PxenumA shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-97.41%)
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-95.59%)
Reverse EngineeringThis repository contains some of the executables that I've cracked.
Stars: ✭ 29 (-97.49%)
WebwhatsappbotCore to automatize whatsapp - working 11/2018
Stars: ✭ 59 (-94.9%)
Tic TacClient not paid ? This is the solution of your problem
Stars: ✭ 29 (-97.49%)
NsudoSeries of System Administration Tools
Stars: ✭ 945 (-18.32%)
XshockXSHOCK Shellshock Exploit
Stars: ✭ 65 (-94.38%)
TaikTool hack Dark FB tanpa lisensi
Stars: ✭ 21 (-98.18%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+676.23%)
BroxyAn HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (-21.18%)
Cve 2020 0796CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
Stars: ✭ 1,102 (-4.75%)
PoccollectPoc Collected for study and develop
Stars: ✭ 15 (-98.7%)
DockerscanDocker security analysis & hacking tools
Stars: ✭ 1,046 (-9.59%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (-24.29%)
Best Hacking ToolsBEST HACKING TOOLS..For more tools visit our blog for Hackers
Stars: ✭ 46 (-96.02%)
Drv3 Tools(Not actively maintained, use DRV3-Sharp) Tools for extracting and re-injecting files for Danganronpa V3 for PC.
Stars: ✭ 13 (-98.88%)
PapersPapers about known hacking, security, hardware, software, computer, network and other ressources.
Stars: ✭ 58 (-94.99%)
Java Sec CodeJava web common vulnerabilities and security code which is base on springboot and spring security
Stars: ✭ 1,033 (-10.72%)
Kubernetes GoatKubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
Stars: ✭ 868 (-24.98%)
EmofishesEmofishes is a collection of proof of concepts that help improve, bypass or detect virtualized execution environments (focusing on the ones setup for malware analysis).
Stars: ✭ 11 (-99.05%)
ShuffleWebShell Backdoor Framework
Stars: ✭ 11 (-99.05%)
DracnmapDracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (-25.58%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (-2.16%)
VulmapVulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (-6.74%)
Cfw2ofw HelperProviding aid in converting video games.
Stars: ✭ 44 (-96.2%)
Ripv6Random IPv6 - circumvents restrictive IP address-based filter and blocking rules
Stars: ✭ 10 (-99.14%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (-12.79%)
PhonesploitUsing open Adb ports we can exploit a Andriod Device
Stars: ✭ 854 (-26.19%)
V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (-26.79%)
Kill RouterFerramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-95.07%)
Cve 2018 18852CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.
Stars: ✭ 42 (-96.37%)
Crazy WeekendMengobati rasa ingin tahu atau kadang hanya iseng
Stars: ✭ 9 (-99.22%)
Usb Keystroke Injector☠️ An Arduino-based USB keyboard simulator which injects keystrokes via Bluetooth protocol or predefined payloads in a SD card.
Stars: ✭ 42 (-96.37%)
PillagerPillage filesystems for sensitive information with Go.
Stars: ✭ 64 (-94.47%)
Knowledge Basepdf,txt,djvu, various useful books
Stars: ✭ 63 (-94.55%)
Dll hook RsRust code to show how hooking in rust with a dll works.
Stars: ✭ 57 (-95.07%)
KeyloggerA simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (-12.96%)
Cve 2020 10199 cve 2020 10204CVE-2020-10199、CVE-2020-10204漏洞一键检测工具,图形化界面。CVE-2020-10199 and CVE-2020-10204 Vul Tool with GUI.
Stars: ✭ 20 (-98.27%)
ChronicelOur super sweet hacker management system, built for HackTCNJ 2017+ | Used by [email protected] 2018!
Stars: ✭ 18 (-98.44%)
TaketvTakeTV permite descubrir dispositivos de red DLNA/UPnP y ayuda a reproducir archivos multimedia en los televisores inteligentes desde nuestra terminal en Linux.
Stars: ✭ 41 (-96.46%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (-22.47%)
ProcjackPoC of injecting code into a running Linux process
Stars: ✭ 17 (-98.53%)
MhddosBest DDoS Attack Script Python3, Cyber Attack With 36 Method
Stars: ✭ 55 (-95.25%)
Jsql InjectionjSQL Injection is a Java application for automatic SQL database injection.
Stars: ✭ 891 (-22.99%)
Quarkus Microservices PocVery simplified shop sales system made in a microservices architecture using quarkus
Stars: ✭ 16 (-98.62%)
Arpspoof arpspoof for macOS - intercept packets on a switched LAN
Stars: ✭ 40 (-96.54%)
SpookflareLoader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
Stars: ✭ 836 (-27.74%)
ScriptsScripts I use during pentest engagements.
Stars: ✭ 834 (-27.92%)
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-94.55%)
WhitehatInformation about my experiences on ethical hacking 💀
Stars: ✭ 54 (-95.33%)