Cehv10 Notes📕 Both personal and public notes for EC-Council's CEHv10 312-50, because its thousands of pages/slides of boredom, and a braindump to many
Stars: ✭ 170 (-48.95%)
Wifi Pumpkin DeprecatedDEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3
Stars: ✭ 2,964 (+790.09%)
ProcspyPython tool that monitors and logs user-run commands on a Linux system for either offensive or defensive purposes..
Stars: ✭ 272 (-18.32%)
OsmedeusFully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+918.32%)
CtftoolsPersonal CTF Toolkit
Stars: ✭ 312 (-6.31%)
CloudscraperCloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.
Stars: ✭ 276 (-17.12%)
BadmodCMS auto detect and exploit.
Stars: ✭ 296 (-11.11%)
ArachniWeb Application Security Scanner Framework
Stars: ✭ 2,942 (+783.48%)
CloudbruteAwesome cloud enumerator
Stars: ✭ 268 (-19.52%)
RichkwareFramework for building Windows malware, written in C++
Stars: ✭ 315 (-5.41%)
Ictf FrameworkThe iCTF Framework, presented by Shellphish!
Stars: ✭ 281 (-15.62%)
HackbrowserdataDecrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。
Stars: ✭ 3,864 (+1060.36%)
Ctf NotesEverything needed for doing CTFs
Stars: ✭ 304 (-8.71%)
PhishapiComprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (-18.32%)
Ctf Writeups PublicWriteups for infosec Capture the Flag events by team Galaxians
Stars: ✭ 331 (-0.6%)
CripsIP Tools To quickly get information about IP Address's, Web Pages and DNS records.
Stars: ✭ 272 (-18.32%)
WebkillerTool Information Gathering Write By Python.
Stars: ✭ 300 (-9.91%)
VajraVajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (-19.22%)
QuineQuine Museum
Stars: ✭ 263 (-21.02%)
MercureMercure is a tool for security managers who want to train their colleague to phishing.
Stars: ✭ 262 (-21.32%)
TomcatwardeployerApache Tomcat auto WAR deployment & pwning penetration testing tool.
Stars: ✭ 287 (-13.81%)
Ghost👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (-6.31%)
WhatwebNext generation web scanner
Stars: ✭ 3,503 (+951.95%)
PivotsuiteNetwork Pivoting Toolkit
Stars: ✭ 329 (-1.2%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+1630.63%)
Vps个人笔记汇总
Stars: ✭ 276 (-17.12%)
Awesome Sec TalksA collected list of awesome security talks
Stars: ✭ 3,411 (+924.32%)
Kubernetes Certified AdministratorOnline resources that will help you prepare for taking the CNCF CKA 2020 "Kubernetes Certified Administrator" Certification exam. with time, This is not likely the comprehensive up to date list - please make a pull request if there something that should be added here.
Stars: ✭ 3,438 (+932.43%)
Langhost👻 A LAN dropbox chatbot controllable via Telegram
Stars: ✭ 324 (-2.7%)
BopscrkTool to generate smart and powerful wordlists
Stars: ✭ 273 (-18.02%)
QuackQuack Toolkit is a set of tools to provide denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools.
Stars: ✭ 305 (-8.41%)
CtfCTF (Capture The Flag) writeups, code snippets, notes, scripts
Stars: ✭ 336 (+0.9%)
D8 StudyguideStudy guide for the Acquia Certified Drupal 8 Developer, Backend and Frontend Exams.
Stars: ✭ 271 (-18.62%)
LambdaguardAWS Serverless Security
Stars: ✭ 300 (-9.91%)
BlacknetFree advanced and modern Windows botnet with a nice and secure PHP panel.
Stars: ✭ 271 (-18.62%)
AirgeddonThis is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (+1050.15%)
Gta ReversedReversed code of GTA:SA executable (gta_sa.exe) 1.0 US
Stars: ✭ 297 (-10.81%)
Soup☎️ Original open source call flooder using Twilio's API.
Stars: ✭ 267 (-19.82%)
BillcipherInformation Gathering tool for a Website or IP address
Stars: ✭ 332 (-0.3%)
Jenkins Rce😈 Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!
Stars: ✭ 262 (-21.32%)
Windows Post ExploitationWindows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (-11.11%)
DeckerDeclarative penetration testing orchestration framework
Stars: ✭ 263 (-21.02%)
OsintgramOsintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Stars: ✭ 312 (-6.31%)
UptuxLinux privilege escalation checks (systemd, dbus, socket fun, etc)
Stars: ✭ 260 (-21.92%)
Cheatsheet GodPenetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+957.36%)
Ctf DifficultyThis cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.
Stars: ✭ 338 (+1.5%)
Socialbox TermuxSocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By init__0 for termux on android
Stars: ✭ 324 (-2.7%)
Offensive DockerOffensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-1.5%)