Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/taielab/awesome-hacking-lists
平常看到好的渗透hacking工具和多领域效率工具的集合
https://github.com/taielab/awesome-hacking-lists
List: awesome-hacking-lists
awesome-list bounty-hunters bug-bounty bugbounty bugbounty-tool hacker hacking hacking-tool hacking-tools kali-scripts pentest-scripts pentesting-tools web
Last synced: about 1 month ago
JSON representation
平常看到好的渗透hacking工具和多领域效率工具的集合
- Host: GitHub
- URL: https://github.com/taielab/awesome-hacking-lists
- Owner: taielab
- Created: 2020-06-12T09:16:28.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2024-09-05T08:51:29.000Z (4 months ago)
- Last Synced: 2024-10-29T16:57:42.844Z (about 2 months ago)
- Topics: awesome-list, bounty-hunters, bug-bounty, bugbounty, bugbounty-tool, hacker, hacking, hacking-tool, hacking-tools, kali-scripts, pentest-scripts, pentesting-tools, web
- Homepage:
- Size: 7.14 MB
- Stars: 1,003
- Watchers: 30
- Forks: 216
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- ultimate-awesome - awesome-hacking-lists - 平常看到好的渗透hacking工具和多领域效率工具的集合. (Other Lists / Monkey C Lists)
README
# Awesome Stars [![Awesome](https://awesome.re/badge.svg)](https://github.com/sindresorhus/awesome)
> A curated list of my GitHub stars! Generated by [starred](https://github.com/maguowei/starred).
## Contents
- [ASL](#asl)
- [ActionScript](#actionscript)
- [Ada](#ada)
- [Arduino](#arduino)
- [Assembly](#assembly)
- [AutoHotkey](#autohotkey)
- [Batchfile](#batchfile)
- [BitBake](#bitbake)
- [Blade](#blade)
- [BlitzBasic](#blitzbasic)
- [Boo](#boo)
- [C](#c)
- [C#](#c#)
- [C++](#c++)
- [CMake](#cmake)
- [CSS](#css)
- [Classic ASP](#classic-asp)
- [Clojure](#clojure)
- [CodeQL](#codeql)
- [ColdFusion](#coldfusion)
- [Dart](#dart)
- [Dockerfile](#dockerfile)
- [Emacs Lisp](#emacs-lisp)
- [Erlang](#erlang)
- [F#](#f#)
- [Fluent](#fluent)
- [FreeMarker](#freemarker)
- [Go](#go)
- [Groovy](#groovy)
- [HCL](#hcl)
- [HTML](#html)
- [Hack](#hack)
- [Haskell](#haskell)
- [Inno Setup](#inno-setup)
- [Java](#java)
- [JavaScript](#javascript)
- [Jinja](#jinja)
- [Jupyter Notebook](#jupyter-notebook)
- [KiCad Layout](#kicad-layout)
- [Kotlin](#kotlin)
- [LLVM](#llvm)
- [Logos](#logos)
- [Lua](#lua)
- [MATLAB](#matlab)
- [Makefile](#makefile)
- [Markdown](#markdown)
- [Mask](#mask)
- [Max](#max)
- [Mercury](#mercury)
- [Mustache](#mustache)
- [Nginx](#nginx)
- [Nim](#nim)
- [Nix](#nix)
- [Nunjucks](#nunjucks)
- [OCaml](#ocaml)
- [Objective-C](#objective-c)
- [Objective-C++](#objective-c++)
- [Open Policy Agent](#open-policy-agent)
- [Others](#others)
- [PHP](#php)
- [PLpgSQL](#plpgsql)
- [Pascal](#pascal)
- [Perl](#perl)
- [PostScript](#postscript)
- [PowerShell](#powershell)
- [Propeller Spin](#propeller-spin)
- [Pug](#pug)
- [Python](#python)
- [QMake](#qmake)
- [REXX](#rexx)
- [Rascal](#rascal)
- [Rich Text Format](#rich-text-format)
- [Roff](#roff)
- [Ruby](#ruby)
- [Rust](#rust)
- [SCSS](#scss)
- [Sage](#sage)
- [SaltStack](#saltstack)
- [Sass](#sass)
- [Scala](#scala)
- [Scheme](#scheme)
- [Shell](#shell)
- [Smali](#smali)
- [Smarty](#smarty)
- [Solidity](#solidity)
- [SourcePawn](#sourcepawn)
- [Svelte](#svelte)
- [Swift](#swift)
- [TSQL](#tsql)
- [Tcl](#tcl)
- [TeX](#tex)
- [TypeScript](#typescript)
- [VBA](#vba)
- [VBScript](#vbscript)
- [VCL](#vcl)
- [Vim Script](#vim-script)
- [Visual Basic](#visual-basic)
- [Visual Basic .NET](#visual-basic-.net)
- [Vue](#vue)
- [XSLT](#xslt)
- [YAML](#yaml)
- [YARA](#yara)
- [Zeek](#zeek)
- [Zig](#zig)
- [nesC](#nesc)
- [templ](#templ)## ASL
- [postgres-cn/pgdoc-cn](https://github.com/postgres-cn/pgdoc-cn) - PostgreSQL manual Chinese translation by China PostgreSQL Users Group
## ActionScript
- [appsecco/json-flash-csrf-poc](https://github.com/appsecco/json-flash-csrf-poc) - This repo contains the files required to perform a CSRF attack using Flash and HTTP 307 redirections.
## Ada
- [PatrikFehrenbach/amass-tools](https://github.com/PatrikFehrenbach/amass-tools) -
## Arduino
- [UnicycleDumpTruck/MissionControl](https://github.com/UnicycleDumpTruck/MissionControl) - This kids' homework desk has top that flips up to reveal a space-themed control panel.
- [spacehuhn/wifi_keylogger](https://github.com/spacehuhn/wifi_keylogger) - DIY Arduino Wi-Fi Keylogger (Proof of Concept)## Assembly
- [enkomio/AlanFramework](https://github.com/enkomio/AlanFramework) - A C2 post-exploitation framework
- [MortenSchenk/Token-Stealing-Shellcode](https://github.com/MortenSchenk/Token-Stealing-Shellcode) -
- [xenoscr/SysWhispers2](https://github.com/xenoscr/SysWhispers2) - AV/EDR evasion via direct system calls.
- [timwhitez/Doge-Direct-Syscall](https://github.com/timwhitez/Doge-Direct-Syscall) - Golang Direct Syscall
- [klezVirus/inceptor](https://github.com/klezVirus/inceptor) - Template-Driven AV/EDR Evasion Framework
- [guitmz/memrun](https://github.com/guitmz/memrun) - Small tool to run ELF binaries from memory with a given process name
- [DownWithUp/DynamicKernelShellcode](https://github.com/DownWithUp/DynamicKernelShellcode) - An example of how x64 kernel shellcode can dynamically find and use APIs
- [mai1zhi2/SysWhispers2_x86](https://github.com/mai1zhi2/SysWhispers2_x86) - X86 version of syswhispers2 / x86 direct system call
- [jthuraisamy/SysWhispers2](https://github.com/jthuraisamy/SysWhispers2) - AV/EDR evasion via direct system calls.
- [Cybereason/siofra](https://github.com/Cybereason/siofra) -
- [mytechnotalent/Reverse-Engineering](https://github.com/mytechnotalent/Reverse-Engineering) - A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM and embedded RISC-V architectures.
- [jjyr/jonesforth_riscv](https://github.com/jjyr/jonesforth_riscv) - Jonesforth RISC-V port.
- [vxunderground/MalwareSourceCode](https://github.com/vxunderground/MalwareSourceCode) - Collection of malware source code for a variety of platforms in an array of different programming languages.
- [antonioCoco/Mapping-Injection](https://github.com/antonioCoco/Mapping-Injection) - Just another Windows Process Injection
- [jthuraisamy/SysWhispers](https://github.com/jthuraisamy/SysWhispers) - AV/EDR evasion via direct system calls.
- [tinysec/windows-syscall-table](https://github.com/tinysec/windows-syscall-table) - windows syscall table from xp ~ 10 rs4## AutoHotkey
- [xianyukang/MyKeymap](https://github.com/xianyukang/MyKeymap) - 一款基于 AutoHotkey 的键盘映射工具
- [goreliu/runz](https://github.com/goreliu/runz) - RunZ,专业的快速启动工具
- [kookob/smpic](https://github.com/kookob/smpic) - Windows下面的SM.MS图床上传工具## Batchfile
- [lxgw/LxgwWenKai](https://github.com/lxgw/LxgwWenKai) - An open-source Chinese font derived from Fontworks' Klee One. 一款开源中文字体,基于 FONTWORKS 出品字体 Klee One 衍生。
- [gsuberland/lbfo_win10](https://github.com/gsuberland/lbfo_win10) - Re-enable NIC teaming (LBFO) in Windows 10 using components from Windows Server.
- [SkyBlueEternal/jdk-change](https://github.com/SkyBlueEternal/jdk-change) - 支持windows\linux\macOS | jdk一键切换版本\一键切换jdk版本\jdk版本更换
- [0xbinibini/emergency_response_batch](https://github.com/0xbinibini/emergency_response_batch) - 应急响应,应急响应脚本,应急响应批处理;将Windows查看日志用户端口等命令集成在批处理脚本中。让熟练的应急人员能省去多次重复的敲击和记忆,并通过读取配置文件来调用Windows自带的命令结束进程服务等,本批处理尽量不调用任何外部的工具。任何调用的外部工具都将会存放在plugin目录下可按需使用,力图使用最原生的命令行来完成工作。
- [wecooperate/iMonitorSDK](https://github.com/wecooperate/iMonitorSDK) - The world's most powerful System Activity Monitor Engine · 一款功能强大的终端行为采集防御开发套件 ~ 旨在帮助EDR、零信任、数据安全、审计管控等终端安全软件可以快速实现产品功能, 而不用关心底层驱动的开发、维护和兼容性问题,让其可以专注于业务开发
- [SoraShu/easyconn-socks5-for-HITsz](https://github.com/SoraShu/easyconn-socks5-for-HITsz) - 在服务器上运行easyconnect并建立socks5代理,实现win电脑上免安装easyconnect访问校园内网。
- [r00t4dm/CVE-2020-27955](https://github.com/r00t4dm/CVE-2020-27955) -
- [swagkarna/Defeat-Defender-V1.2.0](https://github.com/swagkarna/Defeat-Defender-V1.2.0) - Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
- [wafinfo/cobaltstrike](https://github.com/wafinfo/cobaltstrike) - cobaltstrike插件
- [chroblert/JC-jEnv](https://github.com/chroblert/JC-jEnv) - windows java environ manage
- [massgravel/Microsoft-Activation-Scripts](https://github.com/massgravel/Microsoft-Activation-Scripts) - A Windows and Office activator using HWID / Ohook / KMS38 / Online KMS activation methods, with a focus on open-source code and fewer antivirus detections.
- [sagishahar/lpeworkshop](https://github.com/sagishahar/lpeworkshop) - Windows / Linux Local Privilege Escalation Workshop
- [maguowei/k8s-docker-desktop-for-mac](https://github.com/maguowei/k8s-docker-desktop-for-mac) - Docker Desktop for Mac 开启并使用 Kubernetes
- [ihacku/winhardening](https://github.com/ihacku/winhardening) - windows 加固脚本
- [frizb/Windows-Privilege-Escalation](https://github.com/frizb/Windows-Privilege-Escalation) - Windows Privilege Escalation Techniques and Scripts
- [acgbfull/IBM_Appscan_Batch_Scan_Script](https://github.com/acgbfull/IBM_Appscan_Batch_Scan_Script) - IBM AppScan批量扫描脚本
- [crazywifi/RDP_SessionHijacking](https://github.com/crazywifi/RDP_SessionHijacking) - Passwordless RDP Session Hijacking
- [mxk/windows-secure-group-policy](https://github.com/mxk/windows-secure-group-policy) - Windows 11 secure group policy for standalone devices
- [so87/CISSP-Study-Guide](https://github.com/so87/CISSP-Study-Guide) - study material used for the 2018 CISSP exam
- [Tai7sy/fuckcdn](https://github.com/Tai7sy/fuckcdn) - CDN真实IP扫描,易语言开发
- [NextronSystems/APTSimulator](https://github.com/NextronSystems/APTSimulator) - A toolset to make a system look as if it was the victim of an APT attack
- [auspbro/domain-admin-crack](https://github.com/auspbro/domain-admin-crack) - :cactus: 入域电脑用户本地提权
- [bartblaze/Disable-Intel-AMT](https://github.com/bartblaze/Disable-Intel-AMT) - Tool to disable Intel AMT on Windows
- [NuclearPhoenixx/fake-sandbox](https://github.com/NuclearPhoenixx/fake-sandbox) - 👁🗨 This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.
- [wzulfikar/ngrok-caddy](https://github.com/wzulfikar/ngrok-caddy) - Script to run ngrok with (optional) caddy server## BitBake
- [xer0times/BugBounty](https://github.com/xer0times/BugBounty) - Bug Bounty stuffs, payloads, scripts, profiles, tips and tricks, ...
## Blade
- [dbarzin/mercator](https://github.com/dbarzin/mercator) - Mapping the information system / Cartographie du système d'information
## BlitzBasic
- [eslam3kl/SQLiDetector](https://github.com/eslam3kl/SQLiDetector) - Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests with 14 payloads and checking for 152 regex patterns for differe
- [Sy3Omda/burp-bounty](https://github.com/Sy3Omda/burp-bounty) - Burp Bounty profiles
- [six2dez/burp-bounty-profiles](https://github.com/six2dez/burp-bounty-profiles) - Burp Bounty profiles compilation, feel free to contribute!
- [PortSwigger/scan-check-builder](https://github.com/PortSwigger/scan-check-builder) - Burp Bounty is a extension of Burp Suite that improve an active and passive scanner by yourself. This extension requires Burp Suite Pro.
- [1N3/IntruderPayloads](https://github.com/1N3/IntruderPayloads) - A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
- [ghsec/BBProfiles](https://github.com/ghsec/BBProfiles) - Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that improve an active and passive scanner by yourself. This extension requires Burp Suite Pro.## Boo
- [byt3bl33d3r/SILENTTRINITY](https://github.com/byt3bl33d3r/SILENTTRINITY) - An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
## C
- [P001water/yuze](https://github.com/P001water/yuze) - A socksv5 proxy tool Written by CLang. 一款纯C实现的基于socks5协议的轻量内网穿透工具,支持ew的全部数据转发方式,支持跨平台使用
- [OracleNep/Nday-Exploit-Plan](https://github.com/OracleNep/Nday-Exploit-Plan) - 历史漏洞的细节以及利用方法汇总收集
- [iridium-soda/container-escape-exploits](https://github.com/iridium-soda/container-escape-exploits) - 整理容器逃逸相关的漏洞和exploits.
- [baiyies/AutoMonitor](https://github.com/baiyies/AutoMonitor) - windows自动监控截图工具。 windows automatic screenshoter.
- [h4ckm310n/Container-Vulnerability-Exploit](https://github.com/h4ckm310n/Container-Vulnerability-Exploit) - 容器安全漏洞的分析与复现
- [m0nad/Diamorphine](https://github.com/m0nad/Diamorphine) - LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
- [PolarPeak/NIDS](https://github.com/PolarPeak/NIDS) - 基于Suricata简单的网络入侵检测系统,也是我的垃圾毕业设计,目前仅仅是一个demo。
- [evilashz/PigScheduleTask](https://github.com/evilashz/PigScheduleTask) - 添加计划任务方法集合
- [kernweak/minicrypt](https://github.com/kernweak/minicrypt) - 基于MiniFilter和Sfilter的加解密
- [esnet/iperf](https://github.com/esnet/iperf) - iperf3: A TCP, UDP, and SCTP network bandwidth measurement tool
- [qwqdanchun/HVNC](https://github.com/qwqdanchun/HVNC) - 基于Tinynuke修复得到的HVNC
- [baidu/dperf](https://github.com/baidu/dperf) - dperf is a 100Gbps network load tester.
- [H4K6/CVE-2023-0179-PoC](https://github.com/H4K6/CVE-2023-0179-PoC) - 针对(CVE-2023-0179)漏洞利用 该漏洞被分配为CVE-2023-0179,影响了从5.5到6.2-rc3的所有Linux版本,该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。
- [Impalabs/CVE-2023-27326](https://github.com/Impalabs/CVE-2023-27326) - VM Escape for Parallels Desktop <18.1.1
- [libAudioFlux/audioFlux](https://github.com/libAudioFlux/audioFlux) - A library for audio and music analysis, feature extraction.
- [chompie1337/Windows_LPE_AFD_CVE-2023-21768](https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768) - LPE exploit for CVE-2023-21768
- [xforcered/Windows_LPE_AFD_CVE-2023-21768](https://github.com/xforcered/Windows_LPE_AFD_CVE-2023-21768) - LPE exploit for CVE-2023-21768
- [Esonhugh/sshd_backdoor](https://github.com/Esonhugh/sshd_backdoor) - /root/.ssh/authorized_keys evil file watchdog with ebpf tracepoint hook.
- [MrEmpy/Pingoor](https://github.com/MrEmpy/Pingoor) - 「🚪」Linux Backdoor based on ICMP protocol
- [nelhage/reptyr](https://github.com/nelhage/reptyr) - Reparent a running program to a new terminal
- [itm4n/PPLdump](https://github.com/itm4n/PPLdump) - Dump the memory of a PPL with a userland exploit
- [zh-explorer/dirtycow](https://github.com/zh-explorer/dirtycow) - exploit for dirtycow
- [Coldzer0/ReverseSock5Proxy](https://github.com/Coldzer0/ReverseSock5Proxy) - A tiny Reverse Sock5 Proxy written in C :V
- [Cerbersec/KillDefenderBOF](https://github.com/Cerbersec/KillDefenderBOF) - Beacon Object File PoC implementation of KillDefender
- [seventeenman/noELF](https://github.com/seventeenman/noELF) - Linux下用于远程加载可执行文件以达到内存加载的目的
- [Kevin-sa/ebpf-supply-chain](https://github.com/Kevin-sa/ebpf-supply-chain) - 利用ebpf做pypi恶意包检测
- [yukar1z0e/cloudswordtsh](https://github.com/yukar1z0e/cloudswordtsh) - 多用户版linux/freebsd/openbsd/netbsd/cygwin/sunos/irix/hpux/osf的远控tiny shell
- [Octoberfest7/EventViewerUAC_BOF](https://github.com/Octoberfest7/EventViewerUAC_BOF) - Beacon Object File implementation of Event Viewer deserialization UAC bypass
- [Rvn0xsy/SchtaskCreator](https://github.com/Rvn0xsy/SchtaskCreator) - 远程创建任务计划工具
- [Libraggbond/EventViewerBypassUacBof](https://github.com/Libraggbond/EventViewerBypassUacBof) - EventViewer Bypass Uac Bof
- [randorisec/CVE-2022-34918-LPE-PoC](https://github.com/randorisec/CVE-2022-34918-LPE-PoC) -
- [h3xduck/TripleCross](https://github.com/h3xduck/TripleCross) - A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
- [pytorch/cpuinfo](https://github.com/pytorch/cpuinfo) - CPU INFOrmation library (x86/x86-64/ARM/ARM64, Linux/Windows/Android/macOS/iOS)
- [byt3bl33d3r/BOF-Zig](https://github.com/byt3bl33d3r/BOF-Zig) - Cobalt Strike BOF with Zig!
- [crisprss/PetitPotam](https://github.com/crisprss/PetitPotam) - 替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, a series of local rights escalation methods have been realized
- [Cracked5pider/Ekko](https://github.com/Cracked5pider/Ekko) - Sleep Obfuscation
- [helloexp/0day](https://github.com/helloexp/0day) - 各种CMS、各种平台、各种系统、各种软件漏洞的EXP、POC ,该项目将持续更新
- [tr3ee/CVE-2022-23222](https://github.com/tr3ee/CVE-2022-23222) - CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation
- [synacktiv/ica2tcp](https://github.com/synacktiv/ica2tcp) - A SOCKS proxy for Citrix.
- [thefLink/DeepSleep](https://github.com/thefLink/DeepSleep) - A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC
- [q77190858/CVE-2021-3156](https://github.com/q77190858/CVE-2021-3156) - sudo提权漏洞CVE-2021-3156复现代码
- [nsacyber/Hardware-and-Firmware-Security-Guidance](https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance) - Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as gene
- [nemo-wq/PrintNightmare-CVE-2021-34527](https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527) - PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits
- [LDrakura/Remote_ShellcodeLoader](https://github.com/LDrakura/Remote_ShellcodeLoader) - 远程shellcode加载&权限维持+小功能
- [JDArmy/RPCSCAN](https://github.com/JDArmy/RPCSCAN) - RPC远程主机信息匿名扫描工具
- [jituo666/AndroidEventRecorder](https://github.com/jituo666/AndroidEventRecorder) - A recorder used for recording user actions on Android platforms.
- [liudf0716/xfrpc](https://github.com/liudf0716/xfrpc) - The xfrpc project is a lightweight implementation of the FRP client written in C language for OpenWRT and IoT systems. It is designed to provide an efficient solution for resource-constrained devices
- [Mr-Un1k0d3r/WindowsDllsExport](https://github.com/Mr-Un1k0d3r/WindowsDllsExport) - A list of all the DLLs export in C:\windows\system32\
- [trustedsec/CS-Remote-OPs-BOF](https://github.com/trustedsec/CS-Remote-OPs-BOF) -
- [3nock/OTE](https://github.com/3nock/OTE) - OSINT Template Engine
- [Threekiii/Awesome-Exploit](https://github.com/Threekiii/Awesome-Exploit) - 一个漏洞利用工具仓库
- [DataDog/security-labs-pocs](https://github.com/DataDog/security-labs-pocs) - Proof of concept code for Datadog Security Labs referenced exploits.
- [outflanknl/C2-Tool-Collection](https://github.com/outflanknl/C2-Tool-Collection) - A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.
- [chicharitomu14/AndScanner](https://github.com/chicharitomu14/AndScanner) - This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022
- [rbsec/sslscan](https://github.com/rbsec/sslscan) - sslscan tests SSL/TLS enabled services to discover supported cipher suites
- [krisnova/boopkit](https://github.com/krisnova/boopkit) - Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.
- [bytedance/bhook](https://github.com/bytedance/bhook) - :fire: ByteHook is an Android PLT hook library which supports armeabi-v7a, arm64-v8a, x86 and x86_64.
- [r0ysue/AndroidFridaBeginnersBook](https://github.com/r0ysue/AndroidFridaBeginnersBook) - 《安卓Frida逆向与抓包实战》随书附件
- [easychen/pushdeer](https://github.com/easychen/pushdeer) - 开放源码的无App推送服务,iOS14+扫码即用。亦支持快应用/iOS和Mac客户端、Android客户端、自制设备
- [emptymonkey/revsh](https://github.com/emptymonkey/revsh) - A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.
- [Bonfee/CVE-2022-0995](https://github.com/Bonfee/CVE-2022-0995) - CVE-2022-0995 exploit
- [RfidResearchGroup/proxmark3](https://github.com/RfidResearchGroup/proxmark3) - Iceman Fork - Proxmark3
- [gojue/ecapture](https://github.com/gojue/ecapture) - Capturing SSL/TLS plaintext without a CA certificate using eBPF. Supported on Linux/Android kernels for amd64/arm64.
- [ly4k/PwnKit](https://github.com/ly4k/PwnKit) - Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation
- [crisprss/PrintSpoofer](https://github.com/crisprss/PrintSpoofer) - PrintSpoofer的反射dll实现,结合Cobalt Strike使用
- [AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits) - A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.
- [mponcet/subversive](https://github.com/mponcet/subversive) - x86_64 linux rootkit using debug registers
- [therealdreg/lsrootkit](https://github.com/therealdreg/lsrootkit) - Rootkit Detector for UNIX
- [Arinerron/CVE-2022-0847-DirtyPipe-Exploit](https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-Exploit) - A root exploit for CVE-2022-0847 (Dirty Pipe)
- [Bonfee/CVE-2022-25636](https://github.com/Bonfee/CVE-2022-25636) - CVE-2022-25636
- [bopin2020/WindowsCamp](https://github.com/bopin2020/WindowsCamp) - Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&
- [Lojii/Knot](https://github.com/Lojii/Knot) - 一款iOS端基于MITM(中间人攻击技术)实现的HTTPS抓包工具,完整的App,核心代码使用SwiftNIO实现
- [r4j0x00/exploits](https://github.com/r4j0x00/exploits) -
- [SentryPeer/SentryPeer](https://github.com/SentryPeer/SentryPeer) - Protect your SIP Servers from bad actors at https://sentrypeer.org
- [b1n4r1b01/n-days](https://github.com/b1n4r1b01/n-days) -
- [linux-lock/bpflock](https://github.com/linux-lock/bpflock) - bpflock - eBPF driven security for locking and auditing Linux machines
- [Rvn0xsy/CVE-2021-4034](https://github.com/Rvn0xsy/CVE-2021-4034) - CVE-2021-4034 Add Root User - Pkexec Local Privilege Escalation
- [0verSp4ce/CVE-2021-4034](https://github.com/0verSp4ce/CVE-2021-4034) - CVE-2021-4034, For Webshell Version.
- [MichaelDim02/Narthex](https://github.com/MichaelDim02/Narthex) - Modular personalized dictionary generator.
- [FlamingSpork/iptable_evil](https://github.com/FlamingSpork/iptable_evil) - An evil bit backdoor for iptables
- [kyleavery/inject-assembly](https://github.com/kyleavery/inject-assembly) - Inject .NET assemblies into an existing process
- [spieglt/whatfiles](https://github.com/spieglt/whatfiles) - Log what files are accessed by any Linux process
- [berdav/CVE-2021-4034](https://github.com/berdav/CVE-2021-4034) - CVE-2021-4034 1day
- [arthepsy/CVE-2021-4034](https://github.com/arthepsy/CVE-2021-4034) - PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)
- [Ayrx/CVE-2021-4034](https://github.com/Ayrx/CVE-2021-4034) - Exploit for CVE-2021-4034
- [xbyl1234/android_analysis](https://github.com/xbyl1234/android_analysis) - a few android analysis tools, jni trace by native hook, libc hook, write log with caller's addr in file or AndroidLog
- [aaaddress1/Skrull](https://github.com/aaaddress1/Skrull) - Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting te
- [thefLink/Hunt-Sleeping-Beacons](https://github.com/thefLink/Hunt-Sleeping-Beacons) - Aims to identify sleeping beacons
- [Rvn0xsy/linux_dirty](https://github.com/Rvn0xsy/linux_dirty) - 更改后的脏牛提权代码,可以往任意文件写入任意内容,去除交互过程
- [revng/pagebuster](https://github.com/revng/pagebuster) - PageBuster - dump all executable pages of packed processes.
- [screetsec/TheFatRat](https://github.com/screetsec/TheFatRat) - Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then
- [f0rb1dd3n/Reptile](https://github.com/f0rb1dd3n/Reptile) - LKM Linux rootkit
- [lcatro/qemu-fuzzer](https://github.com/lcatro/qemu-fuzzer) - Qemu Fuzzer.针对Qemu模拟设备的模糊测试工具,主要思路是Host生成种子Data,然后传递给Guest中转程序,由中转程序访问MMIO,以达到和模拟设备的交互,不同于qtest自带的fuzzer.
- [chriskaliX/Hades](https://github.com/chriskaliX/Hades) - Hades is a Host-Based Intrusion Detection System based on eBPF(mainly)
- [n0b0dyCN/redis-rogue-server](https://github.com/n0b0dyCN/redis-rogue-server) - Redis(<=5.0.5) RCE
- [wavestone-cdt/EDRSandblast](https://github.com/wavestone-cdt/EDRSandblast) -
- [OALabs/BlobRunner](https://github.com/OALabs/BlobRunner) - Quickly debug shellcode extracted during malware analysis
- [SweetIceLolly/Huorong_Vulnerabilities](https://github.com/SweetIceLolly/Huorong_Vulnerabilities) - Huorong Internet Security vulnerabilities 火绒安全软件漏洞
- [scareing/cmd2shellcode](https://github.com/scareing/cmd2shellcode) - cmd2shellcode
- [securifybv/Visual-Studio-BOF-template](https://github.com/securifybv/Visual-Studio-BOF-template) - A Visual Studio template used to create Cobalt Strike BOFs
- [HexHive/USBFuzz](https://github.com/HexHive/USBFuzz) - A Framework for fuzzing USB Drivers by Device Emulation
- [fortra/nanodump](https://github.com/fortra/nanodump) - The swiss army knife of LSASS dumping
- [0671/RedisModules-ExecuteCommand-for-Windows](https://github.com/0671/RedisModules-ExecuteCommand-for-Windows) - 可在Windows下执行系统命令的Redis模块,可用于Redis主从复制攻击。
- [Lakr233/Decrypter](https://github.com/Lakr233/Decrypter) - An easy way to decrypt UIKit app.
- [idealeer/xmap](https://github.com/idealeer/xmap) - XMap is a fast network scanner designed for performing Internet-wide IPv6 & IPv4 network research scanning.
- [wolfpython/nids](https://github.com/wolfpython/nids) - 基于网络的入侵检测系统
- [dismantl/ImprovedReflectiveDLLInjection](https://github.com/dismantl/ImprovedReflectiveDLLInjection) - An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security
- [aircrack-ng/mdk4](https://github.com/aircrack-ng/mdk4) - MDK4
- [boku7/injectEtwBypass](https://github.com/boku7/injectEtwBypass) - CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)
- [codewhitesec/HandleKatz](https://github.com/codewhitesec/HandleKatz) - PIC lsass dumper using cloned handles
- [gentilkiwi/kekeo](https://github.com/gentilkiwi/kekeo) - A little toolbox to play with Microsoft Kerberos in C
- [EspressoCake/PPLDump_BOF](https://github.com/EspressoCake/PPLDump_BOF) - A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.
- [microsoft/omi](https://github.com/microsoft/omi) - Open Management Infrastructure
- [seL4/seL4](https://github.com/seL4/seL4) - The seL4 microkernel
- [outflanknl/PrintNightmare](https://github.com/outflanknl/PrintNightmare) -
- [cube0x0/SharpSystemTriggers](https://github.com/cube0x0/SharpSystemTriggers) - Collection of remote authentication triggers in C#
- [paranoidninja/PIC-Get-Privileges](https://github.com/paranoidninja/PIC-Get-Privileges) - Building and Executing Position Independent Shellcode from Object Files in Memory
- [SolomonSklash/SleepyCrypt](https://github.com/SolomonSklash/SleepyCrypt) - A shellcode function to encrypt a running process image when sleeping.
- [limithit/NginxExecute](https://github.com/limithit/NginxExecute) - The NginxExecute module executes the shell command through GET POST and HEAD to display the result.
- [boku7/azureOutlookC2](https://github.com/boku7/azureOutlookC2) - Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP: Use Micro
- [cyberark/rdpfuzz](https://github.com/cyberark/rdpfuzz) - Tools for fuzzing RDP
- [mprovost/NFStash](https://github.com/mprovost/NFStash) - NFS client CLI toolkit
- [aaaddress1/PR0CESS](https://github.com/aaaddress1/PR0CESS) - some gadgets about windows process and ready to use :)
- [superflexible/TGPuttyLib](https://github.com/superflexible/TGPuttyLib) - An SFTP client shared library (dll/so/dylib) with bindings and classes for C++, Delphi and Free Pascal based on PuTTY
- [ttdennis/fpicker](https://github.com/ttdennis/fpicker) - fpicker is a Frida-based fuzzing suite supporting various modes (including AFL++ in-process fuzzing)
- [mgeeky/ElusiveMice](https://github.com/mgeeky/ElusiveMice) - Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind
- [boku7/whereami](https://github.com/boku7/whereami) - Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL's.
- [frkngksl/Huan](https://github.com/frkngksl/Huan) - Encrypted PE Loader Generator
- [Yubico/yubico-c](https://github.com/Yubico/yubico-c) - YubiKey C low-level library (libyubikey)
- [RUB-SysSec/Nyx](https://github.com/RUB-SysSec/Nyx) - USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types
- [glmcdona/Process-Dump](https://github.com/glmcdona/Process-Dump) - Windows tool for dumping malware PE files from memory back to disk for analysis.
- [alfarom256/BOF-ForeignLsass](https://github.com/alfarom256/BOF-ForeignLsass) -
- [knightswd/ProcessGhosting](https://github.com/knightswd/ProcessGhosting) -
- [NoOne-hub/Beacon.dll](https://github.com/NoOne-hub/Beacon.dll) - Beacon.dll reverse
- [boku7/BokuLoader](https://github.com/boku7/BokuLoader) - A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!
- [aqi00/advanceapp](https://github.com/aqi00/advanceapp) - 《Android App开发进阶与项目实战》随书源码
- [horsicq/PDBRipper](https://github.com/horsicq/PDBRipper) - PDBRipper is a utility for extract an information from PDB-files.
- [Gui774ume/ebpfkit](https://github.com/Gui774ume/ebpfkit) - ebpfkit is a rootkit powered by eBPF
- [jrbrtsn/ban2fail](https://github.com/jrbrtsn/ban2fail) - Simple & efficient log file scanning and iptable filtering
- [cdpxe/NELphase](https://github.com/cdpxe/NELphase) - Network Environment Learning (NEL) Phase for Covert Channels (with a Feedback Channel)
- [ZhangZhuoSJTU/StochFuzz](https://github.com/ZhangZhuoSJTU/StochFuzz) - Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting
- [connormcgarr/cThreadHijack](https://github.com/connormcgarr/cThreadHijack) - Beacon Object File (BOF) for remote process injection via thread hijacking
- [boku7/injectAmsiBypass](https://github.com/boku7/injectAmsiBypass) - Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.
- [LloydLabs/process-enumeration-stealth](https://github.com/LloydLabs/process-enumeration-stealth) -
- [hasherezade/process_ghosting](https://github.com/hasherezade/process_ghosting) - Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file
- [GJDuck/e9patch](https://github.com/GJDuck/e9patch) - A powerful static binary rewriting tool
- [djkaty/Il2CppInspector](https://github.com/djkaty/Il2CppInspector) - Powerful automated tool for reverse engineering Unity IL2CPP binaries
- [merbanan/rtl_433](https://github.com/merbanan/rtl_433) - Program to decode radio transmissions from devices on the ISM bands (and other frequencies)
- [killvxk/Beacon](https://github.com/killvxk/Beacon) - Lightweight, header-only C++ IPC library for Windows operating systems (Vista+) using advanced local procedure calls
- [sliverarmory/COFFLoader](https://github.com/sliverarmory/COFFLoader) -
- [joshfaust/Alaris](https://github.com/joshfaust/Alaris) - A protective and Low Level Shellcode Loader that defeats modern EDR systems.
- [OWASP/IoTGoat](https://github.com/OWASP/IoTGoat) - IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly found vulnerabilities in IoT devices.
- [ndilieto/uacme](https://github.com/ndilieto/uacme) - ACMEv2 client written in plain C with minimal dependencies
- [client9/libinjection](https://github.com/client9/libinjection) - SQL / SQLI tokenizer parser analyzer
- [alipay/ios-malicious-bithunter](https://github.com/alipay/ios-malicious-bithunter) - iOS Malicious Bit Hunter is a malicious plug-in detection engine for iOS applications. It can analyze the head of the macho file of the injected dylib dynamic library based on runtime. If you are inte
- [xuanxuan0/TiEtwAgent](https://github.com/xuanxuan0/TiEtwAgent) - PoC memory injection detection agent based on ETW, for offensive and defensive research purposes
- [antonioCoco/RemotePotato0](https://github.com/antonioCoco/RemotePotato0) - Windows Privilege Escalation from User to Domain Admin.
- [greenbone/gvmd](https://github.com/greenbone/gvmd) - Greenbone Vulnerability Manager - The database backend for the Greenbone Community Edition
- [topotam/PetitPotam](https://github.com/topotam/PetitPotam) - PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.
- [CCob/BOF.NET](https://github.com/CCob/BOF.NET) - A .NET Runtime for Cobalt Strike's Beacon Object Files
- [0xricksanchez/dlink-decrypt](https://github.com/0xricksanchez/dlink-decrypt) - D-Link firmware decryption PoC
- [boku7/spawn](https://github.com/boku7/spawn) - Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (ACG),
- [xforcered/InlineExecute-Assembly](https://github.com/xforcered/InlineExecute-Assembly) - InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditional f
- [inspiringz/CVE-2021-3493](https://github.com/inspiringz/CVE-2021-3493) - CVE-2021-3493 Ubuntu OverlayFS Local Privesc (Interactive Bash Shell & Execute Command Entered)
- [wbenny/injdrv](https://github.com/wbenny/injdrv) - proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC
- [CCob/SylantStrike](https://github.com/CCob/SylantStrike) - Simple EDR implementation to demonstrate bypass
- [jattach/jattach](https://github.com/jattach/jattach) - JVM Dynamic Attach utility
- [anthemtotheego/InlineExecute-Assembly](https://github.com/anthemtotheego/InlineExecute-Assembly) - InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditional f
- [praetorian-inc/PortBender](https://github.com/praetorian-inc/PortBender) - TCP Port Redirection Utility
- [hlldz/CVE-2021-1675-LPE](https://github.com/hlldz/CVE-2021-1675-LPE) - Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527
- [blackorbird/PrintNightmare](https://github.com/blackorbird/PrintNightmare) -
- [iqiyi/qnsm](https://github.com/iqiyi/qnsm) - QNSM is network security monitoring framework based on DPDK.
- [Yaxser/Backstab](https://github.com/Yaxser/Backstab) - A tool to kill antimalware protected processes
- [CaledoniaProject/rdpscan](https://github.com/CaledoniaProject/rdpscan) - RDP password verification tool - No external libraries required ;-P
- [wonderkun/go-packer](https://github.com/wonderkun/go-packer) - golang打包二进制进行免杀
- [cgwalters/cve-2020-14386](https://github.com/cgwalters/cve-2020-14386) -
- [alipay/Owfuzz](https://github.com/alipay/Owfuzz) - Owfuzz: a WiFi protocol fuzzing tool
- [passthehashbrowns/hook-integrity-checks](https://github.com/passthehashbrowns/hook-integrity-checks) -
- [kevmitch/win_battery_log](https://github.com/kevmitch/win_battery_log) - command line battery stats for MS Windows
- [passthehashbrowns/hiding-your-syscalls](https://github.com/passthehashbrowns/hiding-your-syscalls) - Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction within NTDLL.
- [yarrick/iodine](https://github.com/yarrick/iodine) - Official git repo for iodine dns tunnel
- [airbus-cyber/afl_ghidra_emu](https://github.com/airbus-cyber/afl_ghidra_emu) -
- [ApsaraDB/PolarDB-for-PostgreSQL](https://github.com/ApsaraDB/PolarDB-for-PostgreSQL) - A cloud-native database based on PostgreSQL developed by Alibaba Cloud.
- [season-lab/fuzzolic](https://github.com/season-lab/fuzzolic) - fuzzing + concolic = fuzzolic :)
- [djhohnstein/macos_shell_memory](https://github.com/djhohnstein/macos_shell_memory) - Execute MachO binaries in memory using CGo
- [ASkyeye/Zipper](https://github.com/ASkyeye/Zipper) - Zipper, a CobaltStrike file and folder compression utility.
- [pbek/loganalyzer](https://github.com/pbek/loganalyzer) - LogAnalyzer is a tool that helps you to analyze your log files by reducing the content with patterns you define.
- [heiher/hev-socks5-core](https://github.com/heiher/hev-socks5-core) - A simple, lightweight socks5 library. (IPv4/IPv6/TCP/UDP/Client/Server)
- [orangetw/tsh](https://github.com/orangetw/tsh) - Tiny SHell is an open-source UNIX backdoor.
- [waldo-irc/CVE-2021-21551](https://github.com/waldo-irc/CVE-2021-21551) - Exploit to SYSTEM for CVE-2021-21551
- [Iansus/SilentLsassDump](https://github.com/Iansus/SilentLsassDump) - VisualStudio port of https://github.com/guervild/BOFs/tree/dev/SilentLsassDump
- [abcz316/rwProcMem33](https://github.com/abcz316/rwProcMem33) - Linux ARM64内核硬件进程内存读写驱动、硬件断点调试驱动。硬件级读写Linux进程内存、硬件级下断点。
- [falcosecurity/pdig](https://github.com/falcosecurity/pdig) - ptrace-based event producer for udig
- [svengong/xcubebase_riru](https://github.com/svengong/xcubebase_riru) - 基于magisk 和riru的frida持久化方案
- [Al1ex/WindowsElevation](https://github.com/Al1ex/WindowsElevation) - Windows Elevation(持续更新)
- [Al1ex/LinuxEelvation](https://github.com/Al1ex/LinuxEelvation) - Linux Eelvation(持续更新)
- [boazsegev/iodine](https://github.com/boazsegev/iodine) - iodine - HTTP / WebSockets Server for Ruby with Pub/Sub support
- [xforcered/CredBandit](https://github.com/xforcered/CredBandit) - Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that back through your already existing Beacon communication channel
- [dgoulet/kjackal](https://github.com/dgoulet/kjackal) - Linux Rootkit Scanner
- [rsmudge/ZeroLogon-BOF](https://github.com/rsmudge/ZeroLogon-BOF) -
- [git-for-windows/git-sdk-64](https://github.com/git-for-windows/git-sdk-64) - A Git repository mirroring the current 64-bit Git for Windows SDK
- [csandker/inMemoryShellcode](https://github.com/csandker/inMemoryShellcode) - A Collection of In-Memory Shellcode Execution Techniques for Windows
- [pattern-f/TQ-pre-jailbreak](https://github.com/pattern-f/TQ-pre-jailbreak) - Hello from pattern-f.
- [darvincisec/AntiDebugandMemoryDump](https://github.com/darvincisec/AntiDebugandMemoryDump) - Anti-Debug and Anti-Memory Dump for Android
- [decoder-it/juicy_2](https://github.com/decoder-it/juicy_2) - juicypotato for win10 > 1803 & win server 2019
- [9bie/exe2shellcode](https://github.com/9bie/exe2shellcode) - Remote Download and Memory Execute for shellcode framework
- [trustedsec/COFFLoader](https://github.com/trustedsec/COFFLoader) -
- [akopytov/sysbench](https://github.com/akopytov/sysbench) - Scriptable database and system performance benchmark
- [mtrojnar/osslsigncode](https://github.com/mtrojnar/osslsigncode) - OpenSSL based Authenticode signing for PE/MSI/Java CAB files
- [jmk-foofus/medusa](https://github.com/jmk-foofus/medusa) - Medusa is a speedy, parallel, and modular, login brute-forcer.
- [rewardone/OSCPRepo](https://github.com/rewardone/OSCPRepo) - A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and readi
- [aaaddress1/sakeInject](https://github.com/aaaddress1/sakeInject) - Windows PE - TLS (Thread Local Storage) Injector in C/C++
- [Rvn0xsy/CVE-2021-3156-plus](https://github.com/Rvn0xsy/CVE-2021-3156-plus) - CVE-2021-3156非交互式执行命令
- [blasty/CVE-2021-3156](https://github.com/blasty/CVE-2021-3156) -
- [Mr-Un1k0d3r/RedTeamCCode](https://github.com/Mr-Un1k0d3r/RedTeamCCode) - Red Team C code repo
- [lockedbyte/CVE-Exploits](https://github.com/lockedbyte/CVE-Exploits) - PoC exploits for software vulnerabilities
- [mai1zhi2/ShellCodeFramework](https://github.com/mai1zhi2/ShellCodeFramework) - 绕3环的shellcode免杀框架
- [ea/bosch_headunit_root](https://github.com/ea/bosch_headunit_root) - Documentation and code for rooting and extending a Bosch car head unit (lcn2kai)
- [LloydLabs/Windows-API-Hashing](https://github.com/LloydLabs/Windows-API-Hashing) - This is a simple example and explanation of obfuscating API resolution via hashing
- [LloydLabs/delete-self-poc](https://github.com/LloydLabs/delete-self-poc) - A way to delete a locked file, or current running executable, on disk.
- [zznop/drow](https://github.com/zznop/drow) - Injects code into ELF executables post-build
- [neil-wu/CatFrida](https://github.com/neil-wu/CatFrida) - CatFrida is a macOS tool for inspecting a running iOS app.
- [ybdt/evasion-hub](https://github.com/ybdt/evasion-hub) - 免杀、逆向、破解
- [jsherman212/xnuspy](https://github.com/jsherman212/xnuspy) - an iOS kernel function hooking framework for checkra1n'able devices
- [rsmudge/unhook-bof](https://github.com/rsmudge/unhook-bof) - Remove API hooks from a Beacon process.
- [dacade/tools](https://github.com/dacade/tools) - some tools
- [lengjibo/FourEye](https://github.com/lengjibo/FourEye) - AV Evasion Tool For Red Team Ops
- [AFLplusplus/AFLplusplus](https://github.com/AFLplusplus/AFLplusplus) - The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
- [ethereal-vx/Persistence](https://github.com/ethereal-vx/Persistence) - Recreating and reviewing the Windows persistence methods
- [anantshri/Android_Security](https://github.com/anantshri/Android_Security) - This repository is a suplimentary material for Android Training's done by Anant Shrivastava from 2012-2017
- [gtworek/PSBits](https://github.com/gtworek/PSBits) - Simple (relatively) things allowing you to dig a bit deeper than usual.
- [ajpc500/BOFs](https://github.com/ajpc500/BOFs) - Collection of Beacon Object Files
- [tomcarver16/BOF-DLL-Inject](https://github.com/tomcarver16/BOF-DLL-Inject) - Manual Map DLL injection implemented with Cobalt Strike's Beacon Object Files.
- [gnxbr/Fully-Undetectable-Techniques](https://github.com/gnxbr/Fully-Undetectable-Techniques) -
- [chroblert/JC-AntiPtrace](https://github.com/chroblert/JC-AntiPtrace) - 安卓绕过ptrace反调试
- [NixOS/patchelf](https://github.com/NixOS/patchelf) - A small utility to modify the dynamic linker and RPATH of ELF executables
- [TannerJin/AntiMSHookFunction](https://github.com/TannerJin/AntiMSHookFunction) - AntiMSHookFunction (make MSHookFunction doesn't work)
- [ntop/n2n](https://github.com/ntop/n2n) - Peer-to-peer VPN
- [gaffe23/linux-inject](https://github.com/gaffe23/linux-inject) - Tool for injecting a shared object into a Linux process
- [code-scan/ssh-inject-auto-find-libdl](https://github.com/code-scan/ssh-inject-auto-find-libdl) -
- [geommer/yabar](https://github.com/geommer/yabar) - A modern and lightweight status bar for X window managers.
- [cbwang505/CVE-2019-0708-EXP-Windows](https://github.com/cbwang505/CVE-2019-0708-EXP-Windows) - CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell
- [strongcourage/uafuzz](https://github.com/strongcourage/uafuzz) - UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities
- [LloydLabs/wsb-detect](https://github.com/LloydLabs/wsb-detect) - wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB")
- [g0dA/linuxStack](https://github.com/g0dA/linuxStack) - Linux技术栈
- [0voice/algorithm-structure](https://github.com/0voice/algorithm-structure) - 2021年最新总结 500个常用数据结构,算法,算法导论,面试常用,大厂高级工程师整理总结
- [GeoSn0w/Blizzard-Jailbreak](https://github.com/GeoSn0w/Blizzard-Jailbreak) - An Open-Source iOS 11.0 -> 11.4.1 (soon iOS 13) Jailbreak, made for teaching purposes.
- [bytecode77/r77-rootkit](https://github.com/bytecode77/r77-rootkit) - Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
- [ventoy/Ventoy](https://github.com/ventoy/Ventoy) - A new bootable USB solution.
- [SkewwG/domainTools](https://github.com/SkewwG/domainTools) - 内网域渗透小工具
- [StarCross-Tech/heap_exploit_2.31](https://github.com/StarCross-Tech/heap_exploit_2.31) -
- [XiphosResearch/netelf](https://github.com/XiphosResearch/netelf) - Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.
- [andreafioraldi/weizz-fuzzer](https://github.com/andreafioraldi/weizz-fuzzer) -
- [hackerschoice/gsocket](https://github.com/hackerschoice/gsocket) - Connect like there is no firewall. Securely.
- [phra/PEzor](https://github.com/phra/PEzor) - Open-Source Shellcode & PE Packer
- [TimelifeCzy/Shell_Protect](https://github.com/TimelifeCzy/Shell_Protect) - VM一键加壳/脱壳,全压缩,反调试等
- [ish-app/ish](https://github.com/ish-app/ish) - Linux shell for iOS
- [inspektor-gadget/inspektor-gadget](https://github.com/inspektor-gadget/inspektor-gadget) - The eBPF tool and systems inspection framework for Kubernetes, containers and Linux hosts.
- [gloxec/CrossC2](https://github.com/gloxec/CrossC2) - generate CobaltStrike's cross-platform payload
- [timwhitez/Cobalt-Strike-Aggressor-Scripts](https://github.com/timwhitez/Cobalt-Strike-Aggressor-Scripts) - Cobalt Strike Aggressor 插件包
- [brendan-rius/c-jwt-cracker](https://github.com/brendan-rius/c-jwt-cracker) - JWT brute force cracker written in C
- [bg6cq/whoisscanme](https://github.com/bg6cq/whoisscanme) -
- [aircrack-ng/rtl8188eus](https://github.com/aircrack-ng/rtl8188eus) - RealTek RTL8188eus WiFi driver with monitor mode & frame injection support
- [dtcooper/fakehostname](https://github.com/dtcooper/fakehostname) - Run a command and fake your hostname.
- [yifengyou/learn-kvm](https://github.com/yifengyou/learn-kvm) - Qemu KVM(Kernel Virtual Machine)学习笔记
- [blendin/3snake](https://github.com/blendin/3snake) - Tool for extracting information from newly spawned processes
- [0vercl0k/sic](https://github.com/0vercl0k/sic) - Enumerate user mode shared memory mappings on Windows.
- [CylanceVulnResearch/ReflectiveDLLRefresher](https://github.com/CylanceVulnResearch/ReflectiveDLLRefresher) - Universal Unhooking
- [DoctorWkt/acwj](https://github.com/DoctorWkt/acwj) - A Compiler Writing Journey
- [limbenjamin/LogServiceCrash](https://github.com/limbenjamin/LogServiceCrash) - POC code to crash Windows Event Logger Service
- [nil0x42/duplicut](https://github.com/nil0x42/duplicut) - Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)
- [blunderbuss-wctf/wacker](https://github.com/blunderbuss-wctf/wacker) - A WPA3 dictionary cracker
- [uf0o/CVE-2020-17382](https://github.com/uf0o/CVE-2020-17382) - PoC exploits for CVE-2020-17382
- [libinjection/libinjection](https://github.com/libinjection/libinjection) - SQL / SQLI tokenizer parser analyzer
- [blackarrowsec/redteam-research](https://github.com/blackarrowsec/redteam-research) - Collection of PoC and offensive techniques used by the BlackArrow Red Team
- [chompie1337/s8_2019_2215_poc](https://github.com/chompie1337/s8_2019_2215_poc) - PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass
- [DerekSelander/yacd](https://github.com/DerekSelander/yacd) - Decrypts FairPlay applications on iOS 13.4.1 and lower, no jb required
- [jvinet/knock](https://github.com/jvinet/knock) - A port-knocking daemon
- [ThunderGunExpress/UAC-TokenDuplication](https://github.com/ThunderGunExpress/UAC-TokenDuplication) -
- [Ascotbe/Kernelhub](https://github.com/Ascotbe/Kernelhub) - :palm_tree:Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
- [fancycode/MemoryModule](https://github.com/fancycode/MemoryModule) - Library to load a DLL from memory.
- [reactos/reactos](https://github.com/reactos/reactos) - A free Windows-compatible Operating System
- [MobileForensicsResearch/mem](https://github.com/MobileForensicsResearch/mem) - Tool used for dumping memory from Android devices
- [ARM-software/CSAL](https://github.com/ARM-software/CSAL) - Coresight Access Library
- [webview/webview_csharp](https://github.com/webview/webview_csharp) - C# bindings for webview/webview - Batteries included
- [webview/webview](https://github.com/webview/webview) - Tiny cross-platform webview library for C/C++. Uses WebKit (GTK/Cocoa) and Edge WebView2 (Windows).
- [gabrielrcouto/awesome-php-ffi](https://github.com/gabrielrcouto/awesome-php-ffi) - PHP FFI examples and use cases
- [bhassani/EternalBlueC](https://github.com/bhassani/EternalBlueC) - EternalBlue suite remade in C/C++ which includes: MS17-010 Exploit, EternalBlue vulnerability detector, DoublePulsar detector and DoublePulsar Shellcode & DLL uploader
- [mdsecactivebreach/firewalker](https://github.com/mdsecactivebreach/firewalker) -
- [hzqst/VmwareHardenedLoader](https://github.com/hzqst/VmwareHardenedLoader) - Vmware Hardened VM detection mitigation loader (anti anti-vm)
- [aligrudi/neatcc](https://github.com/aligrudi/neatcc) - A small arm/x86(-64) C compiler
- [bkerler/opencl_brute](https://github.com/bkerler/opencl_brute) - MD5,SHA1,SHA256,SHA512,HMAC,PBKDF2,SCrypt Bruteforcing tools using OpenCL (GPU, yay!) and Python
- [marsyy/littl_tools](https://github.com/marsyy/littl_tools) -
- [n0b0dyCN/RedisModules-ExecuteCommand](https://github.com/n0b0dyCN/RedisModules-ExecuteCommand) - Tools, utilities and scripts to help you write redis modules!
- [vulhub/redis-rogue-getshell](https://github.com/vulhub/redis-rogue-getshell) - redis 4.x/5.x master/slave getshell module
- [TheWover/donut](https://github.com/TheWover/donut) - Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
- [google/sanitizers](https://github.com/google/sanitizers) - AddressSanitizer, ThreadSanitizer, MemorySanitizer
- [AntSwordProject/ant_php_extension](https://github.com/AntSwordProject/ant_php_extension) - PHP 扩展, 用于 PHP-FPM、FastCGI、LD_PRELOAD等模式下突破 disabled_functions
- [m57/cobaltstrike_bofs](https://github.com/m57/cobaltstrike_bofs) - My CobaltStrike BOFS
- [anthemtotheego/C_Shot](https://github.com/anthemtotheego/C_Shot) -
- [sailay1996/UAC_Bypass_In_The_Wild](https://github.com/sailay1996/UAC_Bypass_In_The_Wild) - Windows 10 UAC bypass for all executable files which are autoelevate true .
- [a0rtega/pafish](https://github.com/a0rtega/pafish) - Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
- [github/securitylab](https://github.com/github/securitylab) - Resources related to GitHub Security Lab
- [qq4108863/hihttps](https://github.com/qq4108863/hihttps) - hihttps是一款完整源码的高性能web应用防火墙,既支持传统WAF的所有功能如SQL注入、XSS、恶意漏洞扫描、密码暴力破解、CC、DDOS等ModSecurity正则规则,又支持无监督机器学习,自主对抗未知攻击。
- [rvrsh3ll/BOF_Collection](https://github.com/rvrsh3ll/BOF_Collection) - Various Cobalt Strike BOFs
- [sailay1996/RpcSsImpersonator](https://github.com/sailay1996/RpcSsImpersonator) - Privilege Escalation Via RpcSs svc
- [libyal/liblnk](https://github.com/libyal/liblnk) - Library and tools to access the Windows Shortcut File (LNK) format
- [NtRaiseHardError/NINA](https://github.com/NtRaiseHardError/NINA) - NINA: No Injection, No Allocation x64 Process Injection Technique
- [DanieleDeSensi/peafowl](https://github.com/DanieleDeSensi/peafowl) - High performance Deep Packet Inspection (DPI) framework to identify L7 protocols and extract and process data and metadata from network traffic.
- [elfmaster/libelfmaster](https://github.com/elfmaster/libelfmaster) - Secure ELF parsing/loading library for forensics reconstruction of malware, and robust reverse engineering tools
- [elfmaster/ftrace](https://github.com/elfmaster/ftrace) - POSIX Function tracing
- [elfmaster/dsym_obfuscate](https://github.com/elfmaster/dsym_obfuscate) - Obfuscates dynamic symbol table
- [ntop/nDPI](https://github.com/ntop/nDPI) - Open Source Deep Packet Inspection Software Toolkit
- [redplait/armpatched](https://github.com/redplait/armpatched) - clone of armadillo patched for windows
- [dalvarezperez/CreateFile_based_rootkit](https://github.com/dalvarezperez/CreateFile_based_rootkit) -
- [mhaskar/Shellcode-In-Memory-Decoder](https://github.com/mhaskar/Shellcode-In-Memory-Decoder) - A simple C implementation to decoded your shellcode and writes it directly to memory
- [meme/hotwax](https://github.com/meme/hotwax) - Coverage-guided binary fuzzing powered by Frida Stalker
- [avs333/Nougat_dlfunctions](https://github.com/avs333/Nougat_dlfunctions) -
- [hack0z/byopen](https://github.com/hack0z/byopen) - 🎉A dlopen library that bypasses mobile system limitation
- [titansec/OpenWAF](https://github.com/titansec/OpenWAF) - Web security protection system based on openresty
- [ionescu007/faxhell](https://github.com/ionescu007/faxhell) - A Bind Shell Using the Fax Service and a DLL Hijack
- [ph4ntonn/Impost3r](https://github.com/ph4ntonn/Impost3r) - 👻Impost3r -- A linux password thief
- [havocykp/Gh0st](https://github.com/havocykp/Gh0st) - 远控源码
- [yangyangwithgnu/bypass_disablefunc_via_LD_PRELOAD](https://github.com/yangyangwithgnu/bypass_disablefunc_via_LD_PRELOAD) - bypass disable_functions via LD_PRELOA (no need /usr/sbin/sendmail)
- [gentilkiwi/mimikatz](https://github.com/gentilkiwi/mimikatz) - A little tool to play with Windows security
- [itm4n/PrintSpoofer](https://github.com/itm4n/PrintSpoofer) - Abusing impersonation privileges through the "Printer Bug"
- [sandboxie/sandboxie](https://github.com/sandboxie/sandboxie) - The Sandboxie application
- [can1357/NtLua](https://github.com/can1357/NtLua) - Lua in kernel-mode because why not.
- [1d8/MailJack](https://github.com/1d8/MailJack) -
- [thebabush/bline](https://github.com/thebabush/bline) - Naver LINE VoIP reversing stuff
- [kingToolbox/WindTerm](https://github.com/kingToolbox/WindTerm) - A professional cross-platform SSH/Sftp/Shell/Telnet/Serial terminal.
- [nccgroup/nccfsas](https://github.com/nccgroup/nccfsas) - Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.
- [a1exdandy/checkm8-a5](https://github.com/a1exdandy/checkm8-a5) - checkm8 port for S5L8940X/S5L8942X/S5L8945X
- [taviso/ctftool](https://github.com/taviso/ctftool) - Interactive CTF Exploration Tool
- [YutaroHayakawa/ipftrace2](https://github.com/YutaroHayakawa/ipftrace2) - A packet oriented Linux kernel function call tracer
- [hasherezade/hollows_hunter](https://github.com/hasherezade/hollows_hunter) - Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
- [rxwx/spoolsystem](https://github.com/rxwx/spoolsystem) - Print Spooler Named Pipe Impersonation for Cobalt Strike
- [Katrovisch/KatroLogger](https://github.com/Katrovisch/KatroLogger) - KeyLogger for Linux Systems
- [bats3c/shad0w](https://github.com/bats3c/shad0w) - A post exploitation framework designed to operate covertly on heavily monitored environments
- [HyperDbg/HyperDbg](https://github.com/HyperDbg/HyperDbg) - State-of-the-art native debugging tools
- [AltraMayor/gatekeeper](https://github.com/AltraMayor/gatekeeper) - The first open-source DDoS protection system
- [V-E-O/PoC](https://github.com/V-E-O/PoC) - PoC of CVE/Exploit
- [vanhauser-thc/thc-hydra](https://github.com/vanhauser-thc/thc-hydra) - hydra
- [luke-goddard/enumy](https://github.com/luke-goddard/enumy) - Linux post exploitation privilege escalation enumeration
- [oleavr/ios-inject-custom](https://github.com/oleavr/ios-inject-custom) - Example showing how to use Frida for standalone injection of a custom payload
- [Echocipher/AUTO-EARN](https://github.com/Echocipher/AUTO-EARN) - 一个利用OneForAll进行子域收集、Shodan API端口扫描、Xray漏洞Fuzz、Server酱的自动化漏洞扫描、即时通知提醒的漏洞挖掘辅助工具
- [zhuotong/Android_InlineHook](https://github.com/zhuotong/Android_InlineHook) - Android内联hook框架
- [juuso/keychaindump](https://github.com/juuso/keychaindump) - A proof-of-concept tool for reading OS X keychain passwords
- [prbinu/tls-scan](https://github.com/prbinu/tls-scan) - An Internet scale, blazing fast SSL/TLS scanner ( non-blocking, event-driven )
- [a2o/snoopy](https://github.com/a2o/snoopy) - Snoopy Command Logger is a small library that logs all program executions on your Linux/BSD system.
- [gentilkiwi/kirandomtpm](https://github.com/gentilkiwi/kirandomtpm) - Get random bytes from the TPM (tool + BCrypt RNG provider)
- [wonderkun/CTFENV](https://github.com/wonderkun/CTFENV) - 为应对CTF比赛而搭建的各种环境
- [antonioCoco/RoguePotato](https://github.com/antonioCoco/RoguePotato) - Another Windows Local Privilege Escalation from Service Account to System
- [yusufqk/SystemToken](https://github.com/yusufqk/SystemToken) - Steal privileged token to obtain SYSTEM shell
- [uknowsec/getSystem](https://github.com/uknowsec/getSystem) - webshell下提权执行命令 Reference:https://github.com/yusufqk/SystemToken
- [NLnetLabs/ldns](https://github.com/NLnetLabs/ldns) - LDNS is a DNS library that facilitates DNS tool programming
- [noptrix/lulzbuster](https://github.com/noptrix/lulzbuster) - A very fast and smart web directory and file enumeration tool written in C.
- [danigargu/CVE-2020-0796](https://github.com/danigargu/CVE-2020-0796) - CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
- [twelvesec/passcat](https://github.com/twelvesec/passcat) - Passwords Recovery Tool
- [chroblert/domainWeakPasswdCheck](https://github.com/chroblert/domainWeakPasswdCheck) - 内网安全·域账号弱口令审计
- [chroblert/AssetManage](https://github.com/chroblert/AssetManage) -
- [paranoidninja/Shuriken](https://github.com/paranoidninja/Shuriken) - Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.
- [newsoft/adduser](https://github.com/newsoft/adduser) - Programmatically create an administrative user under Windows
- [david378/ssocks](https://github.com/david378/ssocks) - build static ssocks by cmake,cross build ssocks
- [V-E-O/rdp2tcp](https://github.com/V-E-O/rdp2tcp) - rdp2tcp: open tcp tunnel through remote desktop connection.
- [redcanaryco/atomic-red-team](https://github.com/redcanaryco/atomic-red-team) - Small and highly portable detection tests based on MITRE's ATT&CK.
- [brainsmoke/ptrace-burrito](https://github.com/brainsmoke/ptrace-burrito) - a friendly wrapper around ptrace
- [Mr-Un1k0d3r/SCShell](https://github.com/Mr-Un1k0d3r/SCShell) - Fileless lateral movement tool that relies on ChangeServiceConfigA to run command
- [RITRedteam/Headshot](https://github.com/RITRedteam/Headshot) - NGINX module to allow for RCE through a specific header
- [Genymobile/scrcpy](https://github.com/Genymobile/scrcpy) - Display and control your Android device
- [bootleg/ret-sync](https://github.com/bootleg/ret-sync) - ret-sync is a set of plugins that helps to synchronize a debugging session (WinDbg/GDB/LLDB/OllyDbg2/x64dbg) with IDA/Ghidra/Binary Ninja disassemblers.
- [pymumu/smartdns](https://github.com/pymumu/smartdns) - A local DNS server to obtain the fastest website IP for the best Internet experience, support DoT, DoH. 一个本地DNS服务器,获取最快的网站IP,获得最佳上网体验,支持DoH,DoT。
- [outflanknl/Dumpert](https://github.com/outflanknl/Dumpert) - LSASS memory dumper using direct system calls and API unhooking.
- [jonathanmetzman/wasm-fuzzing-demo](https://github.com/jonathanmetzman/wasm-fuzzing-demo) - Demos of and walkthroughs on in-browser fuzzing using WebAssembly
- [turing-technician/FastHook](https://github.com/turing-technician/FastHook) - Android ART Hook
- [0x25bit/darkRat_HVNC](https://github.com/0x25bit/darkRat_HVNC) - DarkRats Standalone HVNC
- [SwiftLaTeX/SwiftLaTeX](https://github.com/SwiftLaTeX/SwiftLaTeX) - SwiftLaTeX, a WYSIWYG Browser-based LaTeX Editor
- [mohuihui/antispy](https://github.com/mohuihui/antispy) - AntiSpy is a free but powerful anti virus and rootkits toolkit.It offers you the ability with the highest privileges that can detect,analyze and restore various kernel modifications and hooks.With its
- [OWASP/igoat](https://github.com/OWASP/igoat) - OWASP iGoat - A Learning Tool for iOS App Pentesting and Security by Swaroop Yermalkar
- [OWASP/iGoat-Swift](https://github.com/OWASP/iGoat-Swift) - OWASP iGoat (Swift) - A Damn Vulnerable Swift Application for iOS
- [hmgle/graftcp](https://github.com/hmgle/graftcp) - A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy.
- [blechschmidt/massdns](https://github.com/blechschmidt/massdns) - A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)
- [abelcheung/rifiuti2](https://github.com/abelcheung/rifiuti2) - Windows Recycle Bin analyser
- [vmonaco/kloak](https://github.com/vmonaco/kloak) - Keystroke-level online anonymization kernel: obfuscates typing behavior at the device level.
- [robertdavidgraham/rdpscan](https://github.com/robertdavidgraham/rdpscan) - A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability.
- [q3k/cve-2019-5736-poc](https://github.com/q3k/cve-2019-5736-poc) - Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)
- [gurnec/HashCheck](https://github.com/gurnec/HashCheck) - HashCheck Shell Extension for Windows with added SHA2, SHA3, and multithreading; originally from code.kliu.org
- [skeeto/endlessh](https://github.com/skeeto/endlessh) - SSH tarpit that slowly sends an endless banner
- [Chion82/netfilter-full-cone-nat](https://github.com/Chion82/netfilter-full-cone-nat) - A kernel module to turn MASQUERADE into full cone SNAT
- [hacksysteam/HackSysExtremeVulnerableDriver](https://github.com/hacksysteam/HackSysExtremeVulnerableDriver) - HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
- [y11en/BlockRDPBrute](https://github.com/y11en/BlockRDPBrute) - [HIPS]RDP(3389)爆破防护
- [klsfct/getshell](https://github.com/klsfct/getshell) - 各大平台提权工具
- [Halbmond/Introduction-to-Computer-Systems](https://github.com/Halbmond/Introduction-to-Computer-Systems) - Course : Introduction to Computer Systems
- [swaywm/sway](https://github.com/swaywm/sway) - i3-compatible Wayland compositor
- [ambrop72/badvpn](https://github.com/ambrop72/badvpn) - NCD scripting language, tun2socks proxifier, P2P VPN
- [firebroo/UnixTools](https://github.com/firebroo/UnixTools) - 一些处理数据的Unix小工具,支持管道操作。
- [meyerd/n2n](https://github.com/meyerd/n2n) - A development branch of the n2n p2p vpn software
- [ValdikSS/p0f-mtu](https://github.com/ValdikSS/p0f-mtu) - p0f with patches to save MTU value and export it via API (for VPN detection)
- [rosehgal/BinExp](https://github.com/rosehgal/BinExp) - Linux Binary Exploitation
- [sfan5/fi6s](https://github.com/sfan5/fi6s) - IPv6 network scanner designed to be fast
- [silight-jp/MacType-Patch](https://github.com/silight-jp/MacType-Patch) - MacType Patch for DirectWrite Hook
- [andreiw/RaspberryPiPkg](https://github.com/andreiw/RaspberryPiPkg) - DEPRECATED - DO NOT USE | Go here instead ->
- [aarond10/https_dns_proxy](https://github.com/aarond10/https_dns_proxy) - A lightweight DNS-over-HTTPS proxy.
- [telekom-security/tpotce](https://github.com/telekom-security/tpotce) - 🍯 T-Pot - The All In One Multi Honeypot Platform 🐝
- [lihaoyun6/axeldown-core](https://github.com/lihaoyun6/axeldown-core) - 基于axel-webm的优化项目. 通过webui调用axel进行下载
- [suvllian/process-inject](https://github.com/suvllian/process-inject) - 在Windows环境下的进程注入方法:远程线程注入、创建进程挂起注入、反射注入、APCInject、SetWindowHookEX注入
- [sumatrapdfreader/sumatrapdf](https://github.com/sumatrapdfreader/sumatrapdf) - SumatraPDF reader
- [zogvm/zogvm](https://github.com/zogvm/zogvm) - zogna video manager
- [henkman/virgo](https://github.com/henkman/virgo) - :virgo::computer::computer::computer::computer: Virtual desktops for Windows
- [netdata/netdata](https://github.com/netdata/netdata) - Architected for speed. Automated for easy. Monitoring and troubleshooting, transformed!
- [RPISEC/MBE](https://github.com/RPISEC/MBE) - Course materials for Modern Binary Exploitation by RPISEC
- [saaramar/execve_exploit](https://github.com/saaramar/execve_exploit) - Hardcore corruption of my execve() vulnerability in WSL
- [Nat-Lab/eoip](https://github.com/Nat-Lab/eoip) - EoIP/EoIPv6 for *nix.
- [tcp-nanqinlang/general](https://github.com/tcp-nanqinlang/general) - general mode via module loading
- [3proxy/3proxy](https://github.com/3proxy/3proxy) - 3proxy - tiny free proxy server
- [coolstar/electra](https://github.com/coolstar/electra) - Electra iOS 11.0 - 11.1.2 jailbreak toolkit based on async_awake
- [dyne/dnscrypt-proxy](https://github.com/dyne/dnscrypt-proxy) - DNSCrypt-Proxy repository, frankly maintained for what it does (no new features planned)
- [agile6v/awesome-nginx](https://github.com/agile6v/awesome-nginx) - A curated list of awesome Nginx distributions, 3rd party modules, Active developers, etc. :octocat:
- [Chuyu-Team/MINT](https://github.com/Chuyu-Team/MINT) - Contains the definitions for the Windows Internal UserMode API from ntdll.dll, samlib.dll and winsta.dll.
- [guanchao/AppProtect](https://github.com/guanchao/AppProtect) - 整理一些app常见的加固方法,包括java层、native层和资源文件加固等
- [firmianay/CTF-All-In-One](https://github.com/firmianay/CTF-All-In-One) - CTF竞赛权威指南
- [Wind4/vlmcsd](https://github.com/Wind4/vlmcsd) - KMS Emulator in C (currently runs on Linux including Android, FreeBSD, Solaris, Minix, Mac OS, iOS, Windows with or without Cygwin)
- [Motion-Project/motion](https://github.com/Motion-Project/motion) - Motion, a software motion detector. Home page: https://motion-project.github.io/
- [mpv-player/mpv](https://github.com/mpv-player/mpv) - 🎥 Command line video player
- [gsliepen/tinc](https://github.com/gsliepen/tinc) - a VPN daemon
- [hardenedlinux/linux-exploit-development-tutorial](https://github.com/hardenedlinux/linux-exploit-development-tutorial) - a series tutorial for linux exploit development to newbie.
- [NoahhhRyan/krackattacks-test](https://github.com/NoahhhRyan/krackattacks-test) -
- [hfiref0x/UACME](https://github.com/hfiref0x/UACME) - Defeating Windows User Account Control
- [tinyproxy/tinyproxy](https://github.com/tinyproxy/tinyproxy) - tinyproxy - a light-weight HTTP/HTTPS proxy daemon for POSIX operating systems
- [mitchellkrogza/apache-ultimate-bad-bot-blocker](https://github.com/mitchellkrogza/apache-ultimate-bad-bot-blocker) - Apache Block Bad Bots, (Referer) Spam Referrer Blocker, Vulnerability Scanners, Malware, Adware, Ransomware, Malicious Sites, Wordpress Theme Detectors and Fail2Ban Jail for Repeat Offenders
- [vanhoefm/krackattacks-scripts](https://github.com/vanhoefm/krackattacks-scripts) -
- [droberson/icmp-backdoor](https://github.com/droberson/icmp-backdoor) - Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.
- [giltu/KernelPCC](https://github.com/giltu/KernelPCC) - PCC is a new approach for TCP congestion control base on real-time performance analysis. This is a kernel implementation of it.
- [madeye/tcp_china](https://github.com/madeye/tcp_china) - TCP China congestion control algorithm
- [gatieme/AderXCoding](https://github.com/gatieme/AderXCoding) - 介绍各类语言,库,系统编程以及算法的学习
- [session-replay-tools/tcpcopy](https://github.com/session-replay-tools/tcpcopy) - An online request replication and TCP stream replay tool, ideal for real testing, performance testing, stability testing, stress testing, load testing, smoke testing, and more.
- [sudeshnapal12/Web-Application-Firewall](https://github.com/sudeshnapal12/Web-Application-Firewall) - Designed and Implemented a Web Application Firewall as an Apache module that "sits" in-front of a web server. The WAF is designed to stop malicious requests from known attacks such as SQL Injection, X
- [50m30n3/dsptunnel](https://github.com/50m30n3/dsptunnel) - IP over audio tunnel
- [Ridter/Pentest](https://github.com/Ridter/Pentest) - tools
- [dosgo/ngrok-c](https://github.com/dosgo/ngrok-c) - ngrok client for c language,Due to the use of GO ngrok language development, porting to embedded devices some inconvenience, such as openwrt, so use C language rewrite a client. Very mini, the need to
- [dlundquist/sniproxy](https://github.com/dlundquist/sniproxy) - Proxies incoming HTTP and TLS connections based on the hostname contained in the initial request of the TCP session.
- [haiwen/seafile](https://github.com/haiwen/seafile) - High performance file syncing and sharing, with also Markdown WYSIWYG editing, Wiki, file label and other knowledge management features.
- [WireGuard/wireguard-monolithic-historical](https://github.com/WireGuard/wireguard-monolithic-historical) - Historical monolithic WireGuard repository, split into wireguard-tools, wireguard-linux, and wireguard-linux-compat.
- [git-hulk/tcpkit](https://github.com/git-hulk/tcpkit) - the tcpkit was designed to make network packets programable with Lua script
- [snooda/net-speeder](https://github.com/snooda/net-speeder) - net-speeder 在高延迟不稳定链路上优化单线程下载速度
- [rip1s/vmware_escape](https://github.com/rip1s/vmware_escape) - VMware Escape Exploit before VMware WorkStation 12.5.5
- [axel-download-accelerator/axel](https://github.com/axel-download-accelerator/axel) - Lightweight CLI download accelerator
- [skywind3000/kcp](https://github.com/skywind3000/kcp) - :zap: KCP - A Fast and Reliable ARQ Protocol
- [osqzss/gps-sdr-sim](https://github.com/osqzss/gps-sdr-sim) - Software-Defined GPS Signal Simulator
- [magkopian/keepassxc-debian](https://github.com/magkopian/keepassxc-debian) - Debian source package for the KeePassXC password manager.
- [ScottyBauer/Android_Kernel_CVE_POCs](https://github.com/ScottyBauer/Android_Kernel_CVE_POCs) - A list of my CVE's with POCs
- [axi0mX/ios-kexec-utils](https://github.com/axi0mX/ios-kexec-utils) - boot LLB/iBoot/iBSS/iBEC image from a jailbroken iOS kernel
- [santoru/filewatcher](https://github.com/santoru/filewatcher) - A simple auditing utility for macOS
- [Cn33liz/HSEVD-ArbitraryOverwrite](https://github.com/Cn33liz/HSEVD-ArbitraryOverwrite) - HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit
- [c0d3z3r0/sudo-CVE-2017-1000367](https://github.com/c0d3z3r0/sudo-CVE-2017-1000367) -
- [Chion82/kcptun-raw](https://github.com/Chion82/kcptun-raw) - Kcptun with raw socket and fake TCP headers.
- [klsecservices/Invoke-Vnc](https://github.com/klsecservices/Invoke-Vnc) - Powershell VNC injector
- [DhavalKapil/icmptunnel](https://github.com/DhavalKapil/icmptunnel) - Transparently tunnel your IP traffic through ICMP echo and reply packets.
- [shudo/shujit](https://github.com/shudo/shujit) - Java Just-in-Time Compiler for x86 processors
- [opsxcq/exploit-CVE-2017-7494](https://github.com/opsxcq/exploit-CVE-2017-7494) - SambaCry exploit and vulnerable container (CVE-2017-7494)
- [raminfp/linux-4.8.0-netfilter_icmp](https://github.com/raminfp/linux-4.8.0-netfilter_icmp) - Anatomy of a linux kernel development
- [DhavalKapil/heap-exploitation](https://github.com/DhavalKapil/heap-exploitation) - This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structure.
- [ANSSI-FR/AD-control-paths](https://github.com/ANSSI-FR/AD-control-paths) - Active Directory Control Paths auditing and graphing tools
- [ValdikSS/GoodbyeDPI](https://github.com/ValdikSS/GoodbyeDPI) - GoodbyeDPI — Deep Packet Inspection circumvention utility (for Windows)
- [ufrisk/pcileech](https://github.com/ufrisk/pcileech) - Direct Memory Access (DMA) Attack Software
- [Cybellum/DoubleAgent](https://github.com/Cybellum/DoubleAgent) - Zero-Day Code Injection and Persistence Technique
- [gentilkiwi/wanakiwi](https://github.com/gentilkiwi/wanakiwi) - Automated wanadecrypt with key recovery if lucky
- [jtesta/ssh-mitm](https://github.com/jtesta/ssh-mitm) - SSH man-in-the-middle tool
- [SecWiki/linux-kernel-exploits](https://github.com/SecWiki/linux-kernel-exploits) - linux-kernel-exploits Linux平台提权漏洞集合
- [adafruit/Adafruit-GPIO-Halt](https://github.com/adafruit/Adafruit-GPIO-Halt) - Press-to-halt program for headless Raspberry Pi. Similar functionality to the rpi_power_switch kernel module from the fbtft project, but easier to compile (no kernel headers needed).
- [greensea/mptunnel](https://github.com/greensea/mptunnel) - MPUDP Tunnel (User space MultiPath UDP)
- [Keysight/Rhme-2016](https://github.com/Keysight/Rhme-2016) - Rhme2 challenge (2016)
- [leechristensen/UnmanagedPowerShell](https://github.com/leechristensen/UnmanagedPowerShell) - Executes PowerShell from an unmanaged process
- [peperunas/injectopi](https://github.com/peperunas/injectopi) - A set of tutorials about code injection for Windows.
- [hasherezade/demos](https://github.com/hasherezade/demos) - Demos of various injection techniques found in malware
- [google/honggfuzz](https://github.com/google/honggfuzz) - Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)
- [mubix/post-exploitation](https://github.com/mubix/post-exploitation) - Post Exploitation Collection
- [hxp2k6/smart7ec-scan-console](https://github.com/hxp2k6/smart7ec-scan-console) - 基于Linux c开发的插件式扫描器(Python/lua)
- [SpacehuhnTech/esp8266_deauther](https://github.com/SpacehuhnTech/esp8266_deauther) - Affordable WiFi hacking platform for testing and learning
- [hlldz/Phant0m](https://github.com/hlldz/Phant0m) - Windows Event Log Killer
- [s0lst1c3/eaphammer](https://github.com/s0lst1c3/eaphammer) - Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
- [LukaSikic/Unix-Privilege-Escalation-Exploits-Pack](https://github.com/LukaSikic/Unix-Privilege-Escalation-Exploits-Pack) - Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.
- [kala13x/scap](https://github.com/kala13x/scap) - Network Sniffer (Scan and Capture Incoming Packets)
- [nmap/ncrack](https://github.com/nmap/ncrack) - Ncrack network authentication tool
- [SecWiki/windows-kernel-exploits](https://github.com/SecWiki/windows-kernel-exploits) - windows-kernel-exploits Windows平台提权漏洞集合
- [ele7enxxh/Android-Inline-Hook](https://github.com/ele7enxxh/Android-Inline-Hook) - thumb16 thumb32 arm32 inlineHook in Android
- [laginimaineb/cve-2015-6639](https://github.com/laginimaineb/cve-2015-6639) - QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)
- [deamwork/inetutils](https://github.com/deamwork/inetutils) - the copy of https://git.savannah.gnu.org/cgit/inetutils.git/ with knali support
- [traviscross/mtr](https://github.com/traviscross/mtr) - Official repository for mtr, a network diagnostic tool
- [kmyk/libproofofwork](https://github.com/kmyk/libproofofwork) - Simple hash-mining c library and its python binding.
- [boywhp/wifi_crack_windows](https://github.com/boywhp/wifi_crack_windows) - wifi crack project for windows
- [zcgonvh/NTDSDumpEx](https://github.com/zcgonvh/NTDSDumpEx) - NTDS.dit offline dumper with non-elevated
- [derrekr/android_security](https://github.com/derrekr/android_security) - Public Android Vulnerability Information (CVE PoCs etc)
- [googleprojectzero/winafl](https://github.com/googleprojectzero/winafl) - A fork of AFL for fuzzing Windows binaries
- [F-Stack/f-stack](https://github.com/F-Stack/f-stack) - F-Stack is an user space network development kit with high performance based on DPDK, FreeBSD TCP/IP stack and coroutine API.
- [mrschyte/pentestkoala](https://github.com/mrschyte/pentestkoala) - Modified dropbear server which acts as a client and allows authless login
- [openwall/john](https://github.com/openwall/john) - John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
- [netblue30/firejail](https://github.com/netblue30/firejail) - Linux namespaces and seccomp-bpf sandbox
- [Azard/SE315-OperatingSystem](https://github.com/Azard/SE315-OperatingSystem) - SJTU-SE315 Operating System labs from MIT 6.828, by a SE12er.
- [gamelinux/passivedns](https://github.com/gamelinux/passivedns) - A network sniffer that logs all DNS server replies for use in a passive DNS setup
- [spacehuhn/wifi_ducky](https://github.com/spacehuhn/wifi_ducky) - Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4
- [danieljiang0415/android_kernel_crash_poc](https://github.com/danieljiang0415/android_kernel_crash_poc) -
- [robertfisk/USG](https://github.com/robertfisk/USG) - The USG is Good, not Bad
- [ossec/ossec-hids](https://github.com/ossec/ossec-hids) - OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
- [iovisor/bcc](https://github.com/iovisor/bcc) - BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more
- [huntergregal/mimipenguin](https://github.com/huntergregal/mimipenguin) - A tool to dump the login password from the current linux user
- [SamyPesse/How-to-Make-a-Computer-Operating-System](https://github.com/SamyPesse/How-to-Make-a-Computer-Operating-System) - How to Make a Computer Operating System in C++
- [nonstriater/Learn-Algorithms](https://github.com/nonstriater/Learn-Algorithms) - 算法学习笔记
- [wg/wrk](https://github.com/wg/wrk) - Modern HTTP benchmarking tool## C# #
- [MInggongK/Penetration-mining-src](https://github.com/MInggongK/Penetration-mining-src) - 一款集成了H3C,致远,泛微,万户,帆软,海康威视,金蝶云星空,畅捷通,Struts等多个RCE漏洞利用工具
- [INotGreen/SharpScan](https://github.com/INotGreen/SharpScan) - 内网资产收集、探测主机存活、端口扫描、域控定位、文件搜索、各种服务爆破(SSH、SMB、MsSQL等)、Socks代理,一键自动化+无文件落地扫描
- [qwqdanchun/Pillager](https://github.com/qwqdanchun/Pillager) - Pillager是一个适用于后渗透期间的信息收集工具
- [StarfireLab/SharpWeb](https://github.com/StarfireLab/SharpWeb) - 一个浏览器数据(密码|历史记录|Cookie|书签|下载记录)的导出工具,支持主流浏览器。
- [Mangofang/BypassLoad](https://github.com/Mangofang/BypassLoad) - shellcode免杀加载器,过主流杀软
- [DeEpinGh0st/WindowsBaselineAssistant](https://github.com/DeEpinGh0st/WindowsBaselineAssistant) - Windows安全基线核查加固助手
- [mabangde/winlogparser](https://github.com/mabangde/winlogparser) - windows 日志检测工具
- [Ridter/MSSQL_CLR](https://github.com/Ridter/MSSQL_CLR) - MSSQL CLR for pentest.
- [la00gke/DomainAuto-one](https://github.com/la00gke/DomainAuto-one) - Domain penetration automation module one, domain information collection.
- [0xb11a1/yetAnotherObfuscator](https://github.com/0xb11a1/yetAnotherObfuscator) - C# obfuscator that bypass windows defender
- [BeichenDream/GodPotato](https://github.com/BeichenDream/GodPotato) -
- [WesleyWong420/RedTeamOps-Havoc-101](https://github.com/WesleyWong420/RedTeamOps-Havoc-101) - Materials for the workshop "Red Team Ops: Havoc 101"
- [darktohka/FlashPatch](https://github.com/darktohka/FlashPatch) - FlashPatch! Play Adobe Flash Player games in the browser after January 12th, 2021.
- [daem0nc0re/TangledWinExec](https://github.com/daem0nc0re/TangledWinExec) - PoCs and tools for investigation of Windows process execution techniques
- [sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAY](https://github.com/sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAY) - Exploit for the CVE-2023-23397
- [Sq00ky/csharp-portscanner](https://github.com/Sq00ky/csharp-portscanner) - simple C# portscanner - written for playing around with Metasploit's Execute-Assembly
- [zcgonvh/DCOMPotato](https://github.com/zcgonvh/DCOMPotato) - Some Service DCOM Object and SeImpersonatePrivilege abuse.
- [zR00t1/WannaCry](https://github.com/zR00t1/WannaCry) - 基于C#编写的WannaCry模拟病毒,通常应用于网络安全应急演练
- [lele8/SharpUserIP](https://github.com/lele8/SharpUserIP) - 获取服务器或域控登录日志
- [mandiant/ADFSDump](https://github.com/mandiant/ADFSDump) -
- [rasta-mouse/SharpC2](https://github.com/rasta-mouse/SharpC2) - Command and Control Framework written in C#
- [bugch3ck/SharpEfsPotato](https://github.com/bugch3ck/SharpEfsPotato) - Local privilege escalation from SeImpersonatePrivilege using EfsRpc.
- [RikunjSindhwad/MSSQL-Attacker](https://github.com/RikunjSindhwad/MSSQL-Attacker) - MSSQL Database Attacker tool
- [F3eev/SharkExec](https://github.com/F3eev/SharkExec) - 内网渗透|红队工具|C#内存加载|cobaltstrike
- [BornToBeRoot/NETworkManager](https://github.com/BornToBeRoot/NETworkManager) - A powerful tool for managing networks and troubleshoot network problems!
- [netwrix/PingCastleCloud](https://github.com/netwrix/PingCastleCloud) - Audit program for AzureAD
- [BeichenDream/SharpToken](https://github.com/BeichenDream/SharpToken) - Windows Token Stealing Expert
- [casbin-net/redis-adapter](https://github.com/casbin-net/redis-adapter) - Redis adapter for Casbin.NET
- [pwn1sher/frostbyte](https://github.com/pwn1sher/frostbyte) - FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads
- [CervantesSec/cervantes](https://github.com/CervantesSec/cervantes) - Cervantes is an open-source, collaborative platform designed specifically for pentesters and red teams. It serves as a comprehensive management tool, streamlining the organization of projects, clients
- [xpn/AppProxyC2](https://github.com/xpn/AppProxyC2) -
- [improsec/SharpEventPersist](https://github.com/improsec/SharpEventPersist) - Persistence by writing/reading shellcode from Event Log
- [EricZimmerman/evtx](https://github.com/EricZimmerman/evtx) - C# based evtx parser with lots of extras
- [Ryze-T/CNVD-2022-10270-LPE](https://github.com/Ryze-T/CNVD-2022-10270-LPE) - 基于向日葵RCE的本地权限提升,无需指定端口
- [Hagrid29/DuplicateDump](https://github.com/Hagrid29/DuplicateDump) - Dumping LSASS with a duplicated handle from custom LSA plugin
- [fox-it/LDAPFragger](https://github.com/fox-it/LDAPFragger) -
- [nettitude/SharpWSUS](https://github.com/nettitude/SharpWSUS) -
- [BloodHoundAD/SharpHoundCommon](https://github.com/BloodHoundAD/SharpHoundCommon) - Common library used by SharpHound.
