New: githubhackertoolsAll contenthive-129948krhive-196917zzanhive-183959hive-185836steemhive-180932photographyhive-101145hive-150122uncommonlabhive-183397hive-144064hive-184714krsuccesshive-193637hive-145157hive-188619bitcoinhive-103599hive-193186hive-180301lifehive-166405TrendingNewHotLikerstwr (53)in bestgithubhackingtools • 5 years agoTurbolist3r - An Automated Subdomain Scanning ToolTurbolist3r is a subdomain enumeration tool which can identify subdomain takeovers. It is heavily based on sublist3r: Installation and usage git clone cd Turbolist3r/ pip3 install -r…twr (53)in bestgithubhackingtools • 5 years agoSalsa-tools | A Collaboration of Tools For a Reverse Shell on SteroidsSalsa-tools is a collection of three tools programmed with C# used to take over a windows machine and bypass AV and get a reverse shell without the need for PowerShell on the victim machine.…twr (53)in bestgithubhackingtools • 5 years agoWhatWeb – A Very Handy Open Source Web ScannerDefinition Whatweb is web scanner written in Ruby to identify and recognise technologies used by a website including CMS, blogging platforms, statistic/analytics packages, Javascript libraries and…twr (53)in bestgithubhackingtools • 5 years agoWifi Pumpkin – WiFi MITM Attack and Audit FrameworkWifi Pumpkin is a security audit framework used to test the security of wifi against threats like man in the middle attacks. The tool also can create rogue Wi-Fi access points, deauth attacks on…twr (53)in bestgithubhackingtools • 5 years agoTheFatRat - A Convenient Exploitation ToolTheFatRat is an easy to use tool which helps in generating backdoors, system exploitation, post exploitation attacks, browser attacks, DLL files, FUD payloads against Linux, Mac OS X, Windows, and…twr (53)in bestgithubhackingtools • 6 years agoReconnoitre - A Multithreaded Enumeration ToolReconnoitre is a tool that was created to automate routine actions within the OSCP lab environment. It is a simple script, which can automate information gathering and service enumeration. It…twr (53)in bestgithubhackingtools • 6 years agoMassBleed – An Open Source SSL Vulnerability ScannerMassBleed is an open source tool used for scanning SSL vulnerabilities in web applications. The tool can scan Heartbleed, CCS, Poodle, Winshock, and DROWN attack vulnerabilities in target web…twr (53)in bestgithubhackingtools • 6 years agoSherlock - A Tool To Find Usernames Across Social NetworksWith Sherlock you can search across a vast number of social platforms for a username. This is useful for information gathering purposes, if you want to perform a sophisticated social engineering…twr (53)in bestgithubhackingtools • 6 years agoWebvulnscan – An Automated Web Application Vulnerability ScannerWebvulnscan is a web application scanner that automates vulnerability assessment tasks. The tool can automatically detect different web application vulnerabilities including Cross Site Scripting…twr (53)in bestgithubhackingtools • 6 years agoModlishka - An Open Source Phishing Tool With 2FA AuthenticationModlishka is a go based phishing proxy that takes your phishing campaigns to the next level. The main feature that makes it different from the other phishing tools, is that it supports 2FA…twr (53)in bestgithubhackingtools • 6 years agoSitadel - An Open Source Tool for Finding Web Application VulnerabilitiesSitadel is a python based web application scanner. It's flexible and has many different scanning options. It can get a full fingerprint of a server and bruteforce directories, admin pages, files…twr (53)in bestgithubhackingtools • 6 years agoWinpayloads - An Open Source Tool for Generating Windows PayloadsWinpayloads is a python based tool which combines some of the Powershell Empire features along with the metasploit framework to create windows payloads. It is simple to use and has some interesting…twr (53)in bestgithubhackingtools • 6 years agoJoomscan - Open Source Joomla Vulnerability ScannerJoomscan is a scanner by OWASP, which aims to automate the task for vulnerability assessments for Joomla based sites. Based in perl, this tool can enumerate the version, vulnerabilities, components…twr (53)in bestgithubhackingtools • 6 years agoPythem - Web and Network Security Audit FrameworkPythem is a python framework used for performing various security tests on networks and web applications. These include scanning, web crawling, web application bruteforcing, ARP spoofing, DNS…twr (53)in bestgithubhackingtools • 6 years agoUniscan – Web Applications Penetration Testing ToolUniscan is an open source tool capable of scanning web applications for critical vulnerabilities, such as sql injection, blind sql injection, cross site scripting, remote file inclusion, web shell…twr (53)in bestgithubhackingtools • 6 years agoHabu – Open Source Network Penetration Testing ToolkitHabu is an open source penetration testing toolkit that can perform various penetration testing tasks related to networks. These include ARP poisoning, ARP sniffing, SNMP cracking, fake FTP server…twr (53)in bestgithubhackingtools • 6 years agoMorpheus –TCP/UDP Manipulation FrameworkMorpheus is an open source framework that can launch multiple attacks on the network using applications, such as ettercap, msgsnarf, tcpkill, and urlsnarf. The tool’s main objective is to manipulate…twr (53)in bestgithubhackingtools • 6 years agoXSStrike – XSS Detection and Exploitation SuiteXSStrike is an open source tool that detects Cross Site Scripting vulnerabilities and exploits them. The tool is equipped with a powerful fuzzing engine that increases the accuracy of the tool. The…twr (53)in bestgithubhackingtools • 6 years agoWifi Pumpkin – Wifi Security Audit FrameworkWifi Pumpkin is a security audit framework used to test the security of wifi against threats like man in the middle attacks. The tool creates fake access points to utilise MITM attacks on the wifi…twr (53)in bestgithubhackingtools • 6 years agoLeviathan – Mass Audit Toolkit for Networks and ApplicationsLeviathan is an open source toolkit that can be used for auditing networks and web applications. The types of audits that can be performed with Leviathan include discovery of services running on…