Stars
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
Automatic SQL injection and database takeover tool
[NeurIPS 2022] Towards Robust Blind Face Restoration with Codebook Lookup Transformer
CTF framework and exploit development library
An advanced memory forensics framework
PEDA - Python Exploit Development Assistance for GDB
Study Notes For Web Hacking / Web安全学习笔记
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, a…
A cross-version Python bytecode decompiler
A fast sub domain brute tool for pentesters
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool, co…
Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner
WAFNinja is a tool which contains two functions to attack Web Application Firewalls.
A Python Framework For NoSQL Scanning and Exploitation
PyUserInput / PyUserInput
Forked from SavinaRoja/PyUserInputA module for cross-platform control of the mouse and keyboard in python that is simple to install and use.
A Python implementation of the Wiener attack on RSA public-key encryption scheme.