Tool count: 2999
Name | Version | Description | Category | Website |
---|---|---|---|---|
0d1n | 1:263.2d723ae | Web security tool to make fuzzing at HTTP inputs, made in C with libCurl. | webapp fuzzer scanner | |
0trace | 1.5 | A hop enumeration tool. | scanner | |
3proxy | 0.9.4 | Tiny free proxy server. | proxy | |
3proxy-win32 | 0.8.13 | Tiny free proxy server. | windows proxy | |
42zip | 1:42 | Recursive Zip archive bomb. | dos | |
a2sv | 140.cb24c4e | Auto Scanning to SSL Vulnerability (HeartBleed, CCS Injection, SSLv3 POODLE, FREAK, LOGJAM Attack, SSLv2 DROWN etc). | scanner | |
abcd | 4.2738809 | ActionScript ByteCode Disassembler. | disassembler | |
abuse-ssl-bypass-waf | 7.c28f98e | Bypassing WAF by abusing SSL/TLS Ciphers. | webapp fuzzer | |
acccheck | 0.2.1 | A password dictionary attack tool that targets windows authentication via the SMB protocol. | cracker | |
ace | 1.10 | Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface | voip | |
aclpwn | 4.81480cc | Active Directory ACL exploitation with BloodHound. | exploitation | |
activedirectoryenum | 1:0.5.0 | Enumerate AD through LDAP. | recon | |
ad-ldap-enum | 88.60bc5bb | An LDAP based Active Directory user and group enumeration tool. | recon | |
ad-miner | v1.6.0.r0.g008bf05 | Active Directory audit tool that extract data from Bloodhound to uncover security weaknesses and generate an HTML report | recon windows | |
adape-script | 43.4d0b9ff | Active Directory Assessment and Privilege Escalation Script. | windows exploitation | |
adassault | 0.0.3.r4.ge0d9356 | An Active Directory environments pentest tool complementary to existing ones like NetExec. | networking | |
adenum | 36.fbbe14d | A pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos. | exploitation scanner | |
adfind | 1:v1.0.3.r0.g3a6a055 | Admin Panel Finder. | webapp recon | |
adfspray | 6.3d7745d | Python3 tool to perform password spraying against Microsoft Online service using various methods. | cracker windows | |
adidnsdump | 25.8bbb4b0 | Active Directory Integrated DNS dumping by any authenticated user. | recon | |
admid-pack | 1:0.1 | ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful. | spoof | |
adminpagefinder | 0.1 | This python script looks for a large amount of possible administrative interfaces on a given site. | webapp scanner | |
admsnmp | 0.1 | ADM SNMP audit scanner. | scanner | |
aesfix | 1.0.1 | A tool to find AES key in RAM | forensic cracker | |
aeskeyfind | 1.0 | A tool to find AES key in RAM | forensic cracker | |
aespipe | 2.4f | Reads data from stdin and outputs encrypted or decrypted results to stdout. | crypto | |
aesshell | 0.7 | A backconnect shell for Windows and Unix written in python and uses AES in CBC mode in conjunction with HMAC-SHA256 for secure transport. | backdoor windows | |
afflib | 3.7.19 | An extensible open format for the storage of disk images and related forensic information. | forensic | |
afl | 2.57b | Security-oriented fuzzer using compile-time instrumentation and genetic algorithms | fuzzer binary | |
aflplusplus | 1:v4.20c.r16.gad0d0c77 | American Fuzzing Lop fuzzer with community patches and additional features. | fuzzer | |
afpfs-ng | 0.8.2 | A client for the Apple Filing Protocol (AFP) | networking misc | |
agafi | 1:1.1 | A gadget finder and a ROP-Chainer tool for x86 platforms. | windows exploitation | |
against | 1:0.2 | A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list. | cracker | |
aggroargs | 51.c032446 | Bruteforce commandline buffer overflows, linux, aggressive arguments. | exploitation fuzzer | |
aiengine | 1:2.0.1 | A packet inspection engine with capabilities of learning without any human intervention. | networking defensive | |
aimage | 3.2.5 | A program to create aff-images. | forensic | |
aiodnsbrute | 38.e773a4c | Python 3 DNS asynchronous brute force utility. | recon | |
air | 2.0.0 | A GUI front-end to dd/dc3dd designed for easily creating forensic images. | forensic | |
aircrack-ng | 1.7 | Key cracker for the 802.11 WEP and WPA-PSK protocols | wireless | |
airflood | 0.1 | A modification of aireplay that allows for a DoS of the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections. | wireless | |
airgeddon | 1:v11.31.r0.g7335109 | Multi-use bash script for Linux systems to audit wireless networks. | wireless automation | |
airgraph-ng | 2:2.0.2 | Graphing tool for the aircrack suite. | misc | |
airopy | 5.b83f11d | Get (wireless) clients and access points. | wireless sniffer | |
airoscript | 2:45.0a122ee | A script to simplify the use of aircrack-ng tools. | wireless | |
airpwn | 1.4 | A tool for generic packet injection on an 802.11 network. | wireless | |
ajpfuzzer | 0.6 | A command-line fuzzer for the Apache JServ Protocol (ajp13). | fuzzer | |
albatar | 34.4e63f22 | A SQLi exploitation framework in Python. | webapp exploitation | |
allthevhosts | 1.0 | A vhost discovery tool that scrapes various web applications. | scanner webapp | |
altdns | 76.8c1de0f | Generates permutations, alterations and mutations of subdomains and then resolves them. | recon | |
amass | 2:2143.5f1f7176 | In-depth subdomain enumeration written in Go. | scanner recon | |
amber | 256.f6eb2dc | Reflective PE packer. | binary packer windows | |
amoco | 1:v2.9.11.r2.gf1182a5 | Yet another tool for analysing binaries. | binary reversing | |
analyzemft | 133.b6ed04f | Parse the MFT file from an NTFS filesystem. | forensic | |
analyzepesig | 0.0.0.5 | Analyze digital signature of PE file. | windows binary forensic | |
androbugs | 1.7fd3a2c | An efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications. | mobile | |
androguard | 3:3.3.5 | Reverse engineering, Malware and goodware analysis of Android applications and more. | binary disassembler malware | |
androick | 8.522cfb4 | A python tool to help in forensics analysis on android. | mobile forensic | |
android-apktool | 2.7.0 | A tool for reengineering Android apk files. | reversing disassembler | |
android-ndk | 2:r27 | Android C/C++ developer kit. | mobile | |
android-sdk | 26.1.1 | Google Android SDK. | mobile | |
android-sdk-platform-tools | r23.0.1 | Platform-Tools for Google Android SDK (adb and fastboot). | mobile | |
android-udev-rules | 1:532.d1bdb59 | Android udev rules. | mobile | |
androidpincrack | 2.ddaf307 | Bruteforce the Android Passcode given the hash and salt. | mobile cracker | |
androidsniffer | 0.1 | A perl script that lets you search for 3rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more. | mobile scanner sniffer | |
androwarn | 135.626c02d | Yet another static code analyzer for malicious Android applications. | mobile code-audit | |
angr | 1:9.1.11752 | The next-generation binary analysis platform from UC Santa Barbara's Seclab. | binary disassembler reversing | |
angr-management | 9.1.11752 | This is the GUI for angr. | binary disassembler reversing | |
angr-py2 | 1:7.8.9.26 | The next-generation binary analysis platform from UC Santa Barbaras Seclab. | binary disassembler reversing | |
angrop | 408.15616aa | A rop gadget finder and chain builder. | exploitation | |
anontwi | 1.1b | A free software python client designed to navigate anonymously on social networks. It supports Identi.ca and Twitter.com. | social | |
anti-xss | 166.2725dc9 | A XSS vulnerability scanner. | webapp scanner | |
antiransom | 5 | A tool capable of detect and stop attacks of Ransomware using honeypots. | windows defensive honeypot | |
anubis | 1.1.3.r0.g9ea89fa | Subdomain enumeration and information gathering tool. | blackawrch-scanner recon | |
apache-users | 2.1 | This perl script will enumerate the usernames on a unix system that use the apache module UserDir. | scanner | |
apachetomcatscanner | 3.2 | Apache Tomcat vulnerability scanner. | scanner webapp | |
apacket | 374.16e7036 | Sniffer syn and backscatter packets. | networking sniffer | |
aphopper | 0.3 | AP Hopper is a program that automatically hops between access points of different wireless networks. | wireless | |
api-dnsdumpster | 59.eda15d6 | Unofficial Python API for http://dnsdumpster.com/. | recon scanner | |
apkid | 2:2.1.4 | Android Application Identifier for Packers, Protectors, Obfuscators and Oddities. | mobile | |
apkleaks | v2.6.2.r3.g3202df9 | Scanning APK file for URIs, endpoints & secrets. | mobile misc | |
apkstat | 18.81cdad3 | Automated Information Retrieval From APKs For Initial Analysis. | mobile recon | |
apkstudio | 100.9e114ca | An IDE for decompiling/editing & then recompiling of android application binaries. | reversing mobile | |
apkurlgrep | 8.a188a98 | Extract endpoints from APK files. | mobile misc | |
apnbf | 0.1 | A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device. | wireless scanner | |
appmon | 177.f753c4d | A runtime security testing & profiling framework for native apps on macOS, iOS & android and it is built using Frida. | mobile scanner | |
apt2 | 183.8075cdc | Automated penetration toolkit. | automation | |
aquatone | 151.f4eed57 | a set of tools for performing reconnaissance on domain names. | recon scanner | |
arachni | 1.6.1.3.1.g8e5c5d0a9 | A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications. | webapp | |
aranea | 6.469b9ee | A fast and clean dns spoofing tool. | spoof | |
arcane | 2.750cb9f | Backdoor iOS packages and create the necessary resources for APT repositories. | mobile backdoor | |
archivebox | 903.59da482 | The open source self-hosted web archive. Takes browser history/bookmarks/Pocket/Pinboard/etc., saves HTML, JS, PDFs, media, and more. | misc webapp | |
arduino | 1:1.8.19 | Arduino prototyping platform SDK | hardware | |
ares | v0.10.0.r72.gff0af1c | Automated decoding of encrypted text without knowing the key or ciphers used. | cracker crypto | |
argon2 | 20190702 | The password hash Argon2, winner of PHC. | crypto defensive | |
argus | 3.0.8.2 | Network monitoring tool with flow control. | networking defensive sniffer | |
argus-clients | 3.0.8.2 | Network monitoring client for Argus. | networking defensive sniffer | |
arjun | 236.53afa55 | HTTP parameter discovery suite. | webapp scanner | |
armitage | 4:150813 | A graphical cyber attack management tool for Metasploit. | exploitation automation | |
armor | 5.bae27a6 | A simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners. | exploitation crypto | |
armscgen | 98.c51b7d6 | ARM Shellcode Generator (Mostly Thumb Mode). | exploitation automation | |
arp-scan | 1.10.0 | A tool that uses ARP to discover and fingerprint IP hosts on the local network | networking scanner fingerprint | |
arpalert | 1:2.0.12 | Monitor ARP changes in ethernet networks. | networking defensive | |
arping-th | 2.25 | ARP Ping from Thomas Habets (aka Debian arping). | networking | |
arpoison | 0.7 | The UNIX arp cache update utility | exploitation spoof | |
arpon | 2.7 | A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks. | defensive | |
arpstraw | 27.ab40e13 | Arp spoof detection tool. | defensive sniffer | |
arptools | 13.41cdb23 | A simple tool about ARP broadcast, ARP attack, and data transmission. | networking | |
arpwner | 26.f300fdf | GUI-based python tool for arp posioning and dns poisoning attacks. | networking | |
artillery | 1:357.805a5d8 | A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system. | defensive honeypot | |
artlas | 154.e5fdd8d | Apache Real Time Logs Analyzer System. | defensive | |
arybo | 65.89d9a42 | Manipulation, canonicalization and identification of mixed boolean-arithmetic symbolic expressions. | misc | |
asleap | 2.2 | Actively recover LEAP/PPTP passwords. | cracker | |
asnmap | v1.1.1.r0.g9eed841 | Map organization network ranges using ASN information. | networking | |
asp-audit | 2BETA | An ASP fingerprinting tool and vulnerability scanner. | fingerprint scanner webapp | |
assassingo | 173.2dd8650 | Web pentest framework for information gathering and vulnerability scanning. | scanner webapp | |
assetfinder | 19.4e95d87 | Find domains and subdomains potentially related to a given domain. | scanner recon | |
astra | 489.092804a | Automated Security Testing For REST API's. | webapp fuzzer | |
atear | 139.245ec8d | Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration. | wireless recon scanner | |
atftp | 0.8.0 | Client/server implementation of the TFTP protocol that implements RFCs 1350, 2090, 2347, 2348, and 2349 | networking | |
athena-ssl-scanner | 0.6.2 | a SSL cipher scanner that checks all cipher codes. It can identify about 150 different ciphers. | scanner crypto | |
atlas | 7.77bd6c8 | Open source tool that can suggest sqlmap tampers to bypass WAF/IDS/IPS. | webapp fuzzer | |
atscan | 2461.06521a9 | Server, Site and Dork Scanner. | scanner webapp fuzzer exploitation automation | |
atstaketools | 0.1 | This is an archive of various @Stake tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics. | windows scanner forensic cracker sniffer recon | |
attacksurfacemapper | 47.8a402ed | Tool that aims to automate the reconnaissance process. | recon automation | |
attk | 2.0.1023 | Trend Micro Anti-Threat Toolkit. | scanner malware | |
aurebeshjs | 77.75a8fc6 | Translate JavaScript to Other Alphabets. | misc | |
auto-eap | 18.ee36d37 | Automated Brute-Force Login Attacks Against EAP Networks. | wireless cracker | |
auto-xor-decryptor | 7.2eb176d | Automatic XOR decryptor tool. | crypto | |
automato | 33.0561b59 | Should help with automating some of the user-focused enumeration tasks during an internal penetration test. | automation recon | |
autonessus | 24.7933022 | This script communicates with the Nessus API in an attempt to help with automating scans. | automation | |
autonse | 25.7c87f4c | Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner. | automation | |
autopsy | 1:4.21.0 | A GUI for The Sleuth Kit. | forensic | |
autopwn | 190.fc80cef | Specify targets and run sets of tools against them. | automation | |
autorecon | 282.19cc46b | A multi-threaded network reconnaissance tool which performs automated enumeration of services. | automation recon scanner | |
autosint | 236.25d292c | Tool to automate common osint tasks. | recon | |
autosploit | 281.9a6a5ef | Automate the exploitation of remote hosts. | exploitation automation | |
autovpn | 18.28b1a87 | Easily connect to a VPN in a country of your choice. | automation misc | |
avaloniailspy | 1:v7.2.rc.r10.gbc00df4 | .NET Decompiler (port of ILSpy) | decompiler | |
avet | 133.2f1d882 | AntiVirus Evasion Tool | binary backdoor automation | |
avml | 1:v0.6.1.r11.g155f084 | A portable volatile memory acquisition tool for Linux. | misc | |
aws-extender-cli | 17.a351154 | Script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common misconfiguration issues. | scanner webapp | |
aws-iam-privesc | 11.2983efd | AWS IAM policy scanner that helps determine where privilege escalation can be achieved. | scanner recon exploitation automation | |
aws-inventory | 19.9a2fa8e | Discover resources created in an AWS account. | recon | |
awsbucketdump | 82.4684670 | A tool to quickly enumerate AWS S3 buckets to look for loot. | automation scanner | |
azazel | 15.a41fbb5 | A userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. | backdoor | |
aztarna | 1.2.1 | A footprinting tool for ROS and SROS systems. | recon fingerprint | |
ba-testpkg | 8.8 | BlackArch Linux Test Package. | misc | |
backcookie | 51.6dabc38 | Small backdoor using cookie. | backdoor webapp | |
backdoor-apk | 141.2710126 | Shell script that simplifies the process of adding a backdoor to any Android APK file | mobile backdoor | |
backdoor-factory | 1:210.0c53045 | Patch win32/64 binaries with shellcode. | backdoor binary | |
backdoorme | 308.f9755ca | A powerful utility capable of backdooring Unix machines with a slew of backdoors. | backdoor automation | |
backdoorppt | 88.d0e7f91 | Transform your payload.exe into one fake word doc (.ppt). | backdoor | |
backfuzz | 1:1.b0648de | A network protocol fuzzing toolkit. | fuzzer networking | |
backhack | 39.561ec86 | Tool to perform Android app analysis by backing up and extracting apps, allowing you to analyze and modify file system contents for apps. | mobile | |
backoori | 55.988e507 | Tool aided persistence via Windows URI schemes abuse. | exploitation | |
backorifice | 1.0 | A remote administration system which allows a user to control a computer across a tcpip connection using a simple console or GUI application. | windows backdoor | |
bad-pdf | 61.a8149ee | Steal NTLM Hashes with Bad-PDF. | exploitation | |
badkarma | 85.2c46334 | Advanced network reconnaissance toolkit. | scanner networking recon | |
badministration | 16.69e4ec2 | A tool which interfaces with management or administration applications from an offensive standpoint. | webapp scanner recon fingerprint | |
bagbak | 295.bab0de9 | Yet another frida based App decryptor. | mobile reversing binary | |
balbuzard | 67.d6349ef1bc55 | A package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain names, known file headers, interesting strings, etc). | malware cracker reversing | |
bamf-framework | 35.30d2b4b | A modular framework designed to be a platform to launch attacks against botnets. | malware defensive | |
bandicoot | 0.6.0 | A toolbox to analyze mobile phone metadata. | mobile | |
bandit | 1.7.9 | Python security linter from OpenStack Security | code-audit | |
barf | 923.9547ef8 | A multiplatform open source Binary Analysis and Reverse engineering Framework. | binary reversing | |
barmie | 1.01 | Java RMI enumeration and attack tool. | scanner | |
barq | 35.6f1a68c | An AWS Cloud Post Exploitation framework. | exploitation backdoor automation recon | |
base64dump | 0.0.14 | Extract and decode base64 strings from files. | misc | |
basedomainname | 0.1 | Tool that can extract TLD (Top Level Domain), domain extensions (Second Level Domain + TLD), domain name, and hostname from fully qualified domain names. | recon scanner | |
bashfuscator | 338.7487348 | Fully configurable and extendable Bash obfuscation framework. | automation | |
bashscan | 94.80c066c | A port scanner built to utilize /dev/tcp for network and service discovery. | scanner | |
batctl | 2023.1 | B.A.T.M.A.N. advanced control and management tool | wireless | |
batman-adv | 2019.2 | Batman kernel module, (included upstream since .38) | wireless | |
batman-alfred | 2024.2 | Almighty Lightweight Fact Remote Exchange Daemon | wireless | |
bbqsql | 261.b9859d2 | SQL injection exploit tool. | webapp exploitation | |
bbscan | 52.6731879 | A tiny Batch weB vulnerability Scanner. | webapp scanner fuzzer | |
bdfproxy | 107.276c367 | Patch Binaries via MITM: BackdoorFactory + mitmProxy | proxy binary | |
bdlogparser | 2 | This is a utility to parse a Bit Defender log file, in order to sort them into a malware archive for easier maintanence of your malware collection. | malware | |
bed | 0.5 | Collection of scripts to test for buffer overflows, format string vulnerabilities. | exploitation | |
beebug | 25.cddb375 | A tool for checking exploitability. | decompiler disassembler reversing | |
beef | 1:4478.26531fe0 | The Browser Exploitation Framework that focuses on the web browser | exploitation | |
beeswarm | 1183.db51ea0 | Honeypot deployment made easy http://www.beeswarm-ids.org/ | honeypot | |
beholder | 0.8.10 | A wireless intrusion detection tool that looks for anomalies in a wifi environment. | wireless defensive | |
belati | 72.49577a1 | The Traditional Swiss Army Knife for OSINT. | scanner recon webapp | |
beleth | 36.0963699 | A Multi-threaded Dictionary based SSH cracker. | cracker | |
bettercap | 2.33.0 | A complete, modular, portable and easily extensible MITM framework. | sniffer exploitation networking | |
bettercap-ui | 1.3.0 | Official Bettercap's Web UI. | misc | |
bfac | 53.18fb0b5 | An automated tool that checks for backup artifacts that may disclose the web-application's source code. | recon webapp | |
bfbtester | 2.0.1 | Performs checks of single and multiple argument command line overflows and environment variable overflows | exploitation | |
bfuzz | 60.fdaefc0 | Input based fuzzer tool for browsers. | fuzzer | |
bgp-md5crack | 0.1 | RFC2385 password cracker | cracker | |
bgrep | 24.28029c9 | Binary grep. | binary | |
billcipher | 32.97fba59 | Information Gathering tool for a Website or IP address. | recon scanner | |
binaryninja-demo | 4.1.5902 | A new kind of reversing platform (demo version). | reversing binary | |
binaryninja-python | 13.83f59f7 | Binary Ninja prototype written in Python. | binary | |
bind | 9.20.1 | The ISC DNS Server | networking recon | |
bind-tools | 9.16.5 | The ISC DNS tools | networking recon | |
bindead | 4504.67019b97b | A static analysis tool for binaries | binary debugger reversing | |
bindiff | 6.0.0 | A comparison tool for binary files, that assists vulnerability researchers and engineers to quickly find differences and similarities in disassembled code. | binary reversing | |
binex | 1.0 | Format String exploit building tool. | exploitation automation | |
binflow | 5.7fb02a9 | POSIX function tracing. Much better and faster than ftrace. | binary debugger | |
bing-ip2hosts | 1.0.5 | Enumerates all hostnames which Bing has indexed for a specific IP address. | recon | |
bing-lfi-rfi | 0.1 | This is a python script for searching Bing for sites that may have local and remote file inclusion vulnerabilities. | webapp scanner fuzzer | |
bingoo | 3.698132f | A Linux bash based Bing and Google Dorking Tool. | scanner | |
binnavi | 6.1.0 | A binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code. | disassembler reversing binary | |
binproxy | 8.d02fce9 | A proxy for arbitrary TCP connections. | proxy networking | |
binwalk | 2.4.2 | A tool for searching a given binary image for embedded files | disassembler firmware reversing binary | |
binwally | 4.0aabd8b | Binary and Directory tree comparison tool using the Fuzzy Hashing concept (ssdeep). | binary | |
bios_memimage | 1.2 | A tool to dump RAM contents to disk (aka cold boot attack). | cracker forensic | |
birp | 65.b2e108a | A tool that will assist in the security assessment of mainframe applications served over TN3270. | scanner recon fuzzer | |
bitdump | 34.6a5cbd8 | A tool to extract database data from a blind SQL injection vulnerability. | exploitation webapp | |
bittwist | 2.0 | A simple yet powerful libpcap-based Ethernet packet generator. It is designed to complement tcpdump, which by itself has done a great job at capturing network traffic. | sniffer networking | |
bkcrack | v1.7.0.r6.g7b4ea52 | Crack legacy zip encryption with Biham and Kocher known plaintext attack. | cracker | |
bkhive | 1.1.1 | Program for dumping the syskey bootkey from a Windows NT/2K/XP system hive. | cracker | |
blackbox-scanner | 4:1.7a25220 | Dork scanner & bruteforcing & hash cracker tool with blackbox penetration testing framework. | scanner recon cracker | |
blackeye | 1:v2.0.r0.g27a3f04 | The most complete Phishing Tool, with 32 templates +1 customizable. | social automation | |
blackhash | 0.2 | Creates a filter from system hashes | cracker | |
blacknurse | 9.d2a2b23 | A low bandwidth ICMP attack that is capable of doing denial of service to well known firewalls. | dos | |
bleah | 53.6a2fd3a | A BLE scanner for "smart" devices hacking. | scanner wireless bluetooth | |
bless | 0.6.3 | Gtk# Hex Editor. | misc | |
bletchley | 0.0.1 | A collection of practical application cryptanalysis tools. | crypto | |
blind-sql-bitshifting | 54.5bbc183 | A blind SQL injection module that uses bitshfting to calculate characters. | exploitation | |
blindelephant | 7 | A web application fingerprinter. Attempts to discover the version of a (known) web application by comparing static files at known locations | fingerprint webapp | |
blindsql | 1.0 | Set of bash scripts for blind SQL injection attacks. | database | |
blindy | 12.59de8f2 | Simple script to automate brutforcing blind sql injection vulnerabilities. | scanner | |
blisqy | 20.e9995fc | Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB). | webapp exploitation | |
bloodhound | 1665.0d36459 | Six Degrees of Domain Admin | recon windows | |
bloodhound-python | v1.0.1.r151.ge8b0b7a | Bloodhound python data collector | recon windows | |
bloodyad | 195.8638d5d | An Active Directory Privilege Escalation Framework. | exploitation windows | |
blue-hydra | 710.1c2372d | A Bluetooth device discovery service built on top of the bluez library. | bluetooth scanner | |
bluebox-ng | 1:1.1.0 | A GPL VoIP/UC vulnerability scanner. | voip scanner fuzzer | |
bluebugger | 0.1 | An implementation of the bluebug technique which was discovered by Martin Herfurt. | bluetooth | |
bluediving | 0.9 | A Bluetooth penetration testing suite. | bluetooth | |
bluefog | 0.0.4 | A tool that can generate an essentially unlimited number of phantom Bluetooth devices. | bluetooth | |
bluelog | 1.1.2 | A Bluetooth scanner and sniffer written to do a single task, log devices that are in discoverable mode. | bluetooth scanner | |
bluepot | 0.2 | A Bluetooth Honeypot written in Java, it runs on Linux | bluetooth honeypot | |
blueprint | 0.1_3 | A perl tool to identify Bluetooth devices. | bluetooth | |
blueranger | 1.0 | A simple Bash script which uses Link Quality to locate Bluetooth device radios. | automation bluetooth | |
bluescan | 1.0.6 | A Bluetooth Device Scanner. | bluetooth scanner | |
bluesnarfer | 0.1 | A bluetooth attacking tool | bluetooth | |
bluffy | 47.180ed5b | Convert shellcode into different formats. | exploitation | |
bluphish | 9.a7200bd | Bluetooth device and service discovery tool that can be used for security assessment and penetration testing. | bluetooth | |
bluto | 1:142.25cad7a | Recon, Subdomain Bruting, Zone Transfers. | scanner recon | |
bmap-tools | 3.7 | Tool for copying largely sparse files using information from a block map file. | forensic | |
bmc-tools | 25.c66a657 | RDP Bitmap Cache parser. | forensic sniffer | |
bob-the-butcher | 0.7.1 | A distributed password cracker package. | cracker | |
bof-detector | 19.e08367d | A simple detector of BOF vulnerabilities by source-code-level check. | code-audit | |
bokken | 1:1.8 | GUI for radare2 and pyew. | misc reversing disassembler | |
bonesi | 12.733c9e9 | The DDoS Botnet Simulator. | dos | |
boofuzz | v0.4.2.r19.g5552d0c | fuzzer | ||
boopsuite | 170.16c902f | A Suite of Tools written in Python for wireless auditing and security testing. | wireless sniffer | |
bopscrk | 1:v2.4.7.r2.g7eede16 | bopscrk (Before Outset PaSsword CRacKing) is a tool to generate smart and powerful wordlists for targeted attacks. | automation cracker | |
botb | 69.6d33aae | A container analysis and exploitation tool for pentesters and engineers. | exploitation scanner | |
bowcaster | 230.17d69c1 | A framework intended to aid those developing exploits. | exploitation | |
box-js | 679.4d09755 | A tool for studying JavaScript malware. | malware | |
bqm | v1.5.1.r5.ge287280 | Download BloudHound query lists, deduplicate entries and merge them in one file. | misc | |
braa | 0.82 | A mass snmp scanner | scanner | |
braces | 0.4 | A Bluetooth Tracking Utility. | bluetooth | |
brakeman | 1:v6.2.1.1.r6.ge4f49f64d | A static analysis security vulnerability scanner for Ruby on Rails applications | code-audit exploitation scanner | |
bridgekeeper | 57.55c390c | Scrape employee names from search engine LinkedIn profiles. Convert employee names to a specified username format. | recon social | |
bro | 2.6.4 | A powerful network analysis framework that is much different from the typical IDS you may know. | networking defensive sniffer | |
bro-aux | 451.a98acb8 | Handy auxiliary programs related to the use of the Bro Network Security Monitor (https://www.bro.org/). | networking defensive sniffer | |
brosec | 278.c51164f | An interactive reference tool to help security professionals utilize useful payloads and commands. | exploitation | |
browselist | 1.4 | Retrieves the browse list ; the output list contains computer names, and the roles they play in the network. | windows recon | |
browser-fuzzer | 3 | Browser Fuzzer 3 | fuzzer | |
brut3k1t | 104.793821f | Brute-force attack that supports multiple protocols and services. | cracker | |
brute-force | 52.78d1d8e | Brute-Force attack tool for Gmail, Hotmail, Twitter, Facebook, Netflix. | cracker social webapp | |
brute12 | 1 | A tool designed for auditing the cryptography container security in PKCS12 format. | windows cracker cryptography | |
bruteforce-luks | 54.788d637 | Try to find the password of a LUKS encrypted volume. | cracker crypto | |
bruteforce-salted-openssl | 64.30b272e | Try to find the password of a file that was encrypted with the 'openssl' command. | cracker crypto | |
bruteforce-wallet | 43.648d7d7 | Try to find the password of an encrypted Peercoin (or Bitcoin,Litecoin, etc...) wallet file. | cracker crypto | |
brutemap | 65.da4b303 | Penetration testing tool that automates testing accounts to the site's login page. | webapp cracker | |
brutespray | 407.947d7b5 | Brute-Forcing from Nmap output - Automatically attempts default creds on found services. | automation cracker | |
brutessh | 0.6 | A simple sshd password bruteforcer using a wordlist, it's very fast for internal networks. It's multithreads. | cracker | |
brutex | 114.eacd084 | Automatically brute force all services running on a target. | automation cracker | |
brutexss | 54.ba753df | Cross-Site Scripting Bruteforcer. | webapp fuzzer | |
brutus | 2 | One of the fastest, most flexible remote password crackers you can get your hands on. | windows cracker | |
bsdiff | 4.3 | bsdiff and bspatch are tools for building and applying patches to binary files. | reversing binary | |
bsqlbf | 2.7 | Blind SQL Injection Brute Forcer. | webapp | |
bsqlinjector | 13.027184f | Blind SQL injection exploitation tool written in ruby. | webapp exploitation | |
bss | 0.8 | Bluetooth stack smasher / fuzzer | bluetooth fuzzer scanner | |
bt_audit | 0.1.1 | Bluetooth audit | bluetooth fuzzer | |
btcrack | 1.1 | The world's first Bluetooth Pass phrase (PIN) bruteforce tool. Bruteforces the Passkey and the Link key from captured Pairing exchanges. | bluetooth cracker | |
btlejack | 88.c487859 | Bluetooth Low Energy Swiss-army knife. | bluetooth | |
btproxy-mitm | 71.cd1c906 | Man in the Middle analysis tool for Bluetooth. | bluetooth | |
btscanner | 2.1 | Bluetooth device scanner. | bluetooth scanner | |
bulk-extractor | 1562.1c67a75 | Bulk Email and URL extraction tool. | forensic misc | |
bully | 1.4.00 | A wifi-protected-setup (WPS) brute force attack tool. | cracker wireless | |
bunny | 0.93 | A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs. | fuzzer | |
burpsuite | 1:2024.8.1 | An integrated platform for attacking web applications (free edition). | fuzzer proxy scanner webapp | |
buster | 92.131437e | Find emails of a person and return info associated with them. | social recon | |
buttinsky | 138.1a2a1b2 | Provide an open source framework for automated botnet monitoring. | networking | |
bvi | 1.4.2 | A display-oriented editor for binary files operate like "vi" editor. | binary misc | |
byepass | 213.8cbfd9b | Automates password cracking tasks using optimized dictionaries and mangling rules. | automation cracker | |
bypass-firewall-dns-history | 33.c55b7ce | Firewall bypass script based on DNS history records. | networking | |
bytecode-viewer | 1:2.12 | A Java 8/Android APK Reverse Engineering Suite. | binary reversing | |
c5scan | 30.be8845c | Vulnerability scanner and information gatherer for the Concrete5 CMS. | webabb scan recon | |
c7decrypt | 0.3.3 | Cisco password type-7 encryptor and decryptor. | crypto | |
cachedump | 1.1 | A tool that demonstrates how to recover cache entry information: username and hashed password (called MSCASH). | windows cracker | |
cadaver | 0.24 | Command-line WebDAV client for Unix | networking | |
cafebabe | 0.1.2 | Java bytecode editor & decompiler. | decompiler reversing | |
cameradar | 195.1b91e54 | Hacks its way into RTSP videosurveillance cameras. | scanner | |
camover | 94.483befd | A camera exploitation tool that allows to disclosure network camera admin password. | exploitation | |
camscan | 1.0057215 | A tool which will analyze the CAM table of Cisco switches to look for anamolies. | scanner networking defensive | |
can-utils | 1124.d05810f | Linux-CAN / SocketCAN user space applications. | automobile | |
canalyzat0r | 41.6bc251e | Security analysis toolkit for proprietary car protocols. | automobile | |
canari | 3.3.10 | A transform framework for maltego | forensic recon scanner | |
cangibrina | 123.6de0165 | Dashboard Finder. | scanner webapp | |
cansina | 2:59.67c6301 | A python-based Web Content Discovery Tool. | webapp scanner | |
cantoolz | 1:425.82d330b | Framework for black-box CAN network analysis https://asintsov.blogspot.de/. | automobile recon fuzzer scanner | |
capfuzz | 34.97ac312 | Capture, fuzz and intercept web traffic. | sniffer fuzzer | |
capstone | 5.0.3 | A lightweight multi-platform, multi-architecture disassembly framework | reversing disassembler | |
captipper | 74.3fb2836 | Malicious HTTP traffic explorer tool. | forensic malware sniffer | |
cardpwn | 32.166abf9 | OSINT Tool to find Breached Credit Cards Information. | social recon | |
cariddi | v1.3.5.r0.g9e5c233 | Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, token. | webap scanner | |
carwhisperer | 0.2 | Intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys. | bluetooth | |
casefile | 1.0.1 | The little brother to Maltego without transforms, but combines graph and link analysis to examine links between manually added data to mind map your information | forensic recon scanner | |
catana | 31.9ea1f0d | Filter your wordlist according to the specified password policy. | misc | |
catnthecanary | 7.e9184fe | An application to query the canary.pw data set for leaked data. | recon | |
catphish | 44.768d213 | For phishing and corporate espionage. | social | |
ccrawldns | 6.92525b6 | Retrieves from the CommonCrawl data set unique subdomains for a given domain name. | recon | |
cdpsnarf | 0.1.6 | Cisco discovery protocol sniffer. | sniffer | |
cecster | 5.15544cb | A tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocols. | scanner fuzzer | |
cent | v1.3.4.r2.g481700c | Community edition nuclei templates. | webapp scanner | |
centry | 72.6de2868 | Cold boot & DMA protection | misc defensive | |
cero | v1.3.0.r19.gb73125b | Scrape domain names from SSL certificates of arbitrary hosts. | scanner recon | |
certgraph | 172.465bddc | Crawl the graph of certificate Alternate Names. | recon | |
certipy | 4.8.2.r0.g2780d53 | Active Directory Certificate Services enumeration and abuse. | windows exploitation | |
certsync | 0.1.4 | Dump NTDS remotely without DRSUAPI: using golden certificate and UnPAC the hash. | exploitation windows | |
cewl | 189.447ccc1 | A custom word list generator | automation cracker | |
cflow | 1.7 | A C program flow analyzer. | code-audit | |
cfr | 0.152 | Another Java decompiler. | decompiler | |
chainsaw | v2.7.3.r6.g5d908fd | A powerful ‘first-response’ capability to quickly identify threats within Windows event logs. | defensive forensic windows | |
chameleon | 27.a2f0cf1 | A tool for evading Proxy categorisation. | networking | |
chameleonmini | 613.ad0eece | Official repository of ChameleonMini, a freely programmable, portable tool for NFC security analysis that can emulate and clone contactless cards, read RFID tags and sniff/log RF data. | social hardware nfc | |
changeme | 266.89f59d4 | A default credential scanner. | scanner | |
chankro | 21.7b6e844 | Tool that generates a PHP capable of run a custom binary (like a meterpreter) or a bash script (p.e. reverse shell) bypassing disable_functions & open_basedir). | webapp exploitation | |
chaos-client | 283.17a19d7 | Go client to communicate with Chaos dataset API. | recon | |
chaosmap | 1.3 | An information gathering tool and dns / whois / web server scanner | forensic scanner recon | |
chaosreader | 0.94 | A freeware tool to trace tcp, udp etc. sessions and fetch application data from snoop or tcpdump logs. | networking sniffer | |