- [nettitude/MalSCCM](https://github.com/nettitude/MalSCCM) -
- [Viralmaniar/DDWPasteRecon](https://github.com/Viralmaniar/DDWPasteRecon) - DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC & Blue Team to gain situational awareness of the organisation's
- [Dec0ne/KrbRelayUp](https://github.com/Dec0ne/KrbRelayUp) - KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
- [whitesquirrell/C0deVari4nt](https://github.com/whitesquirrell/C0deVari4nt) - A variant analysis and visualisation tool that scans codebases for similar vulnerabilities
- [arsium/EagleMonitorRAT](https://github.com/arsium/EagleMonitorRAT) - Remote Access Tool Written In C#
- [onSec-fr/Http-Asynchronous-Reverse-Shell](https://github.com/onSec-fr/Http-Asynchronous-Reverse-Shell) - [POC] Asynchronous reverse shell using the HTTP protocol.
- [yck1509/ConfuserEx](https://github.com/yck1509/ConfuserEx) - An open-source, free protector for .NET applications
- [daem0nc0re/AtomicSyscall](https://github.com/daem0nc0re/AtomicSyscall) - Tools and PoCs for Windows syscall investigation.
- [scotty-kdw/ARM-Analyzer](https://github.com/scotty-kdw/ARM-Analyzer) - Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation
- [RowTeam/SharpDecryptPwd](https://github.com/RowTeam/SharpDecryptPwd) - SharpDecryptPwd source, To Decrypt Navicat,Xmanager,Filezilla,Foxmail,WinSCP,etc
- [Gr1mmie/AtlasC2](https://github.com/Gr1mmie/AtlasC2) - C# C2 Framework centered around Stage 1 operations
- [wwh1004/ExtremeDumper](https://github.com/wwh1004/ExtremeDumper) - .NET Assembly Dumper
- [netero1010/ScheduleRunner](https://github.com/netero1010/ScheduleRunner) - A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation
- [Group3r/Group3r](https://github.com/Group3r/Group3r) - Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.
- [JDArmy/SharpXDecrypt](https://github.com/JDArmy/SharpXDecrypt) - Xshell全版本密码恢复工具
- [cube0x0/KrbRelay](https://github.com/cube0x0/KrbRelay) - Framework for Kerberos relaying
- [0xthirteen/SharpStay](https://github.com/0xthirteen/SharpStay) - .NET project for installing Persistence
- [skahwah/SQLRecon](https://github.com/skahwah/SQLRecon) - A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.
- [tothi/SharpStay](https://github.com/tothi/SharpStay) - .NET project for installing Persistence
- [dqcostin/SharpGetinfo](https://github.com/dqcostin/SharpGetinfo) - 关于工作组和域信息收集的工具
- [Flangvik/CobaltBus](https://github.com/Flangvik/CobaltBus) - Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus
- [ly4k/SpoolFool](https://github.com/ly4k/SpoolFool) - Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)
- [py7hagoras/GetSystem](https://github.com/py7hagoras/GetSystem) - This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of almost any SYSTEM process.
- [mrd0x/EvilSelenium](https://github.com/mrd0x/EvilSelenium) - EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.
- [jfmaes/AmsiHooker](https://github.com/jfmaes/AmsiHooker) - Hookers are cooler than patches.
- [VbScrub/Rubeus-GUI](https://github.com/VbScrub/Rubeus-GUI) - GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements
- [pengw0048/WechatExport-iOS](https://github.com/pengw0048/WechatExport-iOS) - Save iOS WeChat history as HTML or TXT with neat layout and picture & audio support.
- [snovvcrash/MirrorDump](https://github.com/snovvcrash/MirrorDump) - Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in memory
- [mandiant/SharPersist](https://github.com/mandiant/SharPersist) -
- [An0nySec/UserAdd](https://github.com/An0nySec/UserAdd) - Bypass AV 用户添加
- [daem0nc0re/PrivFu](https://github.com/daem0nc0re/PrivFu) - Kernel mode WinDbg extension and PoCs for token privilege investigation.
- [pwn1sher/WMEye](https://github.com/pwn1sher/WMEye) - WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement
- [bohops/RogueAssemblyHunter](https://github.com/bohops/RogueAssemblyHunter) - Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.
- [VollRagm/KernelBypassSharp](https://github.com/VollRagm/KernelBypassSharp) - C# Kernel Mode Driver to read and write memory in protected processes
- [punk-security/smbeagle](https://github.com/punk-security/smbeagle) - SMBeagle - Fileshare auditing tool.
- [evi1ox/sharpNetstat](https://github.com/evi1ox/sharpNetstat) -
- [Jumbo-WJB/SharpAllowedToAct-Modify](https://github.com/Jumbo-WJB/SharpAllowedToAct-Modify) - resource-based constrained delegation RBCD
- [Ridter/SharpAddDomainMachine](https://github.com/Ridter/SharpAddDomainMachine) - SharpAddDomainMachine
- [cube0x0/noPac](https://github.com/cube0x0/noPac) - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.
- [matterpreter/FindETWProviderImage](https://github.com/matterpreter/FindETWProviderImage) - Quickly search for references to a GUID in DLLs, EXEs, and drivers
- [A-D-Team/SharpMemshell](https://github.com/A-D-Team/SharpMemshell) - Memshell
- [daem0nc0re/SharpWnfSuite](https://github.com/daem0nc0re/SharpWnfSuite) - C# Utilities for Windows Notification Facility
- [FDlucifer/Proxy-Attackchain](https://github.com/FDlucifer/Proxy-Attackchain) - Proxylogon & Proxyshell & Proxyoracle & Proxytoken & All exchange server history vulns summarization :)
- [hackthedev/teardrop](https://github.com/hackthedev/teardrop) - Open-Source Ransomware Project for learning purpose only written in C# (csharp). Dont use it for bad things.
- [Jhangju/bypass-sandbox-antivirus-detection-using-human-interaction-technique-by-cheking-mouse-movement](https://github.com/Jhangju/bypass-sandbox-antivirus-detection-using-human-interaction-technique-by-cheking-mouse-movement) - This project actually checks for the mouse movement if reach to 100 pixel it will start cmd and open cmd.exe and chrome.exe. Just to give idea that some sandbox does not use mouse movements.
- [DamonMohammadbagher/NativePayload_ReverseShell](https://github.com/DamonMohammadbagher/NativePayload_ReverseShell) - This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypassed via this method Very Simple)
- [Kara-4search/MappingInjection_CSharp](https://github.com/Kara-4search/MappingInjection_CSharp) - MappingInjection via csharp
- [tedyyu/ProcDumpEx](https://github.com/tedyyu/ProcDumpEx) - ProcDumpEx = ProcDump in batch mode
- [rasta-mouse/ExternalC2.NET](https://github.com/rasta-mouse/ExternalC2.NET) - .NET implementation of Cobalt Strike's External C2 Spec
- [ldqk/Masuit.Tools](https://github.com/ldqk/Masuit.Tools) - 全龄段友好的C#万能工具库,码数吐司库,包含一些常用的操作类,大都是静态类,加密解密,反射操作,权重随机筛选算法,分布式短id,表达式树,linq扩展,文件压缩,多线程下载,硬件信息,字符串扩展方法,日期时间扩展操作,中国农历,大文件拷贝,图像裁剪,验证码,断点续传,集合扩展、Excel导出等常用封装。诸多功能集一身,代码量不到2MB!
- [ryhanson/ExternalC2](https://github.com/ryhanson/ExternalC2) - A library for integrating communication channels with the Cobalt Strike External C2 server
- [chr0n1k/AH2021Workshop](https://github.com/chr0n1k/AH2021Workshop) - Malware development for red teaming workshop
- [CanIPhish/Phishious](https://github.com/CanIPhish/Phishious) - An open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.
- [knight0x07/ImpulsiveDLLHijack](https://github.com/knight0x07/ImpulsiveDLLHijack) - C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
- [iomoath/PowerShx](https://github.com/iomoath/PowerShx) - Run Powershell without software restrictions.
- [leechristensen/SpoolSample](https://github.com/leechristensen/SpoolSample) - PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as well.
- [plackyhacker/Shellcode-Injection-Techniques](https://github.com/plackyhacker/Shellcode-Injection-Techniques) - A collection of C# shellcode injection techniques. All techniques use an AES encrypted meterpreter payload. I will be building this project up as I learn, discover or develop more techniques. Some tec
- [p0dalirius/LDAPmonitor](https://github.com/p0dalirius/LDAPmonitor) - Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!
- [plackyhacker/Suspended-Thread-Injection](https://github.com/plackyhacker/Suspended-Thread-Injection) - Another meterpreter injection technique using C# that attempts to bypass Defender
- [0x727/SchTask_0x727](https://github.com/0x727/SchTask_0x727) - 创建隐藏计划任务,权限维持,Bypass AV
- [7hr0wer/ProxyValidator](https://github.com/7hr0wer/ProxyValidator) - 用C#开发的简单的多线程代理验证工具。
- [tevora-threat/SharpView](https://github.com/tevora-threat/SharpView) - C# implementation of harmj0y's PowerView
- [pornin/paradox-compress](https://github.com/pornin/paradox-compress) - Paper and Demo Implementation of Paradoxical Compression with VDF
- [StarZHF/Foxmail-Password-Recovery](https://github.com/StarZHF/Foxmail-Password-Recovery) -
- [zacateras/sddl-parser](https://github.com/zacateras/sddl-parser) - Security Descriptor Definition Language (SDDL) Parser
- [pentest-tools-public/Pass-to-hash-EWS](https://github.com/pentest-tools-public/Pass-to-hash-EWS) -
- [GhostPack/SharpDPAPI](https://github.com/GhostPack/SharpDPAPI) - SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.
- [lassehauballe/Eternalblue](https://github.com/lassehauballe/Eternalblue) - Eternalblue written in CSharp. Contains version detection, vulnerability scanner and exploit of MS17-010
- [ChoiSG/SharpJfmaesWorkshop](https://github.com/ChoiSG/SharpJfmaesWorkshop) - things I learned from @jfmaes's .NET reflection workshop - thank you for the great workshop
- [RiccardoAncarani/LiquidSnake](https://github.com/RiccardoAncarani/LiquidSnake) - LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript
- [waf/CSharpRepl](https://github.com/waf/CSharpRepl) - A command line C# REPL with syntax highlighting – explore the language, libraries and nuget packages interactively.
- [eladshamir/Whisker](https://github.com/eladshamir/Whisker) - Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.
- [evilashz/SharpADUserIP](https://github.com/evilashz/SharpADUserIP) - 提取DC日志,快速获取域用户对应IP地址
- [iomoath/SharpSpray](https://github.com/iomoath/SharpSpray) - Active Directory password spraying tool. Auto fetches user list and avoids potential lockouts.
- [GhostPack/RestrictedAdmin](https://github.com/GhostPack/RestrictedAdmin) - Remotely enables Restricted Admin Mode
- [X-C3LL/xlsxPoison](https://github.com/X-C3LL/xlsxPoison) - Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)
- [fozavci/WeaponisingCSharp-Fundamentals](https://github.com/fozavci/WeaponisingCSharp-Fundamentals) - Weaponising C# - Fundamentals Training Content
- [bitsadmin/fakelogonscreen](https://github.com/bitsadmin/fakelogonscreen) - Fake Windows logon screen to steal passwords
- [YDHCUI/csload.net](https://github.com/YDHCUI/csload.net) - 一个cobaltstrike shellcode加载器,过国内主流杀软
- [EncodeGroup/UAC-SilentClean](https://github.com/EncodeGroup/UAC-SilentClean) - New UAC bypass for Silent Cleanup for CobaltStrike
- [deadjakk/Reg1c1de](https://github.com/deadjakk/Reg1c1de) - Registry permission scanner written in C# for finding potential privesc avenues within registry
- [mai1zhi2/SharpBeacon](https://github.com/mai1zhi2/SharpBeacon) - CobaltStrike Beacon written in .Net 4 用.net重写了stager及Beacon,其中包括正常上线、文件管理、进程管理、令牌管理、结合SysCall进行注入、原生端口转发、关ETW等一系列功能
- [mobdk/Upsilon](https://github.com/mobdk/Upsilon) - Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used
- [RedSiege/EDD](https://github.com/RedSiege/EDD) - Enumerate Domain Data
- [chvancooten/OSEP-Code-Snippets](https://github.com/chvancooten/OSEP-Code-Snippets) - A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.
- [w1u0u1/smb2os](https://github.com/w1u0u1/smb2os) - Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019
- [iomoath/SharpStrike](https://github.com/iomoath/SharpStrike) - A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.
- [gellin/bantam](https://github.com/gellin/bantam) - A PHP backdoor management and generation tool/C2 featuring end to end encrypted payload streaming designed to bypass WAF, IDS, SIEM systems.
- [cube0x0/MiniDump](https://github.com/cube0x0/MiniDump) - C# Lsass parser
- [uknowsec/SharpCryptPermute](https://github.com/uknowsec/SharpCryptPermute) - Crypt/Decrypt Proxyshell Payload
- [PwnDexter/SharpEDRChecker](https://github.com/PwnDexter/SharpEDRChecker) - Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories, installed services and each service binaries metadata, install
- [nettitude/SharpSocks](https://github.com/nettitude/SharpSocks) - Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell
- [med0x2e/SigFlip](https://github.com/med0x2e/SigFlip) - SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature.
- [CCob/BeaconEye](https://github.com/CCob/BeaconEye) - Hunts out CobaltStrike beacons and logs operator command output
- [GhostPack/ForgeCert](https://github.com/GhostPack/ForgeCert) - "Golden" certificates
- [GhostPack/Certify](https://github.com/GhostPack/Certify) - Active Directory certificate abuse.
- [Flangvik/DeployPrinterNightmare](https://github.com/Flangvik/DeployPrinterNightmare) - C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!
- [GhostPack/SharpWMI](https://github.com/GhostPack/SharpWMI) - SharpWMI is a C# implementation of various WMI functionality.
- [Flangvik/ADCSPwn](https://github.com/Flangvik/ADCSPwn) - A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service.
- [bats3c/ADCSPwn](https://github.com/bats3c/ADCSPwn) - A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service.
- [med0x2e/GadgetToJScript](https://github.com/med0x2e/GadgetToJScript) - A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA based scripts.
- [zcgonvh/EfsPotato](https://github.com/zcgonvh/EfsPotato) - Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).
- [tuian/subTee-gits-backups](https://github.com/tuian/subTee-gits-backups) - subTee gists code backups
- [Inf0secRabbit/BadAssMacros](https://github.com/Inf0secRabbit/BadAssMacros) - BadAssMacros - C# based automated Malicous Macro Generator.
- [GhostPack/Rubeus](https://github.com/GhostPack/Rubeus) - Trying to tame the three-headed dog.
- [RedSiege/CIMplant](https://github.com/RedSiege/CIMplant) - C# port of WMImplant which uses either CIM or WMI to query remote systems
- [aniqfakhrul/Sharperner](https://github.com/aniqfakhrul/Sharperner) - Simple executable generator with encrypted shellcode.
- [qwqdanchun/DcRat](https://github.com/qwqdanchun/DcRat) - A simple remote tool in C#.
- [dotnet/roslyn](https://github.com/dotnet/roslyn) - The Roslyn .NET compiler provides C# and Visual Basic languages with rich code analysis APIs.
- [connormcgarr/LittleCorporal](https://github.com/connormcgarr/LittleCorporal) - LittleCorporal: A C# Automated Maldoc Generator
- [OG-Sadpanda/SharpSword](https://github.com/OG-Sadpanda/SharpSword) - Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly
- [klezVirus/CheeseTools](https://github.com/klezVirus/CheeseTools) - Self-developed tools for Lateral Movement/Code Execution
- [OG-Sadpanda/SharpExcelibur](https://github.com/OG-Sadpanda/SharpExcelibur) - Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly
- [AnErrupTion/LoGiC.NET](https://github.com/AnErrupTion/LoGiC.NET) - A free and open-source .NET obfuscator using dnlib.
- [Mr-Un1k0d3r/ADHuntTool](https://github.com/Mr-Un1k0d3r/ADHuntTool) - official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)
- [MythicAgents/Apollo](https://github.com/MythicAgents/Apollo) - A .NET Framework 4.0 Windows Agent
- [Yaxser/SharpPhish](https://github.com/Yaxser/SharpPhish) - Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.
- [Kara-4search/DInvoke_shellcodeload_CSharp](https://github.com/Kara-4search/DInvoke_shellcodeload_CSharp) - ShellCodeLoader via DInvoke
- [Flangvik/SharpProxyLogon](https://github.com/Flangvik/SharpProxyLogon) - C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection
- [dahall/Vanara](https://github.com/dahall/Vanara) - A set of .NET libraries for Windows implementing PInvoke calls to many native Windows APIs with supporting wrappers.
- [LimerBoy/FireFox-Thief](https://github.com/LimerBoy/FireFox-Thief) - :fox_face: Decrypt gecko based browsers passwords, cookies, history, bookmarks.
- [gourk/FirePwd.Net](https://github.com/gourk/FirePwd.Net) - Password reader for Mozilla Firefox and Thunderbird
- [BinaryScary/NET-Obfuscate](https://github.com/BinaryScary/NET-Obfuscate) - Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI
- [sourceincite/CVE-2021-24085](https://github.com/sourceincite/CVE-2021-24085) -
- [cube0x0/CVE-2021-1675](https://github.com/cube0x0/CVE-2021-1675) - C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527
- [DamonMohammadbagher/FSWatch](https://github.com/DamonMohammadbagher/FSWatch) - File System Watcher via C# (Monitoring File Activity , Create/Delete/Change/Rename events + some Activity like Size/Attribute/Security Changes & LastAccess, LastWrite etc...)
- [nettitude/RunPE](https://github.com/nettitude/RunPE) - C# Reflective loader for unmanaged binaries.
- [GhostPack/SharpDump](https://github.com/GhostPack/SharpDump) - SharpDump is a C# port of PowerSploit's Out-Minidump.ps1 functionality.
- [IlanKalendarov/SharpHook](https://github.com/IlanKalendarov/SharpHook) - SharpHook is an offensive API hooking tool designed to catch various credentials within the API call.
- [improsec/ImproHound](https://github.com/improsec/ImproHound) - Identify the attack paths in BloodHound breaking your AD tiering
- [GetRektBoy724/SharpUnhooker](https://github.com/GetRektBoy724/SharpUnhooker) - C# Based Universal API Unhooker
- [rasta-mouse/AsyncSockets](https://github.com/rasta-mouse/AsyncSockets) - Example of async client/server sockets in .NET 5
- [d3adzo/shepard](https://github.com/d3adzo/shepard) - In progress persistent download/upload/execution tool using Windows BITS.
- [enkomio/ManagedInjector](https://github.com/enkomio/ManagedInjector) - A C# DLL injection library
- [lithnet/ad-password-protection](https://github.com/lithnet/ad-password-protection) - Active Directory password filter featuring breached password checking and custom complexity rules
- [dionach/NtdsAudit](https://github.com/dionach/NtdsAudit) - An Active Directory audit utility
- [AaronRobinsonMSFT/COMInterop](https://github.com/AaronRobinsonMSFT/COMInterop) - Example on how to consume a COM server from a .NET client and a .NET server from a COM client. Examples are for both using the Registry and for RegFree.
- [AdamWhiteHat/Judge-Jury-and-Executable](https://github.com/AdamWhiteHat/Judge-Jury-and-Executable) - A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power
- [S3cur3Th1sSh1t/SyscallAmsiScanBufferBypass](https://github.com/S3cur3Th1sSh1t/SyscallAmsiScanBufferBypass) - AmsiScanBufferBypass using D/Invoke
- [mitchmoser/SharpShares](https://github.com/mitchmoser/SharpShares) - Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain
- [Dliv3/DomainBorrowing](https://github.com/Dliv3/DomainBorrowing) - Domain Borrowing PoC
- [Cerbersec/DomainBorrowingC2](https://github.com/Cerbersec/DomainBorrowingC2) -
- [marius-rothenbuecher/PentestBro](https://github.com/marius-rothenbuecher/PentestBro) - Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one tool. Uses subdomain list of SecLists. Uses nmap service probes f
- [jfmaes/SharpNukeEventLog](https://github.com/jfmaes/SharpNukeEventLog) - nuke that event log using some epic dinvoke fu
- [RowTeam/SharpNTLMSSPExtract](https://github.com/RowTeam/SharpNTLMSSPExtract) - 利用 NTLMSSP 探测 Windows 信息
- [xpnas/inotify](https://github.com/xpnas/inotify) - 一个简易消息通知系统,支持企业微信、电报机器人、邮件推送、内置BARK推送、钉钉群机器人、飞书群机器人,类似Server酱,支持私有Docker部署
- [cyberark/Evasor](https://github.com/cyberark/Evasor) - A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
- [S3cur3Th1sSh1t/SharpNamedPipePTH](https://github.com/S3cur3Th1sSh1t/SharpNamedPipePTH) - Pass the Hash to a named pipe for token Impersonation
- [Ben0xA/DoUCMe](https://github.com/Ben0xA/DoUCMe) -
- [juliourena/SharpNoPSExec](https://github.com/juliourena/SharpNoPSExec) - Get file less command execution for lateral movement.
- [TheWover/CertStealer](https://github.com/TheWover/CertStealer) - A .NET tool for exporting and importing certificates without touching disk.
- [Hzllaga/JsLoader](https://github.com/Hzllaga/JsLoader) - js免杀shellcode,绕过杀毒添加自启
- [mgeeky/SharpWebServer](https://github.com/mgeeky/SharpWebServer) - Red Team oriented C# Simple HTTP & WebDAV Server with Net-NTLM hashes capture functionality
- [uknowsec/SharpOSS](https://github.com/uknowsec/SharpOSS) - Quickly upload files to aliyun OSS by aliyun-oss-csharp-sdk
- [checkymander/Sharp-SMBExec](https://github.com/checkymander/Sharp-SMBExec) - SMBExec C# module
- [DebugST/STPortScanner](https://github.com/DebugST/STPortScanner) - [端口扫描器] 采用.NET开发的端口扫描器 支持端口协议探测 内置多种类型扫描器 TCP/UDP/SYN/SMB/ICMP 等 采用IOCP模型开发 性能表现不错 可视为轻量级NMAP
- [dahall/TaskScheduler](https://github.com/dahall/TaskScheduler) - Provides a .NET wrapper for the Windows Task Scheduler. It aggregates the multiple versions, provides an editor and allows for localization.
- [FSecureLABS/SharpGPOAbuse](https://github.com/FSecureLABS/SharpGPOAbuse) - SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by th
- [S3cur3Th1sSh1t/Sharp-HackBrowserData](https://github.com/S3cur3Th1sSh1t/Sharp-HackBrowserData) - C# binary with embeded golang hack-browser-data
- [w1u0u1/exec](https://github.com/w1u0u1/exec) - Use current thread token to execute command
- [Hzllaga/RDODecrypt](https://github.com/Hzllaga/RDODecrypt) - Remote Desktop Organizer 密码破解
- [ChoiSG/UuidShellcodeExec](https://github.com/ChoiSG/UuidShellcodeExec) - PoC for UUID shellcode execution using DInvoke
- [airzero24/WMIReg](https://github.com/airzero24/WMIReg) - PoC to interact with local/remote registry hives through WMI
- [proxysu/ProxySU](https://github.com/proxysu/ProxySU) - Xray,V2ray,Trojan,NaiveProxy, Trojan-Go, ShadowsocksR(SSR),Shadowsocks-libev及相关插件,MTProto+TLS 一键安装工具,windows下用(一键科学上网)
- [WithSecureLabs/physmem2profit](https://github.com/WithSecureLabs/physmem2profit) - Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely
- [odedshimon/BruteShark](https://github.com/odedshimon/BruteShark) - Network Analysis Tool
- [calebstewart/bypass-clm](https://github.com/calebstewart/bypass-clm) - PowerShell Constrained Language Mode Bypass
- [hausec/MaliciousClickOnceMSBuild](https://github.com/hausec/MaliciousClickOnceMSBuild) - Basic C# Project that will take an MSBuild payload and run it with MSBuild via ClickOnce.
- [Aetsu/OffensivePipeline](https://github.com/Aetsu/OffensivePipeline) - OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team exercises.
- [mdsecactivebreach/Farmer](https://github.com/mdsecactivebreach/Farmer) -
- [KINGSABRI/DotNetToJScriptMini](https://github.com/KINGSABRI/DotNetToJScriptMini) - A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.
- [Kevin-Robertson/Sharpmad](https://github.com/Kevin-Robertson/Sharpmad) - C# version of Powermad
- [swisskyrepo/SharpLAPS](https://github.com/swisskyrepo/SharpLAPS) - Retrieve LAPS password from LDAP
- [Flangvik/AzureC2Relay](https://github.com/Flangvik/AzureC2Relay) - AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Cobalt Strike Malleable C2 profile.
- [FuzzySecurity/Dendrobate](https://github.com/FuzzySecurity/Dendrobate) - Managed code hooking template.
- [soufianetahiri/HttpRquestPlayer](https://github.com/soufianetahiri/HttpRquestPlayer) - This small utility could help you to find authorization bugs.
- [rvrsh3ll/SharpSMBSpray](https://github.com/rvrsh3ll/SharpSMBSpray) - Spray a hash via smb to check for local administrator access
- [BeichenDream/WhetherMysqlSham](https://github.com/BeichenDream/WhetherMysqlSham) - 检测目标Mysql数据库是不是蜜罐
- [An0nySec/ShadowUser](https://github.com/An0nySec/ShadowUser) - 影子用户 克隆
- [bats3c/EvtMute](https://github.com/bats3c/EvtMute) - Apply a filter to the events being reported by windows event logging
- [JoniRinta-Kahila/WPCracker](https://github.com/JoniRinta-Kahila/WPCracker) - WordPress pentest tool
- [zcgonvh/CVE-2020-0688](https://github.com/zcgonvh/CVE-2020-0688) - Exploit and detect tools for CVE-2020-0688
- [JamesCooteUK/SharpSphere](https://github.com/JamesCooteUK/SharpSphere) - .NET Project for Attacking vCenter
- [py7hagoras/CovenantTasks](https://github.com/py7hagoras/CovenantTasks) - Source for tasks I have used with Covenant
- [RCStep/CSSG](https://github.com/RCStep/CSSG) - Cobalt Strike Shellcode Generator
- [srini0x00/dvta](https://github.com/srini0x00/dvta) - Damn Vulnerable Thick Client App developed in C# .NET
- [uknowsec/SharpSQLTools](https://github.com/uknowsec/SharpSQLTools) - SharpSQLTools 和@Rcoil一起写的小工具,可上传下载文件,xp_cmdshell与sp_oacreate执行命令回显和clr加载程序集执行相应操作。
- [Viralmaniar/BigBountyRecon](https://github.com/Viralmaniar/BigBountyRecon) - BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
- [b4rtik/SharpKatz](https://github.com/b4rtik/SharpKatz) - Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands
- [jnqpblc/SharpTask](https://github.com/jnqpblc/SharpTask) - SharpTask is a simple code set to interact with the Task Scheduler service api and is compatible with Cobalt Strike.
- [ReverendThing/Carnivore](https://github.com/ReverendThing/Carnivore) - Microsoft External Attack Tool
- [FatRodzianko/Get-RBCD-Threaded](https://github.com/FatRodzianko/Get-RBCD-Threaded) - Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments
- [FatRodzianko/SharpBypassUAC](https://github.com/FatRodzianko/SharpBypassUAC) - C# tool for UAC bypasses
- [GoSecure/WSuspicious](https://github.com/GoSecure/WSuspicious) - WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations
- [bitsadmin/nopowershell](https://github.com/bitsadmin/nopowershell) - PowerShell rebuilt in C# for Red Teaming purposes
- [05sec/Asteroid](https://github.com/05sec/Asteroid) - 💫 CTF AWD 实时 3D 攻击大屏
- [rasta-mouse/EWSToolkit](https://github.com/rasta-mouse/EWSToolkit) - Abusing Exchange via EWS
- [mubix/solarflare](https://github.com/mubix/solarflare) - SolarWinds Orion Account Audit / Password Dumping Utility
- [zcgonvh/CVE-2020-17144](https://github.com/zcgonvh/CVE-2020-17144) - weaponized tool for CVE-2020-17144
- [Airboi/CVE-2020-17144-EXP](https://github.com/Airboi/CVE-2020-17144-EXP) - Exchange2010 authorized RCE
- [securesean/DecryptAutoLogon](https://github.com/securesean/DecryptAutoLogon) - Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon
- [cube0x0/SharpMapExec](https://github.com/cube0x0/SharpMapExec) -
- [jas502n/SSCMS_Decrypt](https://github.com/jas502n/SSCMS_Decrypt) - sscms database decrypt
- [outflanknl/EvilClippy](https://github.com/outflanknl/EvilClippy) - A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
- [RcoIl/CSharp-Tools](https://github.com/RcoIl/CSharp-Tools) - .NET C# Tools
- [Ch1ngg/SharpGetTitle](https://github.com/Ch1ngg/SharpGetTitle) - SharpGetTitle - 基于 C# 的多线程 Web Title 扫描器
- [antonioCoco/RunasCs](https://github.com/antonioCoco/RunasCs) - RunasCs - Csharp and open version of windows builtin runas.exe
- [rocksdanister/lively](https://github.com/rocksdanister/lively) - Free and open-source software that allows users to set animated desktop wallpapers and screensavers powered by WinUI 3.
- [huiyadanli/RevokeMsgPatcher](https://github.com/huiyadanli/RevokeMsgPatcher) - :trollface: A hex editor for WeChat/QQ/TIM - PC版微信/QQ/TIM防撤回补丁(我已经看到了,撤回也没用了)
- [cobbr/SharpSploit](https://github.com/cobbr/SharpSploit) - SharpSploit is a .NET post-exploitation library written in C#
- [med0x2e/NoAmci](https://github.com/med0x2e/NoAmci) - Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().
- [NVISOsecurity/DInvisibleRegistry](https://github.com/NVISOsecurity/DInvisibleRegistry) - DInvisibleRegistry
- [matterpreter/DefenderCheck](https://github.com/matterpreter/DefenderCheck) - Identifies the bytes that Microsoft Defender flags on.
- [3F/DllExport](https://github.com/3F/DllExport) - .NET DllExport with .NET Core support (aka 3F/DllExport aka DllExport.bat)
- [TheWover/DInvoke](https://github.com/TheWover/DInvoke) - Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.
- [mandiant/OfficePurge](https://github.com/mandiant/OfficePurge) -
- [hayasec/360SafeBrowsergetpass](https://github.com/hayasec/360SafeBrowsergetpass) - 这是一个一键辅助抓取360安全浏览器密码的CobaltStrike脚本以及解密小工具,用于节省红队工作量,通过下载浏览器数据库、记录密钥来离线解密浏览器密码。
- [smartlockpicking/BLE_HackMe](https://github.com/smartlockpicking/BLE_HackMe) - Bluetooth Low Energy hardware-less HackMe
- [awaescher/Fusion](https://github.com/awaescher/Fusion) - 🧰 A modern alternative to the Microsoft Assembly Binding Log Viewer (FUSLOGVW.exe)
- [rasta-mouse/ThreatCheck](https://github.com/rasta-mouse/ThreatCheck) - Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.
- [xforcered/StandIn](https://github.com/xforcered/StandIn) - StandIn is a small .NET35/45 AD post-exploitation toolkit
- [EncodeGroup/AggressiveProxy](https://github.com/EncodeGroup/AggressiveProxy) - Project to enumerate proxy configurations and generate shellcode from CobaltStrike
- [xiaoxiaoleo/Scan-and-Clean-Macro-Virus](https://github.com/xiaoxiaoleo/Scan-and-Clean-Macro-Virus) - Scan and clean specific Macro Virus, #C Sharp
- [Mr-Un1k0d3r/RedTeamCSharpScripts](https://github.com/Mr-Un1k0d3r/RedTeamCSharpScripts) - C# Script used for Red Team
- [TGSAN/CMWTAT_Digital_Edition](https://github.com/TGSAN/CMWTAT_Digital_Edition) - CloudMoe Windows 10/11 Activation Toolkit get digital license, the best open source Win 10/11 activator in GitHub. GitHub 上最棒的开源 Win10/Win11 数字权利(数字许可证)激活工具!
- [wesleydekraker/xamarin-security-scanner](https://github.com/wesleydekraker/xamarin-security-scanner) - A tool to find security vulnerabilities in Xamarin.Android apps.
- [dev-2null/KerberosRun](https://github.com/dev-2null/KerberosRun) - A little tool to play with Kerberos.
- [ustayready/SharpHose](https://github.com/ustayready/SharpHose) - Asynchronous Password Spraying Tool in C# for Windows Environments
- [tyranid/DotNetToJScript](https://github.com/tyranid/DotNetToJScript) - A tool to create a JScript file which loads a .NET v2 assembly from memory.
- [EncodeGroup/AggressiveGadgetToJScript](https://github.com/EncodeGroup/AggressiveGadgetToJScript) - A Cobalt Strike Aggressor script to generate GadgetToJScript payloads
- [EncodeGroup/Gopher](https://github.com/EncodeGroup/Gopher) - C# tool to discover low hanging fruits
- [b4rtik/SharpAdidnsdump](https://github.com/b4rtik/SharpAdidnsdump) - c# implementation of Active Directory Integrated DNS dumping (authenticated user)
- [mez-0/DecryptRDCManager](https://github.com/mez-0/DecryptRDCManager) - .NET 4.0 Remote Desktop Manager Password Gatherer
- [uknowsec/SharpSQLDump](https://github.com/uknowsec/SharpSQLDump) - 内网渗透中快速获取数据库所有库名,表名,列名。具体判断后再去翻数据,节省时间。适用于mysql,mssql。
- [Apr4h/CobaltStrikeScan](https://github.com/Apr4h/CobaltStrikeScan) - Scan files or process memory for CobaltStrike beacons and parse their configuration
- [r3nhat/SharpWifiGrabber](https://github.com/r3nhat/SharpWifiGrabber) - Sharp Wifi Password Grabber retrieves in clear-text the Wi-Fi Passwords from all WLAN Profiles saved on a workstation.
- [CCob/Rubeus](https://github.com/CCob/Rubeus) - Trying to tame the three-headed dog.
- [rasta-mouse/Fork-n-Run](https://github.com/rasta-mouse/Fork-n-Run) -
- [microsoft/onefuzz](https://github.com/microsoft/onefuzz) - A self-hosted Fuzzing-As-A-Service platform
- [checkymander/Zolom](https://github.com/checkymander/Zolom) - C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed
- [r3nhat/GRAT2](https://github.com/r3nhat/GRAT2) - We developed GRAT2 Command & Control (C2) project for learning purpose.
- [Kudaes/LOLBITS](https://github.com/Kudaes/LOLBITS) - ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + Dinvoke for EDR user-mode hooking evasion.
- [vivami/SauronEye](https://github.com/vivami/SauronEye) - Search tool to find specific files containing specific words, i.e. files containing passwords..
- [mez-0/MoveScheduler](https://github.com/mez-0/MoveScheduler) - .NET 4.0 Scheduled Job Lateral Movement
- [passthehashbrowns/SharpBuster](https://github.com/passthehashbrowns/SharpBuster) - SharpBuster is a C# implementation of a directory brute forcing tool. It's designed to be used via Cobalt Strike's execute-assembly and similar tools, when running a similar tool over a SOCKS proxy is
- [G0ldenGunSec/SharpSecDump](https://github.com/G0ldenGunSec/SharpSecDump) - .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py
- [chromelyapps/Chromely](https://github.com/chromelyapps/Chromely) - Build Cross Platform HTML Desktop Apps on .NET using native GUI, HTML5, JavaScript, CSS, Owin, AspNetCore (MVC, RazorPages, Blazor)
- [slyd0g/LNKMod](https://github.com/slyd0g/LNKMod) - C# project to create or modify existing LNKs
- [lontivero/Open.NAT](https://github.com/lontivero/Open.NAT) - Lightweight and easy-to-use class library to allow port forwarding in NAT devices with UPNP and/or PMP
- [sf197/GetPwd](https://github.com/sf197/GetPwd) - 用CSharp写的一款信息搜集工具,目前支持Navicat、TeamView、Xshell、SecureCRT产品的密码解密
- [BeichenDream/MysqlT](https://github.com/BeichenDream/MysqlT) - 伪造Myslq服务端,并利用Mysql逻辑漏洞来获取客户端的任意文件反击攻击者
- [rasta-mouse/MiscTools](https://github.com/rasta-mouse/MiscTools) - Miscellaneous Tools
- [mez-0/CSharpWinRM](https://github.com/mez-0/CSharpWinRM) - .NET 4.0 WinRM API Command Execution
- [RiccardoAncarani/DirSync-Poc](https://github.com/RiccardoAncarani/DirSync-Poc) - A PoC that uses the DirSync protocol to poll Active Directory for changes
- [BloodHoundAD/SharpHound3](https://github.com/BloodHoundAD/SharpHound3) - C# Data Collector for the BloodHound Project, Version 3
- [BloodHoundAD/SharpHound2](https://github.com/BloodHoundAD/SharpHound2) - The Old BloodHound C# Ingestor (Deprecated)
- [WayneJLee/CsharpAmsiBypass](https://github.com/WayneJLee/CsharpAmsiBypass) - C# loader for msfvenom shellcode with AMSI bypass
- [aduskin/AduSkin](https://github.com/aduskin/AduSkin) - A Beautiful WPF Control UI
- [TalAloni/SMBLibrary](https://github.com/TalAloni/SMBLibrary) - Free, Open Source, User-Mode SMB 1.0/CIFS, SMB 2.0, SMB 2.1 and SMB 3.0 server and client library
- [rnwood/smtp4dev](https://github.com/rnwood/smtp4dev) - smtp4dev - the fake smtp email server for development and testing
- [3xpl01tc0d3r/ProcessInjection](https://github.com/3xpl01tc0d3r/ProcessInjection) - This program is designed to demonstrate various process injection techniques
- [Flangvik/SharpAppLocker](https://github.com/Flangvik/SharpAppLocker) - C# port of the Get-AppLockerPolicy PS cmdlet
- [netwrix/pingcastle](https://github.com/netwrix/pingcastle) - PingCastle - Get Active Directory Security at 80% in 20% of the time
- [RythmStick/ProxyPunch](https://github.com/RythmStick/ProxyPunch) - Finding SSL Blindspots for Red Teams
- [Mr-B0b/SpaceRunner](https://github.com/Mr-B0b/SpaceRunner) - This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes through the use of runspace.
- [jfmaes/GG-AESY](https://github.com/jfmaes/GG-AESY) - Hide cool stuff in images :)
- [MrFooL137/WebSocketRemoteControl](https://github.com/MrFooL137/WebSocketRemoteControl) - Remote Control With WebSocket
- [checkymander/Carbuncle](https://github.com/checkymander/Carbuncle) - Tool for interacting with outlook interop during red team engagements
- [fullmetalcache/PowerLine](https://github.com/fullmetalcache/PowerLine) -
- [djhohnstein/SharpSearch](https://github.com/djhohnstein/SharpSearch) - Search files for extensions as well as text within.
- [crawl3r/FunWithAMSI](https://github.com/crawl3r/FunWithAMSI) - A repo to hold any bypasses I work on/study/whatever
- [Flangvik/SharpDllProxy](https://github.com/Flangvik/SharpDllProxy) - Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading
- [jfmaes/TrustJack](https://github.com/jfmaes/TrustJack) - Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows
- [Fody/Costura](https://github.com/Fody/Costura) - Embed references as resources
- [EquiFox/KsDumper](https://github.com/EquiFox/KsDumper) - Dumping processes using the power of kernel space !
- [tomcarver16/ADSearch](https://github.com/tomcarver16/ADSearch) - A tool to help query AD via the LDAP protocol
- [bohops/SharpRDPHijack](https://github.com/bohops/SharpRDPHijack) - A POC Remote Desktop (RDP) session hijack utility for disconnected sessions
- [mvelazc0/PurpleSharp](https://github.com/mvelazc0/PurpleSharp) - PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monitored Windows environments
- [git-ecosystem/git-credential-manager](https://github.com/git-ecosystem/git-credential-manager) - Secure, cross-platform Git credential storage with authentication to GitHub, Azure Repos, and other popular Git hosting services.
- [SnaffCon/Snaffler](https://github.com/SnaffCon/Snaffler) - a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )
- [360-Linton-Lab/Telemetry](https://github.com/360-Linton-Lab/Telemetry) - WINDOWS TELEMETRY权限维持
- [GhostPack/Seatbelt](https://github.com/GhostPack/Seatbelt) - Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
- [mdsecactivebreach/sitrep](https://github.com/mdsecactivebreach/sitrep) -
- [jfmaes/Clippi-B](https://github.com/jfmaes/Clippi-B) -
- [thiagomayllart/Covenant_Alternate](https://github.com/thiagomayllart/Covenant_Alternate) - Covenant is a collaborative .NET C2 framework for red teamers.
- [Hzllaga/ShellcodeLoader](https://github.com/Hzllaga/ShellcodeLoader) - 将shellcode用rsa加密并动态编译exe,自带几种反沙箱技术。
- [SpiderLabs/SharpCompile](https://github.com/SpiderLabs/SharpCompile) - SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approach than manually compiling an .NET assembly and loading it into
- [dotnet/ILMerge](https://github.com/dotnet/ILMerge) - ILMerge is a static linker for .NET Assemblies.
- [RedLectroid/SearchOutlook](https://github.com/RedLectroid/SearchOutlook) - A C# tool to search through a running instance of Outlook for keywords
- [Flangvik/BetterSafetyKatz](https://github.com/Flangvik/BetterSafetyKatz) - Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime patches signatures and uses SharpSploit DInvoke to PE-Load into me
- [QAX-A-Team/sharpwmi](https://github.com/QAX-A-Team/sharpwmi) - sharpwmi是一个基于rpc的横向移动工具,具有上传文件和执行命令功能。
- [am0nsec/SharpHellsGate](https://github.com/am0nsec/SharpHellsGate) - C# Implementation of the Hell's Gate VX Technique
- [RythmStick/AMSITrigger](https://github.com/RythmStick/AMSITrigger) - The Hunt for Malicious Strings
- [QAX-A-Team/BrowserGhost](https://github.com/QAX-A-Team/BrowserGhost) - 这是一个抓取浏览器密码的工具,后续会添加更多功能
- [WingsOfDoom/ICU](https://github.com/WingsOfDoom/ICU) - quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a37194971a5e944f22c94df7c/CredentialUI.cs
- [dev-2null/ADCollector](https://github.com/dev-2null/ADCollector) - A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.
- [peass-ng/PEASS-ng](https://github.com/peass-ng/PEASS-ng) - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
- [jamf/CVE-2020-1206-POC](https://github.com/jamf/CVE-2020-1206-POC) - CVE-2020-1206 Uninitialized Kernel Memory Read POC
- [FuzzySecurity/Sharp-Suite](https://github.com/FuzzySecurity/Sharp-Suite) - Also known by Microsoft as Knifecoat :hot_pepper:
- [malwareinfosec/EKFiddle](https://github.com/malwareinfosec/EKFiddle) - Your Swiss Army knife to analyze malicious web traffic based on the popular Fiddler web debugger.
- [1y0n/AV_Evasion_Tool](https://github.com/1y0n/AV_Evasion_Tool) - 掩日 - 免杀执行器生成工具
- [reconness/reconness](https://github.com/reconness/reconness) - ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on schedule or events.
- [TheKingOfDuck/MatryoshkaDollTool](https://github.com/TheKingOfDuck/MatryoshkaDollTool) - MatryoshkaDollTool-程序加壳/捆绑工具
- [goichot/CVE-2020-3153](https://github.com/goichot/CVE-2020-3153) - Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal
- [Tycx2ry/SweetPotato_CS](https://github.com/Tycx2ry/SweetPotato_CS) - 修改的SweetPotato,使之可以用于CobaltStrike v4.0
- [3gstudent/SharpRDPCheck](https://github.com/3gstudent/SharpRDPCheck) - Use to check the valid account of the Remote Desktop Protocol(Support plaintext and ntlmhash)
- [Soledge/BlockEtw](https://github.com/Soledge/BlockEtw) - .Net Assembly to block ETW telemetry in current process
- [Viralmaniar/HiveJack](https://github.com/Viralmaniar/HiveJack) - This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to dump SYSTEM, SECURITY and SAM hives and once copied to the atta
- [CCob/SweetPotato](https://github.com/CCob/SweetPotato) - Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019
- [djhohnstein/SharpShares](https://github.com/djhohnstein/SharpShares) - Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.
- [BeichenDream/BadPotato](https://github.com/BeichenDream/BadPotato) - Windows 权限提升 BadPotato
- [infosecn1nja/SharpDoor](https://github.com/infosecn1nja/SharpDoor) - SharpDoor is alternative RDPWrap written in C# to allowed multiple RDP (Remote Desktop) sessions by patching termsrv.dll file.
- [pwntester/ysoserial.net](https://github.com/pwntester/ysoserial.net) - Deserialization payload generator for a variety of .NET formatters
- [uknowsec/SweetPotato](https://github.com/uknowsec/SweetPotato) - Modifying SweetPotato to support load shellcode and webshell
- [uknowsec/SharpNetCheck](https://github.com/uknowsec/SharpNetCheck) -
- [cobbr/Covenant](https://github.com/cobbr/Covenant) - Covenant is a collaborative .NET C2 framework for red teamers.
- [cobbr/Elite](https://github.com/cobbr/Elite) - Elite is the client-side component of the Covenant project. Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraf
- [cyberark/zBang](https://github.com/cyberark/zBang) - zBang is a risk assessment tool that detects potential privileged account threats
- [MichaelGrafnetter/DSInternals](https://github.com/MichaelGrafnetter/DSInternals) - Directory Services Internals (DSInternals) PowerShell Module and Framework
- [rveldhoven/chocoProxy](https://github.com/rveldhoven/chocoProxy) -
- [mandiant/SilkETW](https://github.com/mandiant/SilkETW) -
- [gerardog/gsudo](https://github.com/gerardog/gsudo) - Sudo for Windows
- [rasta-mouse/Watson](https://github.com/rasta-mouse/Watson) - Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities
- [gabrielxvx/zh-fiddler](https://github.com/gabrielxvx/zh-fiddler) - Fiddler Web Debugger 中文版
- [harleyQu1nn/AggressorScripts](https://github.com/harleyQu1nn/AggressorScripts) - Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources
- [guillaC/wsManager](https://github.com/guillaC/wsManager) - Webshell Manager
- [restran/shellcat](https://github.com/restran/shellcat) - ⚡️ ShellCat is a Reverse Shell Manager
- [uknowsec/SharpCheckInfo](https://github.com/uknowsec/SharpCheckInfo) - 收集目标主机信息,包括最近打开文件,系统环境变量和回收站文件等等
- [Cn33liz/p0wnedShell](https://github.com/Cn33liz/p0wnedShell) - PowerShell Runspace Post Exploitation Toolkit
- [netchx/netch](https://github.com/netchx/netch) - A simple proxy client
- [kenvix/USBCopyer](https://github.com/kenvix/USBCopyer) - 😉 用于在插上U盘后自动按需复制该U盘的文件。”备份&偷U盘文件的神器”(写作USBCopyer,读作USBCopier)
- [P1CKLES/SharpBox](https://github.com/P1CKLES/SharpBox) - SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.
- [Wohlstand/Destroy-Windows-10-Spying](https://github.com/Wohlstand/Destroy-Windows-10-Spying) - !!!UNMAINTAINED!!! Destroy Windows Spying tool
- [djhohnstein/EventLogParser](https://github.com/djhohnstein/EventLogParser) - Parse PowerShell and Security event logs for sensitive information.
- [samk1/IISPowershellModule](https://github.com/samk1/IISPowershellModule) - IIS Handler for *.ps1 files
- [AnyListen/YaVipCore](https://github.com/AnyListen/YaVipCore) - Net Core Music Interface
- [duplicati/duplicati](https://github.com/duplicati/duplicati) - Store securely encrypted backups in the cloud!
- [Kevin-Robertson/Inveigh](https://github.com/Kevin-Robertson/Inveigh) - .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers
- [GangZhuo/kcptun-gui-windows](https://github.com/GangZhuo/kcptun-gui-windows) - GUI for kcptun (https://github.com/xtaci/kcptun). (Need .NET framework 4.5)
- [mo-xiaoxi/CTFtools](https://github.com/mo-xiaoxi/CTFtools) - 本项目主要搜集一些关于信息安全攻防相关的知识与工具,便于个人的渗透工作。
- [zgcwkjOpenProject/TestBaiduPassword](https://github.com/zgcwkjOpenProject/TestBaiduPassword) - 百度网盘分享文件密码测试器
- [greenshot/greenshot](https://github.com/greenshot/greenshot) - Greenshot for Windows - Report bugs & features go here: https://greenshot.atlassian.net or look for information on:
- [TheM4hd1/JCS](https://github.com/TheM4hd1/JCS) - Joomla Vulnerability Component Scanner
- [xupefei/Locale-Emulator](https://github.com/xupefei/Locale-Emulator) - Yet Another System Region and Language Simulator
- [YalcinYolalan/WSSAT](https://github.com/YalcinYolalan/WSSAT) - WEB SERVICE SECURITY ASSESSMENT TOOL
- [ShareX/ShareX](https://github.com/ShareX/ShareX) - ShareX is a free and open source program that lets you capture or record any area of your screen and share it with a single press of a key. It also allows uploading images, text or other types of file
- [bitbeans/SimpleDnsCrypt](https://github.com/bitbeans/SimpleDnsCrypt) - A simple management tool for dnscrypt-proxy
- [TheM4hd1/PenCrawLer](https://github.com/TheM4hd1/PenCrawLer) - An Advanced Web Crawler and DirBuster
- [yingDev/WGestures](https://github.com/yingDev/WGestures) - Modern mouse gestures for Windows. (C#)
- [digimezzo/knowte-windows](https://github.com/digimezzo/knowte-windows) - Note taking
- [MediaPortal/MediaPortal-2](https://github.com/MediaPortal/MediaPortal-2) - Development of MediaPortal 2
- [Rushyo/VindicateTool](https://github.com/Rushyo/VindicateTool) - LLMNR/NBNS/mDNS Spoofing Detection Toolkit
- [RadioWar/NFCGUI](https://github.com/RadioWar/NFCGUI) - NFCGUI 一个万恶的无聊的Windows图形界面! GUI for libnfc
- [microsoft/DbgShell](https://github.com/microsoft/DbgShell) - A PowerShell front-end for the Windows debugger engine.
- [VahidN/GitHubFolderDownloader](https://github.com/VahidN/GitHubFolderDownloader) - It lets you to download a single folder of a repository without cloning or downloading the whole repository.
- [hexadezi/adbGUI](https://github.com/hexadezi/adbGUI) - Wrapper for Android Debug Bridge (ADB) written in C#
- [mili-tan/mV2RayConfig](https://github.com/mili-tan/mV2RayConfig) -
- [nccgroup/UPnP-Pentest-Toolkit](https://github.com/nccgroup/UPnP-Pentest-Toolkit) - UPnP Pentest Toolkit for Windows
- [KeeTrayTOTP/KeeTrayTOTP](https://github.com/KeeTrayTOTP/KeeTrayTOTP) - Tray TOTP Plugin for KeePass2.
- [JanisEst/KeePassQRCodeView](https://github.com/JanisEst/KeePassQRCodeView) - KeePass 2.x plugin which shows QR Codes for entry fields.
- [securifybv/ShellLink](https://github.com/securifybv/ShellLink) - A .NET Class Library for processing ShellLink (LNK) files
- [canton7/SyncTrayzor](https://github.com/canton7/SyncTrayzor) - Windows tray utility / filesystem watcher / launcher for Syncthing
- [TkYu/ChromeUpdater](https://github.com/TkYu/ChromeUpdater) - :)
- [oneo-me/Arthas-WPFUI](https://github.com/oneo-me/Arthas-WPFUI) - WPF 控件库,支持 .Net 7.0 Windows Desktop
- [chenjia404/ChromeAutoUpdate](https://github.com/chenjia404/ChromeAutoUpdate) - 一个自动更新chrome的小工具
- [thoemmi/7Zip4Powershell](https://github.com/thoemmi/7Zip4Powershell) - Powershell module for creating and extracting 7-Zip archives
- [p3nt4/PowerShdll](https://github.com/p3nt4/PowerShdll) - Run PowerShell with rundll32. Bypass software restrictions.
- [tomrus88/CASCExplorer](https://github.com/tomrus88/CASCExplorer) - CASCExplorer
- [marx-yu/WopiHost](https://github.com/marx-yu/WopiHost) - Office Online Server Wopi Host implement, No need Cobalt. Support DOCX, XLSX, PPTX online editing.
- [zcgonvh/cve-2017-7269-tool](https://github.com/zcgonvh/cve-2017-7269-tool) - CVE-2017-7269 to webshell or shellcode loader
- [t3ntman/Social-Engineering-Payloads](https://github.com/t3ntman/Social-Engineering-Payloads) - Collection of social engineering payloads
- [Choudai/R10](https://github.com/Choudai/R10) - Lightweight Ransomware @Choudai
- [thangchung/awesome-dotnet-core](https://github.com/thangchung/awesome-dotnet-core) - :honeybee: A collection of awesome .NET core libraries, tools, frameworks and software
- [nsacyber/Windows-Event-Log-Messages](https://github.com/nsacyber/Windows-Event-Log-Messages) - Retrieves the definitions of Windows Event Log messages embedded in Windows binaries and provides them in discoverable formats. #nsacyber
- [DEVSENSE/Phalanger](https://github.com/DEVSENSE/Phalanger) - PHP 5.4 compiler for .NET/Mono frameworks. Predecessor to the opensource PeachPie project (www.peachpie.io).
- [isukces/cs2php](https://github.com/isukces/cs2php) - C# to PHP compiler
- [zcgonvh/SSMSPwd](https://github.com/zcgonvh/SSMSPwd) - SQL Server Management Studio(SSMS) saved password dumper
- [dxflatline/flatpipes](https://github.com/dxflatline/flatpipes) - A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.
- [Kyrodan/KeeAnywhere](https://github.com/Kyrodan/KeeAnywhere) - A cloud storage provider plugin for KeePass Password Safe
- [googleprojectzero/sandbox-attacksurface-analysis-tools](https://github.com/googleprojectzero/sandbox-attacksurface-analysis-tools) - Set of tools to analyze Windows sandboxes for exposed attack surface.
- [shack2/SuperSQLInjectionV1](https://github.com/shack2/SuperSQLInjectionV1) - 超级SQL注入工具(SSQLInjection)是一款基于HTTP协议自组包的SQL注入工具,采用C#开发,直接操作TCP会话来进行HTTP交互,支持出现在HTTP协议任意位置的SQL注入,支持各种类型的SQL注入,支持HTTPS模式注入;支持以盲注、错误显示、Union注入等方式来获取数据;支持Access/MySQL/SQLServer/Oracle/PostgreSQL/DB2/SQLite
- [sacwtv/Altman](https://github.com/sacwtv/Altman) - the cross platform webshell tool in .NET
- [keepwn/Altman](https://github.com/keepwn/Altman) - the cross platform webshell tool in .NET
- [LazoCoder/Windows-Hacks](https://github.com/LazoCoder/Windows-Hacks) - Creative and unusual things that can be done with the Windows API.
- [gaochundong/Cowboy](https://github.com/gaochundong/Cowboy) - Cowboy.Sockets is a C# library for building sockets based services.
- [magicdict/MongoCola](https://github.com/magicdict/MongoCola) - A MongoDB Administration Tool## C++
- [T4y1oR/RingQ](https://github.com/T4y1oR/RingQ) - 一款后渗透免杀工具,助力每一位像我这样的脚本小子快速实现免杀,支持bypass AV/EDR 360 火绒 Windows Defender Shellcode Loader
- [efchatz/pandora](https://github.com/efchatz/pandora) - A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.
- [gfdgd-xi/windows-virtual-machine-installer-for-wine-runner](https://github.com/gfdgd-xi/windows-virtual-machine-installer-for-wine-runner) - Windows虚拟机安装工具
- [Dec0ne/DllNotificationInjection](https://github.com/Dec0ne/DllNotificationInjection) - A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and remote processes.
- [ZeroMemoryEx/Chaos-Rootkit](https://github.com/ZeroMemoryEx/Chaos-Rootkit) - Now You See Me, Now You Don't
- [0x727/UserRegEnum_0x727](https://github.com/0x727/UserRegEnum_0x727) - 域内普通域用户权限查找域内所有计算机上登录的用户
- [0xHossam/Killer](https://github.com/0xHossam/Killer) - Killer tool is designed to bypass AV/EDR security tools using various evasive techniques.
- [nomic-ai/gpt4all](https://github.com/nomic-ai/gpt4all) - GPT4All: Run Local LLMs on Any Device. Open-source and available for commercial use.
- [fgfxf/HttpStageDownloader](https://github.com/fgfxf/HttpStageDownloader) - cobaltstrike的http分阶段下载器 cpp版本;cobaltstrike stage downloader;
- [TaoistBrickscarrier/WFPKit](https://github.com/TaoistBrickscarrier/WFPKit) - 粗暴地枚举管理内核的WFP对象。 Manage kernel WFPs in a brutal way.
- [matthieu-hackwitharts/Win32_Offensive_Cheatsheet](https://github.com/matthieu-hackwitharts/Win32_Offensive_Cheatsheet) - Win32 and Kernel abusing techniques for pentesters
- [ZeroMemoryEx/Amsi-Killer](https://github.com/ZeroMemoryEx/Amsi-Killer) - Lifetime AMSI bypass
- [stealth/fraud-bridge](https://github.com/stealth/fraud-bridge) - ICMP and DNS tunneling via IPv4 and IPv6
- [Ascotbe/virus](https://github.com/Ascotbe/virus) - 病毒&免杀脚本&乱七八糟的脚本
- [deamwork/WinMTR](https://github.com/deamwork/WinMTR) - WinMTR Redux, extended fork of Appnor's WinMTR with IPv6 support and other enhancements
- [capt-meelo/laZzzy](https://github.com/capt-meelo/laZzzy) - laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.
- [seventeenman/CallBackDump](https://github.com/seventeenman/CallBackDump) - dump lsass进程工具
- [0xJs/RedTeaming_CheatSheet](https://github.com/0xJs/RedTeaming_CheatSheet) - Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.
- [ADOOO/Joker](https://github.com/ADOOO/Joker) - 一款基于Http.sys的利用工具
- [zha0gongz1/iscsicpl_bypassUAC](https://github.com/zha0gongz1/iscsicpl_bypassUAC) - UAC bypass for x64 Windows 7 - 11(无弹窗版)
- [antonioCoco/JuicyPotatoNG](https://github.com/antonioCoco/JuicyPotatoNG) - Another Windows Local Privilege Escalation from Service Account to System
- [Tatsu-syo/noMeiryoUI](https://github.com/Tatsu-syo/noMeiryoUI) - No!! MeiryoUI is Windows system font setting tool on Windows 8.1/10/11.
- [ReversingID/Shellcode-Loader](https://github.com/ReversingID/Shellcode-Loader) - Open repository for learning dynamic shellcode loading (sample in many programming languages)
- [NtQuerySystemInformation/NlsCodeInjectionThroughRegistry](https://github.com/NtQuerySystemInformation/NlsCodeInjectionThroughRegistry) - Dll injection through code page id modification in registry. Based on jonas lykk research
- [wanttobeno/AntiDebuggers](https://github.com/wanttobeno/AntiDebuggers) - 30种方法检测程序是否被调试
- [hasherezade/process_overwriting](https://github.com/hasherezade/process_overwriting) - Yet another variant of Process Hollowing
- [yanghaoi/LaunchSystemCmd](https://github.com/yanghaoi/LaunchSystemCmd) - 在权限足够的情况下弹出system权限的cmd命令行,包含exe和dll两种文件类型,可用于一些可能存在本地提权漏洞的测试。
- [lab52io/LeakedHandlesFinder](https://github.com/lab52io/LeakedHandlesFinder) - Leaked Windows processes handles identification tool
- [TUGOhost/anti_Android](https://github.com/TUGOhost/anti_Android) - Is a protect Android App anti any attacks and environments.
- [webraybtl/CVE-2022-25943](https://github.com/webraybtl/CVE-2022-25943) - CVE-2022-25943
- [ZeroMemoryEx/U-Boat](https://github.com/ZeroMemoryEx/U-Boat) - Russian Wipers Dropper (educational-purposes )
- [trailofbits/maat](https://github.com/trailofbits/maat) - Open-source symbolic execution framework: https://maat.re
- [VirtualAlllocEx/Create-Thread-Shellcode-Fetcher](https://github.com/VirtualAlllocEx/Create-Thread-Shellcode-Fetcher) - This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)
- [qiang/Riru-ModuleFridaGadget](https://github.com/qiang/Riru-ModuleFridaGadget) - 一个magisk 的模块,简化版,依赖 riru,能够简单的hook,并且加载动态库,目前用来加载 frida 的gadget 库,从而使hook脱离命令行和server,并且能够在多进程中加载
- [FULLSHADE/Auto-Elevate](https://github.com/FULLSHADE/Auto-Elevate) - Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token Impersonation
- [midisec/BypassAnti-Virus](https://github.com/midisec/BypassAnti-Virus) - 免杀姿势学习、记录、复现。
- [44670/p7zip-wasm](https://github.com/44670/p7zip-wasm) -
- [LuxNoBulIshit/Smug_Fu3k](https://github.com/LuxNoBulIshit/Smug_Fu3k) -
- [thiagoralves/OpenPLC_v3](https://github.com/thiagoralves/OpenPLC_v3) - OpenPLC Runtime version 3
- [zeek/zeek](https://github.com/zeek/zeek) - Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.
- [HACK-THE-WORLD/IDAPluginList](https://github.com/HACK-THE-WORLD/IDAPluginList) - IDA插件集合,含项目名称及项目地址,每日定时Clone项目。
- [blackbox114/Captive_Portal_Gofishing](https://github.com/blackbox114/Captive_Portal_Gofishing) - level:Copper 连接上就会强制弹出钓鱼页面的热点
- [NtQuerySystemInformation/CustomKeyboardLayoutPersistence](https://github.com/NtQuerySystemInformation/CustomKeyboardLayoutPersistence) - Achieve execution using a custom keyboard layout
- [Fortiphyd/GRFICSv2](https://github.com/Fortiphyd/GRFICSv2) - Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)
- [djformby/GRFICS](https://github.com/djformby/GRFICS) - Graphical Realism Framework for Industrial Control Simulations
- [riverar/mach2](https://github.com/riverar/mach2) - Windows Feature Control Multi-tool
- [nielsolie/ICSUnitSim](https://github.com/nielsolie/ICSUnitSim) - Simulation of Industrial process unit on ESP32 board with ModbusTCP interface
- [RedSection/printjacker](https://github.com/RedSection/printjacker) - Hijack Printconfig.dll to execute shellcode
- [thesecretclub/ArbitraryDirectoryDeletion](https://github.com/thesecretclub/ArbitraryDirectoryDeletion) - From directory deletion to SYSTEM shell
- [KaLendsi/CVE-2022-21882](https://github.com/KaLendsi/CVE-2022-21882) - win32k LPE
- [notdodo/adduser-dll](https://github.com/notdodo/adduser-dll) - Simple DLL that add a user to the local Administrators group
- [cmu-sei/pharos](https://github.com/cmu-sei/pharos) - Automated static analysis tools for binary programs
- [ytk2128/dll-merger](https://github.com/ytk2128/dll-merger) - Merging DLLs with a PE32 EXE without LoadLibrary
- [pwn1sher/KillDefender](https://github.com/pwn1sher/KillDefender) - A small POC to make defender useless by removing its token privileges and lowering the token integrity
- [lcatro/Source-and-Fuzzing](https://github.com/lcatro/Source-and-Fuzzing) - 一些阅读源码和Fuzzing 的经验,涵盖黑盒与白盒测试..
- [APTortellini/DefenderSwitch](https://github.com/APTortellini/DefenderSwitch) - Stop Windows Defender using the Win32 API
- [hlldz/RefleXXion](https://github.com/hlldz/RefleXXion) - RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, it first collects the syscall numbers of the NtOpenFile, NtCrea
- [StarCrossPortal/bug-hunting-101](https://github.com/StarCrossPortal/bug-hunting-101) -
- [crisprss/BypassUserAdd](https://github.com/crisprss/BypassUserAdd) - 通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化
- [Rvn0xsy/PDacl](https://github.com/Rvn0xsy/PDacl) - Play Doh Windows ACL Tools
- [theSecHunter/Hades-Windows](https://github.com/theSecHunter/Hades-Windows) - Hades HIDS/HIPS for Windows
- [Ghost2097221/selfMimikatz](https://github.com/Ghost2097221/selfMimikatz) - 自不量力的mimikatz分离计划
- [abcz316/SKRoot-linuxKernelRoot](https://github.com/abcz316/SKRoot-linuxKernelRoot) - 新一代SKRoot,挑战全网root检测手段,跟面具完全不同思路,摆脱面具被检测的弱点,完美隐藏root功能,全程不需要暂停SELinux,实现真正的SELinux 0%触碰,通用性强,通杀所有内核,不需要内核源码,直接patch内核,兼容安卓APP直接JNI调用,稳定、流畅、不闪退。
- [NtRaiseHardError/Antimalware-Research](https://github.com/NtRaiseHardError/Antimalware-Research) - Research on Anti-malware and other related security solutions
- [S3cur3Th1sSh1t/MultiPotato](https://github.com/S3cur3Th1sSh1t/MultiPotato) -
- [hugsy/CFB](https://github.com/hugsy/CFB) - Canadian Furious Beaver is a ProcMon-style tool designed only for capturing IRPs sent to any Windows driver.
- [echo-devim/fhex](https://github.com/echo-devim/fhex) - A Full-Featured HexEditor compatible with Linux/Windows/MacOS
- [r-richter/hyenae-ng](https://github.com/r-richter/hyenae-ng) - Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pattern based address randomization and flood detection breaking
- [kindtime/nosferatu](https://github.com/kindtime/nosferatu) - Windows NTLM Authentication Backdoor
- [lab52io/StopDefender](https://github.com/lab52io/StopDefender) - Stop Windows Defender programmatically
- [lab52io/StealAllTokens](https://github.com/lab52io/StealAllTokens) - This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate and use whatever token present at any process
- [CCob/lsarelayx](https://github.com/CCob/lsarelayx) - NTLM relaying for Windows made easy
- [BlueMatthew/WechatExporter](https://github.com/BlueMatthew/WechatExporter) - Wechat Chat History Exporter 微信聊天记录导出备份程序
- [qtfreet00/AntiFrida](https://github.com/qtfreet00/AntiFrida) - 通过内存特征检测frida
- [mgeeky/ThreadStackSpoofer](https://github.com/mgeeky/ThreadStackSpoofer) - Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
- [ideaslocas/aDLL](https://github.com/ideaslocas/aDLL) -
- [TonyChen56/160-Crackme](https://github.com/TonyChen56/160-Crackme) - 对160个Crackme的详细分析记录
- [ly4k/CallbackHell](https://github.com/ly4k/CallbackHell) - Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)
- [networkit/networkit](https://github.com/networkit/networkit) - NetworKit is a growing open-source toolkit for large-scale network analysis.
- [thewhiteninja/ntfstool](https://github.com/thewhiteninja/ntfstool) - Forensics tool for NTFS (parser, mft, bitlocker, deleted files)
- [magnusstubman/MagnusKatz](https://github.com/magnusstubman/MagnusKatz) - Research project for understanding how Mimikatz work and become better at C
- [EspressoCake/Firewall_Walker_BOF](https://github.com/EspressoCake/Firewall_Walker_BOF) - A BOF to interact with COM objects associated with the Windows software firewall.
- [mgeeky/ShellcodeFluctuation](https://github.com/mgeeky/ShellcodeFluctuation) - An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
- [aristocratos/btop](https://github.com/aristocratos/btop) - A monitor of resources
- [waleedassar/SyscallNumberFinder](https://github.com/waleedassar/SyscallNumberFinder) -
- [hotnops/RemoteDebugView](https://github.com/hotnops/RemoteDebugView) - A DLL that serves OutputDebugString content over a TCP connection
- [APTortellini/unDefender](https://github.com/APTortellini/unDefender) - Killing your preferred antimalware by abusing native symbolic links and NT paths.
- [mez-0/winrmdll](https://github.com/mez-0/winrmdll) - C++ WinRM API via Reflective DLL
- [airbus-cert/Yagi](https://github.com/airbus-cert/Yagi) - Yet Another Ghidra Integration for IDA
- [NoOne-hub/bypass-BeaconEye](https://github.com/NoOne-hub/bypass-BeaconEye) - bypass BeaconEye
- [0x727/CloneX_0x727](https://github.com/0x727/CloneX_0x727) - 进行克隆用户、添加用户等账户防护安全检测的轻巧工具
- [evilashz/RemoteMemorymodule](https://github.com/evilashz/RemoteMemorymodule) - Load the evilDLL from socket connection without touch disk
- [manyfacedllama/amsi-tracer](https://github.com/manyfacedllama/amsi-tracer) - Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) passed into AMSI during dynamic execution.
- [kavika13/RemCom](https://github.com/kavika13/RemCom) - Remote Command Executor: A OSS replacement for PsExec and RunAs - or Telnet without having to install a server. Take your pick :)
- [x64dbg/ScyllaHide](https://github.com/x64dbg/ScyllaHide) - Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide
- [ivan-sincek/keylogger](https://github.com/ivan-sincek/keylogger) - Windows OS keylogger with a hook mechanism (i.e. with a keyboard hook procedure).
- [EvanMcBroom/microsocks11](https://github.com/EvanMcBroom/microsocks11) - A cross-platform SOCKS5 library and server based on the microsocks project.
- [rr-debugger/rr](https://github.com/rr-debugger/rr) - Record and Replay Framework
- [zer0fl4g/DebugDetector](https://github.com/zer0fl4g/DebugDetector) -
- [ZLMediaKit/ZLMediaKit](https://github.com/ZLMediaKit/ZLMediaKit) - WebRTC/RTSP/RTMP/HTTP/HLS/HTTP-FLV/WebSocket-FLV/HTTP-TS/HTTP-fMP4/WebSocket-TS/WebSocket-fMP4/GB28181/SRT server and client framework based on C++11
- [0x727/ShuiYing_0x727](https://github.com/0x727/ShuiYing_0x727) - 检测域环境内,域机器的本地管理组成员是否存在弱口令和通用口令,对域用户的权限分配以及域内委派查询
- [jacob-baines/concealed_position](https://github.com/jacob-baines/concealed_position) - Bring your own print driver privilege escalation tool
- [aaaddress1/Windows-APT-Warfare](https://github.com/aaaddress1/Windows-APT-Warfare) - 著作《Windows APT Warfare:惡意程式前線戰術指南》各章節技術實作之原始碼內容
- [0x727/SqlKnife_0x727](https://github.com/0x727/SqlKnife_0x727) - 适合在命令行中使用的轻巧的SQL Server数据库安全检测工具
- [tpoechtrager/osxcross](https://github.com/tpoechtrager/osxcross) - Mac OS X cross toolchain for Linux, FreeBSD, OpenBSD and Android (Termux)
- [JohnnyZhouX/Intranet-Hacking](https://github.com/JohnnyZhouX/Intranet-Hacking) - 内网渗透相关总结
- [olliencc/WindowsPatchDetector](https://github.com/olliencc/WindowsPatchDetector) - Experimental: Windows .text section compare - disk versus memory
- [citp/BlockSci](https://github.com/citp/BlockSci) - A high-performance tool for blockchain science and exploration
- [huoji120/CobaltStrikeDetected](https://github.com/huoji120/CobaltStrikeDetected) - 40行代码检测到大部分CobaltStrike的shellcode
- [Cr4sh/KernelForge](https://github.com/Cr4sh/KernelForge) - A library to develop kernel level Windows payloads for post HVCI era
- [hasherezade/pin_n_sieve](https://github.com/hasherezade/pin_n_sieve) - An experimental dynamic malware unpacker based on Intel Pin and PE-sieve
- [zodiacon/TotalRegistry](https://github.com/zodiacon/TotalRegistry) - Total Registry - enhanced Registry editor/viewer
- [mandiant/flare-wmi](https://github.com/mandiant/flare-wmi) -
- [AzAgarampur/byeintegrity-uac](https://github.com/AzAgarampur/byeintegrity-uac) - Bypass UAC by hijacking a DLL located in the Native Image Cache
- [rajiv2790/FalconEye](https://github.com/rajiv2790/FalconEye) -
- [BSI-Bund/RdpCacheStitcher](https://github.com/BSI-Bund/RdpCacheStitcher) - RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
- [GossiTheDog/HiveNightmare](https://github.com/GossiTheDog/HiveNightmare) - Exploit allowing you to read registry hives as non-admin on Windows 10 and 11
- [google/lyra](https://github.com/google/lyra) - A Very Low-Bitrate Codec for Speech Compression
- [k-k-k-k-k/CVE-2021-1732](https://github.com/k-k-k-k-k/CVE-2021-1732) - CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发
- [GoSSIP-SJTU/Armariris](https://github.com/GoSSIP-SJTU/Armariris) - 孤挺花(Armariris) -- 由上海交通大学密码与计算机安全实验室维护的LLVM混淆框架
- [HackerDev-Felix/WechatDecrypt](https://github.com/HackerDev-Felix/WechatDecrypt) - 微信消息解密工具
- [wh201906/Proxmark3GUI](https://github.com/wh201906/Proxmark3GUI) - A cross-platform GUI for Proxmark3 client | 为PM3设计的跨平台图形界面
- [kkent030315/PageTableInjection](https://github.com/kkent030315/PageTableInjection) - Code Injection, Inject malicious payload via pagetables pml4.
- [S1ckB0y1337/TokenPlayer](https://github.com/S1ckB0y1337/TokenPlayer) - Manipulating and Abusing Windows Access Tokens.
- [sogou/workflow](https://github.com/sogou/workflow) - C++ Parallel Computing and Asynchronous Networking Framework
- [uknowsec/JuicyPotato](https://github.com/uknowsec/JuicyPotato) - Modifying JuicyPotato to support load shellcode and webshell
- [CodingGay/BlackDex](https://github.com/CodingGay/BlackDex) - BlackDex is an Android unpack(dexdump) tool, it supports Android 5.0~12 and need not rely to any environment. BlackDex can run on any Android mobile phone or emulator, you can unpack APK File in sever
- [KongKong20/WeChatPCHook](https://github.com/KongKong20/WeChatPCHook) - 微信 电脑 机器人 入门教程 基于HOOK
- [uknowsec/CreateService](https://github.com/uknowsec/CreateService) - 创建服务持久化
- [Barbarisch/forkatz](https://github.com/Barbarisch/forkatz) - credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege
- [netbiosX/AMSI-Provider](https://github.com/netbiosX/AMSI-Provider) - A fake AMSI Provider which can be used for persistence.
- [AzAgarampur/byeintegrity5-uac](https://github.com/AzAgarampur/byeintegrity5-uac) - Bypass UAC at any level by abusing the Task Scheduler and environment variables
- [Paulo-D2000/ShellCodeObfuscator](https://github.com/Paulo-D2000/ShellCodeObfuscator) - Simple shellcode obfuscator using PYTHON and C / C++
- [dr0op/CrossNet-Beta](https://github.com/dr0op/CrossNet-Beta) - 红队行动中利用白利用、免杀、自动判断网络环境生成钓鱼可执行文件。
- [chroblert/JCTokenUtil](https://github.com/chroblert/JCTokenUtil) - Windows访问令牌查看及利用工具
- [Cr4sh/MicroBackdoor](https://github.com/Cr4sh/MicroBackdoor) - Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]
- [xuanxuan0/DripLoader](https://github.com/xuanxuan0/DripLoader) - Evasive shellcode loader for bypassing event-based injection detection (PoC)
- [vusec/collabfuzz](https://github.com/vusec/collabfuzz) - CollabFuzz: A Framework for Collaborative Fuzzing
- [FeJQ/AUPK](https://github.com/FeJQ/AUPK) -
- [jozemberi/PE-Crypter](https://github.com/jozemberi/PE-Crypter) - Simple runtime crypter in C/C++.
- [klecko/kvm-fuzz](https://github.com/klecko/kvm-fuzz) - PoC of fuzzing closed-source userspace binaries with KVM
- [jxy-s/herpaderping](https://github.com/jxy-s/herpaderping) - Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
- [L3cr0f/DccwBypassUAC](https://github.com/L3cr0f/DccwBypassUAC) - Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".
- [RedCursorSecurityConsulting/PPLKiller](https://github.com/RedCursorSecurityConsulting/PPLKiller) - Tool to bypass LSA Protection (aka Protected Process Light)
- [h4ms1k/samdump](https://github.com/h4ms1k/samdump) -
- [BlackINT3/OpenArk](https://github.com/BlackINT3/OpenArk) - The Next Generation of Anti-Rookit(ARK) tool for Windows.
- [0xZ0F/Z0FCourse_ReverseEngineering](https://github.com/0xZ0F/Z0FCourse_ReverseEngineering) - Reverse engineering focusing on x64 Windows.
- [UndefinedIdentifier/LCX](https://github.com/UndefinedIdentifier/LCX) - 自修改免杀lcx端口转发工具
- [notify-bibi/ScyllaHide-IDA7.5](https://github.com/notify-bibi/ScyllaHide-IDA7.5) - ScyllaHide for IDA7.5; ScyllaHide IDA7.5; It is a really niccccccce anti-anti-debug tool
- [aahmad097/AlternativeShellcodeExec](https://github.com/aahmad097/AlternativeShellcodeExec) - Alternative Shellcode Execution Via Callbacks
- [hasherezade/bearparser](https://github.com/hasherezade/bearparser) - Portable Executable parsing library (from PE-bear)
- [kdrag0n/safetynet-fix](https://github.com/kdrag0n/safetynet-fix) - Google SafetyNet attestation workarounds for Magisk
- [purerosefallen/ygopro](https://github.com/purerosefallen/ygopro) - KoishiPro
- [deepinstinct/LsassSilentProcessExit](https://github.com/deepinstinct/LsassSilentProcessExit) - Command line interface to dump LSASS memory to disk via SilentProcessExit
- [ChaitanyaHaritash/Callback_Shellcode_Injection](https://github.com/ChaitanyaHaritash/Callback_Shellcode_Injection) - POCs for Shellcode Injection via Callbacks
- [huoji120/DuckMemoryScan](https://github.com/huoji120/DuckMemoryScan) - 检测绝大部分所谓的内存免杀马
- [ajayrandhawa/Keylogger](https://github.com/ajayrandhawa/Keylogger) - Keylogger is 100% invisible keylogger not only for users, but also undetectable by antivirus software. keylogger Monitors all keystokes, Mouse clicks. It has a seperate process which continues capture
- [TimelifeCzy/kHypervisorBasic](https://github.com/TimelifeCzy/kHypervisorBasic) - VT Hook
- [WormChickenWizard/hikvision-decrypter](https://github.com/WormChickenWizard/hikvision-decrypter) - A simple cross platform program written in C++ used for decrypting the configuration files created by Hikvision Security Cameras. Successor to my hikvision-xor-decrypter
- [codingo/dooked](https://github.com/codingo/dooked) - DNS and Target HTTP History Local Storage and Search
- [itm4n/Perfusion](https://github.com/itm4n/Perfusion) - Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)
- [stealth/psc](https://github.com/stealth/psc) - E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward
- [fastogt/fastonosql](https://github.com/fastogt/fastonosql) - FastoNoSQL is a crossplatform Redis, Memcached, SSDB, LevelDB, RocksDB, UnQLite, LMDB, ForestDB, Pika, Dynomite, KeyDB GUI management tool.
- [WerWolv/ImHex](https://github.com/WerWolv/ImHex) - 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
- [OmerYa/Invisi-Shell](https://github.com/OmerYa/Invisi-Shell) - Hide your Powershell script in plain sight. Bypass all Powershell security features
- [ioncodes/CVE-2020-16938](https://github.com/ioncodes/CVE-2020-16938) - Bypassing NTFS permissions to read any files as unprivileged user.
- [DockDroid/openvmi](https://github.com/DockDroid/openvmi) - 鹏城实验室与北弓联合开发的VMI开源版本
- [0xnobody/vmpdump](https://github.com/0xnobody/vmpdump) - A dynamic VMP dumper and import fixer, powered by VTIL.
- [bats3c/ChromeTools](https://github.com/bats3c/ChromeTools) - A collection of tools to abuse chrome browser
- [Rvn0xsy/Cooolis-ms](https://github.com/Rvn0xsy/Cooolis-ms) - Cooolis-ms是一个包含了Metasploit Payload Loader、Cobalt Strike External C2 Loader、Reflective DLL injection的代码执行工具,它的定位在于能够在静态查杀上规避一些我们将要执行且含有特征的代码,帮助红队人员更方便快捷的从Web容器环境切换到C2环境进一步进行工作。
- [0x09AL/RdpThief](https://github.com/0x09AL/RdpThief) - Extracting Clear Text Passwords from mstsc.exe using API Hooking.
- [lcatro/vuln_javascript](https://github.com/lcatro/vuln_javascript) - 模拟一个存在漏洞的JavaScript 运行环境,用来学习浏览器漏洞原理和练习如何编写Shellcode (a JavaScript Execute Envirment which study browser vuln and how to write Shellcode ) ..
- [ggerganov/kbd-audio](https://github.com/ggerganov/kbd-audio) - 🎤⌨️ Acoustic keyboard eavesdropping
- [scanfsec/AggressorCNA](https://github.com/scanfsec/AggressorCNA) - Cobalt Strike Aggressor Scripts
- [googleprojectzero/Jackalope](https://github.com/googleprojectzero/Jackalope) - Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android
- [yazhiwang/ollvm-tll](https://github.com/yazhiwang/ollvm-tll) - Ollvm+Armariris+LLVM 6.0.0
- [m-y-mo/android_nfc_fuzzer](https://github.com/m-y-mo/android_nfc_fuzzer) -
- [Alamot/code-snippets](https://github.com/Alamot/code-snippets) - Various code snippets
- [miek/inspectrum](https://github.com/miek/inspectrum) - Radio signal analyser
- [NytroRST/ShellcodeCompiler](https://github.com/NytroRST/ShellcodeCompiler) - Shellcode Compiler
- [knownsec/shellcodeloader](https://github.com/knownsec/shellcodeloader) - shellcodeloader
- [WithSecureLabs/C3](https://github.com/WithSecureLabs/C3) - Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
- [cbwang505/CVE-2020-1066-EXP](https://github.com/cbwang505/CVE-2020-1066-EXP) - CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统
- [google/CTAP2-test-tool](https://github.com/google/CTAP2-test-tool) - Test tool for CTAP2 authenticators
- [yardenshafir/CVE-2020-1034](https://github.com/yardenshafir/CVE-2020-1034) - PoC demonstrating the use of cve-2020-1034 for privilege escalation
- [PetoiCamp/OpenCat-Old](https://github.com/PetoiCamp/OpenCat-Old) - A programmable and highly maneuverable robotic cat for STEM education and AI-enhanced services.
- [k-fire/shellcode-to-dll](https://github.com/k-fire/shellcode-to-dll) - shellcode 异或加密并生成dll
- [solemnwarning/rehex](https://github.com/solemnwarning/rehex) - Reverse Engineers' Hex Editor
- [sensepost/rattler](https://github.com/sensepost/rattler) - Automated DLL Enumerator
- [mohuihui/DingTalk_Assistant](https://github.com/mohuihui/DingTalk_Assistant) - 钉钉助手,主要功能包括:聊天消息防撤回、程序多开、屏蔽频繁升级等。
- [horsicq/XAPKDetector](https://github.com/horsicq/XAPKDetector) - APK/DEX detector for Windows, Linux and MacOS.
- [crossroadsfpga/pigasus](https://github.com/crossroadsfpga/pigasus) - 100Gbps Intrusion Detection and Prevention System
- [CheckPointSW/showstopper](https://github.com/CheckPointSW/showstopper) - ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solutions that clash with standard anti-debug methods.
- [ION28/BLUESPAWN](https://github.com/ION28/BLUESPAWN) - An Active Defense and EDR software to empower Blue Teams
- [anhkgg/SuperDllHijack](https://github.com/anhkgg/SuperDllHijack) - SuperDllHijack:A general DLL hijack technology, don't need to manually export the same function interface of the DLL, so easy! 一种通用Dll劫持技术,不再需要手工导出Dll的函数接口了
- [gitjdm/dumper2020](https://github.com/gitjdm/dumper2020) - Yet another LSASS dumper
- [itm4n/FullPowers](https://github.com/itm4n/FullPowers) - Recover the default privilege set of a LOCAL/NETWORK SERVICE account
- [tobimensch/aqemu](https://github.com/tobimensch/aqemu) - Official AQEMU repository - a GUI for virtual machines using QEMU as the backend
- [upx/upx](https://github.com/upx/upx) - UPX - the Ultimate Packer for eXecutables
- [vaibhavpandeyvpz/apkstudio](https://github.com/vaibhavpandeyvpz/apkstudio) - Open-source, cross platform Qt based IDE for reverse-engineering Android application packages.
- [am0nsec/wspe](https://github.com/am0nsec/wspe) - Windows System Programming Experiments
- [zodiacon/ProcMonXv2](https://github.com/zodiacon/ProcMonXv2) - Process Monitor X v2
- [Neo23x0/Raccine](https://github.com/Neo23x0/Raccine) - A Simple Ransomware Vaccine
- [siemens/fluffi](https://github.com/siemens/fluffi) - FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters
- [binarly-io/efiXplorer](https://github.com/binarly-io/efiXplorer) - IDA plugin for UEFI firmware analysis and reverse engineering automation
- [mubix/netview](https://github.com/mubix/netview) - Netview enumerates systems using WinAPI calls
- [klzgrad/naiveproxy](https://github.com/klzgrad/naiveproxy) - Make a fortune quietly
- [facebook/hermes](https://github.com/facebook/hermes) - A JavaScript engine optimized for running React Native.
- [cyberark/DLLSpy](https://github.com/cyberark/DLLSpy) - DLL Hijacking Detection Tool
- [mmozeiko/aes-finder](https://github.com/mmozeiko/aes-finder) - Utility to find AES keys in running processes
- [Almamu/linux-wallpaperengine](https://github.com/Almamu/linux-wallpaperengine) - Wallpaper Engine backgrounds for Linux!
- [HexHive/FuZZan](https://github.com/HexHive/FuZZan) - FuZZan: Efficient Sanitizer Metadata Design for Fuzzing
- [illera88/Ponce](https://github.com/illera88/Ponce) - IDA 2016 plugin contest winner! Symbolic Execution just one-click away!
- [TheWover/Manager](https://github.com/TheWover/Manager) - Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET
- [crvvdev/MasterHide](https://github.com/crvvdev/MasterHide) - A x64 Windows Rootkit using SSDT or Hypervisor hook
- [iPower/KasperskyHook](https://github.com/iPower/KasperskyHook) - Hook system calls on Windows by using Kaspersky's hypervisor
- [Soulghost/iblessing](https://github.com/Soulghost/iblessing) - iblessing is an iOS security exploiting toolkit, it mainly includes application information gathering, static analysis and dynamic analysis. It can be used for reverse engineering, binary analysis and
- [hhlxf/USO_Info_Leak](https://github.com/hhlxf/USO_Info_Leak) - two heap address leak bugs in `usosvc` service
- [0xnobody/vmpattack](https://github.com/0xnobody/vmpattack) - A VMP to VTIL lifter.
- [Cc28256/CcRemote](https://github.com/Cc28256/CcRemote) - 这是一个基于gh0st远程控制的项目,使自己更深入了解远控的原理,采用VS2017,默认分支hijack还在修改不能执行,master分支的项目可以正常的运行的,你可以切换到该分支查看可以执行的代码
- [s1kr10s/Load_DLL](https://github.com/s1kr10s/Load_DLL) -
- [can1357/NoVmp](https://github.com/can1357/NoVmp) - A static devirtualizer for VMProtect x64 3.x. powered by VTIL.
- [baidu/openrasp](https://github.com/baidu/openrasp) - 🔥Open source RASP solution
- [br-sn/CheekyBlinder](https://github.com/br-sn/CheekyBlinder) - Enumerating and removing kernel callbacks using signed vulnerable drivers
- [D4stiny/spectre](https://github.com/D4stiny/spectre) - A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.
- [snorez/srcinv](https://github.com/snorez/srcinv) - source code audit tool
- [irsl/CVE-2020-1313](https://github.com/irsl/CVE-2020-1313) - Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability
- [k0keoyo/my_vulnerabilities](https://github.com/k0keoyo/my_vulnerabilities) -
- [hlldz/dazzleUP](https://github.com/hlldz/dazzleUP) - A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating systems.
