Stars
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
Capstone disassembly/disassembler framework for ARM, ARM64 (ARMv8), Alpha, BPF, Ethereum VM, HPPA, LoongArch, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, T…
Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, S390x, TriCore, X86)
A powerful and user-friendly binary analysis platform!
CTF framework and exploit development library
The Open Source kanban (built with Meteor). Keep variable/table/field names camelCase. For translations, only add Pull Request changes to wekan/i18n/en.i18n.json , other translations are done at ht…
Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made w…
🕳 bore is a simple CLI tool for making tunnels to localhost
A tool to perform Kerberos pre-auth bruteforcing
A script that you can run in the background!
Nmap - the Network Mapper. Github mirror of official SVN repository.
Automatic SQL injection and database takeover tool
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available
Mirror of https://gitlab.com/Remmina/Remmina The GTK+ Remmina Remote Desktop Client
The ultimate WinRM shell for hacking/pentesting
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Rewrite of the popular wireless network auditor, "wifite"