Python-For-Ethical-HackingThis is a complete project series on implementing hacking tools available in Kali Linux into python.
Stars: ✭ 29 (-93.74%)
Duckhunt🎯 Prevent RubberDucky (or other keystroke injection) attacks
Stars: ✭ 386 (-16.63%)
HIDAAFPython - Human Interface Device Android Attack Framework
Stars: ✭ 31 (-93.3%)
matrixmirror of https://mypdns.org/my-privacy-dns/matrix as it is obviously no longer safe to do Girhub nor have we no longer any trust in them. See https://mypdns.org/my-privacy-dns/porn-records/-/issues/1347
Stars: ✭ 32 (-93.09%)
CC33ZCurso de Ciência da Computação
Stars: ✭ 50 (-89.2%)
packer-kvmCreate VM templates with Packer for usage with Libvirt/KVM virtualization : CentOS 7, CentOS 8, CentOS 8 Stream, Alma Linux, Rocky Linux, Bionic (Ubuntu 1804), Focal (Ubuntu 2004), Debian 11 (stable), Kali Linux, Fedora 33 and Fedora 34.
Stars: ✭ 99 (-78.62%)
RevsslA script that automates generation of OpenSSL reverse shells
Stars: ✭ 284 (-38.66%)
certexfilExfiltration based on custom X509 certificates
Stars: ✭ 18 (-96.11%)
clamavDocker based ClamAV® service provides an easy to deploy open source antivirus engine for detecting trojans, viruses, malware & other malicious threats.
Stars: ✭ 31 (-93.3%)
mini-kaliDocker image for hacking
Stars: ✭ 15 (-96.76%)
TIWAPTotally Insecure Web Application Project (TIWAP)
Stars: ✭ 137 (-70.41%)
SharpOffensiveShellA sort of simple shell which support multiple protocols.
Stars: ✭ 71 (-84.67%)
malice-avMalice AntiVirus Plugins
Stars: ✭ 98 (-78.83%)
NetcatNetCat for Windows
Stars: ✭ 463 (+0%)
HershellHershell is a simple TCP reverse shell written in Go.
Stars: ✭ 442 (-4.54%)
InfectInfect Any Android Device With Virus From Link In Termux
Stars: ✭ 409 (-11.66%)
Vulnhub Ctf WriteupsThis cheasheet is aimed at the CTF Players and Beginners to help them sort Vulnhub Labs. This list contains all the writeups available on hackingarticles.
Stars: ✭ 368 (-20.52%)
AvsignseekTool written in python3 to determine where the AV signature is located in a binary/payload
Stars: ✭ 284 (-38.66%)
TORhunterDesigned to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .onion
Stars: ✭ 47 (-89.85%)
IStego100KIStego100K: Large-scale Image Steganalysis Dataset
Stars: ✭ 42 (-90.93%)
Python-BotnetThis is a simple DDoS python botnet script with remote monitoring & management for education purposes.
Stars: ✭ 119 (-74.3%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-17.49%)
aquatoneA Tool for Domain Flyovers
Stars: ✭ 43 (-90.71%)
BrutegramInstagram multi-bruteforce Platfrom
Stars: ✭ 183 (-60.48%)
SonarsearchA MongoDB importer and API for Project Sonars DNS datasets
Stars: ✭ 297 (-35.85%)
pakkeroPakkero is a binary packer written in Go made for fun and educational purpose. Its main goal is to take in input a program file (elf binary, script, even appimage) and compress it, protect it from tampering and intrusion.
Stars: ✭ 143 (-69.11%)
GodSpeedFast and intuitive manager for multiple reverse shells
Stars: ✭ 75 (-83.8%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (-10.8%)
BabyMuxpentesting tool for noob hackers.Runs on linux and termux
Stars: ✭ 50 (-89.2%)
cloud-desktopsCloud-based Virtual Desktops on Google Cloud Platform
Stars: ✭ 14 (-96.98%)
Batch-AntivirusBatch Antivirus, a powerful antivirus suite written in batch with real-time protection and heuristical scanning.
Stars: ✭ 26 (-94.38%)
WebdevelopersecuritychecklistA checklist of important security issues you should consider when creating a web application.
Stars: ✭ 379 (-18.14%)
Horus-EyeJust Simple Code To Play With Android Payloads (;
Stars: ✭ 54 (-88.34%)
Dnscat2 PowershellA Powershell client for dnscat2, an encrypted DNS command and control tool.
Stars: ✭ 295 (-36.29%)
rop-benchmarkROP Benchmark is a tool to compare ROP compilers
Stars: ✭ 23 (-95.03%)
YouTube-Tutorials--Italian📂 Source Code for (some of) the Programming Tutorials from my Italian YouTube Channel and website ProgrammareInPython.it. This is just a small portion of the content: please visit the website for more.
Stars: ✭ 28 (-93.95%)
Dradis CeDradis Framework: Colllaboration and reporting for IT Security teams
Stars: ✭ 443 (-4.32%)
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-95.03%)
phomberPhomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (-87.26%)
payloadPSR-15 middleware to parse the body of the request with support for json, csv and url-encode
Stars: ✭ 30 (-93.52%)
SitebrokerA cross-platform python based utility for information gathering and penetration testing automation!
Stars: ✭ 281 (-39.31%)
RaySRayS: A Ray Searching Method for Hard-label Adversarial Attack (KDD2020)
Stars: ✭ 43 (-90.71%)
vagrant-idsAn Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (-95.46%)
MaskphishGive a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
Stars: ✭ 370 (-20.09%)
SSRF payload本脚本旨在生成各类畸形URL链接,进行探测使用的payload,尝试绕过服务端ssrf限制。
Stars: ✭ 28 (-93.95%)
FaradayFaraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit.
Stars: ✭ 3,198 (+590.71%)
SEPparserScript for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.
Stars: ✭ 40 (-91.36%)
CloakCloak can backdoor any python script with some tricks.
Stars: ✭ 411 (-11.23%)
Javadeserh2hcSample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).
Stars: ✭ 361 (-22.03%)
rconnrconn is a multiplatform program for creating generic reverse connections. Lets you consume services that are behind firewall or NAT without opening ports or port-forwarding.
Stars: ✭ 231 (-50.11%)
Learning-Node.js-SecurityA Collection of articles, videos, blogs, talks and other materials on Node.js Security
Stars: ✭ 25 (-94.6%)