- [DimopoulosElias/Primitives](https://github.com/DimopoulosElias/Primitives) -
- [frida/cryptoshark](https://github.com/frida/cryptoshark) - Self-optimizing cross-platform code tracer based on dynamic recompilation
- [yeyiqun/FUPK3-hook_kill](https://github.com/yeyiqun/FUPK3-hook_kill) - 本分支解决部分爱加密加固应用无法脱壳成功的问题。演示视频https://pan.baidu.com/s/1HH_-TQGca1NLoSqzvOPB3Q 密码:izm3
- [uknowsec/OXID_Find](https://github.com/uknowsec/OXID_Find) - OXID_Find by C++(多线程) 通过OXID解析器获取Windows远程主机上网卡地址
- [Q4n/CVE-2020-1362](https://github.com/Q4n/CVE-2020-1362) - writeup of CVE-2020-1362
- [collin80/SavvyCAN](https://github.com/collin80/SavvyCAN) - QT based cross platform canbus tool
- [agauniyal/rang](https://github.com/agauniyal/rang) - A Minimal, Header only Modern c++ library for terminal goodies 💄✨
- [hmoytx/RdpThief_tools](https://github.com/hmoytx/RdpThief_tools) - 窃取mstsc中的用户明文凭据
- [alphaSeclab/anti-debug](https://github.com/alphaSeclab/anti-debug) -
- [alphaSeclab/bypass-uac](https://github.com/alphaSeclab/bypass-uac) -
- [snort3/snort3](https://github.com/snort3/snort3) - Snort++
- [hasherezade/exe_to_dll](https://github.com/hasherezade/exe_to_dll) - Converts a EXE into DLL
- [Gyoonus/deoptfuscator](https://github.com/Gyoonus/deoptfuscator) - Deobfuscator for Android Application
- [tindy2013/subconverter](https://github.com/tindy2013/subconverter) - Utility to convert between various subscription format
- [Rvn0xsy/Cobaltstrike-atexec](https://github.com/Rvn0xsy/Cobaltstrike-atexec) - 使得Cobaltstrike支持Atexec
- [tklab-tud/BSF](https://github.com/tklab-tud/BSF) - Botnet Simulation Framework
- [itm4n/UsoDllLoader](https://github.com/itm4n/UsoDllLoader) - Windows - Weaponizing privileged file writes with the Update Session Orchestrator service
- [KDE/latte-dock](https://github.com/KDE/latte-dock) - Replacement dock for Plasma desktops, providing an elegant and intuitive experience for your tasks and plasmoids
- [ohpe/juicy-potato](https://github.com/ohpe/juicy-potato) - A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
- [hasherezade/tag_converter](https://github.com/hasherezade/tag_converter) -
- [hasherezade/tiny_tracer](https://github.com/hasherezade/tiny_tracer) - A Pin Tool for tracing API calls etc
- [ksnip/ksnip](https://github.com/ksnip/ksnip) - ksnip the cross-platform screenshot and annotation tool
- [A2kaid/Get-WeChat-DB](https://github.com/A2kaid/Get-WeChat-DB) - 获取目标机器的微信数据库和密钥,但是有很多bug需要解决,需要继续完善
- [b4rtik/metasploit-execute-assembly](https://github.com/b4rtik/metasploit-execute-assembly) - Custom Metasploit post module to executing a .NET Assembly from Meterpreter session
- [ZanderChang/anti-sandbox](https://github.com/ZanderChang/anti-sandbox) - Windows对抗沙箱和虚拟机的方法总结
- [cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION](https://github.com/cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION) - Support ALL Windows Version
- [JelinYao/HttpInterface](https://github.com/JelinYao/HttpInterface) - Windows上C++封装的HTTP库,包含三种实现模式(WinInet、WinHttp、socket)
- [LDrakura/DLLhijack-ShellcodeLoader](https://github.com/LDrakura/DLLhijack-ShellcodeLoader) - DLLhijack winmm.dll
- [idiotc4t/ReflectiveBase64DLL](https://github.com/idiotc4t/ReflectiveBase64DLL) - This is a project to receive Base64 data and decode it in process
- [idiotc4t/Mapping-injection](https://github.com/idiotc4t/Mapping-injection) - NO WriteProcessMemory CreateRemoteThread APIs call shellcode injection
- [idiotc4t/GetSystemEarlyBird](https://github.com/idiotc4t/GetSystemEarlyBird) - 这是一个直接取得系统权限的项目
- [HexHive/FuzzGen](https://github.com/HexHive/FuzzGen) -
- [ameenmaali/urldedupe](https://github.com/ameenmaali/urldedupe) - Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
- [anbox/anbox](https://github.com/anbox/anbox) - Anbox is a container-based approach to boot a full Android system on a regular GNU/Linux system
- [antonioCoco/RogueWinRM](https://github.com/antonioCoco/RogueWinRM) - Windows Local Privilege Escalation from Service Account to System
- [sailay1996/WerTrigger](https://github.com/sailay1996/WerTrigger) - Weaponizing for privileged file writes bugs with windows problem reporting
- [SerenityOS/serenity](https://github.com/SerenityOS/serenity) - The Serenity Operating System 🐞
- [ivan-sincek/invoker](https://github.com/ivan-sincek/invoker) - Penetration testing utility and antivirus assessment tool.
- [ylcangel/crack_dexhelper](https://github.com/ylcangel/crack_dexhelper) - 梆梆企业加固详细逆向分析过程, 包含两种对该加固的脱壳机(直接解密classes0.jar和基于frida hook)
- [Bareflank/MicroV](https://github.com/Bareflank/MicroV) - A micro hypervisor for running micro VMs
- [Qv2ray/Qv2ray](https://github.com/Qv2ray/Qv2ray) - :star: Linux / Windows / macOS 跨平台 V2Ray 客户端 | 支持 VMess / VLESS / SSR / Trojan / Trojan-Go / NaiveProxy / HTTP / HTTPS / SOCKS5 | 使用 C++ / Qt 开发 | 可拓展插件式设计 :star:
- [earthquake/Socks5Server](https://github.com/earthquake/Socks5Server) - Windows C/C++ Socks5 Server
- [nccgroup/SocksOverRDP](https://github.com/nccgroup/SocksOverRDP) - Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop
- [SongFGH/USTC-CS-Courses-Resource](https://github.com/SongFGH/USTC-CS-Courses-Resource) - :heart:中国科学技术大学计算机学院课程资源(https://mbinary.xyz/ustc-cs/)
- [DayBreak-u/chineseocr_lite](https://github.com/DayBreak-u/chineseocr_lite) - 超轻量级中文ocr,支持竖排文字识别, 支持ncnn、mnn、tnn推理 ( dbnet(1.8M) + crnn(2.5M) + anglenet(378KB)) 总模型仅4.7M
- [F8LEFT/FUPK3](https://github.com/F8LEFT/FUPK3) - 演示视频https://pan.baidu.com/s/1HH_-TQGca1NLoSqzvOPB3Q 密码:izm3
- [0x09AL/IIS-Raid](https://github.com/0x09AL/IIS-Raid) - A native backdoor module for Microsoft IIS (Internet Information Services)
- [dothook/FunnyMeterpreter](https://github.com/dothook/FunnyMeterpreter) - 与反病毒软件老大哥们的打闹日常
- [trojan-gfw/trojan](https://github.com/trojan-gfw/trojan) - An unidentifiable mechanism that helps you bypass GFW.
- [huoji120/Antivirus_R3_bypass_demo](https://github.com/huoji120/Antivirus_R3_bypass_demo) - 分别用R3的0day与R0的0day来干掉杀毒软件
- [lengjibo/NetUser](https://github.com/lengjibo/NetUser) - 使用windows api添加用户,可用于net无法使用时.分为nim版,c++版本,RDI版,BOF版。
- [panda-re/lava](https://github.com/panda-re/lava) - LAVA: Large-scale Automated Vulnerability Addition
- [outflanknl/Spray-AD](https://github.com/outflanknl/Spray-AD) - A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.
- [tstack/lnav](https://github.com/tstack/lnav) - Log file navigator
- [horsicq/x64dbg-Plugin-Manager](https://github.com/horsicq/x64dbg-Plugin-Manager) - Plugin manager for x64dbg
- [horsicq/XOpcodeCalc](https://github.com/horsicq/XOpcodeCalc) - Opcode calculator / ASM calculator
- [ffffffff0x/1earn](https://github.com/ffffffff0x/1earn) - ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
- [binspector/binspector](https://github.com/binspector/binspector) - A binary format analysis tool
- [JaanusKaapPublic/HyperViper](https://github.com/JaanusKaapPublic/HyperViper) - Toolkit for Hyper-V security research
- [rizinorg/cutter](https://github.com/rizinorg/cutter) - Free and Open Source Reverse Engineering Platform powered by rizin
- [decaf-project/Droidscope](https://github.com/decaf-project/Droidscope) - A dynamic analysis platform for Android
- [zmeadows/lldbg](https://github.com/zmeadows/lldbg) - A lightweight native GUI for LLDB.
- [facebookarchive/ds2](https://github.com/facebookarchive/ds2) - Debug server for lldb.
- [gdbinit/ExtractMacho2](https://github.com/gdbinit/ExtractMacho2) - IDA plugin to extract Mach-O binaries located in the disassembly or data
- [jmpews/DobbyDrill](https://github.com/jmpews/DobbyDrill) - hook MachO file based on Dobby (NOT DONE)
- [codilime/veles](https://github.com/codilime/veles) - Binary data analysis and visualization tool
- [WrBug/dumpDex](https://github.com/WrBug/dumpDex) - 💯一款Android脱壳工具,需要xposed支持, 易开发已集成该项目。
- [GiacomoLaw/Keylogger](https://github.com/GiacomoLaw/Keylogger) - A simple keylogger for Windows, Linux and Mac
- [AloneMonkey/iOSREBook](https://github.com/AloneMonkey/iOSREBook) - 《iOS应用逆向与安全》随书源码
- [martinrotter/rssguard](https://github.com/martinrotter/rssguard) - Feed reader (and podcast player) which supports RSS/ATOM/JSON and many web-based feed services.
- [xorrior/raven](https://github.com/xorrior/raven) - CobaltStrike External C2 for Websockets
- [yuanyuanxiang/SimpleRemoter](https://github.com/yuanyuanxiang/SimpleRemoter) - 基于gh0st的远程控制器:实现了终端管理、进程管理、窗口管理、远程桌面、文件管理、语音管理、视频管理、服务管理、注册表管理等功能,优化全部代码及整理排版,修复内存泄漏缺陷,程序运行稳定。项目代码仅限于学习和交流用途。
- [ossrs/srs](https://github.com/ossrs/srs) - SRS is a simple, high-efficiency, real-time media server supporting RTMP, WebRTC, HLS, HTTP-FLV, HTTP-TS, SRT, MPEG-DASH, and GB28181.
- [saulty4ish/Dir_Scan_ByQT5](https://github.com/saulty4ish/Dir_Scan_ByQT5) - qt实现仿御剑风格路径扫描工具,增加延时,代理池Bypass功能,同时支持批量扫描,附带简单whois信息搜集与端口扫描模块,界面更加美观。
- [HyperSine/SdoKeyCrypt-sys-local-privilege-elevation](https://github.com/HyperSine/SdoKeyCrypt-sys-local-privilege-elevation) - CVE-2019-9729. Transferred from https://github.com/DoubleLabyrinth/SdoKeyCrypt-sys-local-privilege-elevation
- [deadash/pbb_crack](https://github.com/deadash/pbb_crack) - PBB视频解密
- [KikoPlayProject/KikoPlay](https://github.com/KikoPlayProject/KikoPlay) - KikoPlay - NOT ONLY A Full-Featured Danmu Player 不仅仅是全功能弹幕播放器
- [wazuh/wazuh](https://github.com/wazuh/wazuh) - Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
- [GodofMonkeys/Arma-III-Chinese-Localization-Enhanced](https://github.com/GodofMonkeys/Arma-III-Chinese-Localization-Enhanced) - 武裝行動3(Arma 3)官方中文潤飾、加強、在地化翻譯模組。
- [zhongyang219/TrafficMonitor](https://github.com/zhongyang219/TrafficMonitor) - 这是一个用于显示当前网速、CPU及内存利用率的桌面悬浮窗软件,并支持任务栏显示,支持更换皮肤。
- [TranslucentTB/TranslucentTB](https://github.com/TranslucentTB/TranslucentTB) - A lightweight utility that makes the Windows taskbar translucent/transparent.
- [snowie2000/mactype](https://github.com/snowie2000/mactype) - Better font rendering for Windows.
- [klesh/fu](https://github.com/klesh/fu) - fu stands for File to URL, a utility design to help you upload images/files and produce Markdown/HTML snippets with couple of clicks.
- [xdnice/PCShare](https://github.com/xdnice/PCShare) - PCShare是一款强大的远程控制软件,可以监视目标机器屏幕、注册表、文件系统等。
- [dekuan/VwFirewall](https://github.com/dekuan/VwFirewall) - 微盾®VirtualWall®防火墙整套源代码
- [gqrx-sdr/gqrx](https://github.com/gqrx-sdr/gqrx) - Software defined radio receiver powered by GNU Radio and Qt.
- [gnuradio/gnuradio](https://github.com/gnuradio/gnuradio) - GNU Radio – the Free and Open Software Radio Ecosystem
- [zcgonvh/MS16-032](https://github.com/zcgonvh/MS16-032) - MS16-032(CVE-2016-0099) for SERVICE ONLY
- [kanryu/quickviewer](https://github.com/kanryu/quickviewer) - A image/comic viewer application for Windows, Mac and Linux, it can show images very fast
- [oyyd/nysocks](https://github.com/oyyd/nysocks) - Nysocks binds kcp and libuv to provide an aggressive tcp tunnel in nodejs.
- [vnotex/vnote](https://github.com/vnotex/vnote) - A pleasant note-taking platform in native C++.
- [guoming0000/BatchRunTrayTool](https://github.com/guoming0000/BatchRunTrayTool) - A tray tool under windows to open any file by system default or any executable program.
- [rexdf/CommandTrayHost](https://github.com/rexdf/CommandTrayHost) - A command line program monitor systray for Windows
- [Gregwar/fatcat](https://github.com/Gregwar/fatcat) - FAT filesystems explore, extract, repair, and forensic tool
- [0x09AL/DNS-Persist](https://github.com/0x09AL/DNS-Persist) - DNS-Persist is a post-exploitation agent which uses DNS for command and control.
- [wangyu-/tinyfecVPN](https://github.com/wangyu-/tinyfecVPN) - A VPN Designed for Lossy Links, with Build-in Forward Error Correction(FEC) Support. Improves your Network Quality on a High-latency Lossy Link.
- [wangyu-/UDPspeeder](https://github.com/wangyu-/UDPspeeder) - A Tunnel which Improves your Network Quality on a High-latency Lossy Link by using Forward Error Correction, possible for All Traffics(TCP/UDP/ICMP)
- [cbayet/Exploit-CVE-2017-6008](https://github.com/cbayet/Exploit-CVE-2017-6008) - Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.
- [apache/incubator-pagespeed-ngx](https://github.com/apache/incubator-pagespeed-ngx) - Automatic PageSpeed optimization module for Nginx
- [rakshasa/rtorrent](https://github.com/rakshasa/rtorrent) - rTorrent BitTorrent client
- [qwinff/qwinff](https://github.com/qwinff/qwinff) - A Qt4/5 GUI Frontend for FFmpeg
- [simsong/tcpflow](https://github.com/simsong/tcpflow) - TCP/IP packet demultiplexer. Download from:
- [NotGlop/SysExec](https://github.com/NotGlop/SysExec) - [Windows] Local Privilege Escalation - WebClient
- [hatRiot/token-priv](https://github.com/hatRiot/token-priv) - Token Privilege Research
- [XhmikosR/notepad2-mod](https://github.com/XhmikosR/notepad2-mod) - LOOKING FOR DEVELOPERS - Notepad2-mod, a Notepad2 fork, a fast and light-weight Notepad-like text editor with syntax highlighting
- [wangyu-/udp2raw](https://github.com/wangyu-/udp2raw) - A Tunnel which Turns UDP Traffic into Encrypted UDP/FakeTCP/ICMP Traffic by using Raw Socket,helps you Bypass UDP FireWalls(or Unstable UDP Environment)
- [securesocketfunneling/ssf](https://github.com/securesocketfunneling/ssf) - Secure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platform
- [pipesocks/pipesocks](https://github.com/pipesocks/pipesocks) - A pipe-like SOCKS5 tunnel system.
- [vah13/extractTVpasswords](https://github.com/vah13/extractTVpasswords) - tool to extract passwords from TeamViewer memory using Frida
- [miguelfreitas/twister-core](https://github.com/miguelfreitas/twister-core) - twister core / daemon
- [wbenny/mini-tor](https://github.com/wbenny/mini-tor) - proof-of-concept implementation of tor protocol using Microsoft CNG/CryptoAPI
- [jks-prv/Beagle_SDR_GPS](https://github.com/jks-prv/Beagle_SDR_GPS) - KiwiSDR: BeagleBone web-accessible shortwave receiver and software-defined GPS
- [PurpleI2P/i2pd](https://github.com/PurpleI2P/i2pd) - 🛡 I2P: End-to-End encrypted and anonymous Internet
- [samizzo/hexed](https://github.com/samizzo/hexed) - Windows console-based hex editor
- [pavel-odintsov/fastnetmon](https://github.com/pavel-odintsov/fastnetmon) - FastNetMon - very fast DDoS sensor with sFlow/Netflow/IPFIX/SPAN support
- [gatieme/CodingInterviews](https://github.com/gatieme/CodingInterviews) - 剑指Offer——名企面试官精讲典型编程题
- [oguzhaninan/Stacer](https://github.com/oguzhaninan/Stacer) - Linux System Optimizer and Monitoring - https://oguzhaninan.github.io/Stacer-Web
- [sam-b/HackSysDriverExploits](https://github.com/sam-b/HackSysDriverExploits) -
- [psi-im/psi](https://github.com/psi-im/psi) - XMPP client
- [rime/librime](https://github.com/rime/librime) - Rime Input Method Engine, the core library
- [bee13oy/AV_Kernel_Vulns](https://github.com/bee13oy/AV_Kernel_Vulns) - Pocs for Antivirus Software‘s Kernel Vulnerabilities
- [nladuo/captcha-break](https://github.com/nladuo/captcha-break) - captcha break based on opencv2, tesseract-ocr and some machine learning algorithm.
- [3gstudent/From-System-authority-to-Medium-authority](https://github.com/3gstudent/From-System-authority-to-Medium-authority) - Penetration test
- [owasp-modsecurity/ModSecurity](https://github.com/owasp-modsecurity/ModSecurity) - ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. It has a robust event-based programming language which provides protection from a range o
- [secrary/InjectProc](https://github.com/secrary/InjectProc) - InjectProc - Process Injection Techniques [This project is not maintained anymore]
- [JLospinoso/gargoyle](https://github.com/JLospinoso/gargoyle) - A memory scanning evasion technique
- [ladislav-zezula/CascLib](https://github.com/ladislav-zezula/CascLib) - An open-source implementation of library for reading CASC storages from Blizzard games since 2014
- [homenc/HElib](https://github.com/homenc/HElib) - HElib is an open-source software library that implements homomorphic encryption. It supports the BGV scheme with bootstrapping and the Approximate Number CKKS scheme. HElib also includes optimizations
- [aguinet/wannakey](https://github.com/aguinet/wannakey) - Wannacry in-memory key recovery
- [KernelMaker/rocksutil](https://github.com/KernelMaker/rocksutil) - A c++ develop toolkit
- [google/security-research-pocs](https://github.com/google/security-research-pocs) - Proof-of-concept codes created as part of security research done by Google Security Team.
- [Dor1s/libfuzzer-workshop](https://github.com/Dor1s/libfuzzer-workshop) - Repository for materials of "Modern fuzzing of C/C++ Projects" workshop.
- [whdlgp/ARMv6m_Simulator](https://github.com/whdlgp/ARMv6m_Simulator) - Simple Simulator of ARMv6m instructions
- [hidviz/hidviz](https://github.com/hidviz/hidviz) - A tool for in-depth analysis of USB HID devices communication
- [x64dbg/x64dbg](https://github.com/x64dbg/x64dbg) - An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
- [steven-michaud/HookCase](https://github.com/steven-michaud/HookCase) - Tool for reverse engineering macOS/OS X
- [ele7enxxh/poc-exp](https://github.com/ele7enxxh/poc-exp) - poc or exp of android vulnerability
- [jackullrich/ShellcodeStdio](https://github.com/jackullrich/ShellcodeStdio) - An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.
- [Deeplocal/mocktailsmixer](https://github.com/Deeplocal/mocktailsmixer) - Make a DIY Robotic Mocktails Mixer Powered by the Google Assistant SDK
- [msuiche/OPCDE](https://github.com/msuiche/OPCDE) - OPCDE Cybersecurity Conference Materials
- [richkmeli/Richkware](https://github.com/richkmeli/Richkware) - Framework for building Windows malware, written in C++
- [lcatro/network_backdoor_scanner](https://github.com/lcatro/network_backdoor_scanner) - This is a backdoor about discover network device ,and it can hidden reverse connecting the hacker's server with encrypt commuication 后渗透后门程序,适合在已经攻陷的内网中做下一步的网络信息扫描..
- [secrary/InfectPE](https://github.com/secrary/InfectPE) - InfectPE - Inject custom code into PE file [This project is not maintained anymore]
- [lcatro/SISE_Traning_CTF_RE](https://github.com/lcatro/SISE_Traning_CTF_RE) - SNST Traning RE Project .华软网络安全小组逆向工程训练营,尝试以CTF 的形式来使大家可以动手训练快速提升自己的逆向工程水平.CTF 的训练程序又浅到深,没有使用太复杂的算法,在逆向的过程中遇到的难关都是在分析病毒和破解中遇到的实际情况,注重于实用.训练营还包含有源代码文件,训练程序和思路.希望可以帮助小伙伴们入门逆向工程这个神奇的世界..
- [microsoft/CNTK](https://github.com/microsoft/CNTK) - Microsoft Cognitive Toolkit (CNTK), an open source deep-learning toolkit
- [StevenHickson/PiAUISuite](https://github.com/StevenHickson/PiAUISuite) - Raspberry PI AUI Suite
- [hteso/iaito](https://github.com/hteso/iaito) - This project has been moved to:
- [DimitriFourny/koalaOS](https://github.com/DimitriFourny/koalaOS) - x86 Microkernel
- [silverf0x/RpcView](https://github.com/silverf0x/RpcView) - RpcView is a free tool to explore and decompile Microsoft RPC interfaces
- [cinience/RedisStudio](https://github.com/cinience/RedisStudio) - RedisStudio Redis GUI client(tool) for windows
- [yanyiwu/simhash](https://github.com/yanyiwu/simhash) - 中文文档simhash值计算## CMake
- [TheLartians/ModernCppStarter](https://github.com/TheLartians/ModernCppStarter) - 🚀 Kick-start your C++! A template for modern C++ projects using CMake, CI, code coverage, clang-format, reproducible dependency management and much more.
- [pothosware/PothosSDR](https://github.com/pothosware/PothosSDR) - Pothos SDR windows development environment## CSS
- [Qihoo360/WatchAD2.0](https://github.com/Qihoo360/WatchAD2.0) - WatchAD2.0是一款针对域威胁的日志分析与监控系统
- [LinWin-Cloud/setool-master](https://github.com/LinWin-Cloud/setool-master) - SetoolMaster是一款让你入门即入狱的python3开发的进阶型社会工程学工具。包括了全球定位、Ngrok内网穿透、Seeker高精度定位、网页钓鱼、病毒攻击、恐吓勒索信、爬虫、网站克隆、物联网设备搜索等,同时拥有中文支持,内置大量钓鱼模板,设计用于组织级别红队渗透测试,用于团队组织设备型协同,经过非常多的实战演练,效果出众,远超同行产品
- [paulbricman/dual-obsidian-client](https://github.com/paulbricman/dual-obsidian-client) - A skilled virtual assistant for Obsidian.
- [paranoidninja/O365-Doppelganger](https://github.com/paranoidninja/O365-Doppelganger) - A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user
- [LimberDuck/nessus-cheat-sheet](https://github.com/LimberDuck/nessus-cheat-sheet) - Nessus Cheat Sheet in HTML, PDF, PNG, ADOC
- [Escher1108/mailqq](https://github.com/Escher1108/mailqq) - 模拟QQ邮箱登录的钓鱼程序,数据实时发送到手机,能运行html 就可跑,告别PHP等环境
- [dwisiswant0/nuclei-templates-dir](https://github.com/dwisiswant0/nuclei-templates-dir) - Nuclei Templates Directory
- [Yavuzlar/VulnLab](https://github.com/Yavuzlar/VulnLab) -
- [P0cL4bs/Nanobrok](https://github.com/P0cL4bs/Nanobrok) - Web Service write in Python for control and protect your android device remotely.
- [opensec-cn/conote-community](https://github.com/opensec-cn/conote-community) - Conote 综合安全测试平台社区版。
- [du33169/typora-theme-essay_cn](https://github.com/du33169/typora-theme-essay_cn) - a theme for Typora(a markdown editor), designed for chinese essay
- [primary-theme/obsidian](https://github.com/primary-theme/obsidian) - Comfy, playful but productive theme for Obsidian. "Primary instantly puts you in a relaxed state that opens the door to creativity and exploration. Wonderfully executed down to the smallest details,"
- [lbc-team/deep_ethereum](https://github.com/lbc-team/deep_ethereum) - 电子书:以太坊技术与实现
- [Pithus/bazaar](https://github.com/Pithus/bazaar) - Android security & privacy analysis for the masses
- [abhijithb200/investigator](https://github.com/abhijithb200/investigator) - An online handy-recon tool
- [nccgroup/Solitude](https://github.com/nccgroup/Solitude) - Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more advanced researcher, Solitude makes the process of evaluating us
- [admin360bug/PHP](https://github.com/admin360bug/PHP) - PHP训练靶场
- [hrqmonteiro/joplin-theme](https://github.com/hrqmonteiro/joplin-theme) - My Joplin theme files, including userchrome.css and userstyles.css, as well as some markdown templates for my notes.
- [andrejilderda/joplin-macos-native-theme](https://github.com/andrejilderda/joplin-macos-native-theme) - Native looking macOS theme for note taking app Joplin
- [pierce403/nweb](https://github.com/pierce403/nweb) - web based nmap scan collection and search
- [shifa123/clickjackingpoc](https://github.com/shifa123/clickjackingpoc) - A Proof of Concept for Clickjacking Attacks
- [andev-software/graphql-ide](https://github.com/andev-software/graphql-ide) - ⚡️ GraphQL IDE - An extensive IDE for exploring GraphQL API's
- [m0chan/BugBounty](https://github.com/m0chan/BugBounty) - RepoToStoreBugBountyInfo
- [Chudry/Xerror](https://github.com/Chudry/Xerror) - fully automated pentesting tool
- [mrtc0/container-security-book](https://github.com/mrtc0/container-security-book) -
- [elrumo/macOS_Big_Sur_icons_replacements](https://github.com/elrumo/macOS_Big_Sur_icons_replacements) - Replacement icons for popular apps in the style of macOS Big Sur
- [EstamelGG/Nessus-EN-2-CN](https://github.com/EstamelGG/Nessus-EN-2-CN) - 将Nessus的英文版报告处理为中文版,能够在网页上预览,并导出为中文版CSV报告。导出的报告格式为“带有BOM的UTF-8编码”,可供测评能手等软件导入。
- [GoogleInside/Typora-Themes](https://github.com/GoogleInside/Typora-Themes) - 全部Typora主题+自定义修改
- [Aneureka/push-to-kindle](https://github.com/Aneureka/push-to-kindle) - 📘 A web-based tool for pushing documents to your lovely kindle.
- [zseano/JS-Scan](https://github.com/zseano/JS-Scan) - a .js scanner, built in php. designed to scrape urls and other info
- [gwen001/bugbountytips](https://github.com/gwen001/bugbountytips) - Webapp to search tips on Twitter through #bugbountytips
- [varchashva/vPrioritizer](https://github.com/varchashva/vPrioritizer) - vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization, for teams to make more informed decision about what (vulnerabi
- [mike-goodwin/owasp-threat-dragon-desktop](https://github.com/mike-goodwin/owasp-threat-dragon-desktop) - An installable desktop variant of OWASP Threat Dragon
- [leonjza/frida-boot](https://github.com/leonjza/frida-boot) - Frida Boot 👢- A binary instrumentation workshop, with Frida, for beginners!
- [ajinabraham/nodejsscan](https://github.com/ajinabraham/nodejsscan) - nodejsscan is a static security code scanner for Node.js applications.
- [yingshang/banruo](https://github.com/yingshang/banruo) -
- [zsxsoft/my-ctf-challenges](https://github.com/zsxsoft/my-ctf-challenges) - My CTF Challenges
- [curtbraz/PhishAPI](https://github.com/curtbraz/PhishAPI) - Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
- [sp4rkw/Reaper](https://github.com/sp4rkw/Reaper) - 一款用于src资产信息收集的工具
- [pythonran/Pcap_tools](https://github.com/pythonran/Pcap_tools) - 网络流量可配置嗅探,流量包解析,漏洞规则扫描
- [weev3/LKWA](https://github.com/weev3/LKWA) - Lesser Known Web Attack Lab
- [wultra/powerauth-docker](https://github.com/wultra/powerauth-docker) - Docker images for PowerAuth 2.0 Software
- [nowsecure/secure-mobile-development](https://github.com/nowsecure/secure-mobile-development) - A Collection of Secure Mobile Development Best Practices
- [josherich/repo-to-pdf](https://github.com/josherich/repo-to-pdf) - repository to pdf
- [varkai/hugo-theme-zozo](https://github.com/varkai/hugo-theme-zozo) - :star2: A simple and beautiful theme for Hugo
- [Area39/Webug4.0-Docker](https://github.com/Area39/Webug4.0-Docker) - Docker版本的Webug4.0
- [theme-nexmoe/hexo-theme-nexmoe](https://github.com/theme-nexmoe/hexo-theme-nexmoe) - 🔥 A special Hexo theme focusing on pictures and images. Images tell stories, and Nexmoe makes them more vivid.
- [Wei-Xia/most-frequent-technology-english-words](https://github.com/Wei-Xia/most-frequent-technology-english-words) - 程序员工作中常见的英语词汇
- [chokcoco/iCSS](https://github.com/chokcoco/iCSS) - 不止于 CSS
- [HackerYunen/Django-XSS-Platform](https://github.com/HackerYunen/Django-XSS-Platform) -
- [UndeadSec/SocialFish](https://github.com/UndeadSec/SocialFish) - Phishing Tool & Information Collector
- [appsecco/using-docker-kubernetes-for-automating-appsec-and-osint-workflows](https://github.com/appsecco/using-docker-kubernetes-for-automating-appsec-and-osint-workflows) - Repository for all the workshop content delivered at nullcon X on 1st of March 2019
- [w-digital-scanner/w12scan](https://github.com/w-digital-scanner/w12scan) - 🚀 A simple asset discovery engine for cybersecurity. (网络资产发现引擎)
- [LiangJunrong/document-library](https://github.com/LiangJunrong/document-library) - jsliang 的文档库. 里面包含了个人撰写的所有前端文章,例如 Vue、React,、ECharts、微信小程序、算法、数据结构等……
- [billryan/hugo-theme-even](https://github.com/billryan/hugo-theme-even) - 🚀 A super concise theme for Hugo https://blog.olowolo.com/example-site/
- [ba0gu0/WebRange](https://github.com/ba0gu0/WebRange) - 一个Web版的docker管理程序,可以用来运行各种docker漏洞环境和CTF环境。
- [smartFlash/pySecurity](https://github.com/smartFlash/pySecurity) - Python tutorials
- [SukkaW/hexo-theme-suka](https://github.com/SukkaW/hexo-theme-suka) - 🎨Modern, powerful and simple theme for Hexo.
- [muzishanshi/tongleer_for_wordpress](https://github.com/muzishanshi/tongleer_for_wordpress) - tongleer_for_wordpress是一个Wordpress版本的WeiboForWordPress微博主题,又名TleWeiboForWordPress。
- [smartping/smartping](https://github.com/smartping/smartping) - 综合性网络质量(PING)检测工具,支持正/反向PING绘图、互PING拓扑绘图与报警、全国PING延迟地图与在线检测工具等功能
- [w-digital-scanner/w11scan](https://github.com/w-digital-scanner/w11scan) - 分布式WEB指纹识别平台 Distributed WEB fingerprint identification platform
- [710leo/ZVulDrill](https://github.com/710leo/ZVulDrill) - Web漏洞演练平台
- [nizarmah/tintedarc](https://github.com/nizarmah/tintedarc) - An XFCE custom arc and tint2 auto-themer, voila you have yourself a nice theme
- [luodaoyi/CloudFlarePartner](https://github.com/luodaoyi/CloudFlarePartner) - CloudFlare partner website with python and flask
- [vinceliuice/Vimix-gtk-themes](https://github.com/vinceliuice/Vimix-gtk-themes) - Vimix is a flat Material Design theme for GTK 3, GTK 2 and Gnome-Shell etc.
- [ProgrammingFonts/ProgrammingFonts](https://github.com/ProgrammingFonts/ProgrammingFonts) - This is a collection of programming fonts, just share this with the programmers. Now there are 108 kinds of fantastic fonts!
- [FunctionClub/V2ray.Fun](https://github.com/FunctionClub/V2ray.Fun) - 正在开发的全新 V2ray.Fun
- [hashview/hashview-old](https://github.com/hashview/hashview-old) - A web front-end for password cracking and analytics
- [houshanren/hangzhou_house_knowledge](https://github.com/houshanren/hangzhou_house_knowledge) - 2017年买房经历总结出来的买房购房知识分享给大家,希望对大家有所帮助。买房不易,且买且珍惜。Sharing the knowledge of buy an own house that according to the experience at hangzhou in 2017 to all the people. It's not easy to buy a own house, so I
- [rmusser01/Infosec_Reference](https://github.com/rmusser01/Infosec_Reference) - An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
- [jbtronics/CrookedStyleSheets](https://github.com/jbtronics/CrookedStyleSheets) - Webpage tracking only using CSS (and no JS)
- [hltj/kotlin-reference-chinese](https://github.com/hltj/kotlin-reference-chinese) - Kotlin 官方文档(参考部分)中文版
- [cheng-kang/wildfire](https://github.com/cheng-kang/wildfire) - 🔥From a little spark may burst a flame.
- [programster/Apaxy](https://github.com/programster/Apaxy) - A simple, customisable theme for your Apache directory listing.
- [ronggang/transmission-web-control](https://github.com/ronggang/transmission-web-control) - 一个 Transmission 浏览器管理界面。Transmission Web Control is a custom web UI.
- [caspartse/QQ-Groups-Spider](https://github.com/caspartse/QQ-Groups-Spider) - QQ Groups Spider(QQ 群爬虫)
- [justdeleteme/justdelete.me](https://github.com/justdeleteme/justdelete.me) - A directory of direct links to delete your account from web services.
- [chaynHQ/diy-online-privacy-starter](https://github.com/chaynHQ/diy-online-privacy-starter) - Chayn's Do It Yourself Online Safety guide helps women keep their online accounts and social profiles secure against harassment, and stalkers. This guide is open source.
- [malaohu/Arukas-API](https://github.com/malaohu/Arukas-API) - Arukas API 自动获取IP和端口,SSR服务器订阅,Arukas 监测启动
- [sunnyyoung/Farbox-NexT](https://github.com/sunnyyoung/Farbox-NexT) - A hexo theme NexT for Farbox.
- [zhangjikai/gitbook-use](https://github.com/zhangjikai/gitbook-use) - 记录GitBook的一些配置及插件信息
- [wentin/cssicon](https://github.com/wentin/cssicon) - icon set made with pure css code, no dependencies, "grab and go" icons
- [Tencent/tmt-workflow](https://github.com/Tencent/tmt-workflow) - A web developer workflow used by WeChat team based on Gulp, with cross-platform supported and solutions prepared.
- [PJtools/pd3](https://github.com/PJtools/pd3) - 基于D3 v4+进行二次封装及扩展。示例来源于日常项目及客户提出的需求,转化成数据可视化。
- [smartdengjie/hbase-manager](https://github.com/smartdengjie/hbase-manager) - 可视化hbase数据库## Classic ASP
- [xiaopan233/AntSword-Cryption-WebShell](https://github.com/xiaopan233/AntSword-Cryption-WebShell) - Some traffic encryption webshell and encoder for AntSword. 蚁剑流量加密马及编码器
- [LandGrey/webshell-detect-bypass](https://github.com/LandGrey/webshell-detect-bypass) - 绕过专业工具检测的Webshell研究文章和免杀的Webshell## Clojure
- [ntestoc3/burp-clj](https://github.com/ntestoc3/burp-clj) - clojure实现burp插件,提供clj脚本加载环境
## CodeQL
- [Hutt0n0/CodeqlFinder](https://github.com/Hutt0n0/CodeqlFinder) - 用go语言实现的批量执行ql脚本的小工具,实现只搜索sink点或者污点利用链寻找
- [webraybtl/CodeQLpy](https://github.com/webraybtl/CodeQLpy) - CodeQLpy是一款基于CodeQL实现的半自动化代码审计工具,目前仅支持java语言。实现从源码反编译,数据库生成,脆弱性发现的全过程,可以辅助代码审计人员快速定位源码可能存在的漏洞。
- [advanced-security/codeql-queries](https://github.com/advanced-security/codeql-queries) - [Deprecated] GitHub's Field Team's CodeQL Custom Queries, Suites, and Configurations. See GitHubSecurityLab/CodeQL-Community-Packs instead
- [ice-doom/CodeQLRule](https://github.com/ice-doom/CodeQLRule) - 个人使用CodeQL编写的一些规则
- [synacktiv/QLinspector](https://github.com/synacktiv/QLinspector) - Finding Java gadget chains with CodeQL
- [safe6Sec/CodeqlNote](https://github.com/safe6Sec/CodeqlNote) - Codeql学习笔记
- [cldrn/codeql-queries](https://github.com/cldrn/codeql-queries) - My CodeQL queries collection
- [pwntester/codeql_grehack_workshop](https://github.com/pwntester/codeql_grehack_workshop) - GreHack 2021 CodeQL for Java workshop
- [SummerSec/LookupInterface](https://github.com/SummerSec/LookupInterface) - CodeQL 寻找 JNDI利用 Lookup接口
- [zbazztian/codeql-debug](https://github.com/zbazztian/codeql-debug) -
- [kanav99/github-java-ctf](https://github.com/kanav99/github-java-ctf) - Winning submission for the GitHub Security Lab CTF 4: CodeQL and Chill - The Java Edition## ColdFusion
- [foundeo/fixinator](https://github.com/foundeo/fixinator) - ColdFusion / CFML Code Security Scanner
## Dart
- [AppFlowy-IO/AppFlowy](https://github.com/AppFlowy-IO/AppFlowy) - Bring projects, wikis, and teams together with AI. AppFlowy is an AI collaborative workspace where you achieve more without losing control of your data. The best open source alternative to Notion.
- [LuckyLi706/flutter_mobile_command_tools](https://github.com/LuckyLi706/flutter_mobile_command_tools) - flutter写的桌面可视化操作android和ios的简单命令
- [daixianceng/cron_dingding](https://github.com/daixianceng/cron_dingding) - 钉钉自动打卡
- [bingoogolapple/bga_issue_blog](https://github.com/bingoogolapple/bga_issue_blog) - Flutter 或 Vue 全家桶(Vue + VueRouter + Vuex + Axios)抓取 GitHub 上的 Issues,结合 GitHub Pages 搭建个人博客站点,支持 GitHub 登录和评论## Dockerfile
- [TunMax/canal](https://github.com/TunMax/canal) - 一个开箱即用的 http / socks5 代理(基于 Cloudflare WARP)/ Setting Up an Out of Box HTTP/SOCKS5 Proxy with Cloudflare WARP in Docker
- [dr0n1/CTF_Docker_Template](https://github.com/dr0n1/CTF_Docker_Template) - CTF docker部署模板
- [akkuman/docker-awvs](https://github.com/akkuman/docker-awvs) - 可便捷配置账号密码apikey的docker-awvs
- [teamssix/twiki](https://github.com/teamssix/twiki) - T Wiki 云安全知识文库,可能是国内首个云安全知识文库?
- [p0dalirius/Awesome-RCE-techniques](https://github.com/p0dalirius/Awesome-RCE-techniques) - Awesome list of step by step techniques to achieve Remote Code Execution on various apps!
- [aress31/docker_burp-enterprise](https://github.com/aress31/docker_burp-enterprise) - Attempt at dockerizing Burp Enterprise v2022.4.
- [n0madic/nmap-vulners-vulscan](https://github.com/n0madic/nmap-vulners-vulscan) - Docker image for advanced vulnerability scanning with Nmap NSE scripts
- [sonnyyu/docker-nmap](https://github.com/sonnyyu/docker-nmap) - Nmap is utility for network discovery and security auditing
- [xiecat/sec-docker](https://github.com/xiecat/sec-docker) - 常用安全工具 docker镜像 自动更新仓库
- [geerlingguy/docker-ubuntu2204-ansible](https://github.com/geerlingguy/docker-ubuntu2204-ansible) - Ubuntu 22.04 LTS (Jammy Jellyfish) Docker container for Ansible playbook and role testing.
- [puzzlepeaches/sneaky_proxy](https://github.com/puzzlepeaches/sneaky_proxy) - Hiding your infrastructure from the boys in blue.
- [RAJANAGORI/Nightingale](https://github.com/RAJANAGORI/Nightingale) - It's a Docker Environment for Pentesting which having all the required tool for VAPT.
- [ericmjl/essays-on-data-science](https://github.com/ericmjl/essays-on-data-science) - In which I put together my thoughts on the practice of data science.
- [Yogehi/Drozer-Docker](https://github.com/Yogehi/Drozer-Docker) -
- [caphosra/CTFDocker](https://github.com/caphosra/CTFDocker) - This is a docker image for Capture The Flag and many useful and famous tools are on this image.
- [jumpserver/Dockerfile](https://github.com/jumpserver/Dockerfile) - JumpServer all in one Dockerfile
- [Cl0udG0d/AWDDocker](https://github.com/Cl0udG0d/AWDDocker) - 标准化AWD靶场Docker
- [eikendev/java-decompiler](https://github.com/eikendev/java-decompiler) - A Docker image with four popular Java decompilers in one place (CFR, Fernflower, Krakatau, and Procyon) :rocket::hammer:
- [phith0n/phpsrc-debug-docker](https://github.com/phith0n/phpsrc-debug-docker) - Debug environment for PHP inside a Docker container. Document waiting to be completed.
- [sherifabdlnaby/elastdocker](https://github.com/sherifabdlnaby/elastdocker) - 🐳 Elastic Stack (ELK) v8+ on Docker with Compose. Pre-configured out of the box to enable Logging, Metrics, APM, Alerting, ML, and SIEM features. Up with a Single Command.
- [qeeqbox/chameleon](https://github.com/qeeqbox/chameleon) - 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET,
- [mablanco/docker-reconftw](https://github.com/mablanco/docker-reconftw) - Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains
- [rosehgal/k8s-In-30Mins](https://github.com/rosehgal/k8s-In-30Mins) - Learn how to set up the Kubernetes cluster in 30 mins and deploy the application inside the cluster.
- [parzel/Damn-Vulnerable-WooCommerce-Plugins](https://github.com/parzel/Damn-Vulnerable-WooCommerce-Plugins) - This is a docker environment ready set up for multiple WooCommerce Plugin vulnerabilities.
- [himazawa/bento](https://github.com/himazawa/bento) - Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.
- [lazychanger/docker-kunlun-mirror](https://github.com/lazychanger/docker-kunlun-mirror) - 昆仑镜docker镜像
- [Swordfish-Security/Pentest-In-Docker](https://github.com/Swordfish-Security/Pentest-In-Docker) - Docker image to exploit RCE, try for pentest methods and test container security solutions (trivy, falco and etc.)
- [evi0s/Openresty-WAF](https://github.com/evi0s/Openresty-WAF) - Openresty with WAF installed
- [mozilla/docker-sbt](https://github.com/mozilla/docker-sbt) - Dockerfile for sbt (Scala build tool)
- [drandin/docker-php-workspace](https://github.com/drandin/docker-php-workspace) - PHP development environment for Docker
- [zjuchenyuan/dockerized_fuzzing](https://github.com/zjuchenyuan/dockerized_fuzzing) - Run fuzzing experiments in Docker
- [heroku/bheu19-attacking-cloud-builds](https://github.com/heroku/bheu19-attacking-cloud-builds) - Slides, Cheatsheet and Resources from our Blackhat EU talk
- [AlexisAhmed/BugBountyToolkit](https://github.com/AlexisAhmed/BugBountyToolkit) - A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.
- [multiarch/crossbuild](https://github.com/multiarch/crossbuild) - :earth_africa: multiarch cross compiling environments
- [madhuakula/hacker-container](https://github.com/madhuakula/hacker-container) - The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Containers, Kubernetes Clusters, and Cloud Native workloads.
- [masahiro331/CVE-2020-9484](https://github.com/masahiro331/CVE-2020-9484) -
- [hexpwn/drozer-docker](https://github.com/hexpwn/drozer-docker) - Drozer (2.4.4) docker container
- [hysnsec/awesome-threat-modelling](https://github.com/hysnsec/awesome-threat-modelling) - A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
- [AvasDream/pentesting-dockerfiles](https://github.com/AvasDream/pentesting-dockerfiles) - Pentesting/Bugbounty Dockerfiles.
- [OWASP/API-Security](https://github.com/OWASP/API-Security) - OWASP API Security Project
- [FingerLeakers/docker-inurlbr](https://github.com/FingerLeakers/docker-inurlbr) - Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found. http://blog.inurl.c
- [Xyphex/docker-mara-framework](https://github.com/Xyphex/docker-mara-framework) - Unofficial Docker image for MARA Framework
- [OWASP/wstg](https://github.com/OWASP/wstg) - The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
- [Eadom/ctf_xinetd](https://github.com/Eadom/ctf_xinetd) - A docker repository for deploying pwnable challenges in CTF
- [ferrarimarco/docker-pxe](https://github.com/ferrarimarco/docker-pxe) - A virtualized implementation of PXE supported by DNSMasq
- [laradock/laradock](https://github.com/laradock/laradock) - Full PHP development environment for Docker.
- [e3net/rapidscan-docker](https://github.com/e3net/rapidscan-docker) - Docker image of rapidscan
- [knqyf263/CVE-2019-6467](https://github.com/knqyf263/CVE-2019-6467) - CVE-2019-6467 (BIND nxdomain-redirect)
- [nVentiveUX/docker-ttrss](https://github.com/nVentiveUX/docker-ttrss) - A multiarch docker image for Tiny Tiny RSS feed reader
- [davevs/dvxte](https://github.com/davevs/dvxte) - Damn Vulnerable eXtensive Training Environment
- [hitian/docker-shadowsocks-with-simple-obfs](https://github.com/hitian/docker-shadowsocks-with-simple-obfs) - shadowsocks-libev with simple-obfs
- [khs1994-docker/lnmp](https://github.com/khs1994-docker/lnmp) - :computer: :whale: :elephant: :dolphin: :penguin: :rocket: Start Docker LNMP(LEMP) In less than 2 minutes Powered by Docker Compose. 让 PHP 开发者快速(一键)搭建基于容器技术(Docker、Kubernetes)的开发、测试、生产(CI/CD by Drone)
- [linuxserver/docker-transmission](https://github.com/linuxserver/docker-transmission) -
- [diameter/rtorrent-rutorrent](https://github.com/diameter/rtorrent-rutorrent) - Docker container with supervisor/rtorrent/nginx/ruTorrent 64/32 bit
- [MyKings/docker-vulnerability-environment](https://github.com/MyKings/docker-vulnerability-environment) - Use the docker to build a vulnerability environment
- [vulhub/Dockertools](https://github.com/vulhub/Dockertools) - Some tools based on docker
- [luodaoyi/kms-server](https://github.com/luodaoyi/kms-server) - a docker image for kms
- [johackim/docker-hacklab](https://github.com/johackim/docker-hacklab) - My personal hacklab, create your own.
- [vulhub/vulhub](https://github.com/vulhub/vulhub) - Pre-Built Vulnerable Environments Based on Docker-Compose
- [mikesplain/openvas-docker](https://github.com/mikesplain/openvas-docker) - A Docker container for Openvas## Emacs Lisp
- [jinzhu/configure](https://github.com/jinzhu/configure) - My dot files for Emacs, Openbox, XMonad, VIM, Golang, Zsh/Bash, tmux, URXVT, ArchLinux, Git, Ruby/Rails, Xbindkey, Vrome...
## Erlang
- [kudelskisecurity/scannerl](https://github.com/kudelskisecurity/scannerl) - The modular distributed fingerprinting engine
## F# #
- [microsoft/rest-api-fuzz-testing](https://github.com/microsoft/rest-api-fuzz-testing) - REST API Fuzz Testing (RAFT): Source code for self-hosted service developed for Azure, including the API, orchestration engine, and default set of security tools (including MSR's RESTler), that enable
- [jmhickman/Fetters](https://github.com/jmhickman/Fetters) - Port of Seatbelt in F### Fluent
- [janeczku/calibre-web](https://github.com/janeczku/calibre-web) - :books: Web app for browsing, reading and downloading eBooks stored in a Calibre database
## FreeMarker
- [API-Security/APISandbox](https://github.com/API-Security/APISandbox) - Pre-Built Vulnerable Multiple API Scenarios Environments Based on Docker-Compose.
## Go
- [t94j0/gophish-notifier](https://github.com/t94j0/gophish-notifier) - Notification webhook for GoPhish
- [kN6jq/fingerScan](https://github.com/kN6jq/fingerScan) - ehole指纹识别重构版,优化多个功能
- [musiclover789/luna](https://github.com/musiclover789/luna) - Luna-抗指纹浏览器|爬虫|防反爬虫框架|浏览器指纹|自动化浏览器|防识别|反识别|爬虫框架|自动化测试框架
- [Night-Master/sdlc](https://github.com/Night-Master/sdlc) - sdlc 是一个基于 Go 语言构建的安全漏洞示范平台,旨在促进 DevSecOps 和安全开发生命周期 (SDLC) 实践。它通过模拟常见漏洞来增强开发人员的安全意识,除了可以用于devsecops以外,还可以用于安全行业从事者学习漏洞知识或者渗透知识,代码审计,提供了一个实践和学习的环境。本项目采用了前后端分离的设计模式,其中后端利用了轻量级框架 Gin,而前端则使用了 Vue 3。
- [adeljck/MS17-010](https://github.com/adeljck/MS17-010) - MS17-010 Exploits With Original NSA Tool(only for windows)
- [gtqbhksl/xcosx](https://github.com/gtqbhksl/xcosx) - XC+OS(操作系统)+X(X卫士)。面向xc操作系统的容器、镜像、文件系统扫描工具。支持扫描敏感信息、软件包漏洞、webshell、弱口令等问题
- [wuxler/ruasec](https://github.com/wuxler/ruasec) - RuaSec 是一个安全扫描工具,用于扫描镜像、代码、制品等中的安全漏洞。
- [YouChenJun/Keydd](https://github.com/YouChenJun/Keydd) - 从流量包匹配敏感信息的工具-可用作bp、浏览器的下游代理。0感知、无卡顿,支持https。
- [berryalen02/PECracker](https://github.com/berryalen02/PECracker) - 针对PE文件的分离的攻防对抗工具,红队、研究者的好帮手。目前支持文件头伪装、证书区段感染。A no-kill confrontation tool for the separation of PE files, a good helper for red teams and researchers. Currently, file header spoofing and certificate s
- [sspsec/Spear](https://github.com/sspsec/Spear) - 基于GO的渗透工具箱框架
- [HackAllSec/hfinger](https://github.com/HackAllSec/hfinger) - 一个用于web框架、CDN和CMS指纹识别的高性能命令行工具。A high-performance command-line tool for web framework, CDN and CMS fingerprinting.
- [hanbufei/isCdn](https://github.com/hanbufei/isCdn) - 检查一个ip是否在cdn范围内
- [bytedance/vArmor](https://github.com/bytedance/vArmor) - vArmor is a cloud native container sandbox system based on AppArmor/BPF/Seccomp. It also includes multiple built-in protection rules that are ready to use out of the box.
- [CodeSecurityTeam/frp](https://github.com/CodeSecurityTeam/frp) - 基于frp-0.58.1魔改二开,随机化socks5账户密码及端口、钉钉上线下线通知、配置文件oss加密读取、域前置防止溯源、源码替换/编译混淆等
- [Ackites/KillWxapkg](https://github.com/Ackites/KillWxapkg) - 自动化反编译微信小程序,小程序安全评估工具,发现小程序安全问题,自动解密,解包,可还原工程目录,支持Hook,小程序修改
- [qwe1433223/EHole_magic_magic](https://github.com/qwe1433223/EHole_magic_magic) - 可以指定状态码和标题以排除不想要的数据,支持从管道符传入参数,根据cms类型来做总结输出
- [trap-bytes/403jump](https://github.com/trap-bytes/403jump) - HTTP 403 bypass tool
- [Mayter/mssql-command-tool](https://github.com/Mayter/mssql-command-tool) - xp_cmdshell与sp_oacreate执行命令回显和clr加载程序集执行相应操作,上传,job等相应操作。
- [fdx-xdf/darkPulse](https://github.com/fdx-xdf/darkPulse) - darkPulse是一个用go编写的shellcode Packer,用于生成各种各样的shellcode loader,免杀火绒,360核晶等国内常见杀软。
- [wgpsec/EndpointSearch](https://github.com/wgpsec/EndpointSearch) - EndpointSearch 是一个探测云服务端点的扫描器。Endpoint Search is a sophisticated reconnaissance utility designed to discreetly identify and enumerate endpoints within cloud services.
- [wgpsec/lc](https://github.com/wgpsec/lc) - LC(List Cloud)是一个多云攻击面资产梳理工具
- [qi4L/qscan](https://github.com/qi4L/qscan) - 轻量化全方位扫描器
- [SleepingBag945/dddd](https://github.com/SleepingBag945/dddd) - dddd是一款使用简单的批量信息收集,供应链漏洞探测工具,旨在优化红队工作流,减少伤肝的机械性操作。支持从Hunter、Fofa批量拉取目标
- [yhy0/Jie](https://github.com/yhy0/Jie) - Jie stands out as a comprehensive security assessment and exploitation tool meticulously crafted for web applications. Its robust suite of features encompasses vulnerability scanning, information gath
- [INotGreen/XiebroC2](https://github.com/INotGreen/XiebroC2) - 渗透测试C2、支持Lua插件扩展、域前置/CDN上线、自定义profile、前置sRDI、文件管理、进程管理、内存加载、截图、反向代理
- [r00tSe7en/URLPath](https://github.com/r00tSe7en/URLPath) - 批量处理url链接,获取多级路径并打印
- [TryGOTry/AutoGeaconC2](https://github.com/TryGOTry/AutoGeaconC2) - AutoGeaconC2: 一键读取Profile自动化生成geacon实现跨平台上线CobaltStrike
- [sspsec/Scan-Spring-GO](https://github.com/sspsec/Scan-Spring-GO) - 针对SpringBoot的渗透工具,Spring漏洞利用工具
- [p1d3er/RemoteWebScreen](https://github.com/p1d3er/RemoteWebScreen) - 本项目是一个远程控制应用,使用 Golang 开发,允许用户通过 Web 界面远程控制和屏幕监控其他计算机。主要功能包括屏幕共享、鼠标和键盘控制以及键盘记录。
- [Pizz33/Qianji](https://github.com/Pizz33/Qianji) - 千机-红队免杀木马自动生成器 Bypass defender、火绒、360等国内主流杀软 随机加密混淆shellcode快速生成免杀马
- [youki992/VscanPlus](https://github.com/youki992/VscanPlus) - [VscanPlus内外网漏洞扫描工具]已更新HW热门漏洞检测POC。基于veo师傅的漏扫工具vscan二次开发的版本,端口扫描、指纹检测、目录fuzz、漏洞扫描功能工具,批量快速检测网站安全隐患。An open-source, cross-platform website vulnerability scanning tool that helps you quickly detect web
- [Ernket/ARL-Finger-ADD-Go](https://github.com/Ernket/ARL-Finger-ADD-Go) - ARL(灯塔)批量添加指纹
- [corunb/Split_tools](https://github.com/corunb/Split_tools) - 分割小工具,可分割木马,一键生成写入、合并、追加命令
- [wjlin0/CVE-2024-23897](https://github.com/wjlin0/CVE-2024-23897) - CVE-2024-23897 - Jenkins 任意文件读取 利用工具
- [ASkyeye/CVE-2023-21839](https://github.com/ASkyeye/CVE-2023-21839) - Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)
- [Valerian7/dns_capture](https://github.com/Valerian7/dns_capture) -
- [qi4L/Struts2Scan.go](https://github.com/qi4L/Struts2Scan.go) - 用golang实现的Struts2扫描工具
- [Pwn3rzs/HAK5-C2-License-Toolkit](https://github.com/Pwn3rzs/HAK5-C2-License-Toolkit) - Golang tool to help in forcing a license for HAK5 C2 Tool
- [zan8in/pxplan](https://github.com/zan8in/pxplan) - CVE-2022-2022
- [ad-calcium/CVE-2023-22515](https://github.com/ad-calcium/CVE-2023-22515) - Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具
- [z-bool/Venom-Crawler](https://github.com/z-bool/Venom-Crawler) - 毒液爬行器:专为捡洞而生的爬虫神器
- [ch3nnn/webstack-go](https://github.com/ch3nnn/webstack-go) - 基于Gin框架的网址导航项目,具备完整的前后台。您可以拿来制作自己平日收藏的网址导航。
- [GhostTroops/ksubdomain](https://github.com/GhostTroops/ksubdomain) - 子域名爆破,增加了智能爬虫功能
- [Tp0t-Team/Tp0tOJ](https://github.com/Tp0t-Team/Tp0tOJ) - A CTF online judge platform developed by Tp0t.
- [l3yx/Choccy](https://github.com/l3yx/Choccy) - GitHub项目监控 && CodeQL自动扫描 (GitHub project monitoring && CodeQL automatic analysis)
- [BBD-YZZ/hvv2023check](https://github.com/BBD-YZZ/hvv2023check) - 2023hvv期间部分爆出漏洞的辅助扫描工具
- [X1r0z/ActiveMQ-RCE](https://github.com/X1r0z/ActiveMQ-RCE) - ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具
- [qiwentaidi/Slack](https://github.com/qiwentaidi/Slack) - 安服集成化工具平台,帮助测试人员减少测试脚本多,使用繁琐问题
- [wux1an/wxapkg](https://github.com/wux1an/wxapkg) - 微信小程序反编译工具,.wxapkg 文件扫描 + 解密 + 解包工具
- [ttstormxx/lineadd](https://github.com/ttstormxx/lineadd) - lineadd 渗透测试字典管理工具, 让字典管理生活轻松一点。Penetration test dictionary management tool, make dictionary management life a little easier.
- [Mustard404/AceofHearts](https://github.com/Mustard404/AceofHearts) - 红桃A(AceofHearts)是一款专为渗透测试人员设计的实用工具,旨在简化渗透测试环境的搭建过程并提供便捷的部署解决方案。
- [anchore/harbor-scanner-adapter](https://github.com/anchore/harbor-scanner-adapter) - Harbor Scanner Adapter for Anchore Engine and Enterprise
- [fin3ss3g0d/evilgophish](https://github.com/fin3ss3g0d/evilgophish) - evilginx3 + gophish
- [NHAS/reverse_ssh](https://github.com/NHAS/reverse_ssh) - SSH based reverse shell
- [wjlab/Darksteel](https://github.com/wjlab/Darksteel) - 域内自动化信息搜集利用工具
- [gdy666/lucky](https://github.com/gdy666/lucky) - 软硬路由公网神器,ipv6/ipv4 端口转发,反向代理,DDNS,WOL,ipv4 stun内网穿透,cron,acme,阿里云盘,ftp,webdav,filebrowser
- [ZhuriLab/Yi](https://github.com/ZhuriLab/Yi) - 项目监控工具 以及 Codeql 自动运行
- [redhuntlabs/BucketLoot](https://github.com/redhuntlabs/BucketLoot) - BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for custom keywords as well as Regular Expressions from publicly-exp
- [qi4L/seeyonerExp](https://github.com/qi4L/seeyonerExp) - 致远OA利用工具
- [novysodope/fupo_for_yonyou](https://github.com/novysodope/fupo_for_yonyou) - 用友漏洞检测,持续更新漏洞检测模块
- [lemonlove7/EHole_magic](https://github.com/lemonlove7/EHole_magic) - EHole(棱洞)魔改。可对路径进行指纹识别;支持识别出来的重点资产进行漏洞检测(支持从hunter和fofa中提取资产)支持对ftp服务识别及爆破
- [zhaoyumi/WeaverExploit_All](https://github.com/zhaoyumi/WeaverExploit_All) - 泛微最近的漏洞利用工具(PS:2023)
- [STRRL/cloudflare-tunnel-ingress-controller](https://github.com/STRRL/cloudflare-tunnel-ingress-controller) - 🚀 Expose the website directly into the internet! The Kuberntes Ingress Controller based on Cloudflare Tunnel.
- [adeljck/QAX_VPN_Crack](https://github.com/adeljck/QAX_VPN_Crack) - 奇安信VPN任意用户密码重置
- [chaitin/blazehttp](https://github.com/chaitin/blazehttp) - BlazeHTTP 是一款简单易用的 WAF 防护效果测试工具。BlazeHTTP stands as a user-friendly WAF protection efficacy evaluation tool.
- [chainreactors/gogo](https://github.com/chainreactors/gogo) - 面向红队的, 高度可控可拓展的自动化引擎
- [yhy0/ChYing](https://github.com/yhy0/ChYing) - 承影 - 一款安全工具箱,集成了目录扫描、JWT、Swagger 测试、编/解码、轻量级 BurpSuite、杀软辅助功能
- [whoissecure/yaset](https://github.com/whoissecure/yaset) - Yet Another Subdomain Enumeration Tool, a template based tool to enumerate subdomains passively.
- [piaolin/DetectDee](https://github.com/piaolin/DetectDee) - DetectDee: Hunt down social media accounts by username, email or phone across social networks.
- [kunwu2023/kunwu](https://github.com/kunwu2023/kunwu) - kunwu是新一代webshell检测引擎,使用了内置了模糊规则、污点分析模拟执行、机器学习三种高效的检测策略
- [yusinomy/Rpcon](https://github.com/yusinomy/Rpcon) - 内网横向利用工具,用于ssh wmiexec等常规服务,也可以当作一个数据库执行命令工具
- [Hel10-Web/Databasetools](https://github.com/Hel10-Web/Databasetools) - 一款用Go语言编写的数据库自动化提权工具,支持Mysql、MSSQL、Postgresql、Oracle、Redis数据库提权、命令执行、爆破以及ssh连接
- [praetorian-inc/NTLMRecon](https://github.com/praetorian-inc/NTLMRecon) - A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.
- [praetorian-inc/fingerprintx](https://github.com/praetorian-inc/fingerprintx) - Standalone utility for service discovery on open ports!
- [1dayluo/subnya](https://github.com/1dayluo/subnya) - 基于go语言和subfinder实现的用配置文件自定义配置,并以数据库方式跟踪记录子域名的新增减少| A new subdomain monitor tool!
- [minio/simdjson-go](https://github.com/minio/simdjson-go) - Golang port of simdjson: parsing gigabytes of JSON per second
- [ConnectAI-E/feishu-openai](https://github.com/ConnectAI-E/feishu-openai) - 🎒 飞书 ×(GPT-4 + GPT-4V + DALL·E-3 + Whisper)= 飞一般的工作体验 🚀 语音对话、角色扮演、多话题讨论、图片创作、表格分析、文档导出 🚀
- [sari3l/notify](https://github.com/sari3l/notify) - 各端、平台快速消息通知程序,支持配置文件形式或API调用
- [adminlove520/Poc-Monitor_v1.0.1](https://github.com/adminlove520/Poc-Monitor_v1.0.1) - 威胁情报-漏洞存储库
- [kost/dnstun](https://github.com/kost/dnstun) - DNS tunnel library in Go
- [kost/chashell](https://github.com/kost/chashell) - Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
- [zan8in/pyxis](https://github.com/zan8in/pyxis) - pyxis can automatically identify http and https requests, and get response headers, status codes, response size, response time, tools for fingerprinting (favicon has, service, CMS, framework, etc.)
- [xiao-zhu-zhu/noterce](https://github.com/xiao-zhu-zhu/noterce) - 一种另辟蹊径的免杀执行系统命令的木马
- [Ggasdfg321/SmallProxyPool](https://github.com/Ggasdfg321/SmallProxyPool) - 一个免费高质量的小代理池,解决一些站点有WAF的情况下,进行目录扫描或者字典爆破
- [chushuai/wscan](https://github.com/chushuai/wscan) - Wscan is a web security scanner that focuses on web security, dedicated to making web security accessible to everyone.
- [AbelChe/evil_minio](https://github.com/AbelChe/evil_minio) - EXP for CVE-2023-28434 MinIO unauthorized to RCE
- [Kento-Sec/chatGPT-CodeReview](https://github.com/Kento-Sec/chatGPT-CodeReview) - 这是一个调用chatGPT进行代码审计的工具
- [Mob2003/rakshasa](https://github.com/Mob2003/rakshasa) - 基于go编写的跨平台、稳定、隐秘的多级代理内网穿透工具
- [zema1/watchvuln](https://github.com/zema1/watchvuln) - 一个高价值漏洞采集与推送服务 | collect valueable vulnerability and push it
- [nirsarkar/vscan](https://github.com/nirsarkar/vscan) -
- [ifacker/cscan-go](https://github.com/ifacker/cscan-go) - cscan-go 版本,主要用于C段扫描,信息收集、红队横向渗透等...(相信我,点进来不会后悔的!)
- [mmM1ku/Mscan](https://github.com/mmM1ku/Mscan) - Mscan是一款基于go语言开发的内网资产探测工具。
- [jhaddix/awsScrape](https://github.com/jhaddix/awsScrape) - A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.
- [vitorfhc/queryxss](https://github.com/vitorfhc/queryxss) - Tool for testing reflections in the HTTP responses
- [corunb/Dirscan](https://github.com/corunb/Dirscan) - Dirscan是一款由go编写的高性能、高并发的目录扫描器,现在已经支持GET、HEAD、递归扫描、代理、爬虫等功能功能,后续努力实现更多功能。
- [taythebot/archer](https://github.com/taythebot/archer) - Distributed network and vulnerability scanner
- [qi4L/GlangYsoserial](https://github.com/qi4L/GlangYsoserial) - A Go library for generating Java deserialization payloads.
- [godzeo/go-gin-vul](https://github.com/godzeo/go-gin-vul) - GO语言漏洞靶场 GIN框架 支持docker一键启动
- [xiaoyaochen/yscan](https://github.com/xiaoyaochen/yscan) - yscan是一款基于go写的端口扫描工具,集masscan+nmap+wappalyzer+证书于一体
- [rustgopy/RGPScan](https://github.com/rustgopy/RGPScan) - 红队渗透测试、内网资产探测、通用漏洞扫描、弱口令爆破
- [XinRoom/go-portScan](https://github.com/XinRoom/go-portScan) - High-performance port scanner. 高性能端口扫描器. syn scanner
- [vitorfhc/hacks](https://github.com/vitorfhc/hacks) - Collection of scripts that I use while bug hunting
- [SeeFlowerX/estrace](https://github.com/SeeFlowerX/estrace) - 基于eBPF的syscall追踪工具,适用于安卓平台
- [kost/tty2web](https://github.com/kost/tty2web) - Share your terminal as a web application in bind/reverse mode
- [zt2/uncover-turbo](https://github.com/zt2/uncover-turbo) - 一个简单的测绘引擎巴别塔
- [SpenserCai/GoWxDump](https://github.com/SpenserCai/GoWxDump) - SharpWxDump的Go语言版。微信客户端取证,获取信息(微信号、手机号、昵称),微信聊天记录分析(Top N聊天的人、统计聊天最频繁的好友排行、关键词列表搜索等)
- [HZzz2/go-shellcode-loader](https://github.com/HZzz2/go-shellcode-loader) - GO免杀shellcode加载器混淆AES加密
- [Aur0ra-m/APIKiller](https://github.com/Aur0ra-m/APIKiller) - API Security DAST & Oprations
- [WAY29/pocV](https://github.com/WAY29/pocV) - Compatible with xray and nuclei poc framework
- [djun/wechatbot](https://github.com/djun/wechatbot) - 为个人微信接入ChatGPT
- [ExpLangcn/EPScan](https://github.com/ExpLangcn/EPScan) - 被动收集资产并自动进行SQL注入检测(插件化 自动Bypass)、XSS检测、RCE检测、敏感信息检测
- [pingc0y/go_proxy_pool](https://github.com/pingc0y/go_proxy_pool) - 无环境依赖开箱即用的代理IP池
- [dhn/udon](https://github.com/dhn/udon) - A simple tool that helps to find assets/domains based on the Google Analytics ID.
- [musana/mx-takeover](https://github.com/musana/mx-takeover) - mx-takeover focuses DNS MX records and detects misconfigured MX records.
- [google/kctf](https://github.com/google/kctf) - kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see
- [TD0U/WeaverScan](https://github.com/TD0U/WeaverScan) - 泛微oa漏洞利用工具
- [optiv/Ivy](https://github.com/optiv/Ivy) - Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environment t
- [trickest/mkpath](https://github.com/trickest/mkpath) - Make URL path combinations using a wordlist
- [Goqi/Ni](https://github.com/Goqi/Ni) - Ni-nuclei二开
- [niudaii/crack](https://github.com/niudaii/crack) - 弱口令爆破工具。Weak Password Blaster Tool.
- [musana/fuzzuli](https://github.com/musana/fuzzuli) - fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.
- [sh1yan/Lscan](https://github.com/sh1yan/Lscan) - 一款内网快速打点的辅助性扫描工具,方便红队人员在内网横向移动前期的信息搜集、漏洞探测利用环节的工作开展。其工具特性主要为支持一键化三个档位的便捷式信息与漏洞扫描或每个功能模块单独式扫描探测功能。
- [seventeenman/Forest](https://github.com/seventeenman/Forest) - 基于frp(0.44.0)二次开发,删除不必要功能,加密配置文件,修改流量以及文件特征
- [Goqi/Erfrp](https://github.com/Goqi/Erfrp) - Erfrp-frp二开-免杀与隐藏
- [getanteon/anteon](https://github.com/getanteon/anteon) - Anteon (formerly Ddosify) - Effortless Kubernetes Monitoring and Performance Testing. Available on CLI, Self-Hosted, and Cloud
- [kubesphere/kubeeye](https://github.com/kubesphere/kubeeye) - KubeEye aims to find various problems on Kubernetes, such as application misconfiguration, unhealthy cluster components and node problems.
- [edoardottt/csprecon](https://github.com/edoardottt/csprecon) - Discover new target domains using Content Security Policy
- [wgpsec/CreateHiddenAccount](https://github.com/wgpsec/CreateHiddenAccount) - A tool for creating hidden accounts using the registry || 一个使用注册表创建隐藏帐户的工具
- [hanc00l/pocGoby2Xray](https://github.com/hanc00l/pocGoby2Xray) - 将Goby的json格式Poc转为xray的yaml格式Poc
- [niudaii/zpscan](https://github.com/niudaii/zpscan) - 一个有点好用的信息收集工具。A somewhat useful information gathering tool.
- [ChineseSubFinder/ChineseSubFinder](https://github.com/ChineseSubFinder/ChineseSubFinder) - 自动化中文字幕下载。字幕网站支持 shooter、xunlei、arrst、a4k、SubtitleBest 。支持 Emby、Jellyfin、Plex、Sonarr、Radarr、TMM
- [sea-team/gofound](https://github.com/sea-team/gofound) - GoFound GoLang Full text search go语言全文检索引擎,毫秒级查询。 使用http接口调用,集成Admin管理界面,任何系统都可以使用。
- [Lengso/iplookup](https://github.com/Lengso/iplookup) - IP反查域名
- [HavocFramework/Havoc](https://github.com/HavocFramework/Havoc) - The Havoc Framework.
- [Ptkatz/OrcaC2](https://github.com/Ptkatz/OrcaC2) - OrcaC2是一款基于Websocket加密通信的多功能C&C框架,使用Golang实现。
- [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller) - 一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接
- [ItsIgnacioPortal/hacker-scoper](https://github.com/ItsIgnacioPortal/hacker-scoper) - Automagically filter URLs with Bug Bounty program scope rules scraped from the internet.
- [ffffffff0x/gendict](https://github.com/ffffffff0x/gendict) - 字典生成工具
- [MY0723/goby-poc](https://github.com/MY0723/goby-poc) - 451个goby poc,是否后门及重复自行判断,来源于网络收集的Goby&POC,不定时更新。
- [chenjiandongx/bpfpinger](https://github.com/chenjiandongx/bpfpinger) - 🚥 A high-performance ICMP ping implementation build on top of BPF technology.
- [lzzbb/Adinfo](https://github.com/lzzbb/Adinfo) - 域信息收集工具
- [Ciyfly/microwaveo](https://github.com/Ciyfly/microwaveo) - 将dll exe 等转成shellcode 最后输出exe 可定制加载器模板 支持白文件的捆绑 shellcode 加密
- [Peony2022/shiro_killer](https://github.com/Peony2022/shiro_killer) - 批量ShiroKey检测爆破工具
- [a1phaboy/MenoyGone](https://github.com/a1phaboy/MenoyGone) - Attack cobalt strike server’s FCS by DoW
- [360quake/quake_go](https://github.com/360quake/quake_go) - Quake Command-Line Application With Golang
- [CTF-MissFeng/mysql-check](https://github.com/CTF-MissFeng/mysql-check) - mysql蜜罐检查小工具,输出mysql认证及认证后交互数据
- [c3l3si4n/godeclutter](https://github.com/c3l3si4n/godeclutter) - Declutters URLs in a fast and flexible way, for improving input for web hacking automations such as crawlers and vulnerability scans.
- [TideSec/GoBypassAV](https://github.com/TideSec/GoBypassAV) - 整理了基于Go的16种API免杀测试、8种加密测试、反沙盒测试、编译混淆、加壳、资源修改等免杀技术,并搜集汇总了一些资料和工具。
- [wenxi-3000/YNM3000](https://github.com/wenxi-3000/YNM3000) - 要你命三千,集多种渗透工具于一身的终极武器霸王。
- [LubyRuffy/rproxy](https://github.com/LubyRuffy/rproxy) - 自动化的代理服务器
- [boy-hack/ksubdomain](https://github.com/boy-hack/ksubdomain) - Subdomain enumeration tool, asynchronous dns packets, use pcap to scan 1600,000 subdomains in 1 second
- [trickest/mksub](https://github.com/trickest/mksub) - Generate tens of thousands of subdomain combinations in a matter of seconds
- [pingc0y/URLFinder](https://github.com/pingc0y/URLFinder) - 一款快速、全面、易用的页面信息提取工具,可快速发现和提取页面中的JS、URL和敏感信息。
- [RedTeamPentesting/pretender](https://github.com/RedTeamPentesting/pretender) - Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.
- [redhuntlabs/HTTPLoot](https://github.com/redhuntlabs/HTTPLoot) - An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code of sites.
- [j5s/accelerator](https://github.com/j5s/accelerator) - Use Golang to batch analyze class files for Java security research
- [mstxq17/MoreFind](https://github.com/mstxq17/MoreFind) - 一款用于快速导出URL、Domain和IP的小工具
- [u21h2/nacs](https://github.com/u21h2/nacs) - 事件驱动的渗透测试扫描器 Event-driven pentest scanner
- [safe6Sec/GolangBypassAV](https://github.com/safe6Sec/GolangBypassAV) - 研究利用golang各种姿势bypassAV
- [merlinepedra25/SCA4ALL](https://github.com/merlinepedra25/SCA4ALL) -
- [code-scan/Goal](https://github.com/code-scan/Goal) - Goal Go Red-Team 工具类
- [jmoiron/sqlx](https://github.com/jmoiron/sqlx) - general purpose extensions to golang's database/sql
- [inbug-team/SweetBabyScan](https://github.com/inbug-team/SweetBabyScan) - Red Tools 渗透测试
- [GhostTroops/scan4all](https://github.com/GhostTroops/scan4all) - Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
- [daffainfo/apiguesser](https://github.com/daffainfo/apiguesser) - Go script to guess an API key / OAuth token found during pentest. CLI version of https://github.com/daffainfo/apiguesser-web/
- [0xsha/ChainWalker](https://github.com/0xsha/ChainWalker) - Rapid Smart Contract Crawler
- [shadowabi/AutoDomain](https://github.com/shadowabi/AutoDomain) - 自动提取主域名/IP,并调用fofa、quake、hunter等网络资产测绘系统搜集子域名,可配合指纹扫描工具达到快速资产整理
- [burpheart/cdnlookup](https://github.com/burpheart/cdnlookup) - 一个使用 Edns-Client-Subnet(ECS) 遍历智能CDN节点IP地址的工具
- [779789571/rsasZipToExcel](https://github.com/779789571/rsasZipToExcel) - RSAS绿盟科技漏洞扫描html报告转excel
- [TryGOTry/edit-gencon](https://github.com/TryGOTry/edit-gencon) - geacon:简单适配了一个profile配置文件,可直接拿来修改使用,用于cs上线linux.
- [RicterZ/CVE-2021-3560-Authentication-Agent](https://github.com/RicterZ/CVE-2021-3560-Authentication-Agent) - PolicyKit CVE-2021-3560 Exploit (Authentication Agent)
- [ofasgard/ungoliant](https://github.com/ofasgard/ungoliant) - A web reconnaissance tool that proxies its results through Burp or ZAP.
- [patrickhener/gonh](https://github.com/patrickhener/gonh) - Nessus Parser and query tool written in go
- [wikiZ/RedGuard](https://github.com/wikiZ/RedGuard) - RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.
- [alexbakker/log4shell-tools](https://github.com/alexbakker/log4shell-tools) - Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046
- [kubernetes/minikube](https://github.com/kubernetes/minikube) - Run Kubernetes locally
- [tangxiaofeng7/zsxq_notice](https://github.com/tangxiaofeng7/zsxq_notice) - 知识星球提醒
- [GDATASoftwareAG/vaas](https://github.com/GDATASoftwareAG/vaas) - Verdict-as-a-Service SDKs: Analyze files for malicious content
- [zan8in/afrog](https://github.com/zan8in/afrog) - A Security Tool for Bug Bounty, Pentest and Red Teaming.
- [deatil/lakego-admin](https://github.com/deatil/lakego-admin) - lakego-admin 是使用 gin、JWT 和 RBAC 的前后端分离的 go 后台管理系统。An admin api system with gin, JWT and RBAC.
- [yarox24/EvtxHussar](https://github.com/yarox24/EvtxHussar) - Initial triage of Windows Event logs
- [LubyRuffy/gofofa](https://github.com/LubyRuffy/gofofa) - fofa client in Go
- [Yihsiwei/GoFileBinder](https://github.com/Yihsiwei/GoFileBinder) - golang免杀捆绑器
- [TryGOTry/xray_free_crack](https://github.com/TryGOTry/xray_free_crack) - xray_free_crack,通用xray白嫖高级版.
- [chroblert/jishell](https://github.com/chroblert/jishell) - jishell - A powerful modern CLI and SHELL,with a msfconsole-like style
- [optionalCTF/SSOh-No](https://github.com/optionalCTF/SSOh-No) - User enumeration and password spraying tool for testing Azure AD
- [openclarity/openclarity](https://github.com/openclarity/openclarity) - OpenClarity is an open source tool built to enhance security and observability of cloud native applications and infrastructure
- [1ight-2020/GoRottenTomato](https://github.com/1ight-2020/GoRottenTomato) - Go实现部分Rubeus功能,可执行asktgt, asktgs, s4u, describe ticket, renew ticket, asreproast等
- [cloudflare/ebpf_exporter](https://github.com/cloudflare/ebpf_exporter) - Prometheus exporter for custom eBPF metrics
- [sealerio/sealer](https://github.com/sealerio/sealer) - Build, Share and Run Both Your Kubernetes Cluster and Distributed Applications (Project under CNCF)
- [redcode-labs/GoSH](https://github.com/redcode-labs/GoSH) - Golang reverse/bind shell generator
- [s4hm4d/shodanidb](https://github.com/s4hm4d/shodanidb) - Fetch data (open ports, CVEs, CPEs, ...) from shodan internetDB API
- [alanEG/Gosna](https://github.com/alanEG/Gosna) - Dynamic url monitor
- [cycraft-corp/Prometheus-Decryptor](https://github.com/cycraft-corp/Prometheus-Decryptor) - Prometheus-Decryptor is a project to decrypt files encrypted by Prometheus ransomware.
- [sourque/louis](https://github.com/sourque/louis) - Linux EDR written in Golang and based on eBPF.
- [snehshah22/DNS_poison_attack](https://github.com/snehshah22/DNS_poison_attack) - On-path DNS poisoning attack tool.
- [Ciyfly/woodpecker](https://github.com/Ciyfly/woodpecker) - 兼容xray nuclei yaml格式 以及go代码格式的poc验证扫描器
- [ac0d3r/xssfinder](https://github.com/ac0d3r/xssfinder) - XSS discovery tool
- [xwjdsh/manssh](https://github.com/xwjdsh/manssh) - Manage your ssh alias configs easily.
- [SummerSec/SpringExploit](https://github.com/SummerSec/SpringExploit) - 🚀 一款为了学习go而诞生的漏洞利用工具
- [ExpLangcn/Aopo](https://github.com/ExpLangcn/Aopo) - 内网自动化快速打点工具|资产探测|漏洞扫描|服务扫描|弱口令爆破
- [hakluke/hakoriginfinder](https://github.com/hakluke/hakoriginfinder) - Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!
- [mittwald/kubernetes-replicator](https://github.com/mittwald/kubernetes-replicator) - Kubernetes controller for synchronizing secrets & config maps across namespaces
- [AlphabugX/Alphalog](https://github.com/AlphabugX/Alphalog) - DNSLOG、httplog、rmilog、ldaplog、jndi 等都支持,完全匿名 产品(fuzz.red),Alphalog与传统DNSLog不同,更快、更安全。
- [ipfs/kubo](https://github.com/ipfs/kubo) - An IPFS implementation in Go
- [j3ssie/cdnstrip](https://github.com/j3ssie/cdnstrip) - Striping CDN IPs from a list of IP Addresses
- [ferreiraklet/airixss](https://github.com/ferreiraklet/airixss) - Finding XSS during recon
- [chaosblade-io/chaosblade](https://github.com/chaosblade-io/chaosblade) - An easy to use and powerful chaos engineering experiment toolkit.(阿里巴巴开源的一款简单易用、功能强大的混沌实验注入工具)
- [fuxiaohei/pugo](https://github.com/fuxiaohei/pugo) - a simple site generator
- [hakluke/hakip2host](https://github.com/hakluke/hakip2host) - hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.
- [yuyan-sec/RedisEXP](https://github.com/yuyan-sec/RedisEXP) - Redis 漏洞利用工具
- [lal0ne/vulnerability](https://github.com/lal0ne/vulnerability) - 收集、整理、修改互联网上公开的漏洞POC
- [google/licensecheck](https://github.com/google/licensecheck) - The licensecheck package classifies license files and heuristically determines how well they correspond to known open source licenses.
- [step-security/secure-repo](https://github.com/step-security/secure-repo) - Orchestrate GitHub Actions Security
- [brokercap/Bifrost](https://github.com/brokercap/Bifrost) - Bifrost ---- 面向生产环境的 MySQL,MariaDB,kafka 同步到Redis,MongoDB,ClickHouse,StarRocks,Doris,Kafka等服务的异构中间件
- [learnerLj/geth-analyze](https://github.com/learnerLj/geth-analyze) - go-ethereum source code analyzation under the perspective of smart contract security
- [sjatsh/unwxapkg](https://github.com/sjatsh/unwxapkg) - WeChat applet .wxapkg decoding tool
- [wfinn/redirex](https://github.com/wfinn/redirex) - tool that generates bypasses for open redirects
- [wfinn/ucors](https://github.com/wfinn/ucors) - tool that scans for CORS bypasses
- [AidenPearce369/ADReaper](https://github.com/AidenPearce369/ADReaper) - A fast enumeration tool for Windows Active Directory Pentesting written in Go
- [six2dez/ipcdn](https://github.com/six2dez/ipcdn) - Check which CDN providers an IP list belongs to
- [atsud0/frp-modify](https://github.com/atsud0/frp-modify) - frp0.38.1 支持域前置、远程加载配置文件、配置文件自删除、流量特征修改
- [threatcl/threatcl](https://github.com/threatcl/threatcl) - Documenting your Threat Models with HCL
- [utkusen/wholeaked](https://github.com/utkusen/wholeaked) - a file-sharing tool that allows you to find the responsible person in case of a leakage
- [corazawaf/coraza](https://github.com/corazawaf/coraza) - OWASP Coraza WAF is a golang modsecurity compatible web application firewall library
- [firefart/stunner](https://github.com/firefart/stunner) - Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers.
- [common-fate/granted](https://github.com/common-fate/granted) - The easiest way to access your cloud.
- [timwhitez/gobusterdns](https://github.com/timwhitez/gobusterdns) - lite version of gobuster. Only subdomain brute. 内网轻量化子域名爆破工具
- [brentp/gargs](https://github.com/brentp/gargs) - better(?) xargs in go
- [ZhuriLab/Starmap](https://github.com/ZhuriLab/Starmap) - 一个轮子融合的子域名收集小工具
- [utkusen/socialhunter](https://github.com/utkusen/socialhunter) - crawls the website and finds broken social media links that can be hijacked
- [bonjourmalware/melody](https://github.com/bonjourmalware/melody) - Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulation.
- [ferreiraklet/Jeeves](https://github.com/ferreiraklet/Jeeves) - Jeeves SQLI Finder
- [codeyourweb/fastfinder](https://github.com/codeyourweb/fastfinder) - Incident Response - Fast suspicious file finder
- [deepfence/PacketStreamer](https://github.com/deepfence/PacketStreamer) - :star: :star: Distributed tcpdump for cloud native environments :star: :star:
- [tmoneypenny/conspirator](https://github.com/tmoneypenny/conspirator) - An enhanced collaborator-like standalone server
- [takshal/freq](https://github.com/takshal/freq) - This is go CLI tool for send fast Multiple get HTTP request.
- [MrTuxx/OffensiveGolang](https://github.com/MrTuxx/OffensiveGolang) - A collection of offensive Go packages inspired by different Go repositories.
- [mytechnotalent/turbo-attack](https://github.com/mytechnotalent/turbo-attack) - A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numbers to a particular IP and port.
- [mitchellh/golicense](https://github.com/mitchellh/golicense) - Scan and analyze OSS dependencies and licenses from compiled Go binaries
- [alist-org/alist](https://github.com/alist-org/alist) - 🗂️A file list/WebDAV program that supports multiple storages, powered by Gin and Solidjs. / 一个支持多存储的文件列表/WebDAV程序,使用 Gin 和 Solidjs。
- [damit5/gitdorks_go](https://github.com/damit5/gitdorks_go) - 一款在github上发现敏感信息的自动化收集工具
- [s0md3v/Smap](https://github.com/s0md3v/Smap) - a drop-in replacement for Nmap powered by shodan.io
- [ahhh/Ducky_Maker](https://github.com/ahhh/Ducky_Maker) - A fun script to teach automation and create ducky scripts, from existing scripts or ASCII art files
- [lithammer/fuzzysearch](https://github.com/lithammer/fuzzysearch) - :pig: Tiny and fast fuzzy search in Go
- [murphysecurity/murphysec](https://github.com/murphysecurity/murphysec) - An open source tool focused on software supply chain security. 墨菲安全专注于软件供应链安全,具备专业的软件成分分析(SCA)、漏洞检测、专业漏洞库。
- [pry0cc/tew](https://github.com/pry0cc/tew) - A quick ‘n dirty nmap parser written in Golang to convert nmap xml to IP:Port notation.
- [binodlamsal/zerophish](https://github.com/binodlamsal/zerophish) - Zero phish phishing simulated platform
- [YaoApp/yao](https://github.com/YaoApp/yao) - :rocket: A performance app engine to create web services and applications in minutes.Suitable for AI, IoT, Industrial Internet, Connected Vehicles, DevOps, Energy, Finance and many other use-cases.
- [Azure/AzureDefender-K8S-InClusterDefense](https://github.com/Azure/AzureDefender-K8S-InClusterDefense) -
- [hudangwei/codemillx](https://github.com/hudangwei/codemillx) - codemillx is a tool for CodeQL, extract the comments in the code and generate codeql module. 强化Go开源项目安全检测(内含开源项目漏洞挖掘方法)
- [zombiezen/go-sqlite](https://github.com/zombiezen/go-sqlite) - Low-level Go interface to SQLite 3
- [j3ssie/sdlookup](https://github.com/j3ssie/sdlookup) - IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io
- [wumansgy/goEncrypt](https://github.com/wumansgy/goEncrypt) - go语言封装的各种对称加密和非对称加密,可以直接使用,包括3重DES,AES的CBC和CTR模式,还有RSA非对称加密,ECC椭圆曲线的加密和数字签名
- [chaitin/veinmind-tools](https://github.com/chaitin/veinmind-tools) - veinmind-tools 是由长亭科技自研,基于 veinmind-sdk 打造的容器安全工具集
- [projectdiscovery/uncover](https://github.com/projectdiscovery/uncover) - Quickly discover exposed hosts on the internet using multiple search engines.
