Lpecollection of verified Linux kernel exploits
Stars: ✭ 159 (-14.52%)
AmsiscannerA C/C++ implementation of Microsoft's Antimalware Scan Interface
Stars: ✭ 134 (-27.96%)
Redteam vul红队作战中比较常遇到的一些重点系统漏洞整理。
Stars: ✭ 1,271 (+583.33%)
Cve 2020 0688 expCVE-2020-0688_EXP Auto trigger payload & encrypt method
Stars: ✭ 134 (-27.96%)
JscpwnPoC exploit for CVE-2016-4622
Stars: ✭ 89 (-52.15%)
HardentheworldHarden the world is a community driven project to develop hardening guidelines and checklists for common software and devices.
Stars: ✭ 158 (-15.05%)
IntelspyPerform automated network reconnaissance scans
Stars: ✭ 134 (-27.96%)
RvdRobot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (-53.23%)
EvasorA tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
Stars: ✭ 134 (-27.96%)
Ble Security Attack Defence✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Stars: ✭ 88 (-52.69%)
Remote Desktop CachingThis tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: ✭ 171 (-8.06%)
Hacker101Source code for Hacker101.com - a free online web and mobile security class.
Stars: ✭ 12,246 (+6483.87%)
Reverse ShellReverse Shell as a Service
Stars: ✭ 1,281 (+588.71%)
ShellpopPop shells like a master.
Stars: ✭ 1,279 (+587.63%)
Webrtc LeakCheck if your VPN leaks your IP address via the WebRTC technology
Stars: ✭ 133 (-28.49%)
BlackratBlackRAT - Java Based Remote Administrator Tool
Stars: ✭ 87 (-53.23%)
Kickthemout💤 Kick devices off your network by performing an ARP Spoof attack.
Stars: ✭ 2,005 (+977.96%)
Poet[unmaintained] Post-exploitation tool
Stars: ✭ 184 (-1.08%)
Butthaxlovense hush buttplug exploit chain
Stars: ✭ 180 (-3.23%)
AhridAHRID - Analysis Hacker's Real-ID Platform 黑客攻击画像分析系统(停止运营)
Stars: ✭ 133 (-28.49%)
Hooksolinux动态链接库的注入修改查找工具 A tool for injection, modification and search of linux dynamic link library
Stars: ✭ 87 (-53.23%)
Blackphish🔱 [ Phishing Made Easy ] 🔱 (In Beta)
Stars: ✭ 133 (-28.49%)
Atomic Red Team Intelligence C2ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (-53.23%)
In Spectre MeltdownThis tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-53.76%)
Wpscan V3THIS REPOSITORY HAS BEEN MOVED TO https://github.com/wpscanteam/wpscan USE THAT!!!
Stars: ✭ 132 (-29.03%)
OmeglemiddlemanLets you connect strangers to each other, and intercept messages AKA Man in the Middle Attack
Stars: ✭ 85 (-54.3%)
Bot18Bot18 is a high-frequency cryptocurrency trading bot developed by Zenbot creator @carlos8f
Stars: ✭ 157 (-15.59%)
ThreadboatProgram Uses Thread Execution Hijacking To Inject Native Shell-code Into a Standard Win32 Application
Stars: ✭ 132 (-29.03%)
Jenkins ShellAutomating Jenkins Hacking using Shodan API
Stars: ✭ 84 (-54.84%)
Iostracealternative strace for iOS device(64bit) on frida
Stars: ✭ 84 (-54.84%)
Blizzard JailbreakAn Open-Source iOS 11.0 -> 11.4.1 (soon iOS 13) Jailbreak, made for teaching purposes.
Stars: ✭ 130 (-30.11%)
Zynix Fusionzynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
Stars: ✭ 84 (-54.84%)
Openapi Sampler🔠 Tool for generation samples based on OpenAPI(fka Swagger) payload/response schema
Stars: ✭ 83 (-55.38%)
MobilehackersweaponsMobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 170 (-8.6%)
MalwareRootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Cryptography | Shellcodes | Webshells | Keylogger | Botnets | Worms | Other Network Tools
Stars: ✭ 156 (-16.13%)
NekoA self hosted virtual browser (rabb.it clone) that runs in docker.
Stars: ✭ 1,957 (+952.15%)
Rc transmitterAn Arduino 2.4GHz and IR remote controller
Stars: ✭ 83 (-55.38%)
Gitjacker🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (+571.51%)
Buffer overflowDon't let buffer overflows overflow your mind
Stars: ✭ 131 (-29.57%)
WindowsexploitsWindows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.
Stars: ✭ 1,243 (+568.28%)
Geo ReconAn OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts.
Stars: ✭ 82 (-55.91%)
ArcanusARCANUS is a customized payload generator/handler.
Stars: ✭ 130 (-30.11%)
IrextUniversal IR Remote Control Solution
Stars: ✭ 1,240 (+566.67%)
Di.we.hRepositório com conteúdo sobre web hacking em português
Stars: ✭ 156 (-16.13%)
H8mailEmail OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (+1062.9%)
PrismaticaResponsive Command and Control System
Stars: ✭ 81 (-56.45%)
UefiFast and lightweight yet another UEFI implementation
Stars: ✭ 79 (-57.53%)
TcmenuTcMenu is a full feature menu system for Arduino, mbed and ESP, it's modular enough to support different input types, displays and also has the concept of remote control built in.
Stars: ✭ 78 (-58.06%)
Evil WinrmThe ultimate WinRM shell for hacking/pentesting
Stars: ✭ 2,251 (+1110.22%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-57.53%)
CryptolockerCryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system and send keys back to the server. Multi-threaded functionality helps to this tool make encryption faster.
Stars: ✭ 79 (-57.53%)
PentaOpen source all-in-one CLI tool to semi-automate pentesting.
Stars: ✭ 130 (-30.11%)