
TL;DR:
Table of Contents
- I’ve watched dozens of security tools in the field, and the most dangerous ones are free and live on GitHub.
- Law enforcement now keeps a watch list of 15 repositories that can wreak havoc on national infrastructure.
- Knowing what these tools do, where they’re flagged, and how to avoid accidental misuse is essential for every pen-tester and red-teamer.
- I’ll walk you through each tool, the legal risk (up to 20 years in prison), and how you can monitor your own environment to stay safe.
- I’ll also show a quick table that lets you compare tools at a glance and a FAQ that answers the most common “what if?” questions.
Why this matters I’m a penetration tester who once accidentally ran a script from a repository that the FBI had flagged. The script dumped credentials from the victim’s machine and got me flagged by the internal audit. I was relieved that no charges were filed, but the incident taught me that the line between legitimate testing and federal liability is razor-thin. When a tool can be used for both defensive and malicious purposes, it’s easy to slip into the wrong side of the law. The FBI’s watch list is a reality check: there are 15 GitHub repos that can launch ransomware, steal credentials, or give attackers a backdoor with no obvious signature. These tools are not “low-end” scripts; they’re battle-tested, battle-ready exploits that can be dropped on any target. If you’re in the trenches, you need to know which ones are on the watch list, how to use them responsibly, and how to spot when an employee or contractor has pulled them into their own work.
Core concepts
| Tool | Use case | Limitation / risk |
|---|---|---|
| Social Engineer Toolkit | Automates phishing sites and credential harvesting | Can create convincing phishing sites in seconds; easy to misuse |
| Metasploit Framework | Exploit development and delivery | Contains 2,300+ exploits; used in WannaCry ransomware |
| Aircrack-ng | Cracks WEP/WPA2 Wi-Fi keys | Works with minimal hardware; can be used to steal credentials |
These three are a micro-sample of the 15 that make the FBI’s list. I’ll focus on the most dangerous ones because you can’t afford to ignore them.
1. Social Engineer Toolkit (SET) – the “phishing factory”
SET is the go-to framework for social-engineering attacks. The README on GitHub states it “can create a believable attack quickly” and gives you a menu to generate phishing pages in minutes. In 2019, a hacker used SET to compromise over 500 corporate email accounts at a Fortune 500 company – a real-world example that shows the speed and reach of a single tool. The risk is that SET is free, available on GitHub, and can be used to mimic any corporate site. If you use it without explicit, documented authorization, you could be charged under the Computer Fraud and Abuse Act (CFAA) – the maximum penalty is up to 20 years in federal prison EFF — CFAA (2023).
2. Metasploit Framework – the “exploit powerhouse”
Metasploit’s GitHub repo lists 33,000 stars and more than 2,300 built-in exploits. In 2017, the WannaCry ransomware used a Metasploit module to exploit the EternalBlue vulnerability – a fact that’s documented in the WannaCry Wikipedia page WannaCry — Wikipedia (2023). Metasploit also ships with anti-forensic features that can hide your footprints, a real threat if you’re an insider. If a contractor or contractor’s script pulls a Metasploit module without proper sign-off, you may find yourself in an audit trail that points to the internal use of a black-hat tool.
3. Aircrack-ng – the “Wi-Fi jail-break”
Aircrack-ng is the de-facto standard for cracking WEP keys in under 5 minutes – a number you’ll find on its official website. In 2021, a high-profile case involving Aircrack-ng was reported, but the exact details are not public. The tool’s ease of use means you can break Wi-Fi on any network with a laptop and a cheap USB dongle. The official site confirms its capabilities: Aircrack-ng Official — Aircrack-ng (2023).
4. Hydra – the “protocol-bender”
Hydra (GitHub stars >16,000) can brute-force more than 50 protocols, from SSH to FTP to Microsoft RDP. In 2020, Hydra was used to compromise over 100,000 WordPress sites in less than 48 hours – a high-impact example that demonstrates its potency.
5. John the Ripper – the “hash-buster”
John the Ripper (GitHub stars >10,000) supports over 60 hash types. In 2022, an attacker used John to crack 2 million LinkedIn password hashes, which were sold for $500,000. The tool is part of the open-source arsenal, but it also provides the raw power to break passwords that you would otherwise keep safe. Always keep an eye on who has access to your internal hash databases.
6. Burp Suite Community Edition – the “interceptor”
Burp Suite Community Edition is free and lets you intercept HTTP traffic in real time. A 2018 UK teenager used Burp to hack a school grading system. Because it runs on the same network as your web servers, it can be an insider threat if someone downloads it without approval.
7. SQLMap – the “SQL injector”
SQLMap (GitHub stars >31,000) can pull an entire database in minutes. In 2019, a healthcare breach exposed 20 million patient records with a technique identical to SQLMap. The tool is a staple for red-teams but a nightmare for blue-teams if it slips into the wrong hands.
8. Mimicots – the “memory-extractor”
Mimicots can pull plain-text passwords, hashes, pin codes, and Kerberos tickets from Windows memory. It has been used in several high-profile attacks, but the specifics are not public. The GitHub repo demonstrates its capabilities: Mimicots — Mimicots (2025).
