shellster's Stars
evilsocket/opensnitch
OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.
ggerganov/kbd-audio
🎤⌨️ Acoustic keyboard eavesdropping
sensepost/objection
📱 objection - runtime mobile exploration
Ne0nd0g/merlin
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
drk1wi/Modlishka
Modlishka. Reverse Proxy.
ct-Open-Source/tuya-convert
A collection of scripts to flash Tuya IoT devices to alternative firmwares
its-a-feature/Mythic
A collaborative, multi-platform, red teaming framework
rootm0s/WinPwnage
UAC bypass, Elevate, Persistence methods
AlessandroZ/BeRoot
Privilege Escalation Project - Windows / Linux / Mac
chaitin/passionfruit
[WIP] Crappy iOS app analyzer
GoSecure/pyrdp
RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
WindowsExploits/Exploits
Windows Exploits
shr3ddersec/Shr3dKit
Red Team Tool Kit
NYAN-x-CAT/Lime-RAT
LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
googleprojectzero/symboliclink-testing-tools
emtunc/SlackPirate
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
ValdikSS/Super-UEFIinSecureBoot-Disk
Super UEFIinSecureBoot Disk: Boot any OS or .efi file without disabling UEFI Secure Boot
CBHue/PyFuscation
Obfuscate powershell scripts by replacing Function names, Variables and Parameters.
Zer0Mem0ry/RunPE
Code that allows running another windows PE in the same address space as the host process.
jesusprubio/awesome-nodejs-pentest
:skull_and_crossbones: Delightful Node.js packages useful for penetration testing, exploiting, reverse engineer, cryptography ...
SolomonSklash/chomp-scan
A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.
zMarch/Orc
Orc is a post-exploitation framework for Linux written in Bash
ThisIsLibra/AndroidProjectCreator
Convert an APK to an Android Studio Project using multiple open-source decompilers
d0nutptr/sic
A tool to perform Sequential Import Chaining
PositiveTechnologies/seq2seq-web-attack-detection
The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The main goal of this project is to demonstrate the relevance of the NLP approach for web security.
MayaPosch/BMaC
Building Management and Control system
jpakkane/msicreator
Python script to generate MSI installers
pownjs/whoarethey
Discover target social media profiles
BorjaMerino/Windows-One-Way-Stagers
Windows Stagers to circumvent restrictive network environments
bryant-treacle/so-elastalert-create
This Script will walk you through creating elastalert rules