New: bestgithubhackingtoolsAll contenthive-129948hive-196917krsteemzzanhive-183959hive-180932photographyhive-166405hive-185836uncommonlabhive-150122lifehive-183397hive-144064bitcoinhive-188619krsuccesshive-139150hive-101145hive-103599hive-124908hive-180301hive-109690hive-184714TrendingNewHotLikerstwr (53)in bestethicalhackertools • 5 years agoFfuf (Fuzz Faster U Fool) - An Open Source Fast Web Fuzzing ToolFfuf - Fuzz Faster U Fool is a great tool used for fuzzing. It has become really popular lately with bug bounty hunters. Ffuf is used for fuzzing Get and Post data but can also be used for finding…twr (53)in bestethicalhackertools • 5 years agoNmap Automator - a tool I used during OSCP for simple reconNmap Automator is a great tool for initial port scans of a given ip address. It automates the scan techniques which I use on each host, I selected it over any other similar tool since it avoids…twr (53)in bestgithubhackingtools • 5 years agoTurbolist3r - An Automated Subdomain Scanning ToolTurbolist3r is a subdomain enumeration tool which can identify subdomain takeovers. It is heavily based on sublist3r: Installation and usage git clone cd Turbolist3r/ pip3 install -r…twr (53)in bestethicalhackertools • 5 years agowebscreenshot.py | A Simple script that aids in testing large websitesWeb Screenshot - webscreenshot.py is a great tool which comes in handy when a penetration tester needs to quickly identify potential vulnerabilities on a massive website. Installation and usage…twr (53)in bestgithubhackingtools • 5 years agoFinalRecon - An All In One OSINT Tool for Web ReconnaissanceFinal Recon is a useful tool for gathering data about a target from open source resources, the tool is written in Python3. Installation steps It is really easy to install the tool from the…twr (53)in bestgithubhackingtools • 5 years agoDSXS | An open source, simple and effective XSS scanner that can be easily customizedDamn Small XSS Scanner (DSXS) is a great tool for finding cross site scripting vulnerabilities, the tool has been developed in Python 3. It is really simple and the code can be analysed and used for…twr (53)in bestgithubhackingtools • 5 years agoBoomER | An Open Source Post-Exploitation Tool To Exploit Local VulnerabilitiesBoomER is a Command-line interface python open-source framework fully developed in Python 3.X for post-exploitation of targets with the objective to exploit local vulnerabilities on the big three…twr (53)in 4canv2demonstration • 5 years ago4CAN V2 | A Raspberry Pi Project To Help Find Vulnerabilities in Modern Cars4CAN V2 is a Raspberry Pi project created by the Cisco team in order to test the security of cars via the 4CAN bus, it can also send random payloads to automate this process. Background In the…twr (53)in bestgithubhackingtools • 5 years agoSalsa-tools | A Collaboration of Tools For a Reverse Shell on SteroidsSalsa-tools is a collection of three tools programmed with C# used to take over a windows machine and bypass AV and get a reverse shell without the need for PowerShell on the victim machine.…twr (53)in aquatonedemonstration • 5 years agoAquatone | An Open Source Domain Flyover ToolAquatone is a tool programmed by go-lang to inspect domains/check their status and also provide screenshots of the hosts it supports with numerous hosts at the same time. Installation 1 -…twr (53)in bestgithubhackingtools • 5 years agoA Malware Showcase | Understanding Malware With PythonMalware showcase is a Github repository that contains examples of malware usage and behavior, this repo should be used only for educational purposes or for experts who wish to expand on the usage…twr (53)in bestgithubhackingtools • 5 years agoA Malware Showcase | Understanding Malware With PythonMalware showcase is a Github repository that contains examples of malware usage and behavior, this repo should be used only for educational purposes or for experts who wish to expand on the usage…twr (53)in automation • 5 years agoDumpsterFire - A Tool That Generates Network Shenanigans to Facilitate Blue Team TrainingDumpsterFire is an open-source tool made by blue team member to edit create and control dumpster payloads in order to create surface attacks and also facilitate the blue team process, its main…twr (53)in bestgithubhackingtools • 5 years agoCMSeeK | An Open Source Content Management System Detection and Exploitation ToolCMSeek is an open-source tool that analyzes the regex of websites in order to detect flaws and content management system used like Joomla, Wordpress, Magento, etc ... Installation git…twr (53)in bestgithubhackingtools • 5 years agoSniffAir - An Open Source Wireless Security FrameworkSniffAir is an open source tool made for sophisticated wireless attacks and data capture, it handle all types of pcap files and analyze traffic through the network interface whilst looking for…twr (53)in bestgithubhackingtools • 5 years agoWhatWeb – A Very Handy Open Source Web ScannerDefinition Whatweb is web scanner written in Ruby to identify and recognise technologies used by a website including CMS, blogging platforms, statistic/analytics packages, Javascript libraries and…twr (53)in bestgithubhackingtools • 5 years agoWifi Pumpkin – WiFi MITM Attack and Audit FrameworkWifi Pumpkin is a security audit framework used to test the security of wifi against threats like man in the middle attacks. The tool also can create rogue Wi-Fi access points, deauth attacks on…twr (53)in bestgithubhackingtools • 5 years agoTheFatRat - A Convenient Exploitation ToolTheFatRat is an easy to use tool which helps in generating backdoors, system exploitation, post exploitation attacks, browser attacks, DLL files, FUD payloads against Linux, Mac OS X, Windows, and…twr (53)in berootdemonstration • 5 years agoBeRoot - A Post Exploitation Privilege Escalation ToolBeRoot is a post-exploitation tool to check for common misconfigurations which can allow an attacker to escalate their privileges. The main goal of BeRoot is to print only the information that has…twr (53)in bestgithubhackingtools • 5 years agoCloakify - A Tool to Mask Your Data in Plain SightCloakify Factory is a tool to transforms any file type into a list of harmless and even useless looking strings. This ability allows for you to hide a data file in plain sight and also transfer it…