RvdRobot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (-17.14%)
DotfilesAwesome personal dotfiles
Stars: ✭ 99 (-5.71%)
Ble Security Attack Defence✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Stars: ✭ 88 (-16.19%)
Github DorksFind leaked secrets via github search
Stars: ✭ 1,332 (+1168.57%)
FnreactionsviewFNReactionsView is a customizable control (based on UIView) to give people a way to show floating emoji like facebook does during live stream, easy way.
Stars: ✭ 87 (-17.14%)
FacebookautolikeprofessionalAuto Like reactions and unlike Facebook Status, Comments, Photos, group posts, page posts, change facebook theme and skin colors, auto tag members in group post.. Auto Comment and Auto Reply to all Comments... Facebook Auto Like Unlimited 2019 is 100% safe to use...
Stars: ✭ 101 (-3.81%)
BlackratBlackRAT - Java Based Remote Administrator Tool
Stars: ✭ 87 (-17.14%)
Termux Ndkandroid-ndk for termux
Stars: ✭ 91 (-13.33%)
Hooksolinux动态链接库的注入修改查找工具 A tool for injection, modification and search of linux dynamic link library
Stars: ✭ 87 (-17.14%)
In Spectre MeltdownThis tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-18.1%)
One Lin3rGives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+1099.05%)
Zynix Fusionzynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
Stars: ✭ 84 (-20%)
ZphisherAn automated phishing tool with 30+ templates.
Stars: ✭ 1,321 (+1158.1%)
Geo ReconAn OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts.
Stars: ✭ 82 (-21.9%)
JuliusAn open source re-implementation of Caesar III
Stars: ✭ 1,353 (+1188.57%)
Beef Over WanBrowser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-21.9%)
FormationvideoContenus et ressources de la chaîne FormationVidéo (YouTube)
Stars: ✭ 91 (-13.33%)
AndroidAndroid projects with reusable components which will be useful in your applications.
Stars: ✭ 81 (-22.86%)
Learning Social Media Analytics With RThis repository contains code and bonus content which will be added from time to time for the book "Learning Social Media Analytics with R" by Packt
Stars: ✭ 102 (-2.86%)
BlackwormBlack Worm Offical Repo
Stars: ✭ 80 (-23.81%)
Social LinksSimple library to count shares and generate share buttons
Stars: ✭ 91 (-13.33%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-24.76%)
Ecommerce Website Security ChecklistList of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built into the Techinical Specific Document, or will be checked in the Security testing phases.
Stars: ✭ 98 (-6.67%)
GitcacheWhen clone from github.com, build mirror cache to improve clone speed
Stars: ✭ 77 (-26.67%)
StretcherTool designed to help identify open Elasticsearch servers that are exposing sensitive information
Stars: ✭ 91 (-13.33%)
SteganographerSteganograpy in Python | Hide files or data in Image Files
Stars: ✭ 104 (-0.95%)
Ni bomber💥 advanced sms bomber in python to kill the phone
Stars: ✭ 77 (-26.67%)
Wifi CrackingCrack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat
Stars: ✭ 9,546 (+8991.43%)
EzioBT-based Disk Deployment tool
Stars: ✭ 77 (-26.67%)
BrutesharkNetwork Analysis Tool
Stars: ✭ 1,335 (+1171.43%)
Xhp LibClass libraries for XHP. XHP is a Hack feature that augments the syntax of the language such that XML document fragments become valid Hack expressions.
Stars: ✭ 1,297 (+1135.24%)
FacegrabA tool to collect public images from Facebook and create an image dataset for training computer vision applications like gender recognition, and face detection
Stars: ✭ 76 (-27.62%)
Burp Bounty ProfilesBurp Bounty profiles compilation, feel free to contribute!
Stars: ✭ 76 (-27.62%)
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+1031.43%)
KeyeKeye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-3.81%)
Aura BotnetA super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Bash, and Powershell.
Stars: ✭ 95 (-9.52%)
EasyloginLogin effortlessly with different social networks like Facebook, Twitter or Google Plus
Stars: ✭ 90 (-14.29%)
Movies For Hackers🎬 A curated list of movies every hacker & cyberpunk must watch.
Stars: ✭ 8,884 (+8360.95%)
Network Avatar PickerA npm module that returns user's social network avatar. Supported providers: facebook, instagram, twitter, tumblr, vimeo, github, youtube and gmail
Stars: ✭ 74 (-29.52%)
SeginfofaqFAQ del mundo de la seguridad informática en español.
Stars: ✭ 73 (-30.48%)
DeadtrapAn OSINT tool to gather information about the real owner of a phone number
Stars: ✭ 73 (-30.48%)
ToolsSecurity and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+1179.05%)
SandmapNmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (+1023.81%)
Lor Axe🪓 a multi-threaded, low-bandwidth HTTP DOS tool
Stars: ✭ 72 (-31.43%)
Apac ConferencesA community contributed consolidated list of InfoSec meetups in the Asia Pacific region.
Stars: ✭ 90 (-14.29%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-31.43%)
SkraperKotlin/Java library and cli tool for scraping posts and media from various sources with neither authorization nor full page rendering (Facebook, Instagram, Twitter, Youtube, Tiktok, Telegram, Twitch, Reddit, 9GAG, Pinterest, Flickr, Tumblr, IFunny, VK, Pikabu)
Stars: ✭ 72 (-31.43%)
SocialcountUnmaintained (see the README): Simple barebones project to show share counts from various social networks.
Stars: ✭ 1,382 (+1216.19%)
Grayfishlight weight phishing framework with 18+ pages.
Stars: ✭ 101 (-3.81%)
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-7.62%)
Daily Coding ProblemSeries of the problem 💯 and solution ✅ asked by Daily Coding problem👨🎓 website.
Stars: ✭ 90 (-14.29%)
Facebook Data Analyzer📊Python script to analyze the contents of your Facebook data export
Stars: ✭ 71 (-32.38%)
Fb DeleteDelete your Facebook content by year and category
Stars: ✭ 72 (-31.43%)
Chaos🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Stars: ✭ 1,168 (+1012.38%)