Pinned Repositories
sql-injection-payload-list
🎯 SQL Injection Payload List
-
整理到的暗网网址
.tmux
🇫🇷 Oh my tmux! My self-contained, pretty & versatile tmux configuration made with ❤️
1earn
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
awesome-shodan-queries
🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻
beef
The Browser Exploitation Framework Project
blizzardwrap
BlizzardWrap
commix
Automated All-in-One OS Command Injection Exploitation Tool.
ratel-bryan's Repositories
ratel-bryan/beef
The Browser Exploitation Framework Project
ratel-bryan/1earn
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
ratel-bryan/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
ratel-bryan/OneForAll
OneForAll是一款功能强大的子域收集工具
ratel-bryan/commix
Automated All-in-One OS Command Injection Exploitation Tool.
ratel-bryan/HTB-walkthroughs
ratel-bryan/kali-.pdf
ratel-bryan/blizzardwrap
BlizzardWrap
ratel-bryan/.tmux
🇫🇷 Oh my tmux! My self-contained, pretty & versatile tmux configuration made with ❤️
ratel-bryan/sql-injection-payload-list
🎯 SQL Injection Payload List
ratel-bryan/StegOnline
A web-based, accessible and open-source port of StegSolve.
ratel-bryan/Pentest-Cheatsheets
ratel-bryan/tmux.conf
Tmux 配置:打造最适合自己的终端复用工具
ratel-bryan/lpeworkshop
Windows / Linux Local Privilege Escalation Workshop
ratel-bryan/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
ratel-bryan/-
整理到的暗网网址
ratel-bryan/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
ratel-bryan/awesome-shodan-queries
🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻
ratel-bryan/The-Hacker-Playbook-3-Translation
对 The Hacker Playbook 3 的翻译。
ratel-bryan/Ghostcat-CNVD-2020-10487
Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938)