The Hacker's ToolBox
☆191Jun 29, 2017Updated 8 years ago
Alternatives and similar repositories for PloitKit
Users that are interested in PloitKit are comparing it to the libraries listed below
Sorting:
- All tools you needed during penetration testing.☆18Mar 26, 2017Updated 8 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- AutoBrowser Screenshot☆49Oct 27, 2016Updated 9 years ago
- A payload stager using PowerShell☆183Dec 15, 2019Updated 6 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225May 8, 2021Updated 4 years ago
- OWASP VBScan is a Black Box vBulletin Vulnerability Scanner☆328Jun 16, 2019Updated 6 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆177Jul 29, 2017Updated 8 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- BruteXSS is a tool written in python simply to find XSS vulnerabilities in web application. This tool was originally developed by Shawar …☆561Jun 17, 2021Updated 4 years ago
- search for hosts info with shodan☆233Jun 14, 2021Updated 4 years ago
- minimal script to help find script into the nse database☆133Jul 10, 2018Updated 7 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆126Feb 20, 2023Updated 3 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- A modular distributed penetration testing tool.☆41Dec 21, 2016Updated 9 years ago
- Neet - Network Enumeration and Exploitation Tool☆168Nov 30, 2016Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Dec 21, 2015Updated 10 years ago
- Script to generate malicious debian packages (debain trojans).☆120Apr 24, 2019Updated 6 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 5 months ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- An anti-ARP-spoofing application software that use active and passive scanning methods to detect and remove any ARP-spoofer from the netw…☆178Sep 2, 2020Updated 5 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Jul 9, 2019Updated 6 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆379Apr 13, 2017Updated 8 years ago
- [unmaintained] Post-exploitation tool☆181Jan 28, 2016Updated 10 years ago
- PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo☆533Nov 4, 2016Updated 9 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- 📡 A security research tool with shodan integration☆25Sep 6, 2018Updated 7 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆80Jun 30, 2018Updated 7 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Aug 9, 2017Updated 8 years ago
- An SDN penetration testing toolkit☆117Oct 4, 2024Updated last year
- OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. It fosters a principle of attack the web usin…☆163Jan 21, 2021Updated 5 years ago
- operative framework is a rust investigation OSINT framework, you can interact with multiple targets, execute multiple modules, create lin…☆741May 17, 2025Updated 9 months ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,213Feb 6, 2022Updated 4 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Aug 13, 2021Updated 4 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆601Jul 18, 2021Updated 4 years ago
- Hakku Framework penetration testing☆353Oct 17, 2021Updated 4 years ago