Lists (2)
Sort Name ascending (A-Z)
Stars
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
A little tool to play with Windows security
microsoftarchive / redis
Forked from redis/redisRedis is an in-memory database that persists on disk. The data model is key-value, but many different kind of values are supported: Strings, Lists, Sets, Sorted Sets, Hashes
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…
Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, S390x, TriCore, X86)
windows-kernel-exploits Windows平台提权漏洞集合
chsrc 全平台通用换源工具与框架. Change Source everywhere for every software
linux-kernel-exploits Linux平台提权漏洞集合
A tool to dump the login password from the current linux user
A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and re…
Hide a process under Linux using the ld preloader (https://sysdig.com/blog/hiding-linux-processes-for-fun-and-profit/)
A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability.
Tool for extracting information from newly spawned processes
一个利用OneForAll进行子域收集、Shodan API端口扫描、Xray漏洞Fuzz、Server酱的自动化漏洞扫描、即时通知提醒的漏洞挖掘辅助工具
[Linux] Two Privilege Escalation techniques abusing sudo token
Windows 10 UAC bypass for all executable files which are autoelevate true .
Repo for FUZE project. I will also publish some Linux kernel LPE exploits for various real world kernel vulnerabilities here. the samples are uploaded for education purposes for red and blue teams.
Fast Conversion Windows Dynamic Link Library To ShellCode
The vm images in this repo are lost, we recommend our new project: https://github.com/hust-open-atom-club/S2VulnHub
jon 是一款LINUX系统攻防工具箱,包含扫描,入侵,痕迹清理,木马,网站测试等各种黑客工具。Jon is a toolbox of Linux, including scanning, intrusion, trace cleaning, Trojan horse, website testing and other hacker tools.
a PoC for Linux to get around agents that log commands being executed, without root privilege. Linux低权限模糊化执行的程序名和参数,避开基于execve系统调用监控的命令日志