hippie68.github.ioThis is sleirsgoevy's PS4 jailbreak for firmware 7.02/7.5x, upgraded with additional features and more payloads.
Stars: ✭ 35 (-97.28%)
FireelffireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (-66.17%)
OverlordOverlord - Red Teaming Infrastructure Automation
Stars: ✭ 258 (-79.94%)
formatstringFormat string exploitation helper
Stars: ✭ 45 (-96.5%)
VirusX5The Most Powerful Fake Page Redirecting tool...
Stars: ✭ 15 (-98.83%)
Wadcoms.github.ioWADComs is an interactive cheat sheet, containing a curated list of Unix/Windows offensive tools and their respective commands.
Stars: ✭ 431 (-66.49%)
CVE-2016-7255An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit
Stars: ✭ 85 (-93.39%)
Venomvenom - shellcode generator/compiler/handler (metasploit)
Stars: ✭ 904 (-29.7%)
EhtoolsWi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: ✭ 422 (-67.19%)
recceDomain availbility checker
Stars: ✭ 30 (-97.67%)
Super Nt JailbreakCustom "Jailbreak" firmware for the Analogue Super NT
Stars: ✭ 415 (-67.73%)
reverse-sshStatically-linked ssh server with reverse shell functionality for CTFs and such
Stars: ✭ 548 (-57.39%)
FinalreconThe Last Web Recon Tool You'll Need
Stars: ✭ 888 (-30.95%)
iSecureOSAn iOS Security assessment app for jailbroken iOS Devices.
Stars: ✭ 111 (-91.37%)
BotbA container analysis and exploitation tool for pentesters and engineers.
Stars: ✭ 414 (-67.81%)
iOS-Restrictions-RecoveryCan find the Restrictions or Screen Time passcode of any iOS 7.0-12.5.5 device. iOS 13 and 14 should work in theory, but Keychain-Dumper is very hit or miss on those versions
Stars: ✭ 50 (-96.11%)
Burpsuite CollectionsBurpSuite收集:包括不限于 Burp 文章、破解版、插件(非BApp Store)、汉化等相关教程,欢迎添砖加瓦---burpsuite-pro burpsuite-extender burpsuite cracked-version hackbar hacktools fuzzing fuzz-testing burp-plugin burp-extensions bapp-store brute-force-attacks brute-force-passwords waf sqlmap jar
Stars: ✭ 1,081 (-15.94%)
shellPython 3 Reverse Shell
Stars: ✭ 22 (-98.29%)
PapergramSet Instagram backgrounds on iOS
Stars: ✭ 5 (-99.61%)
tomcter😹 Tomcter is a python tool developed to bruteforce Apache Tomcat manager login with Apache Tomcat default credentials.
Stars: ✭ 18 (-98.6%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (-68.66%)
iBadAppleFirst ever: Windows, free iCloud & activation lock bypass... that isn't a malware!
Stars: ✭ 133 (-89.66%)
iOS-Tweak-Dev-ToolsA collection of useful development tools and forks of tools that are geared towards iOS jailbreak developers.
Stars: ✭ 37 (-97.12%)
Top25 ParameterFor basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙
Stars: ✭ 388 (-69.83%)
LazyMan-iOSA simple app that lets you stream every live and archived NHL and MLB game from any of your iOS devices.
Stars: ✭ 73 (-94.32%)
WindowsAwesome tools to exploit Windows !
Stars: ✭ 816 (-36.55%)
NightingaleIt's a Docker Environment for pentesting which having all the required tool for VAPT.
Stars: ✭ 119 (-90.75%)
Xeexe TopantivirusevasionUndetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (-69.91%)
ARL-NPoC集漏洞验证和任务运行的一个框架
Stars: ✭ 73 (-94.32%)
Nmap Nse InfoBrowse and search through nmap's NSE scripts.
Stars: ✭ 54 (-95.8%)
phuzzFind exploitable PHP files by parameter fuzzing and function call tracing
Stars: ✭ 53 (-95.88%)
Envizonnetwork visualization & vulnerability management/reporting
Stars: ✭ 382 (-70.3%)
MsfpcMSFvenom Payload Creator (MSFPC)
Stars: ✭ 808 (-37.17%)
PasshuntPasshunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
Stars: ✭ 961 (-25.27%)
Platypus🔨 A modern multiple reverse shell sessions manager wrote in go
Stars: ✭ 559 (-56.53%)
yarasploitYaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.
Stars: ✭ 31 (-97.59%)
godofwarGodOfWar - Malicious Java WAR builder with built-in payloads
Stars: ✭ 118 (-90.82%)
LookylooLookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.
Stars: ✭ 381 (-70.37%)
chrome extensionBrowser extension that uses intelligence to combat malicious websites by blocking them in real-time.
Stars: ✭ 53 (-95.88%)
WebdevelopersecuritychecklistA checklist of important security issues you should consider when creating a web application.
Stars: ✭ 379 (-70.53%)
sedoppkitA knockoff social-engineer toolkit
Stars: ✭ 46 (-96.42%)
Shellen🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (-37.87%)
FlashRoute🚀 Takes minutes to explore the topology of all routable /24 prefixes in IPv4 address space. Now supports IPv6 scan!
Stars: ✭ 26 (-97.98%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+223.64%)
1earnffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+188.88%)
Macro packmacro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to final document generation. It also provides a lot of helpful features useful for redteam or security research.
Stars: ✭ 1,072 (-16.64%)
KeyPlexerCapstone: Keylogger Trojan
Stars: ✭ 32 (-97.51%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-95.26%)
PotironPotiron - Normalize, Index and Visualize Network Capture
Stars: ✭ 66 (-94.87%)
HouseA runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
Stars: ✭ 910 (-29.24%)
Easy hackHack the World using Termux
Stars: ✭ 549 (-57.31%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-96.27%)
gtfoSearch for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (-93.16%)