- [JustinTimperio/gomap](https://github.com/JustinTimperio/gomap) - A fully self-contained Nmap like parallel port scanning module in pure Golang that supports SYN-ACK (Silent Scans)
- [bytedance/godlp](https://github.com/bytedance/godlp) - sensitive information protection toolkit
- [goreleaser/goreleaser](https://github.com/goreleaser/goreleaser) - Deliver Go binaries as fast and easily as possible
- [tidwall/gjson](https://github.com/tidwall/gjson) - Get JSON values quickly - JSON parser for Go
- [p7e4/dnsearch](https://github.com/p7e4/dnsearch) - using rapid7 open dns data search subdomain and reverse ip
- [lprat/spyre](https://github.com/lprat/spyre) - simple YARA-based IOC scanner (Forked project Spyre)
- [bufsnake/aiqicha](https://github.com/bufsnake/aiqicha) - 基于无头浏览器查询 爱企查 内的企业信息
- [ffffffff0x/ones](https://github.com/ffffffff0x/ones) - 可用于多个网络资产测绘引擎 API 的命令行查询工具
- [wagoodman/dive](https://github.com/wagoodman/dive) - A tool for exploring each layer in a docker image
- [hahwul/authz0](https://github.com/hahwul/authz0) - 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.
- [Kevin-fqh/learning-k8s-source-code](https://github.com/Kevin-fqh/learning-k8s-source-code) - k8s、docker源码分析、读书笔记
- [naiba/nezha](https://github.com/naiba/nezha) - :trollface: Self-hosted, lightweight server and website monitoring and O&M tool
- [chroblert/JSigThief](https://github.com/chroblert/JSigThief) - Golang 版SigThief
- [DataDog/stratus-red-team](https://github.com/DataDog/stratus-red-team) - :cloud: :zap: Granular, Actionable Adversary Emulation for the Cloud
- [trufflesecurity/driftwood](https://github.com/trufflesecurity/driftwood) - Private key usage verification
- [mhmdiaa/second-order](https://github.com/mhmdiaa/second-order) - Second-order subdomain takeover scanner
- [devploit/nomore403](https://github.com/devploit/nomore403) - Tool to bypass 403/40X response codes.
- [Le0nsec/SecCrawler](https://github.com/Le0nsec/SecCrawler) - 一个方便安全研究人员获取每日安全日报的爬虫和推送程序,目前爬取范围包括先知社区、安全客、Seebug Paper、跳跳糖、奇安信攻防社区、棱角社区以及绿盟、腾讯玄武、天融信、360等实验室博客,持续更新中。
- [feiyu563/nbping](https://github.com/feiyu563/nbping) - nbping是为解决局域网大批量IP实例或主机探活,采用go协程并发处理,可以自定义并发的协程数量和输出结果.效率远高于现有的批量ping工具.
- [antonmedv/fx](https://github.com/antonmedv/fx) - Terminal JSON viewer & processor
- [wallarm/gotestwaf](https://github.com/wallarm/gotestwaf) - An open-source project in Golang to asess different API Security tools and WAF for detection logic and bypasses
- [kenjoe41/goSubsWordlist](https://github.com/kenjoe41/goSubsWordlist) - Generate wordlist from already collected subdomains for bruteforcing purposes.
- [aau-network-security/riotpot](https://github.com/aau-network-security/riotpot) - IoT and Operational Technology Honeypot
- [busterb/msmailprobe](https://github.com/busterb/msmailprobe) - Office 365 and Exchange Enumeration
- [timwhitez/Doge-Gabh](https://github.com/timwhitez/Doge-Gabh) - GetProcAddressByHash/remap/full dll unhooking/Tartaru's Gate/Spoofing Gate/universal/Perun's Fart/Spoofing-Gate/EGG/RecycledGate/syswhisper/RefleXXion golang implementation
- [wgpsec/ENScan_GO](https://github.com/wgpsec/ENScan_GO) - 一款基于各大企业信息API的工具,解决在遇到的各种针对国内企业信息收集难题。一键收集控股公司ICP备案、APP、小程序、微信公众号等信息聚合导出。
- [sairson/Yasso](https://github.com/sairson/Yasso) - 强大的内网渗透辅助工具集-让Yasso像风一样 支持rdp,ssh,redis,postgres,mongodb,mssql,mysql,winrm等服务爆破,快速的端口扫描,强大的web指纹识别,各种内置服务的一键利用(包括ssh完全交互式登陆,mssql提权,redis一键利用,mysql数据库查询,winrm横向利用,多种服务利用支持socks5代理执行)
- [bufsnake/blueming](https://github.com/bufsnake/blueming) - 备份文件扫描,并自动进行下载
- [fiatjaf/jiq](https://github.com/fiatjaf/jiq) - jid on jq - interactive JSON query tool using jq expressions
- [phith0n/zkar](https://github.com/phith0n/zkar) - ZKar is a Java serialization protocol analysis tool implement in Go.
- [shmilylty/netspy](https://github.com/shmilylty/netspy) - netspy是一款快速探测内网可达网段工具(深信服深蓝实验室天威战队强力驱动)
- [binganao/golang-shellcode-bypassav](https://github.com/binganao/golang-shellcode-bypassav) - 2021.12.9 使用go语言免杀360、微软、腾讯、火绒
- [google/log4jscanner](https://github.com/google/log4jscanner) - A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.
- [xiecat/fofax](https://github.com/xiecat/fofax) - FOFAX是一个基于fofa.info的API命令行查询工具
- [Hackmanit/Web-Cache-Vulnerability-Scanner](https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner) - Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/).
- [ariary/TrojanSourceFinder](https://github.com/ariary/TrojanSourceFinder) - 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)
- [1ultimat3/tld-scan](https://github.com/1ultimat3/tld-scan) - Top level domain scanner in Go
- [ravro-ir/log4shell-looker](https://github.com/ravro-ir/log4shell-looker) - log4jshell vulnerability scanner for bug bounty
- [N0MoreSecr3ts/wraith](https://github.com/N0MoreSecr3ts/wraith) - Uncover forgotten secrets and bring them back to life, haunting security and operations teams.
- [panjf2000/gnet](https://github.com/panjf2000/gnet) - 🚀 gnet is a high-performance, lightweight, non-blocking, event-driven networking framework written in pure Go.
- [freshcn/qqwry](https://github.com/freshcn/qqwry) - 纯真ip库的golang服务
- [wolfeidau/golang-massl](https://github.com/wolfeidau/golang-massl) - Simple examples of configuring mutual authentication (MASSL)
- [LeakIX/l9fuzz](https://github.com/LeakIX/l9fuzz) - Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload
- [hupe1980/scan4log4shell](https://github.com/hupe1980/scan4log4shell) - Scanner to send specially crafted requests and catch callbacks of systems that are impacted by log4j log4shell vulnerability and to detect vulnerable log4j versions on your local file-system
- [nodauf/GoMapEnum](https://github.com/nodauf/GoMapEnum) - User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin
- [ariary/fileless-xec](https://github.com/ariary/fileless-xec) - Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,...)
- [mmcdole/gofeed](https://github.com/mmcdole/gofeed) - Parse RSS, Atom and JSON feeds in Go
- [palantir/log4j-sniffer](https://github.com/palantir/log4j-sniffer) - A tool that scans archives to check for vulnerable log4j versions
- [0xInfection/LogMePwn](https://github.com/0xInfection/LogMePwn) - A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.
- [proferosec/log4jScanner](https://github.com/proferosec/log4jScanner) - log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services
- [veo/vscan](https://github.com/veo/vscan) - 开源、轻量、快速、跨平台 的网站漏洞扫描工具,帮助您快速检测网站安全隐患。功能 端口扫描(port scan) 指纹识别(fingerprint) 漏洞检测(nday check) 智能爆破 (admin brute) 敏感文件扫描(file fuzz)
- [40a/go-powershell](https://github.com/40a/go-powershell) - Go wrapper for running PowerShell sessions
- [containers/podman](https://github.com/containers/podman) - Podman: A tool for managing OCI containers and pods.
- [A-D-Team/grafanaExp](https://github.com/A-D-Team/grafanaExp) - A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins / extract secret_key / decrypt data_source info automatic.
- [imgproxy/imgproxy](https://github.com/imgproxy/imgproxy) - Fast and secure standalone server for resizing and converting remote images
- [dvyukov/go-fuzz](https://github.com/dvyukov/go-fuzz) - Randomized testing for Go
- [0xInfection/PewSWITCH](https://github.com/0xInfection/PewSWITCH) - A FreeSWITCH specific scanning and exploitation toolkit for CVE-2021-37624 and CVE-2021-41157.
- [CTF-MissFeng/jsForward](https://github.com/CTF-MissFeng/jsForward) - 解决web及移动端H5数据加密Burp调试问题
- [jas502n/Grafana-CVE-2021-43798](https://github.com/jas502n/Grafana-CVE-2021-43798) - Grafana Unauthorized arbitrary file reading vulnerability
- [shirdonl/goWebActualCombat](https://github.com/shirdonl/goWebActualCombat) - 🔥🔥🔥🔥🔥🔥重磅!《Go Web编程实战派从入门到精通》随书源码开源啦,Go语言/Web开发/高并发/微服务/Gin/Redis/MongoDB/并发编程/Docker源码!欢迎star~
- [krishpranav/webinfo](https://github.com/krishpranav/webinfo) - A web information gathering tool made in go - DNS / Subdomains / Ports / Directories enumeration
- [lord3ver/gctsubdomains](https://github.com/lord3ver/gctsubdomains) - Discover subdomains in Certificate Transparency logs using Google's Transparency Report
- [byt3hx/gup](https://github.com/byt3hx/gup) - gup aka Get All Urls parameters to create wordlists for brute forcing parameters.
- [lanyi1998/DNSlog-GO](https://github.com/lanyi1998/DNSlog-GO) - DNSLog-GO 是一款golang编写的监控 DNS 解析记录的工具,自带WEB界面 / DNSLog-GO is a monitoring tool written in Golang that monitors DNS resolution records. It comes with a web interface.
- [redtoolskobe/scaninfo](https://github.com/redtoolskobe/scaninfo) - fast scan for redtools
- [tomatome/grdp](https://github.com/tomatome/grdp) - pure golang rdp protocol
- [code-scan/AutoSubtitles](https://github.com/code-scan/AutoSubtitles) -
- [zyylhn/zscan](https://github.com/zyylhn/zscan) - Zscan a scan blasting tool set
- [zema1/yarx](https://github.com/zema1/yarx) - An awesome reverse engine for xray poc. | 一个自动化根据 xray poc 生成对应靶站的工具
- [NyDubh3/CuiRi](https://github.com/NyDubh3/CuiRi) - 一款红队专用免杀木马生成器,基于shellcode生成绕过所有杀软的木马。
- [akkuman/toolset](https://github.com/akkuman/toolset) - 免杀小小工具集
- [yqcs/ZheTian](https://github.com/yqcs/ZheTian) - ::ZheTian / 强大的免杀生成工具,Bypass All.
- [NetSPI/goddi](https://github.com/NetSPI/goddi) - goddi (go dump domain info) dumps Active Directory domain information
- [botherder/androidqf](https://github.com/botherder/androidqf) - androidqf (Android Quick Forensics) helps quickly gathering forensic evidence from Android devices, in order to identify potential traces of compromise.
- [tanc7/EXOCET-AV-Evasion](https://github.com/tanc7/EXOCET-AV-Evasion) - EXOCET - AV-evading, undetectable, payload delivery tool
- [box/kube-applier](https://github.com/box/kube-applier) - kube-applier enables automated deployment and declarative configuration for your Kubernetes cluster.
- [lal0ne/monitor](https://github.com/lal0ne/monitor) - 监控网站目录下的文件变更,通过钉钉机器人发送告警。
- [HopopOps/k8s-ldap-auth](https://github.com/HopopOps/k8s-ldap-auth) - Kubernetes webhook token authentication plugin implementation using ldap.
- [mutagen-io/mutagen](https://github.com/mutagen-io/mutagen) - Fast file synchronization and network forwarding for remote development
- [p4gefau1t/trojan-go](https://github.com/p4gefau1t/trojan-go) - Go实现的Trojan代理,支持多路复用/路由功能/CDN中转/Shadowsocks混淆插件,多平台,无依赖。A Trojan proxy written in Go. An unidentifiable mechanism that helps you bypass GFW. https://p4gefau1t.github.io/trojan-go/
- [XiaoMi/soar](https://github.com/XiaoMi/soar) - SQL Optimizer And Rewriter
- [mainfunx/frpc_android](https://github.com/mainfunx/frpc_android) - frpc_android 最新版本0.39.1
- [lqqyt2423/go-mitmproxy](https://github.com/lqqyt2423/go-mitmproxy) - mitmproxy implemented with golang. 用 Golang 实现的中间人攻击(Man-in-the-middle),解析、监测、篡改 HTTP/HTTPS 流量。
- [Maka8ka/NGLite](https://github.com/Maka8ka/NGLite) - A major platform RAT Tool based by Blockchain/P2P.Now support Windows/Linux/MacOS
- [lwch/natpass](https://github.com/lwch/natpass) - 🔥居家办公,远程开发神器
- [akkuman/gSigFlip](https://github.com/akkuman/gSigFlip) - A SigFlip implement in golang
- [IngoKl/HTTPUploadExfil](https://github.com/IngoKl/HTTPUploadExfil) - A simple HTTP server for delivering and exfiltrating files/data during, for example, CTFs.
- [looCiprian/GC2-sheet](https://github.com/looCiprian/GC2-sheet) - GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Mi
- [Rvn0xsy/zipcreater](https://github.com/Rvn0xsy/zipcreater) - ZipCreater主要应用于跨目录的文件上传漏洞的利用,它能够快速进行压缩包生成。
- [Metarget/cloud-native-security-book](https://github.com/Metarget/cloud-native-security-book) - 《云原生安全:攻防实践与体系构建》资料仓库
- [vyrus001/go-mimikatz](https://github.com/vyrus001/go-mimikatz) - A wrapper around a pre-compiled version of the Mimikatz executable for the purpose of anti-virus evasion.
- [cckuailong/hostscan](https://github.com/cckuailong/hostscan) - 自动化Host碰撞工具,帮助红队快速扩展网络边界,获取更多目标点
- [R4yGM/dorkscout](https://github.com/R4yGM/dorkscout) - DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets
- [Tylous/ZipExec](https://github.com/Tylous/ZipExec) - A unique technique to execute binaries from a password protected zip
- [akkuman/rotateproxy](https://github.com/akkuman/rotateproxy) - 利用fofa搜索socks5开放代理进行代理池轮切的工具
- [SkewwG/henggeFish](https://github.com/SkewwG/henggeFish) - 自动化批量发送钓鱼邮件(横戈安全团队出品)
- [super-l/codelines](https://github.com/super-l/codelines) - 一款基于GO语言,支持跨平台,可以统计项目代码行数的软件(命令行软件,无界面),支持多种自定义过滤。 主要用于代码安全审计服务相关的费用评估。
- [FourCoreLabs/EDRHunt](https://github.com/FourCoreLabs/EDRHunt) - Scan installed EDRs and AVs on Windows
- [openrdap/rdap](https://github.com/openrdap/rdap) - RDAP command line client
- [Shu1L/avbypass](https://github.com/Shu1L/avbypass) - 简单go加载器实现免杀360 火绒
- [glebarez/cero](https://github.com/glebarez/cero) - Scrape domain names from SSL certificates of arbitrary hosts
- [knes1/elktail](https://github.com/knes1/elktail) - Command line utility to query, search and tail EL (elasticsearch, logstash) logs
- [mhmdiaa/chronos](https://github.com/mhmdiaa/chronos) - Wayback Machine OSINT Framework
- [un4gi/fave](https://github.com/un4gi/fave) - Search for vulnerabilities and exposures while filtering based on age, keywords, and other parameters.
- [kirides/screencapture](https://github.com/kirides/screencapture) - This repository has been moved to https://github.com/kirides/go-d3d
- [fuzz7j/cDogScan](https://github.com/fuzz7j/cDogScan) - 多服务口令爆破、内网常见服务未授权访问探测,端口扫描
- [ariary/QueenSono](https://github.com/ariary/QueenSono) - Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)
- [sh4hin/GoPurple](https://github.com/sh4hin/GoPurple) - Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions
- [raverrr/plution](https://github.com/raverrr/plution) - Prototype pollution scanner using headless chrome
- [Rvn0xsy/red-tldr](https://github.com/Rvn0xsy/red-tldr) - red-tldr is a lightweight text search tool, which is used to help red team staff quickly find the commands and key points they want to execute, so it is more suitable for use by red team personnel wit
- [akkuman/EvilEye](https://github.com/akkuman/EvilEye) - A BeaconEye implement in Golang. It is used to detect the cobaltstrike beacon from memory and extract some configuration.
- [galli-leo/emmutaler](https://github.com/galli-leo/emmutaler) - A set of tools for fuzzing SecureROM. Managed to find and trigger checkm8.
- [lucaslorentz/caddy-docker-proxy](https://github.com/lucaslorentz/caddy-docker-proxy) - Caddy as a reverse proxy for Docker
- [yunginnanet/prox5](https://github.com/yunginnanet/prox5) - 🧮 SOCKS5/4/4a 🌾 validating proxy pool and upstream SOCKS5 server for 🤽 LOLXDsoRANDum connections 🎋
- [BishopFox/dufflebag](https://github.com/BishopFox/dufflebag) - Search exposed EBS volumes for secrets
- [drosseau/degob](https://github.com/drosseau/degob) - Go library/tool for viewing and reversing Go gob data [Moved to GitLab]
- [0xERR0R/blocky](https://github.com/0xERR0R/blocky) - Fast and lightweight DNS proxy as ad-blocker for local network with many features
- [xjasonlyu/tun2socks](https://github.com/xjasonlyu/tun2socks) - tun2socks - powered by gVisor TCP/IP stack
- [o8oo8o/WebSSH](https://github.com/o8oo8o/WebSSH) - 功能强大,Go 实现的一个WebSSH,支持文件上传下载
- [xiecat/goblin](https://github.com/xiecat/goblin) - 一款适用于红蓝对抗中的仿真钓鱼系统
- [CasperGN/GoHead](https://github.com/CasperGN/GoHead) - Get interesting http headers, internal IPs, possible endpoints from target(s) and search JS files for juicy info
- [harleo/knockknock](https://github.com/harleo/knockknock) - A simple reverse whois lookup tool which returns a list of domains owned by people or companies
- [MPaandeey/dlevel](https://github.com/MPaandeey/dlevel) - A tool get level of subdomain from 1....n
- [i5nipe/nipejs](https://github.com/i5nipe/nipejs) - Simplify your life with leak detection in JavaScript. NipeJS streamlines the use of regex, making it effortless to uncover potential leaks.
- [un4gi/dirtywords](https://github.com/un4gi/dirtywords) - A targeted word list generation tool
- [FleexSecurity/fleex](https://github.com/FleexSecurity/fleex) - Fleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.
- [0xTeles/jsleak](https://github.com/0xTeles/jsleak) - a Go code to detect leaks in JS files via regex patterns
- [cryonayes/GoFilter](https://github.com/cryonayes/GoFilter) - A tool to filter URLs by parameter count or size
- [thelikes/fuzznav](https://github.com/thelikes/fuzznav) - parse ffuf & map endpoints to wordlists
- [dqcostin/fxr](https://github.com/dqcostin/fxr) - 使用fscan联动Xray
- [slimtoolkit/slim](https://github.com/slimtoolkit/slim) - Slim(toolkit): Don't change anything in your container image and minify it by up to 30x (and for compiled languages even more) making it secure too! (free and open source)
- [haojie06/selfhelp-iptables](https://github.com/haojie06/selfhelp-iptables) - 通过http api自助添加iptables白名单与黑名单的工具,防止nmap等程序的端口扫描和恶意主动探测,防止ssh、mysql等敏感服务受到攻击,并能对探测进行记录。
- [darkb1rd/DarkGld](https://github.com/darkb1rd/DarkGld) - A tool for quickly generating fishing Trojan horse.
- [ethicalhackingplayground/tprox](https://github.com/ethicalhackingplayground/tprox) - TProx is a fast reverse proxy path traversal detector and directory bruteforcer.
- [jakubd/apkreport](https://github.com/jakubd/apkreport) - Generate CSV Reports of MobSF Results
- [pwnesia/dnstake](https://github.com/pwnesia/dnstake) - DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover
- [neex/http2smugl](https://github.com/neex/http2smugl) -
- [wrfly/gus-proxy](https://github.com/wrfly/gus-proxy) - "打一枪换一个地方" 一个HTTP代理
- [ossf/allstar](https://github.com/ossf/allstar) - GitHub App to set and enforce security policies
- [mosajjal/dnsmonster](https://github.com/mosajjal/dnsmonster) - Passive DNS Capture and Monitoring Toolkit
- [j3ssie/goverview](https://github.com/j3ssie/goverview) - goverview - Get an overview of the list of URLs
- [alexzorin/cve-2021-34558](https://github.com/alexzorin/cve-2021-34558) -
- [zhzyker/dismap](https://github.com/zhzyker/dismap) - Asset discovery and identification tools 快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点
- [JKme/cube](https://github.com/JKme/cube) - 内网渗透测试工具,弱密码爆破、信息收集和漏洞扫描
- [0voice/Introduction-to-Golang](https://github.com/0voice/Introduction-to-Golang) - 【未来服务器端编程语言】最全空降golang资料补给包(满血战斗),包含文章,书籍,作者论文,理论分析,开源框架,云原生,大佬视频,大厂实战分享ppt
- [marv2097/siprocket](https://github.com/marv2097/siprocket) - Fast SIP and SDP Parser
- [desertbit/grumble](https://github.com/desertbit/grumble) - A powerful modern CLI and SHELL
- [praetorian-inc/gokart](https://github.com/praetorian-inc/gokart) - A static analysis tool for securing Go code
- [Tylous/SourcePoint](https://github.com/Tylous/SourcePoint) - SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.
- [timwhitez/doge-getsys](https://github.com/timwhitez/doge-getsys) - An easy way to getsystem by golang.
- [binwiederhier/replbot](https://github.com/binwiederhier/replbot) - Slack/Discord bot for running interactive REPLs and shells from a chat.
- [sanity-io/litter](https://github.com/sanity-io/litter) - Litter is a pretty printer library for Go data structures to aid in debugging and testing.
- [h0x0er/andromanifest](https://github.com/h0x0er/andromanifest) - AndroidManifest.xml parser written in go
- [krishpranav/sshpot](https://github.com/krishpranav/sshpot) - A simple ssh honey pot, fake ssh server that lets anyone to connect and monitor their activty
- [ContainerSSH/ContainerSSH](https://github.com/ContainerSSH/ContainerSSH) - ContainerSSH: Launch containers on demand
- [goodwithtech/dockle](https://github.com/goodwithtech/dockle) - Container Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start
- [saferwall/saferwall](https://github.com/saferwall/saferwall) - :cloud: Collaborative Malware Analysis Platform at Scale
- [kube-tarian/tarian](https://github.com/kube-tarian/tarian) - Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runtime processes monitoring, automated actions based on configure-a
- [perlogix/cmon](https://github.com/perlogix/cmon) - NIST Information Security Continuous Monitoring (ISCM) and configuration baseline data collector
- [VerSprite/alpnpass](https://github.com/VerSprite/alpnpass) - This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffic again and send it to the target of your choice. Unlike most S
- [antihax/gambit](https://github.com/antihax/gambit) - GaMBiT Honeypot
- [octarinesec/kube-scan](https://github.com/octarinesec/kube-scan) - kube-scan: Octarine k8s cluster risk assessment tool
- [endorama/devid](https://github.com/endorama/devid) - Securely manage your developer personas
- [aveyuan/icpquery](https://github.com/aveyuan/icpquery) - ICP备案查询库
- [gofiber/fiber](https://github.com/gofiber/fiber) - ⚡️ Express inspired web framework written in Go
- [iiiusky/webrtc-proxy](https://github.com/iiiusky/webrtc-proxy) - 反向代理+webrtc 神不知鬼不觉的获取真实IP
- [EatonChips/wsh](https://github.com/EatonChips/wsh) - Web shell generator and command line interface.
- [k0kubun/pp](https://github.com/k0kubun/pp) - Colored pretty printer for Go language
- [Rvn0xsy/goDomain](https://github.com/Rvn0xsy/goDomain) - Windows活动目录中的LDAP信息收集工具
- [Ne0nd0g/merlin](https://github.com/Ne0nd0g/merlin) - Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
- [Dc4ts/ChangeTower](https://github.com/Dc4ts/ChangeTower) - ChangeTower is intended to help you watch changes in webpages and get notified of any changes written in Go
- [Ne0nd0g/go-shellcode](https://github.com/Ne0nd0g/go-shellcode) - A repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls or techniques.
- [hueristiq/xurlfind3r](https://github.com/hueristiq/xurlfind3r) - A command-line interface (CLI) based passive URLs discovery utility. It is designed to efficiently identify known URLs of given domains by tapping into a multitude of curated online passive sources.
- [capnspacehook/taskmaster](https://github.com/capnspacehook/taskmaster) - Windows Task Scheduler Library for Go
- [banzaicloud/dast-operator](https://github.com/banzaicloud/dast-operator) - Dynamic Application and API Security Testing
- [jeessy2/ddns-go](https://github.com/jeessy2/ddns-go) - Simple and easy to use DDNS. Support Aliyun, Tencent Cloud, Dnspod, Cloudflare, Callback, Huawei Cloud, Baidu Cloud, Porkbun, GoDaddy, Namecheap, NameSilo...
- [haochen233/socks5](https://github.com/haochen233/socks5) - A Go library about socks5, supports all socks5 commands. That Provides server and client and easy to use. Compatible with socks4 and socks4a.
- [koho/frpmgr](https://github.com/koho/frpmgr) - Windows 平台的 FRP GUI 客户端 / A user-friendly desktop GUI client for FRP on Windows.
- [daffainfo/Git-Secret](https://github.com/daffainfo/Git-Secret) - Go scripts for finding sensitive data like API key / some keywords in the github repository
- [benmanns/goworker](https://github.com/benmanns/goworker) - goworker is a Go-based background worker that runs 10 to 100,000* times faster than Ruby-based workers.
- [fullstorydev/grpcurl](https://github.com/fullstorydev/grpcurl) - Like cURL, but for gRPC: Command-line tool for interacting with gRPC servers
- [miku/esbulk](https://github.com/miku/esbulk) - Bulk indexing command line tool for elasticsearch.
- [For-ACGN/MS17-010](https://github.com/For-ACGN/MS17-010) - An EternalBlue exploit implementation in pure go
- [cockroachdb/pebble](https://github.com/cockroachdb/pebble) - RocksDB/LevelDB inspired key-value database in Go
- [derekparker/delve](https://github.com/derekparker/delve) - Delve is a debugger for the Go programming language.
- [m-mizutani/octovy](https://github.com/m-mizutani/octovy) - Trivy based vulnerability management service
- [inspiringz/fofa](https://github.com/inspiringz/fofa) - 一款 Go 语言编写的小巧、简洁、快速采集 fofa 数据导出到 Excel 表单的小工具。
- [Li4n0/revsuit](https://github.com/Li4n0/revsuit) - RevSuit is a flexible and powerful reverse connection platform designed for receiving connection from target host in penetration.
- [nicocha30/ligolo-ng](https://github.com/nicocha30/ligolo-ng) - An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
- [fengziHK/bypass_go](https://github.com/fengziHK/bypass_go) - bypass_go cs免杀
- [Lmg66/shellcodeloading](https://github.com/Lmg66/shellcodeloading) - shellcode加载器 golang 分离免杀
- [TryGOTry/go-shellcode-webimg-load](https://github.com/TryGOTry/go-shellcode-webimg-load) - golang shellcode loader 远程图片隐写加载执行 无文件落地
- [projectdiscovery/simplehttpserver](https://github.com/projectdiscovery/simplehttpserver) - Go alternative of python SimpleHTTPServer
- [Josue87/roboxtractor](https://github.com/Josue87/roboxtractor) - Extract endpoints marked as disallow in robots files to generate wordlists.
- [daffainfo/Key-Checker](https://github.com/daffainfo/Key-Checker) - Go scripts for checking API key / access token validity
- [lkarlslund/Adalanche](https://github.com/lkarlslund/Adalanche) - Active Directory ACL Visualizer and Explorer - who's really Domain Admin? (Commerical versions available from NetSection)
- [kleiton0x00/ppmap](https://github.com/kleiton0x00/ppmap) - A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.
- [allyomalley/dnsobserver](https://github.com/allyomalley/dnsobserver) - A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for out-of-band DNS interactions and sends lookup notifications vi
- [Ullaakut/Gorsair](https://github.com/Ullaakut/Gorsair) - Gorsair gives root access on remote docker containers that expose their APIs
- [redcode-labs/neurax](https://github.com/redcode-labs/neurax) - A framework for constructing self-spreading binaries
- [aktsk/ipa-medit](https://github.com/aktsk/ipa-medit) - Memory modification tool for re-signed ipa supports iOS apps running on iPhone and Apple Silicon Mac without jailbreaking.
- [immunIT/TeamsUserEnum](https://github.com/immunIT/TeamsUserEnum) - User enumeration with Microsoft Teams API
- [lesnuages/hershell](https://github.com/lesnuages/hershell) - Multiplatform reverse shell generator
- [txthinking/tun2brook](https://github.com/txthinking/tun2brook) - Proxy all traffic just one line command. tun2socks, tun2brook. IPv4 and IPv6, TCP and UDP.
- [ThreeDotsLabs/watermill](https://github.com/ThreeDotsLabs/watermill) - Building event-driven applications the easy way in Go.
- [google/cel-spec](https://github.com/google/cel-spec) - Common Expression Language -- specification and binary representation
- [Fahrj/reverse-ssh](https://github.com/Fahrj/reverse-ssh) - Statically-linked ssh server with reverse shell functionality for CTFs and such
- [esrrhs/spp](https://github.com/esrrhs/spp) - A simple and powerful proxy
- [daffainfo/bypass-403](https://github.com/daffainfo/bypass-403) - Go script for bypassing 403 forbidden
- [Maka8ka/Faygo](https://github.com/Maka8ka/Faygo) - A major platforms RAT Tools .High scalability.Now support Windows/Linux/MacOS
- [xm1k3/cent](https://github.com/xm1k3/cent) - Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place
- [iammaguire/MeetC2](https://github.com/iammaguire/MeetC2) - Modular C2 framework aiming to ease post exploitation for red teamers.
- [irsl/gcp-dhcp-takeover-code-exec](https://github.com/irsl/gcp-dhcp-takeover-code-exec) - Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent
- [ethicalhackingplayground/erebus](https://github.com/ethicalhackingplayground/erebus) - Erebus is a fast tool for parameter-based vulnerability scanning using a Yaml based template engine like nuclei.
- [grines/scour](https://github.com/grines/scour) -
- [edoardottt/cariddi](https://github.com/edoardottt/cariddi) - Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more
- [wahaha1573/ByPassAVAddUser](https://github.com/wahaha1573/ByPassAVAddUser) -
- [seccome/Ehoney](https://github.com/seccome/Ehoney) - 安全、快捷、高交互、企业级的蜜罐管理系统,护网;支持多种协议蜜罐、蜜签、诱饵等功能。A safe, fast, highly interactive and enterprise level honeypot management system, supports multiple protocol honeypots, honeytokens, baits and other functions
- [KubeOperator/KubeOperator](https://github.com/KubeOperator/KubeOperator) - KubeOperator 是一个开源的轻量级 Kubernetes 发行版,专注于帮助企业规划、部署和运营生产级别的 K8s 集群。
- [spf13/viper](https://github.com/spf13/viper) - Go configuration with fangs
- [ccfos/nightingale](https://github.com/ccfos/nightingale) - An all-in-one observability solution which aims to combine the advantages of Prometheus and Grafana. It manages alert rules and visualizes metrics, logs, traces in a beautiful web UI.
- [projectdiscovery/hmap](https://github.com/projectdiscovery/hmap) - Hybrid memory/disk map
- [SPuerBRead/mqtts](https://github.com/SPuerBRead/mqtts) - MQTT安全测试工具 (MQTT Security Tools)
- [dumorewithcode/purl](https://github.com/dumorewithcode/purl) -
- [redcode-labs/UnChain](https://github.com/redcode-labs/UnChain) - A tool to find redirection chains in multiple URLs
- [xiaobaiTech/golangFamily](https://github.com/xiaobaiTech/golangFamily) - 【超全golang面试题合集+golang学习指南+golang知识图谱+入门成长路线】 一份涵盖大部分golang程序员所需要掌握的核心知识。常用第三方库(mysql,mq,es,redis等)+机器学习库+算法库+游戏库+开源框架+自然语言处理nlp库+网络库+视频库+微服务框架+视频教程+音频音乐库+图形图片库+物联网库+地理位置信息+嵌入式脚本库+编译器库+数据库+金融库+电子邮件库+电子
- [yumusb/DNSLog-Platform-Golang](https://github.com/yumusb/DNSLog-Platform-Golang) - DNSLOG平台 golang
- [redcode-labs/Coldfire](https://github.com/redcode-labs/Coldfire) - Golang malware development library
- [sigstore/cosign](https://github.com/sigstore/cosign) - Code signing and transparency for containers and binaries
- [zu1k/proxypool](https://github.com/zu1k/proxypool) - Automatically crawls proxy nodes on the public internet, de-duplicates and tests for usability and then provides a list of nodes
- [tenable/terrascan](https://github.com/tenable/terrascan) - Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
- [adamyi/CTFProxy](https://github.com/adamyi/CTFProxy) - Your ultimate infrastructure to run a CTF, with a BeyondCorp-like zero-trust network and simple infrastructure-as-code configuration.
- [eikendev/hackenv](https://github.com/eikendev/hackenv) - Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs, Hack The Box, etc.) :rocket::wrench:
- [togettoyou/ipashare](https://github.com/togettoyou/ipashare) - 🚤 share and install your Apple ipa
- [KCarretto/paragon](https://github.com/KCarretto/paragon) - Red Team engagement platform with the goal of unifying offensive tools behind a simple UI
- [spyse-com/go-spyse](https://github.com/spyse-com/go-spyse) - The official wrapper for spyse.com API, written in Go, aimed to help developers build their integrations with Spyse.
- [Daybr4ak/C2ReverseProxy](https://github.com/Daybr4ak/C2ReverseProxy) - 一款可以在不出网的环境下进行反向代理及cs上线的工具
- [jiaocoll/GoWebBanner](https://github.com/jiaocoll/GoWebBanner) - Go语言web指纹识别
- [niudaii/webscan](https://github.com/niudaii/webscan) - web信息收集工具。Web Information Collection Tool.
- [canc3s/judas](https://github.com/canc3s/judas) - 轻便的恶意反代
- [idiotc4t/Reflective-HackBrowserData](https://github.com/idiotc4t/Reflective-HackBrowserData) - HackBrowserData的反射模块
- [marmotedu/iam](https://github.com/marmotedu/iam) - 企业级的 Go 语言实战项目:认证和授权系统(带配套课程)
- [edoardottt/lit-bb-hack-tools](https://github.com/edoardottt/lit-bb-hack-tools) - Little Bug Bounty & Hacking Tools⚔️
- [kubecost/kubectl-cost](https://github.com/kubecost/kubectl-cost) - CLI for determining the cost of Kubernetes workloads
- [ahmetak4n/radar](https://github.com/ahmetak4n/radar) - Scanner for misconfigured DevSecOps or Security tools on internet like SonarQube, GoPhish etc.
- [TardC/fofadump](https://github.com/TardC/fofadump) - A small utility that calls fofa api to download data.
- [koderover/zadig](https://github.com/koderover/zadig) - Zadig is a cloud native, distributed, developer-oriented DevOps platform
- [golang/vulndb](https://github.com/golang/vulndb) - [mirror] The Go Vulnerability Database
- [Josue87/AnalyticsRelationships](https://github.com/Josue87/AnalyticsRelationships) - Get related domains / subdomains by looking at Google Analytics IDs
- [umputun/reproxy](https://github.com/umputun/reproxy) - Simple edge server / reverse proxy
- [ipinfo/cli](https://github.com/ipinfo/cli) - Official Command Line Interface for the IPinfo API (IP geolocation and other types of IP data)
- [Sakurasan/scf-proxy](https://github.com/Sakurasan/scf-proxy) - 云函数代理服务
- [activecm/rita-legacy](https://github.com/activecm/rita-legacy) - Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
- [work-helper/command-search-alfred](https://github.com/work-helper/command-search-alfred) - alfred命令搜索workflow
- [akavel/rsrc](https://github.com/akavel/rsrc) - Tool for embedding .ico & manifest resources in Go programs for Windows.
- [FunnyWolf/ligolo](https://github.com/FunnyWolf/ligolo) - Ligolo : 用于内网渗透的反向隧道
- [jweny/pocassist](https://github.com/jweny/pocassist) - 傻瓜式漏洞PoC测试框架
- [optiv/Dent](https://github.com/optiv/Dent) - A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.
- [TryGOTry/multiplexing_port_socks5](https://github.com/TryGOTry/multiplexing_port_socks5) - 一款golang写的支持http与socks5的端口复用小工具,并且可以开启socks5代理。
- [superfashi/pwnlib](https://github.com/superfashi/pwnlib) - A Go rewrite of pwntools.
- [yonyoucloud/install_k8s](https://github.com/yonyoucloud/install_k8s) - 一键安装kubernets(k8s)系统,采用RBAC模式运行(证书安全认证模式),既可以单台安装、也可以集群安装,并且完全是生产环境的安装标准。有疑问大家可以加我微信沟通:bsh888
- [projectdiscovery/interactsh](https://github.com/projectdiscovery/interactsh) - An OOB interaction gathering server and client library
- [4dogs-cn/TXPortMap](https://github.com/4dogs-cn/TXPortMap) - Port Scanner & Banner Identify From TianXiang
- [chenjia404/p2ptunnel](https://github.com/chenjia404/p2ptunnel) - A p2p-based tcp, udp intranet penetration tunneling tool
- [vugu/vugu](https://github.com/vugu/vugu) - Vugu: A modern UI library for Go+WebAssembly (experimental)
- [1340691923/ElasticView](https://github.com/1340691923/ElasticView) - 这是一个简单好用的ElasticSearch可视化客户端,支持连接6,7,8版本的ES,不妨一试
- [binyoucai/sec](https://github.com/binyoucai/sec) -
- [redcode-labs/GodSpeed](https://github.com/redcode-labs/GodSpeed) - Fast and intuitive manager for multiple reverse shells
- [0xrawsec/whids](https://github.com/0xrawsec/whids) - Open Source EDR for Windows
- [k3s-io/kine](https://github.com/k3s-io/kine) - Run Kubernetes on MySQL, Postgres, sqlite, dqlite, not etcd.
- [yunxu1/dnsub](https://github.com/yunxu1/dnsub) - dnsub一款好用且强大的子域名扫描工具
- [Matrix86/flowdownloader](https://github.com/Matrix86/flowdownloader) - Simple software to download HLS encrypted files used by FlowPlayer video player
- [charmbracelet/glow](https://github.com/charmbracelet/glow) - Render markdown on the CLI, with pizzazz! 💅🏻
- [inbug-team/InScan](https://github.com/inbug-team/InScan) - 边界打点后的自动化渗透工具
- [assetnote/kiterunner](https://github.com/assetnote/kiterunner) - Contextual Content Discovery Tool
- [Alaa-abdulridha/SerpScan](https://github.com/Alaa-abdulridha/SerpScan) - Serpscan is a powerfull php script designed to allow you to leverage the power of dorking straight from the comfort of your command line.
- [cyberark/kubesploit](https://github.com/cyberark/kubesploit) - Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
- [redcode-labs/SNOWCRASH](https://github.com/redcode-labs/SNOWCRASH) - A polyglot payload generator
- [nyancrimew/goop](https://github.com/nyancrimew/goop) - Yet another tool to dump a git repository from a website, focused on as-complete-as-possible dumps and handling weird edge-cases.
- [glitchedgitz/cook](https://github.com/glitchedgitz/cook) - A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.
- [rootklt/snowball](https://github.com/rootklt/snowball) - fofa+xray vul scan golang
- [d3mondev/puredns](https://github.com/d3mondev/puredns) - Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries.
- [genkiroid/cert](https://github.com/genkiroid/cert) - Cert is the Go tool to get TLS certificate information.
- [kgoins/ldsview](https://github.com/kgoins/ldsview) -
- [Tylous/Limelighter](https://github.com/Tylous/Limelighter) - A tool for generating fake code signing certificates or signing real ones
- [riptl/cve-2021-3449](https://github.com/riptl/cve-2021-3449) - CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻
- [sw33tLie/bbscope](https://github.com/sw33tLie/bbscope) - Scope gathering tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!
- [kgretzky/evilginx2](https://github.com/kgretzky/evilginx2) - Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
- [muraenateam/muraena](https://github.com/muraenateam/muraena) - Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.
- [hakluke/haktrails](https://github.com/hakluke/haktrails) - Golang client for querying SecurityTrails API data
- [evilsocket/stork](https://github.com/evilsocket/stork) - A small utility that aims to automate and simplify some tasks related to software release cycles.
- [LearnGolang/365Golang](https://github.com/LearnGolang/365Golang) - 《365天深入理解Go语言》Deep understanding of Golang.
- [daehee/mildew](https://github.com/daehee/mildew) - Dotmil subdomain discovery tool that scrapes domains from official DoD website directories and certificate transparency logs
- [canc3s/cIPR](https://github.com/canc3s/cIPR) - 将域名转为ip段权重
- [staaldraad/turner](https://github.com/staaldraad/turner) - SOCKS5 and HTTP over TURN/STUN proxy
- [joanbono/gap](https://github.com/joanbono/gap) - Google Maps API checker
- [AdguardTeam/dnsproxy](https://github.com/AdguardTeam/dnsproxy) - Simple DNS proxy with DoH, DoT, DoQ and DNSCrypt support
- [canc3s/cSubsidiary](https://github.com/canc3s/cSubsidiary) - 利用天眼查查询企业子公司
- [flavio/kube-image-bouncer](https://github.com/flavio/kube-image-bouncer) - Simple endpoint for the ImagePolicyWebhook and the GenericAdmissionWebhook Kubernetes admission controllers
- [canc3s/cDomain](https://github.com/canc3s/cDomain) - 利用天眼查查询企业备案
- [EgeBalci/amber](https://github.com/EgeBalci/amber) - Reflective PE packer.
- [ZupIT/horusec](https://github.com/ZupIT/horusec) - Horusec is an open source tool that improves identification of vulnerabilities in your project with just one command.
- [kitabisa/mubeng](https://github.com/kitabisa/mubeng) - An incredibly fast proxy checker & IP rotator with ease.
- [rakyll/hey](https://github.com/rakyll/hey) - HTTP load generator, ApacheBench (ab) replacement
- [1ight-2020/Struts2Scanner](https://github.com/1ight-2020/Struts2Scanner) - 一款Golang编写的Struts2漏洞检测和利用工具,支持并发批量检测
- [M4DM0e/DirDar](https://github.com/M4DM0e/DirDar) - DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it
- [lcvvvv/kscan](https://github.com/lcvvvv/kscan) - Kscan是一款纯go开发的全方位扫描器,具备端口扫描、协议检测、指纹识别,暴力破解等功能。支持协议1200+,协议指纹10000+,应用指纹20000+,暴力破解协议10余种。
- [gustavorobertux/gcs](https://github.com/gustavorobertux/gcs) -
- [Rvn0xsy/Pricking](https://github.com/Rvn0xsy/Pricking) - 基于反向代理的水坑部署工具
- [optiv/CVE-2020-15931](https://github.com/optiv/CVE-2020-15931) - Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability
- [kost/revsocks](https://github.com/kost/revsocks) - Reverse SOCKS5 implementation in Go
- [kuriv/civil-service-exam](https://github.com/kuriv/civil-service-exam) - 公务员考试知识思维导图,我们岸上见!
- [liamg/traitor](https://github.com/liamg/traitor) - :arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
- [deepfence/SecretScanner](https://github.com/deepfence/SecretScanner) - :unlock: :unlock: Find secrets and passwords in container images and file systems :unlock: :unlock:
- [hahwul/backbomb](https://github.com/hahwul/backbomb) - 💣 Dockerized penetration-testing/bugbounty/app-sec testing environment
- [hahwul/gee](https://github.com/hahwul/gee) - 🏵 Gee is tool of stdin to each files and stdout. It is similar to the tee command, but there are more functions for convenience. In addition, it was written as go
- [ryandamour/ssrfuzz](https://github.com/ryandamour/ssrfuzz) - SSRFuzz is a tool to find Server Side Request Forgery vulnerabilities, with CRLF chaining capabilities
- [gustavorobertux/goshock](https://github.com/gustavorobertux/goshock) - SonicWall VPN-SSL Exploit* using Golang ( * and other targets vulnerable to shellshock ).
- [jaswdr/faker](https://github.com/jaswdr/faker) - :rocket: Ultimate fake data generator for Go with zero dependencies
- [mehrdadrad/tcpdog](https://github.com/mehrdadrad/tcpdog) - eBPF based TCP observability.
- [R0X4R/ssrf-tool](https://github.com/R0X4R/ssrf-tool) - An SSRF detector tool written in golang. I have fixed some errors and added some more payloads to it. But the tool credits go to z0idsec.
- [runZeroInc/recog-go](https://github.com/runZeroInc/recog-go) - Recog-Go: Pattern Recognition using Rapid7 Recog
- [seventh-letter/DictGenerate](https://github.com/seventh-letter/DictGenerate) - 使用Go语言编写的社工字典生成器(The social engineering dictionary generator written by Go)
- [evilsocket/uroboros](https://github.com/evilsocket/uroboros) - A GNU/Linux monitoring and profiling tool focused on single processes.
- [cyal1/host_scan](https://github.com/cyal1/host_scan) - 这是一个用于IP和域名碰撞匹配访问的小工具,旨意用来匹配出渗透过程中需要绑定hosts才能访问的弱主机或内部系统。https://github.com/fofapro/Hosts_scan implement in Go
- [optiv/ScareCrow](https://github.com/optiv/ScareCrow) - ScareCrow - Payload creation framework designed around EDR bypass.
- [evilsocket/ditto](https://github.com/evilsocket/ditto) - A tool for IDN homograph attacks and detection.
- [tehmoon/http-fuzzer](https://github.com/tehmoon/http-fuzzer) -
- [n9e/k8s-mon](https://github.com/n9e/k8s-mon) - 滴滴夜莺Kubernetes monitor
- [EdgeSecurityTeam/EHole](https://github.com/EdgeSecurityTeam/EHole) - EHole(棱洞)3.0 重构版-红队重点攻击系统指纹探测工具
- [juicedata/juicefs](https://github.com/juicedata/juicefs) - JuiceFS is a distributed POSIX file system built on top of Redis and S3.
- [doitintl/kubeip](https://github.com/doitintl/kubeip) - Assign static public IPs to Kubernetes nodes (GKE, EKS)
- [thibmaek/go-volumio-mqtt-proxy](https://github.com/thibmaek/go-volumio-mqtt-proxy) -
- [JavierOlmedo/ipdiscover](https://github.com/JavierOlmedo/ipdiscover) - 🔍 A simple tool to obtain long lists of ips from domains using goroutines
- [bytedance/Elkeid](https://github.com/bytedance/Elkeid) - Elkeid is an open source solution that can meet the security requirements of various workloads such as hosts, containers and K8s, and serverless. It is derived from ByteDance's internal best practices
- [hahwul/MobileHackersWeapons](https://github.com/hahwul/MobileHackersWeapons) - Mobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
- [C4o/FBI-Analyzer](https://github.com/C4o/FBI-Analyzer) - A Flexible Log Analysis System Based on Golang and Lua-Plugins. 插件化的准实时日志分析系统。
- [clevercoder91/Subanser](https://github.com/clevercoder91/Subanser) - A simple Golang Script where you provide list of domains you want to check if webserver is running on that port or not . Give it a Try !!
- [moloch--/denim](https://github.com/moloch--/denim) - Automated compiler obfuscation for nim
- [alltom/dirgui](https://github.com/alltom/dirgui) - turn a directory into a GUI, slash example of VNC-based GUI
- [gomodules/notify](https://github.com/gomodules/notify) - Send notification via Email, SMS, Chat etc.
- [0xsapra/fuzzparam](https://github.com/0xsapra/fuzzparam) -
- [Charlie-belmer/nosqli](https://github.com/Charlie-belmer/nosqli) - NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.
- [acme-dns/acme-dns-client](https://github.com/acme-dns/acme-dns-client) - A client software for https://github.com/joohoi/acme-dns
- [goretk/redress](https://github.com/goretk/redress) - Redress - A tool for analyzing stripped Go binaries
- [riza/gigger](https://github.com/riza/gigger) - Git folder digger, I'm sure it's worthwhile stuff.
- [alpkeskin/mosint](https://github.com/alpkeskin/mosint) - An automated e-mail OSINT tool
- [nytr0gen/deduplicate](https://github.com/nytr0gen/deduplicate) - Remove duplicate urls from input
- [edoardottt/scilla](https://github.com/edoardottt/scilla) - Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration
- [m7shapan/querycsv](https://github.com/m7shapan/querycsv) - QueryCSV enables you to load CSV files and manipulate them using SQL queries then after you finish you can export the new values to a CSV file
- [tomnomnom/meg](https://github.com/tomnomnom/meg) - Fetch many paths for many hosts - without killing the hosts
- [michenriksen/Amass](https://github.com/michenriksen/Amass) - In-depth Attack Surface Mapping and Asset Discovery
- [jm33-m0/emp3r0r](https://github.com/jm33-m0/emp3r0r) - Linux/Windows post-exploitation framework made by linux user
- [assetnote/commonspeak2](https://github.com/assetnote/commonspeak2) - Leverages publicly available datasets from Google BigQuery to generate content discovery and subdomain wordlists
- [CTF-MissFeng/GoScan](https://github.com/CTF-MissFeng/GoScan) - GoScan是采用Golang语言编写的一款分布式综合资产管理系统,适合红队、SRC等使用
- [posener/h2conn](https://github.com/posener/h2conn) - HTTP2 client-server full-duplex connection
- [Ridter/p12tool](https://github.com/Ridter/p12tool) - A simple Go script to brute force or parse a password-protected PKCS#12 (PFX/P12) file.
- [ranon-rat/sayBruh](https://github.com/ranon-rat/sayBruh) - its a rebuild of saycheese with golang
- [mlcsec/headi](https://github.com/mlcsec/headi) - Customisable and automated HTTP header injection
- [bp0lr/linkz](https://github.com/bp0lr/linkz) -
- [netxfly/sec-dev-in-action-src](https://github.com/netxfly/sec-dev-in-action-src) - 《白帽子安全开发实战》配套代码
- [pelaohxc/postMessageFinder](https://github.com/pelaohxc/postMessageFinder) -
- [C-Sto/GoGitDumper](https://github.com/C-Sto/GoGitDumper) - Dump exposed HTTP .git fast
- [sudosammy/knary](https://github.com/sudosammy/knary) - A simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams/Lark/Telegram & Pushover support
- [ameenmaali/qsfuzz](https://github.com/ameenmaali/qsfuzz) - qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.
- [hahwul/mzap](https://github.com/hahwul/mzap) - ⚡️ Multiple target ZAP Scanning
- [ezekg/git-hound](https://github.com/ezekg/git-hound) - Git plugin that prevents sensitive data from being committed.
- [root4loot/rescope](https://github.com/root4loot/rescope) - A scope generation tool for Burp Suite & ZAP
- [awgh/madns](https://github.com/awgh/madns) - DNS server for pentesters
- [braaaax/gfz](https://github.com/braaaax/gfz) -
- [gen2brain/url2img](https://github.com/gen2brain/url2img) - HTTP server with API for capturing screenshots of websites
- [arkrz/v2sub](https://github.com/arkrz/v2sub) - 用于 linux 下订阅 v2ray 的小工具。
- [jimareed/casbin-auth0-rbac-backend](https://github.com/jimareed/casbin-auth0-rbac-backend) - Example RBAC implementation with Casbin and Auth0
- [Hackl0us/GeoIP2-CN](https://github.com/Hackl0us/GeoIP2-CN) - 小巧精悍、准确、实用 GeoIP2 数据库
- [bp0lr/dmut](https://github.com/bp0lr/dmut) - A tool to perform permutations, mutations and alteration of subdomains in golang.
- [tismayil/rsdl](https://github.com/tismayil/rsdl) - Subdomain Scan With Ping Method.
- [projectdiscovery/proxify](https://github.com/projectdiscovery/proxify) - A versatile and portable proxy for capturing, manipulating, and replaying HTTP/HTTPS traffic on the go.
- [rmb122/rogue_mysql_server](https://github.com/rmb122/rogue_mysql_server) - A rouge mysql server supports reading files from most mysql libraries of multiple programming languages.
- [bp0lr/dnsfaster](https://github.com/bp0lr/dnsfaster) - Test the speed and reliability of a list of DNS servers
- [projectdiscovery/cloudlist](https://github.com/projectdiscovery/cloudlist) - Cloudlist is a tool for listing Assets from multiple Cloud Providers.
- [mehrdadrad/tcpprobe](https://github.com/mehrdadrad/tcpprobe) - Modern TCP tool and service for network performance observability.
- [ReddyyZ/urlbrute](https://github.com/ReddyyZ/urlbrute) - Directory/Subdomain scanner developed in GoLang.
- [sneakerhax/C2PE](https://github.com/sneakerhax/C2PE) - C2 and Post Exploitation Code
- [fzakaria/autopatchelf](https://github.com/fzakaria/autopatchelf) -
- [dwisiswant0/galer](https://github.com/dwisiswant0/galer) - A fast tool to fetch URLs from HTML attributes by crawl-in.
- [denandz/sourcemapper](https://github.com/denandz/sourcemapper) - Extract JavaScript source trees from Sourcemap files
- [cloudquery/cloudquery](https://github.com/cloudquery/cloudquery) - The open source high performance ELT framework powered by Apache Arrow
- [FairwindsOps/nova](https://github.com/FairwindsOps/nova) - Find outdated or deprecated Helm charts running in your cluster.
- [matryer/xbar](https://github.com/matryer/xbar) - Put the output from any script or program into your macOS Menu Bar (the BitBar reboot)
- [gorse-io/gorse](https://github.com/gorse-io/gorse) - Gorse open source recommender system engine
- [ribbybibby/ssl_exporter](https://github.com/ribbybibby/ssl_exporter) - Exports Prometheus metrics for TLS certificates
- [sysdream/chashell](https://github.com/sysdream/chashell) - Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
- [utkusen/urlhunter](https://github.com/utkusen/urlhunter) - a recon tool that allows searching on URLs that are exposed via shortener services
- [lobuhi/byp4xx](https://github.com/lobuhi/byp4xx) - 40X/HTTP bypasser in Go. Features: Verb tampering, headers, #bugbountytips, User-Agents, extensions, default credentials...
- [Cgboal/exclude-cdn](https://github.com/Cgboal/exclude-cdn) - Wraps projectdiscovery's cdncheck library to exclude CDN hosts from input passed over stdin
- [ipipdotnet/ipdb-go](https://github.com/ipipdotnet/ipdb-go) - IPIP.net officially supported IP database ipdb format parsing library
- [idoubi/goz](https://github.com/idoubi/goz) - A fantastic HTTP request libarary used in Golang.
- [MaxSecurity/BurpSuite-MacOS-Crack](https://github.com/MaxSecurity/BurpSuite-MacOS-Crack) -
- [projectdiscovery/collaborator](https://github.com/projectdiscovery/collaborator) - BurpSuite Standard/Private Collaborator Library
- [digininja/GitHunter](https://github.com/digininja/GitHunter) - A tool for searching a Git repository for interesting content
- [cdk-team/CDK](https://github.com/cdk-team/CDK) - 📦 Make security testing of K8s, Docker, and Containerd easier.
- [rvrsh3ll/RendezvousRAT](https://github.com/rvrsh3ll/RendezvousRAT) - Self-healing RAT utilizing libp2p
- [shadow1ng/fscan](https://github.com/shadow1ng/fscan) - 一款内网综合扫描工具,方便一键自动化、全方位漏扫扫描。
- [xo/xo](https://github.com/xo/xo) - Command line tool to generate idiomatic Go code for SQL databases supporting PostgreSQL, MySQL, SQLite, Oracle, and Microsoft SQL Server
- [PaddlePaddle/PaddleCloud](https://github.com/PaddlePaddle/PaddleCloud) - PaddlePaddle Docker images and K8s operators for PaddleOCR/Detection developers to use on public/private cloud.
- [tomnomnom/gron](https://github.com/tomnomnom/gron) - Make JSON greppable!
- [uknowsec/keylogger](https://github.com/uknowsec/keylogger) - 键盘记录,支持定时回传
- [aquasecurity/starboard](https://github.com/aquasecurity/starboard) - Moved to https://github.com/aquasecurity/trivy-operator
- [ossf/scorecard](https://github.com/ossf/scorecard) - OpenSSF Scorecard - Security health metrics for Open Source
- [k8gege/LadonGo](https://github.com/k8gege/LadonGo) - Ladon for Kali 全平台开源内网渗透扫描器,Windows/Linux/Mac/路由器内网渗透,使用它可轻松一键批量探测C段、B段、A段存活主机、高危漏洞检测MS17010、SmbGhost,远程执行SSH/Winrm,密码爆破SMB/SSH/FTP/Mysql/Mssql/Oracle/Winrm/HttpBasic/Redis,端口扫描服务识别PortScan指纹识别/HttpBa
- [yolossn/Prometheus-Basics](https://github.com/yolossn/Prometheus-Basics) - Prometheus-Basics is part of Prometheus Docs now, checkout 👇
- [RedTeamPentesting/CVE-2020-13935](https://github.com/RedTeamPentesting/CVE-2020-13935) - Exploit for WebSocket Vulnerability in Apache Tomcat
- [projectdiscovery/notify](https://github.com/projectdiscovery/notify) - Notify is a Go-based assistance package that enables you to stream the output of several tools (or read from a file) and publish it to a variety of supported platforms.
- [ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955-Go](https://github.com/ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955-Go) -
- [teler-sh/teler](https://github.com/teler-sh/teler) - Real-time HTTP Intrusion Detection
- [iiiusky/alicloud-tools](https://github.com/iiiusky/alicloud-tools) - 阿里云ECS、策略组辅助小工具
- [anchore/grype](https://github.com/anchore/grype) - A vulnerability scanner for container images and filesystems
- [Ridter/DomainHiding](https://github.com/Ridter/DomainHiding) - external c2 use domainhiding.
- [timwhitez/Doge-Loader](https://github.com/timwhitez/Doge-Loader) - 🐶Cobalt Strike Shellcode Loader by Golang
- [ThreatUnknown/jsubfinder](https://github.com/ThreatUnknown/jsubfinder) - jsubfinder searches webpages for javascript & analyzes them for hidden subdomains and secrets (wip).
- [Shivangx01b/BountyIt](https://github.com/Shivangx01b/BountyIt) - A fuzzer made in golang for finding issues like xss, lfi, rce, ssti...that detects issues using change in content length and verify it using signatures
- [StamusNetworks/gophercap](https://github.com/StamusNetworks/gophercap) - Accurate, modular, scalable PCAP manipulation tool written in Go.
- [C-Sto/recursebuster](https://github.com/C-Sto/recursebuster) - rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments
- [facebookincubator/nvdtools](https://github.com/facebookincubator/nvdtools) - A set of tools to work with the feeds (vulnerabilities, CPE dictionary etc.) distributed by National Vulnerability Database (NVD)
- [hashicorp/waypoint](https://github.com/hashicorp/waypoint) - A tool to build, deploy, and release any application on any platform.
- [nscuro/fdnssearch](https://github.com/nscuro/fdnssearch) - Swiftly search FDNS datasets from Rapid7 Open Data
- [jimen0/fdns](https://github.com/jimen0/fdns) - Concurrent Rapid7 FDNS dataset parser
- [rootless-containers/bypass4netns](https://github.com/rootless-containers/bypass4netns) - [Experimental] Accelerates slirp4netns using SECCOMP_IOCTL_NOTIF_ADDFD. As fast as `--net=host`.
- [mzfr/takeover](https://github.com/mzfr/takeover) - A tool for testing subdomain takeover possibilities at a mass scale.
- [vsec7/urlive](https://github.com/vsec7/urlive) - Check url is live (*HTTP status code "200 ok" only*).
- [valyala/fasthttp](https://github.com/valyala/fasthttp) - Fast HTTP package for Go. Tuned for high performance. Zero memory allocations in hot paths. Up to 10x faster than net/http
- [gwen001/github-subdomains](https://github.com/gwen001/github-subdomains) - Find subdomains on GitHub.
- [aquasecurity/tfsec](https://github.com/aquasecurity/tfsec) - Tfsec is now part of Trivy
- [tstillz/webshell-analyzer](https://github.com/tstillz/webshell-analyzer) - Web shell scanner and analyzer.
- [falcosecurity/kilt](https://github.com/falcosecurity/kilt) - Kilt is a project that defines how to inject foreign apps into containers
- [C-Sto/gosecretsdump](https://github.com/C-Sto/gosecretsdump) - Dump ntds.dit really fast
- [kptdev/kpt](https://github.com/kptdev/kpt) - Automate Kubernetes Configuration Editing
- [berty/berty](https://github.com/berty/berty) - Berty is a secure peer-to-peer messaging app that works with or without internet access, cellular data or trust in the network
- [PentestPad/subzy](https://github.com/PentestPad/subzy) - Subdomain takeover vulnerability checker
- [liamg/scout](https://github.com/liamg/scout) - 🔭 Lightweight URL fuzzer and spider: Discover a web server's undisclosed files, directories and VHOSTs
- [OWASP/Go-SCP](https://github.com/OWASP/Go-SCP) - Golang Secure Coding Practices guide
- [bp0lr/wurl](https://github.com/bp0lr/wurl) - A tool to test working urls.
- [mergestat/mergestat-lite](https://github.com/mergestat/mergestat-lite) - Query git repositories with SQL. Generate reports, perform status checks, analyze codebases. 🔍 📊
- [nkanaev/yarr](https://github.com/nkanaev/yarr) - yet another rss reader
- [sw33tLie/bcscope](https://github.com/sw33tLie/bcscope) - Get the scope of your bugcrowd programs
- [dstotijn/hetty](https://github.com/dstotijn/hetty) - An HTTP toolkit for security research.
- [liamg/gitjacker](https://github.com/liamg/gitjacker) - 🔪 :octocat: Leak git repositories from misconfigured websites
- [code-scan/s5_server](https://github.com/code-scan/s5_server) -
- [dwisiswant0/go-stare](https://github.com/dwisiswant0/go-stare) - A fast & light web screenshot without headless browser but Chrome DevTools Protocol!
- [crowdsecurity/crowdsec](https://github.com/crowdsecurity/crowdsec) - CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the most advanced real-world CTI.
- [incogbyte/quickpress](https://github.com/incogbyte/quickpress) - Small tool to automate SSRF wordpress and XMLRPC finder
- [RedTeamPentesting/monsoon](https://github.com/RedTeamPentesting/monsoon) - Fast HTTP enumerator
- [harleo/asnip](https://github.com/harleo/asnip) - ASN target organization IP range attack surface mapping for reconnaissance, fast and lightweight
- [projectdiscovery/mapcidr](https://github.com/projectdiscovery/mapcidr) - Utility program to perform multiple operations for a given subnet/CIDR ranges.
- [Shpota/goxygen](https://github.com/Shpota/goxygen) - Generate a modern Web project with Go and Angular, React, or Vue in seconds 🎲
- [EddieIvan01/gld](https://github.com/EddieIvan01/gld) - Go shellcode LoaDer
- [theblackturtle/wildcheck](https://github.com/theblackturtle/wildcheck) - A simple tool to detect wildcards domain based on Amass's wildcards detector.
- [dwisiswant0/unew](https://github.com/dwisiswant0/unew) - A tool for append URLs, skipping duplicates/paths & combine parameters.
- [0xsha/CloudBrute](https://github.com/0xsha/CloudBrute) - Awesome cloud enumerator
- [Becivells/iconhash](https://github.com/Becivells/iconhash) - fofa shodan favicon.ico hash icon ico 计算器
- [shenwei356/rush](https://github.com/shenwei356/rush) - A cross-platform command-line tool for executing jobs in parallel
- [awake1t/linglong](https://github.com/awake1t/linglong) - 一款甲方资产巡航扫描系统。系统定位是发现资产,进行端口爆破。帮助企业更快发现弱口令问题。主要功能包括: 资产探测、端口爆破、定时任务、管理后台识别、报表展示
- [mingrammer/go-web-framework-stars](https://github.com/mingrammer/go-web-framework-stars) - :star: Web frameworks for Go, most starred on GitHub
- [imroc/req](https://github.com/imroc/req) - Simple Go HTTP client with Black Magic
- [arminc/clair-scanner](https://github.com/arminc/clair-scanner) - Docker containers vulnerability scan
- [FiloSottile/age](https://github.com/FiloSottile/age) - A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.
- [schollz/croc](https://github.com/schollz/croc) - Easily and securely send things from one computer to another :crocodile: :package:
- [Ladicle/kubectl-rolesum](https://github.com/Ladicle/kubectl-rolesum) - Summarize Kubernetes RBAC roles for the specified subjects.
- [kalmhq/kalm](https://github.com/kalmhq/kalm) - Kalm | Kubernetes AppLication Manager
- [lamoda/gonkey](https://github.com/lamoda/gonkey) - Gonkey - a testing automation tool
- [jcatala/gqm](https://github.com/jcatala/gqm) - Go quick message
- [fanjq99/dnslog](https://github.com/fanjq99/dnslog) - dnslog reverse vul-verify 反连平台 漏洞验证
- [chennqqi/godnslog](https://github.com/chennqqi/godnslog) - An exquisite dns&http log server for verify SSRF/XXE/RFI/RCE vulnerability
- [ArturSS7/TukTuk](https://github.com/ArturSS7/TukTuk) - Tool for catching and logging different types of requests.
- [ethicalhackingplayground/wordlistgen](https://github.com/ethicalhackingplayground/wordlistgen) - Generates target specific word lists for Fuzzing with fuff
- [BishopFox/smogcloud](https://github.com/BishopFox/smogcloud) - Find cloud assets that no one wants exposed 🔎 ☁️
- [containerd/stargz-snapshotter](https://github.com/containerd/stargz-snapshotter) - Fast container image distribution plugin with lazy pulling
- [ethicalhackingplayground/ssrf-tool](https://github.com/ethicalhackingplayground/ssrf-tool) -
- [chroblert/JCRandomProxy](https://github.com/chroblert/JCRandomProxy) - 随机代理
- [hahwul/jwt-hack](https://github.com/hahwul/jwt-hack) - 🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)
- [ethicalhackingplayground/dorkX](https://github.com/ethicalhackingplayground/dorkX) - Pipe different tools with google dork Scanner
- [ethicalhackingplayground/linkJS](https://github.com/ethicalhackingplayground/linkJS) -
- [KathanP19/Gxss](https://github.com/KathanP19/Gxss) - A tool to check a bunch of URLs that contain reflecting params.
- [mhewedy/vermin](https://github.com/mhewedy/vermin) - The smart virtual machines manager. A modern CLI for Vagrant Boxes.
- [dwisiswant0/wadl-dumper](https://github.com/dwisiswant0/wadl-dumper) - Dump all available paths and/or endpoints on WADL file.
- [alfarom256/ExternalC2Go](https://github.com/alfarom256/ExternalC2Go) -
- [qq431169079/PortScanner-3](https://github.com/qq431169079/PortScanner-3) - golang 版本的分布式端口扫描器,可快速方便部署,扫描核心基于 masscan & nmap
- [KingOfBugbounty/KingOfBugBountyTips](https://github.com/KingOfBugbounty/KingOfBugBountyTips) - Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish t
- [FunnyWolf/TFirewall](https://github.com/FunnyWolf/TFirewall) - 防火墙出网探测工具,内网穿透型socks5代理
- [mitchellh/gox](https://github.com/mitchellh/gox) - A dead simple, no frills Go cross compile tool
- [projectcalico/calico](https://github.com/projectcalico/calico) - Cloud native networking and network security
- [awake1t/PortBrute](https://github.com/awake1t/PortBrute) - 一款跨平台小巧的端口爆破工具,支持爆破FTP/SSH/SMB/MSSQL/MYSQL/POSTGRESQL/MONGOD / A cross-platform compact port blasting tool that supports blasting FTP/SSH/SMB/MSSQL/MYSQL/POSTGRESQL/MONGOD
- [nerdswords/yet-another-cloudwatch-exporter](https://github.com/nerdswords/yet-another-cloudwatch-exporter) - Prometheus exporter for AWS CloudWatch - Discovers services through AWS tags, gets CloudWatch metrics data and provides them as Prometheus metrics with AWS tags as labels
- [codingo/bbr](https://github.com/codingo/bbr) - An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.
- [dwisiswant0/slackcat](https://github.com/dwisiswant0/slackcat) - A simple way of sending messages from the CLI output to your Slack with webhook.
- [alexellis/registry-creds](https://github.com/alexellis/registry-creds) - Replicate Kubernetes ImagePullSecrets to all namespaces
- [Threagile/threagile](https://github.com/Threagile/threagile) - Agile Threat Modeling Toolkit
- [knownsec/ksubdomain](https://github.com/knownsec/ksubdomain) - 无状态子域名爆破工具
- [pkujhd/goloader](https://github.com/pkujhd/goloader) - load and run golang code at runtime.
- [inguardians/peirates](https://github.com/inguardians/peirates) - Peirates - Kubernetes Penetration Testing tool
- [hirochachacha/go-smb2](https://github.com/hirochachacha/go-smb2) - SMB2/3 client library written in Go.
- [capnspacehook/rose](https://github.com/capnspacehook/rose) -
- [burrowers/garble](https://github.com/burrowers/garble) - Obfuscate Go builds
- [dalconan/NaviPassRead](https://github.com/dalconan/NaviPassRead) - Read Navicat 12 Password
- [thought-machine/dracon](https://github.com/thought-machine/dracon) - Security scanning & static analysis tool
- [optiv/Go365](https://github.com/optiv/Go365) - An Office365 User Attack Tool
- [dwisiswant0/crlfuzz](https://github.com/dwisiswant0/crlfuzz) - A fast tool to scan CRLF vulnerability written in Go
- [halfrost/LeetCode-Go](https://github.com/halfrost/LeetCode-Go) - ✅ Solutions to LeetCode by Go, 100% test coverage, runtime beats 100% / LeetCode 题解
- [MilindPurswani/whoxyrm](https://github.com/MilindPurswani/whoxyrm) - A reverse whois tool based on Whoxy API.
- [ameenmaali/wordlistgen](https://github.com/ameenmaali/wordlistgen) - Quickly generate context-specific wordlists for content discovery from lists of URLs or paths
- [openservicemesh/osm](https://github.com/openservicemesh/osm) - Open Service Mesh (OSM) is a lightweight, extensible, cloud native service mesh that allows users to uniformly manage, secure, and get out-of-the-box observability features for highly dynamic microser
- [Masterminds/sprig](https://github.com/Masterminds/sprig) - Useful template functions for Go templates.
- [C4o/Juggler](https://github.com/C4o/Juggler) - A system that may trick hackers. 针对黑客的拟态欺骗系统。
- [zu1k/nali](https://github.com/zu1k/nali) - An offline tool for querying IP geographic information and CDN provider. 一个查询IP地理信息和CDN服务提供商的离线终端工具.
- [hasura/gitkube](https://github.com/hasura/gitkube) - Build and deploy docker images to Kubernetes using git push
- [xct/xc](https://github.com/xct/xc) - A small reverse shell for Linux & Windows
- [impost0r/Misc-Tools](https://github.com/impost0r/Misc-Tools) - Miscellaneous tools I've developed over the years for help in infosec.
- [ayoul3/reflect-pe](https://github.com/ayoul3/reflect-pe) - Reflectively load PE
- [vmware-archive/octant](https://github.com/vmware-archive/octant) - Highly extensible platform for developers to better understand the complexity of Kubernetes clusters.
- [CloudyKit/jet](https://github.com/CloudyKit/jet) - Jet template engine
- [moonD4rk/HackBrowserData](https://github.com/moonD4rk/HackBrowserData) - Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).
- [lunixbochs/usercorn](https://github.com/lunixbochs/usercorn) - dynamic binary analysis via platform emulation
- [he1m4n6a/cve-db](https://github.com/he1m4n6a/cve-db) - 一个用于生成cve数据库的程序并提供简单的http协议查询接口
- [sourcegraph/sourcegraph-public-snapshot](https://github.com/sourcegraph/sourcegraph-public-snapshot) - Code AI platform with Code Search & Cody
- [jpillora/chisel](https://github.com/jpillora/chisel) - A fast TCP/UDP tunnel over HTTP
- [paranoidninja/Boomerang](https://github.com/paranoidninja/Boomerang) - Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Multiple levels of Pivoting and exposing multiple internal servic
- [ropnop/kerbrute](https://github.com/ropnop/kerbrute) - A tool to perform Kerberos pre-auth bruteforcing
- [dwisiswant0/go-dork](https://github.com/dwisiswant0/go-dork) - The fastest dork scanner written in Go.
- [hakluke/hakq](https://github.com/hakluke/hakq) - A basic golang server/client for distributing tasks over multiple systems.
- [ctoyan/ponieproxy](https://github.com/ctoyan/ponieproxy) - Simple proxy which applies filters (default or custom) to your requests and responses, while you browse a website.
- [greyireland/algorithm-pattern](https://github.com/greyireland/algorithm-pattern) - 算法模板,最科学的刷题方式,最快速的刷题路径,你值得拥有~
- [optiv/Talon](https://github.com/optiv/Talon) - A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.
- [CTF-MissFeng/NmapTools](https://github.com/CTF-MissFeng/NmapTools) - Go语言练习,第一个小工具,nmaptools解析xml导出xlsx结果、进行web服务探测、进行socket数据探测等
- [lifei6671/interview-go](https://github.com/lifei6671/interview-go) - golang面试题集合
- [hsiafan/httpdump](https://github.com/hsiafan/httpdump) - Capture and parse http traffics
- [moloch--/leakdb](https://github.com/moloch--/leakdb) - Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search
- [cybercdh/kitphishr](https://github.com/cybercdh/kitphishr) - A tool designed to hunt for Phishing Kit source code
- [gokrazy/gokrazy](https://github.com/gokrazy/gokrazy) - turn your Go program(s) into an appliance running on the Raspberry Pi 3, Pi 4, Pi 5, Pi Zero 2 W, or amd64 PCs!
- [aktsk/apk-medit](https://github.com/aktsk/apk-medit) - memory search and patch tool on debuggable apk without root & ndk
- [sysdream/ligolo](https://github.com/sysdream/ligolo) - Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/
- [kubernetes-sigs/kustomize](https://github.com/kubernetes-sigs/kustomize) - Customization of kubernetes YAML configurations
- [Static-Flow/gofingerprint](https://github.com/Static-Flow/gofingerprint) - GoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fingerprints.
- [aquasecurity/kube-bench](https://github.com/aquasecurity/kube-bench) - Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
- [D00MFist/Go4aRun](https://github.com/D00MFist/Go4aRun) - Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process
- [riza/medusa](https://github.com/riza/medusa) - Fastest recursive HTTP fuzzer, like a Ferrari.
- [sunshinev/go-sword](https://github.com/sunshinev/go-sword) - 【Go-sword】可视化CRUD管理后台生成工具
- [jckuester/awsls](https://github.com/jckuester/awsls) - A list command for AWS resources
- [go-rod/rod](https://github.com/go-rod/rod) - A Chrome DevTools Protocol driver for web automation and scraping.
- [mailhog/MailHog](https://github.com/mailhog/MailHog) - Web and API based SMTP testing
- [kinvolk/lokomotive](https://github.com/kinvolk/lokomotive) - 🪦 DISCONTINUED Further Lokomotive development has been discontinued. Lokomotive is a 100% open-source, easy to use and secure Kubernetes distribution from the volks at Kinvolk
- [stefanoj3/dirstalk](https://github.com/stefanoj3/dirstalk) - Modern alternative to dirbuster/dirb
- [sethvargo/go-envconfig](https://github.com/sethvargo/go-envconfig) - A Go library for parsing struct tags from environment variables.
- [apache/incubator-seata-go](https://github.com/apache/incubator-seata-go) - Go Implementation For Seata
- [ncarlier/feedpushr](https://github.com/ncarlier/feedpushr) - A simple feed aggregator daemon with sugar on top.
- [michelin/ChopChop](https://github.com/michelin/ChopChop) - ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.
- [projectdiscovery/httpx](https://github.com/projectdiscovery/httpx) - httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
- [lesnuages/go-execute-assembly](https://github.com/lesnuages/go-execute-assembly) - Allow a Go process to dynamically load .NET assemblies
- [EddieIvan01/iox](https://github.com/EddieIvan01/iox) - Tool for port forwarding & intranet proxy
- [TheMMMdev/addSome](https://github.com/TheMMMdev/addSome) - Simple Go script to check if found domains in a file are already saved in your Findomain database
- [fuzzitdev/fuzzit](https://github.com/fuzzitdev/fuzzit) - CLI to integrate continuous fuzzing with Fuzzit (no longer available)
- [1ndianl33t/1ndiList](https://github.com/1ndianl33t/1ndiList) - Recon Custom WordList Ganerator
- [smallstep/autocert](https://github.com/smallstep/autocert) - ⚓ A kubernetes add-on that automatically injects TLS/HTTPS certificates into your containers
- [ameenmaali/whoareyou](https://github.com/ameenmaali/whoareyou) - whoareyou is a tool to find the underlying technology/software used in a list of websites passed through stdin (using Wappalyzer dataset)
- [ethicalhackingplayground/Zin](https://github.com/ethicalhackingplayground/Zin) - A Payload Injector for bugbounties written in go
- [hakluke/haktldextract](https://github.com/hakluke/haktldextract) - Extract domains/subdomains from URLs en masse
- [ngrok/sqlmw](https://github.com/ngrok/sqlmw) - Interceptors for database/sql
- [hwholiday/gid](https://github.com/hwholiday/gid) - Golang 分布式ID生成系统,高性能、高可用、易扩展的id生成服务
- [BishopFox/sliver](https://github.com/BishopFox/sliver) - Adversary Emulation Framework
- [projectdiscovery/chaos-client](https://github.com/projectdiscovery/chaos-client) - Go client to communicate with Chaos DB API.
- [projectdiscovery/naabu](https://github.com/projectdiscovery/naabu) - A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests
- [dwisiswant0/cf-check](https://github.com/dwisiswant0/cf-check) - CloudFlare Checker written in Go
- [05sec/Cardinal](https://github.com/05sec/Cardinal) - CTF🚩 AWD (Attack with Defense) 线下赛平台 / AWD platform - 欢迎 Star~ ✨
- [wunderwuzzi23/KoiPhish](https://github.com/wunderwuzzi23/KoiPhish) - A simple yet beautiful phishing proxy.
- [caddyserver/forwardproxy](https://github.com/caddyserver/forwardproxy) - Forward proxy plugin for the Caddy web server
- [Binject/backdoorfactory](https://github.com/Binject/backdoorfactory) - A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.
- [go-vgo/robotgo](https://github.com/go-vgo/robotgo) - RobotGo, Go Native cross-platform RPA and GUI automation @vcaesar
- [erbbysam/DNSGrep](https://github.com/erbbysam/DNSGrep) - Quickly Search Large DNS Datasets
- [random-robbie/ssrf-finder](https://github.com/random-robbie/ssrf-finder) - Pass list of urls with FUZZ in and it will check if it has found a potential SSRF.
- [1ndianl33t/1ndi-hacks](https://github.com/1ndianl33t/1ndi-hacks) - Bug Bounty Tools
- [gobysec/GobyVuls](https://github.com/gobysec/GobyVuls) - Vulnerabilities of Goby supported with exploitation.
- [projectdiscovery/public-bugbounty-programs](https://github.com/projectdiscovery/public-bugbounty-programs) - Community curated list of public bug bounty and responsible disclosure programs.
- [xluohome/phonedata](https://github.com/xluohome/phonedata) - 手机号码归属地信息库、手机号归属地查询 phone.dat 最后更新:2023年02月
- [tomnomnom/fff](https://github.com/tomnomnom/fff) - The Fairly Fast Fetcher. Requests a bunch of URLs provided on stdin fairly quickly.
- [praetorian-inc/slack-c2bot](https://github.com/praetorian-inc/slack-c2bot) - Slack C2bot that executes commands and returns the output.
- [esrrhs/pingtunnel](https://github.com/esrrhs/pingtunnel) - Pingtunnel is a tool that send TCP/UDP traffic over ICMP
- [pry0cc/subgen](https://github.com/pry0cc/subgen) - A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!
- [ctoyan/waybackcollector](https://github.com/ctoyan/waybackcollector) - Fetch wayback machine historical content for a given url
- [cruise-automation/rbacsync](https://github.com/cruise-automation/rbacsync) - Automatically sync groups into Kubernetes RBAC
- [uber-go/ratelimit](https://github.com/uber-go/ratelimit) - A Go blocking leaky-bucket rate limit implementation
- [Shivangx01b/CorsMe](https://github.com/Shivangx01b/CorsMe) - Cross Origin Resource Sharing MisConfiguration Scanner
- [leobeosab/sharingan](https://github.com/leobeosab/sharingan) - Offensive Security recon tool
- [Sh1Yo/rate-limit-checker](https://github.com/Sh1Yo/rate-limit-checker) - Check whether the domain has a rate limit enabled.
- [asciimoo/wuzz](https://github.com/asciimoo/wuzz) - Interactive cli tool for HTTP inspection
- [zmap/zgrab2](https://github.com/zmap/zgrab2) - Fast Go Application Scanner
- [ndelphit/apkurlgrep](https://github.com/ndelphit/apkurlgrep) - Extract endpoints from APK files
- [heroku/terrier](https://github.com/heroku/terrier) - Terrier is a Image and Container analysis tool that can be used to scan Images and Containers to identify and verify the presence of specific files according to their hashes.
- [xfhg/intercept](https://github.com/xfhg/intercept) - INTERCEPT Code Compliance / Policy as Code Auditing / SAST & Runtime Code+API Check
- [chai2010/go-ast-book](https://github.com/chai2010/go-ast-book) - :books: 《Go语言定制指南》(原名:Go语法树入门/开源免费图书/Go语言进阶/掌握抽象语法树/Go语言AST)
- [tillson/git-hound](https://github.com/tillson/git-hound) - Reconnaissance tool for GitHub code search. Scans for exposed API keys across all of GitHub, not just known repos and orgs.
- [ihaiker/sudis](https://github.com/ihaiker/sudis) - Sudis !! Distributed supervisor process control system
- [tailscale/tailscale](https://github.com/tailscale/tailscale) - The easiest, most secure way to use WireGuard and 2FA.
- [QSoloX/whoisyou](https://github.com/QSoloX/whoisyou) - Take a list of domains and output the hostname and ip.
- [virink/xray-weblisten-ui](https://github.com/virink/xray-weblisten-ui) - Xray 被动扫描管理
- [Dliv3/Venom](https://github.com/Dliv3/Venom) - Venom - A Multi-hop Proxy for Penetration Testers
- [jjf012/gopoc](https://github.com/jjf012/gopoc) - 用cel-go重现了长亭xray的poc检测功能的轮子
- [go-admin-team/go-admin](https://github.com/go-admin-team/go-admin) - 基于Gin + Vue + Element UI & Arco Design & Ant Design 的前后端分离权限管理系统脚手架(包含了:多租户的支持,基础用户管理功能,jwt鉴权,代码生成器,RBAC资源控制,表单构建,定时任务等)3分钟构建自己的中后台项目;项目文档》:https://www.go-admin.pro V2 Demo: https://vue2.go-admin.d
- [tismayil/ohmybackup](https://github.com/tismayil/ohmybackup) - Scan Victim Backup Directories & Backup Files
- [drk1wi/Modlishka](https://github.com/drk1wi/Modlishka) - Modlishka. Reverse Proxy.
- [joanbono/Gurp](https://github.com/joanbono/Gurp) - Burp Commander written in Go
- [projectdiscovery/dnsprobe](https://github.com/projectdiscovery/dnsprobe) - DNSProb is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers.
- [zmap/zdns](https://github.com/zmap/zdns) - Fast DNS Lookup Library and CLI Tool
- [jaeles-project/jaeles](https://github.com/jaeles-project/jaeles) - The Swiss Army knife for automated Web Application Testing
- [hahwul/dalfox](https://github.com/hahwul/dalfox) - 🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.
- [shomali11/go-interview](https://github.com/shomali11/go-interview) - Collection of Technical Interview Questions solved with Go
- [lc/gau](https://github.com/lc/gau) - Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.
- [gudegg/yunSpider](https://github.com/gudegg/yunSpider) - 百度云网盘爬虫
- [master-coder-ll/v2ray-web-manager](https://github.com/master-coder-ll/v2ray-web-manager) - v2ray-web-manager 是一个v2ray的面板,也是一个集群的解决方案;同时增加了流量控制/账号管理/限速等功能。key: admin , panel ,web,cluster,集群,proxy
- [tuxotron/docker-image-generator](https://github.com/tuxotron/docker-image-generator) - Customized docker images generation toolkit
- [Adminisme/ServerScan](https://github.com/Adminisme/ServerScan) - ServerScan一款使用Golang开发的高并发网络扫描、服务探测工具。
- [projectdiscovery/nuclei](https://github.com/projectdiscovery/nuclei) - Fast and customizable vulnerability scanner based on simple YAML based DSL.
- [argoproj/argo-workflows](https://github.com/argoproj/argo-workflows) - Workflow Engine for Kubernetes
- [theblackturtle/fprobe](https://github.com/theblackturtle/fprobe) - Take a list of domains/subdomains and probe for working http/https server.
- [madneal/gshark](https://github.com/madneal/gshark) - Scan for sensitive information easily and effectively.
- [ATpiu/asset-scan](https://github.com/ATpiu/asset-scan) - asset-scan是一款适用甲方企业的外网资产周期性扫描监控系统
- [jesseduffield/lazydocker](https://github.com/jesseduffield/lazydocker) - The lazier way to manage everything docker
- [parsiya/Hacking-with-Go](https://github.com/parsiya/Hacking-with-Go) - Golang for Security Professionals
- [projectdiscovery/shuffledns](https://github.com/projectdiscovery/shuffledns) - MassDNS wrapper written in go to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard filtering and easy input-output support.
- [rhaidiz/broxy](https://github.com/rhaidiz/broxy) - An HTTP/HTTPS intercept proxy written in Go.
- [TheKingOfDuck/ReverseGoShell](https://github.com/TheKingOfDuck/ReverseGoShell) - A Golang Reverse Shell Tool With AES Dynamic Encryption
- [darkr4y/geacon](https://github.com/darkr4y/geacon) - Practice Go programming and implement CobaltStrike's Beacon in Go
- [kozlice/slack-webm-sentinel](https://github.com/kozlice/slack-webm-sentinel) - A bot that tracks .webm links and converts them to .mp4
- [Go-zh/tour](https://github.com/Go-zh/tour) - 【已弃用】新版移至 website 代码仓库
- [gophish/gophish](https://github.com/gophish/gophish) - Open-Source Phishing Toolkit
- [sensepost/gowitness](https://github.com/sensepost/gowitness) - 🔍 gowitness - a golang, web screenshot utility using Chrome Headless
- [xfiftyone/STS2G](https://github.com/xfiftyone/STS2G) - Struts2漏洞扫描利用工具 - Golang版. Struts2 Scanner Written in Golang
- [ZeroDream-CN/SakuraFrp](https://github.com/ZeroDream-CN/SakuraFrp) - 基于 Frp 二次开发定制的版本,可实现多用户管理、限速等商业化功能
- [phil-fly/goWeakPass](https://github.com/phil-fly/goWeakPass) - 使用golang编写的服务弱口令检测
- [ph4ntonn/Stowaway](https://github.com/ph4ntonn/Stowaway) - 👻Stowaway -- Multi-hop Proxy Tool for pentesters
- [geph-official/geph2](https://github.com/geph-official/geph2) - (ARCHIVED) Geph (迷霧通) is a modular Internet censorship circumvention system designed specifically to deal with national filtering.
