A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: β 382 (-96.67%)
Rebel FrameworkAdvanced and easy to use penetration testing framework π£π
Stars: β 183 (-98.4%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: β 4,162 (-63.7%)
WhatwebNext generation web scanner
Stars: β 3,503 (-69.45%)
Privilege EscalationThis cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Stars: β 2,117 (-81.54%)
Icg AutoexploiterbotWordpress π₯ Joomla π₯ Drupal π₯ OsCommerce π₯ Prestashop π₯ Opencart π₯
Stars: β 242 (-97.89%)
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: β 474 (-95.87%)
PhpvulnAudit tool to find common vulnerabilities in PHP source code
Stars: β 146 (-98.73%)
FdsploitFile Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: β 199 (-98.26%)
M3m0M3m0 Tool βοΈ Website Vulnerability Scanner & Auto Exploiter
Stars: β 124 (-98.92%)
Beef Over WanBrowser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: β 82 (-99.28%)
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: β 63 (-99.45%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: β 5,763 (-49.74%)
PayloadsallthethingsA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: β 32,909 (+187.01%)
Juice ShopOWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: β 6,270 (-45.32%)
AntidebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: β 161 (-98.6%)
GefGEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers β’
Stars: β 4,197 (-63.4%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: β 10,451 (-8.85%)
Ssh MitmSSH man-in-the-middle tool
Stars: β 1,328 (-88.42%)
K8toolsK8ε·₯ε
·ει(ε
η½ζΈι/ζζε·₯ε
·/θΏη¨ζΊ’εΊ/ζΌζ΄ε©η¨/ζ«ζε·₯ε
·/ε―η η ΄θ§£/ε
ζε·₯ε
·/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Stars: β 4,173 (-63.61%)
PwndbgExploit Development and Reverse Engineering with GDB Made Easy
Stars: β 4,178 (-63.56%)
HyperpwnA hyper plugin to provide a flexible GDB GUI with the help of GEF, pwndbg or peda
Stars: β 387 (-96.62%)
Pentesting toolkitπ΄ββ οΈ Tools for pentesting, CTFs & wargames. π΄ββ οΈ
Stars: β 1,268 (-88.94%)
Juice Shop CtfCapture-the-Flag (CTF) environment setup tools for OWASP Juice Shop
Stars: β 238 (-97.92%)
Penetration Testing ToolsA collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: β 614 (-94.65%)
Oscp Prepmy oscp prep collection
Stars: β 105 (-99.08%)
Awesome HackingAwesome hacking is an awesome collection of hacking tools.
Stars: β 1,802 (-84.28%)
Write Upsπ VoidHack CTF write-ups
Stars: β 45 (-99.61%)
Awesome HackingA collection of various awesome lists for hackers, pentesters and security researchers
Stars: β 48,038 (+318.96%)
TelekillerA Tools Session Hijacking And Stealer Local Passcode Telegram Windows
Stars: β 122 (-98.94%)
Search LibcWeb wrapper of niklasb/libc-database
Stars: β 124 (-98.92%)
Dll hook RsRust code to show how hooking in rust with a dll works.
Stars: β 57 (-99.5%)
Oscp AutomationA collection of personal scripts used in hacking excercises.
Stars: β 118 (-98.97%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: β 1,132 (-90.13%)
NtrghidraFully Featured Nintendo DS Loader for Ghidra
Stars: β 56 (-99.51%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: β 62 (-99.46%)
Rhme 2017Riscure Hack Me embedded hardware CTF 2017-2018.
Stars: β 65 (-99.43%)
RatelRAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: β 121 (-98.94%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: β 72 (-99.37%)
Kernel ExploitsMy proof-of-concept exploits for the Linux kernel
Stars: β 1,173 (-89.77%)
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: β 72 (-99.37%)
Scillaπ΄ββ οΈ Information Gathering tool π΄ββ οΈ DNS / Subdomains / Ports / Directories enumeration
Stars: β 116 (-98.99%)
CtfSome of my CTF solutions
Stars: β 70 (-99.39%)
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: β 1,188 (-89.64%)
Mitmapπ‘ A python program to create a fake AP and sniff data.
Stars: β 1,526 (-86.69%)
Slideswon't maintain
Stars: β 79 (-99.31%)
Php Malware AnalysisDeobfuscation and analysis of PHP malware captured by a WordPress honey pot
Stars: β 82 (-99.28%)
Sudo killerA tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: β 1,073 (-90.64%)
GtfonowAutomatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: β 68 (-99.41%)