Skip to content
Pro
Block or report user

Report or block sneakerhax

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
Block or report user

Report or block sneakerhax

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse

Vulnerability scanner based on vulners.com search API

Java 626 134 Updated Apr 9, 2019

Python 3.5+ DNS asynchronous brute force utility

Python 196 42 Updated Jun 4, 2019
Python 138 50 Updated Jul 13, 2017

CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens.

HTML 768 170 Updated Jun 6, 2019

DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will automatically generate the userlist from the domain. BE VERY CAR…

PowerShell 439 114 Updated Jun 14, 2019

cve-2018-10933 libssh authentication bypass

Dockerfile 81 26 Updated Oct 21, 2018

Payload Generation Framework

Visual Basic 820 179 Updated Feb 13, 2019

Batch file code for the convoluted phishing payload blog post at www.acenyethehackerguy.com

C# 3 5 Updated Aug 27, 2018

A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system

101 18 Updated Jan 28, 2019

A tool to create a JScript file which loads a .NET v2 assembly from memory.

C# 527 168 Updated Jul 20, 2019

Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.

C# 97 14 Updated Sep 18, 2018

CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.

33 1 Updated Aug 30, 2018

PowerShell Pass The Hash Utils

PowerShell 718 185 Updated Dec 9, 2018

Audits AD hashdump and looks for instances for password reuse

Python 8 Updated Aug 26, 2018

Official code repository for: Gray Hat Hacking, The Ethical Hacker's Handbook, 5th Edition.

C 50 17 Updated Jul 12, 2018

Exploit Development and Reverse Engineering with GDB Made Easy

Python 2,214 346 Updated Aug 19, 2019

TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

C 10,423 1,733 Updated Jul 8, 2019

Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper us…

Python 869 150 Updated Aug 17, 2019

A tool to link a domain with registered organisation names and emails, to other domains.

Python 357 59 Updated Jun 11, 2019

MSFvenom Payload Creator (MSFPC)

Shell 598 167 Updated Apr 13, 2019

SMBMap is a handy SMB enumeration tool

Python 654 179 Updated Aug 1, 2019

A look at inner workings of Joycon and Nintendo Switch

C 1,933 91 Updated Jul 8, 2019

Blockchain CTF challenge

Python 5 4 Updated Mar 6, 2017

Bitcoin & Lightning full node on a Raspberry Pi

Shell 714 225 Updated Aug 22, 2019

Learning path: Solidity

1 1 Updated Jul 24, 2018

Litecoin source tree

C++ 3,382 2,227 Updated Aug 15, 2019

Bitcoin Core integration/staging tree

C++ 39,802 23,959 Updated Aug 23, 2019

Lightning Network Daemon ⚡️

Go 4,078 1,125 Updated Aug 23, 2019

The project has been moved to this new repo https://github.com/melonproject/oyente

Python 56 25 Updated Mar 18, 2017

Security analysis tool for EVM bytecode. Supports smart contracts built for Ethereum, Quorum, Vechain, Roostock, Tron and other EVM-compatible blockchains.

Python 1,262 279 Updated Aug 23, 2019
Next
You can’t perform that action at this time.