cyberytti / ToolHuntLinks
This is a local search engine to search for cybersecurity tools. It has 3000+ tools in it's database.
β48Updated this week
Alternatives and similar repositories for ToolHunt
Users that are interested in ToolHunt are comparing it to the libraries listed below
Sorting:
- A visual methodology tracking platform tailored for offensive security assessmentsβ206Updated 2 weeks ago
- π΄ββ οΈ Hacking Guides, Demos and Proof-of-Concepts π₯·β204Updated last week
- Quick scripts I developed to streamline OSCP tasksβ183Updated 3 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.β198Updated last month
- Cyber threat intelligence tool suite.β41Updated 5 months ago
- A RAG model trained on malware samples, It is designed to generate new malwareβ36Updated 2 weeks ago
- A blind SQL injection brute forcerβ110Updated 4 months ago
- Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconβ¦β39Updated last week
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.β191Updated 10 months ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered featuresβ141Updated last week
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?β57Updated 2 months ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to analβ¦β282Updated 3 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!β259Updated 3 months ago
- An automated NMAP python scriptβ48Updated 7 months ago
- Automated solution for nmap'ingβ30Updated 2 years ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β126Updated 5 months ago
- β124Updated 3 months ago
- A powershell module for hiding payloads in the pixels of imagesβ77Updated last year
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilitiesβ264Updated 5 months ago
- π§° ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.β78Updated 4 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-β¦β105Updated 2 years ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Groupβ86Updated 7 months ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilitiesβ¦β352Updated last month
- Speed up your pentest enumerationβ83Updated last month
- Automated Active Directory lab running on Proxmoxβ84Updated last month
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the β¦β135Updated last year
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.β453Updated 2 weeks ago
- A tool for mapping cyber crimeβ151Updated 4 months ago
- Some settings stolen from multiple scripts @ZephrFishβ130Updated 4 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logsβ123Updated 2 years ago