SICADATRIDIMENSIONAL's Stars
anirudhmalik/xhunter
Android Penetration Tool [ RAT for Android ]
Nishantbhagat57/backup-gen
Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup file extensions or wordlist.
hueristiq/xurlfind3r
A command-line interface (CLI) based passive URLs discovery utility. It is designed to efficiently identify known URLs of given domains by tapping into a multitude of curated online passive sources.
AleksaMCode/WiFi-password-stealer
Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).
ECTO-1A/AppleJuice
Apple BLE proximity pairing message spoofing
vxunderground/MalwareSourceCode
Collection of malware source code for a variety of platforms in an array of different programming languages.
Kkevsterrr/backdoorme
powerful auto-backdooring utility
evilsocket/ditto
A tool for IDN homograph attacks and detection.
blendin/3snake
Tool for extracting information from newly spawned processes
fatedier/frp
A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.
jasperan/whatsapp-osint
WhatsApp spy - logs online/offline events from ANYONE in the world
zblurx/dploot
DPAPI looting remotely in Python
GONZOsint/geowifi
Search WiFi geolocation data by BSSID and SSID on different public databases.
piaolin/DetectDee
DetectDee: Hunt down social media accounts by username, email or phone across social networks.
hahwul/WebHackersWeapons
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
s0md3v/SubGPT
Find subdomains with GPT, for free
H4K6/CVE-2023-2982-POC
WordPress社交登录和注册(Discord,Google,Twitter,LinkedIn)<=7.6.4-绕过身份验证
random-robbie/bruteforce-lists
Some files for bruteforcing certain things.
KTN1990/ACIDREVERSER
Unlimited Reverse IP Lookup using hackertarget.com API.
aboul3la/Sublist3r
Fast subdomains enumeration tool for penetration testers
nelenkov/android-backup-extractor
Android backup extractor
abdulkadir-gungor/JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
wh0amitz/S4UTomato
Escalate Service Account To LocalSystem via Kerberos
Mehran-Seifalinia/CVE-2023-37979
gnebbia/pdlist
A passive subdomain finder
secleGhost/Q-FTPBREAKER
Brute force for multithreaded FTP capable of analyzing thousands of ftp in a few seconds and finding their passwords.
zombieCraig/ICSim
Instrument Cluster Simulator
vchan-in/CVE-2023-35078-Exploit-POC
CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC
mhaskar/ExchangeFinder
Find Microsoft Exchange instance for a given domain and identify the exact version
AndnixSH/APKToolGUI
GUI for apktool, signapk, zipalign and baksmali utilities.