Lists (14)
Sort Name ascending (A-Z)
Autres Outils Utiles
Coin Du Dev
Crack
Hacking Protocols
Telnet SSH FTP SMB SMTP DNS SNMP MSRPC RDP MYSQL MSSQL VNC Rsync LDAP DockerIngénierie Sociale
Concepts / Principes / Attaques Ethique Profil ComportementauxOSINT / Recon
Pas trié
Pentest AD
GPP Mouvements latéraux Azure ADPentest IoT
Replay stream caméra Assistant vocaux Caméra IP DoS Imprimantes ChromecastPentest Mobile
Android IOSPentest Physique
Crochetage RFID Équipements Hardware Hacking Firmware HackingPentest Réseaux
Protocole réseau Wifi BLEPentest Web
Bruteforce / Fuzzing Injections Open Redirect Path Traversal / LFI / RFI Bypass Charges utiles CMS SOP Bypass Clickjacking Insecure deserialization Etc...Post Exploitation
Énumération / Élévation Privilèges Effacement des traces Persistance / Downloaders Defense Evasion Exfiltration de donnéesStars
Open Source Intelligence Interface for Deep Web Scraping
GVision is a reverse image search app that use Google Cloud Vision API to detect landmarks and web entities from images, helping you gather valuable information quickly and easily.
Script to Automate installtion of Apps ,frida server and moving Burpsuite certificate to root folder
A translation of Ryan McDermott's "Clean Code Javascript" repository to French
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
Like nmap for mapping wifi networks you're not connected to, plus device tracking
Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydrattack.com), the main idea of which is, based only on the do…
Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share th…
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
A vulnerability scanner for container images and filesystems
A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highlighting those that contain matches.
Linux enumeration tool for pentesting and CTFs with verbosity levels
An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S01E01)
A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the given words, creating a unique and ideal wordlist to use regard…
Generates millions of keyword-based password mutations in seconds.
Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs
Tool and framework for securely reading untrusted USB mass storage devices.
BinAbsInspector: Vulnerability Scanner for Binaries
A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.