Frequently used commands that are searchable by using your browser's search function. (CTRL+F on Firefox)
Support
Quality
Security
License
Reuse
An open-world scenario domain generalization code base
Support
Quality
Security
License
Reuse
Many documents added, for Kali Linux and others distribution
Support
Quality
Security
License
Reuse
CVE-2022-41082-RCE-POC aka ProxyNotShell
Support
Quality
Security
License
Reuse
CVE-2022-41040-RCE-POC aka ProxyNotShell
Support
Quality
Security
License
Reuse
A Docker Container that simplifies penetration testing
Support
Quality
Security
License
Reuse
Man in the middle tool (arp poisoning, dns spoofing, etc.)
Support
Quality
Security
License
Reuse
Mutate a target to identify exploit candidates (https://developer.mozilla.org/en-US/docs/Mozilla/Security/Exploitable_crashes)
Support
Quality
Security
License
Reuse
A powerful, extensible, customizable & rapidly develop hacking framework.
Support
Quality
Security
License
Reuse
Sysindators (System Intruders and Data Predators) is a tool framework made especially for hacking, has tools that help you to create extraordinary things.
Support
Quality
Security
License
Reuse
Support
Quality
Security
License
Reuse
PoC Code for TCP data injection attack implemented using Python
Support
Quality
Security
License
Reuse
WINFLESHER v0.1.0.5 - MITRE EXPLOITATION FRAMEWORK
Support
Quality
Security
License
Reuse
Hack-All is a simple CLI tool that helps ethical-hackers to make a reverse connection without knowing the target device in use is it computer or phone
Support
Quality
Security
License
Reuse
B
Browsable-Web-Directory-Finderby yusufcannc
Python 3 Version:Current License: No License (No License)
Support
Quality
Security
License
Reuse
Scripts Python for hacking
Support
Quality
Security
License
Reuse
BolyShell Reverse Shell Script
Support
Quality
Security
License
Reuse
Program made in Python that does a brute force of subdomains and reverse DNS
Support
Quality
Security
License
Reuse
A simple and user friendly tool for information gathering and reconnaissance of a website
Support
Quality
Security
License
Reuse
Us3r Unl0ck3d is a permissions scanner built to scan most Linux and Windows environments. It returns all accessible files by the currently logged-in user using an octal pattern.
Support
Quality
Security
License
Reuse
Resources about remote work talk sessions
Support
Quality
Security
License
Reuse
CVE-2021-4034 PoC , polkit < 0.131
Support
Quality
Security
License
Reuse
The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.
Support
Quality
Security
License
Reuse
This repository collects TryHackMe, Security, Blue Team and CTF writeups
Support
Quality
Security
License
Reuse
一个方便的Reverse Shell生成器,可以在交互界面生成shell和设置监听的端口,并且自动运行netcat监听设置的端口,并不需要退出就可以测试多个shell
Support
Quality
Security
License
Reuse
A Web Scanner to find vulnerabilities along multiple Domains
Support
Quality
Security
License
Reuse
This is a simple powershell script that can install most important tools for cyber security researcher.
Support
Quality
Security
License
Reuse
This Python GUI program helps to generate and save passwords with their respective website and username.
Support
Quality
Security
License
Reuse
Vulnerabilities Database
Support
Quality
Security
License
Reuse
Exploit to CVE-2022-46169 vulnerability
Support
Quality
Security
License
Reuse
A bad application, a vulnerable application to try SQLi 😈
Support
Quality
Security
License
Reuse
CVE-2022-46463(Harbor 未授权)
Support
Quality
Security
License
Reuse
BASH and Python based ethical hacking scripts for, amongst others, recon, servers, firewalls, malware.
Support
Quality
Security
License
Reuse
b
bugbounty_scoperby blackhatethicalhacking
Shell 3 Version:Current License: Strong Copyleft (GPL-3.0)
BugBounty Scoper is a command-line tool for finding in scope targets for bug bounty programs.
Support
Quality
Security
License
Reuse
F
HTML 3 Version:Current License: Permissive (MIT)
👾🛀 Freeloader Remote Administration Tool for Windows
Support
Quality
Security
License
Reuse
An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.
Support
Quality
Security
License
Reuse
scanner Tool for test some vulnerabilities with unique ideas
Support
Quality
Security
License
Reuse
MecaU is a program designed to scan and detect the presence of malware in a directory specified by the user through the command line. The program uses a hash database of suspicious files that is downloaded from an external server, and also compiles and uses Yara rules to look for patterns of malicious behavior in files.
Support
Quality
Security
License
Reuse
A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of carefully crafted payloads with encoding techniques.
Support
Quality
Security
License
Reuse
Nmap WBE - Port-scanner Web-Based Environment
Support
Quality
Security
License
Reuse
E
JavaScript 3 Version:Current License: No License (No License)
Graduation_Project: Most efforts have focused on detecting vulnerable contracts, but automated verification of the exploitable nature of detected vulnerabilities is lacking. Therefore, this project requires the development of an automated analysis tool that integrates vulnerability detection and verification.
Support
Quality
Security
License
Reuse
渗透测试用途的字典/Dictionary with penetration test purposes
Support
Quality
Security
License
Reuse
Scan site for most common CVEs!
Support
Quality
Security
License
Reuse
Filter scanner results by applying data from the Wolfi secdb
Support
Quality
Security
License
Reuse
Support
Quality
Security
License
Reuse
Automatically install all Kali linux tools.
Support
Quality
Security
License
Reuse
Its a simple tool made for recon, I have included lots of future like spiderfoot which can dig password hashes from a website so don't use it for any maleious activity, Thankyou.
Support
Quality
Security
License
Reuse
Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSRF
Support
Quality
Security
License
Reuse
C port scanner that originally written for windows but what ported to linux
Support
Quality
Security
License
Reuse
Red Team utilities for setting up CWP CentOS 7 payload & reverse shell (Red Team 9 - CW2023)
Support
Quality
Security
License
Reuse
c
command-centerby encryptedninja
Frequently used commands that are searchable by using your browser's search function. (CTRL+F on Firefox)
Shell 3Updated: 1 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
S
Source-Free-Domain-Generalizationby muse1998
An open-world scenario domain generalization code base
Python 3Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
d
documents-learningby PhineasPhreak
Many documents added, for Kali Linux and others distribution
HTML 3Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
C
CVE-2022-41082-RCE-POCby kevibeaumont
CVE-2022-41082-RCE-POC aka ProxyNotShell
Python 3Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
C
CVE-2022-41040-RCE-POCby kevibeaumont
CVE-2022-41040-RCE-POC aka ProxyNotShell
Python 3Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
_
_petusawo_by berylliumsec
A Docker Container that simplifies penetration testing
Python 3Updated: 11 mo ago License: No License (No License)
Support
Quality
Security
License
Reuse
M
ManInTheMirrorby lucasrpatten
Man in the middle tool (arp poisoning, dns spoofing, etc.)
Python 3Updated: 11 mo ago License: Strong Copyleft (AGPL-3.0)
Support
Quality
Security
License
Reuse
m
mutation-fuzzerby demetrius-ford
Mutate a target to identify exploit candidates (https://developer.mozilla.org/en-US/docs/Mozilla/Security/Exploitable_crashes)
C 3Updated: 2 y ago License: Strong Copyleft (GPL-2.0)
Support
Quality
Security
License
Reuse
y
yourn3xtby hanaui-git
A powerful, extensible, customizable & rapidly develop hacking framework.
JavaScript 3Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
s
sysindatorsby sysindators
Sysindators (System Intruders and Data Predators) is a tool framework made especially for hacking, has tools that help you to create extraordinary things.
Python 3Updated: 1 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
l
lazyReconby dip3nluit3l
Python 3Updated: 1 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
T
TCP-data-injectionby harshitrajpal
PoC Code for TCP data injection attack implemented using Python
Python 3Updated: 1 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
W
WinFlesherby mindsflee
WINFLESHER v0.1.0.5 - MITRE EXPLOITATION FRAMEWORK
PowerShell 3Updated: 1 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
H
Hack-Allby YagamiLight17
Hack-All is a simple CLI tool that helps ethical-hackers to make a reverse connection without knowing the target device in use is it computer or phone
Python 3Updated: 1 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
B
Browsable-Web-Directory-Finderby yusufcannc
Python 3Updated: 1 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
p
python-red-teamby alestanalves
Scripts Python for hacking
Python 3Updated: 1 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
B
BolyShellby VirusNoirrr
BolyShell Reverse Shell Script
Python 3Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
s
socket-nmap-pythonby kayantchian
Program made in Python that does a brute force of subdomains and reverse DNS
Python 3Updated: 1 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
s
sitescannerby lisus18ikrak
A simple and user friendly tool for information gathering and reconnaissance of a website
Python 3Updated: 10 mo ago License: No License (No License)
Support
Quality
Security
License
Reuse
u
us3r-unl0ck3dby Hifumi1337
Us3r Unl0ck3d is a permissions scanner built to scan most Linux and Windows environments. It returns all accessible files by the currently logged-in user using an octal pattern.
