Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 36 million developers.
Hide content and notifications from this user.
Learn more about blocking users
Contact Support about this user’s behavior.
Learn more about reporting abuse
Repository for community provided Binary Ninja plugins
A terminal UI for tshark, inspired by Wireshark
Universal Radio Hacker: investigate wireless protocols like a boss
Socks proxy server using powershell.
A writeup summary for CTF competitions, problems.
OSINT Tool to Find Passwords for Compromised Email Addresses
Veil 3.1.X (Check version info in Veil at runtime)
A curated list of awesome Hacking tutorials, tools and resources
A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools
Using Intel's PIN tool to solve CTF problems
Windows Exploit Suggester - Next Generation
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Real Intelligence Threat Analytics
RouterOS Bug Hunting Materials
Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices
A curated list of CTF frameworks, libraries, resources and softwares
Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.
A post-exploitation agent powered by Python, IronPython, C# and .NET's DLR
All your bug are belong to us.
Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and contro…
Exploitation Framework for Embedded Devices
IDAPython tool for creating automatic C++ virtual tables in IDA Pro
A simple zero-config tool to make locally trusted development certificates with any names you'd like.
Tool designed to help identify open Elasticsearch servers that are exposing sensitive information
Ultimate phishing tool. Socialize with the credentials.
Use angr inside GDB. Create an angr state from the current debugger state.
The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication