Trending repositories for topic pentesting-tools
Automated pentest reporting with custom Word templates, project tracking, and client management tools. Streamline your security workflows effortlessly!
A deauth attack that disconnects all devices from the target wifi network (2.4Ghz & 5Ghz)
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in disk forensics, memory analysis, network monitoring, malware analy...
A curated collection of top-tier penetration testing tools and productivity utilities across multiple domains. Join us to explore, contribute, and enhance your hacking toolkit!
Offensive Security OSCP, OSWP, OSEP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA Exam and Lab Reporting / Note-Taking Tool
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement
A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in disk forensics, memory analysis, network monitoring, malware analy...
Automated pentest reporting with custom Word templates, project tracking, and client management tools. Streamline your security workflows effortlessly!
A deauth attack that disconnects all devices from the target wifi network (2.4Ghz & 5Ghz)
Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement
A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication
Offensive Security OSCP, OSWP, OSEP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA Exam and Lab Reporting / Note-Taking Tool
A curated collection of top-tier penetration testing tools and productivity utilities across multiple domains. Join us to explore, contribute, and enhance your hacking toolkit!
Username enumeration and password spraying tool aimed at Microsoft O365.
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
Automated pentest reporting with custom Word templates, project tracking, and client management tools. Streamline your security workflows effortlessly!
A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in disk forensics, memory analysis, network monitoring, malware analy...
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
A deauth attack that disconnects all devices from the target wifi network (2.4Ghz & 5Ghz)
A curated collection of top-tier penetration testing tools and productivity utilities across multiple domains. Join us to explore, contribute, and enhance your hacking toolkit!
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
Uncover the true IP address of websites safeguarded by Cloudflare & Others
Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hackers and developers identify and address sensitive information wi...
A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in disk forensics, memory analysis, network monitoring, malware analy...
Automated pentest reporting with custom Word templates, project tracking, and client management tools. Streamline your security workflows effortlessly!
Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hackers and developers identify and address sensitive information wi...
A deauth attack that disconnects all devices from the target wifi network (2.4Ghz & 5Ghz)
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
A curated collection of top-tier penetration testing tools and productivity utilities across multiple domains. Join us to explore, contribute, and enhance your hacking toolkit!
Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement
SMSgate is an open source Python-based server for sending and especially receiving SMS using multiple GSM modems and SIM cards.
Improved SMTP Checker / SMTP Cracker with proxy-support, inbox test and many more features.
A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Generate tens of thousands of subdomain combinations in a matter of seconds
A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in disk forensics, memory analysis, network monitoring, malware analy...
Automated pentest reporting with custom Word templates, project tracking, and client management tools. Streamline your security workflows effortlessly!
Convolutional neural network for analyzing pentest screenshots
A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in disk forensics, memory analysis, network monitoring, malware analy...
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.
A deauth attack that disconnects all devices from the target wifi network (2.4Ghz & 5Ghz)
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
Uncover the true IP address of websites safeguarded by Cloudflare & Others
A curated collection of top-tier penetration testing tools and productivity utilities across multiple domains. Join us to explore, contribute, and enhance your hacking toolkit!
Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.
Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hackers and developers identify and address sensitive information wi...
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectable malleable implants compatible with Windows/Linux/Mac OSX, and...
Automated pentest reporting with custom Word templates, project tracking, and client management tools. Streamline your security workflows effortlessly!
This is a website penetration testing tool for testing webdav server vulnerabilities.
Convolutional neural network for analyzing pentest screenshots
Blind XSS Scanner is a tool that can be used to scan for blind XSS vulnerabilities in web applications.
A deauth attack that disconnects all devices from the target wifi network (2.4Ghz & 5Ghz)
Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC
Scoop bucket for Penetration Testing and Cybersecurity related tools. 用于渗透测试和网络安全相关工具下载、安装和自动更新的Scoop软件仓库。
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
A pure PowerShell solution for Entra OAuth authentication, enabling easy retrieval of access and refresh tokens
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy
A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.
A pure PowerShell solution for Entra OAuth authentication, enabling easy retrieval of access and refresh tokens
A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in disk forensics, memory analysis, network monitoring, malware analy...
AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.
LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectable malleable implants compatible with Windows/Linux/Mac OSX, and...
Scoop bucket for Penetration Testing and Cybersecurity related tools. 用于渗透测试和网络安全相关工具下载、安装和自动更新的Scoop软件仓库。
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
Uncover the true IP address of websites safeguarded by Cloudflare & Others
A deauth attack that disconnects all devices from the target wifi network (2.4Ghz & 5Ghz)
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
Offensive Security OSCP, OSWP, OSEP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA Exam and Lab Reporting / Note-Taking Tool
An XSS exploitation command-line interface and payload generator.
Convolutional neural network for analyzing pentest screenshots
Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
Git Exposed leverages the unintended exposure of .git directories to clone and reconstruct complete projects, providing a clear window into potential vulnerabilities.
Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.
Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement
A deauth attack that disconnects all devices from the target wifi network (2.4Ghz & 5Ghz)
A pure PowerShell solution for Entra OAuth authentication, enabling easy retrieval of access and refresh tokens
Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.
Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hackers and developers identify and address sensitive information wi...
Unveiling the Hidden Layers of the Web – A Comprehensive Web Reconnaissance Tool
EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.
Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with a mounted windows drive.
Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!
This repo houses Rubber Ducky scripts integrated with OpenAI's GPT. Designed for ethical hackers and researchers, it merges quick Ducky executions with GPT's intelligence. Always use responsibly and w...