Stars
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
UNIX-like reverse engineering framework and command-line toolset
A little tool to play with Windows security
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
Small and highly portable detection tests based on MITRE's ATT&CK.
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…
A repository for learning various heap exploitation techniques.
ZMap is a fast single packet network scanner designed for Internet-wide network surveys.
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
A tool to dump the login password from the current linux user
A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digi…
A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and re…
A minimal but powerful thread pool in ANSI C
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
A post exploitation framework designed to operate covertly on heavily monitored environments
Fileless lateral movement tool that relies on ChangeServiceConfigA to run command
A little toolbox to play with Microsoft Kerberos in C
Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)
Tool for extracting information from newly spawned processes