Pinned Repositories
angular-tour-of-heroes
Computer-Security-Algorithms
Problems related to computer security. Algorithms written in Python. Learn more: https://id0-rsa.pub/
CrackMapExec
A swiss army knife for pentesting networks
ctf-tools
tổng hợp tool ctf
dockertraining-reverseproxy
GoSniff
A network sniffer in the go language
Tools
Tools
zyayaa's Repositories
zyayaa/Tools
Tools
zyayaa/GoSniff
A network sniffer in the go language
zyayaa/angular-tour-of-heroes
zyayaa/CrackMapExec
A swiss army knife for pentesting networks
zyayaa/dockertraining-reverseproxy
zyayaa/burpsuite
java -jar BurpLoader.jar java -cp BurpLoader.jar;burpsuite_pro.jar larry.lau.BurpLoader
zyayaa/dockertraining-votingapp
zyayaa/Ebowla
Framework for Making Environmental Keyed Payloads
zyayaa/Go-SCP
Go programming language secure coding practices guide
zyayaa/gobuster
Directory/file & DNS busting tool written in Go
zyayaa/kernelpop
kernel privilege escalation enumeration and exploitation framework
zyayaa/linux-local-enumeration-script
Linux Local Enumeration Script
zyayaa/malicious-wordpress-plugin
Simply generates a wordpress plugin that will grant you a reverse shell once uploaded. I recommend installing Kali Linux, as msfvenom is used to generate the payload.
zyayaa/Mirai-Botnet
Mirai Botnet Client, Echo Loader and CNC source code (for the sake of knowledge)
zyayaa/odat
ODAT: Oracle Database Attacking Tool
zyayaa/os-scripts
Personal Collection of Operating Systems Scripts
zyayaa/OSCP-Survival-Guide
Kali Linux Offensive Security Certified Professional Survival Exam Guide
zyayaa/Phantom-Evasion
Python AV evasion tool capable to generate FUD executable even with the most common 32 bit metasploit payload(exe/elf/dmg/apk)
zyayaa/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
zyayaa/pwntools
CTF framework and exploit development library
zyayaa/Responder
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
zyayaa/RTA
zyayaa/SecLists
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
zyayaa/Sherlock
PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.
zyayaa/sparta
Network Infrastructure Penetration Testing Tool
zyayaa/sqlmap
Automatic SQL injection and database takeover tool
zyayaa/static-binaries
Various *nix tools built as statically-linked binaries
zyayaa/unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
zyayaa/unity-mergetool
A quick guide to set up Unity's Smart Merge with Git
zyayaa/windows-kernel-exploits
windows-kernel-exploits Windows平台提权漏洞集合