fsociety Hacking Tools Pack – A Penetration Testing Framework
☆14Aug 8, 2024Updated last year
Alternatives and similar repositories for fsociety
Users that are interested in fsociety are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆23Aug 25, 2024Updated last year
- Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, ad…☆15Aug 22, 2024Updated last year
- DeepWeb is a tool that extracts links from a webpage and does a deep analysis on every link.☆26Jul 12, 2023Updated 2 years ago
- Automated enumeration for red teamers☆11Nov 22, 2022Updated 3 years ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆25Jan 5, 2026Updated 3 months ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆22Feb 12, 2023Updated 3 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- TechackZ is a powerful web technology detection and vulnerability assessment tool that combines the capabilities of Wappalyzer and Nuclei…☆67Jun 4, 2025Updated 10 months ago
- LulzSec-Toolkit enables the user to have a menu with the most important tools. But this tool not only allows you to have the most importa…☆30Jun 24, 2020Updated 5 years ago
- ReconX is a powerful and user-friendly reconnaissance tool designed for security researchers and penetration testers. It provides a compr…☆27Dec 24, 2024Updated last year
- Escáner ofensivo web en Python: crawling, XSS, SQLi, headers y detección WAF con bypass por proveedor (--waf-xss).☆13Mar 25, 2026Updated 3 weeks ago
- ☆196Jul 10, 2024Updated last year
- Informatrion Gathering Framework☆23Aug 28, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 9 months ago
- OSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.☆23Apr 3, 2024Updated 2 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆18Feb 10, 2022Updated 4 years ago
- BSCIT Network Security Notes☆11Oct 1, 2018Updated 7 years ago
- Fluxion is the future of MITM WPA attacks Fluxion is a security auditing and social-engineering research tool. It is a remake of linset …☆16Oct 1, 2020Updated 5 years ago
- This Is PERL Script For Admin-Panel-Finder-Of-Any-Website☆17Nov 13, 2022Updated 3 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- Script to auto generate Python package info on requirements.txt☆11Jul 28, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- IP Tracking☆10Jul 1, 2019Updated 6 years ago
- This keylogger takes the input of keyboard (Android) and mails it to the given mail.....☆11Oct 30, 2022Updated 3 years ago
- Apex Legends external cheat all in one (ud)☆12Jan 24, 2024Updated 2 years ago
- DDoS Attack - Script Python 2☆14May 12, 2018Updated 7 years ago
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆86Mar 20, 2025Updated last year
- A curated atelier for security research. Deciphering the anatomy of risk through a disciplined and reproducible toolkit.☆13Feb 17, 2026Updated 2 months ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Nessus is one of the many vulnerability scanners used during vulnerability assessments☆23Aug 25, 2023Updated 2 years ago
- ☆12Sep 14, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Red Teaming Tactics and Techniques☆12Feb 10, 2022Updated 4 years ago
- NetHawk 🦅: An educational PoC combining 🤖 generative AI with 🛡️ ethical hacking and 🔍 network vulnerability assessment. Simplifying s…☆41May 25, 2025Updated 10 months ago
- Firmware Analysis Tool☆26May 20, 2025Updated 10 months ago
- DroidSniper - Misconfigured Android Debug Bridge Scanner☆15Mar 26, 2024Updated 2 years ago
- ☆17Mar 22, 2026Updated 3 weeks ago
- linux for humans☆14Jul 18, 2018Updated 7 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆63Jul 18, 2024Updated last year