Stars
🚀 SQL Server automation and instance migrations have never been safer, faster or freer
Versão mais simples e compacta da famosa sp_WhoIsActive do Adam Machanic.
Open security analytics. Understand, monitor, and protect your product from cyber threats, account takeovers, bots, and abuse.
🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications
coffeegist / bofhound
Forked from fortalice/bofhoundGenerate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel
ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making it very hard to track your online activity, IP address, and l…
Self-hosted tiny web C2 framework for dynamically managing PowerShell/BashScript payloads and collecting exfiltrated data
BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python-based tool leverages Selenium and Selenium-Wire to automate…
ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing, and command & control attacks through an intuitive graphica…
Espressif IoT Development Framework. Official development framework for Espressif SoCs.
ESP8266 based WiFi implant to remotely track the presence of certain people or devices via a simple web interface
An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.
Automated Multi UAC BYPASS for win10|win11|win12-pre-release|ws2019|ws2022
Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.
A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse shell connection with a target system. Use responsibly for e…
Custom Created Hardware ID Spoofer to Bypass Hardware or IP Bans
ESP32 Network Toolbox Scripts
针对(CVE-2023-0179)漏洞利用 该漏洞被分配为CVE-2023-0179,影响了从5.5到6.2-rc3的所有Linux版本,该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。
Send arbitrary IEEE 802.11 frames with Espressif's ESP32
Exploring possibilities of ESP32 platform to attack on nearby Wi-Fi networks.