Register | Hacking Tools

Blackhat All Tools List
Name Version Description Category
0d1n 260.c3023e9 Web security tool to make fuzzing at HTTP inputs, made in C with libCurl. | Hacker Scanner Tools
0trace 1.5 A hop enumeration tool. | Hacker Scanner Tools
3proxy 0.9.4 Tiny free proxy server. | Proxy Tools
3proxy-win32 0.8.13 Tiny free proxy server. | Windows Hacking Tools
42zip 42 Recursive Zip archive bomb. | DOS Hacking Tools
a2sv 140.cb24c4e Auto Scanning to SSL Vulnerability. | Hacker Scanner Tools
abcd 4.2738809 ActionScript ByteCode Disassembler. | Disassembler Tools
abuse-ssl-bypass-waf 7.c28f98e Bypassing WAF by abusing SSL/TLS Ciphers. | WebApp Hacking Tools
acccheck 0.2.1 A password dictionary attack tool that targets windows authentication via the SMB protocol. | Cracker Hacking Tools
ace 1.10 Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface | VOIP Hacking Tools
aclpwn 4.81480cc Active Directory ACL exploitation with BloodHound. | Exploitation Hacking Tools
activedirectoryenum 0.5.0 Enumerate AD through LDAP. | Recognise Hacking Tools
ad-ldap-enum 56.ae2eb47 An LDAP based Active Directory user and group enumeration tool. | Recognise Hacking Tools
adape-script 43.4d0b9ff Active Directory Assessment and Privilege Escalation Script. | Windows Hacking Tools
adenum 29.0e3576e A pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos. | Exploitation Hacking Tools
adfind 31.9808cb7 Simple admin panel finder for php,js,cgi,asp and aspx admin panels. | WebApp Hacking Tools
adfspray 6.3d7745d Python3 tool to perform password spraying against Microsoft Online service using various methods. | Cracker Hacking Tools
adidnsdump 23.7422086 Active Directory Integrated DNS dumping by any authenticated user. | Recognise Hacking Tools
admid-pack 0.1 ADM DNS spoofing tools – Uses a variety of active and passive methods to spoof DNS packets. Very powerful. | Spoofing Hacking Tools
adminpagefinder 0.1 This python script looks for a large amount of possible administrative interfaces on a given site. | WebApp Hacking Tools
admsnmp 0.1 ADM SNMP audit scanner. | Hacker Scanner Tools
aesfix 1.0.1 A tool to find AES key in RAM. | Cracker Hacking Tools
aeskeyfind 1.0 A tool to find AES key in RAM. | Cracker Hacking Tools
aespipe 2.4f Reads data from stdin and outputs encrypted or decrypted results to stdout. | Crypto Tools
aesshell 0.7 A backconnect shell for Windows and Unix written in python and uses AES in CBC mode in conjunction with HMAC-SHA256 for secure transport. | Backdooring Tools
afflib 3.7.19 An extensible open format for the storage of disk images and related forensic information. | Forensic Tools
aflplusplus 4.00c.r226.gba3c7bfe American Fuzzing Lop fuzzer with community patches and additional features. | Fuzzing Tools
afpfs-ng 0.8.2 A client for the Apple Filing Protocol (AFP) | Network Hacking Tools
agafi 1.1 A gadget finder and a ROP-Chainer tool for x86 platforms. | Windows Hacking Tools
against 0.2 A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list. | Cracker Hacking Tools
aggroargs 51.c032446 Bruteforce commandline buffer overflows, linux, aggressive arguments. | Exploitation Hacking Tools
aiengine 2.0.1 A packet inspection engine with capabilities of learning without any human intervention. | Network Hacking Tools
aimage 3.2.5 A program to create aff-images. | Forensic Tools
aiodnsbrute 38.e773a4c Python 3 DNS asynchronous brute force utility. | Recognise Hacking Tools
air 2.0.0 A GUI front-end to dd/dc3dd designed for easily creating forensic images. | Forensic Tools
aircrack-ng 1.7 Key cracker for the 802.11 WEP and WPA-PSK protocols | Wireless Hacking Tools
airflood 0.1 A modification of aireplay that allows for a DoS of the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections. [Tool in Spanish] | Wireless Hacking Tools
airgeddon v11.01.r0.gc58bb8f Multi-use bash script for Linux systems to audit wireless networks. | Wireless Hacking Tools
airopy 5.b83f11d Get (wireless) clients and access points. | Wireless Hacking Tools
airoscript 45.0a122ee A script to simplify the use of aircrack-ng tools. | Wireless Hacking Tools
airpwn 1.4 A tool for generic packet injection on an 802.11 network. | Wireless Hacking Tools
ajpfuzzer 0.6 A command-line fuzzer for the Apache JServ Protocol (ajp13). | Fuzzing Tools
albatar 34.4e63f22 A SQLi exploitation framework in Python. | WebApp Hacking Tools
allthevhosts 1.0 A vhost discovery tool that scrapes various web applications. | Hacker Scanner Tools
altdns 76.8c1de0f Generates permutations, alterations and mutations of subdomains and then resolves them. | Recognise Hacking Tools
amass 1922.8a7cd5d In-depth subdomain enumeration written in Go. | Hacker Scanner Tools
amber 254.a331b34 Reflective PE packer. | Binary Tools
amoco v2.4.1.r294.g3f062db Yet another tool for analysing binaries. | Binary Tools
analyzemft 125.79a33ce Parse the MFT file from an NTFS filesystem. | Forensic Tools
analyzepesig Analyze digital signature of PE file. | Windows Hacking Tools
androbugs 1.7fd3a2c An efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications. | Mobile Hacking Tools
androguard 2118.8d091cbb Reverse engineering, Malware and goodware analysis of Android applications and more. | Binary Tools
androick 8.522cfb4 A python tool to help in forensics analysis on android. | Mobile Hacking Tools
android-apktool 2.5.0 A tool for reverse engineering Android apk files. | Reverse Engineering Tools
android-ndk r23.b Android C/C++ developer kit | Mobile Hacking Tools
android-sdk 26.1.1 Google Android SDK | Mobile Hacking Tools
android-udev-rules 452.aa4a6d8 Android udev rules. | Mobile Hacking Tools
androidpincrack 2.ddaf307 Bruteforce the Android Passcode given the hash and salt. | Mobile Hacking Tools
androidsniffer 0.1 A perl script that lets you search for 3rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more. | Mobile Hacking Tools
androwarn 135.626c02d Yet another static code analyzer for malicious Android applications. | Mobile Hacking Tools
angr 9.1.11752 The next-generation binary analysis platform from UC Santa Barbaras Seclab. | Binary Tools
angr-management 9.1.11752 This is the GUI for angr. | Binary Tools
angr-py2 The next-generation binary analysis platform from UC Santa Barbaras Seclab. | Binary Tools
angrop 214.5fb6634 A rop gadget finder and chain builder. | Exploitation Hacking Tools
anontwi 1.1b A free software python client designed to navigate anonymously on social networks. It supports and | Social Engineering Tools
anti-xss 166.2725dc9 A XSS vulnerability scanner. | WebApp Hacking Tools
antiransom 5 A tool capable of detect and stop attacks of Ransomware using honeypots. | Windows Hacking Tools
apache-users 2.1 This perl script will enumerate the usernames on a unix system that use the apache module UserDir. | Hacker Scanner Tools
apacket 374.16e7036 Sniffer syn and backscatter packets. | Network Hacking Tools
aphopper 0.3 A program that automatically hops between access points of different wireless networks. | Wireless Hacking Tools
apkid 2.1.1 Android Application Identifier for Packers, Protectors, Obfuscators and Oddities. | Mobile Hacking Tools
apkleaks v2.6.1.r3.g9cf27d6 Scanning APK file for URIs, endpoints & secrets. | Mobile Hacking Tools
apkstat 18.81cdad3 Automated Information Retrieval From APKs For Initial Analysis. | Mobile Hacking Tools
apkstudio 100.9e114ca An IDE for decompiling/editing & then recompiling of android application binaries. | Reverse Engineering Tools
apnbf 0.1 A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device. | Wireless Hacking Tools
appmon 175.a8e0373 A runtime security testing & profiling framework for native apps on macOS, iOS & android and it is built using Frida. | Mobile Hacking Tools
apt2 175.6732505 Automated penetration toolkit. | Automation Tools
aquatone 142.2daa022 A Tool for Domain Flyovers. | Recognise Hacking Tools
arachni A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications. | WebApp Hacking Tools
aranea 6.469b9ee A fast and clean dns spoofing tool. | Spoofing Hacking Tools
arcane 2.750cb9f Backdoor iOS packages and create the necessary resources for APT repositories. | Mobile Hacking Tools
archivebox 903.59da482 The open source self-hosted web archive. Takes browser history/bookmarks/Pocket/Pinboard/etc., saves HTML, JS, PDFs, media, and more. | Misc Tools
arduino 1.8.19 Arduino prototyping platform SDK | Hardware Tools
argon2 20190702 A password-hashing function (reference C implementation) | Crypto Tools
argus Network monitoring tool with flow control. | Network Hacking Tools
argus-clients Network monitoring client for Argus. | Network Hacking Tools
arjun 201.01c755d HTTP parameter discovery suite. | WebApp Hacking Tools
armitage 150813 A graphical cyber attack management tool for Metasploit. | Exploitation Hacking Tools
armor 5.bae27a6 A simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners. | Exploitation Hacking Tools
armscgen 98.c51b7d6 ARM Shellcode Generator (Mostly Thumb Mode). | Exploitation Hacking Tools
arp-scan 1.9.7 A tool that uses ARP to discover and fingerprint IP hosts on the local network | Network Hacking Tools
arpalert 2.0.12 Monitor ARP changes in ethernet networks. | Network Hacking Tools
arpoison 0.7 The UNIX arp cache update utility | Exploitation Hacking Tools
arpon 2.7 A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks. | Defensive Tools
arpstraw 27.ab40e13 Arp spoof detection tool. | Defensive Tools
arptools 13.41cdb23 A simple tool about ARP broadcast, ARP attack, and data transmission. | Network Hacking Tools
arpwner 26.f300fdf GUI-based python tool for arp poisoning and dns poisoning attacks. | Network Hacking Tools
artillery 357.805a5d8 A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system. | Defensive Tools
artlas 154.e5fdd8d Apache Real Time Logs Analyzer System. | Defensive Tools
arybo 65.89d9a42 Manipulation, canonicalization and identification of mixed boolean-arithmetic symbolic expressions. | Misc Tools
asleap 2.2 Actively recover LEAP/PPTP passwords. | Cracker Hacking Tools
asp-audit 2BETA An ASP fingerprinting tool and vulnerability scanner. | Fingerprinting Tools
assetfinder 19.4e95d87 Find domains and subdomains potentially related to a given domain. | Hacker Scanner Tools
astra 486.394d538 Automated Security Testing For REST API’s. | WebApp Hacking Tools
atear 139.245ec8d Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration. | Wireless Hacking Tools
atftp 0.7.5 Client/server implementation of the TFTP protocol that implements RFCs 1350, 2090, 2347, 2348, and 2349 | Network Hacking Tools
athena-ssl-scanner 0.6.2 A SSL cipher scanner that checks all cipher codes. It can identify about 150 different ciphers. | Hacker Scanner Tools
atlas 7.77bd6c8 Open source tool that can suggest sqlmap tampers to bypass WAF/IDS/IPS. | WebApp Hacking Tools
atscan 2454.b1b241e Server, Site and Dork Scanner. | Hacker Scanner Tools
atstaketools 0.1 This is an archive of various @Stake tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics. | Windows Hacking Tools
attacksurfacemapper 42.42ed228 Tool that aims to automate the reconnaissance process. | Recognise Hacking Tools
attk 2.0.1023 Trend Micro Anti-Threat Toolkit. | Hacker Scanner Tools
aurebeshjs 66.2c93a1f Translate JavaScript to Other Alphabets. | Misc Tools
auto-eap 18.ee36d37 Automated Brute-Force Login Attacks Against EAP Networks. | Wireless Hacking Tools
auto-xor-decryptor 7.2eb176d Automatic XOR decryptor tool. | Crypto Tools
automato 33.0561b59 Should help with automating some of the user-focused enumeration tasks during an internal penetration test. | Automation Tools
autonessus 24.7933022 This script communicates with the Nessus API in an attempt to help with automating scans. | Automation Tools
autonse 25.7c87f4c Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner. | Automation Tools
autopsy 4.19.2 The forensic browser. A GUI for the Sleuth Kit. | Forensic Tools
autopwn 190.fc80cef Specify targets and run sets of tools against them. | Automation Tools
autorecon 257.f724be8 A multi-threaded network reconnaissance tool which performs automated enumeration of services. | Automation Tools
autosint 234.e1f4937 Tool to automate common osint tasks. | Recognise Hacking Tools
autosploit 281.9a6a5ef Automate the exploitation of remote hosts. | Exploitation Hacking Tools
autovpn 18.28b1a87 Easily connect to a VPN in a country of your choice. | Network Hacking Tools
avaloniailspy v7.2.rc.r0.g113ef11 .NET Decompiler (port of ILSpy) | Decompiler Tools
avet 133.2f1d882 AntiVirus Evasion Tool | Binary Tools
avml v0.6.1.r11.g155f084 A portable volatile memory acquisition tool for Linux. | Misc Tools
aws-extender-cli 17.a351154 Script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common misconfiguration issues. | Hacker Scanner Tools
aws-inventory 19.9a2fa8e Discover resources created in an AWS account. | Recognise Hacking Tools
awsbucketdump 82.4684670 A tool to quickly enumerate AWS S3 buckets to look for loot. | Automation Tools
azazel 15.a41fbb5 A userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. | Backdooring Tools
aztarna 1.2.1 A footprinting tool for ROS and SROS systems. | Recognise Hacking Tools
backcookie 51.6dabc38 Small backdoor using cookie. | Backdooring Tools
backdoor-apk 141.2710126 Shell script that simplifies the process of adding a backdoor to any Android APK file | Mobile Hacking Tools
backdoor-factory 208.9972ac6 Patch win32/64 binaries with shellcode. | Backdooring Tools
backdoorme 308.f9755ca A powerful utility capable of backdooring Unix machines with a slew of backdoors. | Backdooring Tools
backdoorppt 88.d0e7f91 Transform your payload.exe into one fake word doc (.ppt). | Backdooring Tools
backfuzz 1.b0648de A network protocol fuzzing toolkit. | Fuzzing Tools
backhack 39.561ec86 Tool to perform Android app analysis by backing up and extracting apps, allowing you to analyze and modify file system contents for apps. | Mobile Hacking Tools
backoori 55.988e507 Tool aided persistence via Windows URI schemes abuse. | Exploitation Hacking Tools
backorifice 1.0 A remote administration system which allows a user to control a computer across a tcpip connection using a simple console or GUI application. | Windows Hacking Tools
bad-pdf 61.a8149ee Steal NTLM Hashes with Bad-PDF. | Exploitation Hacking Tools
badkarma 85.2c46334 Advanced network reconnaissance toolkit. | Recognise Hacking Tools
badministration 16.69e4ec2 A tool which interfaces with management or administration applications from an offensive standpoint. | WebApp Hacking Tools
bagbak 141.ab2853f Yet another frida based App decryptor. | Mobile Hacking Tools
balbuzard 67.d6349ef1bc55 A package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain names, known file headers, interesting strings, etc). | Malware Tools
bamf-framework 35.30d2b4b A modular framework designed to be a platform to launch attacks against botnets. | Malware Tools
bandicoot 0.6.0 A toolbox to analyze mobile phone metadata. | Mobile Hacking Tools
barf 923.9547ef8 A multiplatform open source Binary Analysis and Reverse engineering Framework. | Binary Tools
barmie 1.01 Java RMI enumeration and attack tool. | Hacker Scanner Tools
barq 35.6f1a68c An AWS Cloud Post Exploitation framework. | Exploitation Hacking Tools
base64dump 0.0.14 Extract and decode base64 strings from files. | Misc Tools
basedomainname 0.1 Tool that can extract TLD (Top Level Domain), domain extensions (Second Level Domain + TLD), domain name, and hostname from fully qualified domain names. | Recognise Hacking Tools
bashfuscator 338.7487348 Fully configurable and extendable Bash obfuscation framework. | Automation Tools
bashscan 94.80c066c A port scanner built to utilize /dev/tcp for network and service discovery. | Hacker Scanner Tools
batctl 2022.1 B.A.T.M.A.N. advanced control and management tool | Wireless Hacking Tools
batman-adv 2019.2 Batman kernel module, (included upstream since .38) | Wireless Hacking Tools
batman-alfred 2022.0 Almighty Lightweight Fact Remote Exchange Daemon. | Wireless Hacking Tools
bbqsql 261.b9859d2 SQL injection exploit tool. | WebApp Hacking Tools
bbscan 44.4b82032 A tiny Batch web vulnerability Scanner. | WebApp Hacking Tools
bdfproxy 107.276c367 Patch Binaries via MITM: BackdoorFactory + mitmProxy | Proxy Tools
bdlogparser 2 This is a utility to parse a Bit Defender log file, in order to sort them into a malware archive for easier maintenance of your malware collection. | Malware Tools
bed 0.5 Collection of scripts to test for buffer overflows, format string vulnerabilities. | Exploitation Hacking Tools
beebug 25.cddb375 A tool for checking exploitability. | Decompiler Tools
beef 4048.a7a4c814 The Browser Exploitation Framework that focuses on the web browser. | Exploitation Hacking Tools
beeswarm 1183.db51ea0 Honeypot deployment made easy
beholder 0.8.10 A wireless intrusion detection tool that looks for anomalies in a wifi environment. | Wireless Hacking Tools
belati 72.49577a1 The Traditional Swiss Army Knife for OSINT. | Hacker Scanner Tools
beleth 36.0963699 A Multi-threaded Dictionary based SSH cracker. | Cracker Hacking Tools
bettercap 2.32.0 Swiss army knife for network attacks and monitoring | Sniffing Tools
bettercap-ui 1.3.0 Official Bettercap’s Web UI. | Misc Tools
bfac 53.18fb0b5 An automated tool that checks for backup artifacts that may disclose the web-application’s source code. | Recognise Hacking Tools
bfbtester 2.0.1 Performs checks of single and multiple argument command line overflows and environment variable overflows | Exploitation Hacking Tools
bfuzz 59.e82cbf4 Input based fuzzer tool for browsers. | Fuzzing Tools
bgp-md5crack 0.1 RFC2385 password cracker | Cracker Hacking Tools
bgrep 24.28029c9 Binary grep. | Binary Tools
billcipher 32.97fba59 Information Gathering tool for a Website or IP address. | Recognise Hacking Tools
binaryninja-demo 3.0.3233 A new kind of reversing platform (demo version). | Reverse Engineering Tools
binaryninja-python 13.83f59f7 Binary Ninja prototype written in Python. | Binary Tools
bind 9.18.3 A complete, highly portable implementation of the DNS protocol | Network Hacking Tools
bindead 4504.67019b97b A static analysis tool for binaries | Binary Tools
bindiff 6.0.0 A comparison tool for binary files, that assists vulnerability researchers and engineers to quickly find differences and similarities in disassembled code. | Binary Tools
binex 1.0 Format String exploit building tool. | Exploitation Hacking Tools
binflow 5.7fb02a9 POSIX function tracing. Much better and faster than ftrace. | Binary Tools
bing-ip2hosts 1.0.5 Enumerates all hostnames which Bing has indexed for a specific IP address. | Recognise Hacking Tools
bing-lfi-rfi 0.1 Python script for searching Bing for sites that may have local and remote file inclusion vulnerabilities. | WebApp Hacking Tools
bingoo 3.698132f A Linux bash based Bing and Google Dorking Tool. | Hacker Scanner Tools
binnavi 6.1.0 A binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code. | Disassembler Tools
binproxy 8.d02fce9 A proxy for arbitrary TCP connections. | Proxy Tools
binwalk 2.3.3 Tool for searching a given binary image for embedded files | Disassembler Tools
binwally 4.0aabd8b Binary and Directory tree comparison tool using the Fuzzy Hashing concept (ssdeep). | Binary Tools
bios_memimage 1.2 A tool to dump RAM contents to disk (aka cold boot attack). | Cracker Hacking Tools
birp 65.b2e108a A tool that will assist in the security assessment of mainframe applications served over TN3270. | Hacker Scanner Tools
bitdump 34.6a5cbd8 A tool to extract database data from a blind SQL injection vulnerability. | Exploitation Hacking Tools
bittwist 2.0 A simple yet powerful libpcap-based Ethernet packet generator. It is designed to complement tcpdump, which by itself has done a great job at capturing network traffic. | Sniffing Tools
bkcrack v1.4.0.r1.gda2cf30 Crack legacy zip encryption with Biham and Kocher known plaintext attack. | Cracker Hacking Tools
bkhive 1.1.1 Program for dumping the syskey bootkey from a Windows NT/2K/XP system hive. | Cracker Hacking Tools
blackbox-scanner 1.7a25220 Dork scanner & bruteforcing & hash cracker with blackbox framework. | Hacker Scanner Tools
blackeye v2.0.r0.g27a3f04 Ultimate phishing tool with ngrok and serveo. | Social Engineering Tools
blackhash 0.2 Creates a filter from system hashes. | Cracker Hacking Tools
blacknurse 9.d2a2b23 A low bandwidth ICMP attack that is capable of doing denial of service to well known firewalls. | DOS Hacking Tools
bleah 53.6a2fd3a A BLE scanner for “smart” devices hacking. | Hacker Scanner Tools
bless 0.6.3 High-quality, full-featured hex editor | Misc Tools
bletchley 0.0.1 A collection of practical application cryptanalysis tools. | Crypto Tools
blind-sql-bitshifting 54.5bbc183 A blind SQL injection module that uses bitshfting to calculate characters. | Exploitation Hacking Tools
blindelephant 7 A web application fingerprinter. Attempts to discover the version of a (known) web application by comparing static files at known locations | Fingerprinting Tools
blindsql 1.0 Set of bash scripts for blind SQL injection attacks. | Database Tools
blindy 12.59de8f2 Simple script to automate brutforcing blind sql injection vulnerabilities. | Hacker Scanner Tools
blisqy 20.e9995fc Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB). | WebApp Hacking Tools
bloodhound 1323.4fd3b95 Six Degrees of Domain Admin | Recognise Hacking Tools
bloodhound-python v1.0.1.r43.gec2a9a9 Bloodhound python data collector | Recognise Hacking Tools
blue-hydra 710.1c2372d A Bluetooth device discovery service built on top of the bluez library. | Bluetooth Hacking Tools
bluebox-ng 1.1.0 A GPL VoIP/UC vulnerability scanner. | VOIP Hacking Tools
bluebugger 0.1 An implementation of the bluebug technique which was discovered by Martin Herfurt. | Bluetooth Hacking Tools
bluediving 0.9 A Bluetooth penetration testing suite. | Bluetooth Hacking Tools
bluefog 0.0.4 A tool that can generate an essentially unlimited number of phantom Bluetooth devices. | Bluetooth Hacking Tools
bluelog 1.1.2 A Bluetooth scanner and sniffer written to do a single task, log devices that are in discoverable mode. | Bluetooth Hacking Tools
bluepot 0.2 A Bluetooth Honeypot written in Java, it runs on Linux. | Bluetooth Hacking Tools
blueprint 0.1_3 A perl tool to identify Bluetooth devices. | Bluetooth Hacking Tools
blueranger 1.0 A simple Bash script which uses Link Quality to locate Bluetooth device radios. | Automation Tools
bluescan 1.0.6 A Bluetooth Device Scanner. | Bluetooth Hacking Tools
bluesnarfer 0.1 A bluetooth attacking tool. | Bluetooth Hacking Tools
bluffy 46.3f6ec81 Convert shellcode into different formats. | Exploitation Hacking Tools
bluphish 9.a7200bd Bluetooth device and service discovery tool that can be used for security assessment and penetration testing. | Bluetooth Hacking Tools
bluto 142.25cad7a Recon, Subdomain Bruting, Zone Transfers. | Hacker Scanner Tools
bmap-tools 3.6 Tool for copying largely sparse files using information from a block map file. | Forensic Tools
bmc-tools 23.d7dc673 RDP Bitmap Cache parser. | Forensic Tools
bob-the-butcher 0.7.1 A distributed password cracker package. | Cracker Hacking Tools
bof-detector 19.e08367d A simple detector of BOF vulnerabilities by source-code-level check. | Code Audit Tools
bonesi 12.733c9e9 The DDoS Botnet Simulator. | DOS Hacking Tools
boofuzz v0.4.1.r12.g0cfcef5 | Fuzzing Tools
boopsuite 170.16c902f A Suite of Tools written in Python for wireless auditing and security testing. | Wireless Hacking Tools
bopscrk 72.34fb3fd Tool to generate smart wordlists, eg. based on lyrics. | Automation Tools
botb 69.6d33aae A container analysis and exploitation tool for pentesters and engineers. | Exploitation Hacking Tools
bowcaster 230.17d69c1 A framework intended to aid those developing exploits. | Exploitation Hacking Tools
box-js 411.e41c4ae A tool for studying JavaScript malware. | Malware Tools
braa 0.82 A mass snmp scanner | Hacker Scanner Tools
braces 0.4 A Bluetooth Tracking Utility. | Bluetooth Hacking Tools
brakeman 3805.26735dd99 A static analysis security vulnerability scanner for Ruby on Rails applications. | Code Audit Tools
brosec 278.c51164f An interactive reference tool to help security professionals utilize useful payloads and commands. | Exploitation Hacking Tools
browselist 1.4 Retrieves the browse list ; the output list contains computer names, and the roles they play in the network. | Windows Hacking Tools
browser-fuzzer 3 Browser Fuzzer 3 | Fuzzing Tools
brut3k1t 104.793821f Brute-force attack that supports multiple protocols and services. | Cracker Hacking Tools
brute-force 52.78d1d8e Brute-Force attack tool for Gmail Hotmail Twitter Facebook Netflix. | Cracker Hacking Tools
brute12 1 A tool designed for auditing the cryptography container security in PKCS12 format. | Windows Hacking Tools
bruteforce-luks 46.a18694a Try to find the password of a LUKS encrypted volume. | Cracker Hacking Tools
bruteforce-salted-openssl 54.6e87cc0 Try to find the password of a file that was encrypted with the ‘openssl’ command. | Cracker Hacking Tools
bruteforce-wallet 39.f6d8cc5 Try to find the password of an encrypted Peercoin (or Bitcoin,Litecoin, etc…) wallet file. | Cracker Hacking Tools
brutemap 65.da4b303 Penetration testing tool that automates testing accounts to the site’s login page. | WebApp Hacking Tools
brutespray 195.20f36bd Brute-Forcing from Nmap output – Automatically attempts default creds on found services. | Automation Tools
brutessh 0.6 A simple sshd password bruteforcer using a wordlist, it’s very fast for internal networks. It’s multithreads. | Cracker Hacking Tools
brutex 107.3f43505 Automatically brute force all services running on a target. | Automation Tools
brutexss 54.ba753df Cross-Site Scripting Bruteforcer. | WebApp Hacking Tools
brutus 2 One of the fastest, most flexible remote password crackers you can get your hands on. | Windows Hacking Tools
bsdiff 4.3 bsdiff and bspatch are tools for building and applying patches to binary files. | Reverse Engineering Tools
bsqlbf 2.7 Blind SQL Injection Brute Forcer. | WebApp Hacking Tools
bsqlinjector 13.027184f Blind SQL injection exploitation tool written in ruby. | WebApp Hacking Tools
bss 0.8 Bluetooth stack smasher / fuzzer | Bluetooth Hacking Tools
bt_audit 0.1.1 Bluetooth audit | Bluetooth Hacking Tools
btcrack 1.1 The world’s first Bluetooth Pass phrase (PIN) bruteforce tool. Bruteforces the Passkey and the Link key from captured Pairing exchanges. | Bluetooth Hacking Tools
btlejack 84.4e3014f Bluetooth Low Energy Swiss-army knife. | Bluetooth Hacking Tools
btproxy-mitm 71.cd1c906 Man in the Middle analysis tool for Bluetooth. | Bluetooth Hacking Tools
btscanner 2.1 Bluetooth device scanner. | Bluetooth Hacking Tools
bulk-extractor 1562.1c67a75 Bulk Email and URL extraction tool. | Forensic Tools
bully 1.1.12.g04185d7 Retrieve WPA/WPA2 passphrase from a WPS enabled access point | Wireless Hacking Tools
bunny 0.93 A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs. | Fuzzing Tools
burpsuite 2022.3.8 An integrated platform for attacking web applications (community edition) + SHELLING plugin. | WebApp Hacking Tools
buster 92.131437e Find emails of a person and return info associated with them. | Social Engineering Tools
buttinsky 138.1a2a1b2 Provide an open source framework for automated botnet monitoring. | Network Hacking Tools
bvi 1.4.1 A display-oriented editor for binary files operate like “vi” editor. | Binary Tools
byepass 213.8cbfd9b Automates password cracking tasks using optimized dictionaries and mangling rules. | Automation Tools
bypass-firewall-dns-history 33.c55b7ce Firewall bypass script based on DNS history records. | Network Hacking Tools
bytecode-viewer 2.9.22 A Java 8/Android APK Reverse Engineering Suite. | Binary Tools
c5scan 30.be8845c Vulnerability scanner and information gatherer for the Concrete5 CMS. | WebApp Hacking Tools
cachedump 1.1 A tool that demonstrates how to recover cache entry information: username and hashed password (called MSCASH). | Windows Hacking Tools
cadaver 0.23.3 Command-line WebDAV client for Unix | Network Hacking Tools
cafebabe 0.1.2 Java bytecode editor & decompiler. | Decompiler Tools
cameradar 194.d73878a Hacks its way into RTSP videosurveillance cameras. | Hacker Scanner Tools
camover 73.abcded1 A camera exploitation tool that allows to disclosure network camera admin password. | Exploitation Hacking Tools
camscan 1.0057215 A tool which will analyze the CAM table of Cisco switches to look for anamolies. | Hacker Scanner Tools
can-utils 841.6e7f845 Linux-CAN / SocketCAN user space applications.
