PillagerPillage filesystems for sensitive information with Go.
Stars: ✭ 64 (-26.44%)
Best Hacking ToolsBEST HACKING TOOLS..For more tools visit our blog for Hackers
Stars: ✭ 46 (-47.13%)
Cfw2ofw HelperProviding aid in converting video games.
Stars: ✭ 44 (-49.43%)
Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (-22.99%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+1059.77%)
Gitjacker🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (+1335.63%)
KeyloggerA simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (+1057.47%)
Rhme 2017Riscure Hack Me embedded hardware CTF 2017-2018.
Stars: ✭ 65 (-25.29%)
YsfYSF Server Functions
Stars: ✭ 77 (-11.49%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+1205.75%)
ReconftwreconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+1019.54%)
One Lin3rGives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+1347.13%)
PowerladonLadon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Stars: ✭ 39 (-55.17%)
Knowledge Basepdf,txt,djvu, various useful books
Stars: ✭ 63 (-27.59%)
Wifi duckyUpload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4
Stars: ✭ 991 (+1039.08%)
Griefing MethodsA documentation about how to hack Minecraft servers
Stars: ✭ 76 (-12.64%)
PinceA reverse engineering tool that'll supply the place of Cheat Engine for linux
Stars: ✭ 987 (+1034.48%)
ReflexilThe .NET Assembly Editor
Stars: ✭ 1,117 (+1183.91%)
100 Days Of Swiftui👨💻👩💻100 Days Of SwiftUI free course from Hacking with Swift. 👨💻👩💻
Stars: ✭ 35 (-59.77%)
Beef Over WanBrowser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-5.75%)
Spytrojan keylogger[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-63.22%)
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+1265.52%)
Tiny.scatterScatter compatible eos injection library
Stars: ✭ 31 (-64.37%)
Reverse EngineeringThis repository contains some of the executables that I've cracked.
Stars: ✭ 29 (-66.67%)
In Spectre MeltdownThis tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-1.15%)
Tic TacClient not paid ? This is the solution of your problem
Stars: ✭ 29 (-66.67%)
Dyci MainDynamic Code Injection Tool for Objective-C
Stars: ✭ 1,103 (+1167.82%)
CatchmeCatchME - WiFi Fun Box "Having Fun with ESP8266"
Stars: ✭ 28 (-67.82%)
SeginfofaqFAQ del mundo de la seguridad informática en español.
Stars: ✭ 73 (-16.09%)
EmcThe EMC Framework (Easy Minecraft Client) - An easy to use Minecraft modding framework
Stars: ✭ 21 (-75.86%)
HackphilesBruteForce Tool For both Instagram and Facebook
Stars: ✭ 57 (-34.48%)
WsshWSSH Is a tool for brute forcing servers that has port 22 open via ssh, wssh is probably the fastest ssh brute forcer available
Stars: ✭ 21 (-75.86%)
BlackwormBlack Worm Offical Repo
Stars: ✭ 80 (-8.05%)
PoodinisA dependency injection framework for D with support for autowiring.
Stars: ✭ 57 (-34.48%)
Drv3 Tools(Not actively maintained, use DRV3-Sharp) Tools for extracting and re-injecting files for Danganronpa V3 for PC.
Stars: ✭ 13 (-85.06%)
SandmapNmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (+1256.32%)
Kubernetes GoatKubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
Stars: ✭ 868 (+897.7%)
Dll hook RsRust code to show how hooking in rust with a dll works.
Stars: ✭ 57 (-34.48%)
DracnmapDracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+889.66%)
WheelchairAn introduction to the battle between JavaScript cheats and anti cheats.
Stars: ✭ 84 (-3.45%)
V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+873.56%)
WhitehatInformation about my experiences on ethical hacking 💀
Stars: ✭ 54 (-37.93%)
Pwn jenkinsNotes about attacking Jenkins servers
Stars: ✭ 841 (+866.67%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-17.24%)
SpellbookMicro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-39.08%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+931.03%)
Webhackersweapons⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 1,205 (+1285.06%)
Jsql InjectionjSQL Injection is a Java application for automatic SQL database injection.
Stars: ✭ 891 (+924.14%)
Netmap.jsFast browser-based network discovery module
Stars: ✭ 70 (-19.54%)
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-41.38%)
Pythempentest framework
Stars: ✭ 1,060 (+1118.39%)
ShellshockhunterIt's a simple tool for test vulnerability shellshock
Stars: ✭ 52 (-40.23%)