FlirtdbA community driven collection of IDA FLIRT signature files
Stars: ✭ 809 (+642.2%)
Zxhookutil【iOS逆向】高效Tweak工具函数集,基于theos、monkeyDev。(含方法追踪、无须关心层级获取任意view、拦截并修改全局请求、清除keyChain数据、打印block参数、打印类的属性和方法、数据转换、数据存储、添加轮询、网络请求、加密解密等各种协助逆向分析函数)
Stars: ✭ 93 (-14.68%)
QbdiA Dynamic Binary Instrumentation framework based on LLVM.
Stars: ✭ 801 (+634.86%)
Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (-38.53%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+7011.93%)
TimelapseA time lapse app for Sony Alpha camera using the OpenMemories framework
Stars: ✭ 101 (-7.34%)
PrivescA collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+621.1%)
Pmd RedDecompilation of Pokémon Mystery Dungeon: Red Rescue Team
Stars: ✭ 65 (-40.37%)
SimplyemailEmail recon made fast and easy, with a framework to build on
Stars: ✭ 779 (+614.68%)
PokeemeraldDecompilation of Pokémon Emerald
Stars: ✭ 772 (+608.26%)
B1tifissh management tool to provides commandline access to a remote system running SSH server
Stars: ✭ 65 (-40.37%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+600.92%)
ProdigymathgamehackingProdigy Hacking Organization: Hacking for the right reasons. | Questions? Ask on our Discord. https://discord.gg/XQDfbfq
Stars: ✭ 108 (-0.92%)
VelesBinary data analysis and visualization tool
Stars: ✭ 767 (+603.67%)
Rhme 2017Riscure Hack Me embedded hardware CTF 2017-2018.
Stars: ✭ 65 (-40.37%)
InterlaceEasily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+597.25%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+9488.07%)
Packer FuzzerPacker Fuzzer is a fast and efficient scanner for security detection of websites constructed by javascript module bundler such as Webpack.
Stars: ✭ 753 (+590.83%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+942.2%)
Flare IdaIDA Pro utilities from FLARE team
Stars: ✭ 1,374 (+1160.55%)
StcobfuscatoriOS全局自动化 代码混淆 工具!支持cocoapod组件代码一并 混淆,完美避开hardcode方法、静态库方法和系统库方法!
Stars: ✭ 740 (+578.9%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+565.14%)
CutterFree and Open Source Reverse Engineering Platform powered by rizin
Stars: ✭ 10,073 (+9141.28%)
Nfdx64dbgPlugin for x64dbg Linker/Compiler/Tool detector.
Stars: ✭ 105 (-3.67%)
GhidraGhidra is a software reverse engineering (SRE) framework
Stars: ✭ 30,371 (+27763.3%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-43.12%)
Lockdoor Framework🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+521.1%)
BrutalPayload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (+522.02%)
Hackerone LessonsTranscribed video lessons of HackerOne to pdf's
Stars: ✭ 101 (-7.34%)
WhalerProgram to reverse Docker images into Dockerfiles
Stars: ✭ 670 (+514.68%)
KsmA fast, hackable and simple x64 VT-x hypervisor for Windows and Linux. Builtin userspace sandbox and introspection engine.
Stars: ✭ 673 (+517.43%)
PiroguePiRogue is a small device meant to ease network interception and analysis.
Stars: ✭ 90 (-17.43%)
DeapkDeAPK is an open-source, online APK decompiler which lets you upload an APK and then decompile it to Smali or Java sources. It is built using Laravel, Vue.js, Bootstrap, FontAwesome, Pusher, Redis, MySQL, apktool, jadx and hosted atop Oracle cloud platform.
Stars: ✭ 33 (-69.72%)
HashcatWorld's fastest and most advanced password recovery utility
Stars: ✭ 11,014 (+10004.59%)
Makinmakin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]
Stars: ✭ 645 (+491.74%)
Instabruteforcehacking-tool termux-tools termux noob-friendly instagram-bot bruteforce-password-cracker wordlist-technique
Stars: ✭ 86 (-21.1%)
Powershell RatPython based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+483.49%)
Vgm rippingSources for game music ripping tools
Stars: ✭ 58 (-46.79%)
NsablocklistHOSTS file and research project to block all known NSA / GCHQ / C.I.A. / F.B.I. spying server
Stars: ✭ 630 (+477.98%)
JebscriptsA set of JEB Python/Java scripts for reverse engineering Android obfuscated code
Stars: ✭ 100 (-8.26%)
Webhackersweapons⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 1,205 (+1005.5%)
Badusb botnet👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-70.64%)
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-11.01%)
Packer Centos 6This build has been moved - see README.md
Stars: ✭ 78 (-28.44%)
Spytrojan keylogger[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-70.64%)
FiercephishFiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.
Stars: ✭ 960 (+780.73%)
PharosAutomated static analysis tools for binary programs
Stars: ✭ 955 (+776.15%)