PPNPentester's Promiscuous Notebook
Stars: ✭ 221 (-32.62%)
FaradayFaraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit.
Stars: ✭ 3,198 (+875%)
crawleetWeb Recon & Exploitation Tool.
Stars: ✭ 48 (-85.37%)
HellgateLoader CSharpLoad shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.
Stars: ✭ 73 (-77.74%)
gf-patternsCollection grep patterns for Tom Hudson a.k.a Tomnomnom tools namely gf
Stars: ✭ 27 (-91.77%)
RichkwareFramework for building Windows malware, written in C++
Stars: ✭ 315 (-3.96%)
WebkillerTool Information Gathering Write By Python.
Stars: ✭ 300 (-8.54%)
Recon PipelineAn automated target reconnaissance pipeline.
Stars: ✭ 278 (-15.24%)
diotermsOpen-source vulnerability disclosure policy templates.
Stars: ✭ 48 (-85.37%)
RPCScanTool to communicate with RPC services and check misconfigurations on NFS shares
Stars: ✭ 53 (-83.84%)
CTF-WriteupsRepository of my CTF writeups
Stars: ✭ 25 (-92.38%)
Spray365Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The built-in execution plan features options that attempt to bypass Azure Smart Lockout and insecure conditional access policies.
Stars: ✭ 233 (-28.96%)
k8badusbBadUSB Teensy downexec exploit support Windows & Linux / Windows Cmd & PowerShell addUser exploit
Stars: ✭ 32 (-90.24%)
Vps个人笔记汇总
Stars: ✭ 276 (-15.85%)
FacebookBugFacebook Write-ups, PoC, and exploitation codes:
Stars: ✭ 28 (-91.46%)
ComPPCompany Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.
Stars: ✭ 44 (-86.59%)
goverviewgoverview - Get an overview of the list of URLs
Stars: ✭ 93 (-71.65%)
ORtesterOpen Redirect scanner - (out of date)
Stars: ✭ 24 (-92.68%)
shaniaScan secrets from Continuous Integration Build Logs
Stars: ✭ 54 (-83.54%)
Gta ReversedReversed code of GTA:SA executable (gta_sa.exe) 1.0 US
Stars: ✭ 297 (-9.45%)
HackbrowserdataDecrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。
Stars: ✭ 3,864 (+1078.05%)
vulnerabilitiesList of every possible vulnerabilities in computer security.
Stars: ✭ 14 (-95.73%)
usefuluseful pentest note
Stars: ✭ 59 (-82.01%)
rbusteryet another dirbuster
Stars: ✭ 21 (-93.6%)
serverHashtopolis - A Hashcat wrapper for distributed hashcracking
Stars: ✭ 954 (+190.85%)
fdnssearchSwiftly search FDNS datasets from Rapid7 Open Data
Stars: ✭ 19 (-94.21%)
doraFind exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Stars: ✭ 229 (-30.18%)
gitls🖇 Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline
Stars: ✭ 39 (-88.11%)
wafbypasserNo description or website provided.
Stars: ✭ 73 (-77.74%)
woodpeckerCustom security distro for remote penetration testing
Stars: ✭ 45 (-86.28%)
BurpSQLTruncSannerMessy BurpSuite plugin for SQL Truncation vulnerabilities.
Stars: ✭ 53 (-83.84%)
WebanalyzePort of Wappalyzer (uncovers technologies used on websites) to automate mass scanning.
Stars: ✭ 311 (-5.18%)
BopscrkTool to generate smart and powerful wordlists
Stars: ✭ 273 (-16.77%)
juice-shop-ctfCapture-the-Flag (CTF) environment setup tools for OWASP Juice Shop supporting CTFd, FBCTF and RootTheBox
Stars: ✭ 287 (-12.5%)
HostPanicFind host header injections and perform Host Header attacks with other kind of bugs like web cache poissoning
Stars: ✭ 23 (-92.99%)
clairvoyanceObtain GraphQL API Schema even if the introspection is not enabled
Stars: ✭ 448 (+36.59%)
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-92.99%)
request smugglerHttp request smuggling vulnerability scanner
Stars: ✭ 203 (-38.11%)
CloudbunnyCloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search engines to search domain information: Shodan, Censys and Zoomeye.
Stars: ✭ 273 (-16.77%)
Crypto封装多种CTF和平时常见加密及编码C#类库
Stars: ✭ 20 (-93.9%)
allsafeIntentionally vulnerable Android application.
Stars: ✭ 135 (-58.84%)
urldedupePass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
Stars: ✭ 208 (-36.59%)
jsleaka Go code to detect leaks in JS files via regex patterns
Stars: ✭ 111 (-66.16%)
ShadowCloneUnleash the power of cloud
Stars: ✭ 224 (-31.71%)
WhoEnumMass querying whois records
Stars: ✭ 24 (-92.68%)
BrutusBotnet targeting Windows machines written entirely in Python & open source security project.
Stars: ✭ 37 (-88.72%)
dorkscoutDorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets
Stars: ✭ 189 (-42.38%)
dontgo403Tool to bypass 40X response codes.
Stars: ✭ 457 (+39.33%)
huntkitDocker - Ubuntu with a bunch of PenTesting tools and wordlists
Stars: ✭ 51 (-84.45%)
Recon My WayThis repository created for personal use and added tools from my latest blog post.
Stars: ✭ 271 (-17.38%)
SimpleKeyloggerSimple Keylogger with smtp to send emails on your account using python works on linux and Windows
Stars: ✭ 32 (-90.24%)
boxerBoxer: A fast directory bruteforce tool written in Python with concurrency.
Stars: ✭ 15 (-95.43%)
ResourcesNo description or website provided.
Stars: ✭ 38 (-88.41%)
bhedakA replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.
Stars: ✭ 77 (-76.52%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (-81.71%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+1657.01%)