BabySploit Beginner Pentesting Toolkit/Framework Written in Python
☆1,039Dec 11, 2019Updated 6 years ago
Alternatives and similar repositories for BabySploit
Users that are interested in BabySploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,655Jun 20, 2024Updated last year
- Incredibly fast crawler designed for OSINT.☆12,832Feb 10, 2026Updated 2 months ago
- A Social Media Enumeration & Correlation Tool by Jacob Wilkin(Greenwolf)☆4,015Feb 25, 2022Updated 4 years ago
- Most advanced XSS scanner.☆14,913Apr 26, 2025Updated last year
- Automated Mass Exploiter☆5,229May 22, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,541Apr 21, 2026Updated last week
- A swiss army knife for pentesting networks☆9,129Dec 6, 2023Updated 2 years ago
- Bash post exploitation toolkit☆747Apr 1, 2026Updated last month
- A Modern Orchestration Engine for Security☆6,211Apr 15, 2026Updated 2 weeks ago
- Hacking Toolkit☆978Dec 30, 2025Updated 4 months ago
- Ocean Tweak for Sileo☆10Jan 18, 2019Updated 7 years ago
- File upload vulnerability scanner and exploitation tool.☆3,317May 8, 2025Updated 11 months ago
- Find exploits in local and online databases instantly☆1,811Sep 27, 2021Updated 4 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The best way to scan for weak ssh passwords on your network☆620Dec 18, 2023Updated 2 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆248Sep 9, 2021Updated 4 years ago
- Attack Surface Management Platform☆9,715Feb 15, 2026Updated 2 months ago
- Active Directory Assessment and Privilege Escalation Script☆1,128Dec 7, 2022Updated 3 years ago
- Automatic UAC-Bypassing for custom payloads during privilege escalation testing☆97Aug 13, 2022Updated 3 years ago
- Reconnaissance Swiss Army Knife☆2,042Jan 26, 2021Updated 5 years ago
- articles☆13,795Apr 3, 2023Updated 3 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,832Nov 19, 2024Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,272Sep 29, 2025Updated 7 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- An open-source post-exploitation framework for students, researchers and developers.☆9,461Apr 2, 2026Updated 3 weeks ago
- Know the dangers of credential reuse attacks.☆2,103Dec 9, 2025Updated 4 months ago
- A tool to automate penetration tests☆382Mar 9, 2024Updated 2 years ago
- Official Black Hat Arsenal Security Tools Repository☆4,272Aug 26, 2024Updated last year
- The Shadow Attack Framework☆1,117Sep 4, 2022Updated 3 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,190Dec 11, 2022Updated 3 years ago
- Tools, scripts and tips useful during Penetration Testing engagements.☆643Dec 8, 2025Updated 4 months ago
- Exploitation Framework for Embedded Devices☆13,097Mar 2, 2026Updated last month
- an asynchronous target enumeration tool☆249Dec 8, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,297Dec 23, 2018Updated 7 years ago
- Striker is an offensive information and vulnerability scanner.☆2,331Jun 4, 2023Updated 2 years ago
- The Offensive Manual Web Application Penetration Testing Framework.☆1,856Apr 19, 2023Updated 3 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,770Dec 9, 2025Updated 4 months ago
- Infection Monkey - An open-source adversary emulation platform☆6,995May 1, 2025Updated last year
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☆5,524Dec 12, 2024Updated last year
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆278Aug 24, 2023Updated 2 years ago