 years ago | mit | Python | ||||||
MSFVenom Powershell Stager Encoder & Generator | ||||||||||
Intro To Ethical Hacking | 5 | 4 years ago | JavaScript | |||||||
Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showed how you can protect yourself from some common attacks. Using Kali Linux as a platform, we isolated exploits and recreate some of the more common major attacks (eg; ‘Man-In-The-Middle’) using a variety of penetration testing tools such as the Browser Exploitation Framework, also showed how to inoculate your systems against each malicious action. |