HatBoy's Stars
vulhub/vulhub
Pre-Built Vulnerable Environments Based on Docker-Compose
learn-anything/learn-anything
Organize world's knowledge, explore connections and curate learning paths
snail007/goproxy
🔥 Proxy is a high performance HTTP(S) proxies, SOCKS5 proxies,WEBSOCKET, TCP, UDP proxy server implemented by golang. Now, it supports chain-style proxies,nat forwarding in different lan,TCP/UDP port forwarding, SSH forwarding.Proxy是golang实现的高性能http,https,websocket,tcp,socks5代理服务器,支持内网穿透,链式代理,通讯加密,智能HTTP,SOCKS5代理,黑白名单,限速,限流量,限连接数,跨平台,KCP支持,认证API。
Chuyu-Team/Dism-Multi-language
Dism++ Multi-language Support & BUG Report
fortra/impacket
Impacket is a collection of Python classes for working with network protocols.
BloodHoundAD/BloodHound
Six Degrees of Domain Admin
screetsec/TheFatRat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
SecWiki/windows-kernel-exploits
windows-kernel-exploits Windows平台提权漏洞集合
Porchetta-Industries/CrackMapExec
A swiss army knife for pentesting networks
rebootuser/LinEnum
Scripted Local Linux Enumeration & Privilege Escalation Checks
lgandx/Responder
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
mzet-/linux-exploit-suggester
Linux privilege escalation auditing tool
Veil-Framework/Veil
Veil 3.1.X (Check version info in Veil at runtime)
dashingsoft/pyarmor
A tool used to obfuscate python scripts, bind obfuscated scripts to fixed machine or expire obfuscated scripts.
danielbohannon/Invoke-Obfuscation
PowerShell Obfuscator
FuzzySecurity/PowerShell-Suite
My musings with PowerShell
Kevin-Robertson/Inveigh
.NET IPv4/IPv6 machine-in-the-middle tool for penetration testers
nirui/sshwifty
Web SSH & Telnet (WebSSH & WebTelnet client) 🔮
s0lst1c3/eaphammer
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
sensepost/ruler
A tool to abuse Exchange services
api0cradle/UltimateAppLockerByPassList
The goal of this repository is to document the most common techniques to bypass AppLocker.
orlyjamie/mimikittenz
A post-exploitation powershell tool for extracting juicy info from memory.
Veil-Framework/Veil-Evasion
Veil Evasion is no longer supported, use Veil 3.0!
ShawnDEvans/smbmap
SMBMap is a handy SMB enumeration tool
xairy/kernel-exploits
My proof-of-concept exploits for the Linux kernel
WindowsExploits/Exploits
Windows Exploits
GreatSCT/GreatSCT
The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool is intended for BOTH red and blue team.
Kabot/Unix-Privilege-Escalation-Exploits-Pack
Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.
p3nt4/Invoke-SocksProxy
Socks proxy, and reverse socks server using powershell.
leostat/rtfm
A database of common, interesting or useful commands, in one handy referable form