A curated list of my GitHub stars! Generated by starred.
- ASL
- ASP.NET
- ActionScript
- Ada
- Arduino
- Assembly
- AutoHotkey
- AutoIt
- Batchfile
- BitBake
- Blade
- BlitzBasic
- Boo
- C
- C#
- C++
- CMake
- CSS
- Classic ASP
- Clojure
- CodeQL
- ColdFusion
- Dart
- Dockerfile
- Emacs Lisp
- Erlang
- F#
- Fluent
- FreeMarker
- Go
- Groovy
- HCL
- HTML
- Hack
- Haskell
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- KiCad Layout
- Kotlin
- LLVM
- Logos
- Lua
- MATLAB
- Makefile
- Markdown
- Mask
- Max
- Mustache
- NSIS
- Nginx
- Nim
- Nix
- Nunjucks
- OCaml
- Objective-C
- Objective-C++
- Open Policy Agent
- Others
- PHP
- PLpgSQL
- Pascal
- Perl
- PostScript
- PowerShell
- Propeller Spin
- Pug
- Python
- QMake
- REXX
- Rascal
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- Sage
- SaltStack
- Scala
- Scheme
- Shell
- Smali
- Smarty
- Solidity
- SourcePawn
- Starlark
- Svelte
- Swift
- TSQL
- Tcl
- TeX
- TypeScript
- VBA
- VBScript
- VCL
- Vim Script
- Visual Basic
- Visual Basic .NET
- Vue
- XSLT
- YAML
- YARA
- Zeek
- Zig
- nesC
- templ
- postgres-cn/pgdoc-cn - PostgreSQL manual Chinese translation by China PostgreSQL Users Group
- Jean-Francois-C/Webshell-Upload-and-Web-RCE-Techniques - Classic Web shell upload techniques & Web RCE techniques
- appsecco/json-flash-csrf-poc - This repo contains the files required to perform a CSRF attack using Flash and HTTP 307 redirections.
- UnicycleDumpTruck/MissionControl - This kids' homework desk has top that flips up to reveal a space-themed control panel.
- spacehuhn/wifi_keylogger - DIY Arduino Wi-Fi Keylogger (Proof of Concept)
- enkomio/AlanFramework - A C2 post-exploitation framework
- MortenSchenk/Token-Stealing-Shellcode -
- xenoscr/SysWhispers2 - AV/EDR evasion via direct system calls.
- timwhitez/Doge-Direct-Syscall - Golang Direct Syscall
- klezVirus/inceptor - Template-Driven AV/EDR Evasion Framework
- guitmz/memrun - Small tool to run ELF binaries from memory with a given process name
- DownWithUp/DynamicKernelShellcode - An example of how x64 kernel shellcode can dynamically find and use APIs
- mai1zhi2/SysWhispers2_x86 - X86 version of syswhispers2 / x86 direct system call
- jthuraisamy/SysWhispers2 - AV/EDR evasion via direct system calls.
- Cybereason/siofra -
- mytechnotalent/Reverse-Engineering - A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.
- jjyr/jonesforth_riscv - Jonesforth RISC-V port.
- vxunderground/MalwareSourceCode - Collection of malware source code for a variety of platforms in an array of different programming languages.
- antonioCoco/Mapping-Injection - Just another Windows Process Injection
- jthuraisamy/SysWhispers - AV/EDR evasion via direct system calls.
- tinysec/windows-syscall-table - windows syscall table from xp ~ 10 rs4
- xianyukang/MyKeymap - 一款基于 AutoHotkey 的键盘映射工具
- goreliu/runz - RunZ,专业的快速启动工具
- kookob/smpic - Windows下面的SM.MS图床上传工具
- WildByDesign/ACLViewer - ACL Viewer for Windows
- lxgw/LxgwWenKai - An open-source Chinese font derived from Fontworks' Klee One. 一款开源中文字体,基于 FONTWORKS 出品字体 Klee One 衍生。
- gsuberland/lbfo_win10 - Re-enable NIC teaming (LBFO) in Windows 10 using components from Windows Server.
- SkyBlueEternal/jdk-change - 支持windows\linux\macOS | jdk一键切换版本\一键切换jdk版本\jdk版本更换
- 0xbinibini/emergency_response_batch - 应急响应,应急响应脚本,应急响应批处理;将Windows查看日志用户端口等命令集成在批处理脚本中。让熟练的应急人员能省去多次重复的敲击和记忆,并通过读取配置文件来调用Windows自带的命令结束进程服务等,本批处理尽量不调用任何外部的工具。任何调用的外部工具都将会存放在plugin目录下可按需使用,力图使用最原生的命令行来完成工作。
- SoraShu/easyconn-socks5-for-HITsz - 在服务器上运行easyconnect并建立socks5代理,实现win电脑上免安装easyconnect访问校园内网。
- r00t4dm/CVE-2020-27955 -
- swagkarna/Defeat-Defender-V1.2.0 - Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
- wafinfo/cobaltstrike - cobaltstrike插件
- chroblert/JC-jEnv - windows java environ manage
- massgravel/Microsoft-Activation-Scripts - Open-source Windows and Office activator featuring HWID, Ohook, TSforge, KMS38, and Online KMS activation methods, along with advanced troubleshooting.
- sagishahar/lpeworkshop - Windows / Linux Local Privilege Escalation Workshop
- maguowei/k8s-docker-desktop-for-mac - Docker Desktop for Mac 开启并使用 Kubernetes
- ihacku/winhardening - windows 加固脚本
- frizb/Windows-Privilege-Escalation - Windows Privilege Escalation Techniques and Scripts
- acgbfull/IBM_Appscan_Batch_Scan_Script - IBM AppScan批量扫描脚本
- crazywifi/RDP_SessionHijacking - Passwordless RDP Session Hijacking
- mxk/windows-secure-group-policy - Windows 11 secure group policy for standalone devices
- so87/CISSP-Study-Guide - study material used for the 2018 CISSP exam
- Tai7sy/fuckcdn - CDN真实IP扫描,易语言开发
- NextronSystems/APTSimulator - A toolset to make a system look as if it was the victim of an APT attack
- auspbro/domain-admin-crack - 🌵 入域电脑用户本地提权
- bartblaze/Disable-Intel-AMT - Tool to disable Intel AMT on Windows
- NuclearPhoenixx/fake-sandbox - 👁🗨 This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.
- wzulfikar/ngrok-caddy - Script to run ngrok with (optional) caddy server
- xer0times/BugBounty - Bug Bounty stuffs, payloads, scripts, profiles, tips and tricks, ...
- dbarzin/mercator - Mapping the information system / Cartographie du système d'information
- Sy3Omda/burp-bounty - Burp Bounty profiles
- six2dez/burp-bounty-profiles - Burp Bounty profiles compilation, feel free to contribute!
- PortSwigger/scan-check-builder - Burp Bounty is a extension of Burp Suite that improve an active and passive scanner by yourself. This extension requires Burp Suite Pro.
- 1N3/IntruderPayloads - A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
- ghsec/BBProfiles - Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that improve an active and passive scanner by yourself. This extension requires Burp Suite Pro.
- byt3bl33d3r/SILENTTRINITY - An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
- ImKKingshuk/RootShield - RootShield : The Ultimate Shield for Rooted Android Devices - Protect your rooted Android device from unauthorized file operations and process executions! 🛡️ RootShield is a powerful kernel module tha
- google/security-research - This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
- linktools-toolkit/linktools - 记录了在移动端漏洞分析和合规扫描过程中涉及的一些常用功能,以Python库的方式提供使用
- varwara/CVE-2024-35250 - PoC for the Untrusted Pointer Dereference in the ks.sys driver
- hengyoush/kyanos - Kyanos is a networking analysis tool using eBPF. It can visualize the time packets spend in the kernel, capture requests/responses, makes troubleshooting more efficient.
- wangfly-me/LoaderFly - 助力每一位RT队员,快速生成免杀木马
- gianlucaborello/libprocesshider - Hide a process under Linux using the ld preloader (https://sysdig.com/blog/hiding-linux-processes-for-fun-and-profit/)
- paokuwansui/Antivirus_killer - 免杀主流防病毒软件
- P001water/yuze - A socksv5 proxy tool Written by CLang. 一款纯C实现的轻量内网穿透工具,支持正向,反向socks5代理隧道的搭建,支持跨平台使用。
- OracleNep/Nday-Exploit-Plan - 历史漏洞的细节以及利用方法汇总收集
- iridium-soda/container-escape-exploits - 整理容器逃逸相关的漏洞和exploits.
- baiyies/AutoMonitor - windows自动监控截图工具。 windows automatic screenshoter.
- h4ckm310n/Container-Vulnerability-Exploit - 容器安全漏洞的分析与复现
- m0nad/Diamorphine - LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
- PolarPeak/NIDS - 基于Suricata简单的网络入侵检测系统,也是我的垃圾毕业设计,目前仅仅是一个demo。
- evilashz/PigScheduleTask - 添加计划任务方法集合
- kernweak/minicrypt - 基于MiniFilter和Sfilter的加解密
- esnet/iperf - iperf3: A TCP, UDP, and SCTP network bandwidth measurement tool
- qwqdanchun/HVNC - 基于Tinynuke修复得到的HVNC
- baidu/dperf - dperf is a 100Gbps network load tester.
- H4K6/CVE-2023-0179-PoC - 针对(CVE-2023-0179)漏洞利用 该漏洞被分配为CVE-2023-0179,影响了从5.5到6.2-rc3的所有Linux版本,该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。
- Impalabs/CVE-2023-27326 - VM Escape for Parallels Desktop <18.1.1
- libAudioFlux/audioFlux - A library for audio and music analysis, feature extraction.
- chompie1337/Windows_LPE_AFD_CVE-2023-21768 - LPE exploit for CVE-2023-21768
- xforcered/Windows_LPE_AFD_CVE-2023-21768 - LPE exploit for CVE-2023-21768
- Esonhugh/sshd_backdoor - /root/.ssh/authorized_keys evil file watchdog with ebpf tracepoint hook.
- brosck/Pingoor - 「🚪」Linux Backdoor based on ICMP protocol
- nelhage/reptyr - Reparent a running program to a new terminal
- itm4n/PPLdump - Dump the memory of a PPL with a userland exploit
- zh-explorer/dirtycow - exploit for dirtycow
- Coldzer0/ReverseSock5Proxy - A tiny Reverse Sock5 Proxy written in C :V
- Cerbersec/KillDefenderBOF - Beacon Object File PoC implementation of KillDefender
- seventeenman/noELF - Linux下用于远程加载可执行文件以达到内存加载的目的
- Kevin-sa/ebpf-supply-chain - 利用ebpf做pypi恶意包检测
- yukar1z0e/cloudswordtsh - 多用户版linux/freebsd/openbsd/netbsd/cygwin/sunos/irix/hpux/osf的远控tiny shell
- Octoberfest7/EventViewerUAC_BOF - Beacon Object File implementation of Event Viewer deserialization UAC bypass
- Rvn0xsy/SchtaskCreator - 远程创建任务计划工具
- Libraggbond/EventViewerBypassUacBof - EventViewer Bypass Uac Bof
- randorisec/CVE-2022-34918-LPE-PoC -
- h3xduck/TripleCross - A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
- pytorch/cpuinfo - CPU INFOrmation library (x86/x86-64/ARM/ARM64, Linux/Windows/Android/macOS/iOS)
- byt3bl33d3r/BOF-Zig - Cobalt Strike BOF with Zig!
- crisprss/PetitPotam - 替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, a series of local rights escalation methods have been realized
- Cracked5pider/Ekko - Sleep Obfuscation
- helloexp/0day - 各种CMS、各种平台、各种系统、各种软件漏洞的EXP、POC ,该项目将持续更新
- tr3ee/CVE-2022-23222 - CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation
- synacktiv/ica2tcp - A SOCKS proxy for Citrix.
- thefLink/DeepSleep - A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC
- q77190858/CVE-2021-3156 - sudo提权漏洞CVE-2021-3156复现代码
- nsacyber/Hardware-and-Firmware-Security-Guidance - Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as gene
- nemo-wq/PrintNightmare-CVE-2021-34527 - PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits
- LDrakura/Remote_ShellcodeLoader - 远程shellcode加载&权限维持+小功能
- JDArmy/RPCSCAN - RPC远程主机信息匿名扫描工具
- jituo666/AndroidEventRecorder - A recorder used for recording user actions on Android platforms.
- liudf0716/xfrpc - The xfrpc project is a lightweight implementation of the FRP client written in C language for OpenWRT and IoT systems. It is designed to provide an efficient solution for resource-constrained devices
- Mr-Un1k0d3r/WindowsDllsExport - A list of all the DLLs export in C:\windows\system32\
- trustedsec/CS-Remote-OPs-BOF -
- 3nock/OTE - OSINT Template Engine
- DataDog/security-labs-pocs - Proof of concept code for Datadog Security Labs referenced exploits.
- outflanknl/C2-Tool-Collection - A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.
- chicharitomu14/AndScanner - This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022
- rbsec/sslscan - sslscan tests SSL/TLS enabled services to discover supported cipher suites
- krisnova/boopkit - Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.
- bytedance/bhook - 🔥 ByteHook is an Android PLT hook library which supports armeabi-v7a, arm64-v8a, x86 and x86_64.
- r0ysue/AndroidFridaBeginnersBook - 《安卓Frida逆向与抓包实战》随书附件
- easychen/pushdeer - 开放源码的无App推送服务,iOS14+扫码即用。亦支持快应用/iOS和Mac客户端、Android客户端、自制设备
- emptymonkey/revsh - A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.
- Bonfee/CVE-2022-0995 - CVE-2022-0995 exploit
- RfidResearchGroup/proxmark3 - Iceman Fork - Proxmark3
- gojue/ecapture - Capturing SSL/TLS plaintext without a CA certificate using eBPF. Supported on Linux/Android kernels for amd64/arm64.
- ly4k/PwnKit - Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation
- crisprss/PrintSpoofer - PrintSpoofer的反射dll实现,结合Cobalt Strike使用
- AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits - A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.
- mponcet/subversive - x86_64 linux rootkit using debug registers
- therealdreg/lsrootkit - Rootkit Detector for UNIX
- Arinerron/CVE-2022-0847-DirtyPipe-Exploit - A root exploit for CVE-2022-0847 (Dirty Pipe)
- Bonfee/CVE-2022-25636 - CVE-2022-25636
- bopin2020/WindowsCamp - Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&
- Lojii/Knot - 一款iOS端基于MITM(中间人攻击技术)实现的HTTPS抓包工具,完整的App,核心代码使用SwiftNIO实现
- r4j0x00/exploits -
- SentryPeer/SentryPeer - Protect your SIP Servers from bad actors at https://sentrypeer.org
- b1n4r1b01/n-days -
- linux-lock/bpflock - bpflock - eBPF driven security for locking and auditing Linux machines
- Rvn0xsy/CVE-2021-4034 - CVE-2021-4034 Add Root User - Pkexec Local Privilege Escalation
- 0verSp4ce/CVE-2021-4034 - CVE-2021-4034, For Webshell Version.
- MichaelDim02/Narthex - Modular personalized dictionary generator.
- FlamingSpork/iptable_evil - An evil bit backdoor for iptables
- kyleavery/inject-assembly - Inject .NET assemblies into an existing process
- spieglt/whatfiles - Log what files are accessed by any Linux process
- berdav/CVE-2021-4034 - CVE-2021-4034 1day
- arthepsy/CVE-2021-4034 - PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)
- Ayrx/CVE-2021-4034 - Exploit for CVE-2021-4034
- xbyl1234/android_analysis - a few android analysis tools, jni trace by native hook, libc hook, write log with caller's addr in file or AndroidLog
- aaaddress1/Skrull - Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting te
- thefLink/Hunt-Sleeping-Beacons - Aims to identify sleeping beacons
- Rvn0xsy/linux_dirty - 更改后的脏牛提权代码,可以往任意文件写入任意内容,去除交互过程
- revng/pagebuster - PageBuster - dump all executable pages of packed processes.
- screetsec/TheFatRat - Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then
- f0rb1dd3n/Reptile - LKM Linux rootkit
- lcatro/qemu-fuzzer - Qemu Fuzzer.针对Qemu模拟设备的模糊测试工具,主要思路是Host生成种子Data,然后传递给Guest中转程序,由中转程序访问MMIO,以达到和模拟设备的交互,不同于qtest自带的fuzzer.
- chriskaliX/Hades - Hades is a Host-Based Intrusion Detection System based on eBPF(mainly)
- n0b0dyCN/redis-rogue-server - Redis(<=5.0.5) RCE
- wavestone-cdt/EDRSandblast -
- OALabs/BlobRunner - Quickly debug shellcode extracted during malware analysis
- SweetIceLolly/Huorong_Vulnerabilities - Huorong Internet Security vulnerabilities 火绒安全软件漏洞
- scareing/cmd2shellcode - cmd2shellcode
- securifybv/Visual-Studio-BOF-template - A Visual Studio template used to create Cobalt Strike BOFs
- HexHive/USBFuzz - A Framework for fuzzing USB Drivers by Device Emulation
- fortra/nanodump - The swiss army knife of LSASS dumping
- 0671/RedisModules-ExecuteCommand-for-Windows - 可在Windows下执行系统命令的Redis模块,可用于Redis主从复制攻击。
- Lakr233/Decrypter - An easy way to decrypt UIKit app.
- idealeer/xmap - XMap is a fast network scanner designed for performing Internet-wide IPv6 & IPv4 network research scanning.
- wolfpython/nids - 基于网络的入侵检测系统
- dismantl/ImprovedReflectiveDLLInjection - An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security
- aircrack-ng/mdk4 - MDK4
- boku7/injectEtwBypass - CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)
- codewhitesec/HandleKatz - PIC lsass dumper using cloned handles
- gentilkiwi/kekeo - A little toolbox to play with Microsoft Kerberos in C
- EspressoCake/PPLDump_BOF - A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.
- microsoft/omi - Open Management Infrastructure
- seL4/seL4 - The seL4 microkernel
- outflanknl/PrintNightmare -
- cube0x0/SharpSystemTriggers - Collection of remote authentication triggers in C#
- paranoidninja/PIC-Get-Privileges - Building and Executing Position Independent Shellcode from Object Files in Memory
- SolomonSklash/SleepyCrypt - A shellcode function to encrypt a running process image when sleeping.
- limithit/NginxExecute - The NginxExecute module executes the shell command through GET POST and HEAD to display the result.
- boku7/azureOutlookC2 - Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP: Use Micro
- cyberark/rdpfuzz - Tools for fuzzing RDP
- mprovost/NFStash - NFS client CLI toolkit
- aaaddress1/PR0CESS - some gadgets about windows process and ready to use :)
- superflexible/TGPuttyLib - An SFTP client shared library (dll/so/dylib) with bindings and classes for C++, Delphi and Free Pascal based on PuTTY
- ttdennis/fpicker - fpicker is a Frida-based fuzzing suite supporting various modes (including AFL++ in-process fuzzing)
- mgeeky/ElusiveMice - Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind
- boku7/whereami - Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL's.
- frkngksl/Huan - Encrypted PE Loader Generator
- Yubico/yubico-c - YubiKey C low-level library (libyubikey)
- RUB-SysSec/Nyx - USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types
- glmcdona/Process-Dump - Windows tool for dumping malware PE files from memory back to disk for analysis.
- alfarom256/BOF-ForeignLsass -
- knightswd/ProcessGhosting -
- NoOne-hub/Beacon.dll - Beacon.dll reverse
- boku7/BokuLoader - A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!
- aqi00/advanceapp - 《Android App开发进阶与项目实战》随书源码
- horsicq/PDBRipper - PDBRipper is a utility for extract an information from PDB-files.
- Gui774ume/ebpfkit - ebpfkit is a rootkit powered by eBPF
- jrbrtsn/ban2fail - Simple & efficient log file scanning and iptable filtering
- cdpxe/NELphase - Network Environment Learning (NEL) Phase for Covert Channels (with a Feedback Channel)
- ZhangZhuoSJTU/StochFuzz - Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting
- connormcgarr/cThreadHijack - Beacon Object File (BOF) for remote process injection via thread hijacking
- boku7/injectAmsiBypass - Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.
- LloydLabs/process-enumeration-stealth -
- hasherezade/process_ghosting - Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file
- GJDuck/e9patch - A powerful static binary rewriting tool
- djkaty/Il2CppInspector - Powerful automated tool for reverse engineering Unity IL2CPP binaries
- merbanan/rtl_433 - Program to decode radio transmissions from devices on the ISM bands (and other frequencies)
- killvxk/Beacon - Lightweight, header-only C++ IPC library for Windows operating systems (Vista+) using advanced local procedure calls
- sliverarmory/COFFLoader -
- joshfaust/Alaris - A protective and Low Level Shellcode Loader that defeats modern EDR systems.
- OWASP/IoTGoat - IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly found vulnerabilities in IoT devices.
- ndilieto/uacme - ACMEv2 client written in plain C with minimal dependencies
- client9/libinjection - SQL / SQLI tokenizer parser analyzer
- alipay/ios-malicious-bithunter - iOS Malicious Bit Hunter is a malicious plug-in detection engine for iOS applications. It can analyze the head of the macho file of the injected dylib dynamic library based on runtime. If you are inte
- xuanxuan0/TiEtwAgent - PoC memory injection detection agent based on ETW, for offensive and defensive research purposes
- antonioCoco/RemotePotato0 - Windows Privilege Escalation from User to Domain Admin.
- greenbone/gvmd - Greenbone Vulnerability Manager - The database backend for the Greenbone Community Edition
- topotam/PetitPotam - PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.
- CCob/BOF.NET - A .NET Runtime for Cobalt Strike's Beacon Object Files
- 0xricksanchez/dlink-decrypt - D-Link firmware decryption PoC
- boku7/spawn - Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (ACG),
- xforcered/InlineExecute-Assembly - InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditional f
- inspiringz/CVE-2021-3493 - CVE-2021-3493 Ubuntu OverlayFS Local Privesc (Interactive Bash Shell & Execute Command Entered)
- wbenny/injdrv - proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC
- CCob/SylantStrike - Simple EDR implementation to demonstrate bypass
- jattach/jattach - JVM Dynamic Attach utility
- anthemtotheego/InlineExecute-Assembly - InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditional f
- praetorian-inc/PortBender - TCP Port Redirection Utility
- hlldz/CVE-2021-1675-LPE - Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527
- blackorbird/PrintNightmare -
- iqiyi/qnsm - QNSM is network security monitoring framework based on DPDK.
- Yaxser/Backstab - A tool to kill antimalware protected processes
- CaledoniaProject/rdpscan - RDP password verification tool - No external libraries required ;-P
- wonderkun/go-packer - golang打包二进制进行免杀
- cgwalters/cve-2020-14386 -
- alipay/Owfuzz - Owfuzz: a WiFi protocol fuzzing tool
- passthehashbrowns/hook-integrity-checks -
- kevmitch/win_battery_log - command line battery stats for MS Windows
- passthehashbrowns/hiding-your-syscalls - Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction within NTDLL.
- yarrick/iodine - Official git repo for iodine dns tunnel
- airbus-cyber/afl_ghidra_emu -
- ApsaraDB/PolarDB-for-PostgreSQL - A cloud-native database based on PostgreSQL developed by Alibaba Cloud.
- season-lab/fuzzolic - fuzzing + concolic = fuzzolic :)
- djhohnstein/macos_shell_memory - Execute MachO binaries in memory using CGo
- ASkyeye/Zipper - Zipper, a CobaltStrike file and folder compression utility.
- pbek/loganalyzer - LogAnalyzer is a tool that helps you to analyze your log files by reducing the content with patterns you define.
