hexstrike-ai
AI Summary: HexStrike AI is an advanced penetration testing platform that integrates over 150 security tools and more than 12 autonomous AI agents for automated cybersecurity assessment. Its primary use case focuses on cybersecurity automation, employing intelligent decision-making and vulnerability intelligence to optimize attack strategies and resource management. Notable features include real-time dashboards, progress visualization, and a multi-agent architecture that facilitates comprehensive penetration testing and threat analysis.
README
HexWalk
AI Summary: HexWalk is a cross-platform hex editor, viewer, and analyzer that facilitates in-depth binary file examination. Its primary use case is for advanced binary analysis, featuring capabilities such as advanced pattern searching, entropy analysis, disassembly for multiple architectures, and integration with Binwalk for firmware analysis. Notable features include a hash calculator, byte pattern recognition for header parsing, and a comprehensive diff analysis tool, making it suitable for security researchers and developers working with binary data.
hidden
AI Summary: Hidden is a Windows driver designed for reverse engineering and research purposes, enabling users to conceal specific environmental indicators on their machines, such as debugging tools and virtual machine infrastructure. It offers advanced features to hide registry keys, files, directories, and processes, while providing a usermode interface through a library and command-line interface for comprehensive management capabilities. Notably, it includes the functionality to protect specific processes and exclude others from hiding features, all compatible with Windows Vista and later versions.
hollows_hunter
AI Summary: Hollows Hunter is a command-line tool designed to identify and dump potentially malicious implants in processes by utilizing the PE-sieve passive memory scanner. Its primary use case includes scanning processes based on various criteria, such as process name and creation time, and it offers capabilities for continuous memory scanning and ETW listening. Notable features include the ability to scan all processes if no specific targets are specified, and support for multiple input criteria for enhanced targeting.
HolyTips
AI Summary: HolyTips is a comprehensive repository that provides a collection of notes, checklists, and writeups focused on bug bounty hunting and web application security. Its primary use case is to serve as a resource for security researchers and ethical hackers, offering organized information that aids in identifying vulnerabilities. Notable features include structured content that facilitates quick reference and learning in the field of web security assessments.
README

HolyTips
A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.honeypots
AI Summary: Qeeqbox/honeypots is a versatile package containing 30 customizable honeypots designed for monitoring network traffic, bot activities, and credential harvesting. It features non-blocking responses, easy setup and customization, and supports logging to various outputs, including Postgres databases, terminal, and Syslog. The tool encapsulates multiple protocols like HTTP, FTP, SSH, and more, facilitating quick deployment of multiple honeypots for enhanced threat detection.
README

30 low-high level honeypots in a single PyPI package for monitoring network traffic, bots activities, and username \ password credentials.
HookCase
AI Summary: HookCase is a powerful debugging and reverse engineering tool for macOS that enhances the capabilities of Apple’s
DYLD_INSERT_LIBRARIES. It allows users to hook methods in any module, including non-exported functions, and can target both parent and child processes simultaneously. Key features include support for watchpoints and the ability to bypass Apple’s restrictions onDYLD_INSERT_LIBRARIES, making it suitable for working with applications that have entitlements.
README
HookCase
HookCase is a tool for debugging and reverse engineering applications
on macOS (aka OS X), and the operating system itself. It re-implements
and extends
Apple’s DYLD_INSERT_LIBRARIES functionality.
It can be used to hook any method in any module (even non-exported
ones, and even those that don’t have an entry in their own module’s
symbol table). In a single operation, it can be applied to a parent
process and all its child processes, whether or not the child
processes inherit their parent’s environment. It supports
watchpoints. So HookCase is considerably more powerful than
DYLD_INSERT_LIBRARIES. It also doesn’t have the restrictions Apple
has placed on DYLD_INSERT_LIBRARIES. So, for example, HookCase can
be used with applications that have
entitlements.
HookCase runs on OS X 10.9 (Mavericks) through macOS 26 (Tahoe).
