ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+687.07%)
EnteletaorMessage Queue & Broker Injection tool
Stars: ✭ 139 (-5.44%)
Millionhero速度快、准确易用-支持各平台的答题助手-图形界面-多权重答案推荐-自动百度高亮答案
Stars: ✭ 106 (-27.89%)
Poc BankFocus on cybersecurity | collection of PoC and Exploits
Stars: ✭ 68 (-53.74%)
PillagerPillage filesystems for sensitive information with Go.
Stars: ✭ 64 (-56.46%)
Website 2 Apk BuilderConvert your Website to a working Android App. Supports html, php, htm, js, css. Build app from any website or from local directory.
Stars: ✭ 67 (-54.42%)
PapersPapers about known hacking, security, hardware, software, computer, network and other ressources.
Stars: ✭ 58 (-60.54%)
VulmapVulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+634.01%)
EviltwinframeworkA framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities
Stars: ✭ 122 (-17.01%)
Dll hook RsRust code to show how hooking in rust with a dll works.
Stars: ✭ 57 (-61.22%)
NtrghidraFully Featured Nintendo DS Loader for Ghidra
Stars: ✭ 56 (-61.9%)
OpenvehiclediagA rust based cross-platform ECU diagnostics and car hacking application, utilizing the passthru protocol
Stars: ✭ 135 (-8.16%)
JaelesThe Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+629.93%)
TimelapseA time lapse app for Sony Alpha camera using the OpenMemories framework
Stars: ✭ 101 (-31.29%)
TelekillerA Tools Session Hijacking And Stealer Local Passcode Telegram Windows
Stars: ✭ 122 (-17.01%)
KeyeKeye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-31.29%)
MtpwnPoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)
Stars: ✭ 143 (-2.72%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+6009.52%)
Cve 2019 1458CVE-2019-1458 Windows LPE Exploit
Stars: ✭ 101 (-31.29%)
HellomelloExperiments with writing Android apps in Nim
Stars: ✭ 47 (-68.03%)
Apkdiffpatcha C++ library and command-line tools for Zip(Jar,Apk) file Diff & Patch; create minimal delta/differential; support Jar sign(apk v1 sign) & apk v2,v3 sign .
Stars: ✭ 121 (-17.69%)
Twitter Follow ExploitAutomated Twitter mass account creation and follow using Selenium and Tor VPN
Stars: ✭ 47 (-68.03%)
BettercapThe Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Stars: ✭ 10,735 (+7202.72%)
Pentest Tools FrameworkPentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Stars: ✭ 48 (-67.35%)
ApkupdaterAPKUpdater is an open source tool that simplifies the process of finding updates for your installed apps.
Stars: ✭ 1,028 (+599.32%)
Yalu Jailbreak Ios 10.2My own fork of (Beta) Yalu Jailbreak for iOS 10.0 to 10.2 by @kpwn and @marcograss with custom UI and other features.
Stars: ✭ 99 (-32.65%)
GofingerprintGoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fingerprints.
Stars: ✭ 120 (-18.37%)
DroidjackEste troyano para Android es uno de los más completos. Con él vamos a poder tener acceso a remoto a todo el dispositivo infectado, desde la agenda, las llamadas y los SMS hasta el micrófono y las cámaras del smartphone. Todo.
Stars: ✭ 44 (-70.07%)
Ecommerce Website Security ChecklistList of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built into the Techinical Specific Document, or will be checked in the Security testing phases.
Stars: ✭ 98 (-33.33%)
Streamingr/freemediaheckyeah
Stars: ✭ 147 (+0%)
PidrilaPython Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (-14.97%)
Linsetmv1 2Linset is a WPA/WPA2 phishing tool (evil twin)
Stars: ✭ 105 (-28.57%)
Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (-54.42%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+586.39%)
BrutesharkNetwork Analysis Tool
Stars: ✭ 1,335 (+808.16%)
Usb Keystroke Injector☠️ An Arduino-based USB keyboard simulator which injects keystrokes via Bluetooth protocol or predefined payloads in a SD card.
Stars: ✭ 42 (-71.43%)
GoaltdnsA permutation generation tool written in golang
Stars: ✭ 119 (-19.05%)
TaketvTakeTV permite descubrir dispositivos de red DLNA/UPnP y ayuda a reproducir archivos multimedia en los televisores inteligentes desde nuestra terminal en Linux.
Stars: ✭ 41 (-72.11%)
NosqlmapAutomated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+1211.56%)
Adb rootMagisk Module that allows you to run "adb root".
Stars: ✭ 97 (-34.01%)
ReconftwreconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+562.59%)
HjmirrorMirroring you droid device screen to Windows, MacOS and Linux.
Stars: ✭ 67 (-54.42%)
B1tifissh management tool to provides commandline access to a remote system running SSH server
Stars: ✭ 65 (-55.78%)
Burpsuite XkeysA Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.
Stars: ✭ 144 (-2.04%)
WpreconWPrecon (WordPress Recon), is a vulnerability recognition tool in CMS Wordpress, developed in Go and with scripts in Lua.
Stars: ✭ 135 (-8.16%)
Rhme 2017Riscure Hack Me embedded hardware CTF 2017-2018.
Stars: ✭ 65 (-55.78%)
AdbserverAdb Server for Espresso tests
Stars: ✭ 105 (-28.57%)
XshockXSHOCK Shellshock Exploit
Stars: ✭ 65 (-55.78%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+672.79%)
Inferno🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-28.57%)