- [tomnomnom/hacks](https://github.com/tomnomnom/hacks) - A collection of hacks and one-off scripts
- [tomnomnom/qsreplace](https://github.com/tomnomnom/qsreplace) - Accept URLs on stdin, replace all query string values with a user-supplied value
- [phuslu/iploc](https://github.com/phuslu/iploc) - Fastest IP To Country Library
- [ac0d3r/Hyuga](https://github.com/ac0d3r/Hyuga) - Hyuga 是一个用来监控带外(Out-of-Band)流量的工具。🪤
- [hakluke/hakrevdns](https://github.com/hakluke/hakrevdns) - Small, fast tool for performing reverse DNS lookups en masse.
- [runZeroInc/runzero-tools](https://github.com/runZeroInc/runzero-tools) - Open source tools, libraries, and datasets related to the runZero product and associated research
- [hakluke/hakrawler](https://github.com/hakluke/hakrawler) - Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application
- [yuxiaokui/gohtran](https://github.com/yuxiaokui/gohtran) - 反向socks5代理, 关键词: go htran 重复造轮子 ssocks ew
- [sundowndev/phoneinfoga](https://github.com/sundowndev/phoneinfoga) - Information gathering framework for phone numbers
- [40t/go-sniffer](https://github.com/40t/go-sniffer) - 🔎Sniffing and parsing mysql,redis,http,mongodb etc protocol. 抓包截取项目中的数据库请求并解析成相应的语句。
- [aquasecurity/trivy](https://github.com/aquasecurity/trivy) - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
- [xxjwxc/gowp](https://github.com/xxjwxc/gowp) - golang worker pool , Concurrency limiting goroutine pool
- [Qianlitp/crawlergo](https://github.com/Qianlitp/crawlergo) - A powerful browser crawler for web vulnerability scanners
- [dreamans/syncd](https://github.com/dreamans/syncd) - syncd是一款开源的代码部署工具,它具有简单、高效、易用等特点,可以提高团队的工作效率.
- [insidersec/insider](https://github.com/insidersec/insider) - Static Application Security Testing (SAST) engine focused on covering the OWASP Top 10, to make source code analysis to find vulnerabilities right in the source code, focused on a agile and easy to im
- [bnkamalesh/verifier](https://github.com/bnkamalesh/verifier) - A minimal, customizable Go package for Email & Mobile number verification
- [ahhh/nmap-to-netscan](https://github.com/ahhh/nmap-to-netscan) - A helper utility for turning nmap xml files into target lists for go-netscan
- [openkruise/kruise](https://github.com/openkruise/kruise) - Automated management of large-scale applications on Kubernetes (incubating project under CNCF)
- [guonaihong/gout](https://github.com/guonaihong/gout) - gout to become the Swiss Army Knife of the http client @^^@---> gout 是http client领域的瑞士军刀,小巧,强大,犀利。具体用法可看文档,如使用迷惑或者API用得不爽都可提issues
- [wxbool/video-srt-windows](https://github.com/wxbool/video-srt-windows) - 这是一个可以识别视频语音自动生成字幕SRT文件的开源 Windows-GUI 软件工具。
- [aau-network-security/haaukins](https://github.com/aau-network-security/haaukins) - A Highly Accessible and Automated Virtualization Platform for Security Education
- [crawlab-team/crawlab](https://github.com/crawlab-team/crawlab) - Distributed web crawler admin platform for spiders management regardless of languages and frameworks. 分布式爬虫管理平台,支持任何语言和框架
- [yakumioto/alkaid](https://github.com/yakumioto/alkaid) - Alkaid is a BaaS(Blockchan as a Service) service based on Hyperledger Fabric.
- [TNK-Studio/gortal](https://github.com/TNK-Studio/gortal) - 🚪A super lightweight jumpserver service developed using the Go language. 一个使用 Go 语言开发的,超级轻量的跳板机服务。
- [kerbyj/goLazagne](https://github.com/kerbyj/goLazagne) - Go library for credentials recovery
- [squat/kilo](https://github.com/squat/kilo) - Kilo is a multi-cloud network overlay built on WireGuard and designed for Kubernetes (k8s + wg = kg)
- [filebrowser/filebrowser](https://github.com/filebrowser/filebrowser) - 📂 Web File Browser
- [derailed/k9s](https://github.com/derailed/k9s) - 🐶 Kubernetes CLI To Manage Your Clusters In Style!
- [flipped-aurora/gin-vue-admin](https://github.com/flipped-aurora/gin-vue-admin) - 🚀Vite+Vue3+Gin的开发基础平台,支持TS和JS混用。它集成了JWT鉴权、权限管理、动态路由、显隐可控组件、分页封装、多点登录拦截、资源权限、上传下载、代码生成器【可AI辅助】、表单生成器和可配置的导入导出等开发必备功能。
- [aquasecurity/tracee](https://github.com/aquasecurity/tracee) - Linux Runtime Security and Forensics using eBPF
- [cbeuw/Cloak](https://github.com/cbeuw/Cloak) - A censorship circumvention tool to evade detection by authoritarian state adversaries
- [gin-gonic/gin](https://github.com/gin-gonic/gin) - Gin is a HTTP web framework written in Go (Golang). It features a Martini-like API with much better performance -- up to 40 times faster. If you need smashing performance, get yourself some Gin.
- [kataras/iris](https://github.com/kataras/iris) - The fastest HTTP/2 Go Web Framework. New, modern and easy to learn. Fast development with Code you control. Unbeatable cost-performance ratio :rocket:
- [github/gh-ost](https://github.com/github/gh-ost) - GitHub's Online Schema-migration Tool for MySQL
- [mehrdadrad/radvpn](https://github.com/mehrdadrad/radvpn) - Decentralized VPN
- [LyricTian/gin-admin](https://github.com/LyricTian/gin-admin) - A lightweight, flexible, elegant and full-featured RBAC scaffolding based on GIN + GORM 2.0 + Casbin 2.0 + Wire DI.
- [TruthHun/BookStack](https://github.com/TruthHun/BookStack) - BookStack,基于MinDoc,使用Beego开发的在线文档管理系统,功能类似Gitbook和看云。
- [thinkeridea/go-extend](https://github.com/thinkeridea/go-extend) - go语言扩展包,收集一些常用的操作函数,辅助更快的完成开发工作,并减少重复代码
- [xinliangnote/go-gin-api](https://github.com/xinliangnote/go-gin-api) - 基于 Gin 进行模块化设计的 API 框架,封装了常用功能,使用简单,致力于进行快速的业务研发。比如,支持 cors 跨域、jwt 签名验证、zap 日志收集、panic 异常捕获、trace 链路追踪、prometheus 监控指标、swagger 文档生成、viper 配置文件解析、gorm 数据库组件、gormgen 代码生成工具、graphql 查询语言、errno 统一定义错误码、gR
- [eolinker/goku_lite](https://github.com/eolinker/goku_lite) - A Powerful HTTP API Gateway in pure golang!Goku API Gateway (中文名:悟空 API 网关)是一个基于 Golang开发的微服务网关,能够实现高性能 HTTP API 转发、服务编排、多租户管理、API 访问权限控制等目的,拥有强大的自定义插件系统可以自行扩展,并且提供友好的图形化配置界面,能够快速帮助企业进行 API 服务治理、提高 AP
- [yangwenmai/learning-golang](https://github.com/yangwenmai/learning-golang) - Go 学习之路:Go 开发者博客、Go 微信公众号、Go 学习资料(文档、书籍、视频)
- [defenxor/dsiem](https://github.com/defenxor/dsiem) - Security event correlation engine for ELK stack
- [TeaWeb/build](https://github.com/TeaWeb/build) - TeaWeb-可视化的Web代理服务。DEMO: http://teaos.cn:7777
- [gourouting/singo](https://github.com/gourouting/singo) - Gin+Gorm开发Golang API快速开发脚手架
- [nntaoli-project/goex](https://github.com/nntaoli-project/goex) - Cryptocurrency Exchange Rest API SDK For Golang Wrapper Support okx,huobi,binance
- [sqshq/sampler](https://github.com/sqshq/sampler) - Tool for shell commands execution, visualization and alerting. Configured with a simple YAML file.
- [mdsecactivebreach/o365-attack-toolkit](https://github.com/mdsecactivebreach/o365-attack-toolkit) - A toolkit to attack Office365
- [OJ/gobuster](https://github.com/OJ/gobuster) - Directory/File, DNS and VHost busting tool written in Go
- [netevert/delator](https://github.com/netevert/delator) - Golang-based subdomain miner leveraging certificate transparency logs
- [tomnomnom/assetfinder](https://github.com/tomnomnom/assetfinder) - Find domains and subdomains related to a given domain
- [mlogclub/bbs-go](https://github.com/mlogclub/bbs-go) - 基于Golang的开源社区系统。简洁对话,高效互动,社区新体验!
- [astaxie/build-web-application-with-golang](https://github.com/astaxie/build-web-application-with-golang) - A golang ebook intro how to build a web with golang
- [myrual/mixin-network-snapshot-golang](https://github.com/myrual/mixin-network-snapshot-golang) - crypto currency gateway plugin for web store
- [aceld/zinx](https://github.com/aceld/zinx) - A lightweight concurrent server framework based on Golang.
- [hanxi/lemonade](https://github.com/hanxi/lemonade) - Lemonade is a remote utility tool. (copy, paste and open browser) over TCP.
- [txthinking/zoro](https://github.com/txthinking/zoro) - zoro can help you expose local server to external network. Support both TCP/UDP, of course support HTTP. Zero-Configuration.
- [az0ne/Finder](https://github.com/az0ne/Finder) - 一款Go语言实现的端口扫描器.
- [lakevilladom/goSkylar](https://github.com/lakevilladom/goSkylar) - 基于Golang开发的企业级外网端口资产扫描
- [Virus-V/arpZebra](https://github.com/Virus-V/arpZebra) - ARP+DNS欺骗工具,网络安全第三次实验,课堂演示用,严禁非法用途。ARPSpoof,wifi hijack,dns spoof
- [rancher/k3os](https://github.com/rancher/k3os) - Purpose-built OS for Kubernetes, fully managed by Kubernetes.
- [gcla/termshark](https://github.com/gcla/termshark) - A terminal UI for tshark, inspired by Wireshark
- [RickGray/vscan-go](https://github.com/RickGray/vscan-go) - golang version for nmap service and application version detection (without nmap installation)
- [ffuf/ffuf](https://github.com/ffuf/ffuf) - Fast web fuzzer written in Go
- [lis912/CapOS](https://github.com/lis912/CapOS) - 等级保护测评windows工具源码
- [netxfly/x-crack](https://github.com/netxfly/x-crack) - x-crack - Weak password scanner, Support: FTP/SSH/SNMP/MSSQL/MYSQL/PostGreSQL/REDIS/ElasticSearch/MONGODB
- [ice-ice/dnstunnel](https://github.com/ice-ice/dnstunnel) - dns tunnel backdoor DNS隧道后门
- [future-architect/vuls](https://github.com/future-architect/vuls) - Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
- [milo2012/pathbrute](https://github.com/milo2012/pathbrute) - Pathbrute
- [l3m0n/whatweb](https://github.com/l3m0n/whatweb) - 更快速的进行Web应用指纹识别
- [boy-hack/goWhatweb](https://github.com/boy-hack/goWhatweb) - [学习GO] go语言写的web指纹识别 - Identify websites by go language
- [gwuhaolin/livego](https://github.com/gwuhaolin/livego) - live video streaming server in golang
- [ffhelicopter/Go42](https://github.com/ffhelicopter/Go42) - 《Go语言四十二章经》详细讲述Go语言规范与语法细节及开发中常见的误区,通过研读标准库等经典代码设计模式,启发读者深刻理解Go语言的核心思维,进入Go语言开发的更高阶段。
- [meshbird/meshbird](https://github.com/meshbird/meshbird) - Distributed private networking
- [Q2h1Cg/dnsbrute](https://github.com/Q2h1Cg/dnsbrute) - a fast domain brute tool
- [marco-lancini/goscan](https://github.com/marco-lancini/goscan) - Interactive Network Scanner
- [tair-opensource/RedisShake](https://github.com/tair-opensource/RedisShake) - RedisShake is a Redis data processing and migration tool.
- [knownsec/gsm](https://github.com/knownsec/gsm) - 使用树莓派配合硬件来进行短信转发
- [WangYihang/Platypus](https://github.com/WangYihang/Platypus) - :hammer: A modern multiple reverse shell sessions manager written in go
- [jmpews/goscan](https://github.com/jmpews/goscan) - golang的扫描框架, 支持协程池和自动调节协程个数.
- [coyim/coyim](https://github.com/coyim/coyim) - coyim - a safe and secure chat client
- [golang-china/awesome-go-zh](https://github.com/golang-china/awesome-go-zh) - :books: Go资源精选中文版(含中文图书大全)
- [securego/gosec](https://github.com/securego/gosec) - Go security checker
- [ehang-io/nps](https://github.com/ehang-io/nps) - 一款轻量级、高性能、功能强大的内网穿透代理服务器。支持tcp、udp、socks5、http等几乎所有流量转发,可用来访问内网网站、本地支付接口调试、ssh访问、远程桌面,内网dns解析、内网socks5代理等等……,并带有功能强大的web管理端。a lightweight, high-performance, powerful intranet penetration proxy server,
- [opensec-cn/kunpeng](https://github.com/opensec-cn/kunpeng) - kunpeng是一个Golang编写的开源POC框架/库,以动态链接库的形式提供各种语言调用,通过此项目可快速开发漏洞检测类的系统。
- [j3ssie/osmedeus](https://github.com/j3ssie/osmedeus) - A Workflow Engine for Offensive Security
- [rockstar2046/cmus-lyric](https://github.com/rockstar2046/cmus-lyric) - cmus lyric viewer
- [maxmcd/webtty](https://github.com/maxmcd/webtty) - Share a terminal session over WebRTC
- [0xDkd/auxpi](https://github.com/0xDkd/auxpi) - 🍭 集合多家 API 的新一代图床
- [root-gg/plik](https://github.com/root-gg/plik) - Plik is a temporary file upload system (Wetransfer like) in Go.
- [sensepost/godoh](https://github.com/sensepost/godoh) - 🕳 godoh - A DNS-over-HTTPS C2
- [mkchoi212/fac](https://github.com/mkchoi212/fac) - Easy-to-use CUI for fixing git conflicts
- [gogs/gogs](https://github.com/gogs/gogs) - Gogs is a painless self-hosted Git service
- [iwannay/jiacrontab](https://github.com/iwannay/jiacrontab) - 简单可信赖的任务管理工具
- [Releasel0ck/Blind-SQL-Injector](https://github.com/Releasel0ck/Blind-SQL-Injector) - 手工盲注辅助注入工具
- [netxfly/docker_ssh_honeypot](https://github.com/netxfly/docker_ssh_honeypot) - 安全开发教学 - 用Docker制作一个高交互ssh蜜罐
- [jesseduffield/lazygit](https://github.com/jesseduffield/lazygit) - simple terminal UI for git commands
- [go-gitea/gitea](https://github.com/go-gitea/gitea) - Git with a cup of tea! Painless self-hosted all-in-one software development service, including Git hosting, code review, team collaboration, package registry and CI/CD
- [sipt/shuttle](https://github.com/sipt/shuttle) - A web proxy in Golang with amazing features.
- [lixiangzhong/dnsutil](https://github.com/lixiangzhong/dnsutil) - dns dig for golang
- [TruthHun/DocHub](https://github.com/TruthHun/DocHub) - 参考百度文库,使用Beego(Golang)开发的开源文库系统
- [TimothyYe/godns](https://github.com/TimothyYe/godns) - A dynamic DNS client tool that supports AliDNS, Cloudflare, Google Domains, DNSPod, HE.net & DuckDNS & DreamHost, etc, written in Go.
- [cloverstd/tcping](https://github.com/cloverstd/tcping) - ping over a tcp connection
- [google/subcommands](https://github.com/google/subcommands) - Go subcommand library.
- [fanpei91/torsniff](https://github.com/fanpei91/torsniff) - torsniff - a sniffer that sniffs torrents from BitTorrent network
- [anshumanbh/merge-nmap-masscan](https://github.com/anshumanbh/merge-nmap-masscan) - Merge results from NMAP and Masscan into one CSV file
- [anoshop/BAT_Check_DomainName](https://github.com/anoshop/BAT_Check_DomainName) -
- [helloxz/zdir](https://github.com/helloxz/zdir) - A multifunctional private storage program that integrates file indexing, online preview, and sharing, supporting both WebDAV and cloud download.
- [jimeh/tmux-themepack](https://github.com/jimeh/tmux-themepack) - A pack of various Tmux themes.
- [xo/usql](https://github.com/xo/usql) - Universal command-line interface for SQL databases
- [miniflux/v2](https://github.com/miniflux/v2) - Minimalist and opinionated feed reader
- [AmyangXYZ/DNSSniffer](https://github.com/AmyangXYZ/DNSSniffer) - DNSQuery Sniffer in Golang
- [OpenBazaar/go-onion-transport](https://github.com/OpenBazaar/go-onion-transport) - Tor onion transport for IPFS
- [snail007/goproxy](https://github.com/snail007/goproxy) - 🔥 Proxy is a high performance HTTP(S) proxies, SOCKS5 proxies,WEBSOCKET, TCP, UDP proxy server implemented by golang. Now, it supports chain-style proxies,nat forwarding in different lan,TCP/UDP port
- [shawn1m/overture](https://github.com/shawn1m/overture) - A customized DNS relay server
- [projectdiscovery/subfinder](https://github.com/projectdiscovery/subfinder) - Fast passive subdomain enumeration tool.
- [baidu-security/app-env-docker](https://github.com/baidu-security/app-env-docker) - 基于 Docker 的真实应用测试环境
- [claudiodangelis/qrcp](https://github.com/claudiodangelis/qrcp) - :zap: Transfer files over wifi from your computer to your mobile device by scanning a QR code without leaving the terminal.
- [dsopas/rfd-checker](https://github.com/dsopas/rfd-checker) - RFD Checker - security CLI tool to test Reflected File Download issues
- [gilbertchen/duplicacy](https://github.com/gilbertchen/duplicacy) - A new generation cloud backup tool
- [tiagorlampert/CHAOS](https://github.com/tiagorlampert/CHAOS) - :fire: CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.
- [cointop-sh/cointop](https://github.com/cointop-sh/cointop) - A fast and lightweight interactive terminal based UI application for tracking cryptocurrencies 🚀
- [lyyyuna/godht](https://github.com/lyyyuna/godht) -
- [shadowsocks/shadowsocks-go](https://github.com/shadowsocks/shadowsocks-go) - go port of shadowsocks (Deprecated)
- [mritd/idgen](https://github.com/mritd/idgen) - 一个使用 golang 编写的大陆身份证生成器
- [cbeuw/GoQuiet](https://github.com/cbeuw/GoQuiet) - A Shadowsocks obfuscation plugin utilising domain fronting to evade deep packet inspection
- [haccer/subjack](https://github.com/haccer/subjack) - Subdomain Takeover tool written in Go
- [qax-os/ElasticHD](https://github.com/qax-os/ElasticHD) - Elasticsearch 可视化DashBoard, 支持Es监控、实时搜索,Index template快捷替换修改,索引列表信息查看, SQL converts to DSL等
- [gitleaks/gitleaks](https://github.com/gitleaks/gitleaks) - Protect and discover secrets using Gitleaks 🔑
- [cloudreve/Cloudreve](https://github.com/cloudreve/Cloudreve) - 🌩支持多家云存储的云盘系统 (Self-hosted file management and sharing system, supports multiple storage providers)
- [Ice3man543/SubOver](https://github.com/Ice3man543/SubOver) - A Powerful Subdomain Takeover Tool
- [MiSecurity/x-patrol](https://github.com/MiSecurity/x-patrol) - github泄露扫描系统
- [ginuerzh/gost](https://github.com/ginuerzh/gost) - GO Simple Tunnel - a simple tunnel written in golang
- [avast/apkverifier](https://github.com/avast/apkverifier) - APK Signature verification in Go. Supports scheme v1, v2 and v3 and passes Google apksig's testing suite.
- [dzonerzy/goWAPT](https://github.com/dzonerzy/goWAPT) - Go Web Application Penetration Test
- [rgburke/grv](https://github.com/rgburke/grv) - GRV is a terminal interface for viewing git repositories
- [jiajunhuang/guard](https://github.com/jiajunhuang/guard) - NOT MAINTAINED! A generic high performance circuit breaker & proxy server written in Go
- [random-robbie/AWS-Scanner](https://github.com/random-robbie/AWS-Scanner) - Scans a list of websites for Cloudfront or S3 Buckets
- [DNSCrypt/dnscrypt-proxy](https://github.com/DNSCrypt/dnscrypt-proxy) - dnscrypt-proxy 2 - A flexible DNS proxy, with support for encrypted DNS protocols.
- [malfunkt/hyperfox](https://github.com/malfunkt/hyperfox) - HTTP/HTTPS MITM proxy and recorder.
- [LubyRuffy/tcptunnel](https://github.com/LubyRuffy/tcptunnel) - 将本地内网服务器映射到公网。
- [ghostunnel/ghostunnel](https://github.com/ghostunnel/ghostunnel) - A simple SSL/TLS proxy with mutual authentication for securing non-TLS services.
- [mmatczuk/go-http-tunnel](https://github.com/mmatczuk/go-http-tunnel) - Fast and secure tunnels over HTTP/2
- [mattn/ft](https://github.com/mattn/ft) - File Transferer
- [ethereum/go-ethereum](https://github.com/ethereum/go-ethereum) - Go implementation of the Ethereum protocol
- [cookieY/Yearning](https://github.com/cookieY/Yearning) - 🐳 A most popular sql audit platform for mysql
- [crabkun/switcher](https://github.com/crabkun/switcher) - 一个多功能的端口转发/端口复用工具,支持转发本地或远程地址的端口,支持正则表达式转发(实现端口复用)。
- [fardog/secureoperator](https://github.com/fardog/secureoperator) - A DNS-protocol proxy for DNS-over-HTTPS providers, such as Google and Cloudflare
- [drish/ben](https://github.com/drish/ben) - Your benchmark assistant, written in Go.
- [Nhoya/gOSINT](https://github.com/Nhoya/gOSINT) - OSINT Swiss Army Knife
- [cw1997/NATBypass](https://github.com/cw1997/NATBypass) - 一款lcx.exe在golang下的实现, 可用于内网穿透, 建立TCP反弹隧道用以绕过防火墙入站限制等, This tool is used to establish reverse tunnel in NAT network environment, it can bypass firewall inbound restriction, support all functions of lcx
- [sa7mon/S3Scanner](https://github.com/sa7mon/S3Scanner) - Scan for misconfigured S3 buckets across S3-compatible APIs!
- [netxfly/xsec-proxy-scanner](https://github.com/netxfly/xsec-proxy-scanner) - xsec-proxy-scanner是一款速度超快、小巧的代理扫描器
- [go-ignite/ignite](https://github.com/go-ignite/ignite) - A SS(R) panel for managing multiple users, powered by Go & Docker.
- [yinqiwen/gsnova](https://github.com/yinqiwen/gsnova) - Private proxy solution & network troubleshooting tool.
- [timest/goscan](https://github.com/timest/goscan) - goscan is a simple and efficient IPv4 network scanner that discovers all active devices on local subnet.
- [tam7t/hpkp](https://github.com/tam7t/hpkp) - golang hpkp client library
- [twitchyliquid64/subnet](https://github.com/twitchyliquid64/subnet) - Simple, auditable & elegant VPN, built with TLS mutual authentication and TUN.
- [dreddsa5dies/goHackTools](https://github.com/dreddsa5dies/goHackTools) - Hacker tools on Go (Golang)
- [rclone/rclone](https://github.com/rclone/rclone) - "rsync for cloud storage" - Google Drive, S3, Dropbox, Backblaze B2, One Drive, Swift, Hubic, Wasabi, Google Cloud Storage, Azure Blob, Azure Files, Yandex Files
- [moul/assh](https://github.com/moul/assh) - :computer: make your ssh client smarter
- [yangxuan8282/docker-image](https://github.com/yangxuan8282/docker-image) -
- [averagesecurityguy/searchscan](https://github.com/averagesecurityguy/searchscan) - Search Nmap and Metasploit scanning scripts.
- [netxfly/xsec-ip-database](https://github.com/netxfly/xsec-ip-database) - xsec-ip-database为一个恶意IP和域名库(Malicious ip database)
- [bynil/sov2ex](https://github.com/bynil/sov2ex) - A site search for V2EX
- [coyove/goflyway](https://github.com/coyove/goflyway) - An encrypted HTTP server
- [junegunn/fzf](https://github.com/junegunn/fzf) - :cherry_blossom: A command-line fuzzy finder
- [flynaj/kcptun](https://github.com/flynaj/kcptun) - A Secure Tunnel Based On KCP with N:M Multiplexing
- [inconshreveable/slt](https://github.com/inconshreveable/slt) - A TLS reverse proxy with SNI multiplexing in Go
- [diamondyuan-achieve/frp](https://github.com/diamondyuan-achieve/frp) -
- [inconshreveable/ngrok](https://github.com/inconshreveable/ngrok) - Unified ingress for developers
- [moby/moby](https://github.com/moby/moby) - The Moby Project - a collaborative project for the container ecosystem to assemble container-based systems
- [gohugoio/hugo](https://github.com/gohugoio/hugo) - The world’s fastest framework for building websites.
- [jpillora/cloud-torrent](https://github.com/jpillora/cloud-torrent) - ☁️ Cloud Torrent: a self-hosted remote torrent client
- [yeasy/docker_practice](https://github.com/yeasy/docker_practice) - Learn and understand Docker&Container technologies, with real DevOps practice!
- [shyiko/kubesec](https://github.com/shyiko/kubesec) - Secure Secret management for Kubernetes (with gpg, Google Cloud KMS and AWS KMS backends)
- [netxfly/xsec-dns-proxy](https://github.com/netxfly/xsec-dns-proxy) - DNS代理服务器,可以记录log到数据库中
- [shiyanhui/dht](https://github.com/shiyanhui/dht) - BitTorrent DHT Protocol && DHT Spider.
- [btcsuite/btcd](https://github.com/btcsuite/btcd) - An alternative full node bitcoin implementation written in Go (golang)
- [ARwMq9b6/dnsproxy](https://github.com/ARwMq9b6/dnsproxy) - 防 DNS 缓存污染,兼顾查询质量与速度
- [yinghuocho/firefly-proxy](https://github.com/yinghuocho/firefly-proxy) - A proxy software to help circumventing the Great Firewall.
- [Kisesy/gscan_quic](https://github.com/Kisesy/gscan_quic) - Google Quic 扫描工具
- [IDrinkMoreWater/fetchserver](https://github.com/IDrinkMoreWater/fetchserver) - phuslu删掉了fetchserver,我重新传一个
- [nadoo/glider](https://github.com/nadoo/glider) - glider is a forward proxy with multiple protocols support, and also a dns/dhcp server with ipset management features(like dnsmasq).
- [txthinking/brook](https://github.com/txthinking/brook) - A cross-platform programmable network tool
- [avelino/awesome-go](https://github.com/avelino/awesome-go) - A curated list of awesome Go frameworks, libraries and software
- [caddyserver/caddy](https://github.com/caddyserver/caddy) - Fast and extensible multi-platform HTTP/1-2-3 web server with automatic HTTPS
- [evilsocket/xray](https://github.com/evilsocket/xray) - XRay is a tool for recon, mapping and OSINT gathering from public networks.
- [huacnlee/flora-kit](https://github.com/huacnlee/flora-kit) - 💐 基于 shadowsocks-go 做的完善实现,自动网络分流,完全兼容 Surge 的配置文件。
- [apex/gh-polls](https://github.com/apex/gh-polls) - Polls for user feedback in GitHub issues
- [x90skysn3k/brutespray](https://github.com/x90skysn3k/brutespray) - Bruteforcing from various scanner output - Automatically attempts default creds on found services.
- [rabbitstack/fibratus](https://github.com/rabbitstack/fibratus) - Adversary tradecraft detection, protection, and hunting
- [crazy-max/WindowsSpyBlocker](https://github.com/crazy-max/WindowsSpyBlocker) - Block spying and tracking on Windows
- [evilsocket/dnssearch](https://github.com/evilsocket/dnssearch) - A subdomain enumeration tool.
- [zmap/zgrab](https://github.com/zmap/zgrab) - **DEPRECATED** This project has been replaced by https://github.com/zmap/zgrab2
- [evilsocket/brutemachine](https://github.com/evilsocket/brutemachine) - A Go library which main purpose is giving an interface to loop over a dictionary and use those words/lines as input for some custom logic such as HTTP file bruteforcing, DNS bruteforcing, etc.
- [rqlite/rqlite](https://github.com/rqlite/rqlite) - The lightweight, user-friendly, distributed relational database built on SQLite.
- [michenriksen/aquatone](https://github.com/michenriksen/aquatone) - A Tool for Domain Flyovers
- [anshumanbh/git-all-secrets](https://github.com/anshumanbh/git-all-secrets) - A tool to capture all the git secrets by leveraging multiple open source git searching tools
- [quay/clair](https://github.com/quay/clair) - Vulnerability Static Analysis for Containers
- [InsZVA/tap0901](https://github.com/InsZVA/tap0901) - Go语言虚拟网卡库,可用于制作对战平台、加速器、防火墙、VPN等
- [techjacker/repo-security-scanner](https://github.com/techjacker/repo-security-scanner) - CLI tool that finds secrets accidentally committed to a git repo, eg passwords, private keys
- [netxfly/crack_ssh](https://github.com/netxfly/crack_ssh) - go写的协程版的ssh\redis\mongodb弱口令破解工具
- [shunfei/cronsun](https://github.com/shunfei/cronsun) - A Distributed, Fault-Tolerant Cron-Style Job System.
- [kashav/fsql](https://github.com/kashav/fsql) - Search for files using a fun query language
- [yeasy/blockchain_guide](https://github.com/yeasy/blockchain_guide) - Introduce blockchain related technologies, from theory to practice with bitcoin, ethereum and hyperledger.
- [mysteriumnetwork/node](https://github.com/mysteriumnetwork/node) - Mysterium Network Node - official implementation of distributed VPN network (dVPN) protocol
- [early-return/ebreader](https://github.com/early-return/ebreader) - 一个让你可以在浏览器中阅读Epub电子书的CLI程序,使用Golang编写
- [FeatureBaseDB/featurebase](https://github.com/FeatureBaseDB/featurebase) - A crazy fast analytical database, built on bitmaps. Perfect for ML applications. Learn more at: http://docs.featurebase.com/. Start a Docker instance: https://hub.docker.com/r/featurebasedb/featurebas
- [kryptco/kr](https://github.com/kryptco/kr) - DEPRECATED A dev tool for SSH auth + Git commit/tag signing using a key stored in Krypton.
- [c0nrad/go-mbf](https://github.com/c0nrad/go-mbf) - MongoDB Login Brute Forcer
- [coreybutler/nvm-windows](https://github.com/coreybutler/nvm-windows) - A node.js version management utility for Windows. Ironically written in Go.
- [Shopify/toxiproxy](https://github.com/Shopify/toxiproxy) - :alarm_clock: :fire: A TCP proxy to simulate network and system conditions for chaos and resiliency testing
- [trufflesecurity/trufflehog](https://github.com/trufflesecurity/trufflehog) - Find, verify, and analyze leaked credentials
- [duolatech/xapimanager](https://github.com/duolatech/xapimanager) - XAPI MANAGER -专业实用的开源接口管理平台,为程序开发者提供一个灵活,方便,快捷的API管理工具,让API管理变的更加清晰、明朗。如果你觉得xApi对你有用的话,别忘了给我们点个赞哦^_^ !
- [fatedier/frp](https://github.com/fatedier/frp) - A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.
- [cilium/cilium](https://github.com/cilium/cilium) - eBPF-based Networking, Security, and Observability
- [linuxkit/linuxkit](https://github.com/linuxkit/linuxkit) - A toolkit for building secure, portable and lean operating systems for containers
- [weaveworks/scope](https://github.com/weaveworks/scope) - Monitoring, visualisation & management for Docker & Kubernetes
- [prasmussen/gdrive](https://github.com/prasmussen/gdrive) - Google Drive CLI Client
- [StackExchange/dnscontrol](https://github.com/StackExchange/dnscontrol) - Infrastructure as code for DNS!
- [sensepost/ruler](https://github.com/sensepost/ruler) - A tool to abuse Exchange services
- [0x4D31/honeybits](https://github.com/0x4D31/honeybits) - A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the attacker toward your honeypots
- [qiniu/qshell](https://github.com/qiniu/qshell) - Shell Tools for Qiniu Cloud
- [gonet2/geoip](https://github.com/gonet2/geoip) - query geo-locations of ips
- [lionsoul2014/ip2region](https://github.com/lionsoul2014/ip2region) - Ip2region (2.0 - xdb) is a offline IP address manager framework and locator, support billions of data segments, ten microsecond searching performance. xdb engine implementation for many programming la
- [michenriksen/gitrob](https://github.com/michenriksen/gitrob) - Reconnaissance tool for GitHub organizations
- [huichen/wukong](https://github.com/huichen/wukong) - 高度可定制的全文搜索引擎
- [beego/beego](https://github.com/beego/beego) - beego is an open-source, high-performance web framework for the Go programming language.
- [xtaci/kcptun](https://github.com/xtaci/kcptun) - A Quantum-Safe Secure Tunnel based on QPP, KCP, FEC, and N:M multiplexing.
- [unknwon/the-way-to-go_ZH_CN](https://github.com/unknwon/the-way-to-go_ZH_CN) - 《The Way to Go》中文译本,中文正式名《Go 入门指南》
- [urfave/negroni](https://github.com/urfave/negroni) - Idiomatic HTTP Middleware for Golang
- [ajermakovics/jvm-mon](https://github.com/ajermakovics/jvm-mon) - Console-based JVM monitoring tool
- [flike/kingshard](https://github.com/flike/kingshard) - A high-performance MySQL proxy## Groovy
- [ankushs92/geolocation-useragent-parser-rest-api](https://github.com/ankushs92/geolocation-useragent-parser-rest-api) - A very fast geolocation and user-agent analysis REST API. Written in Groovy on top of Vert.x platform.
## HCL
- [bridgecrewio/terragoat](https://github.com/bridgecrewio/terragoat) - TerraGoat is Bridgecrew's "Vulnerable by Design" Terraform repository. TerraGoat is a learning and training project that demonstrates how common configuration errors can find their way into production
- [HuskyHacks/PMAT-labs](https://github.com/HuskyHacks/PMAT-labs) - Labs for Practical Malware Analysis & Triage
- [christophetd/Adaz](https://github.com/christophetd/Adaz) - :wrench: Deploy customizable Active Directory labs in Azure - automatically.
- [nozaq/terraform-aws-secure-baseline](https://github.com/nozaq/terraform-aws-secure-baseline) - Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations and AWS Foundational Security Best Practices.
- [ralphte/devops_4_hackers](https://github.com/ralphte/devops_4_hackers) - DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)
- [cfalta/activedirectory-lab](https://github.com/cfalta/activedirectory-lab) - Terraform config to spin up a domain controller and some member servers in azure
- [easttimor/aws-incident-response](https://github.com/easttimor/aws-incident-response) -
- [stackrox/Kubernetes_Security_Specialist_Study_Guide](https://github.com/stackrox/Kubernetes_Security_Specialist_Study_Guide) -
- [anshumanbh/terraform-burp-collaborator](https://github.com/anshumanbh/terraform-burp-collaborator) - Terraform configuration to build a Burp Private Collaborator Server
- [netevert/sentinel-attack](https://github.com/netevert/sentinel-attack) - Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK## HTML
- [A10ha/EmailSender](https://github.com/A10ha/EmailSender) - 钓鱼邮件便捷发送工具(GUI)
- [2740908911/Pilot-Web](https://github.com/2740908911/Pilot-Web) - Pilot-Web:一款基于PythonFlask框架开发的前后端分离式渗透测试&漏洞挖掘Web靶场,内置WP与知识库的集成式教学靶场。
- [BambiZombie/QRPhish](https://github.com/BambiZombie/QRPhish) - 二维码钓鱼
- [gerosecurity/gerobug](https://github.com/gerosecurity/gerobug) - The First Open Source Bug Bounty Platform
- [Clouditera/Clouditera.github.io](https://github.com/Clouditera/Clouditera.github.io) - 塑造未来的安全领域智能革命
- [FY036/BurpGCR](https://github.com/FY036/BurpGCR) - burp的Decoder遇到汉字会出现乱码,此工具用来修复这个乱码
- [ybdt/pentest-hub](https://github.com/ybdt/pentest-hub) - Web打点及WAF绕过
- [quahac/Azure-AD-Password-Checker](https://github.com/quahac/Azure-AD-Password-Checker) - Azure AD Password Checker
- [SexyBeast233/SecBooks](https://github.com/SexyBeast233/SecBooks) - 安全类各家文库大乱斗
- [Potato-py/ExportReport](https://github.com/Potato-py/ExportReport) - 本项目用于自动化生成报告。可根据项目需求,通过简单的提取变量来自定义报告模板。内附常见扫描器API/原报告(awvs、xray、goby)数据提取模块,可直接生成全新的自定义报告。 对有复杂的功能需求时,适用于有Python基础的人使用。 本项目内附二次开发所用的资料文档,欢迎各位提Pull Request
- [f/awesome-chatgpt-prompts](https://github.com/f/awesome-chatgpt-prompts) - This repo includes ChatGPT prompt curation to use ChatGPT better.
- [dark-kingA/superSearchPlus](https://github.com/dark-kingA/superSearchPlus) - superSearchPlus是聚合型信息收集插件,支持综合查询,资产测绘查询,信息收集 敏感信息提取 js资源扫描 目录扫描 vue组件扫描 整合了目前常见的资产测绘平台 专为白帽子提供快速侦测目标。
- [karthi-the-hacker/Gh0stR3c0n](https://github.com/karthi-the-hacker/Gh0stR3c0n) - All in one web Recon app
- [code-scan/LoginFish](https://github.com/code-scan/LoginFish) - 通用登录页面安全控件钓鱼
- [Phuong39/PoC-CVE-2021-30632](https://github.com/Phuong39/PoC-CVE-2021-30632) - PoC CVE-2021-30632 - Out of bounds write in V8
- [Wrong-pixel/inforgation](https://github.com/Wrong-pixel/inforgation) -
- [trickest/cve](https://github.com/trickest/cve) - Gather and update all available and newest CVEs with their PoC.
- [theori-io/CVE-2022-26717-Safari-WebGL-Exploit](https://github.com/theori-io/CVE-2022-26717-Safari-WebGL-Exploit) -
- [mahp/jQuery-with-XSS](https://github.com/mahp/jQuery-with-XSS) - jQuery with XSS, Testing and Secure Version
- [alufers/mitmproxy2swagger](https://github.com/alufers/mitmproxy2swagger) - Automagically reverse-engineer REST APIs via capturing traffic
- [KhronosGroup/glTF](https://github.com/KhronosGroup/glTF) - glTF – Runtime 3D Asset Delivery
- [Threekiii/Vulnerability-Wiki](https://github.com/Threekiii/Vulnerability-Wiki) - 基于 docsify 快速部署 Awesome-POC 中的漏洞文档
- [shengshengli/SecExample](https://github.com/shengshengli/SecExample) - java漏洞靶场
- [satan1a/TheRoadOfSO](https://github.com/satan1a/TheRoadOfSO) - 学习安全运营的记录 | The knowledge base of security operation
- [lovechoudoufu/baselinecheck_cdf](https://github.com/lovechoudoufu/baselinecheck_cdf) - Security check of system baseline.服务器基线检查工具。基于python3造的对linux、windows服务器做基线核查的轮子。
- [Th30neAnd0nly/AIRAVAT](https://github.com/Th30neAnd0nly/AIRAVAT) - A multifunctional Android RAT with GUI based Web Panel without port forwarding.
- [kagancapar/CVE-2022-29072](https://github.com/kagancapar/CVE-2022-29072) - 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.
- [ultrasecurity/Storm-Breaker](https://github.com/ultrasecurity/Storm-Breaker) - Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}
- [lijiejie/eyes.sh](https://github.com/lijiejie/eyes.sh) - Optimized DNS/HTTP Log Tool for pentesters, faster and easy to use.
- [jatinkalwar/fisher](https://github.com/jatinkalwar/fisher) - New phishing tool with 30+ templates updated tool
- [JDArmy/RTASS](https://github.com/JDArmy/RTASS) - 红蓝对抗量化评估系统(Red Team Assessment Scoring System)
- [reconmap/pentest-reports-static](https://github.com/reconmap/pentest-reports-static) - Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.
- [redteamwiki/redteamwiki](https://github.com/redteamwiki/redteamwiki) -
- [etlownoise/xolo](https://github.com/etlownoise/xolo) - Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest hacking team exercises.
- [Rvn0xsy/SMTP-NC](https://github.com/Rvn0xsy/SMTP-NC) - SMTP Netcat , test SMTP protocol
- [jgamblin/CPEData](https://github.com/jgamblin/CPEData) - NVD CPE Data
- [orleven/Celestion](https://github.com/orleven/Celestion) - Celestion 是一个无回显漏洞测试辅助平台,平台使用flask编写,提供DNSLOG,HTTPLOG等功能。 (界面懒得弄,后续有需要再说)。
- [terryvogelsang/PentestFTW](https://github.com/terryvogelsang/PentestFTW) - Penetration Testing tips & tricks
- [roottusk/vapi](https://github.com/roottusk/vapi) - vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.
- [tb0hdan/domains](https://github.com/tb0hdan/domains) - World’s single largest Internet domains dataset
- [xsscx/Commodity-Injection-Signatures](https://github.com/xsscx/Commodity-Injection-Signatures) - Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT
- [Ed1s0nZ/cool](https://github.com/Ed1s0nZ/cool) - Golang-Gin 框架写的免杀平台,内置分离、捆绑等多种BypassAV方式。
- [ybdt/post-hub](https://github.com/ybdt/post-hub) - 后渗透
- [chroblert/Flash-Pop2](https://github.com/chroblert/Flash-Pop2) - Flash-Pop升级版
- [EdOverflow/bugbountyguide](https://github.com/EdOverflow/bugbountyguide) - Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.
- [tombstoneghost/TIWAP](https://github.com/tombstoneghost/TIWAP) - Totally Insecure Web Application Project (TIWAP)
- [mpast/mobileAudit](https://github.com/mpast/mobileAudit) - Django application that performs SAST and Malware Analysis for Android APKs
- [klezVirus/CVE-2021-40444](https://github.com/klezVirus/CVE-2021-40444) - CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
- [OWASP/Top10](https://github.com/OWASP/Top10) - Official OWASP Top 10 Document Repository
- [lockedbyte/CVE-2021-40444](https://github.com/lockedbyte/CVE-2021-40444) - CVE-2021-40444 PoC
- [ybdt/fish-hub](https://github.com/ybdt/fish-hub) - 社工钓鱼
- [HangZhouCat/ReaverAPKTools](https://github.com/HangZhouCat/ReaverAPKTools) - 逆向APK工具
- [cckuailong/vulbase](https://github.com/cckuailong/vulbase) - 各大漏洞文库合集
- [techchipnet/CamPhish](https://github.com/techchipnet/CamPhish) - Grab cam shots from target's phone front camera or PC webcam just sending a link.
- [Accruent/owasp-zap-historic](https://github.com/Accruent/owasp-zap-historic) - Store ZAP reports historically and compare current ZAP results against the most recent for changes in alerts.
- [OtherDevOpsGene/zap-sonar-plugin](https://github.com/OtherDevOpsGene/zap-sonar-plugin) - Integrates OWASP Zed Attack Proxy reports into SonarQube
- [IQTLabs/AuraBorealisApp](https://github.com/IQTLabs/AuraBorealisApp) - Do You Know What's In Your Python Packages? A Tool for Visualizing Python Package Registry Security Audit Data
- [r00tk1ts/binary-security-tutorial](https://github.com/r00tk1ts/binary-security-tutorial) - Resource assembly of 'Binary Security Tutorial' online course of mine. Video link:https://pan.baidu.com/s/1ltcHIehhLFVFMvru6tGQ8A Passwd:axje
- [OWASP/NodeGoat](https://github.com/OWASP/NodeGoat) - The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them.
- [tangxiaofeng7/SecExample](https://github.com/tangxiaofeng7/SecExample) - JAVA 漏洞靶场 (Vulnerability Environment For Java)
- [iknowjason/BlueCloud](https://github.com/iknowjason/BlueCloud) - Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.
- [The-Login/DNS-Reset-Checker](https://github.com/The-Login/DNS-Reset-Checker) - Tools to assess the DNS security of web applications
- [rpetrich/deciduous](https://github.com/rpetrich/deciduous) - App that simplifies building decision trees to model adverse scenarios
- [M4tir/M-Scan](https://github.com/M4tir/M-Scan) - Optical Chain Scanner 光链安全扫描器
- [chainflag/ctfd-neon-theme](https://github.com/chainflag/ctfd-neon-theme) -
- [ctf-wiki/ctf-challenges](https://github.com/ctf-wiki/ctf-challenges) -
- [Cl0udG0d/pppXray](https://github.com/Cl0udG0d/pppXray) - Xray批量化自动扫描
- [woj-ciech/Shomap](https://github.com/woj-ciech/Shomap) - Create visualization from Shodan query
- [TomAPU/schemeflood](https://github.com/TomAPU/schemeflood) - schemeflood demo
- [satan1a/awesome-cybersecurity-blueteam-cn](https://github.com/satan1a/awesome-cybersecurity-blueteam-cn) - 网络安全 · 攻防对抗 · 蓝队清单,中文版
- [HacktivistRO/Bug-Bounty-Wordlists](https://github.com/HacktivistRO/Bug-Bounty-Wordlists) -
- [s7ckTeam/sWebScanner](https://github.com/s7ckTeam/sWebScanner) - 作为一个网络安全从业人员,在测试网站目录时,常用的就是御剑,7kb等几款,使用下来始终觉得缺少了什么东西,于是重复造了一个轮子,此版本支持自定义字典,返回大小,代理IP模式,爆破模式
- [ripienaar/free-for-dev](https://github.com/ripienaar/free-for-dev) - A list of SaaS, PaaS and IaaS offerings that have free tiers of interest to devops and infradev
- [Puliczek/CVE-2021-21123-PoC-Google-Chrome](https://github.com/Puliczek/CVE-2021-21123-PoC-Google-Chrome) - 🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...
- [ustayready/CredSniper](https://github.com/ustayready/CredSniper) - CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens.
- [M-Kings/BypassAv-web](https://github.com/M-Kings/BypassAv-web) - nim一键免杀
- [collabnix/kubetools](https://github.com/collabnix/kubetools) - Kubetools - Curated List of Kubernetes Tools
- [jonasstrehle/supercookie](https://github.com/jonasstrehle/supercookie) - ⚠️ Browser fingerprinting via favicon!
- [zwc456baby/file-proxy](https://github.com/zwc456baby/file-proxy) - 文件代下载服务,github文件加速下载,支持任意文件格式。支持命令行代下,支持子节点权重负载均衡。
- [alivx/CIS-Ubuntu-20.04-Ansible](https://github.com/alivx/CIS-Ubuntu-20.04-Ansible) - Ansible Role to Automate CIS v1.1.0 Ubuntu Linux 18.04 LTS, 20.04 LTS Remediation
- [WADComs/WADComs.github.io](https://github.com/WADComs/WADComs.github.io) - WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
- [xsleaks/wiki](https://github.com/xsleaks/wiki) - XS-Leaks Wiki
- [ethicalhackingplayground/SubNuke](https://github.com/ethicalhackingplayground/SubNuke) - Subdomain Takeover tool with web UI
- [Ap0k4L1p5/Ap0k4L1p5.github.io](https://github.com/Ap0k4L1p5/Ap0k4L1p5.github.io) - Portfolio website.
- [madhuakula/security-automation-with-ansible-2](https://github.com/madhuakula/security-automation-with-ansible-2) - Ansible Playbooks for Security Automation with Ansible2 book
- [gh0stkey/Web-Fuzzing-Box](https://github.com/gh0stkey/Web-Fuzzing-Box) - Web Fuzzing Box - Web 模糊测试字典与一些Payloads
- [ybdt/exp-hub](https://github.com/ybdt/exp-hub) - 漏洞复现及武器化
- [Cl0udG0d/HXnineTails](https://github.com/Cl0udG0d/HXnineTails) - python3实现的集成了github上多个扫描工具的命令行WEB扫描工具
- [jas502n/Security_Article](https://github.com/jas502n/Security_Article) - scrapy website Article and link ...
- [Wileysec/adobe-flash-phishing-page](https://github.com/Wileysec/adobe-flash-phishing-page) - Adobe Flash Phishing Page(Adobe Flash钓鱼页面)
- [ericchiang/pup](https://github.com/ericchiang/pup) - Parsing HTML at the command line
- [ffffffff0x/AboutSecurity](https://github.com/ffffffff0x/AboutSecurity) - Everything for pentest. | 用于渗透测试的 payload 和 bypass 字典.
- [doocop/Flash_Xss](https://github.com/doocop/Flash_Xss) - Flash最新钓鱼源码对接官方API实现跟随官方升级而升级
- [fwonggh/Bthub](https://github.com/fwonggh/Bthub) - Bthub最新地址发布页
- [qkqpttgf/OneManager-php](https://github.com/qkqpttgf/OneManager-php) - An index & manager of Onedrive based on serverless. Can be deployed to Heroku/Glitch/Vercel/Replit/SCF/FG/FC/CFC/PHP web hosting/VPS.
- [sense-of-security/ADRecon](https://github.com/sense-of-security/ADRecon) - ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.
- [BaizeSec/bylibrary](https://github.com/BaizeSec/bylibrary) - 白阁文库是白泽Sec安全团队维护的一个漏洞POC和EXP公开项目
- [hunzaboy/CodedMailsFree](https://github.com/hunzaboy/CodedMailsFree) - Ready to use 50+ responsive HTML email templates - Codedmails Free
- [DefectDojo/django-DefectDojo](https://github.com/DefectDojo/django-DefectDojo) - DevSecOps, ASPM, Vulnerability Management. All on one platform.
- [MS-WEB-BN/c41n](https://github.com/MS-WEB-BN/c41n) - Automated rogue access point setup tool.
- [wgpsec/VulnRange](https://github.com/wgpsec/VulnRange) - 漏洞靶场-快速搭建Web安全漏洞和第三方组件漏洞环境,用于漏洞复现和研究
- [zgjx6/SocialEngineeringDictionaryGenerator](https://github.com/zgjx6/SocialEngineeringDictionaryGenerator) - 社会工程学密码生成器,是一个利用个人信息生成密码的工具
- [sbousseaden/EVTX-ATTACK-SAMPLES](https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES) - Windows Events Attack Samples
- [r00tSe7en/Flash-Pop](https://github.com/r00tSe7en/Flash-Pop) - Flash钓鱼弹窗优化版
- [EtherDream/js-port-knocking](https://github.com/EtherDream/js-port-knocking) - Web 端口敲门的奇思妙想
- [SummerSec/JavaLearnVulnerability](https://github.com/SummerSec/JavaLearnVulnerability) - Java漏洞学习笔记 Deserialization Vulnerability
- [Humoud/apksneeze-lab](https://github.com/Humoud/apksneeze-lab) - Analyze Android APK files from a browser.
- [OWASP/www-project-integration-standards](https://github.com/OWASP/www-project-integration-standards) - OWASP Foundation Web Respository
- [DasSecurity-HatLab/HatLab_IOT_Wiki](https://github.com/DasSecurity-HatLab/HatLab_IOT_Wiki) - 海特实验室物联网安全知识库
- [KnightSec-Official/Phlexish](https://github.com/KnightSec-Official/Phlexish) - Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk
- [math1as/Windows-GDI-fuzzer](https://github.com/math1as/Windows-GDI-fuzzer) - Windows Graphics Device Interface (GDI+) fuzzer
- [sayaanalam/CORS-EXPLOIT](https://github.com/sayaanalam/CORS-EXPLOIT) -
- [mixmark-io/turndown](https://github.com/mixmark-io/turndown) - 🛏 An HTML to Markdown converter written in JavaScript
- [yogeshojha/rengine](https://github.com/yogeshojha/rengine) - reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous mon
- [dongfangyuxiao/BurpExtend](https://github.com/dongfangyuxiao/BurpExtend) - 基于Burp插件开发打造渗透测试自动化
- [FeeiCN/Security-PPT](https://github.com/FeeiCN/Security-PPT) - Security-related Slide Presentation & Security Research Report(大安全各领域各公司各会议分享的PPT以及各类安全研究报告)
- [madhuakula/kubernetes-goat](https://github.com/madhuakula/kubernetes-goat) - Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
- [momenbasel/keyFinder](https://github.com/momenbasel/keyFinder) - Keyfinder🔑 is a tool that let you find keys while surfing the web!
- [Arryboom/Language](https://github.com/Arryboom/Language) - Some dirty tricks to learn different programming language.
- [humblelad/Needle](https://github.com/humblelad/Needle) - Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip
- [UnkL4b/BabyShark](https://github.com/UnkL4b/BabyShark) - Basic C2 Server
- [Cl0udG0d/SZhe_Scan](https://github.com/Cl0udG0d/SZhe_Scan) - 碎遮SZhe_Scan Web漏洞扫描器,基于python Flask框架,对输入的域名/IP进行全面的信息搜集,漏洞扫描,可自主添加POC
- [guhe120/Windows-EoP](https://github.com/guhe120/Windows-EoP) - Windows EoP Bugs
- [subspacecommunity/subspace](https://github.com/subspacecommunity/subspace) - A fork of the simple WireGuard VPN server GUI community maintained
- [mubix/post-exploitation-wiki](https://github.com/mubix/post-exploitation-wiki) - Post Exploitation Wiki
- [nccgroup/autochrome](https://github.com/nccgroup/autochrome) - This tool downloads, installs, and configures a shiny new copy of Chromium.
- [knassar702/hacking-lab](https://github.com/knassar702/hacking-lab) - Small Vulnerable Web App
- [Mr-xn/BurpSuite-collections](https://github.com/Mr-xn/BurpSuite-collections) - 有关burpsuite的插件(非商店),文章以及使用技巧的收集(此项目不再提供burpsuite破解文件,如需要请在博客mrxn.net下载)---Collection of burpsuite plugins (non-stores), articles and tips for using Burpsuite, no crack version file
- [hackxc/xss_flash](https://github.com/hackxc/xss_flash) - Xss之Flash钓鱼
- [proabiral/inception](https://github.com/proabiral/inception) - A highly configurable Framework for easy automated web scanning
- [vavkamil/bugbountytip.com](https://github.com/vavkamil/bugbountytip.com) - Flask powered website to display tweets with a hashtag #bugbountytip
- [bb1nfosec/Information-Security-Tasks](https://github.com/bb1nfosec/Information-Security-Tasks) - This repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on pr
- [si9int/Subra](https://github.com/si9int/Subra) - A Web-UI for subdomain enumeration (subfinder)
- [clong/DetectionLab](https://github.com/clong/DetectionLab) - Automate the creation of a lab environment complete with security tooling and logging best practices
- [drduh/YubiKey-Guide](https://github.com/drduh/YubiKey-Guide) - Guide to using YubiKey for GnuPG and SSH
- [nu11secur1ty/Windows10Exploits](https://github.com/nu11secur1ty/Windows10Exploits) - Microsoft » Windows 10 : Security Vulnerabilities
- [myvyang/chromium_for_spider](https://github.com/myvyang/chromium_for_spider) - dynamic crawler for web vulnerability scanner
- [mewcoder/SharedCourses](https://github.com/mewcoder/SharedCourses) - 大学课程共享计划整理
- [Mr-xn/Penetration_Testing_POC](https://github.com/Mr-xn/Penetration_Testing_POC) - 渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cm
- [Coq-zh/SF-zh](https://github.com/Coq-zh/SF-zh) - 《软件基础》中译版 Software Foundations Chinese Translation
- [forecho/hugo-theme-echo](https://github.com/forecho/hugo-theme-echo) - A super concise theme for Hugo
- [nshalabi/ATTACK-Tools](https://github.com/nshalabi/ATTACK-Tools) - Utilities for MITRE™ ATT&CK
- [HiddenStrawberry/Crawler_Illegal_Cases_In_China](https://github.com/HiddenStrawberry/Crawler_Illegal_Cases_In_China) - Collection of China illegal cases about web crawler 本项目用来整理所有中国大陆爬虫开发者涉诉与违规相关的新闻、资料与法律法规。致力于帮助在中国大陆工作的爬虫行业从业者了解我国相关法律,避免触碰数据合规红线。 [AD]中文知识图谱门户
- [shubhamshubhankar/DumpTheGit](https://github.com/shubhamshubhankar/DumpTheGit) - DumpTheGit searches through public repositories to find sensitive information uploaded to the Github repositories.
- [xfirefly/Airplay-SDK](https://github.com/xfirefly/Airplay-SDK) - The Best Airplay SDK supports Airplay Mirroring and AirPlay Casting to a receiver device.
- [wangweianger/APubPlat](https://github.com/wangweianger/APubPlat) - Devops自动化部署、堡垒机开源项目、Web Terminal
- [ColorlibHQ/gentelella](https://github.com/ColorlibHQ/gentelella) - Free Bootstrap 4 Admin Dashboard Template
- [decal/werdlists](https://github.com/decal/werdlists) - :keyboard: Wordlists, Dictionaries and Other Data Sets for Writing Software Security Test Cases
- [r00t-3xp10it/morpheus](https://github.com/r00t-3xp10it/morpheus) - Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)
- [maaaaz/androwarn](https://github.com/maaaaz/androwarn) - Yet another static code analyzer for malicious Android applications
- [cch123/golang-notes](https://github.com/cch123/golang-notes) - Go source code analysis(zh-cn)
- [xazlsec/APT_Sample-Weapoon](https://github.com/xazlsec/APT_Sample-Weapoon) - Pull some collected APT group related samples, ransomware, remote control and other malicious programs for security researchers to use.
- [rigtorp/awesome-modern-cpp](https://github.com/rigtorp/awesome-modern-cpp) - A collection of resources on modern C++
- [yzhu798/CodingInterviewsNotes](https://github.com/yzhu798/CodingInterviewsNotes) - 涵盖C++ Primer 5th、 effective C++ 、 STL api和demos C++ 基础知识与理论、 智能指针、C++11、 Git教程 Linux命令 Unix操作系统(进程、线程、内存管理、信号)计算机网络、 数据结构(排序、查找)、数据库、、C++对象模型、 设计模式、算法(《剑指offer》、leetcode、lintcode、hihocoder、《王道程序员求职宝典》
- [Ebryx/Nessus_Map](https://github.com/Ebryx/Nessus_Map) - Parse .nessus file(s) and shows output in interactive UI
- [yaseng/iot-security-wiki](https://github.com/yaseng/iot-security-wiki) - IOT security wiki
- [LangziFun/LangNetworkTopologys](https://github.com/LangziFun/LangNetworkTopologys) - 端口扫描,指纹识别,网站探测,结果整理
- [gh0stkey/RGPerson](https://github.com/gh0stkey/RGPerson) - RGPerson - Randomly generate identity information
- [cncf/tag-security](https://github.com/cncf/tag-security) - 🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!
- [RomanEmelyanov/CobaltStrikeForensic](https://github.com/RomanEmelyanov/CobaltStrikeForensic) - Toolset for research malware and Cobalt Strike beacons
- [biggerwing/nsfocus-rsas-knowledge-base](https://github.com/biggerwing/nsfocus-rsas-knowledge-base) - 绿盟科技漏洞扫描器(RSAS)漏洞库
- [helloxz/ccaa](https://github.com/helloxz/ccaa) - 此项目不再维护,推荐使用Zdir替代!
- [ningbonb/HTML5](https://github.com/ningbonb/HTML5) - HTML5学习、总结、实践
- [go101/go101](https://github.com/go101/go101) - An up-to-date (unofficial) knowledge base for Go programming self learning
- [JeffXue/web-log-parser](https://github.com/JeffXue/web-log-parser) - An open source analysis web log tool
- [honze-net/nmap-bootstrap-xsl](https://github.com/honze-net/nmap-bootstrap-xsl) - A Nmap XSL implementation with Bootstrap.
- [sisoc-tokyo/Real-timeDetectionAD_ver2](https://github.com/sisoc-tokyo/Real-timeDetectionAD_ver2) -
- [tanjiti/sec_profile](https://github.com/tanjiti/sec_profile) - 爬取secwiki和xuanwu.github.io/sec.today,分析安全信息站点、安全趋势、提取安全工作者账号(twitter,weixin,github等)
- [chg122345/mall](https://github.com/chg122345/mall) - ssm小商城
- [zaiyunduan123/springboot-manage](https://github.com/zaiyunduan123/springboot-manage) - 基于SpringBoot + Mybatis + Thymeleaf + Redis + MongoDB + MySQL开发的商品管理系统
- [hookmaster/frida-all-in-one](https://github.com/hookmaster/frida-all-in-one) - 《FRIDA操作手册》by @hluwa @r0ysue
- [buyingfei/live](https://github.com/buyingfei/live) - 完整搭建直播平台实例
- [QSCTech/zju-icicles](https://github.com/QSCTech/zju-icicles) - 浙江大学课程攻略共享计划
- [cainiaocome/xssgun](https://github.com/cainiaocome/xssgun) - xss payloads generator
- [Ridter/cs_custom_404](https://github.com/Ridter/cs_custom_404) - Cobalt strike custom 404 page
- [M4cs/BabySploit](https://github.com/M4cs/BabySploit) - :baby: BabySploit Beginner Pentesting Toolkit/Framework Written in Python :snake:
- [ym2011/SecurityMind](https://github.com/ym2011/SecurityMind) - share experience towards for information management, brainstorming and so on.
- [Raul1718/sec_profile](https://github.com/Raul1718/sec_profile) - 安全行业信息趋势分析
- [gdufeZLYL/springboot-penguin](https://github.com/gdufeZLYL/springboot-penguin) - :penguin:Online Examination System 基于SpringBoot+Mybatis+Thymeleaf+SemanticUI+Bootstrap的在线考试系统(低仿牛客网)
- [micyo202/yan-demo](https://github.com/micyo202/yan-demo) - 本项目是基于 SpringMVC+Spring+MyBatis (SSM) 架构的高效率便捷开发框架
- [C4o/ChineseDarkWebCrawler](https://github.com/C4o/ChineseDarkWebCrawler) - 中文暗网爬虫
- [2024baibai/flask_multi_uploader](https://github.com/2024baibai/flask_multi_uploader) - flask+webuploader实现多文件上传
- [posclegom/programthink](https://github.com/posclegom/programthink) - for 热心读者
- [Igglybuff/awesome-piracy](https://github.com/Igglybuff/awesome-piracy) - A curated list of awesome warez and piracy links
- [TgeaUs/Weak-password](https://github.com/TgeaUs/Weak-password) - 字典大全 dictionary
- [nsacyber/Windows-Secure-Host-Baseline](https://github.com/nsacyber/Windows-Secure-Host-Baseline) - Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber
- [fate0/proxylist](https://github.com/fate0/proxylist) - proxylist, generate by fate0/getproxy project in every 15 minute
- [salesforce/vulnreport](https://github.com/salesforce/vulnreport) - Open-source pentesting management and automation platform by Salesforce Product Security
- [anquanquantao/pentraining](https://github.com/anquanquantao/pentraining) - 一个网络安全基础知识的教程。内容比较杂,好在都是实验视频和工具提供,可以自行动手完成实验。
- [NetSPI/SQLInjectionWiki](https://github.com/NetSPI/SQLInjectionWiki) - A wiki focusing on aggregating and documenting various SQL injection methods
- [davideuler/architecture.of.internet-product](https://github.com/davideuler/architecture.of.internet-product) - 互联网公司技术架构,微信/淘宝/微博/腾讯/阿里/美团点评/百度/OpenAI/Google/Facebook/Amazon/eBay的架构,欢迎PR补充
- [iwannarun/JavaWiki](https://github.com/iwannarun/JavaWiki) - 不定期收集与JAVA有关书籍或文章
- [zhangkaitao/shiro-example](https://github.com/zhangkaitao/shiro-example) - 跟我学Shiro(我的公众号:kaitao-1234567,我的新书:《亿级流量网站架构核心技术》)
- [tennc/fuzzdb](https://github.com/tennc/fuzzdb) - Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
- [skulltech/wordpress-vulscan](https://github.com/skulltech/wordpress-vulscan) - WordPress vulnerability scanner
- [intezer/linux-explorer](https://github.com/intezer/linux-explorer) - Easy-to-use live forensics toolbox for Linux endpoints
- [Wscats/CV](https://github.com/Wscats/CV) - :see_no_evil:Front End Engineer Curriculum Vitae - 面试宝典和简历生成器
- [securitytxt/security-txt](https://github.com/securitytxt/security-txt) - A proposed standard that allows websites to define security policies.
- [Xyntax/Campus-FakeAP](https://github.com/Xyntax/Campus-FakeAP) - 针对校园网的wifi钓鱼工具
- [Ph0en1x-XMU/Awesome-CTF-Book](https://github.com/Ph0en1x-XMU/Awesome-CTF-Book) - Study CTF, study security
- [CHYbeta/WAF-Bypass](https://github.com/CHYbeta/WAF-Bypass) - WAF Bypass Cheatsheet
- [leizongmin/js-xss](https://github.com/leizongmin/js-xss) - Sanitize untrusted HTML (to prevent XSS) with a configuration specified by a Whitelist
- [pingfangx/TranslatorX](https://github.com/pingfangx/TranslatorX) - JetBrains 系列软件汉化包 关键字: Android Studio 3.5 汉化包 CLion 2019.3 汉化包 DataGrip 2019.3 汉化包 GoLand 2019.3 汉化包 IntelliJ IDEA 2019.3 汉化包 PhpStorm 2019.3 汉化包 PyCharm 2019.3 汉化包 Rider 2019.3 汉化包 RubyMine 2019.3 汉化
- [ewen0930/PyCharm-Chinese](https://github.com/ewen0930/PyCharm-Chinese) - PyCharm Chinese Language Pack(中文语言包)
- [rootclay/Powershell-Attack-Guide](https://github.com/rootclay/Powershell-Attack-Guide) - Powershell攻击指南----黑客后渗透之道
- [vanhoefm/krackattacks](https://github.com/vanhoefm/krackattacks) -
- [Magicalex/seedbox-manager](https://github.com/Magicalex/seedbox-manager) - [UNMAINTAINED] Web app for manage your seedbox
- [vl0ms/docker-armhf-torrentbox](https://github.com/vl0ms/docker-armhf-torrentbox) - Docker image with nginx + php5-fpm + rtorrent + rutorrent(web ui) started with supervisord
- [xuechiyaobai/CVE-2017-7092-PoC](https://github.com/xuechiyaobai/CVE-2017-7092-PoC) - This is the Pwn2Own 2017 Safari backup vul's exploit.
- [CHYbeta/Software-Security-Learning](https://github.com/CHYbeta/Software-Security-Learning) - Software-Security-Learning
- [CHYbeta/Web-Security-Learning](https://github.com/CHYbeta/Web-Security-Learning) - Web-Security-Learning
- [me115/linuxtools_rst](https://github.com/me115/linuxtools_rst) - Linux工具快速教程
- [pointbiz/bitaddress.org](https://github.com/pointbiz/bitaddress.org) - JavaScript Client-Side Bitcoin Wallet Generator
- [HACK-BLOSSOM/DIY-Cybersecurity-For-Domestic-Violence](https://github.com/HACK-BLOSSOM/DIY-Cybersecurity-For-Domestic-Violence) - Abuse adapts to technology. You deserve privacy and compassion.
- [twngo/privacytools-zh](https://github.com/twngo/privacytools-zh) - privacytool.io -Traditional Chinese version
- [privacytools/privacytools.io](https://github.com/privacytools/privacytools.io) - 🛡🛠 You are being watched. Protect your privacy against global mass surveillance.
- [l3m0n/wooyun-wiki](https://github.com/l3m0n/wooyun-wiki) - wiki.wooyun.org的部分快照网页
- [odin1314/skills](https://github.com/odin1314/skills) - Linux、WAF、正则、web安全等一些知识点的总结
- [rdkmaster/jigsaw](https://github.com/rdkmaster/jigsaw) - Jigsaw七巧板 provides a set of web components based on Angular5/8/9+. The main purpose of Jigsaw is to help the application developers to construct complex & intensive interacting & user friendly web pag
- [burpsuite/Manual](https://github.com/burpsuite/Manual) -
- [sukeesh/Music-Downloader](https://github.com/sukeesh/Music-Downloader) - Download any music from web
- [chrisallenlane/drek](https://github.com/chrisallenlane/drek) - A static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a large application, with an emphasis on identifying development an
- [ihebski/angryFuzzer](https://github.com/ihebski/angryFuzzer) - Tools for information gathering
- [bitcoinbook/bitcoinbook](https://github.com/bitcoinbook/bitcoinbook) - Mastering Bitcoin 3rd Edition - Programming the Open Blockchain
- [wisec/domxsswiki](https://github.com/wisec/domxsswiki) - Automatically exported from code.google.com/p/domxsswiki
- [byoungd/English-level-up-tips](https://github.com/byoungd/English-level-up-tips) - An advanced guide to learn English which might benefit you a lot 🎉 . 离谱的英语学习指南/英语学习教程。
- [SecWiki/ipot](https://github.com/SecWiki/ipot) - Honeypot Research Blog 蜜罐技术研究小组
- [keithjjones/visualize_logs](https://github.com/keithjjones/visualize_logs) - A Python library and command line tools to provide interactive log visualization.
- [ITI/ICS-Security-Tools](https://github.com/ITI/ICS-Security-Tools) - Tools, tips, tricks, and more for exploring ICS Security.
- [bitdust/WamaCry](https://github.com/bitdust/WamaCry) - a fake WannaCry
- [juliocesarfort/public-pentesting-reports](https://github.com/juliocesarfort/public-pentesting-reports) - A list of public penetration test reports published by several consulting firms and academic security groups.
- [cure53/HTTPLeaks](https://github.com/cure53/HTTPLeaks) - HTTPLeaks - All possible ways, a website can leak HTTP requests
- [SamJoan/droopescan](https://github.com/SamJoan/droopescan) - A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe.
- [SuperKieran/WooyunDrops](https://github.com/SuperKieran/WooyunDrops) - Wooyun知识库,乌云知识库,https://wooyun.kieran.top
- [FluxionNetwork/fluxion](https://github.com/FluxionNetwork/fluxion) - Fluxion is a remake of linset by vk496 with enhanced functionality.
- [ZJU-NewMirrors/OldMirrorsFrontend](https://github.com/ZJU-NewMirrors/OldMirrorsFrontend) - mirrors.zju.edu.cn
- [beckyricha/Broadlink-RM-SmartThings-Alexa](https://github.com/beckyricha/Broadlink-RM-SmartThings-Alexa) - Control RF and Ir devices using SmartThings and Alexa.
- [sbehrens/sleepy-puppy](https://github.com/sbehrens/sleepy-puppy) - Deprecated please use https://github.com/Netflix/sleepy-puppy
- [phodal/fe](https://github.com/phodal/fe) - 《我的职业是前端工程师》 - Ebook:I'm a FrontEnd Developer
- [n0tr00t/Sreg](https://github.com/n0tr00t/Sreg) - Sreg可对使用者通过输入email、phone、username的返回用户注册的所有互联网护照信息。
- [Xyntax/1000php](https://github.com/Xyntax/1000php) - 1000个PHP代码审计案例(2016.7以前乌云公开漏洞)
- [chromium/badssl.com](https://github.com/chromium/badssl.com) - :lock: Memorable site for testing clients against bad SSL configs.
- [solid/solid](https://github.com/solid/solid) - Solid - Re-decentralizing the web (project directory)
- [cloudtracer/ThreatPinchLookup](https://github.com/cloudtracer/ThreatPinchLookup) - Documentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
- [SebastianElvis/ElvisProjs](https://github.com/SebastianElvis/ElvisProjs) -
- [exploitprotocol/material-blog](https://github.com/exploitprotocol/material-blog) -
- [ubuntu/ubuntu-make](https://github.com/ubuntu/ubuntu-make) - Easy setup of common tools for developers on Ubuntu.
- [elasticsearch-cn/elasticsearch-definitive-guide](https://github.com/elasticsearch-cn/elasticsearch-definitive-guide) - 欢迎加QQ群:109764489,贡献力量!
- [iros/d3-v4-whats-new](https://github.com/iros/d3-v4-whats-new) -
- [yiminghe/learning-react](https://github.com/yiminghe/learning-react) - materials about learning react
- [HT524/500LineorLess_CN](https://github.com/HT524/500LineorLess_CN) - 500 line or less 中文翻译计划。
- [suhanyujie/php_webDataMining](https://github.com/suhanyujie/php_webDataMining) - php_webDataMining,PHP网络数据挖掘,第一个应用是爬取并分析和(草)谐(榴)论坛的一个版块数据并作可视化分析
- [yoghurtjia/Zhihu_bigdata](https://github.com/yoghurtjia/Zhihu_bigdata) - 使用scrapy和pandas完成对知乎300w用户的数据分析。首先使用scrapy爬取知乎网的300w,用户资料,最后使用pandas对数据进行过滤,找出想要的知乎大牛,并用图表的形式可视化。## Hack
- [justid/InlineAMP](https://github.com/justid/InlineAMP) - InlineAMP is an AMP ready WordPress theme.
## Haskell
- [dapphub/dapptools](https://github.com/dapphub/dapptools) - Dapp, Seth, Hevm, and more
- [jekor/gressgraph](https://github.com/jekor/gressgraph) - visualize your iptables firewall
- [github/semantic](https://github.com/github/semantic) - Parsing, analyzing, and comparing source code across many languages
- [digitallyinduced/ihp](https://github.com/digitallyinduced/ihp) - 🔥 The fastest way to build type safe web apps. IHP is a new batteries-included web framework optimized for longterm productivity and programmer happiness
- [iostreamer-X/FuncShell](https://github.com/iostreamer-X/FuncShell) - Improve your shell by making it functional through Haskell! (An update to Awkward)
- [huangzworks/real-world-haskell-cn](https://github.com/huangzworks/real-world-haskell-cn) - 《Real World Haskell》中文翻译项目## Inno Setup
- [mentebinaria/retoolkit](https://github.com/mentebinaria/retoolkit) - Reverse Engineer's Toolkit
## Java
- [winezer0/passive-scan-client-plus](https://github.com/winezer0/passive-scan-client-plus) - burpsuite passive-scan-client 插件持续维护分支 v2024
- [keven1z/simpleIAST](https://github.com/keven1z/simpleIAST) - simpleIAST- 基于污点追踪的灰盒漏洞扫描工具。
- [X1r0z/Godzilla-Suo5MemShell](https://github.com/X1r0z/Godzilla-Suo5MemShell) - 使用 Godzilla 一键注入 Suo5 内存马
- [shuanx/BurpAPIFinder](https://github.com/shuanx/BurpAPIFinder) - 攻防演练过程中,我们通常会用浏览器访问一些资产,但很多未授权/敏感信息/越权隐匿在已访问接口过html、JS文件等,该插件能让我们发现未授权/敏感信息/越权/登陆接口等。
- [R4gd0ll/LazyAnFuZai](https://github.com/R4gd0ll/LazyAnFuZai) - 安服吗喽化工具
- [MInggongK/jeecg-](https://github.com/MInggongK/jeecg-) - jeecg综合漏洞利用工具
- [sma11new/Pyke-Shiro](https://github.com/sma11new/Pyke-Shiro) - 复杂请求下的Shiro反序列化利用工具
- [10cks/fofaEX](https://github.com/10cks/fofaEX) - FOFA EX 是一款基于fofa api(也可导入鹰图、夸克文件)实现的红队综合利用工具,可基于模板把工具作为插件进行集成,自动化进行资产探测,目前提供的插件功能如下:探活、 nuclei 模板扫描、IP反查域名、域名反查 ICP 备案、dismap 指纹扫描
- [jdr2021/OSSFileBrowse](https://github.com/jdr2021/OSSFileBrowse) - 存储桶遍历漏洞利用工具
- [whocansee/FilelessAgentMemShell](https://github.com/whocansee/FilelessAgentMemShell) - 无需文件落地Agent内存马生成器
- [KimJun1010/inspector](https://github.com/KimJun1010/inspector) - IDEA代码审计辅助插件(深信服深蓝实验室天威战队强力驱动)
- [novysodope/javaeasyscan](https://github.com/novysodope/javaeasyscan) - javaeasyscanner - 富婆系列,代码审计辅助工具,致力于解放大脑,方便双手
- [sincere9/Apache-ActiveMQ-RCE](https://github.com/sincere9/Apache-ActiveMQ-RCE) - Apache ActiveMQ远程代码执行(RCE)利用工具
- [pascal-lab/Tai-e](https://github.com/pascal-lab/Tai-e) - An easy-to-learn/use static analysis framework for Java
- [hldfight/Tai-e-WebPlugin](https://github.com/hldfight/Tai-e-WebPlugin) - Tai-e的Web插件
- [P4r4d1se/heapdump_shiro_vuln](https://github.com/P4r4d1se/heapdump_shiro_vuln) - A heapdump leaks Shiro key causing RCE vulnerability environment.
- [veo/vagent](https://github.com/veo/vagent) - 多功能 java agent 内存马
- [Getshell/Mshell](https://github.com/Getshell/Mshell) - Memshell-攻防内存马研究
- [pykiller/API-T00L](https://github.com/pykiller/API-T00L) - 互联网厂商API利用工具。
- [F6JO/JsRouteScan](https://github.com/F6JO/JsRouteScan) - Burpsuite - Js Route Scan 正则匹配获取响应中的路由进行被动探测与递归目录探测的burp插件
- [shuanx/BurpFingerPrint](https://github.com/shuanx/BurpFingerPrint) - BurpSuite插件集成Ehole指纹库并进行常见OA弱口令爆破插件
- [hanbufei/findUriInjs](https://github.com/hanbufei/findUriInjs) - 一个既可主动,又可被动提取链接的burp插件
- [0xf4n9x/CDGXStreamDeserRCE](https://github.com/0xf4n9x/CDGXStreamDeserRCE) - 亿赛通电子文档安全管理系统XStream反序列化漏洞任意文件上传利用
- [0x7eTeam/0x7eTeamTools](https://github.com/0x7eTeam/0x7eTeamTools) - javafx练习,JS接口提取,漏洞检测
- [pen4uin/java-echo-generator](https://github.com/pen4uin/java-echo-generator) - 一款支持自定义的 Java 回显载荷生成工具|A customizable Java echo payload generation tool.
- [yutianqaq/BypassAV-Online](https://github.com/yutianqaq/BypassAV-Online) - An online AV evasion platform written in Springboot (Golang, Nim, C) supports inline, local and remote loading of Shellocde methods.
- [1101439360/License](https://github.com/1101439360/License) - 软件产品License控制简单实现
- [RKQF-JVS/jvs-teamwork](https://github.com/RKQF-JVS/jvs-teamwork) - 任务管理是企业内部事务协同的重要工具【参考teamwork、worktile、trello等多种产品对项目的管理理念】。包含项目管理(任务看板)、个人待办(to do list)、目标管理(OKR)三大核心功能。通过项目-任务的管理方式,在公开透明的任务看板,随时掌握项目进展,多级任务分配到人,知道「谁」在「何时」「做什么」。
- [Yong-An-Dang/nuclei-plus](https://github.com/Yong-An-Dang/nuclei-plus) - Functional enhancement based on nuclei
- [sleeyax/burp-awesome-tls](https://github.com/sleeyax/burp-awesome-tls) - Burp extension to evade TLS fingerprinting. Bypass WAF, spoof any browser.
- [pacemrc/VulDebug](https://github.com/pacemrc/VulDebug) - Java漏洞调试分析集合
- [bcvgh/daydayEXP](https://github.com/bcvgh/daydayEXP) - 支持自定义Poc文件的图形化漏洞利用工具
- [Whoopsunix/JavaRce](https://github.com/Whoopsunix/JavaRce) - Common Exploitation Techniques for Java RCE Vulnerabilities in Real-World Scenarios | 实战场景较通用的 Java Rce 相关漏洞的利用方式
- [Peakmain/AsmActualCombat](https://github.com/Peakmain/AsmActualCombat) - AsmActual利用ASM技术将合规插件会侵入到编译流程中, 插件会把App中所有系统敏感API或属性替换为SDK的收口方法 , 从而解决直接使用系统方法时面临的隐私合规问题
- [StarfireLab/wsMemShell](https://github.com/StarfireLab/wsMemShell) - WebSocket 内存马/Webshell,一种新型内存马/WebShell技术
- [charonlight/NacosExploitGUI](https://github.com/charonlight/NacosExploitGUI) - Nacos漏洞综合利用GUI工具,集成了默认口令漏洞、SQL注入漏洞、身份认证绕过漏洞、反序列化漏洞的检测及其利用
- [Drun1baby/JavaSecurityLearning](https://github.com/Drun1baby/JavaSecurityLearning) - 记录一下 Java 安全学习历程,也算是半条学习路线了
- [luelueking/ClazzSearcher](https://github.com/luelueking/ClazzSearcher) - 一款使用Yaml定义搜索规则来搜索Class的工具
- [kN6jq/gatherBurp](https://github.com/kN6jq/gatherBurp) - 一款burp插件,请看简介
- [pen4uin/java-memshell-generator](https://github.com/pen4uin/java-memshell-generator) - 一款支持自定义的 Java 内存马生成工具|A customizable Java in-memory webshell generation tool.
- [HummerRisk/HummerRisk](https://github.com/HummerRisk/HummerRisk) - HummerRisk 是云原生安全平台,包括混合云安全治理和云原生安全检测。
- [vaycore/OneScan](https://github.com/vaycore/OneScan) - OneScan是递归目录扫描的BurpSuite插件
- [makejavas/EasyCode](https://github.com/makejavas/EasyCode) - 基于IntelliJ IDEA开发的代码生成插件,支持自定义任意模板(Java,html,js,xml)。只要是与数据库相关的代码都可以通过自定义模板来生成。支持数据库类型与java类型映射关系配置。支持同时生成生成多张表的代码。每张表有独立的配置信息。完全的个性化定义,规则由你设置。
- [c0olw/NacosRce](https://github.com/c0olw/NacosRce) - Nacos JRaft Hessian 反序列化 RCE 加载字节码 注入内存马 不出网利用
- [kyo-w/router-router](https://github.com/kyo-w/router-router) - Java web路由内存分析工具
- [r0ysue/MobileCTF](https://github.com/r0ysue/MobileCTF) - 体系化、实战化、step by step、目标清晰且具体的一个打怪升级、成长路径规划图
- [4ra1n/mysql-fake-server](https://github.com/4ra1n/mysql-fake-server) - MySQL Fake Server (纯Java实现,支持GUI版和命令行版,提供Dockerfile,支持多种常见JDBC利用)
- [savior-only/Spring_All_Reachable](https://github.com/savior-only/Spring_All_Reachable) - Spring漏洞综合利用工具
- [YYHYlh/Apache-Dubbo-CVE-2023-23638-exp](https://github.com/YYHYlh/Apache-Dubbo-CVE-2023-23638-exp) - Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践
- [libaibaia/cloudSec](https://github.com/libaibaia/cloudSec) - 云安全利用工具-云平台AK/SK-WEB利用工具,添加AK/SK自动检测资源,无需手动执行,支持云服务器、存储桶、数据库操作
- [altEr1125/ShiroAttack2](https://github.com/altEr1125/ShiroAttack2) - 一款针对Shiro550漏洞进行快速漏洞利用工具。 对 @SummerSec 大佬的项目https://github.com/SummerSec/ShiroAttack2 进行了一些改进。
- [TonyD0g/JSPHunter](https://github.com/TonyD0g/JSPHunter) - 基于污点分析和模拟栈帧技术的JSP Webshell检测
- [vulhub/JNDIExploit](https://github.com/vulhub/JNDIExploit) - A malicious LDAP server for JNDI injection attacks
- [zfile-dev/zfile](https://github.com/zfile-dev/zfile) - 在线云盘、网盘、OneDrive、云存储、私有云、对象存储、h5ai、上传、下载
- [Janhsu/oday](https://github.com/Janhsu/oday) - javafx编写的poc管理工具和漏洞扫描的小工具
- [Armandhe-China/ApacheDubboSerialVuln](https://github.com/Armandhe-China/ApacheDubboSerialVuln) - Apache Dubbo系列漏洞
- [b4zinga/VulnerableJava](https://github.com/b4zinga/VulnerableJava) - 常见漏洞示例代码、修复方案、白盒检测误报案例. SAST test case.
- [passer-W/FinalShell-Decoder](https://github.com/passer-W/FinalShell-Decoder) - FinallShell 密码解密GUI工具
- [codewatchorg/Burp-UserAgent](https://github.com/codewatchorg/Burp-UserAgent) - Automatically modify the User-Agent header in all Burp requests
- [0x727/BypassPro](https://github.com/0x727/BypassPro) - 对权限绕过自动化bypass的burpsuite插件
- [aress31/burpgpt](https://github.com/aress31/burpgpt) - A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities and enables running traffic-based analysis of any type.
- [Roboterh/JNDI-injector](https://github.com/Roboterh/JNDI-injector) -
- [d3mondev/burp-vps-proxy](https://github.com/d3mondev/burp-vps-proxy) - This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.
- [dqzg12300/MikRom](https://github.com/dqzg12300/MikRom) - ROM逆向工具
- [qi4L/JYso](https://github.com/qi4L/JYso) - It can be either a JNDIExploit or a ysoserial.
- [LaurieWired/JADXecute](https://github.com/LaurieWired/JADXecute) - JADX-gui scripting plugin for dynamic decompiler manipulation
- [1150037361/SpringScan](https://github.com/1150037361/SpringScan) - 一个扫描Spring的常见敏感目录的burp suite插件
- [base64linqi/COPXposed](https://github.com/base64linqi/COPXposed) - 基于Xposed的Android App隐私合规检测辅助工具
- [webraybtl/ysoserialbtl](https://github.com/webraybtl/ysoserialbtl) - 基于ysoserial扩展命令执行结果回显,生成冰蝎内存马
- [asmjmp0/AndroidRunnableJadx](https://github.com/asmjmp0/AndroidRunnableJadx) - run java method of Android in Jadx without Android device.
- [sityck/RedosScanTool](https://github.com/sityck/RedosScanTool) - Redos漏洞代码扫描器(基于RegexStaticAnalysis)
- [NicolaasWeideman/RegexStaticAnalysis](https://github.com/NicolaasWeideman/RegexStaticAnalysis) - A tool to perform static analysis on regexes to determine whether they are vulnerable to ReDoS.
- [davinci1012/pinduoduo_backdoor_unpacker](https://github.com/davinci1012/pinduoduo_backdoor_unpacker) - Samples and Unpacker of malicious backdoors and exploits developed and used by Pinduoduo
- [WithSecureLabs/drozer-agent](https://github.com/WithSecureLabs/drozer-agent) - The Android Agent for the Drozer Security Assessment Framework.
- [MaliciousErection/drozer-agent-maliciouserection](https://github.com/MaliciousErection/drozer-agent-maliciouserection) - Slightly modified version of the Drozer Agent application.
- [zema1/suo5](https://github.com/zema1/suo5) - 一款高性能 HTTP 代理隧道工具 | A high-performance http proxy tunneling tool
- [KrystianLi/ExchangeOWA](https://github.com/KrystianLi/ExchangeOWA) - 一款OutLook信息收集工具
- [ffffffff0x/burp_nu_te_gen](https://github.com/ffffffff0x/burp_nu_te_gen) - nuclei模版生成插件
- [MaskCyberSecurityTeam/BurpHttpHelper](https://github.com/MaskCyberSecurityTeam/BurpHttpHelper) - BurpHttpHelper是一款Burpsuite插件,主要用于简化和解决Burpsuite对Http的一些操作.
- [White-hua/Apt_t00ls](https://github.com/White-hua/Apt_t00ls) - 高危漏洞利用工具
- [f0ng/captcha-killer-modified](https://github.com/f0ng/captcha-killer-modified) - captcha-killer的修改版,支持关键词识别base64编码的图片,添加免费ocr库,用于验证码爆破,适配新版Burpsuite
- [Yuuu99/FridaRpcTool](https://github.com/Yuuu99/FridaRpcTool) - BurpSuite Rpc 算法转发插件
- [M1k0er/SSRF-SCAN](https://github.com/M1k0er/SSRF-SCAN) - 一款被动扫描ssrf的burpsuite插件
- [4ra1n/code-inspector](https://github.com/4ra1n/code-inspector) - JavaWeb漏洞审计工具,构建方法调用链并模拟栈帧进行分析
- [LinWin-Cloud/Setool-Main](https://github.com/LinWin-Cloud/Setool-Main) - (入门不当可能导致入狱) 基于linux的企业级别社会工程学渗透测试、轻量级别Web渗透辅助。内置的钓鱼网站可以获取主要的个人信息账户;网站克隆模块可以把白宫网站给克隆下来;内置的各种Web终端完全可以群体性的攻击和对社会工程学的测试;破坏性脚本和半自动编写勒索信完美辅助了社工等等。使用Java开发,参考了大大小小的企业级别社会工程学案例,定制出的一款适用于企业级别的社工测试和攻击的高级命令行工具
- [jar-analyzer/jar-analyzer-v1-gui](https://github.com/jar-analyzer/jar-analyzer-v1-gui) - 建议使用新版:https://github.com/jar-analyzer/jar-analyzer
- [4ra1n/super-xray](https://github.com/4ra1n/super-xray) - Web漏洞扫描工具XRAY的GUI启动器
- [loveinsky100/goanno](https://github.com/loveinsky100/goanno) - Auto generate comment for golang/golang自动生成函数注释插件
- [HHa1ey/TKHunter](https://github.com/HHa1ey/TKHunter) - 一个基于JavaFX写的一个Hunter资产测绘平台的图形化工具
- [f0ng/autoDecoder](https://github.com/f0ng/autoDecoder) - Burp插件,根据自定义来达到对数据包的处理(适用于加解密、爆破等),类似mitmproxy,不同点在于经过了burp中转,在自动加解密的基础上,不影响APP、网站加解密正常逻辑等。
- [corener/JavaPassDump](https://github.com/corener/JavaPassDump) - JavaPassDump
- [z2p/sweetPotato](https://github.com/z2p/sweetPotato) - 基于burpsuite的资产分析工具
- [ax1sX/SpringSecurity](https://github.com/ax1sX/SpringSecurity) - A list for Spring Security
- [safe6Sec/ShiroAndFastJson](https://github.com/safe6Sec/ShiroAndFastJson) - shiro加fastjson环境
- [whwlsfb/SpringSpider](https://github.com/whwlsfb/SpringSpider) - Spring Actuator端点的BurpSuite被动扫描插件。
- [NewBeginning6/Subdir-vul-find](https://github.com/NewBeginning6/Subdir-vul-find) -
- [0xrumble/BytecodeScreen](https://github.com/0xrumble/BytecodeScreen) -
- [safe6Sec/MemoryShell](https://github.com/safe6Sec/MemoryShell) - 内存马学习
- [Zhuoyuan1/navicat_password_decrypt](https://github.com/Zhuoyuan1/navicat_password_decrypt) - 忘记navicat密码时,此工具可以帮您查看密码
- [pandening/Java-debug-tool](https://github.com/pandening/Java-debug-tool) - Java dynamic debug tool
- [cckuailong/JNDI-Injection-Exploit-Plus](https://github.com/cckuailong/JNDI-Injection-Exploit-Plus) - 80+ Gadgets(30 More than ysoserial). JNDI-Injection-Exploit-Plus is a tool for generating workable JNDI links and provide background services by starting RMI server,LDAP server and HTTP server.
- [burpheart/CVE-2022-39197-patch](https://github.com/burpheart/CVE-2022-39197-patch) - CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch.
- [Lonely-night/fastjsonVul](https://github.com/Lonely-night/fastjsonVul) - fastjson 80 远程代码执行漏洞复现
- [kyxiaxiang/CrackSleeve4.7](https://github.com/kyxiaxiang/CrackSleeve4.7) -
- [smxiazi/xia_Liao](https://github.com/smxiazi/xia_Liao) - xia Liao(瞎料)burp插件 用于Windows在线进程/杀软识别 与 web渗透注册时,快速生成需要的资料用来填写,资料包含:姓名、手机号、身份证、统一社会信用代码、组织机构代码、银行卡,以及各类web语言的hello world输出和生成弱口令字典等。
- [R17a-17/JavaVulnSummary](https://github.com/R17a-17/JavaVulnSummary) - Java漏洞分析汇合
- [xyy-ws/NoAgent-memshell-scanner](https://github.com/xyy-ws/NoAgent-memshell-scanner) -
- [veo/wsMemShell](https://github.com/veo/wsMemShell) - WebSocket 内存马/Webshell,一种新型内存马/WebShell技术
- [kezibei/yongyou_nc_poc](https://github.com/kezibei/yongyou_nc_poc) -
- [keven1z/DHook](https://github.com/keven1z/DHook) - DHook是一个支持动态debug,动态修改java程序的web应用.
- [safe6Sec/proxyServer](https://github.com/safe6Sec/proxyServer) - 本项目其实就是个简单的代理服务器,把代理池集成进来来了。
- [F6JO/RouteVulScan](https://github.com/F6JO/RouteVulScan) - Burpsuite - Route Vulnerable Scanning 递归式被动检测脆弱路径的burp插件
- [achuna33/MYExploit](https://github.com/achuna33/MYExploit) - OAExploit一款基于产品的一键扫描工具。
- [RASSec/BinAbsInspector](https://github.com/RASSec/BinAbsInspector) - BinAbsInspector: Vulnerability Scanner for Binaries
- [BeichenDream/CVE-2022-26134-Godzilla-MEMSHELL](https://github.com/BeichenDream/CVE-2022-26134-Godzilla-MEMSHELL) -
- [Weik1/Artillery](https://github.com/Weik1/Artillery) - JAVA 插件化漏洞扫描器,Gui基于javafx。POC 目前集成 Weblogic、Tomcat、Shiro、Spring等。
- [javahongxi/whatsmars](https://github.com/javahongxi/whatsmars) - Java生态研究(Spring Boot + Redis + Dubbo + RocketMQ + Elasticsearch)🔥🔥🔥🔥🔥
- [kezibei/fastjson_payload](https://github.com/kezibei/fastjson_payload) -
- [tauh33dkhan/fastjson-1.2.80-test-lab](https://github.com/tauh33dkhan/fastjson-1.2.80-test-lab) -
- [fade03/EZ-JNDI](https://github.com/fade03/EZ-JNDI) - 一键启动JNDI测试/利用环境。
- [meltingscales/JNDI-Exploit-Server](https://github.com/meltingscales/JNDI-Exploit-Server) - JNDI Exploit Server
- [winnpixie/log4noshell](https://github.com/winnpixie/log4noshell) - A Java Agent that disables Apache Log4J's JNDI Lookup to mitigate CVE-2021-44228 ("Log4Shell").
- [topicusonderwijs/naming-kubernetes](https://github.com/topicusonderwijs/naming-kubernetes) - Java naming context (JNDI) for WildFly using Kubernetes as backend.
- [0xJDow/rogue-rmi-server](https://github.com/0xJDow/rogue-rmi-server) - Rogue RMI Registry PoC for https://www.veracode.com/blog/research/exploiting-jndi-injections-java. All credit to artsploit.
- [Bl0omZ/JNDIEXP](https://github.com/Bl0omZ/JNDIEXP) - JNDI在java高版本的利用工具,FUZZ利用链
- [Like0x/0xagent](https://github.com/Like0x/0xagent) - CobaltStrike 4.0 - 4.5 Patch
- [elkokc/reflector](https://github.com/elkokc/reflector) - Burp plugin able to find reflected XSS on page in real-time while browsing on site
- [jweny/shiro-cve-2020-17523](https://github.com/jweny/shiro-cve-2020-17523) - shiro-cve-2020-17523 漏洞的两种绕过姿势分析 以及配套的漏洞环境
- [ce-automne/TomcatMemShell](https://github.com/ce-automne/TomcatMemShell) - 拿来即用的Tomcat7/8/9/10版本Listener/Filter/Servlet内存马,支持注入CMD内存马和冰蝎内存马
- [ballcat-projects/ballcat](https://github.com/ballcat-projects/ballcat) - 😸一个快速开发脚手架,快速搭建企业级后台管理系统,并提供多种便捷starter进行功能扩展。主要功能包括前后台用户分离,菜单权限,数据权限,定时任务,访问日志,操作日志,异常日志,统一异常处理,XSS过滤,SQL防注入,国际化 等多种功能
- [metaStor/SpringScan](https://github.com/metaStor/SpringScan) - SpringScan 漏洞检测 Burp插件
- [pnpninja/nsetools](https://github.com/pnpninja/nsetools) - A Java Implementation of nse-tools package in Python
- [wh1t3p1g/tabby-path-finder](https://github.com/wh1t3p1g/tabby-path-finder) - A neo4j procedure for tabby
- [ca3tie1/CrackSleeve](https://github.com/ca3tie1/CrackSleeve) - 破解CS4.0
- [KeenSecurityLab/BinAbsInspector](https://github.com/KeenSecurityLab/BinAbsInspector) - BinAbsInspector: Vulnerability Scanner for Binaries
- [doocs/jvm](https://github.com/doocs/jvm) - 🤗 JVM 底层原理最全知识总结
- [alibaba/DataX](https://github.com/alibaba/DataX) - DataX是阿里云DataWorks数据集成的开源版本。
- [ChrisM09/KNX-Bus-Dump](https://github.com/ChrisM09/KNX-Bus-Dump) - A tool to listen on a KNX bus via TPUART and the Calimero Project suite and to dump the data from the packets into a Wireshark-Compatible file hex dump.
- [billyJoePiano/TenaPull](https://github.com/billyJoePiano/TenaPull) - TenaPull is a configurable Java application which fetches and processes the data from one or more Nessus APIs, and converts it into JSON ouputs that are usable by Splunk
- [Y4er/ysoserial](https://github.com/Y4er/ysoserial) - ysoserial修改版,着重修改ysoserial.payloads.util.Gadgets.createTemplatesImpl使其可以通过引入自定义class的形式来执行命令、内存马、反序列化回显。
- [Adrninistrator/java-all-call-graph](https://github.com/Adrninistrator/java-all-call-graph) - Generate all call graph for Java Code.
- [jorgectf/spring-cloud-function-spel](https://github.com/jorgectf/spring-cloud-function-spel) -
- [lz520520/tabby](https://github.com/lz520520/tabby) - A CAT called tabby ( Code Analysis Tool )
- [smxiazi/xia_sql](https://github.com/smxiazi/xia_sql) - xia SQL (瞎注) burp 插件 ,在每个参数后面填加一个单引号,两个单引号,一个简单的判断注入小插件。
- [RASSec/BurpFastJsonScan](https://github.com/RASSec/BurpFastJsonScan) - 一款基于BurpSuite的被动式FastJson检测插件
- [33time/captcha-killer-5h6m](https://github.com/33time/captcha-killer-5h6m) - 原插件在新版本burpsuite无法使用,对插件jdk版本进行升级,引用jdk8、base64包
- [projectdiscovery/nuclei-burp-plugin](https://github.com/projectdiscovery/nuclei-burp-plugin) - Nuclei plugin for BurpSuite
- [tangxiaofeng7/Spring-Cloud-Function-Spel](https://github.com/tangxiaofeng7/Spring-Cloud-Function-Spel) - Spring Cloud Function Spel命令执行漏洞
- [xxDark/JavaShellcodeInjector](https://github.com/xxDark/JavaShellcodeInjector) - Java utility that allows to inject shell code and execute it
- [czz1233/GBByPass](https://github.com/czz1233/GBByPass) - 冰蝎 哥斯拉 WebShell bypass
- [Endava/cats](https://github.com/Endava/cats) - CATS is a REST API Fuzzer and negative testing tool for OpenAPI endpoints. CATS automatically generates, runs and reports tests with minimum configuration and no coding effort. Tests are self-healing
- [lovechoudoufu/GoogleCSAgent_cdf](https://github.com/lovechoudoufu/GoogleCSAgent_cdf) - CSAgent 与 GoogleAuth 的缝合体,cobalt strike的破解+otp动态口令的agent
- [SummerSec/AgentInjectTool](https://github.com/SummerSec/AgentInjectTool) - 改造BeichenDream/InjectJDBC加入shiro获取key和修改key功能
- [nsacyber/GRASSMARLIN](https://github.com/nsacyber/GRASSMARLIN) - Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in support of network security assessments. #nsacyber
- [BeichenDream/InjectJDBC](https://github.com/BeichenDream/InjectJDBC) - 注入JVM进程 动态获取目标进程连接的数据库
- [Y4tacker/JavaSec](https://github.com/Y4tacker/JavaSec) - a rep for documenting my study, may be from 0 to 0.1
- [ultimate-pa/ultimate](https://github.com/ultimate-pa/ultimate) - The Ultimate program analysis framework.
- [whwlsfb/JDumpSpider](https://github.com/whwlsfb/JDumpSpider) - HeapDump敏感信息提取工具
- [Retsamer/java_vuln_code](https://github.com/Retsamer/java_vuln_code) - 基于SpringBoot编写的常见Web漏洞安全开发学习平台
- [alibaba/cobar](https://github.com/alibaba/cobar) - a proxy for sharding databases and tables
- [SummerSec/SPATool](https://github.com/SummerSec/SPATool) - 静态程序分析工具 主要生成方法的CFG和.java文件的AST
- [rajasoun/log4j-zero-day-exploit](https://github.com/rajasoun/log4j-zero-day-exploit) - Log4j Zero-Day Exploit
- [bitterzzZZ/CVE-2021-43297-POC](https://github.com/bitterzzZZ/CVE-2021-43297-POC) - CVE-2021-43297 POC,Apache Dubbo<= 2.7.13时可以实现RCE
- [theonedev/onedev](https://github.com/theonedev/onedev) - Git Server with CI/CD, Kanban, and Packages. Seamless integration. Unparalleled experience.
- [mtxiaowangzi/CAFJE](https://github.com/mtxiaowangzi/CAFJE) - 又一个Java Web代码审计工具
- [woodpecker-appstore/springboot-vuldb](https://github.com/woodpecker-appstore/springboot-vuldb) -
- [f0ng/poc2jar](https://github.com/f0ng/poc2jar) - Java编写,Python作为辅助依赖的漏洞验证、利用工具,添加了进程查找模块、编码模块、命令模块、常见漏洞利用GUI模块、shiro rememberMe解密模块,加快测试效率
- [Peithon/JustC2file](https://github.com/Peithon/JustC2file) - Burp插件,Malleable C2 Profiles生成器;可以通过Burp代理选中请求,生成Cobalt Strike的profile文件(CSprofile)
- [kezibei/Urldns](https://github.com/kezibei/Urldns) -
- [sunilpaulmathew/NFSManager](https://github.com/sunilpaulmathew/NFSManager) - The source code of NFS Manager: An application to control NFS Injector
- [jboss-javassist/javassist](https://github.com/jboss-javassist/javassist) - Java bytecode engineering toolkit
- [981011512/--](https://github.com/981011512/--) - 停车场系统源码,新能源充电桩系统,停车场小程序,智能停车,Parking system,【功能介绍】:①兼容市面上主流的多家相机,理论上兼容所有硬件,可灵活扩展,②相机识别后数据自动上传到云端并记录,校验相机唯一id和硬件序列号,防止非法数据录入,③用户手机查询停车记录详情可自主缴费(支持微信,支付宝,银行接口支付,支持每个停车场指定不同的商户进行收款),支付后出场在免费时间内会自动抬杆。④支持a
- [opengoofy/hippo4j](https://github.com/opengoofy/hippo4j) - 📌 异步线程池框架,支持线程池动态变更&监控&报警,无需修改代码轻松引入。Asynchronous thread pool framework, support Thread Pool Dynamic Change & monitoring & Alarm, no need to modify the code easily introduced.
- [LeadroyaL/dex-finder](https://github.com/LeadroyaL/dex-finder) - 快速寻找一个类所在 dex 的小工具
- [exp1orer/JNDI-Inject-Exploit](https://github.com/exp1orer/JNDI-Inject-Exploit) - 解决FastJson、Jackson、Log4j2、原生JNDI注入漏洞的高版本JDKBypass利用,探测本地可用反序列化gadget达到命令执行、回显命令执行、内存马注入
- [evi1hack/LandrayExploit](https://github.com/evi1hack/LandrayExploit) - 蓝凌OA漏洞利用工具/前台无条件RCE/文件写入
- [pmiaowu/RMITest](https://github.com/pmiaowu/RMITest) - 就是一个练习RMI反序列化的最简单环境
- [Acmesec/Sylas](https://github.com/Acmesec/Sylas) - 新一代子域名主/被动收集工具 - Subdomain automatic/passive collection tool
- [bit4woo/Fiora](https://github.com/bit4woo/Fiora) - Fiora:漏洞PoC框架Nuclei的图形版。快捷搜索PoC、一键运行Nuclei。即可作为独立程序运行,也可作为burp插件使用。
- [Jesse505/PrivacyMonitorAndroid](https://github.com/Jesse505/PrivacyMonitorAndroid) - Android 隐私合规检测方案,基于ASM编译期插桩,将隐私api调用的堆栈信息保存到本地Excel文件中
- [simplepeng/HeGuiChecker](https://github.com/simplepeng/HeGuiChecker) - 🔥🔥🔥 基于Hook方案的合规化检测器
- [LGH1996/TapClick](https://github.com/LGH1996/TapClick) - Android史上最强大的跳过广告工具
- [six2dez/wahh_extras](https://github.com/six2dez/wahh_extras) - The Web Application Hacker's Handbook - Extra Content
- [whwlsfb/Log4j2Scan](https://github.com/whwlsfb/Log4j2Scan) - Log4j2 RCE Passive Scanner plugin for BurpSuite
- [Ovi3/010Editor-Template](https://github.com/Ovi3/010Editor-Template) - 010Editor Templates
- [Firebasky/Java](https://github.com/Firebasky/Java) - 关于学习java安全的一些知识,正在学习中ing,欢迎fork and star
- [f0ng/log4j2burpscanner](https://github.com/f0ng/log4j2burpscanner) - CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks
- [cryptomator/cryptomator](https://github.com/cryptomator/cryptomator) - Multi-platform transparent client-side encryption of your files in the cloud
- [r00tSe7en/JNDIMonitor](https://github.com/r00tSe7en/JNDIMonitor) - 一个LDAP请求监听器,摆脱dnslog平台
- [twseptian/spring-boot-log4j-cve-2021-44228-docker-lab](https://github.com/twseptian/spring-boot-log4j-cve-2021-44228-docker-lab) - Spring Boot Log4j - CVE-2021-44228 Docker Lab
- [Contrast-Security-OSS/safelog4j](https://github.com/Contrast-Security-OSS/safelog4j) - Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning or upgrading
- [theque5t/Detect4j](https://github.com/theque5t/Detect4j) - Runnable jar that detects if a specific class(es) is in use within existing JVMs
- [lz2y/yaml-payload-for-ruoyi](https://github.com/lz2y/yaml-payload-for-ruoyi) - A memory shell for ruoyi
- [madCdan/JndiLookup](https://github.com/madCdan/JndiLookup) - Some tools to help mitigating Apache Log4j 2 CVE-2021-44228
- [christophetd/log4shell-vulnerable-app](https://github.com/christophetd/log4shell-vulnerable-app) - Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).
- [back2root/log4shell-rex](https://github.com/back2root/log4shell-rex) - PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs
- [Cybereason/Logout4Shell](https://github.com/Cybereason/Logout4Shell) - Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell
- [nccgroup/log4j-jndi-be-gone](https://github.com/nccgroup/log4j-jndi-be-gone) - A Byte Buddy Java agent-based fix for CVE-2021-44228, the log4j 2.x "JNDI LDAP" vulnerability.
- [javaweb-sec/javaweb-sec](https://github.com/javaweb-sec/javaweb-sec) -
- [woodpecker-appstore/log4j-payload-generator](https://github.com/woodpecker-appstore/log4j-payload-generator) - Log4j jndi injects the Payload generator
- [CodeShield-Security/Log4JShell-Bytecode-Detector](https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector) - Local Bytecode Scanner for the Log4JShell Vulnerability (CVE-2021-44228)
- [javasec/log4j-patch](https://github.com/javasec/log4j-patch) - log4j-patch 修改字节码实现补丁防御
- [qingtengyun/cve-2021-44228-qingteng-online-patch](https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch) - Hot-patch CVE-2021-44228 by exploiting the vulnerability itself.
- [Puliczek/CVE-2021-44228-PoC-log4j-bypass-words](https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words) - 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
- [welk1n/JNDI-Injection-Bypass](https://github.com/welk1n/JNDI-Injection-Bypass) - Some payloads of JNDI Injection in JDK 1.8.0_191+
- [numanturle/Log4jNuclei](https://github.com/numanturle/Log4jNuclei) - Log4j for nuclei
- [code-scan/log4j-rce-demo](https://github.com/code-scan/log4j-rce-demo) - log4j rce测试项目
- [l4yn3/micro_service_seclab](https://github.com/l4yn3/micro_service_seclab) - Java漏洞靶场
- [bkfish/yaml-payload-for-Win](https://github.com/bkfish/yaml-payload-for-Win) - 用于windows反弹shell的yaml-payload
- [Barro/java-afl](https://github.com/Barro/java-afl) - Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.
- [xiaoliangli1128/SpringBootFinder](https://github.com/xiaoliangli1128/SpringBootFinder) - Springboot detection
- [ax/burp-logs](https://github.com/ax/burp-logs) - Logs is a Burp Suite extension to work with log files.
- [p0desta/AutoBypass403-BurpSuite](https://github.com/p0desta/AutoBypass403-BurpSuite) - 一个自动化bypass 403/auth的Burpsuite插件
- [skylot/jadx](https://github.com/skylot/jadx) - Dex to Java decompiler
- [dyc87112/SpringBoot-Learning](https://github.com/dyc87112/SpringBoot-Learning) - 《Spring Boot基础教程》,2.x版本持续连载中!点击下方链接直达教程目录!
- [OneSourceCat/YonyouNC-EXP](https://github.com/OneSourceCat/YonyouNC-EXP) - YonyouNC RCE
- [gzu-liyujiang/Android_CN_OAID](https://github.com/gzu-liyujiang/Android_CN_OAID) - 安卓设备唯一标识解决方案,可替代移动安全联盟(MSA)统一 SDK 闭源方案。包括国内手机厂商的开放匿名标识(OAID)、海外手机平台的安卓广告标识(AAID),另外也提供了 IMEI/MEID、AndroidID、WidevineID、PseudoID、GUID 等常见的设备标识的获取方法。
- [jas502n/FinalShellDecodePass](https://github.com/jas502n/FinalShellDecodePass) - FinalShellDecodePass 加密解密
- [SummerSec/ShiroAttack2](https://github.com/SummerSec/ShiroAttack2) - shiro反序列化漏洞综合利用,包含(回显执行命令/注入内存马)修复原版中NoCC的问题 https://github.com/j1anFen/shiro_attack
- [puhaiyang/easyHttpProxy](https://github.com/puhaiyang/easyHttpProxy) - support http/https proxy.类似于finddler,由java编写,代码简单便于理解。支持http/https代理!
- [w568w/XposedChecker](https://github.com/w568w/XposedChecker) - [Deprecated] Check whether your xposed has been enabled.
- [ElivenLZY/AndroidSafeCheck](https://github.com/ElivenLZY/AndroidSafeCheck) - APP过等保要用到的安全检测,支持调试检测/签名校验/Root检测/网络代理检测等,功能高度灵活可定制。
- [depycode/fastjson-local-echo](https://github.com/depycode/fastjson-local-echo) - 基于dbcp的fastjson rce 回显
- [API-Security/APIKit](https://github.com/API-Security/APIKit) - APIKit:Discovery, Scan and Audit APIs Toolkit All In One.
- [smxiazi/NEW_xp_CAPTCHA](https://github.com/smxiazi/NEW_xp_CAPTCHA) - xp_CAPTCHA(瞎跑 白嫖版) burp 验证码 识别 burp插件
- [ssssssss-team/spider-flow](https://github.com/ssssssss-team/spider-flow) - 新一代爬虫平台,以图形化方式定义爬虫流程,不写代码即可完成爬虫。
- [potats0/CasExp](https://github.com/potats0/CasExp) - Apereo CAS exploit tool
- [ixrjog/opscloud4](https://github.com/ixrjog/opscloud4) - 云上运维
- [artsploit/yaml-payload](https://github.com/artsploit/yaml-payload) - A tiny project for generating SnakeYAML deserialization payloads
- [ba0gu0/520apkhook](https://github.com/ba0gu0/520apkhook) - 将安卓远控Apk附加进普通的App中,运行新生成的App时,普通App正常运行,远控正常上线。Attach the Android remote control APK to a regular app. When the newly generated app is launched, the regular app operates as normal while the remote con
- [hamibot/hamibot](https://github.com/hamibot/hamibot) - 安卓平台自动化工具,无需 root。
- [OakChen/ApkShelling](https://github.com/OakChen/ApkShelling) - 脱Apk使用360加固、梆梆加固、腾讯乐固、百度加固免费版加的壳
- [ftmtshuashua/AndroidMonitor](https://github.com/ftmtshuashua/AndroidMonitor) - Android监控器(Activity异常destroy , 隐私政策合规)
- [yanerchuang/PrivacyPolicyComplianceCheck](https://github.com/yanerchuang/PrivacyPolicyComplianceCheck) - Android 隐私政策合规检查方案
- [gh0stkey/CaA](https://github.com/gh0stkey/CaA) - CaA - Collector and Analyzer, Insight into information, exploring with intelligence in a thousand ways.
- [fa1c0n1/rmi-attack-demo](https://github.com/fa1c0n1/rmi-attack-demo) - 在学习Java反序列化漏洞的过程中,用来理解Java RMI程序的执行流程,演示如何攻击Java RMI程序的几个示例。
- [CodeShield-Security/SPDS](https://github.com/CodeShield-Security/SPDS) - Efficient and Precise Pointer-Tracking Data-Flow Framework
- [BeichenDream/Chunk-Proxy](https://github.com/BeichenDream/Chunk-Proxy) -
- [tkmru/lazyCSRF](https://github.com/tkmru/lazyCSRF) - A more useful CSRF PoC generator on Burp Suite
- [0x727/SpringBootExploit](https://github.com/0x727/SpringBootExploit) - 项目是根据LandGrey/SpringBootVulExploit清单编写,目的hvv期间快速利用漏洞、降低漏洞利用门槛。
- [pmiaowu/HostCollision](https://github.com/pmiaowu/HostCollision) - 用于host碰撞而生的小工具,专门检测渗透中需要绑定hosts才能访问的主机或内部系统
- [yetingli/ReDoSHunter](https://github.com/yetingli/ReDoSHunter) - ReDoSHunter: A Combined Static and Dynamic Approach for Regular Expression DoS Detection
- [ChenJunsen/Hegui3.0](https://github.com/ChenJunsen/Hegui3.0) - 工信部合规检测Xposed模块源码
- [jas502n/database-spring-ENC](https://github.com/jas502n/database-spring-ENC) - sprint encode (plan text) get enc password
- [Netflix/EVCache](https://github.com/Netflix/EVCache) - A distributed in-memory data store for the cloud
- [NeoTheCapt/PowerScanner](https://github.com/NeoTheCapt/PowerScanner) - 面向HW的红队半自动扫描器
- [shwenzhang/AndResGuard](https://github.com/shwenzhang/AndResGuard) - proguard resource for Android by wechat team
- [lqs1848/AllatoriCrack](https://github.com/lqs1848/AllatoriCrack) - 破解 Java 混淆工具 Allatori
- [jmockit/jmockit1](https://github.com/jmockit/jmockit1) - Advanced Java library for integration testing, mocking, faking, and code coverage
- [durkworf/spring-boot-webshell](https://github.com/durkworf/spring-boot-webshell) -
- [sec-it/BFAC-Burp-Extension](https://github.com/sec-it/BFAC-Burp-Extension) - Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)
- [ethushiroha/JavaAgentTools](https://github.com/ethushiroha/JavaAgentTools) - 用Java agent实现内存马等功能
- [su18/JDBC-Attack](https://github.com/su18/JDBC-Attack) - JDBC Connection URL Attack
- [gfbjngjibn/JustTrustMe](https://github.com/gfbjngjibn/JustTrustMe) - An xposed module that disables SSL certificate checking for the purposes of auditing an app with cert pinning
- [yhy0/ExpDemo-JavaFX](https://github.com/yhy0/ExpDemo-JavaFX) - 图形化漏洞利用Demo-JavaFX版
- [LeadroyaL/drozer-agent](https://github.com/LeadroyaL/drozer-agent) - The Android Agent for the Mercury Security Assessment Framework.
- [makeloveandroid/XpRoot](https://github.com/makeloveandroid/XpRoot) - 描述
- [CTF-MissFeng/Ecloud](https://github.com/CTF-MissFeng/Ecloud) - Ecloud是一款基于http/1.1协议传输TCP流量工具,适用于内网不出网时通过web代理脚本转发tcp流量
- [Static-Flow/RepeaterSearch](https://github.com/Static-Flow/RepeaterSearch) - This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response matches a query via simple text matching or Regex.
- [rbmonster/learning-note](https://github.com/rbmonster/learning-note) - Java开发及面试(个人面试、工作总结、资料收集站)
- [shrinkwrap/resolver](https://github.com/shrinkwrap/resolver) - ShrinkWrap Resolvers
- [PortSwigger/php-object-injection-check](https://github.com/PortSwigger/php-object-injection-check) - PHP Unserialize Check - Burp Scanner Extension
- [dipjyotimetia/HybridTestFramework](https://github.com/dipjyotimetia/HybridTestFramework) - End to End testing of Web, API, Cloud, Events and Security
- [j3ers3/Hello-Java-Sec](https://github.com/j3ers3/Hello-Java-Sec) - ☕️ Java Security,安全编码和代码审计
- [hengyunabc/dumpclass](https://github.com/hengyunabc/dumpclass) - Dump classes from running JVM process.
- [karma9874/AndroRAT](https://github.com/karma9874/AndroRAT) - A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
- [sqlancer/sqlancer](https://github.com/sqlancer/sqlancer) - Automated testing to find logic and performance bugs in database systems
- [jsnjfz/WebStack-Guns](https://github.com/jsnjfz/WebStack-Guns) - 一个开源的网址导航网站项目,后台基于Guns和Springboot
- [songxiaomo1997/ScanStation](https://github.com/songxiaomo1997/ScanStation) - 一个可以自定规则的动扫描器,支持主动和被动扫描
- [StringCare/AndroidLibrary](https://github.com/StringCare/AndroidLibrary) - Android library to reveal or obfuscate strings and assets at runtime
- [SasanLabs/owasp-zap-fileupload-addon](https://github.com/SasanLabs/owasp-zap-fileupload-addon) - OWASP ZAP add-on for finding vulnerabilities in File Upload functionality.
- [jenkinsci/contrast-continuous-application-security-plugin](https://github.com/jenkinsci/contrast-continuous-application-security-plugin) - Jenkins Plugin from Contrast Security
- [gdgd009xcd/AutoMacroBuilderForZAP](https://github.com/gdgd009xcd/AutoMacroBuilderForZAP) - A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applications that need to access pages in a specific order, such as sh
- [jenkinsci/fortify-plugin](https://github.com/jenkinsci/fortify-plugin) - Fortify Jenkins plugin
- [openraven/magpie](https://github.com/openraven/magpie) - A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat landscape such as cloud ransomware and supply chain attacks.
- [pt-tools/rmi_bypass_jep290](https://github.com/pt-tools/rmi_bypass_jep290) -
- [trung/InMemoryJavaCompiler](https://github.com/trung/InMemoryJavaCompiler) - Utility class to compile java source code in memory
- [rufherg/WebLogic_Basic_Poc](https://github.com/rufherg/WebLogic_Basic_Poc) - 用于WebLogic poc及exp测试的基础脚本,后续将集成各版本poc库
- [raphw/byte-buddy](https://github.com/raphw/byte-buddy) - Runtime code generation for the Java virtual machine.
- [neykov/extract-tls-secrets](https://github.com/neykov/extract-tls-secrets) - Decrypt HTTPS/TLS connections on the fly with Wireshark
- [grpc/grpc-java](https://github.com/grpc/grpc-java) - The Java gRPC implementation. HTTP/2 based RPC
- [spotbugs/sonar-findbugs](https://github.com/spotbugs/sonar-findbugs) - SpotBugs plugin for SonarQube
- [woodpecker-appstore/xmldecoder-payload-generator](https://github.com/woodpecker-appstore/xmldecoder-payload-generator) - Java XMLDecoder payload generator
- [sepinf-inc/IPED](https://github.com/sepinf-inc/IPED) - IPED Digital Forensic Tool. It is an open source software that can be used to process and analyze digital evidence, often seized at crime scenes by law enforcement or in a corporate investigation by p
- [cmu-sei/kaiju](https://github.com/cmu-sei/kaiju) - CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- please file tickets, bug reports, or pull requests at the upstre
- [Mr-xn/RedTeam_BlueTeam_HW](https://github.com/Mr-xn/RedTeam_BlueTeam_HW) - 红蓝对抗以及护网相关工具和资料,内存shellcode(cs+msf)和内存马查杀工具
- [doocs/source-code-hunter](https://github.com/doocs/source-code-hunter) - 😱 从源码层面,剖析挖掘互联网行业主流技术的底层实现原理,为广大开发者 “提升技术深度” 提供便利。目前开放 Spring 全家桶,Mybatis、Netty、Dubbo 框架,及 Redis、Tomcat 中间件等
- [zifeihan/friday](https://github.com/zifeihan/friday) - java runtime decompiler (java实时反编译工具)
- [qtc-de/beanshooter](https://github.com/qtc-de/beanshooter) - JMX enumeration and attacking tool.
- [Lotus6/ThinkphpGUI](https://github.com/Lotus6/ThinkphpGUI) - Thinkphp(GUI)漏洞利用工具,支持各版本TP漏洞检测,命令执行,getshell。
- [LSPosed/LSPosed](https://github.com/LSPosed/LSPosed) - LSPosed Framework
- [ggg4566/BurpBountyPlus](https://github.com/ggg4566/BurpBountyPlus) - BurpBounty 魔改版本
- [fit2cloud/riskscanner](https://github.com/fit2cloud/riskscanner) - RiskScanner 是开源的多云安全合规扫描平台,基于 Cloud Custodian 和 Nuclei 引擎,实现对主流公(私)有云资源的安全合规扫描和漏洞扫描。
- [Dor-Tumarkin/CVE-2021-25641-Proof-of-Concept](https://github.com/Dor-Tumarkin/CVE-2021-25641-Proof-of-Concept) - Apache/Alibaba Dubbo <= 2.7.3 PoC Code for CVE-2021-25641 RCE via Deserialization of Untrusted Data; Affects Versions <= 2.7.6 With Different Gadgets
- [JunGe-Y/JustTrustMePP](https://github.com/JunGe-Y/JustTrustMePP) -
- [su18/MemoryShell](https://github.com/su18/MemoryShell) - JavaWeb MemoryShell Inject/Scan/Killer/Protect Research & Exploring
- [20200629/openfire_shells](https://github.com/20200629/openfire_shells) - 后台插件getshell
- [certmichelin/Redscan](https://github.com/certmichelin/Redscan) -
- [dushitaoyuan/javaweb_security_handle](https://github.com/dushitaoyuan/javaweb_security_handle) - web常见漏洞处理,xss,sql注入,跨域,文件上传,接口暴力,限流实现
- [mprunet/burp-scripting](https://github.com/mprunet/burp-scripting) -
- [duckstroms/xss-reflector](https://github.com/duckstroms/xss-reflector) - XSS reflector vulnerabilities exploitation extended.
- [5wimming/gadgetinspector](https://github.com/5wimming/gadgetinspector) - 利用链、漏洞检测工具
- [fynch3r/Gadgets](https://github.com/fynch3r/Gadgets) - Java反序列化漏洞利用链补全计划,仅用于个人归纳总结。
- [didi/KnowStreaming](https://github.com/didi/KnowStreaming) - 一站式云原生实时流数据平台,通过0侵入、插件化构建企业级Kafka服务,极大降低操作、存储和管理实时流数据门槛
- [bitterzzZZ/MemoryShellLearn](https://github.com/bitterzzZZ/MemoryShellLearn) - 分享几个直接可用的内存马,记录一下学习过程中看过的文章
- [woodpecker-framework/ysoserial-for-woodpecker](https://github.com/woodpecker-framework/ysoserial-for-woodpecker) - 给woodpecker框架量身定制的ysoserial
- [wgpsec/fofa_viewer](https://github.com/wgpsec/fofa_viewer) - A simple FOFA client written in JavaFX. Made by WgpSec, Maintained by f1ashine.
- [jweny/MemShellDemo](https://github.com/jweny/MemShellDemo) - 内存马Demo合集 memshell demo for java / php / python
- [woodpecker-appstore/rmi-deserialization-vuldb](https://github.com/woodpecker-appstore/rmi-deserialization-vuldb) - Java RMI反序列化漏洞插件
- [Hakky54/mutual-tls-ssl](https://github.com/Hakky54/mutual-tls-ssl) - 🔐 Tutorial of setting up Security for your API with one way authentication with TLS/SSL and mutual authentication for a java based web server and a client with both Spring Boot. Different clients are
- [xxux11/http-methods-discloser](https://github.com/xxux11/http-methods-discloser) -
- [durkworf/BCELconvert](https://github.com/durkworf/BCELconvert) - bcel转码
- [synacktiv/HopLa](https://github.com/synacktiv/HopLa) - HopLa Burp Suite Extender plugin - Adds autocompletion support and useful payloads in Burp Suite
- [wh1t3p1g/tabby](https://github.com/wh1t3p1g/tabby) - A CAT called tabby ( Code Analysis Tool )
- [Ramos-dev/graph4code](https://github.com/Ramos-dev/graph4code) - 超硬核!使用图数据技术发现软件漏洞
- [java-deobfuscator/deobfuscator-gui](https://github.com/java-deobfuscator/deobfuscator-gui) - An awesome GUI for an awesome deobfuscator
- [raise-isayan/FakeCert](https://github.com/raise-isayan/FakeCert) - Burp suite Certificate modification tool
- [bailsong/BurpDecoder](https://github.com/bailsong/BurpDecoder) - This is a Burpsuite Extension that will be able to Auto-Decode intercepted request message by PROXY TOOL before the message was shown in PROXY Panel ,and Auto-Encode request message after it forwarde
- [Ebryx/SRePlay](https://github.com/Ebryx/SRePlay) - Burpsuite Plugin to bypass strict RePlay protection
- [LSPosed/AndroidHiddenApiBypass](https://github.com/LSPosed/AndroidHiddenApiBypass) - LSPass: Bypass restrictions on non-SDK interfaces
- [ThexXTURBOXx/bytecode-viewer](https://github.com/ThexXTURBOXx/bytecode-viewer) - A Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More)
- [Y4er/yaml-payload](https://github.com/Y4er/yaml-payload) - Spring Cloud SnakeYAML 反序列化一键注入cmdshell和reGeorg
- [LandGrey/spring-boot-upload-file-lead-to-rce-tricks](https://github.com/LandGrey/spring-boot-upload-file-lead-to-rce-tricks) - spring boot Fat Jar 任意写文件漏洞到稳定 RCE 利用技巧
- [bwcxljsm/Fofa-collect](https://github.com/bwcxljsm/Fofa-collect) - Fofa采集工具
- [safeYYY/easyHook](https://github.com/safeYYY/easyHook) - 直接指定hook目标,无需重新编写hook代码
- [HXSecurity/DongTai-agent-java](https://github.com/HXSecurity/DongTai-agent-java) - Java Agent is a Java application probe of DongTai IAST, which collects method invocation data during runtime of Java application by dynamic hooks.
- [keven1z/weblogic_memshell](https://github.com/keven1z/weblogic_memshell) - 适用于weblogic和Tomcat的无文件的内存马(memshell)
- [rebeyond/memShell](https://github.com/rebeyond/memShell) - a webshell resides in the memory of java web server
- [threedr3am/ZhouYu](https://github.com/threedr3am/ZhouYu) - (周瑜)Java - SpringBoot 持久化 WebShell 学习demo(不仅仅是SpringBoot,适合任何符合JavaEE规范的服务)
- [tlamb96/kgb_messenger](https://github.com/tlamb96/kgb_messenger) - An Android CTF practice challenge
- [espduino/Hegui2.0](https://github.com/espduino/Hegui2.0) - 检测用户在同意授权前是否有获取隐私信息的Xposed插件
- [jas502n/Burp_AES_Plugin](https://github.com/jas502n/Burp_AES_Plugin) - Burpsuite Plugin For AES Crack
- [wfh45678/radar](https://github.com/wfh45678/radar) - 实时风控引擎(Risk Engine),自定义规则引擎(Rule Script),完美支持中文,适用于反欺诈(Anti-fraud)应用场景,开箱即用!!!移动互联网时代的风险管理利器,你 Get 到了吗?
- [vran-dev/PrettyZoo](https://github.com/vran-dev/PrettyZoo) - 😉 Pretty nice Zookeeper GUI, Support Win / Mac / Linux Platform
- [AntSwordProject/AwesomeScript](https://github.com/AntSwordProject/AwesomeScript) - AntSword Shell 脚本分享/示例
- [xinyu2428/TDOA_RCE](https://github.com/xinyu2428/TDOA_RCE) - 通达OA综合利用工具
- [doyensec/ajpfuzzer](https://github.com/doyensec/ajpfuzzer) - A command-line fuzzer for the Apache JServ Protocol (ajp13)
- [OneSourceCat/BcelPayloadGenerator](https://github.com/OneSourceCat/BcelPayloadGenerator) - A fastjson payload generator
- [GraxCode/JByteMod-Beta](https://github.com/GraxCode/JByteMod-Beta) - Java bytecode editor
- [LandGrey/copagent](https://github.com/LandGrey/copagent) - java memory web shell extracting tool
- [jas502n/BurpSuiteAutoCompletion](https://github.com/jas502n/BurpSuiteAutoCompletion) - This exention enables autocompletion within BurpSuite Repeater/Intruder tabs.
- [sanfengAndroid/FakeXposed](https://github.com/sanfengAndroid/FakeXposed) - Hide xposed, root, file redirection, etc.
- [bit4woo/domain_hunter_pro](https://github.com/bit4woo/domain_hunter_pro) - domain_hunter的高级版本,SRC挖洞、HW打点之必备!自动化资产收集;快速Title获取;外部工具联动;等等
- [dunwu/java-tutorial](https://github.com/dunwu/java-tutorial) - :coffee: 老司机在 Java 技术领域的十年积累。
- [Meshall/flutter_fp](https://github.com/Meshall/flutter_fp) -
- [CyberScions/Digitalbank](https://github.com/CyberScions/Digitalbank) - Android Digital Bank Vulnerable Mobile App
- [qtc-de/remote-method-guesser](https://github.com/qtc-de/remote-method-guesser) - Java RMI Vulnerability Scanner
- [elki-project/elki](https://github.com/elki-project/elki) - ELKI Data Mining Toolkit
- [baidu-security/openrasp-testcases](https://github.com/baidu-security/openrasp-testcases) - OpenRASP 漏洞测试环境
- [mdsecresearch/BurpSuiteSharpener](https://github.com/mdsecresearch/BurpSuiteSharpener) -
- [0Chencc/DaE](https://github.com/0Chencc/DaE) - CTFCrackTools 's BurpSuite Plugin - Decode and Encode
- [ffffffff0x/BerylEnigma](https://github.com/ffffffff0x/BerylEnigma) - ffffffff0x team toolset for penetration testing, cryptography research, CTF and daily use. | ffffffff0x 团队工具集,用来进行渗透测试,密码学研究,CTF和日常使用。
- [Josue87/BurpMetaFinder](https://github.com/Josue87/BurpMetaFinder) - Burp Suite extension for extracting metadata from files
- [gdgd009xcd/AutoMacroBuilder](https://github.com/gdgd009xcd/AutoMacroBuilder) - A BurpSuite Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applications that need to access pages in a specific order, such as s
- [jcasbin/shiro-casbin](https://github.com/jcasbin/shiro-casbin) - Apache Shiro's authorization middleware based on Casbin
- [TheKingOfDuck/Loki](https://github.com/TheKingOfDuck/Loki) - 一个轻量级Web蜜罐 - A Little Web Honeypot.🍯🍯🍯🐝🐝🐝
- [wizos/loread](https://github.com/wizos/loread) - RSS Android client,support Inoreader, Feedly, TinyTinyRSS, Fever。
- [SecureSkyTechnology/burpextender-proxyhistory-webui](https://github.com/SecureSkyTechnology/burpextender-proxyhistory-webui) - Burp Extender : Proxy History viewer in Web UI
- [nscuro/bradamsa-ng](https://github.com/nscuro/bradamsa-ng) - Burp Suite extension for Radamsa-powered fuzzing with Intruder
- [hvqzao/burp-wildcard](https://github.com/hvqzao/burp-wildcard) - Burp extension intended to compact Burp extension tabs by hijacking them to own tab.
- [BitTheByte/BitTraversal](https://github.com/BitTheByte/BitTraversal) - Burpsuite Plugin to detect Directory Traversal vulnerabilities
- [raise-isayan/ViewStateDecoder](https://github.com/raise-isayan/ViewStateDecoder) - Burpsuite extension. Supports ASP.NET ViewStateDecoder
- [simioni87/auth_analyzer](https://github.com/simioni87/auth_analyzer) - Burp Extension for testing authorization issues. Automated request repeating and parameter value extraction on the fly.
- [wagiro/BurpBounty](https://github.com/wagiro/BurpBounty) - Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the active and passive scanner by means of personalized rules through
- [Ppsoft1991/CodeReviewTools](https://github.com/Ppsoft1991/CodeReviewTools) - 通过正则搜索、批量反编译特定Jar包中的class名称
- [aau-network-security/HosTaGe](https://github.com/aau-network-security/HosTaGe) - Low Interaction Mobile Honeypot
- [TimelineSec/ATTCK-Tools-library](https://github.com/TimelineSec/ATTCK-Tools-library) - TimelineSec ATT&CK 工具库
- [SecUSo/privacy-friendly-pedometer](https://github.com/SecUSo/privacy-friendly-pedometer) - Privacy Friendly App that counts your steps on Android devices.
- [JackyTsuuuy/UnicodeDecoder4burp](https://github.com/JackyTsuuuy/UnicodeDecoder4burp) - burpsuite Unicode解码插件
- [superblaubeere27/obfuscator](https://github.com/superblaubeere27/obfuscator) - A java obfuscator (GUI)
- [ethicalhackingplayground/ssrf-king](https://github.com/ethicalhackingplayground/ssrf-king) - SSRF plugin for burp Automates SSRF Detection in all of the Request
- [CoreyD97/BurpCustomizer](https://github.com/CoreyD97/BurpCustomizer) - Because just a dark theme wasn't enough!
- [bytebutcher/burp-send-to](https://github.com/bytebutcher/burp-send-to) - Adds a customizable "Send to..."-context-menu to your BurpSuite.
- [SafeGroceryStore/MDUT](https://github.com/SafeGroceryStore/MDUT) - MDUT - Multiple Database Utilization Tools
- [hs-vae/java-load](https://github.com/hs-vae/java-load) - 记录自己从零开始学习Java SE的道路
- [TheKingOfDuck/burpJsEncrypter](https://github.com/TheKingOfDuck/burpJsEncrypter) - More Easier Burp Extension To Solve Javascript Front End Encryption,一款更易使用的解决前端加密问题的Burp插件。
- [t0thkr1s/allsafe](https://github.com/t0thkr1s/allsafe) - Intentionally vulnerable Android application.
- [zhutougg/LandrayDES](https://github.com/zhutougg/LandrayDES) - 蓝凌OA的前后台密码的加解密工具
- [pmiaowu/BurpFastJsonScan](https://github.com/pmiaowu/BurpFastJsonScan) - 一款基于BurpSuite的被动式FastJson检测插件
- [jas502n/OpenFire_Decrypt](https://github.com/jas502n/OpenFire_Decrypt) - OpenFire 管理后台账号密码解密
- [pimps/ysoserial-modified](https://github.com/pimps/ysoserial-modified) - That repository contains my updates to the well know java deserialization exploitation tool ysoserial.
- [jas502n/CVE-2020-26259](https://github.com/jas502n/CVE-2020-26259) - CVE-2020-26259: XStream is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling as long as the executing process has sufficient rights.
- [lwierzbicki/RegexFinder](https://github.com/lwierzbicki/RegexFinder) - RegexFinder - Burp Suite extension to passively scan responses for occurrence of regular expression patterns.
- [aress31/openapi-parser](https://github.com/aress31/openapi-parser) - Parse OpenAPI documents into Burp Suite for automating OpenAPI-based APIs security assessments (approved by PortSwigger for inclusion in their official BApp Store).
- [augustd/burp-suite-utils](https://github.com/augustd/burp-suite-utils) - Utilities for creating Burp Suite Extensions.
- [pimps/JNDI-Exploit-Kit](https://github.com/pimps/JNDI-Exploit-Kit) - JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP Server, RMI Server and LDAP Server to exploit java web apps vuln
- [dschadow/JavaSecurity](https://github.com/dschadow/JavaSecurity) - Java web and command line applications demonstrating various security topics
- [w296488320/XposedAppium](https://github.com/w296488320/XposedAppium) - 基于Xposed自动化框架
- [w296488320/XposedOkHttpCat](https://github.com/w296488320/XposedOkHttpCat) -
- [WindySha/Xpatch](https://github.com/WindySha/Xpatch) - This is a tool to repackage apk file, then the apk can load any xposed modules installed in the device. It is another way to hook an app without root device.
- [framgia/android-emulator-detector](https://github.com/framgia/android-emulator-detector) - Easy to detect android emulator
- [jas502n/publiccms_decrypt](https://github.com/jas502n/publiccms_decrypt) - publiccms_decrypt
- [lenve/javaboy-code-samples](https://github.com/lenve/javaboy-code-samples) - 公众号【江南一点雨】文章案例汇总,技术文章请戳这里----->
- [yongyecc/dexshellerInMemory](https://github.com/yongyecc/dexshellerInMemory) - android APK一键DEX加固脚本(内存加载DEX)
- [xkzhangsan/xk-time](https://github.com/xkzhangsan/xk-time) - xk-time 是时间转换,时间计算,时间格式化,时间解析,日历,时间cron表达式和时间NLP等的工具,使用Java8(JSR-310),线程安全,简单易用,多达70几种常用日期格式化模板,支持Java8时间类和Date,轻量级,无第三方依赖。
- [PortSwigger/freddy-deserialization-bug-finder](https://github.com/PortSwigger/freddy-deserialization-bug-finder) -
- [Leoid/Burp2Slack](https://github.com/Leoid/Burp2Slack) - Push notifications to Slack channel or to custom server based on BurpSuite response conditions.
- [theLSA/burp-info-extractor](https://github.com/theLSA/burp-info-extractor) - burpsuite extension for extract information from data
- [SasanLabs/VulnerableApp](https://github.com/SasanLabs/VulnerableApp) - OWASP VulnerableApp Project: For Security Enthusiasts by Security Enthusiasts.
- [yangchong211/YCAndroidTool](https://github.com/yangchong211/YCAndroidTool) - 用于项目测试,崩溃重启操作,崩溃记录日志【可以查看,分享】和重启【多种重启app方式】;网路拦截查看的工具小助手,拦截请求和响应数据,统计接口请求次数,流量消耗,以及统计网络链接/dns解析/request请求/respond响应等时间。提高开发效率……
- [pkilller/super-jadx](https://github.com/pkilller/super-jadx) - Add new features for reverse engineering, such as: renaming of classes, fields, methods, variables, reference graphs and more.
- [AutohomeCorp/frostmourne](https://github.com/AutohomeCorp/frostmourne) - Frostmourne(霜之哀伤监控平台)是基于Elasticsearch, Prometheus, SkyWalking, InfluxDB,Mysql/TiDB,ClickHouse, SqlServer, IoTDB数据的分布式监控报警系统. Monitor & alert & alarm for Elasticsearch,Prometheus data。主要使用springboot2 +
- [gdelmas/IntelliJDashPlugin](https://github.com/gdelmas/IntelliJDashPlugin) - A smart and simple plugin that provides keyboard shortcut access for Dash, Velocity or Zeal in IntelliJ IDEA, RubyMine, WebStorm, PhpStorm, PyCharm and Android Studio.
- [rewanthtammana/Damn-Vulnerable-Bank](https://github.com/rewanthtammana/Damn-Vulnerable-Bank) - Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android application security hacking skills.
- [jeremylong/DependencyCheck](https://github.com/jeremylong/DependencyCheck) - OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
- [Freakboy/jgraphx](https://github.com/Freakboy/jgraphx) - jgraphx 4.0.4 build for cs project
- [monkeyWie/proxyee](https://github.com/monkeyWie/proxyee) - HTTP proxy server,support HTTPS&websocket.MITM impl,intercept and tamper HTTPS traffic.
- [geekxh/hello-algorithm](https://github.com/geekxh/hello-algorithm) - 🌍 针对小白的算法训练 | 包括四部分:①.大厂面经 ②.力扣图解 ③.千本开源电子书 ④.百张技术思维导图(项目花了上百小时,希望可以点 star 支持,🌹感谢~)推荐免费ChatGPT使用网站
- [xiaoxiaoleo/BurpSuite-Exclude-From-Scope](https://github.com/xiaoxiaoleo/BurpSuite-Exclude-From-Scope) -
- [L-JINBIN/ApkSignatureKiller](https://github.com/L-JINBIN/ApkSignatureKiller) - 一键破解APK签名校验
- [OneSourceCat/XxlJob-Hessian-RCE](https://github.com/OneSourceCat/XxlJob-Hessian-RCE) - XxlJob<=2.1.2配置不当情况下反序列化RCE
- [it-gorillaz/lnk2pwn](https://github.com/it-gorillaz/lnk2pwn) - Malicious Shortcut(.lnk) Generator
- [Nicky213Zhang/WeChatAssist](https://github.com/Nicky213Zhang/WeChatAssist) - 一款基于Android AccessibilityService(辅助服务)的自动操作微信的app,实现的功能有,附近的人自动打招呼,通讯录自动发消息,自动加好友,自动点赞评论,自定发漂流瓶,自动加群好友,自动推广公众号等等,同时,使用hook模块进行了微信的模拟定位,附近的人位置随意切换。
- [xiaoxiaoleo/Burp-Auto-Do-Intercept](https://github.com/xiaoxiaoleo/Burp-Auto-Do-Intercept) - Burp Suite Extender can auto intercept response for specify URL.
- [EXALAB/AnLinux-App](https://github.com/EXALAB/AnLinux-App) - AnLinux allow you to run Linux on Android without root access.
- [doyensec/burpdeveltraining](https://github.com/doyensec/burpdeveltraining) - Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"
- [luoyesiqiu/DexRepair](https://github.com/luoyesiqiu/DexRepair) - Android dex文件修复程序
- [bit4woo/burp-api-drops](https://github.com/bit4woo/burp-api-drops) - burp插件开发指南
- [rohanpadhye/JQF](https://github.com/rohanpadhye/JQF) - JQF + Zest: Coverage-guided semantic fuzzing for Java.
- [hakistan/Lokiboard-Mod](https://github.com/hakistan/Lokiboard-Mod) - Just Mod Version of lokiboard with remote reporting via Gmail
- [moloch--/burp-multiplayer](https://github.com/moloch--/burp-multiplayer) - Burp with Friends
- [c0ny1/java-memshell-scanner](https://github.com/c0ny1/java-memshell-scanner) - 通过jsp脚本扫描java web Filter/Servlet型内存马
- [DependencyTrack/dependency-track](https://github.com/DependencyTrack/dependency-track) - Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
- [motikan2010/CVE-2020-5398](https://github.com/motikan2010/CVE-2020-5398) - CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC
- [momosecurity/momo-code-sec-inspector-java](https://github.com/momosecurity/momo-code-sec-inspector-java) - IDEA静态代码安全审计及漏洞一键修复插件
- [Ramos-dev/OSSTunnel](https://github.com/Ramos-dev/OSSTunnel) - 基于亚马逊S3\阿里云OSS\腾讯COS通信隧道的远程管理工具
- [noidsirius/SootTutorial](https://github.com/noidsirius/SootTutorial) - A step-by-step tutorial for Soot (a Java static analysis framework)
- [f1tz/BCELCodeman](https://github.com/f1tz/BCELCodeman) - BCEL encode/decode manager for fastjson payloads
- [redtimmy/Richsploit](https://github.com/redtimmy/Richsploit) - Exploitation toolkit for RichFaces
- [J0hnWalker/MysqlMonitor](https://github.com/J0hnWalker/MysqlMonitor) - Mysql 语句执行记录监控
- [0x10f2c/Mini-Android-Challenges](https://github.com/0x10f2c/Mini-Android-Challenges) - A small Android CTF challenge
- [MountCloud/BehinderClientSource](https://github.com/MountCloud/BehinderClientSource) - ❄️冰蝎客户端源码-V4.0.6🔞
- [Y4er/CVE-2020-2551](https://github.com/Y4er/CVE-2020-2551) - Weblogic IIOP CVE-2020-2551
- [waderwu/attackRmi](https://github.com/waderwu/attackRmi) - attackRmi
- [ydnzol/memshell](https://github.com/ydnzol/memshell) - Tomcat 冰蝎内存马。
- [woodpecker-appstore/BCELConverter](https://github.com/woodpecker-appstore/BCELConverter) - BCEL class转换插件
- [Daybr4ak/ShiroScan](https://github.com/Daybr4ak/ShiroScan) - burp插件 ShiroScan 主要用于框架、无dnslog key检测
- [Conanjun/passive-scan-client-and-sendto](https://github.com/Conanjun/passive-scan-client-and-sendto) - burp被动扫描自动转发和手动重发插件
- [veracode-research/spring-view-manipulation](https://github.com/veracode-research/spring-view-manipulation) - When MVC magic turns black
- [z1Ro0/tomcat_nofile_webshell](https://github.com/z1Ro0/tomcat_nofile_webshell) - Tomcat基于动态注册Filter的无文件Webshell
- [Maskhe/FastjsonScan](https://github.com/Maskhe/FastjsonScan) - 一个简单的Fastjson反序列化检测burp插件
- [zhisheng17/flink-learning](https://github.com/zhisheng17/flink-learning) - flink learning blog. http://www.54tianzhisheng.cn/ 含 Flink 入门、概念、原理、实战、性能调优、源码解析等内容。涉及 Flink Connector、Metrics、Library、DataStream API、Table API & SQL 等内容的学习案例,还有 Flink 落地应用的大型项目案例(PVUV、日志存储、百亿数据实时去重、
- [Y4er/fastjson-bypass-autotype-1.2.68](https://github.com/Y4er/fastjson-bypass-autotype-1.2.68) - fastjson bypass autotype 1.2.68 with Throwable and AutoCloseable.
- [nutzam/nutz](https://github.com/nutzam/nutz) - Nutz -- Web Framework(Mvc/Ioc/Aop/Dao/Json) for ALL Java developer
- [ozzi-/JWT4B](https://github.com/ozzi-/JWT4B) - JWT Support for Burp
- [LuckyC4t/shiro-urldns](https://github.com/LuckyC4t/shiro-urldns) - shiro反序列化检测(只是个玩具23333)
- [0x141/ShiroRce-Burp](https://github.com/0x141/ShiroRce-Burp) -
- [wultra/powerauth-push-server](https://github.com/wultra/powerauth-push-server) - PowerAuth Push Server repository
- [xhycccc/Struts2-Vuln-Demo](https://github.com/xhycccc/Struts2-Vuln-Demo) - Struts2漏洞实例源码
- [Y4er/WebLogic-Shiro-shell](https://github.com/Y4er/WebLogic-Shiro-shell) - WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell
- [leibnitz27/cfr](https://github.com/leibnitz27/cfr) - This is the public repository for the CFR Java decompiler
- [alibaba/jvm-sandbox](https://github.com/alibaba/jvm-sandbox) - Real - time non-invasive AOP framework container based on JVM
- [5up3rc/weblogic_cmd](https://github.com/5up3rc/weblogic_cmd) - weblogic t3 deserialization rce
- [longofo/rmi-jndi-ldap-jrmp-jmx-jms](https://github.com/longofo/rmi-jndi-ldap-jrmp-jmx-jms) - rmi、jndi、ldap、jrmp、jmx、jms一些demo测试
- [Afant1/RemoteObjectInvocationHandler](https://github.com/Afant1/RemoteObjectInvocationHandler) - bypass JEP290 RaspHook code
- [Y4er/CVE-2020-2555](https://github.com/Y4er/CVE-2020-2555) - Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE
- [cdaller/security_taint_propagation](https://github.com/cdaller/security_taint_propagation) - Java taint propagation for java. Define tainted sources, sanitizer methods and sinks via aspects.
- [javaparser/javaparser](https://github.com/javaparser/javaparser) - Java 1-21 Parser and Abstract Syntax Tree for Java with advanced analysis functionalities.
- [JackOfMostTrades/gadgetinspector](https://github.com/JackOfMostTrades/gadgetinspector) - A byte code analyzer for finding deserialization gadget chains in Java applications
- [0Kee-Team/JavaProbe](https://github.com/0Kee-Team/JavaProbe) - A Java runtime information-gathering tool which uses the Java Attach API for information acquisition
- [soot-oss/soot](https://github.com/soot-oss/soot) - Soot - A Java optimization framework
- [GraxCode/cafecompare](https://github.com/GraxCode/cafecompare) - Java code comparison tool (jar / class)
- [threedr3am/fastjson-blacklist](https://github.com/threedr3am/fastjson-blacklist) - 打CTF实在厌倦了找利用链,就知道一个fastjson的版本,一堆依赖找啊找,头都疼。为了解决这个烦恼,用了卓卓师傅的fastjson黑名单工具和库,自己改造了一下。
- [Ramos-dev/R9000](https://github.com/Ramos-dev/R9000) -
- [threedr3am/log-agent](https://github.com/threedr3am/log-agent) - 利用agent hock指定的class,在jar运行周期内,用于跟踪被执行的方法,辅助做一些事情,比如挖洞啊
- [feihong-cs/Java-Rce-Echo](https://github.com/feihong-cs/Java-Rce-Echo) - Java RCE 回显测试代码
- [topjohnwu/libsu](https://github.com/topjohnwu/libsu) - A complete solution for apps using root permissions
- [fluency03/leetcode-java](https://github.com/fluency03/leetcode-java) - 🎓🎓🎓 Leetcode solution in Java - 536/921 Solved. https://leetcode.com/problemset/all/
- [potats0/cve_2020_14644](https://github.com/potats0/cve_2020_14644) -
- [oversecured/ovaa](https://github.com/oversecured/ovaa) - Oversecured Vulnerable Android App
- [metersphere/metersphere](https://github.com/metersphere/metersphere) - MeterSphere 是新一代的开源持续测试工具,让软件测试工作更简单、更高效,不再成为持续交付的瓶颈。
- [pyn3rd/Apache-Tomcat-Redis-Remote-Code-Execution](https://github.com/pyn3rd/Apache-Tomcat-Redis-Remote-Code-Execution) - Apache-Tomcat-Redis-Remote-Code-Execution
- [Wh0ale/CAS_Execution_decode](https://github.com/Wh0ale/CAS_Execution_decode) - Apereo CAS payload AES解密
- [iqiyi/Lens](https://github.com/iqiyi/Lens) - 功能简介:一种开发帮助产品研发的效率工具。主要提供了:页面分析、任务分析、网络分析、DataDump、自定义hook 、Data Explorer 等功能。以帮助开发、测试、UI 等同学更便捷的排查和定位问题,提升开发效率。
- [pmiaowu/BurpShiroPassiveScan](https://github.com/pmiaowu/BurpShiroPassiveScan) - 一款基于BurpSuite的被动式shiro检测插件
- [momosecurity/oxpecker](https://github.com/momosecurity/oxpecker) - oxpecker是一款用于从IDE提取开发项目仓库地址、当前分支、三方组件等信息用于安全分析的JetBrains家族IDE插件。
- [momosecurity/mosec-maven-plugin](https://github.com/momosecurity/mosec-maven-plugin) - 用于检测maven项目的第三方依赖组件是否存在安全漏洞。
- [momosecurity/mosec-gradle-plugin](https://github.com/momosecurity/mosec-gradle-plugin) - 用于检测gradle项目的第三方依赖组件是否存在安全漏洞。
- [snyk/snyk-maven-plugin](https://github.com/snyk/snyk-maven-plugin) - Test and monitor your projects for vulnerabilities with Maven. This plugin is officially maintained by Snyk.
- [thatcherclough/BetterBackdoor](https://github.com/thatcherclough/BetterBackdoor) - A backdoor with a multitude of features.
- [ThisIsLibra/AndroidProjectCreator](https://github.com/ThisIsLibra/AndroidProjectCreator) - Convert an APK to an Android Studio Project using multiple open-source decompilers
- [pwntester/StaticInitializerPayload](https://github.com/pwntester/StaticInitializerPayload) -
- [shuzijun/leetcode-editor](https://github.com/shuzijun/leetcode-editor) - Do Leetcode exercises in IDE, support leetcode.com and leetcode-cn.com, to meet the basic needs of doing exercises.Support theoretically: IntelliJ IDEA PhpStorm WebStorm PyCharm RubyMine AppCode CLion
- [stevespringett/threatmodel-sdk](https://github.com/stevespringett/threatmodel-sdk) - A Java library for parsing and programmatically using threat models
- [potats0/shiroPoc](https://github.com/potats0/shiroPoc) -
- [fupinglee/ShiroScan](https://github.com/fupinglee/ShiroScan) - Shiro RememberMe 1.2.4 反序列化漏洞图形化检测工具(Shiro-550)
- [tangxiaofeng7/Fofa-collect](https://github.com/tangxiaofeng7/Fofa-collect) - Fofa平台采集工具
- [wh1t3p1g/ysoserial](https://github.com/wh1t3p1g/ysoserial) - forked from frohoff/ysoserial and added my own payloads.
- [huanzi-qch/base-admin](https://github.com/huanzi-qch/base-admin) - Base Admin一套简单通用的后台管理系统,主要功能有:权限管理、菜单管理、用户管理,系统设置、实时日志,实时监控,API加密,以及登录用户修改密码、配置个性菜单等
- [NickstaDB/SerializationDumper](https://github.com/NickstaDB/SerializationDumper) - A tool to dump Java serialization streams in a more human readable form.
- [Y4er/CVE-2020-14645](https://github.com/Y4er/CVE-2020-14645) - Weblogic CVE-2020-14645 UniversalExtractor JNDI injection getDatabaseMetaData()
- [lalajun/RMIDeserialize](https://github.com/lalajun/RMIDeserialize) - RMI 反序列化环境 一步步
- [phith0n/JavaThings](https://github.com/phith0n/JavaThings) - Share Things Related to Java - Java安全漫谈笔记相关内容
- [langligelang/CAS_EXP](https://github.com/langligelang/CAS_EXP) - CAS 硬编码 远程代码执行漏洞
- [ztosec/secscan-authcheck](https://github.com/ztosec/secscan-authcheck) - 越权检测工具
- [NetSPI/JavaSerialKiller](https://github.com/NetSPI/JavaSerialKiller) - Burp extension to perform Java Deserialization Attacks
- [fairyming/CVE-2020-9547](https://github.com/fairyming/CVE-2020-9547) - CVE-2020-9547:FasterXML/jackson-databind 远程代码执行漏洞
- [canyie/pine](https://github.com/canyie/pine) - Dynamic java method hook framework on ART. Allowing you to change almost all java methods' behavior dynamically.
- [google/tsunami-security-scanner](https://github.com/google/tsunami-security-scanner) - Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
- [SycloverSecurity/SCTF2020](https://github.com/SycloverSecurity/SCTF2020) - SCTF2020
- [keycloak/keycloak](https://github.com/keycloak/keycloak) - Open Source Identity and Access Management For Modern Applications and Services
- [mogwailabs/rmi-deserialization](https://github.com/mogwailabs/rmi-deserialization) - Slides/Demos from the BSides Munich 2019 talk "Attacking Java RMI in 2019"
- [Ch1ngg/WebLogicPasswordDecryptorUi](https://github.com/Ch1ngg/WebLogicPasswordDecryptorUi) - 解密weblogic AES或DES加密方法
- [jas502n/CVE-2020-5902](https://github.com/jas502n/CVE-2020-5902) - CVE-2020-5902 BIG-IP
- [Ch0pin/AndroidWebDoor](https://github.com/Ch0pin/AndroidWebDoor) - A minimalistic android backdoor
- [core-lib/xjar](https://github.com/core-lib/xjar) - Spring Boot JAR 安全加密运行工具,支持的原生JAR。
- [victordiaz/PHONK](https://github.com/victordiaz/PHONK) - PHONK is a coding playground for new and old Android devices
- [spoofzu/jvmxray](https://github.com/spoofzu/jvmxray) - Externalize Java application access to protected resources as log messages.
- [bage2014/study](https://github.com/bage2014/study) - Java全栈工程师学习笔记;Spring、shiro、CAS、oauth2单点登录;cache 、Redis; web 安全及解决思路;redis、mq、quartz、docker;Docker各种组件实践等;mybatis、spring、spring boot实践;分布式锁;基于分库分表等等;Java full-stack engineer study notes; Spring, shiro,
- [TimeAndSpaceIO/CronScheduler](https://github.com/TimeAndSpaceIO/CronScheduler) - An alternative to ScheduledThreadPoolExecutor proof against the clock drift problem
- [wh1t3p1g/ysomap](https://github.com/wh1t3p1g/ysomap) - A helpful Java Deserialization exploit framework.
- [cdk8s/tkey](https://github.com/cdk8s/tkey) - 以材料最全、示例最多为目标的单点登录系统(SSO)
- [Ruil1n/after-deserialization-attack](https://github.com/Ruil1n/after-deserialization-attack) - Java After-Deserialization Attack
- [iamyours/ApkCrack](https://github.com/iamyours/ApkCrack) - A tool that make your apk debuggable for Charles/Fiddler in Android 7.0
- [feix760/WebViewDebugHook](https://github.com/feix760/WebViewDebugHook) - Use Xposed force all webView to debug on android 4.4+
- [ba0zi/Spring-Boot-Actuator-Exploit](https://github.com/ba0zi/Spring-Boot-Actuator-Exploit) - Spring Boot Actuator (jolokia) XXE/RCE
- [bigsizeme/shiro-check](https://github.com/bigsizeme/shiro-check) - Shiro反序列化回显利用、内存shell、检查 Burp插件
- [dineshshetty/FridaLoader](https://github.com/dineshshetty/FridaLoader) - A quick and dirty app to download and launch Frida on Genymotion and rooted Physical Android Devices
- [jpiechowka/burp-security-headers-checker](https://github.com/jpiechowka/burp-security-headers-checker) - Super simple Burp Suite extension adding passive scanner checks for missing security headers in server responses
- [salesforce/VulnreportForBurp](https://github.com/salesforce/VulnreportForBurp) - Burp Suite extension to enable reporting findings directly to VulnReport
- [celsogbezerra/Copy-as-JavaScript-Request](https://github.com/celsogbezerra/Copy-as-JavaScript-Request) - Copy as JavaScript Request plugin for Burp Suite
- [raise-isayan/YaguraExtender](https://github.com/raise-isayan/YaguraExtender) - Burpsuite extension. Supports CJK (Chinese, Japanese, Korean) encoding.
- [bit4woo/burp-api-common](https://github.com/bit4woo/burp-api-common) - common methods that used by my burp extension projects
- [ldionmarcil/burp-samesite-reporter](https://github.com/ldionmarcil/burp-samesite-reporter) - Burp extension that passively reports various SameSite flags
- [augustd/burp-suite-swaggy](https://github.com/augustd/burp-suite-swaggy) - Burp Suite extension for parsing Swagger web service definition files
- [raise-isayan/BigIPDiscover](https://github.com/raise-isayan/BigIPDiscover) - It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect that IP
- [madneal/r-forwarder-burp](https://github.com/madneal/r-forwarder-burp) - The burp extension to forward the request
- [wrvenkat/burp-multistep-csrf-poc](https://github.com/wrvenkat/burp-multistep-csrf-poc) - Burp extension to generate multi-step CSRF POC.
- [augustd/burp-suite-jsonpath](https://github.com/augustd/burp-suite-jsonpath) - JSONPath extension for BurpSuite
- [righettod/log-requests-to-sqlite](https://github.com/righettod/log-requests-to-sqlite) - BURP extension to record every HTTP request send via BURP and create an audit trail log of an assessment.
- [usdAG/cstc](https://github.com/usdAG/cstc) - CSTC is a Burp Suite extension that allows request/response modification using a GUI analogous to CyberChef
- [humblelad/TeaBreak](https://github.com/humblelad/TeaBreak) - A productivity burp extension which reminds to take break while you are at work!
- [cxxsheng/profiler](https://github.com/cxxsheng/profiler) - A tool to trace java method dynamically for android application.
- [angelwhu/jvm-rasp](https://github.com/angelwhu/jvm-rasp) - 基于JVM-Sandbox实现RASP安全监控防护
- [pyn3rd/Apache-Tomcat-MongoDB-Remote-Code-Execution](https://github.com/pyn3rd/Apache-Tomcat-MongoDB-Remote-Code-Execution) - Apache Tomcat + MongoDB Remote Code Execution
- [asLody/SandVXposed](https://github.com/asLody/SandVXposed) - Xposed environment without root (OS 5.0 - 10.0)
- [feihong-cs/JspMaster-Deprecated](https://github.com/feihong-cs/JspMaster-Deprecated) - 一款基于webshell命令执行功能实现的GUI webshell管理工具,支持流量加密
- [zsdlove/fortify-license-crack](https://github.com/zsdlove/fortify-license-crack) - fortify-license-crack
- [la0s/JustTrustMe-master](https://github.com/la0s/JustTrustMe-master) - 在JustTrustMe的基础上修改了log日志打印位置,便于追踪hook函数
- [iSafeBlue/fastjson-autotype-bypass-demo](https://github.com/iSafeBlue/fastjson-autotype-bypass-demo) - fastjson 1.2.68 版本 autotype bypass
- [LeadroyaL/fastjson-blacklist](https://github.com/LeadroyaL/fastjson-blacklist) -
- [mpgn/Spring-Boot-Actuator-Exploit](https://github.com/mpgn/Spring-Boot-Actuator-Exploit) - Spring Boot Actuator (jolokia) XXE/RCE
- [nccgroup/freddy](https://github.com/nccgroup/freddy) - Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans
- [langgithub/RxAppEncryptionProtocol](https://github.com/langgithub/RxAppEncryptionProtocol) - frida反特征检测 app协议破解 Frida破解协议 sslping抓包 通用逆向破解 打印native动态注册函数
- [0ffffffffh/dragondance](https://github.com/0ffffffffh/dragondance) - Binary code coverage visualizer plugin for Ghidra
- [zjkhiyori/hack-root](https://github.com/zjkhiyori/hack-root) - Android APP get root-level permissions without rooted system
- [bihe0832/Android-GetAPKInfo](https://github.com/bihe0832/Android-GetAPKInfo) - 获取Android应用基本信息的工具集
- [Wfzsec/FastJson1.2.62-RCE](https://github.com/Wfzsec/FastJson1.2.62-RCE) - 来源于jackson-CVE-2020-8840,需要开autotype
- [veracode-research/rogue-jndi](https://github.com/veracode-research/rogue-jndi) - A malicious LDAP server for JNDI injection attacks
- [whwlsfb/BurpCrypto](https://github.com/whwlsfb/BurpCrypto) - BurpCrypto is a collection of burpsuite encryption plug-ins, support AES/RSA/DES/ExecJs(execute JS encryption code in burpsuite). 支持多种加密算法或直接执行JS代码的用于爆破前端加密的BurpSuite插件
- [BishopFox/rmiscout](https://github.com/BishopFox/rmiscout) - RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities
- [anatolikalysch/roots_a11y](https://github.com/anatolikalysch/roots_a11y) - PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.
- [threedr3am/JSP-WebShells](https://github.com/threedr3am/JSP-WebShells) - Collect JSP webshell of various implementation methods. 收集JSP Webshell的各种姿势
- [langgithub/JustTrustMePlus](https://github.com/langgithub/JustTrustMePlus) -
- [LandGrey/SpringBootVulExploit](https://github.com/LandGrey/SpringBootVulExploit) - SpringBoot 相关漏洞学习资料,利用方法和技巧合集,黑盒安全评估 check list
- [threedr3am/tomcat-cluster-session-sync-exp](https://github.com/threedr3am/tomcat-cluster-session-sync-exp) - tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484是session持久化的洞,这个是session集群同步的洞!
- [yudaocode/SpringBoot-Labs](https://github.com/yudaocode/SpringBoot-Labs) - 一个涵盖六个专栏:Spring Boot 2.X、Spring Cloud、Spring Cloud Alibaba、Dubbo、分布式消息队列、分布式事务的仓库。希望胖友小手一抖,右上角来个 Star,感恩 1024
- [Slzdude/behinder_source](https://github.com/Slzdude/behinder_source) - Behinder3.0 Beta4 源码(Decompile and Fixed)
- [Y4er/CVE-2020-2883](https://github.com/Y4er/CVE-2020-2883) - Weblogic coherence.jar RCE
- [LinShunKang/MyPerf4J](https://github.com/LinShunKang/MyPerf4J) - High performance Java APM. Powered by ASM. Try it. Test it. If you feel its better, use it.
- [GraxCode/threadtear](https://github.com/GraxCode/threadtear) - Multifunctional java deobfuscation tool suite
- [ElderDrivers/EdXposedManager](https://github.com/ElderDrivers/EdXposedManager) - Companion Android application for EdXposed
- [PortSwigger/param-miner](https://github.com/PortSwigger/param-miner) -
- [feihong-cs/ShiroExploit-Deprecated](https://github.com/feihong-cs/ShiroExploit-Deprecated) - Shiro550/Shiro721 一键化利用工具,支持多种回显方式
- [yzddmr6/JspForAntSword](https://github.com/yzddmr6/JspForAntSword) - 中国蚁剑JSP一句话Payload
- [NetsOSS/headless-burp](https://github.com/NetsOSS/headless-burp) - Automate security tests using Burp Suite.
- [nccgroup/CollaboratorPlusPlus](https://github.com/nccgroup/CollaboratorPlusPlus) -
- [xkcoding/spring-boot-demo](https://github.com/xkcoding/spring-boot-demo) - 🚀一个用来深入学习并实战 Spring Boot 的项目。
- [nccgroup/LoggerPlusPlus](https://github.com/nccgroup/LoggerPlusPlus) - Advanced Burp Suite Logging Extension
- [google/firing-range](https://github.com/google/firing-range) -
- [SPuerBRead/Bridge](https://github.com/SPuerBRead/Bridge) - 无回显漏洞测试辅助平台,平台使用Java编写,提供DNSLOG,HTTPLOG等功能,辅助渗透测试过程中无回显漏洞及SSRF等漏洞的验证和利用。
- [rsrdesarrollo/generator-burp-extension](https://github.com/rsrdesarrollo/generator-burp-extension) - Everything you need about Burp Extension Generation
- [mr-m0nst3r/Burpy](https://github.com/mr-m0nst3r/Burpy) - A plugin that allows you execute python and get return to BurpSuite.
- [c0ny1/java-object-searcher](https://github.com/c0ny1/java-object-searcher) - java内存对象搜索辅助工具
- [SonarSource/sonarqube](https://github.com/SonarSource/sonarqube) - Continuous Inspection
- [find-sec-bugs/find-sec-bugs](https://github.com/find-sec-bugs/find-sec-bugs) - The SpotBugs plugin for security audits of Java web applications and Android applications. (Also work with Kotlin, Groovy and Scala projects)
- [ffffffff0x/CryptionTool](https://github.com/ffffffff0x/CryptionTool) - 一个CTF+渗透测试工具框架,集成常见加解密,密码、编码转换,端口扫描,字符处理等功能
- [somowhere/albedo](https://github.com/somowhere/albedo) - Albedo 是一个Java企业应用开源框架,使用经典技术组合(SpringBoot2.x、MyBatis、Vue),包括核心模块如:组织机构、角色用户、权限授权、数据权限、代码生成、定时任务等。
- [wuyr/PathLayoutManager](https://github.com/wuyr/PathLayoutManager) - RecyclerView的LayoutManager,轻松实现各种炫酷、特殊效果,再也不怕产品经理为难!
- [Byron4j/CookBook](https://github.com/Byron4j/CookBook) - 🎉🎉🎉JAVA高级架构师技术栈==任何技能通过 “刻意练习” 都可以达到融会贯通的境界,就像烹饪一样,这里有一份JAVA开发技术手册,只需要增加自己练习的次数。🏃🏃🏃
- [work-helper/class-decompile-intellij](https://github.com/work-helper/class-decompile-intellij) - decompile .class file
- [AnyListen/tools-ocr](https://github.com/AnyListen/tools-ocr) - 树洞 OCR 文字识别(一款跨平台的 OCR 小工具)
- [Zo3i/frpMgr](https://github.com/Zo3i/frpMgr) - Frp快速配置面板
- [threedr3am/gadgetinspector](https://github.com/threedr3am/gadgetinspector) - 一个利用ASM对字节码进行污点传播分析的静态代码审计应用(添加了大量代码注释,适合大家进行源码学习)。也加入了挖掘Fastjson反序列化gadget chains和SQLInject(JdbcTemplate、MyBatis、JPA、Hibernate、原生jdbc等)静态检测功能。并且加入了很多功能以方便进行漏洞自动化挖掘。
- [threedr3am/FindClassInJars](https://github.com/threedr3am/FindClassInJars) - 个人用于在自动化挖掘gadget时,方便查找gadget chains中class所在jar包,以助于便捷审计测试gadget有效性的那么一个小工具。
- [jas502n/jackson-CVE-2020-8840](https://github.com/jas502n/jackson-CVE-2020-8840) - FasterXML/jackson-databind 远程代码执行漏洞
- [BishopFox/GadgetProbe](https://github.com/BishopFox/GadgetProbe) - Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.
- [threedr3am/learnjavabug](https://github.com/threedr3am/learnjavabug) - Java安全相关的漏洞和技术demo,原生Java、Fastjson、Jackson、Hessian2、XML反序列化漏洞利用和Spring、Dubbo、Shiro、CAS、Tomcat、RMI、Nexus等框架\中间件\功能的exploits以及Java Security Manager绕过、Dubbo-Hessian2安全加固等等实践代码。
- [charles2gan/GDA-android-reversing-Tool](https://github.com/charles2gan/GDA-android-reversing-Tool) - the fastest and most powerful android decompiler(native tool working without Java VM) for the APK, DEX, ODEX, OAT, JAR, AAR, and CLASS file. which supports malicious behavior detection, privacy leakin
- [TideSec/Decrypt_Weblogic_Password](https://github.com/TideSec/Decrypt_Weblogic_Password) - 搜集了市面上绝大部分weblogic解密方式,整理了7种解密weblogic的方法及响应工具。
- [alipay/SoloPi](https://github.com/alipay/SoloPi) - SoloPi 自动化测试工具
- [dkhadoop/dk-fitting](https://github.com/dkhadoop/dk-fitting) - Fitting是一个面向大数据的统一的开发框架,由大快搜索主导并完全开源,克服了大数据技术开发涉及技术面广,各组件间缺乏统一规范等问题,能有效降低大数据的学习难度,并提高大数据项目的开发效率并可与开源项目混用。 Fitting遵循Apache2.0开源协议,采用类黑箱框架模式,将大数据生态圈内各组件底层API根据应用组合封装为Fitting API服务。用户编程时直接引用Fitting框架,即可使
- [Genymobile/gnirehtet](https://github.com/Genymobile/gnirehtet) - Gnirehtet provides reverse tethering for Android
- [oracle/opengrok](https://github.com/oracle/opengrok) - OpenGrok is a fast and usable source code search and cross reference engine, written in Java
- [mock-server/mockserver](https://github.com/mock-server/mockserver) - MockServer enables easy mocking of any system you integrate with via HTTP or HTTPS with clients written in Java, JavaScript and Ruby. MockServer also includes a proxy that introspects all proxied tra
- [DayorNight/BLCS](https://github.com/DayorNight/BLCS) - 一款集合多个Android开源库的使用工具,可以展示各个开源库的特性。并简单了解其使用方法。包含[★1.1仿微信功能-字体大小★1.2仿微信功能-存储空间★1.3仿微信功能-多语言★1.4仿微信功能-地区选择★2.BottomNavigationView★3.RecyclerView4.DialogFragment★5.toolbar★6.RxToast★7.转盘小游戏★8.跑马灯/水波纹/标签★
- [Guardsquare/proguard](https://github.com/Guardsquare/proguard) - ProGuard, Java optimizer and obfuscator
- [welk1n/JNDI-Injection-Exploit](https://github.com/welk1n/JNDI-Injection-Exploit) - JNDI注入测试工具(A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability,like Jackson,Fastjson,etc)
- [bastillion-io/Bastillion](https://github.com/bastillion-io/Bastillion) - Bastillion is a web-based SSH console that centrally manages administrative access to systems. Web-based administration is combined with management and distribution of user's public SSH keys.
- [wrlu/SecMobile](https://github.com/wrlu/SecMobile) - 移动安全检测平台,支持Android和iOS应用辅助分析。
- [wrlu/FridaHooker](https://github.com/wrlu/FridaHooker) - Android Frida GUI Manager // An advanced version by @icespite :https://github.com/icespite/FridaHooker
- [tchiotludo/akhq](https://github.com/tchiotludo/akhq) - Kafka GUI for Apache Kafka to manage topics, topics data, consumers group, schema registry, connect and more...
- [fntneves/falcon](https://github.com/fntneves/falcon) - Falcon: A practical log-based analysis tool for distributed systems
- [ricardojba/poi-slinger](https://github.com/ricardojba/poi-slinger) - Automatically identify serialization issues in PHP Frameworks by means of an Burp Suite active scan
- [iamaldi/rapid](https://github.com/iamaldi/rapid) - Rapid is a Burp extension that enables you to save HTTP Request & Response data to a single file a lot easier and faster in one go.
- [c0ny1/burp-cookie-porter](https://github.com/c0ny1/burp-cookie-porter) - 一个可快速“搬运”cookie的Burp Suite插件
- [lilifengcode/Burpsuite-Plugins-Usage](https://github.com/lilifengcode/Burpsuite-Plugins-Usage) - Burpsuite-Plugins-Usage
- [c0ny1/sqlmap4burp-plus-plus](https://github.com/c0ny1/sqlmap4burp-plus-plus) - sqlmap4burp++是一款兼容Windows,mac,linux多个系统平台的Burp与sqlmap联动插件
- [c0ny1/passive-scan-client](https://github.com/c0ny1/passive-scan-client) - Burp被动扫描流量转发插件
- [c0ny1/captcha-killer](https://github.com/c0ny1/captcha-killer) - burp验证码识别接口调用插件
- [nelenkov/android-backup-extractor](https://github.com/nelenkov/android-backup-extractor) - Android backup extractor
- [woozoo73/adonistrack](https://github.com/woozoo73/adonistrack) - Simple Java profiling tool
- [wultra/powerauth-cmd-tool](https://github.com/wultra/powerauth-cmd-tool) - Command-line utility for PowerAuth Reference Client
- [itemic/rotacsufbo](https://github.com/itemic/rotacsufbo) - did u know the name of the repo is obfuscator backwards?
- [wultra/powerauth-mobile-sdk](https://github.com/wultra/powerauth-mobile-sdk) - PowerAuth Mobile SDK for adds capability for authentication and transaction signing into the mobile apps (ios, watchos, android).
- [HTBridge/pivaa](https://github.com/HTBridge/pivaa) - Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of mobile vulnerability scanners.
- [1ultimat3/BadIntent](https://github.com/1ultimat3/BadIntent) - Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite
- [appsecco/VyAPI](https://github.com/appsecco/VyAPI) - VyAPI - A cloud based vulnerable hybrid Android App
- [gpengDemo/Estore](https://github.com/gpengDemo/Estore) - Java 语言实现的 苹果网上商城 ,前端模仿 苹果爱否 商城的页面 ,后端运用纯 Servlet + JSP +c3p0 数据库连接池以及web 相关技术,实现的基础功能包括前后台、实现展示首页、管理商品页面、商品分类、添加购物车、购买、提交订单 、联系客服等 ,欢迎 star,谢谢!!!
- [tianshiyeben/wgcloud](https://github.com/tianshiyeben/wgcloud) - Linux运维监控工具,支持系统硬件信息,内存,cpu,温度,磁盘空间及IO,硬盘smart,系统负载,网络流量等监控,服务接口,大屏展示,拓扑图,进程监控,端口监控,docker监控,文件防篡改,日志监控,数据可视化,web ssh,堡垒机,指令下发批量执行,Linux面板(探针),SNMP,故障告警,计划任务,账号管理,资产管理
- [boy-hack/wooyun-payload](https://github.com/boy-hack/wooyun-payload) - 从wooyun中提取的payload,以及burp插件
- [imperva/automatic-api-attack-tool](https://github.com/imperva/automatic-api-attack-tool) - Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an output.
- [OWASP/MASTG-Hacking-Playground](https://github.com/OWASP/MASTG-Hacking-Playground) -
- [payatu/diva-android](https://github.com/payatu/diva-android) - DIVA Android - Damn Insecure and vulnerable App for Android
- [facebook/stetho](https://github.com/facebook/stetho) - Stetho is a debug bridge for Android applications, enabling the powerful Chrome Developer Tools and much more.