chapcrack | 17.ae2827f | A tool for parsing and decrypting MS-CHAPv2 network handshakes. | cracker | |
cheat-sh | 6 | The only cheat sheet you need. | automation misc | |
check-weak-dh-ssh | 0.1 | Debian OpenSSL weak client Diffie-Hellman Exchange checker. | scanner crypto | |
checkiban | 0.2 | Checks the validity of an International Bank Account Number (IBAN). | misc | |
checkov | 3.2.253.r1.gf98649efb | Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages. | code-audit | |
checkpwd | 1.23 | Oracle Password Checker (Cracker). | cracker | |
checksec | 2.7.1 | Tool designed to test which standard Linux OS and PaX security features are being used | automation scanner | |
cheetah-suite | 21.2364713 | Complete penetration testing suite (port scanning, brute force attacks, services discovery, common vulnerabilities searching, reporting etc.) | scanner fingerprint cracker | |
chiasm-shell | 33.e20ed9f | Python-based interactive assembler/disassembler CLI, powered byKeystone/Capstone. | disassembler | |
chipsec | 4:2196.422c7fbb | Framework for analyzing the security of PC platforms including hardware, system firmware (BIOS/UEFI), and platform components. | hardware binary forensic scanner fuzzer | |
chiron | 48.524abe1 | An all-in-one IPv6 Penetration Testing Framework. | scanner networking exploitation proxy | |
chisel | 237.59e5362 | A fast TCP tunnel over HTTP. | tunnel | |
chkrootkit | 0.58b | Checks for rootkits on a system | defensive forensic | |
chntpw | 140201 | Offline NT Password Editor - reset passwords in a Windows NT SAM user database file | forensic cracker | |
chopshop | 444.8bdd393 | Protocol Analysis/Decoder Framework. | networking reversing | |
choronzon | 4.d702c31 | An evolutionary knowledge-based fuzzer. | fuzzer | |
chownat | 0.08b | Allows two peers behind two separate NATs with no port forwarding and no DMZ setup on their routers to directly communicate with each other | tunnel | |
chrome-decode | 0.1 | Chrome web browser decoder tool that demonstrates recovering passwords. | windows cracker crypto | |
chromefreak | 24.12745b1 | A Cross-Platform Forensic Framework for Google Chrome | forensic | |
chromensics | 1.0 | A Google chrome forensics tool. | windows forensic | |
chw00t | 39.1fd1016 | Unices chroot breaking tool. | exploitation | |
cidr2range | 1.0 | Script for listing the IP addresses contained in a CIDR netblock | networking | |
cintruder | 14.f8a3f12 | An automatic pentesting tool to bypass captchas. | cracker webapp | |
cipherscan | 421.5866911 | A very simple way to find out which SSL ciphersuites are supported by a target. | scanner crypto | |
ciphertest | 22.e33eb4a | A better SSL cipher checker using gnutls. | crypto | |
ciphr | 127.5da7137 | A CLI tool for encoding, decoding, encryption, decryption, and hashing streams of data. | crypto | |
cirt-fuzzer | 1.0 | A simple TCP/UDP protocol fuzzer. | fuzzer | |
cisco-auditing-tool | 1 | Perl script which scans cisco routers for common vulnerabilities. Checks for default passwords, easily guessable community names, and the IOS history bug. Includes support for plugins and scanning multiple hosts. | cracker fuzzer scanner | |
cisco-global-exploiter | 1.3 | A perl script that targets multiple vulnerabilities in the Cisco Internetwork Operating System (IOS) and Catalyst products. | exploitation | |
cisco-ocs | 0.2 | Cisco Router Default Password Scanner. | cracker | |
cisco-router-config | 1.1 | copy-router-config and merge-router-config to copy and merge Cisco Routers Configuration | misc | |
cisco-scanner | 0.2 | Multithreaded Cisco HTTP vulnerability scanner. Tested on Linux, OpenBSD and Solaris. | cracker scanner | |
cisco-snmp-enumeration | 10.ad06f57 | Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking. | automation networking exploitation cracker | |
cisco-snmp-slap | 5.daf0589 | IP address spoofing tool in order to bypass an ACL protecting an SNMP service on Cisco IOS devices. | spoof networking exploitation | |
cisco-torch | 0.4b | Cisco Torch mass scanning, fingerprinting, and exploitation tool. | exploitation fingerprint scanner | |
cisco5crack | 2.c4b228c | Crypt and decrypt the cisco enable 5 passwords. | cracker crypto | |
cisco7crack | 2.f1c21dd | Crypt and decrypt the cisco enable 7 passwords. | cracker crypto | |
ciscos | 1.3 | Сканирует сети классов A, B и C в поисках роутеров cisco с открытым портом telnet и неизменённым заводским паролем от cisco. | scanner | |
citadel | 95.3b1adbc | A library of OSINT tools. | recon social | |
cjexploiter | 6.72b08d8 | Drag and Drop ClickJacking exploit development assistance tool. | webapp | |
clair | 1974.d3467bad | Vulnerability Static Analysis for Containers. | scanner | |
clairvoyance | 2.5.2 | Obtain GraphQL API Schema even if the introspection is not enabled. | webapp recon scanner | |
clamscanlogparser | 1 | This is a utility to parse a Clam Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your malware collection. | malware | |
clash | 1.18.0 | A rule-based tunnel in Go. | tunnel networking | |
climber | 30.5530a78 | Check UNIX/Linux systems for privilege escalation. | scanner | |
cloakify | 117.f45c3b3 | Data Exfiltration In Plain Sight; Evade DLP/MLS Devices; Social Engineering of Analysts; Evade AV Detection. | misc crypto | |
cloud-buster | 194.b55e4a1 | A tool that checks Cloudflare enabled sites for origin IP leaks. | recon | |
cloudfail | 79.7982c7d | Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network. | recon | |
cloudflare-enum | 10.412387f | Cloudflare DNS Enumeration Tool for Pentesters. | scanner | |
cloudget | 64.cba10b1 | Python script to bypass cloudflare from command line. Built upon cfscrape module. | webapp | |
cloudlist | 692.1435ef5 | A tool for listing Assets from multiple Cloud Providers. | recon | |
cloudmare | 108.9c5a39f | A simple tool to find origin servers of websites protected by CloudFlare with a misconfiguration DNS. | recon scanner | |
cloudsploit | 6429.3d86c5df5 | AWS security scanning checks. | scanner automation | |
cloudunflare | 14.b91a8a7 | Reconnaissance Real IP address for Cloudflare Bypass. | recon scanner | |
clusterd | 143.d190b2c | Automates the fingerprinting, reconnaissance, and exploitation phases of an application server attack. | automation | |
cminer | 25.d766f7e | A tool for enumerating the code caves in PE files. | binary windows | |
cmospwd | 5.1 | Decrypts password stored in CMOS used to access BIOS setup. | cracker | |
cms-explorer | 15.23b58cd | Designed to reveal the specific modules, plugins, components and themes that various cms driven websites are running | fingerprint webapp | |
cms-few | 0.1 | Joomla, Mambo, PHP-Nuke, and XOOPS CMS SQL injection vulnerability scanning tool written in Python. | webapp scanner | |
cmseek | 382.20f9780 | CMS (Content Management Systems) Detection and Exploitation suite. | webapp fingerprint exploitation | |
cmsfuzz | 5.6be5a98 | Fuzzer for wordpress, cold fusion, drupal, joomla, and phpnuke. | webapp scanner fuzzer | |
cmsmap | 1:8.59dd0e2 | A python open source Content Management System scanner that automates the process of detecting security flaws of the most popular CMSs. | scanner automation webapp exploitation | |
cmsscan | 43.f060b4b | CMS scanner to identify and find vulnerabilities for Wordpress, Drupal, Joomla, vBulletin. | webapp scanner recon fingerprint | |
cmsscanner | 0.13.8.63.g864c47f | CMS Scanner Framework. | webapp scanner recon fingerprint | |
cnamulator | 5.4667c68 | A phone CNAM lookup utility using the OpenCNAM API. | mobile recon | |
cntlm | 4.b35d55c | An NTLM, NTLM2SR, and NTLMv2 authenticating HTTP proxy. | proxy | |
codeql | 1:2.8.1 | The CLI tool for GitHub CodeQL | automation code-audit | |
codetective | 45.52b91f1 | A tool to determine the crypto/encoding algorithm used according to traces of its representation. | crypto | |
coercer | 2.4.3 | Coerce a Windows server to authenticate on an arbitrary machine through 9 methods. | exploitation networking windows | |
comission | 203.67b890e | WhiteBox CMS analysis. | webapp scanner | |
commentor | 20.4582674 | Extract all comments from the specified URL resource. | webapp misc | |
commix | 2176.94842b2c | Automated All-in-One OS Command Injection and Exploitation Tool. | webapp automation exploitation | |
commonspeak | 36.f0aad23 | Leverages publicly available datasets from Google BigQuery to generate wordlists. | automation recon | |
complemento | 0.7.6 | A collection of tools for pentester: LetDown is a powerful tcp flooder ReverseRaider is a domain scanner that use wordlist scanning or reverse resolution scanning Httsquash is an http server scanner, banner grabber and data retriever | fingerprint scanner | |
compp | 1.0.5 | Company Passwords Profiler helps making a bruteforce wordlist for a targeted company. | cracker | |
configpush | 0.8.5 | This is a tool to span /8-sized networks quickly sending snmpset requests with default or otherwise specified community string to Cisco devices. | scanner | |
conpass | 0.1.1 | Password spraying in AD environment avoing account locking. | windows cracker | |
conpot | 0.6.0 | ICS honeypot with the goal to collect intelligence about the motives and methods of adversaries targeting industrial control systems url="http://conpot.org" | honeypot | |
conscan | 1.2 | A blackbox vulnerability scanner for the Concre5 CMS. | fuzzer scanner webapp | |
cook | 1:v2.2.1.r13.gbabf5ba | Easily create word's permutation and combination to generate complex wordlists and passwords. | automation | |
cookie-cadger | 1.08 | An auditing tool for Wi-Fi or wired Ethernet connections. | fuzzer scanner | |
corkscrew | 2.0 | A tool for tunneling SSH through HTTP proxies | tunnel proxy networking | |
corscanner | 99.593043f | Fast CORS misconfiguration vulnerabilities scanner. | webapp scanner | |
corstest | 10.beffd0b | A simple CORS misconfigurations checker. | scanner webapp | |
corsy | 69.2985ae2 | CORS Misconfiguration Scanner. | webapp scanner | |
cottontail | 93.b7f5222 | Capture all RabbitMQ messages being sent through a broker. | sniffer | |
cowpatty | 4.8 | Wireless WPA/WPA2 PSK handshake cracking utility | wireless cracker | |
cpfinder | 0.1 | This is a simple script that looks for administrative web interfaces. | scanner webapp | |
cpp2il | 1:2022.0.7.r17.g20ccab2 | A tool to reverse unity's IL2PP toolchain | binary reversing | |
cppcheck | 2.14.2 | A tool for static C/C++ code analysis | code-audit | |
cpptest | 2.0.0 | A portable and powerful, yet simple, unit testing framework for handling automated tests in C++. | code-audit | |
cr3dov3r | 46.99a1660 | Search for public leaks for email addresses + check creds against 16 websites. | social recon | |
crabstick | 47.bb7827f | Automatic remote/local file inclusion vulnerability analysis and exploit tool. | webapp exploitation | |
cracken | v1.0.1.r0.g7a325ff | A ast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust. | misc | |
crackhor | 2.ae7d83f | A Password cracking utility. | cracker | |
crackle | 111.d83b4b6 | Crack and decrypt BLE encryption | cracker bluetooth | |
crackmapexec | 3:v6.0.1.r198.gda472cb | A swiss army knife for pentesting Windows/Active Directory environments. | scanner exploitation | |
crackmapexec-pingcastle | 9.16340d2 | NetExec & CrackMapExec module that execute PingCastle on a remote machine. | windows | |
crackpkcs12 | 0.2.10.11.c7dedb1 | A multithreaded program to crack PKCS#12 files (p12 and pfx extensions). | cracker crypto | |
crackq | 48.89b7318 | Hashcrack.org GPU-accelerated password cracker. | cracker | |
crackql | 1.0.r53.gac26a44 | GraphQL password brute-force and fuzzing utility | webapp exploitation fuzzer | |
crackserver | 33.e5763ab | An XMLRPC server for password cracking. | cracker | |
crawlic | 51.739fe2b | Web recon tool (find temporary files, parse robots.txt, search folders, google dorks and search domains hosted on same server). | webapp recon | |
creak | 41.a6c011f | Poison, reset, spoof, redirect MITM script. | networking exploitation sniffer | |
create_ap | 265.462c09f | A shell script to create a NATed/Bridged Software Access Point | wireless | |
creddump | 3.ed95e1a | A python tool to extract various credentials and secrets from Windows registry hives. | cracker windows | |
credmap | 116.d862247 | The Credential mapper - Tool that was created to bring awareness to the dangers of credential reuse. | misc defensive | |
credmaster | 205.b3c2a5b | Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling. | cracker | |
creds | 1:17.1ec8297 | Harvest FTP/POP/IMAP/HTTP/IRC credentials along with interesting data from each of the protocols. | sniffer | |
credsniper | 21.f52461b | Phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens. | social | |
creepy | 1:137.9f60449 | A geolocation information gatherer. Offers geolocation information gathering through social networking platforms. | scanner social recon | |
cribdrag | 5.2d27dbf | An interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys. | crypto | |
crlf-injector | 9.bd6db06 | A python script for testing CRLF injecting issues. | fuzzer webapp | |
crlfuzz | 62.7a442bb | A fast tool to scan CRLF vulnerability written in Go. | webapp scanner | |
crosslinked | 1:47.9c0069d | LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping. | social recon | |
crosstool-ng | 1.26.0 | Versatile (cross-)toolchain generator. | misc | |
crowbar | 111.4b563dc | A brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools. | cracker | |
crozono | 1:5.6a51669 | A modular framework designed to automate the penetration testing of wireless networks from drones and such unconventional devices. | drone wireless | |
crunch | 3.6 | A wordlist generator for all combinations/permutations of a given character set. | automation cracker | |
crypthook | 18.690dcae | TCP/UDP symmetric encryption tunnel wrapper. | crypto tunnel networking | |
cryptonark | 0.5.7 | SSL security checker. | crypto | |
csrftester | 1.0 | The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws. | webapp | |
ct-exposer | 24.71252ac | An OSINT tool that discovers sub-domains by searching Certificate Transparency logs | scanner recon | |
ctf-party | v3.0.0.r39.gb0c58df | A CLI tool & library to enhance and speed up script/exploit writing for CTF players. | misc | |
ctunnel | 0.7 | Tunnel and/or proxy TCP or UDP connections via a cryptographic tunnel. | tunnel | |
ctypes-sh | 158.b79e401 | Allows you to call routines in shared libraries from within bash. | reversing exploitation | |
cuckoo | 2.0.7 | A malware analysis system. | malware | |
cupp | 77.56547fd | Common User Password Profiler | cracker | |
cutycapt | 3:10 | A Qt and WebKit based command-line utility that captures WebKit's rendering of a web page. | recon | |
cve-api | 170.8e9c247 | Unofficial api for cve.mitre.org. | misc | |
cve-search | v5.1.0.r3.g3e0a906 | A tool to perform local searches for known vulnerabilities. | exploitation | |
cvechecker | 4.0 | The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning the installed software and matching the results with the CVE database. | scanner | |
cvemap | v0.0.7.r111.gf09282a | CLI tool designed to provide a structured and easily navigable interface to various vulnerability databases. | exploitation | |
cybercrowl | 111.f7cac52 | A Python Web path scanner tool. | webapp scanner | |
cyberscan | 75.ca85794 | A Network Pentesting Tool | networking scanner | |
cymothoa | 1 | A stealth backdooring tool, that inject backdoor's shellcode into an existing process. | backdoor | |
d-tect | 13.9555c25 | Pentesting the Modern Web. | scanner recon webapp | |
dagon | 244.f065d7b | Advanced Hash Manipulation. | crypto | |
dalfox | 1463.a0f8d6f | Parameter Analysis and XSS Scanning tool. | webapp fuzzer | |
damm | 32.60e7ec7 | Differential Analysis of Malware in Memory. | malware binary reversing | |
daredevil | 42.81cb57f | A tool to perform (higher-order) correlation power analysis attacks (CPA). | crypto | |
dark-dork-searcher | 1.0 | Dark-Dork Searcher. | windows scanner | |
darkarmour | 4.f10228a | Store and execute an encrypted windows binary from inside memory, without a single bit touching disk. | windows malware | |
darkbing | 0.1 | A tool written in python that leverages bing for mining data on systems that may be susceptible to SQL injection. | scanner fuzzer webapp | |
darkd0rk3r | 1.0 | Python script that performs dork searching and searches for local file inclusion and SQL injection errors. | exploitation webapp | |
darkdump | 54.b71776b | Search The Deep Web Straight From Your Terminal. | webapp scanner | |
darkjumper | 5.8 | This tool will try to find every website that host at the same server at your target. | webapp | |
darkmysqli | 1.6 | Multi-Purpose MySQL Injection Tool | exploitation webapp | |
darkscrape | 68.2ca0e37 | OSINT Tool For Scraping Dark Websites. | webapp scanner recon | |
darkspiritz | 1:6.4d23e94 | A penetration testing framework for Linux, MacOS, and Windows systems. | exploitation automation | |
darkstat | 3.0.721 | Network statistics gatherer (packet sniffer) | sniffer networking | |
dartspylru | 7.5ef01b1 | Simple dictionary with LRU behaviour. | misc | |
datajackproxy | 42.f75f3a3 | A proxy which allows you to intercept TLS traffic in native x86 applications across platform. | proxy networking | |
datasploit | 1:367.a270d50 | A tool to perform various OSINT techniques, aggregate all the raw data, visualize it on a dashboard, and facilitate alerting and monitoring on the data. | recon scanner | |
davoset | 1.3.7 | A tool for using Abuse of Functionality and XML External Entities vulnerabilities on some websites to attack other websites. | dos | |
davscan | 30.701f967 | Fingerprints servers, finds exploits, scans WebDAV. | webapp scanner fingerprint recon | |
davtest | 3.a282c58 | Tests WebDAV enabled servers by uploading test executable files, and then (optionally) uploading files which allow for command execution or other actions directly on the target | scanner | |
dawnscanner | 1:v2.2.0.r15.g0d647fc | A static analysis security scanner for ruby written web applications. | webapp scanner | |
dbd | 61.8cf5350 | A Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32. | misc | |
dbpwaudit | 0.8 | A Java tool that allows you to perform online audits of password quality for several database engines. | cracker defensive | |
dbusmap | 16.6bb2831 | This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus. | scanner | |
dc3dd | 7.2.646 | A patched version of dd that includes a number of features useful for computer forensics. | forensic | |
dcdetector | 0.0.1.r52.g2e69244 | Spot all domain controllers in a Microsoft Active Directory environment. Find computer name, FQDN, and IP address(es) of all DCs. | networking recon windows | |
dcfldd | 1.7.1 | DCFL (DoD Computer Forensics Lab) dd replacement with hashing | forensic | |
dcrawl | 7.3273c35 | Simple, but smart, multi-threaded web crawler for randomly gathering huge lists of unique domain names. | scanner webapp | |
ddosify | 1:v1.7.2.r2.g1639885 | High-performance load testing tool, written in Golang. | dos misc | |
ddrescue | 1.28 | A data recovery tool. It copies data from one file or block device (hard disc, cdrom, etc) to another, trying to rescue the good parts first in case of read errors. | forensic | |
de4dot | 3.1.41592 | .NET deobfuscator and unpacker. | windows unpacker binary reversing | |
deathstar | 60.d7bcbfd | Automate getting Domain Admin using Empire. | automation exploitation | |
debinject | 43.d884309 | Inject malicious code into *.debs. | backdoor | |
deblaze | 1:1.0608dc3 | A remote method enumeration tool for flex servers | scanner | |
decodify | 50.76a0801 | Tool that can detect and decode encoded strings, recursively. | crypto misc | |
deen | 601.fd9aebe | Generic data encoding/decoding application built with PyQt5. | crypto misc | |
deepce | 119.c1bb2ca | Docker Enumeration, Escalation of Privileges and Container Escapes. | exploitation | |
delldrac | 0.1a | DellDRAC and Dell Chassis Discovery and Brute Forcer. | scanner cracker | |
delorean | 16.0291151 | NTP Main-in-the-Middle tool. | exploitation proxy | |
demiguise | 11.58d5681 | HTA encryption tool for RedTeams. | crypto windows backdoor | |
densityscout | 45 | Calculates density for files of any file-system-path to finally output an accordingly descending ordered list. | misc | |
depant | 0.3a | Check network for services with default passwords. | cracker | |
depdep | 2.0 | A merciless sentinel which will seek sensitive files containing critical info leaking through your network. | networking malware | |
dependency-check | 10.0.2 | A tool that attempts to detect publicly disclosed vulnerabilities contained within a project's dependencies. | defensive, scanner | |
depix | 38.f7d1850 | A tool for recovering passwords from pixelized screenshots. | misc | |
der-ascii | 92.0e84c96 | A reversible DER and BER pretty-printer. | misc | |
det | 31.417cbce | (extensible) Data Exfiltration Toolkit. | networking misc | |
detect-it-easy | 3:3.09 | A program for determining types of files. | binary reversing | |
detect-secrets | v1.5.0.r30.g6cdb79b | An enterprise friendly way of detecting and preventing secrets in code. | code-audit | |
detect-sniffer | 159.a359262 | Tool that detects sniffers in the network. | defensive networking | |
detectem | 276.bc5f073 | Detect software and its version on websites. | fingerprint webapp recon | |
devaudit | 803.ca0a68e | An open-source, cross-platform, multi-purpose security auditing tool targeted at developers and teams. | code-audit | |
device-pharmer | 40.b06a460 | Opens 1K+ IPs or Shodan search results and attempts to login. | cracker | |
dex2jar | 2.1 | A tool for converting Android's .dex format to Java's .class format | hardware reversing | |
dexpatcher | 1.7.0 | Modify Android DEX/APK files at source-level using Java. | mobile binary | |
dff | 183.d40d46b | A Forensics Framework coming with command line and graphical interfaces. | forensic | |
dff-scanner | 1.1 | Tool for finding path of predictable resource locations. | webapp | |
dfir-ntfs | 1.1.18 | An NTFS parser for digital forensics & incident response. | forensic | |
dftimewolf | 724.4eaebec2 | Framework for orchestrating forensic collection, processing and data export . | forensic | |
dga-detection | 78.0a3186e | DGA Domain Detection using Bigram Frequency Analysis. | recon | |
dharma | 98.6b1e511 | Generation-based, context-free grammar fuzzer. | fuzzer | |
dhcdrop | 0.5 | Remove illegal dhcp servers with IP-pool underflow. | misc | |
dhcpf | 3.a770b20 | Passive DHCP fingerprinting implementation. | fingerprint | |
dhcpig | 2:110.f037788 | Enhanced DHCPv4 and DHCPv6 exhaustion and fuzzing script written in python using scapy network library. | scanner fuzzer dos | |
dhcpoptinj | 123.58a12c6 | DHCP option injector. | networking | |
didier-stevens-suite | 399.0d1d4cb | Didier Stevens Suite. | (blackarch | |
dinouml | 0.9.5 | A network simulation tool, based on UML (User Mode Linux) that can simulate big Linux networks on a single PC | networking | |
dirb | 2.22 | A web content scanner, brute forceing for hidden files. | scanner webapp | |
dirble | 1:1.4.2 | Fast directory scanning and scraping tool. | webapp scanner | |
dirbuster | 1.0_RC1 | An application designed to brute force directories and files names on web/application servers | scanner webapp | |
dirbuster-ng | 9.0c34920 | C CLI implementation of the Java dirbuster tool. | webapp scanner | |
directorytraversalscan | 1.0.1.0 | Detect directory traversal vulnerabilities in HTTP servers and web applications. | windows webapp | |
dirhunt | 329.a5ea20d | Find web directories without bruteforce. | webapp scanner | |
dirscanner | 0.1 | This is a python script that scans webservers looking for administrative directories, php shells, and more. | scanner webapp | |
dirscraper | 16.e752450 | OSINT Scanning tool which discovers and maps directories found in javascript files hosted on a website. | webapp scanner | |
dirsearch | 2386.9752105 | HTTP(S) directory/file brute forcer. | webapp scanner | |
dirstalk | 1.3.3 | Dirstalk is a multi threaded application designed to brute force paths on web servers. The tool contains functionalities similar to the ones offered by dirbuster and dirb. | scanner webapp | |
disitool | 0.4 | Tool to work with Windows executables digital signatures. | forensic | |
dislocker | 580.3e7aea1 | A tool to exploit the hash length extension attack in various hashing algorithms. With FUSE capabilities built in. | cracker crypto | |
dissector | 1 | This code dissects the internal data structures in ELF files. It supports x86 and x86_64 archs and runs under Linux. | binary | |
distorm | 3.5.2.b | Powerful disassembler library for x86/AMD64 | disassembler reversing | |
dive | 0.12.0 | A tool for exploring each layer in a docker image. | scanner | |
dizzy | 2.0 | A Python based fuzzing framework with many features. | fuzzer networking | |
dkmc | 56.3c238f0 | Dont kill my cat - Malicious payload evasion tool. | exploitation networking | |
dmde | 3.8.0.790 | Disk Editor and Data Recovery Software. | forensic | |
dmg2img | 1.6.7 | Convert a (compressed) Apple Disk Images. A CLI tool to uncompress Apple's compressed DMG files to the HFS+ IMG format A CLI tool to uncompress Apple's compressed DMG files to the HFS+ IMG format | misc forensic | |
dmitry | 1.3a | Deepmagic Information Gathering Tool. Gathers information about hosts. It is able to gather possible subdomains, email addresses, and uptime information and run tcp port scans, whois lookups, and more. | scanner | |
dnmap | 0.6 | The distributed nmap framework | scanner | |
dns-parallel-prober | 68.422db61 | PoC for an adaptive parallelised DNS prober. | recon | |
dns-reverse-proxy | 39.bd33162 | A reverse DNS proxy written in Go. | proxy networking | |
dns-spoof | 13.81ba29f | Yet another DNS spoof utility. | spoof | |
dns2geoip | 0.1 | A simple python script that brute forces DNS and subsequently geolocates the found subdomains. | scanner recon | |
dns2tcp | 0.5.2 | A tool for relaying TCP connections over DNS. | tunnel | |
dnsa | 0.6 | DNSA is a dns security swiss army knife | scanner | |
dnsbf | 0.3 | Search for available domain names in an IP range. | scanner | |
dnsbrute | 2.b1dc84a | Multi-theaded DNS bruteforcing, average speed 80 lookups/second with 40 threads. | recon scanner | |
dnscan | 208.2e23323 | A python wordlist-based DNS subdomain scanner. | scanner | |
dnschef | 17.a395411 | A highly configurable DNS proxy for pentesters. | proxy | |
dnscobra | 1.0 | DNS subdomain bruteforcing tool with Tor support through torsocks | recon | |
dnsdiag | 325.4c7384c | DNS Diagnostics and Performance Measurement Tools. | networking | |
dnsdrdos | 0.1 | Proof of concept code for distributed DNS reflection DoS. | dos | |
dnsenum | 1.2.4.2 | Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results. | recon scanner | |
dnsfilexfer | 24.126edcd | File transfer via DNS. | networking misc | |
dnsgoblin | 1:0.1 | Nasty creature constantly searching for DNS servers. It uses standard dns queries and waits for the replies. | scanner | |
dnsgrep | 14.3f4fa7c | A utility for quickly searching presorted DNS names. | recon | |
dnsmap | 0.30 | Passive DNS network mapper | fingerprint | |
dnsobserver | 5.f331482 | A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. | networking | |
dnspredict | 0.0.2 | DNS prediction. | scanner | |
dnsprobe | 56.7120008 | Allows you to perform multiple dns queries of your choice with a list of user supplied resolvers. | recon | |
dnspy | 6.1.8 | .NET debugger and assembly editor. | windows decompiler binary reversing | |
dnsrecon | 2:1.2.0 | Python script for enumeration of hosts, subdomains and emails from a given domain using google. | recon | |
dnssearch | 20.e4ea439 | A subdomain enumeration tool. | recon | |
dnsspider | 1.4 | A very fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation. | recon scanner | |
dnsteal | 28.1b09d21 | DNS Exfiltration tool for stealthily sending files over DNS requests.. | networking | |
dnstracer | 1.10 | Determines where a given DNS server gets its information from, and follows the chain of DNS servers | recon | |
dnstwist | 636.7c70076 | Domain name permutation engine for detecting typo squatting, phishing and corporate espionage. | scanner recon | |
dnsvalidator | 82.146c9b0 | Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses. | networking misc | |
dnswalk | 2.0.2 | A DNS debugger. | recon scanner | |
dnsx | 965.c2398ec | Fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers. | recon | |
docem | 21.59db436 | Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids). | webapp | |
dockerscan | 59.590a844 | Docker security analysis & hacking tools. | scanner | |
domain-analyzer | 0.8.1 | Finds all the security information for a given domain name. | recon | |
domain-stats | 169.759c52c | A web API to deliver domain information from whois and alexa. | recon | |
domained | 80.d9d079c | Multi Tool Subdomain Enumeration. | recon automation | |
domainhunter | 51.38cb7ef | Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names. | recon social | |
domato | 127.053714b | DOM fuzzer. | fuzzer | |
domi-owned | 41.583d0a5 | A tool used for compromising IBM/Lotus Domino servers. | webapp cracker fingerprint | |
domlink | 37.1cabd5d | A tool to link a domain with registered organisation names and emails, to other domains. | misc | |
donpapi | 1:V1.2.0.r10.g51767fc | Dumping revelant information on compromised targets without AV detection with DPAPI. | windows exploitation | |
dontgo403 | 1.0.1.r11.ga47e83b | Tool to bypass 40X response codes.. | webapp exploitation scanner | |
donut | 501.61af8cc | Generates x86, x64 or AMD64+x86 P.I. shellcode loading .NET Assemblies from memory. | backdoor exploitation | |
doona | 145.7a4796c | A fork of the Bruteforce Exploit Detector Tool (BED). | fuzzer exploitation | |
doork | 6.90c7260 | Passive Vulnerability Auditor. | webapp recon | |
doozer | 9.5cfc8f8 | A Password cracking utility. | cracker | |
dorkbot | 212.c91c4b9 | Command-line tool to scan Google search results for vulnerabilities. | scanner | |
dorkme | 57.0a7017a | Tool designed with the purpose of making easier the searching of vulnerabilities with Google Dorks, such as SQL Injection vulnerabilities. | scanner | |
dorknet | 58.419d6a2 | Selenium powered Python script to automate searching for vulnerable web apps. | webapp automation | |
dorkscout | 1.0.r13.gdd87daf | Golang tool to automate google dork scan against the entire internet or specific targets. | automation recon | |
dotdotpwn | 3.0.2 | The Transversal Directory Fuzzer | exploitation fuzzer | |
dotpeek | 2021.3.3 | Free .NET Decompiler and Assembly Browser. | windows decompiler binary reversing | |
dpeparser | 1:beta002 | Default password enumeration project | cracker | |
dpscan | 0.1 | Drupal Vulnerabilty Scanner. | scanner webapp fuzzer | |
dr-checker | 140.ea63c0f | A Soundy Vulnerability Detection Tool for Linux Kernel Drivers. | exploitation fuzzer | |
dr0p1t-framework | 44.db9bc2d | A framework that creates a dropper that bypass most AVs, some sandboxes and have some tricks. | backdoor | |
dracnmap | 69.09d3945 | Tool to exploit the network and gathering information with nmap help. | automation | |
dradis | 3.0.0.rc1 | An open source framework to enable effective information sharing. | recon misc | |
dradis-ce | 5575.ed72071c | An open source framework to enable effective information sharing. | recon misc | |
dragon-backdoor | 7.c7416b7 | A sniffing, non binding, reverse down/exec, portknocking service Based on cd00r.c. | backdoor sniffer windows | |
driftnet | 1:v1.3.0.r13.ge492335 | Listens to network traffic and picks out images from TCP streams it observes. | scanner sniffer | |
drinkme | 19.acf1a14 | A shellcode testing harness. | exploitation | |
dripcap | 0.6.15 | Caffeinated Packet Analyzer. | networking sniffer | |
dripper | v1.r1.gc9bb0c9 | A fast, asynchronous DNS scanner; it can be used for enumerating subdomains and enumerating boxes via reverse DNS. | scanner | |
droopescan | 1.45.1 | A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe. | scanner webapp | |
drozer | 2.4.4 | A security testing framework for Android - Precompiled binary from official repository. | mobile scanner fuzzer | |
drupal-module-enum | 11.525543c | Enumerate on drupal modules. | webapp scanner | |
drupalscan | 0.5.2 | Simple non-intrusive Drupal scanner. | webapp scanner | |
drupwn | 1:59.8186732 | Drupal enumeration & exploitation tool. | webapp exploitation scanner | |
dscanner | 0.15.2 | Swiss-army knife for D source code. | code-audit | |
dsd | 91.7ee04e5 | Digital Speech Decoder | misc | |
dsfs | 36.8e9f8e9 | A fully functional File inclusion vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code. | webapp scanner | |
dshell | 142.695c891 | A network forensic analysis framework. | forensic networking | |
dsjs | 32.26287d0 | A fully functional JavaScript library vulnerability scanner written in under 100 lines of code. | webapp scanner | |
dsniff | 2.4b1 | Collection of tools for network auditing and penetration testing | sniffer networking | |
dsss | 123.84ddd33 | A fully functional SQL injection vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code. | webapp scanner | |
dsstore-crawler | 7.efa51f5 | A parser + crawler for .DS_Store files exposed publically. | webapp recon | |
dsxs | 130.3e628b6 | A fully functional Cross-site scripting vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code. | webapp scanner | |
dtp-spoof | 5.3ae05fc | Python script/security tool to test Dynamic Trunking Protocol configuration on a switch. | networking | |
dublin-traceroute | 344.f9b1853 | NAT-aware multipath tracerouting tool. | networking | |
ducktoolkit | 37.42da733 | Encoding Tools for Rubber Ducky. | exploitation crypto | |
dudley | 16.ea14ca6 | Block-based vulnerability fuzzing framework. | fuzzer | |
dumb0 | 19.1493e74 | A simple tool to dump users in popular forums and CMS. | automation webapp | |
dump1090 | 386.bff92c4 | A simple Mode S decoder for RTLSDR devices. | networking misc | |
dumpacl | 1:0.1 | Dumps NTs ACLs and audit settings. | windows cracker | |
dumpsmbshare | 21.9fd4d5b | A script to dump files and folders remotely from a Windows SMB share. | miscc | |
dumpusers | 1.0 | Dumps account names and information even though RestrictAnonymous has been set to 1. | windows recon | |
dumpzilla | 03152013 | A forensic tool for firefox. | forensic | |
duplicut | 2.2 | Remove duplicates from massive wordlist, without sorting it (for dictionnary-based password cracking). | misc cracker | |
dutas | 10.37fa3ab | Analysis PE file or Shellcode. | binary reversing | |
dvcs-ripper | 54.2c1bbc6 | Rip web accessible (distributed) version control systems: SVN/GIT/... | scanner | |
dwarf | 1084.fd859ae | Full featured multi arch/os debugger built on top of PyQt5 and frida. | binary debugger disassembler exploitation mobile reversing | |
dynamorio | 9.0.19046 | DynamoRIO is a runtime code manipulation system that supports code transformations on any part of a program, while it executes. | binary reversing | |
eapeak | 130.9550d1c | Analysis Suite For EAP Enabled Wireless Networks. | wireless recon | |
eaphammer | 310.442ee78 | Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks. | wireless | |
eapmd5pass | 3.3d5551f | An implementation of an offline dictionary attack against the EAP-MD5 protocol | cracker wireless | |
easy-creds | 45.bf9f00c | A bash script that leverages ettercap and other tools to obtain credentials. | automation networking | |
easyda | 7.0867f9b | Easy Windows Domain Access Script. | automation scanner recon | |
easyfuzzer | 3.6 | A flexible fuzzer, not only for web, has a CSV output for efficient output analysis (platform independant). | fuzzer webapp | |
eazy | 0.1 | This is a small python tool that scans websites to look for PHP shells, backups, admin panels, and more. | scanner webapp | |
ecfs | 305.1758063 | Extended core file snapshot format. | binary | |
