Beef Over WanBrowser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-60.95%)
Libhv🔥 比libevent、libuv更易用的国产网络库。A c/c++ network library for developing TCP/UDP/SSL/HTTP/WebSocket client/server.
Stars: ✭ 3,355 (+1497.62%)
Go2pSimple to use but full configurable p2p framework
Stars: ✭ 80 (-61.9%)
Octopass🐙 Management linux user and authentication with team or collaborator on Github.
Stars: ✭ 135 (-35.71%)
CryptolockerCryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system and send keys back to the server. Multi-threaded functionality helps to this tool make encryption faster.
Stars: ✭ 79 (-62.38%)
Bismuth[Migrated] The first Python blockchain protocol and platform
Stars: ✭ 186 (-11.43%)
Nac bypassScript collection to bypass Network Access Control (NAC, 802.1x)
Stars: ✭ 79 (-62.38%)
ReconnoitreA security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+768.57%)
Thor OsSimple operating system in C++, written from scratch
Stars: ✭ 1,204 (+473.33%)
NosqlmapAutomated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+818.1%)
Cifsdcifsd kernel server(SMB/CIFS server)
Stars: ✭ 76 (-63.81%)
Go GuardianGo-Guardian is a golang library that provides a simple, clean, and idiomatic way to create powerful modern API and web authentication.
Stars: ✭ 204 (-2.86%)
O365sprayUsername enumeration and password spraying tool aimed at Microsoft O365.
Stars: ✭ 133 (-36.67%)
JsprintmanagerAdvanced Client-side Printing & Scanning Solution for Javascript
Stars: ✭ 74 (-64.76%)
EnumdbRelational database brute force and post exploitation tool for MySQL and MSSQL
Stars: ✭ 167 (-20.48%)
BonsaiSimple Python 3 module for LDAP, using libldap2 and winldap C libraries.
Stars: ✭ 74 (-64.76%)
Cve 2020 0688 expCVE-2020-0688_EXP Auto trigger payload & encrypt method
Stars: ✭ 134 (-36.19%)
Cve 2020 1472Exploit Code for CVE-2020-1472 aka Zerologon
Stars: ✭ 183 (-12.86%)
I2p.i2pI2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
Stars: ✭ 1,186 (+464.76%)
DedsploitNetwork protocol auditing framework
Stars: ✭ 133 (-36.67%)
DnaDiscourse Network Analyzer (DNA)
Stars: ✭ 73 (-65.24%)
PspyMonitor linux processes without root permissions
Stars: ✭ 2,470 (+1076.19%)
CiscoexploitCisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution/CVE-2019-1653/Cisco SNMP RCE/Dump Cisco RV320 Password)
Stars: ✭ 73 (-65.24%)
Android Remote DebuggerA library for remote logging, database debugging, shared preferences and network requests
Stars: ✭ 132 (-37.14%)
Cisco iosAnsible Network Cisco IOS Provider Role
Stars: ✭ 72 (-65.71%)
FdsploitFile Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (-5.24%)
Kernel ExploitsMy proof-of-concept exploits for the Linux kernel
Stars: ✭ 1,173 (+458.57%)
Ldap2pg🐘 👥 Manage PostgreSQL roles and privileges from YAML or LDAP
Stars: ✭ 131 (-37.62%)
Serial StudioMulti-purpose serial data visualization & processing program
Stars: ✭ 1,168 (+456.19%)
Ctfsome experience in CTFs
Stars: ✭ 165 (-21.43%)
SsfSecure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platform
Stars: ✭ 1,157 (+450.95%)
RufflesLightweight and fully managed reliable UDP library.
Stars: ✭ 131 (-37.62%)
Poc BankFocus on cybersecurity | collection of PoC and Exploits
Stars: ✭ 68 (-67.62%)
MouseMouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-11.43%)
Awesome I2pA curated list of awesome I2P implementations, libraries, resources, projects, and shiny things. I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.
Stars: ✭ 66 (-68.57%)
IsoallocA general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good performance
Stars: ✭ 130 (-38.1%)
Go Out☄️ go-out - A Golang egress buster.
Stars: ✭ 65 (-69.05%)
DirsearchA Go implementation of dirsearch.
Stars: ✭ 164 (-21.9%)
PytcpPyTCP is an attempt to create fully functional TCP/IP stack in Python. It supports TCP stream based transport with reliable packet delivery based on sliding window mechanism and basic congestion control. It also supports IPv6/ICMPv6 protocols with SLAAC address configuration. It operates as user space program attached to Linux TAP interface. As of today stack is able to send and receive traffic over Internet using IPv4 and IPv6 default gateways for routing. Since goal of this project is purely educational (at least at this point) the clarity of code is preferred over its efficiency. For the same reason security features are not being implemented just yet unless they are integral part of TCP/IP suite protocols specification.
Stars: ✭ 65 (-69.05%)
Reddit DetectivePlay detective on Reddit: Discover political disinformation campaigns, secret influencers and more
Stars: ✭ 129 (-38.57%)
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-70%)
Enet⚡️ ENet reliable UDP networking library
Stars: ✭ 202 (-3.81%)
Pwninitpwninit - automate starting binary exploit challenges
Stars: ✭ 127 (-39.52%)
CollieAn asynchronous event-driven network framework( port netty ) written in D.
Stars: ✭ 60 (-71.43%)
Spectre Meltdown PocA semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities
Stars: ✭ 127 (-39.52%)
Pcapxray❄️ PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
Stars: ✭ 1,096 (+421.9%)
LdaptoolsLdapTools is a feature-rich LDAP library for PHP 5.6+.
Stars: ✭ 185 (-11.9%)
DysenteryExploring ways to participate in a Pioneer Pro DJ Link network
Stars: ✭ 102 (-51.43%)
InterviewAndroid、Java程序员面试资源总结,涉及Java、Android、网络、操作系统、算法等
Stars: ✭ 150 (-28.57%)
MachinaNetwork capture library for realtime TCP/IP decoding from a windows application. Includes an extension library to support FFXIV data capture.
Stars: ✭ 102 (-51.43%)
Heapinspect🔍Heap analysis tool for CTF pwn.
Stars: ✭ 177 (-15.71%)
EcsECS for Unity with full game state automatic rollbacks
Stars: ✭ 151 (-28.1%)
GateA high performant & paralleled Minecraft proxy server with scalability, flexibility & excellent server version support - ready for the cloud!
Stars: ✭ 102 (-51.43%)