canalyzat0r 41.6bc251e Security analysis toolkit for proprietary car protocols.
canari 3.3.10 Maltego rapid transform development and execution framework. | Forensic Tools
cangibrina 123.6de0165 Dashboard Finder. | Hacker Scanner Tools
cansina 57.e0d9727 A python-based Web Content Discovery Tool. | WebApp Hacking Tools
cantoolz 425.82d330b Framework for black-box CAN network analysis.
capfuzz 34.97ac312 Capture, fuzz and intercept web traffic. | Sniffing Tools
capstone 4.0.2 Lightweight multi-platform, multi-architecture disassembly framework | Reverse Engineering Tools
captipper 74.3fb2836 Malicious HTTP traffic explorer tool. | Forensic Tools
cardpwn 32.166abf9 OSINT Tool to find Breached Credit Cards Information. | Social Engineering Tools
carwhisperer 0.2 Intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys. | Bluetooth Hacking Tools
casefile 1.0.1 The little brother to Maltego without transforms, but combines graph and link analysis to examine links between manually added data to mind map your information | Forensic Tools
catnthecanary 7.e9184fe An application to query the data set for leaked data. | Recognise Hacking Tools
catphish 44.768d213 For phishing and corporate espionage. | Social Engineering Tools
ccrawldns 5.17187e5 Retrieves from the CommonCrawl data set unique subdomains for a given domain name. | Recognise Hacking Tools
cdpsnarf 0.1.6 Cisco discovery protocol sniffer. | Sniffing Tools
cecster 5.15544cb A tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocols. | Hacker Scanner Tools
centry 72.6de2868 Cold boot & DMA protection | Misc Tools
cero v1.3.0.r3.gd64990f Scrape domain names from SSL certificates of arbitrary hosts. | Hacker Scanner Tools
certgraph 163.508f05d Crawl the graph of certificate Alternate Names. | Recognise Hacking Tools
cewl 138.ddda1c0 A custom word list generator. | Automation Tools
cflow 1.7 A C program flow analyzer. | Code Audit Tools
cfr 152 Another Java decompiler. | Decompiler Tools
chainsaw v1.1.7.r4.g0bfdc0e A powerful ‘first-response’ capability to quickly identify threats within Windows event logs. | Defensive Tools
chameleon 27.a2f0cf1 A tool for evading Proxy categorisation. | Network Hacking Tools
chameleonmini 436.0291b9b Official repository of ChameleonMini, a freely programmable, portable tool for NFC security analysis that can emulate and clone contactless cards, read RFID tags and sniff/log RF data. | Social Engineering Tools
changeme 266.89f59d4 A default credential scanner. | Hacker Scanner Tools
chankro 21.7b6e844 Tool that generates a PHP capable of run a custom binary (like a meterpreter) or a bash script (p.e. reverse shell) bypassing disable_functions & open_basedir). | WebApp Hacking Tools
chaos-client 142.b733660 Go client to communicate with Chaos dataset API. | Recognise Hacking Tools
chaosmap 1.3 An information gathering tool and dns / whois / web server scanner | Forensic Tools
chaosreader 0.94 A freeware tool to trace tcp, udp etc. sessions and fetch application data from snoop or tcpdump logs. | Network Hacking Tools
chapcrack 17.ae2827f A tool for parsing and decrypting MS-CHAPv2 network handshakes. | Cracker Hacking Tools
cheat-sh 6 The only cheat sheet you need. | Automation Tools
check-weak-dh-ssh 0.1 Debian OpenSSL weak client Diffie-Hellman Exchange checker. | Hacker Scanner Tools
checkiban 0.2 Checks the validity of an International Bank Account Number (IBAN). | Misc Tools
checksec 2.6.0 Tool designed to test which standard Linux OS and PaX security features are being used | Automation Tools
chiasm-shell 33.e20ed9f Python-based interactive assembler/disassembler CLI, powered byKeystone/Capstone. | Disassembler Tools
chipsec 1496.ad358086 Platform Security Assessment Framework. | Hardware Tools
chiron 48.524abe1 An all-in-one IPv6 Penetration Testing Framework. | Hacker Scanner Tools
chisel 201.9e97ddf A fast TCP tunnel over HTTP.
chkrootkit 0.55 Checks for rootkits on a system. | Defensive Tools
chntpw 140201 Offline NT Password Editor – reset passwords in a Windows NT SAM user database file | Forensic Tools
chopshop 416.1d26a77 Protocol Analysis/Decoder Framework. | Network Hacking Tools
choronzon 4.d702c31 An evolutionary knowledge-based fuzzer. | Fuzzing Tools
chownat 0.08b Allows two peers behind two separate NATs with no port forwarding and no DMZ setup on their routers to directly communicate with each other
chrome-decode 0.1 Chrome web browser decoder tool that demonstrates recovering passwords. | Windows Hacking Tools
chromefreak 24.12745b1 A Cross-Platform Forensic Framework for Google Chrome | Forensic Tools
chromensics 1.0 A Google chrome forensics tool. | Windows Hacking Tools
chw00t 39.1fd1016 Unices chroot breaking tool. | Exploitation Hacking Tools
cidr2range 1.0 Script for listing the IP addresses contained in a CIDR netblock. | Network Hacking Tools
cintruder 14.f8a3f12 An automatic pentesting tool to bypass captchas. | Cracker Hacking Tools
cipherscan 419.c67f3ee A very simple way to find out which SSL ciphersuites are supported by a target. | Hacker Scanner Tools
ciphertest 22.e33eb4a A better SSL cipher checker using gnutls. | Crypto Tools
ciphr 127.5da7137 A CLI tool for encoding, decoding, encryption, decryption, and hashing streams of data. | Crypto Tools
cirt-fuzzer 1.0 A simple TCP/UDP protocol fuzzer. | Fuzzing Tools
cisco-auditing-tool 1 Perl script which scans cisco routers for common vulnerabilities. Checks for default passwords, easily guessable community names, and the IOS history bug. Includes support for plugins and scanning multiple hosts. | Cracker Hacking Tools
cisco-global-exploiter 1.3 A perl script that targets multiple vulnerabilities in the Cisco Internetwork Operating System (IOS) and Catalyst products. | Exploitation Hacking Tools
cisco-ocs 0.2 Cisco Router Default Password Scanner. | Cracker Hacking Tools
cisco-router-config 1.1 Tools to copy and merge Cisco Routers Configuration. | Misc Tools
cisco-scanner 0.2 Multithreaded Cisco HTTP vulnerability scanner. Tested on Linux, OpenBSD and Solaris. | Cracker Hacking Tools
cisco-snmp-enumeration 10.ad06f57 Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking. | Automation Tools
cisco-snmp-slap 5.daf0589 IP address spoofing tool in order to bypass an ACL protecting an SNMP service on Cisco IOS devices. | Spoofing Hacking Tools
cisco-torch 0.4b Cisco Torch mass scanning, fingerprinting, and exploitation tool. | Exploitation Hacking Tools
cisco5crack 2.c4b228c Crypt and decrypt the cisco enable 5 passwords. | Cracker Hacking Tools
cisco7crack 2.f1c21dd Crypt and decrypt the cisco enable 7 passwords. | Cracker Hacking Tools
ciscos 1.3 Scans class A, B, and C networks for cisco routers which have telnet open and have not changed the default password from cisco. | Hacker Scanner Tools
citadel 95.3b1adbc A library of OSINT tools. | Recognise Hacking Tools
cjexploiter 6.72b08d8 Drag and Drop ClickJacking exploit development assistance tool. | WebApp Hacking Tools
clair 1545.12b676d4 Vulnerability Static Analysis for Containers. | Hacker Scanner Tools
clamscanlogparser 1 This is a utility to parse a Clam Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your malware collection. | Malware Tools
clash 1.10.6 A rule based proxy in Go
climber 30.5530a78 Check UNIX/Linux systems for privilege escalation. | Hacker Scanner Tools
cloakify 117.f45c3b3 Data Exfiltration In Plain Sight; Evade DLP/MLS Devices; Social Engineering of Analysts; Evade AV Detection. | Misc Tools
cloud-buster 194.b55e4a1 A tool that checks Cloudflare enabled sites for origin IP leaks. | Recognise Hacking Tools
cloudfail 79.7982c7d Utilize misconfigured DNS and old database records to find hidden IP’s behind the CloudFlare network. | Recognise Hacking Tools
cloudflare-enum 10.412387f Cloudflare DNS Enumeration Tool for Pentesters. | Hacker Scanner Tools
cloudget 64.cba10b1 Python script to bypass cloudflare from command line. Built upon cfscrape module. | WebApp Hacking Tools
cloudlist 118.a2d2952 A tool for listing Assets from multiple Cloud Providers. | Recognise Hacking Tools
cloudmare 89.dc36cfc A simple tool to find origin servers of websites protected by CloudFlare with a misconfiguration DNS. | Recognise Hacking Tools
cloudsploit 2212.77621542 AWS security scanning checks. | Hacker Scanner Tools
cloudunflare 14.b91a8a7 Reconnaissance Real IP address for Cloudflare Bypass. | Recognise Hacking Tools
clusterd 143.d190b2c Automates the fingerprinting, reconnaissance, and exploitation phases of an application server attack. | Automation Tools
cminer 25.d766f7e A tool for enumerating the code caves in PE files. | Binary Tools
cmospwd 5.1 Decrypts password stored in CMOS used to access BIOS setup. | Cracker Hacking Tools
cms-explorer 15.23b58cd Designed to reveal the specific modules, plugins, components and themes that various cms driven websites are running. | Fingerprinting Tools
cms-few 0.1 Joomla, Mambo, PHP-Nuke, and XOOPS CMS SQL injection vulnerability scanning tool written in Python. | WebApp Hacking Tools
cmseek 353.9c40fbb CMS (Content Management Systems) Detection and Exploitation suite. | WebApp Hacking Tools
cmsfuzz 5.6be5a98 Fuzzer for wordpress, cold fusion, drupal, joomla, and phpnuke. | WebApp Hacking Tools
cmsmap 8.59dd0e2 A python open source Content Management System scanner that automates the process of detecting security flaws of the most popular CMSs. | Hacker Scanner Tools
cmsscan 43.f060b4b CMS scanner to identify and find vulnerabilities for WordPress, Drupal, Joomla, vBulletin. | WebApp Hacking Tools
cmsscanner 0.13.8 CMS Scanner Framework. | WebApp Hacking Tools
cnamulator 5.4667c68 A phone CNAM lookup utility using the OpenCNAM API. | Mobile Hacking Tools
cntlm 4.b35d55c An NTLM, NTLM2SR, and NTLMv2 authenticating HTTP proxy. | Proxy Tools
codeql 2.8.1 The CLI tool for GitHub CodeQL | Automation Tools
codetective 45.52b91f1 A tool to determine the crypto/encoding algorithm used according to traces of its representation. | Crypto Tools
comission 203.67b890e WhiteBox CMS analysis. | WebApp Hacking Tools
commix 1821.7d0c36dc Automated All-in-One OS Command Injection and Exploitation Tool. | WebApp Hacking Tools
commonspeak 36.f0aad23 Leverages publicly available datasets from Google BigQuery to generate wordlists. | Automation Tools
complemento 0.7.6 A collection of tools for pentester: LetDown is a powerful tcp flooder ReverseRaider is a domain scanner that use wordlist scanning or reverse resolution scanning Httsquash is an http server scanner, banner grabber and data retriever | Fingerprinting Tools
compp 1.0.5 Company Passwords Profiler helps making a bruteforce wordlist for a targeted company. | Cracker Hacking Tools
configpush 0.8.5 This is a tool to span /8-sized networks quickly sending snmpset requests with default or otherwise specified community string to Cisco devices. | Hacker Scanner Tools
conpot 0.6.0 ICS honeypot with the goal to collect intelligence about the motives and methods of adversaries targeting industrial control systems.
conscan 1.2 A blackbox vulnerability scanner for the Concre5 CMS. | Fuzzing Tools
cook 236.55d2e8d Easily create word’s permutation and combination to generate complex wordlists and passwords. | Automation Tools
cookie-cadger 1.08 An auditing tool for Wi-Fi or wired Ethernet connections. | Fuzzing Tools
corkscrew 2.0 A tool for tunneling SSH through HTTP proxies
corscanner 99.593043f Fast CORS misconfiguration vulnerabilities scanner. | WebApp Hacking Tools
corstest 10.beffd0b A simple CORS misconfigurations checker. | Hacker Scanner Tools
corsy 69.2985ae2 CORS Misconfiguration Scanner. | WebApp Hacking Tools
cottontail 93.b7f5222 Capture all RabbitMQ messages being sent through a broker. | Sniffing Tools
cowpatty 4.8 Wireless WPA/WPA2 PSK handshake cracking utility | Wireless Hacking Tools
cpfinder 0.1 Simple script that looks for administrative web interfaces. | Hacker Scanner Tools
cppcheck 2.8 A tool for static C/C++ code analysis | Code Audit Tools
cpptest 2.0.0 A portable and powerful, yet simple, unit testing framework for handling automated tests in C++. | Code Audit Tools
cr3dov3r 46.99a1660 Search for public leaks for email addresses + check creds against 16 websites. | Recognise Hacking Tools
crabstick 47.bb7827f Automatic remote/local file inclusion vulnerability analysis and exploit tool. | WebApp Hacking Tools
cracken v1.0.1.r0.g7a325ff A ast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust. | Misc Tools
crackhor 2.ae7d83f A Password cracking utility. | Cracker Hacking Tools
crackle 111.d83b4b6 Crack and decrypt BLE encryption. | Cracker Hacking Tools
crackmapexec 780.e9bcd09 A swiss army knife for pentesting Windows/Active Directory environments. | Hacker Scanner Tools
crackq 48.89b7318 GPU-accelerated password cracker. | Cracker Hacking Tools
crackserver 33.e5763ab An XMLRPC server for password cracking. | Cracker Hacking Tools
crawlic 51.739fe2b Web recon tool (find temporary files, parse robots.txt, search folders, google dorks and search domains hosted on same server). | WebApp Hacking Tools
creak 40.52b0d74 Poison, reset, spoof, redirect MITM script. | Network Hacking Tools
create_ap 265.462c09f A shell script to create a NATed/Bridged Software Access Point. | Wireless Hacking Tools
creddump 3.ed95e1a A python tool to extract various credentials and secrets from Windows registry hives. | Cracker Hacking Tools
credmap 116.d862247 The Credential mapper – Tool that was created to bring awareness to the dangers of credential reuse. | Misc Tools
creds 17.1ec8297 Harvest FTP/POP/IMAP/HTTP/IRC credentials along with interesting data from each of the protocols. | Sniffing Tools
credsniper 21.f52461b Phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens. | Social Engineering Tools
creepy 137.9f60449 A geolocation information gatherer. Offers geolocation information gathering through social networking platforms. | Hacker Scanner Tools
cribdrag 5.2d27dbf An interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys. | Crypto Tools
crlf-injector 9.bd6db06 A python script for testing CRLF injecting issues. | Fuzzing Tools
crlfuzz 60.da5d40c A fast tool to scan CRLF vulnerability written in Go. | WebApp Hacking Tools
crosslinked 4.d600f96 LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping. | Social Engineering Tools
crosstool-ng 1.25.0 A versatile (cross-)toolchain generator | Misc Tools
crowbar 111.4b563dc A brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools. | Cracker Hacking Tools
crozono 5.6a51669 A modular framework designed to automate the penetration testing of wireless networks from drones and such unconventional devices.
crunch 3.6 A wordlist generator for all combinations/permutations of a given character set. | Automation Tools
crypthook 18.690dcae TCP/UDP symmetric encryption tunnel wrapper. | Crypto Tools
cryptohazemultiforcer 1.31a High performance multihash brute forcer with CUDA support. | Cracker Hacking Tools
cryptonark 0.5.7 SSL security checker. | Crypto Tools
csrftester 1.0 The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws. | WebApp Hacking Tools
ct-exposer 23.23e8c84 An OSINT tool that discovers sub-domains by searching Certificate Transparency logs. | Hacker Scanner Tools
ctf-party v2.1.0.r16.g41dc61d A CLI tool & library to enhance and speed up script/exploit writing for CTF players. | Misc Tools
ctunnel 0.7 Tunnel and/or proxy TCP or UDP connections via a cryptographic tunnel.
ctypes-sh 153.6982e6c Allows you to call routines in shared libraries from within bash. | Reverse Engineering Tools
cuckoo 2.0.7 Automated malware analysis system. | Malware Tools
cudahashcat 2.01 Worlds fastest WPA cracker with dictionary mutation engine. | Cracker Hacking Tools
cupp 77.56547fd Common User Password Profiler | Cracker Hacking Tools
cutycapt 10 A Qt and WebKit based command-line utility that captures WebKit’s rendering of a web page. | Recognise Hacking Tools
cve-api 170.8e9c247 Unofficial api for | Misc Tools
cve-search v4.2.1.r0.gb99da1a A tool to perform local searches for known vulnerabilities. | Exploitation Hacking Tools
cvechecker 4.0 The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning the installed software and matching the results with the CVE database. | Hacker Scanner Tools
cybercrowl 111.f7cac52 A Python Web path scanner tool. | WebApp Hacking Tools
cyberscan 75.ca85794 A Network Pentesting Tool | Network Hacking Tools
cymothoa 1 A stealth backdooring tool, that inject backdoor’s shellcode into an existing process. | Backdooring Tools
d-tect 13.9555c25 Pentesting the Modern Web. | Hacker Scanner Tools
dagon 244.f065d7b Advanced Hash Manipulation. | Crypto Tools
dalfox 1128.0393e8d Parameter Analysis and XSS Scanning tool. | WebApp Hacking Tools
damm 32.60e7ec7 Differential Analysis of Malware in Memory. | Malware Tools
daredevil 42.81cb57f A tool to perform (higher-order) correlation power analysis attacks (CPA). | Crypto Tools
dark-dork-searcher 1.0 Dark-Dork Searcher. | Windows Hacking Tools
darkarmour 4.f10228a Store and execute an encrypted windows binary from inside memory, without a single bit touching disk. | Windows Hacking Tools
darkbing 0.1 A tool written in python that leverages bing for mining data on systems that may be susceptible to SQL injection. | Hacker Scanner Tools
darkd0rk3r 1.0 Python script that performs dork searching and searches for local file inclusion and SQL injection errors. | Exploitation Hacking Tools
darkdump 17.06ca0b6 Search The Deep Web Straight From Your Terminal. | WebApp Hacking Tools
darkjumper 5.8 This tool will try to find every website that host at the same server at your target. | WebApp Hacking Tools
darkmysqli 1.6 Multi-Purpose MySQL Injection Tool | Exploitation Hacking Tools
darkscrape 68.2ca0e37 OSINT Tool For Scraping Dark Websites. | WebApp Hacking Tools
darkspiritz 6.4d23e94 A penetration testing framework for Linux, MacOS, and Windows systems. | Exploitation Hacking Tools
darkstat 3.0.721 Network statistics gatherer (packet sniffer) | Sniffing Tools
datajackproxy 42.f75f3a3 A proxy which allows you to intercept TLS traffic in native x86 applications across platform. | Proxy Tools
datasploit 367.a270d50 Performs automated OSINT and more. | Recognise Hacking Tools
davoset 1.3.7 A tool for using Abuse of Functionality and XML External Entities vulnerabilities on some websites to attack other websites. | DOS Hacking Tools
davscan 30.701f967 Fingerprints servers, finds exploits, scans WebDAV. | WebApp Hacking Tools
davtest 3.a282c58 Tests WebDAV enabled servers by uploading test executable files, and then (optionally) uploading files which allow for command execution or other actions directly on the target. | Hacker Scanner Tools
dawnscanner v2.0.0.rc4.r0.gd6150be A static analysis security scanner for ruby written web applications. | WebApp Hacking Tools
dbd 61.8cf5350 A Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32. | Misc Tools
dbpwaudit 0.8 A Java tool that allows you to perform online audits of password quality for several database engines. | Cracker Hacking Tools
dbusmap 16.6bb2831 Simple utility for enumerating D-Bus endpoints, an nmap for D-Bus. | Hacker Scanner Tools
dc3dd 7.2.646 A patched version of dd that includes a number of features useful for computer forensics. | Forensic Tools
dcfldd 1.7.1 DCFL (DoD Computer Forensics Lab) dd replacement with hashing. | Forensic Tools
dcrawl 7.3273c35 Simple, but smart, multi-threaded web crawler for randomly gathering huge lists of unique domain names. | Hacker Scanner Tools
ddosify v0.7.9.r1.gdec778e High-performance load testing tool, written in Golang. | DOS Hacking Tools
ddrescue 1.26 GNU data recovery tool | Forensic Tools
de4dot 3.1.41592 .NET deobfuscator and unpacker. | Windows Hacking Tools
deathstar 59.f10fdbf Automate getting Domain Admin using Empire. | Automation Tools
debinject 43.d884309 Inject malicious code into *.debs. | Backdooring Tools
deblaze 1.0608dc3 Performs method enumeration and interrogation against flash remoting end points. | Hacker Scanner Tools
decodify 50.76a0801 Tool that can detect and decode encoded strings, recursively. | Crypto Tools
deen 601.fd9aebe Generic data encoding/decoding application built with PyQt5. | Crypto Tools
deepce 99.0605062 Docker Enumeration, Escalation of Privileges and Container Escapes. | Exploitation Hacking Tools
delldrac 0.1a DellDRAC and Dell Chassis Discovery and Brute Forcer. | Hacker Scanner Tools
delorean 16.0291151 NTP Main-in-the-Middle tool. | Exploitation Hacking Tools
demiguise 9.0293989 HTA encryption tool for RedTeams. | Crypto Tools
densityscout 45 Calculates density for files of any file-system-path to finally output an accordingly descending ordered list. | Misc Tools
depant 0.3a Check network for services with default passwords. | Cracker Hacking Tools
depdep 2.0 A merciless sentinel which will seek sensitive files containing critical info leaking through your network. | Network Hacking Tools
dependency-check 6.5.3 A tool that attempts to detect publicly disclosed vulnerabilities contained within a project’s dependencies. | Defensive Tools
depix 38.f7d1850 A tool for recovering passwords from pixelized screenshots. | Misc Tools
det 31.417cbce (extensible) Data Exfiltration Toolkit. | Network Hacking Tools
detect-it-easy 3.02 A program for determining types of files. | Binary Tools
detect-secrets v1.2.0.r23.g3c8ee74 An enterprise friendly way of detecting and preventing secrets in code. | Code Audit Tools
detect-sniffer 151.63f0d7f Tool that detects sniffers in the network. | Defensive Tools
detectem 276.bc5f073 Detect software and its version on websites. | Fingerprinting Tools
devaudit 803.ca0a68e An open-source, cross-platform, multi-purpose security auditing tool targeted at developers and teams. | Code Audit Tools
device-pharmer 40.b06a460 Opens 1K+ IPs or Shodan search results and attempts to login. | Cracker Hacking Tools
dex2jar 2.1 A tool for converting Android’s .dex format to Java’s .class format | Hardware Tools
dexpatcher 1.7.0 Modify Android DEX/APK files at source-level using Java. | Mobile Hacking Tools
dff-scanner 1.1 Tool for finding path of predictable resource locations. | WebApp Hacking Tools
dfir-ntfs 1.1.13 An NTFS parser for digital forensics & incident response. | Forensic Tools
dftimewolf 481.cf2702bd Framework for orchestrating forensic collection, processing and data export . | Forensic Tools
dga-detection 78.0a3186e DGA Domain Detection using Bigram Frequency Analysis. | Recognise Hacking Tools
dharma 98.6b1e511 Generation-based, context-free grammar fuzzer. | Fuzzing Tools
dhcdrop 0.5 Remove illegal dhcp servers with IP-pool underflow. | Misc Tools
dhcpf 3.a770b20 Passive DHCP fingerprinting implementation. | Fingerprinting Tools
dhcpig 92.9fd8df5 Enhanced DHCPv4 and DHCPv6 exhaustion and fuzzing script written in python using scapy network library. | Hacker Scanner Tools
dhcpoptinj 123.58a12c6 DHCP option injector. | Network Hacking Tools
didier-stevens-suite 324.49c4f96 Didier Stevens Suite.
