Highlights
- Pro
Lists (1)
Sort Name ascending (A-Z)
Stars
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Composable transformations of Python+NumPy programs: differentiate, vectorize, JIT to GPU/TPU, and more
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Find, verify, and analyze leaked credentials
Information gathering framework for phone numbers
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
cross-platform (Qt), open-source (GPLv3) video editor
Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
An open-source post-exploitation framework for students, researchers and developers.
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
A swiss army knife for pentesting networks
Empire is a PowerShell and Python post-exploitation agent.
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
This is a multi-use bash script for Linux systems to audit wireless networks.
🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List
Tools and Techniques for Red Team / Penetration Testing
Linux privilege escalation auditing tool
Emulator for rapid prototyping of Software Defined Networks
🐍 A toolkit for testing, tweaking and cracking JSON Web Tokens
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
A recursive internet scanner for hackers.
The ultimate WinRM shell for hacking/pentesting
Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email