Lists (13)
Sort Name ascending (A-Z)
Starred repositories
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), ar…
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
BC-SECURITY / Empire
Forked from EmpireProject/EmpireEmpire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
渗透测试C2、支持Lua插件扩展、域前置/CDN上线、自定义profile、前置sRDI、文件管理、进程管理、内存加载、截图、反向代理、分组管理
Red Team C2 Framework with AV/EDR bypass capabilities.
Discord Remote Administration Tool fully written in c#, stub size of ~75kb, over 40 post exploitations modules
Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system management. Has features such as HVNC, live microphone, reverse prox…
NjRAT-0.7D is a powerful remote administration tool (RAT) for Windows systems, enabling remote access and control of infected machines. Use responsibly and for educational purposes only.
Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/
The Web3 Security Resources Hub is a comprehensive collection of curated tools, guides, and best practices for securing decentralized systems and smart contracts in the blockchain space.
Information about web3 security and programming tutorials/tools
🎯 PHP / ASP - Shell Backdoor List 🎯
Leaked Mirai Source Code for Research/IoC Development Purposes
Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).
PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.
IPED Digital Forensic Tool. It is an open source software that can be used to process and analyze digital evidence, often seized at crime scenes by law enforcement or in a corporate investigation b…
通过获取到的webshell流量、url、key来还原攻击者使用webshell所做的操作。
Jar Analyzer - 一个JAR包分析工具,批量分析,SCA漏洞分析,方法调用关系搜索,字符串搜索,Spring组件分析,信息泄露检查,CFG程序分析,JVM栈帧分析,进阶表达式搜索,字节码指令级的动态调试分析,反编译JAR包一键导出,一键提取序列化数据恶意代码,一键分析BCEL字节码
免费的代理池工具-完全开源,可以提意见,后续可能会持续更新 ---作者:杨CC