daronwolff's Stars
fortra/impacket
Impacket is a collection of Python classes for working with network protocols.
Powerlevel9k/powerlevel9k
Powerlevel9k was a tool for building a beautiful and highly functional CLI, customized for you. P9k had a substantial impact on CLI UX, and its legacy is now continued by P10k.
ReFirmLabs/binwalk
Firmware Analysis Tool
malwaredllc/byob
An open-source post-exploitation framework for students, researchers and developers.
RhinoSecurityLabs/pacu
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
toolswatch/blackhat-arsenal-tools
Official Black Hat Arsenal Security Tools Repository
noraj/OSCP-Exam-Report-Template-Markdown
:orange_book: Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report
marionebl/svg-term-cli
Share terminal sessions via SVG and CSS
tarunkant/Gopherus
This tool generates gopher link for exploiting SSRF and gaining RCE in various servers
rsmusllp/king-phisher
Phishing Campaign Toolkit
dana-at-cp/backdoor-apk
backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool, the Android SDK, smali, etc. This shell script is provided as-is without warranty of any kind and is intended for educational purposes only.
IvanGlinkin/Fast-Google-Dorks-Scan
The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information about the specific web-site: common admin panels, the widespread file types and path traversal. The 100% automated.
paulpierre/informer
A Telegram Mass Surveillance Bot in Python
tennc/fuzzdb
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
0xInfection/XSRFProbe
The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.
lmammino/jwt-cracker
Simple HS256, HS384 & HS512 JWT token brute force cracker.
OpenCyberTranslationProject/Linux-Basics-for-Hackers
书籍《Linux Basics for Hackers》2019版中文翻译版
emilyanncr/Windows-Post-Exploitation
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
offensive-security/exploitdb-papers
The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers
g0tmi1k/debian-ssh
Debian OpenSSL Predictable PRNG (CVE-2008-0166)
helviojunior/MS17-010
MS17-010
pentestgeek/phishing-frenzy-templates
Phishing Scenarios Used for Phishing Frenzy
chrismaddalena/Goreport
A Python script to collect campaign data from Gophish and generate a report
felamos/weirdhta
A tool to create obfuscated HTA script.
microsoftgraph/msgraph-sample-nodeexpressapp
This sample demonstrates how to use the Microsoft Graph JavaScript SDK to access data in Office 365 from Node.js Express apps.
edduu/Arjun
HTTP parameter discovery suite.
cym13/vbs-reverse-shell
VBS reverse shell scripts
OpenCyberTranslationProject/How-to-Hack-Like-a-Pornstar
书籍《How to Hack Like a Pornstar》2019中文翻译版
AOCorsaire/Meth0dMan
Meth0dMan is a Burp Suite extension to aid in testing HTTP Methods
moneermasoud/scripts
PHP Scripts ||| Exploits ||| Hacking