Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security tools hacking tool
hacking-tool
x
security-tools
x
77 search results found
Sn1per
⭐
7,480
Attack Surface Management Platform
Awesome Hacker Search Engines
⭐
6,307
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Linux Exploit Suggester
⭐
5,139
Linux privilege escalation auditing tool
Whatweb
⭐
5,096
Next generation web scanner
Osmedeus
⭐
5,076
A Workflow Engine for Offensive Security
Cheatsheet God
⭐
4,540
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Cameradar
⭐
3,626
Cameradar hacks its way into RTSP videosurveillance cameras
Blackhat Arsenal Tools
⭐
3,551
Official Black Hat Arsenal Security Tools Repository
Usbrubberducky Payloads
⭐
3,242
The Official USB Rubber Ducky Payload Repository
Stegcloak
⭐
3,158
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
Nettacker
⭐
2,915
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
Nosqlmap
⭐
2,728
Automated NoSQL database enumeration and web application exploitation tool.
Awesome Hacking
⭐
2,716
Awesome hacking is an awesome collection of hacking tools.
Awesome Mobile Security
⭐
2,511
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Reconnoitre
⭐
2,053
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Appinfoscanner
⭐
1,975
一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网
Diamorphine
⭐
1,639
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
Xattacker
⭐
1,486
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Cloakify
⭐
1,483
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Ksubdomain
⭐
1,457
无状态子域名爆破工具
Interlace
⭐
1,161
Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Vhostscan
⭐
1,114
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Captfencoder
⭐
1,088
Captfencoder is opensource a rapid cross platform network security tool suite, providing network security related code conversion, classical cryptography, cryptography, asymmetric encryption, miscellaneous tools, and aggregating all kinds of online tools.
Evillimiter
⭐
928
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Ssh Snake
⭐
874
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Sipvicious
⭐
835
SIPVicious OSS is a VoIP security testing toolset. It helps security teams, QA and developers test SIP-based VoIP systems and applications. This toolset is useful in simulating VoIP hacking attacks against PBX systems especially through identification, scanning, extension enumeration and password cracking.
Hosthunter
⭐
826
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Web Cache Vulnerability Scanner
⭐
756
Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/).
Psudohash
⭐
724
Generates millions of keyword-based password mutations in seconds.
Dumpsterfire
⭐
709
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Scilla
⭐
682
Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration
Autopwn Suite
⭐
636
AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.
Packetwhisper
⭐
605
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Jok3r
⭐
564
Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Hellraiser
⭐
545
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Yasuo
⭐
491
A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Alanframework
⭐
435
A C2 post-exploitation framework
Sharkjack Payloads
⭐
432
The Official Hak5 Shark Jack Payload Repository
Awesome Bbht
⭐
390
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Taipan
⭐
369
Web application vulnerability scanner
Sippts
⭐
347
Set of tools to audit SIP based VoIP Systems
Lit Bb Hack Tools
⭐
293
Little Bug Bounty & Hacking Tools⚔️
Cerberus
⭐
246
一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产 bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQ XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能
Vaf
⭐
241
Vaf is a cross-platform very advanced and fast web fuzzer written in nim
Wifi Password Stealer
⭐
223
Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).
Drat
⭐
216
去中心化远程控制工具(Decentralized Remote Administration Tool),通过ENS实现了配置文件分发的去中心化,通过Telegram实现了服务端的去中心化
Emailall
⭐
216
EmailAll is a powerful Email Collect tool — 一款强大的邮箱收集工具
Linux Soft Exploit Suggester
⭐
204
Search Exploitable Software on Linux
Minesweeper
⭐
188
A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Reveng_rtkit
⭐
181
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
Lucifer
⭐
177
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Octopuswaf
⭐
170
OctopusWAF is a WAF( Web application firewall) with high performance, made in C language and use libevent.
Netpwn
⭐
161
Tool made to automate tasks of pentesting.
Recsech
⭐
161
Recsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected, Subdomain takeovers, Reconnaissance On Github and much more you can see in Features in tools .
Crithit
⭐
152
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Vmass
⭐
148
vMass Bot 🪝 Vulnerability Scanner & Auto Exploiter Tool Written in Perl.
