Ssrf vulnerable labThis Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Stars: ✭ 361 (-3.99%)
Langhost👻 A LAN dropbox chatbot controllable via Telegram
Stars: ✭ 324 (-13.83%)
HackbrowserdataDecrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。
Stars: ✭ 3,864 (+927.66%)
TomcatwardeployerApache Tomcat auto WAR deployment & pwning penetration testing tool.
Stars: ✭ 287 (-23.67%)
ChromepassChromepass - Hacking Chrome Saved Passwords
Stars: ✭ 364 (-3.19%)
WhatwebNext generation web scanner
Stars: ✭ 3,503 (+831.65%)
BillcipherInformation Gathering tool for a Website or IP address
Stars: ✭ 332 (-11.7%)
EastExploits and Security Tools Framework 2.0.1
Stars: ✭ 283 (-24.73%)
Offensive DockerOffensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-12.77%)
Ictf FrameworkThe iCTF Framework, presented by Shellphish!
Stars: ✭ 281 (-25.27%)
Rustscan🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+1287.77%)
BopscrkTool to generate smart and powerful wordlists
Stars: ✭ 273 (-27.39%)
Vps个人笔记汇总
Stars: ✭ 276 (-26.6%)
KubeiKubei is a flexible Kubernetes runtime scanner, scanning images of worker and Kubernetes nodes providing accurate vulnerabilities assessment, for more information checkout:
Stars: ✭ 353 (-6.12%)
CloudscraperCloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.
Stars: ✭ 276 (-26.6%)
W5Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (-2.39%)
PhishapiComprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (-27.66%)
Swap digger swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (-5.85%)
InjuredandroidA vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
Stars: ✭ 317 (-15.69%)
ProcspyPython tool that monitors and logs user-run commands on a Linux system for either offensive or defensive purposes..
Stars: ✭ 272 (-27.66%)
AirgeddonThis is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (+918.62%)
CripsIP Tools To quickly get information about IP Address's, Web Pages and DNS records.
Stars: ✭ 272 (-27.66%)
BlacknetFree advanced and modern Windows botnet with a nice and secure PHP panel.
Stars: ✭ 271 (-27.93%)
Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (-6.12%)
VajraVajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (-28.46%)
ArachniWeb Application Security Scanner Framework
Stars: ✭ 2,942 (+682.45%)
NxcryptNXcrypt - 'python backdoor' framework
Stars: ✭ 316 (-15.96%)
Soup☎️ Original open source call flooder using Twilio's API.
Stars: ✭ 267 (-28.99%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+1006.91%)
MemoryjsRead and write process memory in Node.js (Windows API functions exposed via Node bindings)
Stars: ✭ 371 (-1.33%)
K8toolsK8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Stars: ✭ 4,173 (+1009.84%)
Proxy ListGet PROXY List that gets updated everyday
Stars: ✭ 347 (-7.71%)
OsintgramOsintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Stars: ✭ 312 (-17.02%)
CloudbruteAwesome cloud enumerator
Stars: ✭ 268 (-28.72%)
DvwsOWSAP Damn Vulnerable Web Sockets (DVWS) is a vulnerable web application which works on web sockets for client-server communication.
Stars: ✭ 267 (-28.99%)
Jenkins Rce😈 Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!
Stars: ✭ 262 (-30.32%)
QuineQuine Museum
Stars: ✭ 263 (-30.05%)
Cve 2019 07083389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)
Stars: ✭ 350 (-6.91%)
HorusecHorusec is an open source tool that improves identification of vulnerabilities in your project with just one command.
Stars: ✭ 311 (-17.29%)
DeckerDeclarative penetration testing orchestration framework
Stars: ✭ 263 (-30.05%)
MercureMercure is a tool for security managers who want to train their colleague to phishing.
Stars: ✭ 262 (-30.32%)
Ghost👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (-17.02%)
ShellverReverse Shell Cheat Sheet TooL
Stars: ✭ 258 (-31.38%)
UptuxLinux privilege escalation checks (systemd, dbus, socket fun, etc)
Stars: ✭ 260 (-30.85%)
PatrowlmanagerPatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (-3.46%)
RichkwareFramework for building Windows malware, written in C++
Stars: ✭ 315 (-16.22%)
Dumpall一款信息泄漏利用工具,适用于.git/.svn源代码泄漏和.DS_Store泄漏
Stars: ✭ 250 (-33.51%)
Lyncsmashlocate and attack Lync/Skype for Business
Stars: ✭ 258 (-31.38%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+1432.71%)
Kube HunterHunt for security weaknesses in Kubernetes clusters
Stars: ✭ 3,399 (+803.99%)
Droid Hunter(deprecated) Android application vulnerability analysis and Android pentest tool
Stars: ✭ 256 (-31.91%)