【免责声明】本项目所涉及的技术、思路和工具仅供学习,任何人不得将其用于非法用途和盈利,不得将其用于非授权渗透测试,否则后果自行承担,与本项目无关。使用本项目前请先阅读 法律法规。
- Awesome-Redteam
- 攻防渗透常用命令速查:Click Here
- 常见WAF拦截页面速查:Click Here
- 反弹shell命令速查:Click Here
- 默认口令/弱口令速查:Click Here
- 重要端口及服务速查:Click Here
- HTTP状态码速查:Click Here
- 安全厂商及官网链接速查:Click Here
- Apache项目及漏洞指纹速查:Click Here
- OWASP TOP10 2017/2021:Click Here
戳这里 Click Here
- ShellcodeWrapper:Shellcode加密
- AntivirusScanner:杀软进程检测脚本
- runtime-exec-payloads.html:java.lang.Runtime.exec() Payloads生成
- Ascii2Char:ASCII码和字符互相转换脚本 修改webshell文件名密码
- Weakpass_Generator:在线弱密码生成工具 汉化版
- Godzilla_Decryptor:哥斯拉流量解密脚本
- Flask_Session_Decryptor:Flask session注入解密脚本
戳这里 Click Here
- 内网渗透-免杀
- 内网渗透-隐藏
- 逆向分析-微信小程序反编译
- 社会工程学-钓鱼邮件主题汇总
- 服务搭建-DNS Log平台搭建
- 红队中易被攻击的一些重点系统漏洞整理(来源:棱角安全团队)
- 网络攻击与防御图谱
- Webshell流量分析
戳这里 Click Here
- 云安全攻防概述
- 云安全攻防矩阵
- 云原生安全
- K8s集群命令速查
- CyberChef:编解码及加密,可本地部署 https://github.com/gchq/CyberChef
- OK Tools在线工具:https://github.com/wangyiwy/oktools
- CTF在线工具:http://www.hiencode.com/
- XSSEE:在线综合编解码工具 https://evilcos.me/lab/xssee/
- MeTools:在线综合编解码工具 http://www.metools.info/code/quotedprintable231.html
- MD5 Hash:https://www.somd5.com/
- CMD5:https://www.cmd5.com/
- GB2312:http://code.mcdvisa.com/
- Unicode字符表:https://www.52unicode.com/enclosed-alphanumerics-zifu
- Unicode:https://www.compart.com/en/unicode/
- UUencode:http://web.chacuo.net/charsetuuencode
- Escape/Unescape:https://tool.chinaz.com/tools/escape.aspx
- HTML实体编码:https://zh.rakko.tools/tools/21/
-
Explain Shell:Shell命令解析 https://explainshell.com/
-
反弹Shell生成:
-
文件下载命令:
-
Webshell Chop:https://webshellchop.chaitin.cn/demo/
-
XSS Chop:https://xsschop.chaitin.cn/demo/
-
WebShell查杀:https://n.shellpub.com/
-
HTML5 Security Cheatsheet:XSS攻击向量学习/参考 https://html5sec.org/
-
在线代码格式标准化:http://web.chacuo.net/formatsh
-
免费接受手机验证码:https://www.supercloudsms.com/en/
- Virustotal:https://www.virustotal.com/gui/home/upload
- 腾讯哈勃分析系统:https://habo.qq.com/tool/index
- 微步在线威胁情报:https://x.threatbook.cn/
- 奇安信威胁情报:https://ti.qianxin.com/
- 360威胁情报:https://ti.360.net/#/homepage
- 安恒威胁情报:https://ti.dbappsecurity.com.cn/
- 火线安全平台:https://www.huoxian.cn
- 知道创宇漏洞平台:https://www.seebug.org/
- 知道创宇黑客新闻流:https://hackernews.cc/
- Hacking8安全信息流:https://i.hacking8.com/
- SecWiki安全信息流:https://www.sec-wiki.com/
- 网络安全威胁信息共享平台:https://share.anva.org.cn/web/publicity/listPhishing
- 国家互联网应急中心:https://www.cert.org.cn/
- Fofa:https://fofa.info/
- Shodan:https://www.shodan.io/
- ZoomEye:https://www.zoomeye.org/
- 鹰图:https://hunter.qianxin.com/
- 谛听:https://www.ditecting.com/
- 360网络空间测绘:https://quake.360.cn/quake/#/index
- Google Hacking Database:https://www.exploit-db.com/google-hacking-database
- 棱角社区工具集整理:https://forum.ywhack.com/bountytips.php?tools
- ffffffff0x 团队安全知识框架:https://github.com/ffffffff0x/1earn
- 先知社区:https://xz.aliyun.com/
- 狼组公开知识库:https://wiki.wgpsec.org/
- 零组文库:零组已停运,非官方 https://0-wiki.com/
- 404星链计划:知道创宇 404 实验室 https://github.com/knownsec/404StarLink
- MITRE ATT&CK:网络攻击中使用的已知对抗战术和技术 https://attack.mitre.org/matrices/enterprise
- Wayback Machine:网页历史缓存 https://archive.org/web
- IP精准定位:https://www.ipuu.net/#/home
- IP 138:https://site.ip138.com/
- Security Trails:https://securitytrails.com/
- Chinaz:https://ping.chinaz.com/
- Host Tracker:https://www.host-tracker.com/
- Webpage Test:https://www.webpagetest.org/
- DNS Check:https://dnscheck.pingdom.com/
-
IP138 https://site.ip138.com/
-
VirusTotal https://www.virustotal.com/
- 站长之家 Whois:https://whois.chinaz.com/
- 中国万网 Whois:https://whois.aliyun.com/
- 国际 Whois:https://who.is/
- Hacker Target:https://hackertarget.com/find-dns-host-records
- DNS Dumpster:https://dnsdumpster.com
- DNS DB:https://dnsdb.io/zh-cn
- Censys:https://censys.io
- Certificate Search:https://crt.sh
- 证书透明度监控:https://developers.facebook.com/tools/ct
- CNNIC中国互联网信息中心:http://ipwhois.cnnic.net.cn
- Wapplyzer:Chrome插件 跨平台网站分析工具 https://github.com/AliasIO/Wappalyzer
- Finger:一款红队在大量的资产中存活探测与重点攻击系统指纹探测工具 https://github.com/EASY233/Finger
- EHole:红队重点攻击系统指纹探测工具 https://github.com/EdgeSecurityTeam/EHole
- ObserverWard:web 指纹识别 https://github.com/0x727/ObserverWard
- TideFinger:提取了多个开源指纹识别工具的规则库并进行了规则重组 https://github.com/TideSec/TideFinger
- fingerprint:各种工具指纹收集分享 https://github.com/r0eXpeR/fingerprint
- Dismap:tcp/udp/tls 协议指纹和 4500+ Web 指纹规则 https://github.com/zhzyker/dismap
- 御剑web指纹识别程序:https://www.webshell.cc/4697.html
- 云悉指纹识别:http://www.yunsee.cn/
- identYwaf:WAF识别工具 https://github.com/stamparm/identYwaf
- jwt_tool:JSON Web Token Toolkit https://github.com/ticarpi/jwt_tool
- jwt.secrets.list:公开已知密钥列表 https://github.com/wallarm/jwt-secrets/blob/master/jwt.secrets.list
- c-jwt-cracker:JSON Web Token Cracker https://github.com/brendan-rius/c-jwt-cracker
- dirsearch:目录扫描/爆破 https://github.com/maurosoria/dirsearch
- dirmap:目录扫描/爆破 https://github.com/H4ckForJob/dirmap
- ffuf:高速web fuzz工具 https://github.com/ffuf/ffuf
- Arjun:HTTP参数扫描器 https://github.com/s0md3v/Arjun
- URLFinder:JS与URL快速提取检测 https://github.com/pingc0y/URLFinder
- ksubdomain:子域名爆破 https://github.com/knownsec/ksubdomain
- Gobuster:URI/DNS/WEB爆破 https://github.com/OJ/gobuster
- Hydra:弱密码爆破 https://github.com/vanhauser-thc/thc-hydra
- John the Ripper:https://github.com/openwall/john
- SecLists:46.4k star 项目 https://github.com/danielmiessler/SecLists
- SecDictionary:配合fuff使用 https://github.com/SexyBeast233/SecDictionary
- Dictionary-Of-Pentesting:渗透测试、SRC漏洞挖掘、爆破、Fuzzing等常用字典 https://github.com/insightglacier/Dictionary-Of-Pentesting
- fuzzDicts:Web渗透Fuzz字典 https://github.com/TheKingOfDuck/fuzzDicts
- Web-Fuzzing-Box:Web 模糊测试字典与Payloads https://github.com/gh0stkey/Web-Fuzzing-Box
- PentesterSpecialDict:渗透测试工程师精简化字典 https://github.com/ppbibo/PentesterSpecialDict
- fuzz:https://github.com/Bo0oM/fuzz.txt
- top25-parameter:top25参数字典 https://github.com/lutfumertceylan/top25-parameter
