Sqli HunterSQLi-Hunter is a simple HTTP / HTTPS proxy server and a SQLMAP API wrapper that makes digging SQLi easy.
Stars: ✭ 340 (-60.56%)
DevBrute-A Password Brute ForcerDevBrute is a Password Brute Forcer, It can Brute Force almost all Social Media Accounts or Any Web Application.
Stars: ✭ 91 (-89.44%)
BlisqyVersion 0.2 - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB).
Stars: ✭ 179 (-79.23%)
BlazyBlazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .
Stars: ✭ 637 (-26.1%)
SqlmapAutomatic SQL injection and database takeover tool
Stars: ✭ 21,907 (+2441.42%)
DbshieldDatabase firewall written in Go
Stars: ✭ 620 (-28.07%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (-15.55%)
SamplesSteeltoe samples and reference application collection
Stars: ✭ 586 (-32.02%)
Heap ViewerAn IDA Pro plugin to examine the glibc heap, focused on exploit development
Stars: ✭ 574 (-33.41%)
WindowsAwesome tools to exploit Windows !
Stars: ✭ 816 (-5.34%)
NmapNmap - the Network Mapper. Github mirror of official SVN repository.
Stars: ✭ 5,792 (+571.93%)
RpcxBest microservices framework in Go, like alibaba Dubbo, but with more features, Scale easily. Try it. Test it. If you feel it's better, use it! 𝐉𝐚𝐯𝐚有𝐝𝐮𝐛𝐛𝐨, 𝐆𝐨𝐥𝐚𝐧𝐠有𝐫𝐩𝐜𝐱!
Stars: ✭ 6,516 (+655.92%)
JanusecJanusec Application Gateway, Provides Fast and Secure Application Delivery. JANUSEC应用网关,提供快速、安全的应用交付。
Stars: ✭ 771 (-10.56%)
AttifyosAttify OS - Distro for pentesting IoT devices
Stars: ✭ 615 (-28.65%)
BrutedetGeneralized proof of concept tool which can be used for drop-in bruteforce protection when needed.
Stars: ✭ 5 (-99.42%)
Cve 2019 11708Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.
Stars: ✭ 581 (-32.6%)
Paper collectionAcademic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
Stars: ✭ 710 (-17.63%)
Damn Vulnerable Graphql ApplicationDamn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
Stars: ✭ 567 (-34.22%)
Jsql InjectionjSQL Injection is a Java application for automatic SQL database injection.
Stars: ✭ 891 (+3.36%)
ServerscanServerScan一款使用Golang开发的高并发网络扫描、服务探测工具。
Stars: ✭ 674 (-21.81%)
Cheetaha very fast brute force webshell password tool
Stars: ✭ 509 (-40.95%)
Exploit WriteupsA collection where my current and future writeups for exploits/CTF will go
Stars: ✭ 676 (-21.58%)
Upash🔒Unified API for password hashing algorithms
Stars: ✭ 484 (-43.85%)
EsdEnumeration sub domains(枚举子域名)
Stars: ✭ 785 (-8.93%)
LinkerdOld repo for Linkerd 1.x. See the linkerd2 repo for Linkerd 2.x.
Stars: ✭ 5,382 (+524.36%)
Fsocietyfsociety Hacking Tools Pack – A Penetration Testing Framework
Stars: ✭ 7,224 (+738.05%)
HerpaderpingProcess Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (-28.77%)
BinexpLinux Binary Exploitation
Stars: ✭ 742 (-13.92%)
SteeltoeSteeltoe .NET Core Components: CircuitBreaker, Configuration, Connectors, Discovery, Logging, Management, and Security
Stars: ✭ 612 (-29%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+4.06%)
Docker AlpineDocker containers running Alpine Linux and s6 for process management. Solid, reliable containers.
Stars: ✭ 574 (-33.41%)
AtscanAdvanced dork Search & Mass Exploit Scanner
Stars: ✭ 817 (-5.22%)
DvwaDamn Vulnerable Web Application (DVWA)
Stars: ✭ 5,727 (+564.39%)
Zeus ScannerAdvanced reconnaissance utility
Stars: ✭ 706 (-18.1%)
Sample Spring Microservices NewDemo for Spring Boot 2 and Spring Cloud microservices with distributed configuration (Spring Cloud Config), service discovery (Eureka), API gateway (Spring Cloud Gateway, Zuul), Swagger2 API documentation, logs correlation using Spring Cloud Sleuth and many more
Stars: ✭ 559 (-35.15%)
ConsulConsul is a distributed, highly available, and data center aware solution to connect and configure applications across dynamic, distributed infrastructure.
Stars: ✭ 23,723 (+2652.09%)
Ssh AuditorThe best way to scan for weak ssh passwords on your network
Stars: ✭ 516 (-40.14%)
LfFully Decentralized Fully Replicated Key/Value Store
Stars: ✭ 809 (-6.15%)
MxtractmXtract - Memory Extractor & Analyzer
Stars: ✭ 499 (-42.11%)
DirsearchWeb path scanner
Stars: ✭ 7,246 (+740.6%)
RegistratorService registry bridge for Docker with pluggable adapters
Stars: ✭ 4,558 (+428.77%)
SsbSecure Shell Bruteforcer — A faster & simpler way to bruteforce SSH server
Stars: ✭ 832 (-3.48%)
RizinUNIX-like reverse engineering framework and command-line toolset.
Stars: ✭ 673 (-21.93%)
Scalecube ServicesScaleCube Services is a high throughput, low latency reactive microservices library built to scale. it features: API-Gateways, service-discovery, service-load-balancing, the architecture supports plug-and-play service communication modules and features. built to provide performance and low-latency real-time stream-processing. its open and designed to accommodate changes. (no sidecar in a form of broker or any kind)
Stars: ✭ 482 (-44.08%)
Dns Proxy ServerSolve your DNS hosts from your docker containers, then from your local configuration, then from internet
Stars: ✭ 480 (-44.32%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+799.3%)
Exploit meVery vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
Stars: ✭ 665 (-22.85%)
Dora RpcDoraRPC is an RPC For the PHP MicroService by The Swoole
Stars: ✭ 475 (-44.9%)
MbeCourse materials for Modern Binary Exploitation by RPISEC
Stars: ✭ 4,674 (+442.23%)
TseerA high available service discovery & registration & fault-tolerance framework
Stars: ✭ 665 (-22.85%)
Sqlivmassive SQL injection vulnerability scanner
Stars: ✭ 840 (-2.55%)