kankanhua's Stars
WooyunDota/DroidDrops
梳理下自己之前写过的文章
madneal/gshark
Scan for sensitive information easily and effectively.
liuxing/node-blog
:rocket:《Node.js从入门到上线》A blog build with Koa2.
liusw/elasticsearch-rtf
elasticsearch中文发行版,针对中文集成了相关插件,方便新手学习测试.
p4-team/ctf
Ctf solutions from p4 team
jeffzh3ng/fuxi
Penetration Testing Platform
BugScanTeam/GitHack
.git 泄漏利用工具,可还原历史版本
hongriSec/CTF-Training
收集各大比赛的题目和Writeup
leoyiall/liu
firework
niexinming/python_hook
xinali/wooyun
wooyun public information backup
heidsoft/cloud-bigdata-book
write book
yhd4711499/CalloutPopupWindow
ImageTragick/PoCs
Proof of Concepts for CVE-2016–3714
summitt/Nope-Proxy
TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.
SpiderLabs/Airachnid-Burp-Extension
A Burp Extension to test applications for vulnerability to the Web Cache Deception attack
tom0li/collection-document
Collection of quality safety articles. Awesome articles.
EmpireProject/Empire
Empire is a PowerShell and Python post-exploitation agent.
AHXR/ghost
:ghost: RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
byt3bl33d3r/gcat
A PoC backdoor that uses Gmail as a C&C server
secretsquirrel/the-backdoor-factory
Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors
sweetsoftware/Ares
Python botnet and backdoor
screetsec/TheFatRat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
TryCatchHCF/DumpsterFire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
w-digital-scanner/w9scan
Plug-in type web vulnerability scanner
lijiejie/htpwdScan
HTTP weak pass scanner
80vul/weakfilescan
动态多线程敏感信息泄露检测工具
CHYbeta/cmsPoc
CMS渗透测试框架-A CMS Exploit Framework
SecWiki/CMS-Hunter
CMS漏洞测试用例集合
t57root/pwnginx
Pwn nginx - a nginx backdoor provides shell access, socks5 tunneling, http password sniffing.