Beef Over WanBrowser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-96.13%)
Pentesting CookbookA set of recipes useful in pentesting and red teaming scenarios
Stars: ✭ 82 (-96.13%)
OscprepoA list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and reading material in 'BookmarkList' CherryTree. Reconscan Py2 and Py3. Custom ISO building.
Stars: ✭ 1,916 (-9.49%)
TweetshellMulti-thread Twitter BruteForcer in Shell Script
Stars: ✭ 112 (-94.71%)
PwnablewebPwnableWeb is a suite of web applications for use in information security training.
Stars: ✭ 81 (-96.17%)
Pwn SandboxA sandbox to protect your pwn challenges being pwned in CTF AWD.
Stars: ✭ 81 (-96.17%)
CtfrAbusing Certificate Transparency logs for getting HTTPS websites subdomains.
Stars: ✭ 1,535 (-27.49%)
Ctf WriteupsWriteups of Capture The Flag Competitions
Stars: ✭ 101 (-95.23%)
SccAn Offline cheat sheet and a quick reference command line tool for HTML, CSS and JS .
Stars: ✭ 123 (-94.19%)
CheatsheetCool command-line cheatsheet. Open format, grep-able, where you need them most.
Stars: ✭ 58 (-97.26%)
KeyeKeye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-95.23%)
HackphilesBruteForce Tool For both Instagram and Facebook
Stars: ✭ 57 (-97.31%)
OpenvehiclediagA rust based cross-platform ECU diagnostics and car hacking application, utilizing the passthru protocol
Stars: ✭ 135 (-93.62%)
Kill RouterFerramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-97.31%)
Yalu Jailbreak Ios 10.2My own fork of (Beta) Yalu Jailbreak for iOS 10.0 to 10.2 by @kpwn and @marcograss with custom UI and other features.
Stars: ✭ 99 (-95.32%)
CtfsubmitterA flag submitter service with distributed attackers for attack/defense CTF games.
Stars: ✭ 56 (-97.35%)
Destructivefarm📢 🔒 Exploit farm for attack-defense CTF competitions
Stars: ✭ 122 (-94.24%)
Ecommerce Website Security ChecklistList of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built into the Techinical Specific Document, or will be checked in the Security testing phases.
Stars: ✭ 98 (-95.37%)
VenomVenom - A Multi-hop Proxy for Penetration Testers
Stars: ✭ 1,228 (-41.99%)
Burpsuite XkeysA Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.
Stars: ✭ 144 (-93.2%)
QuiverQuiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-93.39%)
Lctf2018Source code, writeups and exps in LCTF2018.
Stars: ✭ 130 (-93.86%)
BlackwormBlack Worm Offical Repo
Stars: ✭ 80 (-96.22%)
BrutesharkNetwork Analysis Tool
Stars: ✭ 1,335 (-36.94%)
Project TauroA Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-97.54%)
Flux Keylogger🔖 Modern Javascript keylogger with web panel
Stars: ✭ 122 (-94.24%)
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-97.59%)
Aura BotnetA super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Bash, and Powershell.
Stars: ✭ 95 (-95.51%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+324.23%)
Paredit CheatsheetA new, scalable source document for the Paredit Cheatsheet available as a png on the Emacs wiki
Stars: ✭ 48 (-97.73%)
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-95.42%)
PrivesccheckPrivilege Escalation Enumeration Script for Windows
Stars: ✭ 1,032 (-51.25%)
Labs PentestFree Labs to Train Your Pentest / CTF Skills
Stars: ✭ 46 (-97.83%)
CtfscoreboardScoreboard for Capture The Flag competitions.
Stars: ✭ 148 (-93.01%)
Write Ups📚 VoidHack CTF write-ups
Stars: ✭ 45 (-97.87%)
Python RansomwarePython Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (-95.47%)
Cfw2ofw HelperProviding aid in converting video games.
Stars: ✭ 44 (-97.92%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (-7.94%)
Ctfclictfcli is a tool to manage Capture The Flag events and challenges
Stars: ✭ 43 (-97.97%)
Spykeyboardkeylogger which sends us the data to our gmail.
Stars: ✭ 95 (-95.51%)
PwntoolsCTF framework and exploit development library
Stars: ✭ 8,585 (+305.53%)
StegbruteFast Steganography bruteforce tool written in Rust useful for CTF's
Stars: ✭ 134 (-93.67%)
Usb Keystroke Injector☠️ An Arduino-based USB keyboard simulator which injects keystrokes via Bluetooth protocol or predefined payloads in a SD card.
Stars: ✭ 42 (-98.02%)
Delete2systemWeaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM
Stars: ✭ 95 (-95.51%)
TaketvTakeTV permite descubrir dispositivos de red DLNA/UPnP y ayuda a reproducir archivos multimedia en los televisores inteligentes desde nuestra terminal en Linux.
Stars: ✭ 41 (-98.06%)
Shodan DorksDorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (-94.43%)
FawkesFawkes is a tool to search for targets vulnerable to SQL Injection. Performs the search using Google search engine.
Stars: ✭ 108 (-94.9%)
Slideswon't maintain
Stars: ✭ 79 (-96.27%)
StegextractDetect hidden files and text in images
Stars: ✭ 79 (-96.27%)
JwtxploiterA tool to test security of json web token
Stars: ✭ 130 (-93.86%)
PossumbotA bot that will allow you to destroy discord servers.
Stars: ✭ 106 (-94.99%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-96.27%)