- in Your Heart
- http://seclist.us/
Stars
Injector能夠在iOS介面上瀏覽網路封包、網路使用狀態、區域網路主機訊息、系統工具、網路工具指令、防火牆...等功能。 Injector function: browse network packet, network usage, LAN host configure, system tool, network command tool, firewall....
(I abandoned this project upon realizing just how disparately divergent the Linux universe is) Linux Scripting "Packet-filter Owner Only Firewall - Invisible To Everyone Else". Attempt at cross-fla…
A package for capturing and analyzing network flow data and intraflow data, for network research, forensics, and security monitoring.
WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites. Contact us via [email protected]
PowerShell Module for automating Tenable Nessus Vulnerability Scanner.
PowerShell Runspace Post Exploitation Toolkit
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
0x0mar / Bot_Army
Forked from adle29/Bot_ArmyScanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.
Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.
Forced set CIO data and Control Omron PLC CPU
A system for protecting password-based authentication systems from online-guessing attacks.
Unsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
Empire is a PowerShell and Python post-exploitation agent.
BinaryDefense / artillery
Forked from trustedsec/artilleryThe Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.
The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.
Reverse engineering and pentesting for Android applications
HTTP and SMS spam testing application
MISP (core software) - Open Source Threat Intelligence and Sharing Platform