Lists (1)
Sort Name ascending (A-Z)
Stars
Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)
Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Cracking Hashes / Hashing
Obtain the passphrase of a private key (id_rsa), this tool uses the ssh-keygen binary to perform a brute force attack until a successful collision occurs.
Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by bruteforcing the decryption key, and then executing the decrypted ev…
End-to-end encrypted, onion-routed, censorship-resistant, peer-to-peer instant messaging over Lightning
A *nix Enumerator & Auto Privilege Escalation tool.
Turns any junk text into a usable wordlist for brute-forcing.
WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted servers via zone transfer data - stores their responses, and l…
Machine Learning Network Share Password Hunting Toolkit
BurpCrypto is a collection of burpsuite encryption plug-ins, support AES/RSA/DES/ExecJs(execute JS encryption code in burpsuite). 支持多种加密算法或直接执行JS代码的用于爆破前端加密的BurpSuite插件
A Holistic OSINT and Threat Hunting Platform
A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.
Adversary simulation and Red teaming platform with AI
A penetration testing tool for finding file upload bugs (NDSS 2020)
Protocol agnostic online password guessing API.
Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved) position.
Template-Driven AV/EDR Evasion Framework
A Network Packet Sniffing tool developed in Python 3.
A tool for generating fake code signing certificates or signing real ones
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)