A curated list of penetration testing and ethical hacking tools, organized by category. This compilation includes tools from Kali Linux and other notable sources.
☆1,363Mar 9, 2026Updated last month
Alternatives and similar repositories for Hacking-Tools
Users that are interested in Hacking-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers …☆54Jan 25, 2026Updated 3 months ago
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆60Jan 25, 2026Updated 3 months ago
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆71Jan 25, 2026Updated 3 months ago
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆40Jan 26, 2026Updated 3 months ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆239Jan 25, 2026Updated 3 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 3 months ago
- Lists various tools used in hardware hacking.☆34Jan 25, 2026Updated 3 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆211Mar 22, 2025Updated last year
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 3 months ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆60Jan 25, 2026Updated 3 months ago
- High-Performance JavaScript Security Scanner - Process 1M URLs in ~5 hours with Telegram & Discord bot integration, Docker support, and c…☆173Oct 18, 2025Updated 6 months ago
- A state-sponsored APT framework for cyber/counter-espionage featuring AI-driven zero-click supply chain attacks, autonomous exploit deplo…☆100Apr 21, 2026Updated last week
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆406Dec 20, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆92Mar 17, 2025Updated last year
- HackTheBox Certified Penetration Tester Specialist Cheatsheet☆738Jul 10, 2024Updated last year
- LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs☆235Apr 5, 2025Updated last year
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆171Jun 29, 2025Updated 10 months ago
- This repository is a comprehensive collection of Cross-Site Scripting (XSS) Payloads designed for educational, research, and testing purp…☆28Mar 31, 2025Updated last year
- ☆14Sep 28, 2024Updated last year
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,560Dec 7, 2025Updated 4 months ago
- ☆24Mar 22, 2025Updated last year
- Awesome list for cloud security related projects☆151Oct 4, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Tools and Techniques for Red Team / Penetration Testing☆8,706Apr 18, 2026Updated last week
- BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect☆11May 21, 2024Updated last year
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,838Updated this week
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆90Jan 25, 2026Updated 3 months ago
- Analyze Android native `.so` files☆122Jul 28, 2025Updated 9 months ago
- High quality and text versions of cheat sheets from Cyber Detective Twitter☆40May 1, 2024Updated last year
- Not The Hidden Wiki - The largest repository of links related to cybersecurity☆1,943Apr 21, 2026Updated last week
- PowerShell & Python tools developed for CTFs and certification exams☆71Aug 10, 2025Updated 8 months ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆430May 21, 2025Updated 11 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Proof of Concept Exploit for CVE-2024-9465☆31Oct 9, 2024Updated last year
- An XSS Exploitation Tool☆339Dec 5, 2025Updated 4 months ago
- ☆47Mar 7, 2025Updated last year
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆105Jan 25, 2026Updated 3 months ago
- GLPI vulnerabilities checking tool☆166Mar 30, 2026Updated last month
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆20Mar 6, 2025Updated last year
- AI/ML Pentesting Roadmap for Beginners☆404Mar 22, 2026Updated last month