WslreverseExperiments with hidden COM interface and LxBus IPC mechanism in WSL
Stars: ✭ 47 (-64.39%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+8586.36%)
RedasmThe OpenSource Disassembler
Stars: ✭ 1,042 (+689.39%)
ToolsSecurity and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+917.42%)
Web exploit detectorThe Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
Stars: ✭ 81 (-38.64%)
X64dbgAn open-source x64/x32 debugger for windows.
Stars: ✭ 37,825 (+28555.3%)
PrismaticaResponsive Command and Control System
Stars: ✭ 81 (-38.64%)
Xil2cppdumperIL2CppDumper writed in C++ by xia0
Stars: ✭ 97 (-26.52%)
RigekAnalyzing Rig Exploit Kit
Stars: ✭ 45 (-65.91%)
EfiseekGhidra analyzer for UEFI firmware.
Stars: ✭ 45 (-65.91%)
Put2winScript to automate PUT HTTP method exploitation to get shell
Stars: ✭ 96 (-27.27%)
Log Requests To SqliteBURP extension to record every HTTP request send via BURP and create an audit trail log of an assessment.
Stars: ✭ 44 (-66.67%)
DemosWindows Kernel Exploitation. Static & dynamic analysis, exploits & vuln research. Mitigations bypass's, genric bug-class's.
Stars: ✭ 112 (-15.15%)
Analyst CasefileMaltego CaseFile entities for information security investigations, malware analysis and incident response
Stars: ✭ 41 (-68.94%)
Jnitrace EngineEngine used by jnitrace to intercept JNI API calls.
Stars: ✭ 94 (-28.79%)
MelodyMelody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulation.
Stars: ✭ 41 (-68.94%)
SubrakeA Subdomain Enumeration and Validation tool for Bug Bounty and Pentesters.
Stars: ✭ 125 (-5.3%)
DnsbruteDNS Sub-domain brute forcer, in Python + gevent
Stars: ✭ 40 (-69.7%)
PowerladonLadon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Stars: ✭ 39 (-70.45%)
BellaBella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻
Stars: ✭ 112 (-15.15%)
Ipod GadgetiPod usb gadget for audio playback
Stars: ✭ 94 (-28.79%)
Eyes👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?" 🔍 🕵️
Stars: ✭ 38 (-71.21%)
HoundsploitAn advanced graphical search engine for Exploit-DB
Stars: ✭ 81 (-38.64%)
Horn3tPowerful Visual Subdomain Enumeration at the Click of a Mouse
Stars: ✭ 120 (-9.09%)
OsirisFree open-source game cheat for Counter-Strike: Global Offensive, written in modern C++. GUI powered by Dear ImGui.
Stars: ✭ 1,851 (+1302.27%)
AnubisFree open-source training software / cheat for Counter-Strike: Global Offensive, written in C.
Stars: ✭ 81 (-38.64%)
NorimaciNorimaci is a simple and lightweight malware analysis sandbox for macOS
Stars: ✭ 37 (-71.97%)
DirhuntFind web directories without bruteforce
Stars: ✭ 983 (+644.7%)
Computer Science ResourcesA list of resources in different fields of Computer Science (multiple languages)
Stars: ✭ 1,316 (+896.97%)
Zoomrip⚰️ Ваша конференция в Zoom не состоится
Stars: ✭ 36 (-72.73%)
Flask UnsignCommand line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
Stars: ✭ 90 (-31.82%)
BaresifterA bare-metal x86 instruction set fuzzer a la Sandsifter
Stars: ✭ 33 (-75%)
PokecrystalDisassembly of Pokémon Crystal
Stars: ✭ 1,549 (+1073.48%)
DeapkDeAPK is an open-source, online APK decompiler which lets you upload an APK and then decompile it to Smali or Java sources. It is built using Laravel, Vue.js, Bootstrap, FontAwesome, Pusher, Redis, MySQL, apktool, jadx and hosted atop Oracle cloud platform.
Stars: ✭ 33 (-75%)
Cvebase.comcvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (-33.33%)
P0wny ShellSingle-file PHP shell
Stars: ✭ 949 (+618.94%)
ReconnessReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on schedule or events.
Stars: ✭ 131 (-0.76%)
WhatpulseWhatPulse reverse engineered
Stars: ✭ 30 (-77.27%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+7817.42%)
ExploitrainingsExploitation on different architectures (x86, x64, arm, mips, avr)
Stars: ✭ 29 (-78.03%)
Re sysdiag逆向火绒安全软件驱动——sysdiag
Stars: ✭ 111 (-15.91%)
KatzkatzPython3 script to parse txt files containing Mimikatz output
Stars: ✭ 91 (-31.06%)
Gopoc用cel-go重现了长亭xray的poc检测功能的轮子
Stars: ✭ 124 (-6.06%)
Cross Channel chinese Localization project[LEGACY] CROSS † CHANNEL 中文化 (汉化) 项目,源代码以及网站。(全翻译文本、全平台移植源码已公开!欢迎修改&学习!)CROSS † CHANNEL Chinese Localization Project, source codes and websites. (All translations and scripts are open, welcome on any improvements!)
Stars: ✭ 107 (-18.94%)
VenomVenom - A Multi-hop Proxy for Penetration Testers
Stars: ✭ 1,228 (+830.3%)
Alive reversingRe-implementation of Abe's Exoddus and Abe's Oddysee
Stars: ✭ 127 (-3.79%)
Owasp FstmThe Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers, consultants, hobbyists, and Information Security professionals with conducting firmware security assessments.
Stars: ✭ 120 (-9.09%)
AnsvifA Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.
Stars: ✭ 107 (-18.94%)
LookinsidetheboxBreaks the encryption and obfuscation layers that Dropbox applies to their modified Python interpreter.
Stars: ✭ 80 (-39.39%)
AngelswordPython3编写的CMS漏洞检测框架
Stars: ✭ 1,223 (+826.52%)