ReconnoitreA security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+936.36%)
PanopticonA libre cross-platform disassembler.
Stars: ✭ 1,376 (+681.82%)
Hexd🔍 Colourful, human-friendly hexdump tool
Stars: ✭ 100 (-43.18%)
Itrace🍰 Trace objc method call for ios and mac
Stars: ✭ 170 (-3.41%)
TimelapseA time lapse app for Sony Alpha camera using the OpenMemories framework
Stars: ✭ 101 (-42.61%)
PortiaPortia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
Stars: ✭ 154 (-12.5%)
Apk Utilities🛠 Tools and scripts to manipulate Android APKs
Stars: ✭ 134 (-23.86%)
IdbutilLibrary and tool for reading IDApro databases.
Stars: ✭ 100 (-43.18%)
BrutesharkNetwork Analysis Tool
Stars: ✭ 1,335 (+658.52%)
MazewalkerToolkit for enriching and speeding up static malware analysis
Stars: ✭ 132 (-25%)
Aura BotnetA super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Bash, and Powershell.
Stars: ✭ 95 (-46.02%)
UrlcrazyGenerate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (-14.77%)
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-44.89%)
MgbdisGame Boy ROM disassembler with RGBDS compatible output
Stars: ✭ 131 (-25.57%)
Anno1800 Mod LoaderThe one and only mod loader for Anno 1800, supports loading of unpacked RDA files, XML merging and Python mods.
Stars: ✭ 161 (-8.52%)
Python RansomwarePython Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (-45.45%)
Buffer overflowDon't let buffer overflows overflow your mind
Stars: ✭ 131 (-25.57%)
Spykeyboardkeylogger which sends us the data to our gmail.
Stars: ✭ 95 (-46.02%)
JalescJust Another Linux Enumeration Script: A Bash script for locally enumerating a compromised Linux box
Stars: ✭ 152 (-13.64%)
Ssh MitmSSH man-in-the-middle tool
Stars: ✭ 1,328 (+654.55%)
H8mailEmail OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (+1128.98%)
FormationvideoContenus et ressources de la chaîne FormationVidéo (YouTube)
Stars: ✭ 91 (-48.3%)
Attiny85RubberDucky like payloads for DigiSpark Attiny85
Stars: ✭ 169 (-3.98%)
Evil WinrmThe ultimate WinRM shell for hacking/pentesting
Stars: ✭ 2,251 (+1178.98%)
Ida For DelphiIDA Python Script to Get All function names from Event Constructor (VCL)
Stars: ✭ 92 (-47.73%)
Privilege EscalationThis cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Stars: ✭ 2,117 (+1102.84%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+5838.07%)
CutterFree and Open Source Reverse Engineering Platform powered by rizin
Stars: ✭ 10,073 (+5623.3%)
MinesweeperA Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-7.95%)
PiroguePiRogue is a small device meant to ease network interception and analysis.
Stars: ✭ 90 (-48.86%)
JnianalyzerAnalysis scripts for Ghidra to work with Android NDK libraries.
Stars: ✭ 128 (-27.27%)
Instabruteforcehacking-tool termux-tools termux noob-friendly instagram-bot bruteforce-password-cracker wordlist-technique
Stars: ✭ 86 (-51.14%)
Container IocInversion of Control container & Dependency Injection for Javascript and Node.js apps powered by Typescript.
Stars: ✭ 89 (-49.43%)
Elf Stringself-strings will programmatically read an ELF binary's string sections within a given binary. This is meant to be much like the strings UNIX utility, however is purpose built for ELF binaries.
Stars: ✭ 127 (-27.84%)
Ble Security Attack Defence✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Stars: ✭ 88 (-50%)
Umbrella androidOpen source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to dealing with a kidnap. Umbrella has best practice guides in over 40 topics in multiple languages. Used daily by people working in high risk countries - journalists, activists, diplomats, business travelers etc.
Stars: ✭ 171 (-2.84%)
ShellpopPop shells like a master.
Stars: ✭ 1,279 (+626.7%)
DespectorJava / Kotlin Decompiler and AST Library
Stars: ✭ 126 (-28.41%)
In Spectre MeltdownThis tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-51.14%)
Frida Ios Dumppull decrypted ipa from jailbreak device
Stars: ✭ 2,223 (+1163.07%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-28.41%)
Jenkins ShellAutomating Jenkins Hacking using Shodan API
Stars: ✭ 84 (-52.27%)
HackercampEnine boyuna siber güvenlik
Stars: ✭ 149 (-15.34%)
DotnettencyMutlitenancy for dotnet applications
Stars: ✭ 100 (-43.18%)
NosqlmapAutomated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+995.45%)
Flare IdaIDA Pro utilities from FLARE team
Stars: ✭ 1,374 (+680.68%)
Hackerone LessonsTranscribed video lessons of HackerOne to pdf's
Stars: ✭ 101 (-42.61%)
IntelspyPerform automated network reconnaissance scans
Stars: ✭ 134 (-23.86%)
KeyeKeye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-42.61%)
JebscriptsA set of JEB Python/Java scripts for reverse engineering Android obfuscated code
Stars: ✭ 100 (-43.18%)
Awesome CsirtAwesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (-25%)