Stars
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
Open Breach and Attack Simulation Platform
Malware Development for Ethical Hackers, published by Packt
A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.
Instant voice cloning by MIT and MyShell. Audio foundation model.
Documents Exfiltration project for fun and educational purposes
KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
Discord Token Grabber , Password Stealer, Cookie Stealer, File Stealer, Crypto wallet Stealer etc.
This malware consists of simulating a command and control attack.
A Linux worm targeting vulnerable IoT devices with MMU. Reengineered from/inspired by Mirai botnet.
Real-time face swap for PC streaming or video calls
PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.
Extract Windows Wi-Fi Passwords to Remote URL
A Hidden and Undetectable Remote Access Tool written in C++ and Server in Python3.
Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails, phone numbers and more
PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.
White-hat hacking keylogger
use CoinHive's JavaScript miner on any stratum pool
A lightweight JavaScript library for creating particles
A simple script to screenshot a list of websites
ellipsys / davscan
Forked from Graph-X/davscanFingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.
Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.
ellipsys / GoldenEye
Forked from jseidl/GoldenEyeGoldenEye Layer 7 (KeepAlive+NoCache) DoS Test Tool