HostHunter
AI Summary: HostHunter is a Python-based tool designed for the discovery and extraction of hostnames linked to specified IPv4 or IPv6 addresses, utilizing OSINT and active reconnaissance methods. It generates comprehensive reports in various formats, including CSV and Nessus, and features capabilities like SSL certificate extraction, hostname validation, and the ability to capture screenshots of target applications. This tool is particularly beneficial for organizations aiming to assess their attack surface effectively.
houdini
AI Summary: HOUDINI is a comprehensive collection of Docker images designed for network intrusion testing, facilitating offensive security practices. It not only provides extensive listings of tools but also includes pre-defined
docker runcommands and cheatsheets for ease of use. Additionally, the repository encourages community contributions to expand its toolset, enhancing collaborative development in network security.
README
🐳 HOUDINI: Hundreds of Offensive and Useful Docker Images for Network Intrusion
HOUDINI is a curated list of Network Security related Docker Images for Network Intrusion purposes. A lot of images are created and kept updated through our RAUDI repository. Pretty dope, eh?
hrtng
AI Summary: The hrtng IDA plugin provides a suite of tools designed to enhance the reverse engineering process within the IDA Pro environment, specifically leveraging the Hex-Rays decompiler. Its notable features include automation of variable renaming, interactive pseudocode transformations, various decryption capabilities, and assistance with obfuscated code analysis, all aimed at improving the efficiency and accuracy of binary analysis tasks. The plugin integrates seamlessly into IDA’s existing functionality, offering a structured approach to handling complex code scenarios.
htrace.sh
AI Summary:
htrace.shis a shell script designed for troubleshooting and profiling HTTP/HTTPS communications, serving as a wrapper for various open-source security tools. Its primary use case includes diagnosing web application vulnerabilities, analyzing SSL configurations, and extracting response headers and body content through an array of customizable parameters and options. Notable features include the ability to integrate with tools such as testssl, Mozilla’s Observatory, and Nmap’s NSE for comprehensive security assessments.
htshells
AI Summary: HTSHELLS is a toolkit that facilitates the deployment of self-contained web shells and various web-based attack vectors by utilizing .htaccess files. Its primary use case is for penetration testing and exploitation, allowing users to execute commands remotely and conduct denial-of-service, information disclosure, directory traversal, and other attacks through a structured directory of attack modules. Notable features include the ability to generate custom .htaccess files for specific attack types and execute commands via query parameters, enhancing flexibility for security assessments.
HyperDbg
AI Summary: HyperDbg is an open-source, hypervisor-assisted debugger designed for advanced analysis, fuzzing, and reversing of Windows applications at both user and kernel levels. It leverages modern hardware features like Intel VT-x and EPT, enabling stealthy operation that resists detection by classic anti-debugging techniques, while offering unique capabilities such as hidden hooks and code coverage measurement. This tool is tailored for users with deep low-level system knowledge, providing full control over the operating system for intricate debugging tasks.
I-See-You
AI Summary: I-See-You is a Bash and JavaScript tool designed for identifying the precise geographical location of users during social engineering or phishing attempts by utilizing their location coordinates. The tool allows attackers to gather crucial reconnaissance data, facilitating targeted attacks, and functions without requiring any additional software for phishing operations. Users can easily execute the tool by running a script and can modify the appearance of the phishing page to enhance deception.
iaito
AI Summary: Iaitō is a GUI application developed in Qt and C++ that serves as a frontend for the radare2 reverse engineering framework, specifically targeting users who are not familiar with command-line interfaces. The tool is designed to lower the barrier of entry for new users by providing a more accessible interface, although it is currently in an alpha state and primarily intended for developers. Notable features include cross-platform support for OS X, Linux, and Windows, along with installation requirements for radare2 and Qt.
ida-pro-mcp
AI Summary: The IDA Pro MCP is a simple MCP server designed to facilitate vibe reversing in IDA Pro, allowing users to interact with supported MCP clients for enhanced reverse engineering tasks. Key features include installation support via pip, configuration for various MCP clients, and guidance on prompt engineering to optimize interactions with large language models during the analysis process. This tool is particularly beneficial for users looking to streamline the reverse engineering process using advanced AI techniques in conjunction with traditional analysis tools.
idacode
AI Summary: IDACode is a Visual Studio Code extension designed to facilitate the execution and debugging of Python scripts within the IDA Pro environment. Notable features include quick script execution, seamless integration with the Python debugger via
debugpy, and the ability to run scripts without modifications directly from IDA. The tool supports features like “Execute on save” for automatic script execution and has been tested for compatibility with IDA versions 8.4/9.0 and Python 3.12 on both Windows and macOS.