- heiher/hev-socks5-core - A simple, lightweight socks5 library (IPv4/IPv6/TCP/UDP/Client/Server)
- orangetw/tsh - Tiny SHell is an open-source UNIX backdoor.
- waldo-irc/CVE-2021-21551 - Exploit to SYSTEM for CVE-2021-21551
- Iansus/SilentLsassDump - VisualStudio port of https://github.com/guervild/BOFs/tree/dev/SilentLsassDump
- abcz316/rwProcMem33 - Linux ARM64内核硬件进程内存读写驱动、硬件断点调试驱动。硬件级读写Linux进程内存、硬件级下断点。
- falcosecurity/pdig - ptrace-based event producer for udig
- svengong/xcubebase_riru - 基于magisk 和riru的frida持久化方案
- Al1ex/WindowsElevation - Windows Elevation(持续更新)
- Al1ex/LinuxEelvation - Linux Eelvation(持续更新)
- boazsegev/iodine - iodine - HTTP / WebSockets Server for Ruby with Pub/Sub support
- xforcered/CredBandit - Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that back through your already existing Beacon communication channel
- dgoulet/kjackal - Linux Rootkit Scanner
- rsmudge/ZeroLogon-BOF -
- git-for-windows/git-sdk-64 - A Git repository mirroring the current 64-bit Git for Windows SDK
- csandker/inMemoryShellcode - A Collection of In-Memory Shellcode Execution Techniques for Windows
- pattern-f/TQ-pre-jailbreak - Hello from pattern-f.
- darvincisec/AntiDebugandMemoryDump - Anti-Debug and Anti-Memory Dump for Android
- purerosefallen/ygopro - KoishiPro
- decoder-it/juicy_2 - juicypotato for win10 > 1803 & win server 2019
- 9bie/exe2shellcode - Remote Download and Memory Execute for shellcode framework
- trustedsec/COFFLoader -
- akopytov/sysbench - Scriptable database and system performance benchmark
- mtrojnar/osslsigncode - OpenSSL based Authenticode signing for PE/MSI/Java CAB files
- jmk-foofus/medusa - Medusa is a speedy, parallel, and modular, login brute-forcer.
- rewardone/OSCPRepo - A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and readi
- aaaddress1/sakeInject - Windows PE - TLS (Thread Local Storage) Injector in C/C++
- Rvn0xsy/CVE-2021-3156-plus - CVE-2021-3156非交互式执行命令
- blasty/CVE-2021-3156 -
- Mr-Un1k0d3r/RedTeamCCode - Red Team C code repo
- lockedbyte/CVE-Exploits - PoC exploits for software vulnerabilities
- mai1zhi2/ShellCodeFramework - 绕3环的shellcode免杀框架
- ea/bosch_headunit_root - Documentation and code for rooting and extending a Bosch car head unit (lcn2kai)
- LloydLabs/Windows-API-Hashing - This is a simple example and explanation of obfuscating API resolution via hashing
- LloydLabs/delete-self-poc - A way to delete a locked file, or current running executable, on disk.
- zznop/drow - Injects code into ELF executables post-build
- neil-wu/CatFrida - CatFrida is a macOS tool for inspecting a running iOS app.
- ybdt/evasion-hub - 免杀对抗
- jsherman212/xnuspy - an iOS kernel function hooking framework for checkra1n'able devices
- rsmudge/unhook-bof - Remove API hooks from a Beacon process.
- dacade/tools - some tools
- lengjibo/FourEye - AV Evasion Tool For Red Team Ops
- AFLplusplus/AFLplusplus - The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
- ethereal-vx/Persistence - Recreating and reviewing the Windows persistence methods
- anantshri/Android_Security - This repository is a suplimentary material for Android Training's done by Anant Shrivastava from 2012-2017
- gtworek/PSBits - Simple (relatively) things allowing you to dig a bit deeper than usual.
- ajpc500/BOFs - Collection of Beacon Object Files
- tomcarver16/BOF-DLL-Inject - Manual Map DLL injection implemented with Cobalt Strike's Beacon Object Files.
- gnxbr/Fully-Undetectable-Techniques -
- chroblert/JC-AntiPtrace - 安卓绕过ptrace反调试
- NixOS/patchelf - A small utility to modify the dynamic linker and RPATH of ELF executables
- TannerJin/AntiMSHookFunction - AntiMSHookFunction (make MSHookFunction doesn't work)
- ntop/n2n - Peer-to-peer VPN
- gaffe23/linux-inject - Tool for injecting a shared object into a Linux process
- code-scan/ssh-inject-auto-find-libdl -
- geokb/yabar - A modern and lightweight status bar for X window managers.
- cbwang505/CVE-2019-0708-EXP-Windows - CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell
- strongcourage/uafuzz - UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities
- LloydLabs/wsb-detect - wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB")
- g0dA/linuxStack - Linux技术栈
- 0voice/algorithm-structure - 2021年最新总结 500个常用数据结构,算法,算法导论,面试常用,大厂高级工程师整理总结
- GeoSn0w/Blizzard-Jailbreak - An Open-Source iOS 11.0 -> 11.4.1 (soon iOS 13) Jailbreak, made for teaching purposes.
- bytecode77/r77-rootkit - Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
- ventoy/Ventoy - A new bootable USB solution.
- SkewwG/domainTools - 内网域渗透小工具
- StarCross-Tech/heap_exploit_2.31 -
- XiphosResearch/netelf - Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.
- andreafioraldi/weizz-fuzzer -
- hackerschoice/gsocket - Connect like there is no firewall. Securely.
- phra/PEzor - Open-Source Shellcode & PE Packer
- TimelifeCzy/Shell_Protect - VM一键加壳/脱壳,全压缩,反调试等
- ish-app/ish - Linux shell for iOS
- inspektor-gadget/inspektor-gadget - Inspektor Gadget is a set of tools and framework for data collection and system inspection on Kubernetes clusters and Linux hosts using eBPF
- gloxec/CrossC2 - generate CobaltStrike's cross-platform payload
- timwhitez/Cobalt-Strike-Aggressor-Scripts - Cobalt Strike Aggressor 插件包
- brendan-rius/c-jwt-cracker - JWT brute force cracker written in C
- bg6cq/whoisscanme -
- aircrack-ng/rtl8188eus - RealTek RTL8188eus WiFi driver with monitor mode & frame injection support
- dtcooper/fakehostname - Run a command and fake your hostname.
- yifengyou/learn-kvm - Qemu KVM(Kernel Virtual Machine)学习笔记
- blendin/3snake - Tool for extracting information from newly spawned processes
- 0vercl0k/sic - Enumerate user mode shared memory mappings on Windows.
- CylanceVulnResearch/ReflectiveDLLRefresher - Universal Unhooking
- DoctorWkt/acwj - A Compiler Writing Journey
- limbenjamin/LogServiceCrash - POC code to crash Windows Event Logger Service
- nil0x42/duplicut - Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)
- blunderbuss-wctf/wacker - A WPA3 dictionary cracker
- uf0o/CVE-2020-17382 - PoC exploits for CVE-2020-17382
- libinjection/libinjection - SQL / SQLI tokenizer parser analyzer
- blackarrowsec/redteam-research - Collection of PoC and offensive techniques used by the BlackArrow Red Team
- chompie1337/s8_2019_2215_poc - PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass
- DerekSelander/yacd - Decrypts FairPlay applications on iOS 13.4.1 and lower, no jb required
- jvinet/knock - A port-knocking daemon
- ThunderGunExpress/UAC-TokenDuplication -
- Ascotbe/Kernelhub - 🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
- fancycode/MemoryModule - Library to load a DLL from memory.
- reactos/reactos - A free Windows-compatible Operating System
- MobileForensicsResearch/mem - Tool used for dumping memory from Android devices
- ARM-software/CSAL - Coresight Access Library
- webview/webview_csharp - C# bindings for webview/webview - Batteries included
- gabrielrcouto/awesome-php-ffi - PHP FFI examples and use cases
- bhassani/EternalBlueC - EternalBlue suite remade in C/C++ which includes: MS17-010 Exploit, EternalBlue vulnerability detector, DoublePulsar detector and DoublePulsar Shellcode & DLL uploader
- mdsecactivebreach/firewalker -
- hzqst/VmwareHardenedLoader - Vmware Hardened VM detection mitigation loader (anti anti-vm)
- aligrudi/neatcc - A small arm/x86(-64) C compiler
- bkerler/opencl_brute - MD5,SHA1,SHA256,SHA512,HMAC,PBKDF2,SCrypt Bruteforcing tools using OpenCL (GPU, yay!) and Python
- marsyy/littl_tools -
- n0b0dyCN/RedisModules-ExecuteCommand - Tools, utilities and scripts to help you write redis modules!
- vulhub/redis-rogue-getshell - redis 4.x/5.x master/slave getshell module
- TheWover/donut - Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
- google/sanitizers - AddressSanitizer, ThreadSanitizer, MemorySanitizer
- AntSwordProject/ant_php_extension - PHP 扩展, 用于 PHP-FPM、FastCGI、LD_PRELOAD等模式下突破 disabled_functions
- m57/cobaltstrike_bofs - My CobaltStrike BOFS
- anthemtotheego/C_Shot -
- sailay1996/UAC_Bypass_In_The_Wild - Windows 10 UAC bypass for all executable files which are autoelevate true .
- a0rtega/pafish - Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
- github/securitylab - Resources related to GitHub Security Lab
- qq4108863/hihttps - hihttps是一款完整源码的高性能web应用防火墙,既支持传统WAF的所有功能如SQL注入、XSS、恶意漏洞扫描、密码暴力破解、CC、DDOS等ModSecurity正则规则,又支持无监督机器学习,自主对抗未知攻击。
- rvrsh3ll/BOF_Collection - Various Cobalt Strike BOFs
- sailay1996/RpcSsImpersonator - Privilege Escalation Via RpcSs svc
- libyal/liblnk - Library and tools to access the Windows Shortcut File (LNK) format
- NtRaiseHardError/NINA - NINA: No Injection, No Allocation x64 Process Injection Technique
- DanieleDeSensi/peafowl - High performance Deep Packet Inspection (DPI) framework to identify L7 protocols and extract and process data and metadata from network traffic.
- elfmaster/libelfmaster - Secure ELF parsing/loading library for forensics reconstruction of malware, and robust reverse engineering tools
- elfmaster/ftrace - POSIX Function tracing
- elfmaster/dsym_obfuscate - Obfuscates dynamic symbol table
- ntop/nDPI - Open Source Deep Packet Inspection Software Toolkit
- redplait/armpatched - clone of armadillo patched for windows
- dalvarezperez/CreateFile_based_rootkit -
- mhaskar/Shellcode-In-Memory-Decoder - A simple C implementation to decoded your shellcode and writes it directly to memory
- meme/hotwax - Coverage-guided binary fuzzing powered by Frida Stalker
- avs333/Nougat_dlfunctions -
- hack0z/byopen - 🎉A dlopen library that bypasses mobile system limitation
- titansec/OpenWAF - Web security protection system based on openresty
- ionescu007/faxhell - A Bind Shell Using the Fax Service and a DLL Hijack
- ph4ntonn/Impost3r - 👻Impost3r -- A linux password thief
- havocykp/Gh0st - 远控源码
- yangyangwithgnu/bypass_disablefunc_via_LD_PRELOAD - bypass disable_functions via LD_PRELOA (no need /usr/sbin/sendmail)
- gentilkiwi/mimikatz - A little tool to play with Windows security
- itm4n/PrintSpoofer - Abusing impersonation privileges through the "Printer Bug"
- sandboxie/sandboxie - The Sandboxie application
- can1357/NtLua - Lua in kernel-mode because why not.
- 1d8/MailJack -
- thebabush/bline - Naver LINE VoIP reversing stuff
- kingToolbox/WindTerm - A professional cross-platform SSH/Sftp/Shell/Telnet/Tmux/Serial terminal.
- nccgroup/nccfsas - Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.
- a1exdandy/checkm8-a5 - checkm8 port for S5L8940X/S5L8942X/S5L8945X
- taviso/ctftool - Interactive CTF Exploration Tool
- YutaroHayakawa/ipftrace2 - A packet oriented Linux kernel function call tracer
- hasherezade/hollows_hunter - Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
- rxwx/spoolsystem - Print Spooler Named Pipe Impersonation for Cobalt Strike
- Katrovisch/KatroLogger - KeyLogger for Linux Systems
- bats3c/shad0w - A post exploitation framework designed to operate covertly on heavily monitored environments
- HyperDbg/HyperDbg - State-of-the-art native debugging tools
- AltraMayor/gatekeeper - The first open-source DDoS protection system
- V-E-O/PoC - PoC of CVE/Exploit
- vanhauser-thc/thc-hydra - hydra
- luke-goddard/enumy - Linux post exploitation privilege escalation enumeration
- oleavr/ios-inject-custom - Example showing how to use Frida for standalone injection of a custom payload
- Echocipher/AUTO-EARN - 一个利用OneForAll进行子域收集、Shodan API端口扫描、Xray漏洞Fuzz、Server酱的自动化漏洞扫描、即时通知提醒的漏洞挖掘辅助工具
- zhuotong/Android_InlineHook - Android内联hook框架
- juuso/keychaindump - A proof-of-concept tool for reading OS X keychain passwords
- prbinu/tls-scan - An Internet scale, blazing fast SSL/TLS scanner ( non-blocking, event-driven )
- a2o/snoopy - Snoopy Command Logger is a small library that logs all program executions on your Linux/BSD system.
- gentilkiwi/kirandomtpm - Get random bytes from the TPM (tool + BCrypt RNG provider)
- wonderkun/CTFENV - 为应对CTF比赛而搭建的各种环境
- antonioCoco/RoguePotato - Another Windows Local Privilege Escalation from Service Account to System
- yusufqk/SystemToken - Steal privileged token to obtain SYSTEM shell
- uknowsec/getSystem - webshell下提权执行命令 Reference:https://github.com/yusufqk/SystemToken
- NLnetLabs/ldns - LDNS is a DNS library that facilitates DNS tool programming
- noptrix/lulzbuster - A very fast and smart web directory and file enumeration tool written in C.
- danigargu/CVE-2020-0796 - CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
- twelvesec/passcat - Passwords Recovery Tool
- chroblert/domainWeakPasswdCheck - 内网安全·域账号弱口令审计
- chroblert/AssetManage -
- paranoidninja/Shuriken - Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.
- newsoft/adduser - Programmatically create an administrative user under Windows
- david378/ssocks - build static ssocks by cmake,cross build ssocks
- V-E-O/rdp2tcp - rdp2tcp: open tcp tunnel through remote desktop connection.
- redcanaryco/atomic-red-team - Small and highly portable detection tests based on MITRE's ATT&CK.
- brainsmoke/ptrace-burrito - a friendly wrapper around ptrace
- Mr-Un1k0d3r/SCShell - Fileless lateral movement tool that relies on ChangeServiceConfigA to run command
- RITRedteam/Headshot - NGINX module to allow for RCE through a specific header
- Genymobile/scrcpy - Display and control your Android device
- bootleg/ret-sync - ret-sync is a set of plugins that helps to synchronize a debugging session (WinDbg/GDB/LLDB/OllyDbg2/x64dbg) with IDA/Ghidra/Binary Ninja disassemblers.
- pymumu/smartdns - A local DNS server to obtain the fastest website IP for the best Internet experience, support DoT, DoH, DoQ. 一个本地DNS服务器,获取最快的网站IP,获得最佳上网体验,支持DoH,DoT, DoQ。
- outflanknl/Dumpert - LSASS memory dumper using direct system calls and API unhooking.
- jonathanmetzman/wasm-fuzzing-demo - Demos of and walkthroughs on in-browser fuzzing using WebAssembly
- turing-technician/FastHook - Android ART Hook
- 0x25bit/darkRat_HVNC - DarkRats Standalone HVNC
- SwiftLaTeX/SwiftLaTeX - SwiftLaTeX, a WYSIWYG Browser-based LaTeX Editor
- mohuihui/antispy - AntiSpy is a free but powerful anti virus and rootkits toolkit.It offers you the ability with the highest privileges that can detect,analyze and restore various kernel modifications and hooks.With its
- OWASP/igoat - OWASP iGoat - A Learning Tool for iOS App Pentesting and Security by Swaroop Yermalkar
- OWASP/iGoat-Swift - OWASP iGoat (Swift) - A Damn Vulnerable Swift Application for iOS
- hmgle/graftcp - A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy.
- blechschmidt/massdns - A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)
- abelcheung/rifiuti2 - Windows Recycle Bin analyser
- vmonaco/kloak - Keystroke-level online anonymization kernel: obfuscates typing behavior at the device level.
- robertdavidgraham/rdpscan - A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability.
- q3k/cve-2019-5736-poc - Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)
- gurnec/HashCheck - HashCheck Shell Extension for Windows with added SHA2, SHA3, and multithreading; originally from code.kliu.org
- skeeto/endlessh - SSH tarpit that slowly sends an endless banner
- Chion82/netfilter-full-cone-nat - A kernel module to turn MASQUERADE into full cone SNAT
- hacksysteam/HackSysExtremeVulnerableDriver - HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
- y11en/BlockRDPBrute - [HIPS]RDP(3389)爆破防护
- klsfct/getshell - 各大平台提权工具
- Halbmond/Introduction-to-Computer-Systems - Course : Introduction to Computer Systems
- swaywm/sway - i3-compatible Wayland compositor
- ambrop72/badvpn - NCD scripting language, tun2socks proxifier, P2P VPN
- firebroo/UnixTools - 一些处理数据的Unix小工具,支持管道操作。
- meyerd/n2n - A development branch of the n2n p2p vpn software
- ValdikSS/p0f-mtu - p0f with patches to save MTU value and export it via API (for VPN detection)
- rosehgal/BinExp - Linux Binary Exploitation
- sfan5/fi6s - IPv6 network scanner designed to be fast
- silight-jp/MacType-Patch - MacType Patch for DirectWrite Hook
- andreiw/RaspberryPiPkg - DEPRECATED - DO NOT USE | Go here instead ->
- aarond10/https_dns_proxy - A lightweight DNS-over-HTTPS proxy.
- telekom-security/tpotce - 🍯 T-Pot - The All In One Multi Honeypot Platform 🐝
- lihaoyun6/axeldown-core - 基于axel-webm的优化项目. 通过webui调用axel进行下载
- suvllian/process-inject - 在Windows环境下的进程注入方法:远程线程注入、创建进程挂起注入、反射注入、APCInject、SetWindowHookEX注入
- sumatrapdfreader/sumatrapdf - SumatraPDF reader
- zogvm/zogvm - zogna video manager
- henkman/virgo - ♍💻💻💻💻 Virtual desktops for Windows
- netdata/netdata - X-Ray Vision for your infrastructure!
- RPISEC/MBE - Course materials for Modern Binary Exploitation by RPISEC
- saaramar/execve_exploit - Hardcore corruption of my execve() vulnerability in WSL
- Nat-Lab/eoip - EoIP/EoIPv6 for *nix.
- tcp-nanqinlang/general - general mode via module loading
- 3proxy/3proxy - 3proxy - tiny free proxy server
- coolstar/electra - Electra iOS 11.0 - 11.1.2 jailbreak toolkit based on async_awake
- dyne/dnscrypt-proxy - DNSCrypt-Proxy repository, frankly maintained for what it does (no new features planned)
- agile6v/awesome-nginx - A curated list of awesome Nginx distributions, 3rd party modules, Active developers, etc.
- Chuyu-Team/MINT - Contains the definitions for the Windows Internal UserMode API from ntdll.dll, samlib.dll and winsta.dll.
- guanchao/AppProtect - 整理一些app常见的加固方法,包括java层、native层和资源文件加固等
- firmianay/CTF-All-In-One - CTF竞赛权威指南
- Wind4/vlmcsd - KMS Emulator in C (currently runs on Linux including Android, FreeBSD, Solaris, Minix, Mac OS, iOS, Windows with or without Cygwin)
- mpv-player/mpv - 🎥 Command line media player
- gsliepen/tinc - a VPN daemon
- hardenedlinux/linux-exploit-development-tutorial - a series tutorial for linux exploit development to newbie.
- NoahhhRyan/krackattacks-test -
- hfiref0x/UACME - Defeating Windows User Account Control
- tinyproxy/tinyproxy - tinyproxy - a light-weight HTTP/HTTPS proxy daemon for POSIX operating systems
- mitchellkrogza/apache-ultimate-bad-bot-blocker - Apache Block Bad Bots, (Referer) Spam Referrer Blocker, Vulnerability Scanners, Malware, Adware, Ransomware, Malicious Sites, Wordpress Theme Detectors and Fail2Ban Jail for Repeat Offenders
- vanhoefm/krackattacks-scripts -
- droberson/icmp-backdoor - Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.
- giltu/KernelPCC - PCC is a new approach for TCP congestion control base on real-time performance analysis. This is a kernel implementation of it.
- madeye/tcp_china - TCP China congestion control algorithm
- gatieme/AderXCoding - 介绍各类语言,库,系统编程以及算法的学习
- session-replay-tools/tcpcopy - An online request replication and TCP stream replay tool, ideal for real testing, performance testing, stability testing, stress testing, load testing, smoke testing, and more.
- sudeshnapal12/Web-Application-Firewall - Designed and Implemented a Web Application Firewall as an Apache module that "sits" in-front of a web server. The WAF is designed to stop malicious requests from known attacks such as SQL Injection, X
- 50m30n3/dsptunnel - IP over audio tunnel
- Ridter/Pentest - tools
- dosgo/ngrok-c - ngrok client for c language,Due to the use of GO ngrok language development, porting to embedded devices some inconvenience, such as openwrt, so use C language rewrite a client. Very mini, the need to
- dlundquist/sniproxy - Proxies incoming HTTP and TLS connections based on the hostname contained in the initial request of the TCP session.
- haiwen/seafile - High performance file syncing and sharing, with also Markdown WYSIWYG editing, Wiki, file label and other knowledge management features.
- WireGuard/wireguard-monolithic-historical - Historical monolithic WireGuard repository, split into wireguard-tools, wireguard-linux, and wireguard-linux-compat.
- git-hulk/tcpkit - the tcpkit was designed to make network packets programable with Lua script
- snooda/net-speeder - net-speeder 在高延迟不稳定链路上优化单线程下载速度
- rip1s/vmware_escape - VMware Escape Exploit before VMware WorkStation 12.5.5
- axel-download-accelerator/axel - Lightweight CLI download accelerator
- skywind3000/kcp - ⚡ KCP - A Fast and Reliable ARQ Protocol
- osqzss/gps-sdr-sim - Software-Defined GPS Signal Simulator
- magkopian/keepassxc-debian - Debian source package for the KeePassXC password manager.
- ScottyBauer/Android_Kernel_CVE_POCs - A list of my CVE's with POCs
- axi0mX/ios-kexec-utils - boot LLB/iBoot/iBSS/iBEC image from a jailbroken iOS kernel
- santoru/filewatcher - A simple auditing utility for macOS
- Cn33liz/HSEVD-ArbitraryOverwrite - HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit
- c0d3z3r0/sudo-CVE-2017-1000367 -
- Chion82/kcptun-raw - Kcptun with raw socket and fake TCP headers.
- klsecservices/Invoke-Vnc - Powershell VNC injector
- DhavalKapil/icmptunnel - Transparently tunnel your IP traffic through ICMP echo and reply packets.
- shudo/shujit - Java Just-in-Time Compiler for x86 processors
- opsxcq/exploit-CVE-2017-7494 - SambaCry exploit and vulnerable container (CVE-2017-7494)
- raminfp/linux-4.8.0-netfilter_icmp - Anatomy of a linux kernel development
- DhavalKapil/heap-exploitation - This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structure.
