Showing 169-196 of 616 tool(s)
Page 7 of 22
JSRat-Py
Command and Control (C2)

JSRat-Py

Python implementation of JSRat.ps1 for cross-platform attack server.

ClassyShark
Reverse Engineering

ClassyShark

Inspects Android binaries showing classes, methods, dependencies, and more.

WhatsAnalyze
DFIR

WhatsAnalyze

Open-source tool to analyze WhatsApp chats and generate PDFs. Run locally or access the hosted version at whatsanalyze.com fully transparent on GitHub.

CyberPhish
Social Engineering

CyberPhish

Customizable phishing tool with social media email templates for educational purposes.

Barrion
Web Application Security

Barrion

Automated scans to detect flaws in websites, web apps, and APIs no setup needed.

Synergy Httpx
Physical Security

Synergy Httpx

Python HTTP(s) server for red teaming, receives POST data and serves dynamic content.

vulnerable-AD
Security Auditing

vulnerable-AD

Creates a vulnerable Active Directory environment for local lab attack testing.

Oblivion
Reconnaissance and OSINT

Oblivion

Monitors real-time data leaks and alerts if user credentials have been exposed.

Th3inspector
Reconnaissance and OSINT

Th3inspector

All-in-one tool for automated public information gathering.

rekono
Red Team Operations

rekono

Automates pentests by combining tools, sending results, and integrating with Defect-Dojo.

Exiv2
DFIR

Exiv2

C++ library & CLI utility to manage image metadata (Exif, IPTC, XMP, ICC).

emp3r0r
Post-Exploitation

emp3r0r

Advanced post-exploitation framework for Linux/Windows with integrated C2 capabilities.

MyJWT
Exploitation Frameworks

MyJWT

CLI for exploiting and testing vulnerabilities in JSON Web Tokens (JWT).

PrivacyNet
Network Penetration

PrivacyNet

Routes all traffic and DNS via Tor using iptables to anonymize network connections.

The Sleuth Kit
DFIR

The Sleuth Kit

CLI tools and C library to analyze disk images and recover files; used by Autopsy and others.

SysWhispers2
Post-Exploitation

SysWhispers2

Generates direct syscall headers/ASM for evasion and privilege escalation in post-exploitation.

Nighthawk C2
Command and Control (C2)

Nighthawk C2

Stealth C2 framework with evasive beacon for Red Team in monitored environments.

CHAOS
Command and Control (C2)

CHAOS

Free and open-source Remote Administration Tool (RAT) to control remote operating systems.

Google Safe Browsing
Threat Intelligence

Google Safe Browsing

Google Safe Browsing is a tool by Google that enhances online security by identifying and warning users about potentially dangerous websites.

shuffledns
Reconnaissance and OSINT

shuffledns

Massdns wrapper for subdomain bruteforce and resolution with wildcard handling support.

Autofill Phishing
Security Awareness

Autofill Phishing

Demonstrates autofill phishing vulnerability in modern browsers.

Jarvis-GPT
AI Security

Jarvis-GPT

Interacts with ChatGPT by voice, performs computer commands, and plays music.

ImmuniWeb
Web Application Security

ImmuniWeb

Free app/API security, phishing detection, and dark web monitoring for awareness and safety.

theHarvester
Reconnaissance and OSINT

theHarvester

Collects emails, subdomains, and IPs using OSINT from public sources.

httpx
Web Application Security

httpx

Fast HTTP toolkit for reliable probing using multi-threading and retryable HTTP requests.

vermilion
Red Team Operations

vermilion

CLI tool for rapid collection and optional exfiltration of sensitive info from Linux systems.

Censys Enumeration
Reconnaissance and OSINT

Censys Enumeration

Extracts subdomains and emails using Censys TLS certificate data.

Burp Encode IP
Web Application Security

Burp Encode IP

Burp extension encoding IPs to test SSRF, RFI, and open redirect flaws.

GPT - RedTeam.Blue