- All languages
- ASP
- ActionScript
- Arduino
- Assembly
- AutoIt
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- CodeQL
- Dart
- Dockerfile
- Go
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Less
- Lua
- Makefile
- Mask
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Rich Text Format
- Ruby
- Rust
- Scala
- Shell
- Smali
- Smarty
- Standard ML
- Swift
- TeX
- TypeScript
- VBA
- VBScript
- Vim Script
- Visual Basic
- Vue
- XSLT
- YARA
- Zeek
Starred repositories
real time face swap and one-click video deepfake with only a single image
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWA…
OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.
A swiss army knife for pentesting networks
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
lgandx / Responder
Forked from SpiderLabs/ResponderResponder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…
Scanning APK file for URIs, endpoints & secrets.
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool, co…
Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors
Automatic SSRF fuzzer and exploitation tool
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
Know the dangers of credential reuse attacks.
BloodyAD is an Active Directory Privilege Escalation Framework
Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive …
Run PowerShell command without invoking powershell.exe
DKMC - Dont kill my cat - Malicious payload evasion tool
Subdomain enumeration and information gathering tool
A PoC backdoor that uses Gmail as a C&C server