Mecfor mass exploiting
Stars: ✭ 448 (+1110.81%)
BrutusBotnet targeting Windows machines written entirely in Python & open source security project.
Stars: ✭ 37 (+0%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+3027.03%)
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+1181.08%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+140.54%)
OSCESome exploits, which I’ve created during my OSCE preparation.
Stars: ✭ 74 (+100%)
exploitsSome personal exploits/pocs
Stars: ✭ 52 (+40.54%)
akamai-arl-hackScript to test open Akamai ARL vulnerability.
Stars: ✭ 70 (+89.19%)
doraFind exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Stars: ✭ 229 (+518.92%)
log4jpwnlog4j rce test environment and poc
Stars: ✭ 306 (+727.03%)
PayloadsAllA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 31 (-16.22%)
refluxionRefluxion -- MITM WPA attacks tool
Stars: ✭ 25 (-32.43%)
redshellguidepython script allow red teaming , hackthebox Pwners , OSCP lovers to shorten their time by these useful shells
Stars: ✭ 32 (-13.51%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+127.03%)
longtongueCustomized Password/Passphrase List inputting Target Info
Stars: ✭ 61 (+64.86%)
WPCrackerWordPress pentest tool
Stars: ✭ 34 (-8.11%)
overload📡 Overload DoS Tool (Layer 7)
Stars: ✭ 167 (+351.35%)
SILVERDUMPA wrapping script to query the default password list maintained by cirn.net... << Thank them.
Stars: ✭ 24 (-35.14%)
exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (+229.73%)
python-log4rceAn All-In-One Pure Python PoC for CVE-2021-44228
Stars: ✭ 179 (+383.78%)
vscode-f5Let the F5 VSCode extension supercharge your workflows with schema validation, rest client, fast templates, and so much more!!!
Stars: ✭ 44 (+18.92%)
Free-ProxyHi there will be a lot of proxies here.
Stars: ✭ 135 (+264.86%)
LuciferA Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+716.22%)
CVE-2019-7609RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer
Stars: ✭ 47 (+27.03%)
BrutegramInstagram multi-bruteforce Platfrom
Stars: ✭ 183 (+394.59%)
boxerBoxer: A fast directory bruteforce tool written in Python with concurrency.
Stars: ✭ 15 (-59.46%)
MCPToolPentesting tool for Minecraft
Stars: ✭ 73 (+97.3%)
DLL-INJECTORI created a dll injector I am going to Open source its Code. But remember one thing that is any one can use it only for Educational purpose .I again say do not use it to damage anyone's Computer.But one thing if you are using it for some good purpose like to help someone who really need help then I permit you to use it.
Stars: ✭ 14 (-62.16%)
exploitsSome of my public exploits
Stars: ✭ 50 (+35.14%)
FBM-134Hack Facebook Account Brute Force Method
Stars: ✭ 27 (-27.03%)
vimana-frameworkVimana is an experimental security framework that aims to provide resources for auditing Python web applications.
Stars: ✭ 47 (+27.03%)
AshokAshok is a OSINT Recon Tool , a.k.a 😍 Swiss Army knife .
Stars: ✭ 109 (+194.59%)
trolotrolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (+21.62%)
penelopePenelope Shell Handler
Stars: ✭ 291 (+686.49%)
spicescriptA Handy-Dandy Personal Toolkit for Enumeration and a headstart on attacking a machine!
Stars: ✭ 20 (-45.95%)
GmailBruterV2Simple tool written in python3 to perform limited brute-force attacks on gmail accounts.
Stars: ✭ 264 (+613.51%)
droid controllerControl the parameters of an Android system with the power of Xposed framework. 通过Xposed框架控制Android参数。
Stars: ✭ 15 (-59.46%)
pyhtoolsA Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester credential harvester, keylogger, download&execute, ransomware, data harvestors, etc.
Stars: ✭ 166 (+348.65%)
HostPanicFind host header injections and perform Host Header attacks with other kind of bugs like web cache poissoning
Stars: ✭ 23 (-37.84%)
Brute-Force-LoginProof -Of-Concept Brute Force Login on a web-site with a good dictionary of words
Stars: ✭ 231 (+524.32%)
mec-ngpentest toolbox
Stars: ✭ 28 (-24.32%)
TokenBreakerJSON RSA to HMAC and None Algorithm Vulnerability POC
Stars: ✭ 51 (+37.84%)
IP-TrackerTrack any ip address with IP-Tracker. IP-Tracker is developed for Linux and Termux. you can retrieve any ip address information using IP-Tracker.
Stars: ✭ 53 (+43.24%)
rceDistributed, workflow-driven integration environment
Stars: ✭ 42 (+13.51%)
minipwnerA script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".
Stars: ✭ 53 (+43.24%)
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-37.84%)
PrintNightmare-CVE-2021-34527PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits
Stars: ✭ 73 (+97.3%)
instagram-hacking-toolInstagram Hacking Tool is a phishing tool, it will help you to hack Instagram Accounts using fake login page.
Stars: ✭ 350 (+845.95%)
exploit-CVE-2015-3306ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container
Stars: ✭ 97 (+162.16%)