- 在线弱密码生成:https://weakpass.com/generate
- 在线子域名生成:https://weakpass.com/generate/domains
- Weakpass:在线弱密码生成工具部署 https://github.com/zzzteph/weakpass
- Weakpass:在线子域名生成工具部署 https://github.com/zzzteph/probable_subdomains
- pydictor:一个强大实用的黑客暴力破解字典建立工具 https://github.com/LandGrey/pydictor/
- 汉字转拼音:https://www.aies.cn/pinyin.htm
-
Default Credentials Cheat Sheet:3468个默认密码 https://github.com/ihebski/DefaultCreds-cheat-sheet
-
datarecovery:在线默认口令查询 https://datarecovery.com/rd/default-passwords/
-
cirt.net:在线默认口令查询 https://cirt.net/passwords
-
在线路由器密码查询:
- Hunter:Chrome插件 查找网页暴露邮箱 https://hunter.io/chrome
- Phonebook:邮箱地址搜索 https://phonebook.cz
- Skymem:邮箱地址搜索 https://www.skymem.info/
- 搜邮箱:邮箱域名搜索 https://souyouxiang.com/find-contact/
- gophish:钓鱼邮件 https://github.com/gophish/gophish
- SpoofWeb:一键部署HTTPS钓鱼网站 https://github.com/5icorgi/SpoofWeb
- HackBrowserData:浏览器数据导出工具 https://github.com/moonD4rk/HackBrowserData
- AlliN:https://github.com/P1-Team/AlliN
- Kunyu:https://github.com/knownsec/Kunyu
- OneForAll:https://github.com/shmilylty/OneForAll
- ShuiZe:https://github.com/0x727/ShuiZe_0x727
- FofaX:https://github.com/xiecat/fofax
- Fofa Viewer:https://github.com/wgpsec/fofa_viewer
- Fofa GUI:https://github.com/bewhale/FOFA_GUI
- kscan:综合扫描 https://github.com/lcvvvv/kscan
- fscan:内网综合扫描工具 https://github.com/shadow1ng/fscan
- hping3:端口扫描 高速 发包量少 结果准确无蜜罐 https://github.com/antirez/hping
- ENScan_GO:国内企业信息收集 https://github.com/wgpsec/ENScan_GO
- Ladon:用于大型网络渗透的多线程插件化综合扫描工具 https://github.com/k8gege/Ladon
- HackerOne:https://www.hackerone.com/
- cve:收录了几乎所有公开的CVE https://github.com/trickest/cve
- Vulhub:基于Docker的漏洞复现环境 https://vulhub.org/
- PeiQi:面向网络安全从业者的知识文库 http://wiki.peiqi.tech/
- Vulnerability:棱角社区公布漏洞 https://github.com/EdgeSecurityTeam/Vulnerability
- 乌云镜像:http://wooyun.2xss.cc/
- 未授权访问漏洞总结:http://luckyzmj.cn/posts/15dff4d3.html
- DVWA:https://github.com/digininja/DVWA
- HackTheBox:https://www.hackthebox.com/
- OWASP Top10:https://owasp.org/www-project-juice-shop/
- WebGoat:https://github.com/WebGoat/WebGoat
- Sqli-labs:SQL注入 https://github.com/Audi-1/sqli-labs
- Xss-labs:XSS注入 https://github.com/do0dl3/xss-labs
- Upload-labs:上传漏洞 https://github.com/c0ny1/upload-labs
- Vulstudy:docker快速搭建共17个漏洞靶场 https://github.com/c0ny1/vulstudy
- Vulfocus:漏洞集成平台 https://github.com/fofapro/vulfocus
Be careful Malware,POC 库最新的 CVE 可能存在投毒风险。
- Exploit Database:https://www.exploit-db.com/
- POChouse:https://github.com/DawnFlame/POChouse
- Some-PoC-oR-ExP:各种漏洞PoC、ExP的收集或编写 https://github.com/coffeehb/Some-PoC-oR-ExP
- Library-POC:基于Pocsuite3、goby编写的漏洞poc&exp存档 https://github.com/luck-ying/Library-POC
- Penetration_Testing_POC:https://github.com/Mr-xn/Penetration_Testing_POC
- PoC-in-GitHub:https://github.com/nomi-sec/PoC-in-GitHub
- 0day:https://github.com/helloexp/0day
- POC 辅助生成:在线 https://poc.xray.cool/
- POC 辅助生成:本地 https://github.com/zeoxisca/gamma-gui
- xpoc:供应链漏洞扫描 https://github.com/chaitin/xpoc
- Xray:安全评估工具 https://github.com/chaitin/xray
- Super Xray:Xray GUI启动器 https://github.com/4ra1n/super-xray
- Vulmap:漏洞扫描和验证工具 https://github.com/zhzyker/vulmap
- Artillery:插件化 JAVA 漏洞扫描器 https://github.com/Weik1/Artillery
- Aazhen-v3.1:JavaFX图形化漏洞扫描工具 https://github.com/zangcc/Aazhen-v3.1
- ysoserial:Java反序列化 https://github.com/frohoff/ysoserial
- JYso:jndi注入 反溯源 https://github.com/qi4L/JYso
- JNDI-Injection-Exploit:https://github.com/welk1n/JNDI-Injection-Exploit
- JNDIExploit:功能更强 冰蝎内存马 https://github.com/WhiteHSBG/JNDIExploit
- wscat:Websocket测试工具 https://github.com/websockets/wscat
- Ceye DNS:在线平台 Dnslog http://ceye.io/
- Dnslog:在线平台 Dnslog http://dnslog.cn/
- Fuzz.Red:在线平台 Dnslog https://github.com/AlphabugX/Alphalog
- DNS重绑定:https://lock.cmpxchg8b.com/rebinder.html
- DNSLog-GO:自建私有平台 https://github.com/lanyi1998/DNSlog-GO
- RedisStudio:Redis 未授权 https://github.com/cinience/RedisStudio
- mysql-fake-server:MySQL JDBC 客户端 Java 反序列化漏洞利用 https://github.com/4ra1n/mysql-fake-server
- GitHack:.git泄露利用脚本 https://github.com/lijiejie/GitHack python3 有时无法恢复.git目录,推荐python2版本
- GitHack:.git泄露利用脚本https://github.com/BugScanTeam/GitHack python2
- dvcs-ripper:.svn、.hg、.cvs泄露利用脚本 https://github.com/kost/dvcs-ripper
- ds_store_exp:.DS_Store 文件泄漏利用脚本 https://github.com/lijiejie/ds_store_exp
- Hawkeye:GitHub 泄露监控系统 https://github.com/0xbug/Hawkeye
- Windows-Exploit-Suggester:https://github.com/AonCyberLabs/Windows-Exploit-Suggester
- Linux_Exploit_Suggester:https://github.com/The-Z-Labs/linux-exploit-suggester
- Linux_Exploit_Suggester:https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- windows-kernel-exploits:提权漏洞集合 https://github.com/SecWiki/windows-kernel-exploits
- Windows Elevation:https://github.com/Al1ex/WindowsElevation
-
DruidCrack:Druid密文解密工具 https://github.com/rabbitmask/DruidCrack
-
druid_sessions:Druid sessions利用工具 https://github.com/yuyan-sec/druid_sessions
- etcd:etcdctl https://github.com/etcd-io/etcd
- NacosRce:Nacos Hessian 反序列化 https://github.com/c0olw/NacosRce/
- nacosleak:获取nacos中配置文件信息 https://github.com/a1phaboy/nacosleak
- nacosScan:jwt硬编码、api未授权添加用户、配置读取 https://github.com/Whoopsunix/nacosScan
- nps-auth-bypass:nps认证绕过利用工具 https://github.com/carr0t2/nps-auth-bypass
- jdwp-shellifier:python2 https://github.com/IOActive/jdwp-shellifier
- jdwp-shellifier:https://github.com/Lz1y/jdwp-shellifier
- attackRmi:https://github.com/A-D-Team/attackRmi
- redis-rogue-server:Redis未授权访问 https://github.com/n0b0dyCN/redis-rogue-server
- redis-rce:Redis未授权访问 https://github.com/Ridter/redis-rce
- Shiro rememberMe 在线解密:https://vulsee.com/tools/shiroDe/shiroDecrypt.html
- shiro_attack:https://github.com/j1anFen/shiro_attack
- shiro_rce_tool:https://github.com/wyzxxz/shiro_rce_tool
- ShiroExploit:https://github.com/feihong-cs/ShiroExploit-Deprecated
- ShiroExp:https://github.com/safe6Sec/ShiroExp
- shiro_key:shiro key 收集 目前 1k+ https://github.com/yanm1e/shiro_key
- Struts2VulsTools:https://github.com/shack2/Struts2VulsTools
- SpringBoot-Scan:https://github.com/AabyssZG/SpringBoot-Scan
- Spring_All_Reachable:Spring Cloud Gateway命令执行 CVE-2022-22947、Spring Cloud Function SpEL 远程代码执行 CVE-2022-22963 https://github.com/savior-only/Spring_All_Reachable
- SpringBootVulExploit:https://github.com/LandGrey/SpringBootVulExploit
- Spring-cloud-function-SpEL-RCE:CVE-2022-22963 https://github.com/mamba-2021/EXP-POC/tree/main/Spring-cloud-function-SpEL-RCE
- swagger-exp:Swagger REST API 信息泄露利用工具 https://github.com/lijiejie/swagger-exp
- heapdump_tool:heapdump敏感信息查询工具 https://github.com/wyzxxz/heapdump_tool
- JDumpSpider:HeapDump敏感信息提取工具 https://github.com/whwlsfb/JDumpSpider
- Memory Analyzer:HeapDump分析工具 https://www.eclipse.org/mat/previousReleases.php
- CVE-2020-1938:https://github.com/YDHCUI/CNVD-2020-10487-Tomcat-Ajp-lfi
- ClassHound:https://github.com/LandGrey/ClassHound
- ThinkphpGUI:https://github.com/Lotus6/ThinkphpGUI
- thinkphp_gui_tools:https://github.com/bewhale/thinkphp_gui_tools
- WeblogicTool:https://github.com/KimJun1010/WeblogicTool
- WeblogicScan:https://github.com/dr0op/WeblogicScan
- weblogicScanner:https://github.com/0xn0ne/weblogicScanner
- weblogic-framework:https://github.com/sv3nbeast/weblogic-framework
- VcenterKiller:针对Vcenter的综合利用工具 https://github.com/Schira4396/VcenterKiller
- VcenterKit:Vcenter综合渗透利用工具包 https://github.com/W01fh4cker/VcenterKit
- ZooInspector:ZooKeeper 客户端监控软件 https://issues.apache.org/jira/secure/attachment/12436620/ZooInspector.zip
- apache-zookeeper:zkCli.sh 客户端命令连接 https://archive.apache.org/dist/zookeeper/zookeeper-3.5.6/
- CMS-Hunter:CMS漏洞测试用例集合 https://github.com/SecWiki/CMS-Hunter
- 若依CMS https://github.com/thelostworldFree/Ruoyi-All
- 通达OA:https://github.com/Fu5r0dah/TongdaScan_go
- MYExploit:https://github.com/achuna33/MYExploit
- PayloadsAllTheThings:https://github.com/swisskyrepo/PayloadsAllTheThings
- java.lang.Runtime.exec() Payload:java Payload在线生成 https://www.bugku.net/runtime-exec-payloads/
- PHP Generic Gadget Chains:PHP反序列化Payload https://github.com/ambionics/phpggc
- PHPFuck:https://github.com/splitline/PHPFuck
- JSFuck:http://www.jsfuck.com/
- Gopherus:SSRF 生成gopher链接 https://github.com/tarunkant/Gopherus python2
- CVE-2021-44228-PoC-log4j-bypass-words:https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
- 403bypasser:https://github.com/yunemse48/403bypasser
- byp4xx:https://github.com/lobuhi/byp4xx
- 4-ZERO-3:403/401绕过 https://github.com/Dheerajmadhukar/4-ZERO-3
- netspy:快速探测内网可达网段 https://github.com/shmilylty/netspy
- BloodHound:域内信息收集分析 https://github.com/SpecterOps/BloodHound
- SharpHound:配合 BloodHound 使用 https://github.com/BloodHoundAD/SharpHound
- Adinfo:域内信息收集 https://github.com/lzzbb/Adinfo
- 密码猜解:猜测目标可能使用的密码 https://www.hacked.com.cn/pass.html
