WechatspellbookWechat Spellbook 是一个使用Kotlin编写的开源微信插件框架,底层需要 Xposed 或 VirtualXposed 等Hooking框架的支持,而顶层可以轻松对接Java、Kotlin、Scala等JVM系语言。让程序员能够在几分钟内编写出简单的微信插件,随意揉捏微信的内部逻辑。
Stars: ✭ 1,584 (-86.19%)
Www.rootkit.comwww.rootkit.com users section mirror, sql database dump, and a few other files/rootkits.
Stars: ✭ 117 (-98.98%)
Mitm Scripts🔄 A collection of mitmproxy inline scripts
Stars: ✭ 109 (-99.05%)
Dark FbHack Facebook
Stars: ✭ 98 (-99.15%)
LighthouseA Code Coverage Explorer for Reverse Engineers
Stars: ✭ 1,348 (-88.24%)
Chaos🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Stars: ✭ 1,168 (-89.81%)
Netmap.jsFast browser-based network discovery module
Stars: ✭ 70 (-99.39%)
Lime Minera simple hidden silent XMR miner.
Stars: ✭ 109 (-99.05%)
BrutesharkNetwork Analysis Tool
Stars: ✭ 1,335 (-88.36%)
SsrfmapAutomatic SSRF fuzzer and exploitation tool
Stars: ✭ 1,344 (-88.28%)
AppmonDocumentation:
Stars: ✭ 1,157 (-89.91%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (-89.91%)
FawkesFawkes is a tool to search for targets vulnerable to SQL Injection. Performs the search using Google search engine.
Stars: ✭ 108 (-99.06%)
Poc BankFocus on cybersecurity | collection of PoC and Exploits
Stars: ✭ 68 (-99.41%)
VsauditVOIP Security Audit Framework
Stars: ✭ 97 (-99.15%)
ProxifySwiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go.
Stars: ✭ 1,153 (-89.94%)
Red Team Curation ListA list to discover work of red team tooling and methodology for penetration testing and security assessment
Stars: ✭ 68 (-99.41%)
Bin2llvmA binary to LLVM translator
Stars: ✭ 108 (-99.06%)
Aura BotnetA super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Bash, and Powershell.
Stars: ✭ 95 (-99.17%)
PillagerPillage filesystems for sensitive information with Go.
Stars: ✭ 64 (-99.44%)
PakuriPenetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (-98.91%)
Msploitego Pentesting suite for Maltego based on data in a Metasploit database
Stars: ✭ 124 (-98.92%)
CtfCTF Field Guide
Stars: ✭ 1,145 (-90.01%)
Awesome Malware💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-99.06%)
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-99.15%)
Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (-99.42%)
Xil2cppdumperIL2CppDumper writed in C++ by xia0
Stars: ✭ 97 (-99.15%)
ZaproxyThe OWASP ZAP core project
Stars: ✭ 9,078 (-20.83%)
PossumbotA bot that will allow you to destroy discord servers.
Stars: ✭ 106 (-99.08%)
Pmd RedDecompilation of Pokémon Mystery Dungeon: Red Rescue Team
Stars: ✭ 65 (-99.43%)
ReconcatA small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any year or complete list of all years possible. Made Specially for penetration testing purpose.
Stars: ✭ 66 (-99.42%)
B1tifissh management tool to provides commandline access to a remote system running SSH server
Stars: ✭ 65 (-99.43%)
Imhex🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Stars: ✭ 11,744 (+2.42%)
Ddos RootsecDDOS Archive by RootSec (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)
Stars: ✭ 108 (-99.06%)
IlluminatejsIlluminateJS is a static JavaScript deobfuscator
Stars: ✭ 96 (-99.16%)
FishchatHook WeChat.app on non-jailbroken devices.
Stars: ✭ 1,139 (-90.07%)
Jnitrace EngineEngine used by jnitrace to intercept JNI API calls.
Stars: ✭ 94 (-99.18%)
XshockXSHOCK Shellshock Exploit
Stars: ✭ 65 (-99.43%)
ProdigymathgamehackingProdigy Hacking Organization: Hacking for the right reasons. | Questions? Ask on our Discord. https://discord.gg/XQDfbfq
Stars: ✭ 108 (-99.06%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (-90.09%)
Github DorksFind leaked secrets via github search
Stars: ✭ 1,332 (-88.38%)
Google ratA Remote Access Tool using Google Apps Script as the proxy for command and control.
Stars: ✭ 64 (-99.44%)
DataAPTnotes data
Stars: ✭ 1,126 (-90.18%)
Horn3tPowerful Visual Subdomain Enumeration at the Click of a Mouse
Stars: ✭ 120 (-98.95%)
SojoboA binary analysis framework
Stars: ✭ 116 (-98.99%)
SocialpwnedSocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and Twitter to find possible credentials leaks in PwnDB.
Stars: ✭ 104 (-99.09%)
Spykeyboardkeylogger which sends us the data to our gmail.
Stars: ✭ 95 (-99.17%)
Libc DatabaseBuild a database of libc offsets to simplify exploitation
Stars: ✭ 1,122 (-90.21%)