SuperHackerTool5000A tool that will hack literally anything on the planet. If you get your hands on this tool, be ready to get put behind bars.
Stars: ✭ 31 (+47.62%)
BTPS-SecPackThis repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommendations of multiple cyber security researchers at Microsoft. These tools were created with a small to medium size enterprise environment in mind as smaller organizations do not always have the type of funding a…
Stars: ✭ 33 (+57.14%)
awesome-pentest-toolsList of Security Archives Tools and software, generally for facilitate security & penetration research. Opening it up to everyone will facilitate a knowledge transfer. Hopefully the initial set will grow and expand.
Stars: ✭ 34 (+61.9%)
EventTranscriptParserPython based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)
Stars: ✭ 22 (+4.76%)
xray-nodePython 开发的基于 xray-core 的多用户代理后端,支持用户动态管理和流量统计。
Stars: ✭ 20 (-4.76%)
Reverse-EngineeringA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+34347.62%)
fluxionWiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)
Stars: ✭ 115 (+447.62%)
URL-obfuscatorPython Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (+380.95%)
auroraMalware similarity platform with modularity in mind.
Stars: ✭ 70 (+233.33%)
CVE-2020-5902exploit code for F5-Big-IP (CVE-2020-5902)
Stars: ✭ 37 (+76.19%)
cycat-serviceCyCAT.org API back-end server including crawlers
Stars: ✭ 25 (+19.05%)
TORhunterDesigned to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .onion
Stars: ✭ 47 (+123.81%)
SWRATT🤖 ☠️ 💬 A simple Telegram Bot that controls the victim's computer.
Stars: ✭ 38 (+80.95%)
digital-copyrightStamp your code with a trackable digital copyright
Stars: ✭ 17 (-19.05%)
attack-evalsATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (+171.43%)
CleanUnwantedUpdatesA set of scripts to detect updates of Microsoft (TM) Windows (TM) OS which harm users' privacy and uninstall them
Stars: ✭ 24 (+14.29%)
adv-dnn-ens-malwareadversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants
Stars: ✭ 33 (+57.14%)
droid controllerControl the parameters of an Android system with the power of Xposed framework. 通过Xposed框架控制Android参数。
Stars: ✭ 15 (-28.57%)
trojan-go-panel🦄 trojan-go 管理面板。一键部署,多节点监控,多用户管理,可设置日期限制、流量限制,一键生成动态订阅链接。项目持续更新中,欢迎提出宝贵建议。
Stars: ✭ 42 (+100%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+1266.67%)
robot hacking manualRobot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.
Stars: ✭ 169 (+704.76%)
cerberus researchResearch tools for analysing Cerberus banking trojan.
Stars: ✭ 110 (+423.81%)
paradoxiaRATParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 583 (+2676.19%)
TokenBreakerJSON RSA to HMAC and None Algorithm Vulnerability POC
Stars: ✭ 51 (+142.86%)
SentryPeerA distributed peer to peer list of bad actor IP addresses and phone numbers collected via a SIP Honeypot.
Stars: ✭ 108 (+414.29%)
OneShotRun WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant
Stars: ✭ 223 (+961.9%)
ad-privileged-auditProvides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (+100%)
firecrackerStop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (+1985.71%)
hackipyHacking, pen-testing, and cyber-security related tools built with Python.
Stars: ✭ 26 (+23.81%)
recommendations-for-engineersAll of my recommendations for aspiring engineers in a single place, coming from various areas of interest.
Stars: ✭ 81 (+285.71%)
ArmorLibEasily scan files for threats to security and privacy. A Rust library and command line tool. WIP.
Stars: ✭ 20 (-4.76%)
sike-javaSIKE for Java is a software library that implements experimental supersingular isogeny cryptographic schemes that aim to provide protection against attackers running a large-scale quantum computer.
Stars: ✭ 28 (+33.33%)
HashExploitHashExpoit is Great Tool For Cracking Hash
Stars: ✭ 17 (-19.05%)
evildorkEvildork targeting your fiancee👁️
Stars: ✭ 46 (+119.05%)
osint-notesGood info about DeepWeb and OSINT
Stars: ✭ 24 (+14.29%)
password-listPassword lists with top passwords to optimize bruteforce attacks
Stars: ✭ 174 (+728.57%)
go-spyseThe official wrapper for spyse.com API, written in Go, aimed to help developers build their integrations with Spyse.
Stars: ✭ 25 (+19.05%)
Free-Node-Merge自动合并 ss ssr trojan vmess vless 等免费节点链接,科学上网,定阅免费机场。有资源网址,请加Telegram群:opmhth
Stars: ✭ 346 (+1547.62%)
ESP-BugESP8266 based WiFi implant to remotely track the presence of certain people or devices via a simple web interface
Stars: ✭ 78 (+271.43%)
sudohulktry privilege escalation changing sudo command
Stars: ✭ 114 (+442.86%)
Misterchef🍳 The most delicious pentesting tool
Stars: ✭ 35 (+66.67%)
IP-TrackerTrack any ip address with IP-Tracker. IP-Tracker is developed for Linux and Termux. you can retrieve any ip address information using IP-Tracker.
Stars: ✭ 53 (+152.38%)
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 424 (+1919.05%)
GRFICSv2Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)
Stars: ✭ 119 (+466.67%)
Practical Malware AnalysisMaterials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski
Stars: ✭ 16 (-23.81%)
BackdoorA backdoor that runs on Linux and Windows
Stars: ✭ 36 (+71.43%)
TrojanGUI for trojan client on macOS, trojan for mac, written by Swift
Stars: ✭ 133 (+533.33%)
Foxss-XSS-Penetration-Testing-ToolFoxss is a simple php based penetration Testing Tool.Currently it will help to find XSS vulnerability in websites.
Stars: ✭ 35 (+66.67%)
pyiocutilsA collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).
Stars: ✭ 18 (-14.29%)
ConTroll Remote Access TrojanCreated a VERY SIMPLE remote access Trojan that will establish administrative control over any windows machine it compromises.
Stars: ✭ 69 (+228.57%)
rawsec-cybersecurity-inventoryAn inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+628.57%)
PoW-ShieldProject dedicated to fight Layer 7 DDoS with proof of work, featuring an additional WAF. Completed with full set of features and containerized for rapid and lightweight deployment.
Stars: ✭ 99 (+371.43%)
BrutegramInstagram multi-bruteforce Platfrom
Stars: ✭ 183 (+771.43%)
refluxionRefluxion -- MITM WPA attacks tool
Stars: ✭ 25 (+19.05%)