The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
-
Updated
Sep 27, 2024 - JavaScript
Hacking refers to the practice of gaining unauthorized access to data in a system or computer. This topic encompasses various forms of hacking, including black-hat and grey-hat hacking, which involve malicious or non-malicious intent. It explores the tools and techniques used by hackers, the motivations behind hacking, and the measures organizations can take to protect themselves.
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.
Text, samples and website for my 'Effective Shell' series.
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
A OSINT tool which helps you to quickly find information effectively. All you need is to input and it will take take care of rest.
A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
A front-end JavaScript toolkit for creating DNS rebinding attacks.
DNS Rebinding Exploitation Framework
GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment
Vulnerability assessment and penetration testing automation and reporting platform for teams.
Pen Test Report Generation and Assessment Collaboration
Tool to export Juice Shop challenges and hints in data format compatible with CTFd, RootTheBox or FBCTF
i-Haklab is a hacking laboratory for Termux that contains open source tools for pentesting, scan/find vulnerabilities, explotation and post-explotation recommended by Ivam3 with automation hacking commands and many guides and tutorials to learn use it.
🐙 Cross-document messaging security research tool powered by https://enso.security
Host and manage multiple Juice Shop instances for security trainings and Capture The Flags
Fully Undetected Grabber (Grabs Wallets, Passwords, Cookies, Modifies Discord Client Etc.) Disclaimer: We are not responsible for any damages this software may cause after being acquired. This software was made for personal education and sandbox testing.
DNS rebinding toolkit
A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers