Highlights
- Pro
Stars
Open source software that helps you create and deploy high-frequency crypto trading bots
ZMap is a fast single packet network scanner designed for Internet-wide network surveys.
A curated list of CTF frameworks, libraries, resources and softwares
A PHP backdoor management and generation tool/C2 featuring end to end encrypted payload streaming designed to bypass WAF, IDS, SIEM systems.
A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.
Hook system calls, context switches, page faults and more.
A Bring Your Own Land Toolkit that Doubles as a WMI Provider
Server-Side Template Injection and Code Injection Detection and Exploitation Tool
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Herramienta para evadir disable_functions y open_basedir
The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.
SocksSharp provides support for Socks4/4a/5 proxy servers to HttpClient
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique present…
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Impacket is a collection of Python classes for working with network protocols.
IDA Pro plugin to examine the glibc heap, focused on exploit development
Arbitrary code execution with kernel privileges using CVE-2018-8897.
Veil 3.1.X (Check version info in Veil at runtime)
The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool is intended for BOTH red and blue team.
List of PowerShell scripts conjured up for my consumption (you are welcome to use)
exe2powershell - exe2bat reborn for modern Windows
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.