NetwormPython network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-53.12%)
Mutual labels: hacking, backdoor
BbreconPython library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-41.32%)
Mutual labels: hacking, web-security
ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-50.69%)
Mutual labels: hacking, backdoor
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+312.5%)
Mutual labels: hacking, backdoor
RspetRSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Stars: ✭ 251 (-12.85%)
Mutual labels: hacking, backdoor
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+340.28%)
Mutual labels: hacking, web-security
MinesweeperA Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-43.75%)
Mutual labels: hacking, web-security
Log KillerClear all your logs in [linux/windows] servers 🛡️
Stars: ✭ 252 (-12.5%)
Mutual labels: hacking, web-security
FdsploitFile Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (-30.9%)
Mutual labels: hacking, web-security
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+293.06%)
Mutual labels: hacking, backdoor
firecrackerStop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (+52.08%)
Mutual labels: web-security, websecurity
Project TauroA Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-81.94%)
Mutual labels: hacking, web-security
Hg8045qPwning the Nuro issued Huawei HG8045Q
Stars: ✭ 107 (-62.85%)
Mutual labels: hacking, backdoor
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+244.44%)
Mutual labels: hacking, backdoor
Hacker101Source code for Hacker101.com - a free online web and mobile security class.
Stars: ✭ 12,246 (+4152.08%)
Mutual labels: hacking, web-security
BroxyAn HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (+216.67%)
Mutual labels: hacking, websecurity
Intranet penetration cheetsheets做redteam时使用,修改自Ridter的https://github.com/Ridter/Intranet_Penetration_Tips
Stars: ✭ 29 (-89.93%)
Mutual labels: hacking, websecurity
MouseMouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-35.42%)
Mutual labels: hacking, backdoor
ViewstateASP.NET View State Decoder
Stars: ✭ 77 (-73.26%)
Mutual labels: asp-net, web-security