VulWebajuVulWebaju is a platform that automates setting up your pen-testing environment for learning purposes.
Stars: ✭ 53 (-13.11%)
1earnffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+5990.16%)
sshamebrute force SSH public-key authentication
Stars: ✭ 43 (-29.51%)
Enum.pyA tool to enumerate network services
Stars: ✭ 23 (-62.3%)
warfWARF is a Web Application Reconnaissance Framework that helps to gather information about the target.
Stars: ✭ 53 (-13.11%)
attack-evalsATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (-6.56%)
hsploitAn advanced command-line search engine for Exploit-DB
Stars: ✭ 16 (-73.77%)
lazyaircrackAutomated tool for WiFi hacking.
Stars: ✭ 301 (+393.44%)
Malicious-Urlv5A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (-42.62%)
Windows-Optimize-Harden-DebloatFully Optimize, Harden, and Debloat Windows 10 and Windows 11 Deployments to Windows Best Practices and DoD STIG/SRG Requirements. The ultimate Windows 10 & 11 security and privacy script!
Stars: ✭ 304 (+398.36%)
master-thesisВыпускная квалификационная работа (ВКР) магистра в LaTeX, оформленная в соответствии с нормоконтролем Севастопольского государственного университета в 2017 г.
Stars: ✭ 84 (+37.7%)
scan-cli-pluginDocker Scan is a Command Line Interface to run vulnerability detection on your Dockerfiles and Docker images
Stars: ✭ 135 (+121.31%)
ghidra-builderDocker image for building ghidra RE framework from source
Stars: ✭ 55 (-9.84%)
TokenBreakerJSON RSA to HMAC and None Algorithm Vulnerability POC
Stars: ✭ 51 (-16.39%)
WiFi-ProjectPre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (-63.93%)
MsFontsFuzzOpenType font file format fuzzer for Windows
Stars: ✭ 49 (-19.67%)
PentestingMisc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-60.66%)
dark-lord-obamaAV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities
Stars: ✭ 61 (+0%)
advisoriesA collection of my public security advisories.
Stars: ✭ 16 (-73.77%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+37.7%)
PhirauteeA proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
Stars: ✭ 96 (+57.38%)
AshokAshok is a OSINT Recon Tool , a.k.a 😍 Swiss Army knife .
Stars: ✭ 109 (+78.69%)
PythonPython Powered Repository
Stars: ✭ 17 (-72.13%)
pyc2bytecodeA Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (+14.75%)
Kali-Linux-EbooksTop 20 Kali Linux Related E-books (Free Download)
Stars: ✭ 134 (+119.67%)
PPNPentester's Promiscuous Notebook
Stars: ✭ 221 (+262.3%)
rsmReverse shell manager using tmux and ncat
Stars: ✭ 29 (-52.46%)
ad-privileged-auditProvides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (-31.15%)
ThreatPursuit-VMThreat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Stars: ✭ 1,033 (+1593.44%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-40.98%)
linkyYet Another LInkedIn Scraper...
Stars: ✭ 44 (-27.87%)
WinRAT(Windows/Linux/Mac) Remote Administration Tool
Stars: ✭ 35 (-42.62%)
adv-dnn-ens-malwareadversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants
Stars: ✭ 33 (-45.9%)
HellgateLoader CSharpLoad shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.
Stars: ✭ 73 (+19.67%)
onedrive user enumonedrive user enumeration - pentest tool to enumerate valid onedrive users
Stars: ✭ 223 (+265.57%)
ArmorLibEasily scan files for threats to security and privacy. A Rust library and command line tool. WIP.
Stars: ✭ 20 (-67.21%)
recommendations-for-engineersAll of my recommendations for aspiring engineers in a single place, coming from various areas of interest.
Stars: ✭ 81 (+32.79%)
AwesomeMoroccanHackersAn Awesome List of Moroccan Cyber Security Researchers, Pentesters, Bug Hunters.
Stars: ✭ 69 (+13.11%)
brutasWordlists and passwords handcrafted with ♥
Stars: ✭ 32 (-47.54%)
fastoverflowtkThis Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variables/commands. Payloads can be generated through MSFVENOM or you can use your own ASM files.
Stars: ✭ 16 (-73.77%)
ghidra scriptsGhidra scripts for malware analysis
Stars: ✭ 53 (-13.11%)
Defeat-Defender-V1.2Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
Stars: ✭ 885 (+1350.82%)
gtfoSearch for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (+44.26%)
clusterfuzzliteClusterFuzzLite - Simple continuous fuzzing that runs in CI.
Stars: ✭ 315 (+416.39%)
phdctf-2017PHDays Online CTF 2017. Developed with ♥ by Hackerdom team
Stars: ✭ 22 (-63.93%)
advisoriesAdvisories and Proofs of Concept by BlackArrow
Stars: ✭ 17 (-72.13%)
ghidra-gb[WIP] A simple Ghidra loader for GameBoy ROMs
Stars: ✭ 11 (-81.97%)
TS-453BeUbuntu on QNAP TS-453Be
Stars: ✭ 48 (-21.31%)
awesome-pentest-toolsList of Security Archives Tools and software, generally for facilitate security & penetration research. Opening it up to everyone will facilitate a knowledge transfer. Hopefully the initial set will grow and expand.
Stars: ✭ 34 (-44.26%)
go-spyseThe official wrapper for spyse.com API, written in Go, aimed to help developers build their integrations with Spyse.
Stars: ✭ 25 (-59.02%)
RPCScanTool to communicate with RPC services and check misconfigurations on NFS shares
Stars: ✭ 53 (-13.11%)
fransReconScript will enumerate domain name using horizontal enumeration, reverse lookup. Each horziontal domain will then be vertically enumerated using Sublist3r.
Stars: ✭ 31 (-49.18%)