A curated list of penetration testing and ethical hacking tools, organized by category. This compilation includes tools from Kali Linux and other notable sources.
☆1,458May 7, 2026Updated 2 weeks ago
Alternatives and similar repositories for Hacking-Tools
Users that are interested in Hacking-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers …☆55Jan 25, 2026Updated 3 months ago
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆62Jan 25, 2026Updated 3 months ago
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆72Jan 25, 2026Updated 3 months ago
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆42Jan 26, 2026Updated 3 months ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆238Jan 25, 2026Updated 3 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆14Jan 25, 2026Updated 3 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆212Mar 22, 2025Updated last year
- Lists various tools used in hardware hacking.☆34Jan 25, 2026Updated 3 months ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆62Jan 25, 2026Updated 3 months ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆73Jan 25, 2026Updated 3 months ago
- High-Performance JavaScript Security Scanner - Process 1M URLs in ~5 hours with Telegram & Discord bot integration, Docker support, and c…☆174Oct 18, 2025Updated 7 months ago
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆406Dec 20, 2025Updated 5 months ago
- ☆92Mar 17, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- HackTheBox Certified Penetration Tester Specialist Cheatsheet☆748Jul 10, 2024Updated last year
- LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs☆236Apr 5, 2025Updated last year
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆172Jun 29, 2025Updated 10 months ago
- This repository is a comprehensive collection of Cross-Site Scripting (XSS) Payloads designed for educational, research, and testing purp…☆28Mar 31, 2025Updated last year
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆133May 12, 2025Updated last year
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,572Dec 7, 2025Updated 5 months ago
- ☆24Mar 22, 2025Updated last year
- Tools and Techniques for Red Team / Penetration Testing☆8,731Apr 18, 2026Updated last month
- 100 Hacking Tools and Resources☆110Jun 27, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,885May 2, 2026Updated 2 weeks ago
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆89Jan 25, 2026Updated 3 months ago
- Analyze Android native `.so` files☆123Jul 28, 2025Updated 9 months ago
- Control Coding Agents (Codex, etc.) via Telegram or Slack.☆82Feb 24, 2026Updated 2 months ago
- High quality and text versions of cheat sheets from Cyber Detective Twitter☆42May 1, 2024Updated 2 years ago
- Not The Hidden Wiki - The largest repository of links related to cybersecurity☆1,960Updated this week
- PowerShell & Python tools developed for CTFs and certification exams☆71Aug 10, 2025Updated 9 months ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆441May 21, 2025Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆31Oct 9, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An XSS Exploitation Tool☆340Dec 5, 2025Updated 5 months ago
- ☆47Mar 7, 2025Updated last year
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆106Jan 25, 2026Updated 3 months ago
- OSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.☆3,312Updated this week
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆20Mar 6, 2025Updated last year
- GLPI vulnerabilities checking tool☆168Updated this week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,765Apr 22, 2026Updated last month