Skip to content
View Pandora-research's full-sized avatar

Block or report Pandora-research

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws

Python 1 Updated Jan 9, 2023

GoPhish automation

Python 1 Updated Jan 19, 2023

A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc

Python 1 Updated Jan 16, 2023

This is a multi-use bash script for Linux systems to audit wireless networks.

Shell 1 Updated Dec 22, 2022

Automated All-in-One OS Command Injection Exploitation Tool.

Python 1 Updated Dec 31, 2022

Cloudflare, Sucuri, Incapsula real IP tracker.

Python 1 Updated Oct 20, 2022

This repository contains a curated list of resources I suggest on LinkedIn and Twitter.📝🌝

1 Updated Dec 30, 2022

A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side

Java 1 Updated Dec 16, 2022

A PoC ransomware sample to test out your ransomware response strategy.

Go 1 Updated Dec 1, 2022

Tools for maintaining access to systems and proof-of-concept demonstrations.

Python 1 Updated Jan 30, 2020

A collection of tools created for computer security research purposes.

Python 1 Updated Jan 30, 2020

exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House

C 1 Updated Sep 17, 2021

⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting

Ruby 1 Updated Dec 18, 2022

Resources for learning about Exploit Development

1 Updated Oct 1, 2020
Batchfile 1 Updated Mar 14, 2022

My Malware Collection From Internet "Dont Run In Real PC"

Batchfile 1 Updated Aug 2, 2022

This repo contains live malware samples. Be careful with them or you can lose all your data!

Batchfile 1 Updated Nov 19, 2022

One of the few malware collection

Batchfile 1 Updated Dec 2, 2022

Various public documents, whitepapers and articles about APT campaigns

1 Updated Sep 18, 2019

Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .onion

Shell 1 Updated Jan 2, 2022

Ransomware leak site monitoring

Python 1 Updated Mar 7, 2022

Python Xor Cipher Tool To Perform Both Encryption And Decryption Operations

Python 1 Updated Sep 6, 2022

Organized list of my malware development resources

1 Updated May 16, 2022

Villain is a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other machines running Villain) and share their backdoor sessions, handy…

Python 1 Updated Nov 14, 2022

Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, Th…

Python 1 Updated Nov 3, 2022

MISP (core software) - Open Source Threat Intelligence and Sharing Platform

PHP 1 Updated Nov 5, 2022

A curated list of Awesome Threat Intelligence resources

1 Updated Oct 13, 2022

WiFi security auditing tools suite

C 1 Updated Oct 21, 2022

Automatic SQL injection and database takeover tool

Python 1 Updated Oct 21, 2022
Next