Pinned Repositories
arpi
Network scanner for Raspberry Pi
awesome
😎 Awesome lists about all kinds of interesting topics
Awesome-1
:computer: 🎉 An awesome & curated list of best applications and tools for Windows.
Awesome-CobaltStrike
cobaltstrike的相关资源汇总 / List of Awesome CobaltStrike Resources
awesome-command-control
A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments.
awesome-flipperzero
🐬 A collection of awesome resources for the Flipper Zero device.
BloodHound
Six Degrees of Domain Admin
CAPEv2
Malware Configuration And Payload Extraction
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
privilege-escalation-awesome-scripts-suite
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
4HM3R's Repositories
4HM3R/awesome
😎 Awesome lists about all kinds of interesting topics
4HM3R/Awesome-1
:computer: 🎉 An awesome & curated list of best applications and tools for Windows.
4HM3R/Awesome-CobaltStrike
cobaltstrike的相关资源汇总 / List of Awesome CobaltStrike Resources
4HM3R/awesome-command-control
A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments.
4HM3R/BloodHound
Six Degrees of Domain Admin
4HM3R/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
4HM3R/privilege-escalation-awesome-scripts-suite
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
4HM3R/awesome-incident-response
A curated list of tools for incident response
4HM3R/awesome-osint
:scream: A curated list of amazingly awesome OSINT
4HM3R/awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
4HM3R/CobaltStrike
CobaltStrike's source code
4HM3R/code_snippets
4HM3R/CrackMapExec
A swiss army knife for pentesting networks
4HM3R/ctf-katana
This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.
4HM3R/evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
4HM3R/exploitdb
The official Exploit Database repository
4HM3R/gitleaks
Scan git repos (or files) for secrets using regex and entropy 🔑
4HM3R/impacket
Impacket is a collection of Python classes for working with network protocols.
4HM3R/katana
Katana - Automatic CTF Challenge Solver in Python3
4HM3R/Microsoft-Blue-Forest
Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers
4HM3R/msfpc
MSFvenom Payload Creator (MSFPC)
4HM3R/PENTESTING-BIBLE
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
4HM3R/Phantom-Evasion
Python antivirus evasion tool
4HM3R/pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
4HM3R/Quasar
Remote Administration Tool for Windows
4HM3R/Resources-for-Beginner-Bug-Bounty-Hunters
A list of resources for those interested in getting started in bug bounties
4HM3R/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
4HM3R/social-analyzer
API, CLI & Web App for analyzing & finding a person's profile across 400+ social media \ websites (Detections are updated regularly)
4HM3R/streetmerchant
🤖 The world's easiest, most powerful stock checker
4HM3R/TheFatRat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .