Mqtt PwnMQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.
Stars: ✭ 156 (+239.13%)
Tidos FrameworkThe Offensive Manual Web Application Penetration Testing Framework.
Stars: ✭ 1,290 (+2704.35%)
Reconky-Automated Bash ScriptReconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (+263.04%)
crawleetWeb Recon & Exploitation Tool.
Stars: ✭ 48 (+4.35%)
Awesome BbhtA bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (+313.04%)
flydnsRelated subdomains finder
Stars: ✭ 29 (-36.96%)
PortforgeLightweight utility to fool port scanners
Stars: ✭ 23 (-50%)
SourceWolfAmazingly fast response crawler to find juicy stuff in the source code! 😎🔥
Stars: ✭ 132 (+186.96%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+543.48%)
go-spyseThe official wrapper for spyse.com API, written in Go, aimed to help developers build their integrations with Spyse.
Stars: ✭ 25 (-45.65%)
XposedOrNotXposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of such compromised passwords is detrimental to individual account security.
Stars: ✭ 120 (+160.87%)
Investigo🔎 Find usernames and download their data across social media.
Stars: ✭ 168 (+265.22%)
CEHExam Prep for the Ec-council Certified Ethical Hacker 312-50
Stars: ✭ 71 (+54.35%)
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-50%)
DevBrute-A Password Brute ForcerDevBrute is a Password Brute Forcer, It can Brute Force almost all Social Media Accounts or Any Web Application.
Stars: ✭ 91 (+97.83%)
exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (+165.22%)
CandyPotatoPure C++, weaponized, fully automated implementation of RottenPotatoNG
Stars: ✭ 278 (+504.35%)
Recon-XAdvanced Reconnaissance tool to enumerate attacking surface of the target.
Stars: ✭ 27 (-41.3%)
ArgosThis script will automatically set up an OSINT workstation starting from a Ubuntu OS.
Stars: ✭ 73 (+58.7%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+204.35%)
kahoot-toolsA website for interacting with kahoot games.
Stars: ✭ 63 (+36.96%)
PLtools整理一些内网常用渗透小工具
Stars: ✭ 227 (+393.48%)
easyreconTool to automate recon
Stars: ✭ 37 (-19.57%)
OverRideBinary Exploitation and Reverse-Engineering (from assembly into C)
Stars: ✭ 69 (+50%)
urlRecon📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (-32.61%)
SubRosaBasic tool to automate backdooring PE files
Stars: ✭ 48 (+4.35%)
subdomainsEnumeratorA docker image which will enumerate, sort, unique and resolve the results of various subdomains enumeration tools.
Stars: ✭ 63 (+36.96%)
PythonPython Powered Repository
Stars: ✭ 17 (-63.04%)
NTU-Computer-Security台大 計算機安全 - Pwn 簡報、影片、作業題目與解法 - Computer Security Fall 2019 @ CSIE NTU Taiwan
Stars: ✭ 293 (+536.96%)
JiraffeOne stop place for exploiting Jira instances in your proximity
Stars: ✭ 157 (+241.3%)
Hack4Squad💀 A bash hacking and scanning framework.
Stars: ✭ 45 (-2.17%)
warfWARF is a Web Application Reconnaissance Framework that helps to gather information about the target.
Stars: ✭ 53 (+15.22%)
tugareconPentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+208.7%)
webreconAutomated Web Recon Shell Scripts
Stars: ✭ 48 (+4.35%)
prickly-peteA script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER may not be fun, not to be taken internally, aim away from face)
Stars: ✭ 29 (-36.96%)
fastoverflowtkThis Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variables/commands. Payloads can be generated through MSFVENOM or you can use your own ASM files.
Stars: ✭ 16 (-65.22%)
SudomySudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 1,572 (+3317.39%)
apkizerapkizer is a mass downloader for android applications for all available versions.
Stars: ✭ 40 (-13.04%)
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (+176.09%)
linksys-wrt54gExploiting Linksys WRT54G using a vulnerability I found.
Stars: ✭ 31 (-32.61%)
biscBorrowed Instructions Synthetic Computation
Stars: ✭ 71 (+54.35%)
exploitsSome of my public exploits
Stars: ✭ 50 (+8.7%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+93.48%)
Sub-DrillA very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Stars: ✭ 70 (+52.17%)
Git-SecretGo scripts for finding sensitive data like API key / some keywords in the github repository
Stars: ✭ 156 (+239.13%)
rest-apiREST API backend for Reconmap
Stars: ✭ 48 (+4.35%)
Awesome-CyberSec-ResourcesAn awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (+493.48%)
adalancheActive Directory ACL Visualizer and Explorer - who's really Domain Admin?
Stars: ✭ 862 (+1773.91%)
IdacyberData Visualization Plugin for IDA Pro
Stars: ✭ 244 (+430.43%)
titanmThis repository contains the tools we used in our research on the Google Titan M chip
Stars: ✭ 149 (+223.91%)
XxexploiterTool to help exploit XXE vulnerabilities
Stars: ✭ 243 (+428.26%)
InjectopiA set of tutorials about code injection for Windows.
Stars: ✭ 237 (+415.22%)
BFS2019Bluefrost Exploitation Challenge 2019 - Exploit and Writeup
Stars: ✭ 20 (-56.52%)
mqttinfoAttempts to determine the configuration, behavior, and type of a remote MQTT broker
Stars: ✭ 17 (-63.04%)
CommixAutomated All-in-One OS Command Injection Exploitation Tool.
Stars: ✭ 3,016 (+6456.52%)
Insecureprogrammingmirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/
Stars: ✭ 229 (+397.83%)
hunter🐺 Command-line application and golang client library for hunter.io
Stars: ✭ 28 (-39.13%)