edb | 3255.64fca61f | A QT4-based binary mode debugger with the goal of having usability on par with OllyDbg. | debugger reversing | |
eggshell | 157.eaeeea7 | iOS/macOS/Linux Remote Administration Tool. | backdoor | |
eigrp-tools | 0.1 | This is a custom EIGRP packet generator and sniffer developed to test the security and overall operation quality of this brilliant Cisco routing protocol. | sniffer networking recon scanner | |
eindeutig | 20050628_1 | Examine the contents of Outlook Express DBX email repository files (forensic purposes) | forensic | |
electric-fence | 2.2.5 | A malloc(3) debugger that uses virtual memory hardware to detect illegal memory accesses. | debugger | |
elettra | 1.0 | Encryption utility by Julia Identity | misc | |
elettra-gui | 1.0 | Gui for the elettra crypto application. | misc | |
elevate | 27.1272d51 | Horizontal domain discovery tool you can use to discover other domains owned by a given company. | recon | |
elfkickers | 3.2 | Collection of ELF utilities (includes sstrip) | binary | |
elfparser | 7.39d21ca | Cross Platform ELF analysis. | binary | |
elfutils | 0.191 | Utilities to handle ELF object files and DWARF debugging information. | binary | |
elidecode | 48.38fa5ba | A tool to decode obfuscated shellcodes using the unicorn-engine for the emulation and the capstone-engine to print the asm code. | reversing | |
elite-proxy-finder | 51.1ced3be | Finds public elite anonymity proxies and concurrently tests them. | proxy | |
email2phonenumber | 29.9df9dbe | A OSINT tool to obtain a target's phone number just by having his email address. | social recon | |
emldump | 0.0.11 | Analyze MIME files. | forensic | |
emp3r0r | v1.23.0.r1.g3621842 | Linux post-exploitation framework made by linux user. | automation | |
empire | 2:3432.19baddb7 | A PowerShell and Python post-exploitation agent. | automation | |
enabler | 1 | Attempts to find the enable password on a cisco system via brute force. | cracker | |
encodeshellcode | 0.1b | This is an encoding tool for 32-bit x86 shellcode that assists a researcher when dealing with character filter or byte restrictions in a buffer overflow vulnerability or some kind of IDS/IPS/AV blocking your code. | exploitation | |
ent | 1.0 | Pseudorandom number sequence test. | misc | |
enteletaor | 68.a975b5c | Message Queue & Broker Injection tool that implements attacks to Redis, RabbitMQ and ZeroMQ. | exploitation scanner recon | |
entropy | 702.13aac50 | A set of tools to exploit Netwave and GoAhead IP Webcams. | exploitation | |
enum-shares | 7.97cba5a | Tool that enumerates shared folders across the network and under a custom user account. | scanner | |
enum4linux | 0.9.1 | A tool for enumerating information from Windows and Samba systems. | recon scanner | |
enum4linux-ng | 422.70c6ea1 | A next generation version of enum4linux. | recon scanner | |
enumerate-iam | 14.4529114 | Enumerate the permissions associated with an AWS credential set. | recon scanner | |
enumerid | 36.d3e7265 | Enumerate RIDs using pure Python. | recon | |
enumiax | 1.0 | An IAX enumerator. | scanner | |
enyelkm | 1.2 | Rootkit for Linux x86 kernels v2.6. | backdoor | |
eos | 14.0127319 | Enemies Of Symfony - Debug mode Symfony looter. | webapp scanner | |
epicwebhoneypot | 2.0a | Tool which aims to lure attackers using various types of web vulnerability scanners by tricking them into believing that they have found a vulnerability on a host. | webapp defensive honeypot | |
erase-registrations | 1.0 | An IAX flooder. | voip | |
eraser | 6.2.0.2992 | Windows tool which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. | windows defensive | |
eresi | 1291.4769c175 | The ERESI Reverse Engineering Software Interface. | binary reversing debugger disassembler | |
erl-matter | 53.ab793cd | Tool to exploit epmd related services such ass rabbitmp, ejabberd and couchdb by bruteforcing the cookie and gaining RCE afterwards. | exploitation cracker | |
espionage | 1:48.2d57edd | A Network Packet and Traffic Interceptor For Linux. Sniff All Data Sent Through a Network. | sniffer networking | |
eternal-scanner | 101.3979b0f | An internet scanner for exploit CVE-2017-0144 (Eternal Blue). | scanner exploitation | |
etherape | 0.9.20 | A graphical network monitor for various OSI layers and protocols | networking sniffer | |
etherchange | 1.1 | Can change the Ethernet address of the network adapters in Windows. | windows misc | |
etherflood | 1.1 | Floods a switched network with Ethernet frames with random hardware addresses. | windows dos networking | |
ettercap | 0.8.3.1 | Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis. | sniffer networking | |
evil-ssdp | 96.0d41a11 | Spoof SSDP replies to phish for NetNTLM challenge/response on a network. | spoof sniffer | |
evil-winrm | 1:v3.5.r0.g7514b05 | The ultimate WinRM shell for hacking/pentesting. | exploitation backdoor | |
evilclippy | 62.fa610c6 | A cross-platform assistant for creating malicious MS Office documents. | exploitation windows | |
evilginx | 3.3.0 | Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. | social | |
evilginx2 | 59.5a477f7 | Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication. | social | |
evilgrade | 2.0.9 | Modular framework that takes advantage of poor upgrade implementations by injecting fake updates | misc | |
evilize | 0.2 | Tool to create MD5 colliding binaries. | cracker binary crypto | |
evillimiter | 36.46d2033 | Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access. | networking misc | |
evilmaid | 1.01 | TrueCrypt loader backdoor to sniff volume password | cracker | |
evilpdf | 5.43696a8 | Embedding executable files in PDF Documents. | backdoor | |
evine | 42.46051de | Interactive CLI Web Crawler. | webapp scanner | |
evtkit | 8.af06db3 | Fix acquired .evt - Windows Event Log files (Forensics). | forensic windows | |
exabgp | 5230.82b21cdf | The BGP swiss army knife of networking. | networking defensive | |
exe2hex | 1.5.1.r6.ge563b35 | Inline file transfer using in-built Windows tools (DEBUG.exe or PowerShell). | disassembler | |
exe2image | 1.1 | A simple utility to convert EXE files to JPEG images and vice versa. | backdoor binary | |
exescan | 1.ad993e3 | A tool to detect anomalies in PE (Portable Executable) files. | binary | |
exiflooter | 39.0c9535f | Find geolocation on all image urls and directories also integrates with OpenStreetMap. | forensic | |
exitmap | 373.8155029 | A fast and modular scanner for Tor exit relays. | recon | |
exiv2 | 0.27.2 | Exif, Iptc and XMP metadata manipulation library and tools | forensic defensive | |
expimp-lookup | 4.79a96c7 | Looks for all export and import names that contain a specified string in all Portable Executable in a directory tree. | binary recon | |
exploit-db | 1.6 | The Exploit Database (EDB) - an ultimate archive of exploits and vulnerable software - A collection of hacks | exploitation | |
exploitdb | 20240829 | Offensive Security's Exploit Database Archive | exploitation | |
exploitpack | 139.e565c47 | Exploit Pack - Project. | exploitation automation | |
expose | 1110.30264af | A Dynamic Symbolic Execution (DSE) engine for JavaScript | binary reversing code-audit | |
exrex | 148.1c22c70 | Irregular methods on regular expressions. Exrex is a command line tool and python module that generates all - or random - matching strings to a given regular expression and more. It's pure python, without external dependencies. | misc | |
extended-ssrf-search | 28.680f815 | Smart ssrf scanner using different methods like parameter brute forcing in post and get. | webapp scanner | |
extracthosts | 17.8fdff9e | Extracts hosts (IP/Hostnames) from files. | misc | |
extractusnjrnl | 7.362d4290 | Tool to extract the $UsnJrnl from an NTFS volume. | forensic windows | |
extundelete | 0.2.4 | Utility for recovering deleted files from ext2, ext3 or ext4 partitions by parsing the journal | forensic | |
eyeballer | 143.5299227 | Convolutional neural network for analyzing pentest screenshots. | misc | |
eyepwn | 1.0 | Exploit for Eye-Fi Helper directory traversal vulnerability | exploitation wireless | |
eyewitness | 1145.cb09a84 | Designed to take screenshots of websites, provide some server header info, and identify default credentials if possible. | webapp recon misc | |
f-scrack | 19.9a00357 | A single file bruteforcer supports multi-protocol. | cracker | |
facebash | 17.95c3c25 | Facebook Brute Forcer in shellscript using TOR. | social cracker | |
facebookosint | 21.656a04a | OSINT tool to replace facebook graph search. | social recon | |
facebot | 23.57f6025 | A facebook profile and reconnaissance system. | recon webapp | |
facebrok | 33.0f6fe8d | Social Engineering Tool Oriented to facebook. | social | |
facebrute | 7.ece355b | This script tries to guess passwords for a given facebook account using a list of passwords (dictionary). | cracker webapp | |
factordb-pycli | 1.3.0 | CLI for factordb and Python API Client. | crypto | |
fakeap | 0.3.2 | Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP's cacophony of beacon frames. | honeypot | |
fakedns | 118.39609da | A regular-expression based python MITM DNS server with correct DNS request passthrough and "Not Found" responses. | proxy spoof | |
fakemail | 1.0 | Fake mail server that captures e-mails as files for acceptance testing. | misc | |
fakenet-ng | 304.2e3e99e | Next Generation Dynamic Network Analysis Tool. | malware networking sniffer proxy | |
fakenetbios | 7.b83701e | A family of tools designed to simulate Windows hosts (NetBIOS) on a LAN. | spoof honeypot networking | |
fang | 22.4f94552 | A multi service threaded MD5 cracker. | cracker | |
faraday | 9269.4625bd369 | A new concept (IPE) Integrated Penetration-Test Environment a multiuser Penetration test IDE. Designed for distribution, indexation and analyze of the generated data during the process of a security audit. | scanner exploitation fuzzer fingerprint automation misc | |
faradaysec | 12594.9e806957c | Collaborative Penetration Test and Vulnerability Management Platform. | scanner exploitation fuzzer fingerprint automation misc | |
fastnetmon | v1.1.4.r62.g780aff3 | High performance DoS/DDoS load analyzer built on top of multiple packet capture engines. | defensive sniffer | |
fav-up | 54.089aa11 | IP lookup by favicon using Shodan. | recon | |
favfreak | 27.8acea5e | Weaponizing favicon.ico for BugBounties , OSINT and what not. | recon fingerprint | |
fbht | 1:70.d75ae93 | A Facebook Hacking Tool | webapp | |
fbi | 28.0f94e99 | An accurate facebook account information gathering. | social recon | |
fbid | 16.1b35eb9 | Show info about the author by facebook photo url. | recon social | |
fcrackzip | 1.0 | Zip file password cracker | cracker | |
fdsploit | 26.4522f53 | A File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool. | webapp fuzzer exploitation | |
featherduster | 191.9229158 | An automated, modular cryptanalysis tool. | crypto | |
fern-wifi-cracker | 299.0870567 | WEP, WPA wifi cracker for wireless penetration testing | cracker wireless | |
fernflower | 668.15c64a5 | An analytical decompiler for Java. | decompiler | |
fernmelder | 8.030212e | Asynchronous mass DNS scanner. | scanner recon | |
feroxbuster | 1:v2.10.4.r9.gae0bcfa | A fast, simple, recursive content discovery tool written in Rust. | webapp scanner fuzzer | |
ffdec | 11.0.0 | Open source Flash SWF decompiler and editor. | decompiler binary misc | |
ffm | 129.6337eaf | A hacking harness that you can use during the post-exploitation phase of a red-teaming engagement. | exploitation | |
ffuf | 1:v2.1.0.r3.gde9ac86 | Fast web fuzzer written in Go. | webapp fuzzer | |
ffuf-scripts | 1.2192bf7 | Scripts and snippets for ffuf payloads. | misc | |
fgscanner | 11.893372c | An advanced, opensource URL scanner. | scanner | |
fhttp | 1.3 | This is a framework for HTTP related attacks. It is written in Perl with a GTK interface, has a proxy for debugging and manipulation, proxy chaining, evasion rules, and more. | webapp scanner fuzzer fingerprint dos | |
fi6s | 195.1380b86 | IPv6 network scanner designed to be fast. | scanner | |
fierce | 135.f32f639 | A DNS reconnaissance tool for locating non-contiguous IP space. A DNS scanner. | scanner | |
fiked | 0.0.5 | FakeIKEd, or fiked for short, is a fake IKE daemon supporting just enough of the standards and Cisco extensions to attack commonly found insecure Cisco VPN PSK+XAUTH based IPsec authentication setups in what could be described as a semi MitM attack. Fiked can impersonate a VPN gateway’s IKE responder in order to capture XAUTH login credentials; it doesn’t currently do the client part of full MitM. | honeypot | |
filebuster | 95.f2b04c7 | An extremely fast and flexible web fuzzer. | webapp fuzzer | |
filefuzz | 1.0 | A binary file fuzzer for Windows with several options. | windows fuzzer | |
filegps | 90.03cbc75 | A tool that help you to guess how your shell was renamed after the server-side script of the file uploader saved it. | webapp misc | |
fileintel | 33.a0bff38 | A modular Python application to pull intelligence about malicious files. | malware recon | |
filibuster | 167.c54ac80 | A Egress filter mapping application with additional functionality. | networking | |
fimap | 2:1.00 | A little tool for local and remote file inclusion auditing and exploitation. fimap is a little python tool which can find, prepare, audit, exploit and even google automaticly for local and remote file inclusion bugs in webapps. | exploitation fuzzer | |
finalrecon | 187.06c2811 | OSINT Tool for All-In-One Web Reconnaissance. | recon | |
find-dns | 0.1 | A tool that scans networks looking for DNS servers. | scanner | |
find3 | 604.5964026 | High-precision indoor positioning framework. | misc | |
findmyhash | 1.1.2 | Crack different types of hashes using free online services | crypto | |
findmyiphone | 19.aef3ac8 | Locates all devices associated with an iCloud account | mobile recon | |
findomain | 9.0.4 | A tool that use Certificate Transparency logs to find subdomains. | scanner recon | |
findsploit | 87.3e61d8d | Find exploits in local and online databases instantly. | misc | |
fingerprinter | 480.105ab04 | CMS/LMS/Library etc Versions Fingerprinter. | fingerprint webapp | |
firecat | 6.b5205c8 | A penetration testing tool that allows you to punch reverse TCP tunnels out of a compromised network. | networking tunnel | |
firefox-decrypt | 1.1.1.r3.g2a163fa | Extract passwords from Mozilla Firefox, Waterfox, Thunderbird, SeaMonkey profiles. | forensic | |
firefox-security-toolkit | 16.31dacf0 | A tool that transforms Firefox browsers into a penetration testing suite. | misc | |
firewalk | 5.0 | An active reconnaissance network security tool | fuzzer scanner | |
firmwalker | 101.23ff299 | A simple bash script for searching the extracted or mounted firmware file system. | firmware | |
firmware-mod-kit | 149.8403a17 | Modify firmware images without recompiling. | firmware | |
firstexecution | 6.a275793 | A Collection of different ways to execute code outside of the expected entry points. | exploitation | |
firstorder | 8.107eb6a | A traffic analyzer to evade Empire communication from Anomaly-Based IDS. | sniffer automation exploitation | |
fl0p | 0.1 | A passive L7 flow fingerprinter that examines TCP/UDP/ICMP packet sequences, can peek into cryptographic tunnels, can tell human beings and robots apart, and performs a couple of other infosec-related tricks. | fingerprint bluetooth sniffer | |
flamerobin | 2370.c75f8618 | A tool to handle Firebird database management. | database | |
flare | 0.6 | Flare processes an SWF and extracts all scripts from it. | misc | |
flare-floss | 1:v3.1.0.r50.ge4595b2 | Obfuscated String Solver - Automatically extract obfuscated strings from malware. | recon | |
flashlight | 109.90d1dc5 | Automated Information Gathering Tool for Penetration Testers. | recon | |
flashscanner | 11.6815b02 | Flash XSS Scanner. | scanner webapp | |
flashsploit | 23.c465a6d | Exploitation Framework for ATtiny85 Based HID Attacks. | exploitation | |
flask-session-cookie-manager2 | v1.2.1.1.r12.ga2b1b57 | Decode and encode Flask session cookie. | webapp | |
flask-session-cookie-manager3 | v1.2.1.1.r12.ga2b1b57 | Decode and encode Flask session cookie. | webapp | |
flask-unsign | 1.2.0 | Decode, encode and brute-force Flask session cookie. | webapp | |
flasm | 1.62 | Disassembler tool for SWF bytecode | reversing decompiler | |
flawfinder | 2.0.19 | Searches through source code for potential security flaws. | code-audit scanner | |
flowinspect | 97.34759ed | A network traffic inspection tool. | networking sniffer | |
flunym0us | 2.0 | A Vulnerability Scanner for Wordpress and Moodle. | scanner webapp | |
fluxion | 3:1571.4f461a4 | A security auditing and social-engineering research tool. | social wireless | |
flyr | 76.4926ecc | Block-based software vulnerability fuzzing framework. | fuzzer | |
fockcache | 10.3e7efa9 | Tool to make cache poisoning by trying X-Forwarded-Host and X-Forwarded-Scheme headers on web pages. | webapp fuzzer | |
forager | 115.7439b0a | Multithreaded threat Intelligence gathering utilizing. | recon | |
foremost | 1.5.7 | A console program to recover files based on their headers, footers, and internal data structures | forensic | |
foresight | 57.6f48984 | A tool for predicting the output of random number generators. | crypto | |
forkingportscanner | 1 | Simple and fast forking port scanner written in perl. Can only scan one host at a time, the forking is done on the specified port range. Or on the default range of 1-65535. Has the ability to scan UDP or TCP, defaults to tcp. | scanner | |
formatstringexploiter | 107.2810293 | Helper script for working with format string bugs. | exploitation | |
fortiscan | 0.7.r7.gd54faa0 | A high performance FortiGate SSL-VPN vulnerability scanning and exploitation tool. | scanner exploitation | |
fpdns | 2:108.2a898bf | Program that remotely determines DNS server versions. | fingerprint | |
fping | 5.2 | A utility to ping multiple hosts at once | networking recon scanner | |
fport | 2.0 | Identify unknown open ports and their associated applications. | windows recon fingerprint | |
fprotlogparser | 1 | This is a utility to parse a F-Prot Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your collection. | malware | |
fraud-bridge | 10.775c563 | ICMP and DNS tunneling via IPv4 and IPv6. | tunnel networking | |
fred | 0.1.1 | Cross-platform M$ registry hive editor. | windows | |
freeipmi | 1.6.14 | Sensor monitoring, system event monitoring, power control, and serial-over-LAN (SOL). | networking misc | |
freeradius | 3.2.6 | The premier open source RADIUS server | wireless | |
freewifi | 30.1cb752b | How to get free wifi. | wireless | |
frida | 12.6.8 | An interactive disassembler based on LLVM and Qt. | disassembler | |
frida-extract | 13.abb3f14 | Frida.re based RunPE (and MapViewOfSection) extraction tool. | reversing | |
frida-ios-dump | 53.56e99b2 | Pull decrypted ipa from jailbreak device. | mobilereversing binary | |
frida-ipa-dump | 1:117.b9dcb91 | Yet another frida based iOS dumpdecrypted. | mobilereversing binary | |
frida-push | 1.0.8 | Wrapper tool to identify the remote device and push device specific frida-server binary | mobile fingerprint | |
fridump | 23.3e64ee0 | A universal memory dumper using Frida. | forensic | |
frisbeelite | 1.2 | A GUI-based USB device fuzzer. | fuzzer | |
fs-exploit | 3.28bb9bb | Format string exploit generation. | exploitation automation | |
fs-nyarl | 1.0 | A network takeover & forensic analysis tool - useful to advanced PenTest tasks & for fun and profit. | scanner networking forensic spoof exploitation sniffer | |
fscan | 1.8.4.r4.gd01df95 | A Security Auditing Tool. | scanner | |
fsnoop | 3.4 | A tool to monitor file operations on GNU/Linux systems by using the Inotify mechanism. Its primary purpose is to help detecting file race condition vulnerabilities and since version 3, to exploit them with loadable DSO modules (also called "payload modules" or "paymods"). | scanner | |
fssb | 73.51d2ac2 | A low-level filesystem sandbox for Linux using syscall intercepts. | defensive | |
fstealer | 0.1 | Automates file system mirroring through remote file disclosure vulnerabilities on Linux machines. | automation misc | |
ftester | 1.0 | A tool designed for testing firewall filtering policies and Intrusion Detection System (IDS) capabilities. | fuzzer | |
ftp-fuzz | 1:1337 | The master of all master fuzzing scripts specifically targeted towards FTP server sofware. | fuzzer | |
ftp-scanner | 0.2.5 | Multithreaded ftp scanner/brute forcer. Tested on Linux, OpenBSD and Solaris. | cracker scanner | |
ftp-spider | 1.0 | FTP investigation tool - Scans ftp server for the following: reveal entire directory tree structures, detect anonymous access, detect directories with write permissions, find user specified data within repository. | scanner cracker | |
ftpmap | 52.cbeabbe | Scans remote FTP servers to identify what software and what versions they are running. | fingerprint scanner | |
ftpscout | 12.cf1dff1 | Scans ftps for anonymous access. | scanner | |
fuddly | 569.fd2c4d0 | Fuzzing and Data Manipulation Framework (for GNU/Linux). | fuzzer | |
fusil | 1.5 | A Python library used to write fuzzing programs. | fuzzer | |
fuxploider | 140.ec8742b | Tool that automates the process of detecting and exploiting file upload forms flaws. | webapp exploitation | |
fuzzap | 17.057002b | A python script for obfuscating wireless networks. | wireless | |
fuzzball2 | 0.7 | A little fuzzer for TCP and IP options. It sends a bunch of more or less bogus packets to the host of your choice. | fuzzer | |
fuzzbunch | 32.2b76c22 | NSA Exploit framework | exploitation | |
fuzzdb | 475.5656ab2 | Attack and Discovery Pattern Dictionary for Application Fault Injection Testing | fuzzer | |
fuzzdiff | 1.0 | A simple tool designed to help out with crash analysis during fuzz testing. It selectively 'un-fuzzes' portions of a fuzzed file that is known to cause a crash, re-launches the targeted application, and sees if it still crashes. | fuzzer | |
fuzzowski | 41.e39f665 | A Network Protocol Fuzzer made by NCCGroup based on Sulley and BooFuzz. | fuzzer networking | |
fuzztalk | 1.0.0.0 | An XML driven fuzz testing framework that emphasizes easy extensibility and reusability. | windows fuzzer | |
g72x++ | Decoder for the g72x++ codec. | wireless | ||
gadgetinspector | 6.ac7832d | A byte code analyzer for finding deserialization gadget chains in Java applications. | decompiler binary | |
gadgettojscript | 20.005cb8b | .NET serialized gadgets that can trigger .NET assembly from JS/VBS/VBA based scripts. | exploitation windows | |
galleta | 20040505_1 | Examine the contents of the IE's cookie files for forensic purposes | forensic | |
gasmask | 172.2527371 | All in one Information gathering tool - OSINT. | recon | |
gatecrasher | 2.3ad5225 | Network auditing and analysis tool developed in Python. | recon scanner | |
gau | 161.046a59f | Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl. | webapp recon | |
gcat | 29.39b266c | A fully featured backdoor that uses Gmail as a C&C server. | malware exploitation | |
gcpbucketbrute | 17.6866bd2 | A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated. | scanner | |
gcrypt | 1:32.d3f9f06 | Simple file encryption tool written in C++. | crypto | |
gdb | 15.1 | The GNU Debugger | debugger | |
gdb-common | 15.1 | The GNU Debugger | debugger | |
gdbgui | 1:437.be95217 | Browser-based gdb frontend using Flask and JavaScript to visually debug C, C++, Go, or Rust. | debugger binary | |
gef | 2308.2830670 | Multi-Architecture GDB Enhanced Features for Exploiters & Reverse-Engineers. | debugger exploitation | |
gene | 78.faf8cc0 | Signature Engine for Windows Event Logs. | windows | |
genisys | 53.d53bb0c | Powerful Telegram Members Scraping and Adding Toolkit. | social recon | |
genlist | 1:0.1 | Generates lists of IP addresses. | misc | |
geoedge | 0.2 | This little tools is designed to get geolocalization information of a host, it get the information from two sources (maxmind and geoiptool). | recon | |
geoip | 1.6.12 | Non-DNS IP-to-country resolver C library & utils | networking recon | |
geoipgen | 0.4 | GeoIPgen is a country to IP addresses generator. | misc | |
gerix-wifi-cracker | 1.1c3cd73 | A graphical user interface for aircrack-ng and pyrit. | wireless misc | |
gethsploit | 3.144778b | Finding Ethereum nodes which are vulnerable to RPC-attacks. | scanner | |
getsids | 0.0.1 | Getsids tries to enumerate Oracle Sids by sending the services command to the Oracle TNS listener. Like doing 'lsnrctl service'. | database | |
getsploit | 37.bcab2ee | Command line utility for searching and downloading exploits. | exploitation misc | |
gf | 39.dcd4c36 | A wrapper around grep, to help you grep for things. | misc | |
gg-images | 35.b2dd863 | The application was created to allow anyone to easily download profile pictures from GG. | social misc | |
gggooglescan | 0.4 | A Google scraper which performs automated searches and returns results of search queries in the form of URLs or hostnames. | scanner | |
gh-dork | 3.799f86f | Github dorking tool. | recon social | |
ghauri | 1.3.7.r0.g0d52050 | An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws. | webapp exploitation | |
ghettotooth | 1.0 | Ghettodriving for bluetooth | bluetooth | |
ghidra | 11.0.3 | A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission. | reversing disassembler debugger | |
ghost-phisher | 1.62 | GUI suite for phishing and penetration attacks | scanner | |
ghost-py | 2.0.0 | Webkit based webclient (relies on PyQT). | webapp misc | |
ghostdelivery | 32.a23ed5a | Python script to generate obfuscated .vbs script that delivers payload (payload dropper) with persistence and windows antivirus disabling functions. | exploitation windows | |
gibberish-detector | v0.1.1.r2.gecac969 | Train a model and detect gibberish strings with it. | misc | |
girsh | v0.41.r0.gfc5b44e | Automatically spawn a reverse shell fully interactive for Linux or Windows victim. | networking | |
giskismet | 20110805 | A program to visually represent the Kismet data in a flexible manner. | wireless | |
git-dump | 7.4c9a2a9 | Dump the contents of a remote git repository without directory listing enabled. | scanner code-audit | |
git-dumper | 1:1.0.6.r14.g2d6fa4f | A tool to dump a git repository from a website. | scanner webapp | |
git-hound | 174.1d20536 | Pinpoints exposed API keys on GitHub. A batch-catching, pattern-matching, patch-attacking secret snatcher. | recon social | |
git-wild-hunt | 16.6495672 | A tool to hunt for credentials in github wild AKA git*hunt. | recon | |
gitdorker | 113.8199375 | Python program to scrape secrets from GitHub through usage of a large repository of dorks. | recon scanner | |
gitdump | 1.682fa37 | A pentesting tool that dumps the source code from .git even when the directory traversal is disabled. | webapp automation | |
gitem | 104.d40a1c9 | A Github organization reconnaissance tool. | recon | |
gitgraber | 82.aab4839 | Monitor GitHub to search and find sensitive data in real time for different online services. | recon | |
githack | 16.a3d70b1 | A `.git` folder disclosure exploit. | recon | |
githound | v1.7.1.r15.g1d20536 | Find secret information in git repositories. | code-audit recon | |
github-dorks | 82.d50a677 | Collection of github dorks and helper tool to automate the process of checking dorks. | recon social | |
githubcloner | 35.2bcb9c2 | A script that clones Github repositories of users and organizations automatically. | misc automation | |
gitleaks | 8.18.4 | Audit Git repos for secrets and keys. | recon | |
gitmails | 71.8aa8411 | An information gathering tool to collect git commit emails in version control host services. | recon social | |
gitminer | 54.16ada58 | Tool for advanced mining for content on Github. | recon | |
gitrecon | 30.6467e78 | OSINT tool to get information from a Github and Gitlab profile and find user's email addresses leaked on commits. | recon social | |
gitrob | 7.7be4c53 | Scan Github For Sensitive Files. | scanner | |
gittools | 70.7cac63a | A repository with 3 tools for pwn'ing websites with .git repositories available'. | webapp scanner | |
gloom | 1:93.cd6e927 | Linux Penetration Testing Framework. | scanner exploitation recon fuzzer social | |
glue | 380.8703380 | A framework for running a series of tools. | automation | |
gmsadumper | 18.e03187c | A tool that Reads any gMSA password blobs the user can access and parses the values. | misc | |
gnuradio | 3.10.11.0 | General purpose DSP and SDR toolkit. With drivers for usrp and fcd. | wireless | |
gnutls2 | 2.12.23 | A library which provides a secure layer over a reliable transport layer (Version 2) | crypto | |
go-windapsearch | v0.3.0.r22.ged05587 | Utility to enumerate users, groups and computers from a Windows domain through LDAP queries. | recon windows | |
gobd | 82.3bbd17c | A Golang covert backdoor. | backdoor | |
gobuster | 2:367.308cf9f | Directory/file & DNS busting tool written in Go. | webapp scanner | |
gocabrito | 4.33ac59a | Super organized and flexible script for sending phishing campaigns. | social | |
goddi | 1.2 | Dumps Active Directory domain information. | recon windows | |
goldeneye | 28.792862f | A HTTP DoS test tool. Attack Vector exploited: HTTP Keep Alive + NoCache. | dos | |
golismero | 73.7d605b9 | Opensource web security testing framework. | webapp | |
gomapenum | v1.1.0.r110.g8b344df | User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin. | cracker recon social windows | |
goodork | 2.2 | A python script designed to allow you to leverage the power of google dorking straight from the comfort of your command line. | recon | |
goofile | 1.5 | Command line filetype search | recon | |
goofuzz | 1.2.5.r2.g6ba4cc5 | A Bash script that uses advanced Google search techniques to obtain sensitive information in files or directories without making requests to the web server. | fuzzer recon scanner | |
goog-mail | 1.0 | Enumerate domain emails from google. | recon | |
google_streetview | 1.2.9 | A command line tool and module for Google Street View Image API. | misc | |
google-explorer | 140.0b21b57 | Google mass exploit robot - Make a google search, and parse the results for a especific exploit you define. | automation exploitation | |
googlesub | 14.a7a3cc7 | A python script to find domains by using google dorks. | scanner | |
goohak | 31.815a31e | Automatically Launch Google Hacking Queries Against A Target Domain. | recon automation scanner | |
goop | 12.39b34eb | Perform google searches without being blocked by the CAPTCHA or hitting any rate limits. Note: It no longer works. | recon | |
goop-dump | 71.3c15d60 | Tool to dump a git repository from a website, focused on as-complete-as-possible dumps and handling weird edge-cases. | webapp scanner | |
gooscan | 1.0.9 | A tool that automates queries against Google search appliances, but with a twist. | automation | |
gopherus | 33.90a2fd5 | Tool generates gopher link for exploiting SSRF and gaining RCE in various servers. | webapp exploitation | |
gophish | 813.8e792944 | Open-Source Phishing Framework. | social | |
goshs | 0.3.8 | A SimpleHTTPServer written in Go, enhanced with features and with a nice design. | misc | |
gosint | 196.9c86ed2 | OSINT framework in Go. | recon | |
gospider | 108.f6cc9a7 | Fast web spider written in Go. | webapp scanner | |
gostringsr2 | 1.1.2 | Extract strings from a Go binary using radare2. | reversing | |
gowitness | 307.6cfa992 | A golang, web screenshot utility using Chrome Headless. | webapp recon | |
gplist | 1.0 | Lists information about the applied Group Policies. | windows recon | |
gpocrack | 3.cf63c86 | Active Directory Group Policy Preferences cpassword cracker/decrypter. | cracker | |
gpredict | 1646.098e376 | A real-time satellite tracking and orbit prediction application. | radio scanner | |
gps-sdr-sim | 217.ca37535 | Software-Defined GPS Signal Simulator. | radio | |
gqrx | 2.17.5 | Interactive SDR receiver waterfall for many devices. | wireless | |
gr-air-modes | 396.0b6c383 | Gnuradio tools for receiving Mode S transponder signals, including ADS-B. | radio | |
gr-gsm | 1194.a77cf59 | Gnuradio blocks and tools for receiving GSM transmissions | radio | |
gr-paint | 50.3806b20 | An OFDM Spectrum Painter for GNU Radio. | radio | |
grabbb | 0.0.7 | Clean, functional, and fast banner scanner. | scanner | |
grabber | 0.1 | A web application scanner. Basically it detects some kind of vulnerabilities in your website. | webapp | |
grabing | 11.9c1aa6c | Counts all the hostnames for an IP adress | recon | |
grabitall | 1.1 | Performs traffic redirection by sending spoofed ARP replies. | windows spoof networking | |
graffiti | 24.4af61b4 | A tool to generate obfuscated one liners to aid in penetration testing. | misc | |
grammarinator | 352.122dfbb | A random test generator / fuzzer that creates test cases according to an input ANTLR v4 grammar. | fuzzer misc | |
graphinder | 1.11.6 | GraphQL endpoints finder using subdomain enumeration, scripts analysis and bruteforce. | recon scanner webapp | |
graphql-cop | 1:1.12.r21.ga08f757 | GraphQL vulnerability scanner. | scanner webapp | |
graphql-path-enum | 23.5450280 | Tool that lists the different ways of reaching a given type in a GraphQL schema. | webapp exploitation fuzzer | |
graphqlmap | 63.59305d7 | Scripting engine to interact with a graphql endpoint for pentesting purposes. | webapp exploitation fuzzer | |
graphw00f | 1.1.18.r0.g701e4c1 | GraphQL endpoint detection and engine fingerprinting. | webapp fingerprint | |
graudit | 629.132db32 | Grep rough source code auditing tool. | code-audit | |
greenbone-security-assistant | 9.0.1 | Greenbone Security Assistant (gsa) - OpenVAS web frontend | scanner fuzzer exploitation | |
grepforrfi | 0.1 | Simple script for parsing web logs for RFIs and Webshells v1.2 | scanner | |
grokevt | 0.5.0 | A collection of scripts built for reading Windows NT/2K/XP/2K eventlog files. | forensic | |
grr | 17.791ed5a | High-throughput fuzzer and emulator of DECREE binaries. | fuzzer | |
grype | 1:0.33.1 | A vulnerability scanner for container images and filesystems. | scanner | |
gsd | 1.1 | Gives you the Discretionary Access Control List of any Windows NT service you specify as a command line option. | windows recon | |
gsocket | 1.4.43 | Global Socket. Moving data from here to there. Securely, Fast and trough NAT/Firewalls. | networking | |
gspoof | 3.2 | A simple GTK/command line TCP/IP packet generator. | networking | |
gtalk-decode | 0.1 | Google Talk decoder tool that demonstrates recovering passwords from accounts. | windows crypto cracker | |
gtfo | 17.873d862 | Search gtfobins and lolbas files from your terminal. | misc | |
gtfoblookup | 69.cc50e6e | Offline command line lookup utility for GTFOBins and LOLBAS. | misc | |
gtp-scan | 0.7 | A small python script that scans for GTP (GPRS tunneling protocol) speaking hosts. | scanner networking mobile | |
guymager | 0.8.13 | A forensic imager for media acquisition. | forensic | |
gvmd | 8.0.1 | Greenbone Vulnerability Manager - The database backend for the Greenbone Vulnerability Management (GVM) framework | scanner fuzzer exploitation | |
gwcheck | 0.1 | A simple program that checks if a host in an ethernet network is a gateway to Internet. | networking scanner | |
gwtenum | 1:7.f27a5aa | A command line tool that analyzes the obfuscated Javascript produced by Google Web Toolkit (GWT) applications in order to enumerate all services and method calls. | recon webapp | |
h2buster | 79.6c4dd1c | A threaded, recursive, web directory brute-force scanner over HTTP/2. | scanner webapp | |
h2csmuggler | 7.7ea573a | HTTP Request Smuggling over HTTP/2 Cleartext (h2c). | webapp | |
h2spec | 2.6.0 | A conformance testing tool for HTTP/2 implementation. | misc | |
h2t | 36.9183a30 | Scans a website and suggests security headers to apply. | webapp scanner defensive | |
h8mail | 344.ee31c8f | Email OSINT and password breach hunting. | recon social | |
