fsociety Hacking Tools Pack – A Penetration Testing Framework
☆14Aug 8, 2024Updated last year
Alternatives and similar repositories for fsociety
Users that are interested in fsociety are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆23Aug 25, 2024Updated last year
- Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, ad…☆15Aug 22, 2024Updated last year
- Automated enumeration for red teamers☆11Nov 22, 2022Updated 3 years ago
- DeepWeb is a tool that extracts links from a webpage and does a deep analysis on every link.☆26Jul 12, 2023Updated 2 years ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 3 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆25Jan 5, 2026Updated 2 months ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆22Feb 12, 2023Updated 3 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- TechackZ is a powerful web technology detection and vulnerability assessment tool that combines the capabilities of Wappalyzer and Nuclei…☆67Jun 4, 2025Updated 9 months ago
- LulzSec-Toolkit enables the user to have a menu with the most important tools. But this tool not only allows you to have the most importa…☆30Jun 24, 2020Updated 5 years ago
- ReconX is a powerful and user-friendly reconnaissance tool designed for security researchers and penetration testers. It provides a compr…☆27Dec 24, 2024Updated last year
- Escáner básico de vulnerabilidades web (XSS, SQLi, cabeceras) con crawling ligero, escrito en Python.☆13Mar 4, 2026Updated 3 weeks ago
- ☆194Jul 10, 2024Updated last year
- Informatrion Gathering Framework☆23Aug 28, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 8 months ago
- OSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.☆23Apr 3, 2024Updated last year
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆18Feb 10, 2022Updated 4 years ago
- BSCIT Network Security Notes☆11Oct 1, 2018Updated 7 years ago
- Fluxion is the future of MITM WPA attacks Fluxion is a security auditing and social-engineering research tool. It is a remake of linset …☆16Oct 1, 2020Updated 5 years ago
- This Is PERL Script For Admin-Panel-Finder-Of-Any-Website☆16Nov 13, 2022Updated 3 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- Script to auto generate Python package info on requirements.txt☆11Jul 28, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- IP Tracking☆10Jul 1, 2019Updated 6 years ago
- Apex Legends external cheat all in one (ud)☆12Jan 24, 2024Updated 2 years ago
- This keylogger takes the input of keyboard (Android) and mails it to the given mail.....☆11Oct 30, 2022Updated 3 years ago
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆86Mar 20, 2025Updated last year
- DDoS Attack - Script Python 2☆14May 12, 2018Updated 7 years ago
- A curated atelier for security research. Deciphering the anatomy of risk through a disciplined and reproducible toolkit.☆13Feb 17, 2026Updated last month
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Nessus is one of the many vulnerability scanners used during vulnerability assessments☆21Aug 25, 2023Updated 2 years ago
- ☆12Sep 14, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- NetHawk 🦅: An educational PoC combining 🤖 generative AI with 🛡️ ethical hacking and 🔍 network vulnerability assessment. Simplifying s…☆39May 25, 2025Updated 10 months ago
- Firmware Analysis Tool☆26May 20, 2025Updated 10 months ago
- DroidSniper - Misconfigured Android Debug Bridge Scanner☆14Mar 26, 2024Updated 2 years ago
- ☆17Mar 22, 2026Updated last week
- Script to make your Gnome desktop environment look like MacOS☆10Nov 2, 2020Updated 5 years ago
- linux for humans☆14Jul 18, 2018Updated 7 years ago