A curated list of penetration testing and ethical hacking tools, organized by category. This compilation includes tools from Kali Linux and other notable sources.
☆1,322Mar 9, 2026Updated last month
Alternatives and similar repositories for Hacking-Tools
Users that are interested in Hacking-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers …☆53Jan 25, 2026Updated 2 months ago
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆60Jan 25, 2026Updated 2 months ago
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆69Jan 25, 2026Updated 2 months ago
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆40Jan 26, 2026Updated 2 months ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆238Jan 25, 2026Updated 2 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Lists various tools used in hardware hacking.☆34Jan 25, 2026Updated 2 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆209Mar 22, 2025Updated last year
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 2 months ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆58Jan 25, 2026Updated 2 months ago
- High-Performance JavaScript Security Scanner - Process 1M URLs in ~5 hours with Telegram & Discord bot integration, Docker support, and c…☆172Oct 18, 2025Updated 5 months ago
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆405Dec 20, 2025Updated 3 months ago
- ☆91Mar 17, 2025Updated last year
- HackTheBox Certified Penetration Tester Specialist Cheatsheet☆726Jul 10, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs☆233Apr 5, 2025Updated last year
- This repository is a comprehensive collection of Cross-Site Scripting (XSS) Payloads designed for educational, research, and testing purp…☆26Mar 31, 2025Updated last year
- 按二八法则来学习:用大约 20% 的核心知识(组件、JSX、state、props、生命周期与 Hooks)覆盖日常开发里 80% 的场景。不追求大而全,只把最常用、最易踩坑的部分讲清楚,让你快速上手React基础、少走弯路。☆24Feb 22, 2026Updated last month
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆171Jun 29, 2025Updated 9 months ago
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,547Dec 7, 2025Updated 4 months ago
- ☆23Mar 22, 2025Updated last year
- Awesome list for cloud security related projects☆149Oct 4, 2022Updated 3 years ago
- Tools and Techniques for Red Team / Penetration Testing☆8,617Mar 18, 2025Updated last year
- BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect☆11May 21, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- High quality and text versions of cheat sheets from Cyber Detective Twitter☆39May 1, 2024Updated last year
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆91Jan 25, 2026Updated 2 months ago
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,818Mar 25, 2026Updated 2 weeks ago
- Analyze Android native `.so` files☆122Jul 28, 2025Updated 8 months ago
- Not The Hidden Wiki - The largest repository of links related to cybersecurity☆1,923Apr 1, 2026Updated last week
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆417May 21, 2025Updated 10 months ago
- AI/ML Pentesting Roadmap for Beginners☆376Mar 22, 2026Updated 2 weeks ago
- PowerShell & Python tools developed for CTFs and certification exams☆70Aug 10, 2025Updated 7 months ago
- Proof of Concept Exploit for CVE-2024-9465☆31Oct 9, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An XSS Exploitation Tool☆339Dec 5, 2025Updated 4 months ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆101Jan 25, 2026Updated 2 months ago
- ☆47Mar 7, 2025Updated last year
- GLPI vulnerabilities checking tool☆162Mar 30, 2026Updated last week
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆18Mar 6, 2025Updated last year
- Browser-based iOS IPA security analyzer.☆59Jan 12, 2026Updated 2 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆132May 12, 2025Updated 10 months ago