Tuhinshubhra / RED_HAWK
All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers
β2,977Updated last month
Related projects: β
- Automatically brute force all services running on a target.β1,916Updated last month
- Th3Inspector π΅οΈ Best Tool For Information Gathering πβ2,222Updated 11 months ago
- Phishing Tool & Information Collectorβ4,015Updated 5 months ago
- Reconnaissance Swiss Army Knifeβ1,784Updated 3 years ago
- Attack Surface Management Platformβ7,936Updated last month
- X Attacker Tool β£ Website Vulnerability Scanner & Auto Exploiterβ1,546Updated 11 months ago
- Tools for Pentestingβ1,935Updated 10 months ago
- Phishing Campaign Toolkitβ2,212Updated last month
- π Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.β2,019Updated 11 months ago
- Efficient and advanced man in the middle frameworkβ2,015Updated last year
- Advanced dork Search & Mass Exploit Scannerβ1,397Updated last month
- β2,686Updated this week
- The LAZY script will make your life easier, and of course faster.β4,033Updated 3 years ago
- Websploit is a high level MITM frameworkβ1,115Updated last year
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etβ¦β9,295Updated 6 months ago
- Common User Passwords Profiler (CUPP)β4,411Updated 9 months ago
- Generate unicode domains for IDN Homograph Attack and detect them.β1,110Updated 2 years ago
- Transparent proxy through Tor for Kali Linux OSβ1,013Updated 5 months ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related emailβ4,113Updated last year
- All In One Web Reconβ2,214Updated 3 weeks ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on βLoginβ¦β1,346Updated 10 months ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.β2,734Updated last month
- A port of ParrotSec's stealth and anonsurf modules to Kali Linuxβ1,522Updated 8 months ago
- A powerful and useful hacker dictionary builder for a brute-force attackβ3,256Updated 9 months ago
- Striker is an offensive information and vulnerability scanner.β2,211Updated last year
- β945Updated last year
- Find exploits in local and online databases instantlyβ1,611Updated 2 years ago
- β1,825Updated this week