SqlmapAutomatic SQL injection and database takeover tool
Stars: ✭ 21,907 (+997%)
CommixAutomated All-in-One OS Command Injection Exploitation Tool.
Stars: ✭ 3,016 (+51.03%)
Sqli HunterSQLi-Hunter is a simple HTTP / HTTPS proxy server and a SQLMAP API wrapper that makes digging SQLi easy.
Stars: ✭ 340 (-82.97%)
ArissploitArissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (-94.29%)
ShurikenCross-Site Scripting (XSS) command line tool for testing lists of XSS payloads on web apps.
Stars: ✭ 114 (-94.29%)
Poc T渗透测试插件化并发框架 / Open-sourced remote vulnerability PoC/EXP framework
Stars: ✭ 1,722 (-13.77%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (-79.82%)
PrismaticaResponsive Command and Control System
Stars: ✭ 81 (-95.94%)
MxtractmXtract - Memory Extractor & Analyzer
Stars: ✭ 499 (-75.01%)
RaccoonA high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+15.77%)
BadmodCMS auto detect and exploit.
Stars: ✭ 296 (-85.18%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (-55.08%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (-63.55%)
avainA Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
Stars: ✭ 56 (-97.2%)
sub404A python tool to check subdomain takeover vulnerability
Stars: ✭ 205 (-89.73%)
FireelffireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (-78.22%)
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (-92.79%)
Xerrorfully automated pentesting tool
Stars: ✭ 173 (-91.34%)
FdsploitFile Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (-90.04%)
ShellabLinux and Windows shellcode enrichment utility
Stars: ✭ 225 (-88.73%)
Suid3numA standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)
Stars: ✭ 342 (-82.87%)
WinpwnAutomation for internal Windows Penetrationtest / AD-Security
Stars: ✭ 1,303 (-34.75%)
VailynA phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-94.84%)
XssmapXSSMap 是一款基于 Python3 开发用于检测 XSS 漏洞的工具
Stars: ✭ 134 (-93.29%)
Make SenseFree to use online tool for labelling photos. https://makesense.ai
Stars: ✭ 2,087 (+4.51%)
Evil WinrmThe ultimate WinRM shell for hacking/pentesting
Stars: ✭ 2,251 (+12.72%)
WhatwafDetect and bypass web application firewalls and protection systems
Stars: ✭ 1,881 (-5.81%)
XorpassEncoder to bypass WAF filters using XOR operations
Stars: ✭ 134 (-93.29%)
Vehicle DetectionCompare FasterRCNN,Yolo,SSD model with the same dataset
Stars: ✭ 130 (-93.49%)
IsoallocA general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good performance
Stars: ✭ 130 (-93.49%)
Nimscan🚀 Fast Port Scanner 🚀
Stars: ✭ 134 (-93.29%)
Pytorch Imagenet Cifar Coco Voc TrainingTraining examples and results for ImageNet(ILSVRC2012)/CIFAR100/COCO2017/VOC2007+VOC2012 datasets.Image Classification/Object Detection.Include ResNet/EfficientNet/VovNet/DarkNet/RegNet/RetinaNet/FCOS/CenterNet/YOLOv3.
Stars: ✭ 130 (-93.49%)
JwtxploiterA tool to test security of json web token
Stars: ✭ 130 (-93.49%)
NetwormPython network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-93.24%)
Awesome CsirtAwesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (-93.39%)
Cloud BusterA Cloudflare resolver that works
Stars: ✭ 128 (-93.59%)
DedsploitNetwork protocol auditing framework
Stars: ✭ 133 (-93.34%)
SilentbridgeSilentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.
Stars: ✭ 136 (-93.19%)
Cr3dov3rKnow the dangers of credential reuse attacks.
Stars: ✭ 1,700 (-14.87%)
DnstrickerA simple dns resolver of dns-record and web-record log server for pentesting
Stars: ✭ 128 (-93.59%)
Yolo labelGUI for marking bounded boxes of objects in images for training neural network Yolo v3 and v2 https://github.com/AlexeyAB/darknet, https://github.com/pjreddie/darknet
Stars: ✭ 128 (-93.59%)
Up Detr[CVPR2021 Oral] UP-DETR: Unsupervised Pre-training for Object Detection with Transformers
Stars: ✭ 126 (-93.69%)
Craft RemadeImplementation of CRAFT Text Detection
Stars: ✭ 127 (-93.64%)
Sqlite LabThis code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is for fun. Just enjoy it \m/
Stars: ✭ 140 (-92.99%)
Arm exploitationExploitation on ARM-based Systems (Troopers18)
Stars: ✭ 139 (-93.04%)
Wpscan V3THIS REPOSITORY HAS BEEN MOVED TO https://github.com/wpscanteam/wpscan USE THAT!!!
Stars: ✭ 132 (-93.39%)
Awesome Mobile SecurityAn effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (-8.01%)
OpennpdC++ detect and train of "A Fast and Accurate Unconstrained Face Detector".
Stars: ✭ 126 (-93.69%)
TrigmapA wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (-93.39%)
Aggressor scriptsA collection of useful scripts for Cobalt Strike
Stars: ✭ 126 (-93.69%)
AsnipASN target organization IP range attack surface mapping for reconnaissance, fast and lightweight
Stars: ✭ 126 (-93.69%)