UCYBERS / Awesome-Blackhat-ToolsLinks
A curated list of tools officially presented at Black Hat events
☆512Updated last week
Alternatives and similar repositories for Awesome-Blackhat-Tools
Users that are interested in Awesome-Blackhat-Tools are comparing it to the libraries listed below
Sorting:
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆400Updated last week
- Using Agents To Automate Pentesting☆281Updated 5 months ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆292Updated 2 years ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆197Updated last month
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆370Updated 6 months ago
- Offline Cybersecurity Knowledge Base☆173Updated this week
- ☆119Updated 6 months ago
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆675Updated 2 months ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆379Updated this week
- Automated web vulnerability scanning with LLM agents☆332Updated 3 weeks ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆200Updated 2 weeks ago
- ☆110Updated last month
- Header Exploitation HTTP☆510Updated this week
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆121Updated 3 months ago
- Collection of knowledge about information security☆639Updated 3 weeks ago
- Taranis AI is an advanced Open-Source Intelligence (OSINT) tool, leveraging Artificial Intelligence to revolutionize information gatherin…☆703Updated this week
- A fast WordPress plugin enumeration tool☆538Updated last week
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆237Updated 2 months ago
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆480Updated 2 months ago
- secator - the pentester's swiss knife☆1,119Updated 2 weeks ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,142Updated 2 months ago
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆685Updated last week
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆229Updated 5 months ago
- Application Fuzzing: Tools, Techniques, and Best Practices☆166Updated 9 months ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆96Updated last year
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆392Updated last month
- Phone: A Mobile Phone Forensic Framework ( Android )☆201Updated 3 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆114Updated 3 weeks ago
- cyber security mind maps collection☆218Updated last year
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆103Updated 7 months ago