Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for cybersecurity hacking tool
cybersecurity
x
hacking-tool
x
81 search results found
Sn1per
⭐
7,480
Attack Surface Management Platform
Phonesploit Pro
⭐
3,899
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
Villain
⭐
3,376
Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).
Blackhat Python3
⭐
1,763
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Keylogger
⭐
1,634
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Unshackle
⭐
1,545
Open-source tool to bypass windows and linux passwords from bootable usb
Lockdoor Framework
⭐
1,254
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Search That Hash
⭐
1,105
🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Captfencoder
⭐
1,088
Captfencoder is opensource a rapid cross platform network security tool suite, providing network security related code conversion, classical cryptography, cryptography, asymmetric encryption, miscellaneous tools, and aggregating all kinds of online tools.
Ssh Snake
⭐
874
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Violent Python3
⭐
867
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Autopwn Suite
⭐
636
AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.
Ghosttrack
⭐
470
Useful tool to track location or mobile number
Ntlmrecon
⭐
458
Enumerate information from NTLM authentication enabled web endpoints 🔎
Alfred
⭐
456
Alfred is a advanced OSINT information gathering tool that finds social media accounts based on inputs.
Exploit Notes
⭐
454
Sticky notes for pentesting, bug bounty, CTF.
Nivos
⭐
369
NIVOS is a hacking tool that allows you to scan deeply , crack wifi, see people on your network. It applies to all linux operating systems. And it is improving every day, new packages are added. Thank You For Using NIVOS :> [NIVOS Created By NIVO Team]
Ransomware
⭐
341
Ransomwares Collection. Don't Run Them on Your Device.
Wifipassword Stealer
⭐
313
Get All Registered Wifi Passwords from Target Computer.
Agartha
⭐
292
a burp extension creates dynamic payloads to reveal injection flaws(LFI, RCE, SQLi), generates user access tables to spot authentication/authorization issues, and copys Http requests as JavaScript code.
Cyberonix
⭐
241
Cyberonix is a complete resource hub for Cyber Security Community. Our aim is to make this tool an 1 stop solution for all the Hackers out there to get resources of various topics in Cyber Security. We will keep updating this tool & adding new & updated resources on the go.
Wifi Password Stealer
⭐
223
Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).
Remote_hacker_probe
⭐
221
Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.
Hackingtoolkit
⭐
220
ALL IN ONE Hacking Tool For Hackers, Penetration Tester and Cybersecurity. New Version Beginner to Advanced Tool. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !
Slash
⭐
201
The Slash OSINT Tool
Nightingale
⭐
183
It's a Docker Environment for Pentesting which having all the required tool for VAPT.
Tryhackme Ctf
⭐
178
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Lucifer
⭐
177
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Espionage
⭐
162
A Network Packet and Traffic Interceptor For Linux. Spoof ARP & Wiretap A Network.
Kali Linux Tools Interface
⭐
141
Graphical Web interface developed to facilitate the use of security information tools.
Skanuvaty
⭐
140
Dangerously fast DNS/network/port scanner
Hacking Rust
⭐
133
A FREE comprehensive online Rust hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of reverse engineering Rust from scratch.
Witch_craft
⭐
125
WITCH_CRAFT is a versatile task automation software designed to serve as the foundation for various cyber security modules. It provides capabilities for tasks such as forensic research, OSINT (Open Source Intelligence), scanning, backup and copying, intrusion testing of applications and APIs, and more.
Infosec And Hacking Scripts
⭐
118
🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation automated scripts to make hacking easier🌠. Have fun!😎
Awesome Ddos Tools
⭐
115
Collection of several DDos tools.
Virtualseccons
⭐
113
An ongoing list of virtual cybersecurity conferences.
Preferred Network List Sniffer
⭐
98
A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.
Samlists
⭐
90
Free, libre, effective, and data-driven wordlists for all!
Slowloris
⭐
89
Asynchronous Python implementation of SlowLoris DoS attack
Turbo Attack
⭐
87
A turbo traffic generator pentesting tool to generate random traffic with random mac and ip addresses in addition to random sequence numbers to a particular ip and port.
Cam Dumper
⭐
78
Cam-dumper is a written tool in the language of Python program for hacking CCTV cameras that can access cameras in 20 countries
Cyber Sploit
⭐
76
A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules will be added time to time.
Recon
⭐
75
NodeJS script to extract assets for the Apple bug bounty program from their security acknowledgments page for bug bounty recon.
Recon
⭐
73
Enumerate a target Based off of Nmap Results
Keylogger
⭐
63
A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record each keystroke on a specific computer. Keylogger software is also available for use on smartphones, such as the Apple iPhone and Android devices.
Vector
⭐
56
Open source osint project.
Puwr
⭐
54
Pivot your way deeper into computer networks with SSH compromised machines.
Omegapstoolkit
⭐
49
Totally in development! A toolkit that brings together penetration testing tools such as wireless tools, web tools, password cracking tools, etc.
Autosploit
⭐
47
Autosploit = Automating Metasploit Modules.
Htkit
⭐
41
Information Gathering Simplified.
