Lists (29)
Sort Name ascending (A-Z)
AI & LLM
APT
Asset Discovery
Brute Force
C2
Cloud Security
Code Audit
Coding
Defense Evasion
Detection & Response
Discovery & Collection
Domain
Forensic Analysis
ICS & IOT
Infrastructure
Lateral Movement
Misc & Note
OSINT
Persistence
Pishing
Post Exploitation
Privilege Escalation
Proxy & Pivot
Reverse Engineering
Rookit
Shell
Vulnerability
Web Security
Wireless
Stars
Mythic C2 agent targeting Linux and Windows hosts written in Rust
An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts
Scan your computer for applications that are either susceptible to dylib hijacking or have been hijacked.
The first Computer Emergency Response Tools (CERT) for young people ;) 年轻人的第一款应急响应工具 ;)
An even funnier way to disable windows defender. (through WSC api)
SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.
本项目集成了全网优秀的攻防武器工具项目,包含自动化利用,子域名、目录扫描、端口扫描等信息收集工具,各大中间件、cms、OA漏洞利用工具,爆破工具、内网横向、免杀、社工钓鱼以及应急响应、甲方安全资料等其他安全攻防资料。
Xray, Penetrates Everything. Also the best v2ray-core. Where the magic happens. An open platform for various uses.
A code-searching tool similar to ack, but faster.
🔄 A simple tool to backup and sync your git repositories
A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.
An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
Tools for maintaining access to systems and proof-of-concept demonstrations.
Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread
Weaponizing DCOM for NTLM Authentication Coercions
Python tool for converting files and office documents to Markdown.
.NET post-exploitation toolkit for Active Directory reconnaissance and exploitation
Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.
Laplace is an open-source project to enable screen sharing directly via browser. Based on WebRTC for low latency peer-to-peer connections, and WebSocket implemented in golang for signaling.
Simple Project that Extracts PE Information.
CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applications
proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained p…
密探渗透测试工具包含资产信息收集,子域名爆破,搜索语法,资产测绘(FOFA,Hunter,quake, ZoomEye),指纹识别,敏感信息采集,文件扫描、端口扫描、弱口令破解、jwt密钥爆破、sesionkey加解密、批量信息权重查询、密码字典等功能