habu | 359.8326936 | Python Network Hacking Toolkit. | scanner spoof dos cracker dos | |
hackersh | 0.2.0 | A shell for with Pythonect-like syntax, including wrappers for commonly used security tools. | automation misc | |
hackredis | 3.fbae1bc | A simple tool to scan and exploit redis servers. | exploitation scanner | |
hackrf | 2024.02.1 | Driver for HackRF, allowing general purpose software defined radio (SDR). | radio | |
haiti | v2.1.0.r47.g962a11b | A CLI tool to identify the hash type of a given hash. | crypto | |
haka | 0.2.2 | A collection of tool that allows capturing TCP/IP packets and filtering them based on Lua policy files. | networking sniffer | |
hakku | 384.bbb434d | Simple framework that has been made for penetration testing tools. | scanner recon webapp exploitation fingerprint | |
hakrawler | 234.14e240b | Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application. | webapp scanner | |
hakrevdns | 47.3001d16 | Small, fast tool for performing reverse DNS lookups en masse. | recon | |
halberd | 0.2.4 | Halberd discovers HTTP load balancers. It is useful for web application security auditing and for load balancer configuration testing. | scanner webapp | |
halcyon | 0.1 | A repository crawler that runs checksums for static files found within a given git repository. | recon | |
halcyon-ide | 2.0.2 | First IDE for Nmap Script (NSE) Development. | misc | |
hamster | 2.0.0 | Tool for HTTP session sidejacking. | exploitation | |
handle | 1:0.1 | An small application designed to analyze your system searching for global objects related to running proccess and display information for every found object, like tokens, semaphores, ports, files,.. | windows recon | |
harness | 19.ed2a6aa | Interactive remote PowerShell Payload. | backdoor windows | |
harpoon | 383.8021994 | CLI tool for open source and threat intelligence. | automation recon | |
hasere | 1.0 | Discover the vhosts using google and bing. | recon scanner | |
hash-buster | 49.0d6ebb4 | A python script which scraps online hash crackers to find cleartext of a hash. | crypto | |
hash-extender | 157.1f29520 | A hash length extension attack tool. | crypto | |
hash-identifier | 6.0e08a97 | Software to identify the different types of hashes used to encrypt data and especially passwords. | crypto | |
hashcat | 1:6.2.6 | Multithreaded advanced password recovery utility | cracker | |
hashcat-utils | 1.9 | Utilites for Hashcat | cracker | |
hashcatch | 52.8145660 | Hashcatch deauthenticates clients connected to all nearby WiFi networks and tries to capture the handshakes. It can be used in any linux device including Raspberry Pi and Nethunter devices so that you can capture handshakes while walking your dog. | wireless cracker | |
hashcheck | 2.72b0c6e | Search for leaked passwords while maintaining a high level of privacy using the k-anonymity method. | crypto social recon | |
hashdb | 1089.1da1b9f | A block hash toolkit. | crypto forensic misc | |
hashdeep | 4.4 | Advanced checksum hashing tool. | forensic | |
hasher | 48.40173c5 | A tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. | cracker crypto | |
hashfind | 8.e9a9a14 | A tool to search files for matching password hash types and other interesting data. | crypto | |
hashid | 1:397.7e8473a | Software to identify the different types of hashes used to encrypt data. | crypto | |
hashpump | 49.314268e | A tool to exploit the hash length extension attack in various hashing algorithms. | crypto cracker | |
hashrat | 1.15 | Hashing tool supporting MD5, SHA1, SHA256, SHA512, Whirlpool, JH and their HMAC. | crypto | |
hashtag | 0.41 | A python script written to parse and identify password hashes. | cracker | |
hatcloud | 33.3012ad6 | Bypass CloudFlare with Ruby. | recon | |
hate-crack | 206.1e5b5ca | A tool for automating cracking methodologies through Hashcat. | automation cracker | |
haystack | 1823.c178b5a | A Python framework for finding C structures from process memory - heap analysis - Memory structures forensics. | binary forensic | |
hbad | 1.0 | This tool allows you to test clients on the heartbleed bug. | scanner | |
hcraft | 1.0.0 | HTTP Vuln Request Crafter | exploitation | |
hcxdumptool | 6.3.4 | Small tool to capture packets from wlan devices | wireless sniffer | |
hcxkeys | 6.2.1 | Set of tools to generate plainmasterkeys (rainbowtables) and hashes for hashcat and John the Ripper | crypto | |
hcxtools | 6.3.4 | Small set of tools to capture and convert packets from wlan devices for the use with hashcat. | wireless | |
hdcp-genkey | 18.e8d342d | Generate HDCP source and sink keys from the leaked master key. | crypto cracker | |
hdmi-sniff | 5.f7fbc0e | HDMI DDC (I2C) inspection tool. It is designed to demonstrate just how easy it is to recover HDCP crypto keys from HDMI devices. | hardware sniffer cracker | |
heaptrace | 2.2.8.2.r20.g06f43fc | Helps visualize heap operations for pwn and debugging. | debugger | |
heartbleed-honeypot | 0.1 | Script that listens on TCP port 443 and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford's | honeypot | |
heartleech | 116.3ab1d60 | Scans for systems vulnerable to the heartbleed bug, and then download them. | exploitation scanner | |
hekatomb | 107.bdd53cf | Extract and decrypt all credentials from all domain computers using DPAPI. | windows exploitation | |
hellraiser | 279.bea43e2 | Vulnerability Scanner. | scanner recon | |
hemingway | 8.9c70a13 | A simple and easy to use spear phishing helper. | social | |
hercules-payload | 222.2607a3a | A special payload generator that can bypass all antivirus software. | binary windows backdoor | |
hetty | 134.f60202e | HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community. | webapp proxy | |
hex2bin | 2.5 | Converts Motorola and Intel hex files to binary. | binary | |
hexinject | 1.6 | A very versatile packet injector and sniffer that provides a command-line framework for raw network access. | sniffer | |
hexorbase | 2:6 | A database application designed for administering and auditing multiple database servers simultaneously from a centralized location. It is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL). | fuzzer scanner | |
hexyl | 0.14.0 | A command-line hex viewer. | misc | |
hharp | 1beta | This tool can perform man-in-the-middle and switch flooding attacks. It has 4 major functions, 3 of which attempt to man-in-the-middle one or more computers on a network with a passive method or flood type method. | networking spoof | |
hidattack | 0.1 | HID Attack (attacking HID host implementations) | bluetooth | |
hiddeneye | 1228.7a3deaf | Modern phishing tool with advanced functionality. | social | |
hiddeneye-legacy | RC1.r226.g7a3deaf | Modern Phishing Tool With Advanced Functionality. | social | |
hikpwn | 8.5a7d69c | A simple scanner for Hikvision devices with basic vulnerability scanning capabilities written in Python 3.8. | scanner | |
hlextend | 17.be21920 | Pure Python hash length extension module. | crypto | |
hodor | 1.01be107 | A general-use fuzzer that can be configured to use known-good input and delimiters in order to fuzz specific locations. | fuzzer | |
holehe | 434.14da70f | A tool for Efficiently finding registered accounts from emails. | social recon | |
hollows-hunter | 0.3.9 | Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches). | windows malware binary | |
homepwn | 31.0803981 | Swiss Army Knife for Pentesting of IoT Devices. | scanner recon fuzzer exploitation | |
honeycreds | 26.eaeb401 | Network credential injection to detect responder and other network poisoners. | defensive | |
honeyd | 337.a0f3d64 | A small daemon that creates virtual hosts on a network. | honeypot | |
honeypy | 600.6ca3d6e | A low interaction Honeypot. | honeypot defensensive | |
honggfuzz | 4109.b4f72b42 | A general-purpose fuzzer with simple, command-line interface. | fuzzer hardware | |
honssh | 204.821ce87 | A high-interaction Honey Pot solution designed to log all SSH communications between a client and server. | honeypot | |
hookanalyser | 3.4 | A hook tool which can be potentially helpful in reversing applications and analyzing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer. | windows reversing | |
hookshot | 205.df30b85 | Integrated web scraper and email account data breach comparison tool. | webapp scanner recon social | |
hoover | 4.9bda860 | Wireless Probe Requests Sniffer. | wireless sniffer | |
hoper | 15.8d5dbd9 | Trace URL's jumps across the rel links to obtain the last URL. | recon | |
hopper | 5.17.1 | Reverse engineering tool that lets you disassemble, decompile and debug your applications. | reversing disassembler decompiler binary | |
hoppy | 1.8.1 | A python script which tests http methods for configuration issues leaking information or just to see if they are enabled. | scanner recon | |
horusec | v2.9.0.beta.2.r1.g873d4104 | Static code analysis to identify security flaws for many languages. | code-audit | |
host-extract | 1:8.0134ad7 | Ruby script tries to extract all IP/Host patterns in page response of a given URL and JavaScript/CSS files of that URL. | scanner webapp | |
hostapd-wpe | 2.9.1 | IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator - Wireless Pwnage Edition. | wireless | |
hostbox-ssh | 0.1.1 | A ssh password/account scanner. | cracker scanner | |
hosthunter | 158.553f1c7 | A recon tool for discovering hostnames using OSINT techniques. | recon | |
hotpatch | 90.fd2baf1 | Hot patches executables on Linux using .so file injection. | backdoor | |
hotspotter | 0.4 | Hotspotter passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names. | wireless | |
howmanypeoplearearound | 123.b05e06a | Count the number of people around you by monitoring wifi signals. | recon wireless | |
hpfeeds | 414.34bf4d4 | Honeynet Project generic authenticated datafeed protocol. | honeypot networking | |
hping | 3.0.0 | A command-line oriented TCP/IP packet assembler/analyzer. | networking | |
hqlmap | 38.bb6ab46 | A tool to exploit HQL Injections. | exploitation | |
hsecscan | 66.7b8fa71 | A security scanner for HTTP response headers. | scanner | |
htcap | 1:155.a59c592 | A web application analysis tool for detecting communications between javascript and the server. | webapp scanner | |
htexploit | 0.77 | A Python script that exploits a weakness in the way that .htaccess files can be configured to protect a web directory with an authentication process | exploitation | |
htpwdscan | 23.e995d6f | A python HTTP weak pass scanner. | cracker | |
htrosbif | 134.9dc3f86 | Active HTTP server fingerprinting and recon tool. | fingerprint recon | |
htshells | 2:89.3216523 | Self contained web shells and other attacks via .htaccess files. | exploitation | |
http-enum | 0.4 | A tool to enumerate the enabled HTTP methods supported on a webserver. | scanner | |
http-fuzz | 1:0.1 | A simple http fuzzer. | fuzzer | |
http-put | 1.0 | Simple http put perl script. | misc | |
http-traceroute | 0.5 | This is a python script that uses the Max-Forwards header in HTTP and SIP to perform a traceroute-like scanning functionality. | networking recon | |
http2smugl | 36.78abc09 | Http2Smugl - Tool to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -больше HTTP/1.1 conversion. | webapp scanner exploitation | |
httpbog | 1.0.0.0 | A slow HTTP denial-of-service tool that works similarly to other attacks, but rather than leveraging request headers or POST data Bog consumes sockets by slowly reading responses. | windows dos | |
httpforge | 11.02.01 | A set of shell tools that let you manipulate, send, receive, and analyze HTTP messages. These tools can be used to test, discover, and assert the security of Web servers, apps, and sites. An accompanying Python library is available for extensions. | webapp scanner fuzzer recon | |
httpgrep | 2.4 | A python tool which scans for HTTP servers and finds given strings in URIs. | webapp scanner | |
httping | 3.6 | A ping-like tool for http-requests | networking recon | |
httppwnly | 47.528a664 | "Repeater" style XSS post-exploitation tool for mass browser control. | webapp | |
httprecon | 7.3 | Tool for web server fingerprinting, also known as http fingerprinting. | windows fingerprint | |
httprint | 301 | A web server fingerprinting tool. | fingerprint | |
httprint-win32 | 301 | A web server fingerprinting tool (Windows binaries). | windows fingerprint | |
httprobe | 22.5555984 | Take a list of domains and probe for working HTTP and HTTPS servers | scanner | |
httpry | 0.1.8 | A specialized packet sniffer designed for displaying and logging HTTP traffic. | sniffer | |
httpscreenshot | 69.0ef8f8f | A tool for grabbing screenshots and HTML of large numbers of websites. | misc | |
httpsniff | 0.4 | Tool to sniff HTTP responses from TCP/IP based networks and save contained files locally for later review. | sniffer | |
httpsscanner | 1.2 | A tool to test the strength of a SSL web server. | scanner crypto | |
httptunnel | 3.3 | Creates a bidirectional virtual data connection tunnelled in HTTP requests | tunnel | |
httpx | 2151.d58ad9d | A fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library. | webapp scanner | |
httrack | 3.49.5 | An easy-to-use offline browser utility | misc | |
hubbit-sniffer | 74.460ecf8 | Simple application that listens for WIFI-frames and records the mac-address of the sender and posts them to a REST-api. | sniffer wireless | |
hulk | 27.ed2b11c | A webserver DoS tool (Http Unbearable Load King) ported to Go with some additional features. | dos | |
hungry-interceptor | 391.1aea7f3 | Intercepts data, does something with it, stores it. | sniffer | |
hurl | 20.afca9c5 | Hexadecimal & URL (en/de)coder. | misc | |
hurl-encoder | 20.afca9c5 | Hexadecimal & URL (en/de)coder. | misc | |
hwk | 0.4 | Collection of packet crafting and wireless network flooding tools | dos fuzzer scanner wireless | |
hxd | 2.5.0.0 | Freeware Hex Editor and Disk Editor. | misc windows | |
hyde | 11.ec09462 | Just another tool in C to do DDoS (with spoofing). | networking dos | |
hydra | 9.5 | Very fast network logon cracker which support many different services | cracker | |
hyenae | 0.36_1 | flexible platform independent packet generator | networking | |
hyperfox | 121.1a8c26f | A security tool for proxying and recording HTTP and HTTPs traffic. | networking proxy webapp | |
hyperion-crypter | 2.3.1 | A runtime encrypter for 32-bit portable executables. | windows binary crypto | |
i2pd | 2.53.1 | A full-featured C++ implementation of the I2P router | networking | |
iaito | 5.9.2 | Qt and C++ GUI for radare2 reverse engineering framework | reversing decompiler disassembler debugger | |
iaxflood | 3:0.1 | IAX flooder. | dos voip | |
iaxscan | 0.02 | A Python based scanner for detecting live IAX/2 hosts and then enumerating (by bruteforce) users on those hosts. | scanner cracker | |
ibrute | 12.3a6a11e | An AppleID password bruteforce tool. It uses Find My Iphone service API, where bruteforce protection was not implemented. | cracker mobile | |
icloudbrutter | 15.1f64f19 | Tool for AppleID Bruteforce. | cracker | |
icmpquery | 1.0 | Send and receive ICMP queries for address mask and current time. | scanner | |
icmpsh | 12.82caf34 | Simple reverse ICMP shell. | backdoor networking | |
icmptx | 17.52df90f | IP over ICMP tunnel. | tunnel networking | |
id-entify | 34.dd064a5 | Search for information related to a domain: Emails - IP addresses - Domains - Information on WEB technology - Type of Firewall - NS and MX records. | recon | |
ida-free | 8.4 | Freeware version of the world's smartest and most feature-full disassembler. | reversing disassembler decompiler binary | |
idb | 2.10.3 | A tool to simplify some common tasks for iOS pentesting and research. | mobile | |
identywaf | 207.ae7e44a | Blind WAF identification tool. | webapp fingerprint | |
idswakeup | 1.0 | A collection of tools that allows to test network intrusion detection systems. | recon networking scanner | |
ifchk | 1.1.2 | A network interface promiscuous mode detection tool. | defensive networking | |
ifuzz | 1.0 | A binary file fuzzer with several options. | fuzzer | |
iheartxor | 0.01 | A tool for bruteforcing encoded strings within a boundary defined by a regular expression. It will bruteforce the key value range of 0x1 through 0x255. | cracker | |
iis-shortname-scanner | 5.4ad4937 | An IIS shortname Scanner. | scanner | |
iisbruteforcer | 15 | HTTP authentication cracker. It's a tool that launchs an online dictionary attack to test for weak or simple passwords against protected areas on an IIS Web server. | cracker | |
ike-scan | 1.9.5 | A tool that uses IKE protocol to discover, fingerprint and test IPSec VPN servers | scanner | |
ikecrack | 1.00 | An IKE/IPSec crack tool designed to perform Pre-Shared-Key analysis of RFC compliant aggressive mode authentication | cracker | |
ikeforce | 30.575af15 | A command line IPSEC VPN brute forcing tool for Linux that allows group name/ID enumeration and XAUTH brute forcing capabilities. | cracker | |
ikeprobe | 2:0.1 | Determine vulnerabilities in the PSK implementation of the VPN server. | windows scanner cracker | |
ikeprober | 1.12 | Tool crafting IKE initiator packets and allowing many options to be manually set. Useful to find overflows, error conditions and identifiyng vendors | fuzzer | |
ilo4-toolbox | 47.672a5d6 | Toolbox for HPE iLO4 analysis. | scanner automation backdoor | |
ilty | 1.0 | An interception phone system for VoIP network. | voip | |
imagegrep | 8.1f14af2 | Grep word in pdf or image based on OCR. | misc | |
imagejs | 56.a442f94 | Small tool to package javascript into a valid image file. | binary webapp | |
imagemounter | 413.383b30b | Command line utility and Python package to ease the (un)mounting of forensic disk images. | forensic misc | |
imhex | 1.35.0.r139.g871a0d535 | A Hex Editor for Reverse Engineers, Programmers and people that value their eye sight when working at 3 AM. | misc | |
impacket | 0.9.24 | Impacket is a collection of Python classes for working with network protocols. | networking | |
impacket-ba | 0.11.0 | Collection of classes for working with network protocols. | exploitation networking | |
impulse | 77.6939ea2 | Modern Denial-of-service ToolKit. | dos spoof | |
inception | 454.4df3231 | A FireWire physical memory manipulation and hacking tool exploiting IEEE 1394 SBP-2 DMA. | exploitation hardware | |
indx2csv | 17.129a411e | An advanced parser for INDX records. | forensic windows | |
indxcarver | 5.dee36608 | Carve INDX records from a chunk of data. | forensic windows | |
indxparse | 198.a977192 | A Tool suite for inspecting NTFS artifacts. | forensic | |
inetsim | 1.3.2 | A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples. | defensive honeypot | |
infection-monkey | v2.2.0.r3559.g2b5a9390c | Automated security testing tool for networks. | networking automation | |
infip | 0.1 | A python script that checks output from netstat against RBLs from Spamhaus. | scanner misc | |
infoga | 3:33.79a1c03 | Tool for gathering e-mail accounts information from different public sources (search engines, pgp key servers). | recon | |
inguma | 0.1.1 | A free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler. | cracker disassembler exploitation fuzzer scanner | |
injectus | 12.3c01fa0 | Simple python tool that goes through a list of URLs trying CRLF and open redirect payloads. | webapp scanner fuzzer | |
innounp | 0.50 | Inno Setup Unpacker. | reversing | |
inquisitor | 1:28.12a9ec1 | OSINT Gathering Tool for Companies and Organizations. | recon social | |
insanity | 117.cf51ff3 | Generate Payloads and Control Remote Machines . | exploitation | |
instagramosint | 21.30b5735 | An Instagram Open Source Intelligence Tool. | social recon | |
instashell | 56.49b6b4f | Multi-threaded Instagram Brute Forcer without password limit. | cracker | |
intelmq | 3.3.1.r0.gceb678cce | A tool for collecting and processing security feeds using a message queuing protocol. | misc | |
intelplot | 12.4dd9fc0 | OSINT Tool to Mark Points on Offline Map. | recon | |
intensio-obfuscator | 280.f66a22b | Obfuscate a python code 2 and 3. | misc | |
interactsh-client | v1.2.0.r1.ge6663b7 | Open-Source Solution for Out of band Data Extraction. | webapp | |
intercepter-ng | 1.0 | A next generation sniffer including a lot of features: capturing passwords/hashes, sniffing chat messages, performing man-in-the-middle attacks, etc. | windows wireless sniffer networking cracker | |
interlace | 354.79b8949 | Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support. | networking | |
interrogate | 5.eb5f071 | A proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage. | forensic cracker | |
intersect | 2.5 | Post-exploitation framework | automation | |
intrace | 1.5 | Traceroute-like application piggybacking on existing TCP connections | recon | |
inundator | 0.5 | An ids evasion tool, used to anonymously inundate intrusion detection logs with false positives in order to obfuscate a real attack. | spoof misc | |
inurlbr | 34.dbf9773 | Advanced search in the search engines - Inurl scanner, dorker, exploiter. | scanner webapp automation | |
inviteflood | 2.0 | Flood a device with INVITE requests | dos | |
invoke-cradlecrafter | 19.3ff8bac | PowerShell Remote Download Cradle Generator & Obfuscator. | automation | |
invoke-dosfuscation | 7.6260f5b | Cmd.exe Command Obfuscation Generator & Detection Test Harness. | automation | |
invoke-obfuscation | 45.f20e7f8 | PowerShell Obfuscator. | automation | |
inzider | 1.2 | This is a tool that lists processes in your Windows system and the ports each one listen on. | windows recon | |
iodine | 0.8.0 | Tunnel IPv4 data through a DNS server | tunnel | |
iosforensic | 1.0 | iOS forensic tool https://www.owasp.org/index.php/Projects/OWASP_iOSForensic | forensic mobile | |
ip-https-tools | 7.170691f | Tools for the IP over HTTPS (IP-HTTPS) Tunneling Protocol. | tunnel networking | |
ip-tracer | 91.8e2e3dd | Track and retrieve any ip address information. | recon | |
ip2clue | 0.0.95 | A small memory/CPU footprint daemon to lookup country (and other info) based on IP (v4 and v6). | recon | |
ipaudit | 1.1 | Monitors network activity on a network. | networking | |
ipba2 | 1:95.c03bd85 | IOS Backup Analyzer | forensic | |
ipcountry | 1.2 | misc | ||
ipdecap | 96.45d2a7d | Can decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, and can also remove IEEE 802.1Q (virtual lan) header. | networking | |
iphoneanalyzer | 2.1.0 | Allows you to forensically examine or recover date from in iOS device. | forensic mobile | |
ipmipwn | 6.74a08a8 | IPMI cipher 0 attack tool. | cracker automation | |
ipmitool | 1.8.19 | Command-line interface to IPMI-enabled devices | networking | |
ipobfuscator | 27.f005262 | A simple tool to convert the IP to a DWORD IP. | misc | |
ipscan | 3.9.1 | Angry IP scanner is a very fast IP address and port scanner. | scanner | |
ipsourcebypass | 1.2.r15.g7befb82 | This Python script can be used to bypass IP source restrictions using HTTP headers. | webapp | |
iptodomain | 18.f1afcd7 | This tool extract domains from IP address based in the information saved in virustotal. | recon | |
iptv | 138.ae6457b | Search and brute force illegal iptv server. | scanner cracker | |
iputils | 20240905 | Network monitoring tools, including ping | networking | |
ipv4bypass | 24.f54072b | Using IPv6 to Bypass Security. | networking | |
ipv666 | 182.ad45ae8 | Golang IPv6 address enumeration. ipv666 is a set of tools that enables the discovery of IPv6 addresses both in the global IPv6 address space and in more narrow IPv6 network ranges. These tools are designed to work out of the box with minimal knowledge of their workings. | recon networking | |
ipv6toolkit | 819.367bbe6 | SI6 Networks' IPv6 Toolkit | scanner | |
ipython-genutils | 0.2.0 | Vestigial utilities from IPython. | (blackarch | |
ircsnapshot | 94.cb02a85 | Tool to gather information from IRC servers. | recon scanner | |
irpas | 0.10 | Internetwork Routing Protocol Attack Suite. | exploitation | |
isf | 68.5228865 | Industrial Exploitation Framework is an exploitation framework based on Python. | exploitation | |
isip | 2.fad1f10 | Interactive sip toolkit for packet manipulations, sniffing, man in the middle attacks, fuzzing, simulating of dos attacks. | voip networking fuzzer dos | |
isme | 0.12 | Scans a VOIP environment, adapts to enterprise VOIP, and exploits the possibilities of being connected directly to an IP Phone VLAN. | voip recon scanner | |
isr-form | 1.0 | Simple html parsing tool that extracts all form related information and generates reports of the data. Allows for quick analyzing of data. | recon webapp | |
issniff | 294.79c6c2a | Internet Session Sniffer. | sniffer | |
ivre | 0.9.20.dev262 | Network recon framework. | recon networking | |
ivre-docs | 0.9.20.dev262 | Network recon framework (documentation) | recon networking | |
ivre-web | 0.9.20.dev262 | Network recon framework (web application) | recon networking | |
ja3 | 117.cb29184 | Standard for creating SSL client fingerprints in an easy to produce and shareable way. | crypto cryptography misc | |
jaadas | 0.1 | Joint Advanced Defect assEsment for android applications. | scanner | |
jackdaw | 416.1c3a4c2 | Collect all information in your domain, show you graphs on how domain objects interact with each-other and how to exploit these interactions | recon windows | |
jad | 1.5.8e | Java decompiler | reversing | |
jadx | 1.5.0 | Command line and GUI tools to produce Java source code from Android Dex and APK files | decompiler reversing | |
jaeles | 233.243e0b6 | The Swiss Army knife for automated Web Application Testing. | webapp scanner | |
jaidam | 18.15e0fec | Penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or joomla platform was used and finally check them automatically, for web vulnerabilities using two well-known open source tools, WPScan and Joomscan. | webapp automation exploitation | |
jast | 17.361ecde | Just Another Screenshot Tool. | webapp recon misc | |
javasnoop | 1.1 | A tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer | reversing | |
jboss-autopwn | 1.3bc2d29 | A JBoss script for obtaining remote shell access. | exploitation webapp automation | |
jbrofuzz | 2.5 | Web application protocol fuzzer that emerged from the needs of penetration testing. | fuzzer | |
jbrute | 1:0.99 | Open Source Security tool to audit hashed passwords. | cracker | |
jcrack | 0.3.6 | A utility to create dictionary files that will crack the default passwords of select wireless gateways | wireless | |
jd-cli | 1.2.0 | Command line Java Decompiler. | decompiler reversing | |
jd-gui | 1.6.6 | A standalone graphical utility that displays Java source codes of .class files. | decompiler reversing | |
jdeserialize | 31.20635ba | A library that interprets Java serialized objects. It also comes with a command-line tool that can generate compilable class declarations, extract block data, and print textual representations of instance values. | webapp reversing | |
jeangrey | 43.9bf3cf4 | A tool to perform differential fault analysis attacks (DFA). | cracker crypto | |
jeb-android | 3.7.0.201909272058 | Android decompiler. | reversing mobile | |
jeb-arm | 3.7.0.201909272058 | Arm decompiler. | reversing | |
jeb-intel | 1:3.7.0.201909272058 | Intel decompiler. | reversing | |
jeb-mips | 1:3.7.0.201909272058 | Mips decompiler. | reversing | |
jeb-webasm | 3.7.0.201909272058 | WebAssembly decompiler. | reversing | |
jeopardize | 5.34f1d07 | A low(zero) cost threat intelligence & response tool against phishing domains. | defensive social | |
jexboss | 86.338b531 | Jboss verify and Exploitation Tool. | webapp exploitation | |
jhead | 3.08 | EXIF JPEG info parser and thumbnail remover | defensive | |
jira-scan | 7.447d0ec | A simple remote scanner for Atlassian Jira | webapp scanner | |
jndi-injection-exploit | 10.2dc4018 | A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability, like Jackson, Fastjson, etc. | exploitation | |
jnetmap | 0.5.5 | jNetMap helps you to keep an eye on your network. You can draw a graphical representation of your network, and jNetMap will periodically check if the devices are still up or a service is still running. You can also set up E-mail notifications or let jNetMap execute a script when a device goes down or comes up again. Additionally, you may attach notes to a device, initiate an RDP/VNC/SSH connection to a device and much more. | networking | |
john | 1.9.0.jumbo1 | John the Ripper password cracker | cracker | |
johnny | 20120424 | GUI for John the Ripper. | cracker | |
jok3r | 447.0761996 | Network and Web Pentest Framework. | webapp scanner fuzzer networking | |
jomplug | 0.1 | This php script fingerprints a given Joomla system and then uses Packet Storm's archive to check for bugs related to the installed components. | webapp fingerprint | |
jondo | 00.20.001 | Redirects internet traffic trough a mix of proxy servers to hide the origin of the requests. | proxy networking | |
jooforce | 11.43c21ad | A Joomla password brute force tester. | webapp cracker | |
joomlascan | 1.2 | Joomla scanner scans for known vulnerable remote file inclusion paths and files. | webapp scanner | |
joomlavs | 254.eea7500 | A black box, Ruby powered, Joomla vulnerability scanner. | webapp scanner fuzzer | |
joomscan | 1:83.2ea8cc7 | Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site. | webapp | |
jpegdump | 0.0.7 | Tool to analyzse JPEG images Reads binary files and parses the JPEG markers inside them. | binary forensic | |
jpexs-decompiler | 15.1.0 | JPEXS Free Flash Decompiler. | decompiler | |
jsearch | 44.87cf9c1 | Simple script that grep infos from javascript files. | recon webapp | |
jsfuck | 233.fd96902 | Write any JavaScript with 6 Characters: []()!+. | misc | |
jshell | 7.ee3c92d | Get a JavaScript shell with XSS. | webapp | |
jsonbee | 30.c0c87fc | A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP). | webapp | |
jsparser | 31.ccd3ab6 | A python 2.7 script using Tornado and JSBeautifier to parse relative URLs from JavaScript files. Useful for easily discovering AJAX requests. | webapp reversing | |
jsql | 0.81 | A lightweight application used to find database information from a distant server. | scanner | |
jsql-injection | 0.101 | A Java application for automatic SQL database injection. | webapp exploitation fuzzer | |
jstillery | 65.512e9af | Advanced JavaScript Deobfuscation via Partial Evaluation. | webapp | |
juicy-potato | 53.744d321 | A sugared version of RottenPotatoNG, with a bit of juice. | windows | |
junkie | 1365.70a83d6 | A modular packet sniffer and analyzer. | sniffer networking | |
justdecompile | 22018 | The decompilation engine of JustDecompile. | windows decompiler binary reversing | |
juumla | 106.130565e | Python tool created to identify Joomla version, scan for vulnerabilities and search for config files. | webapp scanner recon fingerprint | |
jwscan | 7.874b3a5 | Scanner for Jar to EXE wrapper like Launch4j, Exe4j, JSmooth, Jar2Exe. | reversing binary | |
jwt-cracker | 23.8130879 | JWT brute force cracker written in C. | cracker | |
jwt-hack | v1.2.0.r0.g32e486b | A tool for hacking / security testing to JWT. | webapp cracker | |
jwt-key-recovery | 11.094df95 | Recovers the public key used to sign JWT tokens. | crypto | |
jwt-tool | 73.e4f380f | Toolkit for validating, forging and cracking JWTs (JSON Web Tokens). | cracker | |
jwtcat | 77.f80f3d9 | Script performs offline brute-force attacks against JSON Web Token (JWT) | cracker | |
jynx2 | 2.0 | An expansion of the original Jynx LD_PRELOAD rootkit | backdoor | |
k55 | 86.b3c4aa9 | Linux x86_64 Process Injection Utility. | backdoor exploitation | |
kacak | 1.0 | Tools for penetration testers that can enumerate which users logged on windows system. | recon | |
kadimus | 183.ac5f438 | LFI Scan & Exploit Tool. | webapp exploitation scanner | |
kalibrate-rtl | 69.340003e | Fork of http://thre.at/kalibrate/ for use with rtl-sdr devices. | mobile scanner | |
kamerka | 1:40.be17620 | Build interactive map of cameras from Shodan. | recon | |
katana | 1.0.0.1 | A framework that seeks to unite general auditing tools, which are general pentesting tools (Network,Web,Desktop and others). | exploitation dos cracker scanner recon | |
katana-framework | 1.0.0.1 | A framework that seekss to unite general auditing tools, which are general pentesting tools (Network,Web,Desktop and others). | exploitation dos cracker scanner recon | |
katana-pd | v1.1.0.r2.g9ba3bb8 | Crawling and spidering framework. | webapp scanner | |
katsnoop | 0.1 | Utility that sniffs HTTP Basic Authentication information and prints the base64 decoded form. | sniffer | |
kautilya | 52.1c9d5b0 | Pwnage with Human Interface Devices using Teensy++2.0 and Teensy 3.0 devices. | hardware | |
kcptun | 20240107 | A Secure Tunnel Based On KCP with N:M Multiplexing | tunnel | |
keimpx | 3:300.37190f4 | Tool to verify the usefulness of credentials across a network over SMB. | cracker | |
kekeo | 2.2.0_20211214 | A little toolbox to play with Microsoft Kerberos in C. | windows cracker | |
kerbcrack | 1.3d3 | Kerberos sniffer and cracker for Windows. | windows sniffer cracker | |
kerberoast | 1:0.2.0.r9.g82f5bb2 | Kerberoast attack -pure python-. | exploitation cracker windows | |
kerbrute | 90.9cfb81e | A tool to perform Kerberos pre-auth bruteforcing. | cracker | |
kernelpop | 238.b3467d3 | Kernel privilege escalation enumeration and exploitation framework. | exploitation automation | |
keye | 29.d44a578 | Recon tool detecting changes of websites based on content-length differences. | recon webapp | |
kh2hc | 0.0.1.r59.g4d84651 | Convert OpenSSH known_hosts file hashed with HashKnownHosts to hashes crackable by Hashcat. | crypto misc | |
khc | 0.2 | A small tool designed to recover hashed known_hosts fields back to their plain-text equivalents. | cracker | |
kickthemout | 212.861aea2 | Kick devices off your network by performing an ARP Spoof attack. | networking | |
killcast | 30.ee81cfa | Manipulate Chromecast Devices in your Network. | exploitation automation | |
killerbee | 398.748740d | Framework and tools for exploiting ZigBee and IEEE 802.15.4 networks. | exploitation wireless | |
kimi | 28.e7cafda | Script to generate malicious debian packages (debain trojans). | backdoor | |
kippo | 287.b9eb06a | A medium interaction SSH honeypot designed to log brute force attacks and most importantly, the entire shell interaction by the attacker. | honeypot | |
kismet | 2023_07_R1 | 802.11 layer2 wireless network detector, sniffer, and intrusion detection system | wireless sniffer | |
kismet-earth | 1:0.1 | Various scripts to convert kismet logs to kml file to be used in Google Earth. | wireless | |
kismet2earth | 1.0 | A set of utilities that convert from Kismet logs to Google Earth .kml format | wireless | |
kismon | 1.0.3 | GUI client for kismet (wireless scanner/sniffer/monitor). | wireless | |
kiterunner | 19.7d5824c | Contextual Content Discovery Tool. | webapp scanner recon | |
kitty | 321.f19e811 | Fuzzing framework written in python. | fuzzer | |
kitty-framework | 352.cb07609 | Fuzzing framework written in python. | fuzzer | |
klar | 2.4.0 | Integration of Clair and Docker Registry. | exploitation misc | |
klee | 2.1 | A symbolic virtual machine built on top of the LLVM compiler infrastructure. | binary reversing debugger | |
klogger | 1.0 | A keystroke logger for the NT-series of Windows. | windows keylogger | |
knock | 2:96.0c6ea4f | Subdomain scanner. | scanner recon | |
knxmap | 252.6f40dd1 | KNXnet/IP scanning and auditing tool for KNX home automation installations. | scanner | |
koadic | 1:637.ac46c44 | A Windows post-exploitation rootkit similar to other penetration testing tools such as Meterpreter and Powershell Empire. | exploitation automation | |
kolkata | 3.0 | A web application fingerprinting engine written in Perl that combines cryptography with IDS evasion. | webapp fingerprint | |
konan | 23.7b5ac80 | Advanced Web Application Dir Scanner. | webapp scanner | |