- ANSSI-FR/AD-control-paths - Active Directory Control Paths auditing and graphing tools
- ValdikSS/GoodbyeDPI - GoodbyeDPI — Deep Packet Inspection circumvention utility (for Windows)
- ufrisk/pcileech - Direct Memory Access (DMA) Attack Software
- Cybellum/DoubleAgent - Zero-Day Code Injection and Persistence Technique
- gentilkiwi/wanakiwi - Automated wanadecrypt with key recovery if lucky
- jtesta/ssh-mitm - SSH man-in-the-middle tool
- SecWiki/linux-kernel-exploits - linux-kernel-exploits Linux平台提权漏洞集合
- adafruit/Adafruit-GPIO-Halt - Press-to-halt program for headless Raspberry Pi. Similar functionality to the rpi_power_switch kernel module from the fbtft project, but easier to compile (no kernel headers needed).
- greensea/mptunnel - MPUDP Tunnel (User space MultiPath UDP)
- Keysight/Rhme-2016 - Rhme2 challenge (2016)
- leechristensen/UnmanagedPowerShell - Executes PowerShell from an unmanaged process
- peperunas/injectopi - A set of tutorials about code injection for Windows.
- hasherezade/demos - Demos of various injection techniques found in malware
- google/honggfuzz - Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)
- mubix/post-exploitation - Post Exploitation Collection
- hxp2k6/smart7ec-scan-console - 基于Linux c开发的插件式扫描器(Python/lua)
- SpacehuhnTech/esp8266_deauther - Affordable WiFi hacking platform for testing and learning
- hlldz/Phant0m - Windows Event Log Killer
- s0lst1c3/eaphammer - Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
- LukaSikic/Unix-Privilege-Escalation-Exploits-Pack - Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.
- kala13x/scap - Network Sniffer (Scan and Capture Incoming Packets)
- nmap/ncrack - Ncrack network authentication tool
- SecWiki/windows-kernel-exploits - windows-kernel-exploits Windows平台提权漏洞集合
- ele7enxxh/Android-Inline-Hook - thumb16 thumb32 arm32 inlineHook in Android
- laginimaineb/cve-2015-6639 - QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)
- deamwork/inetutils - the copy of https://git.savannah.gnu.org/cgit/inetutils.git/ with knali support
- traviscross/mtr - Official repository for mtr, a network diagnostic tool
- kmyk/libproofofwork - Simple hash-mining c library and its python binding.
- boywhp/wifi_crack_windows - wifi crack project for windows
- zcgonvh/NTDSDumpEx - NTDS.dit offline dumper with non-elevated
- derrekr/android_security - Public Android Vulnerability Information (CVE PoCs etc)
- googleprojectzero/winafl - A fork of AFL for fuzzing Windows binaries
- F-Stack/f-stack - F-Stack is an user space network development kit with high performance based on DPDK, FreeBSD TCP/IP stack and coroutine API.
- mrschyte/pentestkoala - Modified dropbear server which acts as a client and allows authless login
- openwall/john - John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
- netblue30/firejail - Linux namespaces and seccomp-bpf sandbox
- Azard/SE315-OperatingSystem - SJTU-SE315 Operating System labs from MIT 6.828, by a SE12er.
- gamelinux/passivedns - A network sniffer that logs all DNS server replies for use in a passive DNS setup
- spacehuhn/wifi_ducky - Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4
- danieljiang0415/android_kernel_crash_poc -
- robertfisk/USG - The USG is Good, not Bad
- ossec/ossec-hids - OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
- iovisor/bcc - BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more
- huntergregal/mimipenguin - A tool to dump the login password from the current linux user
- SamyPesse/How-to-Make-a-Computer-Operating-System - How to Make a Computer Operating System in C++
- nonstriater/Learn-Algorithms - 算法学习笔记
- wg/wrk - Modern HTTP benchmarking tool
- EncodeGroup/RegSave - A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives
- lintstar/SharpHunter - Automated Hosting Information Hunting Tool - Windows 主机信息自动化狩猎工具
- xhnbzdl/feishu-doc-export - 飞书文档导出服务
- h0ny/MobaXtermDecryptor - A simple MobaXterm password extraction tool.
- 1Remote/1Remote - One Remote Access Manager to Rule Them All
- rnchg/Apt - AI Productivity Tool - Free and open source, improve user productivity, protect privacy and data security. Provide efficient and convenient AI solutions, built-in local exclusive ChatGPT, Phi, DeepSee
- decoder-it/KrbRelay-SMBServer -
- murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access - EDR & Antivirus Bypass to Gain Shell Access
- lypd0/DeadPotato - DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the
- MInggongK/Penetration-mining-src - 一款集成了H3C,致远,泛微,万户,帆软,海康威视,金蝶云星空,畅捷通,Struts等多个RCE漏洞利用工具
- INotGreen/SharpScan - 内网资产收集、探测主机存活、端口扫描、域控定位、文件搜索、各种服务爆破(SSH、SMB、MsSQL等)、Socks代理,一键自动化+无文件落地扫描
- qwqdanchun/Pillager - Pillager是一个适用于后渗透期间的信息收集工具
- StarfireLab/SharpWeb - 一个浏览器数据(密码|历史记录|Cookie|书签|下载记录)的导出工具,支持主流浏览器。
- Mangofang/BypassLoad - shellcode免杀加载器,过主流杀软
- DeEpinGh0st/WindowsBaselineAssistant - Windows安全基线核查加固助手
- mabangde/winlogparser - windows 日志检测工具
- Ridter/MSSQL_CLR - MSSQL CLR for pentest.
- la00gke/DomainAuto-one - Domain penetration automation module one, domain information collection.
- 0xb11a1/yetAnotherObfuscator - C# obfuscator that bypass windows defender
- BeichenDream/GodPotato -
- WesleyWong420/RedTeamOps-Havoc-101 - Materials for the workshop "Red Team Ops: Havoc 101"
- darktohka/FlashPatch - FlashPatch! Play Adobe Flash Player games in the browser after January 12th, 2021.
- daem0nc0re/TangledWinExec - PoCs and tools for investigation of Windows process execution techniques
- sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAY - Exploit for the CVE-2023-23397
- Sq00ky/csharp-portscanner - simple C# portscanner - written for playing around with Metasploit's Execute-Assembly
- zcgonvh/DCOMPotato - Some Service DCOM Object and SeImpersonatePrivilege abuse.
- zR00t1/WannaCry - 基于C#编写的WannaCry模拟病毒,通常应用于网络安全应急演练
- lele8/SharpUserIP - 获取服务器或域控登录日志
- mandiant/ADFSDump -
- rasta-mouse/SharpC2 - Command and Control Framework written in C#
- bugch3ck/SharpEfsPotato - Local privilege escalation from SeImpersonatePrivilege using EfsRpc.
- RikunjSindhwad/MSSQL-Attacker - MSSQL Database Attacker tool
- F3eev/SharkExec - 内网渗透|红队工具|C#内存加载|cobaltstrike
- BornToBeRoot/NETworkManager - A powerful tool for managing networks and troubleshoot network problems!
- netwrix/PingCastleCloud - Audit program for AzureAD
- BeichenDream/SharpToken - Windows Token Stealing Expert
- casbin-net/redis-adapter - Redis adapter for Casbin.NET
- pwn1sher/frostbyte - FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads
- CervantesSec/cervantes - Cervantes is an open-source, collaborative platform designed specifically for pentesters and red teams. It serves as a comprehensive management tool, streamlining the organization of projects, clients
- xpn/AppProxyC2 -
- improsec/SharpEventPersist - Persistence by writing/reading shellcode from Event Log
- EricZimmerman/evtx - C# based evtx parser with lots of extras
- Ryze-T/CNVD-2022-10270-LPE - 基于向日葵RCE的本地权限提升,无需指定端口
- Hagrid29/DuplicateDump - Dumping LSASS with a duplicated handle from custom LSA plugin
- fox-it/LDAPFragger -
- nettitude/SharpWSUS -
- SpecterOps/SharpHoundCommon - Common library used by SharpHound.
- nettitude/MalSCCM -
- Viralmaniar/DDWPasteRecon - DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC & Blue Team to gain situational awareness of the organisation's
- Dec0ne/KrbRelayUp - KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
- whitesquirrell/C0deVari4nt - A variant analysis and visualisation tool that scans codebases for similar vulnerabilities
- arsium/EagleMonitorRAT - Remote Access Tool Written In C#
- onSec-fr/Http-Asynchronous-Reverse-Shell - [POC] Asynchronous reverse shell using the HTTP protocol.
- yck1509/ConfuserEx - An open-source, free protector for .NET applications
- daem0nc0re/AtomicSyscall - Tools and PoCs for Windows syscall investigation.
- scotty-kdw/ARM-Analyzer - Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation
- RowTeam/SharpDecryptPwd - SharpDecryptPwd source, To Decrypt Navicat,Xmanager,Filezilla,Foxmail,WinSCP,etc
- Gr1mmie/AtlasC2 - C# C2 Framework centered around Stage 1 operations
- wwh1004/ExtremeDumper - .NET Assembly Dumper
- netero1010/ScheduleRunner - A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation
- Group3r/Group3r - Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.
- JDArmy/SharpXDecrypt - Xshell全版本密码恢复工具
- cube0x0/KrbRelay - Framework for Kerberos relaying
- 0xthirteen/SharpStay - .NET project for installing Persistence
- skahwah/SQLRecon - A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.
- tothi/SharpStay - .NET project for installing Persistence
- dqcostin/SharpGetinfo - 关于工作组和域信息收集的工具
- Flangvik/CobaltBus - Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus
- ly4k/SpoolFool - Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)
- py7hagoras/GetSystem - This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of almost any SYSTEM process.
- mrd0x/EvilSelenium - EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.
- jfmaes/AmsiHooker - Hookers are cooler than patches.
- VbScrub/Rubeus-GUI - GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements
- pengw0048/WechatExport-iOS - Save iOS WeChat history as HTML or TXT with neat layout and picture & audio support.
- snovvcrash/MirrorDump - Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in memory
- mandiant/SharPersist -
- An0nySec/UserAdd - Bypass AV 用户添加
- daem0nc0re/PrivFu - Kernel mode WinDbg extension and PoCs for token privilege investigation.
- pwn1sher/WMEye - WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement
- bohops/RogueAssemblyHunter - Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.
- VollRagm/KernelBypassSharp - C# Kernel Mode Driver to read and write memory in protected processes
- punk-security/smbeagle - SMBeagle - Fileshare auditing tool.
- evi1ox/sharpNetstat -
- Jumbo-WJB/SharpAllowedToAct-Modify - resource-based constrained delegation RBCD
- Ridter/SharpAddDomainMachine - SharpAddDomainMachine
- cube0x0/noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.
- matterpreter/FindETWProviderImage - Quickly search for references to a GUID in DLLs, EXEs, and drivers
- A-D-Team/SharpMemshell - Memshell
- daem0nc0re/SharpWnfSuite - C# Utilities for Windows Notification Facility
- FDlucifer/Proxy-Attackchain - Proxylogon & Proxyshell & Proxyoracle & Proxytoken & All exchange server history vulns summarization :)
- hackthedev/teardrop - Open-Source Ransomware Project for learning purpose only written in C# (csharp). Dont use it for bad things.
- Jhangju/bypass-sandbox-antivirus-detection-using-human-interaction-technique-by-cheking-mouse-movement - This project actually checks for the mouse movement if reach to 100 pixel it will start cmd and open cmd.exe and chrome.exe. Just to give idea that some sandbox does not use mouse movements.
- DamonMohammadbagher/NativePayload_ReverseShell - This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypassed via this method Very Simple)
- Kara-4search/MappingInjection_CSharp - MappingInjection via csharp
- tedyyu/ProcDumpEx - ProcDumpEx = ProcDump in batch mode
- rasta-mouse/ExternalC2.NET - .NET implementation of Cobalt Strike's External C2 Spec
- ldqk/Masuit.Tools - 全龄段友好的C#万能工具库,码数吐司库,包含一些常用的操作类,大都是静态类,加密解密,反射操作,权重随机筛选算法,分布式短id,表达式树,linq扩展,文件压缩,多线程下载,硬件信息,字符串扩展方法,日期时间扩展操作,中国农历,大文件拷贝,图像裁剪,验证码,断点续传,集合扩展、Excel导出等常用封装。诸多功能集一身,代码量不到2MB!
- ryhanson/ExternalC2 - A library for integrating communication channels with the Cobalt Strike External C2 server
- chr0n1k/AH2021Workshop - Malware development for red teaming workshop
- CanIPhish/Phishious - An open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.
- knight0x07/ImpulsiveDLLHijack - C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
- iomoath/PowerShx - Run Powershell without software restrictions.
- leechristensen/SpoolSample - PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as well.
- plackyhacker/Shellcode-Injection-Techniques - A collection of C# shellcode injection techniques. All techniques use an AES encrypted meterpreter payload. I will be building this project up as I learn, discover or develop more techniques. Some tec
- p0dalirius/LDAPmonitor - Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!
- plackyhacker/Suspended-Thread-Injection - Another meterpreter injection technique using C# that attempts to bypass Defender
- 0x727/SchTask_0x727 - 创建隐藏计划任务,权限维持,Bypass AV
- 7hr0wer/ProxyValidator - 用C#开发的简单的多线程代理验证工具。
- tevora-threat/SharpView - C# implementation of harmj0y's PowerView
- pornin/paradox-compress - Paper and Demo Implementation of Paradoxical Compression with VDF
- StarZHF/Foxmail-Password-Recovery -
- zacateras/sddl-parser - Security Descriptor Definition Language (SDDL) Parser
- pentest-tools-public/Pass-to-hash-EWS -
- GhostPack/SharpDPAPI - SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.
- lassehauballe/Eternalblue - Eternalblue written in CSharp. Contains version detection, vulnerability scanner and exploit of MS17-010
- ChoiSG/SharpJfmaesWorkshop - things I learned from @jfmaes's .NET reflection workshop - thank you for the great workshop
- RiccardoAncarani/LiquidSnake - LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript
- waf/CSharpRepl - A command line C# REPL with syntax highlighting – explore the language, libraries and nuget packages interactively.
- eladshamir/Whisker - Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.
- evilashz/SharpADUserIP - 提取DC日志,快速获取域用户对应IP地址
- iomoath/SharpSpray - Active Directory password spraying tool. Auto fetches user list and avoids potential lockouts.
- GhostPack/RestrictedAdmin - Remotely enables Restricted Admin Mode
- X-C3LL/xlsxPoison - Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)
- fozavci/WeaponisingCSharp-Fundamentals - Weaponising C# - Fundamentals Training Content
- bitsadmin/fakelogonscreen - Fake Windows logon screen to steal passwords
- YDHCUI/csload.net - 一个cobaltstrike shellcode加载器,过国内主流杀软
- EncodeGroup/UAC-SilentClean - New UAC bypass for Silent Cleanup for CobaltStrike
- deadjakk/Reg1c1de - Registry permission scanner written in C# for finding potential privesc avenues within registry
- mai1zhi2/SharpBeacon - CobaltStrike Beacon written in .Net 4 用.net重写了stager及Beacon,其中包括正常上线、文件管理、进程管理、令牌管理、结合SysCall进行注入、原生端口转发、关ETW等一系列功能
- mobdk/Upsilon - Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used
- RedSiege/EDD - Enumerate Domain Data
- chvancooten/OSEP-Code-Snippets - A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.
- w1u0u1/smb2os - Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019
- iomoath/SharpStrike - A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.
- gellin/bantam - A PHP backdoor management and generation tool/C2 featuring end to end encrypted payload streaming designed to bypass WAF, IDS, SIEM systems.
- cube0x0/MiniDump - C# Lsass parser
- uknowsec/SharpCryptPermute - Crypt/Decrypt Proxyshell Payload
- PwnDexter/SharpEDRChecker - Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories, installed services and each service binaries metadata, install
- nettitude/SharpSocks - Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell
- med0x2e/SigFlip - SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature.
- CCob/BeaconEye - Hunts out CobaltStrike beacons and logs operator command output
- GhostPack/ForgeCert - "Golden" certificates
- GhostPack/Certify - Active Directory certificate abuse.
- Flangvik/DeployPrinterNightmare - C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!
- GhostPack/SharpWMI - SharpWMI is a C# implementation of various WMI functionality.
- Flangvik/ADCSPwn - A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service.
- bats3c/ADCSPwn - A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service.
- med0x2e/GadgetToJScript - A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA based scripts.
- zcgonvh/EfsPotato - Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).
- tuian/subTee-gits-backups - subTee gists code backups
- Inf0secRabbit/BadAssMacros - BadAssMacros - C# based automated Malicous Macro Generator.
- GhostPack/Rubeus - Trying to tame the three-headed dog.
- RedSiege/CIMplant - C# port of WMImplant which uses either CIM or WMI to query remote systems
- aniqfakhrul/Sharperner - Simple executable generator with encrypted shellcode.
- qwqdanchun/DcRat - A simple remote tool in C#.
- dotnet/roslyn - The Roslyn .NET compiler provides C# and Visual Basic languages with rich code analysis APIs.
- connormcgarr/LittleCorporal - LittleCorporal: A C# Automated Maldoc Generator
- OG-Sadpanda/SharpSword - Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly
- klezVirus/CheeseTools - Self-developed tools for Lateral Movement/Code Execution
- OG-Sadpanda/SharpExcelibur - Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly
- AnErrupTion/LoGiC.NET - A free and open-source .NET obfuscator using dnlib.
- Mr-Un1k0d3r/ADHuntTool - official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)
- MythicAgents/Apollo - A .NET Framework 4.0 Windows Agent
- Yaxser/SharpPhish - Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.
- Kara-4search/DInvoke_shellcodeload_CSharp - ShellCodeLoader via DInvoke
- Flangvik/SharpProxyLogon - C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection
- dahall/Vanara - A set of .NET libraries for Windows implementing PInvoke calls to many native Windows APIs with supporting wrappers.
- LimerBoy/FireFox-Thief - 🦊 Decrypt gecko based browsers passwords, cookies, history, bookmarks.
- gourk/FirePwd.Net - Password reader for Mozilla Firefox and Thunderbird
- BinaryScary/NET-Obfuscate - Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI
- sourceincite/CVE-2021-24085 -
- cube0x0/CVE-2021-1675 - C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527
- DamonMohammadbagher/FSWatch - File System Watcher via C# (Monitoring File Activity , Create/Delete/Change/Rename events + some Activity like Size/Attribute/Security Changes & LastAccess, LastWrite etc...)
- nettitude/RunPE - C# Reflective loader for unmanaged binaries.
- GhostPack/SharpDump - SharpDump is a C# port of PowerSploit's Out-Minidump.ps1 functionality.
- IlanKalendarov/SharpHook - SharpHook is an offensive API hooking tool designed to catch various credentials within the API call.
- improsec/ImproHound - Identify the attack paths in BloodHound breaking your AD tiering
- GetRektBoy724/SharpUnhooker - C# Based Universal API Unhooker
- rasta-mouse/AsyncSockets - Example of async client/server sockets in .NET 5
- d3adzo/shepard - In progress persistent download/upload/execution tool using Windows BITS.
- enkomio/ManagedInjector - A C# DLL injection library
- lithnet/ad-password-protection - Active Directory password filter featuring breached password checking and custom complexity rules
- dionach/NtdsAudit - An Active Directory audit utility
- AaronRobinsonMSFT/COMInterop - Example on how to consume a COM server from a .NET client and a .NET server from a COM client. Examples are for both using the Registry and for RegFree.
- AdamWhiteHat/Judge-Jury-and-Executable - A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power
- S3cur3Th1sSh1t/SyscallAmsiScanBufferBypass - AmsiScanBufferBypass using D/Invoke
- mitchmoser/SharpShares - Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain
- Dliv3/DomainBorrowing - Domain Borrowing PoC
- Cerbersec/DomainBorrowingC2 -
- marius-rothenbuecher/PentestBro - Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one tool. Uses subdomain list of SecLists. Uses nmap service probes f
- jfmaes/SharpNukeEventLog - nuke that event log using some epic dinvoke fu
- RowTeam/SharpNTLMSSPExtract - 利用 NTLMSSP 探测 Windows 信息
- xpnas/inotify - 一个简易消息通知系统,支持企业微信、电报机器人、邮件推送、内置BARK推送、钉钉群机器人、飞书群机器人,类似Server酱,支持私有Docker部署
- cyberark/Evasor - A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
- S3cur3Th1sSh1t/SharpNamedPipePTH - Pass the Hash to a named pipe for token Impersonation
- Ben0xA/DoUCMe -
- juliourena/SharpNoPSExec - Get file less command execution for lateral movement.
- TheWover/CertStealer - A .NET tool for exporting and importing certificates without touching disk.
- Hzllaga/JsLoader - js免杀shellcode,绕过杀毒添加自启
- mgeeky/SharpWebServer - Red Team oriented C# Simple HTTP & WebDAV Server with Net-NTLM hashes capture functionality
- uknowsec/SharpOSS - Quickly upload files to aliyun OSS by aliyun-oss-csharp-sdk
- checkymander/Sharp-SMBExec - SMBExec C# module
- DebugST/STPortScanner - [端口扫描器] 采用.NET开发的端口扫描器 支持端口协议探测 内置多种类型扫描器 TCP/UDP/SYN/SMB/ICMP 等 采用IOCP模型开发 性能表现不错 可视为轻量级NMAP
- dahall/TaskScheduler - Provides a .NET wrapper for the Windows Task Scheduler. It aggregates the multiple versions, provides an editor and allows for localization.
- FSecureLABS/SharpGPOAbuse - SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by th
- S3cur3Th1sSh1t/Sharp-HackBrowserData - C# binary with embeded golang hack-browser-data
- w1u0u1/exec - Use current thread token to execute command
- Hzllaga/RDODecrypt - Remote Desktop Organizer 密码破解
- ChoiSG/UuidShellcodeExec - PoC for UUID shellcode execution using DInvoke
- airzero24/WMIReg - PoC to interact with local/remote registry hives through WMI
- proxysu/ProxySU - Xray,V2ray,Trojan,NaiveProxy, Trojan-Go, ShadowsocksR(SSR),Shadowsocks-libev及相关插件,MTProto+TLS 一键安装工具,windows下用(一键科学上网)
- WithSecureLabs/physmem2profit - Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely
- odedshimon/BruteShark - Network Analysis Tool
- calebstewart/bypass-clm - PowerShell Constrained Language Mode Bypass
- hausec/MaliciousClickOnceMSBuild - Basic C# Project that will take an MSBuild payload and run it with MSBuild via ClickOnce.
- Aetsu/OffensivePipeline - OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team exercises.
- mdsecactivebreach/Farmer -
- KINGSABRI/DotNetToJScriptMini - A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.
- Kevin-Robertson/Sharpmad - C# version of Powermad
- swisskyrepo/SharpLAPS - Retrieve LAPS password from LDAP
- Flangvik/AzureC2Relay - AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Cobalt Strike Malleable C2 profile.
- FuzzySecurity/Dendrobate - Managed code hooking template.
- soufianetahiri/HttpRquestPlayer - This small utility could help you to find authorization bugs.
- rvrsh3ll/SharpSMBSpray - Spray a hash via smb to check for local administrator access
- BeichenDream/WhetherMysqlSham - 检测目标Mysql数据库是不是蜜罐
- An0nySec/ShadowUser - 影子用户 克隆
- bats3c/EvtMute - Apply a filter to the events being reported by windows event logging
- JoniRinta-Kahila/WPCracker - WordPress pentest tool
- zcgonvh/CVE-2020-0688 - Exploit and detect tools for CVE-2020-0688
- JamesCooteUK/SharpSphere - .NET Project for Attacking vCenter
- py7hagoras/CovenantTasks - Source for tasks I have used with Covenant
- RCStep/CSSG - Cobalt Strike Shellcode Generator
- srini0x00/dvta - Damn Vulnerable Thick Client App developed in C# .NET
- uknowsec/SharpSQLTools - SharpSQLTools 和@Rcoil一起写的小工具,可上传下载文件,xp_cmdshell与sp_oacreate执行命令回显和clr加载程序集执行相应操作。
- Viralmaniar/BigBountyRecon - BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
- b4rtik/SharpKatz - Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands
- jnqpblc/SharpTask - SharpTask is a simple code set to interact with the Task Scheduler service api and is compatible with Cobalt Strike.
- ReverendThing/Carnivore - Microsoft External Attack Tool
- FatRodzianko/Get-RBCD-Threaded - Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments
- FatRodzianko/SharpBypassUAC - C# tool for UAC bypasses
- GoSecure/WSuspicious - WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations
- bitsadmin/nopowershell - PowerShell rebuilt in C# for Red Teaming purposes
- 05sec/Asteroid - 💫 CTF AWD 实时 3D 攻击大屏
- rasta-mouse/EWSToolkit - Abusing Exchange via EWS
- mubix/solarflare - SolarWinds Orion Account Audit / Password Dumping Utility
- zcgonvh/CVE-2020-17144 - weaponized tool for CVE-2020-17144
- Airboi/CVE-2020-17144-EXP - Exchange2010 authorized RCE
- securesean/DecryptAutoLogon - Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon
- cube0x0/SharpMapExec -
- jas502n/SSCMS_Decrypt - sscms database decrypt
- outflanknl/EvilClippy - A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
- RcoIl/CSharp-Tools - .NET C# Tools
- Ch1ngg/SharpGetTitle - SharpGetTitle - 基于 C# 的多线程 Web Title 扫描器
- antonioCoco/RunasCs - RunasCs - Csharp and open version of windows builtin runas.exe
- rocksdanister/lively - Free and open-source software that allows users to set animated desktop wallpapers and screensavers powered by WinUI 3.
- huiyadanli/RevokeMsgPatcher -
A hex editor for WeChat/QQ/TIM - PC版微信/QQ/TIM防撤回补丁(我已经看到了,撤回也没用了)
- cobbr/SharpSploit - SharpSploit is a .NET post-exploitation library written in C#
- med0x2e/NoAmci - Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().
- NVISOsecurity/DInvisibleRegistry - DInvisibleRegistry
- matterpreter/DefenderCheck - Identifies the bytes that Microsoft Defender flags on.
- 3F/DllExport - .NET DllExport with .NET Core support (aka 3F/DllExport aka DllExport.bat)
- TheWover/DInvoke - Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.
- mandiant/OfficePurge -
- hayasec/360SafeBrowsergetpass - 这是一个一键辅助抓取360安全浏览器密码的CobaltStrike脚本以及解密小工具,用于节省红队工作量,通过下载浏览器数据库、记录密钥来离线解密浏览器密码。
- smartlockpicking/BLE_HackMe - Bluetooth Low Energy hardware-less HackMe
- awaescher/Fusion - 🧰 A modern alternative to the Microsoft Assembly Binding Log Viewer (FUSLOGVW.exe)
- rasta-mouse/ThreatCheck - Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.
- xforcered/StandIn - StandIn is a small .NET35/45 AD post-exploitation toolkit
- EncodeGroup/AggressiveProxy - Project to enumerate proxy configurations and generate shellcode from CobaltStrike
- xiaoxiaoleo/Scan-and-Clean-Macro-Virus - Scan and clean specific Macro Virus, #C Sharp
- Mr-Un1k0d3r/RedTeamCSharpScripts - C# Script used for Red Team
- TGSAN/CMWTAT_Digital_Edition - CloudMoe Windows 10/11 Activation Toolkit get digital license, the best open source Win 10/11 activator in GitHub. GitHub 上最棒的开源 Win10/Win11 数字权利(数字许可证)激活工具!
- wesleydekraker/xamarin-security-scanner - A tool to find security vulnerabilities in Xamarin.Android apps.
- dev-2null/KerberosRun - A little tool to play with Kerberos.
- ustayready/SharpHose - Asynchronous Password Spraying Tool in C# for Windows Environments
- tyranid/DotNetToJScript - A tool to create a JScript file which loads a .NET v2 assembly from memory.
- EncodeGroup/AggressiveGadgetToJScript - A Cobalt Strike Aggressor script to generate GadgetToJScript payloads
- EncodeGroup/Gopher - C# tool to discover low hanging fruits
- b4rtik/SharpAdidnsdump - c# implementation of Active Directory Integrated DNS dumping (authenticated user)
- mez-0/DecryptRDCManager - .NET 4.0 Remote Desktop Manager Password Gatherer
- uknowsec/SharpSQLDump - 内网渗透中快速获取数据库所有库名,表名,列名。具体判断后再去翻数据,节省时间。适用于mysql,mssql。
- Apr4h/CobaltStrikeScan - Scan files or process memory for CobaltStrike beacons and parse their configuration
- r3nhat/SharpWifiGrabber - Sharp Wifi Password Grabber retrieves in clear-text the Wi-Fi Passwords from all WLAN Profiles saved on a workstation.
- CCob/Rubeus - Trying to tame the three-headed dog.
- rasta-mouse/Fork-n-Run -
- microsoft/onefuzz - A self-hosted Fuzzing-As-A-Service platform
- checkymander/Zolom - C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed
- r3nhat/GRAT2 - We developed GRAT2 Command & Control (C2) project for learning purpose.
- Kudaes/LOLBITS - ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + Dinvoke for EDR user-mode hooking evasion.
- vivami/SauronEye - Search tool to find specific files containing specific words, i.e. files containing passwords..
- mez-0/MoveScheduler - .NET 4.0 Scheduled Job Lateral Movement
- passthehashbrowns/SharpBuster - SharpBuster is a C# implementation of a directory brute forcing tool. It's designed to be used via Cobalt Strike's execute-assembly and similar tools, when running a similar tool over a SOCKS proxy is
- G0ldenGunSec/SharpSecDump - .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py
- chromelyapps/Chromely - Build Cross Platform HTML Desktop Apps on .NET using native GUI, HTML5, JavaScript, CSS, Owin, AspNetCore (MVC, RazorPages, Blazor)
- slyd0g/LNKMod - C# project to create or modify existing LNKs
- lontivero/Open.NAT - Lightweight and easy-to-use class library to allow port forwarding in NAT devices with UPNP and/or PMP
- sf197/GetPwd - 用CSharp写的一款信息搜集工具,目前支持Navicat、TeamView、Xshell、SecureCRT产品的密码解密
- BeichenDream/MysqlT - 伪造Myslq服务端,并利用Mysql逻辑漏洞来获取客户端的任意文件反击攻击者
- rasta-mouse/MiscTools - Miscellaneous Tools
- mez-0/CSharpWinRM - .NET 4.0 WinRM API Command Execution
- RiccardoAncarani/DirSync-Poc - A PoC that uses the DirSync protocol to poll Active Directory for changes
- BloodHoundAD/SharpHound3 - C# Data Collector for the BloodHound Project, Version 3
- BloodHoundAD/SharpHound2 - The Old BloodHound C# Ingestor (Deprecated)
- WayneJLee/CsharpAmsiBypass - C# loader for msfvenom shellcode with AMSI bypass
- aduskin/AduSkin - A Beautiful WPF Control UI
- TalAloni/SMBLibrary - Free, Open Source, User-Mode SMB 1.0/CIFS, SMB 2.0, SMB 2.1 and SMB 3.0 server and client library
- rnwood/smtp4dev - smtp4dev - the fake smtp email server for development and testing
- 3xpl01tc0d3r/ProcessInjection - This program is designed to demonstrate various process injection techniques
- Flangvik/SharpAppLocker - C# port of the Get-AppLockerPolicy PS cmdlet
- netwrix/pingcastle - PingCastle - Get Active Directory Security at 80% in 20% of the time
- RythmStick/ProxyPunch - Finding SSL Blindspots for Red Teams
- Mr-B0b/SpaceRunner - This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes through the use of runspace.
- jfmaes/GG-AESY - Hide cool stuff in images :)
- MrFooL137/WebSocketRemoteControl - Remote Control With WebSocket
- checkymander/Carbuncle - Tool for interacting with outlook interop during red team engagements
- fullmetalcache/PowerLine -
- djhohnstein/SharpSearch - Search files for extensions as well as text within.
- crawl3r/FunWithAMSI - A repo to hold any bypasses I work on/study/whatever
- Flangvik/SharpDllProxy - Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading
- jfmaes/TrustJack - Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows
- Fody/Costura - Embed references as resources
- EquiFox/KsDumper - Dumping processes using the power of kernel space !
- tomcarver16/ADSearch - A tool to help query AD via the LDAP protocol
- bohops/SharpRDPHijack - A proof-of-concept Remote Desktop (RDP) session hijack utility
- mvelazc0/PurpleSharp - PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monitored Windows environments
- git-ecosystem/git-credential-manager - Secure, cross-platform Git credential storage with authentication to GitHub, Azure Repos, and other popular Git hosting services.
- SnaffCon/Snaffler - a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )
- 360-Linton-Lab/Telemetry - WINDOWS TELEMETRY权限维持
- GhostPack/Seatbelt - Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
- mdsecactivebreach/sitrep -
- jfmaes/Clippi-B -
- thiagomayllart/Covenant_Alternate - Covenant is a collaborative .NET C2 framework for red teamers.
- Hzllaga/ShellcodeLoader - 将shellcode用rsa加密并动态编译exe,自带几种反沙箱技术。
- SpiderLabs/SharpCompile - SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approach than manually compiling an .NET assembly and loading it into
- dotnet/ILMerge - ILMerge is a static linker for .NET Assemblies.
- RedLectroid/SearchOutlook - A C# tool to search through a running instance of Outlook for keywords
- Flangvik/BetterSafetyKatz - Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime patches signatures and uses SharpSploit DInvoke to PE-Load into me
- QAX-A-Team/sharpwmi - sharpwmi是一个基于rpc的横向移动工具,具有上传文件和执行命令功能。
- am0nsec/SharpHellsGate - C# Implementation of the Hell's Gate VX Technique
- RythmStick/AMSITrigger - The Hunt for Malicious Strings
- QAX-A-Team/BrowserGhost - 这是一个抓取浏览器密码的工具,后续会添加更多功能
- WingsOfDoom/ICU - quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a37194971a5e944f22c94df7c/CredentialUI.cs
- dev-2null/ADCollector - A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.
- peass-ng/PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
- jamf/CVE-2020-1206-POC - CVE-2020-1206 Uninitialized Kernel Memory Read POC
- FuzzySecurity/Sharp-Suite - Also known by Microsoft as Knifecoat 🌶️
- jeromesegura/EKFiddle - Your Swiss Army knife to analyze malicious web traffic based on the popular Fiddler web debugger.
- 1y0n/AV_Evasion_Tool - 掩日 - 免杀执行器生成工具
- reconness/reconness - ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on schedule or events.
- TheKingOfDuck/MatryoshkaDollTool - MatryoshkaDollTool-程序加壳/捆绑工具
- goichot/CVE-2020-3153 - Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal
- Tycx2ry/SweetPotato_CS - 修改的SweetPotato,使之可以用于CobaltStrike v4.0
- 3gstudent/SharpRDPCheck - Use to check the valid account of the Remote Desktop Protocol(Support plaintext and ntlmhash)
- Soledge/BlockEtw - .Net Assembly to block ETW telemetry in current process
- Viralmaniar/HiveJack - This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to dump SYSTEM, SECURITY and SAM hives and once copied to the atta
- CCob/SweetPotato - Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019
- djhohnstein/SharpShares - Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.
- BeichenDream/BadPotato - Windows 权限提升 BadPotato
- infosecn1nja/SharpDoor - SharpDoor is alternative RDPWrap written in C# to allowed multiple RDP (Remote Desktop) sessions by patching termsrv.dll file.
- pwntester/ysoserial.net - Deserialization payload generator for a variety of .NET formatters
- uknowsec/SweetPotato - Modifying SweetPotato to support load shellcode and webshell
- uknowsec/SharpNetCheck -
- cobbr/Covenant - Covenant is a collaborative .NET C2 framework for red teamers.
- cobbr/Elite - Elite is the client-side component of the Covenant project. Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraf
- cyberark/zBang - zBang is a risk assessment tool that detects potential privileged account threats
- MichaelGrafnetter/DSInternals - Directory Services Internals (DSInternals) PowerShell Module and Framework
- rveldhoven/chocoProxy -
- mandiant/SilkETW -
- gerardog/gsudo - Sudo for Windows
- rasta-mouse/Watson - Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities
- k8gege/Ladon - Ladon大型内网渗透扫描器,PowerShell、Cobalt Strike插件、内存加载、无文件扫描。含端口扫描、服务识别、网络资产探测、密码审计、高危漏洞检测、漏洞利用、密码读取以及一键GetShell,支持批量A段/B段/C段以及跨网段扫描,支持URL、主机、域名列表扫描等。网络资产探测32种协议(ICMP\NBT\DNS\MAC\SMB\WMI\SSH\HTTP\HTTPS\Exchan
- gabrielxvx/zh-fiddler - Fiddler Web Debugger 中文版
- harleyQu1nn/AggressorScripts - Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources
- restran/shellcat - ⚡️ ShellCat is a Reverse Shell Manager
- uknowsec/SharpCheckInfo - 收集目标主机信息,包括最近打开文件,系统环境变量和回收站文件等等
- Cn33liz/p0wnedShell - PowerShell Runspace Post Exploitation Toolkit
- netchx/netch - A simple proxy client
- kenvix/USBCopyer - 😉 用于在插上U盘后自动按需复制该U盘的文件。”备份&偷U盘文件的神器”(写作USBCopyer,读作USBCopier)
- P1CKLES/SharpBox - SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.
- Wohlstand/Destroy-Windows-10-Spying - !!!UNMAINTAINED!!! Destroy Windows Spying tool
- djhohnstein/EventLogParser - Parse PowerShell and Security event logs for sensitive information.
- samk1/IISPowershellModule - IIS Handler for *.ps1 files
- AnyListen/YaVipCore - Net Core Music Interface
- duplicati/duplicati - Store securely encrypted backups in the cloud!
- Kevin-Robertson/Inveigh - .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers
- GangZhuo/kcptun-gui-windows - GUI for kcptun (https://github.com/xtaci/kcptun). (Need .NET framework 4.5)
- mo-xiaoxi/CTFtools - 本项目主要搜集一些关于信息安全攻防相关的知识与工具,便于个人的渗透工作。
- zgcwkjOpenProject/TestBaiduPassword - 百度网盘分享文件密码测试器
- greenshot/greenshot - Greenshot for Windows - Report bugs & features go here: https://greenshot.atlassian.net or look for information on:
- TheM4hd1/JCS - Joomla Vulnerability Component Scanner
- xupefei/Locale-Emulator - Yet Another System Region and Language Simulator
- YalcinYolalan/WSSAT - WEB SERVICE SECURITY ASSESSMENT TOOL
- ShareX/ShareX - ShareX is a free and open source program that lets you capture or record any area of your screen and share it with a single press of a key. It also allows uploading images, text or other types of file
- bitbeans/SimpleDnsCrypt - A simple management tool for dnscrypt-proxy
- TheM4hd1/PenCrawLer - An Advanced Web Crawler and DirBuster
- yingDev/WGestures - Modern mouse gestures for Windows. (C#)
- digimezzo/knowte-windows - Note taking
- MediaPortal/MediaPortal-2 - Development of MediaPortal 2
- Rushyo/VindicateTool - LLMNR/NBNS/mDNS Spoofing Detection Toolkit
- RadioWar/NFCGUI - NFCGUI 一个万恶的无聊的Windows图形界面! GUI for libnfc
- microsoft/DbgShell - A PowerShell front-end for the Windows debugger engine.
- VahidN/GitHubFolderDownloader - It lets you to download a single folder of a repository without cloning or downloading the whole repository.
- hexadezi/adbGUI - Wrapper for Android Debug Bridge (ADB) written in C#
- mili-tan/mV2RayConfig -
- nccgroup/UPnP-Pentest-Toolkit - UPnP Pentest Toolkit for Windows
- KeeTrayTOTP/KeeTrayTOTP - Tray TOTP Plugin for KeePass2.
- JanisEst/KeePassQRCodeView - KeePass 2.x plugin which shows QR Codes for entry fields.
- securifybv/ShellLink - A .NET Class Library for processing ShellLink (LNK) files
- canton7/SyncTrayzor - Windows tray utility / filesystem watcher / launcher for Syncthing
- TkYu/ChromeUpdater - :)
- oneo-me/Arthas-WPFUI - WPF 控件库,支持 .Net 7.0 Windows Desktop
- chenjia404/ChromeAutoUpdate - 一个自动更新chrome的小工具
- thoemmi/7Zip4Powershell - Powershell module for creating and extracting 7-Zip archives
- p3nt4/PowerShdll - Run PowerShell with rundll32. Bypass software restrictions.
- tomrus88/CASCExplorer - CASCExplorer
- marx-yu/WopiHost - Office Online Server Wopi Host implement, No need Cobalt. Support DOCX, XLSX, PPTX online editing.
- zcgonvh/cve-2017-7269-tool - CVE-2017-7269 to webshell or shellcode loader
- t3ntman/Social-Engineering-Payloads - Collection of social engineering payloads
- Choudai/R10 - Lightweight Ransomware @Choudai
- thangchung/awesome-dotnet-core - 🐝 A collection of awesome .NET core libraries, tools, frameworks and software
- nsacyber/Windows-Event-Log-Messages - Retrieves the definitions of Windows Event Log messages embedded in Windows binaries and provides them in discoverable formats. #nsacyber
- DEVSENSE/Phalanger - PHP 5.4 compiler for .NET/Mono frameworks. Predecessor to the opensource PeachPie project (www.peachpie.io).
- isukces/cs2php - C# to PHP compiler
- zcgonvh/SSMSPwd - SQL Server Management Studio(SSMS) saved password dumper
- dxflatline/flatpipes - A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.
- Kyrodan/KeeAnywhere - A cloud storage provider plugin for KeePass Password Safe
- googleprojectzero/sandbox-attacksurface-analysis-tools - Set of tools to analyze Windows sandboxes for exposed attack surface.
- shack2/SuperSQLInjectionV1 - 超级SQL注入工具(SSQLInjection)是一款基于HTTP协议自组包的SQL注入工具,采用C#开发,直接操作TCP会话来进行HTTP交互,支持出现在HTTP协议任意位置的SQL注入,支持各种类型的SQL注入,支持HTTPS模式注入;支持以盲注、错误显示、Union注入等方式来获取数据;支持Access/MySQL/SQLServer/Oracle/PostgreSQL/DB2/SQLite
- sacwtv/Altman - the cross platform webshell tool in .NET
- keepwn/Altman - the cross platform webshell tool in .NET
- LazoVelko/Windows-Hacks - Creative and unusual things that can be done with the Windows API.
- gaochundong/Cowboy - Cowboy.Sockets is a C# library for building sockets based services.
- magicdict/MongoCola - A MongoDB Administration Tool
- ctkqiang/LQZ - 灵取证是一款功能强大且专业的安卓设备数据取证工具,专门为执法部门、司法机构和安全调查人员设计开发。本工具采用先进的取证技术,确保数据提取过程的完整性和准确性。本工具的开发和使用严格遵循相关法律法规框架,确保所有数据提取操作都在合法授权范围内进行。通过专业的数据处理流程,为执法调查工作提供可靠的电子证据支持。
- bytedance/flux - A fast communication-overlapping library for tensor/expert parallelism on GPUs.
- DarkSpaceSecurity/RunAs-Stealer - RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
- GhostWolfLab/APT-Individual-Combat-Guide - 《APT Individual Combat Guide》
- 78/xiaozhi-esp32 - Build your own AI friend
- pqrs-org/Karabiner-Elements - Karabiner-Elements is a powerful tool for customizing keyboards on macOS
- ggml-org/llama.cpp - LLM inference in C/C++
- roger1337/JDBG - Java Dynamic Reverse Engineering and Debugging Tool
- unum-cloud/usearch - Fast Open-Source Search & Clustering engine × for Vectors & 🔜 Strings × in C++, C, Python, JavaScript, Rust, Java, Objective-C, Swift, C#, GoLang, and Wolfram 🔍
- deepseek-ai/3FS - A high-performance distributed file system designed to address the challenges of AI training and inference workloads.
- ggerganov/ggwave - Tiny data-over-sound library
- deepseek-ai/FlashMLA - FlashMLA: Efficient MLA decoding kernels
- Zackriya-Solutions/meeting-minutes - A free and open source, self hosted Ai based live meeting note taker and minutes summary generator that can completely run in your Local device (Mac OS and windows OS Support added. Working on adding
- fsquirt/damnCoffee - 一款简单的后渗透免杀加载器,Bypass AV/EDR
- CBLabresearch/PhantomExecution - Self Cleanup in post-ex job
- xlccc/cyber_security_assessment - 网络安全测试平台专为系统脆弱性和安全性检测设计,支持 Ubuntu 20.04 操作系统。功能包括资产清点、安全基线检测、安全风险评估和安全等级保护测评,并输出详细的检测报告。
- daijro/camoufox - 🦊 Anti-detect browser
- deskflow/deskflow - Deskflow lets you share one mouse and keyboard between multiple computers on Windows, macOS and Linux. It's like a software KVM (but without video). Sponsored by Synergy.
- yinsel/BypassAV - 一款基于PE Patch技术的后渗透免杀工具,支持32位和64位
- T4y1oR/RingQ - 一款后渗透免杀工具,助力每一位像我这样的脚本小子快速实现免杀,支持bypass AV/EDR 360 火绒 Windows Defender Shellcode Loader
- efchatz/pandora - A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.
- gfdgd-xi/windows-virtual-machine-installer-for-wine-runner - Windows虚拟机安装工具
- Dec0ne/DllNotificationInjection - A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and remote processes.
- ZeroMemoryEx/Chaos-Rootkit - Now You See Me, Now You Don't
- 0x727/UserRegEnum_0x727 - 域内普通域用户权限查找域内所有计算机上登录的用户
- 0xHossam/Killer - Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.
- nomic-ai/gpt4all - GPT4All: Run Local LLMs on Any Device. Open-source and available for commercial use.
- fgfxf/HttpStageDownloader - cobaltstrike的http分阶段下载器 cpp版本;cobaltstrike stage downloader;
- TaoistBrickscarrier/WFPKit - 粗暴地枚举管理内核的WFP对象。 Manage kernel WFPs in a brutal way.
- matthieu-hackwitharts/Win32_Offensive_Cheatsheet - Win32 and Kernel abusing techniques for pentesters
- ZeroMemoryEx/Amsi-Killer - Lifetime AMSI bypass
- stealth/fraud-bridge - ICMP and DNS tunneling via IPv4 and IPv6
- Ascotbe/virus - 病毒&免杀脚本&乱七八糟的脚本
- deamwork/WinMTR - WinMTR Redux, extended fork of Appnor's WinMTR with IPv6 support and other enhancements
- capt-meelo/laZzzy - laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.
- seventeenman/CallBackDump - dump lsass进程工具
- 0xJs/RedTeaming_CheatSheet - Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.
- ADOOO/Joker - 一款基于Http.sys的利用工具
- zha0gongz1/iscsicpl_bypassUAC - UAC bypass for x64 Windows 7 - 11(无弹窗版)
- antonioCoco/JuicyPotatoNG - Another Windows Local Privilege Escalation from Service Account to System
- Tatsu-syo/noMeiryoUI - No!! MeiryoUI is Windows system font setting tool on Windows 8.1/10/11.
