BabySploit Beginner Pentesting Toolkit/Framework Written in Python
☆1,043Dec 11, 2019Updated 6 years ago
Alternatives and similar repositories for BabySploit
Users that are interested in BabySploit are comparing it to the libraries listed below
Sorting:
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,595Jun 20, 2024Updated last year
- Incredibly fast crawler designed for OSINT.☆12,698Feb 10, 2026Updated 2 weeks ago
- A Social Media Enumeration & Correlation Tool by Jacob Wilkin(Greenwolf)☆3,977Feb 25, 2022Updated 4 years ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,514Jun 10, 2025Updated 8 months ago
- Most advanced XSS scanner.☆14,773Apr 26, 2025Updated 10 months ago
- Automated Mass Exploiter☆5,211May 22, 2023Updated 2 years ago
- A Modern Orchestration Engine for Security☆6,109Feb 19, 2026Updated last week
- A swiss army knife for pentesting networks☆9,082Dec 6, 2023Updated 2 years ago
- Reconnaissance Swiss Army Knife☆2,015Jan 26, 2021Updated 5 years ago
- File upload vulnerability scanner and exploitation tool.☆3,300May 8, 2025Updated 9 months ago
- Bash post exploitation toolkit☆743Jul 19, 2023Updated 2 years ago
- Hacking Toolkit☆973Dec 30, 2025Updated 2 months ago
- Active Directory Assessment and Privilege Escalation Script☆1,132Dec 7, 2022Updated 3 years ago
- Know the dangers of credential reuse attacks.☆2,094Dec 9, 2025Updated 2 months ago
- A tool to automate penetration tests☆382Mar 9, 2024Updated last year
- Attack Surface Management Platform☆9,418Feb 15, 2026Updated 2 weeks ago
- Official Black Hat Arsenal Security Tools Repository☆4,231Aug 26, 2024Updated last year
- An open-source post-exploitation framework for students, researchers and developers.☆9,431Feb 20, 2026Updated last week
- articles☆13,705Apr 3, 2023Updated 2 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,821Nov 19, 2024Updated last year
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Find exploits in local and online databases instantly☆1,809Sep 27, 2021Updated 4 years ago
- Find exploit tool☆1,024Aug 30, 2022Updated 3 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,150Sep 29, 2025Updated 5 months ago
- Embedding a "UAC-Bypassing" function into your custom payload☆98Aug 13, 2022Updated 3 years ago
- Infection Monkey - An open-source adversary emulation platform☆6,956May 1, 2025Updated 10 months ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,392Feb 10, 2021Updated 5 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,296Dec 23, 2018Updated 7 years ago
- The Offensive Manual Web Application Penetration Testing Framework.☆1,849Apr 19, 2023Updated 2 years ago
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor a…☆1,178Oct 20, 2022Updated 3 years ago
- The Shadow Attack Framework☆1,116Sep 4, 2022Updated 3 years ago
- Red Team Tool Kit☆1,133Dec 8, 2022Updated 3 years ago
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☆5,460Dec 12, 2024Updated last year
- Tools, scripts and tips useful during Penetration Testing engagements.☆637Dec 8, 2025Updated 2 months ago
- Exploitation Framework for Embedded Devices☆13,002Jun 10, 2025Updated 8 months ago
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,528Jun 4, 2025Updated 8 months ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,322Dec 6, 2023Updated 2 years ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,446May 6, 2024Updated last year
- The best way to scan for weak ssh passwords on your network☆619Dec 18, 2023Updated 2 years ago