Stars
Pandora-research / ghauri
Forked from r0oth3x49/ghauriAn advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
Pandora-research / gophish-1
Forked from cvlabsio/gophishGoPhish automation
A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc
Pandora-research / airgeddon
Forked from v1s1t0r1sh3r3/airgeddonThis is a multi-use bash script for Linux systems to audit wireless networks.
Pandora-research / commix
Forked from commixproject/commixAutomated All-in-One OS Command Injection Exploitation Tool.
Pandora-research / Cloudmare
Forked from mrh0wl/CloudmareCloudflare, Sucuri, Incapsula real IP tracker.
Pandora-research / Practical-CyberSecurity-Resources
Forked from brcyrr/PracticalCyberSecurityResourcesThis repository contains a curated list of resources I suggest on LinkedIn and Twitter.📝🌝
Pandora-research / AndroRAT
Forked from karma9874/AndroRATA Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Pandora-research / ransomwhere
Forked from hazcod/ransomwhereA PoC ransomware sample to test out your ransomware response strategy.
Tools for maintaining access to systems and proof-of-concept demonstrations.
Pandora-research / tools
Forked from hackerhouse-opensource/toolsA collection of tools created for computer security research purposes.
exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
OSWE, OSEP, OSED
Resources for learning about Exploit Development
My Malware Collection From Internet "Dont Run In Real PC"
This repo contains live malware samples. Be careful with them or you can lose all your data!
One of the few malware collection
Pandora-research / APTnotes
Forked from kbandla/APTnotesVarious public documents, whitepapers and articles about APT campaigns
Pandora-research / TORhunter
Forked from Err0r-ICA/TORhunterDesigned to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .onion
Ransomware leak site monitoring
Pandora-research / Xorcry
Forked from amaitou/XorcryPython Xor Cipher Tool To Perform Both Encryption And Decryption Operations
Organized list of my malware development resources
Pandora-research / Villain
Forked from t3l3machus/VillainVillain is a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other machines running Villain) and share their backdoor sessions, handy…
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, Th…
Pandora-research / MISP
Forked from MISP/MISPMISP (core software) - Open Source Threat Intelligence and Sharing Platform
A curated list of Awesome Threat Intelligence resources
WiFi security auditing tools suite
Pandora-research / sqlmap
Forked from sqlmapproject/sqlmapAutomatic SQL injection and database takeover tool