• Evilginx

    A free and open-source man-in-the-middle attack framework. Evilginx can be used to steal users’ login credentials and session cookies, allowing the tool to bypass two-factor authentication.

  • Ghost Phisher

    A free and open-source wireless and ethernet phishing tool. Ghost Phisher supports features such as webpage hosting, credential logging, Wi-Fi access point emulation, session hijacking, and more.

  • GitOops

    All paths lead to clouds. GitOops is a tool to help attackers and defenders identify lateral movement and privilege escalation paths in GitHub organizations by abusing CI/CD pipelines and GitHub access controls.

  • Gophish

    A free and open-source phishing toolkit for organizations. GoPhish can run on Windows, macOS, and Linux and lets users quickly and easily spin up phishing attacks.

  • Gssapi-Abuse

    A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks.

  • Hakoriginfinder

    Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!

  • Hashcat

    World’s fastest and most advanced password recovery utility

  • Hping3

    A free and open-source command-line packet crafting and analysis tool. The hping3 tool can send custom ICMP/UDP/TCP packets for use cases such as testing firewalls or network performance.

  • HttpX

    Httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retry able http library.

  • Hydra

    A free and open-source parallelized network login cracker tool. Hydra can crack dozens of protocols, including Cisco, HTTP(S), ICQ, IMAP, MySQL, Oracle, SMTP, and more.

  • IBM Node-Red

    Generalized automation / orchestration framework. It simplifies the development of IoT (Internet of Things) applications by providing a flow-based development environment. Users create flows by connecting nodes that represent different functionalities, making it easy to design and deploy applications that integrate various devices and services. It’s often used for rapid prototyping, automation, and IoT solutions.

  • John the Ripper

    A free and open-source password cracker tool for auditing and recovery. John the Ripper supports hundreds of hash and cipher types, including Unix, Windows, macOS, WordPress, database servers, filesystems, archives, and more.