Pyiris BackdoorPyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (+14.17%)
BetterbackdoorA backdoor with a multitude of features.
Stars: ✭ 195 (+53.54%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+133.07%)
ImgbackdoorHide your payload into .jpg file
Stars: ✭ 87 (-31.5%)
Cyberdisc BotThe bot for the Cyber Discovery Community Discord Server!
Stars: ✭ 108 (-14.96%)
Shodan DorksDorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (-7.09%)
PrismaticaResponsive Command and Control System
Stars: ✭ 81 (-36.22%)
XsscopeXSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.
Stars: ✭ 103 (-18.9%)
Azure SentinelCloud-native SIEM for intelligent security analytics for your entire enterprise.
Stars: ✭ 1,208 (+851.18%)
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+835.43%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+8129.13%)
RvdRobot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (-31.5%)
RatelRAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-4.72%)
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+886.61%)
Hg8045qPwning the Nuro issued Huawei HG8045Q
Stars: ✭ 107 (-15.75%)
ContentSecurity automation content in SCAP, OSCAL, Bash, Ansible, and other formats
Stars: ✭ 1,219 (+859.84%)
The Big List Of Hacked Malware Web SitesThis repository contains a list of all web sites I come across that are either hacked with or purposefully hosting malware, ransomware, viruses or trojans.
Stars: ✭ 125 (-1.57%)
Awesome CybersecurityCurated list of awesome cybersecurity companies and solutions.
Stars: ✭ 77 (-39.37%)
BluecommandDashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard
Stars: ✭ 99 (-22.05%)
Attack Control Framework MappingsSecurity control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
Stars: ✭ 115 (-9.45%)
Ioc ExplorerExplore Indicators of Compromise Automatically
Stars: ✭ 73 (-42.52%)
SidedoorSSH connection daemon for Debian/Raspbian/Ubuntu/etc
Stars: ✭ 97 (-23.62%)
Redirect.rulesQuick and dirty dynamic redirect.rules generator
Stars: ✭ 69 (-45.67%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+791.34%)
Cvebase.comcvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (-30.71%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-29.92%)
Chatterinternet monitoring osint telegram bot for windows
Stars: ✭ 123 (-3.15%)
Docker Compose LampA basic LAMP stack environment built using Docker Compose.
Stars: ✭ 1,284 (+911.02%)
CertidudeEasy to use Certificate Authority web service for OpenVPN, StrongSwan and HTTPS
Stars: ✭ 108 (-14.96%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-31.5%)
Walkoff AppsWALKOFF-enabled applications. #nsacyber
Stars: ✭ 125 (-1.57%)
ThecollectiveThe Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-33.07%)
Awesome Malware💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-14.96%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+1434.65%)
WhalescanWhalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulnerable packages on the container
Stars: ✭ 81 (-36.22%)
OpeninvoiceperuRepositorio OpenInvoicePeru, API REST para la Facturación Electrónica del Perú
Stars: ✭ 106 (-16.54%)
Awesome Wifi SecurityA collection of awesome resources related to 802.11 security, tools and other things
Stars: ✭ 79 (-37.8%)
PhishingkittrackerLet's track phishing kits to give to research community raw material to study !
Stars: ✭ 126 (-0.79%)
CerteagleWeaponizing Live CT logs for automated monitoring of assets
Stars: ✭ 78 (-38.58%)
Seed LabsSEED Labs developed in the last 20 years.
Stars: ✭ 102 (-19.69%)
RsfThe Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
Stars: ✭ 76 (-40.16%)
Awesome Cybersecurity Blueteam💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Stars: ✭ 2,091 (+1546.46%)
CasApereo CAS - Enterprise Single Sign On for all earthlings and beyond.
Stars: ✭ 9,154 (+7107.87%)
Osint SanFramework для сбора данных из открытых источников. В Framework используется большое количество API, их необходимо зарегистрировать самому.
Stars: ✭ 99 (-22.05%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-45.67%)
Mwdb CoreMalware repository component for samples & static configuration with REST API interface.
Stars: ✭ 125 (-1.57%)
VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+6863.78%)
FileintelA modular Python application to pull intelligence about malicious files
Stars: ✭ 97 (-23.62%)
GitmonitorOne way to continuously monitor sensitive information that could be exposed on Github
Stars: ✭ 115 (-9.45%)
Blackhat Python3Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 1,125 (+785.83%)
Aura BotnetA super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Bash, and Powershell.
Stars: ✭ 95 (-25.2%)
Robust Adv Malware DetectionCode repository for the paper "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware"
Stars: ✭ 63 (-50.39%)
Dfw1n OsintAustralian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Stars: ✭ 63 (-50.39%)
Mass RatBasic Multiplatform Remote Administration Tool - Xamarin
Stars: ✭ 127 (+0%)
Gitlab WatchmanMonitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (+0%)