Andrax Mobile PentestANDRAX The first and unique Penetration Testing platform for Android smartphones
Stars: ✭ 394 (+80.73%)
Zbn安全编排与自动化响应平台
Stars: ✭ 201 (-7.8%)
ApicheckThe DevSecOps toolset for REST APIs
Stars: ✭ 184 (-15.6%)
BotnetsThis is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY
Stars: ✭ 2,523 (+1057.34%)
Rebel FrameworkAdvanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (-16.06%)
MemtriageAllows you to quickly query a Windows machine for RAM artifacts
Stars: ✭ 200 (-8.26%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-16.51%)
Open MyrtusRCEed version of computer malware / rootkit MyRTUs / Stuxnet.
Stars: ✭ 208 (-4.59%)
Windows HacksCreative and unusual things that can be done with the Windows API.
Stars: ✭ 2,171 (+895.87%)
FdsploitFile Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (-8.72%)
Unstoppable Wallet IosA secure and decentralized Bitcoin and other cryptocurrency wallet for iPhone. Supports Bitcoin, Ethereum, EOS, Binance Chain, Bitcoin Cash, DASH, ...
Stars: ✭ 180 (-17.43%)
Stormkitty🔑 Open source stealer written on C#, all logs will be sent to Telegram bot.
Stars: ✭ 198 (-9.17%)
Nntpchannntp based decentralized imageboard
Stars: ✭ 179 (-17.89%)
CypherPythonic ransomware proof of concept.
Stars: ✭ 178 (-18.35%)
Trisis Triton HatmanRepository containting original and decompiled files of TRISIS/TRITON/HATMAN malware
Stars: ✭ 178 (-18.35%)
Ladon大型内网渗透扫描器&Cobalt Strike,Ladon8.9内置120个模块,包含信息收集/存活主机/端口扫描/服务识别/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010/SMBGhost/Weblogic/ActiveMQ/Tomcat/Struts2,密码口令爆破(Mysql/Oracle/MSSQL)/FTP/SSH(Linux)/VNC/Windows(IPC/WMI/SMB/Netbios/LDAP/SmbHash/WmiHash/Winrm),远程执行命令(smbexec/wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0
Stars: ✭ 2,911 (+1235.32%)
UniversalropSmall tool for generating ropchains using unicorn and z3
Stars: ✭ 196 (-10.09%)
Facebook CrackerFacebook Cracker Version 1.0 can crack into Facebook Database 100% without Interruption By Facebook Firewall
Stars: ✭ 171 (-21.56%)
LisaSandbox for automated Linux malware analysis.
Stars: ✭ 177 (-18.81%)
Asufacebook hacking toolkit
Stars: ✭ 197 (-9.63%)
StegcloakHide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
Stars: ✭ 2,379 (+991.28%)
MemjectSimple Dll injector loading from memory. Supports PE header and entry point erasure. Written in C99.
Stars: ✭ 176 (-19.27%)
DjangohunterTool designed to help identify incorrectly configured Django applications that are exposing sensitive information.
Stars: ✭ 212 (-2.75%)
EnergizedprotectionA merged collection of hosts from reputable sources. #StayEnergized!
Stars: ✭ 175 (-19.72%)
Jwt Hack🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)
Stars: ✭ 172 (-21.1%)
MosintAn automated e-mail OSINT tool
Stars: ✭ 184 (-15.6%)
AnteaterAnteater - CI/CD Gate Check Framework
Stars: ✭ 174 (-20.18%)
Trojan R轻量高效的 Trojan 代理,使用 Rust 实现
Stars: ✭ 174 (-20.18%)
WhatcmsCMS Detection and Exploit Kit based on Whatcms.org API
Stars: ✭ 205 (-5.96%)
FacebashFacebook Brute Forcer in shellscript using TOR
Stars: ✭ 195 (-10.55%)
HacktricksWelcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Stars: ✭ 3,741 (+1616.06%)
Antiddos System🛡️⚔️ Protect your web app from DDOS attack or the Dead Ping + CAPTCHA VERIFICATION in one line!
Stars: ✭ 173 (-20.64%)
3box Js3Box JavaScript SDK: User identities, storage, messaging
Stars: ✭ 195 (-10.55%)
EvasionsEvasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.
Stars: ✭ 173 (-20.64%)
RaccoonA high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+960.55%)
Xss LoaderXss Payload Generator ~ Xss Scanner ~ Xss Dork Finder
Stars: ✭ 215 (-1.38%)
BrutedumBruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack
Stars: ✭ 212 (-2.75%)
IkyOSINT Project
Stars: ✭ 203 (-6.88%)
V2raycloudspider采集免费、优质的机场订阅连接;科学上网,从娃娃抓起!/SSR/V2RAY/TROJAN/SPIDER
Stars: ✭ 189 (-13.3%)
Umbrella androidOpen source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to dealing with a kidnap. Umbrella has best practice guides in over 40 topics in multiple languages. Used daily by people working in high risk countries - journalists, activists, diplomats, business travelers etc.
Stars: ✭ 171 (-21.56%)
Remote Desktop CachingThis tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: ✭ 171 (-21.56%)
LockphishLockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.
Stars: ✭ 186 (-14.68%)
MediumIndependent telecommunication environment
Stars: ✭ 171 (-21.56%)
TechnowloggerTechNowLogger is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info
Stars: ✭ 172 (-21.1%)
Effective ShellText, samples and website for my 'Effective Shell' series.
Stars: ✭ 204 (-6.42%)
QilingQiling Advanced Binary Emulation Framework
Stars: ✭ 2,816 (+1191.74%)
MobilehackersweaponsMobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 170 (-22.02%)
Itrace🍰 Trace objc method call for ios and mac
Stars: ✭ 170 (-22.02%)
HrshellHRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (-11.47%)
Cehv10 Notes📕 Both personal and public notes for EC-Council's CEHv10 312-50, because its thousands of pages/slides of boredom, and a braindump to many
Stars: ✭ 170 (-22.02%)
Attiny85RubberDucky like payloads for DigiSpark Attiny85
Stars: ✭ 169 (-22.48%)
T LoadNew Interface And Loading Screen For Termux Users
Stars: ✭ 207 (-5.05%)
O365reconretrieve information via O365 with a valid cred
Stars: ✭ 204 (-6.42%)
Awesome BbhtA bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-12.84%)
Misp TaxonomiesTaxonomies used in MISP taxonomy system and can be used by other information sharing tool.
Stars: ✭ 168 (-22.94%)