K8toolsK8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Stars: ✭ 4,173 (+839.86%)
Objection📱 objection - runtime mobile exploration
Stars: ✭ 4,404 (+891.89%)
NmapIdiomatic nmap library for go developers
Stars: ✭ 391 (-11.94%)
Tradfri HackingHacking IKEA TRÅDFRI products, such as light bulbs, window blinds and other accessories.
Stars: ✭ 367 (-17.34%)
Awesome Cyber SecurityA collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
Stars: ✭ 333 (-25%)
ArchstrikeAn Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (-9.68%)
Frida GumCross-platform instrumentation and introspection library written in C
Stars: ✭ 357 (-19.59%)
ReverseapkQuickly analyze and reverse engineer Android packages
Stars: ✭ 419 (-5.63%)
Cve 2019 07083389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)
Stars: ✭ 350 (-21.17%)
Email2phonenumberA OSINT tool to obtain a target's phone number just by having his email address
Stars: ✭ 379 (-14.64%)
Rustscan🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+1075.23%)
Ctf Writeups PublicWriteups for infosec Capture the Flag events by team Galaxians
Stars: ✭ 331 (-25.45%)
ApkurlgrepExtract endpoints from APK files
Stars: ✭ 405 (-8.78%)
ChromepassChromepass - Hacking Chrome Saved Passwords
Stars: ✭ 364 (-18.02%)
TaipanWeb application vulnerability scanner
Stars: ✭ 359 (-19.14%)
HulkHULK DoS tool ported to Go with some additional features.
Stars: ✭ 427 (-3.83%)
Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (-20.5%)
PigA Linux packet crafting tool.
Stars: ✭ 384 (-13.51%)
Vaultswiss army knife for hackers
Stars: ✭ 346 (-22.07%)
CtfCTF (Capture The Flag) writeups, code snippets, notes, scripts
Stars: ✭ 336 (-24.32%)
PocAdvisories, proof of concept files and exploits that have been made public by @pedrib.
Stars: ✭ 376 (-15.32%)
IpapatchPatch iOS Apps, The Easy Way, Without Jailbreak.
Stars: ✭ 3,837 (+764.19%)
BillcipherInformation Gathering tool for a Website or IP address
Stars: ✭ 332 (-25.23%)
HellraiserVulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (-6.98%)
MemoryjsRead and write process memory in Node.js (Windows API functions exposed via Node bindings)
Stars: ✭ 371 (-16.44%)
Dref DNS Rebinding Exploitation Framework
Stars: ✭ 423 (-4.73%)
ZinesMirror of my favourite hacking Zines for the lulz, nostalgy, and reference
Stars: ✭ 370 (-16.67%)
PacketwhisperPacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (-8.78%)
W5Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (-17.34%)
Appinfoscanner一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
Stars: ✭ 424 (-4.5%)
AnymethodlogLog any method call of object in Objective-C
Stars: ✭ 361 (-18.69%)
Frida CoreFrida core library intended for static linking into bindings
Stars: ✭ 398 (-10.36%)
Ssrf vulnerable labThis Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Stars: ✭ 361 (-18.69%)
EhtoolsWi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: ✭ 422 (-4.95%)
Technical WhitepapersCollection of IT whitepapers, presentations, pdfs; hacking, web app security, db, reverse engineering and more; EN/PL.
Stars: ✭ 359 (-19.14%)
ParadoxiaratParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (-11.04%)
KatanaA Python Tool For google Hacking
Stars: ✭ 355 (-20.05%)
GoohakAutomatically Launch Google Hacking Queries Against A Target Domain
Stars: ✭ 432 (-2.7%)
Swap digger swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (-20.27%)
Xeexe TopantivirusevasionUndetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (-12.84%)
Proxy ListGet PROXY List that gets updated everyday
Stars: ✭ 347 (-21.85%)
Frida FuzzerThis experimetal fuzzer is meant to be used for API in-memory fuzzing.
Stars: ✭ 415 (-6.53%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-13.96%)
Sign逆向app的sign等参数的思路和体验, 安卓逆向, 安卓破解, 逆向app,爬虫解密
Stars: ✭ 334 (-24.77%)
Wahh extrasThe Web Application Hacker's Handbook - Extra Content
Stars: ✭ 428 (-3.6%)
Ctf DifficultyThis cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.
Stars: ✭ 338 (-23.87%)
EqgrpDecrypted content of eqgrp-auction-file.tar.xz
Stars: ✭ 3,743 (+743.02%)
Socialbox TermuxSocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By init__0 for termux on android
Stars: ✭ 324 (-27.03%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (-6.98%)
Cam HackersHack Cameras CCTV FREE
Stars: ✭ 368 (-17.12%)
Dns Rebind ToolkitA front-end JavaScript toolkit for creating DNS rebinding attacks.
Stars: ✭ 435 (-2.03%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (-3.83%)
BrutesploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (-4.5%)
Memory.dllC# Hacking library for making PC game trainers.
Stars: ✭ 411 (-7.43%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+837.39%)