kraken | 32.368a837 | A project to encrypt A5/1 GSM signaling using a Time/Memory Tradeoff Attack. | crypto mobile hardware | |
krbjack | 1.2.0 | DNS dynamic update abuse in ADIDNS and MitM attack using Kerberos AP-REQ hijacking. | networking exploitation | |
krbrelayx | 49.4eb9c4f | Kerberos unconstrained delegation abuse toolkit. | scanner fuzzer spoof networking | |
kube-hunter | 703.bc47f08 | Hunt for security weaknesses in Kubernetes clusters. | scanner | |
kubesploit | 86.2de2f12 | Cross-platform post-exploitation HTTP/2 Command & Control server. | scanner exploitation | |
kubestriker | 39.e1776ea | A Blazing fast Security Auditing tool for Kubernetes. | scanner | |
kubolt | 28.0027239 | Utility for scanning public kubernetes clusters. | webapp scanner | |
kwetza | 26.0e50272 | Python script to inject existing Android applications with a Meterpreter payload. | backdoor exploitation | |
l0l | 322.1319ea7 | The Exploit Development Kit. | exploitation | |
laf | 12.7a456b3 | Login Area Finder: scans host/s for login panels. | scanner webapp | |
lanmap2 | 1:127.1197999 | Passive network mapping tool. | recon | |
lans | 1:148.9f8ef2d | A Multithreaded asynchronous packet parsing/injecting arp spoofer. | spoof networking | |
latd | 1.31 | A LAT terminal daemon for Linux and BSD. | networking misc | |
laudanum | 1.0 | A collection of injectable files, designed to be used in a pentest when SQL injection flaws are found and are in multiple languages for different environments. | misc webapp | |
lazagne | 872.3ed06c7 | An open source application used to retrieve lots of passwords stored on a local computer. | forensic social | |
lazydroid | 25.0f559ec | Tool written as a bash script to facilitate some aspects of an Android Assessment | mobile automation binary | |
lbd | 20130719 | Load Balancing detector | recon | |
lbmap | 147.2d15ace | Proof of concept scripts for advanced web application fingerprinting, presented at OWASP AppSecAsia 2012. | fingerprint webapp | |
ld-shatner | 4.5c215c4 | ld-linux code injector. | backdoor binary | |
ldap-brute | 21.acc06e3 | A semi fast tool to bruteforce values of LDAP injections over HTTP. | cracker | |
ldapdomaindump | 0.9.4 | Active Directory information dumper via LDAP. | scanner networking | |
ldapenum | 1:0.1 | Enumerate domain controllers using LDAP. | recon scanner | |
ldapscripts | 2.0.8 | Simple shell scripts to handle POSIX entries in an LDAP directory. | automation misc | |
ldeep | 1:1.0.54.r0.g72dbd0d | In-depth ldap enumeration utility. | recon | |
ldsview | 47.d8bfcaa | Offline search tool for LDAP directory dumps in LDIF format. | forensic | |
leaklooker | 5.0d2b9fc | Find open databases with Shodan. | scanner | |
leena | 2.5119f56 | Symbolic execution engine for JavaScript | binary code-audit | |
legion | 61.ca99853 | Automatic Enumeration Tool based in Open Source tools. | recon automation | |
leo | 34807.2aaae6eb4 | Literate programmer's editor, outliner, and project manager. | misc | |
leroy-jenkins | 3.bdc3965 | A python tool that will allow remote execution of commands on a Jenkins server and its nodes. | exploitation | |
lethalhta | 2.5602402 | Lateral Movement technique using DCOM and HTA. | windows exploitation | |
letmefuckit-scanner | 3.f3be22b | Scanner and Exploit Magento. | scanner webapp | |
leviathan | 35.a1a1d8c | A mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities. | scanner cracker webapp fuzzer exploitation | |
levye | 1:84.5406303 | A brute force tool which is support sshkey, vnckey, rdp, openvpn. | cracker | |
lfi-autopwn | 3.0 | A Perl script to try to gain code execution on a remote server via LFI | exploitation fuzzer | |
lfi-exploiter | 1.1 | This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability. | webapp exploitation | |
lfi-fuzzploit | 1.1 | A simple tool to help in the fuzzing for, finding, and exploiting of local file inclusion vulnerabilities in Linux-based PHP applications. | webapp fuzzer exploitation | |
lfi-image-helper | 0.8 | A simple script to infect images with PHP Backdoors for local file inclusion attacks. | webapp backdoor | |
lfi-scanner | 4.0 | This is a simple perl script that enumerates local file inclusion attempts when given a specific target. | scanner fuzzer webapp | |
lfi-sploiter | 1.0 | This tool helps you exploit LFI (Local File Inclusion) vulnerabilities. Post discovery, simply pass the affected URL and vulnerable parameter to this tool. You can also use this tool to scan a URL for LFI vulnerabilities. | webapp fuzzer exploitation | |
lfifreak | 21.0c6adef | A unique automated LFi Exploiter with Bind/Reverse Shells. | webapp exploitation | |
lfimap | 1:278.df8b226 | This script is used to take the highest beneficts of the local file include vulnerability in a webserver. | webapp fuzzer | |
lfisuite | 85.470e01f | Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner. | scanner webapp exploitation | |
lfle | 24.f28592c | Recover event log entries from an image by heurisitically looking for record structures. | forensic | |
lft | 1:3.91 | A layer four traceroute implementing numerous other features. | recon networking | |
lhf | 40.51568ee | A modular recon tool for pentesting. | recon | |
libbde | 1:334.59aa40b | A library to access the BitLocker Drive Encryption (BDE) format. | crypto | |
libc-database | 45.69815cd | Database of libc offsets to simplify exploitation. | reversing exploitation | |
libdisasm | 0.23 | A disassembler library. | disassembler | |
libfvde | 207.03f12f5 | Library and tools to access FileVault Drive Encryption (FVDE) encrypted volumes. | forensic | |
libosmocore | 1:4248.2d10ff20 | Collection of common code used in various sub-projects inside the Osmocom family of projects. | radio | |
libparistraceroute | 378.6fb8f48 | A library written in C dedicated to active network measurements with examples, such as paris-ping and paris-traceroute. | networking | |
libpst | 0.6.76 | Outlook .pst file converter | misc | |
libtins | 1305.fe22186 | High-level, multiplatform C++ network packet sniffing and crafting library. | networking | |
lief | 0.13.2 | Library to Instrument Executable Formats. | disassembler reversing | |
liffy | 1:33.89dd4f8 | A Local File Inclusion Exploitation tool. | webapp exploitation fuzzer | |
lightbulb | 88.9e8d6f3 | Python framework for auditing web applications firewalls. | webapp scanner | |
ligolo-ng | v0.7.2.alpha.r0.g4ac377a | An advanced, yet simple, tunneling tool that uses a TUN interface. | tunnel networking | |
limeaide | 305.ce3c9b7 | Remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local host. | forensic | |
limelighter | 17.d119dc7 | A tool for generating fake code signing certificates or signing real ones. | exploitation windows | |
linenum | 75.c47f9b2 | Scripted Local Linux Enumeration & Privilege Escalation Checks | scanner recon | |
linikatz | 48.d9cfdbf | Tool to attack Active Directory on UNIX. | automation scanner | |
linkedin2username | 1:144.8889f30 | OSINT Tool: Generate username lists for companies on LinkedIn. | social recon misc | |
linkfinder | 168.1debac5 | Discovers endpoint and their parameters in JavaScript files. | webapp recon | |
linset | 9.8746b1f | Evil Twin Attack Bash script - An automated WPA/WPA2 hacker. | automation wireless cracker | |
linux-exploit-suggester | 32.9db2f5a | A Perl script that tries to suggest exploits based OS version number. | recon | |
linux-exploit-suggester.sh | 171.2063aeb | Linux privilege escalation auditing tool. | recon | |
linux-inject | 100.268d4e4 | Tool for injecting a shared object into a Linux process. | backdoor binary | |
linux-smart-enumeration | 299.eb80976 | Linux enumeration tool for pentesting and CTFs with verbosity levels. | scanner | |
lisa.py | 61.2d1f81a | An Exploit Dev Swiss Army Knife. | exploitation | |
list-urls | 0.1 | Extracts links from webpage | misc webapp | |
littleblackbox | 0.1.3 | Penetration testing tool, search in a collection of thousands of private SSL keys extracted from various embedded devices. | scanner fuzzer crypto | |
littlebrother | 112.338cf82 | OSINT tool to get informations on French, Belgian and Swizerland people. | recon social | |
lldb | 18.1.8 | Next generation, high-performance debugger | debugger | |
loadlibrary | 104.c40033b | Porting Windows Dynamic Link Libraries to Linux. | binary | |
local-php-security-checker | v2.1.3.r1.g1d1fdac | A command line tool that checks your PHP application packages with known security vulnerabilities. | code-audit | |
locasploit | 117.fa48151 | Local enumeration and exploitation framework. | scanner exploitation | |
lodowep | 1.2.1 | Lodowep is a tool for analyzing password strength of accounts on a Lotus Domino webserver system. | cracker | |
log-file-parser | 60.c7a0ae7e | Parser for $LogFile on NTFS. | forensic windows | |
log4j-bypass | 33.f5c92f9 | Log4j web app tester that includes WAF bypasses. | webapp fuzzer scanner | |
log4j-scan | 88.07f7e32 | A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228. | webapp scanner fuzzer | |
logkeys | 97.98aac72 | Simple keylogger supporting also USB keyboards. | keylogger | |
logmepwn | 24.f257a8f | A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability. | scanner fuzzer | |
loic | 2.9.9.99 | An open source network stress tool for Windows. | networking windows | |
loki-scanner | 1227.0dc990b | Simple IOC and Incident Response Scanner. | forensic scanner | |
lolbas | 192.d148d27 | Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts). | windows | |
loot | 51.656fb85 | Sensitive information extraction tool. | recon | |
lorcon | 2:2020.06.06 | Generic library for injecting 802.11 frames | wireless | |
lorg | 98.aa4f1a3 | Apache Logfile Security Analyzer. | defensive | |
lorsrf | bbb.r0.g91c26ec | Find the parameters that can be used to find SSRF or Out-of-band resource load. | webapp scanner fuzzer | |
lotophagi | 0.1 | a relatively compact Perl script designed to scan remote hosts for default (or common) Lotus NSF and BOX databases. | scanner | |
lsrtunnel | 0.2 | Spoofs connections using source routed packets. | spoof | |
lte-cell-scanner | 57.5fa3df8 | LTE SDR cell scanner optimized to work with very low performance RF front ends (8bit A/D, 20dB noise figure). | scanner mobile recon | |
ltrace | 0.7.3 | Tracks runtime library calls in dynamically linked programs | binary | |
luksipc | 0.01 | A tool to convert unencrypted block devices to encrypted LUKS devices in-place. | crypto | |
lulzbuster | 1.3.2 | A very fast and smart web-dir/file enumeration tool written in C. | webapp scanner recon | |
lunar | 884.0578751 | A UNIX security auditing tool based on several security frameworks. | scanner defensive | |
luyten | 0.5.4 | An Open Source Java Decompiler Gui for Procyon. | decompiler misc | |
lynis | 3.1.1 | Security and system auditing tool to harden Unix/Linux systems | scanner | |
lyricpass | 45.fd31d07 | Tool to generate wordlists based on lyrics. | automation cracker | |
m3-gen | 7.7c656cc | Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass. This tool intended for adversary simulation and red teaming purpose. | exploitation | |
mac-robber | 1.02 | A digital investigation tool that collects data from allocated files in a mounted file system. | forensic | |
macchanger | 1.7.0 | A small utility to change your NIC's MAC address | networking misc | |
machinae | 197.9ef3e6c | A tool for collecting intelligence from public sites/feeds about various security-related pieces of data. | recon | |
maclookup | 1:0.4 | Lookup MAC addresses in the IEEE MA-L/OUI public listing. | networking | |
magescan | 1.12.9 | Scan a Magento site for information. | webapp scanner | |
magicrescue | 1.1.9 | Find and recover deleted files on block devices | forensic | |
magictree | 1.3 | A penetration tester productivity tool designed to allow easy and straightforward data consolidation, querying, external command execution and report generation | misc | |
maigret | 905.03900b0 | Collect a dossier on a person by username from a huge number of sites. | recon | |
mail-crawl | 0.1 | Tool to harvest emails from website. | recon | |
mailsend-go | 117.43afc11 | A multi-platform command line tool to send mail via SMTP protocol. | spoof misc | |
make-pdf | 0.1.7 | This tool will embed javascript inside a PDF document. | forensic | |
maketh | 0.2.0 | A packet generator that supports forging ARP, IP, TCP, UDP, ICMP and the ethernet header as well. | networking | |
malcom | 708.02e55b9 | Analyze a system's network communication using graphical representations of network traffic. | networking defensive malware | |
malheur | 0.5.4 | A tool for the automatic analyze of malware behavior. | forensic malware | |
malice | 0.3.28 | VirusTotal Wanna Be - Now with 100% more Hipster. | defensive misc | |
malicious-pdf | 44.8e6ae21 | Generate a bunch of malicious pdf files with phone-home functionality. | webapp malware | |
maligno | 2.5 | An open source penetration testing tool written in python, that serves Metasploit payloads. It generates shellcode with msfvenom and transmits it over HTTP or HTTPS. | scanner fuzzer exploitation | |
mallory | 134.47094fb | HTTP/HTTPS proxy over SSH. | proxy networking | |
malmon | 0.3 | Hosting exploit/backdoor detection daemon. It's written in python, and uses inotify (pyinotify) to monitor file system activity. It checks files smaller then some size, compares their md5sum and hex signatures against DBs with known exploits/backdoor. | defensive malware | |
malscan | 5.773505a | A Simple PE File Heuristics Scanner. | malware binary | |
maltego | 4.8.0 | An open source intelligence and forensics application, enabling to easily gather information about DNS, domains, IP addresses, websites, persons, etc. | forensic recon scanner | |
maltrail | 111262.26b9e305dc | Malicious traffic detection system. | defensive networking sniffer | |
maltrieve | 342.b9e7560 | Originated as a fork of mwcrawler. It retrieves malware directly from the sources as listed at a number of sites. | malware disassembler | |
malware-check-tool | 1.2 | Python script that detects malicious files via checking md5 hashes from an offline set or via the virustotal site. It has http proxy support and an update feature. | malware | |
malwareanalyser | 3.3 | A freeware tool to perform static and dynamic analysis on malware. | windows malware defensive reversing | |
malwaredetect | 0.1 | Submits a file's SHA1 sum to VirusTotal to determine whether it is a known piece of malware | forensic malware | |
malwasm | 0.2 | Offline debugger for malware's reverse engineering. | reversing debugger | |
malybuzz | 1.0 | A Python tool focused in discovering programming faults in network software. | fuzzer | |
mana | 68.56bcfcd | A toolkit for rogue access point (evilAP) attacks first presented at Defcon 22. | wireless | |
mando.me | 9.8b34f1a | Web Command Injection Tool. | webapp exploitation | |
manspider | 70.30ce682 | Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported! | scanner recon | |
manticore | 0.3.7.r73.g88610053 | Symbolic execution tool. | binary | |
mantra | 1:v2.0.r1.ga0ae15e | Hunt down API key leaks in JS files and pages. | scanner webapp | |
manul | 197.f525df9 | A coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS. | fuzzer binary | |
mapcidr | v1.1.34.r254.g3dc37a6 | Utility program to perform multiple operations for a given subnet/CIDR ranges. | misc networking | |
mara-framework | 176.ac4ac88 | A Mobile Application Reverse engineering and Analysis Framework. | mobile reversing disassembler | |
marc4dasm | 6.f11860f | This python-based tool is a disassembler for the Atmel MARC4 (a 4 bit Harvard micro). | disassembler hardware reversing | |
marshalsec | 10.2dc4018 | Java Unmarshaller Security - Turning your data into code execution. | exploitation | |
maryam | 2:819.99ae85a | Tool to scan Web application and networks and easily and complete the information gathering process. | scanner webapp recon | |
maskprocessor | 0.73 | A High-Performance word generator with a per-position configurable charset. | automation misc | |
massbleed | 20.44b7e85 | Automated Pentest Recon Scanner. | recon automation scanner | |
masscan | 1.3.2 | TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes | scanner | |
masscan-automation | 26.a170abc | Masscan integrated with Shodan API. | automation | |
massdns | 307.bad45b8 | A high-performance DNS stub resolver in C. | networking | |
massexpconsole | 1:v2.3.5.r1.g530c880 | A collection of tools and exploits with a cli ui for mass exploitation. | automation exploitation | |
mat | 0.6.1 | Metadata Anonymisation Toolkit composed of a GUI application, a CLI application and a library. | defensive misc | |
mat2 | 0.13.4 | A metadata removal tool, supporting a wide range of commonly used file formats. | defensive misc | |
matahari | 0.1.30 | A reverse HTTP shell to execute commands on remote machines behind firewalls. | tunnel | |
matroschka | 58.2f026a4 | Python steganography tool to hide images or text in images. | stego | |
mausezahn | 0.40 | A free fast traffic generator written in C which allows you to send nearly every possible and impossible packet. | dos networking | |
mbenum | 1.5.0 | Queries the master browser for whatever information it has registered. | windows recon | |
mboxgrep | 0.7.9 | A small, non-interactive utility that scans mail folders for messages matching regular expressions. It does matching against basic and extended POSIX regular expressions, and reads and writes a variety of mailbox formats. | forensic | |
mdbtools | 738.823b32f | Utilities for viewing data and exporting schema from Microsoft Access Database files. | forensic | |
mdcrack | 1.2 | MD4/MD5/NTLM1 hash cracker | cracker | |
mdk3 | v6 | WLAN penetration tool | wireless fuzzer | |
mdk4 | 4.2 | Proof-of-Concept tool to exploit common IEEE 802.11 protocol weaknesses. | wireless fuzzer | |
mdns-recon | 11.69b864e | An mDNS recon tool written in Python. | recon | |
mdns-scan | 0.5 | Scan mDNS/DNS-SD published services on the local network. | networking | |
meanalyzer | 1.273.0 | Intel Engine Firmware Analysis Tool. | firmware | |
medusa | 2.2 | Speedy, massively parallel and modular login brute-forcer for network | cracker | |
meg | 87.9daab00 | Fetch many paths for many hosts - without killing the hosts. | webapp scanner | |
melkor | 1.0 | An ELF fuzzer that mutates the existing data in an ELF sample given to create orcs (malformed ELFs), however, it does not change values randomly (dumb fuzzing), instead, it fuzzes certain metadata with semi-valid values through the use of fuzzing rules (knowledge base). | fuzzer binary | |
memdump | 1.01 | Dumps system memory to stdout, skipping over holes in memory maps. | forensic | |
memfetch | 0.05b | Dumps any userspace process memory without affecting its execution. | forensic | |
memimager | 1.0 | Performs a memory dump using NtSystemDebugControl. | windows forensic | |
mentalist | 6.953a07b | Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can output the full wordlist as well as rules compatible with Hashcat and John the Ripper. | automation cracker | |
merlin-server | 1.3.0 | Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang. | automation exploitation | |
metabigor | 78.607b2c9 | Intelligence Tool but without API key. | recon | |
metacoretex | 0.8.0 | MetaCoretex is an entirely JAVA vulnerability scanning framework for databases. | database | |
metafinder | v1.2.r2.g30c8475 | Search for documents in a domain through Search Engines (Google, Bing and Baidu). The objective is to extract metadata. | recon | |
metaforge | 115.7b32693 | Auto Scanning to SSL Vulnerability. | misc social | |
metagoofil | 85.5d20635 | An information gathering tool designed for extracting metadata of public documents. | recon | |
metame | 14.8d583a0 | A simple metamorphic code engine for arbitrary executables. | binary | |
metasploit | 6.4.26 | Advanced open-source platform for developing, testing, and using exploit code | exploitation fuzzer scanner recon networking | |
metasploit-autopwn | 12.09320cc | db_autopwn plugin of metasploit. | automation exploitation | |
meterssh | 18.9a5ed19 | A way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. | backdoor networking | |
metoscan | 05 | Tool for scanning the HTTP methods supported by a webserver. It works by testing a URL and checking the responses for the different requests. | webapp | |
mfcuk | 0.3.8 | MIFARE Classic Universal toolKit | wireless | |
mfoc | 0.10.7+38+gba072f1 | Mifare Classic Offline Cracker | cracker wireless | |
mfsniffer | 0.1 | A python script for capturing unencrypted TSO login credentials. | sniffer | |
mft2csv | 40.164eb224 | Extract $MFT record info and log it to a csv file. | forensic windows | |
mftcarver | 9.7bfcc0a2 | Carve $MFT records from a chunk of data (for instance a memory dump). | forensic windows | |
mftrcrd | 16.35c3ac2f | Command line $MFT record decoder. | forensic windows | |
mftref2name | 6.7df9eebb | Resolve file index number to name or vice versa on NTFS. A simple tool that just converts MFT reference number to file name and path, or the other way around. | forensic windows | |
mibble | 2.10.1 | An open-source SNMP MIB parser (or SMI parser) written in Java. It can be used to read SNMP MIB files as well as simple ASN.1 files. | misc | |
microsploit | 9.441e132 | Fast and easy create backdoor office exploitation using module metasploit packet, Microsoft Office, Open Office, Macro attack, Buffer Overflow. | backdoor | |
middler | 1.0 | A Man in the Middle tool to demonstrate protocol middling attacks. | networking | |
mikrotik-npk | 11.d54e97c | Python tools for manipulating Mikrotik NPK format. | reversing binary networking packer unpacker | |
mildew | 11.df49c23 | Dotmil subdomain discovery tool that scrapes domains from official DoD website directories and certificate transparency logs. | recon | |
mimikatz | 2.2.0_20220919 | A little tool to play with Windows security. | windows cracker | |
mimipenguin | 152.880a427 | A tool to dump the login password from the current linux user. | forensic cracker | |
mingsweeper | 1.00 | A network reconnaissance tool designed to facilitate large address space,high speed node discovery and identification. | windows recon scanner | |
minimodem | 353.bb2f34c | A command-line program which decodes (or generates) audio modem tones at any specified baud rate, using various framing protocols. | misc | |
minimysqlator | 0.5 | A multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities. | exploitation | |
miranda-upnp | 1.3 | A Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices | exploitation scanner | |
miredo | 1.2.6 | Teredo client and server. | networking | |
missidentify | 1.0 | A program to find Win32 applications. | recon windows | |
missionplanner | 1.3.82 | A GroundControl Station for Ardupilot. | drone | |
mitm | 8.bd2b351 | A simple yet effective python3 script to perform DNS spoofing via ARP poisoning. | networking proxy spoof | |
mitm-relay | 40.1b74741 | Hackish way to intercept and modify non-HTTP protocols through Burp & others. | proxy sniffer | |
mitm6 | 33.8e75884 | Pwning IPv4 via IPv6. | scanner fuzzer spoof networking | |
mitmap | 89.b590f9a | A python program to create a fake AP and sniff data. | wireless sniffer | |
mitmap-old | 1:0.1 | Shell Script for launching a Fake AP with karma functionality and launches ettercap for packet capture and traffic manipulation. | automation exploitation sniffer | |
mitmer | 22.b01c7fe | A man-in-the-middle and phishing attack tool that steals the victim's credentials of some web services like Facebook. | sniffer networking | |
mitmf | 467.0458300 | A Framework for Man-In-The-Middle attacks written in Python. | exploitation proxy networking spoof | |
mitmproxy | 10.4.2 | SSL-capable man-in-the-middle HTTP proxy | proxy exploitation | |
mkbrutus | 27.ddd5f8e | Password bruteforcer for MikroTik devices or boxes running RouterOS. | cracker | |
mkyara | 3.8147f91 | Tool to generate YARA rules based on binary code. | misc | |
mobiusft | 1.12 | An open-source forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. | forensic | |
mobsf | 1:1959.cc625fe8 | An intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static, dynamic analysis and web API testing. | mobile | |
modifycerttemplate | 7.4c35708 | Aid operators in modifying ADCS certificate templates so that a created vulnerable state can be leveraged for privilege escalation. | windows | |
modlishka | v.1.1.0.r60.g3ebc29e | A powerful and flexible HTTP reverse proxy. | proxy | |
modscan | 0.1 | A new tool designed to map a SCADA MODBUS TCP based network. | scanner recon | |
moloch | 0.11.3 | An open source large scale IPv4 full PCAP capturing, indexing and database system. | networking | |
mongoaudit | 222.70b83e8 | A powerful MongoDB auditing and pentesting tool . | scanner fuzzer | |
monocle | 1.0 | A local network host discovery tool. In passive mode, it will listen for ARP request and reply packets. In active mode, it will send ARP requests to the specific IP range. The results are a list of IP and MAC addresses present on the local network. | recon networking | |
monsoon | 261.f4f9852 | A fast HTTP enumerator that allows you to execute a large number of HTTP requests. | webapp | |
moonwalk | v1.0.0.r18.g68d5be1 | Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. | exploitation | |
mooscan | 1:10.82963b0 | A scanner for Moodle LMS. | webapp scanner | |
morpheus | 165.5d81c9e | Automated Ettercap TCP/IP Hijacking Tool. | automation | |
morxbook | 1.0 | A password cracking tool written in perl to perform a dictionary-based attack on a specific Facebook user through HTTPS. | cracker | |
morxbrute | 1.01 | A customizable HTTP dictionary-based password cracking tool written in Perl | cracker | |
morxbtcrack | 1.0 | Single Bitcoin private key cracking tool released. | cracker | |
morxcoinpwn | 1.0 | Mass Bitcoin private keys brute forcing/Take over tool released. | cracker | |
morxcrack | 1.2 | A cracking tool written in Perl to perform a dictionary-based attack on various hashing algorithm and CMS salted-passwords. | cracker crypto | |
morxkeyfmt | 1.0 | Read a private key from stdin and output formatted data values. | crypto | |
morxtraversal | 1.0 | Path Traversal checking tool. | webapp scanner | |
morxtunel | 1.0 | Network Tunneling using TUN/TAP interfaces over TCP tool. | tunnel networking | |
morxtunnel | 1.0 | Network Tunneling using TUN/TAP interfaces over TCP tool. | tunnel networking | |
mosca | 130.a7e725d | Static analysis tool to find bugs like a grep unix command. | code-audit | |
mosquito | 39.fe54831 | XSS exploitation tool - access victims through HTTP proxy. | exploitation webapp | |
mots | 5.34017ca | Man on the Side Attack - experimental packet injection and detection. | sniffer networking spoof defensive | |
motsa-dns-spoofing | 2.6ac6980 | ManOnTheSideAttack-DNS Spoofing. | spoof networking | |
mousejack | 5.58b69c1 | Wireless mouse/keyboard attack with replay/transmit poc. | wireless | |
mp3nema | 0.4 | A tool aimed at analyzing and capturing data that is hidden between frames in an MP3 file or stream, otherwise noted as "out of band" data. | forensic | |
mptcp | 1.9.0 | A tool for manipulation of raw packets that allows a large number of options. | networking | |
mptcp-abuse | 6.b0eeb27 | A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014. | networking recon scanner | |
mqtt-pwn | 43.40368e5 | A one-stop-shop for IoT Broker penetration-testing and security assessment operations. | scanner recon | |
mrkaplan | 1:1.1.1 | Help red teamers to stay hidden by clearing evidence of execution. | windows exploitation | |
mrsip | 110.bdd98ad | SIP-Based Audit and Attack Tool. | voip | |
mrtparse | 522.13cde30 | A module to read and analyze the MRT format data. | misc networking | |
ms-sys | 2.8.0 | A tool to write Win9x-.. master boot records (mbr) under linux - RTM! | backdoor binary forensic | |
msf-mpc | 35.8007ef2 | Msfvenom payload creator. | automation backdoor malware | |
msfdb | 16.09c603b | Manage the metasploit framework database. | misc | |
msfenum | 36.6c6b77e | A Metasploit auto auxiliary script. | automation exploitation | |
msmailprobe | 1.c01c8bf | Office 365 and Exchange Enumeration tool. | scanner recon | |
mssqlscan | 0.8.4 | A small multi-threaded tool that scans for Microsoft SQL Servers. | scanner | |
msvpwn | 1:65.328921b | Bypass Windows' authentication via binary patching. | windows binary backdoor | |
mtr | 0.95 | Combines the functionality of traceroute and ping into one tool (CLI version) | networking | |
mtscan | 167.099482e | Mikrotik RouterOS wireless scanner. | wireless | |
mubeng | 160.05461a5 | An incredibly fast proxy checker & IP rotator with ease. | proxy | |
multiinjector | 0.4 | Automatic SQL injection utility using a lsit of URI addresses to test parameter manipulation. | webapp | |
multimac | 1.0.3 | Multiple MACs on an adapter | spoof | |
multimon-ng | 1.3.0 | An sdr decoder, supports pocsag, ufsk, clipfsk, afsk, hapn, fsk, dtmf, zvei. | radio | |
multiscanner | 1559.86e0145 | Modular file scanning/analysis framework. | scanner automation | |
multitun | 1:1.319a134 | Tunnel arbitrary traffic through an innocuous WebSocket. | tunnel | |
munin-hashchecker | 239.95b046d | Online hash checker for Virustotal and other services | defensive forensic | |
muraena | 227.5804f03 | Almost-transparent reverse proxy to automate phishing and post-phishing activities. | social | |
mutator | 51.164132d | This project aims to be a wordlist mutator with hormones, which means that some mutations will be applied to the result of the ones that have been already done, resulting in something like: corporation -> C0rp0r4t10n_2012 | automation misc | |
mwebfp | 16.a800b98 | Mass Web Fingerprinter. | fingerprint webapp scanner | |
mxtract | 90.0b34376 | Memory Extractor & Analyzer. | forensic | |
mybff | 98.094d443 | A Brute Force Framework. | cracker | |
myjwt | 202.719b939 | This cli is for pentesters, CTF players, or dev. You can modify your jwt, sign, inject, etc. | exploitation cracker | |
mylg | 659.faba867 | Network Diagnostic Tool. | networking recon sniffer | |
myrescue | 0.9.8 | A hard disk recovery tool that reads undamaged regions first. | forensic | |
mysql2sqlite | 1:14.e5b2c31 | Converts a mysqldump file into a Sqlite 3 compatible file. | database misc | |
n1qlmap | 2.5365444 | An N1QL exploitation tool. | exploitation | |
naabu | 1293.10f5605 | A fast port scanner written in go with focus on reliability and simplicity. | scanner | |
nacker | 23.b67bb39 | A tool to circumvent 802.1x Network Access Control on a wired LAN. | networking | |
naft | 0.0.9 | Network Appliance Forensic Toolkit. | forensic | |
narthex | v1.2.r7.g8b78746 | Modular personalized dictionary generator. | misc | |
nasnum | 5.df5df19 | Script to enumerate network attached storages. | recon | |
nbname | 1.0 | Decodes and displays all NetBIOS name packets it receives on UDP port 137 and more! | windows sniffer recon dos scanner | |
nbnspoof | 1.0 | NBNSpoof - NetBIOS Name Service Spoofer | spoof | |
nbtenum | 3.3 | A utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts. | windows scanner recon | |
nbtool | 1:2.bf90c76 | Some tools for NetBIOS and DNS investigation, attacks, and communication. | networking recon scanner | |
nbtscan | 1.7.2 | NBTscan is a program for scanning IP networks for NetBIOS name information. | scanner recon | |
ncpfs | 2.2.6 | Allows you to mount volumes of NetWare servers under Linux. | networking | |
ncrack | 0.7 | A high-speed network authentication cracking tool | cracker | |
necromant | 4.53930c2 | Python Script that search unused Virtual Hosts in Web Servers. | recon | |
needle | 579.891b660 | The iOS Security Testing Framework. | mobile | |
neglected | 1:8.68d02b3 | Facebook CDN Photo Resolver. | recon | |
neighbor-cache-fingerprinter | 83.f1e596f | An ARP based Operating System version scanner. | fingerprint networking | |
nemesis | 331.5aee868 | command-line network packet crafting and injection utility | networking fuzzer spoof | |
neo-regeorg | 1:v5.2.0.r4.g56183a6 | Improved version of reGeorg, HTTP tunneling pivot tool | tunnel proxy | |
net-creds | 87.07a25e1 | Sniffs sensitive data from interface or pcap. | sniffer proxy | |
netactview | 0.6.4 | A graphical network connections viewer similar in functionality to netstat | networking | |
netattack | 2:24.230b856 | Python script to scan and attack wireless networks. | wireless | |
netbios-share-scanner | 1.0 | This tool could be used to check windows workstations and servers if they have accessible shared resources. | scanner | |
netbus | 1.6 | NetBus remote adminsitration tool | windows backdoor | |
netcommander | 1.3 | An easy-to-use arp spoofing tool. | spoof networking | |
netcon | 0.1 | A network connection establishment and management script. | networking | |
netdiscover | 218.ff28964 | An active/passive address reconnaissance tool, mainly developed for those wireless networks without dhcp server, when you are wardriving. It can be also used on hub/switched networks. | recon wireless | |
netexec | v1.2.0.r199.ge927f33f | A Windows / Active Directory environments pentest tool. | scanner exploitation windows | |
netexec-pingcastle | 9.16340d2 | NetExec & CrackMapExec module that execute PingCastle on a remote machine. | windows | |
netkit-bsd-finger | 0.17 | BSD-finger ported to Linux. | recon | |
netkit-rusers | 0.17 | Logged in users; Displays who is logged in to machines on local network. | recon | |
netkit-rwho | 0.17 | Remote who client and server (with Debian patches). | misc | |
netmap | 0.1.3 | Can be used to make a graphical representation of the surounding network. | networking | |
netmask | 2.4.4 | Helps determine network masks | recon | |
netreconn | 1.78 | A collection of network scan/recon tools that are relatively small compared to their larger cousins. | networking recon scanner | |
netripper | 84.c763bd0 | Smart traffic sniffing for penetration testers. | windows | |
netscan | 1.0 | Tcp/Udp/Tor port scanner with: synpacket, connect TCP/UDP and socks5 (tor connection). | scanner networking | |
netscan2 | 1:60.3d02ba1 | Active / passive network scanner. | scanner recon | |
netsed | 1.3 | Small and handful utility design to alter the contents of packets forwarded thru network in real time. | networking | |
netsniff-ng | 0.6.8 | A high performance Linux network sniffer for packet inspection. | sniffer | |
netstumbler | 0.4.0 | Well-known wireless AP scanner and sniffer. | windows wireless | |
nettacker | 0.3.3.r131.ge8c63715 | Automated Penetration Testing Framework. | automation scanners recon | |
network-app-stress-tester | 19.df75391 | Network Application Stress Testing Yammer. | dos networking fuzzer | |
networkmap | 58.f5faf17 | Post-exploitation network mapper. | networking misc | |
networkminer | 2.9 | A Network Forensic Analysis Tool for advanced Network Traffic Analysis, sniffer and packet analyzer. | forensic sniffer | |
netz | v0.1.0.r8.g3754e56 | Discover internet-wide misconfigurations while drinking coffee. | scanner | |
netzob | 1.0.2 | An open source tool for reverse engineering, traffic generation and fuzzing of communication protocols. | reversing fuzzer networking | |
nexfil | 43.4d93c57 | OSINT tool for finding profiles by username. | social recon | |
nextnet | 3.c8dc7a6 | Pivot point discovery tool. | networking scanner | |
nfcutils | 0.3.2 | Provides a simple 'lsnfc' command that list tags which are in your NFC device field | nfc | |
nfdump | 1.6.23 | A set of tools to collect and process netflow data. | networking | |
nfex | 2.5 | A tool for extracting files from the network in real-time or post-capture from an offline tcpdump pcap savefile. | forensic networking | |
nfspy | 1.0 | A Python library for automating the falsification of NFS credentials when mounting an NFS share. | automation | |
nfsshell | 19980519 | Userland NFS command tool. | automation networking | |
ngrep | 1.47 | A grep-like utility that allows you to search for network packets on an interface. | networking | |
