fsociety Hacking Tools Pack – A Penetration Testing Framework
☆14Aug 8, 2024Updated last year
Alternatives and similar repositories for fsociety
Users that are interested in fsociety are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆23Aug 25, 2024Updated last year
- Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, ad…☆15Aug 22, 2024Updated last year
- DeepWeb is a tool that extracts links from a webpage and does a deep analysis on every link.☆26Jul 12, 2023Updated 2 years ago
- Automated enumeration for red teamers☆11Nov 22, 2022Updated 3 years ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆25Jan 5, 2026Updated 4 months ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆22Feb 12, 2023Updated 3 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- TechackZ is a powerful web technology detection and vulnerability assessment tool that combines the capabilities of Wappalyzer and Nuclei…☆67Jun 4, 2025Updated 11 months ago
- LulzSec-Toolkit enables the user to have a menu with the most important tools. But this tool not only allows you to have the most importa…☆30Jun 24, 2020Updated 5 years ago
- ReconX is a powerful and user-friendly reconnaissance tool designed for security researchers and penetration testers. It provides a compr…☆27Dec 24, 2024Updated last year
- Offensive web scanner: crawling, XSS, SQLi, headers and WAF bypass☆13Apr 20, 2026Updated 2 weeks ago
- ☆196Jul 10, 2024Updated last year
- Informatrion Gathering Framework☆23Aug 28, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 10 months ago
- OSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.☆23Apr 3, 2024Updated 2 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆18Feb 10, 2022Updated 4 years ago
- BSCIT Network Security Notes☆11Oct 1, 2018Updated 7 years ago
- Fluxion is the future of MITM WPA attacks Fluxion is a security auditing and social-engineering research tool. It is a remake of linset …☆16Oct 1, 2020Updated 5 years ago
- This Is PERL Script For Admin-Panel-Finder-Of-Any-Website☆17Nov 13, 2022Updated 3 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- Script to auto generate Python package info on requirements.txt☆11Jul 28, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- IP Tracking☆10Jul 1, 2019Updated 6 years ago
- This keylogger takes the input of keyboard (Android) and mails it to the given mail.....☆11Oct 30, 2022Updated 3 years ago
- Apex Legends external cheat all in one (ud)☆12Jan 24, 2024Updated 2 years ago
- DDoS Attack - Script Python 2☆14May 12, 2018Updated 7 years ago
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆87Mar 20, 2025Updated last year
- A curated atelier for security research. Deciphering the anatomy of risk through a disciplined and reproducible toolkit.☆13Feb 17, 2026Updated 2 months ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Nessus is one of the many vulnerability scanners used during vulnerability assessments☆24Aug 25, 2023Updated 2 years ago
- ☆12Sep 14, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- NetHawk 🦅: An educational PoC combining 🤖 generative AI with 🛡️ ethical hacking and 🔍 network vulnerability assessment. Simplifying s…☆43May 25, 2025Updated 11 months ago
- Firmware Analysis Tool☆26May 20, 2025Updated 11 months ago
- DroidSniper - Misconfigured Android Debug Bridge Scanner☆15Mar 26, 2024Updated 2 years ago
- ☆17Mar 22, 2026Updated last month
- linux for humans☆14Jul 18, 2018Updated 7 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆64Jul 18, 2024Updated last year