asfduibkjewr's Stars
Hack-with-Github/Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
shadowsocks/shadowsocks-android
A shadowsocks client for Android
aboul3la/Sublist3r
Fast subdomains enumeration tool for penetration testers
ctf-wiki/ctf-wiki
Come and join us, we need you!
SecWiki/windows-kernel-exploits
windows-kernel-exploits Windows平台提权漏洞集合
1N3/Sn1per
Attack Surface Management Platform
SecWiki/linux-kernel-exploits
linux-kernel-exploits Linux平台提权漏洞集合
LandGrey/pydictor
A powerful and useful hacker dictionary builder for a brute-force attack
l3m0n/pentest_study
从零开始内网渗透学习
tiancode/learn-hacking
开始学习Kali Linux 各种破解教程 渗透测试 逆向工程 HackThisSite挑战问题解答
x90skysn3k/brutespray
Bruteforcing from various scanner output - Automatically attempts default creds on found services.
abatchy17/WindowsExploits
Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.
vulnersCom/getsploit
Command line utility for searching and downloading exploits
WindowsExploits/Exploits
Windows Exploits
rip1s/vmware_escape
VMware Escape Exploit before VMware WorkStation 12.5.5
evilsocket/dnssearch
A subdomain enumeration tool.
stamparm/DSSS
Damn Small SQLi Scanner
0xbug/SQLiScanner
Automatic SQL injection with Charles and sqlmap api
wonderkun/CTF_web
a project aim to collect CTF web practices .
AonCyberLabs/EvilAbigail
Automated Linux evil maid attack
pwntester/SerialKillerBypassGadgetCollection
Collection of bypass gadgets to extend and wrap ysoserial payloads
wifiphisher/extra-phishing-pages
Community-built scenarios for Wifiphisher
ysrc/F-Scrack
F-Scrack is a single file bruteforcer supports multi-protocol
graniet/Inspector
The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, check kernel version, check history file, get possible exploit ...
hdm/metasploit-framework
Metasploit Framework
danielbohannon/Out-FINcodedCommand
POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's stdin command invocation capabilities