ngrok | 3.2.2 | A tunneling, reverse proxy for developing and understanding networked, HTTP services. | tunnel networking | |
nield | 38.0c0848d | A tool to receive notifications from kernel through netlink socket, and generate logs related to interfaces, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), routing, FIB rules, traffic control. | networking | |
nikto | 2.5.0 | A web server scanner which performs comprehensive tests against web servers for multiple items | scanner webapp fuzzer | |
nili | 39.285220a | Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing. | scanner reversing fuzzer | |
nimbostratus | 54.c7c206f | Tools for fingerprintinging and exploiting Amazon cloud infrastructures. | fingerprint exploitation fuzzer | |
nipe | 302.9e628df | A script to make Tor Network your default gateway. | defensive networking | |
nipper | 0.11.7 | Network Infrastructure Parser | recon networking | |
nirsoft | 1.23.30 | Unique collection of small and useful freeware utilities. | windows | |
nishang | 0.7.6 | Using PowerShell for Penetration Testing. | windows misc | |
njsscan | 0.3.1 | A static application testing (SAST) tool that can find insecure code patterns in your node.js applications. | code-audit | |
nkiller2 | 2.0 | A TCP exhaustion/stressing tool. | dos networking | |
nmap | 7.95 | Utility for network discovery and security auditing | scanner | |
nmap-parse-output | 26.a8e31b3 | Converts/manipulates/extracts data from a nmap scan output. | misc | |
nmbscan | 1.2.6 | Tool to scan the shares of a SMB/NetBIOS network, using the NMB/SMB/NetBIOS protocols. | scanner | |
nohidy | 67.22c1283 | The system admins best friend, multi platform auditing tool. | recon networking defensive | |
nomorexor | 2.84489f9 | Tool to help guess a files 256 byte XOR key by using frequency analysis | crypto | |
noriben | 193.e7701dc | Portable, Simple, Malware Analysis Sandbox. | malware | |
nosqlattack | 98.a5b0329 | Python tool to automate exploit MongoDB server IP on Internet and disclose the database data by MongoDB default configuration weaknesses and injection attacks. | automation scanner | |
nosqli | 37.6fce3eb | NoSQL scanner and injector. | webapp scanner exploitation | |
nosqli-user-pass-enum | 18.1b3713a | Script to enumerate usernames and passwords from vulnerable web applications running MongoDB. | exploitation webapp | |
nosqlmap | 298.efe6f7a | Automated Mongo database and NoSQL web application exploitation tool | webapp exploitation | |
notspikefile | 1:0.1 | A Linux based file format fuzzing tool | fuzzer | |
novahot | 23.69857bb | A webshell framework for penetration testers. | webapp | |
nray | 59.30517fd | Distributed port scanner. | scanner | |
nsdtool | 0.1 | A netgear switch discovery tool. It contains some extra features like bruteoforce and setting a new password. | networking scanner | |
nsearch | 353.bd8205b | Minimal script to help find script into the nse database. | misc | |
nsec3map | 20.1263537 | A tool to enumerate the resource records of a DNS zone using its DNSSEC NSEC or NSEC3 chain. | scanner recon | |
nsec3walker | 20101223 | Enumerates domain names using DNSSEC | recon | |
nsia | 1.0.6 | A website scanner that monitors websites in realtime in order to detect defacements, compliance violations, exploits, sensitive information disclosure and other issues. | scanner webapp defensive | |
nsntrace | 81.4d02e74 | Perform network trace of a single process by using network namespaces. | sniffer | |
nsoq | 1.9.5 | A Network Security Tool for packet manipulation that allows a large number of options. | networking scanner fuzzer | |
ntds-decode | 0.1 | This application dumps LM and NTLM hashes from active accounts stored in an Active Directory database. | windows cracker | |
ntdsxtract | 34.7fa1c8c | Active Directory forensic framework. | forensic | |
ntfs-file-extractor | 6.f2b23d72 | Extract files off NTFS. | forensic windows | |
ntfs-log-tracker | 1:1.6 | This tool can parse $LogFile, $UsnJrnl of NTFS. | forensic windows | |
ntlm-challenger | 8.bd61ef6 | Parse NTLM over HTTP challenge messages. | scanner | |
ntlm-scanner | 6.4b29329 | A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities. | scanner | |
ntlm-theft | 26.512074d | A tool for generating multiple types of NTLMv2 hash theft files. | exploitation | |
ntlmrecon | 78.b5778a0 | A tool to enumerate information from NTLM authentication enabled web endpoints. | scanner recon | |
ntp-fingerprint | 0.1 | An active fingerprinting utility specifically designed to identify the OS the NTP server is running on. | fingerprint | |
ntp-ip-enum | 0.1 | Script to pull addresses from a NTP server using the monlist command. Can also output Maltego resultset. | recon | |
ntpdos | 1:4.3fe389b | Create a DDOS attack using NTP servers. | dos | |
nuclei | 2:v3.0.0.r883.g87e99be4f | Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use. | webapp scanner | |
nullinux | 124.9f8727a | Tool that can be used to enumerate OS information, domain information, shares, directories, and users through SMB null sessions. | recon scanner | |
nullscan | 1.0.1 | A modular framework designed to chain and automate security tests. | automation scanner recon fingerprint networking fuzzer exploitation | |
nxcrypt | 32.6ae06b5 | NXcrypt - python backdoor framework. | backdoor | |
nzyme | 1.2.2 | WiFi defense system. | wireless defensive | |
o-saft | 6817.d78860f1 | A tool to show informations about SSL certificate and tests the SSL connection according given list of ciphers and various SSL configurations. | scanner recon | |
o365enum | 19.522a54c | Username enumeration and password enuming tool aimed at Microsoft O365. | cracker recon windows | |
o365spray | 160.28d8d1b | Auto Scanning to SSL Vulnerability. | cracker recon windows | |
oat | 1.3.1 | A toolkit that could be used to audit security within Oracle database servers. | fuzzer | |
obevilion | 409.29fbe9d | Another archive cracker created in python | cracking [zip/7z/rar]. | cracker | |
obexstress | 0.1 | Script for testing remote OBEX service for some potential vulnerabilities. | bluetooth | |
obfs4proxy | 0.0.13 | A pluggable transport proxy written in Go. | proxy networking | |
obfsproxy | 0.2.13 | A pluggable transport proxy written in Python | proxy networking | |
objdump2shellcode | 28.c2d6120 | A tool I have found incredibly useful whenever creating custom shellcode. | binary misc | |
objection | 1.11.0 | Instrumented Mobile Pentest Framework. | mobilereversing binary | |
oclhashcat | 1:2.01 | Worlds fastest WPA cracker with dictionary mutation engine. | cracker | |
ocs | 0.2 | Compact mass scanner for Cisco routers with default telnet/enable passwords. | scanner cracker | |
octopwnweb | 14.e0f83ee | Internal pentest framework running in your browser via WebAssembly, powerd by Pyodide | automation | |
office-dde-payloads | 34.53291f9 | Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique. | exploitation | |
ofp-sniffer | 230.4b79b6c | An OpenFlow sniffer to help network troubleshooting in production networks. | sniffer | |
ohrwurm | 1.7a1182a | A small and simple RTP fuzzer. | fuzzer | |
okadminfinder | 117.bd394ef | Tool to find admin panels / admin login pages. | webapp scanner | |
oledump | 0.0.77 | Analyze OLE files (Compound File Binary Format). These files contain streams of data. This tool allows you to analyze these streams. | binary malware | |
oletools | 1:0.54.1 | Tools to analyze Microsoft OLE2 files. | binary forensic | |
ollydbg | 201g | A 32-bit assembler-level analysing debugger | debugger windows | |
omen | 19.10aa99e | Ordered Markov ENumerator - Password Guesser. | cracker crypto | |
omnibus | 129.88dbf5d | OSINT tool for intelligence collection, research and artifact management. | recon social | |
omnihash | 70.870e9ae | Hash files, strings, input streams and network resources in various common algorithms simultaneously. | crypto | |
one-lin3r | 63.9fdfa5f | Gives you one-liners that aids in penetration testing and more. | misc | |
onesixtyone | 0.7 | An SNMP scanner that sends multiple SNMP requests to multiple IP addresses | cracker scanner | |
onetwopunch | v1.0.0.r2.gd4ab4e8 | Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans. | scanner | |
onioff | 84.34dc309 | An onion url inspector for inspecting deep web links. | recon recon | |
oniongrok | v1.1.7.r0.g37f970f | Onion addresses for anything. | tunnel | |
onionscan | 130.da42865 | Scan Onion Services for Security Issues. | scanner defensive | |
onionsearch | 44.fc9d62c | Script that scrapes urls on different ".onion" search engines. | webapp scanner | |
onionshare | 2.6.2 | Securely and anonymously share a file of any size. | misc defensive | |
open-iscsi | 2.1.10 | iSCSI userland tools | misc | |
opendoor | 422.d1ed311 | OWASP Directory Access scanner. | webapp scanner | |
openpuff | 4.01 | Yet not another steganography SW. | stego windows | |
openrisk | v0.0.1.r22.gb536ea0 | Generates a risk score based on the results of a Nuclei scan using OpenAI's GPT-3 model. | misc | |
openscap | 1.4.0.r12.g0ae322d43 | Open Source Security Compliance Solution. | automation defensive scanner | |
openstego | 0.8.6 | A tool implemented in Java for generic steganography, with support for password-based encryption of the data. | crypto stego | |
opensvp | 65.df54ed8 | A security tool implementing "attacks" to be able to the resistance of firewall to protocol level attack. | exploitation networking | |
openvas | 6.0.1 | The OpenVAS scanning Daemon | scanner fuzzer exploitation | |
openvas-cli | 1.4.5 | The OpenVAS Command-Line Interface | scanner fuzzer exploitation | |
openvas-libraries | 9.0.2 | The OpenVAS libraries | scanner fuzzer exploitation | |
openvas-manager | 7.0.3 | A layer between the OpenVAS Scanner and various client applications | scanner fuzzer exploitation | |
openvas-scanner | 22.4.0 | The OpenVAS scanning Daemon | scanner fuzzer exploitation | |
operative | 1:148.163acdf | Framework based on fingerprint action, this tool is used for get information on a website or a enterprise target with multiple modules (Viadeo search,Linkedin search, Reverse email whois, Reverse ip whois, SQL file forensics ...). | fingerprint | |
ophcrack | 3.8.0 | Windows password cracker based on rainbow tables | cracker | |
orakelcrackert | 1.00 | This tool can crack passwords which are encrypted using Oracle's latest SHA1 based password protection algorithm. | windows cracker | |
origami | 2.1.0 | Aims at providing a scripting tool to generate and analyze malicious PDF files. | malware binary | |
orjail | 200.ae38ba2 | A more secure way to force programs to exclusively use tor network. | defensive | |
oscanner | 1.0.6 | An Oracle assessment framework developed in Java. | fuzzer | |
osert | 90.d515424 | Markdown Templates for Offensive Security exam reports. | misc | |
osfooler-ng | 2.c0b20d6 | Prevents remote active/passive OS fingerprinting by tools like nmap or p0f. | defensive | |
osi.ig | 101.4debaa2 | Instagram OSINT Tool gets a range of information from an Instagram account. | social recon | |
osint-spy | 25.03dcf48 | Performs OSINT scan on email/domain/ip_address/organization. | recon social | |
osinterator | 3.8447f58 | Open Source Toolkit for Open Source Intelligence Gathering. | recon | |
osintgram | 1.3.r9.g3c61e53 | OSINT tool offering an interactive shell to perform analysis on Instagram account of any users by its nickname. | recon | |
osrframework | 840.e02a6e9 | A project focused on providing API and tools to perform more accurate online researches. | recon social | |
osslsigncode | 333.b967175 | A small tool that implements part of the functionality of the Microsoft tool signtool.exe. | windows binary automation | |
ostinato | 0.9 | An open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. | sniffer networking | |
osueta | 82.2ee8068 | A simple Python script to exploit the OpenSSH User Enumeration Timing Attack. | exploitation | |
otori | 0.3 | A python-based toolbox intended to allow useful exploitation of XML external entity ("XXE") vulnerabilities. | exploitation webapp | |
outguess | 0.4 | A universal steganographic tool. | crypto misc | |
outlook-webapp-brute | 1.61d7177 | Microsoft Outlook WebAPP Brute. | cracker | |
owabf | 1.3 | Outlook Web Access bruteforcer tool. | cracker | |
owasp-bywaf | 26.e730d1b | A web application penetration testing framework (WAPTF). | webapp scanner | |
owasp-zsc | 316.f763dea | Shellcode/Obfuscate Code Generator. | exploitation | |
owtf | 2187.af993ecb | The Offensive (Web) Testing Framework. | webapp automation scanner fuzzer | |
p0f | 3.09b | Purely passive TCP/IP traffic fingerprinting tool | fingerprint sniffer | |
pacaur | 4.7.10 | An AUR helper that minimizes user interaction. | misc | |
pack | 0.0.4 | Password Analysis and Cracking Kit | cracker | |
packer | 1.11.1 | tool for creating identical machine images for multiple platforms from a single source configuration | binary | |
packer-io | 1.2.4 | tool for creating identical machine images for multiple platforms from a single source configuration | binary | |
packerid | 1.4 | Script which uses a PEiD database to identify which packer (if any) is being used by a binary. | binary packer reversing | |
packet-o-matic | 351 | A real time packet processor. Reads the packet from an input module, match the packet using rules and connection tracking information and then send it to a target module. | networking tunnel | |
packeth | 3.0 | A Linux GUI packet generator tool for ethernet. | networking | |
packetq | 304.226fa76 | A tool that provides a basic SQL-frontend to PCAP-files. | networking misc | |
packetsender | 978.1a43150 | An open source utility to allow sending and receiving TCP and UDP packets. | networking | |
packit | 1.0 | A network auditing tool. Its value is derived from its ability to customize, inject, monitor, and manipulate IP traffic. | networking | |
pacu | 1512.90ac189 | The AWS exploitation framework, designed for testing the security of Amazon Web Services environments. | exploitation | |
pacumen | 1.92a0884 | Packet Acumen - Analyse encrypted network traffic and more (side-channel attacks). | crypto networking | |
padbuster | 11.50e4a3e | Automated script for performing Padding Oracle attacks. | exploitation | |
padoracle | v0.1.1.r26.g2aa6c99 | Padding Oracle Attack with Node.js. | crypto | |
padre | v2.2.0.r10.g18618f5 | Padding Oracle attack tool. | crypto | |
pafish | 193.b497899 | A demonstration tool that employs several techniques to detect sandboxes and analysis environments in the same way as malware families do. | windows | |
pagodo | 150.7f17f51 | Google dork script to collect potentially vulnerable web pages and applications on the Internet. | scanner recon | |
paketto | 1.10 | Advanced TCP/IP Toolkit. | scanner | |
panhunt | 63.ec87e88 | Searches for credit card numbers (PANs) in directories. | scanner | |
panoptic | 185.df35a6c | A tool that automates the process of search and retrieval of content for common log and config files through LFI vulnerability. | automation | |
pappy-proxy | 77.e1bb049 | An intercepting proxy for web application testing. | webapp proxy scanner fuzzer recon | |
parameth | 56.8da6f27 | This tool can be used to brute discover GET and POST parameters. | webapp scanner | |
parampampam | 45.9171018 | This tool for brute discover GET and POST parameters. | webapp fuzzer | |
paranoic | 1.7 | A simple vulnerability scanner written in Perl. | scanner scanner webapp | |
paros | 3.2.13 | Java-based HTTP/HTTPS proxy for assessing web app vulnerabilities. Supports editing/viewing HTTP messages on-the-fly, spiders, client certificates, proxy-chaining, intelligent scanning for XSS and SQLi, etc. | webapp | |
parse-evtx | 3.a4b02b9 | A tool to parse the Windows XML Event Log (EVTX) format. | forensic | |
parsero | 81.e5b585a | A robots.txt audit tool. | recon | |
pasco | 20040505_1 | Examines the contents of Internet Explorer's cache files for forensic purposes | forensic | |
pass-station | v1.4.0.r72.gf39fbf2 | CLI & library to search for default credentials among thousands of Products / Vendors. | misc recon | |
passcracking | 20131214 | A little python script for sending hashes to passcracking.com and milw0rm | cracker | |
passdetective | 1.0.6.r3.ge3aebf2 | Scans shell command history to detect mistakenly written passwords, API keys, and secrets. | misc | |
passe-partout | 0.1 | Tool to extract RSA and DSA private keys from any process linked with OpenSSL. The target memory is scanned to lookup specific OpenSSL patterns. | cracker | |
passgan | 38.5927158 | A Deep Learning Approach for Password Guessing. | cracker | |
passhunt | 5.332f374 | Search drives for documents containing passwords. | scanner | |
passivedns | 297.be48a8e | A network sniffer that logs all DNS server replies for use in a passive DNS setup. | sniffer | |
pastejacker | 12.ed9f153 | Hacking systems with the automation of PasteJacking attacks. | automation exploitation | |
pastemonitor | 10.abbceb9 | Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.. | recon automation misc | |
pasv-agrsv | 57.6bb54f7 | Passive recon / OSINT automation script. | automation recon | |
patator | 1:223.20e800a | A multi-purpose bruteforcer. | cracker | |
patchkit | 37.95dc699 | Powerful binary patching from Python. | binary backdoor | |
pathzuzu | 64.4f4533c | Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables. | exploitation | |
pax | v0.2.2.r1.g38ac0d8 | CLI tool for PKCS7 padding oracle attacks. | crypto | |
pax-oracle | v0.2.2.r1.g38ac0d8 | CLI tool for PKCS7 padding oracle attacks. | crypto | |
payloadmask | 17.58e0525 | Web Payload list editor to use techniques to try bypass web application firewall. | webapp | |
payloadsallthethings | 1933.c5802aa | A list of useful payloads and bypass for Web Application Security and Pentest/CTF. | misc | |
pblind | 1.0 | Little utility to help exploiting blind sql injection vulnerabilities. | exploitation webapp | |
pbscan | 10.566c3d7 | Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage. | scanner | |
pcapfex | 60.c51055a | Packet CAPture Forensic Evidence eXtractor. | networking forensic | |
pcapfix | 1.1.7 | Tries to repair your broken pcap and pcapng files. | networking misc | |
pcapsipdump | 0.2 | A tool for dumping SIP sessions (+RTP traffic, if available) to disk in a fashion similar to 'tcpdump -w' (format is exactly the same), but one file per sip session (even if there is thousands of concurrect SIP sessions). | voip | |
pcapteller | 1.1 | A tool designed for traffic manipulation and replay. | sniffer networking | |
pcapxray | 274.1721645 | A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction. | forensic networking | |
pcileech | 4.18.0 | Tool, which uses PCIe hardware devices to read and write from the target system memory. | hardware reversing | |
pcode2code | 6.65ae983 | VBA p-code decompiler. | decompiler | |
pcredz | 89.f4f4854 | A tool that extracts credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, and more from a pcap file or from a live interface. | scanner | |
pdblaster | 4.fc8abb3 | Extract PDB file paths from large sample sets of executable files. | forensic malware | |
pdf-parser | 0.7.9 | Parses a PDF document to identify the fundamental elements used in the analyzed file. | forensic | |
pdfbook-analyzer | 1:2 | Utility for facebook memory forensics. | forensic | |
pdfcrack | 0.20 | Password recovery tool for PDF-files. | cracker | |
pdfgrab | 15.1327508 | Tool for searching pdfs withthin google and extracting pdf metadata. | recon | |
pdfid | 0.2.8 | Scan a file to look for certain PDF keywords. | forensic | |
pdfresurrect | 0.12 | A tool aimed at analyzing PDF documents. | forensic | |
pdfwalker | 1:7.64c17f0 | Frontend to explore the internals of a PDF document with Origami | misc | |
pdgmail | 1.0 | A password dictionary attack tool that targets windows authentication via the SMB protocol. | cracker | |
pe-bear | 0.6.7.3 | A freeware reversing tool for PE files. | windows malware binary reversing disassembler | |
pe-sieve | 0.3.9 | Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches). | windows malware binary | |
peach | 3.0.202 | A SmartFuzzer that is capable of performing both generation and mutation based fuzzing. | fuzzer | |
peach-fuzz | 55.404e8ee | Simple vulnerability scanning framework. | fuzzer code-audit | |
peass | 20240505.284a0ce8.r0.g74c1391 | Privilege Escalation Awesome Scripts SUITE (with colors). | scanner | |
peda | 1.2 | Python Exploit Development Assistance for GDB | debugger exploitation | |
peepdf | 0.4.2 | A Python tool to explore PDF files in order to find out if the file can be harmful or not | forensic malware | |
peepingtom | 1:56.bc6f4d8 | A tool to take screenshots of websites. Much like eyewitness. | webapp recon | |
peframe | 135.70683b6 | Tool to perform static analysis on (portable executable) malware. | malware binary reversing | |
pemcrack | 12.66e02b8 | Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. | cracker | |
pemcracker | 9.a741c93 | Tool to crack encrypted PEM files. | cracker | |
penbox | 81.3b77c69 | A Penetration Testing Framework - The Tool With All The Tools. | automation | |
pencode | 39.07e33ef | Complex payload encoder. | misc | |
pentbox | 1.8 | A security suite that packs security and stability testing oriented tools for networks and systems. | fuzzer scanner | |
pentestgpt | v0.14.0.r0.ga6edb30 | A penetration testing tool empowered by ChatGPT. It is designed to automate the penetration testing process. | automation | |
pentestly | 1798.93d1b39 | Python and Powershell internal penetration testing framework. | scanner recon automation | |
pentmenu | 218.2e45233 | A bash script for recon and DOS attacks. | automation | |
pepe | 13.b81889b | Collect information about email addresses from Pastebin. | social recon | |
pepper | 18.9dfcade | An open source script to perform malware static analysis on Portable Executable. | malware reversing binary | |
periscope | 3.2 | A PE file inspection tool. | windows forensic binary | |
perl-image-exiftool | 12.96 | Reader and rewriter of EXIF informations that supports raw files | forensic defensive | |
persistencesniper | v1.16.1.r1.gac4751a | Hunt persistences implanted in Windows machines. | defensive windows | |
petools | 1.9.762 | Portable executable (PE) manipulation toolkit. | windows | |
pev | 0.81 | Command line based tool for PE32/PE32+ file analysis. | forensic reversing | |
pextractor | 0.18b | A forensics tool that can extract all files from an executable file created by a joiner or similar. | windows forensic binary | |
pfff | 0.29 | Tools and APIs for code analysis, visualization and transformation | code-audit | |
pftriage | 79.d7ad183 | Python tool and library to help analyze files during malware triage and analysis. | malware | |
pgdbf | 113.4e84775 | Convert XBase / FoxPro databases to PostgreSQL | database | |
phantap | 64.815c312 | An 'invisible' network tap aimed at red teams. | networking | |
phantom-evasion | 103.2cd0673 | Antivirus evasion tool written in python. | exploitation | |
phemail | 28.302b24d | A python open source phishing email tool that automates the process of sending phishing emails as part of a social engineering test. | social automation | |
phishery | 14.5743953 | An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector. | backdoor social | |
phishingkithunter | 20.ac9bd1e | Find phishing kits which use your brand/organization's files and image. | social defensive | |
phoneinfoga | v2.11.0.r0.g5f6156f | Information gathering & OSINT framework for phone numbers. | social mobile | |
phonesploit | 51.0193f9e | Adb exploiting tools. | mobile | |
phonia | 593.8ae14ff | Advanced toolkits to scan phone numbers using only free resources. | social scanner | |
phoss | 0.1.13 | Sniffer designed to find HTTP, FTP, LDAP, Telnet, IMAP4, VNC and POP3 logins. | cracker sniffer | |
photon | 328.d88d5f3 | Incredibly fast crawler which extracts urls, emails, files, website accounts and much more. | webapp recon | |
php-findsock-shell | 2.b8a984f | A Findsock Shell implementation in PHP + C. | webapp backdoor | |
php-malware-finder | 0.3.4.r82.g87b6d7f | Detect potentially malicious PHP files. | webapp malware scanner code-audit | |
php-mt-seed | 4.0 | PHP mt_rand() seed cracker | cracker | |
php-rfi-payload-decoder | 30.bd42caa | Decode and analyze RFI payloads developed in PHP. | cracker nfc | |
php-vulnerability-hunter | 1.4.0.20 | An whitebox fuzz testing tool capable of detected several classes of vulnerabilities in PHP web applications. | windows webapp code-audit | |
phpggc | 643.d3efa59 | A library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically. | webapp exploitation | |
phpsploit | 1021.aea961d | Stealth post-exploitation framework. | webapp | |
phpstan | 11389.7457ce754 | PHP Static Analysis Tool - discover bugs in your code without running it. | code-audit | |
phpstress | 5.f987a7e | A PHP denial of service / stress test for Web Servers running PHP-FPM or PHP-CGI. | dos | |
phrasendrescher | 1:1.2.2c | A modular and multi processing pass phrase cracking tool | cracker | |
pidense | 29.ef26704 | Monitor illegal wireless network activities. (Fake Access Points) | wireless defensive | |
pin | 3.28.r98749 | A dynamic binary instrumentation tool. | automation binary reversing | |
pingcastle | 3.2.0.1 | Active Directory scanning tool. | windows | |
pinkerton | 1.6.r19.g3195a4a | JavaScript file crawler and secret finder. | webapp scanner | |
pintool | 24.d538a79 | This tool can be useful for solving some reversing challenges in CTFs events. | reversing binary | |
pintool2 | 5.1c1af91 | Improved version of pintool. | reversing binary | |
pip3line | 2:92.5e27195 | The Swiss army knife of byte manipulation. | crypto | |
pipal | 3.4.0.r9.g392f0aa | A password analyser. | cracker | |
pipeline | 19.f4935c9 | Designed to aid in targeted brute force password cracking attacks. | cracker | |
pirana | 0.3.1 | Exploitation framework that tests the security of a email content filter. | exploitation | |
pivotsuite | 20.5640666 | A portable, platform independent and powerful network pivoting toolkit. | networking backdoor | |
pixd | 9.f49add4 | Colourful visualization tool for binary files. | binary misc | |
pixiewps | 1.4.2 | An offline WPS bruteforce utility. | wireless cracker | |
pixload | 87.a8f58a7 | Set of tools for creating/injecting payload into images (hiding backdoors). The following image types are currently supported: BMP, GIF, JPG, PNG, WebP. | webapp backdoor | |
pkcrack | 1.2.2 | A PkZip encryption cracker. | cracker | |
pkinittools | 10.7311de8 | Tools for Kerberos PKINIT and relaying to AD CS. | exploitation windows | |
pkt2flow | 69.868a2e8 | A simple utility to classify packets into flows. | networking | |
plasma | 922.ec7df9b | An interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax. | disassembler binary debugger | |
plasma-disasm | 922.ec7df9b | An interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax. | disassembler binary debugger | |
plcscan | 0.1 | This is a tool written in Python that will scan for PLC devices over s7comm or modbus protocols. | scanner networking | |
plecost | 104.4895e34 | Wordpress finger printer Tool. | webapp fingerprint | |
plown | 13.ccf998c | A security scanner for Plone CMS. | webapp | |
plumber | 18.3f1be68 | A python implementation of a grep friendly ftrace wrapper. | misc | |
plumber.py | 18.3f1be68 | A python implementation of a grep friendly ftrace wrapper. | misc | |
plutil | 1.6 | Converts .plist files between binary and UTF-8 (editable) text formats. | misc | |
pmacct | 4281.db67590d | Small set of multi-purpose passive network monitoring tools [NetFlow IPFIX sFlow libpcap BGP BMP IGP Streaming Telemetry]. | networking sniffer defensive | |
pmap | 1.10 | Passively discover, scan, and fingerprint link-local peers by the background noise they generate (i.e. their broadcast and multicast traffic). | windows recon scanner fingerprint | |
pmapper | 82.91d2e60 | A tool for quickly evaluating IAM permissions in AWS. | recon | |
pmcma | 1.00 | Automated exploitation of invalid memory writes (being them the consequences of an overflow in a writable section, of a missing format string, integer overflow, variable misuse, or any other type of memory corruption). | exploitation automation fuzzer | |
pmdump | 1.2 | A tool that lets you dump the memory contents of a process to a file without stopping the process. | windows forensic | |
pngcheck | 3.0.3 | Verifies the integrity of PNG, JNG and MNG files by checking the CRCs and decompressing the image data. | stego defensive forensic | |
pnscan | 1.14.1 | A parallel network scanner that can be used to survey TCP network services. | scanner | |
pocsuite | 430.877d1b1 | An open-sourced remote vulnerability testing framework developed by the Knownsec Security Team. | exploitation | |
poison | 1.5.41 | A fast, asynchronous syn and udp scanner. | scanner | |
poly | 52.4e6f189 | A python script that generates polymorphic webshells. Use it to encode your favourite shell and make it practically undetectable. | webapp backdoor | |
polyswarm | 3.9.0 | An interface to the public and private PolySwarm APIs. | malware defensive | |
polyswarm-api | 0.5.3 | An interface to the public and private PolySwarm APIs. | malware defensive | |
pompem | 141.3ebe768 | A python exploit tool finder. | exploitation | |
poracle | 68.dcc00b0 | A tool for demonstrating padding oracle attacks. | crypto webapp | |
portia | 39.2e6e608 | Automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. | automation | |
portmanteau | 1.0 | An experimental unix driver IOCTL security tool that is useful for fuzzing and discovering device driver attack surface. | fuzzer | |
portspoof | 149.c3f3c34 | This program's primary goal is to enhance OS security through a set of new techniques. | defensive spoof | |
postenum | 116.9cd9d7e | Clean, nice and easy tool for basic/advanced privilege escalation techniques. | recon scanner exploitation | |
posttester | 0.1 | A jar file that will send POST requests to servers in order to test for the hash collision vulnerability discussed at the Chaos Communication Congress in Berlin. | crypto | |
powercloud | 21.0928303 | Deliver powershell payloads via DNS TXT via CloudFlare using PowerShell. | windows exploitation | |
powerfuzzer | 1_beta | Powerfuzzer is a highly automated web fuzzer based on many other Open Source fuzzers available (incl. cfuzzer, fuzzled, fuzzer.pl, jbrofuzz, webscarab, wapiti, Socket Fuzzer). It can detect XSS, Injections (SQL, LDAP, commands, code, XPATH) and others. | fuzzer | |
powerlessshell | 115.2a87166 | PowerLessShell rely on MSBuild.exe to remotely execute PowerShell scripts and commands without spawning powershell.exe. You can also execute raw shellcode using the same approach. | windows | |
powermft | 5.76574543 | Powerful commandline $MFT record editor. | forensic windows | |
powerops | 32.13fe55b | PowerShell Runspace Portable Post Exploitation Tool aimed at making Penetration Testing with PowerShell "easier". | windows automation | |
powershdll | 72.62cfa17 | Run PowerShell with rundll32. Bypass software restrictions. | windows | |
powersploit | 591.d943001 | A PowerShell Post-Exploitation Framework. | exploitation windows | |
powerstager | 14.0149dc9 | A payload stager using PowerShell. | binary backdoor | |
pown | 332.0e32edf | Security testing and exploitation toolkit built on top of Node.js and NPM. | webapp recon scanner social proxy | |
ppee | 1.12 | A Professional PE file Explorer for reversers, malware researchers and those who want to statically inspect PE files in more details. | windows malware reversing binary | |
ppfuzz | 31.80982ec | A fast tool to scan client-side prototype pollution vulnerability written in Rust. | webapp scanner | |
ppmap | v1.2.0.r15.g9426af6 | A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets. | webapp scanner exploitation | |
ppscan | 0.3 | Yet another port scanner with HTTP and FTP tunneling support. | scanner | |
pr0cks | 1:20.bcfcf2d | python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using iptables -j REDIRECT target. | proxy tunnel networking | |
prads | 1132.e631f4f | Is a "Passive Real-time Asset Detection System". | scanner networking | |
praeda | 49.b0b17d3 | An automated data/information harvesting tool designed to gather critical information from various embedded devices. | scanner | |
preeny | 110.aaef77f | Some helpful preload libraries for pwning stuff. | exploitation reversing | |
pret | 108.a04bd04 | Printer Exploitation Toolkit - The tool that made dumpster diving obsolete. | exploitation fuzzer recon scanner | |
princeprocessor | 1:132.bffda8c | Standalone password candidate generator using the PRINCE algorithm. | misc | |
procdump | 63.5f23548 | Generate coredumps based off performance triggers. | binary misc | |
proctal | 482.67bf7e8 | Provides a command line interface and a C library to manipulate the address space of a running program on Linux. | binary misc | |
procyon | 0.6 | A suite of Java metaprogramming tools focused on code generation and analysis. | decompiler code-audit | |
profuzz | 9.aa6dded | Simple PROFINET fuzzer based on Scapy. | fuzzer | |
prometheus | 176.a316d66 | A Firewall analyzer written in ruby | networking | |
prometheus-firewall | 176.a316d66 | A Firewall analyzer written in ruby | networking | |
promiscdetect | 1.0 | Checks if your network adapter(s) is running in promiscuous mode, which may be a sign that you have a sniffer running on your computer. | windows networking defensive | |
propecia | 2 | A fast class scanner that scans for a specified open port with banner grabbing | fingerprint scanner | |
protos-sip | 2 | SIP test suite. | voip | |
protosint | 26.1ee6ee4 | Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses. | recon social | |
prowler | 1:4097.2c337ab3f | Tool for AWS security assessment, auditing and hardening. | defensive scanner | |
proxenet | 712.67fc6b5 | THE REAL hacker friendly proxy for web application pentests. | webapp proxy sniffer | |
proxify | 711.6769e46 | Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go. | proxy | |
proxmark | 2413.61163344 | A powerful general purpose RFID tool, the size of a deck of cards, designed to snoop, listen and emulate everything from Low Frequency (125kHz) to High Frequency (13.56MHz) tags. | radio recon scanner | |
proxmark3 | 4.18589 | A general purpose RFID tool for Proxmark3 hardware. | radio recon scanner | |
proxybroker | 152.d21aae8 | Proxy [Finder | Checker | Server]. HTTP(S) & SOCKS. | proxy scanner | |
proxybroker2 | 400.928f4aa | Proxy [Finder | Checker | Server]. HTTP(S) & SOCKS. | proxy scanner | |
proxychains-ng | 4.17 | A hook preloader that allows to redirect TCP traffic of existing dynamically linked programs through one or more SOCKS or HTTP proxies | proxy | |
proxycheck | 0.1 | This is a simple proxy tool that checks for the HTTP CONNECT method and grabs verbose output from a webserver. | scanner proxy | |
proxyp | 2013 | Small multithreaded Perl script written to enumerate latency, port numbers, server names, & geolocations of proxy IP addresses. | proxy scanner | |
proxyscan | 0.3 | A security penetration testing tool to scan for hosts and ports through a Web proxy server. | scanner | |
proxytunnel | 1.12.2 | a program that connects stdin and stdout to a server somewhere on the network, through a standard HTTPS proxy | tunnel proxy | |
ps1encode | 41.68d7778 | A tool to generate and encode a PowerShell based Metasploit payloads. | exploitation | |
pscan | 1.3 | A limited problem scanner for C source files | code-audit | |
pshitt | 23.dae7931 | A lightweight fake SSH server designed to collect authentication data sent by intruders. | honeypot | |
pspy | 159.2312eed | Monitor linux processes without root permissions. | misc recon | |
pstoreview | 1.0 | Lists the contents of the Protected Storage. | windows misc | |
ptf | 1503.e9ff60b | The Penetration Testers Framework is a way for modular support for up-to-date tools. | exploitation scanner recon automation | |
