Showing 141-168 of 616 tool(s)
Page 6 of 22
Crowbar
Password Attacks

Crowbar

Brute-forcing tool for penetration tests, focusing on various protocols.

ScrapeIn
Reconnaissance and OSINT

ScrapeIn

Gathers corporate emails from LinkedIn for OSINT and phishing preparation.

psudohash
Password Attacks

psudohash

Customizable password list generator for brute-force attacks, mimicking human patterns.

osintname
Reconnaissance and OSINT

osintname

Generate Emails and Usernames from Provided Lists of Names.

Wifi Analyzer
Wireless Hacking

Wifi Analyzer

Wifi Analyzer will provide useful information about wireless signals around you.

FufuFafa
Reconnaissance and OSINT

FufuFafa

Lightweight OSINT tool for WHOIS, DNS, email harvesting, and social media analysis.

Poastal
Reconnaissance and OSINT

Poastal

Performs OSINT on email addresses, returning detailed information.

SEEKER
Social Engineering

SEEKER

Tool hosting fake page to get victim's location via website permission.

HostedScan
Vulnerability Scanning

HostedScan

Scans websites, servers, networks, and APIs with alerts and audit-ready reports.

SpyNote
Mobile Security

SpyNote

SpyNote is an Android RAT malware used to spy on and control infected mobile devices.

MRTG
Log Management

MRTG

Monitors SNMP devices and generates traffic graphs per interface.

Netlas
Reconnaissance and OSINT

Netlas

Discover, scan and monitor online assets quickly with automated scoping.

Vulners
Vulnerability Management

Vulners

Vuln intelligence with context, exploit updates, and machine-readable integration format.

Amnesiac
Privilege Escalation

Amnesiac

A PowerShell framework for lateral movement in Active Directory, executed in memory.

AuthMatrix
Web Application Security

AuthMatrix

Burp extension to test permissions and access controls in web applications.

osintui
Reconnaissance and OSINT

osintui

Terminal user interface for performing Open Source Intelligence (OSINT) collection.

GASE
Post-Exploitation

GASE

Extracts and decodes Google Authenticator secrets for post-access use.

wstunnel
Red Team Operations

wstunnel

WStunnel uses WebSocket (HTTP-compatible) to tunnel traffic, bypassing firewalls and proxies

ransomwatch
Threat Intelligence

ransomwatch

ransomwatch trails the extortion sites used by ransomware groups and surfaces an aggregated feed of claims

Awesome Search Queries
Reconnaissance and OSINT

Awesome Search Queries

Community-driven list of OSINT queries for multiple search engines and research purposes.

GTFOBins
Post-Exploitation

GTFOBins

Unix binaries list abused to escape restrictions or escalate privileges in misconfigured systems.

Security Onion
Detection and Response

Security Onion

Platform with IDS, network/host visibility, and alert and incident management.

Sudomy
Reconnaissance and OSINT

Sudomy

Subdomain enumeration tool with advanced domain recon and OSINT capabilities.

Van Gonography
Data Loss Prevention

Van Gonography

Hides any file type inside an image of your choice.

WP Users Report
Reconnaissance and OSINT

WP Users Report

WP Users Report is a Python tool that automates user data extraction from WordPress sites via the API, generating HTML and CSV reports for analysis.

pixiewps
Wireless Hacking

pixiewps

C tool for offline WPS PIN brute-force exploiting low entropy.

xurlfind3r
Threat Intelligence

xurlfind3r

Command-line utility to passively discover URLs for a given domain.

FuckThatPacker
Malware Analysis

FuckThatPacker

Simple Python packer to easily bypass Windows Defender.

GPT - RedTeam.Blue