Pinned Repositories
0xdork
Google dorking tool
0xsp-Mongoose
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
A-Red-Teamer-diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
abaddon
AutoTorIP
A Auto Tor IP Changer Tool.This program can automatic change our tor idenity/ip.100% working.
BruteShark
Network Analysis Tool
DeadTrapv2
A new and improved DeadTrap with more efficient time span for scanning a number
learn_mlwr_re
Resources for learning malware analysis and reverse engineering
SamSploit
A professional ethical hacking tool.
legly's Repositories
legly/Advanced-SQL-Injection-Cheatsheet
A cheat sheet that contains advanced queries for SQL Injection of all types.
legly/algo
Set up a personal VPN in the cloud
legly/AllInOneKit
This kit contains many tools for BruteForcing Social Media Accounts, Phising Attacks, Trojan Programs, Programs for Information Gathering and much more...
legly/AntiDDOS-system
🛡️⚔️ Protect your web app from DDOS attack or the Dead Ping + CAPTCHA VERIFICATION in one line!
legly/athena-iso
Athena is a Arch Linux-based distro focused on Cybersecurity. Learn, practice and enjoy with any hacking tool!
legly/AvillaForensics
Avilla Forensics 3.0
legly/DARKARMY
DARKARMY Hacking Tools Pack - A Penetration Testing Framework .
legly/deepdarkCTI
Collection of Cyber Threat Intelligence sources from the deep and dark web
legly/dorks_hunter
Simple Google Dorks search tool
legly/Drone-Hacking-Tool
Drone Hacking Tool is a GUI tool that works with a USB Wifi adapter and HackRF One for hacking drones.
legly/Hunter-Toolkit
Hunter-Toolkit Pentesting Assistant: Information Gathering And More.
legly/karton
Distributed malware processing framework based on Python, Redis and MinIO.
legly/Lockbit3.0-MpClient-Defender-PoC
Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC
legly/mageni
⚡️ Zero-friction vulnerability management platform
legly/medusa
Binary instrumentation framework based on FRIDA
legly/n8n
Free and open fair-code licensed node based Workflow Automation Tool. Easily automate tasks across different services.
legly/neuvector
legly/Offensive-Reverse-Shell-Cheat-Sheet
Offensive Reverse Shell (Cheat Sheet)
legly/Open_Source_Web-Vulnerability-Scanner-and-Patcher
A Open Source Web Vulnerability Scanner and Patcher
legly/owasp-mstg
The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
legly/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
legly/PSFuzz
Proviesec Fuzz Scanner - dir/path web scanner
legly/QCSuper
QCSuper is a tool communicating with Qualcomm-based phones and modems, allowing to capture raw 2G/3G/4G radio frames, among other things.
legly/Red-Rabbit
The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate other peoples tools like the aircrack suite or the wifite framework, it rather has its own code and is raw source with over 270+ options. This framework might just be your everyday key to your workflow
legly/sqli-postgres-rce-privesc-hacking-playground
Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration testing training.
legly/SteaLinG
The SteaLinG is an open-source penetration testing framework designed for social engineering
legly/torsh
Create a reverse shell over Tor network without port forwarding and with improved anonymity.
legly/U-Boat
Russia Wipers Dropper (REvil Ransomware included) (educational-purposes )
legly/WhiteBeam
WhiteBeam: Transparent endpoint security
legly/Windows-Defender-Hardening
Take advantage of some more advanced Windows Defender settings.