HershellMultiplatform reverse shell generator
Stars: ✭ 456 (-66.05%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (-13.63%)
Mecfor mass exploiting
Stars: ✭ 448 (-66.64%)
H EncoreFully chained kernel exploit for the PS Vita on firmwares 3.65-3.68
Stars: ✭ 968 (-27.92%)
Jenkins ShellAutomating Jenkins Hacking using Shodan API
Stars: ✭ 84 (-93.75%)
HvmiHypervisor Memory Introspection Core Library
Stars: ✭ 438 (-67.39%)
Badusb botnet👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-97.62%)
GoohakAutomatically Launch Google Hacking Queries Against A Target Domain
Stars: ✭ 432 (-67.83%)
Appinfoscanner一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
Stars: ✭ 424 (-68.43%)
FiercephishFiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.
Stars: ✭ 960 (-28.52%)
Cve 2017 0785Blueborne CVE-2017-0785 Android information leak vulnerability
Stars: ✭ 428 (-68.13%)
Github DorksFind leaked secrets via github search
Stars: ✭ 1,332 (-0.82%)
Tiny CompilerA tiny compiler for a language featuring LL(2) with Lexer, Parser, ASM-like codegen and VM. Complex enough to give you a flavour of how the "real" thing works whilst not being a mere toy example
Stars: ✭ 425 (-68.35%)
ExploitrainingsExploitation on different architectures (x86, x64, arm, mips, avr)
Stars: ✭ 29 (-97.84%)
Dref DNS Rebinding Exploitation Framework
Stars: ✭ 423 (-68.5%)
PillagerPillage filesystems for sensitive information with Go.
Stars: ✭ 64 (-95.23%)
EhtoolsWi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: ✭ 422 (-68.58%)
SpeedhackSpeedhack coded in C++, inspired by Cheat Engine's own speedhack.
Stars: ✭ 29 (-97.84%)
NxloaderMy first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)
Stars: ✭ 417 (-68.95%)
Gitjacker🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (-7%)
YsoserialA proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
Stars: ✭ 4,808 (+258%)
Memory.dllC# Hacking library for making PC game trainers.
Stars: ✭ 411 (-69.4%)
TaikTool hack Dark FB tanpa lisensi
Stars: ✭ 21 (-98.44%)
CloakCloak can backdoor any python script with some tricks.
Stars: ✭ 411 (-69.4%)
JscpwnPoC exploit for CVE-2016-4622
Stars: ✭ 89 (-93.37%)
Firmware slapDiscovering vulnerabilities in firmware through concolic analysis and function clustering.
Stars: ✭ 407 (-69.69%)
BroxyAn HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (-32.09%)
ApkurlgrepExtract endpoints from APK files
Stars: ✭ 405 (-69.84%)
B1tifissh management tool to provides commandline access to a remote system running SSH server
Stars: ✭ 65 (-95.16%)
MeltdownThis repository contains several applications, demonstrating the Meltdown bug.
Stars: ✭ 3,931 (+192.7%)
ArchstrikeAn Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (-70.14%)
Geo ReconAn OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts.
Stars: ✭ 82 (-93.89%)
ParadoxiaratParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (-70.59%)
Awesome HackingA curated list of awesome Hacking tutorials, tools and resources
Stars: ✭ 7,756 (+477.51%)
Rhme 2017Riscure Hack Me embedded hardware CTF 2017-2018.
Stars: ✭ 65 (-95.16%)
One gadgetThe best tool for finding one gadget RCE in libc.so.6
Stars: ✭ 1,306 (-2.76%)
TextractorExtracts text from video games and visual novels. Highly extensible.
Stars: ✭ 656 (-51.15%)
Jok3rJok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (-51.97%)
Xeexe TopantivirusevasionUndetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (-71.18%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (-15.41%)
Email2phonenumberA OSINT tool to obtain a target's phone number just by having his email address
Stars: ✭ 379 (-71.78%)
ShuffleWebShell Backdoor Framework
Stars: ✭ 11 (-99.18%)
Burp Bounty ProfilesBurp Bounty profiles compilation, feel free to contribute!
Stars: ✭ 76 (-94.34%)
Security whitepapersCollection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQLi
Stars: ✭ 644 (-52.05%)
JoomscanOWASP Joomla Vulnerability Scanner Project
Stars: ✭ 640 (-52.35%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+568.73%)
Powershell RatPython based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (-52.64%)
HabuHacking Toolkit
Stars: ✭ 635 (-52.72%)
Wifi CrackingCrack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat
Stars: ✭ 9,546 (+610.8%)