InjectallthethingsSeven different DLL injection techniques in one single project.
Stars: ✭ 1,297 (+500.46%)
PerunPerun是一款主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架
Stars: ✭ 773 (+257.87%)
PichiFlexible Rule-Based Proxy
Stars: ✭ 149 (-31.02%)
VhostscanA virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+255.09%)
Covid19 ReviewA collaborative review of the emerging COVID-19 literature. Join the chat here:
Stars: ✭ 102 (-52.78%)
Awesome RatRAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
Stars: ✭ 759 (+251.39%)
Arp SpooferA pure-Python ARP Cache Poisoning (a.k.a "ARP Spoofing") tool
Stars: ✭ 180 (-16.67%)
Collection DocumentCollection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+542.13%)
One click script一键安装 trojan v2ray xray. Install v2ray / xray (VLESS) and trojan (trojan-go) script
Stars: ✭ 751 (+247.69%)
SilentbridgeSilentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.
Stars: ✭ 136 (-37.04%)
Redteam vul红队作战中比较常遇到的一些重点系统漏洞整理。
Stars: ✭ 1,271 (+488.43%)
ChashellChashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
Stars: ✭ 742 (+243.52%)
Security ScriptsA collection of public offensive and defensive security related scripts for InfoSec students.
Stars: ✭ 101 (-53.24%)
ClientWindows, OS X and linux RAT client
Stars: ✭ 89 (-58.8%)
Awesome Web Security🐶 A curated list of Web Security materials and resources.
Stars: ✭ 6,623 (+2966.2%)
BettercapThe Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Stars: ✭ 10,735 (+4869.91%)
ManalyzeA static analyzer for PE executables.
Stars: ✭ 701 (+224.54%)
StitchPython Remote Administration Tool (RAT)
Stars: ✭ 2,018 (+834.26%)
RoadmapGitBook: OSCP RoadMap
Stars: ✭ 89 (-58.8%)
V2ray Desktop最优雅的跨平台代理客户端,支持Shadowsocks(R),V2Ray和Trojan协议。The most elegant cross-platform proxy GUI client that supports Shadowsocks(R), V2Ray, and Trojan. Built with Qt5 and QML2.
Stars: ✭ 671 (+210.65%)
GorsairGorsair hacks its way into remote docker containers that expose their APIs
Stars: ✭ 678 (+213.89%)
KratosknifeKratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
Stars: ✭ 97 (-55.09%)
Thc Ipv6IPv6 attack toolkit
Stars: ✭ 673 (+211.57%)
Pyiris BackdoorPyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (-32.87%)
KeyloggerA powerful C keylogger for Windows.
Stars: ✭ 89 (-58.8%)
YamsA collection of Ansible roles for automating infosec builds.
Stars: ✭ 98 (-54.63%)
Kuherowebsocket proxy on heroku
Stars: ✭ 192 (-11.11%)
V2ray Agent(VLESS+TCP+TLS/VLESS+TCP+XTLS/VLESS+gRPC+TLS/VLESS+WS+TLS/VMess+TCP+TLS/VMess+WS+TLS/Trojan+TCP+TLS/Trojan+gRPC+TLS/Trojan+TCP+XTLS)+伪装站点、八合一共存脚本,支持多内核安装
Stars: ✭ 4,133 (+1813.43%)
Eyes.shLet's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?"
Stars: ✭ 89 (-58.8%)
JackhammerJackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
Stars: ✭ 633 (+193.06%)
GorshA Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
Stars: ✭ 97 (-55.09%)
AstraAutomated Security Testing For REST API's
Stars: ✭ 1,898 (+778.7%)
Penetration Testing ToolsA collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (+184.26%)
IlluminatejsIlluminateJS is a static JavaScript deobfuscator
Stars: ✭ 96 (-55.56%)
TcpproxyIntercepting TCP proxy to modify raw TCP streams using modules on incoming or outgoing traffic
Stars: ✭ 176 (-18.52%)
DotdotpwnDotDotPwn - The Directory Traversal Fuzzer
Stars: ✭ 601 (+178.24%)
Python RansomwarePython Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (-55.56%)
Blocklist Ipsetsipsets dynamically updated with firehol's update-ipsets.sh script
Stars: ✭ 2,011 (+831.02%)
Scanners BoxA powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑
Stars: ✭ 5,590 (+2487.96%)
Ssh MitmSSH man-in-the-middle tool
Stars: ✭ 1,328 (+514.81%)
KageKage is Graphical User Interface for Metasploit Meterpreter and Session Handler
Stars: ✭ 578 (+167.59%)
BadpodsA collection of manifests that will create pods with elevated privileges.
Stars: ✭ 93 (-56.94%)
DartDART is a test documentation tool created by the Lockheed Martin Red Team to document and report on penetration tests, especially in isolated network environments.
Stars: ✭ 207 (-4.17%)
Pentest NotesCollection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
Stars: ✭ 89 (-58.8%)
Fudgec2FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (-11.57%)
Trojan R轻量高效的 Trojan 代理,使用 Rust 实现
Stars: ✭ 174 (-19.44%)
ReconnoitreA security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+744.44%)
MalwoverviewMalwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, ThreatCrowd, Valhalla, Malware Bazaar, ThreatFox and it is able to scan Android devices against VT and HA.
Stars: ✭ 1,276 (+490.74%)
QuiverQuiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-35.19%)
BlackratBlackRAT - Java Based Remote Administrator Tool
Stars: ✭ 87 (-59.72%)
YpsilonAutomated Use Case Testing
Stars: ✭ 135 (-37.5%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-59.72%)
Atomic Red Team Intelligence C2ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (-59.72%)