ElpscrkA Common User Passwords generator script that looks like the tool Eliot used it in Mr.Robot Series Episode 01 :D :v
Stars: ✭ 113 (-74.78%)
exploit-CVE-2015-3306ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container
Stars: ✭ 97 (-78.35%)
JavacodeauditGetting started with java code auditing 代码审计入门的小项目
Stars: ✭ 289 (-35.49%)
SnapBash Script For Backing Up All Files In Termux With Easy step
Stars: ✭ 90 (-79.91%)
BrutegramInstagram multi-bruteforce Platfrom
Stars: ✭ 183 (-59.15%)
OmeglemiddlemanLets you connect strangers to each other, and intercept messages AKA Man in the Middle Attack
Stars: ✭ 85 (-81.03%)
HatVenomHatVenom is a HatSploit native powerful payload generation tool that provides support for all common platforms and architectures.
Stars: ✭ 84 (-81.25%)
Beef Over WanBrowser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-81.7%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-83.93%)
Emp3r0rlinux post-exploitation framework made by linux user
Stars: ✭ 419 (-6.47%)
Chaos🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Stars: ✭ 1,168 (+160.71%)
PixiewpsAn offline Wi-Fi Protected Setup brute-force utility
Stars: ✭ 1,149 (+156.47%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+153.57%)
trolotrolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-89.96%)
BrambleBramble is a hacking Open source suite.
Stars: ✭ 60 (-86.61%)
Project TauroA Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-88.39%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+1904.69%)
smbusbUSB SMBus Interface
Stars: ✭ 93 (-79.24%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+125.22%)
LuciferA Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (-32.59%)
Swift KeyloggerKeylogger for mac written in Swift using HID
Stars: ✭ 995 (+122.1%)
ChromepassChromepass - Hacking Chrome Saved Passwords
Stars: ✭ 364 (-18.75%)
SkyratSkyRAT - Powershell Remote Administration Tool
Stars: ✭ 21 (-95.31%)
parallelizerSimplifies the parallelization of function calls.
Stars: ✭ 62 (-86.16%)
ShuffleWebShell Backdoor Framework
Stars: ✭ 11 (-97.54%)
Future🚀 R package: future: Unified Parallel and Distributed Processing in R for Everyone
Stars: ✭ 735 (+64.06%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+100.22%)
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-94.87%)
BoopsuiteA Suite of Tools written in Python for wireless auditing and security testing.
Stars: ✭ 807 (+80.13%)
Xunfeng巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Stars: ✭ 3,131 (+598.88%)
TrapePeople tracker on the Internet: OSINT analysis and research tool by Jose Pino
Stars: ✭ 6,753 (+1407.37%)
vbulletin5-rceCVE-2019-16759 vbulletin 5.0.0 till 5.5.4 pre-auth rce
Stars: ✭ 21 (-95.31%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+70.54%)
AdbNetA tool that allows you to search for vulnerable android devices across the world and exploit them.
Stars: ✭ 112 (-75%)
InterlaceEasily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+69.64%)
CVE-2019-7609RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer
Stars: ✭ 47 (-89.51%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+61.83%)
DirsearchWeb path scanner
Stars: ✭ 7,246 (+1517.41%)
boxerBoxer: A fast directory bruteforce tool written in Python with concurrency.
Stars: ✭ 15 (-96.65%)
Jok3rJok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (+43.97%)
trjExecute any command in other's computer using a trojan horse coded and compiled in C. Just for educational purpose.
Stars: ✭ 21 (-95.31%)
Powershell RatPython based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+41.96%)
DLL-INJECTORI created a dll injector I am going to Open source its Code. But remember one thing that is any one can use it only for Educational purpose .I again say do not use it to damage anyone's Computer.But one thing if you are using it for some good purpose like to help someone who really need help then I permit you to use it.
Stars: ✭ 14 (-96.87%)
PixloadImage Payload Creating/Injecting tools
Stars: ✭ 586 (+30.8%)
Hackbar2.1.3the free firefox extions of hackbar v2.1.3 v2.2.9 v2.3.1,hackbar 插件未收费的免费版本。适用于chrome浏览器的HackBar-v2.2.6.zip,HackBar-v2.3.1.zip
Stars: ✭ 276 (-38.39%)
JARJust Another Repo
Stars: ✭ 53 (-88.17%)
Icg AutoexploiterbotWordpress 🔥 Joomla 🔥 Drupal 🔥 OsCommerce 🔥 Prestashop 🔥 Opencart 🔥
Stars: ✭ 242 (-45.98%)
TangalangaTangalanga: the Zoom conference scanner hacking tool
Stars: ✭ 236 (-47.32%)
exploitsSome of my public exploits
Stars: ✭ 50 (-88.84%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (-4.69%)
CovertutilsA framework for Backdoor development!
Stars: ✭ 424 (-5.36%)
HellraiserVulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (-7.81%)
EqgrpDecrypted content of eqgrp-auction-file.tar.xz
Stars: ✭ 3,743 (+735.49%)
CtftoolsPersonal CTF Toolkit
Stars: ✭ 312 (-30.36%)