dinouml 0.9.5 A network simulation tool, based on UML (User Mode Linux) that can simulate big Linux networks on a single PC | Network Hacking Tools
dirb 2.22 A web content scanner, brute forceing for hidden files. | Hacker Scanner Tools
dirble 1.4.2 Fast directory scanning and scraping tool. | WebApp Hacking Tools
dirbuster 1.0_RC1 An application designed to brute force directories and files names on web/application servers | Hacker Scanner Tools
dirbuster-ng 9.0c34920 C CLI implementation of the Java dirbuster tool. | WebApp Hacking Tools
directorytraversalscan Detect directory traversal vulnerabilities in HTTP servers and web applications. | Windows Hacking Tools
dirhunt 298.57bfd58 Find web directories without bruteforce. | WebApp Hacking Tools
dirscanner 0.1 This is a python script that scans webservers looking for administrative directories, php shells, and more. | Hacker Scanner Tools
dirscraper 16.e752450 OSINT Scanning tool which discovers and maps directories found in javascript files hosted on a website. | WebApp Hacking Tools
dirsearch 2115.db98bbe HTTP(S) directory/file brute forcer. | WebApp Hacking Tools
dirstalk 1.3.3 Modern alternative to dirbuster/dirb. | Hacker Scanner Tools
disitool 0.4 Tool to work with Windows executables digital signatures. | Forensic Tools
dislocker 561.f9674c4 Read BitLocker encrypted volumes under Linux. | Crypto Tools
dissector 1 This code dissects the internal data structures in ELF files. It supports x86 and x86_64 archs and runs under Linux. | Binary Tools
distorm 3.5.2 Powerful disassembler library for x86/AMD64 | Disassembler Tools
dive v0.10.0.r2.gc7d121b A tool for exploring each layer in a docker image. | Hacker Scanner Tools
dizzy 2.0 A Python based fuzzing framework with many features. | Fuzzing Tools
dkmc 56.3c238f0 Dont kill my cat – Malicious payload evasion tool. | Exploitation Hacking Tools
dmde Disk Editor and Data Recovery Software. | Forensic Tools
dmg2img 1.6.7 A CLI tool to uncompress Apple’s compressed DMG files to the HFS+ IMG format | Forensic Tools
dmitry 1.3a Deepmagic Information Gathering Tool. | Hacker Scanner Tools
dnmap 0.6 The distributed nmap framework. | Hacker Scanner Tools
dns-parallel-prober 58.d8547e2 PoC for an adaptive parallelised DNS prober. | Recognise Hacking Tools
dns-reverse-proxy 33.910893a A reverse DNS proxy written in Go. | Proxy Tools
dns-spoof 13.81ba29f Yet another DNS spoof utility. | Spoofing Hacking Tools
dns2geoip 0.1 A simple python script that brute forces DNS and subsequently geolocates the found subdomains. | Hacker Scanner Tools
dns2tcp 0.5.2 A tool for relaying TCP connections over DNS.
dnsa 0.6 A dns security swiss army knife. | Hacker Scanner Tools
dnsbf 0.3 Search for available domain names in an IP range. | Hacker Scanner Tools
dnsbrute 2.b1dc84a Multi-theaded DNS bruteforcing, average speed 80 lookups/second with 40 threads. | Recognise Hacking Tools
dnscan 205.48fa99b A python wordlist-based DNS subdomain scanner. | Hacker Scanner Tools
dnschef 17.a395411 A highly configurable DNS proxy for pentesters. | Proxy Tools
dnscobra 1.0 DNS subdomain bruteforcing tool with Tor support through torsocks | Recognise Hacking Tools
dnsdiag 271.edb168f DNS Diagnostics and Performance Measurement Tools. | Network Hacking Tools
dnsdrdos 0.1 Proof of concept code for distributed DNS reflection DoS. | DOS Hacking Tools
dnsenum Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results. | Recognise Hacking Tools
dnsfilexfer 24.126edcd File transfer via DNS. | Network Hacking Tools
dnsgoblin 0.1 Nasty creature constantly searching for DNS servers. It uses standard dns querys and waits for the replies. | Hacker Scanner Tools
dnsgrep 14.3f4fa7c A utility for quickly searching presorted DNS names. | Recognise Hacking Tools
dnsmap 0.30 Passive DNS network mapper | Fingerprinting Tools
dnsobserver 5.f331482 A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. | Network Hacking Tools
dnspredict 0.0.2 DNS prediction. | Hacker Scanner Tools
dnsprobe 56.7120008 Allows you to perform multiple dns queries of your choice with a list of user supplied resolvers. | Recognise Hacking Tools
dnspy 6.1.8 .NET debugger and assembly editor. | Windows Hacking Tools
dnsrecon 1.0.0 Python script for enumeration of hosts, subdomains and emails from a given domain using google. | Recognise Hacking Tools
dnssearch 20.e4ea439 A subdomain enumeration tool. | Recognise Hacking Tools
dnsspider 1.3 A fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation. | Recognise Hacking Tools
dnsteal 28.1b09d21 DNS Exfiltration tool for stealthily sending files over DNS requests.. | Network Hacking Tools
dnstracer 1.10 Determines where a given DNS server gets its information from, and follows the chain of DNS servers | Recognise Hacking Tools
dnstwist 464.7692bc6 Domain name permutation engine for detecting typo squatting, phishing and corporate espionage. | Hacker Scanner Tools
dnsvalidator 67.b12acc0 Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses. | Network Hacking Tools
dnswalk 2.0.2 A DNS debugger and zone-transfer utility. | Recognise Hacking Tools
dnsx 309.5cb005c Fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers. | Recognise Hacking Tools
docem 20.b0ddd87 Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids). | WebApp Hacking Tools
dockerscan 59.590a844 Docker security analysis & hacking tools. | Hacker Scanner Tools
domain-analyzer 0.8.1 Finds all the security information for a given domain name. | Recognise Hacking Tools
domain-stats 165.1cf05bf A web API to deliver domain information from whois and alexa. | Recognise Hacking Tools
domained 80.d9d079c Multi Tool Subdomain Enumeration. | Recognise Hacking Tools
domainhunter 38.c185116 Checks expired domains for categorization/reputation and history to determine good candidates for phishing and C2 domain names. | Recognise Hacking Tools
domato 96.7625d1d DOM fuzzer. | Fuzzing Tools
domi-owned 41.583d0a5 A tool used for compromising IBM/Lotus Domino servers. | WebApp Hacking Tools
domlink 37.1cabd5d A tool to link a domain with registered organisation names and emails, to other domains. | Misc Tools
dontgo403 0.3.r9.gf948e31 Tool to bypass 40X response codes.. | WebApp Hacking Tools
donut 368.dafea17 Generates x86, x64 or AMD64+x86 P.I. shellcode loading .NET Assemblies from memory. | Backdooring Tools
doona 145.7a4796c A fork of the Bruteforce Exploit Detector Tool (BED). | Fuzzing Tools
doork 6.90c7260 Passive Vulnerability Auditor. | WebApp Hacking Tools
doozer 9.5cfc8f8 A Password cracking utility. | Cracker Hacking Tools
dorkbot 174.7a539b5 Command-line tool to scan Google search results for vulnerabilities. | Hacker Scanner Tools
dorkme 57.0a7017a Tool designed with the purpose of making easier the searching of vulnerabilities with Google Dorks, such as SQL Injection vulnerabilities. | Hacker Scanner Tools
dorknet 58.419d6a2 Selenium powered Python script to automate searching for vulnerable web apps. | WebApp Hacking Tools
dorkscout 1.0.r13.gdd87daf Golang tool to automate google dork scan against the entire internet or specific targets. | Automation Tools
dotdotpwn 3.0.2 The Transversal Directory Fuzzer. | Exploitation Hacking Tools
dotpeek 2021.3.3 Free .NET Decompiler and Assembly Browser. | Windows Hacking Tools
dpeparser beta002 Default password enumeration project | Cracker Hacking Tools
dpscan 0.1 Drupal Vulnerability Scanner. | Hacker Scanner Tools
dr-checker 140.ea63c0f A Soundy Vulnerability Detection Tool for Linux Kernel Drivers. | Exploitation Hacking Tools
dr0p1t-framework 44.db9bc2d A framework that creates a dropper that bypass most AVs, some sandboxes and have some tricks. | Backdooring Tools
dracnmap 69.09d3945 Tool to exploit the network and gathering information with nmap help. | Automation Tools
dradis-ce 5126.4bfe5cfe An open source framework to enable effective information sharing. | Recognise Hacking Tools
dragon-backdoor 7.c7416b7 A sniffing, non binding, reverse down/exec, portknocking service Based on cd00r.c. | Backdooring Tools
driftnet v1.3.0.r13.ge492335 Listens to network traffic and picks out images from TCP streams it observes. | Hacker Scanner Tools
drinkme 19.acf1a14 A shellcode testing harness. | Exploitation Hacking Tools
dripcap 0.6.15 Caffeinated Packet Analyzer. | Network Hacking Tools
dripper v1.r1.gc9bb0c9 A fast, asynchronous DNS scanner; it can be used for enumerating subdomains and enumerating boxes via reverse DNS. | Hacker Scanner Tools
droopescan 1.45.1 A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe. | WebApp Hacking Tools
drozer 2.4.4 A security testing framework for Android – Precompiled binary from official repository. | Mobile Hacking Tools
drupal-module-enum 11.525543c Enumerate on drupal modules. | WebApp Hacking Tools
drupalscan 0.5.2 Simple non-intrusive Drupal scanner. | WebApp Hacking Tools
drupwn 59.8186732 Drupal enumeration & exploitation tool. | WebApp Hacking Tools
dscanner 0.12.1 Swiss-army knife for D source code | Code Audit Tools
dsd 91.7ee04e5 Digital Speech Decoder | Misc Tools
dsfs 36.8e9f8e9 A fully functional File inclusion vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code. | WebApp Hacking Tools
dshell 142.695c891 A network forensic analysis framework. | Forensic Tools
dsjs 32.26287d0 A fully functional JavaScript library vulnerability scanner written in under 100 lines of code. | WebApp Hacking Tools
dsniff 2.4b1 Collection of tools for network auditing and penetration testing | Sniffing Tools
dsss 123.84ddd33 A fully functional SQL injection vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code. | WebApp Hacking Tools
dsstore-crawler 4.9e003a3 A parser + crawler for .DS_Store files exposed publically. | WebApp Hacking Tools
dsxs 130.3e628b6 A fully functional Cross-site scripting vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code. | WebApp Hacking Tools
dtp-spoof 5.3ae05fc Python script/security tool to test Dynamic Trunking Protocol configuration on a switch. | Network Hacking Tools
dublin-traceroute 332.16c002c NAT-aware multipath tracerouting tool. | Network Hacking Tools
ducktoolkit 37.42da733 Encoding Tools for Rubber Ducky. | Exploitation Hacking Tools
dumb0 19.1493e74 A simple tool to dump users in popular forums and CMS. | Automation Tools
dump1090 386.bff92c4 A simple Mode S decoder for RTLSDR devices. | Network Hacking Tools
dumpacl 0.1 Dumps NTs ACLs and audit settings. | Windows Hacking Tools
dumpsmbshare 12.7b79ce6 A script to dump files and folders remotely from a Windows SMB share. | Misc Tools
dumpusers 1.0 Dumps account names and information even though RestrictAnonymous has been set to 1. | Windows Hacking Tools
dumpzilla 3152013 A forensic tool for firefox. | Forensic Tools
duplicut 2.2 Remove duplicates from massive wordlist, without sorting it (for dictionnary-based password cracking). | Misc Tools
dutas 10.37fa3ab Analysis PE file or Shellcode. | Binary Tools
dvcs-ripper 54.2c1bbc6 Rip web accessible (distributed) version control systems: SVN/GIT/BZR/CVS/HG. | Hacker Scanner Tools
dwarf 1079.b1d9d65 Full featured multi arch/os debugger built on top of PyQt5 and frida. | Binary Tools
dynamorio 9.0.19046 A dynamic binary instrumentation framework. | Binary Tools
eapeak 130.9550d1c Analysis Suite For EAP Enabled Wireless Networks. | Wireless Hacking Tools
eaphammer 273.e8d1ff8 Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks. | Wireless Hacking Tools
eapmd5pass 3.3d5551f An implementation of an offline dictionary attack against the EAP-MD5 protocol. | Cracker Hacking Tools
easy-creds 45.bf9f00c A bash script that leverages ettercap and other tools to obtain credentials. | Automation Tools
easyda 7.0867f9b Easy Windows Domain Access Script. | Automation Tools
easyfuzzer 3.6 A flexible fuzzer, not only for web, has a CSV output for efficient output analysis (platform independent). | Fuzzing Tools
eazy 0.1 This is a small python tool that scans websites to look for PHP shells, backups, admin panels, and more. | Hacker Scanner Tools
ecfs 305.1758063 Extended core file snapshot format. | Binary Tools
edb 3234.da04c339 A cross platform AArch32/x86/x86 debugger. | Debugger Tools
eggshell 157.eaeeea7 iOS/macOS/Linux Remote Administration Tool. | Backdooring Tools
eigrp-tools 0.1 This is a custom EIGRP packet generator and sniffer developed to test the security and overall operation quality of this brilliant Cisco routing protocol. | Sniffing Tools
eindeutig 20050628_1 Examine the contents of Outlook Express DBX email repository files (forensic purposes) | Forensic Tools
electric-fence 2.2.5 A malloc(3) debugger that uses virtual memory hardware to detect illegal memory accesses. | Debugger Tools
elettra 1.0 Encryption utility by Julia Identity | Misc Tools
elettra-gui 1.0 Gui for the elettra crypto application. | Misc Tools
elevate 27.1272d51 Horizontal domain discovery tool you can use to discover other domains owned by a given company. | Recognise Hacking Tools
elfkickers 3.2 Collection of ELF utilities (includes sstrip) | Binary Tools
elfparser 7.39d21ca Cross Platform ELF analysis. | Binary Tools
elfutils 0.187 Handle ELF object files and DWARF debugging information (utilities) | Binary Tools
elidecode 48.38fa5ba A tool to decode obfuscated shellcodes using the unicorn-engine for the emulation and the capstone-engine to print the asm code. | Reverse Engineering Tools
elite-proxy-finder 51.1ced3be Finds public elite anonymity proxies and concurrently tests them. | Proxy Tools
email2phonenumber 29.9df9dbe A OSINT tool to obtain a target’s phone number just by having his email address. | Social Engineering Tools
emldump 0.0.11 Analyze MIME files. | Forensic Tools
emp3r0r v1.16.1.r1.gba3f8ac Linux post-exploitation framework made by linux user. | Automation Tools
empire 2685.c011f682 A PowerShell and Python post-exploitation agent. | Automation Tools
enabler 1 Attempts to find the enable password on a cisco system via brute force. | Cracker Hacking Tools
encodeshellcode 0.1b This is an encoding tool for 32-bit x86 shellcode that assists a researcher when dealing with character filter or byte restrictions in a buffer overflow vulnerability or some kind of IDS/IPS/AV blocking your code. | Exploitation Hacking Tools
ent 1.0 Pseudorandom number sequence test. | Misc Tools
enteletaor 66.e8e4daa Message Queue & Broker Injection tool that implements attacks to Redis, RabbitMQ and ZeroMQ. | Exploitation Hacking Tools
entropy 702.13aac50 A set of tools to exploit Netwave and GoAhead IP Webcams. | Exploitation Hacking Tools
enum-shares 7.97cba5a Tool that enumerates shared folders across the network and under a custom user account. | Hacker Scanner Tools
enum4linux 0.9.1 A tool for enumerating information from Windows and Samba systems. | Recognise Hacking Tools
enum4linux-ng 326.e79345d A next generation version of enum4linux. | Recognise Hacking Tools
enumerate-iam 14.4529114 Enumerate the permissions associated with an AWS credential set. | Recognise Hacking Tools
enumerid 28.9872ba7 Enumerate RIDs using pure Python. | Recognise Hacking Tools
enumiax 1.0 An IAX enumerator. | Hacker Scanner Tools
enyelkm 1.2 Rootkit for Linux x86 kernels v2.6. | Backdooring Tools
eos 12.636394e Enemies Of Symfony – Debug mode Symfony looter. | WebApp Hacking Tools
epicwebhoneypot 2.0a Tool which aims to lure attackers using various types of web vulnerability scanners by tricking them into believing that they have found a vulnerability on a host. | WebApp Hacking Tools
erase-registrations 1.0 An IAX flooder. | VOIP Hacking Tools
eraser Windows tool which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. | Windows Hacking Tools
eresi 1291.4769c175 The ERESI Reverse Engineering Software Interface. | Binary Tools
erl-matter 46.a983e94 Tool to exploit epmd related services such as rabbitmq, ejabberd and couchdb by bruteforcing the cookie and gaining RCE afterwards. | Exploitation Hacking Tools
espionage 43.72082d4 A Network Packet and Traffic Interceptor For Linux. Sniff All Data Sent Through a Network. | Sniffing Tools
eternal-scanner 91.4ba62ff An internet scanner for exploit CVE-0144 (Eternal Blue). | Hacker Scanner Tools
etherape 0.9.20 Graphical network monitor for various OSI layers and protocols | Network Hacking Tools
etherchange 1.1 Can change the Ethernet address of the network adapters in Windows. | Windows Hacking Tools
etherflood 1.1 Floods a switched network with Ethernet frames with random hardware addresses. | Windows Hacking Tools
ettercap Network sniffer/interceptor/logger for ethernet LANs – console | Sniffing Tools
evil-ssdp 94.ee76fb0 Spoof SSDP replies to phish for NetNTLM challenge/response on a network. | Spoofing Hacking Tools
evil-winrm v3.3.r0.gfc677a4 The ultimate WinRM shell for hacking/pentesting. | Exploitation Hacking Tools
evilclippy 62.fa610c6 A cross-platform assistant for creating malicious MS Office documents. | Exploitation Hacking Tools
evilginx 2.4.0 Man-in-the-middle attack framework used for phishing login credentials | Social Engineering Tools
evilgrade 2.0.9 Modular framework that takes advantage of poor upgrade implementations by injecting fake updates. | Misc Tools
evilize 0.2 Tool to create MD5 colliding binaries. | Cracker Hacking Tools
evillimiter 36.46d2033 Tool that limits bandwidth of devices on the same network without access. | Network Hacking Tools
evilmaid 1.01 TrueCrypt loader backdoor to sniff volume password | Cracker Hacking Tools
evilpdf 5.43696a8 Embedding executable files in PDF Documents. | Backdooring Tools
evine 42.46051de Interactive CLI Web Crawler. | WebApp Hacking Tools
evtkit 8.af06db3 Fix acquired .evt – Windows Event Log files (Forensics). | Forensic Tools
exabgp 4935.8f06fee2 The BGP swiss army knife of networking. | Network Hacking Tools
exe2image 1.1 A simple utility to convert EXE files to JPEG images and vice versa. | Backdooring Tools
exescan 1.ad993e3 A tool to detect anomalies in PE (Portable Executable) files. | Binary Tools
exitmap 369.172e763 A fast and modular scanner for Tor exit relays. | Recognise Hacking Tools
expimp-lookup 4.79a96c7 Looks for all export and import names that contain a specified string in all Portable Executable in a directory tree. | Binary Tools
exploit-db 1.6 The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software – A collection of hacks | Exploitation Hacking Tools
exploitdb 20211221 Offensive Security’s Exploit Database Archive | Exploitation Hacking Tools
exploitpack 139.e565c47 Exploit Pack – The next generation exploit framework. | Exploitation Hacking Tools
expose 1110.30264af A Dynamic Symbolic Execution (DSE) engine for JavaScript | Binary Tools
exrex 144.9a66706 Irregular methods on regular expressions. | Misc Tools
extended-ssrf-search 28.680f815 Smart ssrf scanner using different methods like parameter brute forcing in post and get. | WebApp Hacking Tools
extracthosts 17.8fdff9e Extracts hosts (IP/Hostnames) from files. | Misc Tools
extractusnjrnl 7.362d4290 Tool to extract the $UsnJrnl from an NTFS volume. | Forensic Tools
eyeballer 137.d1d5182 Convolutional neural network for analyzing pentest screenshots. | Misc Tools
eyepwn 1.0 Exploit for Eye-Fi Helper directory traversal vulnerability | Exploitation Hacking Tools
eyewitness 936.2e7b880 Designed to take screenshots of websites, provide some server header info, and identify default credentials if possible. | WebApp Hacking Tools
f-scrack 19.9a00357 A single file bruteforcer supports multi-protocol. | Cracker Hacking Tools
facebash 17.95c3c25 Facebook Brute Forcer in shellscript using TOR. | Social Engineering Tools
facebookosint 21.656a04a OSINT tool to replace facebook graph search. | Social Engineering Tools
facebot 23.57f6025 A facebook profile and reconnaissance system. | Recognise Hacking Tools
facebrok 33.0f6fe8d Social Engineering Tool Oriented to facebook. | Social Engineering Tools
facebrute 7.ece355b This script tries to guess passwords for a given facebook account using a list of passwords (dictionary). | Cracker Hacking Tools
factordb-pycli 1.3.0 CLI for factordb and Python API Client. | Crypto Tools
fakeap 0.3.2 Black Alchemy’s Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP’s cacophony of beacon frames.
fakedns 118.39609da A regular-expression based python MITM DNS server with correct DNS request passthrough and “Not Found” responses. | Proxy Tools
fakemail 1.0 Fake mail server that captures e-mails as files for acceptance testing. | Misc Tools
fakenet-ng 299.596bb13 Next Generation Dynamic Network Analysis Tool. | Malware Tools
fakenetbios 7.b83701e A family of tools designed to simulate Windows hosts (NetBIOS) on a LAN. | Spoofing Hacking Tools
fang 22.4f94552 A multi service threaded MD5 cracker. | Cracker Hacking Tools
faradaysec 10992.dceeac702 Collaborative Penetration Test and Vulnerability Management Platform. | Hacker Scanner Tools
fastnetmon v1.1.4.r62.g780aff3 High performance DoS/DDoS load analyzer built on top of multiple packet capture engines. | Defensive Tools
fav-up 47.30d9059 IP lookup by favicon using Shodan. | Recognise Hacking Tools
favfreak 26.a1ecf3b Weaponizing favicon.ico for BugBounties , OSINT and what not. | Recognise Hacking Tools
fbht 70.d75ae93 A Facebook Hacking Tool | WebApp Hacking Tools
fbi 28.0f94e99 An accurate facebook account information gathering. | Social Engineering Tools
fbid 16.1b35eb9 Show info about the author by facebook photo url. | Recognise Hacking Tools
fcrackzip 1.0 Zip file password cracker | Cracker Hacking Tools
fdsploit 26.4522f53 A File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool. | WebApp Hacking Tools
featherduster 191.9229158 An automated, modular cryptanalysis tool. | Crypto Tools
fern-wifi-cracker 295.76c64b3 WEP, WPA wifi cracker for wireless penetration testing. | Wireless Hacking Tools
fernflower 485.e19aab6 An analytical decompiler for Java. | Decompiler Tools
fernmelder 6.c6d4ebe Asynchronous mass DNS scanner. | Hacker Scanner Tools
feroxbuster v2.4.0.r7.g75810ff A fast, simple, recursive content discovery tool written in Rust. | WebApp Hacking Tools
ffm 59.2afb61a A hacking harness that you can use during the post-exploitation phase of a red-teaming engagement. | Exploitation Hacking Tools
ffuf 210.5c489ae Fast web fuzzer written in Go. | WebApp Hacking Tools
ffuf-scripts 1.2192bf7 Scripts and snippets for ffuf payloads. | Misc Tools
fgscanner 11.893372c An advanced, opensource URL scanner. | Hacker Scanner Tools
fhttp 1.3 This is a framework for HTTP related attacks. It is written in Perl with a GTK interface, has a proxy for debugging and manipulation, proxy chaining, evasion rules, and more. | WebApp Hacking Tools
fi6s 170.5073aee IPv6 network scanner designed to be fast. | Hacker Scanner Tools
fierce 134.99eca52 A DNS reconnaissance tool for locating non-contiguous IP space. | Recognise Hacking Tools
fiked 0.0.5 Fake IDE daemon
filebuster 88.e46e12e An extremely fast and flexible web fuzzer. | WebApp Hacking Tools
filefuzz 1.0 A binary file fuzzer for Windows with several options. | Windows Hacking Tools
filegps 90.03cbc75 A tool that help you to guess how your shell was renamed after the server-side script of the file uploader saved it. | WebApp Hacking Tools
fileintel 33.a0bff38 A modular Python application to pull intelligence about malicious files. | Malware Tools
filibuster 167.c54ac80 A Egress filter mapping application with additional functionality. | Network Hacking Tools
fimap 1.00 A little tool for local and remote file inclusion auditing and exploitation | Exploitation Hacking Tools
finalrecon 109.3414057 OSINT Tool for All-In-One Web Reconnaissance. | Recognise Hacking Tools
find-dns 0.1 A tool that scans networks looking for DNS servers. | Hacker Scanner Tools
find3 604.5964026 High-precision indoor positioning framework. | Misc Tools
findmyhash 1.1.2 Crack different types of hashes using free online services. | Crypto Tools
findmyiphone 19.aef3ac8 Locates all devices associated with an iCloud account | Mobile Hacking Tools
findomain 8.1.1 The fastest and cross-platform subdomain enumerator, do not waste your time | Recognise Hacking Tools
findsploit 87.3e61d8d Find exploits in local and online databases instantly. | Automation Tools
fingerprinter 480.105ab04 CMS/LMS/Library etc Versions Fingerprinter. | WebApp Hacking Tools
firecat 6.b5205c8 A penetration testing tool that allows you to punch reverse TCP tunnels out of a compromised network. | Network Hacking Tools
firefox-decrypt 1.0.0.r12.gaa471d9 Extract passwords from Mozilla Firefox, Waterfox, Thunderbird, SeaMonkey profiles. | Forensic Tools
firefox-security-toolkit 16.31dacf0 A tool that transforms Firefox browsers into a penetration testing suite. | Misc Tools
firewalk 5.0 An active reconnaissance network security tool. | Fuzzing Tools
firmwalker 101.23ff299 Script for searching the extracted firmware file system for goodies.
firmware-mod-kit 145.104c821 Modify firmware images without recompiling.
firstexecution 6.a275793 A Collection of different ways to execute code outside of the expected entry points. | Exploitation Hacking Tools
firstorder 8.107eb6a A traffic analyzer to evade Empire communication from Anomaly-Based IDS. | Sniffing Tools
fl0p 0.1 A passive L7 flow fingerprinter that examines TCP/UDP/ICMP packet sequences, can peek into cryptographic tunnels, can tell human beings and robots apart, and performs a couple of other infosec-related tricks. | Fingerprinting Tools
flamerobin 2370.c75f8618 A tool to handle Firebird database management. | Database Tools
flare 0.6 Flare processes an SWF and extracts all scripts from it. | Misc Tools
flare-floss 860.7138b61 Obfuscated String Solver – Automatically extract obfuscated strings from malware. | Malware Tools
flashlight 109.90d1dc5 Automated Information Gathering Tool for Penetration Testers. | Recognise Hacking Tools
flashscanner 11.6815b02 Flash XSS Scanner. | Hacker Scanner Tools
flashsploit 23.c465a6d Exploitation Framework for ATtiny85 Based HID Attacks. | Exploitation Hacking Tools
flask-session-cookie-manager2 v1.2.1.1.r10.gd1b17a6 Decode and encode Flask session cookie. | WebApp Hacking Tools
flask-session-cookie-manager3 v1.2.1.1.r10.gd1b17a6 Decode and encode Flask session cookie. | WebApp Hacking Tools
flasm 1.62 Disassembler tool for SWF bytecode | Reverse Engineering Tools
flawfinder 2.0.19 Searches through source code for potential security flaws | Code Audit Tools
flowinspect 97.34759ed A network traffic inspection tool. | Network Hacking Tools
flunym0us 2.0 A Vulnerability Scanner for WordPress and Moodle. | Hacker Scanner Tools
fluxion 1548.09a17a6 A security auditing and social-engineering research tool. | Social Engineering Tools
flyr 76.4926ecc Block-based software vulnerability fuzzing framework. | Fuzzing Tools
fockcache 10.3e7efa9 Tool to make cache poisoning by trying X-Forwarded-Host and X-Forwarded-Scheme headers on web pages. | WebApp Hacking Tools
forager 115.7439b0a Multithreaded threat Intelligence gathering utilizing. | Recognise Hacking Tools
foremost 1.5.7 A console program to recover files based on their headers, footers, and internal data structures | Forensic Tools
foresight 57.6f48984 A tool for predicting the output of random number generators. | Crypto Tools
forkingportscanner 1 Simple and fast forking port scanner written in perl. Can only scan on host at a time, the forking is done on the specified port range. Or on the default range of 1. Has the ability to scan UDP or TCP, defaults to tcp. | Hacker Scanner Tools
formatstringexploiter 29.8d64a56 Helper script for working with format string bugs. | Exploitation Hacking Tools
fortiscan 0.7.r7.gd54faa0 A high performance FortiGate SSL-VPN vulnerability scanning and exploitation tool. | Hacker Scanner Tools
fpdns 108.2a898bf Program that remotely determines DNS server versions. | Fingerprinting Tools
fping 5.1 Utility to ping multiple hosts at once | Network Hacking Tools
fport 2.0 Identify unknown open ports and their associated applications. | Windows Hacking Tools
fprotlogparser 1 This is a utility to parse a F-Prot Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your collection. | Malware Tools
fraud-bridge 10.775c563 ICMP and DNS tunneling via IPv4 and IPv6.
