Swap digger swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (-14.29%)
magento2-fast-vmOptimal vagrant developer box for Magento2. Folders synced by nfs/rsync. This box includes Magento developer utilities.
Stars: ✭ 89 (-78.45%)
mini-kaliDocker image for hacking
Stars: ✭ 15 (-96.37%)
PywerviewA (partial) Python rewriting of PowerSploit's PowerView
Stars: ✭ 292 (-29.3%)
HolyTipsA Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.
Stars: ✭ 1,210 (+192.98%)
Attack-Defense-PlatformA framework that help to create CTF Attack with Defense competition quickly
Stars: ✭ 23 (-94.43%)
Impost3r👻Impost3r -- A linux password thief
Stars: ✭ 355 (-14.04%)
Android ExploitsA collection of android Exploits and Hacks
Stars: ✭ 290 (-29.78%)
OSCP-PrepContained is all my reference material for my OSCP preparation. Designed to be a one stop shop for code, guides, command syntax, and high level strategy. One simple clone and you have access to some of the most popular tools used for pentesting.
Stars: ✭ 33 (-92.01%)
PentmenuA bash script for recon and DOS attacks
Stars: ✭ 288 (-30.27%)
uberscanSecurity program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.
Stars: ✭ 31 (-92.49%)
HashExploitHashExpoit is Great Tool For Cracking Hash
Stars: ✭ 17 (-95.88%)
TomcatwardeployerApache Tomcat auto WAR deployment & pwning penetration testing tool.
Stars: ✭ 287 (-30.51%)
go-escalateThe goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS
Stars: ✭ 23 (-94.43%)
SusanooA REST API security testing framework.
Stars: ✭ 287 (-30.51%)
organonThis program focuses on automating the download, installation and compilation of pentest tools from source
Stars: ✭ 36 (-91.28%)
Dnsbrutea fast domain brute tool
Stars: ✭ 352 (-14.77%)
Rshijacktcp connection hijacker, rust rewrite of shijack
Stars: ✭ 288 (-30.27%)
Ctf WriteupsPerfect Blue's CTF Writeups
Stars: ✭ 286 (-30.75%)
Searpy🥀 Search Engine Tookit,URL采集、Favicon哈希值查找真实IP、子域名查找
Stars: ✭ 104 (-74.82%)
Top25 ParameterFor basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙
Stars: ✭ 388 (-6.05%)
CardinalCTF🚩 AWD (Attack with Defense) 线下赛平台 / AWD platform - 欢迎 Star~ ✨
Stars: ✭ 379 (-8.23%)
Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (-14.53%)
Hackermind渗透步骤,web安全,CTF,业务安全,人工智能,区块链安全,安全开发,无线安全,社会工程学,二进制安全,移动安全,红蓝对抗,运维安全,风控安全,linux安全
Stars: ✭ 284 (-31.23%)
Enum.pyA tool to enumerate network services
Stars: ✭ 23 (-94.43%)
webcocktailAn automatic and lightweight web application scanning tool for CTF.
Stars: ✭ 28 (-93.22%)
Proxy ListGet PROXY List that gets updated everyday
Stars: ✭ 347 (-15.98%)
toshImagine your SSH server only listens on an IPv6 address, and where the last 6 digits are changing every 30 seconds as a TOTP code...
Stars: ✭ 406 (-1.69%)
dark-lord-obamaAV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities
Stars: ✭ 61 (-85.23%)
PhirauteeA proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
Stars: ✭ 96 (-76.76%)
Traitor⬆️ ☠️ Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket
Stars: ✭ 3,473 (+740.92%)
awesome-pentest-toolsList of Security Archives Tools and software, generally for facilitate security & penetration research. Opening it up to everyone will facilitate a knowledge transfer. Hopefully the initial set will grow and expand.
Stars: ✭ 34 (-91.77%)
ctf writeupsNo description or website provided.
Stars: ✭ 25 (-93.95%)
SecuritymanageframworkSecurity Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Stars: ✭ 378 (-8.47%)
PwndbgExploit Development and Reverse Engineering with GDB Made Easy
Stars: ✭ 4,178 (+911.62%)
OsmedeusFully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+721.07%)
BinV👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.
Stars: ✭ 25 (-93.95%)
MailRipV3SMTP and IMAP checker / cracker for mailpass combolists with a user-friendly GUI, automated inbox test and many more features.
Stars: ✭ 28 (-93.22%)
watchmanAML/CTF/KYC/OFAC Search of global watchlist, sanctions, and politically exposed person (PEP)
Stars: ✭ 167 (-59.56%)
CTF-Script-And-Template-Thrift-Shop[180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you googles something for a CTF and landed here look at the scripts they're all fairly malleable. Sorry for the shitty naming conventions (not really). If you are a recruiter stop. I wont be able to rewrite half thi…
Stars: ✭ 38 (-90.8%)
ClippyTerribad PrivEsc enumeration script for Windows systems
Stars: ✭ 15 (-96.37%)
Welpwn💖CTF pwn framework.
Stars: ✭ 284 (-31.23%)
robot hacking manualRobot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.
Stars: ✭ 169 (-59.08%)
IoxTool for port forwarding & intranet proxy
Stars: ✭ 411 (-0.48%)
ctfCTF programs and writeups
Stars: ✭ 22 (-94.67%)
Cobalt strike extension kitAttempting to be an all in one repo for others' userful aggressor scripts as well as things we've found useful during Red Team Operations.
Stars: ✭ 345 (-16.46%)
LazyreconAn automated approach to performing recon for bug bounty hunting and penetration testing.
Stars: ✭ 282 (-31.72%)