Prestashop Cve 2018 19126PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)
Stars: ✭ 37 (-70.63%)
Geo ReconAn OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts.
Stars: ✭ 82 (-34.92%)
Msploitego Pentesting suite for Maltego based on data in a Metasploit database
Stars: ✭ 124 (-1.59%)
Burp Send ToAdds a customizable "Send to..."-context-menu to your BurpSuite.
Stars: ✭ 114 (-9.52%)
Cdn dig用于在linux 终端快速查询全国 CDN 调度到哪些区域节点的工具
Stars: ✭ 36 (-71.43%)
Orangetool📚 Control Functions For Single-Board Computers
Stars: ✭ 82 (-34.92%)
BrutexAutomatically brute force all services running on a target.
Stars: ✭ 974 (+673.02%)
100 Days Of Swiftui👨💻👩💻100 Days Of SwiftUI free course from Hacking with Swift. 👨💻👩💻
Stars: ✭ 35 (-72.22%)
CloudfailUtilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
Stars: ✭ 1,239 (+883.33%)
Gdb StaticPublic repository of static GDB and GDBServer
Stars: ✭ 103 (-18.25%)
Exploit Cve 2016 9920Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container
Stars: ✭ 34 (-73.02%)
Is GoogleVerify that a request is from Google crawlers using Google's DNS verification steps
Stars: ✭ 82 (-34.92%)
H EncoreFully chained kernel exploit for the PS Vita on firmwares 3.65-3.68
Stars: ✭ 968 (+668.25%)
Go Deliver Go-deliver is a payload delivery tool coded in Go.
Stars: ✭ 103 (-18.25%)
Badusb botnet👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-74.6%)
Spytrojan keylogger[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-74.6%)
Ge.mine.nuCode from my old page ge.mine.nu
Stars: ✭ 31 (-75.4%)
ShipA simple, handy network addressing multitool with plenty of features
Stars: ✭ 81 (-35.71%)
FiercephishFiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.
Stars: ✭ 960 (+661.9%)
PxenumA shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-76.19%)
InfogaInfoga - Email OSINT
Stars: ✭ 947 (+651.59%)
Reverse EngineeringThis repository contains some of the executables that I've cracked.
Stars: ✭ 29 (-76.98%)
SpeedhackSpeedhack coded in C++, inspired by Cheat Engine's own speedhack.
Stars: ✭ 29 (-76.98%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+1446.83%)
ElpscrkA Common User Passwords generator script that looks like the tool Eliot used it in Mr.Robot Series Episode 01 :D :v
Stars: ✭ 113 (-10.32%)
Tic TacClient not paid ? This is the solution of your problem
Stars: ✭ 29 (-76.98%)
UefiFast and lightweight yet another UEFI implementation
Stars: ✭ 79 (-37.3%)
CatchmeCatchME - WiFi Fun Box "Having Fun with ESP8266"
Stars: ✭ 28 (-77.78%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-37.3%)
SkyratSkyRAT - Powershell Remote Administration Tool
Stars: ✭ 21 (-83.33%)
Ssh keyscannerssh public host key scanner using shodan
Stars: ✭ 102 (-19.05%)
CryptolockerCryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system and send keys back to the server. Multi-threaded functionality helps to this tool make encryption faster.
Stars: ✭ 79 (-37.3%)
TaikTool hack Dark FB tanpa lisensi
Stars: ✭ 21 (-83.33%)
WsshWSSH Is a tool for brute forcing servers that has port 22 open via ssh, wssh is probably the fastest ssh brute forcer available
Stars: ✭ 21 (-83.33%)
BroxyAn HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (+623.81%)
SnoopSnoop — инструмент разведки на основе открытых данных (OSINT world)
Stars: ✭ 886 (+603.17%)
Chongding冲顶大会/百万赢家/头脑王者/UC疯狂夺金:抓包获取题目(不用图像识别),并搜索答案
Stars: ✭ 113 (-10.32%)
Unfollow PlusAutomated Instagram Unfollower Bot
Stars: ✭ 79 (-37.3%)
Cve 2017 0065Exploiting Edge's read:// urlhandler
Stars: ✭ 15 (-88.1%)
Webcam Easyjavascript access webcam stream and take photo
Stars: ✭ 79 (-37.3%)
Awesome HackingA curated list of awesome Hacking tutorials, tools and resources
Stars: ✭ 7,756 (+6055.56%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+595.24%)
TimelapseA time lapse app for Sony Alpha camera using the OpenMemories framework
Stars: ✭ 101 (-19.84%)
Webhackersweapons⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 1,205 (+856.35%)
Drv3 Tools(Not actively maintained, use DRV3-Sharp) Tools for extracting and re-injecting files for Danganronpa V3 for PC.
Stars: ✭ 13 (-89.68%)
UnauthdA local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854
Stars: ✭ 79 (-37.3%)
Kubernetes GoatKubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
Stars: ✭ 868 (+588.89%)