ThefatratThefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+1963.89%)
HacktheworldAn Python Script For Generating Payloads that Bypasses All Antivirus so far .
Stars: ✭ 527 (+82.99%)
ParadoxiaratParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (+37.15%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+151.74%)
Hg8045qPwning the Nuro issued Huawei HG8045Q
Stars: ✭ 107 (-62.85%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+244.44%)
Ghost👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (+8.33%)
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+312.5%)
Ssrf vulnerable labThis Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Stars: ✭ 361 (+25.35%)
Log KillerClear all your logs in [linux/windows] servers 🛡️
Stars: ✭ 252 (-12.5%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-87.5%)
Project TauroA Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-81.94%)
TomcatwardeployerApache Tomcat auto WAR deployment & pwning penetration testing tool.
Stars: ✭ 287 (-0.35%)
Xeexe TopantivirusevasionUndetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (+34.38%)
ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-50.69%)
ShuffleWebShell Backdoor Framework
Stars: ✭ 11 (-96.18%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+293.06%)
BbreconPython library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-41.32%)
MouseMouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-35.42%)
TaipanWeb application vulnerability scanner
Stars: ✭ 359 (+24.65%)
ViewstateASP.NET View State Decoder
Stars: ✭ 77 (-73.26%)
Hacker101Source code for Hacker101.com - a free online web and mobile security class.
Stars: ✭ 12,246 (+4152.08%)
MinesweeperA Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-43.75%)
CtftoolsPersonal CTF Toolkit
Stars: ✭ 312 (+8.33%)
Powershell RatPython based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+120.83%)
BroxyAn HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (+216.67%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+340.28%)
FdsploitFile Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (-30.9%)
FavfreakMaking Favicon.ico based Recon Great again !
Stars: ✭ 564 (+95.83%)
NetwormPython network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-53.12%)
RspetRSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Stars: ✭ 251 (-12.85%)
firecrackerStop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (+52.08%)
Dumpall一款信息泄漏利用工具,适用于.git/.svn源代码泄漏和.DS_Store泄漏
Stars: ✭ 250 (-13.19%)
BlacknetFree advanced and modern Windows botnet with a nice and secure PHP panel.
Stars: ✭ 271 (-5.9%)
Lyncsmashlocate and attack Lync/Skype for Business
Stars: ✭ 258 (-10.42%)
Droid Hunter(deprecated) Android application vulnerability analysis and Android pentest tool
Stars: ✭ 256 (-11.11%)
Vps个人笔记汇总
Stars: ✭ 276 (-4.17%)
BamfA tool which utilizes Shodan to detect vulnerable IoT devices.
Stars: ✭ 269 (-6.6%)
HackServPython 3 IRC Bot / Botnet
Stars: ✭ 28 (-90.28%)
WDIRGood resources about web security that I have read.
Stars: ✭ 14 (-95.14%)
ArachniWeb Application Security Scanner Framework
Stars: ✭ 2,942 (+921.53%)
PasswordGeneratorA simple C# helper class for ASP.NET Core to generate a random password with custom strength requirements: min length, uppercase, lowercase, digits & more
Stars: ✭ 27 (-90.62%)
HackbrowserdataDecrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。
Stars: ✭ 3,864 (+1241.67%)
Raven-StormRaven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.
Stars: ✭ 235 (-18.4%)
RemoteFFmpegGUI使用 Vue.js + ASP.NET 搭建的 FFMpeg 的 Web GUI 平台,支持视频转码、拼接视频、合并音视频等操作。并有使用 WPF 技术的 Windows 桌面端。
Stars: ✭ 21 (-92.71%)
Ad-Hoc-Report-Builder-.net-mvcOpen Source Reporting tool for .NET6/.NET Core/.NET Framework that you can embed in your application and generate dashboards and ad hoc reports
Stars: ✭ 43 (-85.07%)
CloudscraperCloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.
Stars: ✭ 276 (-4.17%)
Application Security Engineer Interview QuestionsSome of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exhaustive list but i felt these questions were important to be asked and some were challenging to answer
Stars: ✭ 267 (-7.29%)
TG799VAC-XTREME-17.2-MINTMy personal unique wiki for hacking the router firmware used by (Telia)TG799vac Xtream v17.2-MINT delivered from Technicolor
Stars: ✭ 71 (-75.35%)