fred 0.1.1 Cross-platform M$ registry hive editor. | Windows Hacking Tools
freeipmi 1.6.9 IPMI remote console and system management software | Network Hacking Tools
freeradius 3.2.0 The premier open source RADIUS server | Wireless Hacking Tools
freewifi 30.1cb752b How to get free wifi. | Wireless Hacking Tools
frida 12.6.8 Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers. | Reverse Engineering Tools
frida-extract 13.abb3f14 based RunPE (and MapViewOfSection) extraction tool. | Reverse Engineering Tools
frida-ios-dump 53.56e99b2 Pull decrypted ipa from jailbreak device. | Mobile Hacking Tools
frida-push 1.0.8 Wrapper tool to identify the remote device and push device specific frida-server binary | Mobile Hacking Tools
fridump 23.3e64ee0 A universal memory dumper using Frida. | Forensic Tools
frisbeelite 1.2 A GUI-based USB device fuzzer. | Fuzzing Tools
fs-exploit 3.28bb9bb Format string exploit generation. | Exploitation Hacking Tools
fs-nyarl 1.0 A network takeover & forensic analysis tool – useful to advanced PenTest tasks & for fun and profit. | Hacker Scanner Tools
fscan 1.7.1.r22.ga2573e1 A Security Auditing Tool. | Hacker Scanner Tools
fsnoop 3.4 A tool to monitor file operations on GNU/Linux systems by using the Inotify mechanism. Its primary purpose is to help detecting file race condition vulnerabilities and since version 3, to exploit them with loadable DSO modules (also called “payload modules” or “paymods”). | Hacker Scanner Tools
fssb 73.51d2ac2 A low-level filesystem sandbox for Linux using syscall intercepts. | Defensive Tools
fstealer 0.1 Automates file system mirroring through remote file disclosure vulnerabilities on Linux machines. | Automation Tools
ftester 1.0 A tool designed for testing firewall filtering policies and Intrusion Detection System (IDS) capabilities. | Fuzzing Tools
ftp-fuzz 1337 The master of all master fuzzing scripts specifically targeted towards FTP server software. | Fuzzing Tools
ftp-scanner 0.2.5 Multithreaded ftp scanner/brute forcer. Tested on Linux, OpenBSD and Solaris. | Cracker Hacking Tools
ftp-spider 1.0 FTP investigation tool – Scans ftp server for the following: reveal entire directory tree structures, detect anonymous access, detect directories with write permissions, find user specified data within repository. | Hacker Scanner Tools
ftpmap 52.cbeabbe Scans remote FTP servers to identify what software and what versions they are running. | Fingerprinting Tools
ftpscout 12.cf1dff1 Scans ftps for anonymous access. | Hacker Scanner Tools
fuddly 569.fd2c4d0 Fuzzing and Data Manipulation Framework (for GNU/Linux). | Fuzzing Tools
fusil 1.5 A Python library used to write fuzzing programs. | Fuzzing Tools
fuxploider 140.ec8742b Tool that automates the process of detecting and exploiting file upload forms flaws. | WebApp Hacking Tools
fuzzap 17.057002b A python script for obfuscating wireless networks. | Wireless Hacking Tools
fuzzball2 0.7 A little fuzzer for TCP and IP options. It sends a bunch of more or less bogus packets to the host of your choice. | Fuzzing Tools
fuzzbunch 32.2b76c22 NSA Exploit framework | Exploitation Hacking Tools
fuzzdb 475.5656ab2 Attack and Discovery Pattern Dictionary for Application Fault Injection Testing. | Fuzzing Tools
fuzzdiff 1.0 A simple tool designed to help out with crash analysis during fuzz testing. It selectively ‘un-fuzzes’ portions of a fuzzed file that is known to cause a crash, re-launches the targeted application, and sees if it still crashes. | Fuzzing Tools
fuzzowski 41.e39f665 A Network Protocol Fuzzer made by NCCGroup based on Sulley and BooFuzz. | Fuzzing Tools
fuzztalk An XML driven fuzz testing framework that emphasizes easy extensibility and reusability. | Windows Hacking Tools
g72x++ 1 Decoder for the g72x++ codec. | Wireless Hacking Tools
gadgetinspector 6.ac7832d A byte code analyzer for finding deserialization gadget chains in Java applications. | Decompiler Tools
gadgettojscript 20.005cb8b .NET serialized gadgets that can trigger .NET assembly from JS/VBS/VBA based scripts. | Exploitation Hacking Tools
galleta 20040505_1 Examine the contents of the IE’s cookie files for forensic purposes | Forensic Tools
gasmask 172.2527371 All in one Information gathering tool – OSINT. | Recognise Hacking Tools
gatecrasher 2.3ad5225 Network auditing and analysis tool developed in Python. | Recognise Hacking Tools
gau 122.62befc9 Fetch known URLs from AlienVault’s Open Threat Exchange, the Wayback Machine, and Common Crawl. | WebApp Hacking Tools
gcat 29.39b266c A fully featured backdoor that uses Gmail as a C&C server. | Malware Tools
gcpbucketbrute 16.5fe33df A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated. | Hacker Scanner Tools
gcrypt 30.7c2fd05 Simple, secure and performance file encryption tool written in C | Crypto Tools
gdb 12.1 The GNU Debugger | Debugger Tools
gdb-common 12.1 The GNU Debugger | Debugger Tools
gdbgui 429.799d340 Browser-based gdb frontend using Flask and JavaScript to visually debug C, C++, Go, or Rust. | Debugger Tools
gef 2260.7f45550 Multi-Architecture GDB Enhanced Features for Exploiters & Reverse-Engineers. | Debugger Tools
gene 77.dca7ce6 Signature Engine for Windows Event Logs. | Windows Hacking Tools
genisys 53.d53bb0c Powerful Telegram Members Scraping and Adding Toolkit. | Social Engineering Tools
genlist 0.1 Generates lists of IP addresses. | Misc Tools
geoedge 0.2 This little tools is designed to get geolocalization information of a host, it get the information from two sources (maxmind and geoiptool). | Recognise Hacking Tools
geoip 1.6.12 Non-DNS IP-to-country resolver C library & utils | Network Hacking Tools
geoipgen 0.4 GeoIPgen is a country to IP addresses generator. | Misc Tools
gerix-wifi-cracker 1.1c3cd73 A graphical user interface for aircrack-ng and pyrit. | Wireless Hacking Tools
gethsploit 3.144778b Finding Ethereum nodes which are vulnerable to RPC-attacks. | Hacker Scanner Tools
getsids 0.0.1 Getsids tries to enumerate Oracle Sids by sending the services command to the Oracle TNS listener. Like doing ‘lsnrctl service’. | Database Tools
getsploit 34.9d60f4c Command line utility for searching and downloading exploits. | Exploitation Hacking Tools
gf 39.dcd4c36 A wrapper around grep, to help you grep for things. | Misc Tools
gg-images 35.b2dd863 The application was created to allow anyone to easily download profile pictures from GG. | Social Engineering Tools
gggooglescan 0.4 A Google scraper which performs automated searches and returns results of search queries in the form of URLs or hostnames. | Hacker Scanner Tools
gh-dork 3.799f86f Github dorking tool. | Recognise Hacking Tools
ghettotooth 1.0 Ghettodriving for bluetooth. | Bluetooth Hacking Tools
ghidra 10.1.4 Software reverse engineering framework | Reverse Engineering Tools
ghost-phisher 1.62 GUI suite for phishing and penetration attacks | Hacker Scanner Tools
ghost-py 2.0.0 Webkit based webclient (relies on PyQT). | WebApp Hacking Tools
ghostdelivery 32.a23ed5a Python script to generate obfuscated .vbs script that delivers payload (payload dropper) with persistence and windows antivirus disabling functions. | Exploitation Hacking Tools
gibberish-detector v0.1.1.r2.gecac969 Train a model and detect gibberish strings with it. | Misc Tools
girsh v0.40.r2.g0fa6870 Automatically spawn a reverse shell fully interactive for Linux or Windows victim. | Network Hacking Tools
giskismet 20110805 A program to visually represent the Kismet data in a flexible manner. | Wireless Hacking Tools
git-dump 7.4c9a2a9 Dump the contents of a remote git repository without directory listing enabled. | Hacker Scanner Tools
git-dumper 1.0.6.r0.g32d47a2 A tool to dump a git repository from a website. | Hacker Scanner Tools
git-hound 123.41500b1 Pinpoints exposed API keys on GitHub. A batch-catching, pattern-matching, patch-attacking secret snatcher. | Recognise Hacking Tools
git-wild-hunt 15.2c1b430 A tool to hunt for credentials in github wild AKA git*hunt. | Recognise Hacking Tools
gitdorker 113.8199375 Python program to scrape secrets from GitHub through usage of a large repository of dorks. | Recognise Hacking Tools
gitdump 1.682fa37 A pentesting tool that dumps the source code from .git even when the directory traversal is disabled. | WebApp Hacking Tools
gitem 104.d40a1c9 A Github organization reconnaissance tool. | Recognise Hacking Tools
gitgraber 67.72e5850 Monitor GitHub to search and find sensitive data in real time for different online services. | Recognise Hacking Tools
githack 16.a3d70b1 A `.git` folder disclosure exploit. | Recognise Hacking Tools
github-dorks 79.bc65a29 Collection of github dorks and helper tool to automate the process of checking dorks. | Recognise Hacking Tools
githubcloner 35.2bcb9c2 A script that clones Github repositories of users and organizations automatically. | Misc Tools
gitleaks 806.82e409a Audit Git repos for secrets and keys. | Recognise Hacking Tools
gitmails 71.8aa8411 An information gathering tool to collect git commit emails in version control host services. | Recognise Hacking Tools
gitminer 54.16ada58 Tool for advanced mining for content on Github. | Recognise Hacking Tools
gitrecon 30.6467e78 OSINT tool to get information from a Github and Gitlab profile and find user’s email addresses leaked on commits. | Recognise Hacking Tools
gitrob 7.7be4c53 Reconnaissance tool for GitHub organizations. | Hacker Scanner Tools
gittools 70.7cac63a A repository with 3 tools for pwn’ing websites with .git repositories available’. | WebApp Hacking Tools
gloom 93.cd6e927 Linux Penetration Testing Framework. | Hacker Scanner Tools
glue 380.8703380 A framework for running a series of tools. | Automation Tools
gmsadumper 5.d9ca83f A tool that Reads any gMSA password blobs the user can access and parses the values. | Misc Tools
gnuradio General purpose DSP and SDR toolkit. With drivers for usrp and fcd. | Wireless Hacking Tools
gnutls2 2.12.23 A library which provides a secure layer over a reliable transport layer (Version 2) | Crypto Tools
gobd 82.3bbd17c A Golang covert backdoor. | Backdooring Tools
gobuster 334.f7bc132 Directory/file & DNS busting tool written in Go. | WebApp Hacking Tools
gocabrito 4.33ac59a Super organized and flexible script for sending phishing campaigns. | Social Engineering Tools
goddi 1.2 Dumps Active Directory domain information. | Recognise Hacking Tools
goldeneye 28.792862f A HTTP DoS test tool. Attack Vector exploited: HTTP Keep Alive + NoCache. | DOS Hacking Tools
golismero 73.7d605b9 Opensource web security testing framework. | WebApp Hacking Tools
gomapenum v1.1.0.r78.g9ab82ad User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin. | Cracker Hacking Tools
goodork 2.2 A python script designed to allow you to leverage the power of google dorking straight from the comfort of your command line. | Recognise Hacking Tools
goofile 1.5 Command line filetype search | Recognise Hacking Tools
goog-mail 1.0 Enumerate domain emails from google. | Recognise Hacking Tools
google-explorer 140.0b21b57 Google mass exploit robot – Make a google search, and parse the results for a especific exploit you define. | Automation Tools
googlesub 14.a7a3cc7 A python script to find domains by using google dorks. | Recognise Hacking Tools
goohak 31.815a31e Automatically Launch Google Hacking Queries Against A Target Domain. | Recognise Hacking Tools
goop 12.39b34eb Perform google searches without being blocked by the CAPTCHA or hitting any rate limits. | Recognise Hacking Tools
gooscan 1.0.9 A tool that automates queries against Google search appliances, but with a twist. | Automation Tools
gopherus 31.9ca94b8 Tool generates gopher link for exploiting SSRF and gaining RCE in various servers. | WebApp Hacking Tools
gophish 793.d0ff382 Open-Source Phishing Framework. | Social Engineering Tools
gosint 196.9c86ed2 OSINT framework in Go. | Recognise Hacking Tools
gospider 104.0f399bd Fast web spider written in Go. | WebApp Hacking Tools
gostringsr2 1.1.2 Extract strings from a Go binary using radare2. | Reverse Engineering Tools
gowitness 199.65816c6 A golang, web screenshot utility using Chrome Headless. | WebApp Hacking Tools
gplist 1.0 Lists information about the applied Group Policies. | Windows Hacking Tools
gpocrack 3.cf63c86 Active Directory Group Policy Preferences cpassword cracker/decrypter. | Cracker Hacking Tools
gpredict 1619.a0a5636 A real-time satellite tracking and orbit prediction application.
gps-sdr-sim 186.becf3a3 Software-Defined GPS Signal Simulator.
gqrx 2.15.9 Interactive SDR receiver waterfall for many devices. | Wireless Hacking Tools
gr-air-modes 396.0b6c383 Gnuradio tools for receiving Mode S transponder signals, including ADS-B.
gr-gsm 1151.2efaa49 Gnuradio blocks and tools for receiving GSM transmissions.
gr-paint 42.24765f9 An OFDM Spectrum Painter for GNU Radio.
grabbb 0.0.7 Clean, functional, and fast banner scanner. | Hacker Scanner Tools
grabber 0.1 A web application scanner. Basically it detects some kind of vulnerabilities in your website. | WebApp Hacking Tools
grabing 11.9c1aa6c Counts all the hostnames for an IP adress | Recognise Hacking Tools
grabitall 1.1 Performs traffic redirection by sending spoofed ARP replies. | Windows Hacking Tools
graffiti 24.4af61b4 A tool to generate obfuscated one liners to aid in penetration testing. | Misc Tools
grammarinator 153.7dace54 A random test generator / fuzzer that creates test cases according to an input ANTLR v4 grammar. | Fuzzing Tools
graphql-path-enum 14.aed4346 Tool that lists the different ways of reaching a given type in a GraphQL schema. | WebApp Hacking Tools
graphqlmap 51.98997bd Scripting engine to interact with a graphql endpoint for pentesting purposes. | WebApp Hacking Tools
graudit 591.a7ed32a Grep rough source code auditing tool. | Code Audit Tools
grepforrfi 0.1 Simple script for parsing web logs for RFIs and Webshells v1.2 | Hacker Scanner Tools
grokevt 0.5.0 A collection of scripts built for reading Windows® NT/2K/XP/2K eventlog files. | Forensic Tools
grr 17.791ed5a High-throughput fuzzer and emulator of DECREE binaries. | Fuzzing Tools
grype 0.33.1 A vulnerability scanner for container images and filesystems. | Hacker Scanner Tools
gsd 1.1 Gives you the Discretionary Access Control List of any Windows NT service you specify as a command line option. | Windows Hacking Tools
gsocket 1.4.33 Global Socket moving data from here to there securely, fast and trough NAT/Firewalls | Network Hacking Tools
gspoof 3.2 A simple GTK/command line TCP/IP packet generator. | Network Hacking Tools
gtalk-decode 0.1 Google Talk decoder tool that demonstrates recovering passwords from accounts. | Windows Hacking Tools
gtfo 16.2296edf Search gtfobins and lolbas files from your terminal. | Misc Tools
gtfoblookup 59.20f4bbd Offline command line lookup utility for GTFOBins and LOLBAS. | Misc Tools
gtp-scan 0.7 A small python script that scans for GTP (GPRS tunneling protocol) speaking hosts. | Hacker Scanner Tools
guymager 0.8.13 A forensic imager for media acquisition. | Forensic Tools
gwcheck 0.1 A simple program that checks if a host in an ethernet network is a gateway to Internet. | Network Hacking Tools
gwtenum 7.f27a5aa Enumeration of GWT-RCP method calls. | Recognise Hacking Tools
h2buster 79.6c4dd1c A threaded, recursive, web directory brute-force scanner over HTTP/2. | Hacker Scanner Tools
h2csmuggler 7.7ea573a HTTP Request Smuggling over HTTP/2 Cleartext (h2c). | WebApp Hacking Tools
h2spec 2.6.0 A conformance testing tool for HTTP/2 implementation. | Misc Tools
h2t 36.9183a30 Scans a website and suggests security headers to apply. | WebApp Hacking Tools
h8mail 330.0a371eb Email OSINT and password breach hunting. | Recognise Hacking Tools
habu 359.8326936 Python Network Hacking Toolkit. | Hacker Scanner Tools
hackersh 0.2.0 A shell for with Pythonect-like syntax, including wrappers for commonly used security tools. | Automation Tools
hackredis 3.fbae1bc A simple tool to scan and exploit redis servers. | Exploitation Hacking Tools
hackrf 2021.03.1 Driver for HackRF, allowing general purpose software defined radio (SDR).
haiti v1.3.0.r13.gdb5c601 A CLI tool to identify the hash type of a given hash. | Crypto Tools
haka 0.2.2 A collection of tool that allows capturing TCP/IP packets and filtering them based on Lua policy files. | Network Hacking Tools
hakku 384.bbb434d Simple framework that has been made for penetration testing tools. | Hacker Scanner Tools
hakrawler 216.6190559 Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application. | WebApp Hacking Tools
hakrevdns 41.8b638e4 Small, fast tool for performing reverse DNS lookups en masse. | Recognise Hacking Tools
halberd 0.2.4 Halberd discovers HTTP load balancers. It is useful for web application security auditing and for load balancer configuration testing. | Hacker Scanner Tools
halcyon 0.1 A repository crawler that runs checksums for static files found within a given git repository. | Recognise Hacking Tools
halcyon-ide 2.0.2 First IDE for Nmap Script (NSE) Development. | Misc Tools
hamster 2.0.0 Tool for HTTP session sidejacking. | Exploitation Hacking Tools
handle 0.1 An small application designed to analyze your system searching for global objects related to running process and display information for every found object, like tokens, semaphores, ports, files,.. | Windows Hacking Tools
harness 19.ed2a6aa Interactive remote PowerShell Payload. | Backdooring Tools
harpoon 320.35a22cd CLI tool for open source and threat intelligence. | Automation Tools
hasere 1.0 Discover the vhosts using google and bing. | Recognise Hacking Tools
hash-buster 49.0d6ebb4 A python script which scraps online hash crackers to find cleartext of a hash. | Crypto Tools
hash-extender 155.35d6d32 A hash length extension attack tool. | Crypto Tools
hash-identifier 6.0e08a97 Software to identify the different types of hashes used to encrypt data and especially passwords. | Crypto Tools
hashcat 6.2.5 Multithreaded advanced password recovery utility | Cracker Hacking Tools
hashcat-utils 1.9 Set of small utilities that are useful in advanced password cracking | Misc Tools
hashcatch 52.8145660 Capture handshakes of nearby WiFi networks automatically. | Wireless Hacking Tools
hashcheck 2.72b0c6e Search for leaked passwords while maintaining a high level of privacy using the k-anonymity method. | Crypto Tools
hashdb 1089.1da1b9f A block hash toolkit. | Crypto Tools
hashdeep 4.4 cross-platform tools to message digests for any number of files | Crypto Tools
hasher 48.40173c5 A tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. | Cracker Hacking Tools
hashfind 8.e9a9a14 A tool to search files for matching password hash types and other interesting data. | Crypto Tools
hashid 397.7e8473a Software to identify the different types of hashes used to encrypt data. | Crypto Tools
hashpump 49.314268e A tool to exploit the hash length extension attack in various hashing algorithms. | Crypto Tools
hashtag 0.41 A python script written to parse and identify password hashes. | Cracker Hacking Tools
hatcloud 33.3012ad6 Bypass CloudFlare with Ruby. | Recognise Hacking Tools
hate-crack 187.b1d7e39 A tool for automating cracking methodologies through Hashcat. | Automation Tools
haystack 1823.c178b5a A Python framework for finding C structures from process memory – heap analysis – Memory structures forensics. | Binary Tools
hbad 1.0 This tool allows you to test clients on the heartbleed bug. | Hacker Scanner Tools
hcraft 1.0.0 HTTP Vuln Request Crafter | Exploitation Hacking Tools
hcxdumptool 6.2.6 Small tool to capture packets from wlan devices | Wireless Hacking Tools
hcxkeys 6.2.1 Set of tools to generate plainmasterkeys (rainbowtables) and hashes for hashcat and John the Ripper | Crypto Tools
hcxtools 6.2.7 Portable solution for capturing wlan traffic and conversion to hashcat and John the Ripper formats | Wireless Hacking Tools
hdcp-genkey 18.e8d342d Generate HDCP source and sink keys from the leaked master key. | Crypto Tools
hdmi-sniff 5.f7fbc0e HDMI DDC (I2C) inspection tool. It is designed to demonstrate just how easy it is to recover HDCP crypto keys from HDMI devices. | Hardware Tools
heaptrace Helps visualize heap operations for pwn and debugging. | Debugger Tools
heartbleed-honeypot 0.1 Script that listens on TCP port 443 and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford’s
heartleech 116.3ab1d60 Scans for systems vulnerable to the heartbleed bug, and then download them. | Exploitation Hacking Tools
hellraiser 279.bea43e2 Vulnerability Scanner. | Hacker Scanner Tools
hemingway 8.9c70a13 A simple and easy to use spear phishing helper. | Social Engineering Tools
hercules-payload 222.2607a3a A special payload generator that can bypass all antivirus software. | Binary Tools
hetty 134.f60202e HTTP toolkit for security research. Aims to become an open source alternative to commercial software like Burp Suite Pro. | WebApp Hacking Tools
hex2bin 2.5 Converts Motorola and Intel hex files to binary. | Binary Tools
hexinject 1.6 A very versatile packet injector and sniffer that provides a command-line framework for raw network access. | Sniffing Tools
hexorbase 6 A database application designed for administering and auditing multiple database servers simultaneously from a centralized location. It is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL). | Fuzzing Tools
hexyl 0.10.0 Colored command-line hex viewer | Misc Tools
hharp 1beta This tool can perform man-in-the-middle and switch flooding attacks. It has 4 major functions, 3 of which attempt to man-in-the-middle one or more computers on a network with a passive method or flood type method. | Network Hacking Tools
hidattack 0.1 HID Attack (attacking HID host implementations) | Bluetooth Hacking Tools
hiddeneye 1228.7a3deaf Modern phishing tool with advanced functionality. | Social Engineering Tools
hiddeneye-legacy RC1.r226.g7a3deaf Modern Phishing Tool With Advanced Functionality. | Social Engineering Tools
hikpwn 8.5a7d69c A simple scanner for Hikvision devices with basic vulnerability scanning capabilities written in Python 3.8. | Hacker Scanner Tools
hlextend 5.c9e8ff9 Pure Python hash length extension module. | Crypto Tools
hodor 1.01be107 A general-use fuzzer that can be configured to use known-good input and delimiters in order to fuzz specific locations. | Fuzzing Tools
holehe 388.7c2bde2 A tool for Efficiently finding registered accounts from emails. | Social Engineering Tools
hollows-hunter 0.3.4 Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches). | Windows Hacking Tools
homepwn 31.0803981 Swiss Army Knife for Pentesting of IoT Devices. | Hacker Scanner Tools
honeycreds 26.eaeb401 Network credential injection to detect responder and other network poisoners. | Defensive Tools
honeyd 337.a0f3d64 A small daemon that creates virtual hosts on a network.
honeypy 599.feccab5 A low interaction Honeypot.
honggfuzz 4003.4fc751bf A general-purpose fuzzer with simple, command-line interface. | Fuzzing Tools
honssh 204.821ce87 A high-interaction Honey Pot solution designed to log all SSH communications between a client and server.
hookanalyser 3.4 A hook tool which can be potentially helpful in reversing applications and analyzing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer. | Windows Hacking Tools
hookshot 196.7aadacc Integrated web scraper and email account data breach comparison tool. | WebApp Hacking Tools
hoover 4.9bda860 Wireless Probe Requests Sniffer. | Wireless Hacking Tools
hoper 12.3951159 Trace URL’s jumps across the rel links to obtain the last URL. | Recognise Hacking Tools
hopper 5.5.3 Reverse engineering tool that lets you disassemble, decompile and debug your applications. | Reverse Engineering Tools
hoppy 1.8.1 A python script which tests http methods for configuration issues leaking information or just to see if they are enabled. | Hacker Scanner Tools
host-extract 8.0134ad7 Ruby script tries to extract all IP/Host patterns in page response of a given URL and JavaScript/CSS files of that URL. | Hacker Scanner Tools
hostapd-wpe 2.9.1 Modified hostapd to facilitate AP impersonation attacks. | Wireless Hacking Tools
hostbox-ssh 0.1.1 A ssh password/account scanner. | Cracker Hacking Tools
hosthunter 134.68b9bc4 A recon tool for discovering hostnames using OSINT techniques. | Recognise Hacking Tools
hotpatch 90.fd2baf1 Hot patches executables on Linux using .so file injection. | Backdooring Tools
hotspotter 0.4 Hotspotter passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names. | Wireless Hacking Tools
howmanypeoplearearound 123.b05e06a Count the number of people around you by monitoring wifi signals. | Recognise Hacking Tools
hpfeeds 411.539e738 Honeynet Project generic authenticated datafeed protocol.
