A curated list of tools officially presented at Black Hat events
β782Jul 8, 2025Updated 8 months ago
Alternatives and similar repositories for Awesome-Blackhat-Tools
Users that are interested in Awesome-Blackhat-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.β111May 30, 2025Updated 9 months ago
- π‘οΈ High-performance WAF & CDN detection tool. Identify protection layers (Cloudflare, Akamai, AWS, Fastly, and more), run effectiveness β¦β111Mar 9, 2026Updated 2 weeks ago
- Web Server Vulnerability Scanning Toolβ36Mar 11, 2025Updated last year
- Easier way to use advanced search syntax on common search engines like Google, Yandex, DuckDuckGo and more.β29Dec 1, 2025Updated 3 months ago
- β381Sep 20, 2025Updated 6 months ago
- Simple, predictable pricing with DigitalOcean hosting β’ AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- π₯οΈ Windows π A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during β¦β54Jan 26, 2026Updated 2 months ago
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wiβ¦β30Feb 23, 2026Updated last month
- β163Updated this week
- β147Jun 9, 2025Updated 9 months ago
- USRLINKS v1.0 - The Ultimate Username Reconnaissance Toolβ24Oct 6, 2025Updated 5 months ago
- A meta-list of public references to threat actor profiles and APT group datasets.β76Oct 2, 2025Updated 5 months ago
- β43Jul 17, 2025Updated 8 months ago
- Advanced SQLMap command builder with an intuitive cheatsheet UI. Works locally in your browser as a single HTML file (no data sent anywheβ¦β32Jul 6, 2025Updated 8 months ago
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Calβ¦β256Jun 10, 2025Updated 9 months ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates β¦β123Jul 19, 2025Updated 8 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrencyβ15Nov 13, 2025Updated 4 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. β¦β110Jul 21, 2025Updated 8 months ago
- Autonomous AI C2β33Jul 23, 2024Updated last year
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evictβ¦β157Mar 5, 2026Updated 3 weeks ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged objectβ¦β342Mar 16, 2026Updated last week
- Conference presentation slidesβ2,378Nov 15, 2025Updated 4 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.β52Mar 16, 2026Updated last week
- Halberd : Multi-Cloud Agentic Attack Toolβ335Jan 12, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- AI Red Teaming playground labs to run AI Red Teaming trainings including infrastructure.β1,877Feb 13, 2026Updated last month
- PoC shadow SaaS and insecure credential detection system using a browser extension.β42Feb 8, 2026Updated last month
- OOB listener powered by cloudflare workersβ12Apr 13, 2025Updated 11 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many portsβ60Jul 13, 2025Updated 8 months ago
- ReconX is a powerful automated reconnaissance and vulnerability scanning tool designed for ethical hackers, penetration testers, and secuβ¦β16Feb 27, 2025Updated last year
- Automated web vulnerability scanning with LLM agentsβ457Jun 18, 2025Updated 9 months ago
- Command and Control Framework using powershell implantsβ36Jun 17, 2025Updated 9 months ago
- β23Mar 4, 2025Updated last year
- The most complete code auditing platform with thousands of real-world challengesβ136Jun 21, 2025Updated 9 months ago
- End-to-end encrypted cloud storage - Proton Drive β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Persist like a Dodderβ68May 19, 2025Updated 10 months ago
- Community curated list of search queries for various products across multiple search engines.β378Mar 18, 2026Updated last week
- PentestAgent is an AI agent framework for black-box security testing, supporting bug bounty, red-team, and penetration testing workflows.β1,768Mar 15, 2026Updated last week
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft Eβ¦β1,249Updated this week
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentiaβ¦β200Mar 18, 2026Updated last week
- Conditional Access Reportingβ29Apr 4, 2025Updated 11 months ago
- β15Apr 17, 2025Updated 11 months ago