SubRosaBasic tool to automate backdooring PE files
Stars: ✭ 48 (+4.35%)
subdomainsEnumeratorA docker image which will enumerate, sort, unique and resolve the results of various subdomains enumeration tools.
Stars: ✭ 63 (+36.96%)
Vulnerable KextA WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Stars: ✭ 188 (+308.7%)
PythonPython Powered Repository
Stars: ✭ 17 (-63.04%)
Xerrorfully automated pentesting tool
Stars: ✭ 173 (+276.09%)
NTU-Computer-Security台大 計算機安全 - Pwn 簡報、影片、作業題目與解法 - Computer Security Fall 2019 @ CSIE NTU Taiwan
Stars: ✭ 293 (+536.96%)
JiraffeOne stop place for exploiting Jira instances in your proximity
Stars: ✭ 157 (+241.3%)
Fsocietyfsociety Hacking Tools Pack – A Penetration Testing Framework
Stars: ✭ 7,224 (+15604.35%)
FlashsploitExploitation Framework for ATtiny85 Based HID Attacks
Stars: ✭ 155 (+236.96%)
Hack4Squad💀 A bash hacking and scanning framework.
Stars: ✭ 45 (-2.17%)
Magisk Frida🔐 Run frida-server on boot with Magisk, always up-to-date
Stars: ✭ 144 (+213.04%)
warfWARF is a Web Application Reconnaissance Framework that helps to gather information about the target.
Stars: ✭ 53 (+15.22%)
FuxploiderFile upload vulnerability scanner and exploitation tool.
Stars: ✭ 1,997 (+4241.3%)
tugareconPentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+208.7%)
BlazefoxBlazefox exploits for Windows 10 RS5 64-bit.
Stars: ✭ 134 (+191.3%)
webreconAutomated Web Recon Shell Scripts
Stars: ✭ 48 (+4.35%)
Poc T渗透测试插件化并发框架 / Open-sourced remote vulnerability PoC/EXP framework
Stars: ✭ 1,722 (+3643.48%)
prickly-peteA script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER may not be fun, not to be taken internally, aim away from face)
Stars: ✭ 29 (-36.96%)
PakuriPenetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (+171.74%)
fastoverflowtkThis Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variables/commands. Payloads can be generated through MSFVENOM or you can use your own ASM files.
Stars: ✭ 16 (-65.22%)
SudomySudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 1,572 (+3317.39%)
ArissploitArissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (+147.83%)
apkizerapkizer is a mass downloader for android applications for all available versions.
Stars: ✭ 40 (-13.04%)
VailynA phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (+123.91%)
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (+176.09%)
SsrfmapAutomatic SSRF fuzzer and exploitation tool
Stars: ✭ 1,344 (+2821.74%)
linksys-wrt54gExploiting Linksys WRT54G using a vulnerability I found.
Stars: ✭ 31 (-32.61%)
BughunterTools for Bug Hunting
Stars: ✭ 95 (+106.52%)
biscBorrowed Instructions Synthetic Computation
Stars: ✭ 71 (+54.35%)
WinpwnAutomation for internal Windows Penetrationtest / AD-Security
Stars: ✭ 1,303 (+2732.61%)
exploitsSome of my public exploits
Stars: ✭ 50 (+8.7%)
hunter🐺 Command-line application and golang client library for hunter.io
Stars: ✭ 28 (-39.13%)
ShellabLinux and Windows shellcode enrichment utility
Stars: ✭ 225 (+389.13%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+93.48%)
Sub-DrillA very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Stars: ✭ 70 (+52.17%)
RopperDisplay information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper uses the awesome Capstone Framework.
Stars: ✭ 1,218 (+2547.83%)
Git-SecretGo scripts for finding sensitive data like API key / some keywords in the github repository
Stars: ✭ 156 (+239.13%)
rest-apiREST API backend for Reconmap
Stars: ✭ 48 (+4.35%)
PwinSecurity Evaluation of Dynamic Binary Instrumentation Engines
Stars: ✭ 70 (+52.17%)
Awesome-CyberSec-ResourcesAn awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (+493.48%)
Write Ups📚 VoidHack CTF write-ups
Stars: ✭ 45 (-2.17%)
adalancheActive Directory ACL Visualizer and Explorer - who's really Domain Admin?
Stars: ✭ 862 (+1773.91%)
FoxpwnExploit code for CVE-2016-9066
Stars: ✭ 39 (-15.22%)
IdacyberData Visualization Plugin for IDA Pro
Stars: ✭ 244 (+430.43%)
PysploitRemote exploitation framework written in Python
Stars: ✭ 37 (-19.57%)
titanmThis repository contains the tools we used in our research on the Google Titan M chip
Stars: ✭ 149 (+223.91%)
InjectopiA set of tutorials about code injection for Windows.
Stars: ✭ 237 (+415.22%)
BFS2019Bluefrost Exploitation Challenge 2019 - Exploit and Writeup
Stars: ✭ 20 (-56.52%)
TigersharkBilingual PhishingKit. TigerShark intergrates a vast array of various phishing tools and frameworks, from C2 servers, backdoors and delivery methods in multiple scripting languages in order to suit whatever your deployment needs may be.
Stars: ✭ 212 (+360.87%)
Insecureprogrammingmirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/
Stars: ✭ 229 (+397.83%)
mailcatFind existing email addresses by nickname using API/SMTP checking methods without user notification. Please, don't hesitate to improve cat's job! 🐱🔎 📬
Stars: ✭ 219 (+376.09%)
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-2.17%)
AshokAshok is a OSINT Recon Tool , a.k.a 😍 Swiss Army knife .
Stars: ✭ 109 (+136.96%)
LBFHAbout All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers
Stars: ✭ 46 (+0%)