hping 3.0.0 A command-line oriented TCP/IP packet assembler/analyzer. | Network Hacking Tools
hqlmap 38.bb6ab46 A tool to exploit HQL Injections. | Exploitation Hacking Tools
hsecscan 64.3089ac2 A security scanner for HTTP response headers. | Hacker Scanner Tools
htcap 155.a59c592 A web application analysis tool for detecting communications between javascript and the server. | WebApp Hacking Tools
htexploit 0.77 A Python script that exploits a weakness in the way that .htaccess files can be configured to protect a web directory with an authentication process | Exploitation Hacking Tools
htpwdscan 23.e995d6f A python HTTP weak pass scanner. | Cracker Hacking Tools
htrosbif 134.9dc3f86 Active HTTP server fingerprinting and recon tool. | Fingerprinting Tools
htshells 89.3216523 Self contained web shells and other attacks via .htaccess files. | Exploitation Hacking Tools
http-enum 0.4 A tool to enumerate the enabled HTTP methods supported on a webserver. | Hacker Scanner Tools
http-fuzz 0.1 A simple http fuzzer. | Fuzzing Tools
http-put 1.0 Simple http put perl script. | Misc Tools
http-traceroute 0.5 This is a python script that uses the Max-Forwards header in HTTP and SIP to perform a traceroute-like scanning functionality. | Network Hacking Tools
http2smugl 33.acff482 Http2Smugl – Tool to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -> HTTP/1.1 conversion. | WebApp Hacking Tools
httpbog A slow HTTP denial-of-service tool that works similarly to other attacks, but rather than leveraging request headers or POST data Bog consumes sockets by slowly reading responses. | Windows Hacking Tools
httpforge 11.02.01 A set of shell tools that let you manipulate, send, receive, and analyze HTTP messages. These tools can be used to test, discover, and assert the security of Web servers, apps, and sites. An accompanying Python library is available for extensions. | WebApp Hacking Tools
httpgrep 2.3 A python tool which scans for HTTP servers and finds given strings in HTTP body and HTTP response headers. | WebApp Hacking Tools
httping 2.5 A ping-like tool for http-requests | Network Hacking Tools
httppwnly 47.528a664 “Repeater” style XSS post-exploitation tool for mass browser control. | WebApp Hacking Tools
httprecon 7.3 Tool for web server fingerprinting, also known as http fingerprinting. | Windows Hacking Tools
httprint 301 A web server fingerprinting tool. | Fingerprinting Tools
httprint-win32 301 A web server fingerprinting tool (Windows binaries). | Windows Hacking Tools
httprobe 22.5555984 Take a list of domains and probe for working HTTP and HTTPS servers | Hacker Scanner Tools
httpry 0.1.8 A specialized packet sniffer designed for displaying and logging HTTP traffic. | Sniffing Tools
httpscreenshot 69.0ef8f8f A tool for grabbing screenshots and HTML of large numbers of websites. | Misc Tools
httpsniff 0.4 Tool to sniff HTTP responses from TCP/IP based networks and save contained files locally for later review. | Sniffing Tools
httpsscanner 1.2 A tool to test the strength of a SSL web server. | Hacker Scanner Tools
httptunnel 3.3 Creates a bidirectional virtual data connection tunnelled in HTTP requests
httpx 843.9113a3b A fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library. | WebApp Hacking Tools
httrack 3.49.2 An easy-to-use offline browser utility | Misc Tools
hubbit-sniffer 74.460ecf8 Simple application that listens for WIFI-frames and records the mac-address of the sender and posts them to a REST-api. | Sniffing Tools
hulk 27.ed2b11c A webserver DoS tool (Http Unbearable Load King) ported to Go with some additional features. | DOS Hacking Tools
hungry-interceptor 391.1aea7f3 Intercepts data, does something with it, stores it. | Sniffing Tools
hurl 20.afca9c5 Hexadecimal & URL (en/de)coder. | Misc Tools
hwk 0.4 Collection of packet crafting and wireless network flooding tools | DOS Hacking Tools
hxd Freeware Hex Editor and Disk Editor. | Misc Tools
hyde 11.ec09462 Just another tool in C to do DDoS (with spoofing). | Network Hacking Tools
hydra 9.3 Very fast network logon cracker which support many different services | Cracker Hacking Tools
hyenae 0.36_1 Flexible platform independent packet generator. | Network Hacking Tools
hyperfox 121.1a8c26f A security tool for proxying and recording HTTP and HTTPs traffic. | Network Hacking Tools
hyperion-crypter 2.3.1 A runtime encrypter for 32-bit and 64-bit portable executables. | Windows Hacking Tools
i2pd 2.42.1 A full-featured C++ implementation of the I2P router | Network Hacking Tools
iaito 5.5beta0.r16.g24a2eba2 Qt and C++ GUI for radare2 reverse engineering framework | Reverse Engineering Tools
iaxflood 0.1 IAX flooder. | DOS Hacking Tools
iaxscan 0.02 A Python based scanner for detecting live IAX/2 hosts and then enumerating (by bruteforce) users on those hosts. | Hacker Scanner Tools
ibrute 12.3a6a11e An AppleID password bruteforce tool. It uses Find My Iphone service API, where bruteforce protection was not implemented. | Cracker Hacking Tools
icloudbrutter 15.1f64f19 Tool for AppleID Bruteforce. | Cracker Hacking Tools
icmpquery 1.0 Send and receive ICMP queries for address mask and current time. | Hacker Scanner Tools
icmpsh 12.82caf34 Simple reverse ICMP shell. | Backdooring Tools
icmptx 17.52df90f IP over ICMP tunnel.
id-entify 34.dd064a5 Search for information related to a domain: Emails – IP addresses – Domains – Information on WEB technology – Type of Firewall – NS and MX records. | Recognise Hacking Tools
idb 2.10.3 A tool to simplify some common tasks for iOS pentesting and research. | Mobile Hacking Tools
identywaf 206.aa670df Blind WAF identification tool. | WebApp Hacking Tools
idswakeup 1.0 A collection of tools that allows to test network intrusion detection systems. | Recognise Hacking Tools
ifchk 1.1.2 A network interface promiscuous mode detection tool. | Defensive Tools
ifuzz 1.0 A binary file fuzzer with several options. | Fuzzing Tools
iheartxor 0.01 A tool for bruteforcing encoded strings within a boundary defined by a regular expression. It will bruteforce the key value range of 0x1 through 0x255. | Cracker Hacking Tools
iis-shortname-scanner 5.4ad4937 An IIS shortname Scanner. | Hacker Scanner Tools
iisbruteforcer 15 HTTP authentication cracker. It’s a tool that launchs an online dictionary attack to test for weak or simple passwords against protected areas on an IIS Web server. | Cracker Hacking Tools
ike-scan 1.9.5 A tool that uses IKE protocol to discover, fingerprint and test IPSec VPN servers. | Hacker Scanner Tools
ikecrack 1.00 An IKE/IPSec crack tool designed to perform Pre-Shared-Key analysis of RFC compliant aggressive mode authentication | Cracker Hacking Tools
ikeforce 30.575af15 A command line IPSEC VPN brute forcing tool for Linux that allows group name/ID enumeration and XAUTH brute forcing capabilities. | Cracker Hacking Tools
ikeprobe 0.1 Determine vulnerabilities in the PSK implementation of the VPN server. | Windows Hacking Tools
ikeprober 1.12 Tool crafting IKE initiator packets and allowing many options to be manually set. Useful to find overflows, error conditions and identifiyng vendors | Fuzzing Tools
ilo4-toolbox 43.6a494fe Toolbox for HPE iLO4 analysis. | Hacker Scanner Tools
ilty 1.0 An interception phone system for VoIP network. | VOIP Hacking Tools
imagegrep 8.1f14af2 Grep word in pdf or image based on OCR. | Misc Tools
imagejs 55.f926663 Small tool to package javascript into a valid image file. | Binary Tools
imagemounter 413.383b30b Command line utility and Python package to ease the (un)mounting of forensic disk images. | Forensic Tools
imhex 1.16.2.r9.g3da1b3f0 A Hex Editor for Reverse Engineers, Programmers and people that value their eye sight when working at 3 AM. | Misc Tools
impacket 0.9.24 Collection of classes for working with network protocols | Network Hacking Tools
impulse 77.6939ea2 Modern Denial-of-service ToolKit. | DOS Hacking Tools
inception 452.6c09195 A FireWire physical memory manipulation and hacking tool exploiting IEEE 1394 SBP DMA. | Exploitation Hacking Tools
indx2csv 17.129a411e An advanced parser for INDX records. | Forensic Tools
indxcarver 5.dee36608 Carve INDX records from a chunk of data. | Forensic Tools
indxparse 171.454d706 A Tool suite for inspecting NTFS artifacts. | Forensic Tools
inetsim 1.3.2 A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples. | Defensive Tools
infection-monkey v1.8.2.r5124.g594d21559 Automated security testing tool for networks. | Network Hacking Tools
infip 0.1 A python script that checks output from netstat against RBLs from Spamhaus. | Hacker Scanner Tools
infoga 33.79a1c03 Tool for gathering e-mail accounts information from different public sources (search engines, pgp key servers). | Recognise Hacking Tools
inguma 0.1.1 A free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler. | Cracker Hacking Tools
injectus 12.3c01fa0 CRLF and open redirect fuzzer. | WebApp Hacking Tools
innounp 0.50 Inno Setup Unpacker. | Reverse Engineering Tools
inquisitor 28.12a9ec1 OSINT Gathering Tool for Companies and Organizations. | Recognise Hacking Tools
insanity 117.cf51ff3 Generate Payloads and Control Remote Machines . | Exploitation Hacking Tools
instagramosint 20.94213fd An Instagram Open Source Intelligence Tool. | Social Engineering Tools
instashell 56.49b6b4f Multi-threaded Instagram Brute Forcer without password limit. | Cracker Hacking Tools
intelmq 3.0.2.r161.g79cae294a A tool for collecting and processing security feeds using a message queuing protocol. | Misc Tools
intelplot 12.4dd9fc0 OSINT Tool to Mark Points on Offline Map. | Recognise Hacking Tools
intensio-obfuscator 280.f66a22b Obfuscate a python code 2 and 3. | Misc Tools
interactsh-client v1.0.4.r0.g5b7fd9e Open-Source Solution for Out of band Data Extraction. | WebApp Hacking Tools
intercepter-ng 1.0 A next generation sniffer including a lot of features: capturing passwords/hashes, sniffing chat messages, performing man-in-the-middle attacks, etc. | Windows Hacking Tools
interlace 340.2e56cc5 Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support. | Network Hacking Tools
interrogate 5.eb5f071 A proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage. | Forensic Tools
intersect 2.5 Post-exploitation framework | Automation Tools
intrace 1.5 Traceroute-like application piggybacking on existing TCP connections | Recognise Hacking Tools
inundator 0.5 An ids evasion tool, used to anonymously inundate intrusion detection logs with false positives in order to obfuscate a real attack. | Misc Tools
inurlbr 34.dbf9773 Advanced search in the search engines – Inurl scanner, dorker, exploiter. | Hacker Scanner Tools
inviteflood 2.0 Flood a device with INVITE requests | DOS Hacking Tools
invoke-cradlecrafter 19.3ff8bac PowerShell Remote Download Cradle Generator & Obfuscator. | Automation Tools
invoke-dosfuscation 7.6260f5b Cmd.exe Command Obfuscation Generator & Detection Test Harness. | Automation Tools
invoke-obfuscation 45.f20e7f8 PowerShell Obfuscator. | Automation Tools
inzider 1.2 This is a tool that lists processes in your Windows system and the ports each one listen on. | Windows Hacking Tools
iodine 0.7.0 Tunnel IPv4 data through a DNS server
iosforensic 1.0 iOS forensic tool | Forensic Tools
ip-https-tools 7.170691f Tools for the IP over HTTPS (IP-HTTPS) Tunneling Protocol.
ip-tracer 91.8e2e3dd Track and retrieve any ip address information. | Recognise Hacking Tools
ip2clue 0.0.95 A small memory/CPU footprint daemon to lookup country (and other info) based on IP (v4 and v6). | Recognise Hacking Tools
ipaudit 1.1 Monitors network activity on a network. | Network Hacking Tools
ipba2 95.c03bd85 IOS Backup Analyzer. | Forensic Tools
ipcountry 1.2 Fetches IPv4 ranges of given country in host and cidr format. | Misc Tools
ipdecap 96.45d2a7d Can decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, and can also remove IEEE 802.1Q (virtual lan) header. | Network Hacking Tools
iphoneanalyzer 2.1.0 Allows you to forensically examine or recover date from in iOS device. | Forensic Tools
ipmipwn 6.74a08a8 IPMI cipher 0 attack tool. | Cracker Hacking Tools
ipmitool 1.8.18 Command-line interface to IPMI-enabled devices | Network Hacking Tools
ipobfuscator 26.0a7f802 A simple tool to convert the IP to a DWORD IP. | Misc Tools
ipscan 3.8.2 A very fast IP address and port scanner. | Hacker Scanner Tools
ipsourcebypass 1.2.r8.g3b20bde This Python script can be used to bypass IP source restrictions using HTTP headers. | WebApp Hacking Tools
iptodomain 18.f1afcd7 This tool extract domains from IP address based in the information saved in virustotal. | Recognise Hacking Tools
iptv 138.ae6457b Search and brute force illegal iptv server. | Hacker Scanner Tools
iputils 20211215 Network monitoring tools, including ping | Network Hacking Tools
ipv4bypass 21.99bb285 Using IPv6 to Bypass Security. | Network Hacking Tools
ipv666 182.ad45ae8 Golang IPv6 address enumeration. | Recognise Hacking Tools
ipv6toolkit 805.babee5e SI6 Networks’ IPv6 Toolkit. | Hacker Scanner Tools
ircsnapshot 94.cb02a85 Tool to gather information from IRC servers. | Recognise Hacking Tools
irpas 0.10 Internetwork Routing Protocol Attack Suite. | Exploitation Hacking Tools
isf 68.5228865 An exploitation framework based on Python. | Exploitation Hacking Tools
isip 2.fad1f10 Interactive sip toolkit for packet manipulations, sniffing, man in the middle attacks, fuzzing, simulating of dos attacks. | VOIP Hacking Tools
isme 0.12 Scans a VOIP environment, adapts to enterprise VOIP, and exploits the possibilities of being connected directly to an IP Phone VLAN. | VOIP Hacking Tools
isr-form 1.0 Simple html parsing tool that extracts all form related information and generates reports of the data. Allows for quick analyzing of data. | Recognise Hacking Tools
issniff 294.79c6c2a Internet Session Sniffer. | Sniffing Tools
ivre 0.9.17.dev344 Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,… | Recognise Hacking Tools
ivre-docs 0.9.17.dev344 Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,… (documentation) | Recognise Hacking Tools
ivre-web 0.9.17.dev344 Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,… (web application) | Recognise Hacking Tools
ja3 117.cb29184 Standard for creating SSL client fingerprints in an easy to produce and shareable way. | Crypto Tools
jaadas 0.1 Joint Advanced Defect assEsment for android applications. | Hacker Scanner Tools
jackdaw 396.4c06e2b Collect all information in your domain, show you graphs on how domain objects interact with each-other and how to exploit these interactions | Recognise Hacking Tools
jad 1.5.8e Java decompiler | Reverse Engineering Tools
jadx 1.4.1 Command line and GUI tools to produce Java source code from Android Dex and APK files | Decompiler Tools
jaeles 218.515484a The Swiss Army knife for automated Web Application Testing. | WebApp Hacking Tools
jaidam 18.15e0fec Penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or joomla platform was used and finally check them automatically, for web vulnerabilities using two well-known open source tools, WPScan and Joomscan. | WebApp Hacking Tools
jast 17.361ecde Just Another Screenshot Tool. | WebApp Hacking Tools
javasnoop 1.1 A tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer | Reverse Engineering Tools
jboss-autopwn 1.3bc2d29 A JBoss script for obtaining remote shell access. | Exploitation Hacking Tools
jbrofuzz 2.5 Web application protocol fuzzer that emerged from the needs of penetration testing. | Fuzzing Tools
jbrute 0.99 Open Source Security tool to audit hashed passwords. | Cracker Hacking Tools
jcrack 0.3.6 A utility to create dictionary files that will crack the default passwords of select wireless gateways | Wireless Hacking Tools
jd-cli 1.2.0 Command line Java Decompiler. | Decompiler Tools
jd-gui 1.6.6 A standalone graphical utility that displays Java source codes of .class files. | Decompiler Tools
jdeserialize 31.20635ba A library that interprets Java serialized objects. It also comes with a command-line tool that can generate compilable class declarations, extract block data, and print textual representations of instance values. | WebApp Hacking Tools
jeangrey 37.b8eb576 A tool to perform differential fault analysis attacks (DFA). | Cracker Hacking Tools
jeb-android Android decompiler. | Reverse Engineering Tools
jeb-arm Arm decompiler. | Reverse Engineering Tools
jeb-intel Intel decompiler. | Reverse Engineering Tools
jeb-mips Mips decompiler. | Reverse Engineering Tools
jeb-webasm WebAssembly decompiler. | Reverse Engineering Tools
jeopardize 5.34f1d07 A low(zero) cost threat intelligence & response tool against phishing domains. | Defensive Tools
jexboss 86.338b531 Jboss verify and Exploitation Tool. | WebApp Hacking Tools
jhead EXIF JPEG info parser and thumbnail remover | Defensive Tools
jira-scan 5.22a050b A simple remote scanner for Atlassian Jira | WebApp Hacking Tools
jndi-injection-exploit 10.2dc4018 A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability, like Jackson, Fastjson, etc. | Exploitation Hacking Tools
jnetmap 0.5.5 A network monitor of sorts. | Network Hacking Tools
john 1.9.0.jumbo1 John the Ripper password cracker | Cracker Hacking Tools
johnny 20120424 GUI for John the Ripper. | Cracker Hacking Tools
jok3r 447.0761996 Network and Web Pentest Framework. | WebApp Hacking Tools
jomplug 0.1 This php script fingerprints a given Joomla system and then uses Packet Storm’s archive to check for bugs related to the installed components. | WebApp Hacking Tools
jondo 00.20.001 Redirects internet traffic trough a mix of proxy servers to hide the origin of the requests. | Proxy Tools
jooforce 11.43c21ad A Joomla password brute force tester. | WebApp Hacking Tools
joomlascan 1.2 Joomla scanner scans for known vulnerable remote file inclusion paths and files. | WebApp Hacking Tools
joomlavs 254.eea7500 A black box, Ruby powered, Joomla vulnerability scanner. | WebApp Hacking Tools
joomscan 82.7931539 Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site. | WebApp Hacking Tools
jpegdump 0.0.7 Tool to analyzse JPEG images Reads binary files and parses the JPEG markers inside them. | Binary Tools
jpexs-decompiler 15.1.0 JPEXS Free Flash Decompiler. | Decompiler Tools
jsearch 44.87cf9c1 Simple script that grep infos from javascript files. | Recognise Hacking Tools
jsfuck 228.1f02651 Write any JavaScript with 6 Characters: []()!+. | Misc Tools
jshell 7.ee3c92d Get a JavaScript shell with XSS. | WebApp Hacking Tools
jsonbee 26.e106db2 A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP). | WebApp Hacking Tools
jsparser 31.ccd3ab6 Parse javascript using Tornado and JSBeautifier to discover interesting enpoints. | WebApp Hacking Tools
jsql-injection 0.85 A Java application for automatic SQL database injection. | WebApp Hacking Tools
jstillery 65.512e9af Advanced JavaScript Deobfuscation via Partial Evaluation. | WebApp Hacking Tools
juicy-potato 53.744d321 A sugared version of RottenPotatoNG, with a bit of juice. | Windows Hacking Tools
junkie 1365.70a83d6 A modular packet sniffer and analyzer. | Sniffing Tools
justdecompile 22018 The decompilation engine of JustDecompile. | Windows Hacking Tools
juumla 80.3e1b594 Python tool created to identify Joomla version, scan for vulnerabilities and search for config files. | WebApp Hacking Tools
jwscan 7.874b3a5 Scanner for Jar to EXE wrapper like Launch4j, Exe4j, JSmooth, Jar2Exe. | Reverse Engineering Tools
jwt-cracker 23.8130879 JWT brute force cracker written in C. | Cracker Hacking Tools
jwt-hack v1.1.2.r2.gcea10a3 A tool for hacking / security testing to JWT. | WebApp Hacking Tools
jwt-tool 63.aa496cf Toolkit for validating, forging and cracking JWTs (JSON Web Tokens). | Cracker Hacking Tools
jwtcat 67.cd461fb Script performs offline brute-force attacks against JSON Web Token (JWT) | Cracker Hacking Tools
jynx2 2.0 An expansion of the original Jynx LD_PRELOAD rootkit | Backdooring Tools
k55 86.b3c4aa9 Linux x86_64 Process Injection Utility. | Backdooring Tools
kacak 1.0 Tools for penetration testers that can enumerate which users logged on windows system. | Recognise Hacking Tools
kadimus 113.b036a7f LFI Scan & Exploit Tool. | WebApp Hacking Tools
kalibrate-rtl 69.340003e Fork of for use with rtl-sdr devices. | Mobile Hacking Tools
kamerka 40.be17620 Build interactive map of cameras from Shodan. | Recognise Hacking Tools
katana A framework that seekss to unite general auditing tools, which are general pentesting tools (Network,Web,Desktop and others). | Exploitation Hacking Tools
katsnoop 0.1 Utility that sniffs HTTP Basic Authentication information and prints the base64 decoded form. | Sniffing Tools
kautilya 52.1c9d5b0 Pwnage with Human Interface Devices using Teensy++2.0 and Teensy 3.0 devices. | Hardware Tools
kcptun 20210922 A Secure Tunnel Based On KCP with N:M Multiplexing
keimpx 300.37190f4 Tool to verify the usefulness of credentials across a network over SMB. | Cracker Hacking Tools
kekeo 2.2.0_20211214 A little toolbox to play with Microsoft Kerberos in C. | Windows Hacking Tools
kerbcrack 1.3d3 Kerberos sniffer and cracker for Windows. | Windows Hacking Tools
kerberoast 0.1.6.r0.gb90e931 Kerberoast attack -pure python-. | Exploitation Hacking Tools
kerbrute 90.9cfb81e A tool to perform Kerberos pre-auth bruteforcing. | Cracker Hacking Tools
kernelpop 238.b3467d3 Kernel privilege escalation enumeration and exploitation framework. | Exploitation Hacking Tools
keye 29.d44a578 Recon tool detecting changes of websites based on content-length differences. | Recognise Hacking Tools
khc 0.2 A small tool designed to recover hashed known_hosts fiels back to their plain-text equivalents. | Cracker Hacking Tools
kickthemout 212.861aea2 Kick devices off your network by performing an ARP Spoof attack. | Network Hacking Tools
killcast 30.ee81cfa Manipulate Chromecast Devices in your Network. | Exploitation Hacking Tools
killerbee 396.c413761 Framework and tools for exploiting ZigBee and IEEE 802.15.4 networks. | Exploitation Hacking Tools
kimi 28.e7cafda Script to generate malicious debian packages (debain trojans). | Backdooring Tools
kippo 285.0d03635 A medium interaction SSH honeypot designed to log brute force attacks and most importantly, the entire shell interaction by the attacker.
kismet 2022_02_R1 802.11 layer2 wireless network detector, sniffer, and intrusion detection system | Wireless Hacking Tools
kismet-earth 0.1 Various scripts to convert kismet logs to kml file to be used in Google Earth. | Wireless Hacking Tools
kismet2earth 1.0 A set of utilities that convert from Kismet logs to Google Earth .kml format | Wireless Hacking Tools
kismon 1.0.3 GUI client for kismet (wireless scanner/sniffer/monitor). | Wireless Hacking Tools
kiterunner 19.7d5824c Contextual Content Discovery Tool. | WebApp Hacking Tools
kitty-framework 352.cb07609 Fuzzing framework written in python. | Fuzzing Tools
klar 2.4.0 Integration of Clair and Docker Registry. | Exploitation Hacking Tools
klee 2.1 A symbolic virtual machine built on top of the LLVM compiler infrastructure. | Binary Tools
klogger 1.0 A keystroke logger for the NT-series of Windows. | Windows Hacking Tools
knock 70.25781d7 Subdomain scanner. | Hacker Scanner Tools
knxmap 252.6f40dd1 KNXnet/IP scanning and auditing tool for KNX home automation installations. | Hacker Scanner Tools
koadic 637.ac46c44 A Windows post-exploitation rootkit similar to other penetration testing tools such as Meterpreter and Powershell Empire. | Automation Tools
kolkata 3.0 A web application fingerprinting engine written in Perl that combines cryptography with IDS evasion. | WebApp Hacking Tools
konan 23.7b5ac80 Advanced Web Application Dir Scanner. | WebApp Hacking Tools
kraken 32.368a837 A project to encrypt A5/1 GSM signaling using a Time/Memory Tradeoff Attack. | Crypto Tools
krbrelayx 35.6a22e01 Kerberos unconstrained delegation abuse toolkit. | Hacker Scanner Tools
kube-hunter 697.a578726 Hunt for security weaknesses in Kubernetes clusters. | Hacker Scanner Tools
kubesploit 83.662381a Cross-platform post-exploitation HTTP/2 Command & Control server. | Hacker Scanner Tools
kubestriker 39.e1776ea A Blazing fast Security Auditing tool for Kubernetes. | Hacker Scanner Tools
kubolt 28.0027239 Utility for scanning public kubernetes clusters. | WebApp Hacking Tools
kwetza 26.0e50272 Python script to inject existing Android applications with a Meterpreter payload. | Backdooring Tools
l0l 322.1319ea7 The Exploit Development Kit. | Exploitation Hacking Tools
laf 12.7a456b3 Login Area Finder: scans host/s for login panels. | Hacker Scanner Tools
lanmap2 127.1197999 Passive network mapping tool. | Recognise Hacking Tools
lans 148.9f8ef2d A Multithreaded asynchronous packet parsing/injecting arp spoofer. | Spoofing Hacking Tools
latd 1.31 A LAT terminal daemon for Linux and BSD. | Network Hacking Tools
laudanum 1.0 A collection of injectable files, designed to be used in a pentest when SQL injection flaws are found and are in multiple languages for different environments. | Misc Tools
lazagne 824.2a7e0fe An open source application used to retrieve lots of passwords stored on a local computer. | Forensic Tools
lazydroid 25.0f559ec Tool written as a bash script to facilitate some aspects of an Android Assessment | Mobile Hacking Tools
lbd 20130719 Load Balancing detector, | Recognise Hacking Tools
lbmap 147.2d15ace Proof of concept scripts for advanced web application fingerprinting, presented at OWASP AppSecAsia 2012. | Fingerprinting Tools
ld-shatner 4.5c215c4 ld-linux code injector. | Backdooring Tools
ldap-brute 21.acc06e3 A semi fast tool to bruteforce values of LDAP injections over HTTP. | Cracker Hacking Tools
ldapdomaindump 0.9.3 Active Directory information dumper via LDAP. | Hacker Scanner Tools
ldapenum 0.1 Enumerate domain controllers using LDAP. | Recognise Hacking Tools
ldapscripts 2.0.8 Simple shell scripts to handle POSIX entries in an LDAP directory. | Automation Tools
ldeep 129.baf7c94 In-depth ldap enumeration utility. | Recognise Hacking Tools
ldsview 47.d8bfcaa Offline search tool for LDAP directory dumps in LDIF format. | Forensic Tools
leaklooker 5.0d2b9fc Find open databases with Shodan. | Hacker Scanner Tools
leena 2.5119f56 Symbolic execution engine for JavaScript | Binary Tools
legion 55.df23a34 Automatic Enumeration Tool based in Open Source tools. | Recognise Hacking Tools
leo 28087.1731c35d8 Literate programmer’s editor, outliner, and project manager. | Misc Tools
leroy-jenkins 3.bdc3965 A python tool that will allow remote execution of commands on a Jenkins server and its nodes. | Exploitation Hacking Tools
lethalhta 1.a8d772a Lateral Movement technique using DCOM and HTA. | Windows Hacking Tools
letmefuckit-scanner 3.f3be22b Scanner and Exploit Magento. | Hacker Scanner Tools
leviathan 35.a1a1d8c A mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities. | Hacker Scanner Tools
levye 84.5406303 A brute force tool which is support sshkey, vnckey, rdp, openvpn. | Cracker Hacking Tools
lfi-autopwn 3.0 A Perl script to try to gain code execution on a remote server via LFI | Exploitation Hacking Tools
lfi-exploiter 1.1 This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability.. | WebApp Hacking Tools
lfi-fuzzploit 1.1 A simple tool to help in the fuzzing for, finding, and exploiting of local file inclusion vulnerabilities in Linux-based PHP applications. | WebApp Hacking Tools
lfi-image-helper 0.8 A simple script to infect images with PHP Backdoors for local file inclusion attacks. | WebApp Hacking Tools
lfi-scanner 4.0 This is a simple perl script that enumerates local file inclusion attempts when given a specific target. | Hacker Scanner Tools
lfi-sploiter 1.0 This tool helps you exploit LFI (Local File Inclusion) vulnerabilities. Post discovery, simply pass the affected URL and vulnerable parameter to this tool. You can also use this tool to scan a URL for LFI vulnerabilities. | WebApp Hacking Tools
lfifreak 21.0c6adef A unique automated LFi Exploiter with Bind/Reverse Shells. | WebApp Hacking Tools
lfimap 118.7f47578 Local file inclusion discovery and exploitation tool. | WebApp Hacking Tools
lfisuite 85.470e01f Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner. | Hacker Scanner Tools
lfle 24.f28592c Recover event log entries from an image by heurisitically looking for record structures. | Forensic Tools
lft 3.91 A layer four traceroute implementing numerous other features. | Recognise Hacking Tools
lhf 40.51568ee A modular recon tool for pentesting. | Recognise Hacking Tools
libbde 310.80a249a A library to access the BitLocker Drive Encryption (BDE) format. | Crypto Tools
libc-database 45.69815cd Database of libc offsets to simplify exploitation. | Reverse Engineering Tools
libdisasm 0.23 A disassembler library. | Disassembler Tools
libfvde 179.6788f31 Library and tools to access FileVault Drive Encryption (FVDE) encrypted volumes. | Forensic Tools
libosmocore 4248.2d10ff20 Collection of common code used in various sub-projects inside the Osmocom family of projects.