- [android-notes/SwissArmyKnife](https://github.com/android-notes/SwissArmyKnife) - android ui调试工具
- [ernw/AndroTickler](https://github.com/ernw/AndroTickler) - Penetration testing and auditing toolkit for Android apps.
- [patrickfav/uber-apk-signer](https://github.com/patrickfav/uber-apk-signer) - A cli tool that helps signing and zip aligning single or multiple Android application packages (APKs) with either debug or provided release certificates. It supports v1, v2 and v3 Android signing sche
- [android-hacker/VirtualXposed](https://github.com/android-hacker/VirtualXposed) - A simple app to use Xposed without root, unlock the bootloader or modify system image, etc.
- [google/android-classyshark](https://github.com/google/android-classyshark) - Android and Java bytecode viewer
- [heibaiying/BigData-Notes](https://github.com/heibaiying/BigData-Notes) - 大数据入门指南 :star:
- [LeadroyaL/java_xxe_2019](https://github.com/LeadroyaL/java_xxe_2019) - 总结了一下2019年在JVM环境中使用XXE攻击的知识
- [federicodotta/Brida](https://github.com/federicodotta/Brida) - The new bridge between Burp Suite and Frida!
- [guanchao/apk_auto_enforce](https://github.com/guanchao/apk_auto_enforce) - APK一键自动化加固脚本
- [oneWayOut/atlassian-agent](https://github.com/oneWayOut/atlassian-agent) - Atlassian's productions crack.
- [bes2008/sqlhelper](https://github.com/bes2008/sqlhelper) - SQL Tools ( Dialect, Pagination, DDL dump, UrlParser, SqlStatementParser, WallFilter, BatchExecutor for Test) based Java. it is easy to integration into any ORM frameworks
- [c0ny1/FastjsonExploit](https://github.com/c0ny1/FastjsonExploit) - Fastjson vulnerability quickly exploits the framework(fastjson漏洞快速利用框架)
- [louislivi/fastdep](https://github.com/louislivi/fastdep) - Fast integration dependencies in spring boot.是一个快速集成依赖的框架,集成了一些常用公共的依赖。例:多数据源,Redis,JWT...
- [201206030/novel](https://github.com/201206030/novel) - novel 是一套基于时下最新 Java 技术栈 Spring Boot 3 + Vue 3 开发的前后端分离学习型小说项目,配备保姆级教程手把手教你从零开始开发上线一套生产级别的 Java 系统,由小说门户系统、作家后台管理系统、平台后台管理系统等多个子系统构成。包括小说推荐、作品检索、小说排行榜、小说阅读、小说评论、会员中心、作家专区、充值订阅、新闻发布等功能。
- [gulihua10010/eshop](https://github.com/gulihua10010/eshop) - 基于Spring Boot +Dubbo微服务商城系统
- [LiuKay/mmall-java](https://github.com/LiuKay/mmall-java) - A simple project to learn different architecture (Monolithic on SpringBoot, Microservices on SpringCloud, K8S etc.). 一个简单的学习项目(Mall 商城), 用来学习单体架构,微服务架构,K8S等
- [GrowingGit/GitHub-Chinese-Top-Charts](https://github.com/GrowingGit/GitHub-Chinese-Top-Charts) - :cn: GitHub中文排行榜,各语言分设「软件 | 资料」榜单,精准定位中文好项目。各取所需,高效学习。
- [ylw-github/pingyougou](https://github.com/ylw-github/pingyougou) - 使用IDEA版本开发品优购商城项目
- [justauth/JustAuth](https://github.com/justauth/JustAuth) - 🏆Gitee 最有价值开源项目 🚀:100: 小而全而美的第三方登录开源组件。目前已支持Github、Gitee、微博、钉钉、百度、Coding、腾讯云开发者平台、OSChina、支付宝、QQ、微信、淘宝、Google、Facebook、抖音、领英、小米、微软、今日头条、Teambition、StackOverflow、Pinterest、人人、华为、企业微信、酷家乐、Gitlab、美团、饿了么、
- [jeequan/jeepay](https://github.com/jeequan/jeepay) - Jeepay是一套适合互联网企业使用的开源支付系统,支持多渠道服务商和普通商户模式。已对接微信支付,支付宝,云闪付官方接口,支持聚合码支付。
- [elunez/eladmin](https://github.com/elunez/eladmin) - eladmin jpa 版本:项目基于 Spring Boot 2.6.4、 Jpa、 Spring Security、Redis、Vue的前后端分离的后台管理系统,项目采用分模块开发方式, 权限控制采用 RBAC,支持数据字典与数据权限管理,支持一键生成前后端代码,支持动态路由
- [tanling8334/Matplot3D-for-Java](https://github.com/tanling8334/Matplot3D-for-Java) - Matplot3D for java. It is a library for drawing 3D plot
- [zhegexiaohuozi/SeimiCrawler](https://github.com/zhegexiaohuozi/SeimiCrawler) - 一个简单、敏捷、分布式的支持SpringBoot的Java爬虫框架;An agile, distributed crawler framework.
- [hope-for/hope-cloud](https://github.com/hope-for/hope-cloud) - :whale: Hope-Cloud 微服务框架
- [sun0x00/redtorch](https://github.com/sun0x00/redtorch) - Kotlin(Java)开源量化交易开发框架
- [IndexOutOfBounds998/quant4j](https://github.com/IndexOutOfBounds998/quant4j) - 火币量化交易 指标组合策略 简单的数值策略 这个项目只是提供一个思路。
- [2bcoin/zheshiyigeniubidexiangmu](https://github.com/2bcoin/zheshiyigeniubidexiangmu) - 数字货币量化交易系统,支持多家交易所
- [java-aodeng/hope-boot](https://github.com/java-aodeng/hope-boot) - 🌱 一款现代化的脚手架项目
- [guangzhengli/spring-framework](https://github.com/guangzhengli/spring-framework) - 对 Spring 源码的解读分析
- [ScaleSec/vulnado](https://github.com/ScaleSec/vulnado) - Purposely vulnerable Java application to help lead secure coding workshops
- [macrozheng/mall-learning](https://github.com/macrozheng/mall-learning) - mall学习教程,架构、业务、技术要点全方位解析。mall项目(60k+star)是一套电商系统,使用现阶段主流技术实现。涵盖了SpringBoot、MyBatis、Elasticsearch、RabbitMQ、Redis、MongoDB、Mysql等技术,采用Docker容器化部署。
- [apache/dolphinscheduler](https://github.com/apache/dolphinscheduler) - Apache DolphinScheduler is the modern data orchestration platform. Agile to create high performance workflow with low-code
- [forezp/SpringCloudLearning](https://github.com/forezp/SpringCloudLearning) - 《史上最简单的Spring Cloud教程源码》
- [PortSwigger/authz](https://github.com/PortSwigger/authz) -
- [ZHENFENG13/concurrent-programming](https://github.com/ZHENFENG13/concurrent-programming) - :cactus:《实战java高并发程序设计》源码整理
- [hustcc/JS-Sorting-Algorithm](https://github.com/hustcc/JS-Sorting-Algorithm) - 一本关于排序算法的 GitBook 在线书籍 《十大经典排序算法》,多语言实现。
- [chenhaoxiang/Java](https://github.com/chenhaoxiang/Java) - Java的学习之路,学习JavaEE以及框架时候的一些项目,结合博客和源码,让你受益匪浅,适合Java初学者和刚入门开始学框架者
- [JeffLi1993/java-core-learning-example](https://github.com/JeffLi1993/java-core-learning-example) - 关于Java核心技术学习积累的例子,是初学者及核心技术巩固的最佳实践。
- [TheKingOfDuck/burpFakeIP](https://github.com/TheKingOfDuck/burpFakeIP) - 服务端配置错误情况下用于伪造ip地址进行测试的Burp Suite插件
- [GHBlade/Msgs](https://github.com/GHBlade/Msgs) - 短信群发,支持单卡/双卡,发送短信,Excel导入
- [jeecgboot/JeecgBoot](https://github.com/jeecgboot/JeecgBoot) - 🔥「企业级低代码平台」前后端分离架构SpringBoot 2.x/3.x,SpringCloud,Ant Design&Vue3,Mybatis,Shiro,JWT。强大的代码生成器让前后端代码一键生成,无需写任何代码! 引领新的开发模式OnlineCoding->代码生成->手工MERGE,帮助Java项目解决70%重复工作,让开发更关注业务,既能快速提高效率,帮助公司节省成本,同时
- [Carson-Ho/RxJavaLearningMaterial](https://github.com/Carson-Ho/RxJavaLearningMaterial) - 这是一份详细的RxJava学习攻略 & 指南
- [zhuzhiqiang18/Second-hand-mall](https://github.com/zhuzhiqiang18/Second-hand-mall) - 模仿咸鱼的二手交易商城
- [zhaojun1998/Shiro-Action](https://github.com/zhaojun1998/Shiro-Action) - 基于 Shiro 的权限管理系统,支持 restful url 授权,体验地址 :
- [michaelliao/itranswarp](https://github.com/michaelliao/itranswarp) - Full-featured CMS including blog, wiki, discussion, etc. Cloud native application that powered by SpringBoot.
- [JoyChou93/java-sec-code](https://github.com/JoyChou93/java-sec-code) - Java web common vulnerabilities and security code which is base on springboot and spring security
- [eclipse/steady](https://github.com/eclipse/steady) - Analyses your Java applications for open-source dependencies with known vulnerabilities, using both static analysis and testing to determine code context and usage for greater accuracy. https://eclip
- [momosecurity/rhizobia_J](https://github.com/momosecurity/rhizobia_J) - JAVA安全SDK及编码规范
- [hansonwang99/Spring-Boot-In-Action](https://github.com/hansonwang99/Spring-Boot-In-Action) - Spring Boot 系列实战合集
- [c0ny1/jsEncrypter](https://github.com/c0ny1/jsEncrypter) - 一个用于前端加密Fuzz的Burp Suite插件
- [malizhigithub/answerWeb](https://github.com/malizhigithub/answerWeb) - 基于SSM在线答题系统
- [bit4woo/Java_deserialize_vuln_lab](https://github.com/bit4woo/Java_deserialize_vuln_lab) - Java 反序列化学习的实验代码 Java_deserialize_vuln_lab
- [wuyouzhuguli/SpringAll](https://github.com/wuyouzhuguli/SpringAll) - 循序渐进,学习Spring Boot、Spring Boot & Shiro、Spring Batch、Spring Cloud、Spring Cloud Alibaba、Spring Security & Spring Security OAuth2,博客Spring系列源码:https://mrbird.cc
- [lorateam/Gotrip](https://github.com/lorateam/Gotrip) - 民宿旅游管理系统,SSM框架实现
- [hsingyin/EStore](https://github.com/hsingyin/EStore) - 一个基于JavaWeb的网上电子购物城项目,实现展示商品、购买商品、提交订单、持久化保存到数据库等基本功能
- [veekxt/hfuu_shop](https://github.com/veekxt/hfuu_shop) - 原生Jsp和Servlet实现的简单二手物品交易网站
- [Liweimin0512/MMall_JAVA](https://github.com/Liweimin0512/MMall_JAVA) - 基于SSM框架的前后端分离设计完整仿天猫网站服务器端源码。项目特点:前后端分离,数据库接口设计,架构设计,功能开发,上线运维
- [jhyscode/SSM-personnel-management-system](https://github.com/jhyscode/SSM-personnel-management-system) - 基于SSM的人事管理系统,适合初学者第一个实战项目
- [wonderyuan/LEMarket](https://github.com/wonderyuan/LEMarket) - 基于Java SSM框架和layui构建的手机商城系统(包含前后台)
- [xenv/S-mall-servlet](https://github.com/xenv/S-mall-servlet) - 小小商城系统,JavaWEB项目,基于原生Servlet,仿天猫页面,功能齐全
- [StevenWash/xxshop](https://github.com/StevenWash/xxshop) - (B2C) 基于Java 的SSM的B2C电商网站
- [jsphLim/Psychological-counseling-system](https://github.com/jsphLim/Psychological-counseling-system) - 简易心理咨询预约系统Based On SSM
- [KINGSABRI/godofwar](https://github.com/KINGSABRI/godofwar) - GodOfWar - Malicious Java WAR builder with built-in payloads
- [coderzc/biubiu](https://github.com/coderzc/biubiu) - A website like bilibili
- [JackyFuu/SSM-Maven-Heima](https://github.com/JackyFuu/SSM-Maven-Heima) - 基于SSM(Spring+Springmvc+Mybatis)框架的电商小项目,使用Maven构建项目,MySQL为数据库系统,Redis的缓存服务器(并不是用的很多)。商城分为后台人员管理界面和前台处理服务器两个方面。实现了登录,邮件注册,redis缓存机制,cookie的历史记录浏览,分页浏览商品,加入购物车,提交订单等等功能。最精彩的是,如果你刚刚学完基础的SSM框架,那么你就可以跟着视频一
- [ysrc/Liudao](https://github.com/ysrc/Liudao) - “六道”实时业务风控系统
- [CrazyBunQnQ/multimarkdown](https://github.com/CrazyBunQnQ/multimarkdown) - 破解 IntelliJ IDEA 的 Markdown Navigator 插件,觉着不错的话可以 Start 一下哟!
- [Swati4star/Images-to-PDF](https://github.com/Swati4star/Images-to-PDF) - An app to convert images to PDF file!
- [pyn3rd/CVE-2018-3252](https://github.com/pyn3rd/CVE-2018-3252) - CVE-2018-3252-PoC
- [yunxu1/jboss-_CVE-2017-12149](https://github.com/yunxu1/jboss-_CVE-2017-12149) - CVE-2017-12149 jboss反序列化 可回显
- [dunwu/javacore](https://github.com/dunwu/javacore) - ☕ JavaCore 是对 Java 核心技术的经验总结。
- [29DCH/OnlineMall](https://github.com/29DCH/OnlineMall) - :arrow_up: 基于springboot+thymeleaf+spring data jpa+druid+bootstrap+layui等技术的JavaWeb电商项目(项目包含前后台,分为前台商城系统及后台管理系统。前台商城系统包含首页门户、商品推荐、商品分类、商品搜索、商品展示、商品详情、购物车、订单流程、用户中心、评论(有些bug,当时做得不够好,下一个项目的评论模块比这个好)、模拟支付
- [mikemelon/java-exam](https://github.com/mikemelon/java-exam) - Java实现的包含题库编辑、抽题组卷、试题分析、在线考试等模块的Web考试系统。
- [d3vilbug/HackBar](https://github.com/d3vilbug/HackBar) - HackBar plugin for Burpsuite
- [traccar/traccar](https://github.com/traccar/traccar) - Traccar GPS Tracking System
- [Conanjun/XSSBlindInjector](https://github.com/Conanjun/XSSBlindInjector) - burp插件,实现自动化xss盲打以及xss log
- [TheKingOfDuck/MySQLMonitor](https://github.com/TheKingOfDuck/MySQLMonitor) - MySQL实时监控工具(代码审计/黑盒/白盒审计辅助工具)
- [qiao-zhi/springboot-ssm](https://github.com/qiao-zhi/springboot-ssm) - springboot整合mybatis(SSM项目整合)
- [onblog/ProjectTree](https://github.com/onblog/ProjectTree) - 新人熟悉项目必备工具!基于AOP开发的一款方法调用链分析框架,简单到只需要一个注解,异步非阻塞,完美嵌入Spring Cloud、Dubbo项目!再也不用担心搞不懂项目!(欢迎Star,🚫禁止Fork)
- [c0ny1/chunked-coding-converter](https://github.com/c0ny1/chunked-coding-converter) - Burp suite 分块传输辅助插件
- [Bypass007/Nessus_to_report](https://github.com/Bypass007/Nessus_to_report) - Nessus中文报告自动化脚本
- [lynnlovemin/SpringCloudLesson](https://github.com/lynnlovemin/SpringCloudLesson) - SpringCloud从入门到精通系列课程
- [Dreamroute/locker](https://github.com/Dreamroute/locker) - mybatis乐观锁插件,MyBatis Optimistic Locker Plugin
- [b2stry/mytwitter](https://github.com/b2stry/mytwitter) - 一个模仿Twitter的Java Web项目(基于原生的Servlet)
- [Tencent/APIJSON](https://github.com/Tencent/APIJSON) - 🏆 实时 零代码、全功能、强安全 ORM 库 🚀 后端接口和文档零代码,前端(客户端) 定制返回 JSON 的数据和结构 🏆 Real-Time coding-free, powerful and secure ORM 🚀 providing APIs and Docs without coding by Backend, and the returned JSON of API can be
- [NationalSecurityAgency/ghidra](https://github.com/NationalSecurityAgency/ghidra) - Ghidra is a software reverse engineering (SRE) framework
- [hollischuang/toBeTopJavaer](https://github.com/hollischuang/toBeTopJavaer) - To Be Top Javaer - Java工程师成神之路
- [wistbean/manong-ssm](https://github.com/wistbean/manong-ssm) - 基于SSM框架的Java电商项目
- [doublechaintech/scm-biz-suite](https://github.com/doublechaintech/scm-biz-suite) - 供应链中台系统基础版,集成零售管理, 电子商务, 供应链管理, 财务管理, 车队管理, 仓库管理, 人员管理, 产品管理, 订单管理, 会员管理, 连锁店管理, 加盟管理, 前端React/Ant Design, 后端Java Spring+自有开源框架,全面支持MySQL, PostgreSQL, 全面支持国产数据库南大通用GBase 8s,通过REST接口调用,前后端完全分离。
- [xenv/S-mall-ssm](https://github.com/xenv/S-mall-ssm) - 小小商城系统,JavaWEB项目,基于SSM,仿天猫页面,功能齐全,实现了自动处理关联查询的通用Mapper、抽象 BaseService 类、注解鉴权、参数注解校验等
- [xuxueli/xxl-sso](https://github.com/xuxueli/xxl-sso) - A distributed single-sign-on framework.(分布式单点登录框架XXL-SSO)
- [lenve/vhr](https://github.com/lenve/vhr) - 微人事是一个前后端分离的人力资源管理系统,项目采用SpringBoot+Vue开发。
- [ityouknow/spring-boot-examples](https://github.com/ityouknow/spring-boot-examples) - about learning Spring Boot via examples. Spring Boot 教程、技术栈示例代码,快速简单上手教程。
- [mustfun/mybatis-lite](https://github.com/mustfun/mybatis-lite) - Mybatis - Plugin Free版
- [sunnyandgood/JavaEE](https://github.com/sunnyandgood/JavaEE) - 🔥⭐️👍框架(SSM/SSH)学习笔记
- [tywo45/t-io](https://github.com/tywo45/t-io) - T-io is a network programming framework developed based on Java AIO. From the collected cases, t-io is widely used for IoT, IM, and customer service, making it a top-notch network programming framewor
- [TheAlgorithms/Java](https://github.com/TheAlgorithms/Java) - All Algorithms implemented in Java
- [macrozheng/mall](https://github.com/macrozheng/mall) - mall项目是一套电商系统,包括前台商城系统及后台管理系统,基于SpringBoot+MyBatis实现,采用Docker容器化部署。 前台商城系统包含首页门户、商品推荐、商品搜索、商品展示、购物车、订单流程、会员中心、客户服务、帮助中心等模块。 后台管理系统包含商品管理、订单管理、会员管理、促销管理、运营管理、内容管理、统计报表、财务管理、权限管理、设置等模块。
- [qiurunze123/miaosha](https://github.com/qiurunze123/miaosha) - ⭐⭐⭐⭐秒杀系统设计与实现.互联网工程师进阶与分析🙋🐓
- [Maweiming/weixin-bot](https://github.com/Maweiming/weixin-bot) - 使用微信Api实现微信客户端功能(使用Java开发) 可用于监控微信消息、特别关心钉钉提醒功能
- [doocs/advanced-java](https://github.com/doocs/advanced-java) - 😮 Core Interview Questions & Answers For Experienced Java(Backend) Developers | 互联网 Java 工程师进阶知识完全扫盲:涵盖高并发、分布式、高可用、微服务、海量数据处理等领域知识
- [PataPon-coder/JrebelBrainsLicenseServerforJava](https://github.com/PataPon-coder/JrebelBrainsLicenseServerforJava) -
- [dschadow/Java-Web-Security](https://github.com/dschadow/Java-Web-Security) - Java-Web-Security - Sichere Webanwendungen mit Java entwickeln
- [MisterBooo/LeetCodeAnimation](https://github.com/MisterBooo/LeetCodeAnimation) - Demonstrate all the questions on LeetCode in the form of animation.(用动画的形式呈现解LeetCode题目的思路)
- [quentinhardy/jndiat](https://github.com/quentinhardy/jndiat) - JNDI Attacking Tool
- [iSafeBlue/TrackRay](https://github.com/iSafeBlue/TrackRay) - 溯光 (TrackRay) 3 beta⚡渗透测试框架(资产扫描|指纹识别|暴力破解|网页爬虫|端口扫描|漏洞扫描|代码审计|AWVS|NMAP|Metasploit|SQLMap)
- [Ebryx/AES-Killer](https://github.com/Ebryx/AES-Killer) - Burp Plugin to decrypt AES encrypted traffic on the fly
- [h2pl/MyTech](https://github.com/h2pl/MyTech) - Java的基础总结和学习笔记,包括Java核心技术点和常见知识点。同时提供了Java基础原理的代码实现,供大家实践时参考。已补充JVM和JUC的相关内容,欢迎交流。
- [brianway/java-learning](https://github.com/brianway/java-learning) - 旨在打造在线最佳的 Java 学习笔记,含博客讲解和源码实例,包括 Java SE 和 Java Web
- [Snailclimb/JavaGuide](https://github.com/Snailclimb/JavaGuide) - 「Java学习+面试指南」一份涵盖大部分 Java 程序员所需要掌握的核心知识。准备 Java 面试,首选 JavaGuide!
- [oldmanpushcart/greys-anatomy](https://github.com/oldmanpushcart/greys-anatomy) - Java诊断工具
- [mercyblitz/segmentfault-lessons](https://github.com/mercyblitz/segmentfault-lessons) - Segment Fault 在线讲堂 代码工程
- [frank-lam/fullstack-tutorial](https://github.com/frank-lam/fullstack-tutorial) - 🚀 fullstack tutorial 2022,后台技术栈/架构师之路/全栈开发社区,春招/秋招/校招/面试
- [c0ny1/HTTPHeadModifer](https://github.com/c0ny1/HTTPHeadModifer) - 一款快速修改HTTP数据包头的Burp Suite插件
- [ngbdf/redis-manager](https://github.com/ngbdf/redis-manager) - Redis 一站式管理平台,支持集群的监控、安装、管理、告警以及基本的数据操作
- [crossoverJie/JCSprout](https://github.com/crossoverJie/JCSprout) - 👨🎓 Java Core Sprout : basic, concurrent, algorithm
- [nccgroup/BurpSuiteHTTPSmuggler](https://github.com/nccgroup/BurpSuiteHTTPSmuggler) - A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques
- [bit4woo/domain_hunter](https://github.com/bit4woo/domain_hunter) - A Burp Suite Extension that try to find all sub-domain, similar-domain and related-domain of an organization automatically! 基于流量自动收集整个企业或组织的子域名、相似域名、相关域名的burp插件
- [bit4woo/knife](https://github.com/bit4woo/knife) - A burp extension that add some useful function to Context Menu 添加一些右键菜单让burp用起来更顺畅
- [ninetysec/Cknife](https://github.com/ninetysec/Cknife) - Cknife
- [irsdl/IIS-ShortName-Scanner](https://github.com/irsdl/IIS-ShortName-Scanner) - latest version of scanners for IIS short filename (8.3) disclosure vulnerability
- [CaledoniaProject/CVE-2018-1270](https://github.com/CaledoniaProject/CVE-2018-1270) - Spring messaging STOMP protocol RCE
- [waylau/mongodb-file-server](https://github.com/waylau/mongodb-file-server) - MongoDB File Server is a file server system based on MongoDB. 基于 MongoDB 的文件服务器。
- [zengxs/gdns](https://github.com/zengxs/gdns) - A Secure DNS Server (forwarder) based on Google DNS over HTTPS Service
- [zouzg/mybatis-generator-gui](https://github.com/zouzg/mybatis-generator-gui) - mybatis-generator界面工具,让你生成代码更简单更快捷
- [microsoft/mssql-jdbc](https://github.com/microsoft/mssql-jdbc) - The Microsoft JDBC Driver for SQL Server is a Type 4 JDBC driver that provides database connectivity with SQL Server through the standard JDBC application program interfaces (APIs).
- [An0nymous0/MybatisPlugin-Crack-Javassist](https://github.com/An0nymous0/MybatisPlugin-Crack-Javassist) - Javassist实现的破解IDEA MybatisPlugin修改字节码工具,仅供学习用途。
- [mplushnikov/lombok-intellij-plugin](https://github.com/mplushnikov/lombok-intellij-plugin) - Lombok Plugin for IntelliJ IDEA
- [zjlywjh001/PhrackCTF-Platform-Team](https://github.com/zjlywjh001/PhrackCTF-Platform-Team) - CTF platfrom(Team Version) developed by Jarvis from Phrack Team. 做一个功能最全的CTF平台。
- [tranleduy2000/javaide](https://github.com/tranleduy2000/javaide) - Code editor, java auto complete, java compiler, aapt, dx, zipsigner for Android
- [tls-attacker/TLS-Scanner](https://github.com/tls-attacker/TLS-Scanner) - The TLS-Scanner Module from TLS-Attacker
- [Col-E/Recaf](https://github.com/Col-E/Recaf) - The modern Java bytecode editor
- [proxyee-down-org/proxyee-down](https://github.com/proxyee-down-org/proxyee-down) - http下载工具,基于http代理,支持多连接分块下载
- [xuningjack/ANRManager](https://github.com/xuningjack/ANRManager) - ANR collector which can collect ANR information(收集ANR相关信息的工具类)
- [naozibuhao/SecQuanCknife](https://github.com/naozibuhao/SecQuanCknife) - SecQuanCknife
- [zjlywjh001/PhrackCTF-Platform-Personal](https://github.com/zjlywjh001/PhrackCTF-Platform-Personal) - CTF platfrom developed by Jarvis from Phrack Team. 做一个功能最全的CTF平台。
- [littleRich/VirtualLocation](https://github.com/littleRich/VirtualLocation) - 利用Hook技术对APP进行虚拟定位,可修改微信、QQ、以及一些打卡APP等软件,随意切换手机所处位置!
- [amitshekhariitbhu/from-java-to-kotlin](https://github.com/amitshekhariitbhu/from-java-to-kotlin) - From Java To Kotlin - Your Cheat Sheet For Java To Kotlin
- [cundong/MemoryMonitor](https://github.com/cundong/MemoryMonitor) - Memory clean, pss monitor tool, for developer
- [godlikewangjun/dexknife-wj](https://github.com/godlikewangjun/dexknife-wj) - apk加固插件 带签名校验、dex加密、资源混淆
- [guardianproject/haven](https://github.com/guardianproject/haven) - Haven is for people who need a way to protect their personal spaces and possessions without compromising their own privacy, through an Android app and on-device sensors
- [94fzb/zrlog](https://github.com/94fzb/zrlog) - ZrLog是使用 Java 开发的博客/CMS程序,具有简约,易用,组件化,内存占用低等特点。自带 Markdown 编辑器,让更多的精力放在写作上,而不是花费大量时间在学习程序的使用上。
- [shengqi158/S2-055-PoC](https://github.com/shengqi158/S2-055-PoC) - S2-055的环境,基于rest-show-case改造
- [SecureSkyTechnology/study-struts2-s2-054_055-jackson-cve-2017-7525_cve-2017-15095](https://github.com/SecureSkyTechnology/study-struts2-s2-054_055-jackson-cve-2017-7525_cve-2017-15095) - Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告
- [ooni/probe-android](https://github.com/ooni/probe-android) - OONI Probe Android
- [ffay/lanproxy](https://github.com/ffay/lanproxy) - lanproxy是一个将局域网个人电脑、服务器代理到公网的内网穿透工具,支持tcp流量转发,可支持任何tcp上层协议(访问内网网站、本地支付接口调试、ssh访问、远程桌面、http代理、https代理、socks5代理...)。技术交流QQ群 736294209
- [OpenRefine/OpenRefine](https://github.com/OpenRefine/OpenRefine) - OpenRefine is a free, open source power tool for working with messy data and improving it
- [yandex/burp-molly-scanner](https://github.com/yandex/burp-molly-scanner) - Turn your Burp suite into headless active web application vulnerability scanner
- [tiagorlampert/sAINT](https://github.com/tiagorlampert/sAINT) - :eye: (s)AINT is a Spyware Generator for Windows systems written in Java. [Discontinued]
- [sevck/CVE-2017-12149](https://github.com/sevck/CVE-2017-12149) - CVE-2017-12149 JBOSS as 6.X反序列化(反弹shell版)
- [ZjieHU/Tomcat_weak_password_scan](https://github.com/ZjieHU/Tomcat_weak_password_scan) - Tomcat弱口令扫描器
- [NickstaDB/BaRMIe](https://github.com/NickstaDB/BaRMIe) - Java RMI enumeration and attack tool.
- [ibey0nd/NSTProxy](https://github.com/ibey0nd/NSTProxy) - 一款存储HTTP请求入库的burpsuite插件
- [dragonite-network/dragonite-java](https://github.com/dragonite-network/dragonite-java) - [DEPRECATED, please check https://github.com/tobyxdd/hysteria]
- [vulnersCom/burp-vulners-scanner](https://github.com/vulnersCom/burp-vulners-scanner) - Vulnerability scanner based on vulners.com search API
- [chengdedeng/waf](https://github.com/chengdedeng/waf) - :vertical_traffic_light:Web Application Firewall or API Gateway(应用防火墙/API网关)
- [daniel-cues/NMapGUI](https://github.com/daniel-cues/NMapGUI) - Advanced Graphical User Interface for NMap
- [quhw/xtunnel](https://github.com/quhw/xtunnel) - An useful TCP/SSL tunnel utility.
- [zhisheng17/blog](https://github.com/zhisheng17/blog) - SpringBoot + Mybatis + thymeleaf 搭建的个人博客 http://www.54tianzhisheng.cn/
- [ZHENFENG13/spring-boot-projects](https://github.com/ZHENFENG13/spring-boot-projects) - :fire: 该仓库中主要是 Spring Boot 的入门学习教程以及一些常用的 Spring Boot 实战项目教程,包括 Spring Boot 使用的各种示例代码,同时也包括一些实战项目的项目源码和效果展示,实战项目包括基本的 web 开发以及目前大家普遍使用的线上博客项目/企业大型商城系统/前后端分离实践项目等,摆脱各种 hello world 入门案例的束缚,真正的掌握 Spring
- [6iovan/ActivityHijacker](https://github.com/6iovan/ActivityHijacker) - DEPRECATED
- [jearyorg/jsp](https://github.com/jearyorg/jsp) -
- [codewatchorg/bypasswaf](https://github.com/codewatchorg/bypasswaf) - Add headers to all Burp requests to bypass some WAF products
- [difcareer/sqlmap4burp](https://github.com/difcareer/sqlmap4burp) - sqlmap embed in burpsuite
- [JGillam/burp-paramalyzer](https://github.com/JGillam/burp-paramalyzer) - Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.
- [securifybv/PHPUnserializeCheck](https://github.com/securifybv/PHPUnserializeCheck) - PHP Unserialize Check - Burp Scanner Extension
- [vah13/BurpCRLFPlugin](https://github.com/vah13/BurpCRLFPlugin) - Another plugin for CRLF vulnerability detection
- [rover12421/ShakaApktool](https://github.com/rover12421/ShakaApktool) - ShakaApktool
- [floyd-fuh/JKS-private-key-cracker-hashcat](https://github.com/floyd-fuh/JKS-private-key-cracker-hashcat) - Nail in the JKS coffin - Cracking passwords of private key entries in a JKS file
- [ilmila/J2EEScan](https://github.com/ilmila/J2EEScan) - J2EEScan is a plugin for Burp Suite Proxy. The goal of this plugin is to improve the test coverage during web application penetration tests on J2EE applications.
- [PanagiotisDrakatos/JavaRansomware](https://github.com/PanagiotisDrakatos/JavaRansomware) - Simple Ransomware Tool in Pure Java
- [GoSecure/csp-auditor](https://github.com/GoSecure/csp-auditor) - Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website
- [NetSPI/xssValidator](https://github.com/NetSPI/xssValidator) - This is a burp intruder extender that is designed for automation and validation of XSS vulnerabilities.
- [ewilded/psychoPATH](https://github.com/ewilded/psychoPATH) - psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-searching payload generator, LFI mode, nix & windows support, si
- [mbechler/marshalsec](https://github.com/mbechler/marshalsec) -
- [mystech7/Burp-Hunter](https://github.com/mystech7/Burp-Hunter) - XSS Hunter Burp Plugin
- [RIPE-NCC/whois](https://github.com/RIPE-NCC/whois) - RIPE Database whois code repository
- [1135/EquationExploit](https://github.com/1135/EquationExploit) - Eternalblue Doublepulsar exploit
- [NetSPI/WebLogicPasswordDecryptor](https://github.com/NetSPI/WebLogicPasswordDecryptor) - PowerShell script and Java code to decrypt WebLogic passwords
- [olacabs/jackhammer](https://github.com/olacabs/jackhammer) - Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
- [zackszhu/hack_sjtu_2017](https://github.com/zackszhu/hack_sjtu_2017) -
- [NetSPI/Wsdler](https://github.com/NetSPI/Wsdler) - WSDL Parser extension for Burp
- [federicodotta/Java-Deserialization-Scanner](https://github.com/federicodotta/Java-Deserialization-Scanner) - All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities
- [lygttpod/RxHttpUtils](https://github.com/lygttpod/RxHttpUtils) - Rxjava+Retrofit封装,便捷使用
- [zencodex/hack-android](https://github.com/zencodex/hack-android) - Collection tools for hack android, java
- [frohoff/ysoserial](https://github.com/frohoff/ysoserial) - A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
- [shengqi158/fastjson-remote-code-execute-poc](https://github.com/shengqi158/fastjson-remote-code-execute-poc) - fastjson remote code execute poc 直接用intellij IDEA打开即可 首先编译得到Test.class,然后运行Poc.java
- [yaphone/itchat4j](https://github.com/yaphone/itchat4j) - itchat4j -- 用Java扩展个人微信号的能力
- [s4n7h0/Halcyon-IDE](https://github.com/s4n7h0/Halcyon-IDE) - First IDE for Nmap Script (NSE) Development.
- [CYRUS-STUDIO/ApkToolPlus](https://github.com/CYRUS-STUDIO/ApkToolPlus) - ApkToolPlus 是一个 apk 逆向分析工具(a apk analysis tools)。
- [ikkisoft/SerialKiller](https://github.com/ikkisoft/SerialKiller) - Look-Ahead Java Deserialization Library
- [google/binnavi](https://github.com/google/binnavi) - BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code.
- [AndroidVTS/android-vts](https://github.com/AndroidVTS/android-vts) - Android Vulnerability Test Suite - In the spirit of open data collection, and with the help of the community, let's take a pulse on the state of Android security. NowSecure presents an on-device app t
- [gozo-mt/burplist](https://github.com/gozo-mt/burplist) -
- [PortSwigger/backslash-powered-scanner](https://github.com/PortSwigger/backslash-powered-scanner) - Finds unknown classes of injection vulnerabilities
- [ReactivePlatform/netty-in-action-cn](https://github.com/ReactivePlatform/netty-in-action-cn) - Netty In Action 中文版
- [nisrulz/android-tips-tricks](https://github.com/nisrulz/android-tips-tricks) - :ballot_box_with_check: [Cheatsheet] Tips and tricks for Android Development
- [amikey/zhihuWebSpider](https://github.com/amikey/zhihuWebSpider) - https://github.com/QiuMing/zhihuWebSpider.git
- [0Chencc/CTFCrackTools](https://github.com/0Chencc/CTFCrackTools) - China's first CTFTools framework.中国国内首个CTF工具框架,旨在帮助CTFer快速攻克难关
- [zaproxy/zaproxy](https://github.com/zaproxy/zaproxy) - The ZAP core project
- [ewilded/shelling](https://github.com/ewilded/shelling) - SHELLING - a comprehensive OS command injection payload generator
- [knightliao/disconf](https://github.com/knightliao/disconf) - Distributed Configuration Management Platform(分布式配置管理平台)
- [dreamhead/moco](https://github.com/dreamhead/moco) - Easy Setup Stub Server
- [bilibili/DanmakuFlameMaster](https://github.com/bilibili/DanmakuFlameMaster) - Android开源弹幕引擎·烈焰弹幕使 ~
- [Blankj/AndroidUtilCode](https://github.com/Blankj/AndroidUtilCode) - :fire: Android developers should collect the following utils(updating).
- [TellH/GitClub](https://github.com/TellH/GitClub) - An elegent Android Client for Github. 不仅仅是Github客户端,而且是一个发现优秀Github开源项目的app
- [apache/rocketmq](https://github.com/apache/rocketmq) - Apache RocketMQ is a cloud native messaging and streaming platform, making it simple to build event-driven applications.
- [51bigdata/StockData2Hbase](https://github.com/51bigdata/StockData2Hbase) - 股票交易数据处理的整个业务流程 数据源--->数据采集--->数据归类--->数据储存--->数据分析--->数据可视化
- [1973Blunt/VisualSocialNetwork](https://github.com/1973Blunt/VisualSocialNetwork) - 用图状数据结构表达社交网络中实体、边的关系,以 web 应用形式可视化展示。
- [realxujiang/bigtable-sql](https://github.com/realxujiang/bigtable-sql) - 分布式大数据SQL查询可视化界面!
- [summitt/Nope-Proxy](https://github.com/summitt/Nope-Proxy) - TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.## JavaScript
- [en0th/ElectricRat](https://github.com/en0th/ElectricRat) - 电气鼠靶场系统是一种带有漏洞的Web应用程序,旨在为Web安全渗透测试学习者提供学习和实践的机会。The Electrical Mouse Target Range System is a web application with vulnerabilities designed to provide learning and practice opportunities for web secu
- [westinyang/unpacker-panel](https://github.com/westinyang/unpacker-panel) - 基于Youpk脱壳机的一键脱壳Web面板
- [windy-purple/uni_app-Packet-capture](https://github.com/windy-purple/uni_app-Packet-capture) - uni_app抓包脚本
- [echo094/decode-js](https://github.com/echo094/decode-js) - JS混淆代码的AST分析工具 AST analysis tool for obfuscated JS code
- [hacksysteam/CVE-2023-21608](https://github.com/hacksysteam/CVE-2023-21608) - Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
- [RASSec/MobileCTF](https://github.com/RASSec/MobileCTF) - 体系化、实战化、step by step、目标清晰且具体的一个打怪升级、成长路径规划图
- [harrozze/obsidian-section-collector](https://github.com/harrozze/obsidian-section-collector) - Obsidian user script to collect same section in notes into one view
- [akl7777777/ShellGPT](https://github.com/akl7777777/ShellGPT) - **ShellGPT is a free chatgpt client, now Supported online search.no need for a key, no need to log in.Multi-node automatic speed measurement switch,Long text translation with no word limit, AI graphic
- [tongcheng-security-team/NextScan](https://github.com/tongcheng-security-team/NextScan) - 飞刃是一套完整的企业级黑盒漏洞扫描系统,集成漏洞扫描、漏洞管理、扫描资产、爬虫等服务。 拥有强大的漏洞检测引擎和丰富的插件库,覆盖多种漏洞类型和应用程序框架。
- [josStorer/chatGPTBox](https://github.com/josStorer/chatGPTBox) - Integrating ChatGPT into your browser deeply, everything you need is here
- [Yuukimoe/report-helper](https://github.com/Yuukimoe/report-helper) - 提交漏洞报告小助手, 通过 URL 获取目标信息并自动填充到补天
- [GhostTroops/AiCSA](https://github.com/GhostTroops/AiCSA) - GPT AiCSA(Code security audit),SAST(Static Application Security Testing,静态应用程序安全测试),JAR security analysis, static vulnerability and vulnerability analysis of various programming language codes
- [karthi-the-hacker/crlfi](https://github.com/karthi-the-hacker/crlfi) - CRLF Bug scanner for WebPentesters and Bugbounty Hunters
- [barretlee/cloudflare-proxy](https://github.com/barretlee/cloudflare-proxy) - Cloudflare Worker 代理请求 ChatGPT API,支持 Stream 流式输出
- [TongchengOpenSource/AppScan](https://github.com/TongchengOpenSource/AppScan) - 安全隐私卫士(AppScan)一款免费的企业级自动化App隐私合规检测工具。
- [justjavac/chatgpt](https://github.com/justjavac/chatgpt) - ChatGPT 从入门到精通
- [tess-ss/recon-ninja](https://github.com/tess-ss/recon-ninja) - Recon-Ninja
- [system-cpu/wxappUnpacker](https://github.com/system-cpu/wxappUnpacker) - 基于node反编译小程序 已经配置完成
- [laozhou-in-germany/Chens_LMS_Public](https://github.com/laozhou-in-germany/Chens_LMS_Public) - The LMS (Life Management System) is a free tool for personal knowledge management and goal management based on Obsidian.md.
- [obsidian-canzi/Enhanced-editing](https://github.com/obsidian-canzi/Enhanced-editing) - 旨在增强Obsidian编辑功能的插件
- [Ghr07h/Heimdallr](https://github.com/Ghr07h/Heimdallr) - 一款完全被动监听的谷歌插件,用于高危指纹识别、蜜罐特征告警和拦截、机器特征对抗
- [Cryptogenic/PS5-IPV6-Kernel-Exploit](https://github.com/Cryptogenic/PS5-IPV6-Kernel-Exploit) - An experimental webkit-based kernel exploit (Arb. R/W) for the PS5 on <= 4.51FW
- [lijiejie/EasyPen](https://github.com/lijiejie/EasyPen) - EasyPen is a GUI program which helps pentesters do target discovery, vulnerability scan and exploitation
- [wuba/Antenna](https://github.com/wuba/Antenna) - Antenna是58同城安全团队打造的一款辅助安全从业人员验证网络中多种漏洞是否存在以及可利用性的工具。其基于带外应用安全测试(OAST)通过任务的形式,将不同漏洞场景检测能力通过插件的形式进行集合,通过与目标进行out-bind的数据通信方式进行辅助检测。
- [hjmmc/reverse-sourcemap-image](https://github.com/hjmmc/reverse-sourcemap-image) - 还原souremap资源图片
- [0x727/Space_view](https://github.com/0x727/Space_view) - Space_view 是一款Hunter(鹰图平台)或者FOFA平台 资产展示的浏览器油猴插件
- [evenchan86/Auto_BaseSecurity](https://github.com/evenchan86/Auto_BaseSecurity) - 基线漏洞修复
- [emredavut/Chrome-Android-and-Windows-0day-RCE-SBX](https://github.com/emredavut/Chrome-Android-and-Windows-0day-RCE-SBX) - Chrome Android and Windows 0day RCE+SBX.. DPRK
- [bp2008/DahuaLoginBypass](https://github.com/bp2008/DahuaLoginBypass) - Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.
- [sepehrdaddev/zap-scripts](https://github.com/sepehrdaddev/zap-scripts) - Zed Attack Proxy Scripts for finding CVEs and Secrets.
- [micro-joan/Zphisher-GUI-Back_office](https://github.com/micro-joan/Zphisher-GUI-Back_office) - A Zphisher GUI Back-Office Plugin
- [S2eTo/FlawPlatform](https://github.com/S2eTo/FlawPlatform) - 基于 Docker 开发的:在线漏洞靶场。
- [netease-im/electron-fulltext-search-demo](https://github.com/netease-im/electron-fulltext-search-demo) - electron 全文搜索方案的一个 demo
- [0xdea/frida-scripts](https://github.com/0xdea/frida-scripts) - A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.
- [mrd0x/BITB](https://github.com/mrd0x/BITB) - Browser In The Browser (BITB) Templates
- [fkling/astexplorer](https://github.com/fkling/astexplorer) - A web tool to explore the ASTs generated by various parsers.
- [lgh06/web-page-monitor](https://github.com/lgh06/web-page-monitor) - Web Site Page Changes Monitor. 网站网页页面更新变更监控提醒。
- [arcaneiceman/kraken](https://github.com/arcaneiceman/kraken) - Kraken: A multi-platform distributed brute-force password cracking system
- [grigoritchy/pocs](https://github.com/grigoritchy/pocs) -
- [ElSicarius/findalllinks](https://github.com/ElSicarius/findalllinks) - A tool to extract all the urls and paths found in the content of a page (js sources included)
- [VitthalS/ivna](https://github.com/VitthalS/ivna) - Intentionally Vulnerable Nodejs Application & APIs
- [lasting-yang/frida_bypass_ssl_example](https://github.com/lasting-yang/frida_bypass_ssl_example) - frida 辅助抓包的一些技巧
- [ttttmr/spoof-wappalyzer](https://github.com/ttttmr/spoof-wappalyzer) - 欺骗wappalyzer插件指纹识别&XSS
- [Johnng007/Live-Forensicator](https://github.com/Johnng007/Live-Forensicator) - A suite of Tools to aid Incidence Response and Live Forensics for - Windows (Powershell) | Linux (Bash) | MacOS (Shell)
- [What-The-Commit/nft-marketplaces-offer-bot](https://github.com/What-The-Commit/nft-marketplaces-offer-bot) - Automated mass bidding on opensea nft collections, with optional filtering by traits
- [rogerinn/codex](https://github.com/rogerinn/codex) - Endpoint enumeration
- [jayus0821/Armor](https://github.com/jayus0821/Armor) - Armor 浏览器反蜜罐插件 honeypot
- [apachecn/re4e-zh](https://github.com/apachecn/re4e-zh) -
- [lxraa/v8_exp](https://github.com/lxraa/v8_exp) -
- [Abbbbbi/Frida-Seccomp](https://github.com/Abbbbbi/Frida-Seccomp) - 一个Android通用svc跟踪以及hook方案——Frida-Seccomp
- [bojue/BaseMap](https://github.com/bojue/BaseMap) - IDC管理2.5D底图绘制工具(Vue)
- [admin360bug/upload-labs](https://github.com/admin360bug/upload-labs) - 原始靶场环境:https://github.com/c0ny1/upload-labs 此项目原始靶场环境的开普勒安全团队修改版,重新使用PHP7编写,并且保留了原版的风味!
- [seemoo-lab/apple-continuity-tools](https://github.com/seemoo-lab/apple-continuity-tools) - Reverse engineering toolkit for Apple's wireless ecosystem
- [hanbinglengyue/FridaManager](https://github.com/hanbinglengyue/FridaManager) - Frida持久化解决方案
- [d0gkiller87/Frida-libcurlUnpinning](https://github.com/d0gkiller87/Frida-libcurlUnpinning) - A Frida script to bypass libcurl (NDK) SSL-Pinning protection in Android apps.
- [noobpk/frida-intercept-encrypted-api](https://github.com/noobpk/frida-intercept-encrypted-api) - A tool to help you intercept encrypted APIs in iOS or Android apps
- [paazmaya/shuji](https://github.com/paazmaya/shuji) - Reverse engineering JavaScript and CSS sources from sourcemaps
- [pownjs/git](https://github.com/pownjs/git) - Assorted tools for security-related task for git repositories
- [DragonJAR/Scripts](https://github.com/DragonJAR/Scripts) - Una serie de scripts útiles en un proceso de pentesting.
- [SiJiDo/H](https://github.com/SiJiDo/H) - H是一款强大的资产收集管理平台
- [1in9e/gosint](https://github.com/1in9e/gosint) - Gosint is a distributed asset information collection and vulnerability scanning platform
- [mucoze/Umay](https://github.com/mucoze/Umay) - IoT Malware Similarity Analysis Platform
- [spamscanner/spamscanner](https://github.com/spamscanner/spamscanner) - Spam Scanner is a Node.js anti-spam, email filtering, and phishing prevention tool and service. Built for @ladjs, @forwardemail, @cabinjs, @breejs, and @lassjs.
- [wetools/wept](https://github.com/wetools/wept) - 微信小程序多端实时运行工具
- [cjxe/dex-crawler](https://github.com/cjxe/dex-crawler) - 🕷️ Monitor prices of tokens in different DEXs.
- [malwareinfosec/FiddleZAP](https://github.com/malwareinfosec/FiddleZAP) -
- [Ch0pin/log4JFrida](https://github.com/Ch0pin/log4JFrida) -
- [evildecay/etcdkeeper](https://github.com/evildecay/etcdkeeper) - web ui client for etcd
- [Reamd7/notion-zh_CN](https://github.com/Reamd7/notion-zh_CN) - notion 中文化
- [zenozeng/Free-Chinese-Fonts](https://github.com/zenozeng/Free-Chinese-Fonts) - 免费中文字体
- [I2rys/subenujs](https://github.com/I2rys/subenujs) - Website Subdomains enumeration writen in NodeJS.
- [louislam/uptime-kuma](https://github.com/louislam/uptime-kuma) - A fancy self-hosted monitoring tool
- [tintinweb/solidity-shell](https://github.com/tintinweb/solidity-shell) - An interactive Solidity Shell
- [tophat-cloud/cumulus](https://github.com/tophat-cloud/cumulus) - Cumulus is web application weakness monitoring, works with just 3 code lines
- [zhengjim/camille](https://github.com/zhengjim/camille) - 基于Frida的Android App隐私合规检测辅助工具
- [Mustard404/Savior](https://github.com/Mustard404/Savior) - 渗透测试报告自动生成工具!
- [Raz0r/ens-xss](https://github.com/Raz0r/ens-xss) -
- [1modm/petereport](https://github.com/1modm/petereport) - PeTeReport is an open-source application vulnerability reporting tool.
- [Studio-42/elFinder](https://github.com/Studio-42/elFinder) - 📁 Open-source file manager for web, written in JavaScript using jQuery and jQuery UI
- [caoyu48/vue-g6-editor](https://github.com/caoyu48/vue-g6-editor) - vue+g6 3.0实现的editor 由于g6-editor不开源 自己撸了一个
- [NotSoSecure/SerializedPayloadGenerator](https://github.com/NotSoSecure/SerializedPayloadGenerator) -
- [JSREI/ast-hook-for-js-RE](https://github.com/JSREI/ast-hook-for-js-RE) - 浏览器内存漫游解决方案(探索中...)
- [HeiSir2014/M3U8-Downloader](https://github.com/HeiSir2014/M3U8-Downloader) - M3U8-Downloader 支持多线程、断点续传、加密视频下载缓存。
- [AsaiKen/dom-based-xss-finder](https://github.com/AsaiKen/dom-based-xss-finder) - Chrome extension that finds DOM based XSS vulnerabilities
- [TIGMINT/TIGMINT](https://github.com/TIGMINT/TIGMINT) - TIGMINT: OSINT (Open Source Intelligence) GUI software framework
- [zzzteph/weakpass](https://github.com/zzzteph/weakpass) - Weakpass collection of tools for bruteforce and hashcracking
- [louischatriot/nedb](https://github.com/louischatriot/nedb) - The JavaScript Database, for Node.js, nw.js, electron and the browser
- [knqyf263/CVE-2021-40346](https://github.com/knqyf263/CVE-2021-40346) - CVE-2021-40346 PoC (HAProxy HTTP Smuggling)
- [hql7/wl-explorer](https://github.com/hql7/wl-explorer) - 用于vue框架的文件管理器插件,云盘、网盘。File manager plug-in for vue framework, cloud disk.
- [c-f/lel](https://github.com/c-f/lel) - Visualization layer and helper for relevant IT related documentation and operation
- [pwnedshell/Bugs-feed](https://github.com/pwnedshell/Bugs-feed) - Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...
- [SKVNDR/FastDork](https://github.com/SKVNDR/FastDork) - ⚡Chrome extension allows you to create lists of Google and Github dork to open multiple tabs with one click, import "scope/out of scope" from #HackerOne #Bugcrowd #Intigriti ...
- [hanc00l/nemo_go](https://github.com/hanc00l/nemo_go) - Nemo是用来进行自动化信息收集的一个简单平台,通过集成常用的信息收集工具和技术,实现对内网及互联网资产信息的自动收集,提高隐患排查和渗透测试的工作效率。
- [dushixiang/next-terminal](https://github.com/dushixiang/next-terminal) - Next Terminal是一个简单好用安全的开源交互审计系统,支持RDP、SSH、VNC、Telnet、Kubernetes协议。
- [phwd/fb-ios-pinning-2021](https://github.com/phwd/fb-ios-pinning-2021) -
- [nickdeis/eslint-plugin-no-secrets](https://github.com/nickdeis/eslint-plugin-no-secrets) - An eslint plugin to find strings that might be secrets/credentials
- [openprotest/protest](https://github.com/openprotest/protest) - A management base for System Admins
- [Consensys/aragraph](https://github.com/Consensys/aragraph) - Visualize your Aragon DAO Templates
- [NodeSecure/js-x-ray](https://github.com/NodeSecure/js-x-ray) - JavaScript & Node.js open-source SAST scanner. A static analyser for detecting most common malicious patterns 🔬.
- [Vulnogram/Vulnogram](https://github.com/Vulnogram/Vulnogram) - Vulnogram is a tool for creating and editing CVE information in CVE JSON format
- [secureCodeBox/secureCodeBox](https://github.com/secureCodeBox/secureCodeBox) - secureCodeBox (SCB) - continuous secure delivery out of the box
- [c6fc/warcannon](https://github.com/c6fc/warcannon) - High speed/Low cost CommonCrawl RegExp in Node.js
- [justakazh/FreeDa](https://github.com/justakazh/FreeDa) - just show app list and run frida with js
- [nancheung/notion-zh_CN](https://github.com/nancheung/notion-zh_CN) - 对notion.so的汉化油猴脚本
- [HaboobLab/CVE-2019-13764](https://github.com/HaboobLab/CVE-2019-13764) -
- [reconmap/reconmap](https://github.com/reconmap/reconmap) - Vulnerability assessment and penetration testing automation and reporting platform for teams.
- [OffcierCia/DeFi-Developer-Road-Map](https://github.com/OffcierCia/DeFi-Developer-Road-Map) - DeFi Developer roadmap is a curated Developer handbook which includes a list of the best tools for DApps development, resources and references!
- [nklayman/vue-cli-plugin-electron-builder](https://github.com/nklayman/vue-cli-plugin-electron-builder) - Easily Build Your Vue.js App For Desktop With Electron
- [yuzutech/kroki](https://github.com/yuzutech/kroki) - Creates diagrams from textual descriptions!
- [rafeca/prettyjson](https://github.com/rafeca/prettyjson) - Package for formatting JSON data in a coloured YAML-style, perfect for CLI output
- [Yeuoly/FxxkXSS](https://github.com/Yeuoly/FxxkXSS) - 将令你眼前一亮的XSS利用工具!
- [aquasecurity/cloudsploit](https://github.com/aquasecurity/cloudsploit) - Cloud Security Posture Management (CSPM)
- [abhijithvijayan/web-extension-starter](https://github.com/abhijithvijayan/web-extension-starter) - 🖥🔋Web Extension starter to build "Write Once Run on Any Browser" extension
- [threatexpress/aggressor-scripts](https://github.com/threatexpress/aggressor-scripts) - Cobalt Strike Aggressor Scripts
- [Simp1er/MobileSec](https://github.com/Simp1er/MobileSec) - 记录一些我自己在学习Android逆向过程中的有意思的东西
- [r0ysue/r0tracer](https://github.com/r0ysue/r0tracer) - 安卓Java层多功能追踪脚本
- [mandatoryprogrammer/xsshunter-express](https://github.com/mandatoryprogrammer/xsshunter-express) - An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!
- [redpwn/rctf](https://github.com/redpwn/rctf) - redpwn's CTF platform
- [momosecurity/FindSomething](https://github.com/momosecurity/FindSomething) - 基于chrome、firefox插件的被动式信息泄漏检测工具
- [willnewii/qiniuClient](https://github.com/willnewii/qiniuClient) - 云存储管理客户端。支持七牛云、腾讯云、青云、阿里云、又拍云、亚马逊S3、京东云,仿文件夹管理、图片预览、拖拽上传、文件夹上传、同步、批量导出URL等功能
- [Tencent/wepy](https://github.com/Tencent/wepy) - 小程序组件化开发框架
- [lochv/shellbin](https://github.com/lochv/shellbin) - The source code of https://rshell.dev
- [r0zar/shellshock](https://github.com/r0zar/shellshock) - Yet another bash-inside-node framework
- [jychp/cloudflare-bypass](https://github.com/jychp/cloudflare-bypass) - Bypass Coudflare bot protection using Cloudflare Workers
- [jehy/shodan](https://github.com/jehy/shodan) - Advanced error monitoring using kibana logs
- [rpwnage/pwn-my](https://github.com/rpwnage/pwn-my) - iOS 14.5 WebKit/Safari based Jailbreak
- [mhmdiaa/acumen](https://github.com/mhmdiaa/acumen) - A clean UI with a modular structure to enhance security researchers' ability to work with data
- [Medicean/AS_Out-of-Network](https://github.com/Medicean/AS_Out-of-Network) - AntSword 出网探测插件
- [qingyeyun/icp-extensions](https://github.com/qingyeyun/icp-extensions) - icp备案查询谷歌插件
- [motikan2010/CVE-2021-29447](https://github.com/motikan2010/CVE-2021-29447) - WordPress - Authenticated XXE (CVE-2021-29447)
- [darryk10/CVE-2021-25735](https://github.com/darryk10/CVE-2021-25735) - Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass
- [farisv/Moodle-CVE-2019-3810](https://github.com/farisv/Moodle-CVE-2019-3810) - Moodle (< 3.6.2, < 3.5.4, < 3.4.7, < 3.1.16) XSS PoC for Privilege Escalation (Student to Admin)
- [singularseclab/Browser_Exploits](https://github.com/singularseclab/Browser_Exploits) - A collection of browser exploitation codes from Singular Security Lab.
- [ForbiddenProgrammer/CVE-2021-21315-PoC](https://github.com/ForbiddenProgrammer/CVE-2021-21315-PoC) - CVE 2021-21315 PoC
- [dxcweb/watermark](https://github.com/dxcweb/watermark) - canvas图片水印,用于身份证等个人信息添加仅用于XXX等字样保护个人信息
- [CapacitorSet/box-js](https://github.com/CapacitorSet/box-js) - A tool for studying JavaScript malware.
- [eciavatta/caronte](https://github.com/eciavatta/caronte) - A tool to analyze the network flow during attack/defence Capture the Flag competitions
- [ElSicarius/UnCommenteR](https://github.com/ElSicarius/UnCommenteR) - A chrome extension to uncomment hidden stuff in the html
- [rayhan0x01/nodejs-websocket-sqli](https://github.com/rayhan0x01/nodejs-websocket-sqli) - A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection
- [CreditTone/hooker](https://github.com/CreditTone/hooker) - 🔥🔥hooker是一个基于frida实现的逆向工具包。为逆向开发人员提供统一化的脚本包管理方式、通杀脚本、自动化生成hook脚本、内存漫游探测activity和service、firda版JustTrustMe、disable ssl pinning
- [WithSecureLabs/android-keystore-audit](https://github.com/WithSecureLabs/android-keystore-audit) -
- [swoops/eval_villain](https://github.com/swoops/eval_villain) - A Firefox Web Extension to improve the discovery of DOM XSS.
- [liath/CVE-2020-10977](https://github.com/liath/CVE-2020-10977) - Gitlab v12.4.0-8.1 RCE
- [lijiejie/swagger-exp](https://github.com/lijiejie/swagger-exp) - A Swagger API Exploit
- [davtur19/DotGit](https://github.com/davtur19/DotGit) - An extension for checking if .git is exposed in visited websites
- [okoala/egg-jwt](https://github.com/okoala/egg-jwt) - JWT authentication plugin for egg
- [bhattsameer/devtool-snippets-forhacks](https://github.com/bhattsameer/devtool-snippets-forhacks) - Collection of snippets for devtools.
- [r3curs1v3-pr0xy/vajra](https://github.com/r3curs1v3-pr0xy/vajra) - Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
- [tcc0lin/Review_Reverse](https://github.com/tcc0lin/Review_Reverse) -
- [benso-io/posta](https://github.com/benso-io/posta) - 🐙 Cross-document messaging security research tool powered by https://enso.security
- [NorthwaveSecurity/fridax](https://github.com/NorthwaveSecurity/fridax) - Fridax enables you to read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications.
- [noobpk/frida-ios-hook](https://github.com/noobpk/frida-ios-hook) - A tool that helps you easy trace classes, functions, and modify the return values of methods on iOS platform
- [kylesmile1103/Learn-Frida](https://github.com/kylesmile1103/Learn-Frida) - Modding Unity app with Frida tutorial.
- [dolevf/Damn-Vulnerable-GraphQL-Application](https://github.com/dolevf/Damn-Vulnerable-GraphQL-Application) - Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practising GraphQL Security.
- [hzdu/setprograms](https://github.com/hzdu/setprograms) - NodeJS、JDK、Python开发环境设置工具
- [notion-enhancer/notion-enhancer](https://github.com/notion-enhancer/notion-enhancer) - An enhancer/customiser for the all-in-one productivity workspace Notion
- [RenwaX23/XSSTRON](https://github.com/RenwaX23/XSSTRON) - Electron JS Browser To Find XSS Vulnerabilities Automatically
- [avwo/whistle](https://github.com/avwo/whistle) - HTTP, HTTP2, HTTPS, Websocket debugging proxy
- [mickael-kerjean/filestash](https://github.com/mickael-kerjean/filestash) - 🦄 A file manager / web client for SFTP, S3, FTP, WebDAV, Git, Minio, LDAP, CalDAV, CardDAV, Mysql, Backblaze, ...
- [dreamyguy/gitlogg](https://github.com/dreamyguy/gitlogg) - 💾 🧮 🤯 Parse the 'git log' of multiple repos to 'JSON'
- [thunderbarca/BlackStone](https://github.com/thunderbarca/BlackStone) - 一个基于docker,开箱即用的CTF竞赛平台
- [iot-onboarding/mud-visualizer](https://github.com/iot-onboarding/mud-visualizer) - mud-visualizer is a tool to visualize MUD files
- [egoist/docute](https://github.com/egoist/docute) - 📚 Effortless documentation, done right.
- [neXenio/adb-util](https://github.com/neXenio/adb-util) - Electron app for Android developers, providing a GUI for common ADB operations
- [s7ckTeam/LeakFinder](https://github.com/s7ckTeam/LeakFinder) - LeakFinder(觅露)为s7ck Team 红队云武器库F-Box里的一款信息泄露浏览搜集浏览器插件。
- [p3nt4/Nuages](https://github.com/p3nt4/Nuages) - A modular C2 framework
- [MariaGarber/XSS-Scanner](https://github.com/MariaGarber/XSS-Scanner) - XSS scanner that detects Cross-Site Scripting vulnerabilities in website by injecting malicious scripts
- [vercel/update-check](https://github.com/vercel/update-check) - Minimalistic update notifications for command line interfaces
- [arachnys/cabot](https://github.com/arachnys/cabot) - Self-hosted, easily-deployable monitoring and alerts service - like a lightweight PagerDuty
- [qeeqbox/social-analyzer](https://github.com/qeeqbox/social-analyzer) - API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites
- [abhijithvijayan/stargazed](https://github.com/abhijithvijayan/stargazed) - 📋 Creating your own Awesome List of GitHub stars!
- [enovella/fridroid-unpacker](https://github.com/enovella/fridroid-unpacker) - Defeat Java packers via Frida instrumentation
- [jiangqizheng/BlueSea](https://github.com/jiangqizheng/BlueSea) - BlueSea,一个有趣的英语学习扩展,支持划词翻译、单词高亮、单词弹幕、记忆曲线复习、词频统计...
- [m0bilesecurity/Frida-Mobile-Scripts](https://github.com/m0bilesecurity/Frida-Mobile-Scripts) - Collection of useful FRIDA Mobile Scripts
- [coffeehb/FridaHook](https://github.com/coffeehb/FridaHook) - 记录学习Frida Hook时的知识点和小脚本
- [siyujie/OkHttpLogger-Frida](https://github.com/siyujie/OkHttpLogger-Frida) - Frida 实现拦截okhttp的脚本
- [hug-sun/element3](https://github.com/hug-sun/element3) - A Vue.js 3.0 UI Toolkit for IT Education. Build with JS&TS
- [timwhitez/Doge-XSS-Phishing](https://github.com/timwhitez/Doge-XSS-Phishing) - xss钓鱼,cna插件配合php后端收杆
- [gh0stkey/avList](https://github.com/gh0stkey/avList) - avList - 杀软进程对应杀软名称
- [yzddmr6/As-Exploits](https://github.com/yzddmr6/As-Exploits) - 中国蚁剑后渗透框架
- [muraenateam/necrobrowser](https://github.com/muraenateam/necrobrowser) - necromantic session control
- [675354981/JR-scan](https://github.com/675354981/JR-scan) - 利用python3写的综合扫描工具,可“一键”实现基本信息收集(端口、敏感目录、WAF、服务、操作系统、子域名),支持POC扫描(可自行添加POC,操作简单),支持利用AWVS探测(需使用API接口),未来争取实现xray联动。
- [advanced-rest-client/arc-electron](https://github.com/advanced-rest-client/arc-electron) - Advanced REST Client - Desktop application
- [Medicean/VSCodeXssEncode](https://github.com/Medicean/VSCodeXssEncode) - Converts characters from one encoding to another using a transformation. This tool will help you encode payloads in testing sql injections, XSS holes and site security.
- [SukkaW/nali-cli](https://github.com/SukkaW/nali-cli) - :anchor: Parse geoinfo of IP Address without leaving your terminal
- [hizzgdev/jsmind](https://github.com/hizzgdev/jsmind) - a mind mapping library built by javascript
- [SoftSec-KAIST/Fuzzing-Survey](https://github.com/SoftSec-KAIST/Fuzzing-Survey) - The Art, Science, and Engineering of Fuzzing: A Survey
- [dmitriz/cpsfy](https://github.com/dmitriz/cpsfy) - 🚀 Tiny goodies for Continuation-Passing-Style functions, fully tested
- [samyk/webscan](https://github.com/samyk/webscan) - Browser-based network scanner & local-IP detection
- [jeverd/lecture-experience](https://github.com/jeverd/lecture-experience) - :books: Liteboard.io - A lightweight browser-based lecturing platform using WebRTC :pencil2:
- [buffermet/bug-bounty-tools](https://github.com/buffermet/bug-bounty-tools) - Collection of HTTP scanners and fuzzers.
- [bonino97/LemonBooster-v2](https://github.com/bonino97/LemonBooster-v2) - Reestructured LemonBooster.
- [anuraghazra/github-readme-stats](https://github.com/anuraghazra/github-readme-stats) - :zap: Dynamically generated stats for your github readmes
- [zadam/trilium](https://github.com/zadam/trilium) - Build your personal knowledge base with Trilium Notes
- [pwndoc/pwndoc](https://github.com/pwndoc/pwndoc) - Pentest Report Generator
- [msrkp/PPScan](https://github.com/msrkp/PPScan) - Client Side Prototype Pollution Scanner
- [zmister2016/MrDoc](https://github.com/zmister2016/MrDoc) - mrdoc,online document system developed based on python. It is suitable for individuals and small teams to manage documents, wiki, knowledge and notes. 觅思文档,适合于个人和中小型团队的在线文档、知识库系统。
- [its-a-feature/Mythic](https://github.com/its-a-feature/Mythic) - A collaborative, multi-platform, red teaming framework
- [lanyulei/ferry](https://github.com/lanyulei/ferry) - 本系统是集工单统计、任务钩子、权限管理、灵活配置流程与模版等等于一身的开源工单系统,当然也可以称之为工作流引擎。 致力于减少跨部门之间的沟通,自动任务的执行,提升工作效率与工作质量,减少不必要的工作量与人为出错率。
- [bonino97/API-Monitoring](https://github.com/bonino97/API-Monitoring) - Monitoring Subdomains, improve your recon.
- [Ar3h/anti-honeypot](https://github.com/Ar3h/anti-honeypot) - 一款可以检测WEB蜜罐并阻断请求的Chrome插件,能够识别并阻断长亭D-sensor、墨安幻阵的部分溯源api
- [dream-num/Luckysheet](https://github.com/dream-num/Luckysheet) - Luckysheet is an online spreadsheet like excel that is powerful, simple to configure, and completely open source.
- [Tencent/cloudbase-framework](https://github.com/Tencent/cloudbase-framework) - 腾讯云开发云原生一体化部署工具 🚀 CloudBase Framework:一键部署,不限框架语言,云端一体化开发,基于Serverless 架构。A front-end and back-end integrated deployment tool. One-click deploy to serverless architecture. https://docs.cloudbase.net/
- [Cherrison/CrackMinApp](https://github.com/Cherrison/CrackMinApp) - (反编译微信小程序)一键获取微信小程序源码(傻瓜式操作), 使用了C#加nodejs制作
- [davisjam/safe-regex](https://github.com/davisjam/safe-regex) - Detect possibly catastrophic, exponential-time regular expressions
- [jzillmann/pdf-to-markdown](https://github.com/jzillmann/pdf-to-markdown) - A PDF to Markdown converter
- [maple3142/cf-warp](https://github.com/maple3142/cf-warp) -
- [facundoolano/app-store-scraper](https://github.com/facundoolano/app-store-scraper) - scrape data from the itunes app store
- [YMFE/yapi](https://github.com/YMFE/yapi) - YApi 是一个可本地部署的、打通前后端及QA的、可视化的接口管理平台
- [RomaneeSean/xss-flash-fishing](https://github.com/RomaneeSean/xss-flash-fishing) -
- [ajinabraham/njsscan](https://github.com/ajinabraham/njsscan) - njsscan is a semantic aware SAST tool that can find insecure code patterns in your Node.js applications.
- [mike-goodwin/owasp-threat-dragon](https://github.com/mike-goodwin/owasp-threat-dragon) - An open source, online threat modelling tool from OWASP
- [maltek/swift-frida](https://github.com/maltek/swift-frida) - Frida library for interacting with Swift programs. Superseded by https://github.com/frida/frida-swift-bridge
- [jangxx/netflix-1080p](https://github.com/jangxx/netflix-1080p) - Chrome extension to play Netflix in 1080p and 5.1
- [punishell/bbtips](https://github.com/punishell/bbtips) - BugBountyTips
- [mark-zh/BugBountyTips](https://github.com/mark-zh/BugBountyTips) - 记录一些国外漏洞赏金猎人的挖洞技巧和一些有意思的东西
- [hexploitable/r2con2020_r2frida](https://github.com/hexploitable/r2con2020_r2frida) - This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.
- [danny0838/content-farm-terminator](https://github.com/danny0838/content-farm-terminator) - Content Farm Terminator browser extension/「終結內容農場」瀏覽器套件
- [mdnice/markdown-nice](https://github.com/mdnice/markdown-nice) - 支持主题设计的 Markdown 编辑器,让排版变 Nice
- [notilus67/frider](https://github.com/notilus67/frider) - Dump unpacked dex, trace/intercept Java/native function. Frida + adb + React +Django
- [timwhitez/about-anti-honeypot](https://github.com/timwhitez/about-anti-honeypot) - 关于蜜罐的一些微小的统计工作
- [timqian/chinese-independent-blogs](https://github.com/timqian/chinese-independent-blogs) - 中文独立博客列表
- [KilledByAPixel/OS13k](https://github.com/KilledByAPixel/OS13k) - A Tiny OS and Mini Game Engine
- [cnrstar/anti-honeypot](https://github.com/cnrstar/anti-honeypot) - 一款可以检测WEB蜜罐并阻断请求的Chrome插件
- [D00MFist/PersistentJXA](https://github.com/D00MFist/PersistentJXA) - Collection of macOS persistence methods and miscellaneous tools in JXA
- [PerimeterX/CVE-2020-6519](https://github.com/PerimeterX/CVE-2020-6519) -
- [iiiusky/AntiHoneypot-Chrome-simple](https://github.com/iiiusky/AntiHoneypot-Chrome-simple) - Chrome 蜜罐检测插件
- [ossf/wg-best-practices-os-developers](https://github.com/ossf/wg-best-practices-os-developers) - The Best Practices for OSS Developers working group is dedicated to raising awareness and education of secure code best practices for open source developers.
- [alanpeng/docker-training-psweb](https://github.com/alanpeng/docker-training-psweb) - docker-training-psweb
- [Koenkk/zigbee2mqtt](https://github.com/Koenkk/zigbee2mqtt) - Zigbee 🐝 to MQTT bridge 🌉, get rid of your proprietary Zigbee bridges 🔨
- [node-red/node-red](https://github.com/node-red/node-red) - Low-code programming for event-driven applications
- [eip-work/kuboard-press](https://github.com/eip-work/kuboard-press) - Kuboard 是基于 Kubernetes 的微服务管理界面。同时提供 Kubernetes 免费中文教程,入门教程,最新版本的 Kubernetes v1.23.4 安装手册,(k8s install) 在线答疑,持续更新。
- [vernesong/OpenClash](https://github.com/vernesong/OpenClash) - A Clash Client For OpenWrt
- [kingbase/wechat_history_export](https://github.com/kingbase/wechat_history_export) - 从 PC 端 (Windows) 不那么狼狈的阅读或导出微信公众号的历史文章
- [donot-wong/sensinfor](https://github.com/donot-wong/sensinfor) - A chrome extension use to find leak file and backup file.
- [nkzawa/ast-scope](https://github.com/nkzawa/ast-scope) - A JavaScript AST scope analyzer
- [lirantal/cwe-sdk](https://github.com/lirantal/cwe-sdk) - A Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC
- [hyj1991/easy-monitor](https://github.com/hyj1991/easy-monitor) - 企业级 Node.js 应用性能监控与线上故障定位解决方案
- [nccgroup/singularity](https://github.com/nccgroup/singularity) - A DNS rebinding attack framework.
- [kautukkundan/Awesome-Profile-README-templates](https://github.com/kautukkundan/Awesome-Profile-README-templates) - A collection of awesome readme templates to display on your profile
- [smiegles/extract-relative-url-heapsnapshot](https://github.com/smiegles/extract-relative-url-heapsnapshot) - Extract relative urls from a heap snapshot
- [stevenvachon/broken-link-checker](https://github.com/stevenvachon/broken-link-checker) - Find broken links, missing images, etc within your HTML.
- [monkeylord/XposedFridaBridge](https://github.com/monkeylord/XposedFridaBridge) - A frida script implement XposedBridge & load xposed modules, without installing xposed framwork.
- [terjanq/Tiny-XSS-Payloads](https://github.com/terjanq/Tiny-XSS-Payloads) - A collection of tiny XSS Payloads that can be used in different contexts. https://tinyxss.terjanq.me
- [RhinoSecurityLabs/Swagger-EZ](https://github.com/RhinoSecurityLabs/Swagger-EZ) - A tool geared towards pentesting APIs using OpenAPI definitions.
- [mindedsecurity/behave](https://github.com/mindedsecurity/behave) - Behave! A monitoring browser extension for pages acting as "bad boi"
- [kgretzky/pwndrop](https://github.com/kgretzky/pwndrop) - Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.
- [satazor/js-spark-md5](https://github.com/satazor/js-spark-md5) - Lightning fast normal and incremental md5 for javascript
- [onblog/BlogHelper](https://github.com/onblog/BlogHelper) - 帮助国内用户写作的托盘助手,一键发布本地文章到主流博客平台(知乎、简书、博客园、CSDN、SegmentFault、掘金、开源中国),剪贴板图片一键上传至图床(新浪、Github、图壳、腾讯云、阿里云、又拍云、七牛云)(欢迎Star,🚫禁止Fork)
- [TheKingOfDuck/logonTracer](https://github.com/TheKingOfDuck/logonTracer) - Windows系统安全登录日志分析工具logonTracer汉化修正版
- [tdr130/assetnote](https://github.com/tdr130/assetnote) - Push notifications for passive DNS data
- [auth0/repo-supervisor](https://github.com/auth0/repo-supervisor) - Scan your code for security misconfiguration, search for passwords and secrets. :mag:
- [shadow1ng/vanscan](https://github.com/shadow1ng/vanscan) -
- [Qihoo360/doraemon](https://github.com/Qihoo360/doraemon) - Doraemon is a Prometheus based monitor system
- [TheMMMdev/simple-middleman](https://github.com/TheMMMdev/simple-middleman) - Simple NodeJS server meant to handle logged url information (like with chromer).
- [si9int/gDork](https://github.com/si9int/gDork) - A Mozilla Firefox extension which allows quick access to your google-dorking result
- [makuga01/dnsFookup](https://github.com/makuga01/dnsFookup) - DNS rebinding toolkit
- [KuroLabs/stegcloak](https://github.com/KuroLabs/stegcloak) - Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
- [yeswehack/PwnFox](https://github.com/yeswehack/PwnFox) - PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.
- [0x742/noia](https://github.com/0x742/noia) - [WIP] Simple mobile applications sandbox file browser tool. Powered with [frida.re](https://www.frida.re).
- [LeadroyaL/friposed](https://github.com/LeadroyaL/friposed) - Write java hook with frida
- [apiaryio/dredd](https://github.com/apiaryio/dredd) - Language-agnostic HTTP API Testing Tool
- [ehrishirajsharma/SwiftnessX](https://github.com/ehrishirajsharma/SwiftnessX) - A cross-platform note-taking & target-tracking app for penetration testers.
- [DavidCatalan/fridacov](https://github.com/DavidCatalan/fridacov) - JS modules for Frida based tools to add code coverage to your instrumentation scripts.
- [ChiChou/bagbak](https://github.com/ChiChou/bagbak) - Yet another frida based iOS dumpdecrypted. Also decrypts app extensions
- [hakimel/reveal.js](https://github.com/hakimel/reveal.js) - The HTML Presentation Framework
- [monkeylord/XServer](https://github.com/monkeylord/XServer) - A Xposed Module for Android Penetration Test, with NanoHttpd.
- [lasting-yang/frida_hook_libart](https://github.com/lasting-yang/frida_hook_libart) - Frida hook some jni functions
- [lasting-yang/frida_dump](https://github.com/lasting-yang/frida_dump) - frida dump dex, frida dump so
- [gchq/CyberChef](https://github.com/gchq/CyberChef) - The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
- [0xSobky/HackVault](https://github.com/0xSobky/HackVault) - A container repository for my public web hacks!
- [star7th/showdoc](https://github.com/star7th/showdoc) - ShowDoc is a tool greatly applicable for an IT team to share documents online一个非常适合IT团队的在线API文档、技术文档工具
- [eth0izzle/shhgit](https://github.com/eth0izzle/shhgit) - Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.
- [m0bilesecurity/RMS-Runtime-Mobile-Security](https://github.com/m0bilesecurity/RMS-Runtime-Mobile-Security) - Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime
- [samhaxr/XXRF-Shots](https://github.com/samhaxr/XXRF-Shots) - XXRF Shots - Useful for testing SSRF vulnerability
- [jobertabma/transformations](https://github.com/jobertabma/transformations) -
- [Passer6y/CrawlerVuln](https://github.com/Passer6y/CrawlerVuln) - 一个NodeJS实现的漏扫动态爬虫
- [mandatoryprogrammer/CursedChrome](https://github.com/mandatoryprogrammer/CursedChrome) - Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victims.
- [opnsec/postMessage-logger](https://github.com/opnsec/postMessage-logger) - Simple "postMessage logger" Chrome extension
- [fransr/postMessage-tracker](https://github.com/fransr/postMessage-tracker) - A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon
- [openspug/spug](https://github.com/openspug/spug) - 开源运维平台:面向中小型企业设计的轻量级无Agent的自动化运维平台,整合了主机管理、主机批量执行、主机在线终端、文件在线上传下载、应用发布部署、在线任务计划、配置中心、监控、报警等一系列功能。
- [ericalexanderorg/should-i-trust](https://github.com/ericalexanderorg/should-i-trust) - OSINT tool to evaluate the trustworthiness of a company
- [atmoner/githubFind3r](https://github.com/atmoner/githubFind3r) -
- [wuchangming/spy-debugger](https://github.com/wuchangming/spy-debugger) - 微信调试,各种WebView样式调试、手机浏览器的页面真机调试。便捷的远程调试手机页面、抓包工具,支持:HTTP/HTTPS,无需USB连接设备。
- [apsdehal/awesome-ctf](https://github.com/apsdehal/awesome-ctf) - A curated list of CTF frameworks, libraries, resources and softwares
- [projectdiscovery/nuclei-templates](https://github.com/projectdiscovery/nuclei-templates) - Community curated list of templates for the nuclei engine to find security vulnerabilities.
- [0x0FB0/pulsar](https://github.com/0x0FB0/pulsar) - Network footprint scanner platform. Discover domains and run your custom checks periodically.
- [Caratacus/Crown](https://github.com/Caratacus/Crown) - Based on SpringBoot2, Crown builds a rapidly developed web application scaffolding.
- [tacesrever/frida-tsplugin](https://github.com/tacesrever/frida-tsplugin) - typescript autocomplete plugin for frida's java warpper
- [Werneror/pekja](https://github.com/Werneror/pekja) - SRC情报收集管理系统
- [wiwikuan/fast-srt-subtitle](https://github.com/wiwikuan/fast-srt-subtitle) - Make SRT Caption Fast!!!!
- [rewanthtammana/vuln-headers-extension](https://github.com/rewanthtammana/vuln-headers-extension) - Firefox extension which parses the headers of all the requests which are being flowing through your firefox browser to detect for vulnerabilities.
- [juice-shop/multi-juicer](https://github.com/juice-shop/multi-juicer) - Host and manage multiple Juice Shop instances for security trainings and Capture The Flags
- [rohanrhu/gdb-frontend](https://github.com/rohanrhu/gdb-frontend) - ☕ GDBFrontend is an easy, flexible and extensible gui debugger. Try it on https://debugme.dev
- [mitre-attack/tram](https://github.com/mitre-attack/tram) - Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.
- [cliclitv/ClicliPure](https://github.com/cliclitv/ClicliPure) - :snowman: CliCli Whrite. clicli 纯白
- [88250/baidu-netdisk-downloaderx](https://github.com/88250/baidu-netdisk-downloaderx) - ⚡️ 一款图形界面的百度网盘不限速下载器,支持 Windows、Linux 和 Mac。已于 2020 年 4 月 15 日正式停用,源码仅用于程序员交流学习,细节请查看:关于停用 BND 的说明 https://ld246.com/article/1586956316578
- [546669204/fuck-debugger-extensions](https://github.com/546669204/fuck-debugger-extensions) - javascript anti-anti debugging
- [lucky-sideburn/kubeinvaders](https://github.com/lucky-sideburn/kubeinvaders) - Gamified Chaos Engineering Tool for Kubernetes
- [OWASP/DVSA](https://github.com/OWASP/DVSA) - a Damn Vulnerable Serverless Application
- [hakluke/weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads) - XSS payloads designed to turn alert(1) into P1
- [fcavallarin/domdig](https://github.com/fcavallarin/domdig) - DOM XSS scanner for Single Page Applications
- [wrlu/FridaHookUniversal](https://github.com/wrlu/FridaHookUniversal) - An universal frida hook project
- [DockerSecurityPlayground/DSP](https://github.com/DockerSecurityPlayground/DSP) - A Microservices-based framework for the study of Network Security and Penetration Test techniques
- [david3107/squatm3gator](https://github.com/david3107/squatm3gator) - Squatm3gator is a complete web solution based on the python tool squatm3, designed to enumerate available domains generated modifying the original domain name through different cybersquatting techniqu
- [fofapro/fofa_view](https://github.com/fofapro/fofa_view) - FOFA Pro view 是一款FOFA Pro 资产展示浏览器插件,目前兼容 Chrome、Firefox、Opera。
- [logicalhacking/DVHMA](https://github.com/logicalhacking/DVHMA) - Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.
- [goabstract/Awesome-Design-Tools](https://github.com/goabstract/Awesome-Design-Tools) - The best design tools and plugins for everything 👉
- [MichaelWayneLIU/InfoScraper](https://github.com/MichaelWayneLIU/InfoScraper) - 一个基于Electron的自动化Web资产探测工具,用于渗透前期的信息搜集工作
- [andreafioraldi/frida-fuzzer](https://github.com/andreafioraldi/frida-fuzzer) - This experimetal fuzzer is meant to be used for API in-memory fuzzing.
- [wultra/powerauth-admin](https://github.com/wultra/powerauth-admin) - This reporitory was moved to https://github.com/wultra/powerauth-server repository
- [feedhenry/mobile-security](https://github.com/feedhenry/mobile-security) - FeedHenry Mobile Security
- [FrenchYeti/dexcalibur](https://github.com/FrenchYeti/dexcalibur) - [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, s
- [iddoeldor/frida-snippets](https://github.com/iddoeldor/frida-snippets) - Hand-crafted Frida examples
- [vincentcox/StaCoAn](https://github.com/vincentcox/StaCoAn) - StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.
- [dpnishant/appmon](https://github.com/dpnishant/appmon) - Documentation:
- [ant4g0nist/vegvisir](https://github.com/ant4g0nist/vegvisir) - A browser based GUI for **LLDB** Debugger.
- [cloakware-ctf/idascripts](https://github.com/cloakware-ctf/idascripts) - Some IDA Python scripts for auto-analysis and a Hive-plot visualizer.
- [haozi/xss-demo](https://github.com/haozi/xss-demo) - 👮🏻♂️ XSS attack playground,there are answers in issues. XSS 攻防靶场,issues 有答案
- [JonComo/anim](https://github.com/JonComo/anim) - Quick JS program for creating animations
- [horsicq/Detect-It-Easy](https://github.com/horsicq/Detect-It-Easy) - Program for determining types of files for Windows, Linux and MacOS.
- [naptha/tesseract.js](https://github.com/naptha/tesseract.js) - Pure Javascript OCR for more than 100 Languages 📖🎉🖥
- [lazy-luo/smarGate](https://github.com/lazy-luo/smarGate) - 内网穿透,c++实现,无需公网IP,小巧,易用,快速,安全,最好的多链路聚合(p2p+proxy)模式,不做之一...这才是你真正想要的内网穿透工具!
- [seccubus/seccubus](https://github.com/seccubus/seccubus) - Easy automated vulnerability scanning, reporting and analysis
- [abhi-r3v0/Adhrit](https://github.com/abhi-r3v0/Adhrit) - Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.
- [radenvodka/massc](https://github.com/radenvodka/massc) - Subdomain Scanner Tools with word-lists
- [SecurityPaper/SecurityPaper-web](https://github.com/SecurityPaper/SecurityPaper-web) - Security Paper
- [smartdone/Frida-Scripts](https://github.com/smartdone/Frida-Scripts) - 一些frida脚本
- [r00tSe7en/Fake-flash.cn](https://github.com/r00tSe7en/Fake-flash.cn) - flash.cn钓鱼页(中文+英文)
- [laulzgoay/BTPanel-DIY-Template](https://github.com/laulzgoay/BTPanel-DIY-Template) - BTPanel-DIY-Template
- [WooyunDota/DroidSSLUnpinning](https://github.com/WooyunDota/DroidSSLUnpinning) - Android certificate pinning disable tools
- [apachecn/howtodoinjava-zh](https://github.com/apachecn/howtodoinjava-zh) - :book: [译] HowToDoInJava 中文系列教程
- [cn-panda/JavaCodeAudit](https://github.com/cn-panda/JavaCodeAudit) - Getting started with java code auditing 代码审计入门的小项目
- [evil-huawei/evil-huawei](https://github.com/evil-huawei/evil-huawei) - Evil Huawei - 华为作过的恶
- [AloneMonkey/frida-ios-dump](https://github.com/AloneMonkey/frida-ios-dump) - pull decrypted ipa from jailbreak device
- [aws-samples/aws-serverless-security-workshop](https://github.com/aws-samples/aws-serverless-security-workshop) - In this workshop, you will learn techniques to secure a serverless application built with AWS Lambda, Amazon API Gateway and RDS Aurora. We will cover AWS services and features you can leverage to imp
- [axipo/pdfTranslator](https://github.com/axipo/pdfTranslator) - 一个具有划词翻译功能的跨平台pdf阅读器,用着挺好用开源一下造福众科研人员,欢迎star
- [viva-frida/Awesome-Frida-UI](https://github.com/viva-frida/Awesome-Frida-UI) - this tool for beginner , and make easier to use this
- [tobilg/aws-fullstack-website](https://github.com/tobilg/aws-fullstack-website) - Deploy your fullstack websites without all the hassle on AWS with CloudFront, S3, ACM, Route53, API Gateway and Lambda via Serverless.
- [guyoung/CaptfEncoder](https://github.com/guyoung/CaptfEncoder) - Captfencoder is opensource a rapid cross platform network security tool suite, providing network security related code conversion, classical cryptography, cryptography, asymmetric encryption, miscella
- [unbug/codelf](https://github.com/unbug/codelf) - A search tool helps dev to solve the naming things problem.
