All Projects → Writeups → Similar Projects or Alternatives

1480 Open source projects that are alternatives of or similar to Writeups

VulWebaju
VulWebaju is a platform that automates setting up your pen-testing environment for learning purposes.
Stars: ✭ 53 (-13.11%)
Mutual labels:  penetration-testing
1earn
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+5990.16%)
Mutual labels:  pentest
sshame
brute force SSH public-key authentication
Stars: ✭ 43 (-29.51%)
Mutual labels:  penetration-testing
Enum.py
A tool to enumerate network services
Stars: ✭ 23 (-62.3%)
Mutual labels:  enumeration
warf
WARF is a Web Application Reconnaissance Framework that helps to gather information about the target.
Stars: ✭ 53 (-13.11%)
Mutual labels:  penetration-testing
attack-evals
ATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (-6.56%)
Mutual labels:  cybersecurity
Oracle-Pentesting-Reference
Oracle Database Penetration Testing Reference (10g/11g)
Stars: ✭ 34 (-44.26%)
Mutual labels:  penetration-testing
Malware-Machine-Learning
Malware Machine Learning
Stars: ✭ 26 (-57.38%)
Mutual labels:  cybersecurity
hsploit
An advanced command-line search engine for Exploit-DB
Stars: ✭ 16 (-73.77%)
Mutual labels:  penetration-testing
hackergame-challenge-docker
nc 类题目的 Docker 容器资源限制、动态 flag、网页终端
Stars: ✭ 62 (+1.64%)
Mutual labels:  pwn
lazyaircrack
Automated tool for WiFi hacking.
Stars: ✭ 301 (+393.44%)
Mutual labels:  penetration-testing
Malicious-Urlv5
A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (-42.62%)
Mutual labels:  cybersecurity
Windows-Optimize-Harden-Debloat
Fully Optimize, Harden, and Debloat Windows 10 and Windows 11 Deployments to Windows Best Practices and DoD STIG/SRG Requirements. The ultimate Windows 10 & 11 security and privacy script!
Stars: ✭ 304 (+398.36%)
Mutual labels:  cyber
master-thesis
Выпускная квалификационная работа (ВКР) магистра в LaTeX, оформленная в соответствии с нормоконтролем Севастопольского государственного университета в 2017 г.
Stars: ✭ 84 (+37.7%)
Mutual labels:  vulnerabilities
scan-cli-plugin
Docker Scan is a Command Line Interface to run vulnerability detection on your Dockerfiles and Docker images
Stars: ✭ 135 (+121.31%)
Mutual labels:  vulnerabilities
ghidra-builder
Docker image for building ghidra RE framework from source
Stars: ✭ 55 (-9.84%)
Mutual labels:  ghidra
TokenBreaker
JSON RSA to HMAC and None Algorithm Vulnerability POC
Stars: ✭ 51 (-16.39%)
Mutual labels:  penetration-testing
WiFi-Project
Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (-63.93%)
Mutual labels:  cybersecurity
MsFontsFuzz
OpenType font file format fuzzer for Windows
Stars: ✭ 49 (-19.67%)
Mutual labels:  vulnerabilities
Pentesting
Misc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-60.66%)
Mutual labels:  pentest
dark-lord-obama
AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities
Stars: ✭ 61 (+0%)
Mutual labels:  penetration-testing
advisories
A collection of my public security advisories.
Stars: ✭ 16 (-73.77%)
Mutual labels:  cve
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+37.7%)
Mutual labels:  cybersecurity
Phirautee
A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
Stars: ✭ 96 (+57.38%)
Mutual labels:  pentest
Ashok
Ashok is a OSINT Recon Tool , a.k.a 😍 Swiss Army knife .
Stars: ✭ 109 (+78.69%)
Mutual labels:  penetration-testing
Python
Python Powered Repository
Stars: ✭ 17 (-72.13%)
Mutual labels:  exploitation
pyc2bytecode
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (+14.75%)
Mutual labels:  cybersecurity
Kali-Linux-Ebooks
Top 20 Kali Linux Related E-books (Free Download)
Stars: ✭ 134 (+119.67%)
Mutual labels:  penetration-testing
PPN
Pentester's Promiscuous Notebook
Stars: ✭ 221 (+262.3%)
Mutual labels:  pentest
rsm
Reverse shell manager using tmux and ncat
Stars: ✭ 29 (-52.46%)
Mutual labels:  penetration-testing
ad-privileged-audit
Provides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (-31.15%)
Mutual labels:  cybersecurity
ThreatPursuit-VM
Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Stars: ✭ 1,033 (+1593.44%)
Mutual labels:  cyber
Sherlock
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-40.98%)
Mutual labels:  cybersecurity
linky
Yet Another LInkedIn Scraper...
