UCYBERS / Awesome-Blackhat-ToolsLinks
A curated list of tools officially presented at Black Hat events
☆224Updated last week
Alternatives and similar repositories for Awesome-Blackhat-Tools
Users that are interested in Awesome-Blackhat-Tools are comparing it to the libraries listed below
Sorting:
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆70Updated last week
- A Powerful Network Reconnaissance Tool for Security Professionals☆101Updated 5 months ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆230Updated 3 weeks ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆85Updated 2 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆83Updated last month
- ☆184Updated 2 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆185Updated last year
- Search engine for CTF writeups with instant results.☆144Updated 3 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆190Updated last week
- ☆492Updated last week
- ☆159Updated last month
- Dredging up secrets from the depths of the file system☆127Updated 7 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆198Updated 2 months ago
- Collection of all previous 1337UP CTF challenges.☆74Updated 5 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆279Updated last week
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆672Updated last month
- Lab used for workshop and CTF☆250Updated last month
- ☆102Updated 2 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆123Updated 4 months ago
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆224Updated 3 weeks ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆93Updated 3 weeks ago
- Search for all leaked keys/secrets using one regex! bugbounty☆129Updated 2 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆120Updated 2 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆385Updated 2 months ago
- Everything from my OSEP study.☆167Updated 5 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆175Updated 7 months ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆214Updated 6 months ago
- ☆148Updated 2 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆95Updated 2 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆251Updated last month