libparistraceroute 378.6fb8f48 A library written in C dedicated to active network measurements with examples, such as paris-ping and paris-traceroute. | Network Hacking Tools
libpst 0.6.76 Outlook .pst file converter | Misc Tools
libtins 1287.18cbab4 High-level, multiplatform C++ network packet sniffing and crafting library. | Network Hacking Tools
lief 0.12.1 Library to Instrument Executable Formats. | Disassembler Tools
liffy 31.5866f73 A Local File Inclusion Exploitation tool. | WebApp Hacking Tools
lightbulb 88.9e8d6f3 Python framework for auditing web applications firewalls. | WebApp Hacking Tools
limeaide 305.ce3c9b7 Remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local host. | Forensic Tools
limelighter 17.d119dc7 A tool for generating fake code signing certificates or signing real ones. | Exploitation Hacking Tools
linenum 75.c47f9b2 Scripted Local Linux Enumeration & Privilege Escalation Checks | Hacker Scanner Tools
linikatz 41.ee473e0 Tool to attack AD on UNIX. | Automation Tools
linkedin2username 112.8ab4535 OSINT Tool: Generate username lists for companies on LinkedIn. | Social Engineering Tools
linkfinder 162.095bb62 Discovers endpoint and their parameters in JavaScript files. | WebApp Hacking Tools
linset 9.8746b1f Evil Twin Attack Bash script – An automated WPA/WPA2 hacker. | Automation Tools
linux-exploit-suggester 32.9db2f5a A Perl script that tries to suggest exploits based OS version number. | Recognise Hacking Tools 164.54a5c01 Linux privilege escalation auditing tool. | Recognise Hacking Tools
linux-inject 100.268d4e4 Tool for injecting a shared object into a Linux process. | Backdooring Tools
linux-smart-enumeration 249.3395ee7 Linux enumeration tool for pentesting and CTFs with verbosity levels. | Hacker Scanner Tools 61.2d1f81a An Exploit Dev Swiss Army Knife. | Exploitation Hacking Tools
list-urls 0.1 Extracts links from webpage. | WebApp Hacking Tools
littleblackbox 0.1.3 Penetration testing tool, search in a collection of thousands of private SSL keys extracted from various embedded devices. | Hacker Scanner Tools
littlebrother 112.338cf82 OSINT tool to get informations on French, Belgian and Swizerland people. | Recognise Hacking Tools
lldb 13.0.1 Next generation, high-performance debugger | Debugger Tools
loadlibrary 104.c40033b Porting Windows Dynamic Link Libraries to Linux. | Binary Tools
local-php-security-checker v2.0.3.r0.g5a963b3 A command line tool that checks your PHP application packages with known security vulnerabilities. | Code Audit Tools
locasploit 117.fa48151 Local enumeration and exploitation framework. | Hacker Scanner Tools
lodowep 1.2.1 Lodowep is a tool for analyzing password strength of accounts on a Lotus Domino webserver system. | Cracker Hacking Tools
log-file-parser 60.c7a0ae7e Parser for $LogFile on NTFS. | Forensic Tools
log4j-bypass 26.53164c4 Log4j web app tester that includes WAF bypasses. | WebApp Hacking Tools
log4j-scan 82.ceae24f A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-44228. | WebApp Hacking Tools
logkeys 96.2539ccb A GNU/Linux keylogger that worked. | Keylogger Tools
logmepwn 22.a8882bd A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-44228 vulnerability. | Hacker Scanner Tools
loic An open source network stress tool for Windows. | Network Hacking Tools
loki-scanner 1179.77b0c4b Simple IOC and Incident Response Scanner. | Forensic Tools
lolbas 192.d148d27 Living Off The Land Binaries And Scripts – (LOLBins and LOLScripts). | Windows Hacking Tools
loot 51.656fb85 Sensitive information extraction tool. | Recognise Hacking Tools
lorcon 2020.06.06 Generic library for injecting 802.11 frames | Wireless Hacking Tools
lorg 98.aa4f1a3 Apache Logfile Security Analyzer. | Defensive Tools
lorsrf bbb.r0.g91c26ec Find the parameters that can be used to find SSRF or Out-of-band resource load. | WebApp Hacking Tools
lotophagi 0.1 a relatively compact Perl script designed to scan remote hosts for default (or common) Lotus NSF and BOX databases. | Hacker Scanner Tools
lsrtunnel 0.2 Spoofs connections using source routed packets. | Spoofing Hacking Tools
lte-cell-scanner 57.5fa3df8 LTE SDR cell scanner optimized to work with very low performance RF front ends (8bit A/D, 20dB noise figure). | Hacker Scanner Tools
ltrace 0.7.3 Tracks runtime library calls in dynamically linked programs | Binary Tools
luksipc 0.01 A tool to convert unencrypted block devices to encrypted LUKS devices in-place. | Crypto Tools
lulzbuster 1.3.2 A very fast and smart web directory and file enumeration tool written in C. | WebApp Hacking Tools
lunar 685.1378414 A UNIX security auditing tool based on several security frameworks. | Hacker Scanner Tools
luyten 0.5.4 An Open Source Java Decompiler Gui for Procyon. | Decompiler Tools
lynis 3.0.8 Security and system auditing tool to harden Unix/Linux systems | Hacker Scanner Tools
lyricpass 44.b1c8a6a Tool to generate wordlists based on lyrics. | Automation Tools
m3-gen 7.7c656cc Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass, this tool intended for adversary simulation and red teaming purpose. | Exploitation Hacking Tools
mac-robber 1.02 A digital investigation tool that collects data from allocated files in a mounted file system. | Forensic Tools
macchanger 1.7.0 A small utility to change your NIC’s MAC address | Network Hacking Tools
machinae 193.8bbe99a A tool for collecting intelligence from public sites/feeds about various security-related pieces of data. | Recognise Hacking Tools
maclookup 0.4 Lookup MAC addresses in the IEEE MA-L/OUI public listing. | Network Hacking Tools
magescan 1.12.9 Scan a Magento site for information. | WebApp Hacking Tools
magicrescue 1.1.9 Find and recover deleted files on block devices | Forensic Tools
magictree 1.3 A penetration tester productivity tool designed to allow easy and straightforward data consolidation, querying, external command execution and report generation | Misc Tools
maigret 752.eaa545a OSINT username checker. Collect a dossier on a person by username from a huge number of sites. | Social Engineering Tools
mail-crawl 0.1 Tool to harvest emails from website. | Recognise Hacking Tools
make-pdf 0.1.7 This tool will embed javascript inside a PDF document. | Forensic Tools
maketh 0.2.0 A packet generator that supports forging ARP, IP, TCP, UDP, ICMP and the ethernet header as well. | Network Hacking Tools
malboxes 449.f9f310e Builds malware analysis Windows VMs so that you don’t have to. | Malware Tools
malcom 708.02e55b9 Analyze a system’s network communication using graphical representations of network traffic. | Network Hacking Tools
malheur 0.5.4 A tool for the automatic analyze of malware behavior. | Forensic Tools
malice 0.3.28 VirusTotal Wanna Be – Now with 100% more Hipster. | Defensive Tools
maligno 2.5 An open source penetration testing tool written in python, that serves Metasploit payloads. It generates shellcode with msfvenom and transmits it over HTTP or HTTPS. | Hacker Scanner Tools
mallory 134.47094fb HTTP/HTTPS proxy over SSH. | Proxy Tools
malmon 0.3 Hosting exploit/backdoor detection daemon. | Defensive Tools
malscan 5.773505a A Simple PE File Heuristics Scanner. | Malware Tools
maltego 4.3.0 An open source intelligence and forensics application, enabling to easily gather information about DNS, domains, IP addresses, websites, persons, etc. | Forensic Tools
maltrail 77078.8a1cd3d0fe Malicious traffic detection system. | Defensive Tools
maltrieve 342.b9e7560 Originated as a fork of mwcrawler. It retrieves malware directly from the sources as listed at a number of sites. | Malware Tools
malware-check-tool 1.2 Python script that detects malicious files via checking md5 hashes from an offline set or via the virustotal site. It has http proxy support and an update feature. | Malware Tools
malwareanalyser 3.3 A freeware tool to perform static and dynamic analysis on malware. | Windows Hacking Tools
malwaredetect 0.1 Submits a file’s SHA1 sum to VirusTotal to determine whether it is a known piece of malware | Forensic Tools
malwasm 0.2 Offline debugger for malware’s reverse engineering. | Reverse Engineering Tools
malybuzz 1.0 A Python tool focused in discovering programming faults in network software. | Fuzzing Tools
mana 68.56bcfcd A toolkit for rogue access point (evilAP) attacks first presented at Defcon 22. | Wireless Hacking Tools 9.8b34f1a Web Command Injection Tool. | WebApp Hacking Tools
manspider 56.e10bb6a Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content – regex supported! | Hacker Scanner Tools
manticore 0.2.4.r346.gdc998800 Symbolic execution tool. | Binary Tools
manul 197.f525df9 A coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS. | Fuzzing Tools
mara-framework 176.ac4ac88 A Mobile Application Reverse engineering and Analysis Framework. | Mobile Hacking Tools
marc4dasm 6.f11860f This python-based tool is a disassembler for the Atmel MARC4 (a 4 bit Harvard micro). | Disassembler Tools
marshalsec 10.2dc4018 Java Unmarshaller Security – Turning your data into code execution. | Exploitation Hacking Tools
maryam 819.99ae85a Full-featured Web Identification framework written in Python. | Hacker Scanner Tools
maskprocessor 0.73 A High-Performance word generator with a per-position configurable charset. | Automation Tools
massbleed 20.44b7e85 SSL Vulnerability Scanner. | Recognise Hacking Tools
masscan 1.3.2 TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes | Hacker Scanner Tools
masscan-automation 26.a170abc Masscan integrated with Shodan API. | Automation Tools
massdns 273.d52f7b5 A high-performance DNS stub resolver in C. | Network Hacking Tools
massexpconsole v2.3.5.r0.gc6136e8 A collection of tools and exploits with a cli ui for mass exploitation. | Automation Tools
mat 0.6.1 Metadata Anonymisation Toolkit composed of a GUI application, a CLI application and a library. | Defensive Tools
mat2 0.12.4 Metadata removal tool, supporting a wide range of commonly used file formats | Defensive Tools
matahari 0.1.30 A reverse HTTP shell to execute commands on remote machines behind firewalls.
matroschka 58.2f026a4 Python steganography tool to hide images or text in images.
mausezahn 0.40 A free fast traffic generator written in C which allows you to send nearly every possible and impossible packet. | DOS Hacking Tools
mbenum 1.5.0 Queries the master browser for whatever information it has registered. | Windows Hacking Tools
mboxgrep 0.7.9 A small, non-interactive utility that scans mail folders for messages matching regular expressions. It does matching against basic and extended POSIX regular expressions, and reads and writes a variety of mailbox formats. | Forensic Tools
mdbtools 738.823b32f Utilities for viewing data and exporting schema from Microsoft Access Database files. | Forensic Tools
mdcrack 1.2 MD4/MD5/NTLM1 hash cracker | Cracker Hacking Tools
mdk3 v6 WLAN penetration tool. | Wireless Hacking Tools
mdk4 4.2 A tool to exploit common IEEE 802.11 protocol weaknesses | Wireless Hacking Tools
mdns-recon 11.69b864e An mDNS recon tool written in Python. | Recognise Hacking Tools
meanalyzer 1.273.0 Intel Engine Firmware Analysis Tool.
medusa 2.2 Speedy, massively parallel and modular login brute-forcer for network | Cracker Hacking Tools
meg 87.9daab00 Fetch many paths for many hosts – without killing the hosts. | WebApp Hacking Tools
melkor 1.0 An ELF fuzzer that mutates the existing data in an ELF sample given to create orcs (malformed ELFs), however, it does not change values randomly (dumb fuzzing), instead, it fuzzes certain metadata with semi-valid values through the use of fuzzing rules (knowledge base). | Fuzzing Tools
memdump 1.01 Dumps system memory to stdout, skipping over holes in memory maps. | Forensic Tools
memfetch 0.05b Dumps any userspace process memory without affecting its execution. | Forensic Tools
memimager 1.0 Performs a memory dump using NtSystemDebugControl. | Windows Hacking Tools
mentalist 6.953a07b Graphical tool for custom wordlist generation. | Automation Tools
merlin-server 1.3.0 Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang. | Automation Tools
metabigor 54.7b8c30e Intelligence Tool but without API key. | Recognise Hacking Tools
metacoretex 0.8.0 MetaCoretex is an entirely JAVA vulnerability scanning framework for databases. | Database Tools
metafinder v1.2.r0.g2caed73 Search for documents in a domain through Search Engines (Google, Bing and Baidu). The objective is to extract metadata. | Recognise Hacking Tools
metaforge 115.7b32693 Auto Scanning to SSL Vulnerability. | Misc Tools
metagoofil 71.036ea11 An information gathering tool designed for extracting metadata of public documents. | Recognise Hacking Tools
metame 14.8d583a0 A simple metamorphic code engine for arbitrary executables. | Binary Tools
metasploit 6.2.0 Advanced open-source platform for developing, testing, and using exploit code | Exploitation Hacking Tools
metasploit-autopwn 12.09320cc db_autopwn plugin of metasploit. | Automation Tools
meterssh 18.9a5ed19 A way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. | Backdooring Tools
metoscan 5 Tool for scanning the HTTP methods supported by a webserver. It works by testing a URL and checking the responses for the different requests. | WebApp Hacking Tools
mfcuk 0.3.8 MIFARE Classic Universal toolKit. | Wireless Hacking Tools
mfoc 0.10.7+38+gba072f1 MiFare Classic Universal toolKit | Cracker Hacking Tools
mfsniffer 0.1 A python script for capturing unencrypted TSO login credentials. | Sniffing Tools
mft2csv 40.164eb224 Extract $MFT record info and log it to a csv file. | Forensic Tools
mftcarver 9.7bfcc0a2 Carve $MFT records from a chunk of data (for instance a memory dump). | Forensic Tools
mftrcrd 16.35c3ac2f Command line $MFT record decoder. | Forensic Tools
mftref2name 6.7df9eebb Resolve file index number to name or vice versa on NTFS. | Forensic Tools
mibble 2.10.1 An open-source SNMP MIB parser (or SMI parser) written in Java. It can be used to read SNMP MIB files as well as simple ASN.1 files. | Misc Tools
microsploit 9.441e132 Fast and easy create backdoor office exploitation using module metasploit packet, Microsoft Office, Open Office, Macro attack, Buffer Overflow. | Backdooring Tools
middler 1.0 A Man in the Middle tool to demonstrate protocol middling attacks. | Network Hacking Tools
mikrotik-npk 11.d54e97c Python tools for manipulating Mikrotik NPK format. | Reverse Engineering Tools
mildew 11.df49c23 Dotmil subdomain discovery tool that scrapes domains from official DoD website directories and certificate transparency logs. | Recognise Hacking Tools
mimikatz 2.2.0_20210810 A little tool to play with Windows security. | Windows Hacking Tools
mimipenguin 150.eb2fe50 A tool to dump the login password from the current linux user. | Forensic Tools
mingsweeper 1.00 A network reconnaissance tool designed to facilitate large address space,high speed node discovery and identification. | Windows Hacking Tools
minimodem 353.bb2f34c A command-line program which decodes (or generates) audio modem tones at any specified baud rate, using various framing protocols. | Misc Tools
minimysqlator 0.5 A multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities. | Exploitation Hacking Tools
miranda-upnp 1.3 A Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices | Exploitation Hacking Tools
missidentify 1.0 A program to find Win32 applications. | Recognise Hacking Tools
missionplanner 1.3.76 A GroundControl Station for Ardupilot.
mitm 8.bd2b351 A simple yet effective python3 script to perform DNS spoofing via ARP poisoning. | Network Hacking Tools
mitm-relay 36.0e533a6 Hackish way to intercept and modify non-HTTP protocols through Burp & others. | Proxy Tools
mitm6 33.8e75884 Pwning IPv4 via IPv6. | Hacker Scanner Tools
mitmap 89.b590f9a A python program to create a fake AP and sniff data. | Wireless Hacking Tools
mitmap-old 0.1 Shell Script for launching a Fake AP with karma functionality and launches ettercap for packet capture and traffic manipulation. | Automation Tools
mitmer 22.b01c7fe A man-in-the-middle and phishing attack tool that steals the victim’s credentials of some web services like Facebook. | Sniffing Tools
mitmf 467.0458300 A Framework for Man-In-The-Middle attacks written in Python. | Exploitation Hacking Tools
mitmproxy 8.1.0 SSL-capable man-in-the-middle HTTP proxy | Proxy Tools
mkbrutus 27.ddd5f8e Password bruteforcer for MikroTik devices or boxes running RouterOS. | Cracker Hacking Tools
mkyara 3.8147f91 Tool to generate YARA rules based on binary code. | Misc Tools
mobiusft 1.12 An open-source forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. | Forensic Tools
mobsf 1780.664367ec An intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static, dynamic analysis and web API testing. | Mobile Hacking Tools
modlishka v.1.1.0.r47.gfb7f111 A powerful and flexible HTTP reverse proxy. | Proxy Tools
modscan 0.1 A new tool designed to map a SCADA MODBUS TCP based network. | Hacker Scanner Tools
moloch 0.11.3 An open source large scale IPv4 full PCAP capturing, indexing and database system. | Network Hacking Tools
mongoaudit 222.70b83e8 A powerful MongoDB auditing and pentesting tool . | Hacker Scanner Tools
monocle 1.0 A local network host discovery tool. In passive mode, it will listen for ARP request and reply packets. In active mode, it will send ARP requests to the specific IP range. The results are a list of IP and MAC addresses present on the local network. | Recognise Hacking Tools
monsoon 261.f4f9852 A fast HTTP enumerator that allows you to execute a large number of HTTP requests. | WebApp Hacking Tools
mooscan 10.82963b0 A scanner for Moodle LMS. | WebApp Hacking Tools
morpheus 165.5d81c9e Automated Ettercap TCP/IP Hijacking Tool. | Automation Tools
morxbook 1.0 A password cracking tool written in perl to perform a dictionary-based attack on a specific Facebook user through HTTPS. | Cracker Hacking Tools
morxbrute 1.01 A customizable HTTP dictionary-based password cracking tool written in Perl. | Cracker Hacking Tools
morxbtcrack 1.0 Single Bitcoin private key cracking tool released. | Cracker Hacking Tools
morxcoinpwn 1.0 Mass Bitcoin private keys brute forcing/Take over tool released. | Cracker Hacking Tools
morxcrack 1.2 A cracking tool written in Perl to perform a dictionary-based attack on various hashing algorithm and CMS salted-passwords. | Cracker Hacking Tools
morxkeyfmt 1.0 Read a private key from stdin and output formatted data values. | Crypto Tools
morxtraversal 1.0 Path Traversal checking tool. | WebApp Hacking Tools
morxtunel 1.0 Network Tunneling using TUN/TAP interfaces over TCP tool.
mosca 112.7d33611 Static analysis tool to find bugs like a grep unix command. | Code Audit Tools
mosquito 39.fe54831 XSS exploitation tool – access victims through HTTP proxy. | Exploitation Hacking Tools
mots 5.34017ca Man on the Side Attack – experimental packet injection and detection. | Sniffing Tools
motsa-dns-spoofing 2.6ac6980 ManOnTheSideAttack-DNS Spoofing. | Spoofing Hacking Tools
mousejack 5.58b69c1 Wireless mouse/keyboard attack with replay/transmit poc. | Wireless Hacking Tools
mp3nema 0.4 A tool aimed at analyzing and capturing data that is hidden between frames in an MP3 file or stream, otherwise noted as “out of band” data. | Forensic Tools
mptcp 1.9.0 A tool for manipulation of raw packets that allows a large number of options. | Network Hacking Tools
mptcp-abuse 6.b0eeb27 A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014. | Network Hacking Tools
mqtt-pwn 43.40368e5 A one-stop-shop for IoT Broker penetration-testing and security assessment operations. | Hacker Scanner Tools
mrsip 110.bdd98ad SIP-Based Audit and Attack Tool. | VOIP Hacking Tools
mrtparse 519.9fa94ea A module to read and analyze the MRT format data. | Misc Tools
ms-sys 2.7.0 A tool to write Win9x- master boot records (mbr) under linux – RTM! | Backdooring Tools
msf-mpc 35.8007ef2 Msfvenom payload creator. | Automation Tools
msfdb 16.09c603b Manage the metasploit framework database. | Misc Tools
msfenum 33.17bd3ee A Metasploit auto auxiliary script. | Automation Tools
msmailprobe 1.c01c8bf Office 365 and Exchange Enumeration tool. | Hacker Scanner Tools
mssqlscan 0.8.4 A small multi-threaded tool that scans for Microsoft SQL Servers. | Hacker Scanner Tools
msvpwn 65.328921b Bypass Windows’ authentication via binary patching. | Windows Hacking Tools
mtr 0.95 Combines the functionality of traceroute and ping into one tool (CLI version) | Network Hacking Tools
mtscan 150.d332755 Mikrotik RouterOS wireless scanner. | Wireless Hacking Tools
mubeng 160.05461a5 An incredibly fast proxy checker & IP rotator with ease. | Proxy Tools
multiinjector 0.4 Automatic SQL injection utility using a lsit of URI addresses to test parameter manipulation. | WebApp Hacking Tools
multimac 1.0.3 Multiple MACs on an adapter | Spoofing Hacking Tools
multimon-ng 1.1.9 An sdr decoder, supports pocsag, ufsk, clipfsk, afsk, hapn, fsk, dtmf, zvei.
multiscanner 1559.86e0145 Modular file scanning/analysis framework. | Hacker Scanner Tools
multitun 1.319a134 Tunnel arbitrary traffic through an innocuous WebSocket.
munin-hashchecker 223.5ddf3a7 Online hash checker for Virustotal and other services | Defensive Tools
muraena 157.f04a840 Almost-transparent reverse proxy to automate phishing and post-phishing activities. | Social Engineering Tools
mutator 51.164132d This project aims to be a wordlist mutator with hormones, which means that some mutations will be applied to the result of the ones that have been already done, resulting in something like: corporation -> C0rp0r4t10n_2012 | Automation Tools
mwebfp 16.a800b98 Mass Web Fingerprinter. | Fingerprinting Tools
mxtract 90.0b34376 Memory Extractor & Analyzer. | Forensic Tools
mybff 94.6547c51 A Brute Force Framework. | Cracker Hacking Tools
myjwt 193.6a6883a This cli is for pentesters, CTF players, or dev. You can modify your jwt, sign, inject, etc. | Exploitation Hacking Tools
mylg 659.faba867 Network Diagnostic Tool. | Network Hacking Tools
mysql2sqlite 14.e5b2c31 Converts a mysqldump file into a Sqlite 3 compatible file. | Database Tools
n1qlmap 2.5365444 An N1QL exploitation tool. | Exploitation Hacking Tools
naabu 552.901fd55 A fast port scanner written in go with focus on reliability and simplicity. | Hacker Scanner Tools
nacker 23.b67bb39 A tool to circumvent 802.1x Network Access Control on a wired LAN. | Network Hacking Tools
naft 0.0.9 Network Appliance Forensic Toolkit. | Forensic Tools
narthex v1.2.r7.g8b78746 Modular personalized dictionary generator. | Misc Tools
nasnum 5.df5df19 Script to enumerate network attached storages. | Recognise Hacking Tools
nbname 1.0 Decodes and displays all NetBIOS name packets it receives on UDP port 137 and more! | Windows Hacking Tools
nbnspoof 1.0 NetBIOS Name Service Spoofer | Spoofing Hacking Tools
nbtenum 3.3 A utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts. | Windows Hacking Tools
nbtool 2.bf90c76 Some tools for NetBIOS and DNS investigation, attacks, and communication. | Network Hacking Tools
nbtscan 1.7.2 Scan networks searching for NetBIOS information | Hacker Scanner Tools
ncpfs 2.2.6 Allows you to mount volumes of NetWare servers under Linux. | Network Hacking Tools
ncrack 0.7 High-speed network authentication cracking tool | Cracker Hacking Tools
necromant 3.acbc448 Python Script that search unused Virtual Hosts in Web Servers. | Recognise Hacking Tools
needle 579.891b660 The iOS Security Testing Framework. | Mobile Hacking Tools
neglected 8.68d02b3 Facebook CDN Photo Resolver. | Recognise Hacking Tools
neighbor-cache-fingerprinter 83.f1e596f An ARP based Operating System version scanner. | Fingerprinting Tools
nemesis 329.b1d398c A command-line network packet crafting and injection utility. | Network Hacking Tools
neo-regeorg v3.8.0.r3.gf7cda70 Improved version of reGeorg, HTTP tunneling pivot tool
net-creds 87.07a25e1 Sniffs sensitive data from interface or pcap. | Sniffing Tools
netactview 0.6.4 A graphical network connections viewer similar in functionality to netstat. | Network Hacking Tools
netattack 24.230b856 Python script to scan and attack wireless networks. | Wireless Hacking Tools
netbios-share-scanner 1.0 This tool could be used to check windows workstations and servers if they have accessible shared resources. | Hacker Scanner Tools
netbus 1.6 NetBus remote administration tool | Windows Hacking Tools
netcommander 1.3 An easy-to-use arp spoofing tool. | Spoofing Hacking Tools
netcon 0.1 A network connection establishment and management script. | Network Hacking Tools
netdiscover 208.3402efe An active/passive address reconnaissance tool, mainly developed for those wireless networks without dhcp server, when you are wardriving. It can be also used on hub/switched networks. | Recognise Hacking Tools
netkit-bsd-finger 0.17 BSD-finger ported to Linux. | Recognise Hacking Tools
netkit-rusers 0.17 Logged in users; Displays who is logged in to machines on local network. | Recognise Hacking Tools
netkit-rwho 0.17 Remote who client and server (with Debian patches). | Recognise Hacking Tools
netmap 0.1.3 Can be used to make a graphical representation of the surrounding network. | Network Hacking Tools
netmask 2.4.4 Helps determine network masks | Recognise Hacking Tools
netreconn 1.78 A collection of network scan/recon tools that are relatively small compared to their larger cousins. | Network Hacking Tools
netripper 79.683ef1b Smart traffic sniffing for penetration testers. | Windows Hacking Tools
netscan 1.0 Tcp/Udp/Tor port scanner with: synpacket, connect TCP/UDP and socks5 (tor connection). | Hacker Scanner Tools
netscan2 58.a1db723 Active / passive network scanner. | Hacker Scanner Tools
netsed 1.3 Small and handful utility design to alter the contents of packets forwarded thru network in real time. | Network Hacking Tools
netsniff-ng 0.6.8 High performance Linux network sniffer for packet inspection | Sniffing Tools
netstumbler 0.4.0 Well-known wireless AP scanner and sniffer. | Windows Hacking Tools
nettacker Automated Penetration Testing Framework. | Automation Tools
network-app-stress-tester 19.df75391 Network Application Stress Testing Yammer. | DOS Hacking Tools
networkmap 58.f5faf17 Post-exploitation network mapper. | Network Hacking Tools
networkminer 2.6 A Network Forensic Analysis Tool for advanced Network Traffic Analysis, sniffer and packet analyzer. | Forensic Tools
netz v0.1.0.r8.g3754e56 Discover internet-wide misconfigurations while drinking coffee. | Hacker Scanner Tools
netzob 1.0.2 An open source tool for reverse engineering, traffic generation and fuzzing of communication protocols. | Reverse Engineering Tools
nexfil 18.fd06198 OSINT tool for finding profiles by username. | Social Engineering Tools
nextnet 3.c8dc7a6 Pivot point discovery tool. | Network Hacking Tools
nfcutils 0.3.2 Provides a simple ‘lsnfc’ command that list tags which are in your NFC device field
nfdump 1.6.23 A set of tools to collect and process netflow data. | Network Hacking Tools
nfex 2.5 A tool for extracting files from the network in real-time or post-capture from an offline tcpdump pcap savefile. | Forensic Tools
nfspy 1.0 A Python library for automating the falsification of NFS credentials when mounting an NFS share. | Automation Tools
nfsshell 19980519 Userland NFS command tool. | Automation Tools
ngrep 1.47 A grep-like utility that allows you to search for network packets on an interface. | Network Hacking Tools
ngrok 2.3.40 A tunneling, reverse proxy for developing and understanding networked, HTTP services.
