MemoryjsRead and write process memory in Node.js (Windows API functions exposed via Node bindings)
Stars: ✭ 371 (-9.73%)
Dll hook RsRust code to show how hooking in rust with a dll works.
Stars: ✭ 57 (-86.13%)
YsfYSF Server Functions
Stars: ✭ 77 (-81.27%)
Arch极客时间专栏《许式伟的架构课》相关的源代码:冯诺伊曼结构
Stars: ✭ 335 (-18.49%)
Cve 2019 07083389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)
Stars: ✭ 350 (-14.84%)
Awesome Cyber SecurityA collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
Stars: ✭ 333 (-18.98%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-7.06%)
Ctf Writeups PublicWriteups for infosec Capture the Flag events by team Galaxians
Stars: ✭ 331 (-19.46%)
W5Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (-10.71%)
PivotsuiteNetwork Pivoting Toolkit
Stars: ✭ 329 (-19.95%)
Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (-14.11%)
IpapatchPatch iOS Apps, The Easy Way, Without Jailbreak.
Stars: ✭ 3,837 (+833.58%)
Vaultswiss army knife for hackers
Stars: ✭ 346 (-15.82%)
Xeexe TopantivirusevasionUndetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (-5.84%)
CtfCTF (Capture The Flag) writeups, code snippets, notes, scripts
Stars: ✭ 336 (-18.25%)
ZinesMirror of my favourite hacking Zines for the lulz, nostalgy, and reference
Stars: ✭ 370 (-9.98%)
Memeye👀 The eye of memory. A lightweight memory monitor and dashboard for Node.js application on development.
Stars: ✭ 332 (-19.22%)
ArchstrikeAn Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (-2.43%)
K8toolsK8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Stars: ✭ 4,173 (+915.33%)
EqgrpDecrypted content of eqgrp-auction-file.tar.xz
Stars: ✭ 3,743 (+810.71%)
VajraVajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (-34.55%)
TaipanWeb application vulnerability scanner
Stars: ✭ 359 (-12.65%)
RichkwareFramework for building Windows malware, written in C++
Stars: ✭ 315 (-23.36%)
Swap digger swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (-13.87%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+912.65%)
Proxy ListGet PROXY List that gets updated everyday
Stars: ✭ 347 (-15.57%)
NmapIdiomatic nmap library for go developers
Stars: ✭ 391 (-4.87%)
Rustscan🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+1169.59%)
Lmdb EmbeddingsFast word vectors with little memory usage in Python
Stars: ✭ 404 (-1.7%)
Technical WhitepapersCollection of IT whitepapers, presentations, pdfs; hacking, web app security, db, reverse engineering and more; EN/PL.
Stars: ✭ 359 (-12.65%)
CtftoolsPersonal CTF Toolkit
Stars: ✭ 312 (-24.09%)
Ctf DifficultyThis cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.
Stars: ✭ 338 (-17.76%)
Tradfri HackingHacking IKEA TRÅDFRI products, such as light bulbs, window blinds and other accessories.
Stars: ✭ 367 (-10.71%)
Socialbox TermuxSocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By init__0 for termux on android
Stars: ✭ 324 (-21.17%)
PigA Linux packet crafting tool.
Stars: ✭ 384 (-6.57%)
BillcipherInformation Gathering tool for a Website or IP address
Stars: ✭ 332 (-19.22%)
ChromepassChromepass - Hacking Chrome Saved Passwords
Stars: ✭ 364 (-11.44%)
Offensive DockerOffensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-20.19%)
ApkurlgrepExtract endpoints from APK files
Stars: ✭ 405 (-1.46%)
MalconfscanVolatility plugin for extracts configuration data of known malware
Stars: ✭ 327 (-20.44%)
PidusageCross-platform process cpu % and memory usage of a PID
Stars: ✭ 364 (-11.44%)
Langhost👻 A LAN dropbox chatbot controllable via Telegram
Stars: ✭ 324 (-21.17%)
Email2phonenumberA OSINT tool to obtain a target's phone number just by having his email address
Stars: ✭ 379 (-7.79%)
AirgeddonThis is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (+831.87%)
AnymethodlogLog any method call of object in Objective-C
Stars: ✭ 361 (-12.17%)
OsintgramOsintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Stars: ✭ 312 (-24.09%)
Ghost👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (-24.09%)
Ssrf vulnerable labThis Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Stars: ✭ 361 (-12.17%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+1302.19%)
PocAdvisories, proof of concept files and exploits that have been made public by @pedrib.
Stars: ✭ 376 (-8.52%)
Awesome Sec TalksA collected list of awesome security talks
Stars: ✭ 3,411 (+729.93%)
HellraiserVulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (+0.49%)
PacketwhisperPacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (-1.46%)
ParadoxiaratParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (-3.89%)