Hacking Toolkit
☆973Dec 30, 2025Updated 2 months ago
Alternatives and similar repositories for habu
Users that are interested in habu are comparing it to the libraries listed below
Sorting:
- Official Black Hat Arsenal Security Tools Repository☆4,235Aug 26, 2024Updated last year
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,762Dec 9, 2025Updated 3 months ago
- Find exploits in local and online databases instantly☆1,811Sep 27, 2021Updated 4 years ago
- pentest framework☆1,242Feb 21, 2019Updated 7 years ago
- Virtual scenario for Network Penetration Testing☆14Mar 19, 2017Updated 8 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- Tools, scripts and tips useful during Penetration Testing engagements.☆637Dec 8, 2025Updated 3 months ago
- hack tools☆1,181Sep 23, 2024Updated last year
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,449Nov 3, 2018Updated 7 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- Advanced dork Search & Mass Exploit Scanner☆1,553Aug 10, 2024Updated last year
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns☆1,559Nov 14, 2023Updated 2 years ago
- Information gathering tool - OSINT☆1,385Jun 11, 2021Updated 4 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,721Oct 8, 2023Updated 2 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆248Nov 11, 2020Updated 5 years ago
- Reconnaissance Swiss Army Knife☆2,017Jan 26, 2021Updated 5 years ago
- Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework☆1,075Jun 7, 2024Updated last year
- Automated Mass Exploiter☆5,215May 22, 2023Updated 2 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,515Jun 10, 2025Updated 9 months ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆985Dec 13, 2017Updated 8 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,651Nov 24, 2020Updated 5 years ago
- Advanced Hash Manipulation☆176Oct 14, 2019Updated 6 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆656Jan 6, 2022Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆770Apr 5, 2020Updated 5 years ago
- A framework for wireless pentesting.☆1,230Oct 14, 2020Updated 5 years ago
- A Phishing Dropper designed to Pentest.☆276May 15, 2017Updated 8 years ago
- An advanced multithreaded admin panel finder written in python.☆837May 17, 2024Updated last year
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,284Aug 18, 2025Updated 6 months ago
- CyberScan: Network's Forensics ToolKit☆455Jan 23, 2019Updated 7 years ago
- Know the dangers of credential reuse attacks.☆2,098Dec 9, 2025Updated 3 months ago
- The Offensive Manual Web Application Penetration Testing Framework.☆1,848Apr 19, 2023Updated 2 years ago
- for mass exploiting☆615Jul 14, 2022Updated 3 years ago
- Attack Surface Management Platform☆9,435Feb 15, 2026Updated 3 weeks ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆448Jan 31, 2018Updated 8 years ago
- Selenium powered Python script to automate searching for vulnerable web apps.☆350Feb 20, 2022Updated 4 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,691Nov 3, 2019Updated 6 years ago