GithacktoolsThe best Hacking and PenTesting tools installer on the world
Stars: ✭ 78 (-42.22%)
ExamplesA collection of TLA+ specifications of varying complexities
Stars: ✭ 720 (+433.33%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-14.07%)
HackingtoolALL IN ONE Hacking Tool For Hackers
Stars: ✭ 7,521 (+5471.11%)
Griefing MethodsA documentation about how to hack Minecraft servers
Stars: ✭ 76 (-43.7%)
Node Minecraft ProtocolParse and serialize minecraft packets, plus authentication and encryption.
Stars: ✭ 697 (+416.3%)
Redis Toolsmy tools working with redis
Stars: ✭ 104 (-22.96%)
K8cscanK8Cscan大型内网渗透自定义插件化扫描神器,包含信息收集、网络资产、漏洞扫描、密码爆破、漏洞利用,程序采用多线程批量扫描大型内网多个IP段C段主机,目前插件包含: C段旁注扫描、子域名扫描、Ftp密码爆破、Mysql密码爆破、Oracle密码爆破、MSSQL密码爆破、Windows/Linux系统密码爆破、存活主机扫描、端口扫描、Web信息探测、操作系统版本探测、Cisco思科设备扫描等,支持调用任意外部程序或脚本,支持Cobalt Strike联动
Stars: ✭ 693 (+413.33%)
XvizA protocol for real-time transfer and visualization of autonomy data
Stars: ✭ 691 (+411.85%)
AppleapnpushSend push notification to Apple Devices (iPhone, iPad)
Stars: ✭ 134 (-0.74%)
Lockdoor Framework🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+401.48%)
BrutalPayload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (+402.22%)
MultihashSelf describing hashes - for future proofing
Stars: ✭ 656 (+385.93%)
Ugcframeworkunity客户端框架(UGUI+C#+protocol+xlua/ILRuntime)
Stars: ✭ 74 (-45.19%)
IpbanIPBan Monitors failed logins and bad behavior and bans ip addresses on Windows and Linux. Highly configurable, lean and powerful. Learn more at -->
Stars: ✭ 652 (+382.96%)
DeadtrapAn OSINT tool to gather information about the real owner of a phone number
Stars: ✭ 73 (-45.93%)
DhcpwnAll your IPs are belong to us.
Stars: ✭ 642 (+375.56%)
Pycomm3A Python Ethernet/IP library for communicating with Allen-Bradley PLCs.
Stars: ✭ 102 (-24.44%)
Powershell RatPython based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+371.11%)
SandmapNmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (+774.07%)
NsablocklistHOSTS file and research project to block all known NSA / GCHQ / C.I.A. / F.B.I. spying server
Stars: ✭ 630 (+366.67%)
Awesome Mobile SecurityAn effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+1260.74%)
Penetration Testing ToolsA collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (+354.81%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-46.67%)
Hackerone LessonsTranscribed video lessons of HackerOne to pdf's
Stars: ✭ 101 (-25.19%)
CharlatanoProves JVM cheats are viable on native games, and demonstrates the longevity against anti-cheat signature detection systems
Stars: ✭ 599 (+343.7%)
Chaos🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Stars: ✭ 1,168 (+765.19%)
Ios Debug Hacks🎯 Advanced debugging skills used in the iOS project development process, involves the dynamic debugging, static analysis and decompile of third-party libraries. iOS 项目开发过程中用到的高级调试技巧,涉及三方库动态调试、静态分析和反编译等领域
Stars: ✭ 595 (+340.74%)
BlinksocksA framework for building composable proxy protocol stack.
Stars: ✭ 587 (+334.81%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+757.04%)
Coq SerapiCoq Protocol Playground with Se(xp)rialization of Internal Structures.
Stars: ✭ 87 (-35.56%)
SpeedhackSpeedhack coded in C++, inspired by Cheat Engine's own speedhack.
Stars: ✭ 29 (-78.52%)
Among Us ProtocolA writeup of the network protocol used in Among Us, a game by Innersloth.
Stars: ✭ 99 (-26.67%)
Quic GoA QUIC implementation in pure go
Stars: ✭ 6,085 (+4407.41%)
Node Bmw ClientA node.js powered interface for E38/E39/E53 + E6x/E9x BMW vehicles (Client side)
Stars: ✭ 68 (-49.63%)
FavfreakMaking Favicon.ico based Recon Great again !
Stars: ✭ 564 (+317.78%)
JstpFast RPC for browser and Node.js based on TCP, WebSocket, and MDSF
Stars: ✭ 132 (-2.22%)
DrtlaplusDr. TLA+ series - learn an algorithm and protocol, study a specification
Stars: ✭ 561 (+315.56%)
NishangNishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: ✭ 5,943 (+4302.22%)
BettercapThe Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Stars: ✭ 10,735 (+7851.85%)
DawsAdvanced Web Shell
Stars: ✭ 551 (+308.15%)
Fail2ban.webexploitsThis custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (-50.37%)
LndLightning Network Daemon ⚡️
Stars: ✭ 5,623 (+4065.19%)
Go GtpGTP(GPRS Tunneling Protocol) implemented in pure Golang.
Stars: ✭ 116 (-14.07%)
Pay Protocolfixing the transition to a cashless world
Stars: ✭ 29 (-78.52%)
PokeA powerful reflection module for powershell.
Stars: ✭ 66 (-51.11%)
PaperLightning Network Paper
Stars: ✭ 136 (+0.74%)
Cr3dov3rKnow the dangers of credential reuse attacks.
Stars: ✭ 1,700 (+1159.26%)
H8mailEmail OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (+1502.22%)
Mangos V1The pure golang implementation of nanomsg (version 1, frozen)
Stars: ✭ 1,533 (+1035.56%)
PossumbotA bot that will allow you to destroy discord servers.
Stars: ✭ 106 (-21.48%)