- ReversingID/Shellcode-Loader - Open repository for learning dynamic shellcode loading (sample in many programming languages)
- wanttobeno/AntiDebuggers - 30种方法检测程序是否被调试
- hasherezade/process_overwriting - Yet another variant of Process Hollowing
- yanghaoi/LaunchSystemCmd - 在权限足够的情况下弹出system权限的cmd命令行,包含exe和dll两种文件类型,可用于一些可能存在本地提权漏洞的测试。
- lab52io/LeakedHandlesFinder - Leaked Windows processes handles identification tool
- TUGOhost/anti_Android - Is a protect Android App anti any attacks and environments.
- webraybtl/CVE-2022-25943 - CVE-2022-25943
- trailofbits/maat - Open-source symbolic execution framework: https://maat.re
- VirtualAlllocEx/Create-Thread-Shellcode-Fetcher - This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)
- qiang/Riru-ModuleFridaGadget - 一个magisk 的模块,简化版,依赖 riru,能够简单的hook,并且加载动态库,目前用来加载 frida 的gadget 库,从而使hook脱离命令行和server,并且能够在多进程中加载
- FULLSHADE/Auto-Elevate - Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token Impersonation
- midisec/BypassAnti-Virus - 免杀姿势学习、记录、复现。
- 44670/p7zip-wasm -
- LuxNoBulIshit/Smug_Fu3k -
- thiagoralves/OpenPLC_v3 - OpenPLC Runtime version 3
- zeek/zeek - Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.
- HACK-THE-WORLD/IDAPluginList - IDA插件集合,含项目名称及项目地址,每日定时Clone项目。
- blackbox114/Captive_Portal_Gofishing - level:Copper 连接上就会强制弹出钓鱼页面的热点
- Fortiphyd/GRFICSv2 - Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)
- djformby/GRFICS - Graphical Realism Framework for Industrial Control Simulations
- riverar/mach2 - Windows Feature Control Multi-tool
- RedSection/printjacker - Hijack Printconfig.dll to execute shellcode
- thesecretclub/ArbitraryDirectoryDeletion - From directory deletion to SYSTEM shell
- KaLendsi/CVE-2022-21882 - win32k LPE
- notdodo/adduser-dll - Simple DLL that add a user to the local Administrators group
- cmu-sei/pharos - Automated static analysis tools for binary programs
- ytk2128/dll-merger - A simple tool for merging DLLs into executables with PEB-invisible mapping.
- pwn1sher/KillDefender - A small POC to make defender useless by removing its token privileges and lowering the token integrity
- lcatro/Source-and-Fuzzing - 一些阅读源码和Fuzzing 的经验,涵盖黑盒与白盒测试..
- APTortellini/DefenderSwitch - Stop Windows Defender using the Win32 API
- hlldz/RefleXXion - RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, it first collects the syscall numbers of the NtOpenFile, NtCrea
- StarCrossPortal/bug-hunting-101 -
- crisprss/BypassUserAdd - 通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化
- Rvn0xsy/PDacl - Play Doh Windows ACL Tools
- theSecHunter/Hades-Windows - Hades HIDS/HIPS for Windows
- Ghost2097221/selfMimikatz - 自不量力的mimikatz分离计划
- abcz316/SKRoot-linuxKernelRoot - 新一代SKRoot,挑战全网root检测手段,跟面具完全不同思路,摆脱面具被检测的弱点,完美隐藏root功能,全程不需要暂停SELinux,实现真正的SELinux 0%触碰,通用性强,通杀所有内核,不需要内核源码,直接patch内核,兼容安卓APP直接JNI调用,稳定、流畅、不闪退。
- NtRaiseHardError/Antimalware-Research - Research on Anti-malware and other related security solutions
- S3cur3Th1sSh1t/MultiPotato -
- hugsy/CFB - Canadian Furious Beaver is a ProcMon-style tool designed only for capturing IRPs sent to any Windows driver.
- echo-devim/fhex - A Full-Featured HexEditor compatible with Linux/Windows/MacOS
- r-richter/hyenae-ng - Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pattern based address randomization and flood detection breaking
- kindtime/nosferatu - Windows NTLM Authentication Backdoor
- lab52io/StopDefender - Stop Windows Defender programmatically
- lab52io/StealAllTokens - This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate and use whatever token present at any process
- CCob/lsarelayx - NTLM relaying for Windows made easy
- BlueMatthew/WechatExporter - Wechat Chat History Exporter 微信聊天记录导出备份程序
- wecooperate/iMonitorSDK - The world's most powerful System Activity Monitor Engine · 一款功能强大的终端行为采集防御开发套件 ~ 旨在帮助EDR、零信任、数据安全、审计管控等终端安全软件可以快速实现产品功能, 而不用关心底层驱动的开发、维护和兼容性问题,让其可以专注于业务开发
- qtfreet00/AntiFrida - 通过内存特征检测frida
- mgeeky/ThreadStackSpoofer - Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
- ideaslocas/aDLL -
- TonyChen56/160-Crackme - 对160个Crackme的详细分析记录
- ly4k/CallbackHell - Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)
- networkit/networkit - NetworKit is a growing open-source toolkit for large-scale network analysis.
- thewhiteninja/ntfstool - Forensics tool for NTFS (parser, mft, bitlocker, deleted files)
- magnusstubman/MagnusKatz - Research project for understanding how Mimikatz work and become better at C
- EspressoCake/Firewall_Walker_BOF - A BOF to interact with COM objects associated with the Windows software firewall.
- mgeeky/ShellcodeFluctuation - An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
- aristocratos/btop - A monitor of resources
- waleedassar/SyscallNumberFinder -
- hotnops/RemoteDebugView - A DLL that serves OutputDebugString content over a TCP connection
- APTortellini/unDefender - Killing your preferred antimalware by abusing native symbolic links and NT paths.
- mez-0/winrmdll - C++ WinRM API via Reflective DLL
- airbus-cert/Yagi - Yet Another Ghidra Integration for IDA
- NoOne-hub/bypass-BeaconEye - bypass BeaconEye
- 0x727/CloneX_0x727 - 进行克隆用户、添加用户等账户防护安全检测的轻巧工具
- evilashz/RemoteMemorymodule - Load the evilDLL from socket connection without touch disk
- manyfacedllama/amsi-tracer - Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) passed into AMSI during dynamic execution.
- kavika13/RemCom - Remote Command Executor: A OSS replacement for PsExec and RunAs - or Telnet without having to install a server. Take your pick :)
- x64dbg/ScyllaHide - Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide
- ivan-sincek/keylogger - Windows OS keylogger with a hook mechanism (i.e. with a keyboard hook procedure).
- EvanMcBroom/microsocks11 - A cross-platform SOCKS5 library and server based on the microsocks project.
- rr-debugger/rr - Record and Replay Framework
- zer0fl4g/DebugDetector -
- ZLMediaKit/ZLMediaKit - WebRTC/RTSP/RTMP/HTTP/HLS/HTTP-FLV/WebSocket-FLV/HTTP-TS/HTTP-fMP4/WebSocket-TS/WebSocket-fMP4/GB28181/SRT server and client framework based on C++11
- 0x727/ShuiYing_0x727 - 检测域环境内,域机器的本地管理组成员是否存在弱口令和通用口令,对域用户的权限分配以及域内委派查询
- jacob-baines/concealed_position - Bring your own print driver privilege escalation tool
- aaaddress1/Windows-APT-Warfare - 著作《Windows APT Warfare:惡意程式前線戰術指南》各章節技術實作之原始碼內容
- 0x727/SqlKnife_0x727 - 适合在命令行中使用的轻巧的SQL Server数据库安全检测工具
- tpoechtrager/osxcross - Mac OS X cross toolchain for Linux, FreeBSD, OpenBSD and Android (Termux)
- JohnnyZhouX/Intranet-Hacking - 内网渗透相关总结
- olliencc/WindowsPatchDetector - Experimental: Windows .text section compare - disk versus memory
- citp/BlockSci - A high-performance tool for blockchain science and exploration
- huoji120/CobaltStrikeDetected - 40行代码检测到大部分CobaltStrike的shellcode
- Cr4sh/KernelForge - A library to develop kernel level Windows payloads for post HVCI era
- hasherezade/pin_n_sieve - An experimental dynamic malware unpacker based on Intel Pin and PE-sieve
- zodiacon/TotalRegistry - Total Registry - enhanced Registry editor/viewer
- mandiant/flare-wmi -
- AzAgarampur/byeintegrity-uac - Bypass UAC by hijacking a DLL located in the Native Image Cache
- rajiv2790/FalconEye -
- BSI-Bund/RdpCacheStitcher - RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
- GossiTheDog/HiveNightmare - Exploit allowing you to read registry hives as non-admin on Windows 10 and 11
- google/lyra - A Very Low-Bitrate Codec for Speech Compression
- k-k-k-k-k/CVE-2021-1732 - CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发
- GoSSIP-SJTU/Armariris - 孤挺花(Armariris) -- 由上海交通大学密码与计算机安全实验室维护的LLVM混淆框架
- HackerDev-Felix/WechatDecrypt - 微信消息解密工具
- wh201906/Proxmark3GUI - A cross-platform GUI for Proxmark3 client | 为PM3设计的跨平台图形界面
- kkent030315/PageTableInjection - Code Injection, Inject malicious payload via pagetables pml4.
- S1ckB0y1337/TokenPlayer - Manipulating and Abusing Windows Access Tokens.
- sogou/workflow - C++ Parallel Computing and Asynchronous Networking Framework
- uknowsec/JuicyPotato - Modifying JuicyPotato to support load shellcode and webshell
- CodingGay/BlackDex - BlackDex is an Android unpack(dexdump) tool, it supports Android 5.0~12 and need not rely to any environment. BlackDex can run on any Android mobile phone or emulator, you can unpack APK File in sever
- KongKong20/WeChatPCHook - 微信 电脑 机器人 入门教程 基于HOOK
- uknowsec/CreateService - 创建服务持久化
- Barbarisch/forkatz - credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege
- netbiosX/AMSI-Provider - A fake AMSI Provider which can be used for persistence.
- AzAgarampur/byeintegrity5-uac - Bypass UAC at any level by abusing the Task Scheduler and environment variables
- Paulo-D2000/ShellCodeObfuscator - Simple shellcode obfuscator using PYTHON and C / C++
- dr0op/CrossNet-Beta - 红队行动中利用白利用、免杀、自动判断网络环境生成钓鱼可执行文件。
- chroblert/JCTokenUtil - Windows访问令牌查看及利用工具
- Cr4sh/MicroBackdoor - Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]
- xuanxuan0/DripLoader - Evasive shellcode loader for bypassing event-based injection detection (PoC)
- vusec/collabfuzz - CollabFuzz: A Framework for Collaborative Fuzzing
- FeJQ/AUPK -
- jozemberi/PE-Crypter - Simple runtime crypter in C/C++.
- klecko/kvm-fuzz - PoC of fuzzing closed-source userspace binaries with KVM
- jxy-s/herpaderping - Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
- L3cr0f/DccwBypassUAC - Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".
- RedCursorSecurityConsulting/PPLKiller - Tool to bypass LSA Protection (aka Protected Process Light)
- h4ms1k/samdump -
- BlackINT3/OpenArk - The Next Generation of Anti-Rookit(ARK) tool for Windows.
- 0xZ0F/Z0FCourse_ReverseEngineering - Reverse engineering focusing on x64 Windows.
- undefPtr/LCX - 自修改免杀lcx端口转发工具
- notify-bibi/ScyllaHide-IDA7.5 - ScyllaHide for IDA7.5; ScyllaHide IDA7.5; It is a really niccccccce anti-anti-debug tool
- aahmad097/AlternativeShellcodeExec - Alternative Shellcode Execution Via Callbacks
- hasherezade/bearparser - Portable Executable parsing library (from PE-bear)
- kdrag0n/safetynet-fix - Google SafetyNet attestation workarounds for Magisk
- deepinstinct/LsassSilentProcessExit - Command line interface to dump LSASS memory to disk via SilentProcessExit
- ChaitanyaHaritash/Callback_Shellcode_Injection - POCs for Shellcode Injection via Callbacks
- huoji120/DuckMemoryScan - 检测绝大部分所谓的内存免杀马
- ajayrandhawa/Keylogger - Keylogger is 100% invisible keylogger not only for users, but also undetectable by antivirus software. keylogger Monitors all keystokes, Mouse clicks. It has a seperate process which continues capture
- TimelifeCzy/kHypervisorBasic - VT Hook
- WormChickenWizard/hikvision-decrypter - A simple cross platform program written in C++ used for decrypting the configuration files created by Hikvision Security Cameras. Successor to my hikvision-xor-decrypter
- codingo/dooked - DNS and Target HTTP History Local Storage and Search
- itm4n/Perfusion - Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)
- stealth/psc - E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward
- fastogt/fastonosql - FastoNoSQL is a crossplatform Redis, Memcached, SSDB, LevelDB, RocksDB, UnQLite, LMDB, ForestDB, Pika, Dynomite, KeyDB GUI management tool.
- WerWolv/ImHex - 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
- OmerYa/Invisi-Shell - Hide your Powershell script in plain sight. Bypass all Powershell security features
- ioncodes/CVE-2020-16938 - Bypassing NTFS permissions to read any files as unprivileged user.
- DockDroid/openvmi - 鹏城实验室与北弓联合开发的VMI开源版本
- 0xnobody/vmpdump - A dynamic VMP dumper and import fixer, powered by VTIL.
- bats3c/ChromeTools - A collection of tools to abuse chrome browser
- Rvn0xsy/Cooolis-ms - Cooolis-ms是一个包含了Metasploit Payload Loader、Cobalt Strike External C2 Loader、Reflective DLL injection的代码执行工具,它的定位在于能够在静态查杀上规避一些我们将要执行且含有特征的代码,帮助红队人员更方便快捷的从Web容器环境切换到C2环境进一步进行工作。
- 0x09AL/RdpThief - Extracting Clear Text Passwords from mstsc.exe using API Hooking.
- lcatro/vuln_javascript - 模拟一个存在漏洞的JavaScript 运行环境,用来学习浏览器漏洞原理和练习如何编写Shellcode (a JavaScript Execute Envirment which study browser vuln and how to write Shellcode ) ..
- ggerganov/kbd-audio - 🎤⌨️ Acoustic keyboard eavesdropping
- scanfsec/AggressorCNA - Cobalt Strike Aggressor Scripts
- googleprojectzero/Jackalope - Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android
- yazhiwang/ollvm-tll - Ollvm+Armariris+LLVM 6.0.0
- m-y-mo/android_nfc_fuzzer -
- Alamot/code-snippets - Various code snippets
- miek/inspectrum - Radio signal analyser
- NytroRST/ShellcodeCompiler - Shellcode Compiler
- knownsec/shellcodeloader - shellcodeloader
- WithSecureLabs/C3 - Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
- cbwang505/CVE-2020-1066-EXP - CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统
- google/CTAP2-test-tool - Test tool for CTAP2 authenticators
- yardenshafir/CVE-2020-1034 - PoC demonstrating the use of cve-2020-1034 for privilege escalation
- PetoiCamp/OpenCat-Old - A programmable and highly maneuverable robotic cat for STEM education and AI-enhanced services.
- k-fire/shellcode-to-dll - shellcode 异或加密并生成dll
- Gality369/CS-Loader - CSLoader is a general purpose obfuscation and anti-virus tool based on a reimplementation of the llvm project obfuscator(https://github.com/obfuscator-llvm/obfuscator).
- solemnwarning/rehex - Reverse Engineers' Hex Editor
- sensepost/rattler - Automated DLL Enumerator
- mohuihui/DingTalk_Assistant - 钉钉助手,主要功能包括:聊天消息防撤回、程序多开、屏蔽频繁升级等。
- horsicq/XAPKDetector - APK/DEX detector for Windows, Linux and MacOS.
- crossroadsfpga/pigasus - 100Gbps Intrusion Detection and Prevention System
- CheckPointSW/showstopper - ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solutions that clash with standard anti-debug methods.
- ION28/BLUESPAWN - An Active Defense and EDR software to empower Blue Teams
- anhkgg/SuperDllHijack - SuperDllHijack:A general DLL hijack technology, don't need to manually export the same function interface of the DLL, so easy! 一种通用Dll劫持技术,不再需要手工导出Dll的函数接口了
- gitjdm/dumper2020 - Yet another LSASS dumper
- itm4n/FullPowers - Recover the default privilege set of a LOCAL/NETWORK SERVICE account
- tobimensch/aqemu - Official AQEMU repository - a GUI for virtual machines using QEMU as the backend
- upx/upx - UPX - the Ultimate Packer for eXecutables
- vaibhavpandeyvpz/apkstudio - Open-source, cross platform Qt based IDE for reverse-engineering Android application packages.
- am0nsec/wspe - Windows System Programming Experiments
- zodiacon/ProcMonXv2 - Process Monitor X v2
- Neo23x0/Raccine - A Simple Ransomware Vaccine
- siemens/fluffi - FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters
- binarly-io/efiXplorer - IDA plugin and loader for UEFI firmware analysis and reverse engineering automation
- mubix/netview - Netview enumerates systems using WinAPI calls
- klzgrad/naiveproxy - Make a fortune quietly
- facebook/hermes - A JavaScript engine optimized for running React Native.
- cyberark/DLLSpy - DLL Hijacking Detection Tool
- mmozeiko/aes-finder - Utility to find AES keys in running processes
- Almamu/linux-wallpaperengine - Wallpaper Engine backgrounds for Linux!
- HexHive/FuZZan - FuZZan: Efficient Sanitizer Metadata Design for Fuzzing
- illera88/Ponce - IDA 2016 plugin contest winner! Symbolic Execution just one-click away!
- webview/webview - Tiny cross-platform webview library for C/C++. Uses WebKit (GTK/Cocoa) and Edge WebView2 (Windows).
- TheWover/Manager - Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET
- crvvdev/MasterHide - A x64 Windows Rootkit using SSDT or Hypervisor hook
- iPower/KasperskyHook - Hook system calls on Windows by using Kaspersky's hypervisor
- Soulghost/iblessing - iblessing is an iOS security exploiting toolkit, it mainly includes application information gathering, static analysis and dynamic analysis. It can be used for reverse engineering, binary analysis and
- hhlxf/USO_Info_Leak - two heap address leak bugs in
usosvcservice - 0xnobody/vmpattack - A VMP to VTIL lifter.
- Cc28256/CcRemote - 这是一个基于gh0st远程控制的项目,使自己更深入了解远控的原理,采用VS2017,默认分支hijack还在修改不能执行,master分支的项目可以正常的运行的,你可以切换到该分支查看可以执行的代码
- s1kr10s/Load_DLL -
- can1357/NoVmp - A static devirtualizer for VMProtect x64 3.x. powered by VTIL.
- baidu/openrasp - 🔥Open source RASP solution
- br-sn/CheekyBlinder - Enumerating and removing kernel callbacks using signed vulnerable drivers
- D4stiny/spectre - A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.
- snorez/srcinv - source code audit tool
- irsl/CVE-2020-1313 - Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability
- k0keoyo/my_vulnerabilities -
- hlldz/dazzleUP - A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating systems.
- DimopoulosElias/Primitives -
- frida/cryptoshark - Self-optimizing cross-platform code tracer based on dynamic recompilation
- yeyiqun/FUPK3-hook_kill - 本分支解决部分爱加密加固应用无法脱壳成功的问题。演示视频https://pan.baidu.com/s/1HH_-TQGca1NLoSqzvOPB3Q 密码:izm3
- uknowsec/OXID_Find - OXID_Find by C++(多线程) 通过OXID解析器获取Windows远程主机上网卡地址
- Q4n/CVE-2020-1362 - writeup of CVE-2020-1362
- collin80/SavvyCAN - QT based cross platform canbus tool
- agauniyal/rang - A Minimal, Header only Modern c++ library for terminal goodies 💄✨
- hmoytx/RdpThief_tools - 窃取mstsc中的用户明文凭据
- alphaSeclab/anti-debug -
- alphaSeclab/bypass-uac -
- snort3/snort3 - Snort++
- hasherezade/exe_to_dll - Converts a EXE into DLL
- Gyoonus/deoptfuscator - Deobfuscator for Android Application
- tindy2013/subconverter - Utility to convert between various subscription format
- Rvn0xsy/Cobaltstrike-atexec - 使得Cobaltstrike支持Atexec
- tklab-tud/BSF - Botnet Simulation Framework
- itm4n/UsoDllLoader - Windows - Weaponizing privileged file writes with the Update Session Orchestrator service
- KDE/latte-dock - Replacement dock for Plasma desktops, providing an elegant and intuitive experience for your tasks and plasmoids
- ohpe/juicy-potato - A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
- hasherezade/tag_converter -
- hasherezade/tiny_tracer - A Pin Tool for tracing API calls etc
- ksnip/ksnip - ksnip the cross-platform screenshot and annotation tool
- A2kaid/Get-WeChat-DB - 获取目标机器的微信数据库和密钥,但是有很多bug需要解决,需要继续完善
- b4rtik/metasploit-execute-assembly - Custom Metasploit post module to executing a .NET Assembly from Meterpreter session
- ZanderChang/anti-sandbox - Windows对抗沙箱和虚拟机的方法总结
- cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION - Support ALL Windows Version
- JelinYao/HttpInterface - Windows上C++封装的HTTP库,包含三种实现模式(WinInet、WinHttp、socket)
- LDrakura/DLLhijack-ShellcodeLoader - DLLhijack winmm.dll
- idiotc4t/ReflectiveBase64DLL - This is a project to receive Base64 data and decode it in process
- idiotc4t/Mapping-injection - NO WriteProcessMemory CreateRemoteThread APIs call shellcode injection
- idiotc4t/GetSystemEarlyBird - 这是一个直接取得系统权限的项目
- HexHive/FuzzGen -
- ameenmaali/urldedupe - Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
- anbox/anbox - Anbox is a container-based approach to boot a full Android system on a regular GNU/Linux system
- antonioCoco/RogueWinRM - Windows Local Privilege Escalation from Service Account to System
- sailay1996/WerTrigger - Weaponizing for privileged file writes bugs with windows problem reporting
- SerenityOS/serenity - The Serenity Operating System 🐞
- ivan-sincek/invoker - Penetration testing utility and antivirus assessment tool.
- ylcangel/crack_dexhelper - 梆梆企业加固详细逆向分析过程, 包含两种对该加固的脱壳机(直接解密classes0.jar和基于frida hook)
- Bareflank/MicroV - A micro hypervisor for running micro VMs
- Qv2ray/Qv2ray - ⭐ Linux / Windows / macOS 跨平台 V2Ray 客户端 | 支持 VMess / VLESS / SSR / Trojan / Trojan-Go / NaiveProxy / HTTP / HTTPS / SOCKS5 | 使用 C++ / Qt 开发 | 可拓展插件式设计 ⭐
- earthquake/Socks5Server - Windows C/C++ Socks5 Server
- nccgroup/SocksOverRDP - Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop
- SongFGH/USTC-CS-Courses-Resource - ❤️中国科学技术大学计算机学院课程资源(https://mbinary.xyz/ustc-cs/)
- DayBreak-u/chineseocr_lite - 超轻量级中文ocr,支持竖排文字识别, 支持ncnn、mnn、tnn推理 ( dbnet(1.8M) + crnn(2.5M) + anglenet(378KB)) 总模型仅4.7M
- F8LEFT/FUPK3 - 演示视频https://pan.baidu.com/s/1HH_-TQGca1NLoSqzvOPB3Q 密码:izm3
- 0x09AL/IIS-Raid - A native backdoor module for Microsoft IIS (Internet Information Services)
- dothook/FunnyMeterpreter - 与反病毒软件老大哥们的打闹日常
- trojan-gfw/trojan - An unidentifiable mechanism that helps you bypass GFW.
