Skip to content
View samyoyo's full-sized avatar

Block or report samyoyo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

SharpSploit is a .NET post-exploitation library written in C#

C# 1 Updated Sep 22, 2018

SharpSploit is a .NET post-exploitation library written in C#

C# 1,840 317 Updated Aug 12, 2021

Python based Remote Administration Tool(RAT)

Python 92 111 Updated May 25, 2020
Python 3 Updated Aug 6, 2018

0day-mikrotik is a security tool designed to identify and exploit vulnerabilities in MikroTik routers, enabling security researchers to assess the resilience of their network infrastructure.

Python 117 66 Updated Sep 29, 2024

A PoC Java Stager which can download, compile, and execute a Java file in memory.

Java 1 Updated Aug 6, 2018

A PoC Java Stager which can download, compile, and execute a Java file in memory.

Java 108 30 Updated Aug 6, 2018

GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.

C 4 1 Updated Aug 28, 2018

GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.

C 335 114 Updated Mar 6, 2019

advanced network reconnaissance toolkit

Python 3 2 Updated Aug 29, 2018

network reconnaissance toolkit

Python 431 94 Updated Dec 17, 2018

Information Gathering tool for a Website or IP address

Python 4 2 Updated Aug 27, 2018

The most complete Phishing Tool, with 32 templates +1 customizable

HTML 6 2 Updated Aug 2, 2018

X11 trick to inject commands on root terminal.

C 3 Updated Apr 19, 2018

Polymorph is a real-time network packet manipulation framework with support for almost all existing protocols

Python 2 Updated May 22, 2018

Polymorph is a real-time network packet manipulation framework with support for almost all existing protocols

Python 490 61 Updated Feb 10, 2025

A framework based on the Fiddler web debugger to study Exploit Kits, malvertising and malicious traffic in general.

C# 1 Updated Aug 14, 2018

Your Swiss Army knife to analyze malicious web traffic based on the popular Fiddler web debugger.

C# 647 129 Updated Nov 27, 2024

An evil RAT (Remote Administration Tool) for macOS / OS X.

Python 3 2 Updated Aug 1, 2018

An evil RAT (Remote Administration Tool) for macOS / OS X.

Python 2,379 491 Updated Feb 10, 2021

Brutal SSH: SSH Login brute force, scan for vulnerable version and 0 day exploit (under development)

Python 2 Updated Mar 4, 2018

Memoro: A Detailed Heap Profiler

CSS 1 Updated Jun 15, 2018

Brutal SSH: SSH Login brute force, scan for vulnerable version and 0 day exploit (under development)

Python 84 30 Updated Apr 4, 2023

Memoro: A Detailed Heap Profiler

CSS 185 16 Updated Dec 7, 2022

A collection of open source and commercial tools that aid in red team operations.

4 2 Updated Jul 12, 2018

This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.

9,901 2,310 Updated Sep 29, 2025
Python 2 1 Updated Jul 13, 2018

Tool to deploy a post-exploitation prompt at any time

Python 318 72 Updated May 28, 2021

A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter

Python 4 2 Updated Jul 13, 2018

ROPGenerator is a tool that helps you building ROP exploits by finding and chaining gadgets together

Python 1 1 Updated Jul 13, 2018
Next