Satanklgr
⭐
39
⛤Keylogger Generator for Windows written in Python⛤
Reosploit
⭐
39
A Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Vichiti
⭐
39
An OSINT focused tool made with Nodejs!
Webspoilt
⭐
38
This script will you help to find the information about the website and to help in penetrating testing
Wiper
⭐
37
Toolkit to perform secure destruction of sensitive virtual data, temporary files and swap memories.
Blindpie
⭐
37
Automatically exploit time-based blind SQL injection vulnerabilities.
Ehtk
⭐
34
Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Researchers etc. It contains almost all tools mentioned in CEH, OSCP, eCPPT and PNPT
Attacksurfacemanagement
⭐
33
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Pentest Resources Cheat Sheets
⭐
33
This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-ups, tools, techniques, programming/scripting notes, and more. I documented them in this repo to provide like-minded offensive security enthusiasts and professionals easy access to these valuable resources.
Kalipackergemanager
⭐
33
Kali Packerge Manager
Socialrecon
⭐
32
This is an Open source intelligence tool and used to gather information about social media and it is also used to find whether the user name found in any of the website.It is used to find GPS location of an image and it also checks whether the email is found or not.
Sniffcon Ultimate Recon Dashboard For Bug Bounty And Pentesting
⭐
31
Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.
Scanner Inurlbr
⭐
31
Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.
Cve 2018 4407
⭐
29
IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]
Python30days
⭐
27
🚀 Python Learning Roadmap in 30 Days With Projects
Tsuki Sploit
⭐
24
A USB-based script for Ethical hacking with multiple attacks
Wordlist Generator
⭐
24
Generate customised wordlist for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
Hostenumerator
⭐
22
A tool that automates the process of enumeration
Trj
⭐
19
Execute any command in other's computer using a trojan horse coded and compiled in C. Just for educational purpose.
Spyderc2
⭐
18
A simple, dockerized python based Command and Control(C2) Framework named SpyderC2
Web Scanner
⭐
17
Escaner WEB que tiene como objetivo sacar toda la información posible como IP, CMS, Usuarios, posibles correos, rendimiento de la URL, Puertos Abiertos, Subdirectorios ... Etc.
Void
⭐
16
VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute force and other things... You have many choices. If you want to learn penetration , VOID may be a teacher for you. Because its open source code project. Please look VOID's source code and examine commands! And please dont forget to star project.
Zombiegang
⭐
16
Botnet framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface which makes it funny to use. By now, it includes keylogger, DDoS and bruteforce attacks. The project is still under development phase, I appreciate any contribution :)
Phoenix
⭐
16
A tool for steganography of png files .
Virusx5
⭐
15
The Most Powerful Fake Page Redirecting tool...
Kissing Bug
⭐
15
This is a combination of a hacking and a cracking tool.
Jasmin Ransomware
⭐
14
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Burp Suite Pro 2023
⭐
13
A Bash and PowerShell script for acquiring the most recent edition of Burp Suite Professional 2023 without charge.
Haram Tool Hacker Penetration Master
⭐
13
Haram Tool is Software Web Penetration Testing Tool.
Kingster
⭐
12
Program to defend King.txt for TryHackMe's Koth
Cybersecurity Ethical Hacking
⭐
12
An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resources
Phisheye
⭐
12
phishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok.
Hacking Notes
⭐
12
Hacking Notes
Defconarsenaltools
⭐
11
Defcon Arsenal Tools (DArT) is a curation of tools presented at DEF CON, the world's largest hacker con.
Dnsupdate
⭐
11
A python based script to update DNS entries in ADIDNS
C2 Cloud
⭐
10
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
The Box
⭐
10
A tool box with 174 useful and common Linux tools for penetration testing and security audits.
Openredscan
⭐
10
Multifunctional open redirection vulnerability scanner.
Sqli Detector In Python
⭐
10
python based sqli detector tool
Godork
⭐
10
This is a Python based GUI(Graphical User Interface) application for Google Dorking. Easy and convinient tool
Stealthlink
⭐
9
With StealthLink, you can easily create a convincing mask for your phishing URLs, making them indistinguishable from legitimate websites. This tool is designed to provide a professional-level of obfuscation to any phishing URL, making it virtually impossible for users to detect.
Headmail
⭐
9
A tool designed to analyse email headers
Cstorm Windows Startup Virus In C
⭐
9
An opensource Prank Startup Malware for windows developed using C Programming Language.
Evilqr
⭐
9
Generate Malicious QR or similar
Miniss
⭐
9
Displays a list of open listening sockets. It is a minimal alternative to ss or netstat.
Sws Recon Tool
⭐
9
SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects information such as Google Dork, DNS Information, Sub Domains, PortScan, Subdomain takeovers, Reconnaissance On Github and much more vulnerability scan.
Corexital Multitool
⭐
9
Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation
Digit
⭐
8
Extract endpoints from specific Git repository for fuzzing
Bootmiester
⭐
8
Advanced deauthentication script.
Steal All Files
⭐
8
Python script to automatically steal all the files and information from a computer using an USB device. Created just for educational purposes.
Related Searches
Python Cybersecurity (583)
Security Cybersecurity (517)
Python Hacking Tool (458)
1-81 of 81 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.