#bestgithubhackingtoolsUnmoderated tagAll postsTrending CommunitiesSteemitCryptoAcademyNewcomers' Communityআমার বাংলা ব্লগKorea • 한국 • KR • KOSTEEM CN/中文Steem AllianceSteem POD TeamAVLE 일상WORLD OF XPILARBeauty of CreativityTron Fan ClubSCT.암호화폐.CryptoExplore Communities...#bestgithubhackingtoolsTrendingHotNewPayoutsMutedtwr (53)in #bestethicalhackertools • 5 years agoFfuf (Fuzz Faster U Fool) - An Open Source Fast Web Fuzzing ToolFfuf - Fuzz Faster U Fool is a great tool used for fuzzing. It has become really popular lately with bug bounty…twr (53)in #bestethicalhackertools • 5 years agoNmap Automator - a tool I used during OSCP for simple reconNmap Automator is a great tool for initial port scans of a given ip address. It automates the scan techniques which I…twr (53)in #bestgithubhackingtools • 5 years agoTurbolist3r - An Automated Subdomain Scanning ToolTurbolist3r is a subdomain enumeration tool which can identify subdomain takeovers. It is heavily based on…twr (53)in #bestethicalhackertools • 5 years agowebscreenshot.py | A Simple script that aids in testing large websitesWeb Screenshot - webscreenshot.py is a great tool which comes in handy when a penetration tester needs to quickly…twr (53)in #bestgithubhackingtools • 5 years agoFinalRecon - An All In One OSINT Tool for Web ReconnaissanceFinal Recon is a useful tool for gathering data about a target from open source resources, the tool is written in…twr (53)in #bestgithubhackingtools • 5 years agoDSXS | An open source, simple and effective XSS scanner that can be easily customizedDamn Small XSS Scanner (DSXS) is a great tool for finding cross site scripting vulnerabilities, the tool has been…twr (53)in #bestgithubhackingtools • 5 years agoBoomER | An Open Source Post-Exploitation Tool To Exploit Local VulnerabilitiesBoomER is a Command-line interface python open-source framework fully developed in Python 3.X for post-exploitation of…twr (53)in #4canv2demonstration • 5 years ago4CAN V2 | A Raspberry Pi Project To Help Find Vulnerabilities in Modern Cars4CAN V2 is a Raspberry Pi project created by the Cisco team in order to test the security of cars via the 4CAN bus, it…twr (53)in #bestgithubhackingtools • 6 years agoSalsa-tools | A Collaboration of Tools For a Reverse Shell on SteroidsSalsa-tools is a collection of three tools programmed with C# used to take over a windows machine and bypass AV and…twr (53)in #aquatonedemonstration • 6 years agoAquatone | An Open Source Domain Flyover ToolAquatone is a tool programmed by go-lang to inspect domains/check their status and also provide screenshots of the…twr (53)in #bestgithubhackingtools • 6 years agoA Malware Showcase | Understanding Malware With PythonMalware showcase is a Github repository that contains examples of malware usage and behavior, this repo should be used…twr (53)in #bestgithubhackingtools • 6 years agoA Malware Showcase | Understanding Malware With PythonMalware showcase is a Github repository that contains examples of malware usage and behavior, this repo should be used…twr (53)in #automation • 6 years agoDumpsterFire - A Tool That Generates Network Shenanigans to Facilitate Blue Team TrainingDumpsterFire is an open-source tool made by blue team member to edit create and control dumpster payloads in order to…twr (53)in #bestgithubhackingtools • 6 years agoCMSeeK | An Open Source Content Management System Detection and Exploitation ToolCMSeek is an open-source tool that analyzes the regex of websites in order to detect flaws and content management…twr (53)in #bestgithubhackingtools • 6 years agoSniffAir - An Open Source Wireless Security FrameworkSniffAir is an open source tool made for sophisticated wireless attacks and data capture, it handle all types of pcap…twr (53)in #bestgithubhackingtools • 6 years agoWhatWeb – A Very Handy Open Source Web ScannerDefinition Whatweb is web scanner written in Ruby to identify and recognise technologies used by a website including…twr (53)in #bestgithubhackingtools • 6 years agoWifi Pumpkin – WiFi MITM Attack and Audit FrameworkWifi Pumpkin is a security audit framework used to test the security of wifi against threats like man in the middle…twr (53)in #bestgithubhackingtools • 6 years agoTheFatRat - A Convenient Exploitation ToolTheFatRat is an easy to use tool which helps in generating backdoors, system exploitation, post exploitation attacks…twr (53)in #berootdemonstration • 6 years agoBeRoot - A Post Exploitation Privilege Escalation ToolBeRoot is a post-exploitation tool to check for common misconfigurations which can allow an attacker to escalate their…twr (53)in #bestgithubhackingtools • 6 years agoCloakify - A Tool to Mask Your Data in Plain SightCloakify Factory is a tool to transforms any file type into a list of harmless and even useless looking strings. This…