- lengjibo/NetUser - 使用windows api添加用户,可用于net无法使用时.分为nim版,c++版本,RDI版,BOF版。
- panda-re/lava - LAVA: Large-scale Automated Vulnerability Addition
- outflanknl/Spray-AD - A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.
- tstack/lnav - Log file navigator
- horsicq/x64dbg-Plugin-Manager - Plugin manager for x64dbg
- horsicq/XOpcodeCalc - Opcode calculator / ASM calculator
- ffffffff0x/1earn - ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
- binspector/binspector - A binary format analysis tool
- JaanusKaapPublic/HyperViper - Toolkit for Hyper-V security research
- rizinorg/cutter - Free and Open Source Reverse Engineering Platform powered by rizin
- decaf-project/Droidscope - A dynamic analysis platform for Android
- zmeadows/lldbg - A lightweight native GUI for LLDB.
- facebookarchive/ds2 - Debug server for lldb.
- gdbinit/ExtractMacho2 - IDA plugin to extract Mach-O binaries located in the disassembly or data
- jmpews/DobbyDrill - hook MachO file based on Dobby (NOT DONE)
- codilime/veles - Binary data analysis and visualization tool
- WrBug/dumpDex - 💯一款Android脱壳工具,需要xposed支持, 易开发已集成该项目。
- GiacomoLaw/Keylogger - A simple keylogger for Windows, Linux and Mac
- AloneMonkey/iOSREBook - 《iOS应用逆向与安全》随书源码
- martinrotter/rssguard - Feed reader (podcast player and also Gemini protocol client) which supports RSS/ATOM/JSON and many web-based feed services.
- xorrior/raven - CobaltStrike External C2 for Websockets
- yuanyuanxiang/SimpleRemoter - 基于gh0st的远程控制器:实现了终端管理、进程管理、窗口管理、远程桌面、文件管理、语音管理、视频管理、服务管理、注册表管理等功能,优化全部代码及整理排版,修复内存泄漏缺陷,程序运行稳定。项目代码仅限于学习和交流用途。
- ossrs/srs - SRS is a simple, high-efficiency, real-time media server supporting RTMP, WebRTC, HLS, HTTP-FLV, HTTP-TS, SRT, MPEG-DASH, and GB28181.
- saulty4ish/Dir_Scan_ByQT5 - qt实现仿御剑风格路径扫描工具,增加延时,代理池Bypass功能,同时支持批量扫描,附带简单whois信息搜集与端口扫描模块,界面更加美观。
- HyperSine/SdoKeyCrypt-sys-local-privilege-elevation - CVE-2019-9729. Transferred from https://github.com/DoubleLabyrinth/SdoKeyCrypt-sys-local-privilege-elevation
- deadash/pbb_crack - PBB视频解密
- KikoPlayProject/KikoPlay - KikoPlay - NOT ONLY A Full-Featured Danmu Player 不仅仅是全功能弹幕播放器
- wazuh/wazuh - Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
- GodofMonkeys/Arma-III-Chinese-Localization-Enhanced - 武裝行動3(Arma 3)官方中文潤飾、加強、在地化翻譯模組。
- zhongyang219/TrafficMonitor - 这是一个用于显示当前网速、CPU及内存利用率的桌面悬浮窗软件,并支持任务栏显示,支持更换皮肤。
- TranslucentTB/TranslucentTB - A lightweight utility that makes the Windows taskbar translucent/transparent.
- snowie2000/mactype - Better font rendering for Windows.
- klesh/fu - fu stands for File to URL, a utility design to help you upload images/files and produce Markdown/HTML snippets with couple of clicks.
- xdnice/PCShare - PCShare是一款强大的远程控制软件,可以监视目标机器屏幕、注册表、文件系统等。
- dekuan/VwFirewall - 微盾®VirtualWall®防火墙整套源代码
- gqrx-sdr/gqrx - Software defined radio receiver powered by GNU Radio and Qt.
- gnuradio/gnuradio - GNU Radio – the Free and Open Software Radio Ecosystem
- zcgonvh/MS16-032 - MS16-032(CVE-2016-0099) for SERVICE ONLY
- kanryu/quickviewer - A image/comic viewer application for Windows, Mac and Linux, it can show images very fast
- oyyd/nysocks - Nysocks binds kcp and libuv to provide an aggressive tcp tunnel in nodejs.
- Motion-Project/motion - Motion, a software motion detector. Home page: https://motion-project.github.io/
- vnotex/vnote - A pleasant note-taking platform in native C++.
- guoming0000/BatchRunTrayTool - A tray tool under windows to open any file by system default or any executable program.
- rexdf/CommandTrayHost - A command line program monitor systray for Windows
- Gregwar/fatcat - FAT filesystems explore, extract, repair, and forensic tool
- 0x09AL/DNS-Persist - DNS-Persist is a post-exploitation agent which uses DNS for command and control.
- wangyu-/tinyfecVPN - A VPN Designed for Lossy Links, with Build-in Forward Error Correction(FEC) Support. Improves your Network Quality on a High-latency Lossy Link.
- wangyu-/UDPspeeder - A Tunnel which Improves your Network Quality on a High-latency Lossy Link by using Forward Error Correction, possible for All Traffics(TCP/UDP/ICMP)
- cbayet/Exploit-CVE-2017-6008 - Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.
- apache/incubator-pagespeed-ngx - Automatic PageSpeed optimization module for Nginx
- rakshasa/rtorrent - rTorrent BitTorrent client
- qwinff/qwinff - A Qt4/5 GUI Frontend for FFmpeg
- simsong/tcpflow - TCP/IP packet demultiplexer. Download from:
- NotGlop/SysExec - [Windows] Local Privilege Escalation - WebClient
- hatRiot/token-priv - Token Privilege Research
- XhmikosR/notepad2-mod - LOOKING FOR DEVELOPERS - Notepad2-mod, a Notepad2 fork, a fast and light-weight Notepad-like text editor with syntax highlighting
- wangyu-/udp2raw - A Tunnel which Turns UDP Traffic into Encrypted UDP/FakeTCP/ICMP Traffic by using Raw Socket,helps you Bypass UDP FireWalls(or Unstable UDP Environment)
- securesocketfunneling/ssf - Secure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platform
- pipesocks/pipesocks - A pipe-like SOCKS5 tunnel system.
- vah13/extractTVpasswords - tool to extract passwords from TeamViewer memory using Frida
- miguelfreitas/twister-core - twister core / daemon
- wbenny/mini-tor - proof-of-concept implementation of tor protocol using Microsoft CNG/CryptoAPI
- jks-prv/Beagle_SDR_GPS - KiwiSDR: BeagleBone web-accessible shortwave receiver and software-defined GPS (archived)
- PurpleI2P/i2pd - 🛡 I2P: End-to-End encrypted and anonymous Internet
- samizzo/hexed - Windows console-based hex editor
- pavel-odintsov/fastnetmon - FastNetMon - very fast DDoS sensor with sFlow/Netflow/IPFIX/SPAN support
- gatieme/CodingInterviews - 剑指Offer——名企面试官精讲典型编程题
- oguzhaninan/Stacer - Linux System Optimizer and Monitoring - https://oguzhaninan.github.io/Stacer-Web
- sam-b/HackSysDriverExploits -
- psi-im/psi - XMPP client
- rime/librime - Rime Input Method Engine, the core library
- bee13oy/AV_Kernel_Vulns - Pocs for Antivirus Software‘s Kernel Vulnerabilities
- nladuo/captcha-break - captcha break based on opencv2, tesseract-ocr and some machine learning algorithm.
- 3gstudent/From-System-authority-to-Medium-authority - Penetration test
- owasp-modsecurity/ModSecurity - ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. It has a robust event-based programming language which provides protection from a range o
- secrary/InjectProc - InjectProc - Process Injection Techniques [This project is not maintained anymore]
- JLospinoso/gargoyle - A memory scanning evasion technique
- ladislav-zezula/CascLib - An open-source implementation of library for reading CASC storages from Blizzard games since 2014
- homenc/HElib - HElib is an open-source software library that implements homomorphic encryption. It supports the BGV scheme with bootstrapping and the Approximate Number CKKS scheme. HElib also includes optimizations
- aguinet/wannakey - Wannacry in-memory key recovery
- KernelMaker/rocksutil - A c++ develop toolkit
- google/security-research-pocs - Proof-of-concept codes created as part of security research done by Google Security Team.
- Dor1s/libfuzzer-workshop - Repository for materials of "Modern fuzzing of C/C++ Projects" workshop.
- whdlgp/ARMv6m_Simulator - Simple Simulator of ARMv6m instructions
- hidviz/hidviz - A tool for in-depth analysis of USB HID devices communication
- x64dbg/x64dbg - An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
- steven-michaud/HookCase - Tool for reverse engineering macOS/OS X
- ele7enxxh/poc-exp - poc or exp of android vulnerability
- jackullrich/ShellcodeStdio - An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.
- Deeplocal/mocktailsmixer - Make a DIY Robotic Mocktails Mixer Powered by the Google Assistant SDK
- msuiche/OPCDE - OPCDE Cybersecurity Conference Materials
- richkmeli/Richkware - Framework for building Windows malware, written in C++
- lcatro/network_backdoor_scanner - This is a backdoor about discover network device ,and it can hidden reverse connecting the hacker's server with encrypt commuication 后渗透后门程序,适合在已经攻陷的内网中做下一步的网络信息扫描..
- secrary/InfectPE - InfectPE - Inject custom code into PE file [This project is not maintained anymore]
- lcatro/SISE_Traning_CTF_RE - SNST Traning RE Project .华软网络安全小组逆向工程训练营,尝试以CTF 的形式来使大家可以动手训练快速提升自己的逆向工程水平.CTF 的训练程序又浅到深,没有使用太复杂的算法,在逆向的过程中遇到的难关都是在分析病毒和破解中遇到的实际情况,注重于实用.训练营还包含有源代码文件,训练程序和思路.希望可以帮助小伙伴们入门逆向工程这个神奇的世界..
- microsoft/CNTK - Microsoft Cognitive Toolkit (CNTK), an open source deep-learning toolkit
- StevenHickson/PiAUISuite - Raspberry PI AUI Suite
- hteso/iaito - This project has been moved to:
- DimitriFourny/koalaOS - x86 Microkernel
- silverf0x/RpcView - RpcView is a free tool to explore and decompile Microsoft RPC interfaces
- cinience/RedisStudio - RedisStudio Redis GUI client(tool) for windows
- yanyiwu/simhash - 中文文档simhash值计算
- TheLartians/ModernCppStarter - 🚀 Kick-start your C++! A template for modern C++ projects using CMake, CI, code coverage, clang-format, reproducible dependency management and much more.
- pothosware/PothosSDR - Pothos SDR windows development environment
- SpoofIMEI/Faucet - Easy to use encrypted cross platform GUI file stealer.
- AIDotNet/AntSK - 基于.Net8+AntBlazor+SemanticKernel 和KernelMemory 打造的AI知识库/智能体,支持本地离线AI大模型。可以不联网离线运行。支持aspire观测应用数据
- SEC-CAFE/handbook - 安全手册,企业安全实践、攻防与安全研究知识库
- Qihoo360/WatchAD2.0 - WatchAD2.0是一款针对域威胁的日志分析与监控系统
- LinWin-Cloud/setool-master - SetoolMaster是一款让你入门即入狱的python3开发的进阶型社会工程学工具。包括了全球定位、Ngrok内网穿透、Seeker高精度定位、网页钓鱼、病毒攻击、恐吓勒索信、爬虫、网站克隆、物联网设备搜索等,同时拥有中文支持,内置大量钓鱼模板,设计用于组织级别红队渗透测试,用于团队组织设备型协同,经过非常多的实战演练,效果出众,远超同行产品
- paulbricman/dual-obsidian-client - A skilled virtual assistant for Obsidian.
- paranoidninja/O365-Doppelganger - A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user
- LimberDuck/nessus-cheat-sheet - Nessus Cheat Sheet in HTML, PDF, PNG, ADOC
- Escher1108/mailqq - 模拟QQ邮箱登录的钓鱼程序,数据实时发送到手机,能运行html 就可跑,告别PHP等环境
- dwisiswant0/nuclei-templates-dir - Nuclei Templates Directory
- Yavuzlar/VulnLab -
- P0cL4bs/Nanobrok - Web Service write in Python for control and protect your android device remotely.
- opensec-cn/conote-community - Conote 综合安全测试平台社区版。
- du33169/typora-theme-essay_cn - a theme for Typora(a markdown editor), designed for chinese essay
- primary-theme/obsidian - Comfy, playful but productive theme for Obsidian. "Primary instantly puts you in a relaxed state that opens the door to creativity and exploration. Wonderfully executed down to the smallest details,"
- lbc-team/deep_ethereum - 电子书:以太坊技术与实现
- Pithus/bazaar - NO LONGER MAINTAINED - Android security & privacy analysis for the masses
- abhijithb200/investigator - An online handy-recon tool
- nccgroup/Solitude - Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more advanced researcher, Solitude makes the process of evaluating us
- admin360bug/PHP - PHP训练靶场
- hrqmonteiro/joplin-theme - My Joplin theme files, including userchrome.css and userstyles.css, as well as some markdown templates for my notes.
- pierce403/nweb - web based nmap scan collection and search
- shifa123/clickjackingpoc - A Proof of Concept for Clickjacking Attacks
- andev-software/graphql-ide - ⚡️ GraphQL IDE - An extensive IDE for exploring GraphQL API's
- m0chan/BugBounty - RepoToStoreBugBountyInfo
- Chudry/Xerror - fully automated pentesting tool
- mrtc0/container-security-book -
- elrumo/macOS_Big_Sur_icons_replacements - Replacement icons for popular apps in the style of macOS Big Sur
- EstamelGG/Nessus-EN-2-CN - 将Nessus的英文版报告处理为中文版,能够在网页上预览,并导出为中文版CSV报告。导出的报告格式为“带有BOM的UTF-8编码”,可供测评能手等软件导入。
- GoogleInside/Typora-Themes - 全部Typora主题+自定义修改
- Aneureka/push-to-kindle - 📘 A web-based tool for pushing documents to your lovely kindle.
- zseano/JS-Scan - a .js scanner, built in php. designed to scrape urls and other info
- gwen001/bugbountytips - Webapp to search tips on Twitter through #bugbountytips
- varchashva/vPrioritizer - vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization, for teams to make more informed decision about what (vulnerabi
- mike-goodwin/owasp-threat-dragon-desktop - An installable desktop variant of OWASP Threat Dragon
- leonjza/frida-boot - Frida Boot 👢- A binary instrumentation workshop, with Frida, for beginners!
- ajinabraham/nodejsscan - nodejsscan is a static security code scanner for Node.js applications.
- yingshang/banruo -
- zsxsoft/my-ctf-challenges - My CTF Challenges
- curtbraz/PhishAPI - Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
- sp4rkw/Reaper - 一款用于src资产信息收集的工具
- pythonran/Pcap_tools - 网络流量可配置嗅探,流量包解析,漏洞规则扫描
- weev3/LKWA - Lesser Known Web Attack Lab
- wultra/powerauth-docker - Docker images for PowerAuth 2.0 Software
- nowsecure/secure-mobile-development - A Collection of Secure Mobile Development Best Practices
- josherich/repo-to-pdf - repository to pdf
- varkai/hugo-theme-zozo - 🌟 A simple and beautiful theme for Hugo
- Area39/Webug4.0-Docker - Docker版本的Webug4.0
- theme-nexmoe/hexo-theme-nexmoe - 🔥 A special Hexo theme focusing on pictures and images. Images tell stories, and Nexmoe makes them more vivid.
- Wei-Xia/most-frequent-technology-english-words - 程序员工作中常见的英语词汇
- chokcoco/iCSS - 不止于 CSS
- HackerYunen/Django-XSS-Platform -
- UndeadSec/SocialFish - Phishing Tool & Information Collector
- appsecco/using-docker-kubernetes-for-automating-appsec-and-osint-workflows - Repository for all the workshop content delivered at nullcon X on 1st of March 2019
- w-digital-scanner/w12scan - 🚀 A simple asset discovery engine for cybersecurity. (网络资产发现引擎)
- LiangJunrong/document-library - jsliang 的文档库. 里面包含了个人撰写的所有前端文章,例如 Vue、React,、ECharts、微信小程序、算法、数据结构等……
- billryan/hugo-theme-even - 🚀 A super concise theme for Hugo https://blog.olowolo.com/example-site/
- ba0gu0/WebRange - 一个Web版的docker管理程序,可以用来运行各种docker漏洞环境和CTF环境。
- smartFlash/pySecurity - Python tutorials
- SukkaW/hexo-theme-suka - 🎨Modern, powerful and simple theme for Hexo.
- muzishanshi/tongleer_for_wordpress - tongleer_for_wordpress是一个Wordpress版本的WeiboForWordPress微博主题,又名TleWeiboForWordPress。
- smartping/smartping - 综合性网络质量(PING)检测工具,支持正/反向PING绘图、互PING拓扑绘图与报警、全国PING延迟地图与在线检测工具等功能
- w-digital-scanner/w11scan - 分布式WEB指纹识别平台 Distributed WEB fingerprint identification platform
- 710leo/ZVulDrill - Web漏洞演练平台
- nizarmah/tintedarc - An XFCE custom arc and tint2 auto-themer, voila you have yourself a nice theme
- luodaoyi/CloudFlarePartner - CloudFlare partner website with python and flask
- vinceliuice/Vimix-gtk-themes - Vimix is a flat Material Design theme for GTK 3, GTK 2 and Gnome-Shell etc.
- ProgrammingFonts/ProgrammingFonts - This is a collection of programming fonts, just share this with the programmers. Now there are 108 kinds of fantastic fonts!
- FunctionClub/V2ray.Fun - 正在开发的全新 V2ray.Fun
- hashview/hashview-old - A web front-end for password cracking and analytics
- houshanren/hangzhou_house_knowledge - 2017年买房经历总结出来的买房购房知识分享给大家,希望对大家有所帮助。买房不易,且买且珍惜。Sharing the knowledge of buy an own house that according to the experience at hangzhou in 2017 to all the people. It's not easy to buy a own house, so I
- rmusser01/Infosec_Reference - An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
- jbtronics/CrookedStyleSheets - Webpage tracking only using CSS (and no JS)
- hltj/kotlin-reference-chinese - Kotlin 官方文档(参考部分)中文版
- cheng-kang/wildfire - 🔥From a little spark may burst a flame.
- programster/Apaxy - A simple, customisable theme for your Apache directory listing.
- ronggang/transmission-web-control - 一个 Transmission 浏览器管理界面。Transmission Web Control is a custom web UI.
- caspartse/QQ-Groups-Spider - QQ Groups Spider(QQ 群爬虫)
- justdeleteme/justdelete.me - A directory of direct links to delete your account from web services.
- chaynHQ/diy-online-privacy-starter - Chayn's Do It Yourself Online Safety guide helps women keep their online accounts and social profiles secure against harassment, and stalkers. This guide is open source.
- malaohu/Arukas-API - Arukas API 自动获取IP和端口,SSR服务器订阅,Arukas 监测启动
- sunnyyoung/Farbox-NexT - A hexo theme NexT for Farbox.
- zhangjikai/gitbook-use - 记录GitBook的一些配置及插件信息
- wentin/cssicon - icon set made with pure css code, no dependencies, "grab and go" icons
- Tencent/tmt-workflow - A web developer workflow used by WeChat team based on Gulp, with cross-platform supported and solutions prepared.
- PJtools/pd3 - 基于D3 v4+进行二次封装及扩展。示例来源于日常项目及客户提出的需求,转化成数据可视化。
- smartdengjie/hbase-manager - 可视化hbase数据库
- xiaopan233/AntSword-Cryption-WebShell - Some traffic encryption webshell and encoder for AntSword. 蚁剑流量加密马及编码器
- LandGrey/webshell-detect-bypass - 绕过专业工具检测的Webshell研究文章和免杀的Webshell
- eslam3kl/SQLiDetector - Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests with 14 payloads and checking for 152 regex patterns for differe
- ntestoc3/burp-clj - clojure实现burp插件,提供clj脚本加载环境
- Hutt0n0/CodeqlFinder - 用go语言实现的批量执行ql脚本的小工具,实现只搜索sink点或者污点利用链寻找
- webraybtl/CodeQLpy - CodeQLpy是一款基于CodeQL实现的半自动化代码审计工具,目前仅支持java语言。实现从源码反编译,数据库生成,脆弱性发现的全过程,可以辅助代码审计人员快速定位源码可能存在的漏洞。
- advanced-security/codeql-queries - [Deprecated] GitHub's Field Team's CodeQL Custom Queries, Suites, and Configurations. See GitHubSecurityLab/CodeQL-Community-Packs instead
- ice-doom/CodeQLRule - 个人使用CodeQL编写的一些规则
- synacktiv/QLinspector - Finding Java gadget chains with CodeQL
- safe6Sec/CodeqlNote - Codeql学习笔记
- cldrn/codeql-queries - My CodeQL queries collection
- pwntester/codeql_grehack_workshop - GreHack 2021 CodeQL for Java workshop
- SummerSec/LookupInterface - CodeQL 寻找 JNDI利用 Lookup接口
- zbazztian/codeql-debug -
- kanav99/github-java-ctf - Winning submission for the GitHub Security Lab CTF 4: CodeQL and Chill - The Java Edition
- foundeo/fixinator - ColdFusion / CFML Code Security Scanner
- Anxcye/anx-reader - Featuring powerful AI capabilities and supporting various e-book formats, it makes reading smarter and more focused. 集成多种 AI 能力,支持丰富的电子书格式,让阅读更智能、更专注。
- mulaRahul/keyviz - Keyviz is a free and open-source tool to visualize your keystrokes ⌨️ and 🖱️ mouse actions in real-time.
- AppFlowy-IO/AppFlowy - Bring projects, wikis, and teams together with AI. AppFlowy is the AI collaborative workspace where you achieve more without losing control of your data. The leading open source Notion alternative.
- LuckyLi706/flutter_mobile_command_tools - flutter写的桌面可视化操作android和ios的简单命令
- daixianceng/cron_dingding - 钉钉自动打卡
- bingoogolapple/bga_issue_blog - Flutter 或 Vue 全家桶(Vue + VueRouter + Vuex + Axios)抓取 GitHub 上的 Issues,结合 GitHub Pages 搭建个人博客站点,支持 GitHub 登录和评论
- Tanq16/containerized-security-toolkit - Multi-arch Docker images to perform security operations via containerized workflows.
- jaywcjlove/reference - 为开发人员分享快速参考备忘清单(速查表)
- vulhub/java-chains - vulhub Vulnerability Reproduction Designated Platform
- haxqer/confluence - The simplest docker file of Confluence. Support v8.9.8(latest) v9.2.1(latest) and v8.5.19(lts)
- TunMax/canal - 一个开箱即用的 http / socks5 代理(基于 Cloudflare WARP)/ Setting Up an Out of Box HTTP/SOCKS5 Proxy with Cloudflare WARP in Docker
- dr0n1/CTF_Docker_Template - CTF docker部署模板
- akkuman/docker-awvs - 可便捷配置账号密码apikey的docker-awvs
- teamssix/twiki - T Wiki 云安全知识文库,可能是国内首个云安全知识文库?
- p0dalirius/Awesome-RCE-techniques - Awesome list of step by step techniques to achieve Remote Code Execution on various apps!
- aress31/docker_burp-enterprise - Attempt at dockerizing Burp Enterprise v2022.4.
