elbraino / awesome-blackhat-arsenalView external linksLinks
Curated collection of cybersecurity tools featured in Black Hat Arsenal events.
☆125Updated this week
Alternatives and similar repositories for awesome-blackhat-arsenal
Users that are interested in awesome-blackhat-arsenal are comparing it to the libraries listed below
Sorting:
- A Python-based backdoor and server communication tool for ethical hacking and reverse shell practice using socket programming.☆28May 21, 2025Updated 8 months ago
- Context-aware Nmap reconnaissance framework with traffic intelligence and AD awareness☆26Feb 4, 2026Updated last week
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆17Mar 27, 2024Updated last year
- BlackRecon is an automated reconnaissance tool designed for ethical hacking and security assessments. It enumerates subdomains, resolves …☆19Apr 27, 2025Updated 9 months ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Feb 22, 2025Updated 11 months ago
- XillenStealer V4.0 - Professional cross-platform Python stealer builder with modern UI and comprehensive features. V5.0 - t.me/XillenStea…☆51Jan 17, 2026Updated last month
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Sep 28, 2025Updated 4 months ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 5 months ago
- Rich Presence GeForce NOW for Discord. Automatically show your games as real presence on Discord. Detect games on Discord using GeForce N…☆31Feb 9, 2026Updated last week
- A collection of tools and resources useful for OSINT investigations in the cryptocurrency. This is a dynamic list. —most resources here a…☆77Jun 25, 2025Updated 7 months ago
- AdobeAllInOne is a comprehensive suite of creative software tools developed by Adobe. It includes a range of applications for design, pho…☆24Apr 9, 2024Updated last year
- Claude MCP server to perform analysis on ROADrecon data☆48Mar 30, 2025Updated 10 months ago
- ☆21Dec 2, 2024Updated last year
- Máquina virtual educativa que simula los sistemas usados por una empresa eléctrica: control de consumo, monitoreo industrial y cibersegur…☆45Oct 26, 2025Updated 3 months ago
- Herramienta hecha en Bash para rastrear una IP Pública.☆21Mar 30, 2021Updated 4 years ago
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆29Aug 12, 2024Updated last year
- Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.☆74Dec 10, 2025Updated 2 months ago
- Scan Entra for risk in role assignments and escalation paths☆73Dec 10, 2025Updated 2 months ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Jul 6, 2025Updated 7 months ago
- Chrome Extensions for OSINT☆171Oct 29, 2025Updated 3 months ago
- ☆85May 15, 2025Updated 9 months ago
- gRPC Goat is a "Vulnerable by Design" lab created to provide an interactive, hands-on playground for learning and practicing gRPC securit…☆50Sep 22, 2025Updated 4 months ago
- A collection of BASH-Python scripts for different scenarios using loops, field processors and clever commands.☆33Jun 25, 2018Updated 7 years ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆56Jun 30, 2025Updated 7 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆37Aug 8, 2025Updated 6 months ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆82Feb 9, 2026Updated last week
- 🛠️ Ultimate Hardware Hacking Guide | IoT security, embedded systems, UART/SPI analysis, and hardware reverse engineering☆40Jul 24, 2025Updated 6 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Apr 20, 2025Updated 9 months ago
- Ecommerce Store is a Java-based web application built using Spring Boot MVC and Thymeleaf for creating a fully functional online shopping…☆14Jan 24, 2025Updated last year
- Disclaimer: Please note that these materials are public available in several reference websites. These materials are not only the source …☆12Dec 31, 2023Updated 2 years ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Jan 29, 2024Updated 2 years ago
- Convert your shellcode into an ASCII string☆127Jun 27, 2025Updated 7 months ago
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆37Jan 1, 2024Updated 2 years ago
- Enrich your investigations on IPs, Domains etc. with OSINT☆56Apr 4, 2024Updated last year
- Search for all leaked keys/secrets using one regex! bugbounty☆182Mar 29, 2025Updated 10 months ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆86Dec 14, 2025Updated 2 months ago
- ExeRay AI detects malicious Windows executables using ML. Analyzes entropy, imports, and metadata for rapid classification, aiding incide…☆58Feb 7, 2026Updated last week
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆34Jun 23, 2025Updated 7 months ago