VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+4256.65%)
Hackermind渗透步骤,web安全,CTF,业务安全,人工智能,区块链安全,安全开发,无线安全,社会工程学,二进制安全,移动安全,红蓝对抗,运维安全,风控安全,linux安全
Stars: ✭ 284 (+39.9%)
Lctf2017Source code, writeups and exps in LCTF2017.
Stars: ✭ 162 (-20.2%)
Welpwn💖CTF pwn framework.
Stars: ✭ 284 (+39.9%)
Blackhat Python3Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 1,125 (+454.19%)
Reverse Shell Manager🔨 A multiple reverse shell session/client manager via terminal
Stars: ✭ 171 (-15.76%)
Glibc All In One🎁A convenient glibc binary and debug file downloader and source code auto builder
Stars: ✭ 145 (-28.57%)
Computer Science ResourcesA list of resources in different fields of Computer Science (multiple languages)
Stars: ✭ 1,316 (+548.28%)
Pentest EnvPentest environment deployer (kali linux + targets) using vagrant and chef.
Stars: ✭ 610 (+200.49%)
Ctf xinetdA docker repository for deploying pwnable challenges in CTF
Stars: ✭ 257 (+26.6%)
Robust Adv Malware DetectionCode repository for the paper "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware"
Stars: ✭ 63 (-68.97%)
OpenVAS-DockerA Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-92.12%)
RichelieuList of the most common French passwords
Stars: ✭ 199 (-1.97%)
Open-source-tools-for-CTIPublic Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-55.17%)
Black WidowGUI based offensive penetration testing tool (Open Source)
Stars: ✭ 124 (-38.92%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-76.35%)
KeyloggerGet Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+197.54%)
Violent Python3Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 603 (+197.04%)
Seccomp ToolsProvide powerful tools for seccomp analysis
Stars: ✭ 599 (+195.07%)
qctf-school-2018QCTF School 2018. Developed with ♥ by Hackerdom team
Stars: ✭ 13 (-93.6%)
ForcADPure-python distributable Attack-Defence CTF platform, created to be easily set up.
Stars: ✭ 77 (-62.07%)
Destructivefarm📢 🔒 Exploit farm for attack-defense CTF competitions
Stars: ✭ 122 (-39.9%)
WiFi-ProjectPre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (-89.16%)
OpenctiAuthors
Stars: ✭ 2,165 (+966.5%)
Cvebase.comcvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (-56.65%)
ZeratoolAutomatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
Stars: ✭ 584 (+187.68%)
ctfCapture The Flag Information
Stars: ✭ 12 (-94.09%)
Whoishere.pyWIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.
Stars: ✭ 182 (-10.34%)
Zeek-Network-Security-MonitorA Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-81.28%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-82.27%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+860.1%)
tutorialsTutorials written by me.
Stars: ✭ 17 (-91.63%)
Binary ExploitationGood to know, easy to forget information about binaries and their exploitation!
Stars: ✭ 47 (-76.85%)
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 154 (-24.14%)
domfindA Python DNS crawler to find identical domain names under different TLDs.
Stars: ✭ 22 (-89.16%)
CtfCTF writeups
Stars: ✭ 45 (-77.83%)
LazyKLEELazy python wrapper of KLEE for solving CTF challenges
Stars: ✭ 59 (-70.94%)
Ctf weba project aim to collect CTF web practices .
Stars: ✭ 564 (+177.83%)
RecoverPy🙈 Interactively find and recover deleted or 👉 overwritten 👈 files from your terminal
Stars: ✭ 189 (-6.9%)
idsaThis is the main repository of International Data Spaces Association on GitHub, where you can find general overview and required information on IDS Open Source Landscape.
Stars: ✭ 22 (-89.16%)
Rocket ShotBackwards program slice stitching for automatic CTF problem solving.
Stars: ✭ 43 (-78.82%)
Scilla🏴☠️ Information Gathering tool 🏴☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-42.86%)
One gadgetThe best tool for finding one gadget RCE in libc.so.6
Stars: ✭ 1,306 (+543.35%)
Platypus🔨 A modern multiple reverse shell sessions manager wrote in go
Stars: ✭ 559 (+175.37%)
rstthreatsAggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
Stars: ✭ 17 (-91.63%)
PwntoolsCTF framework and exploit development library
Stars: ✭ 8,585 (+4129.06%)
Ctf ToolsUseful CTF Tools
Stars: ✭ 190 (-6.4%)
Write Ups 2017Wiki-like CTF write-ups repository, maintained by the community. 2017
Stars: ✭ 2,066 (+917.73%)
Misp DashboardA dashboard for a real-time overview of threat intelligence from MISP instances
Stars: ✭ 142 (-30.05%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+5048.28%)
BigbountyreconBigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+166.5%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-56.16%)
OpcdeOPCDE Cybersecurity Conference Materials
Stars: ✭ 538 (+165.02%)
RoottheboxA Game of Hackers (CTF Scoreboard & Game Manager)
Stars: ✭ 527 (+159.61%)