Official Black Hat Arsenal Security Tools Repository
☆160May 1, 2022Updated 3 years ago
Alternatives and similar repositories for blackhat-arsenal-tools
Users that are interested in blackhat-arsenal-tools are comparing it to the libraries listed below
Sorting:
- Free tools for mobile testing.☆38May 1, 2022Updated 3 years ago
- A simple script for translating IP addresses to GeoLocations☆51May 1, 2022Updated 3 years ago
- This project exists as a free (and transparent) alternative to paid services that show you what technologies are running on a given websi…☆57May 1, 2022Updated 3 years ago
- A tracking system for everything me, e.g.: beliefs, passions, must-haves, must-dos, favorite movies, favorite quotes, favorite aphorisms,…☆29May 1, 2022Updated 3 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57May 1, 2022Updated 3 years ago
- My tmux stuff☆34May 1, 2022Updated 3 years ago
- This tool will harvest valid DNS subdomains from a given domain.☆75May 1, 2022Updated 3 years ago
- A list of the books that I am reading, with priorities.☆35May 1, 2022Updated 3 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆48May 1, 2022Updated 3 years ago
- ☆34May 1, 2022Updated 3 years ago
- BugOutBag☆68Apr 30, 2022Updated 3 years ago
- My various configuration files for zsh, vim, tmux, etc.☆25May 1, 2022Updated 3 years ago
- Get a number of your tweets from the Twitter API.☆13May 1, 2022Updated 3 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- The website for the AUGMENTED AI course.☆43Nov 28, 2025Updated 3 months ago
- A curated list of the most common and most interesting robots.txt disallowed directories.☆1,485Aug 22, 2022Updated 3 years ago
- Checks to see when the cert for a given domain expires.☆19May 1, 2022Updated 3 years ago
- The website for the Threshold.☆22Feb 9, 2024Updated 2 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆49Nov 11, 2015Updated 10 years ago
- My Nginx configuration files, for all to use and improve upon.☆109May 1, 2022Updated 3 years ago
- A quick and dirty PCAP parser that helps you identify who your applications are sending sensitive data to without encryption.☆119Jan 31, 2024Updated 2 years ago
- Official Black Hat Arsenal Security Tools Repository☆4,238Aug 26, 2024Updated last year
- A collection of category-specific host files☆14Oct 18, 2025Updated 5 months ago
- A simple SMTP Mass mailer program utilising open relays.☆10Aug 1, 2016Updated 9 years ago
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- A curated list of Docker resources and projects☆16Nov 15, 2025Updated 4 months ago
- A list of Github users who distribute tools and tutorials on OSINT (as well as hacking, pentest, and forensics)☆13Oct 15, 2023Updated 2 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆35Nov 10, 2016Updated 9 years ago
- ATHI — An AI Threat Modeling Framework for Policymakers☆60Aug 21, 2023Updated 2 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Mar 29, 2020Updated 5 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- Pages saved with SingleFile☆13Mar 16, 2024Updated 2 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- https://sites.google.com/securifyinc.com/secblogs/finding-leaked-sensitive-data☆17Jun 14, 2018Updated 7 years ago
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆18Nov 26, 2025Updated 3 months ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆18Mar 25, 2023Updated 2 years ago
- Module PMKIDAttack v1.2 for WiFi Pineapple☆18Apr 8, 2019Updated 6 years ago
- An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.☆16Oct 27, 2024Updated last year