Pinned Repositories
aircrack-ng
WiFi security auditing tools suite
anonsurf
parrot anonymous mode
autopwn
Specify targets and run sets of tools against them
beef
The Browser Exploitation Framework Project
JohnTheRipper
This is the official repo for the Jumbo version of John the Ripper. The "bleeding-jumbo" branch (default) is based on 1.8.0-Jumbo-1 (but we are literally several thousands of commits ahead of it).
kali-anonsurf
A port of ParrotSec's stealth and anonsurf modules to Kali Linux
nmap
Nmap - the Network Mapper. Github mirror of official SVN repository.
PandorasBox
Security tool to quickly audit Public Box files and folders.
SecGen
Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)
WMRanger
Khsammy's Repositories
Khsammy/websploit
websploit is an advanced MITM framework
Khsammy/android-kernel-exploits
android kernel exploits漏洞集合 https://www.sec-wiki.com
Khsammy/Spacenet
Python botnet Tor based - V.0.0.2
Khsammy/SEC
Seed, Expand, Constrain: Three Principles for Weakly-Supervised Image Segmentation
Khsammy/BugOutBag
BugOutBag
Khsammy/security-guide-for-developers
Security Guide for Developers (实用性开发人员安全须知)
Khsammy/Ducky-Flasher
Ducky-Flasher Program
Khsammy/webfp-crawler-phantomjs
A Tor Browser crawler based on selenium and phantomjs, used for work on Website Fingerprinting (WFP) Attacks.
Khsammy/EvilAP_Defender
Protect your Wireless Network from Evil Access Points!
Khsammy/Veil-Evasion
Veil Evasion is no longer supported, use Veil 3.0!
Khsammy/HoneyCredIPTracker
Quick script to gather stats on incoming credentials and IPs for a honey listener.
Khsammy/OpenSSL
OpenSSL Static Libraries and CocoaPod for iOS and OSX
Khsammy/collected-wallpapers
Collected wallpapers from around the web.
Khsammy/3vilTwinAttacker
Khsammy/BTCMiner
BTCMiner - A bitcoin miner for Ztex FPGA-boards written in Java
Khsammy/Dicematch
Determines how many times a given number of dice match each other.
Khsammy/Source2URL
Parse source code directories and output list of URLs that are then sent through a proxy.