r3p3r / blackhat-arsenal-tools
Official Black Hat Arsenal Security Tools Repository
☆19Updated 7 years ago
Alternatives and similar repositories for blackhat-arsenal-tools:
Users that are interested in blackhat-arsenal-tools are comparing it to the libraries listed below
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆36Updated 2 years ago
- Repository of tools used in my blog☆51Updated last year
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali now with windows support☆9Updated 2 weeks ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- 🔥Ready, Aim, Fire.🔥☆16Updated 2 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆14Updated 4 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆16Updated 4 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆15Updated 4 years ago
- SecRep Is a Repository That Contain Useful Intrusion, Penetration and Hacking Archive Including Tools List, Cheetsheet and Payloads☆19Updated 6 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Updated 7 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11Updated last year
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Python API wrapper for DarkSearch (darksearch.io).☆33Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 6 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victim …☆16Updated 5 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆51Updated 7 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆18Updated 4 years ago
- The Advanced Automated Pen testing And Forensics Tool NoJle built using python it's for lazy hackers to automate most used Linux commands…☆39Updated 3 years ago
- Keylogger for ethical hackers☆14Updated 3 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 8 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Updated 5 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- WebHook for Red Team☆26Updated 4 years ago
- ☆9Updated 2 years ago
- python remote access trojan☆34Updated 8 years ago