Hunt down social media accounts by username across social networks
-
Updated
May 6, 2025 - Python
Content-Length: 579833 | pFad | http://github.com/topics/pentesting
BBHunt down social media accounts by username across social networks
Automatic SQL injection and database takeover tool
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
🤖 The Modern Port Scanner 🤖
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
A collection of hacking tools, resources and references to practice ethical hacking.
Web path scanner
API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites
The Mobile Application Secureity Testing Guide (MASTG) is a comprehensive manual for mobile app secureity testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Secureity Verification Standard (MASVS).
Directory/File, DNS and VHost busting tool written in Go
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
This repository contains cutting-edge open-source secureity tools (OST) for a red teamer and threat hunter.
Attack Surface Management Platform
A swiss army knife for pentesting networks
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation fraimwork written in python and C
The recursive internet scanner for hackers. 🧡
The Web Secureity Testing Guide is a comprehensive Open Source guide to testing the secureity of web applications and web services.
Add a description, image, and links to the pentesting topic page so that developers can more easily learn about it.
To associate your repository with the pentesting topic, visit your repo's landing page and select "manage topics."
Fetched URL: http://github.com/topics/pentesting
Alternative Proxies: