fsociety
Hacking toolkit
A comprehensive collection of hacking tools and scripts for penetration testing and vulnerability assessment
fsociety Hacking Tools Pack – A Penetration Testing Framework
11k stars
599 watching
2k forks
Language: Python
last commit: 7 months ago
Linked from 2 awesome lists
brute-force-attacksdesktopexploitationfinderfsocietyfsociety-hackinginformation-gatheringnetworkpenetration-testing-frameworkport-scanningpost-exploitationpythonweb-hacking
Related projects:
Repository | Description | Stars |
---|---|---|
| A collection of Python libraries and tools for network exploitation and reverse engineering. | 2,725 |
| Automates exploiting vulnerabilities in web applications to execute arbitrary actions on their behalf | 3,027 |
| A toolkit for teaching and practicing network hacking concepts using Python | 891 |
| A collection of tools and scripts for penetration testing and automation using Python. | 174 |
| Detects and analyzes malicious traffic patterns to identify potential security threats. | 6,642 |
| A toolkit for testing and analyzing JSON Web Tokens for security vulnerabilities | 5,501 |
| A tool for analyzing malware and threat intelligence data from multiple sources | 3,012 |
| Detects known security vulnerabilities in Python dependencies and provides recommendations for remediation. | 1,758 |
| A high-performance tool for reconnaissance and vulnerability scanning of web applications and networks | 3,105 |
| A collection of tools and methodologies for identifying vulnerabilities in web applications | 3,698 |
| Automates searches for exploits and vulnerabilities across multiple databases | 988 |
| Automated tool for identifying vulnerabilities and gathering information about network services and systems. | 3,700 |
| Exploits a locked computer to install a persistent backdoor and expose internal network resources. | 6,268 |
| A tool to automatically generate and test web application inputs for security vulnerabilities | 5,978 |
| An agent trained to scan for vulnerabilities and exploit them in a simulated network environment | 23 |