pth-toolkit | 7.3641cdc | Modified version of the passing-the-hash tool collection made to work straight out of the box. | sniffer networking | |
ptunnel | 0.72 | A tool for reliably tunneling TCP connections over ICMP echo request and reply packets | tunnel networking | |
pulledpork | 397.5ccf5c5 | Snort rule management | misc | |
pulsar | 55.3c61178 | Protocol Learning and Stateful Fuzzing. | fuzzer | |
punk | 9.c2bc420 | A post-exploitation tool meant to help network pivoting from a compromised unix box. | exploitation | |
punter | 45.97b7bed | Hunt domain names using DNSDumpster, WHOIS, Reverse WHOIS, Shodan, Crimeflare. | recon | |
pupy | 2988.4b78dc58 | Opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python. | automation exploitation | |
pureblood | 37.2c5ce07 | A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter. | automation webapp scanner fuzzer | |
puredns | v2.1.1.r1.g9d94e50 | Fast domain resolver and subdomain bruteforcing with accurate wildcard filtering. | recon scanner | |
pwcrack | 368.b6fba8a | Password hash automatic cracking framework. | cracker | |
pwd-hash | 2.0 | A password hashing tool that use the crypt function to generate the hash of a string given on standard input. | crypto | |
pwdlogy | 14.8b92bcf | A target specific wordlist generating tool for social engineers and security researchers. | misc | |
pwdlyser | 136.483b9bc | Python-based CLI Password Analyser (Reporting Tool). | crypto misc | |
pwdump | 7.1 | Extracts the binary SAM and SYSTEM file from the filesystem and then the hashes. | windows cracker | |
pwfuzz-rs | v0.2.0.r0.g9ee3ed4 | Rust-based password mutator for brute force attacks. | misc | |
pwnat | 14.d3c2b05 | A tool that allows any number of clients behind NATs to communicate with a server behind a separate NAT with *no* port forwarding and *no* DMZ setup on any routers in order to directly communicate with each other. | networking | |
pwncat | 0.1.2 | Bind and reverse shell handler with FW/IDS/IPS evasion, self-inject and port-scanning. | backdoor scanner proxy networking | |
pwncat-caleb | v0.5.4.r11.g37f04d4 | A post-exploitation platform. | exploitation | |
pwndbg | 2024.02.14 | Makes debugging with GDB suck less. | debugger | |
pwndora | 248.d3f676a | Massive IPv4 scanner, find and analyze internet-connected devices in minutes, create your own IoT search engine at home. | scanner recon | |
pwndrop | 18.385ba70 | Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV. | webapp exploitation automation | |
pwned | 2521.f136edc | A command-line tool for querying the 'Have I been pwned?' service. | recon | |
pwned-search | 40.04c1439 | Pwned Password API lookup. | recon social | |
pwnedornot | 150.d25d3fa | Tool to find passwords for compromised email addresses. | recon social | |
pwnedpasswords | 2.0.0.r0.g717702e | Generate and verify pwnedpasswords check digits. | misc | |
pwnloris | 11.13d6e93 | An improved slowloris DOS tool which keeps attacking until the server starts getting exhausted. | dos | |
pwntools | 4.10.0 | CTF framework and exploit development library. | disassembler reversing | |
pyaxmlparser | v0.3.31.r0.g09d78e1 | A simple parser to parse Android XML file. | mobile misc | |
pybozocrack | 87.ceb0cd9 | A silly & effective MD5 cracker in Python. | cracker crypto | |
pydictor | 98.e48ee88 | A useful hacker dictionary builder for a brute-force attack. | misc | |
pyersinia | 49.73f4056 | Network attack tool like yersinia but written in Python. | networking fuzzer dos voip scanner exploitation | |
pyew | 109.8eb3e49 | A python tool to analyse malware. | malware | |
pyexfil | 81.2ef1b8c | A couple of beta stage tools for data exfiltration. | networking | |
pyfiscan | 2999.eb42cef | Free web-application vulnerability and version scanner. | webapp scanner | |
pyfuscation | 17.6d8d53f | Obfuscate powershell scripts by replacing Function names, Variables and Parameters. | automation | |
pyinstaller | 2:3.6 | A program that converts (packages) Python programs into stand-alone executables, under Windows, Linux, Mac OS X, Solaris and AIX. | misc | |
pyjfuzz | 157.f777067 | Python JSON Fuzzer. | fuzzer | |
pykek | 12.651b9ba | Kerberos Exploitation Kit. | exploitation | |
pymeta | 13.fa74e64 | Auto Scanning to SSL Vulnerability. | recon | |
pyminifakedns | 0.1 | Minimal DNS server written in Python; it always replies with a 127.0.0.1 A-record. | networking spoof | |
pyrasite | 2.0 | Code injection and introspection of running Python processes. | backdoor | |
pyrdp | 2084.7f766be | RDP man-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact. | sniffer networking | |
pyrit | 0.5.0 | The famous WPA precomputed cracker | cracker wireless | |
pyssltest | 9.d7703f0 | A python multithreaded script to make use of Qualys ssllabs api to test SSL flaws. | scanner cryptography | |
pytacle | alpha2 | Automates the task of sniffing GSM frames | sniffer | |
pytbull | 19.3d82a54 | A python based flexible IDS/IPS testing framework shipped with more than 300 tests. | scanner fuzzer | |
pythem | 454.e4fcb8a | Python penetration testing framework. | scanner sniffer recon cracker webapp | |
python-api-dnsdumpster | 79.0f8ba2b | Unofficial Python API for http://dnsdumpster.com/. | recon scanner | |
python-arsenic | 21.8 | Async WebDriver implementation for asyncio and asyncio-compatible frameworks. | automation webapp | |
python-capstone | 5.0.3 | A lightweight multi-platform, multi-architecture disassembly framework | reversing disassembler | |
python-crontab | 2.5.1 | Crontab module for reading and writing crontab files and accessing the system cron automatically and simply using a direct API. | (blackarch | |
python-cymruwhois | 1.6 | Python client for the whois.cymru.com service | networking | |
python-frida | 15.2.2 | Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers. | reversing binary | |
python-frida-tools | 11.0.0 | Frida CLI tools. | reversing binary mobile | |
python-google-streetview | 1.2.9 | A command line tool and module for Google Street View Image API. | misc | |
python-ivre | 0.9.20.dev262 | Network recon framework (library) | recon networking | |
python-jsbeautifier | 1.15.1 | JavaScript unobfuscator and beautifier | reversing webapp | |
python-keylogger | 2.7.3 | Simple keystroke logger. | keylogger | |
python-libesedb-python | 20181229 | Library and tools to access the Extensible Storage Engine (ESE) Database File (EDB) format. | misc | |
python-minidump | 1:0.0.21 | Python library to parse and read Microsoft minidump file format. | windows | |
python-minikerberos | 1:0.2.1 | Kerberos manipulation library in pure Python. | windows | |
python-mmbot | 78.f5f5478 | Powerful malicious file triage tool for cyber responders. | malware misc | |
python-oletools | 1:0.60.2 | Tools to analyze Microsoft OLE2 files. | binary forensic | |
python-pcodedmp | 1.2.6 | A VBA p-code disassembler. | disassembler | |
python-peid | 2.2.1 | Python implementation of the Packed Executable iDentifier (PEiD). | binary reversing | |
python-pwntools | 4.13.0 | CTF framework and exploit development library | disassembler reversing binary | |
python-python-cymruwhois | 30.022e16d | Python client for the whois.cymru.com service | networking | |
python-rekall | 1396.041d6964 | Memory Forensic Framework. | forensic | |
python-search-engine-parser | 0.6.8 | Scrapes search engine pages for query titles, descriptions and links. | (blackarch | |
python-shodan | 1.31.0 | Python library for Shodan (https://developer.shodan.io). | automation | |
python-ssh-mitm | 5.0.0 | SSH mitm server for security audits supporting public key authentication, session hijacking and file manipulation. | exploitation sniffer | |
python-trackerjacker | 2.0.5 | Finds and tracks wifi devices through raw 802.11 monitoring. | wireless | |
python-uncompyle6 | 3.9.2 | A Python cross-version decompiler. | decompiler | |
python-utidylib | 0.2 | Python bindings for Tidy HTML parser/cleaner. | misc | |
python-winsspi | 0.0.9 | Windows SSPI library in pure Python. | windows | |
python-witnessme | 1:1.5.0 | Web Inventory tool, takes screenshots of webpages using Pyppeteer. | webapp recon | |
python-yara | 3.8.1 | Tool aimed at helping malware researchers to identify and classify malware samples | malware | |
python-yara-rednaga | 279.32b6a74 | The Python interface for YARA. | (blackarch | |
python2-api-dnsdumpster | 79.0f8ba2b | Unofficial Python API for http://dnsdumpster.com/. | recon scanner | |
python2-capstone | 4.0.1 | A lightweight multi-platform, multi-architecture disassembly framework | reversing disassembler | |
python2-cymruwhois | 1.6 | Python client for the whois.cymru.com service | networking | |
python2-darts.util.lru | 7.5ef01b1 | Simple dictionary with LRU behaviour. | misc | |
python2-exrex | 148.1c22c70 | Irregular methods on regular expressions. Exrex is a command line tool and python module that generates all - or random - matching strings to a given regular expression and more. | misc | |
python2-frida | 15.2.2 | Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers. | reversing binary | |
python2-frida-tools | 11.0.0 | Frida CLI tools. | reversing binary mobile | |
python2-google_streetview | 1.2.9 | A command line tool and module for Google Street View Image API. | misc | |
python2-google-streetview | 1.2.9 | A command line tool and module for Google Street View Image API. | misc | |
python2-hpfeeds | 414.34bf4d4 | Honeynet Project generic authenticated datafeed protocol. | honeypot networking | |
python2-ivre | 0.9.16.dev26 | Network recon framework (library) | recon networking | |
python2-jsbeautifier | 1.13.4 | JavaScript unobfuscator and beautifier | reversing webapp | |
python2-ldapdomaindump | 0.9.4 | Active Directory information dumper via LDAP. | scanner networking | |
python2-libesedb | 20181229 | Library and tools to access the Extensible Storage Engine (ESE) Database File (EDB) format. The ESE database format is used in may different applications like Windows Search, Windows Mail, Exchange, Active Directory, etc. | misc | |
python2-libesedb-python | 20181229 | Library and tools to access the Extensible Storage Engine (ESE) Database File (EDB) format. | misc | |
python2-minidump | 19.749e6da | Python library to parse and read Microsoft minidump file format. | windows | |
python2-minikerberos | 17.e7e8d0a | Kerberos manipulation library in pure Python. | windows | |
python2-oletools | 1:0.60.2 | Tools to analyze Microsoft OLE2 files. | binary forensic | |
python2-pcodedmp | 1.2.6 | A VBA p-code disassembler. | disassembler | |
python2-peepdf | 0.4.2 | A Python tool to explore PDF files in order to find out if the file can be harmful or not. | forensic malware | |
python2-rekall | 1396.041d6964 | Memory Forensic Framework. | forensic | |
python2-ropgadget | 5.9 | ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC and MIPS architectures. | exploitation | |
python2-shodan | 1.28.0 | Python library and command-line utility for Shodan (https://developer.shodan.io). | automation | |
python2-webtech | 1.2.12 | Identify technologies used on websites. | webapp recon scanner fingerprint | |
python2-winsspi | 0.0.9 | Windows SSPI library in pure Python. | windows | |
python2-yara | 4.0.5 | Tool aimed at helping malware researchers to identify and classify malware samples | malware | |
qark | 301.ba1b265 | Tool to look for several security related Android application vulnerabilities. | mobile fuzzer scanner exploitation | |
qrgen | 37.82a015b | Simple script for generating Malformed QRCodes. | misc | |
qrljacker | 218.1b0a4e2 | QRLJacker is a highly customizable exploitation framework to demonstrate "QRLJacking Attack Vector". | social | |
qsreplace | 3.0b053d2 | Accept URLs on stdin, replace all query string values with a user-supplied value, only output each combination of query string parameters once per host and path. | misc | |
quark-engine | 21.6.2 | Android Malware (Analysis | Scoring) System | mobile malware | |
quickrecon | 0.3.2 | A python script for simple information gathering. It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing. | recon scanner | |
quicksand-lite | 33.c3edf92 | Command line tool for scanning streams within office documents plus xor db attack. | defensive | |
quickscope | 500.634753a | Statically analyze windows, linux, osx, executables and also APK files. | binary reversing | |
r2cutter | 1:1.12.0 | Qt and C++ GUI for radare2 reverse engineering framework | reversing decompiler disassembler debugger | |
r2ghidra | 5.9.2 | Deep ghidra decompiler integration for radare2 and r2cutter | reversing decompiler disassembler debugger | |
rabid | 1:v0.1.0.r124.gf67962d | A CLI tool and library allowing to simply decode all kind of BigIP cookies. | webapp misc | |
raccoon | 187.9cf6c11 | A high performance offensive security tool for reconnaissance and vulnerability scanning. | recon scanner | |
radamsa | 0.7 | General purpose mutation based fuzzer | fuzzer | |
radare2 | 5.9.2 | Open-source tools to disasm, debug, analyze and manipulate binary files | reversing disassembler | |
radare2-cutter | 1:1.12.0 | Qt and C++ GUI for radare2 reverse engineering framework. | decompiler reversing disassembler debugger | |
radare2-keystone | 873.82b3a8e | Keystone assembler plugins for radare2. | disassembler binary reversing | |
radare2-unicorn | 873.82b3a8e | Unicorn Emulator Plugin for radare2. | disassembler binary reversing | |
radiography | 2 | A forensic tool which grabs as much information as possible from a Windows system. | windows | |
rainbowcrack | 1.8 | Password cracker based on the faster time-memory trade-off. With MySQL and Cisco PIX Algorithm patches. | cracker | |
ranger-scanner | 149.3aae5dd | A tool to support security professionals to access and interact with remote Microsoft Windows based systems. | scanner recon | |
rapidscan | 221.296a20b | The Multi-Tool Web Vulnerability Scanner. | webapp scanner recon fingerprint fuzzer exploitation | |
rarcrack | 0.2 | This program uses bruteforce algorithm to find correct password (rar, 7z, zip). | cracker | |
rasenum | 1.0 | A small program which lists the information for all of the entries in any phonebook file (.pbk). | windows recon | |
rathole | 0.5.0 | A reverse proxy for NAT traversal | proxy tunnel networking | |
ratproxy | 1.58 | A passive web application security assessment tool | fuzzer proxy scanner webapp | |
rats | 6.4ba54ce | A rough auditing tool for security in source code files. It is a tool for scanning C, C++, Perl, PHP, Python and Ruby source code and flagging common security related programming errors such as buffer overflows and TOCTOU (Time Of Check, Time Of Use) race conditions. As its name implies, the tool performs only a rough analysis of source code. It will not find every error and will also find things that are not errors. Manual inspection of your code is still necessary, but greatly aided with this tool. | code-audit | |
raven | 1:33.8646a58 | A Linkedin information gathering tool used to gather information. | recon | |
rawr | 74.544dd75 | Rapid Assessment of Web Resources. A web enumerator. | scanner webapp | |
rawsec-cli | 1.2.0.r7.gf7a08c6 | Rawsec Inventory search CLI to find security tools and resources. | misc | |
rbac-lookup | v0.10.2.r1.g6c40f17 | A CLI that allows you to easily find Kubernetes roles and cluster roles bound to any user. | scanner recon | |
rbasefind | 41.a661118 | A firmware base address search tool. | binary | |
rbkb | v0.7.2.r0.ga6d35c0 | A miscellaneous collection of command-line tools related to pen-testing and reversing. | misc | |
rbndr | 9.a189ffd | Simple DNS Rebinding Service. | spoof | |
rcracki-mt | 0.7.0 | A tool to perform rainbow table attacks on password hashes. It is intended for indexed/perfected rainbow tables, mainly generated by the distributed project www.freerainbowtables.com | cracker | |
rcrdcarver | 5.54507d21 | Carve RCRD records ($LogFile) from a chunk of data.. | forensic windows | |
rdesktop-brute | 1.5.0 | It connects to windows terminal servers - Bruteforce patch included. | cracker | |
rdp-cipher-checker | 0.1 | Enumerate the encryption protocols supported by the server and the cipher strengths supported using native RDP encryption. | scanner crypto windows | |
rdp-sec-check | 11.d0cc143 | Script to enumerate security settings of an RDP Service. | scanner networking windows | |
rdpassspray | 33.c1ba58e | Python3 tool to perform password spraying using RDP. | cracker | |
rdwarecon | 1.2.r0.g9675200 | A python script to extract information from a Microsoft Remote Desktop Web Access (RDWA) application. | recon windows | |
reaver | 1.6.6 | Brute force attack against Wifi Protected Setup | wireless cracker | |
rebind | 0.3.4 | DNS Rebinding Tool | exploitation | |
recaf | 2.21.14.2283.e5669cd90 | Modern Java bytecode editor. | decompiler reversing | |
recentfilecache-parser | 2.5e22518 | Python parser for the RecentFileCache.bcf on Windows. | forensic | |
recomposer | 2.90f85ed | Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites. | automation binary | |
recon-ng | 1:1025.470f4c1 | A full-featured Web Reconnaissance framework written in Python. | recon | |
reconnoitre | 441.f62afba | A security tool for multithreaded information gathering and service enumeration. | recon | |
reconscan | 61.afbcfc0 | Network reconnaissance and vulnerability assessment tools. | recon scanner | |
recoverdm | 0.20 | Recover damaged CD DVD and disks with bad sectors. | forensic | |
recoverjpeg | 2.6.3 | Recover jpegs from damaged devices. | forensic | |
recsech | 123.1fc298a | Tool for doing Footprinting and Reconnaissance on the target web. | recon scanner webapp fingerprinting | |
recstudio | 4.1 | Cross platform interactive decompiler | decompiler reversing | |
recuperabit | 77.c6f8678 | A tool for forensic file system reconstruction. | forensic | |
red-hawk | 36.fa54e23 | All in one tool for Information Gathering, Vulnerability Scanning and Crawling. | recon scanner webapp | |
redasm | 1667.5ab6be9 | Interactive, multiarchitecture disassembler written in C++ using Qt5 as UI Framework. | disassembler reversing | |
redfang | 2.5 | Finds non-discoverable Bluetooth devices by brute-forcing the last six bytes of the devices' Bluetooth addresses and calling read_remote_name(). | bluetooth scanner | |
redirectpoison | 1.1 | A tool to poison a targeted issuer of SIP INVITE requests with 301 (i.e. Moved Permanently) redirection responses. | voip | |
redpoint | 123.23ef36b | Digital Bond's ICS Enumeration Tools. | misc | |
redress | v0.8.0.alpha4.r6.g28a8814 | A tool for analyzing stripped Go binaries. | binary reversing | |
redsocks | 211.19b822e | Transparent redirector of any TCP connection to proxy. | proxy networking | |
reelphish | 5.dc1be33 | A Real-Time Two-Factor Phishing Tool. | social | |
regeorg | 30.1ca54c2 | The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn. | automation cracker proxy scanner | |
regipy | 2.2.2 | Library for parsing offline registry hives. | forensic | |
reglookup | 1.0.1 | Command line utility for reading and querying Windows NT registries | forensic | |
regreport | 1.6 | Windows registry forensic analysis tool. | windows forensic | |
regripper | 104.5bb3c86 | Open source forensic software used as a Windows Registry data extraction command line or GUI tool. | forensic | |
regrippy | 2.0.0 | Framework for reading and extracting useful forensics data from Windows registry hives. | forensic | |
regview | 1.3 | Open raw Windows NT 5 Registry files (Windows 2000 or higher). | windows forensic | |
rekall | 1409.55d1925f | Memory Forensic Framework. | forensic | |
relay-scanner | 1.7 | An SMTP relay scanner. | scanner | |
remot3d | 38.a707ef7 | An Simple Exploit for PHP Language. | webapp backdoor exploitation | |
replayproxy | 1.1 | Forensic tool to replay web-based attacks (and also general HTTP traffic) that were captured in a pcap file. | forensic proxy | |
reptor | 0.7 | CLI tool to automate pentest reporting with SysReptor. | misc automation | |
resourcehacker | 5.1.8 | Resource compiler and decompiler for WindowsВ® applications. | windows reversing | |
responder | 4:v3.1.4.0.r21.g538e6c0 | A LLMNR and NBT-NS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication. | scanner fuzzer spoof networking | |
responder-multirelay | 1:360.24e7b7c | A LLMNR and NBT-NS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2 (multirelay version), | scanner fuzzer spoof networking | |
restler-fuzzer | 8:403.694cc9e | First stateful REST API fuzzing tool for automatically testing cloud services through their REST APIs and finding security and reliability bugs in these services. | webapp fuzzer | |
retdec | 2160.b283e7e3 | Retargetable machine-code decompiler based on LLVM. | decompiler reversing | |
retire | 5.2.2.r3.g03ba5c5 | Scanner detecting the use of JavaScript libraries with known vulnerabilities. | scanner code-audit | |
reverseip | 13.42cc9c3 | ReverseIP is a ruby-based reverse IP-lookup tool, which finds all domains hosted on a web server and returns the HTTP status code of those domains. | recon | |
revipd | 5.2aaacfb | A simple reverse IP domain scanner. | recon scanner | |
revsh | 215.174e309 | A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities. | backdoor networking | |
rex | 711.e97d392 | Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge. | exploitation | |
rext | 63.5f0f626 | Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices. | exploitation scanner | |
rfcat | 170508 | RF ChipCon-based Attack Toolset. | exploitation | |
rfdump | 1.6 | A back-end GPL tool to directly inter-operate with any RFID ISO-Reader to make the contents stored on RFID tags accessible | wireless | |
rfidiot | 107.88f2ef9 | An open source python library for exploring RFID devices. | wireless | |
rfidtool | 0.01 | A opensource tool to read / write rfid tags | wireless | |
rhodiola | 4.8bc08a0 | Personalized wordlist generator with NLP, by analyzing tweets (A.K.A crunch2049). | automation cracker | |
richsploit | 3.6b15e0f | Exploitation toolkit for RichFaces. | exploitation webapp | |
ridenum | 75.9e3b89b | A null session RID cycle attack for brute forcing domain controllers. | cracker | |
ridrelay | 34.f2fa99c | Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv. | recon spoof networking | |
rifiuti2 | 1:0.7.0 | A rewrite of rifiuti, a great tool from Foundstone folks for analyzing Windows Recycle Bin INFO2 file. | forensic recon | |
rinetd | 0.62 | internet redirection server | networking | |
ripdc | 0.3 | A script which maps domains related to an given ip address or domainname. | recon scanner | |
rita | 2:v5.0.8.r0.g93b2dc5 | Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis. | recon | |
riwifshell | 38.40075d5 | Web backdoor - infector - explorer. | webapp backdoor | |
rizin | 0.7.3 | Open-source tools to disasm, debug, analyze and manipulate binary files | reversing decompiler disassembler debugger | |
rkhunter | 1.4.6 | Checks machines for the presence of rootkits and other unwanted tools. | forensic defensive | |
rlogin-scanner | 0.2 | Multithreaded rlogin scanner. Tested on Linux, OpenBSD and Solaris. | cracker scanner | |
rmiscout | 1.4 | Enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities. | exploitation | |
rogue-mysql-server | 2.78ebbfc | A rogue MySQL server written in Python. | misc | |
roguehostapd | 78.381b373 | Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes. | wireless | |
rombuster | 223.4592b7a | A router exploitation tool that allows to disclosure network router admin password. | exploitation | |
rootbrute | 1:0.1 | Local root account bruteforcer. | cracker | |
ropeadope | 1.1 | A linux log cleaner. | anti-forensic | |
ropeme | 4.9b3a8fd | ROPME is a set of python scripts to generate ROP gadgets and payload. | exploitation | |
ropgadget | 7.4 | Lets you search your gadgets on your binaries (ELF format) to facilitate your ROP exploitation. | exploitation binary | |
ropgadget2 | 5.4 | Search gadgets in binaries to facilitate ROP exploitation for several file formats and architectures | exploitation | |
ropper | 1.13.10 | Show information about binary files and find gadgets to build rop chains for different architectures | exploitation binary | |
roputils | 195.ae7ed20 | A Return-oriented Programming toolkit. | exploitation | |
routerhunter | 21.4da257c | Tool used to find vulnerable routers and devices on the Internet and perform tests. | scanner networking | |
routersploit | 3.4.4 | The Router Exploitation Framework. | exploitation | |
rp | 138.3a54a7c | A full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. | exploitation binary | |
rpak | 1.0 | A collection of tools that can be useful for doing attacks on routing protocols. | windows networking sniffer spoof | |
rpcsniffer | 7.9fab095 | Sniffs WINDOWS RPC messages in a given RPC server process. | windows sniffer | |
rpctools | 1.0 | Contains three separate tools for obtaining information from a system that is running RPC services | windows recon scanner | |
rpdscan | 2.a71b0f3 | Remmina Password Decoder and scanner. | cracker scanner | |
rpivot | 5.4963487 | Socks4 reverse proxy for penetration testing. | proxy | |
rr | 6869.556551e4 | A Record and Replay Framework. | debugger misc | |
rrs | 100:1.70 | A reverse (connecting) remote shell. Instead of listening for incoming connections it will connect out to a listener (rrs in listen mode). With tty support and more. | backdoor | |
rsactftool | 1117.627a944 | RSA tool for ctf - retreive private key from weak public key and/or uncipher data. | crypto cracker | |
rsakeyfind | 1.0 | A tool to find RSA key in RAM. | cracker forensic | |
rsatool | 31.06bb1e5 | Tool that can be used to calculate RSA and RSA-CRT parameters. | crypto | |
rshack | 64.cf197e3 | Python tool which allows to carry out some attacks on RSA, and offer a few tools to manipulate RSA keys. | crypto | |
rsmangler | 1.4 | rsmangler takes a wordlist and mangle it | automation | |
rspet | 263.de4356e | A Python based reverse shell equipped with functionalities that assist in a post exploitation scenario. | exploitation backdoor dos | |
rtfm | 95.a807a80 | A database of common, interesting or useful commands, in one handy referable form. | misc | |
rtlamr | 197.03369d1 | An rtl-sdr receiver for smart meters operating in the 900MHz ISM band. | radio hardware | |
rtlizer | 35.5614163 | Simple spectrum analyzer. | scanner radio | |
rtlsdr-scanner | 1013.3c032de | A cross platform Python frequency scanning GUI for the OsmoSDR rtl-sdr library. | scanner | |
rtp-flood | 1.0 | RTP flooder | voip | |
rtpbreak | 1:1.3a | Detects, reconstructs and analyzes any RTP session | networking | |
rubilyn | 0.0.1 | 64bit Mac OS-X kernel rootkit that uses no hardcoded address to hook the BSD subsystem in all OS-X Lion & below. It uses a combination of syscall hooking and DKOM to hide activity on a host. | backdoor | |
ruler | 310.1fe118c | A tool to abuse Exchange services. | webapp exploitation | |
rulesfinder | 42.cf8255b | Machine-learn password mangling rules. | misc | |
rupture | 1383.131c61a | A framework for BREACH and other compression-based crypto attacks. | crypto exploitation | |
rustbuster | 302.4a243d4 | DirBuster for Rust. | webapp scanner | |
rustcat | v3.0.0.r4.g245c791 | A Modern Port Listener & Reverse Shell. | networking | |
rusthound | 55.6d7b945 | Active Directory data collector for BloodHound. | recon windows | |
rustpad | v1.8.1.r1.g11ce343 | Multi-threaded Padding Oracle attacks against any service. | crypto cracker | |
rustscan | 2.3.0 | Faster Nmap Scanning with Rust. | scanner | |
rvi-capture | 14.a2e129b | Capture packets sent or received by iOS devices. | sniffer mobile | |
rww-attack | 0.9.2 | The Remote Web Workplace Attack tool will perform a dictionary attack against a live Microsoft Windows Small Business Server's 'Remote Web Workplace' portal. It currently supports both SBS 2003 and SBS 2008 and includes features to avoid account lock out. | webapp | |
rz-cutter | 2.3.4 | Qt and C++ GUI for rizin reverse engineering framework | reversing decompiler disassembler debugger | |
rz-ghidra | 0.7.0 | Deep ghidra decompiler integration for rizin and rz-cutter | reversing decompiler disassembler debugger | |
s3-fuzzer | 4.0a2a6f0 | A concurrent, command-line AWS S3 Fuzzer. | fuzzer | |
s3enum | v1.0.0.r9.g498cb74 | Amazon S3 bucket enumeration. | recon scanner | |
s3scanner | 472.4b04111 | Scan for open S3 buckets and dump. | scanner | |
safecopy | 1.7 | A disk data recovery tool to extract data from damaged media. | forensic | |
sagan | 2.0.2 | A snort-like log analysis engine. | ids defensive | |
sakis3g | 0.2.0e | An all-in-one script for connecting with 3G. | automation misc | |
saleae-logic | 2.3.47 | Debug happy. | debugger | |
sambascan | 0.5.0 | Allows you to search an entire network or a number of hosts for SMB shares. It will also list the contents of all public shares that it finds. | scanner | |
samdump2 | 3.0.0 | Dump password hashes from a Windows NT/2k/XP installation | cracker | |
samesame | 68.a9bcd7b | Command line tool to generate crafty homograph strings. | fuzzer | |
samplicator | 175.ceeb1d2 | Send copies of (UDP) datagrams to multiple receivers, with optional sampling and spoofing. | networking spoff | |
samydeluxe | 1:2.2ed1bac | Automatic samdump creation script. | cracker | |
sandcastle | 73.10af7c7 | A Python script for AWS S3 bucket enumeration. | scanner | |
sandmap | 579.a7c4860 | Nmap on steroids! Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles. | scanner automation | |
sandsifter | 2.8375e61 | The x86 processor fuzzer. | fuzzer hardware | |
sandy | 6.531ab16 | An open-source Samsung phone encryption assessment framework | scanner crypto mobile | |
saruman | 2.4be8db5 | ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection). | binary backdoor anti-forensic | |
sasm | 3.2.0 | A simple crossplatform IDE for NASM, MASM, GAS and FASM assembly languages. | misc | |
sawef | 32.e5ce862 | Send Attack Web Forms. | webapp recon | |
sb0x | 19.04f40fe | A simple and Lightweight framework for Penetration testing. | scanner fuzzer cracker backdoor recon | |
sbd | 1.36 | Netcat-clone, portable, offers strong encryption - features AES-128-CBC + HMAC-SHA1 encryption, program execution (-e), choosing source port, continuous reconnection with delay + more | crypto networking | |
sc-make | 12.7e39718 | Tool for automating shellcode creation. | exploitation automation | |
scalpel | 1:1.1687261 | A frugal, high performance file carver | forensic | |
scamper | 20230323 | A tool that actively probes the Internet in order to analyze topology and performance. | scanner recon networking | |
scanless | 90.3da40e9 | Utility for using websites that can perform port scans on your behalf. | scanner | |
scanmem | 0.17 | Memory scanner designed to isolate the address of an arbitrary variable in an executing process | reversing | |
scannerl | 15.e52c46b | The modular distributed fingerprinting engine. | fingerprint | |
scanqli | 26.40a028d | SQLi scanner to detect SQL vulns. | webapp scanner | |
scansploit | 9.a0890af | Exploit using barcodes, QRcodes, earn13, datamatrix. | exploitation | |
scanssh | 2.1 | Fast SSH server and open proxy scanner. | scanner | |
scap-security-guide | 0.1.60 | Security compliance content in SCAP, Bash, Ansible, and other formats. | automation defensive scanner | |
scap-workbench | 1.2.1 | SCAP Scanner And Tailoring Graphical User Interface. | automation defensive scanner | |
scapy | 2.5.0 | A powerful interactive packet manipulation program written in Python | networking | |
scapy3k | 0.23 | Powerful interactive packet manipulation program written in Python 3 | networking | |
scavenger | 103.75907e8 | Crawler (Bot) searching for credential leaks on different paste sites. | recon social | |
schnappi-dhcp | 0.1 | Can test network with no DHCP. | misc | |
scout2 | 1182.5d86d46 | Security auditing tool for AWS environments. | scanner fuzzer | |
scoutsuite | 1:5.14.0.r0.g7909f2fc6 | Multi-Cloud Security Auditing Tool. | scanner | |
scrape-dns | 58.3df392f | Searches for interesting cached DNS entries. | scanner | |
scrapy | 2.11.1 | A fast high-level scraping and web crawling framework. | webapp recon scanner | |
scratchabit | 571.e52ba4b | Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API. | disassembler | |
scrounge-ntfs | 0.9 | Data recovery program for NTFS file systems | forensic | |
scrying | 234.caa233c | Collect RDP, web, and VNC screenshots smartly. | webapp recon | |
sctpscan | 34.4d44706 | A network scanner for discovery and security. | recon scanner | |
scylla | 99.621b7b8 | The Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc | recon social | |
sdn-toolkit | 1.21 | Discover, Identify, and Manipulate SDN-Based Networks | networking scanner recon | |
sdnpwn | 84.f58cb21 | An SDN penetration testing toolkit. | scanner networking | |
sea | 103.9aca1c8 | A tool to help to create exploits of binary programs. | malware binary | |
search1337 | 1:11.bf03ec9 | Online, lightweight exploit scanner and downloader. | automation exploitation | |
searchsploit | 1:1828.2ae6cf2b7 | The official Exploit Database search tool. | automation exploitation | |
seat | 0.3 | Next generation information digging application geared toward the needs of security professionals. It uses information stored in search engine databases, cache repositories, and other public resources to scan web sites for potential vulnerabilities. | scanner recon | |
second-order | v3.2.r0.g242569b | Second-order subdomain takeover scanner. | webapp scanner | |
secretfinder | 1:15.d06119d | A python script to find sensitive data (apikeys, accesstoken, jwt,..) in javascript files. | webapp recon | |
secscan | 1.5 | Web Apps Scanner and Much more utilities. | webapp scanner | |
secure-delete | 1:1.b63d814 | Secure file, disk, swap, memory erasure utilities. | anti-forensic defensive | |
secure2csv | 10.119eefb0 | Decode security descriptors in $Secure on NTFS. | forensic windows | |
see-surf | v2.0.r41.g826f05a | A Python based scanner to find potential SSRF parameters in a web application. | webapp scanner | |
seeker | 1:376.692e531 | Accurately Locate People using Social Engineering. | social recon | |
sees | 67.cd741aa | Increase the success rate of phishing attacks by sending emails to company users as if they are coming from the very same company's domain. | social | |
semgrep | 1.75.0 | Lightweight static analysis for many languages. | code-audit | |
sensepost-xrdp | 16.46d6c19 | A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions. | exploitation | |
sentrypeer | v3.0.0.r14.g02173c8 | Protect SIP Servers from bad actors. | defensive | |
sergio-proxy | 20.8a91bb4 | A multi-threaded transparent HTTP proxy for manipulating web traffic | proxy spoof | |
serialbrute | 3.111c217 | Java serialization brute force attack tool. | exploitation | |
serializationdumper | 34.6d161cd | A tool to dump Java serialization streams in a more human readable form. | webapp reversing | |
server-status-pwn | 12.841d55d | A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-status instances. | recon | |
sessionlist | 6.3efc3b2 | Sniffer that intents to sniff HTTP packets and attempts to reconstruct interesting authentication data from websites that do not employ proper secure cookie auth. | networking sniffer | |
set | 1:8.0.3 | Social-engineer toolkit. Aimed at penetration testing around Social-Engineering. | social exploitation | |
seth | 103.8b6e36c | Perform a MitM attack and extract clear text credentials from RDP connections. | networking sniffer | |
setowner | 1.1 | Allows you to set file ownership to any account, as long as you have the "Restore files and directories" user right. | windows binary | |
sfuzz | 200.e1b62bd | A simple fuzzer. | fuzzer | |
sgn | 36.f54fa65 | Shikata ga nai encoder ported into go with several improvements. | binary | |
sh00t | 214.8c7321f | A Testing Environment for Manual Security Testers. | misc | |
