TwitterxKeeping Twitter for macOS alive with code injection
Stars: ✭ 187 (+114.94%)
AtlasQuick SQLMap Tamper Suggester
Stars: ✭ 679 (+680.46%)
MemjectSimple Dll injector loading from memory. Supports PE header and entry point erasure. Written in C99.
Stars: ✭ 176 (+102.3%)
HrshellHRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (+121.84%)
B1tifissh management tool to provides commandline access to a remote system running SSH server
Stars: ✭ 65 (-25.29%)
DikitDependency Injection Framework for Swift, inspired by KOIN.
Stars: ✭ 77 (-11.49%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+1201.15%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-28.74%)
Movies For Hackers🎬 A curated list of movies every hacker & cyberpunk must watch.
Stars: ✭ 8,884 (+10111.49%)
WebwhatsappbotCore to automatize whatsapp - working 11/2018
Stars: ✭ 59 (-32.18%)
GithacktoolsThe best Hacking and PenTesting tools installer on the world
Stars: ✭ 78 (-10.34%)
XshockXSHOCK Shellshock Exploit
Stars: ✭ 65 (-25.29%)
Geo ReconAn OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts.
Stars: ✭ 82 (-5.75%)
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-27.59%)
Burp Bounty ProfilesBurp Bounty profiles compilation, feel free to contribute!
Stars: ✭ 76 (-12.64%)
PyhawkSearches the directory of choice for interesting files. Such as database files and files with passwords stored on them
Stars: ✭ 60 (-31.03%)
Jenkins ShellAutomating Jenkins Hacking using Shodan API
Stars: ✭ 84 (-3.45%)
DeadtrapAn OSINT tool to gather information about the real owner of a phone number
Stars: ✭ 73 (-16.09%)
PapersPapers about known hacking, security, hardware, software, computer, network and other ressources.
Stars: ✭ 58 (-33.33%)
Kill RouterFerramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-34.48%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-9.2%)
Lor Axe🪓 a multi-threaded, low-bandwidth HTTP DOS tool
Stars: ✭ 72 (-17.24%)
PcsgolhPCSGOLH - Pointless Counter-Strike: Global Offensive Lua Hooks. A open-source Lua API for CS:GO hacking written in modern C++
Stars: ✭ 56 (-35.63%)
PillagerPillage filesystems for sensitive information with Go.
Stars: ✭ 64 (-26.44%)
Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (-22.99%)
Gitjacker🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (+1335.63%)
Rhme 2017Riscure Hack Me embedded hardware CTF 2017-2018.
Stars: ✭ 65 (-25.29%)
YsfYSF Server Functions
Stars: ✭ 77 (-11.49%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+1205.75%)
One Lin3rGives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+1347.13%)
Knowledge Basepdf,txt,djvu, various useful books
Stars: ✭ 63 (-27.59%)
Griefing MethodsA documentation about how to hack Minecraft servers
Stars: ✭ 76 (-12.64%)
ReflexilThe .NET Assembly Editor
Stars: ✭ 1,117 (+1183.91%)
Beef Over WanBrowser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-5.75%)
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+1265.52%)
In Spectre MeltdownThis tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-1.15%)
Dyci MainDynamic Code Injection Tool for Objective-C
Stars: ✭ 1,103 (+1167.82%)
SeginfofaqFAQ del mundo de la seguridad informática en español.
Stars: ✭ 73 (-16.09%)
HackphilesBruteForce Tool For both Instagram and Facebook
Stars: ✭ 57 (-34.48%)
BlackwormBlack Worm Offical Repo
Stars: ✭ 80 (-8.05%)
PoodinisA dependency injection framework for D with support for autowiring.
Stars: ✭ 57 (-34.48%)
SandmapNmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (+1256.32%)
Dll hook RsRust code to show how hooking in rust with a dll works.
Stars: ✭ 57 (-34.48%)
WheelchairAn introduction to the battle between JavaScript cheats and anti cheats.
Stars: ✭ 84 (-3.45%)
WhitehatInformation about my experiences on ethical hacking 💀
Stars: ✭ 54 (-37.93%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-17.24%)
JaelesThe Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+1133.33%)
SpellbookMicro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-39.08%)
Webhackersweapons⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 1,205 (+1285.06%)
Chaos🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Stars: ✭ 1,168 (+1242.53%)
Project TauroA Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-40.23%)
ShellshockhunterIt's a simple tool for test vulnerability shellshock
Stars: ✭ 52 (-40.23%)