Python 3Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
r
remote-work-talkby CrisKrus
Resources about remote work talk sessions
HTML 3Updated: 1 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
p
poppyby tahaafarooq
CVE-2021-4034 PoC , polkit < 0.131
C 3Updated: 1 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
i
internet-of-vulnerable-thingsby otsmr
The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.
Python 3Updated: 1 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
C
Cybersecurity-LABby wenkuuk
This repository collects TryHackMe, Security, Blue Team and CTF writeups
C 3Updated: 1 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
c
cat_rev_shellby baimao-box
一个方便的Reverse Shell生成器,可以在交互界面生成shell和设置监听的端口,并且自动运行netcat监听设置的端口,并不需要退出就可以测试多个shell
Python 3Updated: 1 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
O
OzScanby 0zk3y
A Web Scanner to find vulnerabilities along multiple Domains
Shell 3Updated: 1 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
S
SecTools-Installerby majhcc
This is a simple powershell script that can install most important tools for cyber security researcher.
PowerShell 3Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
P
Password-Managerby Biruh-21
This Python GUI program helps to generate and save passwords with their respective website and username.
Python 3Updated: 1 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
V
Support
Quality
Security
License
Reuse
C
CVE-2022-46169by Anthonyc3rb3ru5
Exploit to CVE-2022-46169 vulnerability
Python 3Updated: 1 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
r
r0ueiby yu1hpa
A bad application, a vulnerable application to try SQLi 😈
Ruby 3Updated: 1 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
C
CVE-2022-46463by nu0l
CVE-2022-46463(Harbor 未授权)
Python 3Updated: 1 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
H
Hyperion3by ArcadeusOPS
BASH and Python based ethical hacking scripts for, amongst others, recon, servers, firewalls, malware.
Python 3Updated: 1 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
b
bugbounty_scoperby blackhatethicalhacking
BugBounty Scoper is a command-line tool for finding in scope targets for bug bounty programs.
Shell 3Updated: 1 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
F
Freeloader-Remote-Administration-Tool-for-Windowsby vaginessa
👾🛀 Freeloader Remote Administration Tool for Windows
HTML 3Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
v
vasukiby cyb3rzest
An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.
Shell 3Updated: 1 y ago License: Permissive (BSL-1.0)
Support
Quality
Security
License
Reuse
f
fSeCuRiTyby mrxdevil404
scanner Tool for test some vulnerabilities with unique ideas
Python 3Updated: 1 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
M
MecaUby dylanmeca
MecaU is a program designed to scan and detect the presence of malware in a directory specified by the user through the command line. The program uses a hash database of suspicious files that is downloaded from an external server, and also compiles and uses Yara rules to look for patterns of malicious behavior in files.
Python 3Updated: 1 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
O
OpenRediWreckedby blackhatethicalhacking
A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of carefully crafted payloads with encoding techniques.
Shell 3Updated: 1 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
n
nmap-wbeby xchopath
Nmap WBE - Port-scanner Web-Based Environment
Python 3Updated: 1 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
E
Ethereum-Smart-Contract-Automated-Vulnerability-Detection-and-Verification-Toolby Lele962
Graduation_Project: Most efforts have focused on detecting vulnerable contracts, but automated verification of the exploitable nature of detected vulnerabilities is lacking. Therefore, this project requires the development of an automated analysis tool that integrates vulnerability detection and verification.
JavaScript 3Updated: 1 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
d
dictby coff1
渗透测试用途的字典/Dictionary with penetration test purposes
Python 3Updated: 1 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
p
popular-cves-scannerby bigozzzz
Scan site for most common CVEs!
Python 3Updated: 1 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
f
fixfilterby chainguard-dev
Filter scanner results by applying data from the Wolfi secdb
Go 3Updated: 1 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
O
OCSP-Toolsby edwardwcorbett
Python 3Updated: 1 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
k
katoolin-v2by bitpIus
Automatically install all Kali linux tools.
Python 3Updated: 1 y ago License: Strong Copyleft (GPL-2.0)
Support
Quality
Security
License
Reuse
V
Vuln-Mapby ColdBones69
Its a simple tool made for recon, I have included lots of future like spiderfoot which can dig password hashes from a website so don't use it for any maleious activity, Thankyou.
Shell 3Updated: 1 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
S
SSRFPwnedby blackhatethicalhacking
Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSRF
Shell 3Updated: 1 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
C
CPScan-Linuxby liquidlegs
C port scanner that originally written for windows but what ported to linux
C 3Updated: 1 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
c
cwp-oci-white-boxby hotpotcookie
Red Team utilities for setting up CWP CentOS 7 payload & reverse shell (Red Team 9 - CW2023)
Shell 3Updated: 1 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse