Lists (1)
Sort Name ascending (A-Z)
Stars
Practical labs, notes, and reports for CEH v13 modules — covering web hacking, network pentesting, malware analysis, social engineering, and security tool usage.
Z3r0S3v3n / hexstrike-ai
Forked from 0x4m4/hexstrike-aiHexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity tools for automated pentesting, vulnerability discovery, bug b…
Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.
Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router
Generate Brainrot Content with Python for TikTok, Instagram and YouTube
Best DDoS attack simulation environment with comprehensive attack vectors, AI service targeting, and fully customizable botnet topologies. Research, test, and visualize modern DDoS attacks in a con…
SD Web UI Extension for Run Command Manually
Invoke is a leading creative engine for Stable Diffusion models, empowering professionals, artists, and enthusiasts to generate and create visual media using the latest AI-driven technologies. The …
Stable Diffusion web UI
Learn the fundamentals of cloud computing
An OOB interaction gathering server and client library
OS Command Injection Vulnerability Payload List
CVE-2022-2639 Linux kernel openvswitch local privilege escalation
Bypass firewall for traffic forwarding using webshell
This application was created as a POC for how to scan your local network traffic for HTTP requests and then inject various javascript cryptocurrency miners into the response payloads
sshchecker is a fast dedicated ssh brute-forcing tool to check ssh login on the giving IP list.
Exploits | MIRAI AND SCANNERS | Layer4 Methods | Layer7 Methods | UDP METHODS | TCP METHODS | BRUTERS | VULN | LISTS
Una recopilacion de botnets, para poder analizarlas
A Simple Multi-Threaded SSH Brute Forcer
Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.
Declarative Continuous Deployment for Kubernetes
JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP Server, RMI Server and LDAP Server to exploit java web apps v…
OpenBullet2Python using code from OpenBullet
Various tips & tricks
🌍 Decentralized, peer-to-peer and secure overlay networks