Awesome Cyber SecurityA collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
Stars: ✭ 333 (+2927.27%)
shu-shellWebshell Jumping Edition
Stars: ✭ 23 (+109.09%)
A2svAuto Scanning to SSL Vulnerability
Stars: ✭ 524 (+4663.64%)
AlanFrameworkA C2 post-exploitation framework
Stars: ✭ 405 (+3581.82%)
CtfCTF (Capture The Flag) writeups, code snippets, notes, scripts
Stars: ✭ 336 (+2954.55%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+17481.82%)
rockstar-cliBecome a Github Rockstar in less than 10 seconds
Stars: ✭ 18 (+63.64%)
Ctf Writeups PublicWriteups for infosec Capture the Flag events by team Galaxians
Stars: ✭ 331 (+2909.09%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+2590.91%)
Ctf NotesEverything needed for doing CTFs
Stars: ✭ 304 (+2663.64%)
MercuryMercury is a hacking tool used to collect information and use the information to further hurt the target
Stars: ✭ 236 (+2045.45%)
Lime RatLimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
Stars: ✭ 663 (+5927.27%)
BugbountyscannerA Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.
Stars: ✭ 229 (+1981.82%)
PhishmailerGenerate Professional Phishing Emails Fast And Easy
Stars: ✭ 227 (+1963.64%)
Lo0sRLo0sR is a simple python Keylogger with many functions.
Stars: ✭ 48 (+336.36%)
BillcipherInformation Gathering tool for a Website or IP address
Stars: ✭ 332 (+2918.18%)
Web-TrackerStand alone program that Tracks/Logs all the opened websites in the Chrome Browser. Even incognito! *No need to install anything in browser*
Stars: ✭ 34 (+209.09%)
PhonesploitUsing open Adb ports we can exploit a Andriod Device
Stars: ✭ 854 (+7663.64%)
Black-ToolInstall the tools and start Attacking , black-tool v5.0 ! ⬛
Stars: ✭ 239 (+2072.73%)
PivotsuiteNetwork Pivoting Toolkit
Stars: ✭ 329 (+2890.91%)
AndspoiltRun interactive android exploits in linux.
Stars: ✭ 101 (+818.18%)
YasuoA ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (+4600%)
Teardroid-phprat🇮🇳 🤖 It's easy to use android botnet work without port forwarding, vps and android studio
Stars: ✭ 417 (+3690.91%)
Langhost👻 A LAN dropbox chatbot controllable via Telegram
Stars: ✭ 324 (+2845.45%)
BrutalPayload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (+6063.64%)
Storm-BreakerSocial engineering tool [Access Webcam & Microphone & Location Finder] With Python
Stars: ✭ 1,489 (+13436.36%)
AirgeddonThis is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (+34718.18%)
UmbraA LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malware and more.
Stars: ✭ 98 (+790.91%)
Cheetaha very fast brute force webshell password tool
Stars: ✭ 509 (+4527.27%)
phishEyephishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (+327.27%)
OsintgramOsintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Stars: ✭ 312 (+2736.36%)
DccwbypassuacWindows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".
Stars: ✭ 227 (+1963.64%)
KalimuxInstall And Use Kali Linux With Gui In Termux
Stars: ✭ 240 (+2081.82%)
Linkedin2usernameOSINT Tool: Generate username lists for companies on LinkedIn
Stars: ✭ 504 (+4481.82%)
ThechoiceThe linux choice collection tools
Stars: ✭ 245 (+2127.27%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+52290.91%)
S6 pcie microblazePCI Express DIY hacking toolkit for Xilinx SP605
Stars: ✭ 301 (+2636.36%)
CalderaAutomated Adversary Emulation Platform
Stars: ✭ 3,126 (+28318.18%)
Juice Shop CtfCapture-the-Flag (CTF) environment setup tools for OWASP Juice Shop
Stars: ✭ 238 (+2063.64%)
PayloadsGit All the Payloads! A collection of web attack payloads.
Stars: ✭ 2,862 (+25918.18%)
Lost Nds TvThe Lost Nintendo DS Television Output, brought back to life
Stars: ✭ 221 (+1909.09%)
TextractorExtracts text from video games and visual novels. Highly extensible.
Stars: ✭ 656 (+5863.64%)
WebkillerTool Information Gathering Write By Python.
Stars: ✭ 300 (+2627.27%)
Jsql InjectionjSQL Injection is a Java application for automatic SQL database injection.
Stars: ✭ 891 (+8000%)
RubyfuRubyfu, where Ruby goes evil!
Stars: ✭ 228 (+1972.73%)
Gta ReversedReversed code of GTA:SA executable (gta_sa.exe) 1.0 US
Stars: ✭ 297 (+2600%)
Iprotate burp extensionExtension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.
Stars: ✭ 484 (+4300%)
DarthsidiousBuilding an Active Directory domain and hacking it
Stars: ✭ 479 (+4254.55%)
BadmodCMS auto detect and exploit.
Stars: ✭ 296 (+2590.91%)
PupyPupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+61145.45%)
Webshell Sample收集自网络各处的 webshell 样本,用于测试 webshell 扫描器检测率。
Stars: ✭ 647 (+5781.82%)
GitpreySearching sensitive files and contents in GitHub associated to company name or other key words
Stars: ✭ 478 (+4245.45%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (+4245.45%)
IpdroneTrack Location With Live Address And Accuracy In Termux
Stars: ✭ 286 (+2500%)
Android ExploitsA collection of android Exploits and Hacks
Stars: ✭ 290 (+2536.36%)