AnubisFree open-source training software / cheat for Counter-Strike: Global Offensive, written in C.
Stars: ✭ 81 (-53.98%)
BlackwormBlack Worm Offical Repo
Stars: ✭ 80 (-54.55%)
WascanWAScan - Web Application Scanner
Stars: ✭ 1,895 (+976.7%)
Slideswon't maintain
Stars: ✭ 79 (-55.11%)
Openmf ArchivedAbandoned C++ version. Contains useful format utils and parsers.
Stars: ✭ 123 (-30.11%)
Webhackersweapons⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 1,205 (+584.66%)
N00bratRemote Administration Toolkit (or Trojan) for POSiX (Linux/Unix) system working as a Web Service
Stars: ✭ 148 (-15.91%)
Botw Re NotesReverse engineering notes and tools for The Legend of Zelda: Breath of the Wild
Stars: ✭ 78 (-55.68%)
TelekillerA Tools Session Hijacking And Stealer Local Passcode Telegram Windows
Stars: ✭ 122 (-30.68%)
HacktricksWelcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Stars: ✭ 3,741 (+2025.57%)
YsfYSF Server Functions
Stars: ✭ 77 (-56.25%)
WechatspellbookWechat Spellbook 是一个使用Kotlin编写的开源微信插件框架,底层需要 Xposed 或 VirtualXposed 等Hooking框架的支持,而顶层可以轻松对接Java、Kotlin、Scala等JVM系语言。让程序员能够在几分钟内编写出简单的微信插件,随意揉捏微信的内部逻辑。
Stars: ✭ 1,584 (+800%)
DikitDependency Injection Framework for Swift, inspired by KOIN.
Stars: ✭ 77 (-56.25%)
Ida gelA collection of IDA loaders for various game console ELF's. (PS3, PSVita, WiiU)
Stars: ✭ 76 (-56.82%)
PuresharpPuresharp is a Framework that provides the essential APIs (AOP, IOC, etc...) to productively build high quality (.NET 4.5.2+ & .NET Core 2.1+) applications through reliability, scalability and performance without no compromise
Stars: ✭ 120 (-31.82%)
Burp Bounty ProfilesBurp Bounty profiles compilation, feel free to contribute!
Stars: ✭ 76 (-56.82%)
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+575%)
GofingerprintGoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fingerprints.
Stars: ✭ 120 (-31.82%)
StuffUnsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
Stars: ✭ 146 (-17.05%)
SeginfofaqFAQ del mundo de la seguridad informática en español.
Stars: ✭ 73 (-58.52%)
CtftoolInteractive CTF Exploration Tool
Stars: ✭ 1,563 (+788.07%)
App PeidPEiD detects most common packers, cryptors and compilers for PE files.
Stars: ✭ 72 (-59.09%)
JsshellJSshell - JavaScript reverse/remote shell
Stars: ✭ 167 (-5.11%)
Lor Axe🪓 a multi-threaded, low-bandwidth HTTP DOS tool
Stars: ✭ 72 (-59.09%)
GoaltdnsA permutation generation tool written in golang
Stars: ✭ 119 (-32.39%)
D2s FormatDiablo II Save File Format (.d2s format)
Stars: ✭ 71 (-59.66%)
Netmap.jsFast browser-based network discovery module
Stars: ✭ 70 (-60.23%)
AppmonDocumentation:
Stars: ✭ 1,157 (+557.39%)
UddbgA gdb like debugger that provide a runtime env to unicorn emulator and additionals features!
Stars: ✭ 159 (-9.66%)
PillagerPillage filesystems for sensitive information with Go.
Stars: ✭ 64 (-63.64%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-34.09%)
Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (-61.93%)
SteamkitSteamKit2 is a .NET library designed to interoperate with Valve's Steam network. It aims to provide a simple, yet extensible, interface to perform various actions on the network.
Stars: ✭ 1,926 (+994.32%)
FishchatHook WeChat.app on non-jailbroken devices.
Stars: ✭ 1,139 (+547.16%)
Remote Desktop CachingThis tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: ✭ 171 (-2.84%)
XshockXSHOCK Shellshock Exploit
Stars: ✭ 65 (-63.07%)
Imhex🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Stars: ✭ 11,744 (+6572.73%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+543.18%)
DustcloudXiaomi Smart Home Device Reverse Engineering and Hacking
Stars: ✭ 1,907 (+983.52%)
DotnettencyMutlitenancy for dotnet applications
Stars: ✭ 100 (-43.18%)
SojoboA binary analysis framework
Stars: ✭ 116 (-34.09%)
ReflexilThe .NET Assembly Editor
Stars: ✭ 1,117 (+534.66%)
NosqlmapAutomated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+995.45%)
Flare IdaIDA Pro utilities from FLARE team
Stars: ✭ 1,374 (+680.68%)
Hackerone LessonsTranscribed video lessons of HackerOne to pdf's
Stars: ✭ 101 (-42.61%)
IntelspyPerform automated network reconnaissance scans
Stars: ✭ 134 (-23.86%)
KeyeKeye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-42.61%)
JebscriptsA set of JEB Python/Java scripts for reverse engineering Android obfuscated code
Stars: ✭ 100 (-43.18%)
Awesome CsirtAwesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (-25%)
NgrevTool for reverse engineering of Angular applications
Stars: ✭ 1,368 (+677.27%)