- Responder:获取NTLM Hash https://github.com/SpiderLabs/Responder
- LaZagne:本地计算机密码 https://github.com/AlessandroZ/LaZagne
- BrowserGhost:抓取浏览器密码 https://github.com/QAX-A-Team/BrowserGhost
- HackBrowserData:浏览器数据导出工具 https://github.com/moonD4rk/HackBrowserData
- Sunflower_get_Password:针对向日葵的识别码和验证码提取工具 https://github.com/wafinfo/Sunflower_get_Password
- how-does-Xmanager-encrypt-password:Xmanager 密码解密 https://github.com/HyperSine/how-does-Xmanager-encrypt-password
- CrackMapExec:后渗透工具 https://github.com/byt3bl33d3r/CrackMapExec
- Impacket:https://github.com/SecureAuthCorp/impacket
- PsTools:https://docs.microsoft.com/en-us/sysinternals/downloads/pstools
- Webshell收集项目:https://github.com/tennc/webshell
- TomcatMemShell:Tomcat内存马 https://github.com/ce-automne/TomcatMemShell
- wsMemShell:WebSocket 内存马 https://github.com/veo/wsMemShell
- RMI_Inj_MemShell:LDAP无效时的RMI内存马 配合wscat使用 https://github.com/novysodope/RMI_Inj_MemShell
- Behinder 冰蝎:https://github.com/rebeyond/Behinder
- Behinder4已经发布
- Behinder3:
kali + java 11.0.14
或windows10 + java 1.8.0_91
,注意,该环境下Behinder2无法正常运行,Behinder3代理经测试php无法成功穿透,jsp可以成功穿透 - Behinder2:windows10 + java 1.8.0_91
- Godzilla 哥斯拉:https://github.com/BeichenDream/Godzilla
- Skyscorpion:https://github.com/shack2/skyscorpion
- Databasetools:数据库自动化提权工具 https://github.com/Hel10-Web/Databasetools
- bypassAV:免杀shellcode加载器 过火绒不过360 https://github.com/pureqh/bypassAV
- GolangBypassAV:https://github.com/safe6Sec/GolangBypassAV
- BypassAntiVirus:远控免杀系列文章及配套工具 https://github.com/TideSec/BypassAntiVirus
- BypassAntiVirus2022年部分免杀复现:Threekiii/Awesome-Redteam
- AV_Evasion_Tool:掩日 - 适用于红队的综合免杀工具 https://github.com/1y0n/AV_Evasion_Tool
- shellcodeloader:Windows平台的shellcode免杀加载器 https://github.com/knownsec/shellcodeloader
- 杀软比对:tasklist/systeminfo https://www.shentoushi.top/av/av.php
- 在线免杀:免杀方式为原生webshell随机字符修改、Java反射、垃圾字符填充、函数名称变形 http://bypass.tidesec.com/web/
- NPS:通过web端管理,无需配置文件 https://github.com/ehang-io/nps
- FRP:55k star项目 https://github.com/fatedier/frp
- Neo-reGeorg:tunnel快速部署 https://github.com/L-codes/Neo-reGeorg
- rakshasa:多级代理内网穿透工具 https://github.com/Mob2003/rakshasa
- Stowaway:多级代理 https://github.com/ph4ntonn/Stowaway
- Viper:图形化内网渗透 https://github.com/FunnyWolf/Viper
- Proxifier:windows代理工具 https://www.proxifier.com/
- Proxychains:kali代理工具 https://github.com/haad/proxychains
- iodine:dns隧道 https://github.com/yarrick/iodine
- dnscat2:dns隧道 https://github.com/iagox86/dnscat2
- icmpsh:icmp隧道 https://github.com/bdamele/icmpsh
- noPac:CVE-2021-42278 / CVE-2021-42287 https://github.com/Ridter/noPac
- PetitPotam:NTLM Relay https://github.com/topotam/PetitPotam
- CobaltStrike流量解密脚本 https://github.com/5ime/CS_Decrypt
- BlueTeamTools:https://github.com/abc123info/BlueTeamTools
- IoT-vulhub: IoT 版固件漏洞复现环境 https://github.com/firmianay/IoT-vulhub
- OpenArk:Anti-Rootkit(对抗恶意程序)工具集 https://github.com/BlackINT3/OpenArk
