Skip to content
View jdsecurity's full-sized avatar
  • New York

Block or report jdsecurity

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

A python reverse shell that uses DNS as the c2 channel

Python 2 Updated Oct 10, 2015

SQLI labs to test error based, Blind boolean based, Time based.

PHP 5,670 1,552 Updated Dec 11, 2023

Defund the Police.

13,279 2,656 Updated Jun 7, 2024

HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux

C 2,910 574 Updated Feb 24, 2025

BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal computers.

Perl 332 121 Updated Apr 19, 2017

Official archive of https://code.google.com/p/cryptospecs/

C 77 32 Updated Jun 26, 2019

A simple tool to convert the IP to a DWORD IP

C 142 45 Updated Jul 29, 2022

I found these using archive.org on some site. I didn't write them though.

Groff 29 17 Updated Apr 17, 2015

Source code to the Malicious Demon Hunter Exploit Kit

PHP 58 31 Updated Jun 26, 2015

Web crawler based on C++.

C++ 3 1 Updated Aug 31, 2016

A linux system call fuzzer using TriforceAFL

C 177 60 Updated Feb 28, 2024

Attack Surface Management Platform

Shell 9,283 2,005 Updated Sep 27, 2025

A curated list of awesome infosec courses and training resources.

1 Updated Apr 25, 2016

A curated list of awesome Hacking tutorials, tools and resources

1 Updated Jun 7, 2016

😎 Awesome lists about all kinds of interesting topics

424,182 32,655 Updated Nov 22, 2025
Python 3 2 Updated Apr 28, 2016

Faker is a PHP library that generates fake data for you

PHP 11 4 Updated May 5, 2016

A Ruby framework designed to aid in the penetration testing of WordPress systems.

Ruby 1,039 264 Updated Nov 24, 2019

Initial Collection of HackingTeam Exploits

HTML 93 55 Updated Jul 7, 2015

rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like other simple GET based backdoor but the only difference is …

PHP 26 3 Updated May 12, 2016

SQL Vulnerability Scanner

Ruby 982 233 Updated Jan 11, 2018

Exploitation Framework for Embedded Devices

Python 12,883 2,371 Updated Jun 10, 2025

This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public expl…

Python 4,157 1,047 Updated May 11, 2023

从零开始内网渗透学习

3,000 991 Updated Apr 8, 2016

Harmlessly goof up your co-workers browser and chrome dev tools

CSS 1,272 126 Updated Mar 27, 2019

爆破字典

Python 5,234 2,883 Updated Mar 21, 2022

收集各种各样的exp

PHP 3 Updated Aug 20, 2015

A PoC backdoor that uses Gmail as a C&C server

Python 1,344 422 Updated Nov 16, 2018

👀 Linux kernel mode debugfs keylogger

C 672 81 Updated Apr 15, 2022

python-pentesting-tool

HTML 186 78 Updated Dec 27, 2022
Next