Stars: ✭ 44 (-27.87%)
Mutual labels:  enumeration
WinRAT
(Windows/Linux/Mac) Remote Administration Tool
Stars: ✭ 35 (-42.62%)
Mutual labels:  payload
adv-dnn-ens-malware
adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants
Stars: ✭ 33 (-45.9%)
Mutual labels:  cybersecurity
HellgateLoader CSharp
Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.
Stars: ✭ 73 (+19.67%)
Mutual labels:  pentest
onedrive user enum
onedrive user enumeration - pentest tool to enumerate valid onedrive users
Stars: ✭ 223 (+265.57%)
Mutual labels:  enumeration
ArmorLib
Easily scan files for threats to security and privacy. A Rust library and command line tool. WIP.
Stars: ✭ 20 (-67.21%)
Mutual labels:  cybersecurity
recommendations-for-engineers
All of my recommendations for aspiring engineers in a single place, coming from various areas of interest.
Stars: ✭ 81 (+32.79%)
Mutual labels:  cybersecurity
AwesomeMoroccanHackers
An Awesome List of Moroccan Cyber Security Researchers, Pentesters, Bug Hunters.
Stars: ✭ 69 (+13.11%)
Mutual labels:  cybersecurity
brutas
Wordlists and passwords handcrafted with ♥
Stars: ✭ 32 (-47.54%)
Mutual labels:  enumeration
fastoverflowtk
This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variables/commands. Payloads can be generated through MSFVENOM or you can use your own ASM files.
Stars: ✭ 16 (-73.77%)
Mutual labels:  exploitation
tex-course-index-template
A template for writing a condensed course index leveraging LaTeX indexing
Stars: ✭ 30 (-50.82%)
Mutual labels:  cybersecurity
ghidra scripts
Ghidra scripts for malware analysis
Stars: ✭ 53 (-13.11%)
Mutual labels:  ghidra
Defeat-Defender-V1.2
Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
Stars: ✭ 885 (+1350.82%)
Mutual labels:  payload
vulners-agent
Agent scanner for vulners.com
Stars: ✭ 62 (+1.64%)
Mutual labels:  vulnerabilities
gtfo
Search for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (+44.26%)
Mutual labels:  privilege-escalation
clusterfuzzlite
ClusterFuzzLite - Simple continuous fuzzing that runs in CI.
Stars: ✭ 315 (+416.39%)
Mutual labels:  vulnerabilities
awesome-list-of-secrets-in-environment-variables
🦄🔒 Awesome list of secrets in environment variables 🖥️
Stars: ✭ 538 (+781.97%)
Mutual labels:  cybersecurity
phdctf-2017
PHDays Online CTF 2017. Developed with ♥ by Hackerdom team
Stars: ✭ 22 (-63.93%)
Mutual labels:  vulnerabilities
cms identify
cms识别
Stars: ✭ 13 (-78.69%)
Mutual labels:  penetration-testing
advisories
Advisories and Proofs of Concept by BlackArrow
Stars: ✭ 17 (-72.13%)
Mutual labels:  cve
ghidra-gb
[WIP] A simple Ghidra loader for GameBoy ROMs
Stars: ✭ 11 (-81.97%)
Mutual labels:  ghidra
TS-453Be
Ubuntu on QNAP TS-453Be
Stars: ✭ 48 (-21.31%)
Mutual labels:  ghidra
awesome-pentest-tools
List of Security Archives Tools and software, generally for facilitate security & penetration research. Opening it up to everyone will facilitate a knowledge transfer. Hopefully the initial set will grow and expand.
Stars: ✭ 34 (-44.26%)
Mutual labels:  pentest
go-spyse
The official wrapper for spyse.com API, written in Go, aimed to help developers build their integrations with Spyse.
Stars: ✭ 25 (-59.02%)
Mutual labels:  cybersecurity
RPCScan
Tool to communicate with RPC services and check misconfigurations on NFS shares
Stars: ✭ 53 (-13.11%)
Mutual labels:  pentest
fransRecon
Script will enumerate domain name using horizontal enumeration, reverse lookup. Each horziontal domain will then be vertically enumerated using Sublist3r.
Stars: ✭ 31 (-49.18%)
Mutual labels:  enumeration
Disclosures
Public Disclosures
Stars: ✭ 63 (+3.28%)
Mutual labels:  cve
301-360 of 1480 similar projects