- 逆向分析工具集:https://pythonarsenal.com/
- PEiD:查壳工具 https://www.aldeid.com/wiki/PEiD
- Py2exe:Python打包工具 https://www.py2exe.org/
- PyInstaller:Python打包工具 https://github.com/pyinstaller/pyinstaller
- AppInfoScanner:移动端信息收集 https://github.com/kelvinBen/AppInfoScanner
- wxappUnpacker:小程序解包 https://github.com/xuedingmiaojun/wxappUnpacker
- CrackMinApp:反编译微信小程序 https://github.com/Cherrison/CrackMinApp
- Apktool:Android apk逆向 https://github.com/iBotPeaches/Apktool
- TeamsSix 云安全资源:https://github.com/teamssix/awesome-cloud-security
- 云安全知识文库:https://wiki.teamssix.com/
- Awesome-CloudSec-Labs:云原生安全 https://github.com/iknowjason/Awesome-CloudSec-Labs
- 阿里云OpenAPI:https://next.api.aliyun.com/api/
- 云原生全景图:https://landscape.cncf.io/
- 云服务漏洞库:https://www.cloudvulndb.org/
- ATT&CK Cloud Matrix:https://attack.mitre.org/matrices/enterprise/cloud/
- 火线安全-云服务攻防矩阵 https://cloudsec.huoxian.cn/
- 腾讯云鼎实验室-云安全攻防矩阵 https://cloudsec.tencent.com/home/
- Metarget:https://github.com/Metarget/metarget
- Attack Defense:付费 https://attackdefense.pentesteracademy.com/listing?labtype=cloud-services&subtype=cloud-services-amazon-s3
- AWSGoat:https://github.com/ine-labs/AWSGoat
- TerraformGoat:火线云环境攻防靶场 https://github.com/HuoCorp/TerraformGoat
- Kubernetes Goat:https://github.com/madhuakula/kubernetes-goat
- CloudGoat:https://github.com/RhinoSecurityLabs/cloudgoat
- CF:云环境利用框架 https://github.com/teamssix/cf
- aksk_tool:https://github.com/wyzxxz/aksk_tool
- cloudTools:云资产管理工具(三大云厂商+ucloud) https://github.com/dark-kingA/cloudTools
- aliyun-accesskey-Tools:阿里云图形化利用工具 https://github.com/mrknow001/aliyun-accesskey-Tools
- alicloud-tools:阿里云利用工具https://github.com/iiiusky/alicloud-tools
- oss-browser:阿里云OSS客户端 https://github.com/aliyun/oss-browser
- cosbrowser:腾讯云COS客户端 https://github.com/TencentCloud/cosbrowser
- 行云管家:云存储图形化管理平台 https://yun.cloudbility.com/
- kodo-browser:七牛对象存储图形化管理工具 https://github.com/qiniu/kodo-browser
- cloudSec:云平台AK/SK-WEB利用工具 https://github.com/libaibaia/cloudSec
- CDK:容器渗透 https://github.com/cdk-team/CDK
- veinmind-tools:容器安全工具集 https://github.com/chaitin/veinmind-tools
- Awesome Container Escape:容器逃逸 https://github.com/brant-ruan/awesome-container-escape
- KubeHound:识别 Kubernetes 集群攻击路径 https://github.com/DataDog/KubeHound
- wx_sessionkey_decrypt:微信SessionKey加解密 https://github.com/mrknow001/wx_sessionkey_decrypt
- BurpAppletPentester:SessionKey解密插件 https://github.com/mrknow001/BurpAppletPentester
- HFish:一款安全、简单可信赖的跨平台蜜罐软件,允许商业和个人用户免费使用 https://github.com/hacklcx/HFish
- OPSEC-Tradecraft:https://github.com/WesleyWong420/OPSEC-Tradecraft
- oh my zsh:命令行工具集 https://github.com/ohmyzsh/ohmyzsh
- Platypus:反弹shell管理 https://github.com/WangYihang/Platypus
- tabby:高度可配置终端 https://github.com/Eugeny/tabby
- anew:命令行工具 文件合并去重 https://github.com/tomnomnom/anew
- The art of command line:快速掌握命令行 https://github.com/jlevy/the-art-of-command-line
