A curated list of penetration testing and ethical hacking tools, organized by category. This compilation includes tools from Kali Linux and other notable sources.
☆1,195Jan 25, 2026Updated last month
Alternatives and similar repositories for Hacking-Tools
Users that are interested in Hacking-Tools are comparing it to the libraries listed below
Sorting:
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆60Jan 25, 2026Updated last month
- The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers …☆51Jan 25, 2026Updated last month
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆61Jan 25, 2026Updated last month
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆234Jan 25, 2026Updated last month
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆34Jan 26, 2026Updated last month
- Lists various tools used in hardware hacking.☆33Jan 25, 2026Updated last month
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆16Jan 25, 2026Updated last month
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆47Jan 25, 2026Updated last month
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆210Mar 22, 2025Updated 11 months ago
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆56Jan 25, 2026Updated last month
- Proof of Concept Exploit for CVE-2024-9465☆30Oct 9, 2024Updated last year
- A state-sponsored APT framework for cyber/counter-espionage featuring AI-driven zero-click supply chain attacks, autonomous exploit deplo…☆78Feb 21, 2026Updated last week
- LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs☆234Apr 5, 2025Updated 10 months ago
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆405Dec 20, 2025Updated 2 months ago
- ☆91Mar 17, 2025Updated 11 months ago
- A tool for analyzing vulnerabilities in JWT tokens. Advanced JWT Vulnerability Scanner & Exploitation Toolkit☆44Nov 24, 2025Updated 3 months ago
- HackTheBox Certified Penetration Tester Specialist Cheatsheet☆696Jul 10, 2024Updated last year
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆88Jan 25, 2026Updated last month
- High-Performance JavaScript Security Scanner - Process 1M URLs in ~5 hours with Telegram & Discord bot integration, Docker support, and c…☆171Oct 18, 2025Updated 4 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆131May 12, 2025Updated 9 months ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- Intelligent caching proxy for web scraping with SSL bumping, upstream proxy routing, and a web-based management interface.☆36Jan 10, 2026Updated last month
- Curve Fuckin Styler☆11May 22, 2025Updated 9 months ago
- Top 400 passwords as per HaveIBeenPwned☆22Oct 14, 2024Updated last year
- sqlmap命令生成器☆20Nov 12, 2024Updated last year
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆169Jun 29, 2025Updated 8 months ago
- A keygen for Specter Insight C2☆45Feb 17, 2025Updated last year
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆98Jan 25, 2026Updated last month
- Tools and Techniques for Red Team / Penetration Testing☆8,534Mar 18, 2025Updated 11 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- PowerShell & Python tools developed for CTFs and certification exams☆70Aug 10, 2025Updated 6 months ago
- ☆23Mar 22, 2025Updated 11 months ago
- Collection of different Azure/Entra focused solutions (Deployable templates, Function Apps, etc)☆79Updated this week
- This repository is a comprehensive collection of SQL Injection Payloads designed for educational, research, and testing purposes. It incl…☆55Mar 31, 2025Updated 11 months ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Scraping LegiFrance naturalisation decrees for fun and OSINT profit☆11May 27, 2023Updated 2 years ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated 10 months ago
- Multi-layered malware detection system using static analysis, dynamic browser automation, and external APIs for accurate website threat i…☆14Jun 3, 2025Updated 8 months ago