warfWARF is a Web Application Reconnaissance Framework that helps to gather information about the target.
Stars: ✭ 53 (-60.45%)
Reconky-Automated Bash ScriptReconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (+24.63%)
TokenBreakerJSON RSA to HMAC and None Algorithm Vulnerability POC
Stars: ✭ 51 (-61.94%)
Hacking-P-Bthe only place u can acquire knowledge
Stars: ✭ 109 (-18.66%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-44.03%)
RC-exploiterNOT SUPORTED ANYMORE -- try resource_files repository (mosquito)
Stars: ✭ 50 (-62.69%)
BackToMeLittle tool made in python to create payloads for Linux, Windows and OSX with unique handler
Stars: ✭ 61 (-54.48%)
book-note📖 book note,读书笔记
Stars: ✭ 21 (-84.33%)
ebooks计算机黑皮书、超清超高质量编程电子书 🔥
Stars: ✭ 86 (-35.82%)
centCommunity edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place
Stars: ✭ 315 (+135.07%)
mybook书单
Stars: ✭ 124 (-7.46%)
litLiterature for the self-taught AI practitioner! 📚
Stars: ✭ 199 (+48.51%)
Dark-PhishDark-Phish is a complete phishing tool. For more about Dark-Phish tool please visit the website.
Stars: ✭ 57 (-57.46%)
BookSploreA place for you to explore books with your friends!
Stars: ✭ 24 (-82.09%)
pentest-toolsGeneral stuff for pentesting - password cracking, phishing, automation, Kali, etc.
Stars: ✭ 52 (-61.19%)
argusArgus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (-35.07%)
WPCrackerWordPress pentest tool
Stars: ✭ 34 (-74.63%)
teatimeAn RPC attack framework for Blockchain nodes.
Stars: ✭ 88 (-34.33%)
books电子书(计算机类,经济学,数学), 格式,pdf、mobi、epub
Stars: ✭ 804 (+500%)
goLazagneGo library for credentials recovery
Stars: ✭ 177 (+32.09%)
bug-bountyMy personal bug bounty toolkit.
Stars: ✭ 127 (-5.22%)
dproofreadersDistributed Proofreaders is a web application intended to ease the process of converting public domain books into e-texts.
Stars: ✭ 35 (-73.88%)
cummings.eeA collection of the work of Edward Estlin Cummings, as it enters the public domain.
Stars: ✭ 32 (-76.12%)
BestGifts for Programmers
Stars: ✭ 22 (-83.58%)
a-physical-bookFor National Novel Generation Month 2017
Stars: ✭ 72 (-46.27%)
domhttpxdomhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time.
Stars: ✭ 59 (-55.97%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (+348.51%)
STEWSA Security Tool for Enumerating WebSockets
Stars: ✭ 154 (+14.93%)
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-82.84%)
CamRaptorCamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.
Stars: ✭ 106 (-20.9%)
urldedupePass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
Stars: ✭ 208 (+55.22%)
Offensive-Security-CayuqueoScripts usados en mi formación de Offensive Security por medio de la suscripción Learn Unlimited
Stars: ✭ 14 (-89.55%)
peniotPENIOT: Penetration Testing Tool for IoT
Stars: ✭ 164 (+22.39%)
Gen2KindleSearch, download, convert and send files directly to your kindle from Libgen in one place.
Stars: ✭ 21 (-84.33%)
learn perl onelinersExample based guide for text processing with perl from the command line
Stars: ✭ 63 (-52.99%)
book-notes📖Notes on books and other things I'm reading 📖
Stars: ✭ 43 (-67.91%)
pwn-pulseExploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Stars: ✭ 126 (-5.97%)
booksIT books in Chinese.
Stars: ✭ 54 (-59.7%)
programming-book-3Programming books 3: Python、 Machine-Learning、 Deep-Learning、 NLP
Stars: ✭ 89 (-33.58%)
reverse-sshStatically-linked ssh server with reverse shell functionality for CTFs and such
Stars: ✭ 548 (+308.96%)
AlfredA friendly Toolkit for Beginner CTF players
Stars: ✭ 39 (-70.9%)
huntkitDocker - Ubuntu with a bunch of PenTesting tools and wordlists
Stars: ✭ 51 (-61.94%)
BiB📚 Library Management Application for Elementary Schools
Stars: ✭ 38 (-71.64%)
Red-Rabbit-V4The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate other peoples tools like the aircrack suite or the wifite framework, it rather has its own code and is raw source with over 270+ options. This framework might just be your everyday key to your workflow
Stars: ✭ 123 (-8.21%)
graphw00fgraphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology is behind a given GraphQL endpoint.
Stars: ✭ 260 (+94.03%)
boxerBoxer: A fast directory bruteforce tool written in Python with concurrency.
Stars: ✭ 15 (-88.81%)
IMAPLoginTesterA simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by trying to login on IMAP servers.
Stars: ✭ 47 (-64.93%)
FYIMy last 10 year's material collection on offensive & defensive security, GRC, risk management, technical security guidelines and much more.
Stars: ✭ 194 (+44.78%)