GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+593.71%)
Termux AppTermux - a terminal emulator application for Android OS extendible by variety of packages.
Stars: ✭ 10,088 (+6954.55%)
Cfw2ofw HelperProviding aid in converting video games.
Stars: ✭ 44 (-69.23%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+605.59%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+6180.42%)
Mysqldump PhpPHP version of mysqldump cli that comes with MySQL
Stars: ✭ 975 (+581.82%)
ReconnoitreA security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+1175.52%)
Project TauroA Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-63.64%)
DdlparseDDL parase and Convert to BigQuery JSON schema and DDL statements
Stars: ✭ 52 (-63.64%)
DoltDolt – It's Git for Data
Stars: ✭ 9,880 (+6809.09%)
WhitehatInformation about my experiences on ethical hacking 💀
Stars: ✭ 54 (-62.24%)
Event Managementhelps to register an users for on events conducted in college fests with simple logic with secured way
Stars: ✭ 65 (-54.55%)
XshockXSHOCK Shellshock Exploit
Stars: ✭ 65 (-54.55%)
Chaos🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Stars: ✭ 1,168 (+716.78%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+694.41%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-49.65%)
DumplingDumpling is a fast, easy-to-use tool written by Go for dumping data from the database(MySQL, TiDB...) to local/cloud(S3, GCP...) in multifarious formats(SQL, CSV...).
Stars: ✭ 134 (-6.29%)
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-49.65%)
Countries States Cities Database🌍 World countries, states, regions, provinces, cities, towns in JSON, SQL, XML, PLIST, YAML, and CSV. All Countries, States, Cities with ISO2, ISO3, Country Code, Phone Code, Capital, Native Language, Timezones, Latitude, Longitude, Region, Subregion, Flag Emoji, and Currency. #countries #states #cities
Stars: ✭ 1,130 (+690.21%)
EbeanEbean ORM
Stars: ✭ 1,172 (+719.58%)
SandmapNmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (+725.17%)
Laravel Log To DbCustom Laravel and Lumen 5.6+ Log channel handler that can store log events to SQL or MongoDB databases. Uses Laravel/Monolog native logging functionality.
Stars: ✭ 76 (-46.85%)
BlackwormBlack Worm Offical Repo
Stars: ✭ 80 (-44.06%)
SqlMySQL & PostgreSQL pipe
Stars: ✭ 81 (-43.36%)
Webhackersweapons⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 1,205 (+742.66%)
Archer基于inception的自动化SQL操作平台,支持SQL执行、LDAP认证、发邮件、OSC、SQL查询、SQL优化建议、权限管理等功能,支持docker镜像
Stars: ✭ 1,239 (+766.43%)
One Lin3rGives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+780.42%)
JsqljSQL is the "official" Javascript Query Language - A database written in Javascript for use in a browser or Node.
Stars: ✭ 85 (-40.56%)
GraphjinGraphJin - Build APIs in 5 minutes with GraphQL. An instant GraphQL to SQL compiler.
Stars: ✭ 1,264 (+783.92%)
Docker SupersetRepository for Docker Image of Apache-Superset. [Docker Image: https://hub.docker.com/r/abhioncbr/docker-superset]
Stars: ✭ 86 (-39.86%)
Dailyhack🐱💻 Tiny Tiny Hacks we use in our daily life.
Stars: ✭ 142 (-0.7%)
Photo ImporterCommand line and web tools for photo importing/renaming/rotating
Stars: ✭ 30 (-79.02%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+691.61%)
GithacktoolsThe best Hacking and PenTesting tools installer on the world
Stars: ✭ 78 (-45.45%)
Xeus Sqlxeus-sql is a Jupyter kernel for general SQL implementations.
Stars: ✭ 85 (-40.56%)
ElectrocrudDatabase CRUD Application Built on Electron | MySQL, Postgres, SQLite
Stars: ✭ 1,267 (+786.01%)
Cr3dov3rKnow the dangers of credential reuse attacks.
Stars: ✭ 1,700 (+1088.81%)
QtlA friendly and lightweight C++ database library for MySQL, PostgreSQL, SQLite and ODBC.
Stars: ✭ 92 (-35.66%)
Go MygenQuickly generate CURD and documentation for operating MYSQL.etc
Stars: ✭ 94 (-34.27%)
Wifi CrackingCrack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat
Stars: ✭ 9,546 (+6575.52%)
ZphisherAn automated phishing tool with 30+ templates.
Stars: ✭ 1,321 (+823.78%)
Dark Fantasy Hack ToolDDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file system of websites.. Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities.) Web Spider: For gathering web application hacking information. Email scraper: To get all emails related to a webpage IMDB Rating: Easy way to access the movie database. Both .exe(compressed as zip) and .py versions are available in files.
Stars: ✭ 131 (-8.39%)
ToolsSecurity and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+839.16%)
WpreconWPrecon (WordPress Recon), is a vulnerability recognition tool in CMS Wordpress, developed in Go and with scripts in Lua.
Stars: ✭ 135 (-5.59%)
Ecommerce Website Security ChecklistList of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built into the Techinical Specific Document, or will be checked in the Security testing phases.
Stars: ✭ 98 (-31.47%)
Cve 2019 0604cve-2019-0604 SharePoint RCE exploit
Stars: ✭ 91 (-36.36%)
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-32.17%)
ToolingAdvancing Node.js as a framework for writing great tools
Stars: ✭ 98 (-31.47%)
ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-0.7%)
Kitty CatSimple script to change color-schemes and fonts for kitty terminal.
Stars: ✭ 102 (-28.67%)
BettercapThe Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Stars: ✭ 10,735 (+7406.99%)
Collection DocumentCollection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+869.93%)
Xormxorm是一个简单而强大的Go语言ORM库,通过它可以使数据库操作非常简便。本库是基于原版xorm的定制增强版本,为xorm提供类似ibatis的配置文件及动态SQL支持,支持AcitveRecord操作
Stars: ✭ 1,394 (+874.83%)