Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for python offensive security
offensive-security
x
python
x
73 search results found
Defaultcreds Cheat Sheet
⭐
5,023
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Villain
⭐
3,376
Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).
Oscp
⭐
2,235
OSCP Cheat Sheet
Keylogger
⭐
1,634
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Rapidscan
⭐
1,489
🆕 The Multi-Tool Web Vulnerability Scanner.
Digital Forensics Guide
⭐
1,232
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Vhostscan
⭐
1,114
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
007 Thebond
⭐
931
This Script will help you to gather information about your victim or friend.
Blackmamba
⭐
688
C2/post-exploitation framework
Redteam_toolkit
⭐
512
Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.
Vault
⭐
477
swiss army knife for hackers
Oscp Pwk
⭐
434
This is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.
Flask Session Cookie Manager
⭐
429
🍪 Flask Session Cookie Decoder/Encoder
Vanquish
⭐
422
Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Gtfonow
⭐
414
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Badkarma
⭐
409
network reconnaissance toolkit
Chimera
⭐
346
Automated DLL Sideloading Tool With EDR Evasion Capabilities
East
⭐
293
Exploits and Security Tools Framework 2.0.1
Agartha
⭐
292
a burp extension creates dynamic payloads to reveal injection flaws(LFI, RCE, SQLi), generates user access tables to spot authentication/authorization issues, and copys Http requests as JavaScript code.
Wifi Pentesting Guide
⭐
269
WiFi Penetration Testing Guide
Fudgec2
⭐
236
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Hawk
⭐
227
Network, recon and offensive-security tool for Linux.
Forbidden
⭐
208
Bypass 4xx HTTP response status codes and more. Based on PycURL and Python Requests.
Black Widow
⭐
168
GUI based offensive penetration testing tool (Open Source)
Atomic Red Team Intelligence C2
⭐
163
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Pyphisher
⭐
154
Python tool for phishing
Wwwtree
⭐
146
A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesystem to a victim machine during privilege escalation.
Offensive Azure
⭐
135
Collection of offensive tools targeting Microsoft Azure
Offensive Dockerfiles
⭐
132
Offensive tools as Dockerfiles. Lightweight & Ready to go
Dfshell
⭐
115
D3Ext's Forward Shell
Synergy Httpx
⭐
106
A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving content dynamically (e.g. payloads).
Noobsec Toolkit
⭐
102
NoobSecToolkit is a Python Based Tool kit that brings together powerful security and anonymity tools and scripts with predefined security configurations and modifications. Making it very simple for students and the inexperienced to get started with offensive security!
Arsenal
⭐
96
Offensive security tools weaponized
Punk.py
⭐
94
unix SSH post-exploitation 1337 tool
Docker_offensive_elk
⭐
90
Elasticsearch for Offensive Security
Pythonizing_nmap
⭐
85
A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.
Pentest Everything
⭐
81
This is a penetration testing cheatsheet I created to get my OSCP certification.
Uscan
⭐
69
uscan is an automated vulnerability scanner that streamlines the process of website hacking, making it faster and more efficient than ever before.
Gator
⭐
57
GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments
Try Harder
⭐
41
"Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Security Certified Professional (OSCP) exam, all while offering an immersive experience and retro aesthetic. Enter Real commands correctly, move to the next host, and get a point. Can you get 100?
Buffer_overflow
⭐
37
Don't let buffer overflows overflow your mind
Pnt3
⭐
35
Python tools for networking
Security Utilities
⭐
35
Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized
C2pe
⭐
34
C2 and Post Exploitation Code
Bifrost
⭐
34
A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.
Bof
⭐
30
BOF (Boiboite Opener Framework) is a testing framework for industrial protocols implementations and devices.
Malicious Rmqr Codes
⭐
23
Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more
W4af
⭐
23
w4af: web advanced application attack and audit framework, the open source web vulnerability scanner.
Bifrost
⭐
21
Bifrost C2. Open-source post-exploitation using Discord API
Thunderstorm
⭐
20
Golang C2 Server and Agents using XMT (https://github.com/iDigitalFlame/xmt)
Chad
⭐
17
Search Google Dorks like Chad. / Social media takeover tool.
Param Ninja
⭐
16
An automated penetration testing tool , that automates web vulnerabilities testing upon a given URL with an endpoint parameter
Thecollective
⭐
16
The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/TheCollective #infosec #redteaming #pentest
Havoc_profile_generator
⭐
14
Havoc C2 profile generator
Powerjoker
⭐
12
A random powershell Reverse-Shell in each execution taking LHOST/LPORT
Dash
⭐
12
DASH is deep osint Scanner. You just need username to start osint scan.
Wirebirb
⭐
12
A scapy based module for programming offensive and defensive networking tools easier than before.
Pydorker
⭐
10
Python tool for Dorking
C2 Cloud
⭐
10
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
Codeargos
⭐
10
A python module for red teams to support the continuous recon of JavaScript files and HTML script blocks in an active web application.
Jwt Bf
⭐
10
Brute force a JWT token. Script uses multithreading.
Hack_hard
⭐
10
A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard
Godork
⭐
10
This is a Python based GUI(Graphical User Interface) application for Google Dorking. Easy and convinient tool
Wordlist Extender
⭐
9
Extend wordlist by appending digits and special characters to each word.
Goblyn
⭐
9
Goblyn is a Python tool focused to enumeration and capture of website files metadata.
Slacksploit
⭐
8
A forensic analysis framework for enumerating slack artifacts residing in the Operating system.
Reait
⭐
8
RevEng.AI Toolkit and Python API
Ogre
⭐
7
The Ultimate Protocol Bruteforcer
Ssti Flask Hacking Playground
⭐
7
App with Server Side Template Injection (SSTI) vulnerability - in Flask. For web penetration testing / ethical hacking. Possible RCE :)
Masapt
⭐
7
Multi-Agent System for Automated Penetration Testing (MASAPT)
Amounts
⭐
6
Generate a wordlist to fuzz amounts or any other numerical values.
Xdebug Exploit
⭐
6
An automated xdebug 2.5.5 vulnerability exploit
Moria
⭐
6
Python library for interacting with in-memory C structures using data mined from binary DWARF debug info.
Fsociety
⭐
5
fsociety is a penetration toolkit inspired from MR. ROBOT
Pt Gui
⭐
5
Project PT-GUI for Deakin Capstone Hardhat Enterprises
Fconnch
⭐
5
FConnch is a fast bulk subdomain availability checker
Vulnserver Exploits
⭐
5
Vulnserver exploits created preparing for the Offensive Security's OSCE exam
Nullbrain
⭐
5
Attempt to create knowledge base
Overwhelm
⭐
5
Overwhelm's Vanquish is a Kali Linux based Enumeration Orchestrator built in Python running inside a docker container. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases. The results of each phase are fed into the next phase to identify vulnerabilities that could be leveraged for a remote shell
Nagooglesearch
⭐
5
Not another Google searching tool.
Fishshell
⭐
5
FIshShell is a multi-session handler and Windows & Linux backdoor payload generator. It allows users\targets to connect to the server (other machines running the multi-handler) after which the server admin/attacker can join sessions and also get a non-interactive reverse shell.
Sycp
⭐
5
Anotações realizadas durante a certificação SYCP
Related Searches
Python Django (28,897)
Python Flask (17,643)
Python Script (17,004)
Python Docker (14,113)
Python Testing (9,479)
Python C Plus Plus (6,054)
Python Git (4,731)
Python Cloud Computing (4,599)
Python Gui (4,545)
Python Crawler (4,466)
1-73 of 73 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.