nagaxor's Stars
swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
MatrixTM/MHDDoS
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
threat9/routersploit
Exploitation Framework for Embedded Devices
projectdiscovery/katana
A next-generation crawling and spidering framework.
OJ/gobuster
Directory/File, DNS and VHost busting tool written in Go
samratashok/nishang
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
epi052/feroxbuster
A fast, simple, recursive content discovery tool written in Rust.
s0md3v/Arjun
HTTP parameter discovery suite.
commixproject/commix
Automated All-in-One OS Command Injection Exploitation Tool.
vavkamil/awesome-bugbounty-tools
A curated list of various bug bounty tools
t3l3machus/Villain
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
trustedsec/unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
jtesta/ssh-audit
SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
LandGrey/pydictor
A powerful and useful hacker dictionary builder for a brute-force attack
sensepost/gowitness
🔍 gowitness - a golang, web screenshot utility using Chrome Headless
mrd0x/BITB
Browser In The Browser (BITB) Templates
f0rb1dd3n/Reptile
LKM Linux rootkit
devanshbatham/ParamSpider
Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing
m0rtem/CloudFail
Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
screetsec/Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
skavngr/rapidscan
:new: The Multi-Tool Web Vulnerability Scanner.
hahwul/XSpear
🔱 Powerfull XSS Scanning and Parameter analysis tool&gem
r00t-3xp10it/FakeImageExploiter
Use a Fake image.jpg to exploit targets (hide known file extensions)
projectdiscovery/asnmap
Go CLI and Library for quickly mapping organization network ranges using ASN information.
arxhr007/Aliens_eye
Hunt down 570 social media accounts
ptrkrysik/multi-rtl
Multi-channel receiver with use of RTL-SDR dongles
cyberteach360/Hacking-Wordpress