Spectre AttackExample of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
Stars: ✭ 690 (-48.62%)
YsfYSF Server Functions
Stars: ✭ 77 (-94.27%)
ShellshockhunterIt's a simple tool for test vulnerability shellshock
Stars: ✭ 52 (-96.13%)
EmagnetAutomated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password together from recent uploads from https://pastebin.com. Bruteforce support for spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts
Stars: ✭ 688 (-48.77%)
Lockdoor Framework🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (-49.59%)
SjasmplusSJAsmPlus: Z80 cross-assembler
Stars: ✭ 51 (-96.2%)
AtlasQuick SQLMap Tamper Suggester
Stars: ✭ 679 (-49.44%)
Griefing MethodsA documentation about how to hack Minecraft servers
Stars: ✭ 76 (-94.34%)
BrutalPayload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (-49.52%)
DirsearchWeb path scanner
Stars: ✭ 7,246 (+439.54%)
ThefatratThefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+342.59%)
Cfw2ofw HelperProviding aid in converting video games.
Stars: ✭ 44 (-96.72%)
FavfreakMaking Favicon.ico based Recon Great again !
Stars: ✭ 564 (-58%)
CiscoexploitCisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution/CVE-2019-1653/Cisco SNMP RCE/Dump Cisco RV320 Password)
Stars: ✭ 73 (-94.56%)
NishangNishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: ✭ 5,943 (+342.52%)
PwntoolsCTF framework and exploit development library
Stars: ✭ 8,585 (+539.24%)
RedcloudAutomated Red Team Infrastructure deployement using Docker
Stars: ✭ 551 (-58.97%)
CdkCDK is an open-sourced container penetration toolkit, offering stable exploitation in different slimmed containers without any OS dependency. It comes with penetration tools and many powerful PoCs/EXPs helps you to escape container and takeover K8s cluster easily.
Stars: ✭ 1,264 (-5.88%)
Am I Affected By MeltdownMeltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.
Stars: ✭ 549 (-59.12%)
Cve 2018 18852CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.
Stars: ✭ 42 (-96.87%)
Impulse💣 Impulse Denial-of-service ToolKit
Stars: ✭ 538 (-59.94%)
SandmapNmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (-12.14%)
Onexonex is a hacking tool installer and package manager for hackers. Onex is a library of all hacking tools for Termux and other Linux distributions. onex can install any third party tool or any hacking tool for you.
Stars: ✭ 537 (-60.01%)
KeyloggerA simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (-25.02%)
Apac ConferencesA community contributed consolidated list of InfoSec meetups in the Asia Pacific region.
Stars: ✭ 90 (-93.3%)
HacktheworldAn Python Script For Generating Payloads that Bypasses All Antivirus so far .
Stars: ✭ 527 (-60.76%)
LabsVulnerability Labs for security analysis
Stars: ✭ 1,002 (-25.39%)
A2svAuto Scanning to SSL Vulnerability
Stars: ✭ 524 (-60.98%)
Lor Axe🪓 a multi-threaded, low-bandwidth HTTP DOS tool
Stars: ✭ 72 (-94.64%)
Saint👁 (s)AINT is a Spyware Generator for Windows systems written in Java. [Discontinued]
Stars: ✭ 522 (-61.13%)
Logkeys📝 ⌨️ A GNU/Linux keylogger that works!
Stars: ✭ 518 (-61.43%)
In Spectre MeltdownThis tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-93.6%)
0d1nTool for automating customized attacks against web applications. Fully made in C language with pthreads, it has fast performance.
Stars: ✭ 506 (-62.32%)
Kernel ExploitsMy proof-of-concept exploits for the Linux kernel
Stars: ✭ 1,173 (-12.66%)
Iprotate burp extensionExtension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.
Stars: ✭ 484 (-63.96%)
FormationvideoContenus et ressources de la chaîne FormationVidéo (YouTube)
Stars: ✭ 91 (-93.22%)
Swift KeyloggerKeylogger for mac written in Swift using HID
Stars: ✭ 995 (-25.91%)
CtfSome of my CTF solutions
Stars: ✭ 70 (-94.79%)
TextractorExtracts text from video games and visual novels. Highly extensible.
Stars: ✭ 656 (-51.15%)
Jok3rJok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (-51.97%)
InstainsaneMulti-threaded Instagram Brute Forcer (100 attemps at once)
Stars: ✭ 475 (-64.63%)
Methodtraceman用于快速找到高耗时方法,定位解决Android App卡顿问题。通过gradle plugin+ASM实现可配置范围的方法插桩来统计所有方法的耗时,并提供友好的界面展示,支持耗时筛选、线程筛选、方法名筛选等。(A Tool for Discovering High Time-consuming Methods for Android App)
Stars: ✭ 1,258 (-6.33%)
Search That Hash🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (-65.3%)
PysploitRemote exploitation framework written in Python
Stars: ✭ 37 (-97.24%)
PocProofs-of-concept
Stars: ✭ 467 (-65.23%)
Toledo AtomchessToledo Atomchess is the world's smallest chess program in x86 assembly code
Stars: ✭ 69 (-94.86%)
Burp Bounty ProfilesBurp Bounty profiles compilation, feel free to contribute!
Stars: ✭ 76 (-94.34%)
Security whitepapersCollection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQLi
Stars: ✭ 644 (-52.05%)
JoomscanOWASP Joomla Vulnerability Scanner Project
Stars: ✭ 640 (-52.35%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+568.73%)
Powershell RatPython based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (-52.64%)
HabuHacking Toolkit
Stars: ✭ 635 (-52.72%)
Wifi CrackingCrack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat
Stars: ✭ 9,546 (+610.8%)