CloudbunnyCloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search engines to search domain information: Shodan, Censys and Zoomeye.
Stars: ✭ 273 (+35.82%)
BurpsuitehttpsmugglerA Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques
Stars: ✭ 529 (+163.18%)
Mega-index-herokuMega nz heroku index, Serves mega.nz to http via heroku web. It Alters downloading speed and stability
Stars: ✭ 165 (-17.91%)
Uac EscaperEscalation / Bypass Windows UAC
Stars: ✭ 72 (-64.18%)
Bebasidbebasid dapat membantu membuka halaman situs web yang diblokir oleh pemerintah Indonesia dengan memanfaatkan hosts file.
Stars: ✭ 372 (+85.07%)
Ripv6Random IPv6 - circumvents restrictive IP address-based filter and blocking rules
Stars: ✭ 10 (-95.02%)
HacktheworldAn Python Script For Generating Payloads that Bypasses All Antivirus so far .
Stars: ✭ 527 (+162.19%)
TsunamiAn official Fog Network proxy site, made to access the blocked web. Surf without web filters or restrictions. Made with style, Tsunami is a rather fancy service dedicated to protecting your freedom from censorship
Stars: ✭ 44 (-78.11%)
WinpayloadsUndetectable Windows Payload Generation
Stars: ✭ 1,211 (+502.49%)
Gtfobins.github.ioGTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+2900%)
Pingtunnelping tunnel is a tool that advertises tcp/udp/socks5 traffic as icmp traffic for forwarding.
Stars: ✭ 1,904 (+847.26%)
GtfonowAutomatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: ✭ 68 (-66.17%)
PsbypassclmBypass for PowerShell Constrained Language Mode
Stars: ✭ 138 (-31.34%)
NsudoSeries of System Administration Tools
Stars: ✭ 945 (+370.15%)
CFX-BYPASSBypass it, you won't be Banned when playing cheats 2022
Stars: ✭ 18 (-91.04%)
GldGo shellcode LoaDer
Stars: ✭ 91 (-54.73%)
AllaboutbugbountyAll about bug bounty (bypasses, payloads, and etc)
Stars: ✭ 758 (+277.11%)
PayloadsallthethingsA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+16272.64%)
opensea automatic uploader(Bypass reCAPTCHAs) A Selenium Python bot to automatically and bulky upload and list your NFTs on OpenSea (all metadata integrated - Ethereum and Polygon supported); reCAPTCHA solver & bypasser included.
Stars: ✭ 205 (+1.99%)
AttUsing Asuswrt-Merlin to bypass AT&T's residential gateway
Stars: ✭ 79 (-60.7%)
AviatorAntivirus evasion project
Stars: ✭ 529 (+163.18%)
Trustmealready🔓 Disable SSL verification and pinning on Android, system-wide
Stars: ✭ 506 (+151.74%)
UltimateapplockerbypasslistThe goal of this repository is to document the most common techniques to bypass AppLocker.
Stars: ✭ 1,186 (+490.05%)
Hack🔰渗透测试资源库🔰黑客工具🔰维基解密文件🔰木马免杀🔰信息安全🔰技能树🔰数据库泄露🔰
Stars: ✭ 460 (+128.86%)
Antimalware ResearchResearch on Anti-malware and other related security solutions
Stars: ✭ 163 (-18.91%)
Hatclouddiscontinued
Stars: ✭ 418 (+107.96%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+475.62%)
Cerberus一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能
Stars: ✭ 389 (+93.53%)
K8toolsK8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Stars: ✭ 4,173 (+1976.12%)
MhddosBest DDoS Attack Script Python3, Cyber Attack With 36 Method
Stars: ✭ 55 (-72.64%)
Penetration testing poc渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms
Stars: ✭ 3,858 (+1819.4%)
StracciatellaOpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at startup
Stars: ✭ 171 (-14.93%)
MouseInjectDetectionSimple method of checking whether or not mouse movement or buttons (<windows 10) are injected
Stars: ✭ 29 (-85.57%)
Pentest GuidePenetration tests guide based on OWASP including test cases, resources and examples.
Stars: ✭ 1,316 (+554.73%)
gtfoSearch for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (-56.22%)
EmofishesEmofishes is a collection of proof of concepts that help improve, bypass or detect virtualized execution environments (focusing on the ones setup for malware analysis).
Stars: ✭ 11 (-94.53%)
bypassAV免杀 defender 360 cobalstrike shellcode
Stars: ✭ 54 (-73.13%)
WhatwafDetect and bypass web application firewalls and protection systems
Stars: ✭ 1,881 (+835.82%)
paywallr🔓 Web extension for reading articles locked behind paywalls of over 50 german newspapers, e.g. Frankfurter Allgemeine Zeitung, Leipziger Volkszeitung & Hamburger Abendblatt
Stars: ✭ 63 (-68.66%)
SpookflareLoader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
Stars: ✭ 836 (+315.92%)
xDL🔥 xDL is an enhanced implementation of the Android DL series functions.
Stars: ✭ 117 (-41.79%)
HumanoidNode.js package to bypass CloudFlare's anti-bot JavaScript challenges
Stars: ✭ 88 (-56.22%)
Mysql Unsha1Authenticate against a MySQL server without knowing the cleartext password
Stars: ✭ 191 (-4.98%)
AboutsecurityA list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-17.41%)
SilentbridgeSilentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.
Stars: ✭ 136 (-32.34%)
Nac bypassScript collection to bypass Network Access Control (NAC, 802.1x)
Stars: ✭ 79 (-60.7%)
ThefatratThefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+2857.21%)