- Threekiii/Awesome-POC - 一个漏洞POC知识库 目前数量 1000+
- n0madic/nmap-vulners-vulscan - Docker image for advanced vulnerability scanning with Nmap NSE scripts
- sonnyyu/docker-nmap - Nmap is utility for network discovery and security auditing
- xiecat/sec-docker - 常用安全工具 docker镜像 自动更新仓库
- geerlingguy/docker-ubuntu2204-ansible - Ubuntu 22.04 LTS (Jammy Jellyfish) Docker container for Ansible playbook and role testing.
- puzzlepeaches/sneaky_proxy - Hiding your infrastructure from the boys in blue.
- RAJANAGORI/Nightingale - Nightingale Docker for Pentesters is a comprehensive Dockerized environment tailored for penetration testing and vulnerability assessment. It comes preconfigured with all essential tools and utilities
- ericmjl/essays-on-data-science - In which I put together my thoughts on the practice of data science.
- Yogehi/Drozer-Docker -
- caphosra/CTFDocker - This is a docker image for Capture The Flag and many useful and famous tools are on this image.
- Cl0udG0d/AWDDocker - 标准化AWD靶场Docker
- eikendev/java-decompiler - A Docker image with four popular Java decompilers in one place (CFR, Fernflower, Krakatau, and Procyon) 🚀🔨
- phith0n/phpsrc-debug-docker - Debug environment for PHP inside a Docker container. Document waiting to be completed.
- sherifabdlnaby/elastdocker - 🐳 Elastic Stack (ELK) v8+ on Docker with Compose. Pre-configured out of the box to enable Logging, Metrics, APM, Alerting, ML, and SIEM features. Up with a Single Command.
- qeeqbox/chameleon - 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET,
- mablanco/docker-reconftw - Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains
- rosehgal/k8s-In-30Mins - Learn how to set up the Kubernetes cluster in 30 mins and deploy the application inside the cluster.
- parzel/Damn-Vulnerable-WooCommerce-Plugins - This is a docker environment ready set up for multiple WooCommerce Plugin vulnerabilities.
- himazawa/bento - Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.
- lazychanger/docker-kunlun-mirror - 昆仑镜docker镜像
- Swordfish-Security/Pentest-In-Docker - Docker image to exploit RCE, try for pentest methods and test container security solutions (trivy, falco and etc.)
- evi0s/Openresty-WAF - Openresty with WAF installed
- mozilla/docker-sbt - Dockerfile for sbt (Scala build tool)
- drandin/docker-php-workspace - PHP development environment for Docker
- heroku/bheu19-attacking-cloud-builds - Slides, Cheatsheet and Resources from our Blackhat EU talk
- zjuchenyuan/dockerized_fuzzing - Run fuzzing experiments in Docker
- AlexisAhmed/BugBountyToolkit - A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.
- multiarch/crossbuild - 🌍 multiarch cross compiling environments
- madhuakula/hacker-container - The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Containers, Kubernetes Clusters, and Cloud Native workloads.
- masahiro331/CVE-2020-9484 -
- hexpwn/drozer-docker - Drozer (2.4.4) docker container
- hysnsec/awesome-threat-modelling - A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
- AvasDream/pentesting-dockerfiles - Pentesting/Bugbounty Dockerfiles.
- OWASP/API-Security - OWASP API Security Project
- FingerLeakers/docker-inurlbr - Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found. http://blog.inurl.c
- Xyphex/docker-mara-framework - Unofficial Docker image for MARA Framework
- OWASP/wstg - The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
- Eadom/ctf_xinetd - A docker repository for deploying pwnable challenges in CTF
- ferrarimarco/docker-pxe - A virtualized implementation of PXE supported by DNSMasq
- laradock/laradock - Full PHP development environment for Docker.
- e3net/rapidscan-docker - Docker image of rapidscan
- knqyf263/CVE-2019-6467 - CVE-2019-6467 (BIND nxdomain-redirect)
- nVentiveUX/docker-ttrss - A multiarch docker image for Tiny Tiny RSS feed reader
- davevs/dvxte - Damn Vulnerable eXtensive Training Environment
- hitian/docker-shadowsocks-with-simple-obfs - shadowsocks-libev with simple-obfs
- khs1994-docker/lnmp - 💻 🐳 🐘 🐬 🐧 🚀 Start Docker LNMP(LEMP) In less than 2 minutes Powered by Docker Compose. 让 PHP 开发者快速(一键)搭建基于容器技术(Docker、Kubernetes)的开发、测试、生产(CI/CD by Drone)
- linuxserver/docker-transmission -
- diameter/rtorrent-rutorrent - Docker container with supervisor/rtorrent/nginx/ruTorrent 64/32 bit
- MyKings/docker-vulnerability-environment - Use the docker to build a vulnerability environment
- vulhub/Dockertools - Some tools based on docker
- luodaoyi/kms-server - a docker image for kms
- johackim/docker-hacklab - My personal hacklab, create your own.
- vulhub/vulhub - Pre-Built Vulnerable Environments Based on Docker-Compose
- mikesplain/openvas-docker - A Docker container for Openvas
- jinzhu/configure - My dot files for Emacs, Openbox, XMonad, VIM, Golang, Zsh/Bash, tmux, URXVT, ArchLinux, Git, Ruby/Rails, Xbindkey, Vrome...
- kudelskisecurity/scannerl - The modular distributed fingerprinting engine
- microsoft/rest-api-fuzz-testing - REST API Fuzz Testing (RAFT): Source code for self-hosted service developed for Azure, including the API, orchestration engine, and default set of security tools (including MSR's RESTler), that enable
- jmhickman/Fetters - Port of Seatbelt in F#
- janeczku/calibre-web - 📚 Web app for browsing, reading and downloading eBooks stored in a Calibre database
- API-Security/APISandbox - Pre-Built Vulnerable Multiple API Scenarios Environments Based on Docker-Compose.
- HanHai-Space/FlowSilicon - FlowSilicon 是一个专为硅基流动 API 设计的代理服务,提供全面的 API 密钥管理、智能负载均衡、请求转发和实时监控功能。
- LtmThink/SQLRecorder - SQLRecorder是一个能够实时记录SQL语句的工具,方便代码审计时对SQL注入的实时关注。(A proxy to record all passing SQL statements.)
- playwright-community/playwright-go - Playwright for Go a browser automation library to control Chromium, Firefox and WebKit with a single API.
- vxcontrol/pentagi - ✨ Fully autonomous AI Agents system capable of performing complex penetration testing tasks
- intigriti/misconfig-mapper - Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets!
- edoardottt/favirecon - Use favicon.ico to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.
- edoardottt/pphack - The Most Advanced Client-Side Prototype Pollution Scanner
- daeuniverse/dae - eBPF-based Linux high-performance transparent proxy solution.
- MightyMoud/sidekick - Bare metal to production ready in mins; your own fly server on your VPS.
- Loyalsoldier/geoip - 🌚 🌍 🌝 GeoIP 规则文件加强版,支持自行定制 V2Ray dat 格式文件 geoip.dat、MaxMind mmdb 格式文件、sing-box SRS 格式文件、mihomo MRS 格式文件、Clash ruleset、Surge ruleset 等。Enhanced edition of GeoIP files for V2Ray, Xray-core, sing-box, Cl
- deanxv/genspark2api -
- thinkoaa/Dlam - 反连助手:发现可以映射本地端口的互联网IP,本工具可从hunter、quake、fofa等网络空间测绘平台,收集、探测互联网IP,并通过配置文件中的端口映射关系,把本地端口映射到互联网IP指定的端口,以便反弹shell等场景下使用。
- login546/httpgo - httpgo是一个web指纹识别工具,支持多线程、HTTP代理、批量识别、保存结果、截图展示。可自行添加指纹。
- xingty/rcode-go - rcode written in Go
- mostlygeek/llama-swap - transparent proxy server on demand model swapping for llama.cpp (or any local OpenAPI compatible server)
- microsoft/typescript-go - Staging repo for development of native port of TypeScript
- deanxv/hixAI2api -
- Esonhugh/k8spider - Powerful+Fast+Low Privilege Kubernetes discovery tools
- bernardo-bruning/ollama-copilot - Proxy that allows you to use ollama as a copilot like Github copilot
- DonTizi/rlama - A powerful document AI question-answering tool that connects to your local Ollama models. Create, manage, and interact with RAG systems for all your document needs.
- RedTeamPentesting/resocks - mTLS-Encrypted Back-Connect SOCKS5 Proxy
- hashicorp/vault - A tool for secrets management, encryption as a service, and privileged access management
- sammcj/gollama - Go manage your Ollama models
- mudler/LocalAI - 🤖 The free, Open Source alternative to OpenAI, Claude and others. Self-hosted and local-first. Drop-in replacement for OpenAI, running on consumer-grade hardware. No GPU required. Runs gguf, tr
- glanceapp/glance - A self-hosted dashboard that puts all your feeds in one place
- Tencent/AI-Infra-Guard - AI infrastructure security assessment tool designed to discover and detect potential security risks in AI systems.
- MartialBE/one-hub - OpenAI 接口管理 & 分发系统,改自songquanpeng/one-api。支持更多模型,加入统计页面,完善非openai模型的函数调用。
- Bearer/bearer - Code security scanning tool (SAST) to discover, filter and prioritize security and privacy risks.
- cc1a2b/JShunter - jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying sensitive data, such as API endpoints and potential security vuln
- SleepingBag945/CVE-2024-50379 - tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp
- lcvvvv/stdio - go语言GBK、UTF-8通用输出
- lcvvvv/gonmap - gonmap是一个go语言的nmap端口扫描库,使用纯go实现nmap的扫描逻辑,而非调用nmap来进行扫描。
- polite-007/Milkyway - 一款全方位扫描工具,具备高效的机器探活,端口探活,协议识别,指纹识别,漏洞扫描等功能
- yqcs/prismx - :: Prism X · Automated Enterprise Network Security Risk Detection and Vulnerability Scanning Tool / 棱镜 X · 自动化企业网络安全风险检测、漏洞扫描工具
- wjlin0/uncover - uncover( fork )
- wjlin0/pathScan - pathScan 是一个用Go编写的路径扫描、信息收集、指纹探索工具
- sensensen404/vuln-notifier - A simple Go tool to monitor Openwall oss-security mailing list
- T3nk0/CScan - CScan 是一个基于Go语言开发的网络空间资产搜索工具,支持多个主流网络空间搜索引擎:FOFA Hunter Quake,能够快速搜索IP、域名等资产信息。
- fruitbars/simple-one-api - OpenAI 接口接入适配,支持千帆大模型平台、讯飞星火大模型、腾讯混元以及MiniMax、Deep-Seek,等兼容OpenAI接口,仅单可执行文件,配置超级简单,一键部署,开箱即用. Seamlessly integrate with OpenAI and compatible APIs using a single executable for quick setup and deploy
- howmp/reality - grs内网穿透工具通过reality协议隐藏特征
- Symph0nia/CyberEdge - 互联网资产综合扫描/攻击面测绘
- wgpsec/cloudsword - 一款帮助云租户发现和测试云上风险、增强云上防护能力的综合性开源工具
- shenweiyan/WebStack-Hugo - WebStack 网址导航 Hugo 主题,无需服务器,支持导航一键配置的纯静态网址导航网站。
- pow1e/pfish - 轻量级的无害化钓鱼~
- AgonySec/fscan - fscan的魔改和一些免杀,优化了存活扫描和端口扫描的输出,更加直观舒适的使用。
- kingparks/cursor-vip - cursor IDE enjoy VIP
- projectdiscovery/urlfinder - A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.
- doxx/darkflare - DarkFlare Firewall Piercing (TCP over CDN)
- Chocapikk/CVE-2024-9474 - PAN-OS auth bypass + RCE
- go-eagle/eagle - 🦅 A Go framework for the API or Microservice
- anchordotdev/cli -
- netuseradministrator/CVE-2024-36401 - geoserver图形化漏洞利用工具
- P001water/P1soda - 一款渗透场景下的内网漏洞自动化扫描工具
- Zjackky/CodeScan - 一款轻量级匹配Sink点的代码审计扫描器,为了帮助红队过程中快速代码审计的小工具
- chainreactors/spray - 最好用最智能最可控的目录爆破工具 | The most powerful, user-friendly, intelligent, and precise HTTP buster.
- Naturehi666/searchall - 强大的敏感信息搜索工具
- YouChenJun/CheckCdn - 精确检查IP是否为CDN节点的工具
- P001water/P1finger - P1finger - 红队行动下的重点资产指纹识别工具,支持在线Web指纹识别
- alwaystest18/hostCollision - 一款host碰撞工具,做了较多的误报优化
- BitAUR/Puff - 开源、快速、便捷、基于Go的域名监控程序。
- Seven1an/SocksHunter - 一款高效的 Socks5 代理采集与使用工具
- wa1ki0g/NoAuth - java-web 自动化鉴权绕过
- wudijun/Catcher - Catcher(捕手) 重点系统指纹漏洞验证工具,适用于外网打点,资产梳理漏洞检查。
- EgeBalci/sgn - Shikata ga nai (仕方がない) encoder ported into go with several improvements
- nodauf/Go-RouterSocks - Router socks. One port socks for all the others.
- BishopFox/sj - A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.
- shixiaofeia/gopacket-http - 监听网卡流量, 过滤并组装HTTP请求和响应, 供旁路分析, 抓包等用途
- t94j0/gophish-notifier - Notification webhook for GoPhish
- musiclover789/luna - Luna-抗指纹浏览器|爬虫|防反爬虫框架|浏览器指纹|自动化浏览器|防识别|反识别|爬虫框架|自动化测试框架
- Night-Master/sdlc_golang - sdlc 是一个基于 Go 语言构建的安全漏洞示范平台,旨在促进 DevSecOps 和安全开发生命周期 (SDLC) 实践。它通过模拟常见漏洞来增强开发人员的安全意识,除了可以用于devsecops以外,还可以用于安全行业从事者学习漏洞知识或者渗透知识,代码审计,提供了一个实践和学习的环境。本项目采用了前后端分离的设计模式,其中后端利用了轻量级框架 Gin,而前端则使用了 Vue 3。
- adeljck/MS17-010 - MS17-010 Exploits With Original NSA Tool(only for windows)
- gtqbhksl/xcosx - XC+OS(操作系统)+X(X卫士)。面向xc操作系统的容器、镜像、文件系统扫描工具。支持扫描敏感信息、软件包漏洞、webshell、弱口令等问题
- wuxler/ruasec - RuaSec 是一个安全扫描工具,用于扫描镜像、代码、制品等中的安全漏洞。
- YouChenJun/Keydd - 从流量包匹配敏感信息的工具-可用作bp、浏览器的下游代理。0感知、无卡顿,支持https。
- berryalen02/PECracker - 针对PE文件的分离的攻防对抗工具,红队、研究者的好帮手。目前支持文件头伪装、证书区段感染。A no-kill confrontation tool for the separation of PE files, a good helper for red teams and researchers. Currently, file header spoofing and certificate s
- sspsec/Spear - 基于GO的渗透工具箱框架
- HackAllSec/hfinger - 一个用于web框架、CDN和CMS指纹识别的高性能命令行工具。A high-performance command-line tool for web framework, CDN and CMS fingerprinting.
- hanbufei/isCdn - 检查一个ip是否在cdn范围内
- bytedance/vArmor - vArmor is a cloud native container sandbox system based on AppArmor/BPF/Seccomp. It also includes multiple built-in protection rules that are ready to use out of the box.
- CodeSecurityTeam/frp - 基于frp-0.58.1魔改二开,随机化socks5账户密码及端口、钉钉上线下线通知、配置文件oss加密读取、域前置防止溯源、源码替换/编译混淆等
- Ackites/KillWxapkg - 自动化反编译微信小程序,小程序安全评估工具,发现小程序安全问题,自动解密,解包,可还原工程目录,支持Hook,小程序修改
- qwe1433223/EHole_magic_magic - 可以指定状态码和标题以排除不想要的数据,支持从管道符传入参数,根据cms类型来做总结输出
- trap-bytes/403jump - HTTP 403 bypass tool
- Mayter/mssql-command-tool - xp_cmdshell与sp_oacreate执行命令回显和clr加载程序集执行相应操作,上传,job等相应操作。
- fdx-xdf/darkPulse - darkPulse是一个用go编写的shellcode Packer,用于生成各种各样的shellcode loader,免杀火绒,360核晶等国内常见杀软。
- wgpsec/EndpointSearch - EndpointSearch 是一个探测云服务端点的扫描器。Endpoint Search is a sophisticated reconnaissance utility designed to discreetly identify and enumerate endpoints within cloud services.
- wgpsec/lc - LC(List Cloud)是一个多云攻击面资产梳理工具
- qi4L/qscan - 轻量化全方位扫描器
- SleepingBag945/dddd - dddd是一款使用简单的批量信息收集,供应链漏洞探测工具,旨在优化红队工作流,减少伤肝的机械性操作。支持从Hunter、Fofa批量拉取目标
- yhy0/Jie - Jie stands out as a comprehensive security assessment and exploitation tool meticulously crafted for web applications. Its robust suite of features encompasses vulnerability scanning, information gath
- INotGreen/XiebroC2 - 渗透测试C2、支持Lua插件扩展、域前置/CDN上线、自定义profile、前置sRDI、文件管理、进程管理、内存加载、截图、反向代理、分组管理
- r00tSe7en/URLPath - 批量处理url链接,获取多级路径并打印
- TryGOTry/AutoGeaconC2 - AutoGeaconC2: 一键读取Profile自动化生成geacon实现跨平台上线CobaltStrike
- sspsec/Scan-Spring-GO - 针对SpringBoot的渗透工具,Spring漏洞利用工具
- p1d3er/RemoteWebScreen - 本项目是一个远程控制应用,使用 Golang 开发,允许用户通过 Web 界面远程控制和屏幕监控其他计算机。主要功能包括屏幕共享、鼠标和键盘控制以及键盘记录。
- Pizz33/Qianji - 千机-红队免杀木马自动生成器 Bypass defender、火绒、360等国内主流杀软 随机加密混淆shellcode快速生成免杀马
- youki992/VscanPlus - [VscanPlus内外网漏洞扫描工具]已更新HW热门漏洞检测POC。基于veo师傅的漏扫工具vscan二次开发的版本,端口扫描、指纹检测、目录fuzz、漏洞扫描功能工具,批量快速检测网站安全隐患。An open-source, cross-platform website vulnerability scanning tool that helps you quickly detect web
- Ernket/ARL-Finger-ADD-Go - ARL(灯塔)批量添加指纹,支持新版(&&)和旧版(仅支持|| 或逻辑)
- corunb/Split_tools - 分割小工具,可分割木马,一键生成写入、合并、追加命令
- wjlin0/CVE-2024-23897 - CVE-2024-23897 - Jenkins 任意文件读取 利用工具
- ASkyeye/CVE-2023-21839 - Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)
- Valerian7/dns_capture -
- qi4L/Struts2Scan-go - 用golang实现的Struts2扫描工具
- Pwn3rzs/HAK5-C2-License-Toolkit - Golang tool to help in forcing a license for HAK5 C2 Tool
- zan8in/pxplan - CVE-2022-2022
- ad-calcium/CVE-2023-22515 - Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具
- z-bool/Venom-Crawler - 毒液爬行器:专为捡洞而生的爬虫神器
- ch3nnn/webstack-go - 基于 Go 开源的网址导航网站,具备完整的前后台。您可以拿来制作自己平日收藏的网址导航。
- GhostTroops/ksubdomain - 子域名爆破,增加了智能爬虫功能
- Tp0t-Team/Tp0tOJ - A CTF online judge platform developed by Tp0t.
- l3yx/Choccy - GitHub项目监控 && CodeQL自动扫描 (GitHub project monitoring && CodeQL automatic analysis)
- BBD-YZZ/hvv2023check - 2023hvv期间部分爆出漏洞的辅助扫描工具
- X1r0z/ActiveMQ-RCE - ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具
- qiwentaidi/Slack - 安全服务集成化工具平台,希望能帮助你少开几个应用测试
- wux1an/wxapkg - 微信小程序反编译工具,.wxapkg 文件扫描 + 解密 + 解包工具
- ttstormxx/lineadd - lineadd 渗透测试字典管理工具, 让字典管理生活轻松一点。Penetration test dictionary management tool, make dictionary management life a little easier.
- Mustard404/AceofHearts - 红桃A(AceofHearts)是一款专为渗透测试人员设计的实用工具,旨在简化渗透测试环境的搭建过程并提供便捷的部署解决方案。
- anchore/harbor-scanner-adapter - Harbor Scanner Adapter for Anchore Engine and Enterprise
- fin3ss3g0d/evilgophish - evilginx3 + gophish
- NHAS/reverse_ssh - SSH based reverse shell
- wjlab/Darksteel - 域内自动化信息搜集利用工具
- gdy666/lucky - 软硬路由公网神器,ipv6/ipv4 端口转发,反向代理,DDNS,WOL,ipv4 stun内网穿透,cron,acme,阿里云盘,ftp,webdav,filebrowser
- ZhuriLab/Yi - 项目监控工具 以及 Codeql 自动运行
- redhuntlabs/BucketLoot - BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for custom keywords as well as Regular Expressions from publicly-exp
- qi4L/seeyonerExp - 致远OA利用工具
- novysodope/fupo_for_yonyou - 用友漏洞检测,持续更新漏洞检测模块
- lemonlove7/EHole_magic - EHole(棱洞)魔改。可对路径进行指纹识别;支持识别出来的重点资产进行漏洞检测(支持从hunter和fofa中提取资产)支持对ftp服务识别及爆破
- zhaoyumi/WeaverExploit_All - 泛微最近的漏洞利用工具(PS:2023)
- STRRL/cloudflare-tunnel-ingress-controller - 🚀 Expose the website directly into the internet! The Kuberntes Ingress Controller based on Cloudflare Tunnel.
- adeljck/QAX_VPN_Crack - 奇安信VPN任意用户密码重置
- chaitin/blazehttp - BlazeHTTP 是一款简单易用的 WAF 防护效果测试工具。BlazeHTTP stands as a user-friendly WAF protection efficacy evaluation tool.
- chainreactors/gogo - 面向红队的, 高度可控可拓展的自动化引擎
- yhy0/ChYing - 承影 - 一款安全工具箱,集成了目录扫描、JWT、Swagger 测试、编/解码、轻量级 BurpSuite、杀软辅助功能
- whoissecure/yaset - Yet Another Subdomain Enumeration Tool, a template based tool to enumerate subdomains passively.
- piaolin/DetectDee - DetectDee: Hunt down social media accounts by username, email or phone across social networks.
- kunwu2023/kunwu - kunwu是新一代webshell检测引擎,使用了内置了模糊规则、污点分析模拟执行、机器学习三种高效的检测策略
- yusinomy/Rpcon - 内网横向利用工具,用于ssh wmiexec等常规服务,也可以当作一个数据库执行命令工具
- Hel10-Web/Databasetools - 一款用Go语言编写的数据库自动化提权工具,支持Mysql、MSSQL、Postgresql、Oracle、Redis数据库提权、命令执行、爆破以及ssh连接
- praetorian-inc/NTLMRecon - A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.
- praetorian-inc/fingerprintx - Standalone utility for service discovery on open ports!
- 1dayluo/subnya - 基于go语言和subfinder实现的用配置文件自定义配置,并以数据库方式跟踪记录子域名的新增减少| A new subdomain monitor tool!