- Yakit:网络安全单兵工具 对标Burpsuite https://github.com/yaklang/yakit
-
Awesome CobaltStrike:CobaltStrike知识库 https://github.com/zer0yu/Awesome-CobaltStrike
-
Erebus:后渗透测试插件 https://github.com/DeEpinGh0st/Erebus
-
LSTAR:综合后渗透插件 https://github.com/lintstar/LSTAR
-
ElevateKit:提权插件 https://github.com/rsmudge/ElevateKit
-
C2ReverseProxy:不出网上线 https://github.com/Daybr4ak/C2ReverseProxy
-
pystinger:不出网上线 https://github.com/FunnyWolf/pystinger
- HaE:高亮标记与信息提取辅助型插件 https://github.com/gh0stkey/HaE
- Log4j2Scan:Log4j主动扫描插件 https://github.com/whwlsfb/Log4j2Scan
- RouteVulScan:检测脆弱路径插件 https://github.com/F6JO/RouteVulScan
- Proxy SwitchyOmega:快速切换代理 https://github.com/FelisCatus/SwitchyOmega
- serp-analyzer:识别域名/IP信息 https://leadscloud.github.io/serp-analyzer/
- FindSomething:在网页的源代码或js中寻找有用信息 https://github.com/ResidualLaugh/FindSomething
- Hack Bar:渗透神器No.1 https://github.com/0140454/hackbar
- Wappalyzer:识别网站技术/框架/语言 https://www.wappalyzer.com/
- EditThisCookie:修改Cookie https://www.editthiscookie.com/
- Disable JavaScript:禁用JavaScript绕过弹窗 https://github.com/dpacassi/disable-javascript
- Heimdallr:被动监听的谷歌插件,用于高危指纹识别、蜜罐特征告警和拦截、机器特征对抗 https://github.com/graynjo/Heimdallr
- anti-honeypot:蜜罐识别 https://github.com/cnrstar/anti-honeypot
- immersive-translate:翻译插件 https://github.com/immersive-translate/immersive-translate/
- json-formatter:Json格式化插件 https://github.com/callumlocke/json-formatter
- PySimpleGUI:https://github.com/PySimpleGUI/PySimpleGUI
- f8x:红/蓝队环境自动化部署工具 https://github.com/ffffffff0x/f8x
- cloudreve:私有云盘部署 https://github.com/cloudreve/Cloudreve
- tabby:https://github.com/wh1t3p1g/tabby
- changeme:https://github.com/ztgrace/changeme
- RouterSploit:https://github.com/threat9/routersploit
- JNDInjector:高度可定制化的JNDI和Java反序列化利用工具 https://github.com/rebeyond/JNDInjector
- IDOR_detect_tool:SaaS-API越权漏洞检测系统 https://github.com/y1nglamore/IDOR_detect_tool
- AsamF:集成多个网络资产测绘平台的一站式企业信息资产收集工具 https://github.com/Kento-Sec/AsamF
- FastjsonScan:Fastjson扫描器,可识别版本、依赖库、autoType状态等 https://github.com/a1phaboy/FastjsonScan
- OA-EXPTOOL:OA综合利用工具 https://github.com/LittleBear4/OA-EXPTOOL
- SharpHostInfo:快速探测内网主机信息工具 https://github.com/shmilylty/SharpHostInfo
- 创建alias.bat,文件内容如下。
@echo off
::Tips
@DOSKEY httpcode=type "D:\Hack Tools\Tips\http_status_code.md"
@DOSKEY versions=type "D:\Hack Tools\Tips\versions.md"
@DOSKEY owasp=type "D:\Hack Tools\Tips\owasp.md"
- 注册表打开
计算机\HKEY_CURRENT_USER\Software\Microsoft\Command Processor
。 - 创建字符串值
autorun
,赋值为alias.bat所在位置,例如D:\Software\alias.bat
。 - 双击alias.bat运行,重启cmd。
- 此时在终端输入httpcode,即可返回文件内容。
解决cmd中文乱码的问题:
- 注册表打开
计算机\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Command Processor
。- 创建字符串值
autorun
,赋值为chcp 65001
。
run.bat
call D:\YOUR_PATH\Anaconda\Scripts\activate.bat D:\YOUR_PATH\Anaconda\
call conda activate YOUR_ENV
cd D:\YOUR_WORKDIR
python YOUR_PYTHON_FILE.py
pause
- 安装插件
Markdown Viewer
。 - 配合Bootstrap可以实现快速部署导航页或文档库。