Skanuvaty
⭐
140
Dangerously fast DNS/network/port scanner
Awesome Ddos Tools
⭐
115
Collection of several DDos tools.
Burp Suite Pro
⭐
109
A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.
Spygen
⭐
107
Trojan 🐍 (keylogger, take screenshots, open your webcam) 🔓
Preferred Network List Sniffer
⭐
98
A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.
Recon
⭐
75
NodeJS script to extract assets for the Apple bug bounty program from their security acknowledgments page for bug bounty recon.
Longtongue
⭐
75
Customized Password/Passphrase List inputting Target Info
Network Threats Taxonomy
⭐
70
Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Pentbox
⭐
60
PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.
Omegapstoolkit
⭐
49
Totally in development! A toolkit that brings together penetration testing tools such as wireless tools, web tools, password cracking tools, etc.
Dimorf
⭐
49
Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s
Aquatone
⭐
48
A Tool for Domain Flyovers
Evillimiter Windows
⭐
39
Tool that limits bandwidth of devices on the same network without access.
Satanklgr
⭐
39
⛤Keylogger Generator for Windows written in Python⛤
Rbust
⭐
39
[ Blazing Fast Web Fuzzer in Rust ]
Xattacker
⭐
39
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Awesome Security
⭐
36
A collection of awesome ethical hacking and security related content!
Obsidiansailboat
⭐
35
Nmap and NSE command line wrapper in the style of Metasploit
Delosnmap
⭐
34
delosNmap | Nmap Script
Whispers
⭐
34
Identify hardcoded secrets in static structured text (version 2)
Ehtk
⭐
34
Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Researchers etc. It contains almost all tools mentioned in CEH, OSCP, eCPPT and PNPT
Pentest Resources Cheat Sheets
⭐
33
This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-ups, tools, techniques, programming/scripting notes, and more. I documented them in this repo to provide like-minded offensive security enthusiasts and professionals easy access to these valuable resources.
Scanner Inurlbr
⭐
31
Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.
Brutus
⭐
30
Botnet targeting Windows machines written entirely in Python & open source security project.
Zip Shotgun
⭐
25
Utility script to test zip file upload functionality (and possible extraction of zip files) for vulnerabilities (aka Zip Slip)
Substack
⭐
22
Sub-domains enumeration framework
Active Ip
⭐
21
🕵️♂️🔍 A tool with several scanning techniques that extracts live IP addresses from a list of IP addresses or CIDR notations.
Labsecurity
⭐
21
Labsecurity is a tool that bundles ethical hacking python scripts into a single tool with cli interface.
Clearlead
⭐
20
The name is clear, the concept is simple. Run this to assess the external footprint of a given website. Hopefully, there will be a clear lead to follow.
Onionfermenter
⭐
20
A tool for creating bitcoin stealing phishing clones of onion services on large scale
Gpk
⭐
18
Gengar PwnerKit
Stb
⭐
17
Security Tool Builder: project to automate the building of hacking tools
Teensy3.2 Projects
⭐
16
Teensy 3.2 Projects - Teensy with CMD Command Execution Attack Example 💣
Fbspider
⭐
16
Scraping Facebook information
Burp Suite Pro 2023
⭐
13
A Bash and PowerShell script for acquiring the most recent edition of Burp Suite Professional 2023 without charge.
Haram Tool Hacker Penetration Master
⭐
13
Haram Tool is Software Web Penetration Testing Tool.
Cybersecurity Ethical Hacking
⭐
12
An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resources
Redjoust
⭐
11
A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Written in nodeJS and Electron.
Hitman
⭐
10
Hitman - A tool for reliable TCP/IP communication and detection in the presence of on-path connection reset censorship technologies and firewalls.
Sqli Detector In Python
⭐
10
python based sqli detector tool
Kaliladon
⭐
10
Ladon for Linux (Kali), Large Network Penetration Scanner, vulnerability / exploit / detection / MS17010 / password
Miniss
⭐
9
Displays a list of open listening sockets. It is a minimal alternative to ss or netstat.
Mobile Heavy Artillery
⭐
8
🔥Ready, Aim, Fire.🔥
Shadowduck
⭐
8
ShadowDuck - Reverse http interactive shell
Related Searches
Python Security Tools (592)
Python Hacking Tool (458)
1-77 of 77 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.