Pinned Repositories
AllThingsAndroid
A Collection of Android Pentest Learning Materials
audiocraft
Audiocraft is a library for audio processing and generation with deep learning. It features the state-of-the-art EnCodec audio compressor / tokenizer, along with MusicGen, a simple and controllable music generation LM with textual and melodic conditioning.
Awesome-Hacking-Resources
A collection of hacking / penetration testing resources to make you better!
community-threats
Share SCYTHE threats with the community. #ThreatThursday adversary emulation plans will be shared here.
dot
The Deepfake Offensive Toolkit
Penetration_Testing_POC
渗透测试有关的POC、EXP、脚本、提权、小工具等,欢迎补充、完善---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms
Pitraix
Modern Self-Modifying Cross-Platform Peer-to-Peer Botnet over TOR
Profil3r
OSINT tool that allows you to find a person's accounts and emails + breached emails 🕵️
Stowaway
👻Stowaway -- Multi-hop Proxy Tool for pentesters
Whose-gene-is-it-anyway
3453-315h's Repositories
3453-315h/emptyphish
Phishing Tool for Instagram, Facebook, Twitter, Snapchat, Github, Yahoo, Protonmail, Google, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers, Pinterest +1 customizable
3453-315h/google-books-preview-pages-downloader
Download Google Books
3453-315h/instahack
Best Tool For instagram Bruteforce hacking Tool By Waseem Akram. Made in Bash
3453-315h/maigret
🕵️♂️ Collect a dossier on a person by username from thousands of sites
3453-315h/MobileHackersWeapons
Mobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
3453-315h/PhishingArmyCore
3453-315h/Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
3453-315h/Automator-Terminator
A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industrial environments. Utilizing multithreaded processing, Automator-Terminator delivers a powerful wave of spoofed ethernet packets to a null MAC address.
3453-315h/BurpAcademyLABs
3453-315h/CloudFail
Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
3453-315h/CVE-2021-39623
3453-315h/ExtraTerrestrial
As an Open Source Intelligence analyst, you have been tasked with locating Activia Productions' project manager and recruiter, Khalil Askerman, who disappeared shortly after leaving for a company sponsored trip. According to family and friends, Khalil was a loveable guy who enjoyed the little things in life like going to Waffle House at 2 A.M after a night of wearing out the company credit card with clients on scented dry erase markers and LonelyFans. Can you assist Activia Productions in finding their missing project manager?
3453-315h/GPOwned
Buggy script to play with GPOs
3453-315h/innoextract
A tool to unpack installers created by Inno Setup
3453-315h/iris-web
Incident Response collaborative platform
3453-315h/LCD-show
2.4" 2.8"3.2" 3.5" 5.0" 7.0" TFT LCD driver for the Raspberry PI 3B+/A/A+/B/B+/PI2/ PI3/ZERO/ZERO W
3453-315h/mr.generator
This script is used for genrating encrypted passwords & decrypt the passwords,hash,identifes the hash
3453-315h/Nidhogg
Nidhogg is an all-in-one simple to use rootkit for red teams.
3453-315h/OffensiveNim
My experiments in weaponizing Nim (https://nim-lang.org/)
3453-315h/osint_stuff_tool_collection
A collection of several hundred online tools for OSINT
3453-315h/Pachine
Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)
3453-315h/pegasus_spyware
decompiled pegasus_spyware
3453-315h/Red-Teaming-TTPs
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
3453-315h/SCPA
sophisticated cyber penetratiom attacks is a series of advanced techniques, notes and guidance to prepare u in ur career as a hacker moving forward
3453-315h/Telegram-Trilateration
Proof of concept for abusing Telegram's "People Near Me" feature and tracking people's location
3453-315h/Thehackingverse-Automatic-Recon-script
3453-315h/vipermsf
viper 自定义的msf
3453-315h/viperpython
viper 后台代码
3453-315h/Web-Cache-Vulnerability-Scanner
Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/).
3453-315h/zyxel_password_decrypter
Zyxel password decrypter