- minio/simdjson-go - Golang port of simdjson: parsing gigabytes of JSON per second
- ConnectAI-E/feishu-openai - 🎒 飞书 ×(GPT-4 + GPT-4V + DALL·E-3 + Whisper)= 飞一般的工作体验 🚀 语音对话、角色扮演、多话题讨论、图片创作、表格分析、文档导出 🚀
- sari3l/notify - 各端、平台快速消息通知程序,支持配置文件形式或API调用
- adminlove520/Poc-Monitor_v1.0.1 - 威胁情报-漏洞存储库
- kost/dnstun - DNS tunnel library in Go
- kost/chashell - Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
- zan8in/pyxis - pyxis can automatically identify http and https requests, and get response headers, status codes, response size, response time, tools for fingerprinting (favicon has, service, CMS, framework, etc.)
- xiao-zhu-zhu/noterce - 一种另辟蹊径的免杀执行系统命令的木马
- Ggasdfg321/SmallProxyPool - 一个免费高质量的小代理池,解决一些站点有WAF的情况下,进行目录扫描或者字典爆破
- chushuai/wscan - Wscan is a web security scanner that focuses on web security, dedicated to making web security accessible to everyone.
- AbelChe/evil_minio - EXP for CVE-2023-28434 MinIO unauthorized to RCE
- Kento-Sec/chatGPT-CodeReview - 这是一个调用chatGPT进行代码审计的工具
- Mob2003/rakshasa - 基于go编写的跨平台、稳定、隐秘的多级代理内网穿透工具
- zema1/watchvuln - 一个高价值漏洞采集与推送服务 | collect valueable vulnerability and push it
- nirsarkar/vscan -
- ifacker/cscan-go - cscan-go 版本,主要用于C段扫描,信息收集、红队横向渗透等...(相信我,点进来不会后悔的!)
- mmM1ku/Mscan - Mscan是一款基于go语言开发的内网资产探测工具。
- jhaddix/awsScrape - A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.
- vitorfhc/queryxss - Tool for testing reflections in the HTTP responses
- corunb/Dirscan - Dirscan是一款由go编写的高性能、高并发的目录扫描器,现在已经支持GET、HEAD、递归扫描、代理、爬虫等功能功能,后续努力实现更多功能。
- taythebot/archer - Distributed network and vulnerability scanner
- qi4L/Ysoserial-go - A Go library for generating Java deserialization payloads.
- godzeo/go-gin-vul - GO语言漏洞靶场 GIN框架 支持docker一键启动
- xiaoyaochen/yscan - yscan是一款基于go写的端口扫描工具,集masscan+nmap+wappalyzer+证书于一体
- rustgopy/RGPScan - 红队渗透测试、内网资产探测、通用漏洞扫描、弱口令爆破
- XinRoom/go-portScan - High-performance port scanner. 高性能端口扫描器. syn scanner
- vitorfhc/hacks - Collection of scripts that I use while bug hunting
- SeeFlowerX/estrace - 基于eBPF的syscall追踪工具,适用于安卓平台
- kost/tty2web - Share your terminal as a web application in bind/reverse mode
- zt2/uncover-turbo - 一个简单的测绘引擎巴别塔
- SpenserCai/GoWxDump - SharpWxDump的Go语言版。微信客户端取证,获取信息(微信号、手机号、昵称),微信聊天记录分析(Top N聊天的人、统计聊天最频繁的好友排行、关键词列表搜索等)
- HZzz2/go-shellcode-loader - GO免杀shellcode加载器混淆AES加密
- Aur0ra-m/APIKiller - API Security DAST & Oprations
- WAY29/pocV - Compatible with xray and nuclei poc framework
- djun/wechatbot - 为个人微信接入ChatGPT
- ExpLangcn/EPScan - 被动收集资产并自动进行SQL注入检测(插件化 自动Bypass)、XSS检测、RCE检测、敏感信息检测
- pingc0y/go_proxy_pool - 无环境依赖开箱即用的代理IP池
- dhn/udon - A simple tool that helps to find assets/domains based on the Google Analytics ID.
- musana/mx-takeover - mx-takeover focuses DNS MX records and detects misconfigured MX records.
- google/kctf - kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see
- TD0U/WeaverScan - 泛微oa漏洞利用工具
- optiv/Ivy - Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environment t
- trickest/mkpath - Make URL path combinations using a wordlist
- Goqi/Ni - Ni-nuclei二开
- niudaii/crack - 弱口令爆破工具。Weak Password Blaster Tool.
- musana/fuzzuli - fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.
- sh1yan/Lscan - 一款内网快速打点的辅助性扫描工具,方便红队人员在内网横向移动前期的信息搜集、漏洞探测利用环节的工作开展。其工具特性主要为支持一键化三个档位的便捷式信息与漏洞扫描或每个功能模块单独式扫描探测功能。
- seventeenman/Forest - 基于frp(0.44.0)二次开发,删除不必要功能,加密配置文件,修改流量以及文件特征
- Goqi/Erfrp - Erfrp-frp二开-免杀与隐藏
- getanteon/anteon - Anteon (formerly Ddosify) - Effortless Kubernetes Monitoring and Performance Testing. Available on CLI, Self-Hosted, and Cloud
- kubesphere/kubeeye - KubeEye aims to find various problems on Kubernetes, such as application misconfiguration, unhealthy cluster components and node problems.
- rix4uni/subdog - subdog is a subdomain enumeration tools, this tool collect number of different sources to create a list of root subdomains
- edoardottt/csprecon - Discover new target domains using Content Security Policy
- wgpsec/CreateHiddenAccount - A tool for creating hidden accounts using the registry || 一个使用注册表创建隐藏帐户的工具
- hanc00l/pocGoby2Xray - 将Goby的json格式Poc转为xray的yaml格式Poc
- niudaii/zpscan - 一个有点好用的信息收集工具。A somewhat useful information gathering tool.
- ChineseSubFinder/ChineseSubFinder - 自动化中文字幕下载。字幕网站支持 shooter、xunlei、arrst、a4k、SubtitleBest 。支持 Emby、Jellyfin、Plex、Sonarr、Radarr、TMM
- sea-team/gofound - GoFound GoLang Full text search go语言全文检索引擎,毫秒级查询。 使用http接口调用,集成Admin管理界面,任何系统都可以使用。
- Lengso/iplookup - IP反查域名
- HavocFramework/Havoc - The Havoc Framework
- Ptkatz/OrcaC2 - OrcaC2是一款基于Websocket加密通信的多功能C&C框架,使用Golang实现。
- Schira4396/VcenterKiller - 一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接
- ItsIgnacioPortal/hacker-scoper - Automagically filter URLs with Bug Bounty program scope rules scraped from the internet.
- ffffffff0x/gendict - 字典生成工具
- MY0723/goby-poc - 451个goby poc,是否后门及重复自行判断,来源于网络收集的Goby&POC,不定时更新。
- chenjiandongx/bpfpinger - 🚥 A high-performance ICMP ping implementation build on top of BPF technology.
- lzzbb/Adinfo - 域信息收集工具
- Ciyfly/microwaveo - 将dll exe 等转成shellcode 最后输出exe 可定制加载器模板 支持白文件的捆绑 shellcode 加密
- Peony2022/shiro_killer - 批量ShiroKey检测爆破工具
- a1phaboy/MenoyGone - Attack cobalt strike server’s FCS by DoW
- 360quake/quake_go - Quake Command-Line Application With Golang
- CTF-MissFeng/mysql-check - mysql蜜罐检查小工具,输出mysql认证及认证后交互数据
- c3l3si4n/godeclutter - Declutters URLs in a fast and flexible way, for improving input for web hacking automations such as crawlers and vulnerability scans.
- TideSec/GoBypassAV - 整理了基于Go的16种API免杀测试、8种加密测试、反沙盒测试、编译混淆、加壳、资源修改等免杀技术,并搜集汇总了一些资料和工具。
- wenxi-3000/YNM3000 - 要你命三千,集多种渗透工具于一身的终极武器霸王。
- LubyRuffy/rproxy - 自动化的代理服务器
- boy-hack/ksubdomain - Subdomain enumeration tool, asynchronous dns packets, use pcap to scan 1600,000 subdomains in 1 second
- trickest/mksub - Generate tens of thousands of subdomain combinations in a matter of seconds
- pingc0y/URLFinder - 一款快速、全面、易用的页面信息提取工具,可快速发现和提取页面中的JS、URL和敏感信息。
- RedTeamPentesting/pretender - Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.
- redhuntlabs/HTTPLoot - An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code of sites.
- j5s/accelerator - Use Golang to batch analyze class files for Java security research
- mstxq17/MoreFind - 一款用于快速导出URL、Domain和IP的小工具
- u21h2/nacs - 事件驱动的渗透测试扫描器 Event-driven pentest scanner
- safe6Sec/GolangBypassAV - 研究利用golang各种姿势bypassAV
- merlinepedra25/SCA4ALL -
- code-scan/Goal - Goal Go Red-Team 工具类
- jmoiron/sqlx - general purpose extensions to golang's database/sql
- inbug-team/SweetBabyScan - Red Tools 渗透测试
- GhostTroops/scan4all - Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
- daffainfo/apiguesser - Go script to guess an API key / OAuth token found during pentest. CLI version of https://github.com/daffainfo/apiguesser-web/
- 0xsha/ChainWalker - Rapid Smart Contract Crawler
- shadowabi/AutoDomain - 自动提取主域名/IP,并调用fofa、quake、hunter等网络资产测绘系统搜集子域名,可配合指纹扫描工具达到快速资产整理
- burpheart/cdnlookup - 一个使用 Edns-Client-Subnet(ECS) 遍历智能CDN节点IP地址的工具
- 779789571/rsasZipToExcel - RSAS绿盟科技漏洞扫描html报告转excel
- TryGOTry/edit-gencon - geacon:简单适配了一个profile配置文件,可直接拿来修改使用,用于cs上线linux.
- RicterZ/CVE-2021-3560-Authentication-Agent - PolicyKit CVE-2021-3560 Exploit (Authentication Agent)
- ofasgard/ungoliant - A web reconnaissance tool that proxies its results through Burp or ZAP.
- patrickhener/gonh - Nessus Parser and query tool written in go
- wikiZ/RedGuard - RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.
- alexbakker/log4shell-tools - Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046
- kubernetes/minikube - Run Kubernetes locally
- tangxiaofeng7/zsxq_notice - 知识星球提醒
- GDATASoftwareAG/vaas - Verdict-as-a-Service SDKs: Analyze files for malicious content
- zan8in/afrog - A Security Tool for Bug Bounty, Pentest and Red Teaming.
- deatil/lakego-admin - lakego-admin 是使用 gin、JWT 和 RBAC 的前后端分离的 go 后台管理系统。An admin api system with gin, JWT and RBAC.
- yarox24/EvtxHussar - Initial triage of Windows Event logs
- LubyRuffy/gofofa - fofa client in Go
- Yihsiwei/GoFileBinder - golang免杀捆绑器
- TryGOTry/xray_free_crack - xray_free_crack,通用xray白嫖高级版.
- chroblert/jishell - jishell - A powerful modern CLI and SHELL,with a msfconsole-like style
- optionalCTF/SSOh-No - User enumeration and password spraying tool for testing Azure AD
- openclarity/openclarity - OpenClarity is an open source tool built to enhance security and observability of cloud native applications and infrastructure
- 1ight-2020/GoRottenTomato - Go实现部分Rubeus功能,可执行asktgt, asktgs, s4u, describe ticket, renew ticket, asreproast等
- cloudflare/ebpf_exporter - Prometheus exporter for custom eBPF metrics
- sealerio/sealer - Build, Share and Run Both Your Kubernetes Cluster and Distributed Applications (Project under CNCF)
- redcode-labs/GoSH - Golang reverse/bind shell generator
- s4hm4d/shodanidb - Fetch data (open ports, CVEs, CPEs, ...) from shodan internetDB API
- alanEG/Gosna - Dynamic url monitor
- cycraft-corp/Prometheus-Decryptor - Prometheus-Decryptor is a project to decrypt files encrypted by Prometheus ransomware.
- sourque/louis - Linux EDR written in Golang and based on eBPF.
- snehshah22/DNS_poison_attack - On-path DNS poisoning attack tool.
- Ciyfly/woodpecker - 兼容xray nuclei yaml格式 以及go代码格式的poc验证扫描器
- ac0d3r/xssfinder - Browser-based XSS finder
- xwjdsh/manssh - Manage your ssh alias configs easily.
- SummerSec/SpringExploit - 🚀 一款为了学习go而诞生的漏洞利用工具
- ExpLangcn/Aopo - 内网自动化快速打点工具|资产探测|漏洞扫描|服务扫描|弱口令爆破
- hakluke/hakoriginfinder - Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!
- mittwald/kubernetes-replicator - Kubernetes controller for synchronizing secrets & config maps across namespaces
- AlphabugX/Alphalog - DNSLOG、httplog、rmilog、ldaplog、jndi 等都支持,完全匿名 产品(fuzz.red),Alphalog与传统DNSLog不同,更快、更安全。
- ipfs/kubo - An IPFS implementation in Go
- j3ssie/cdnstrip - Striping CDN IPs from a list of IP Addresses
- ferreiraklet/airixss - Finding XSS during recon
- chaosblade-io/chaosblade - An easy to use and powerful chaos engineering experiment toolkit.(阿里巴巴开源的一款简单易用、功能强大的混沌实验注入工具)
- fuxiaohei/pugo - a simple site generator
- hakluke/hakip2host - hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.
- yuyan-sec/RedisEXP - Redis 漏洞利用工具
- lal0ne/vulnerability - 收集、整理、修改互联网上公开的漏洞POC
- google/licensecheck - The licensecheck package classifies license files and heuristically determines how well they correspond to known open source licenses.
- step-security/secure-repo - Orchestrate GitHub Actions Security
- brokercap/Bifrost - Bifrost ---- 面向生产环境的 MySQL,MariaDB,kafka 同步到Redis,MongoDB,ClickHouse,StarRocks,Doris,Kafka等服务的异构中间件
- learnerLj/geth-analyze - go-ethereum source code analyzation under the perspective of smart contract security
- sjatsh/unwxapkg - WeChat applet .wxapkg decoding tool
- wfinn/redirex - tool that generates bypasses for open redirects
- wfinn/ucors - tool that scans for CORS bypasses
- m0n1x90/ADReaper - A fast enumeration tool for Windows Active Directory Pentesting written in Go
- six2dez/ipcdn - Check which CDN providers an IP list belongs to
- atsud0/frp-modify - frp0.38.1 支持域前置、远程加载配置文件、配置文件自删除、流量特征修改
- threatcl/threatcl - Documenting your Threat Models with HCL
- utkusen/wholeaked - a file-sharing tool that allows you to find the responsible person in case of a leakage
- corazawaf/coraza - OWASP Coraza WAF is a golang modsecurity compatible web application firewall library
- firefart/stunner - Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers.
- common-fate/granted - The easiest way to access your cloud.
- timwhitez/gobusterdns - lite version of gobuster. Only subdomain brute. 内网轻量化子域名爆破工具
- brentp/gargs - better(?) xargs in go
- ZhuriLab/Starmap - 一个轮子融合的子域名收集小工具
- utkusen/socialhunter - crawls the website and finds broken social media links that can be hijacked
- ma111e/melody - Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulation.
- ferreiraklet/Jeeves - Jeeves SQLI Finder
- codeyourweb/fastfinder - Incident Response - Fast suspicious file finder
- deepfence/PacketStreamer - ⭐ ⭐ Distributed tcpdump for cloud native environments ⭐ ⭐
- tmoneypenny/conspirator - An enhanced collaborator-like standalone server
- takshal/freq - This is go CLI tool for send fast Multiple get HTTP request.
- MrTuxx/OffensiveGolang - A collection of offensive Go packages inspired by different Go repositories.
- mytechnotalent/turbo-attack - A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numbers to a particular IP and port.
- mitchellh/golicense - Scan and analyze OSS dependencies and licenses from compiled Go binaries
- AlistGo/alist - 🗂️A file list/WebDAV program that supports multiple storages, powered by Gin and Solidjs. / 一个支持多存储的文件列表/WebDAV程序,使用 Gin 和 Solidjs。
- damit5/gitdorks_go - 一款在github上发现敏感信息的自动化收集工具
- s0md3v/Smap - a drop-in replacement for Nmap powered by shodan.io
- ahhh/Ducky_Maker - A fun script to teach automation and create ducky scripts, from existing scripts or ASCII art files
- lithammer/fuzzysearch - 🐷 Tiny and fast fuzzy search in Go
- murphysecurity/murphysec - An open source tool focused on software supply chain security. 墨菲安全专注于软件供应链安全,具备专业的软件成分分析(SCA)、漏洞检测、专业漏洞库。
- pry0cc/tew - A quick ‘n dirty nmap parser written in Golang to convert nmap xml to IP:Port notation.
- binodlamsal/zerophish - Zero phish phishing simulated platform
- YaoApp/yao - ✨ Yao is an all-in-one application engine that enables developers to create web apps, REST APIs, business applications, and more, with AI as a development partner.
- Azure/AzureDefender-K8S-InClusterDefense -
- hudangwei/codemillx - codemillx is a tool for CodeQL, extract the comments in the code and generate codeql module. 强化Go开源项目安全检测(内含开源项目漏洞挖掘方法)
- zombiezen/go-sqlite - Low-level Go interface to SQLite 3
- j3ssie/sdlookup - IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io
- wumansgy/goEncrypt - go语言封装的各种对称加密和非对称加密,可以直接使用,包括3重DES,AES的CBC和CTR模式,还有RSA非对称加密,ECC椭圆曲线的加密和数字签名
- chaitin/veinmind-tools - veinmind-tools 是由长亭科技自研,基于 veinmind-sdk 打造的容器安全工具集
- projectdiscovery/uncover - Quickly discover exposed hosts on the internet using multiple search engines.
- JustinTimperio/gomap - A fully self-contained Nmap like parallel port scanning module in pure Golang that supports SYN-ACK (Silent Scans)
- bytedance/godlp - sensitive information protection toolkit
- goreleaser/goreleaser - Release engineering, simplified
- tidwall/gjson - Get JSON values quickly - JSON parser for Go
- p7e4/dnsearch - using rapid7 open dns data search subdomain and reverse ip
- lprat/spyre - simple YARA-based IOC scanner (Forked project Spyre)
- bufsnake/aiqicha - 基于无头浏览器查询 爱企查 内的企业信息
- ffffffff0x/ones - 可用于多个网络资产测绘引擎 API 的命令行查询工具
- wagoodman/dive - A tool for exploring each layer in a docker image
- hahwul/authz0 - 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.
- Kevin-fqh/learning-k8s-source-code - k8s、docker源码分析、读书笔记
- nezhahq/nezha -
Self-hosted, lightweight server and website monitoring and O&M tool
- chroblert/JSigThief - Golang 版SigThief
- DataDog/stratus-red-team - ☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
- trufflesecurity/driftwood - Private key usage verification
- mhmdiaa/second-order - Second-order subdomain takeover scanner
- devploit/nomore403 - Tool to bypass 403/40X response codes.
- Le0nsec/SecCrawler - 一个方便安全研究人员获取每日安全日报的爬虫和推送程序,目前爬取范围包括先知社区、安全客、Seebug Paper、跳跳糖、奇安信攻防社区、棱角社区以及绿盟、腾讯玄武、天融信、360等实验室博客,持续更新中。
- feiyu563/nbping - nbping是为解决局域网大批量IP实例或主机探活,采用go协程并发处理,可以自定义并发的协程数量和输出结果.效率远高于现有的批量ping工具.
- antonmedv/fx - Terminal JSON viewer & processor
- wallarm/gotestwaf - An open-source project in Golang to asess different API Security tools and WAF for detection logic and bypasses
- kenjoe41/goSubsWordlist - Generate wordlist from already collected subdomains for bruteforcing purposes.
- aau-network-security/riotpot - IoT and Operational Technology Honeypot
- busterb/msmailprobe - Office 365 and Exchange Enumeration
- timwhitez/Doge-Gabh - GetProcAddressByHash/remap/full dll unhooking/Tartaru's Gate/Spoofing Gate/universal/Perun's Fart/Spoofing-Gate/EGG/RecycledGate/syswhisper/RefleXXion golang implementation
- wgpsec/ENScan_GO - 一款基于各大企业信息API的工具,解决在遇到的各种针对国内企业信息收集难题。一键收集控股公司ICP备案、APP、小程序、微信公众号等信息聚合导出。
- sairson/Yasso - 强大的内网渗透辅助工具集-让Yasso像风一样 支持rdp,ssh,redis,postgres,mongodb,mssql,mysql,winrm等服务爆破,快速的端口扫描,强大的web指纹识别,各种内置服务的一键利用(包括ssh完全交互式登陆,mssql提权,redis一键利用,mysql数据库查询,winrm横向利用,多种服务利用支持socks5代理执行)
- bufsnake/blueming - 备份文件扫描,并自动进行下载
- fiatjaf/jiq - jid on jq - interactive JSON query tool using jq expressions
- phith0n/zkar - ZKar is a Java serialization protocol analysis tool implement in Go.
- shmilylty/netspy - netspy是一款快速探测内网可达网段工具(深信服深蓝实验室天威战队强力驱动)
- binganao/golang-shellcode-bypassav - 2021.12.9 使用go语言免杀360、微软、腾讯、火绒
- google/log4jscanner - A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.
- xiecat/fofax - FOFAX是一个基于fofa.info的API命令行查询工具
- Hackmanit/Web-Cache-Vulnerability-Scanner - Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/).
- ariary/TrojanSourceFinder - 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)
- 1ultimat3/tld-scan - Top level domain scanner in Go
- ravro-ir/log4shell-looker - log4jshell vulnerability scanner for bug bounty
- N0MoreSecr3ts/wraith - Uncover forgotten secrets and bring them back to life, haunting security and operations teams.
- panjf2000/gnet - 🚀 gnet is a high-performance, lightweight, non-blocking, event-driven networking framework written in pure Go.
- freshcn/qqwry - 纯真ip库的golang服务
- wolfeidau/golang-massl - Simple examples of configuring mutual authentication (MASSL)
- LeakIX/l9fuzz - Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload
- hupe1980/scan4log4shell - Scanner to send specially crafted requests and catch callbacks of systems that are impacted by log4j log4shell vulnerability and to detect vulnerable log4j versions on your local file-system
- nodauf/GoMapEnum - User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin
- ariary/fileless-xec - Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,...)
- mmcdole/gofeed - Parse RSS, Atom and JSON feeds in Go
- palantir/log4j-sniffer - A tool that scans archives to check for vulnerable log4j versions
- 0xInfection/LogMePwn - A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.
- proferosec/log4jScanner - log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services
- veo/vscan - 开源、轻量、快速、跨平台 的网站漏洞扫描工具,帮助您快速检测网站安全隐患。功能 端口扫描(port scan) 指纹识别(fingerprint) 漏洞检测(nday check) 智能爆破 (admin brute) 敏感文件扫描(file fuzz)
- 40a/go-powershell - Go wrapper for running PowerShell sessions
- containers/podman - Podman: A tool for managing OCI containers and pods.
- A-D-Team/grafanaExp - A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins / extract secret_key / decrypt data_source info automatic.
- imgproxy/imgproxy - Fast and secure standalone server for resizing and converting remote images
- dvyukov/go-fuzz - Randomized testing for Go
- 0xInfection/PewSWITCH - A FreeSWITCH specific scanning and exploitation toolkit for CVE-2021-37624 and CVE-2021-41157.
- CTF-MissFeng/jsForward - 解决web及移动端H5数据加密Burp调试问题
- jas502n/Grafana-CVE-2021-43798 - Grafana Unauthorized arbitrary file reading vulnerability
- shirdonl/goWebActualCombat - 🔥🔥🔥🔥🔥🔥重磅!《Go Web编程实战派从入门到精通》随书源码开源啦,Go语言/Web开发/高并发/微服务/Gin/Redis/MongoDB/并发编程/Docker源码!欢迎star~