nield 38.0c0848d A tool to receive notifications from kernel through netlink socket, and generate logs related to interfaces, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), routing, FIB rules, traffic control. | Network Hacking Tools
nikto 2.1.6 A web server scanner which performs comprehensive tests against web servers for multiple items | Hacker Scanner Tools
nili 39.285220a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing. | Hacker Scanner Tools
nimbostratus 54.c7c206f Tools for fingerprintinging and exploiting Amazon cloud infrastructures. | Fingerprinting Tools
nipe 302.9e628df A script to make Tor Network your default gateway. | Defensive Tools
nipper 0.11.7 Network Infrastructure Parser | Network Hacking Tools
nirsoft 1.23.30 Unique collection of small and useful freeware utilities. | Windows Hacking Tools
nishang 0.7.6 Using PowerShell for Penetration Testing. | Windows Hacking Tools
njsscan 0.3.1 A static application testing (SAST) tool that can find insecure code patterns in your node.js applications. | Code Audit Tools
nkiller2 2.0 A TCP exhaustion/stressing tool. | DOS Hacking Tools
nmap 7.92 Utility for network discovery and security auditing | Hacker Scanner Tools
nmap-parse-output 23.6405abf Converts/manipulates/extracts data from a nmap scan output. | Misc Tools
nmbscan 1.2.6 Tool to scan the shares of a SMB/NetBIOS network, using the NMB/SMB/NetBIOS protocols. | Hacker Scanner Tools
nohidy 67.22c1283 The system admins best friend, multi platform auditing tool. | Recognise Hacking Tools
nomorexor 2.84489f9 Tool to help guess a files 256 byte XOR key by using frequency analysis. | Crypto Tools
noriben 159.4da0588 Portable, Simple, Malware Analysis Sandbox. | Malware Tools
nosqlattack 98.a5b0329 Python tool to automate exploit MongoDB server IP on Internet anddisclose the database data by MongoDB default configuration weaknesses and injection attacks. | Automation Tools
nosqli 37.6fce3eb NoSQL scanner and injector. | WebApp Hacking Tools
nosqli-user-pass-enum 18.1b3713a Script to enumerate usernames and passwords from vulnerable web applications running MongoDB. | Exploitation Hacking Tools
nosqlmap 238.ae0b461 Automated Mongo database and NoSQL web application exploitation tool | WebApp Hacking Tools
notspikefile 0.1 A Linux based file format fuzzing tool | Fuzzing Tools
novahot 23.69857bb A webshell framework for penetration testers. | WebApp Hacking Tools
nray 59.30517fd Distributed port scanner. | Hacker Scanner Tools
nsdtool 0.1 A netgear switch discovery tool. It contains some extra features like bruteoforce and setting a new password. | Network Hacking Tools
nsearch 353.bd8205b Minimal script to help find script into the nse database. | Misc Tools
nsec3map 20.1263537 A tool to enumerate the resource records of a DNS zone using its DNSSEC NSEC or NSEC3 chain. | Hacker Scanner Tools
nsec3walker 20101223 Enumerates domain names using DNSSEC | Recognise Hacking Tools
nsntrace 81.4d02e74 Perform network trace of a single process by using network namespaces. | Sniffing Tools
nsoq 1.9.5 A Network Security Tool for packet manipulation that allows a large number of options. | Network Hacking Tools
ntds-decode 0.1 This application dumps LM and NTLM hashes from active accounts stored in an Active Directory database. | Windows Hacking Tools
ntdsxtract 34.7fa1c8c Active Directory forensic framework. | Forensic Tools
ntfs-file-extractor 6.f2b23d72 Extract files off NTFS. | Forensic Tools
ntfs-log-tracker 1.6 This tool can parse $LogFile, $UsnJrnl of NTFS. | Forensic Tools
ntlm-challenger 3.e7d3ba8 Parse NTLM over HTTP challenge messages. | Hacker Scanner Tools
ntlm-scanner 6.4b29329 A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities. | Hacker Scanner Tools
ntlm-theft 20.81589ea A tool for generating multiple types of NTLMv2 hash theft files. | Exploitation Hacking Tools
ntlmrecon 75.da150d6 A tool to enumerate information from NTLM authentication enabled web endpoints. | Hacker Scanner Tools
ntp-fingerprint 0.1 An active fingerprinting utility specifically designed to identify the OS the NTP server is running on. | Fingerprinting Tools
ntp-ip-enum 0.1 Script to pull addresses from a NTP server using the monlist command. Can also output Maltego resultset. | Recognise Hacking Tools
ntpdos 4.3fe389b PoC for distributed NTP reflection DoS (CVE-5211) | DOS Hacking Tools
nuclei v2.7.1.r0.ga31bca52 A fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use. | WebApp Hacking Tools
nuclei-templates v9.0.4.r611.g9b6fed937 Community curated list of template files for the nuclei engine. | Hacker Scanner Tools
nullinux 121.b2f1829 Tool that can be used to enumerate OS information, domain information, shares, directories, and users through SMB null sessions. | Recognise Hacking Tools
nullscan 1.0.1 A modular framework designed to chain and automate security tests. | Automation Tools
nxcrypt 32.6ae06b5 NXcrypt – python backdoor framework. | Backdooring Tools
nzyme 1.2.2 WiFi defense system. | Wireless Hacking Tools
o-saft 4665.1564cfe A tool to show informations about SSL certificate and tests the SSL connection according given list of ciphers and various SSL configurations. | Hacker Scanner Tools
o365enum 17.2d4f99c Username enumeration and password enuming tool aimed at Microsoft O365. | Cracker Hacking Tools
o365spray 129.a585432 Username enumeration and password spraying tool aimed at Microsoft O365. | Cracker Hacking Tools
oat 1.3.1 A toolkit that could be used to audit security within Oracle database servers. | Fuzzing Tools
obevilion 409.29fbe9d Another archive cracker created in python, cracking [zip/7z/rar]. | Cracker Hacking Tools
obexstress 0.1 Script for testing remote OBEX service for some potential vulnerabilities. | Bluetooth Hacking Tools
obfs4proxy 0.0.13 A pluggable transport proxy written in Go. | Proxy Tools
objdump2shellcode 28.c2d6120 A tool I have found incredibly useful whenever creating custom shellcode. | Binary Tools
objection 1.11.0 Instrumented Mobile Pentest Framework. | Mobile Hacking Tools
oclhashcat 2.01 Worlds fastest WPA cracker with dictionary mutation engine. | Cracker Hacking Tools
ocs 0.2 Compact mass scanner for Cisco routers with default telnet/enable passwords. | Hacker Scanner Tools
office-dde-payloads 34.53291f9 Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique. | Exploitation Hacking Tools
ofp-sniffer 228.c52567c An OpenFlow sniffer to help network troubleshooting in production networks. | Sniffing Tools
ohrwurm 1.7a1182a A small and simple RTP fuzzer. | Fuzzing Tools
okadminfinder 78.3f0e226 Tool to find admin panels / admin login pages. | WebApp Hacking Tools
oledump 0.0.63 Analyze OLE files (Compound File Binary Format). These files contain streams of data. This tool allows you to analyze these streams. | Binary Tools
ollydbg 201g A 32-bit assembler-level analysing debugger. | Debugger Tools
omen 19.10aa99e Ordered Markov ENumerator – Password Guesser. | Cracker Hacking Tools
omnibus 129.88dbf5d OSINT tool for intelligence collection, research and artifact management. | Recognise Hacking Tools
omnihash 70.870e9ae Hash files, strings, input streams and network resources in various common algorithms simultaneously. | Crypto Tools
one-lin3r 63.9fdfa5f Gives you one-liners that aids in penetration testing and more. | Misc Tools
onesixtyone 0.7 An SNMP scanner that sends multiple SNMP requests to multiple IP addresses | Cracker Hacking Tools
onetwopunch v1.0.0.r2.gd4ab4e8 Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans. | Hacker Scanner Tools
onioff 84.34dc309 An onion url inspector for inspecting deep web links. | Recognise Hacking Tools
oniongrok v1.0.9.r0.g5e74e1a Onion addresses for anything.
onionscan 130.da42865 Scan Onion Services for Security Issues. | Hacker Scanner Tools
onionsearch 41.caf23e4 Script that scrapes urls on different “.onion” search engines. | WebApp Hacking Tools
onionshare 2.5 Share a file over Tor Hidden Services anonymously and securely | Defensive Tools
open-iscsi 2.1.7 iSCSI userland tools | Misc Tools
opendoor 420.fbdffd1 OWASP WEB Directory Scanner. | WebApp Hacking Tools
openpuff 4.01 Yet not another steganography SW.
openscap 1.3.6.r42.g72dd8ba0f Open Source Security Compliance Solution. | Automation Tools
openstego 0.8.4 A tool implemented in Java for generic steganography, with support for password-based encryption of the data. | Crypto Tools
opensvp 65.df54ed8 A security tool implementing “attacks” to be able to the resistance of firewall to protocol level attack. | Exploitation Hacking Tools
openvas-scanner 21.4.4 The OpenVAS scanning Daemon. | Hacker Scanner Tools
operative 147.4448b19 Framework based on fingerprint action, this tool is used for get information on a website or a enterprise target with multiple modules (Viadeo search,Linkedin search, Reverse email whois, Reverse ip whois, SQL file forensics …). | Fingerprinting Tools
ophcrack 3.8.0 Windows password cracker based on rainbow tables | Cracker Hacking Tools
orakelcrackert 1.00 This tool can crack passwords which are encrypted using Oracle’s latest SHA1 based password protection algorithm. | Windows Hacking Tools
origami 2.1.0 Aims at providing a scripting tool to generate and analyze malicious PDF files. | Malware Tools
orjail 200.ae38ba2 A more secure way to force programs to exclusively use tor network. | Defensive Tools
oscanner 1.0.6 An Oracle assessment framework developed in Java. | Fuzzing Tools
osfooler-ng 2.c0b20d6 Prevents remote active/passive OS fingerprinting by tools like nmap or p0f. | Defensive Tools
osi.ig 101.4debaa2 Instagram OSINT Tool gets a range of information from an Instagram account. | Social Engineering Tools
osint-spy 25.03dcf48 Performs OSINT scan on email/domain/ip_address/organization. | Recognise Hacking Tools
osinterator 3.8447f58 Open Source Toolkit for Open Source Intelligence Gathering. | Recognise Hacking Tools
osrframework 840.e02a6e9 A project focused on providing API and tools to perform more accurate online researches. | Recognise Hacking Tools
osslsigncode 333.b967175 A small tool that implements part of the functionality of the Microsoft tool signtool.exe. | Windows Hacking Tools
ostinato 0.9 An open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be “Wireshark in Reverse” and thus become complementary to Wireshark. | Sniffing Tools
osueta 82.2ee8068 A simple Python script to exploit the OpenSSH User Enumeration Timing Attack. | Exploitation Hacking Tools
otori 0.3 A python-based toolbox intended to allow useful exploitation of XML external entity (“XXE”) vulnerabilities. | Exploitation Hacking Tools
outguess 0.2 A universal steganographic tool. | Crypto Tools
outlook-webapp-brute 1.61d7177 Microsoft Outlook WebAPP Brute. | Cracker Hacking Tools
owabf 1.3 Outlook Web Access bruteforcer tool. | Cracker Hacking Tools
owasp-bywaf 26.e730d1b A web application penetration testing framework (WAPTF). | WebApp Hacking Tools
owasp-zsc 315.5bb9fed Shellcode/Obfuscate Code Generator. | Exploitation Hacking Tools
owtf 2178.cf8fcefe The Offensive (Web) Testing Framework. | WebApp Hacking Tools
p0f 3.09b Purely passive TCP/IP traffic fingerprinting tool | Fingerprinting Tools
pack 0.0.4 Password Analysis and Cracking Kit | Cracker Hacking Tools
packer 1.8.1 tool for creating identical machine images for multiple platforms from a single source configuration | Binary Tools
packerid 1.4 Script which uses a PEiD database to identify which packer (if any) is being used by a binary. | Binary Tools
packet-o-matic 351 A real time packet processor. Reads the packet from an input module, match the packet using rules and connection tracking information and then send it to a target module. | Network Hacking Tools
packeth 2.1 Linux GUI packet generator tool for ethernet | Network Hacking Tools
packetq 276.260ee20 A tool that provides a basic SQL-frontend to PCAP-files. | Network Hacking Tools
packetsender 770.c907ae8 An open source utility to allow sending and receiving TCP and UDP packets. | Network Hacking Tools
packit 1.0 A network auditing tool. Its value is derived from its ability to customize, inject, monitor, and manipulate IP traffic. | Network Hacking Tools
pacu 1056.866376c The AWS exploitation framework, designed for testing the security of Amazon Web Services environments. | Exploitation Hacking Tools
pacumen 1.92a0884 Packet Acumen – Analyse encrypted network traffic and more (side-channel attacks). | Crypto Tools
padbuster 11.50e4a3e Automated script for performing Padding Oracle attacks. | Exploitation Hacking Tools
pafish 193.b497899 A demonstration tool that employs several techniques to detect sandboxes and analysis environments in the same way as malware families do. | Windows Hacking Tools
pagodo 108.68ff778 Google dork script to collect potentially vulnerable web pages and applications on the Internet. | Hacker Scanner Tools
paketto 1.10 Advanced TCP/IP Toolkit. | Hacker Scanner Tools
panhunt 63.ec87e88 Searches for credit card numbers (PANs) in directories. | Hacker Scanner Tools
panoptic 185.df35a6c A tool that automates the process of search and retrieval of content for common log and config files through LFI vulnerability. | Automation Tools
pappy-proxy 77.e1bb049 An intercepting proxy for web application testing. | WebApp Hacking Tools
parameth 56.8da6f27 This tool can be used to brute discover GET and POST parameters. | WebApp Hacking Tools
parampampam 34.35458fa This tool for brute discover GET and POST parameters. | WebApp Hacking Tools
paranoic 1.7 A simple vulnerability scanner written in Perl. | Hacker Scanner Tools
paros 3.2.13 Java-based HTTP/HTTPS proxy for assessing web app vulnerabilities. Supports editing/viewing HTTP messages on-the-fly, spiders, client certificates, proxy-chaining, intelligent scanning for XSS and SQLi, etc. | WebApp Hacking Tools
parse-evtx 3.a4b02b9 A tool to parse the Windows XML Event Log (EVTX) format. | Forensic Tools
parsero 81.e5b585a A robots.txt audit tool. | Recognise Hacking Tools
pasco 20040505_1 Examines the contents of Internet Explorer’s cache files for forensic purposes | Forensic Tools
pass-station v1.3.0.r3.ga63a26f CLI & library to search for default credentials among thousands of Products / Vendors. | Misc Tools
passcracking 20131214 A little python script for sending hashes to and milw0rm | Cracker Hacking Tools
passe-partout 0.1 Tool to extract RSA and DSA private keys from any process linked with OpenSSL. The target memory is scanned to lookup specific OpenSSL patterns. | Cracker Hacking Tools
passhunt 5.332f374 Search drives for documents containing passwords. | Hacker Scanner Tools
passivedns 292.c411c46 A network sniffer that logs all DNS server replies for use in a passive DNS setup. | Sniffing Tools
pastejacker 12.ed9f153 Hacking systems with the automation of PasteJacking attacks. | Automation Tools
pastemonitor 8.b3551f1 Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.. | Recognise Hacking Tools
pasv-agrsv 57.6bb54f7 Passive recon / OSINT automation script. | Automation Tools
patator 214.b97f8b2 A multi-purpose bruteforcer. | Cracker Hacking Tools
patchkit 37.95dc699 Powerful binary patching from Python. | Binary Tools
pathzuzu 64.4f4533c Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables. | Exploitation Hacking Tools
payloadmask 17.58e0525 Web Payload list editor to use techniques to try bypass web application firewall. | WebApp Hacking Tools
payloadsallthethings 1407.3066615 A list of useful payloads and bypass for Web Application Security and Pentest/CTF. | Misc Tools
pblind 1.0 Little utility to help exploiting blind sql injection vulnerabilities. | Exploitation Hacking Tools
pbscan 10.566c3d7 Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage. | Hacker Scanner Tools
pcapfex 60.c51055a Packet CAPture Forensic Evidence eXtractor. | Network Hacking Tools
pcapfix 1.1.7 Tries to repair your broken pcap and pcapng files. | Network Hacking Tools
pcapsipdump 0.2 A tool for dumping SIP sessions (+RTP traffic, if available) to disk in a fashion similar to ‘tcpdump -w’ (format is exactly the same), but one file per sip session (even if there is thousands of concurrent SIP sessions). | VOIP Hacking Tools
pcapteller 1.1 A tool designed for traffic manipulation and replay. | Sniffing Tools
pcapxray 274.1721645 A Network Forensics Tool – To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction. | Forensic Tools
pcileech 4.14 Tool, which uses PCIe hardware devices to read and write from the target system memory. | Hardware Tools
pcode2code 6.65ae983 VBA p-code decompiler. | Decompiler Tools
pcredz 70.0cbb055 A tool that extracts credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, and more from a pcap file or from a live interface. | Hacker Scanner Tools
pdblaster 4.fc8abb3 Extract PDB file paths from large sample sets of executable files. | Forensic Tools
pdf-parser 0.7.5 Parses a PDF document to identify the fundamental elements used in the analyzed file. | Forensic Tools
pdfbook-analyzer 2 Utility for facebook memory forensics. | Forensic Tools
pdfcrack 0.19 Password recovery tool for PDF-files | Cracker Hacking Tools
pdfgrab 15.1327508 Tool for searching pdfs withthin google and extracting pdf metadata. | Recognise Hacking Tools
pdfid 0.2.8 Scan a file to look for certain PDF keywords. | Forensic Tools
pdfresurrect 0.12 A tool aimed at analyzing PDF documents. | Forensic Tools
pdfwalker 7.64c17f0 Frontend to explore the internals of a PDF document with Origami | Misc Tools
pdgmail 1.0 A password dictionary attack tool that targets windows authentication via the SMB protocol. | Cracker Hacking Tools
pe-bear A freeware reversing tool for PE files. | Windows Hacking Tools
pe-sieve 0.3.4 Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches). | Windows Hacking Tools
peach 3.0.202 A SmartFuzzer that is capable of performing both generation and mutation based fuzzing. | Fuzzing Tools
peach-fuzz 55.404e8ee Simple vulnerability scanning framework. | Fuzzing Tools
peass 1332.fa0f2e1 Privilege Escalation Awesome Scripts SUITE (with colors). | Hacker Scanner Tools
peda 1.2 Python Exploit Development Assistance for GDB | Debugger Tools
peepdf 0.4.2 A Python tool to explore PDF files in order to find out if the file can be harmful or not. | Forensic Tools
peepingtom 56.bc6f4d8 A tool to take screenshots of websites. Much like eyewitness. | WebApp Hacking Tools
peframe 135.70683b6 Tool to perform static analysis on (portable executable) malware. | Malware Tools
pemcrack 12.66e02b8 Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. | Cracker Hacking Tools
pemcracker 9.a741c93 Tool to crack encrypted PEM files. | Cracker Hacking Tools
penbox 81.3b77c69 A Penetration Testing Framework – The Tool With All The Tools. | Automation Tools
pencode 32.47e5784 Complex payload encoder. | Misc Tools
pentbox 1.8 A security suite that packs security and stability testing oriented tools for networks and systems. | Fuzzing Tools
pentestly 1798.93d1b39 Python and Powershell internal penetration testing framework. | Hacker Scanner Tools
pentmenu 216.094f281 A bash script for recon and DOS attacks. | Automation Tools
pepe 13.b81889b Collect information about email addresses from Pastebin. | Social Engineering Tools
pepper 18.9dfcade An open source script to perform malware static analysis on Portable Executable. | Malware Tools
periscope 3.2 A PE file inspection tool. | Windows Hacking Tools
perl-image-exiftool 12.42 Reader and rewriter of EXIF informations that supports raw files | Forensic Tools
petools 1.9.762 Portable executable (PE) manipulation toolkit. | Windows Hacking Tools
pev 0.81 Command line based tool for PE32/PE32+ file analysis. | Forensic Tools
pextractor 0.18b A forensics tool that can extract all files from an executable file created by a joiner or similar. | Windows Hacking Tools
pfff 0.29 Tools and APIs for code analysis, visualization and transformation | Code Audit Tools
pftriage 79.d7ad183 Python tool and library to help analyze files during malware triage and analysis. | Malware Tools
pgdbf 113.4e84775 Convert XBase / FoxPro databases to PostgreSQL | Database Tools
phantap 63.e80be64 An ‘invisible’ network tap aimed at red teams. | Network Hacking Tools
phantom-evasion 103.2cd0673 Antivirus evasion tool written in python. | Exploitation Hacking Tools
phemail 28.302b24d A python open source phishing email tool that automates the process of sending phishing emails as part of a social engineering test. | Social Engineering Tools
phishery 14.5743953 An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector. | Backdooring Tools
phishingkithunter 20.ac9bd1e Find phishing kits which use your brand/organization’s files and image’. | Social Engineering Tools
phoneinfoga v2.4.3.r2.gd7e6e84 Information gathering & OSINT framework for phone numbers. | Social Engineering Tools
phonesploit 51.0193f9e Adb exploiting tools. | Mobile Hacking Tools
phonia 593.8ae14ff Advanced toolkits to scan phone numbers using only free resources. | Social Engineering Tools
phoss 0.1.13 Sniffer designed to find HTTP, FTP, LDAP, Telnet, IMAP4, VNC and POP3 logins. | Cracker Hacking Tools
photon 325.6a41a90 Incredibly fast crawler which extracts urls, emails, files, website accounts and much more. | WebApp Hacking Tools
php-findsock-shell 2.b8a984f A Findsock Shell implementation in PHP + C. | WebApp Hacking Tools
php-malware-finder 0.3.4.r74.g48936ef Detect potentially malicious PHP files. | WebApp Hacking Tools
php-mt-seed 4.0 PHP mt_rand() seed cracker. | Cracker Hacking Tools
php-rfi-payload-decoder 30.bd42caa Decode and analyze RFI payloads developed in PHP. | Cracker Hacking Tools
php-vulnerability-hunter An whitebox fuzz testing tool capable of detected several classes of vulnerabilities in PHP web applications. | Windows Hacking Tools
phpggc 389.5589874 A library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically. | WebApp Hacking Tools
phpsploit 979.7dabcad Stealth post-exploitation framework. | WebApp Hacking Tools
phpstan 7702.22e755948 PHP Static Analysis Tool – discover bugs in your code without running it. | Code Audit Tools
phpstress 5.f987a7e A PHP denial of service / stress test for Web Servers running PHP-FPM or PHP-CGI. | DOS Hacking Tools
phrasendrescher 1.2.2c A modular and multi processing pass phrase cracking tool. | Cracker Hacking Tools
pidense 29.ef26704 Monitor illegal wireless network activities. (Fake Access Points) | Wireless Hacking Tools
pin 3.11.r97998 A dynamic binary instrumentation tool. | Automation Tools
pingcastle Active Directory scanning tool. | Windows Hacking Tools
pintool 24.d538a79 This tool can be useful for solving some reversing challenges in CTFs events. | Reverse Engineering Tools
pintool2 5.1c1af91 Improved version of pintool. | Reverse Engineering Tools
pip3line 92.5e27195 The Swiss army knife of byte manipulation. | Crypto Tools
pipal 1.1 A password analyser. | Cracker Hacking Tools
pipeline 19.f4935c9 Designed to aid in targeted brute force password cracking attacks. | Cracker Hacking Tools
pirana 0.3.1 Exploitation framework that tests the security of a email content filter. | Exploitation Hacking Tools
pivotsuite 19.9078d1e A portable, platform independent and powerful network pivoting toolkit. | Network Hacking Tools
pixd 7.873db72 Colourful visualization tool for binary files. | Binary Tools
pixiewps 1.4.2 Offline bruteforce of the WPS pin exploiting the low or non-existing entropy of some APs | Wireless Hacking Tools
pixload 77.d9645fb Image Payload Creating/Injecting tools. | WebApp Hacking Tools
pkcrack 1.2.2 A PkZip encryption cracker. | Cracker Hacking Tools
pkinittools 8.0f7f9a5 Tools for Kerberos PKINIT and relaying to AD CS. | Exploitation Hacking Tools
pkt2flow 69.868a2e8 A simple utility to classify packets into flows. | Network Hacking Tools
plasma-disasm 922.ec7df9b An interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax. | Disassembler Tools
plcscan 0.1 This is a tool written in Python that will scan for PLC devices over s7comm or modbus protocols. | Hacker Scanner Tools
plecost 102.ef0d89b WordPress finger printer Tool. | WebApp Hacking Tools
plown 13.ccf998c A security scanner for Plone CMS. | WebApp Hacking Tools 18.3f1be68 A python implementation of a grep friendly ftrace wrapper. | Misc Tools
plutil 1.6 Converts .plist files between binary and UTF (editable) text formats. | Misc Tools
pmacct 4281.db67590d Small set of multi-purpose passive network monitoring tools [NetFlow IPFIX sFlow libpcap BGP BMP IGP Streaming Telemetry]. | Network Hacking Tools
pmap 1.10 Passively discover, scan, and fingerprint link-local peers by the background noise they generate (i.e. their broadcast and multicast traffic). | Windows Hacking Tools
pmapper 82.91d2e60 A tool for quickly evaluating IAM permissions in AWS. | Recognise Hacking Tools
pmcma 1.00 Automated exploitation of invalid memory writes (being them the consequences of an overflow in a writable section, of a missing format string, integer overflow, variable misuse, or any other type of memory corruption). | Exploitation Hacking Tools
pmdump 1.2 A tool that lets you dump the memory contents of a process to a file without stopping the process. | Windows Hacking Tools
pngcheck 3.0.3 Verifies the integrity of PNG, JNG and MNG files by checking the CRCs and decompressing the image data.
