Cve 2018 8120CVE-2018-8120 Windows LPE exploit
Stars: ✭ 447 (-46.85%)
HershellHershell is a simple TCP reverse shell written in Go.
Stars: ✭ 442 (-47.44%)
Gta ReversedReversed code of GTA:SA executable (gta_sa.exe) 1.0 US
Stars: ✭ 297 (-64.68%)
KeyloggerGet Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (-28.18%)
Windows kernel resourcesPapers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits
Stars: ✭ 298 (-64.57%)
Django JenkinsPlug and play continuous integration with django and jenkins
Stars: ✭ 933 (+10.94%)
BadmodCMS auto detect and exploit.
Stars: ✭ 296 (-64.8%)
GraphqlmapGraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes.
Stars: ✭ 434 (-48.39%)
Helm ChartsA curated set of Helm charts brought to you by codecentric
Stars: ✭ 295 (-64.92%)
CharlatanoProves JVM cheats are viable on native games, and demonstrates the longevity against anti-cheat signature detection systems
Stars: ✭ 599 (-28.78%)
Awesome Security GistsA collection of various GitHub gists for hackers, pentesters and security researchers
Stars: ✭ 701 (-16.65%)
DawsAdvanced Web Shell
Stars: ✭ 551 (-34.48%)
Ics Security ToolsTools, tips, tricks, and more for exploring ICS Security.
Stars: ✭ 749 (-10.94%)
Ss7maperSS7 MAP (pen-)testing toolkit. DISCONTINUED REPO, please use: https://github.com/0xc0decafe/ss7MAPer/
Stars: ✭ 394 (-53.15%)
PowerhubA post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Stars: ✭ 431 (-48.75%)
TomcatwardeployerApache Tomcat auto WAR deployment & pwning penetration testing tool.
Stars: ✭ 287 (-65.87%)
ZipA portable, simple zip library written in C
Stars: ✭ 596 (-29.13%)
Ansible PlaybooksAnsible playbook collection that have been written for Ubuntu. Some of the playbooks are Elasticsearch, Mesos, AWS, MySql, Sensu, Nginx etc..
Stars: ✭ 429 (-48.99%)
Am I Affected By MeltdownMeltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.
Stars: ✭ 549 (-34.72%)
Awesome OscpA curated list of awesome OSCP resources
Stars: ✭ 804 (-4.4%)
OsmedeusFully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+303.21%)
HulkHULK DoS tool ported to Go with some additional features.
Stars: ✭ 427 (-49.23%)
Ios Debug Hacks🎯 Advanced debugging skills used in the iOS project development process, involves the dynamic debugging, static analysis and decompile of third-party libraries. iOS 项目开发过程中用到的高级调试技巧,涉及三方库动态调试、静态分析和反编译等领域
Stars: ✭ 595 (-29.25%)
Ictf FrameworkThe iCTF Framework, presented by Shellphish!
Stars: ✭ 281 (-66.59%)
ChronicelOur super sweet hacker management system, built for HackTCNJ 2017+ | Used by [email protected] 2018!
Stars: ✭ 18 (-97.86%)
Opscloud运维管理平台(阿里云),自动同步阿里云配置信息,堡垒机(容器),批量运维,Kubernetes,Zabbix管理等功能
Stars: ✭ 788 (-6.3%)
Pentesterspecialdict渗透测试人员专用精简化字典 Dictionary for penetration testers happy hacker
Stars: ✭ 391 (-53.51%)
Jenkinsfile RunnerA command line tool to run Jenkinsfile as a function
Stars: ✭ 727 (-13.56%)
Cve 2017 11882CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.
Stars: ✭ 280 (-66.71%)
BrutesploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (-49.58%)
Vps个人笔记汇总
Stars: ✭ 276 (-67.18%)
OpendoorOWASP WEB Directory Scanner
Stars: ✭ 586 (-30.32%)
CloudbunnyCloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search engines to search domain information: Shodan, Censys and Zoomeye.
Stars: ✭ 273 (-67.54%)
KeyloggerKeylogger is 100% invisible keylogger not only for users, but also undetectable by antivirus software. Blackcat keylogger Monitors all keystokes, Mouse clicks. It has a seperate process which continues capture system screenshot and send to ftp server in given time.
Stars: ✭ 271 (-67.78%)
NxloaderMy first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)
Stars: ✭ 417 (-50.42%)
Jenkins CourseThis is the repository with all the resources for the Jenkins training on Udemy
Stars: ✭ 269 (-68.01%)
Naive HashcatCrack password hashes without the fuss 🐈
Stars: ✭ 726 (-13.67%)
BlackmambaC2/post-exploitation framework
Stars: ✭ 544 (-35.32%)
Slackor A Golang implant that uses Slack as a command and control server
Stars: ✭ 392 (-53.39%)
JxJenkins X provides automated CI+CD for Kubernetes with Preview Environments on Pull Requests using Cloud Native pipelines from Tekton
Stars: ✭ 4,041 (+380.5%)
Impulse💣 Impulse Denial-of-service ToolKit
Stars: ✭ 538 (-36.03%)
Danger Js⚠️ Stop saying "you forgot to …" in code review
Stars: ✭ 4,076 (+384.66%)
Struts PwnAn exploit for Apache Struts CVE-2017-5638
Stars: ✭ 391 (-53.51%)
Name That Hash🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 3000+ other hashes ☄ Comes with a neat web app 🔥
Stars: ✭ 540 (-35.79%)
NmapIdiomatic nmap library for go developers
Stars: ✭ 391 (-53.51%)