sha1collisiondetection | 105.b4a7b0b | Library and command line tool to detect SHA-1 collision in a file | crypto | |
shad0w | 387.d35b9dc | A modular C2 framework designed to successfully operate on mature environments. | windows exploitation | |
shadowexplorer | 0.9 | Browse the Shadow Copies created by the Windows Vista / 7 / 8 / 10 Volume Shadow Copy Service. | forensic windows | |
shard | 1.5 | A command line tool to detect shared passwords. | recon | |
shareenum | 48.db728dd | Tool to enumerate shares from Windows hosts. | scanner | |
sharesniffer | 58.a0c5ed6 | Network share sniffer and auto-mounter for crawling remote file systems. | scanner automation | |
shed | 2.0.0 | .NET runtime inspector. | windows reversing | |
shellcheck | 0.10.0 | Shell script analysis tool | code-audit | |
shellcode-compiler | 26.8a25463 | Compiles C/C++ style code into a small, position-independent and NULL-free shellcode for Windows & Linux. | exploitation | |
shellcode-factory | 96.07ae857 | Tool to create and test shellcodes from custom assembly sources. | exploitation | |
shellcodecs | 0.1 | A collection of shellcode, loaders, sources, and generators provided with documentation designed to ease the exploitation and shellcode programming process. | exploitation | |
shellen | 66.c0c5f83 | Interactive shellcoding environment to easily craft shellcodes. | exploitation | |
shellerator | 32.0ed6571 | Simple command-line tool aimed to help pentesters quickly generate one-liner reverse/bind shells in multiple languages. | automation | |
shellinabox | 428.98e6eeb | Implements a web server that can export arbitrary command line tools to a web based terminal emulator. | backdoor webapp | |
shelling | 227.0a6c135 | An offensive approach to the anatomy of improperly written OS command injection sanitisers. | misc | |
shellme | 5.d5206f0 | Because sometimes you just need shellcode and opcodes quickly. This essentially just wraps some nasm/objdump calls into a neat script. | exploitation automation | |
shellnoob | 35.72cf498 | A toolkit that eases the writing and debugging of shellcode | debugger exploitation | |
shellpop | 148.a145349 | Generate easy and sophisticated reverse or bind shell commands. | automation | |
shellsploit-framework | 273.a16d22f | New Generation Exploit Development Kit. | exploitation backdoor | |
shellter | 7.2 | A dynamic shellcode injection tool, and the first truly dynamic PE infector ever created. | exploitation backdoor windows | |
shellz | 161.0ed068f | A script for generating common revshells fast and easy. | automation | |
sherlock | 1:0.15.0 | Find usernames across social networks. | social recon | |
sherlocked | 1.f190c2b | Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging. | packer binary crypto backdoor | |
shhgit | 66.53e656c | Find committed secrets and sensitive files across GitHub, Gists, GitLab and BitBucket or your local repositories in real time. | recon | |
shitflood | 14.e74fc42 | A Socks5 clone flooder for the Internet Relay Chat (IRC) protocol. | dos | |
shocker | 65.65d4d76 | A tool to find and exploit servers vulnerable to Shellshock. | exploitation scanner | |
shodan | 1.13.0 | Python library for Shodan (https://developer.shodan.io). | automation | |
shodanhat | 13.e5e7e68 | Search for hosts info with shodan. | recon | |
shootback | 83.cab462c | A reverse TCP tunnel let you access target behind NAT or firewall. | backdoor tunnel | |
shortfuzzy | 0.1 | A web fuzzing script written in perl. | webapp fuzzer scanner | |
shosubgo | 1:v3.0.r2.gd9e5dcd | Small tool to Grab subdomains using Shodan API. | recon | |
shreder | 115.a108575 | A powerful multi-threaded SSH protocol password bruteforce tool. | cracker | |
shuffledns | 362.1e45a1b | A wrapper around massdns written in go that allows you to enumerate valid subdomains. | scanner | |
sickle | 76.20a0f2d | A shellcode development tool, created to speed up the various steps needed to create functioning shellcode. | exploitation | |
sidguesser | 1.0.5 | Guesses sids/instances against an Oracle database according to a predefined dictionary file. | cracker | |
siege | 4.1.6 | An http regression testing and benchmarking utility | dos | |
sigma | 0.20 | Generic Signature Format for SIEM Systems | defensive | |
sign | 10.2dc4018 | Automatically signs an apk with the Android test certificate. | mobile automation | |
sigploit | 786.0e52072 | Telecom Signaling Exploitation Framework - SS7, GTP, Diameter & SIP. | exploitation mobile | |
sigspotter | 1.0 | A tool that search in your HD to find wich publishers has been signed binaries in your PC. | windows misc | |
sigthief | 25.ffb501b | Stealing Signatures and Making One Invalid Signature at a Time. | exploitation windows | |
silenteye | 21.a53a7ff | A cross-platform application design for an easy use of steganography. | stego | |
silenttrinity | 293.08b1c61 | An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR. | backdoor | |
silk | 3.19.2 | A collection of traffic analysis tools developed by the CERT NetSA to facilitate security analysis of large networks. | networking scanner | |
simple-ducky | 20.f15079e | A payload generator. | automation exploitation | |
simple-lan-scan | 1.0 | A simple python script that leverages scapy for discovering live hosts on a network. | scanner recon networking | |
simpleemailspoofer | 54.7075f0c | A simple Python CLI to spoof emails. | social | |
simplify | 1.3.0 | Generic Android Deobfuscator. | mobile | |
simplyemail | 1:1.4.10.r7.6a42d37 | Email recon made fast and easy, with a framework to build on http://CyberSyndicates.com. | recon | |
simtrace2 | 1079.e6e7739 | Host utilities to communicate with SIMtrace2 USB Devices. | radio | |
sinfp | 1.24 | A full operating system stack fingerprinting suite. | fingerprint | |
siparmyknife | 11232011 | A small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications. | voip | |
sipbrute | 11.5be2fdd | A utility to perform dictionary attacks against the VoIP SIP Register hash. | voip cracker | |
sipcrack | 0.2 | A SIP protocol login cracker. | cracker voip | |
sipffer | 1:29.efc3ff1 | SIP protocol command line sniffer. | sniffer voip | |
sipi | 13.58f0dcc | Simple IP Information Tools for Reputation Data Analysis. | recon misc | |
sipp | 1490.d677f54 | A free Open Source test tool / traffic generator for the SIP protocol. | voip | |
sippts | 1:v3.4.r8.g48f9949 | Set of tools to audit SIP based VoIP Systems. | voip | |
sipsak | 1:0.9.8.1 | A small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications. | voip | |
sipscan | 1:0.1 | A sip scanner. | windows scanner voip | |
sipshock | 7.6ab5591 | A scanner for SIP proxies vulnerable to Shellshock. | scanner voip | |
sipvicious | 462.fd3e7c7 | Tools for auditing SIP devices | automation exploitation | |
sireprat | 34.b8ef60b | Remote Command Execution as SYSTEM on Windows IoT Core. | exploitation windows | |
sitadel | 123.e4d9ed4 | Web Application Security Scanner. | webapp scanner | |
sitediff | 3.1383935 | Fingerprint a web app using local files as the fingerprint sources. | webapp fingerprint | |
sjet | 103.dd2a4e6 | Siberas JMX exploitation toolkit. | exploitation webapp | |
skipfish | 2.10b | A fully automated, active web application security reconnaissance tool | fuzzer scanner webapp | |
skiptracer | 1:123.ca40957 | OSINT python2 webscraping framework. Skipping the needs of API keys. | social recon | |
skul | 27.7bd83f1 | A PoC to bruteforce the Cryptsetup implementation of Linux Unified Key Setup (LUKS). | cracker cryptography | |
skydive | 0.28.0 | An open source real-time network topology and protocols analyzer. | networking | |
skyjack | 16.24e3878 | Takes over Parrot drones, deauthenticating their true owner and taking over control, turning them into zombie drones under your own control. | drone | |
skype-dump | 0.1 | This is a tool that demonstrates dumping MD5 password hashes from the configuration file in Skype. | windows cracker | |
skypefreak | 33.9347a65 | A Cross Platform Forensic Framework for Skype. | forensic | |
slackpirate | 142.9788be6 | Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace. | social recon | |
sleuthkit | 4.12.1 | File system and media management forensic analysis tools | forensic | |
sleuthql | 9.29fc878 | Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap. | misc | |
slither | 1:4567.2c792b2b7 | Solidity static analysis framework written in Python 3. | code-audit exploitation | |
sloth-fuzzer | 39.9f7f59a | A smart file fuzzer. | fuzzer | |
slowhttptest | 1.9.0 | A highly configurable tool that simulates application layer denial of service attacks. | dos | |
slowloris | 0.7 | A tool which is written in perl to test http-server vulnerabilites for connection exhaustion denial of service (DoS) attacks so you can enhance the security of your webserver. | dos | |
slowloris-py | 30.eb7f632 | Low bandwidth DoS tool. | dos | |
slurp | 90.6a4eaaf | S3 bucket enumerator | scanner | |
slurp-scanner | 90.6a4eaaf | Evaluate the security of S3 buckets. | scanner | |
smali | 2.5.2 | An assembler/disassembler for Android's dex format | disassembler hardware | |
smali-cfgs | 6.4450418 | Smali Control Flow Graph's. | mobile misc | |
smalisca | 58.1aa7a16 | Static Code Analysis for Smali files. | mobile code-audit | |
smap | 24.3ed1ac7 | Shellcode mapper - Handy tool for shellcode analysis. | exploitation binary | |
smap-scanner | 0.1.12.r1.g90dfe74 | Passive port scanner built with shodan free API. | scanner recon | |
smartphone-pentest-framework | 104.fc45347 | Repository for the Smartphone Pentest Framework (SPF). | mobile scanner fuzzer | |
smbbf | 0.9.1 | SMB password bruteforcer. | cracker | |
smbcrunch | 12.313400e | 3 tools that work together to simplify reconaissance of Windows File Shares. | recon scanner | |
smbexec | 2:59.a54fc14 | A rapid psexec style attack with samba tools. | scanner recon fuzzer exploitation | |
smbmap | 1:v1.10.5.r0.gba4750f | A handy SMB enumeration tool. | scanner recon | |
smbrelay | 3 | SMB / HTTP to SMB replay attack toolkit. | windows networking exploitation | |
smbspider | 10.7db9323 | A lightweight python utility for searching SMB/CIFS/Samba file shares. | scanner | |
smbsr | 50.7f86241 | Lookup for interesting stuff in SMB shares. | scanner recon | |
smikims-arpspoof | 25.244d9ee | Performs an ARP spoofing attack using the Linux kernel's raw sockets. | spoof exploitation networking | |
smod | 53.7eb8423 | A modular framework with every kind of diagnostic and offensive feature you could need in order to pentest modbus protocol. | scanner fuzzer recon dos | |
smplshllctrlr | 9.2baf390 | PHP Command Injection exploitation tool. | webapp exploitation | |
smtp-fuzz | 1.0 | Simple smtp fuzzer. | fuzzer | |
smtp-test | 5.d8d8598 | Automated testing of SMTP servers for penetration testing. | scanner | |
smtp-user-enum | 1.2 | Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO. | recon scanner | |
smtp-vrfy | 1.0 | An SMTP Protocol Hacker. | scanner | |
smtpmap | 0.8.234_BETA | Tool to identify the running smtp software on a given host. | fingerprint | |
smtpscan | 0.5 | An SMTP scanner | fingerprint | |
smtptester | 13.634e1ee | Small python3 tool to check common vulnerabilities in SMTP servers. | exploitation cracker | |
smtptx | 1.0 | A very simple tool used for sending simple email and do some basic email testing from a pentester perspective. | scanner fuzzer | |
smuggler | 23.2be871e | Python tool used to test for HTTP Desync/Request Smuggling attacks. | webapp scanner | |
smuggler-py | 1.0 | Python tool used to test for HTTP Desync/Request Smuggling attacks. | webapp scanner | |
sn00p | 0.8 | A modular tool written in bourne shell and designed to chain and automate security tools and tests. | automation scanner recon fingerprint networking fuzzer exploitation | |
sn1per | 1:609.b10362b | Automated Pentest Recon Scanner. | recon automation scanner cracker | |
snallygaster | 243.ece8e7b | Tool to scan for secret files on HTTP servers. | webapp scanner | |
snapception | 8.c156f9e | Intercept and decrypt all snapchats received over your network. | sniffer crypto | |
snare | 188.b17fdfe | Super Next generation Advanced Reactive honEypot. SNARE is a web application honeypot sensor attracting all sort of maliciousness from the Internet. | honeypot webapp | |
snarf-mitm | 41.bada142 | SMB Man in the Middle Attack Engine / relay suite. | exploitation proxy | |
sniff-probe-req | 410.58c7d63 | Wi-Fi Probe Requests Sniffer. | wireless sniffer | |
sniffer | 4.688854e | Packet Trace Parser for TCP, SMTP Emails, and HTTP Cookies. | networking | |
sniffglue | 0.16.1 | Secure multithreaded packet sniffer | sniffer | |
sniffjoke | 772.434bfb1 | Injects packets in the transmission flow that are able to seriously disturb passive analysis like sniffing, interception and low level information theft. | defensive networking sniffer | |
sniffles | 469.118e93f | A Packet Capture Generator for IDS and Regular Expression Evaluation. | networking | |
snitch | 1.2 | Turn back the asterisks in password fields to plaintext passwords. | windows cracker | |
snmp-brute | 19.830bb0a | SNMP brute force, enumeration, CISCO config downloader and password cracking script. | cracker networking | |
snmp-fuzzer | 0.1.1 | SNMP fuzzer uses Protos test cases with an entirely new engine written in Perl. | fuzzer networking | |
snmpattack | 1.8 | SNMP scanner and attacking tool. | networking scanner | |
snmpcheck | 1.9 | A free open source utility to get information via SNMP protocols. | networking recon | |
snmpenum | 1.7 | snmp enumerator | scanner | |
snmpscan | 0.1 | A free, multi-processes SNMP scanner. | scanner | |
snoopbrute | 17.589fbe6 | Multithreaded DNS recursive host brute-force tool. | scanner recon | |
snoopy-ng | 128.eac73f5 | A distributed, sensor, data collection, interception, analysis, and visualization framework. | drone exploitation sniffer | |
snort | 2.9.20 | A lightweight network intrusion detection system. | defensive networking forensic | |
snow | 20130616 | Steganography program for concealing messages in text files. | crypto misc | |
snowman | 0.1.3 | A native code to C/C++ decompiler, see the examples of generated code. | windows decompiler | |
snscan | 1.05 | A Windows based SNMP detection utility that can quickly and accurately identify SNMP enabled devices on a network. | windows scanner | |
snscrape | 0.4.3.20220106 | A social networking service scraper in Python. | recon social | |
snuck | 6.76196b6 | Automatic XSS filter bypass. | webapp | |
snyk | 1.1283.0 | CLI and build-time tool to find and fix known vulnerabilities in open-source dependencies. | code-audit scanner | |
soapui | 5.7.2 | The Swiss-Army Knife for SOAP Testing. | proxy fuzzer | |
socat | 1.8.0.1 | Multipurpose relay | networking | |
social-analyzer | 0.45 | Analyzing & finding a person's profile across social media websites. | social recon | |
social-mapper | 190.92be8da | A social media enumeration and correlation tool. | social recon | |
social-vuln-scanner | 11.91794c6 | Gathers public information on companies to highlight social engineering risk. | social recon | |
socialfish | 248.4795024 | Ultimate phishing tool with Ngrok integrated. | social | |
socialpwned | v2.0.1.r5.g6af3563 | OSINT tool that allows to get the emails, from a target, published in social networks. | social recon | |
socialscan | 128.5ae42d0 | Check email address and username availability on online platforms. | recon | |
socketfuzz | 26.089add2 | Simple socket fuzzer. | fuzzer | |
sockstat | 0.4.1 | A tool to let you view information about open connections. It is similar to the tool of the same name that is included in FreeBSD, trying to faithfully reproduce as much functionality as is possible. | networking | |
sonar-scanner | 4.8.0.2856 | Generic CLI tool to launch project analysis on SonarQube servers. | code-audit | |
soot | 3.4.0 | A Java Bytecode Analysis and Transformation Framework. | binary | |
sooty | 333.6cb15e6 | The SOC Analysts all-in-one CLI tool to automate and speed up workflow. | defensive recon social | |
sourcemapper | 37.467916e | Extract JavaScript source trees from Sourcemap files. | webapp | |
spade | 114 | A general-purpose Internet utility package, with some extra features to help in tracing the source of spam and other forms of Internet harassment. | windows scanner recon | |
spaf | 11.671a976 | Static Php Analysis and Fuzzer. | webapp fuzzer code-audit | |
spaghetti | 4:9.df39a11 | Web Application Security Scanner. | webapp scanner | |
sparta | 21.b0a4514 | Python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase. | scanner cracker fingerprint networking | |
spartan | 23.babdd7d | TCHunt-ng attempts to reveal encrypted files stored on a filesystem. The program is successful in finding TrueCrypt, VeraCrypt, CipherShed containers, EncFS encrypted files, PGP/GPG encrypted messages, OpenSSH and PEM private keys, password databases, and files made up of random data. | fingerprint fuzzer | |
sparty | 0.1 | An open source tool written in python to audit web applications using sharepoint and frontpage architecture. | webapp | |
spectools | 2010_04_R1 | Spectrum-Tools is a set of utilities for using the Wi-Spy USB spectrum analyzer hardware. Stable version. | wireless | |
speedpwn | 8.3dd2793 | An active WPA/2 Bruteforcer, original created to prove weak standard key generation in different ISP labeled routers without a client is connected. | cracker wireless | |
spf | 85.344ac2f | A python tool designed to allow for quick recon and deployment of simple social engineering phishing exercises. | social | |
spfmap | 8.a42d15a | A program to map out SPF and DKIM records for a large number of domains. | recon | |
spiderfoot | 4.0 | The Open Source Footprinting Tool. | recon | |
spiderpig-pdffuzzer | 0.1 | A javascript pdf fuzzer | fuzzer | |
spiga | 2:652.e2d8424 | Configurable web resource scanner. | webapp scanner | |
spike | 2.9 | IMMUNITYsec's fuzzer creation kit in C | fuzzer | |
spike-fuzzer | 2.9 | IMMUNITYsec's fuzzer creation kit in C. | fuzzer | |
spike-proxy | 148 | A Proxy for detecting vulnerabilities in web applications | webapp | |
spiped | 1.6.2 | A utility for creating symmetrically encrypted and authenticated pipes between socket addresses. | networking crypto | |
spipscan | 1:69.4ad3235 | SPIP (CMS) scanner for penetration testing purpose written in Python. | webapp scanner | |
splint | 3.1.2.git20180129 | A tool for statically checking C programs for security vulnerabilities and coding mistakes | code-audit | |
sploitctl | 1:3.0.4 | Fetch, install and search exploit archives from exploit sites like exploit-db and packetstorm. | automation exploitation | |
sploitego | 153.d9568dc | Maltego Penetration Testing Transforms. | fuzzer scanner | |
spoofcheck | 16.8cce591 | Simple script that checks a domain for email protections. | recon social | |
spooftooph | 0.5.2 | Designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain sight | bluetooth | |
spookflare | 24.19491b5 | Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures. | automation exploitation | |
spotbugs | 17479.03f0c07bd | A tool for static analysis to look for bugs in Java code. | code-audit | |
spray365 | 42.58fd193 | Makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. | cracker recon windows | |
spraycharles | 204.cda7eb0 | Low and slow password spraying tool, designed to spray on an interval over a long period of time. | cracker | |
sprayhound | 0.0.3 | Password spraying tool and Bloodhound integration. | networking scanner | |
sprayingtoolkit | 60.82e2ec8 | Scripts to make password spraying attacks against Lync/S4B & OWA a lot quicker, less painful and more efficient. | webapp scanner | |
spraykatz | 62.1fb3aa7 | Credentials gathering tool automating remote procdump and parse of lsass process. | exploitation | |
sps | 4.3 | A Linux packet crafting tool. Supports IPv4, IPv6 including extension headers, and tunneling IPv6 over IPv4. | networking dos fuzzer | |
spyse | 47.cd11ba9 | Python API wrapper and command-line client for the tools hosted on spyse.com. | recon | |
sqid | 0.3 | A SQL injection digger. | webapp | |
sqlbrute | 1.0 | Brute forces data out of databases using blind SQL injection. | fuzzer webapp | |
sqldict | 2.1 | A dictionary attack tool for SQL Server. | windows webapp | |
sqlivulscan | 249.cc8e657 | This will give you the SQLi Vulnerable Website Just by Adding the Dork. | scanner webapp | |
sqlmap | 1.8.8 | Automatic SQL injection and database takeover tool | webapp exploitation fuzzer | |
sqlninja | 0.2.999 | A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. | exploitation fuzzer webapp | |
sqlpat | 1.0.1 | This tool should be used to audit the strength of Microsoft SQL Server passwords offline. | cracker | |
sqlping | 4 | SQL Server scanning tool that also checks for weak passwords using wordlists. | windows webapp exploitation | |
sqlpowerinjector | 1.2 | Application created in .Net 1.1 that helps the penetration tester to find and exploit SQL injections on a web page. | windows webapp | |
sqlsus | 0.7.2 | An open source MySQL injection and takeover tool, written in perl | exploitation webapp | |
ssdeep | 2.14.1 | A program for computing context triggered piecewise hashes | crypto | |
ssdp-scanner | 1.0 | SSDP amplification scanner written in Python. Makes use of Scapy. | scanner networking | |
ssh-audit | 3.2.0 | SSH server auditing (banner, key exchange, encryption, mac, compression, compatbility, etc). | scanner | |
ssh-honeypot | 109.6307259 | Fake sshd that logs ip addresses, usernames, and passwords. | honeypot | |
ssh-mitm | 140.70998ba | SSH man-in-the-middle tool. | exploitation networking | |
ssh-privkey-crack | 0.4 | A SSH private key cracker. | cracker | |
ssh-user-enum | 7.ae453c1 | SSH User Enumeration Script in Python Using The Timing Attack. | scanner | |
sshatter | 1.2 | Password bruteforcer for SSH. | cracker | |
sshfuzz | 1.0 | A SSH Fuzzing utility written in Perl that uses Net::SSH2. | fuzzer | |
sshprank | 1.4.2 | A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan module. | cracker scanner fingerprint | |
sshscan | 1:1.0 | A horizontal SSH scanner that scans large swaths of IPv4 space for a single SSH user and pass. | cracker scanner | |
sshtrix | 0.0.3 | A very fast multithreaded SSH login cracker. | cracker | |
sshtunnel | 0.4.0 | Pure python SSH tunnels. | tunnel networking | |
sshuttle | 1.1.2 | Transparent proxy server that forwards all TCP packets over ssh | proxy networking | |
ssl-hostname-resolver | 1 | CN (Common Name) grabber on X.509 Certificates over HTTPS. | recon scanner | |
ssl-phuck3r | 2.0 | All in one script for Man-In-The-Middle attacks. | sniffer networking automation | |
sslcat | 1.0 | SSLCat is a simple Unix utility that reads and writes data across an SSL enable network connection. | misc | |
sslcaudit | 524.f218b9b | Utility to perform security audits of SSL/TLS clients. | scanner crypto | |
ssldump | 1.7 | an SSLv3/TLS network protocol analyzer | sniffer | |
sslh | 2.1.2 | SSL/SSH/OpenVPN/XMPP/tinc port multiplexer | networking | |
ssllabs-scan | 251.53cd76a | Command-line client for the SSL Labs APIs | scanner crypto | |
sslmap | 0.2.0 | A lightweight TLS/SSL cipher suite scanner. | scanner crypto | |
sslnuke | 5.c5faeaa | Transparent proxy that decrypts SSL traffic and prints out IRC messages. | cracker proxy | |
sslscan | 2.1.4 | A fast tools to scan SSL services, such as HTTPS to determine the ciphers that are supported | scanner crypto | |
sslscan2 | 702.a1b0292 | Tests SSL/TLS enabled services to discover supported cipher suites. | scanner | |
sslsniff | 0.8 | A tool to MITM all SSL connections on a LAN and dynamically generate certs for the domains that are being accessed on the fly | sniffer | |
sslstrip | 0.9 | Python tool to hijack HTTPS connections during a MITM attack. | proxy networking exploitation | |
sslyze | 6.0.0 | Python tool for analyzing the configuration of SSL servers and for identifying misconfigurations. | misc | |
ssma | 215.2a2b6bd | Simple Static Malware Analyzer. | malware | |
ssrf-proxy | 293.e79da7a | Facilitates tunneling HTTP communications through servers vulnerable to Server-Side Request Forgery. | proxy tunnel | |
ssrf-sheriff | 2.f95d691 | A simple SSRF-testing sheriff written in Go. | webapp proxy | |
ssrfmap | 115.36eb5a3 | Automatic SSRF fuzzer and exploitation tool. | webapp scanner fuzzer exploitation | |
stackflow | 2.2af525d | Universal stack-based buffer overfow exploitation tool. | exploitation | |
stacoan | 0.90 | Crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications. | mobile code-audit | |
stacs | 0.5.1.r0.g11f3503 | Static Token And Credential Scanner. | scanner misc | |
staekka | 9.57787ca | This plugin extends Metasploit for some missing features and modules allowing interaction with other/custom exploits/ways of getting shell access. | exploitation | |
stardox | 41.95b0a97 | Github stargazers information gathering tool. | recon | |
starttls-mitm | 7.b257756 | A mitm proxy that will transparently proxy and dump both plaintext and TLS traffic. | proxy sniffer networking | |
statsprocessor | 5:0.11 | A high-performance word-generator based on per-position Markov-attack. | automation | |
stegcracker | 2.1.0 | Steganography brute-force utility to uncover hidden data inside files. | stego | |
stegdetect | 20.28a4f07 | An automated tool for detecting steganographic content in images. | stego defensive forensic | |
steghide | 0.5.1 | Embeds a message in a file by replacing some of the least significant bits | anti-forensic | |
stegolego | 8.85354f6 | Simple program for using stegonography to hide data within BMP images. | stego | |
stegosip | 11.5cda6d6 | TCP tunnel over RTP/SIP. | tunnel networking stego | |
stegoveritas | 1.10 | Automatic image steganography analysis tool. | stego | |
stegseek | 1:v0.6.r10.g5896978 | Lightning fast steghide cracker. | stego | |
stegsolve | 1.3 | Steganography Solver. | stego | |
stenographer | 486.355604b | A packet capture solution which aims to quickly spool all packets to disk, then provide simple, fast access to subsets of those packets. | sniffer networking forensic | |
stepic | 0.4 | A python image steganography tool. | stego | |
stews | 1.0.0.r7.gc7bba5a | A Security Tool for Enumerating WebSockets. | webapp scanner fingerprint fuzzer | |
sticky-keys-hunter | 15.c816fc9 | Script to test an RDP host for sticky keys and utilman backdoor. | scanner | |
stig-viewer | 2.8 | XCCDF formatted SRGs and STIGs files viewer for SCAP validation tools. | scanner | |
stompy | 0.0.4 | An advanced utility to test the quality of WWW session identifiers and other tokens that are meant to be unpredictable. | misc | |
stoq | 769.8bfc78b | An open source framework for enterprise level automated analysis. | code-audit | |
storm-ring | 0.1 | This simple tool is useful to test a PABX with "allow guest" parameter set to "yes" (in this scenario an anonymous caller could place a call). | voip scanner | |
stowaway | v2.2.r34.g33010c6 | A Multi-hop proxy tool for security researchers and pentesters. | proxy exploitation | |
strace | 6.10 | A diagnostic, debugging and instructional userspace tracer | binary | |
streamfinder | 1.2 | Searches for Alternate Data Streams (ADS). | windows | |
striker | 85.87c184d | An offensive information and vulnerability scanner. | scanner recon webapp | |
stringsifter | 39.33c0cd5 | Machine learning tool that automatically ranks strings based on their relevance for malware analysis. | binary forensic | |
striptls | 55.5ec712c | Proxy PoC implementation of STARTTLS stripping attacks. | proxy | |
strutscan | 4.8712c12 | Apache Struts2 vulnerability scanner written in Perl. | scanner | |
stunnel | 5.72 | A program that allows you to encrypt arbitrary TCP connections inside SSL | networking tunnel | |
stunner | v0.5.8.r35.gda12465 | Test and exploit STUN, TURN and TURN over TCP servers. | networking webapp | |
sub7 | 2.2 | A remote administration tool. No further comments ;-) | windows backdoor | |
subbrute | 1.2.1 | A DNS meta-query spider that enumerates DNS records and subdomains | scanner | |
subdomainer | 1.2 | A tool designed for obtaining subdomain names from public sources. | recon scanner | |
subfinder | 1:v2.6.3.r497.gbb127fb | Modular subdomain discovery tool that can discover massive amounts of valid subdomains for any target. | recon | |
subjack | 182.49c51e5 | Subdomain Takeover tool written in Go. | scanner | |
subjs | 45.76ce9ec | Fetches javascript file from a list of URLS or subdomains. | webapp recon | |
sublert | 67.56d2a12 | A security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate. | recon | |
sublist3r | 138.729d649 | A Fast subdomains enumeration tool for penetration testers. | recon scanner | |
subover | 71.3d258e2 | A Powerful Subdomain Takeover Tool. | scanner recon | |
subscraper | 2:34.29aa5cc | Tool that performs subdomain enumeration through various techniques. | recon scanner | |
subterfuge | 2:64.69dda99 | Automated Man-in-the-Middle Attack Framework | exploitation | |
sucrack | 1.2.3 | A multi-threaded Linux/UNIX tool for brute-force cracking local user accounts via su | cracker | |
suid3num | 60.2241c9c | Python script which utilizes python's built-in modules to enumerate SUID binaries. | exploitation | |
sulley | 4:1.0.bff0dd1 | A pure-python fully automated and unattended fuzzing framework. | fuzzer | |
superscan | 4.1 | Powerful TCP port scanner, pinger, resolver. | windows scanner recon | |
suricata | 6.0.20 | An Open Source Next Generation Intrusion Detection and Prevention Engine. | defensive | |
suricata-verify | 1332.bda90c62 | Suricata Verification Tests - Testing Suricata Output. | misc ids | |
svn-extractor | 45.6829804 | A simple script to extract all web resources by means of .SVN folder exposed over network. | scanner | |
swaks | 20240103.0 | Swiss Army Knife SMTP; Command line SMTP testing, including TLS and AUTH | networking | |
swamp | 59.3c8be65 | An OSINT tool for discovering associated sites through Google Analytics Tracking IDs. | recon | |
swap-digger | 51.4d18ce0 | A tool used to automate Linux swap analysis during post-exploitation or forensics. | forensic | |
swarm | 1:41.1713c1e | A distributed penetration testing tool. | scanner recon cracker exploitation webapp | |
swfintruder | 0.9.1 | First tool for testing security in Flash movies. A runtime analyzer for SWF external movies. It helps to find flaws in Flash. | reversing | |
swftools | 0.9.2 | A collection of SWF manipulation and creation utilities | binary reversing webapp | |
syborg | 36.5cd010b | Recursive DNS Subdomain Enumerator with dead-end avoidance system. | recon | |
syft | 814.5e5312c | A CLI tool and go library for generating a Software Bill of Materials (SBOM) from container images and filesystems. | forensic | |
sylkie | 1:0.0.4.r3.g1cf170f | IPv6 address spoofing with the Neighbor Discovery Protocol. | spoof networking | |
syms2elf | 12.329c2ce | A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table. | reversing disassembler binary | |
synflood | 0.1 | A very simply script to illustrate DoS SYN Flooding attack. | dos | |
synner | 1.1 | A custom eth->ip->tcp packet generator (spoofer) for testing firewalls and dos attacks. | spoof dos | |
synscan | 5.02 | fast asynchronous half-open TCP portscanner | scanner | |
syringe | 12.79a703e | A General Purpose DLL & Code Injection Utility. | backdoor binary windows | |
sysdig | 0.38.1 | Open source system-level exploration and troubleshooting tool | recon | |
sysinternals-suite | 1:6.4 | Sysinternals tools suite. | windows | |
t50 | 5.8.7 | Experimental Multi-protocol Packet Injector Tool. | dos networking | |
tabi | 13.068a406 | BGP Hijack Detection. | defensive networking | |
tachyon-scanner | 467.0145e92 | Fast Multi-Threaded Web Discovery Tool. | scanner | |
tactical-exploitation | 95.7bbcb5d | Modern tactical exploitation toolkit. | scanner exploitation recon sniffer | |
taipan | 1:2.9.498.18 | Web application security scanner. | scanner webapp | |
takeover | 98.a058647 | Sub-Domain TakeOver Vulnerability Scanner. | scanner | |
talon | v3.1.r1.g8acc175 | A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment. | cracker windows | |
taof | 0.3.2 | Taof is a GUI cross-platform Python generic network protocol fuzzer. | fuzzer | |
tbear | 1.5 | Transient Bluetooth Environment Auditor includes an ncurses-based Bluetooth scanner (a bit similar to kismet), a Bluetooth DoS tool, and a Bluetooth hidden device locator. | bluetooth | |
tcgetkey | 0.1 | A set of tools that deal with acquiring physical memory dumps via FireWire and then scan the memory dump to locate TrueCrypt keys and finally decrypt the encrypted TrueCrypt container using the keys. | dos | |
tchunt-ng | 208.b8cf7fc | Reveal encrypted files stored on a filesystem. | forensic crypto | |
tckfc | 23.911e92e | TrueCrypt key file cracker. | cracker | |
tcpcontrol-fuzzer | 2:0.1 | 2^6 TCP control bit fuzzer (no ECN or CWR). | fuzzer networking | |
tcpcopy | 1262.70ed2ea | A TCP stream replay tool to support real testing of Internet server applications. | networking | |
tcpdstat | 4.be5bd28 | Get protocol statistics from tcpdump pcap files. | networking | |
tcpdump | 4.99.5 | A tool for network monitoring and data acquisition | networking sniffer | |
tcpextract | 1.1 | Extracts files from captured TCP sessions. Support live streams and pcap files. | networking | |
tcpflow | 1.6.1 | Captures data transmitted as part of TCP connections then stores the data conveniently | networking sniffer | |
tcpick | 0.2.1 | TCP stream sniffer and connection tracker | sniffer | |
tcpjunk | 2.9.03 | A general tcp protocols testing and hacking utility. | exploitation fuzzer | |
tcpreplay | 4.4.3 | Gives the ability to replay previously captured traffic in a libpcap format | networking | |
tcptrace | 6.6.7 | A TCP dump file analysis tool | networking | |
tcptraceroute | 1.5beta7 | A traceroute implementation using TCP packets. | networking | |
tcpwatch | 1.3.1 | A utility written in Python that lets you monitor forwarded TCP connections or HTTP proxy connections. | networking | |
tcpxtract | 1.0.1 | A tool for extracting files from network traffic. | misc | |
teamsuserenum | v1.0.r1.g0c8b6c2 | User enumeration with Microsoft Teams API | recon | |
teardown | 1.0 | Command line tool to send a BYE request to tear down a call. | voip | |
tekdefense-automater | 88.42548cf | IP URL and MD5 OSINT Analysis | forensic | |
tell-me-your-secrets | 1:v2.4.2.r3.g5434b9d | Find secrets on any machine from over 120 Different Signatures. | code-audit forensic | |
tempomail | 26.5600ec3 | Tool to create a temporary email address in 1 Second and receive emails. | misc | |
termineter | 203.9311d6d | Smart meter testing framework | fuzzer | |
terminus-font-ttf | 4.47.0 | Monospaced bitmap font designed for long work with computers (TTF version, mainly for Java applications). | misc | |
testdisk | 7.2 | Checks and undeletes partitions + PhotoRec, signature based recovery tool | forensic | |
testssl | 1:2.9.5 | Testing TLS/SSL encryption. | crypto scanner | |
testssl.sh | 3.0.9 | Testing TLS/SSL encryption | crypto scanner | |
tfsec | v0.63.1.r399.g4476b18b3 | Security scanner for your Terraform code. | defensive scanner | |
tftp-bruteforce | 0.1 | TFTP-bruteforcer is a fast TFTP filename bruteforcer written in perl. | cracker | |
tftp-fuzz | 1:1337 | Master TFTP fuzzing script as part of the ftools series of fuzzers. | fuzzer | |
tftp-proxy | 0.1 | This tool accepts connection on tftp and reloads requested content from an upstream tftp server. Meanwhile modifications to the content can be done by pluggable modules. So this one's nice if your mitm with some embedded devices. | proxy networking | |
tgcd | 1.1.1 | TCP/IP Gender Changer Daemon utility. | networking | |
thc-ipv6 | 3.8 | Complete tool set to attack the inherent protocol weaknesses of IPv6 and ICMP6 | networking recon dos spoof scanner | |
thc-keyfinder | 1.0 | Finds crypto keys, encrypted data and compressed data in files by analyzing the entropy of parts of the file. | cracker | |