pnscan 1.14.1 A parallel network scanner that can be used to survey TCP network services. | Hacker Scanner Tools
pocsuite 430.877d1b1 An open-sourced remote vulnerability testing framework developed by the Knownsec Security Team. | Exploitation Hacking Tools
poison 1.5.41 A fast, asynchronous syn and udp scanner. | Hacker Scanner Tools
poly 52.4e6f189 Polymorphic webshells. | WebApp Hacking Tools
polyswarm 2.9.2 An interface to the public and private PolySwarm APIs. | Malware Tools
pompem 141.3ebe768 A python exploit tool finder. | Exploitation Hacking Tools
poracle 68.dcc00b0 A tool for demonstrating padding oracle attacks. | Crypto Tools
portia 39.2e6e608 Automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. | Automation Tools
portmanteau 1.0 An experimental unix driver IOCTL security tool that is useful for fuzzing and discovering device driver attack surface. | Fuzzing Tools
portspoof 128.8b5596a This program’s primary goal is to enhance OS security through a set of new techniques. | Defensive Tools
postenum 116.9cd9d7e Clean, nice and easy tool for basic/advanced privilege escalation techniques. | Recognise Hacking Tools
posttester 0.1 A jar file that will send POST requests to servers in order to test for the hash collision vulnerability discussed at the Chaos Communication Congress in Berlin. | Crypto Tools
powercloud 21.0928303 Deliver powershell payloads via DNS TXT via CloudFlare using PowerShell. | Windows Hacking Tools
powerfuzzer 1_beta Powerfuzzer is a highly automated web fuzzer based on many other Open Source fuzzers available (incl. cfuzzer, fuzzled,, jbrofuzz, webscarab, wapiti, Socket Fuzzer). It can detect XSS, Injections (SQL, LDAP, commands, code, XPATH) and others. | Fuzzing Tools
powerlessshell 113.7159552 Run PowerShell command without invoking powershell.exe. | Windows Hacking Tools
powermft 5.76574543 Powerful commandline $MFT record editor. | Forensic Tools
powerops 32.13fe55b PowerShell Runspace Portable Post Exploitation Tool aimed at making Penetration Testing with PowerShell “easier”. | Windows Hacking Tools
powershdll 72.62cfa17 Run PowerShell with rundll32. Bypass software restrictions. | Windows Hacking Tools
powersploit 591.d943001 A PowerShell Post-Exploitation Framework. | Exploitation Hacking Tools
powerstager 14.0149dc9 A payload stager using PowerShell. | Binary Tools
pown 162.1036e02 Security testing and exploitation toolkit built on top of Node.js and NPM. | WebApp Hacking Tools
ppee 1.12 A Professional PE file Explorer for reversers, malware researchers and those who want to statically inspect PE files in more details. | Windows Hacking Tools
ppfuzz 24.0c3c526 A fast tool to scan client-side prototype pollution vulnerability written in Rust. | WebApp Hacking Tools
ppmap v1.2.0.r14.g42011bd A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets. | WebApp Hacking Tools
ppscan 0.3 Yet another port scanner with HTTP and FTP tunneling support. | Hacker Scanner Tools
pr0cks 20.c98188b python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using iptables -j REDIRECT target. | Proxy Tools
prads 1132.e631f4f A “Passive Real-time Asset Detection System”. | Hacker Scanner Tools
praeda 48.1dc2220 An automated data/information harvesting tool designed to gather critical information from various embedded devices. | Hacker Scanner Tools
preeny 110.aaef77f Some helpful preload libraries for pwning stuff. | Exploitation Hacking Tools
pret 102.638caad Printer Exploitation Toolkit – The tool that made dumpster diving obsolete. | Exploitation Hacking Tools
princeprocessor 132.bffda8c Standalone password candidate generator using the PRINCE algorithm. | Misc Tools
procdump 54.569883d Generate coredumps based off performance triggers. | Binary Tools
proctal 482.67bf7e8 Provides a command line interface and a C library to manipulate the address space of a running program on Linux. | Binary Tools
procyon 0.6 A suite of Java metaprogramming tools focused on code generation and analysis. | Decompiler Tools
profuzz 9.aa6dded Simple PROFINET fuzzer based on Scapy. | Fuzzing Tools
prometheus-firewall 176.a316d66 A Firewall analyzer written in ruby | Network Hacking Tools
promiscdetect 1.0 Checks if your network adapter(s) is running in promiscuous mode, which may be a sign that you have a sniffer running on your computer. | Windows Hacking Tools
propecia 2 A fast class scanner that scans for a specified open port with banner grabbing | Fingerprinting Tools
protos-sip 2 SIP test suite. | VOIP Hacking Tools
protosint 26.1ee6ee4 Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses. | Recognise Hacking Tools
prowler 1919.7930b44 Tool for AWS security assessment, auditing and hardening. | Defensive Tools
proxenet 712.67fc6b5 THE REAL hacker friendly proxy for web application pentests. | WebApp Hacking Tools
proxify 160.688e448 Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go. | Proxy Tools
proxmark 2413.61163344 A powerful general purpose RFID tool, the size of a deck of cards, designed to snoop, listen and emulate everything from Low Frequency (125kHz) to High Frequency (13.56MHz) tags.
proxmark3 4.9237 Software for the the Proxmark3, an RFID swiss-army tool
proxybroker 152.d21aae8 Proxy [Finder Checker
proxychains-ng 4.16 A hook preloader that allows to redirect TCP traffic of existing dynamically linked programs through one or more SOCKS or HTTP proxies | Proxy Tools
proxycheck 0.1 This is a simple proxy tool that checks for the HTTP CONNECT method and grabs verbose output from a webserver. | Hacker Scanner Tools
proxyp 2013 Small multithreaded Perl script written to enumerate latency, port numbers, server names, & geolocations of proxy IP addresses. | Proxy Tools
proxyscan 0.3 A security penetration testing tool to scan for hosts and ports through a Web proxy server. | Hacker Scanner Tools
proxytunnel 1.10.20210604 Creates tunnels through HTTP(S) proxies for any TCP based protocol
ps1encode 41.68d7778 A tool to generate and encode a PowerShell based Metasploit payloads. | Exploitation Hacking Tools
pscan 1.3 A limited problem scanner for C source files | Code Audit Tools
pshitt 23.dae7931 A lightweight fake SSH server designed to collect authentication data sent by intruders.
pspy 159.2312eed Monitor linux processes without root permissions. | Misc Tools
pstoreview 1.0 Lists the contents of the Protected Storage. | Windows Hacking Tools
ptf 1480.a70d1ba The Penetration Testers Framework: Way for modular support for up-to-date tools. | Exploitation Hacking Tools
pth-toolkit 7.3641cdc Modified version of the passing-the-hash tool collection made to work straight out of the box. | Sniffing Tools
ptunnel 0.72 A tool for reliably tunneling TCP connections over ICMP echo request and reply packets
pulledpork 397.5ccf5c5 Snort rule management. | Misc Tools
pulsar 53.e2714b2 Protocol Learning and Stateful Fuzzing. | Fuzzing Tools
punk 9.c2bc420 A post-exploitation tool meant to help network pivoting from a compromised unix box. | Exploitation Hacking Tools
punter 45.97b7bed Hunt domain names using DNSDumpster, WHOIS, Reverse WHOIS, Shodan, Crimeflare. | Recognise Hacking Tools
pupy 2988.4b78dc58 Opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python. | Automation Tools
pureblood 37.2c5ce07 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter. | Automation Tools
pwcrack 328.a333ba2 Password hash automatic cracking framework. | Cracker Hacking Tools
pwd-hash 2.0 A password hashing tool that use the crypt function to generate the hash of a string given on standard input. | Crypto Tools
pwdlogy 14.8b92bcf A target specific wordlist generating tool for social engineers and security researchers. | Misc Tools
pwdlyser 136.483b9bc Python-based CLI Password Analyser (Reporting Tool). | Crypto Tools
pwdump 7.1 Extracts the binary SAM and SYSTEM file from the filesystem and then the hashes. | Windows Hacking Tools
pwnat 14.d3c2b05 A tool that allows any number of clients behind NATs to communicate with a server behind a separate NAT with *no* port forwarding and *no* DMZ setup on any routers in order to directly communicate with each other. | Network Hacking Tools
pwncat 0.1.2 Bind and reverse shell handler with FW/IDS/IPS evasion, self-inject and port-scanning. | Backdooring Tools
pwncat-caleb v0.5.4.r11.g37f04d4 A post-exploitation platform. | Exploitation Hacking Tools
pwndbg 2022.01.05 Makes debugging with GDB suck less | Debugger Tools
pwndora 248.d3f676a Massive IPv4 scanner, find and analyze internet-connected devices in minutes, create your own IoT search engine at home. | Hacker Scanner Tools
pwndrop 18.385ba70 Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV. | WebApp Hacking Tools
pwned 1701.e1a46a1 A command-line tool for querying the ‘Have I been pwned?’ service. | Recognise Hacking Tools
pwned-search 40.04c1439 Pwned Password API lookup. | Recognise Hacking Tools
pwnedornot 145.a082e6c Tool to find passwords for compromised email addresses. | Recognise Hacking Tools
pwnedpasswords 2.0.0.r0.g717702e Generate and verify pwnedpasswords check digits. | Misc Tools
pwnloris 10.5b79eff An improved slowloris DOS tool which keeps attacking until the server starts getting exhausted. | DOS Hacking Tools
pwntools 4.7.0 CTF framework and exploit development library. | Disassembler Tools
pyaxmlparser v0.3.27.r0.g8da0929 A simple parser to parse Android XML file. | Mobile Hacking Tools
pybozocrack 87.ceb0cd9 A silly & effective MD5 cracker in Python. | Cracker Hacking Tools
pydictor 98.e48ee88 A useful hacker dictionary builder for a brute-force attack. | Misc Tools
pyersinia 49.73f4056 Network attack tool like yersinia but written in Python. | Network Hacking Tools
pyew 109.8eb3e49 A python tool to analyse malware. | Malware Tools
pyexfil 81.2ef1b8c A couple of beta stage tools for data exfiltration. | Network Hacking Tools
pyfiscan 2872.11780ef Free web-application vulnerability and version scanner. | WebApp Hacking Tools
pyfuscation 17.6d8d53f Obfuscate powershell scripts by replacing Function names, Variables and Parameters. | Automation Tools
pyinstaller 3.5 A program that converts (packages) Python programs into stand-alone executables, under Windows, Linux, Mac OS X, Solaris and AIX. | Misc Tools
pyjfuzz 157.f777067 Python JSON Fuzzer. | Fuzzing Tools
pykek 12.651b9ba Kerberos Exploitation Kit. | Exploitation Hacking Tools
pymeta 13.fa74e64 Auto Scanning to SSL Vulnerability. | Recognise Hacking Tools
pyminifakedns 0.1 Minimal DNS server written in Python; it always replies with a A-record. | Network Hacking Tools
pyrasite 2.0 Code injection and introspection of running Python processes. | Backdooring Tools
pyrdp 1894.24a9037 Python 3 RDP MITM and library. | Sniffing Tools
pyrit 0.5.0 The famous WPA precomputed cracker. | Cracker Hacking Tools
pyssltest 9.d7703f0 A python multithreaded script to make use of Qualys ssllabs api to test SSL flaws. | Hacker Scanner Tools
pytacle alpha2 Automates the task of sniffing GSM frames | Sniffing Tools
pytbull 2.1 A python based flexible IDS/IPS testing framework shipped with more than 300 tests. | Hacker Scanner Tools
pythem 454.e4fcb8a Python2 penetration testing framework. | Hacker Scanner Tools
python-api-dnsdumpster 76.fa952c6 Unofficial Python API for | Recognise Hacking Tools
python-arsenic 19.1 Async WebDriver implementation for asyncio and asyncio-compatible frameworks. | Automation Tools
python-capstone 4.0.2 Lightweight multi-platform, multi-architecture disassembly framework | Reverse Engineering Tools
python-cymruwhois 1.6 Python client for the service | Network Hacking Tools
python-frida 15.1.24 Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers. | Reverse Engineering Tools
python-frida-tools 10.6.2 Frida CLI tools. | Mobile Hacking Tools
python-google-streetview 1.2.9 A command line tool and module for Google Street View Image API. | Misc Tools
python-ivre 0.9.17.dev344 Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,… (library) | Recognise Hacking Tools
python-jsbeautifier 1.14.3 JavaScript unobfuscator and beautifier | Reverse Engineering Tools
python-keylogger 2.7.3 Simple keystroke logger. | Keylogger Tools
python-minidump 0.0.21 Python library to parse and read Microsoft minidump file format. | Windows Hacking Tools
python-mmbot 78.f5f5478 Powerful malicious file triage tool for cyber responders. | Malware Tools
python-oletools 0.60 Tools to analyze Microsoft OLE2 files. | Binary Tools
python-pcodedmp 1.2.6 A VBA p-code disassembler. | Disassembler Tools
python-search-engine-parser 0.6.6 Scrapes search engine pages for query titles, descriptions and links.
python-shodan 1.27.0 The official Python library and CLI for Shodan | Recognise Hacking Tools
python-ssh-mitm 2.0.3 SSH mitm server for security audits supporting public key authentication, session hijacking and file manipulation. | Exploitation Hacking Tools
python-trackerjacker 1.9.0 Finds and tracks wifi devices through raw 802.11 monitoring. | Wireless Hacking Tools
python-uncompyle6 3.8.0 A Python cross-version decompiler. | Decompiler Tools
python-utidylib 0.2 Python bindings for Tidy HTML parser/cleaner. | Misc Tools
python-witnessme 1.5.0 Web Inventory tool, takes screenshots of webpages using Pyppeteer. | WebApp Hacking Tools
python-yara-rednaga 279.32b6a74 The Python interface for YARA.
python2-api-dnsdumpster 76.fa952c6 Unofficial Python API for | Recognise Hacking Tools
python2-capstone 4.0.1 A disassembly framework with the target of becoming the ultimate disasm engine for binary analysis and reversing in the security community. | Disassembler Tools
python2-cymruwhois 1.6 Python client for the service | Network Hacking Tools
python2-darts.util.lru 7.5ef01b1 Simple dictionary with LRU behaviour. | Misc Tools
python2-exrex 144.9a66706 Irregular methods on regular expressions. | Misc Tools
python2-frida 15.1.24 Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers. | Reverse Engineering Tools
python2-frida-tools 10.6.2 Frida CLI tools. | Mobile Hacking Tools
python2-google-streetview 1.2.9 A command line tool and module for Google Street View Image API. | Misc Tools
python2-hpfeeds 411.539e738 Honeynet Project generic authenticated datafeed protocol.
python2-ivre 0.9.16.dev26 Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,… (library) | Recognise Hacking Tools
python2-jsbeautifier 1.13.4 JavaScript unobfuscator and beautifier. | WebApp Hacking Tools
python2-ldapdomaindump 0.9.3 Active Directory information dumper via LDAP. | Hacker Scanner Tools
python2-minidump 19.749e6da Python library to parse and read Microsoft minidump file format. | Windows Hacking Tools
python2-minikerberos 17.e7e8d0a Kerberos manipulation library in pure Python. | Windows Hacking Tools
python2-oletools 0.60 Tools to analyze Microsoft OLE2 files. | Binary Tools
python2-pcodedmp 1.2.6 A VBA p-code disassembler. | Disassembler Tools
python2-peepdf 0.4.2 A Python tool to explore PDF files in order to find out if the file can be harmful or not. | Forensic Tools
python2-ropgadget 5.9 Pythonic argument parser, that will make you smile. | Exploitation Hacking Tools
python2-shodan 1.27.0 Python library and command-line utility for Shodan ( | Recognise Hacking Tools
python2-yara 4.0.5 Python interface for YARA. | Malware Tools
qark 301.ba1b265 Tool to look for several security related Android application vulnerabilities. | Mobile Hacking Tools
qrgen 37.82a015b Simple script for generating Malformed QRCodes. | Misc Tools
qrljacker 210.56b0e72 QRLJacker is a highly customizable exploitation framework to demonstrate “QRLJacking Attack Vector”. | Social Engineering Tools
qsreplace 3.0b053d2 Accept URLs on stdin, replace all query string values with a user-supplied value, only output each combination of query string parameters once per host and path. | Misc Tools
quark-engine 21.6.2 An Obfuscation-Neglect Android Malware Scoring System. | Mobile Hacking Tools
quickrecon 0.3.2 A python script for simple information gathering. It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing. | Recognise Hacking Tools
quicksand-lite 32.42af152 Command line tool for scanning streams within office documents plus xor db attack. | Defensive Tools
quickscope 332.700a671 Statically analyze windows, linux, osx, executables and also APK files. | Binary Tools
r2ghidra 5.6.2.r1.ga4ba1ddc Deep ghidra decompiler integration for radare2 and iaito | Reverse Engineering Tools
rabid v0.1.0.r12.g1d71ea2 A CLI tool and library allowing to simply decode all kind of BigIP cookies | WebApp Hacking Tools
raccoon 187.9cf6c11 A high performance offensive security tool for reconnaissance and vulnerability scanning. | Recognise Hacking Tools
radamsa 0.6 General purpose mutation based fuzzer | Fuzzing Tools
radare2 5.6.6 Open-source tools to disasm, debug, analyze and manipulate binary files | Reverse Engineering Tools
radare2-keystone 667.caee604 Keystone assembler plugins for radare2. | Reverse Engineering Tools
radare2-unicorn 667.caee604 Unicorn Emulator Plugin for radare2. | Disassembler Tools
radiography 2 A forensic tool which grabs as much information as possible from a Windows system. | Windows Hacking Tools
rainbowcrack 1.8 Password cracker based on the faster time-memory trade-off. With MySQL and Cisco PIX Algorithm patches. | Cracker Hacking Tools
ranger-scanner 149.3aae5dd A tool to support security professionals to access and interact with remote Microsoft Windows based systems. | Hacker Scanner Tools
rapidscan 208.1441c05 The Multi-Tool Web Vulnerability Scanner. | WebApp Hacking Tools
rarcrack 0.2 This program uses bruteforce algorithm to find correct password (rar, 7z, zip). | Cracker Hacking Tools
rasenum 1.0 A small program which lists the information for all of the entries in any phonebook file (.pbk). | Windows Hacking Tools
rathole 0.4.1 A reverse proxy for NAT traversal | Proxy Tools
ratproxy 1.58 A passive web application security assessment tool | Fuzzing Tools
rats 6.4ba54ce A rough auditing tool for security in source code files. | Code Audit Tools
raven 33.8646a58 A Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees using Linkedin. | Social Engineering Tools
rawr 74.544dd75 Rapid Assessment of Web Resources. A web enumerator. | Hacker Scanner Tools
rawsec-cli 1.2.0.r7.gf7a08c6 Rawsec Inventory search CLI to find security tools and resources. | Misc Tools
rbasefind 41.a661118 A firmware base address search tool. | Binary Tools
rbkb v0.7.2.r0.ga6d35c0 A miscellaneous collection of command-line tools related to pen-testing and reversing. | Misc Tools
rbndr 9.a189ffd Simple DNS Rebinding Service. | Spoofing Hacking Tools
rcracki-mt 0.7.0 A tool to perform rainbow table attacks on password hashes. It is intended for indexed/perfected rainbow tables, mainly generated by the distributed project | Cracker Hacking Tools
rcrdcarver 5.54507d21 Carve RCRD records ($LogFile) from a chunk of data.. | Forensic Tools
rdesktop-brute 1.5.0 It connects to windows terminal servers – Bruteforce patch included. | Cracker Hacking Tools
rdp-cipher-checker 0.1 Enumerate the encryption protocols supported by the server and the cipher strengths supported using native RDP encryption. | Hacker Scanner Tools
rdp-sec-check 11.d0cc143 Script to enumerate security settings of an RDP Service. | Hacker Scanner Tools
rdpassspray 25.6aaeb60 Python3 tool to perform password spraying using RDP. | Cracker Hacking Tools
rdwarecon 1.1.r7.g37db279 A python script to extract information from a Microsoft Remote Desktop Web Access (RDWA) application. | Recognise Hacking Tools
reaver 1.6.6 Brute force attack against Wifi Protected Setup | Wireless Hacking Tools
rebind 0.3.4 DNS Rebinding Tool | Exploitation Hacking Tools
recaf Modern Java bytecode editor. | Decompiler Tools
recentfilecache-parser 2.5e22518 Python parser for the RecentFileCache.bcf on Windows. | Forensic Tools
recomposer 2.90f85ed Randomly changes Win32/64 PE Files for ‘safer’ uploading to malware and sandbox sites. | Automation Tools
recon-ng 1021.9e907df A full-featured Web Reconnaissance framework written in Python. | Recognise Hacking Tools
reconnoitre 441.f62afba A security tool for multithreaded information gathering and service enumeration. | Recognise Hacking Tools
reconscan 61.afbcfc0 Network reconnaissance and vulnerability assessment tools. | Recognise Hacking Tools
recoverjpeg 2.6.3 Recover jpegs from damaged devices. | Forensic Tools
recsech 123.1fc298a Tool for doing Footprinting and Reconnaissance on the target web. | Recognise Hacking Tools
recstudio 4.1 Cross platform interactive decompiler. | Decompiler Tools
recuperabit 69.8e77cde A tool for forensic file system reconstruction. | Forensic Tools
red-hawk 36.fa54e23 All in one tool for Information Gathering, Vulnerability Scanning and Crawling. | Recognise Hacking Tools
redasm 1667.5ab6be9 Interactive, multiarchitecture disassembler written in C++ using Qt5 as UI Framework. | Disassembler Tools
redfang 2.5 Finds non-discoverable Bluetooth devices by brute-forcing the last six bytes of the devices’ Bluetooth addresses and calling read_remote_name(). | Bluetooth Hacking Tools
redirectpoison 1.1 A tool to poison a targeted issuer of SIP INVITE requests with 301 (i.e. Moved Permanently) redirection responses. | VOIP Hacking Tools
redpoint 123.23ef36b Digital Bond’s ICS Enumeration Tools. | Misc Tools
redress v0.8.0.alpha4.r6.g28a8814 A tool for analyzing stripped Go binaries. | Binary Tools
redsocks 211.19b822e Transparent redirector of any TCP connection to proxy. | Proxy Tools
reelphish 5.dc1be33 A Real-Time Two-Factor Phishing Tool. | Social Engineering Tools
regeorg 30.1ca54c2 The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.
regipy 2.2.2 Library for parsing offline registry hives. | Forensic Tools
reglookup 1.0.1 Command line utility for reading and querying Windows NT registries | Forensic Tools
regreport 1.6 Windows registry forensic analysis tool. | Windows Hacking Tools
regrippy 2.0.0 Framework for reading and extracting useful forensics data from Windows registry hives. | Forensic Tools
regview 1.3 Open raw Windows NT 5 Registry files (Windows 2000 or higher). | Windows Hacking Tools
rekall 1409.55d1925f Memory Forensic Framework. | Forensic Tools
relay-scanner 1.7 An SMTP relay scanner. | Hacker Scanner Tools
remot3d 38.a707ef7 An Simple Exploit for PHP Language. | WebApp Hacking Tools
replayproxy 1.1 Forensic tool to replay web-based attacks (and also general HTTP traffic) that were captured in a pcap file. | Forensic Tools
resourcehacker 5.1.8 Resource compiler and decompiler for Windows® applications. | Windows Hacking Tools
responder v3.1.2.0.r7.g983a1c6 A LLMNR and NBT-NS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2 (multirelay version). | Hacker Scanner Tools
restler-fuzzer v8.5.0.r16.g1bd7bc6 First stateful REST API fuzzing tool for automatically testing cloud services through their REST APIs and finding security and reliability bugs in these services. | WebApp Hacking Tools
retdec 2033.f9ac9ec7 Retargetable machine-code decompiler based on LLVM. | Decompiler Tools
retire 3.0.7.r11.gf491d25 Scanner detecting the use of JavaScript libraries with known vulnerabilities. | Hacker Scanner Tools
reverseip 13.42cc9c3 Ruby based reverse IP-lookup tool. | Recognise Hacking Tools
revipd 5.2aaacfb A simple reverse IP domain scanner. | Recognise Hacking Tools
revsh 215.174e309 A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities. | Backdooring Tools
rex 663.155a0bd Shellphish’s automated exploitation engine, originally created for the Cyber Grand Challenge. | Exploitation Hacking Tools
rext 63.5f0f626 Router EXploitation Toolkit – small toolkit for easy creation and usage of various python scripts that work with embedded devices. | Exploitation Hacking Tools
rfcat 170508 RF ChipCon-based Attack Toolset. | Exploitation Hacking Tools
rfdump 1.6 Tool to detect RFID-Tags and show their meta information | Wireless Hacking Tools
rfidiot 107.88f2ef9 An open source python library for exploring RFID devices. | Wireless Hacking Tools
rfidtool 0.01 A opensource tool to read / write rfid tags | Wireless Hacking Tools
rhodiola 4.8bc08a0 Personalized wordlist generator with NLP, by analyzing tweets (A.K.A crunch2049). | Automation Tools
richsploit 3.6b15e0f Exploitation toolkit for RichFaces. | Exploitation Hacking Tools
ridenum 75.9e3b89b A null session RID cycle attack for brute forcing domain controllers. | Cracker Hacking Tools
ridrelay 34.f2fa99c Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv. | Recognise Hacking Tools
rifiuti2 0.7.0 A rewrite of rifiuti, a great tool from Foundstone folks for analyzing Windows Recycle Bin INFO2 file. | Forensic Tools
rinetd 0.62 internet redirection server | Network Hacking Tools
ripdc 0.3 A script which maps domains related to an given ip address or domainname. | Recognise Hacking Tools
rita 799.b237b3e Real Intelligence Threat Analytics. | Recognise Hacking Tools
riwifshell 38.40075d5 Web backdoor – infector – explorer. | WebApp Hacking Tools
rkhunter 1.4.6 Checks machines for the presence of rootkits and other unwanted tools. | Forensic Tools
rlogin-scanner 0.2 Multithreaded rlogin scanner. Tested on Linux, OpenBSD and Solaris. | Cracker Hacking Tools
rmiscout 1.4 Enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities. | Exploitation Hacking Tools
rogue-mysql-server 2.78ebbfc A rogue MySQL server written in Python. | Misc Tools
roguehostapd 78.381b373 Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes. | Wireless Hacking Tools