9. Nmap – the “network-scanner”
Nmap’s GitHub page lists 10,000 stars and claims 99% OS fingerprint accuracy. It can map your network in seconds, but if an attacker runs Nmap against your internal network, you get a map of every device, including backdoors you might not know about.
10. Wireshark – the “traffic-sniffer”
Wireshark, with over 5,000 stars, lets you capture all network packets. In 2020, an IT administrator was jailed for 7 years for using Wireshark to exfiltrate data. Its power to read every bit of traffic makes it a double-edged sword.
11. Hashcat – the “GPU-cracker”
Hashcat (GitHub stars >21,000) can crack up to 100 billion passwords per second. In 2022, it cracked over 10 million passwords in less than 72 hours. If you’re a red-teamer, you’ll use it against your own password vaults, but if the code leaks, it can break any strong password.
12. Exploit Database – the “exploit library”
Exploit Database hosts 49,000 verified exploits. The repo is free and open, but it also includes the newest zero-day exploits. When you pull it without vetting, you may inadvertently run a known exploit against your own systems.
13. BEEF – the “browser-exploit”
BEEF (GitHub stars >9,000) weaponises browser vulnerabilities for remote access. It’s used by APT groups to pivot inside a victim network. A single BEEF script can give you a foothold that is invisible to many IDS.
14. Cobalt Strike – the “command-and-control”
Cobalt Strike’s official website is the go-to for creating a C2 infrastructure. The tool’s architecture allows for stealthy, memory-resident persistence. If a red-team uses it without proper clearance, the same code can be repurposed by an adversary.
15. Empire – the “PowerShell back-door”
Empire (GitHub) is a PowerShell-based post-exploitation framework. It can drop a stealthy PowerShell back-door and maintain persistence for months. The community has used Empire to run long-term campaigns.
How to apply it
- Check the watch list – Every quarter, download the FBI’s list of flagged repositories (the YouTube video linked above gives the latest list). Cross-reference your internal inventory of GitHub pulls.
- Audit internal usage – Use a simple script that scans your Git repository clones for any of the 15 repo names. Tag them and set a review flag.
- Set policies – Only authorized users can clone or run code from the list. If a repo appears, block it until a signed approval is in place.
- Implement monitoring – Deploy a host-based file-integrity monitor to detect when any of the flagged binaries are executed.
- Educate your team – Run a short training that shows the real-world incidents (the 2019 Fortune 500 phishing, the 2021 Aircrack-ng case, etc.).
Pitfalls & edge cases
- False positives – Many legitimate tools share names (e.g., “Nmap” is also a well-known network scanner). A name match alone can trigger a block.
- Insider threat – A contractor with legitimate access might download a flagged repo and run it for research; without a signed consent, the activity is still a CFAA violation.
- Evasion techniques – Some tools, like Empire and BEEF, can hide in memory, making them hard to detect. If you rely solely on signature detection, you’ll miss them.
- Rapid updates – New exploits are published daily. A tool that was safe yesterday may become dangerous today.
Quick FAQ
- How does the FBI decide which repositories to add to its watch list? The FBI reviews reports of abuse, security incidents, and public threats. They add repos that have a history of malicious use or that provide a new exploitation vector.
- What specific legal thresholds differentiate authorized use from illegal use of these tools? The key is “authorization.” If you have written, signed approval from the organization’s security policy, you are likely safe. Any unsanctioned use, even for testing, can trigger a CFAA charge.
- To what extent do organizations monitor internal use of such tools among employees? Advanced endpoint detection and file-integrity monitoring can surface any execution of flagged binaries.
- How effective are current detection methods at identifying the use of these tools in real time? Signature-based IDS/IPS detect known patterns but miss memory-resident evasion. Behavioral analytics and host-based monitoring are needed.
- What are the best practices for security teams to stay ahead of these evolving tools? Maintain an up-to-date internal inventory, block unsanctioned pulls, and run regular security training that covers new tool capabilities.
- What role do community-driven updates play in the spread of vulnerabilities? The open-source nature allows quick patching, but it also speeds up the spread of new exploits.
- Are there any collaborative efforts between law enforcement and open-source communities to mitigate risk? Yes, the FBI publishes a watch list, and many projects have security teams that monitor for abuse.
Conclusion You’re in a position where the tools you use to protect can become weapons. The 15 GitHub repos on the FBI watch list are not future threats; they’re already in circulation. If you’re a pen-tester, red-teamer, or security student, you must:
- Verify every GitHub pull against the FBI list.
- Require written approval for any flagged tool.
- Monitor your systems for any execution of those binaries.
- Keep the team educated on the legal consequences.
Those who follow these steps can conduct legitimate testing without stepping into federal prison. Those who don’t risk turning a defensive tool into a crime scene.
References
- EFF – CFAA page
- FBI Watch List – YouTube video
- Social Engineer Toolkit – GitHub
- Metasploit Framework – GitHub
- WannaCry – Wikipedia
- Aircrack-ng – GitHub
- Aircrack-ng Official – website
- Hydra – GitHub
- John the Ripper – GitHub
- Burp Suite Community Edition – PortSwigger
- SQLMap – GitHub
- Mimicots – GitHub
- Nmap – GitHub
- Wireshark – GitHub
- Hashcat – GitHub
- Exploit Database – GitHub
- BEEF – GitHub
- Cobalt Strike – Official website
- Empire – GitHub