ighack
AI Summary: Ighack is a Bash-based tool designed for testing the password strength of Instagram accounts through brute-force attacks, compatible with both rooted and non-rooted Android devices using Termux. It offers features such as a stable Instagram API, support for Tor to enhance anonymity during attacks, and both auto and manual attack options for user flexibility. The tool is maintained and provides a beginner-friendly interface, allowing easy installation and usage.
ignorant
AI Summary: Ignorant is a tool designed to check the presence of a phone number across various platforms, such as Snapchat and Instagram, without alerting the target. Its primary use case is to facilitate user verification linked to phone numbers for security assessments, while notable features include support for asynchronous operations, rate limiting detection, and integration with multiple modules for different websites.
README
Ignorant
👋 Hi there! For any professional inquiries or collaborations, please reach out to me at: megadose@protonmail.com
iKy
AI Summary: iKy is a cybersecurity tool designed to collect and display information related to email addresses through an intuitive visual interface. It integrates multiple modules such as FullContact, LinkedIn, and HaveIBeenPwned, allowing users to gather diverse data points about email owners, enhancing the reconnaissance process in cybersecurity investigations. The tool leverages technologies like Flask for the interface, Redis for storage, and is deployable via Docker, ensuring robust performance and ease of use.
Il2CppDumper
AI Summary: Il2CppDumper is a reverse engineering tool specifically designed for Unity games that utilize the il2cpp scripting backend, allowing users to extract and analyze game assets such as
MonoBehaviourandMonoScript. It supports a variety of binary formats (ELF, Mach-O, PE, etc.) and versions of Unity (5.3 to 2022.2), while also generating scripts compatible with analysis tools like IDA, Ghidra, and Binary Ninja to facilitate in-depth examination of il2cpp files. Notably, it offers functionalities for bypassing simple protections and generating comprehensive DLL restorations and structure header files.
imessage-exporter
AI Summary: The imessage-exporter is a versatile tool for exporting, managing, and diagnosing iMessage data, providing both library and binary functionalities. It facilitates the saving and archiving of message history, including multimedia content, into open formats, while also supporting migration and compliance with data retention policies. Notable features include cross-platform support, extensive compatibility with iMessage functionalities, and diagnostic tools to ensure the integrity of the iMessage database.
README
imessage-exporter
This crate provides both a library to interact with iMessage data as well as a binary that can perform some useful read-only operations using that data. The aim of this project is to provide the most comprehensive and accurate representation of iMessage data available.
Impulse
AI Summary: Impulse is a modern denial-of-service toolkit designed for executing various DDoS attack methods, including SMS, email, and multiple network traffic overload techniques like SYN and UDP floods. Its notable features include a user-friendly interface and support for methods such as Slowloris and NTP amplification, allowing attackers to exploit vulnerabilities across multiple platforms including Windows, Linux, and Termux. This tool can be leveraged to stress test and demonstrate the potential impact of denial-of-service attacks on targeted systems.
inceptor
AI Summary: Inceptor is a Windows-focused penetration testing tool designed to automate the bypassing of anti-virus (AV) and endpoint detection and response (EDR) solutions. It features a template-based PE packer that allows extensive user customization and integrates various encoding methods for encoding, compressing, or encrypting shellcode. Notably, Inceptor supports transformations of existing binaries into shellcode and distinguishes between loader-independent and loader-dependent encoders to enhance payload obfuscation and evade detection.
README
:triangular_flag_on_post: This is the public repository of Inceptor, for latest version and updates please consider supporting us through https://porchetta.industries/
infoooze
AI Summary: Infoooze is an OSINT tool designed for efficient information gathering on targets such as websites, IP addresses, and usernames through a command-line interface. Notable features include various reconnaissance capabilities like subdomain scanning, Whois lookups, and automatic results saving to text files, facilitating streamlined data collection. Additionally, it supports multiple operating systems, including Linux, Windows, and Termux.
README
Table of Content
About Infoooze
Infoooze is a powerful and user-friendly OSINT (Open-Source Intelligence) tool that allows you to quickly and easily gather information about a specific target. With Infoooze, you can easily search for information about websites, IP addresses, usernames, and more, all from the convenience of a simple command-line interface.

