Stars
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
The Browser Exploitation Framework Project
An open-source post-exploitation framework for students, researchers and developers.
PowerSploit - A PowerShell Post-Exploitation Framework
Exploitation Framework for Embedded Devices
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), ar…
A collection of hacking / penetration testing resources to make you better!
Simple RDP Brute Forcer in python using NLA
Collection of some common wordlists such as RDP password, user name list, ssh password wordlist for brute force. IP Cameras Default Passwords.
[Deprecated, work in progress alternative: https://github.com/M2Team/NanaRun] Series of System Administration Tools
Python GUIs for Humans! PySimpleGUI is the top-rated Python application development environment. Launched in 2018 and actively developed, maintained, and supported in 2024. Transforms tkinter, Qt, …
A list of interesting payloads, tips and tricks for bug bounty hunters.
Additional files for the DaFlasher App and the ATCwatch Firmware for the P8 Smartwatch
A MicroPython based development environment for smart watches (including Pine64 PineTime)
Confluence Server Webwork OGNL injection
🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit
Interactive roadmaps, guides and other educational content to help developers grow in their careers.
A cross-platform GUI for youtube-dl made in Electron and node.js
Rumble allows the sharing of messages and pictures without relying on the Internet, in a Delay Tolerant Fashion following the Store-Carry and Forward paradigm
Rapidly Search and Hunt through Windows Forensic Artefacts
LucaBongiorni / P4wnP1
Forked from RoganDawes/P4wnP1P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.
Hidden tear 2.0 with more extension and now it can crypt directory like Documents, Download, Pictures etc.
LucaBongiorni / Lilith
Forked from werkamsus/LilithLilith, The Open Source C++ Remote Administration Tool (RAT)