- [iptv-org/iptv](https://github.com/iptv-org/iptv) - Collection of publicly available IPTV channels from all over the world
- [fengbindev/Quella](https://github.com/fengbindev/Quella) - Quella是基于SSM+shiro+redis开发的后台脚手架,集成了一些后台通用功能,并集成了一些常用的第三方服务。
- [zhongshaofa/layuimini](https://github.com/zhongshaofa/layuimini) - 后台admin前端模板,基于 layui 编写的最简洁、易用的后台框架模板。只需提供一个接口就直接初始化整个框架,无需复杂操作。
- [xiandanin/magnetW](https://github.com/xiandanin/magnetW) - [已失效,不再维护]
- [geemo/huobi-robot](https://github.com/geemo/huobi-robot) - 火币合约自动交易机器人
- [ttop5/to-be-slack](https://github.com/ttop5/to-be-slack) - !!!【接口已停,没有数据】今日热榜,摸鱼神器。支持全平台:Web、PC、Mobile 及 Chrome 插件。
- [phith0n/xray-poc-generation](https://github.com/phith0n/xray-poc-generation) - 🧬 辅助生成 XRay YAML POC
- [pownjs/duct](https://github.com/pownjs/duct) - Essential tool for finding blind injection attacks.
- [apachecn/calc4b-zh](https://github.com/apachecn/calc4b-zh) - :book: [译] MIT 18.03 面向初学者的微积分
- [flutterchina/flutter-in-action](https://github.com/flutterchina/flutter-in-action) - 《Flutter实战》书稿。第二版书稿已上传,请移步新Repo。
- [xtuJSer/CoCoMusic](https://github.com/xtuJSer/CoCoMusic) - a simple music player built by electron and vue
- [src-kun/solr-sgk](https://github.com/src-kun/solr-sgk) - 大数据社工裤 demo
- [blinkfox/hexo-theme-matery](https://github.com/blinkfox/hexo-theme-matery) - A beautiful hexo blog theme with material design and responsive design.一个基于材料设计和响应式设计而成的全面、美观的Hexo主题。国内访问:http://blinkfox.com
- [TyCoding/boot-chat](https://github.com/TyCoding/boot-chat) - :bookmark: 基于SpringBoot + WebSocket的在线聊天系统,实现单窗口消息推送、群消息推送、上线提醒、Redis会话消息储存
- [wangai3176/webug4.0](https://github.com/wangai3176/webug4.0) - webug4.0
- [jeffjose/tget](https://github.com/jeffjose/tget) - tget is wget for torrents
- [makazeu/steam-key](https://github.com/makazeu/steam-key) - Online activation tool for Steam.
- [Magicskys/Kiddy](https://github.com/Magicskys/Kiddy) - 被动式扫描器
- [lyxhh/lxhToolHTTPDecrypt](https://github.com/lyxhh/lxhToolHTTPDecrypt) - Simple Android/iOS protocol analysis and utilization tool
- [AntSwordProject/ant](https://github.com/AntSwordProject/ant) - 实时上线的 XSS 盲打平台
- [showdownjs/showdown](https://github.com/showdownjs/showdown) - A bidirectional Markdown to HTML to Markdown converter written in Javascript
- [Louiszhai/tool](https://github.com/Louiszhai/tool) - 开发效率提升:Mac生产力工具链推荐
- [lyricat/wechat-format](https://github.com/lyricat/wechat-format) - 微信公众号排版编辑器,转换 Markdown 到微信特制的 HTML
- [virink/as_plugin_godofhacker](https://github.com/virink/as_plugin_godofhacker) - 黑客神器,谁用谁知道!
- [starrtc/starrtc-edu-demo](https://github.com/starrtc/starrtc-edu-demo) - web版本在线教育与白板演示示例,更多示例请参见:
- [zhaoolee/ChromeAppHeroes](https://github.com/zhaoolee/ChromeAppHeroes) - 🌈谷粒-Chrome插件英雄榜, 为优秀的Chrome插件写一本中文说明书, 让Chrome插件英雄们造福人类~ ChromePluginHeroes, Write a Chinese manual for the excellent Chrome plugin, let the Chrome plugin heroes benefit the human~ 公众号「0加1」同步更新
- [lqs469/confluence-export](https://github.com/lqs469/confluence-export) - Export document from confluence with nice style
- [nondanee/UnblockNeteaseMusic](https://github.com/nondanee/UnblockNeteaseMusic) - Revive unavailable songs for Netease Cloud Music
- [nondanee/vsc-netease-music](https://github.com/nondanee/vsc-netease-music) - UNOFFICIAL Netease Music extension for Visual Studio Code
- [Tinywan/H5-dash-hls-rtmp-webrtc](https://github.com/Tinywan/H5-dash-hls-rtmp-webrtc) - :sunflower: 传统直播:HTML5播放器、M3U8直播/点播、RTMP直播、低延迟、推流/播流地址鉴权。:green_apple: 实时直播:WebRTC
- [jack-hoo/LiveRoomDemo_Client](https://github.com/jack-hoo/LiveRoomDemo_Client) - 自己动手打造一个直播间(视频直播、聊天室、弹幕、多端适配)
- [jack-hoo/LiveRoomDemo_Server](https://github.com/jack-hoo/LiveRoomDemo_Server) - 自己动手打造一个直播间(视频直播、聊天室、弹幕、多端适配)
- [gwuhaolin/reflv](https://github.com/gwuhaolin/reflv) - react component wrap flv.js
- [archerysec/archerysec](https://github.com/archerysec/archerysec) - ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.
- [PrettyUp/Security-Baseline](https://github.com/PrettyUp/Security-Baseline) - Linux安全基线扫描、报告生成与自动修复程序
- [exodusintel/CVE-2019-5786](https://github.com/exodusintel/CVE-2019-5786) - FileReader Exploit
- [s0md3v/AwesomeXSS](https://github.com/s0md3v/AwesomeXSS) - Awesome XSS stuff
- [bilibili-helper/bilibili-helper-o](https://github.com/bilibili-helper/bilibili-helper-o) - 哔哩哔哩 (bilibili.com) 辅助工具,可以替换播放器、推送通知并进行一些快捷操作
- [foru17/front-end-collect](https://github.com/foru17/front-end-collect) - 分享自己长期关注的前端开发相关的优秀网站、博客、以及活跃开发者
- [phodal/new-project-checklist](https://github.com/phodal/new-project-checklist) - 🥳🥳🥳🥳 a checklist & tool for new project setup for developer. 新项目检查清单及其工具。
- [agalwood/Motrix](https://github.com/agalwood/Motrix) - A full-featured download manager.
- [CAT-Team-mmc/lysec](https://github.com/CAT-Team-mmc/lysec) - 一个基于docker的安全培训系统
- [0verSp4ce/PoCBox](https://github.com/0verSp4ce/PoCBox) - PoCBox - Vulnerability Test Aid Platform
- [d2-projects/d2-admin](https://github.com/d2-projects/d2-admin) - An elegant dashboard
- [EmpireProject/Empire-GUI](https://github.com/EmpireProject/Empire-GUI) - Empire client application
- [cbdyzj/cbdyzj.github.io](https://github.com/cbdyzj/cbdyzj.github.io) - jianzhao.org
- [r00tSe7en/GoogleHackingTool](https://github.com/r00tSe7en/GoogleHackingTool) - 在线Google Hacking 小工具
- [VKSRC/Github-Monitor](https://github.com/VKSRC/Github-Monitor) - Github Sensitive Information Leakage Monitor(Github信息泄漏监控系统)
- [TerryZ/v-region](https://github.com/TerryZ/v-region) - 提供 5 种应用形式的 4 级行政区划选择器 A simple region cascade selector, provide 4 levels Chinese administrative division data
- [GitSquared/edex-ui](https://github.com/GitSquared/edex-ui) - A cross-platform, customizable science fiction terminal emulator with advanced monitoring & touchscreen support.
- [sherylynn/pdf-sync](https://github.com/sherylynn/pdf-sync) - PDF Reader in JavaScript with Sync
- [iAJue/note](https://github.com/iAJue/note) - 萌音云笔记 - 一个高效的在线云笔记、专注技术文档在线创作、阅读、分享和托管
- [stephentian/33-js-concepts](https://github.com/stephentian/33-js-concepts) - :scroll: 每个 JavaScript 工程师都应懂的33个概念 @leonardomso
- [dongyuanxin/webpack-demos](https://github.com/dongyuanxin/webpack-demos) - 📦 Demos && Courses for Webpack 4
- [izuolan/zresume](https://github.com/izuolan/zresume) - 程序员简历生成器(可导出静态页面、支持密码验证访问)
- [HyperSimon/bookmarks-2-markdown](https://github.com/HyperSimon/bookmarks-2-markdown) - A Chrome extension for exporting bookmarks as markdown
- [MrSorrow/taotao](https://github.com/MrSorrow/taotao) - IDEA版本淘淘商城
- [TevinLi/amWiki](https://github.com/TevinLi/amWiki) - amWiki 是一款由 JS 开发、依赖 Atom 或 Nodejs-Npm 的 Markdown 轻量级前端化开源文库系统
- [mengkunsoft/MKOnlineMusicPlayer](https://github.com/mengkunsoft/MKOnlineMusicPlayer) - ⛔【停止维护】一个在线音乐播放器(仅 UI,无功能)
- [monkeym4ster/find-subdomains](https://github.com/monkeym4ster/find-subdomains) - Abusing Certificate Transparency logs for getting HTTPS websites subdomains. (通过 HTTPS 证书透明日志,以 **非字典爆破** 的方式获取网站子域名。)
- [hacksalot/HackMyResume](https://github.com/hacksalot/HackMyResume) - Generate polished résumés and CVs in HTML, Markdown, LaTeX, MS Word, PDF, plain text, JSON, XML, YAML, smoke signal, and carrier pigeon.
- [OXOYO/bookmark2md](https://github.com/OXOYO/bookmark2md) - Convert chrome bookmarks to md files and push them to GitHub repository.
- [apachecn/apachecn-algo-zh](https://github.com/apachecn/apachecn-algo-zh) - ApacheCN 数据结构与算法译文集
- [EthanLin-TWer/translation-spring-mvc-4-documentation](https://github.com/EthanLin-TWer/translation-spring-mvc-4-documentation) - Spring MVC 4.2.4 RELEASE 中文文档完整翻译稿
- [codeskyblue/gosuv](https://github.com/codeskyblue/gosuv) - Deprecated!!! Process managerment writtern by golang, inspired by python-supervisor
- [quincyyhuang/hexo-node-admin](https://github.com/quincyyhuang/hexo-node-admin) - A Hexo management tool with responsive UI designed to make it easier for you to compose.
- [Medicean/GenShell](https://github.com/Medicean/GenShell) - AntSword Generate Shell Plugin
- [yincongcyincong/proxy-web](https://github.com/yincongcyincong/proxy-web) - proxy-web is a webview proxy application written by Golang
- [phpservermon/phpservermon](https://github.com/phpservermon/phpservermon) - PHP Server Monitor
- [kern/filepizza](https://github.com/kern/filepizza) - :pizza: Peer-to-peer file transfers in your browser
- [csbun/thal](https://github.com/csbun/thal) - 译文:Puppeteer 与 Chrome Headless —— 从入门到爬虫
- [Tsuk1ko/pxder](https://github.com/Tsuk1ko/pxder) - 🖼 Download illusts from pixiv.net P站插画批量下载器
- [aui/font-spider](https://github.com/aui/font-spider) - Smart webfont compression and format conversion tool
- [J3-Tech/Office-Document-Converter](https://github.com/J3-Tech/Office-Document-Converter) - Office Document Convertor (ODC) is an online convertor for office document which runs as a web service. Its aim is to provide the facility of converting almost all office documents into image which ma
- [ning1022/SQLInjectionWiki](https://github.com/ning1022/SQLInjectionWiki) - 一个专注于聚合和记录各种SQL注入方法的wiki
- [RASSec/A_Scan_Framework](https://github.com/RASSec/A_Scan_Framework) - Network Security Vulnerability Manage
- [RASSec/cve.wang](https://github.com/RASSec/cve.wang) - bug公开平台
- [WebGoat/WebGoat](https://github.com/WebGoat/WebGoat) - WebGoat is a deliberately insecure application
- [geeeeeeeeek/electronic-wechat](https://github.com/geeeeeeeeek/electronic-wechat) - :speech_balloon: A better WeChat on macOS and Linux. Built with Electron by Zhongyi Tong.
- [cablej/FileChangeMonitor](https://github.com/cablej/FileChangeMonitor) - Continuous monitoring for JavaScript files
- [Toninie/github-blog](https://github.com/Toninie/github-blog) - blog base on Vue.js and Github API
- [78778443/permeate](https://github.com/78778443/permeate) - 一个用于渗透透测试演练的WEB系统,用于提升寻找网站能力,也可以用于web安全教学
- [zmzhang8/Photon](https://github.com/zmzhang8/Photon) - A lightweight multi-threaded downloader based on aria2.
- [mriiiron/salvia](https://github.com/mriiiron/salvia) - A minimum-building static blog framework.
- [ShawnZeng1996/Memory](https://github.com/ShawnZeng1996/Memory) - A theme for wordpress.
- [bingohuang/docker-labs](https://github.com/bingohuang/docker-labs) - Docker在线实验室
- [axt/cfg-explorer](https://github.com/axt/cfg-explorer) - CFG explorer for binaries
- [carlos-wong/cerebro-codelf](https://github.com/carlos-wong/cerebro-codelf) - ⭐️ 给变量起名的事情上,为你生命省 3s (Save 3 seconds of your life when naming things.)
- [cerebroapp/cerebro](https://github.com/cerebroapp/cerebro) - 🔵 Cerebro is an open-source launcher to improve your productivity and efficiency
- [Warflop/FireShodanMap](https://github.com/Warflop/FireShodanMap) - FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerable devices and they are showed on the map for analysis. All dat
- [hustcc/aliyun-oss-deploy](https://github.com/hustcc/aliyun-oss-deploy) - 🙈 一个 nodejs 命令行工具,用于部署静态资源到 aliyun oss,支持代码方式和 CLI 方式!
- [noahziheng/sdeploy-cli](https://github.com/noahziheng/sdeploy-cli) - A light development tool using SCP,SFTP and RSync
- [axetroy/blog](https://github.com/axetroy/blog) - :open_book:基于Github API 的动态博客
- [denghongcai/forsaken-mail](https://github.com/denghongcai/forsaken-mail) - a self-hosted disposable mail service
- [malaohu/forsaken-mail](https://github.com/malaohu/forsaken-mail) - a self-hosted disposable mail service
- [runningcheese/RunningCheese-Firefox](https://github.com/runningcheese/RunningCheese-Firefox) - A Graceful and Powerful Customized Firefox
- [jae-jae/Camtd](https://github.com/jae-jae/Camtd) - Chrome multi-threaded download manager extension,based on Aria2 and AriaNg. Chrome多线程下载扩展。
- [s9w/font_compare](https://github.com/s9w/font_compare) - Programming font comparison
- [be5invis/Sarasa-Gothic](https://github.com/be5invis/Sarasa-Gothic) - Sarasa Gothic / 更纱黑体 / 更紗黑體 / 更紗ゴシック / 사라사 고딕
- [aliyun/oss-browser](https://github.com/aliyun/oss-browser) - OSS Browser 提供类似windows资源管理器功能。用户可以很方便的浏览文件,上传下载文件,支持断点续传等。
- [geekcompany/DeerResume](https://github.com/geekcompany/DeerResume) - MarkDown在线简历工具,可在线预览、编辑和生成PDF。[此项目已不再维护,建议使用 cv.ftqq.com 替代 ]
- [marktext/marktext](https://github.com/marktext/marktext) - 📝A simple and elegant markdown editor, available for Linux, macOS and Windows.
- [UbuntuBar/userguide](https://github.com/UbuntuBar/userguide) - Ubuntu 吧用户指南
- [KafuuChinoQ/V2RayGeoKit](https://github.com/KafuuChinoQ/V2RayGeoKit) -
- [reruin/sharelist](https://github.com/reruin/sharelist) - 快速分享 GoogleDrive OneDrive
- [liyangready/multiple-host](https://github.com/liyangready/multiple-host) - 虚拟host解决方案,轻松实现两套host环境
- [listen1/listen1_chrome_extension](https://github.com/listen1/listen1_chrome_extension) - one for all free music in china (chrome extension, also works for firefox)
- [listen1/listen1_desktop](https://github.com/listen1/listen1_desktop) - one for all free music in china (Windows, Mac, Linux desktop)
- [KaTeX/KaTeX](https://github.com/KaTeX/KaTeX) - Fast math typesetting for the web.
- [creditease-sec/insight](https://github.com/creditease-sec/insight) - 洞察-宜信集应用系统资产管理、漏洞全生命周期管理、安全知识库管理三位一体的平台。
- [IceEnd/Yosoro](https://github.com/IceEnd/Yosoro) - :shaved_ice:Beautiful Markdown NoteBook. 🏖
- [jax777/scan_monitor](https://github.com/jax777/scan_monitor) - ip 域名 端口扫描 服务刺探 单机版
- [VoidSec/WebRTC-Leak](https://github.com/VoidSec/WebRTC-Leak) - Check if your VPN leaks your IP address via the WebRTC technology
- [1c7/Crash-Course-Computer-Science-Chinese](https://github.com/1c7/Crash-Course-Computer-Science-Chinese) - :computer: 计算机速成课 | Crash Course 字幕组 (全40集 2018-5-1 精校完成) B站播放量 383万
- [chinese-poetry/chinese-poetry](https://github.com/chinese-poetry/chinese-poetry) - The most comprehensive database of Chinese poetry 🧶最全中华古诗词数据库, 唐宋两朝近一万四千古诗人, 接近5.5万首唐诗加26万宋诗. 两宋时期1564位词人,21050首词。
- [ALEXZZZ9/PS4-5.01-WebKit-Exploit-PoC](https://github.com/ALEXZZZ9/PS4-5.01-WebKit-Exploit-PoC) - PS4 5.01 WebKit Exploit PoC
- [brookhong/Surfingkeys](https://github.com/brookhong/Surfingkeys) - Map your keys for web surfing, expand your browser with javascript and keyboard.
- [wspl/CIDR-in-Proxifier](https://github.com/wspl/CIDR-in-Proxifier) - :tea: A script for converting CIDRs list to configuration file segment of Proxifier.
- [carbon-app/carbon](https://github.com/carbon-app/carbon) - :black_heart: Create and share beautiful images of your source code
- [lukechilds/reverse-shell](https://github.com/lukechilds/reverse-shell) - Reverse Shell as a Service
- [neargle/win-powerup-exp-index](https://github.com/neargle/win-powerup-exp-index) - 🚄 火车上写的,2015年的代码和数据了
- [chaozh/awesome-blockchain-cn](https://github.com/chaozh/awesome-blockchain-cn) - 收集所有区块链(BlockChain)技术开发相关资料,包括Fabric和Ethereum开发资料
- [0x0ade/rotonde-client](https://github.com/0x0ade/rotonde-client) - Rotonde Base Client
- [Rotonde/rotonde-client](https://github.com/Rotonde/rotonde-client) - Rotonde Base Client
- [zhuzhuyule/HexoEditor](https://github.com/zhuzhuyule/HexoEditor) - this markdown Editor for hexo blog
- [zkat/cipm](https://github.com/zkat/cipm) - standalone ci-oriented package installer for npm projects (moved)
- [amhoho/electron-cn-docs](https://github.com/amhoho/electron-cn-docs) - Electron中文文档! 精心翻译,完美排版,实时同步更新!, 最后同步:2017-05-23(个人比较忙,本项目已经不再维护了)
- [yuzd/ClearScript.Manager](https://github.com/yuzd/ClearScript.Manager) - Use tern.js in .netcontext 重构原有代码,require dll js等功能
- [bradoyler/xmr-miner](https://github.com/bradoyler/xmr-miner) - Web-based Cryptocurrency miner, built with Vue.js
- [trazyn/ieaseMusic](https://github.com/trazyn/ieaseMusic) - 网易云音乐第三方
- [blinksocks/blinksocks](https://github.com/blinksocks/blinksocks) - A framework for building composable proxy protocol stack.
- [zhangjikai/tools](https://github.com/zhangjikai/tools) - Some useful tools
- [njwangchuan/schoidbot](https://github.com/njwangchuan/schoidbot) - schoidbot is a twitter bot with rss feeds. 二次元Twitter新闻机器人
- [lqzhgood/Rss2Weibo](https://github.com/lqzhgood/Rss2Weibo) - 将 rss 流同步到 微博. 如 twitter facebook 等
- [Unitech/pm2](https://github.com/Unitech/pm2) - Node.js Production Process Manager with a built-in Load Balancer.
- [ssbc/patchwork](https://github.com/ssbc/patchwork) - A decentralized messaging and sharing app built on top of Secure Scuttlebutt (SSB).
- [sensepost/wsproxy](https://github.com/sensepost/wsproxy) - A websocket proxy
- [imsun/gh-feed](https://github.com/imsun/gh-feed) - Generate RSS feed from GitHub Issues
- [mumuy/relationship](https://github.com/mumuy/relationship) - 中国亲戚关系计算器 - 家庭称谓/亲戚称呼/称呼计算/辈分计算/亲戚关系算法/親戚稱呼計算機_Chinese kinship system.
- [homerchen19/nba-go](https://github.com/homerchen19/nba-go) - 🏀 💻 The finest NBA CLI.
- [LandGrey/dnstricker](https://github.com/LandGrey/dnstricker) - A simple dns resolver of dns-record and web-record log server for pentesting
- [machengwei1024/Hexo-Theme-Life](https://github.com/machengwei1024/Hexo-Theme-Life) - Hexo Theme
- [Rotonde/beaker](https://github.com/Rotonde/beaker) - Rotonde client with user account combined(deprecated)
- [reruin/ServerStockCheck](https://github.com/reruin/ServerStockCheck) - 库存检查工具
- [dannyti/seedbox-from-scratch](https://github.com/dannyti/seedbox-from-scratch) - Creating a seedbox on a Linux server
- [mengskysama/rain](https://github.com/mengskysama/rain) - http://rain.mengsky.net
- [justjavac/Flarum](https://github.com/justjavac/Flarum) - Flarum - 优雅自由的 PHP 轻社区
- [mikeal/webtorrent-element](https://github.com/mikeal/webtorrent-element) - WebTorrent HTML element.
- [Notos/seedbox-from-scratch](https://github.com/Notos/seedbox-from-scratch) - Creating a seedbox on a Linux server
- [QuickBox/QB](https://github.com/QuickBox/QB) - QuickBox is much more than a ‘seedbox installer script’, it is a simplistic approach to achieving easy seedbox and services management from a beautifully designed dashboard. Allowing users the ability
- [xavier84/RatXaBox](https://github.com/xavier84/RatXaBox) - Auto installation de ruTorrent avec rTorrent. Version "Seedbox-Manager Workflow"
- [Meshiest/mrseedbox](https://github.com/Meshiest/mrseedbox) - [unmaintained] A Containerized Seedbox with Embedded Media Player
- [Kerwood/Rtorrent-LXC](https://github.com/Kerwood/Rtorrent-LXC) - A Docker container with Rtorrent + Rutorrent.
- [xcatliu/cqc](https://github.com/xcatliu/cqc) - Code Quality Checker - Check your code quality by running one command.
- [marknote/TeleShellBot](https://github.com/marknote/TeleShellBot) - A simple Telegram Bot to run shell commands remotely
- [ElaWorkshop/awesome-cn-cafe](https://github.com/ElaWorkshop/awesome-cn-cafe) - A curated list of awesome coffee places for work in China.
- [ksco/reblog](https://github.com/ksco/reblog) - A blog system using GitHub Issues, powered by React + Redux.
- [malaohu/Dply-Autobuild-Server](https://github.com/malaohu/Dply-Autobuild-Server) - Dply.co自动创建服务器
- [denysdovhan/wtfjs](https://github.com/denysdovhan/wtfjs) - 🤪 A list of funny and tricky JavaScript examples
- [ohroy/blog](https://github.com/ohroy/blog) - A super blog lite -- just one page. use vue with github api !
- [ipfs/js-ipfs](https://github.com/ipfs/js-ipfs) - IPFS implementation in JavaScript
- [OhYee/hexo-theme-indigo](https://github.com/OhYee/hexo-theme-indigo) - 这个只是我修改的别人的,大家fork去原项目啊
- [fei-ke/WeiboImageReverse](https://github.com/fei-ke/WeiboImageReverse) - Chrome 插件,反查微博图片po主
- [knownsec/KCon](https://github.com/knownsec/KCon) - KCon is a famous Hacker Con powered by Knownsec Team.
- [otale/tale](https://github.com/otale/tale) - 🦄 Best beautiful java blog, worth a try
- [jasonsheh/SiteScan](https://github.com/jasonsheh/SiteScan) - A tool help get the basic information of one site
- [suoyuesmile/suo-blog](https://github.com/suoyuesmile/suo-blog) - :fox_face:技术博客文章、笔记、实战、技术探讨、资源收集等等
- [novnc/noVNC](https://github.com/novnc/noVNC) - VNC client web application
- [coderzh/hugo-rapid-theme](https://github.com/coderzh/hugo-rapid-theme) - A hugo theme as
- [CatTail/rssify](https://github.com/CatTail/rssify) - Convert anything to rss feed
- [xiongwilee/iblog](https://github.com/xiongwilee/iblog) - 基于Gracejs及github issues的全功能博客方案,参考:
- [gitalk/gitalk](https://github.com/gitalk/gitalk) - Gitalk is a modern comment component based on Github Issue and Preact.
- [aksakalli/gtop](https://github.com/aksakalli/gtop) - System monitoring dashboard for terminal
- [securing/gattacker](https://github.com/securing/gattacker) - A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks
- [ciscocsirt/GOSINT](https://github.com/ciscocsirt/GOSINT) - The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).
- [lqmeta/Cube-In-Electron](https://github.com/lqmeta/Cube-In-Electron) - :octocat:A cross-platform web music player in Electron.
- [stkevintan/Cube](https://github.com/stkevintan/Cube) - A cross-platform web music player in nw.js
- [htfy96/v2ray-config-gen](https://github.com/htfy96/v2ray-config-gen) - V2Ray Configuration generator
- [boy-hack/WebshellManager](https://github.com/boy-hack/WebshellManager) - w8ay 一句话WEB端管理工具
- [ciqulover/CMS-of-Blog](https://github.com/ciqulover/CMS-of-Blog) - deprecated
- [overcache/VRouter](https://github.com/overcache/VRouter) - 一个基于 VirtualBox 和 openwrt 构建的项目, 旨在实现 macOS / Windows 平台的透明代理.
- [wpyok500/Google-IPs](https://github.com/wpyok500/Google-IPs) - :us: Google 全球 IP 地址库
- [Or3stis/apparatus](https://github.com/Or3stis/apparatus) - A graphical security analysis tool for IoT networks
- [dryabov/twister-webkit](https://github.com/dryabov/twister-webkit) - webkit package for twister
- [cryptpad/cryptpad](https://github.com/cryptpad/cryptpad) - Collaborative office suite, end-to-end encrypted and open-source.
- [twngo/cryptpad](https://github.com/twngo/cryptpad) - Unity is Strength - Collaboration is Key - CryptPad is the zero knowledge realtime collaborative editor.
- [viatsko/awesome-vscode](https://github.com/viatsko/awesome-vscode) - 🎨 A curated list of delightful VS Code packages and resources.
- [medcl/elasticsearch-rtf](https://github.com/medcl/elasticsearch-rtf) - elasticsearch中文发行版,针对中文集成了相关插件,方便新手学习测试.
- [malaohu/squid-with-net-speeder](https://github.com/malaohu/squid-with-net-speeder) - SQUID Proxy with net speed
- [VincentChanX/shadowsocks-over-websocket](https://github.com/VincentChanX/shadowsocks-over-websocket) - 免费使用 Heroku 部署 shadowsocks
- [contiv/auth_proxy](https://github.com/contiv/auth_proxy) - A proxy + UI server for Contiv which handles authentication (local users/LDAP/AD) + authorization (RBAC)
- [squidproxy/squidproxy](https://github.com/squidproxy/squidproxy) - squid 技術部署、客戶端(原創)提供
- [AnarchyLinux/installer](https://github.com/AnarchyLinux/installer) - Anarchy Linux - A simple and intuitive Arch Linux installer. https://anarchyinstaller.org/
- [ha7ilm/openwebrx](https://github.com/ha7ilm/openwebrx) - Open source, multi-user SDR receiver software with a web interface
- [beakerbrowser/beaker](https://github.com/beakerbrowser/beaker) - An experimental peer-to-peer Web browser
- [borgbackup/borgweb](https://github.com/borgbackup/borgweb) - Web UI for Borg Backup
- [hound-search/hound](https://github.com/hound-search/hound) - Lightning fast code searching made easy
- [Tschaul/twister-react](https://github.com/Tschaul/twister-react) - proxy-based Twister client written with react-js
- [martinzhou2015/SRCMS](https://github.com/martinzhou2015/SRCMS) - SRCMS企业应急响应与缺陷管理系统
- [alibaba/anyproxy](https://github.com/alibaba/anyproxy) - A fully configurable http/https proxy in NodeJS
- [AInoob/NooBoss](https://github.com/AInoob/NooBoss) - NooBoss is an extension that handles your extensions like a boss!
- [mapbox/link-hijacker](https://github.com/mapbox/link-hijacker) - Hijack clicks on and within links, probably for client-side routing
- [veniversum/git-visualizer](https://github.com/veniversum/git-visualizer) - 👁🗨:octocat:Visualizes directory structure of GitHub repos
- [evilcos/xssor2](https://github.com/evilcos/xssor2) - XSS'OR - Hack with JavaScript.
- [TuuuNya/GenPass](https://github.com/TuuuNya/GenPass) - 用Vue.js给健忘的女票写的在线密码生成器。
- [bugbountyforum/XSS-Radar](https://github.com/bugbountyforum/XSS-Radar) -
- [sakurity/securelogin](https://github.com/sakurity/securelogin) - This version won't be maintained!
- [anttiviljami/browser-autofill-phishing](https://github.com/anttiviljami/browser-autofill-phishing) - A simple demo of phishing by abusing the browser autofill feature
- [ChromeDevTools/debugger-protocol-viewer](https://github.com/ChromeDevTools/debugger-protocol-viewer) - DevTools Protocol API docs—its domains, methods, and events
- [egoist/eme](https://github.com/egoist/eme) - Elegant Markdown Editor.
- [bryanph/GeistMap](https://github.com/bryanph/GeistMap) - An experimental personal knowledge base with a focus on connections
- [nccgroup/wssip](https://github.com/nccgroup/wssip) - Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa.
- [xbotao/hexo-admin-qiniu](https://github.com/xbotao/hexo-admin-qiniu) - 根据[email protected]进行修改,添加粘贴图片上传至七牛
- [platformio/platformio-atom-ide](https://github.com/platformio/platformio-atom-ide) - PlatformIO IDE for Atom: The next generation integrated development environment for IoT
- [n0mad01/node.bittrex.api](https://github.com/n0mad01/node.bittrex.api) - No longer maintained
- [sghaskell/Clustered-Single-Value-Map-Visualization](https://github.com/sghaskell/Clustered-Single-Value-Map-Visualization) - Splunk Custom Visualization
- [cure53/DOMPurify](https://github.com/cure53/DOMPurify) - DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:
- [IonicaBizau/git-unsaved](https://github.com/IonicaBizau/git-unsaved) - :mag_right: Scan your projects directory for dirty git repositories.
- [ryanhanwu/How-To-Ask-Questions-The-Smart-Way](https://github.com/ryanhanwu/How-To-Ask-Questions-The-Smart-Way) - 本文原文由知名 Hacker Eric S. Raymond 所撰寫,教你如何正確的提出技術問題並獲得你滿意的答案。
- [llh911001/mostly-adequate-guide-chinese](https://github.com/llh911001/mostly-adequate-guide-chinese) - 函数式编程指南中文版
- [trim21-archive/sdu-mirror-website](https://github.com/trim21-archive/sdu-mirror-website) - 山大镜像站首页
- [zcgonvh/LinkedServerPwdDumper](https://github.com/zcgonvh/LinkedServerPwdDumper) - SqlServer Linked Password Dumper.
- [jikeytang/front-end-collect](https://github.com/jikeytang/front-end-collect) - 分享自己长期关注的前端开发相关的优秀网站、博客、以及活跃开发者
- [aweary/tinytime](https://github.com/aweary/tinytime) - ⏰ A straightforward date and time formatter in <1kb
- [le4f/pcap-analyzer](https://github.com/le4f/pcap-analyzer) - online pcap forensic
- [monkeym4ster/DomainFuzz](https://github.com/monkeym4ster/DomainFuzz) - Domain name permutation engine for detecting typo squatting, phishing and corporate espionage
- [Formstone/Formstone](https://github.com/Formstone/Formstone) - Library of modular front end components.
- [MobSF/Mobile-Security-Framework-MobSF](https://github.com/MobSF/Mobile-Security-Framework-MobSF) - Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and
- [azu/codemirror-anywhere](https://github.com/azu/codemirror-anywhere) - [Greasemonkey] Use CodeMirror editor instead of textarea in anywhere
- [frida/frida-java-bridge](https://github.com/frida/frida-java-bridge) - Java runtime interop from Frida
- [imsun/gitment](https://github.com/imsun/gitment) - A comment system based on GitHub Issues.
- [xsank/xpath_tester](https://github.com/xsank/xpath_tester) - Demo
- [DIYgod/APlayer](https://github.com/DIYgod/APlayer) - :lollipop: Wow, such a beautiful HTML5 music player
- [FrankFang/wheels](https://github.com/FrankFang/wheels) - Create wheels in the dumbest way
- [iagox86/h2gb-ui](https://github.com/iagox86/h2gb-ui) -
- [firesunCN/My_CTF_Challenges](https://github.com/firesunCN/My_CTF_Challenges) - :fire::sunny:
- [leanote/leanote](https://github.com/leanote/leanote) - Not Just A Notepad! (golang + mongodb) http://leanote.org
- [lockfale/OSINT-Framework](https://github.com/lockfale/OSINT-Framework) - OSINT Framework
- [acgpiano/wooyun-node](https://github.com/acgpiano/wooyun-node) - wooyun.org
- [kevana/ui-for-docker](https://github.com/kevana/ui-for-docker) - A web interface for Docker, formerly known as DockerUI. This repo is not maintained
- [fwon/electron-anyproxy](https://github.com/fwon/electron-anyproxy) - 📢 A http/https proxy client, using to analyze and mock.
- [jaywcjlove/awesome-mac](https://github.com/jaywcjlove/awesome-mac) - Now we have become very big, Different from the original idea. Collect premium software in various categories.
- [MicrosoftEdge/magic-mirror-demo](https://github.com/MicrosoftEdge/magic-mirror-demo) - A :zap:Magic Mirror:zap: powered by a UWP Hosted Web App :rocket:
- [ziahamza/webui-aria2](https://github.com/ziahamza/webui-aria2) - The aim for this project is to create the worlds best and hottest interface to interact with aria2. Very simple to use, just download and open index.html in any web browser.
- [martinsbalodis/web-scraper-chrome-extension](https://github.com/martinsbalodis/web-scraper-chrome-extension) - Web data extraction tool implemented as chrome extension
- [derhuerst/tcp-over-websockets](https://github.com/derhuerst/tcp-over-websockets) - Tunnel TCP through WebSockets.
- [e2email-org/e2email](https://github.com/e2email-org/e2email) - E2EMail is a simple Chrome application - a Gmail client that exchanges OpenPGP mail.
- [aimer1124/JianshuSpider](https://github.com/aimer1124/JianshuSpider) - Use Node.js,HighChart,BootStrap,Mongo,Cucumber with Gulp to scrapy information from Jianshu.
- [cnwhy/lib-qqwry](https://github.com/cnwhy/lib-qqwry) - 用NodeJS解析纯真IP库(QQwry.dat) 支持IP段查询
- [keeweb/keeweb](https://github.com/keeweb/keeweb) - Free cross-platform password manager compatible with KeePass
- [wzyy2/PiBox](https://github.com/wzyy2/PiBox) - PiBox is a web control Interface written to control Embedded Board(Raspberry Pi).
- [52cik/github-hans](https://github.com/52cik/github-hans) - [废弃] {官方中文马上就来了} GitHub 汉化插件,GitHub 中文化界面。 (GitHub Translation To Chinese)
- [TingGe/calibration-box](https://github.com/TingGe/calibration-box) - 图片标定:一个 Fabric 的小插件,可用于标定图片中车辆、人、交通灯标识、区域等。
- [gavinkwoe/weapp-ide-crack](https://github.com/gavinkwoe/weapp-ide-crack) - 【应用号】IDE + 破解 + Demo
- [eteplus/vue-sui-demo](https://github.com/eteplus/vue-sui-demo) - 用vue 和 SUI-Mobile 写了一个移动端demo,用来反馈学习vue的成果(禁用了SUI自带的路由,使用vue-router, vue-resource, webpack)[a web app written by vue & sui-mobile]
- [google/WebFundamentals](https://github.com/google/WebFundamentals) - Former git repo for WebFundamentals on developers.google.com
- [FredWe/How-To-Ask-Questions-The-Smart-Way](https://github.com/FredWe/How-To-Ask-Questions-The-Smart-Way) - Any update requests plz redirect to original --->
- [jakubfiala/atrament](https://github.com/jakubfiala/atrament) - A small JS library for beautiful drawing and handwriting on the HTML Canvas.
- [vuejs/vue-hackernews-2.0](https://github.com/vuejs/vue-hackernews-2.0) - HackerNews clone built with Vue 2.0, vue-router & vuex, with server-side rendering
- [shimohq/chinese-programmer-wrong-pronunciation](https://github.com/shimohq/chinese-programmer-wrong-pronunciation) - 中国程序员容易发音错误的单词
- [aosabook/500lines](https://github.com/aosabook/500lines) - 500 Lines or Less
- [Lmnoppy/Scrippy](https://github.com/Lmnoppy/Scrippy) - Scrippy is a browser extension that holds sql statements (think clip board) to aid devlopers in the testing of websites for basic code injections.
- [mandatoryprogrammer/xsshunter](https://github.com/mandatoryprogrammer/xsshunter) - The XSS Hunter service - a portable version of XSSHunter.com
- [dragthor/xss-scanner](https://github.com/dragthor/xss-scanner) - Cross-Site Scripting (XSS) scanner. This tool helps to find possible XSS vulnerabilities. Cross platform - macOS, Linux, and Windows.
- [lixiangwei/xsser](https://github.com/lixiangwei/xsser) - xss监控(xss monitor)
- [jiang890910bo/back_manager](https://github.com/jiang890910bo/back_manager) - Paladin是啥? 它是一个以JFinal为底层的java基础后台框架。 结合了以下第三方组件: Beetl、Druid、Shiro、Ehcache(JFinal自带有工具类)。 界面使用的拼图的后台模板,自己做了些优化和更改。 最初目的:为了学习jfinal,通过一点点的摸索,把它建立起来了。 最终理想:形成一个工作中比较通用的基础后台框架。 适用人群 刚入门JFinal的同学,
- [jichengyue/SailsAdmin](https://github.com/jichengyue/SailsAdmin) - 利用nodejs sails框架搭建的权限管理系统和数据可视化界面的B/S
- [ycosine/DataVistual](https://github.com/ycosine/DataVistual) - 数字校园项目-大数据可视化平台
- [doumengyu/The-FlowingData-Guide](https://github.com/doumengyu/The-FlowingData-Guide) - 自己整理的《鲜活的数据——数据可视化指南》一书的笔记,还有自己根据书中的讲解,整理出的各章代码。
- [RodgerLai/nodejs-nedb-excel](https://github.com/RodgerLai/nodejs-nedb-excel) - 基于nodejs+webpack,以nosql轻量级嵌入式数据库nedb作为存储,页面渲染采用react+redux,样式框架为ant design,实现了excel表格上传导出以及可视化
- [jinjianhua727/log-date-view](https://github.com/jinjianhua727/log-date-view) - 日志数据可视化
- [tutuxxx/csv2dv](https://github.com/tutuxxx/csv2dv) - 将csv数据转换成可视化所需的数据格式
- [SunshowerC/lagou-spider-data-handle](https://github.com/SunshowerC/lagou-spider-data-handle) - 拉勾数据处理,echarts数据可视化
- [walkdoer/Life-Time-Tracker](https://github.com/walkdoer/Life-Time-Tracker) - 个人时间跟踪,可视化个人活动数据,管理个人生活,利用过去来指导未来,基于柳比歇夫的统计方法
- [yexiaochai/medlog](https://github.com/yexiaochai/medlog) - 数据可视化系统,持续迭代,包括前端采集+数据设计+大数据存储+可视化展示几个大块
- [TingGe/data-visualization](https://github.com/TingGe/data-visualization) - 数据可视化
- [Easonzero/Compiler](https://github.com/Easonzero/Compiler) - 哈工大编译原理实验,使用node语言,实现了基于状态转换机制的词法分析器,以及自顶而下分析的语法分析器,gui基于electron&angular制作,数据可视化使用的是d3.js。
- [khrome/ascii-art](https://github.com/khrome/ascii-art) - A Node.js library for ansi codes, figlet fonts, ascii art and other ASCII graphics## Jinja
- [Dido1960/random_c2_profile](https://github.com/Dido1960/random_c2_profile) - Cobalt Strike random C2 Profile 修改版(适配腾讯云函数,亚马逊云函数和CrossC2自定义protocol)
- [99cloud/lab-openstack](https://github.com/99cloud/lab-openstack) - lab for OpenStack
- [op7ic/BlueTeam.Lab](https://github.com/op7ic/BlueTeam.Lab) - Blue Team detection lab created with Terraform and Ansible in Azure.
- [EspressoCake/Cobalt_Strike_Ansible](https://github.com/EspressoCake/Cobalt_Strike_Ansible) - A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.
- [geerlingguy/internet-pi](https://github.com/geerlingguy/internet-pi) - Raspberry Pi config for all things Internet.
- [warhorse/ansible-role-cobaltstrike-docker](https://github.com/warhorse/ansible-role-cobaltstrike-docker) - Ansible Cobalt Strike (Docker)
- [ralphte/build_a_phish](https://github.com/ralphte/build_a_phish) - Ansible playbook to deploy a phishing engagement in the cloud.
- [ironicbadger/infra](https://github.com/ironicbadger/infra) - 99.8% less leaked credentials
- [easzlab/kubeasz](https://github.com/easzlab/kubeasz) - 使用Ansible脚本安装K8S集群,介绍组件交互原理,方便直接,不受国内网络环境影响
- [splunk/attack_range](https://github.com/splunk/attack_range) - A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
- [trailofbits/algo](https://github.com/trailofbits/algo) - Set up a personal VPN in the cloud
- [BlitzKraft/saythanks.io](https://github.com/BlitzKraft/saythanks.io) - Spreading Thankfulness in Open Source.## Jupyter Notebook
- [microsoft/autogen](https://github.com/microsoft/autogen) - A programming framework for agentic AI 🤖
- [NoDataFound/hackGPT](https://github.com/NoDataFound/hackGPT) - I leverage OpenAI and ChatGPT to do hackerish things
- [shriyanss/UtilityTools](https://github.com/shriyanss/UtilityTools) - Web hacking utility tools in one .ipynb
- [batfish/pybatfish](https://github.com/batfish/pybatfish) - Python client for Batfish: https://github.com/batfish/batfish
- [frankwxu/digital-forensics-lab](https://github.com/frankwxu/digital-forensics-lab) - Free hands-on digital forensics labs for students and faculty
- [naity/DeepUFC2](https://github.com/naity/DeepUFC2) - Now with data scraping and implementation in PyTorch
- [gyoisamurai/Adversarial-Threat-Detector](https://github.com/gyoisamurai/Adversarial-Threat-Detector) -
- [jgamblin/cveprophet](https://github.com/jgamblin/cveprophet) - CVE Prophet
- [obheda12/JupyterPen](https://github.com/obheda12/JupyterPen) - A Repository dedicated to creating modular and automated penetration testing frameworks utilizing Jupyter Notebooks
- [lyhue1991/eat_pytorch_in_20_days](https://github.com/lyhue1991/eat_pytorch_in_20_days) - Pytorch🍊🍉 is delicious, just eat it! 😋😋
- [The-Art-of-Hacking/h4cker](https://github.com/The-Art-of-Hacking/h4cker) - This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif
- [hackingguy/Bug-Hunting-Colab](https://github.com/hackingguy/Bug-Hunting-Colab) - A Colab For Bug Hunting!
- [WithSecureLabs/leonidas](https://github.com/WithSecureLabs/leonidas) - Automated Attack Simulation in the Cloud, complete with detection use cases.
- [someshkar/colabcat](https://github.com/someshkar/colabcat) - :smiley_cat: Running Hashcat on Google Colab with session backup and restore.
- [dempfi/ayu](https://github.com/dempfi/ayu) - 🎨🖌 Modern Sublime Text theme
- [OTRF/detection-hackathon-apt29](https://github.com/OTRF/detection-hackathon-apt29) - Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets
- [malrev/ABD](https://github.com/malrev/ABD) - Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories
- [czy36mengfei/tensorflow2_tutorials_chinese](https://github.com/czy36mengfei/tensorflow2_tutorials_chinese) - tensorflow2中文教程,持续更新(当前版本:tensorflow2.0),tag: tensorflow 2.0 tutorials
- [Alfred1984/interesting-python](https://github.com/Alfred1984/interesting-python) - 有趣的Python爬虫和Python数据分析小项目(Some interesting Python crawlers and data analysis projects)
- [leandromoreira/digital_video_introduction](https://github.com/leandromoreira/digital_video_introduction) - A hands-on introduction to video technology: image, video, codec (av1, vp9, h265) and more (ffmpeg encoding). Translations: 🇺🇸 🇨🇳 🇯🇵 🇮🇹 🇰🇷 🇷🇺 🇧🇷 🇪🇸
- [404notf0und/AI-for-Security-Testing-Database](https://github.com/404notf0und/AI-for-Security-Testing-Database) - 复现过的AI安全检测的项目集合
- [selfteaching/the-craft-of-selfteaching](https://github.com/selfteaching/the-craft-of-selfteaching) - One has no future if one couldn't teach themself.
- [advboxes/AdvBox](https://github.com/advboxes/AdvBox) - Advbox is a toolbox to generate adversarial examples that fool neural networks in PaddlePaddle、PyTorch、Caffe2、MxNet、Keras、TensorFlow and Advbox can benchmark the robustness of machine learning models.
- [MLEveryday/100-Days-Of-ML-Code](https://github.com/MLEveryday/100-Days-Of-ML-Code) - 100-Days-Of-ML-Code中文版
- [Cyb3rWard0g/HELK](https://github.com/Cyb3rWard0g/HELK) - The Hunting ELK
- [BrambleXu/pydata-notebook](https://github.com/BrambleXu/pydata-notebook) - 利用Python进行数据分析 第二版 (2017) 中文翻译笔记
- [SuperCowPowers/data_hacking](https://github.com/SuperCowPowers/data_hacking) - Data Hacking Project
- [yidao620c/python3-cookbook](https://github.com/yidao620c/python3-cookbook) - 《Python Cookbook》 3rd Edition Translation
- [coells/100days](https://github.com/coells/100days) - 100 days of algorithms
- [cycleuser/Duke-STA-663-CN](https://github.com/cycleuser/Duke-STA-663-CN) - A Chinese Translation of the Resources for Duke University STA 663 杜克大学计算机统计学(Python)全部内容的中文翻译
- [cs231n/cs231n.github.io](https://github.com/cs231n/cs231n.github.io) - Public facing notes page
- [justmarkham/pandas-videos](https://github.com/justmarkham/pandas-videos) - Jupyter notebook and datasets from the pandas video series
- [slofast/pandas-doc-zh](https://github.com/slofast/pandas-doc-zh) - pandas 0.19.2 文档中文版
- [jvns/pandas-cookbook](https://github.com/jvns/pandas-cookbook) - Recipes for using Python's pandas library
- [brandon-rhodes/pycon-pandas-tutorial](https://github.com/brandon-rhodes/pycon-pandas-tutorial) - PyCon 2015 Pandas tutorial materials
- [hanxlinsist/jupyter_hub](https://github.com/hanxlinsist/jupyter_hub) - 机器学习算法、可视化、数据分析的Python代码## KiCad Layout
- [xorrbit/growdammit](https://github.com/xorrbit/growdammit) - Garden thing
## Kotlin
- [Forgo7ten/VulnerableApp](https://github.com/Forgo7ten/VulnerableApp) - 移动安全_漏洞靶场_Android应用层漏洞
- [wuzuchang/PrivacyCompliancePlugin](https://github.com/wuzuchang/PrivacyCompliancePlugin) - 隐私合规代码扫描Gradle插件
- [bytedance/appshark](https://github.com/bytedance/appshark) - Appshark is a static taint analysis platform to scan vulnerabilities in an Android app.
- [ssseasonnn/PermissionX](https://github.com/ssseasonnn/PermissionX) - Android permission with coroutine
- [square/leakcanary](https://github.com/square/leakcanary) - A memory leak detection library for Android.
- [allenymt/PrivacySentry](https://github.com/allenymt/PrivacySentry) - Android隐私合规整改检测工具,注解+Asm修改字节码的检测方案
- [0xDexter0us/Scavenger](https://github.com/0xDexter0us/Scavenger) - Burp extension to create target specific and tailored wordlist from burp history.
- [0xDexter0us/Log4J-Scanner](https://github.com/0xDexter0us/Log4J-Scanner) - Burp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth.
- [silentsignal/burp-log4shell](https://github.com/silentsignal/burp-log4shell) - Log4Shell scanner for Burp Suite
- [linuxct/PhoneAccountDetector](https://github.com/linuxct/PhoneAccountDetector) - #PAAD: PhoneAccount Abuse Detector for Android 6.0+ devices
- [Leon406/ToolsFx](https://github.com/Leon406/ToolsFx) - 基于kotlin+tornadoFx的跨平台密码学工具箱.包含编解码,编码转换,加解密, 哈希,MAC,签名,大数运算,压缩,二维码功能,ctf等实用功能,支持插件
- [Guardsquare/appsweep-gradle](https://github.com/Guardsquare/appsweep-gradle) - This Gradle plugin can be used to continuously integrate app scanning using AppSweep into your Android app build process
- [androidPluto/pluto](https://github.com/androidPluto/pluto) - Android Pluto is a on-device debugging framework for Android applications, which helps intercept Network calls, capture Crashes & ANRs, manipulate application data on-the-go, and much more.
- [optiv/InsecureShop](https://github.com/optiv/InsecureShop) - An Intentionally designed Vulnerable Android Application built in Kotlin.
- [SagerNet/SagerNet](https://github.com/SagerNet/SagerNet) - The universal proxy toolchain for Android
- [pppscn/SmsForwarder](https://github.com/pppscn/SmsForwarder) - 短信转发器——监控Android手机短信、来电、APP通知,并根据指定规则转发到其他手机:钉钉群自定义机器人、钉钉企业内机器人、企业微信群机器人、飞书机器人、企业微信应用消息、邮箱、bark、webhook、Telegram机器人、Server酱、PushPlus、手机短信等。包括主动控制服务端与客户端,让你轻松远程发短信、查短信、查通话、查话簿、查电量等。(V3.0 新增)PS.这个APK主要是
- [LibChecker/LibChecker](https://github.com/LibChecker/LibChecker) - An app to view libraries used in apps in your device.
- [TeamVanced/VancedManager](https://github.com/TeamVanced/VancedManager) - Vanced Installer
- [securityfirst/Umbrella_android](https://github.com/securityfirst/Umbrella_android) - Open source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to dealing with a kidnap. Umbrella has best practice guides in ove
- [NitishGadangi/Privacy-Indicator-App](https://github.com/NitishGadangi/Privacy-Indicator-App) - 🔔 Get the famous "Recording Indicators" feature of iOS14 to android. Get notified every time a third-party app or a service uses camera or microphone.
- [Leifzhang/AndroidAutoTrack](https://github.com/Leifzhang/AndroidAutoTrack) - Android Asm 插桩 教学
- [kongxiaoan/Network-Demo](https://github.com/kongxiaoan/Network-Demo) - Retrofit + OkHttp3 + coroutines + LiveData打造一款网络请求框架
- [PaulWoitaschek/DaemonHunter](https://github.com/PaulWoitaschek/DaemonHunter) - Freeing up memory used by old Kotlin and Gradle Daemons
- [fabricezhang/lcg](https://github.com/fabricezhang/lcg) - 吾爱破解第三方安卓应用
- [androidx/androidx](https://github.com/androidx/androidx) - Development environment for Android Jetpack extension libraries under the androidx namespace. Synchronized with Android Jetpack's primary development branch on AOSP.
- [leavesCZY/DataBindingSamples](https://github.com/leavesCZY/DataBindingSamples) - 包含了 DataBinding 的大部分知识点
- [corona-warn-app/cwa-app-android](https://github.com/corona-warn-app/cwa-app-android) - Native Android app using the Apple/Google exposure notification API. The CWA development ends on May 31, 2023. You still can warn other users until April 30, 2023. More information:
- [koxudaxi/poetry-pycharm-plugin](https://github.com/koxudaxi/poetry-pycharm-plugin) - A PyCharm plugin for poetry
- [approov/shipfast-api-protection](https://github.com/approov/shipfast-api-protection) - Learn practical Mobile and API security techniques: API Key, Static and Dynamic HMAC, Dynamic Certificate Pinning, and Mobile App Attestation.
- [GoSecure/dtd-finder](https://github.com/GoSecure/dtd-finder) - List DTDs and generate XXE payloads using those local DTDs.
- [CarGuo/GSYGithubAppKotlin](https://github.com/CarGuo/GSYGithubAppKotlin) - 超完整的Android Kotlin 项目,功能丰富,适合学习和日常使用。GSYGithubApp系列的优势:目前已经拥有Flutter、Weex、ReactNative、Kotlin四个版本。 功能齐全,项目框架内技术涉及面广,完成度高。开源Github客户端App,更好的体验,更丰富的功能,旨在更好的日常管理和维护个人Github,提供更好更方便的驾车体验Σ( ̄。 ̄ノ)ノ。同款Weex版本:
- [TypeError/Bookmarks](https://github.com/TypeError/Bookmarks) - Reclaim control of your Burp Suite Repeater tabs with this powerful extension
- [B3nac/InjuredAndroid](https://github.com/B3nac/InjuredAndroid) - A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
- [WrBug/DeveloperHelper](https://github.com/WrBug/DeveloperHelper) - 📌易开发是一款帮助开发人员快速开发的工具,功能包括界面分析,页面信息,加固脱壳,支持Android9.0
- [Mygod/VPNHotspot](https://github.com/Mygod/VPNHotspot) - Share your VPN connection over hotspot or repeater! (root required)
- [k0kubun/gitstar-ranking](https://github.com/k0kubun/gitstar-ranking) - GitHub star ranking for users, organizations and repositories
- [Heapy/awesome-kotlin](https://github.com/Heapy/awesome-kotlin) - A curated list of awesome Kotlin related stuff Inspired by awesome-java.
- [alibaba/p3c](https://github.com/alibaba/p3c) - Alibaba Java Coding Guidelines pmd implements and IDE plugin
- [Kotlin-lang-CN/Kotlin-CN](https://github.com/Kotlin-lang-CN/Kotlin-CN) - 【已下线】https://discuss.kotliner.cn 的第一个实验版本,尝试使用Kotlin编写构建的 Kotlin China 论坛,etcd+自研tpc协议RPC
- [ingbyr/vdm](https://github.com/ingbyr/vdm) - GUI for command-line video downloader (youtube-dl annie)
- [bannedbook/fanqiang](https://github.com/bannedbook/fanqiang) - 翻墙-科学上网
- [enzet/symbolic-execution](https://github.com/enzet/symbolic-execution) - History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)
- [Kotlin/kotlin-koans](https://github.com/Kotlin/kotlin-koans) - Kotlin workshop## LLVM
- [llvm/llvm-project](https://github.com/llvm/llvm-project) - The LLVM Project is a collection of modular and reusable compiler and toolchain technologies.
- [Evian-Zhang/llvm-ir-tutorial](https://github.com/Evian-Zhang/llvm-ir-tutorial) - LLVM IR入门指南## Logos
- [creantan/LookinLoader](https://github.com/creantan/LookinLoader) - Lookin - iOS UI Debugging Tweak LookinLoader,Compatible with iOS 8~15
- [XLsn0w/Cydiapps](https://github.com/XLsn0w/Cydiapps) - 🔥🔥🔥微信公众号:Cydiapps🔥🔥🔥 => Cydia插件 Logos语言 开发Tweak.xm Cydia Substrate 注入dylib iOS逆向工程开发 越狱Jailbreak deb插件 - fishhook / Frida / iOSOpenDev / Cycript / MachOView / IDA / Hopper Disassembler
- [limneos/UIDaemon](https://github.com/limneos/UIDaemon) - An iOS daemon that can show UI /over/ SpringBoard## Lua
- [foggyspace/NsePocsuite-lua](https://github.com/foggyspace/NsePocsuite-lua) - 网络摄像头漏洞检测脚本.Nmap (Nse Nmap script engine)
- [riverscn/rime-forge](https://github.com/riverscn/rime-forge) - 文正坊 - 中州韵 Rime 输入法私房菜
- [vela-security/openresty-ssl-ja3](https://github.com/vela-security/openresty-ssl-ja3) - openresty ssl tls 指纹识别
- [CronUp/Vulnerabilidades](https://github.com/CronUp/Vulnerabilidades) -
- [GuayoyoCyber/CVE-2021-21972](https://github.com/GuayoyoCyber/CVE-2021-21972) - Nmap script to check vulnerability CVE-2021-21972
- [jiansiting/NMAP-NSE-SCADA](https://github.com/jiansiting/NMAP-NSE-SCADA) - NMAP Script for SCADA protocol
- [icarot/NSE_scripts](https://github.com/icarot/NSE_scripts) - NSE script to use with nmap tool.
- [n3tSh4d3/Nmap_Script_Collection](https://github.com/n3tSh4d3/Nmap_Script_Collection) - Collection of NSE Script
- [VicariusInc/vicarius-nmap](https://github.com/VicariusInc/vicarius-nmap) - nmap scripts (nse files) to identify vulnerabilities
- [hackertarget/nmap-nse-scripts](https://github.com/hackertarget/nmap-nse-scripts) - Nmap NSE scripts that have been customised or created
- [mmpx12/nse-country-scan](https://github.com/mmpx12/nse-country-scan) - nmap nse script for scan a whole country
- [scmanjarrez/CVEScannerV2](https://github.com/scmanjarrez/CVEScannerV2) - Nmap script that scans for probable vulnerabilities based on services discovered in open ports.
- [alt3kx/CVE-2022-22965](https://github.com/alt3kx/CVE-2022-22965) - Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)
- [nccgroup/nmap-nse-vulnerability-scripts](https://github.com/nccgroup/nmap-nse-vulnerability-scripts) - NMAP Vulnerability Scanning Scripts
- [rjbhide/wireshark-forensics-plugin](https://github.com/rjbhide/wireshark-forensics-plugin) -
- [automayt/ICS-pcap](https://github.com/automayt/ICS-pcap) - A collection of ICS/SCADA PCAPs
- [casbin-lua/luasql-adapter](https://github.com/casbin-lua/luasql-adapter) - LuaSQL adapter for Lua-Casbin
- [nccgroup/nlist](https://github.com/nccgroup/nlist) - An nmap script to produce target lists for use with various tools.
- [pwntester/nautilus.nvim](https://github.com/pwntester/nautilus.nvim) - A nice and cobaltish neovim theme
- [whickey-r7/grab_beacon_config](https://github.com/whickey-r7/grab_beacon_config) -
- [tomer8007/chromium-ipc-sniffer](https://github.com/tomer8007/chromium-ipc-sniffer) - A tool to capture communication between Chromium processes on Windows
- [ym2011/nmap-scripts](https://github.com/ym2011/nmap-scripts) -
- [hi-KK/ICS-Protocol-identify](https://github.com/hi-KK/ICS-Protocol-identify) - Using nmap NSE scripts for identifying common ICS protocols[使用nmap的nse脚本对常见工控协议进行识别,附对应nse脚本,并记录pcap流量]
- [scipag/vulscan](https://github.com/scipag/vulscan) - Advanced vulnerability scanning with Nmap NSE
- [hack0z/luject](https://github.com/hack0z/luject) - 🍹A static injector of dynamic library for application (android, iphoneos, macOS, windows, linux)
- [jerryting/ngxlua](https://github.com/jerryting/ngxlua) - nginx/openresty lua access limit 限流防爬
- [safebuffer/remote-adb-scan](https://github.com/safebuffer/remote-adb-scan) - pure python remote adb scanner + nmap scan module
- [xmake-io/xmake](https://github.com/xmake-io/xmake) - 🔥 A cross-platform build utility based on Lua
- [threathunterX/nebula](https://github.com/threathunterX/nebula) - "星云"业务风控系统,主工程
- [w3h/icsmaster](https://github.com/w3h/icsmaster) - ICS/SCADA Security Resource(整合工控安全相关资源)
- [Rvn0xsy/nse_vuln](https://github.com/Rvn0xsy/nse_vuln) - Nmap扫描、漏洞利用脚本
- [pentesteracademy/patoolkit](https://github.com/pentesteracademy/patoolkit) - PA Toolkit is a collection of traffic analysis plugins focused on security
- [OCSAF/freevulnsearch](https://github.com/OCSAF/freevulnsearch) - Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.
- [Tinywan/lua-nginx-redis](https://github.com/Tinywan/lua-nginx-redis) - :hibiscus: Redis、Lua、Nginx、OpenResty 笔记和资料
- [jx-sec/jxwaf](https://github.com/jx-sec/jxwaf) - JXWAF是一款开源web应用防火墙
- [loveshell/ngx_lua_waf](https://github.com/loveshell/ngx_lua_waf) - ngx_lua_waf是一个基于lua-nginx-module(openresty)的web应用防火墙
- [vulnersCom/nmap-vulners](https://github.com/vulnersCom/nmap-vulners) - NSE script based on Vulners.com API
- [TuuuNya/nmap_scripts](https://github.com/TuuuNya/nmap_scripts) - nmap默认的scripts和自己收集的一些scripts
- [alexazhou/VeryNginx](https://github.com/alexazhou/VeryNginx) - A very powerful and friendly nginx base on lua-nginx-module( openresty ) which provide WAF, Control Panel, and Dashboards.
- [rwx------/nginx_waf](https://github.com/rwx------/nginx_waf) - 使用nginx和lua构建的waf
- [christophetd/nmap-nse-info](https://github.com/christophetd/nmap-nse-info) - Browse and search through nmap's NSE scripts.
- [ChaitanyaHaritash/nmapii](https://github.com/ChaitanyaHaritash/nmapii) - Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V
- [Waffles-2/SambaCry](https://github.com/Waffles-2/SambaCry) - CVE-2017-7494 - Detection Scripts
- [cldrn/nmap-nse-scripts](https://github.com/cldrn/nmap-nse-scripts) - My collection of nmap NSE scripts
- [DNS-OARC/drool](https://github.com/DNS-OARC/drool) - DNS Replay Tool## MATLAB
- [Ryuk17/AudioProcessing-toolbox](https://github.com/Ryuk17/AudioProcessing-toolbox) - extract the time domain or frequent domain features from wav format audio
## Makefile
- [zhengmin1989/TheSevenWeapons](https://github.com/zhengmin1989/TheSevenWeapons) - 安卓动态调试七种武器
- [DrizzleRisk/drizzleDumper](https://github.com/DrizzleRisk/drizzleDumper) - drizzleDumper是一款基于内存搜索的Android脱壳工具。
- [crifan/industrial_control_security_overview](https://github.com/crifan/industrial_control_security_overview) - 工控安全概览
- [hueristiq/web-hacking-toolkit](https://github.com/hueristiq/web-hacking-toolkit) - A web hacking toolkit (docker image).
- [spdx/license-list-XML](https://github.com/spdx/license-list-XML) - This is the repository for the master files that comprise the SPDX License List
- [IntelLabs/kAFL](https://github.com/IntelLabs/kAFL) - A fuzzer for full VM kernel/driver targets
- [yuk7/ArchWSL](https://github.com/yuk7/ArchWSL) - ArchLinux based WSL Distribution. Supports multiple install.
- [seebi/dircolors-solarized](https://github.com/seebi/dircolors-solarized) - This is a repository of themes for GNU ls (configured via GNU dircolors) that support Ethan Schoonover’s Solarized color scheme.
- [icing/h2fuzz](https://github.com/icing/h2fuzz) - everyone can fuzz h2
- [veficos/reverse-engineering-for-beginners](https://github.com/veficos/reverse-engineering-for-beginners) - translate project of Drops
- [jobbole/awesome-python-cn](https://github.com/jobbole/awesome-python-cn) - Python资源大全中文版,包括:Web框架、网络爬虫、模板引擎、数据库、数据可视化、图片处理等,由「开源前哨」和「Python开发者」微信公号团队维护更新。## Markdown
- [analysis-tools-dev/dynamic-analysis](https://github.com/analysis-tools-dev/dynamic-analysis) - ⚙️ A curated list of dynamic analysis tools and linters for all programming languages, binaries, and more.
- [labuladong/fucking-algorithm](https://github.com/labuladong/fucking-algorithm) - 刷算法全靠套路,认准 labuladong 就够了!English version supported! Crack LeetCode, not only how, but also why.
- [KaiserY/rust-book-chinese](https://github.com/KaiserY/rust-book-chinese) - rust 程序设计语言 中文版## Mask
- [lcatro/Fuzzing-ImageMagick](https://github.com/lcatro/Fuzzing-ImageMagick) - OpenSource My ImageMagick Fuzzer ..
## Max
- [anoff/microllaborators](https://github.com/anoff/microllaborators) - microllaborators 👩👦👦🔮🔬👩🏫 - the revolution in teaching
## Mercury
- [DanTheMan827/ios-app-signer](https://github.com/DanTheMan827/ios-app-signer) - This is an app for OS X that can (re)sign apps and bundle them into ipa files that are ready to be installed on an iOS device.
## Mustache
- [aquasecurity/aqua-helm](https://github.com/aquasecurity/aqua-helm) - Helm Charts For Installing Aqua Security Components
- [kajov/wazuh-kubernetes-helmchart](https://github.com/kajov/wazuh-kubernetes-helmchart) - Wazuh - Wazuh Kubernetes Helm chart. This repo is not maintained by Wazuh team. This is community project.## Nginx
- [vSense/docker-rtorrent](https://github.com/vSense/docker-rtorrent) - rTorrent is a BitTorrent client and ruTorrent is a front-end for the popular Bittorrent client rtorrent.
## Nim
- [sh3d0ww01f/nim_shellloader](https://github.com/sh3d0ww01f/nim_shellloader) - nim,免杀,红队,shellcode,bypass,apt,bypass-av.
- [d4rckh/grc2](https://github.com/d4rckh/grc2) - grim reaper c2
- [chvancooten/NimPackt-v1](https://github.com/chvancooten/NimPackt-v1) - Nim-based assembly packer and shellcode loader for opsec & profit
- [icyguider/Nimcrypt2](https://github.com/icyguider/Nimcrypt2) - .NET, PE, & Raw Shellcode Packer/Loader Written in Nim
- [whydee86/PlayWithDefender](https://github.com/whydee86/PlayWithDefender) - An easy tool to disable and enable windows defender protections
- [thisago/fsmonitor](https://github.com/thisago/fsmonitor) - Files changes monitor and logger
- [MythicAgents/Nimplant](https://github.com/MythicAgents/Nimplant) - A cross-platform implant written in Nim
- [HuskyHacks/ShadowSteal](https://github.com/HuskyHacks/ShadowSteal) - Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
- [ThomasTJdev/nim_awsS3](https://github.com/ThomasTJdev/nim_awsS3) - Amazon Simple Storage Service (AWS S3) basic API support
- [d4rckh/vaf](https://github.com/d4rckh/vaf) - Vaf is a cross-platform very advanced and fast web fuzzer written in nim
- [byt3bl33d3r/OffensiveNim](https://github.com/byt3bl33d3r/OffensiveNim) - My experiments in weaponizing Nim (https://nim-lang.org/)
- [inspiringz/nim-dnp](https://github.com/inspiringz/nim-dnp) - Nim 版 domainNamePredictor:一个简单的现代化公司域名使用规律预测及生成工具
- [khchen/wAuto](https://github.com/khchen/wAuto) - Windows automation module
- [cheatfate/nimcrypto](https://github.com/cheatfate/nimcrypto) - Nim cryptographic library
- [status-im/nim-json-rpc](https://github.com/status-im/nim-json-rpc) - Nim library for implementing JSON-RPC clients and servers
- [ringabout/awesome-nim](https://github.com/ringabout/awesome-nim) - A curated list of awesome Nim frameworks, libraries, software and resources.
- [khchen/winim](https://github.com/khchen/winim) - Windows API, COM, and CLR Module for Nim
- [xmonader/nimassets](https://github.com/xmonader/nimassets) - bundle your assets into single nim file inspired by go-bindata
- [ba0f3/subhook.nim](https://github.com/ba0f3/subhook.nim) - subhook wrapper for Nim https://github.com/Zeex/subhook
- [elddy/Nim-SMBExec](https://github.com/elddy/Nim-SMBExec) - SMBExec implementation in Nim - SMBv2 using NTLM Authentication with Pass-The-Hash technique
- [elddy/NimScan](https://github.com/elddy/NimScan) - 🚀 Fast Port Scanner 🚀
- [arnetheduck/nlvm](https://github.com/arnetheduck/nlvm) - LLVM-based compiler for the Nim language
- [treeform/quickjwt](https://github.com/treeform/quickjwt) - JWT implementation for nim-lang## Nix
- [nix-community/home-manager](https://github.com/nix-community/home-manager) - Manage a user environment using Nix [maintainer=@rycee]
## Nunjucks
- [typlog/china-indie-podcasts](https://github.com/typlog/china-indie-podcasts) - 发现与推荐高质量的中文独立播客
## OCaml
- [semgrep/semgrep](https://github.com/semgrep/semgrep) - Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.
## Objective-C
- [sunnyyoung/WeChatTweak-macOS](https://github.com/sunnyyoung/WeChatTweak-macOS) - A dynamic library tweak for WeChat macOS - 首款微信 macOS 客户端撤回拦截与多开 🔨
- [NyaMisty/fouldecrypt](https://github.com/NyaMisty/fouldecrypt) - A lightweight and simpling iOS binary decryptor
- [pilotmoon/Scroll-Reverser](https://github.com/pilotmoon/Scroll-Reverser) - Per-device scrolling prefs on macOS.
- [pallotron/yubiswitch](https://github.com/pallotron/yubiswitch) - OSX status bar application to enable/disable Yubikey Nano
- [asaurusrex/Forblaze](https://github.com/asaurusrex/Forblaze) - Forblaze - A Python Mac Steganography Payload Generator
- [ios-control/ios-deploy](https://github.com/ios-control/ios-deploy) - Install and debug iPhone apps from the command line, without using Xcode
- [HexFiend/HexFiend](https://github.com/HexFiend/HexFiend) - A fast and clever hex editor for macOS
- [paradiseduo/IPAPatch](https://github.com/paradiseduo/IPAPatch) - Patch iOS Apps, The Easy Way, Without Jailbreak.
- [Naituw/IPAPatch](https://github.com/Naituw/IPAPatch) - Patch iOS Apps, The Easy Way, Without Jailbreak.
- [QMUI/LookinServer](https://github.com/QMUI/LookinServer) - Free macOS app for iOS view debugging.
- [ichitaso/KernBypass-Unofficial](https://github.com/ichitaso/KernBypass-Unofficial) - chroot based kernel level jailbreak detection bypass.
- [evilpenguin/NetworkSniffer](https://github.com/evilpenguin/NetworkSniffer) - Log iOS network traffic without a proxy
- [objective-see/BlockBlock](https://github.com/objective-see/BlockBlock) - BlockBlock provides continual protection by monitoring persistence locations.
- [orklann/PEP](https://github.com/orklann/PEP) - PEP - Free & Open Source PDF Editor for Mac
- [riusksk/SecConArchive](https://github.com/riusksk/SecConArchive) - Security Conference Archive
- [JourneyYoung/iOSMixProject](https://github.com/JourneyYoung/iOSMixProject) - To mix your project if you want it won't be like others
- [chenxiancai/STCObfuscator](https://github.com/chenxiancai/STCObfuscator) - iOS全局自动化 代码混淆 工具!支持cocoapod组件代码一并 混淆,完美避开hardcode方法、静态库方法和系统库方法!
- [xorrior/macOSTools](https://github.com/xorrior/macOSTools) - macOS Offensive Tools
- [sweetloser/DecryptApp](https://github.com/sweetloser/DecryptApp) -
- [agatti/hopper-plugins](https://github.com/agatti/hopper-plugins) - Plugins for the Hopper disassembler
- [akusio/KernBypass-Public](https://github.com/akusio/KernBypass-Public) - chroot based kernel level jailbreak detection bypass.
- [tihmstar/ios-app-signer](https://github.com/tihmstar/ios-app-signer) - This is an app for OS X that can (re)sign apps and bundle them into ipa files that are ready to be installed on an iOS device.
- [ptoomey3/Keychain-Dumper](https://github.com/ptoomey3/Keychain-Dumper) - A tool to check which keychain items are available to an attacker once an iOS device has been jailbroken
- [neil-wu/FridaNSLogger](https://github.com/neil-wu/FridaNSLogger) - Logging tool that send Frida log to Mac NSLoggerViewer
- [iodefog/VipVideo](https://github.com/iodefog/VipVideo) - 各大网站vip视频、世界杯直播(CCTV5)免费观看 - Mac版。付费电影,VIP会员剧等,去广告播放。自用视频或者电影URL,音乐破解URL,CCTV等电视播放URL,爱奇艺、腾讯视频、芒果视频、bilibili、美剧、韩剧、日剧、音乐破解
- [SmileZXLee/ZXHookDetection](https://github.com/SmileZXLee/ZXHookDetection) - 【iOS应用安全、安全攻防】hook及越狱的基本防护与检测(动态库注入检测、hook检测与防护、越狱检测、签名校验、IDA反编译分析加密协议Demo);【数据传输安全】浅谈http、https与数据加密
- [ealeksandrov/ProvisionQL](https://github.com/ealeksandrov/ProvisionQL) - Quick Look plugin for mobile apps and provisioning profiles
- [MustangYM/WeChatExtension-ForMac](https://github.com/MustangYM/WeChatExtension-ForMac) - Mac微信功能拓展/微信插件/微信小助手(A plugin for Mac WeChat)
- [TalkingData/YourView](https://github.com/TalkingData/YourView) - YourView is a desktop App in MacOS based on Apple SceneKit. You may use it to view iOS App's view hierarchy 3D.
- [SatanWoo/JSDebugger](https://github.com/SatanWoo/JSDebugger) - JavaScript-Based Debugger For Inspecting Running State Of Your Application
- [AloneMonkey/MonkeyDev](https://github.com/AloneMonkey/MonkeyDev) - CaptainHook Tweak、Logos Tweak and Command-line Tool、Patch iOS Apps, Without Jailbreak.
- [rockqj/networkfixer](https://github.com/rockqj/networkfixer) - Enable network access for Chinese iPhone with checkra1n
- [axclogo/AxcDrawPath_Tool](https://github.com/axclogo/AxcDrawPath_Tool) - AxcAEKit系列拆分出来的一个贝塞尔曲线绘制工具,以科技风为主,动画为辅
- [jiangboLee/ChangeLocation](https://github.com/jiangboLee/ChangeLocation) - 改变自己的定位地址(免越狱打卡)
- [ChenYilong/iOSBlog](https://github.com/ChenYilong/iOSBlog) - 微博@iOS程序犭袁 的blog
- [lucasjacks0n/EggShell](https://github.com/lucasjacks0n/EggShell) - iOS/macOS/Linux Remote Administration Tool
- [wzqcongcong/macSubstrate](https://github.com/wzqcongcong/macSubstrate) - Substrate for macOS
- [MxABC/DevDataTool](https://github.com/MxABC/DevDataTool) - 编码转换、摘要(hash)、加解密(MD5、SHA1、SHA256、SHA3、SM3、HMAC、DES、3DES、AES、SM4)
- [macmade/KeychainCracker](https://github.com/macmade/KeychainCracker) - macOS keychain cracking tool
- [sequelpro/sequelpro](https://github.com/sequelpro/sequelpro) - MySQL/MariaDB database management for macOS## Objective-C++
- [evilpenguin/MachoDecrypt](https://github.com/evilpenguin/MachoDecrypt) - Decrypt iOS binaries at runtime
- [evilpenguin/SSLBypass](https://github.com/evilpenguin/SSLBypass) - iOS SSL Pinning Bypass (iOS 8 - 14)
- [hexploitable/MEMSCAN](https://github.com/hexploitable/MEMSCAN) - A memory scanning tool which uses mach_vm* to either dump memory or look for a specific sequence of bytes.
- [google/santa](https://github.com/google/santa) - A binary authorization and monitoring system for macOS
- [fjh658/IDA7.0_SP](https://github.com/fjh658/IDA7.0_SP) - IDA7.0_SP is ida's bugfix
- [BishopFox/bfinject](https://github.com/BishopFox/bfinject) - Dylib injection for iOS 11.0 - 11.1.2 with LiberiOS and Electra jailbreaks
- [dongyuwei/hallelujahIM](https://github.com/dongyuwei/hallelujahIM) - hallelujahIM(哈利路亚 英文输入法) is an intelligent English input method with auto-suggestions and spell check features.## Open Policy Agent
- [Checkmarx/kics](https://github.com/Checkmarx/kics) - Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.
- [madhuakula/docker-security-checker](https://github.com/madhuakula/docker-security-checker) - Dockerfile Security Checker using OPA Rego policies with Conftest
- [raspbernetes/k8s-security-policies](https://github.com/raspbernetes/k8s-security-policies) - This repository offers a comprehensive library of security policies designed to enhance the security of Kubernetes cluster configurations. The policies are developed in accordance with the CIS Kuberne
- [gbrindisi/dockerfile-security](https://github.com/gbrindisi/dockerfile-security) - A collection of OPA rules to statically analyze Dockerfiles to improve security
- [sysdiglabs/opa-image-scanner](https://github.com/sysdiglabs/opa-image-scanner) - Kubernetes Admission Controller for Image Scanning using OPA## Others
- [Lotus6/ysoserial](https://github.com/Lotus6/ysoserial) - ysoserial 图形化,探测 Gadget,探测 Class,命令执行,注入哥斯拉冰蝎内存马,加载字节码等
- [Lya0/Fofa_view_fingerprint](https://github.com/Lya0/Fofa_view_fingerprint) - 魔改的fofa浏览器插件,能够进行自动调用指纹接口进行指纹识别。
- [qiuluo-oss/Tiger](https://github.com/qiuluo-oss/Tiger) - Tiger是一款在攻防演练中对目标资产重点系统指纹识别、精准漏扫的工具。是一款打点神器。
- [m-sec-org/EZ](https://github.com/m-sec-org/EZ) - EZ是一款集信息收集、端口扫描、服务暴破、URL爬虫、指纹识别、被动扫描为一体的跨平台漏洞扫描器。
- [AgentVirus/GoT](https://github.com/AgentVirus/GoT) - 漏洞poc指纹整合管理,漏洞扫描工具
- [CllmsyK/YYBaby-Spring_Scan](https://github.com/CllmsyK/YYBaby-Spring_Scan) - 一款针对Spring框架的漏洞扫描及漏洞利用图形化工具
- [Just-Hack-For-Fun/Linux-INCIDENT-RESPONSE-COOKBOOK](https://github.com/Just-Hack-For-Fun/Linux-INCIDENT-RESPONSE-COOKBOOK) - Linux 应急响应手册
- [lintstar/CS-AutoPostChain](https://github.com/lintstar/CS-AutoPostChain) - 基于 OPSEC 的 CobaltStrike 后渗透自动化链
- [g1oves2ali/anti-anti-virus](https://github.com/g1oves2ali/anti-anti-virus) - 免杀知识库 | 开源免杀木马效果测试 360 火绒 卡巴斯基 Microsoft Defender | 免杀工具汇总
- [veo/vshell](https://github.com/veo/vshell) - vshell 是一款安全对抗模拟、红队工具。提供隧道代理和隐蔽通道,模拟长期潜伏攻击者的策略和技术
- [twowb/zndb](https://github.com/twowb/zndb) - 此工具用于快速准确的等保核查、端口扫描、组件识别、子域名扫描、目录扫描等功能
- [DeEpinGh0st/MDUT-Extend-Release](https://github.com/DeEpinGh0st/MDUT-Extend-Release) - MDUT-Extend(扩展版本)
- [Ylarod/Florida](https://github.com/Ylarod/Florida) - 基础反检测 frida-server / Basic anti-detection frida-server
- [justjavac/awesome-wechat-weapp](https://github.com/justjavac/awesome-wechat-weapp) - 微信小程序开发资源汇总 :100:
- [0xgkd/awvs](https://github.com/0xgkd/awvs) - A version of awvs docker based on Ubuntu 18.04
- [Just-Hack-For-Fun/Windows-INCIDENT-RESPONSE-COOKBOOK](https://github.com/Just-Hack-For-Fun/Windows-INCIDENT-RESPONSE-COOKBOOK) - Windows 应急响应手册
- [mifine666/miscan](https://github.com/mifine666/miscan) - 一款简单好用的漏洞管理工具,支持本地和协作两种模式。
- [kkbo8005/mitan](https://github.com/kkbo8005/mitan) - 密探渗透测试工具包含资产信息收集,子域名爆破,搜索语法,资产测绘(FOFA,Hunter,quake, ZoomEye),指纹识别,敏感信息采集,文件扫描、密码字典等功能
- [R4gd0ll/I-Wanna-Get-All](https://github.com/R4gd0ll/I-Wanna-Get-All) - OA漏洞利用工具
- [zangcc/Java_Risky_Functions](https://github.com/zangcc/Java_Risky_Functions) - Java 代码审计-存在风险的函数汇总。方便我们日常代码审计过程中快速定位漏洞点,配合静态代码分析工具做到事半功倍。Java code audit - summary of risky functions. It is convenient for us to quickly locate vulnerability points in the daily code audit process,
- [HotBoy-java/PotatoTool](https://github.com/HotBoy-java/PotatoTool) - 这款工具是一款功能强大的网络安全综合工具,旨在为安全从业者、红蓝对抗人员和网络安全爱好者提供全面的网络安全解决方案。它集成了多种实用功能,包括解密、分析、扫描、溯源等,为用户提供了便捷的操作界面和丰富的功能选择。This tool offers robust network security solutions for professionals and enthusiasts. With fea
- [CTF-Archives/OMCTF2024](https://github.com/CTF-Archives/OMCTF2024) - 2024高校网络安全管理运维赛 附件归档 OMCTF2024(operation and maintenance)
- [One-Fox-Security-Team/One-Fox-T00ls](https://github.com/One-Fox-Security-Team/One-Fox-T00ls) -
- [kong030813/Z-Godzilla_ekp](https://github.com/kong030813/Z-Godzilla_ekp) - 哥斯拉webshell管理工具二次开发规避流量检测设备
- [ProbiusOfficial/CTF-OS](https://github.com/ProbiusOfficial/CTF-OS) - 【Hello CTF】专为CTF比赛封装的虚拟机,基于工具集封装多个版本和系统,更多选择,开箱即用。比赛愉快!
- [Byxs20/PuzzleSolver](https://github.com/Byxs20/PuzzleSolver) - 一款针对CTF竞赛MISC的工具~
- [ProbiusOfficial/CTFtools-wiki](https://github.com/ProbiusOfficial/CTFtools-wiki) - 【Hello CTF】录常用 / 优秀 的CTF工具项目及其文档,一个对各阶段CTFer都很友好的工具仓库,让所有的工具都发挥作用!
- [abc123info/EquationToolsGUI](https://github.com/abc123info/EquationToolsGUI) - 本程序为美国NSA的方程式工具包图形界面版,由ABC_123于2017年开始编写,仅用来扫描和验证MS17-010、MS09-050、MS08-067漏洞,并可协助管理员修复系统漏洞。
- [xjsafe/MimikatzBypass](https://github.com/xjsafe/MimikatzBypass) - 新免杀方向 Mimikatz(猕猴桃) 免杀 360,火绒,电脑管家,WindowsDefinder,详细使用教程请参考博客:https://www.vpss.cc/381.html
- [W01fh4cker/LearnFastjsonVulnFromZero-Improvement](https://github.com/W01fh4cker/LearnFastjsonVulnFromZero-Improvement) - 【两万字原创】零基础学fastjson漏洞(提高篇),公众号:追梦信安
- [charonlight/RuoYiExploitGUI](https://github.com/charonlight/RuoYiExploitGUI) - 若依最新定时任务SQL注入可导致RCE漏洞的一键利用工具
- [wafinfo/DecryptTools](https://github.com/wafinfo/DecryptTools) - DecryptTools-综合解密
- [He1za1/FscanSnipaste](https://github.com/He1za1/FscanSnipaste) - FscanSnipaste_1.8.2_001_内网快速连接工具
- [yingshang/CybersecurityNote](https://github.com/yingshang/CybersecurityNote) - 信息安全笔记(JAVA安全、代码审计、红队攻防、渗透测试)
- [luelueking/RuoYi-v4.7.8-RCE-POC](https://github.com/luelueking/RuoYi-v4.7.8-RCE-POC) -
- [charonlight/SpringExploitGUI](https://github.com/charonlight/SpringExploitGUI) - 一款Spring综合漏洞的利用工具,工具支持多个Spring相关漏洞的检测以及利用
- [charonlight/JenkinsExploitGUI](https://github.com/charonlight/JenkinsExploitGUI) - Jenkins CLI 任意文件读取漏洞检查工具
- [SexyBeast233/SecDictionary](https://github.com/SexyBeast233/SecDictionary) - 实战沉淀字典
- [xiaogang000/XG_NTAI](https://github.com/xiaogang000/XG_NTAI) - 用于Webshell木马免杀、流量加密传输,多多支持star
- [W01fh4cker/LearnJavaMemshellFromZero](https://github.com/W01fh4cker/LearnJavaMemshellFromZero) - 【三万字原创】完全零基础从0到1掌握Java内存马,公众号:追梦信安
- [FindAllTeam/FindAll](https://github.com/FindAllTeam/FindAll) - Automated analysis of network security emergency response tools.(自动化分析网络安全应急响应工具)
- [iamHuFei/HVVault](https://github.com/iamHuFei/HVVault) - 梳理【护网高利用率POC】并集成Nuclei模板仓库,针对解决网上同一资产漏洞一键检测工具参次不齐问题。
- [pingcap/awesome-database-learning](https://github.com/pingcap/awesome-database-learning) - A list of learning materials to understand databases internals
- [abc123info/UserNameDictTools](https://github.com/abc123info/UserNameDictTools) - 用户名密码字典生成工具(将中文汉字姓名转成14种格式的拼音、IP地址处理、网络设备密码生成)
- [z-bool/Venom-Transponder](https://github.com/z-bool/Venom-Transponder) - 毒液流量转发器:自动化捡洞/打点/跳板必备神器,支持联动URL爬虫、各种被动扫描器。
- [InQuest/awesome-yara](https://github.com/InQuest/awesome-yara) - A curated list of awesome YARA rules, tools, and people.
- [wy876/POC](https://github.com/wy876/POC) - 收集整理漏洞EXP/POC,大部分漏洞来源网络,目前收集整理了1000多个poc/exp,长期更新。
- [xcanwin/CVE-2023-4357-Chrome-XXE](https://github.com/xcanwin/CVE-2023-4357-Chrome-XXE) - [漏洞复现] 全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.
- [ProbiusOfficial/SecToolKit](https://github.com/ProbiusOfficial/SecToolKit) - Cybersecurity tool repository / Wiki 收录常用 / 前沿 的CTF和渗透工具以及其 官方/使用 文档,致力于让每个工具都能发挥作用ww,不管你是萌新还是领域从业者希望你都能在这里找到适合你的工具或者获得一定的启发。
- [bcvgh/daydayExp-pocs](https://github.com/bcvgh/daydayExp-pocs) - daydayExp的漏洞POC仓库,慢慢更新...
- [WuFengXue/android-reverse](https://github.com/WuFengXue/android-reverse) - 安卓逆向工具汇总 / Awsome Android Reverse Tools
- [W01fh4cker/LearnFastjsonVulnFromZero-Basic](https://github.com/W01fh4cker/LearnFastjsonVulnFromZero-Basic) - 【两万字原创】零基础学fastjson漏洞(基础篇),公众号:追梦信安
- [AD-Attacks/AD-Attacks-by-Service](https://github.com/AD-Attacks/AD-Attacks-by-Service) - Active Directory Penetration Testing for Red Teams
- [sfsm565826960/AutoPenetrationTesting](https://github.com/sfsm565826960/AutoPenetrationTesting) - BurpSuite辅助渗透测试插件
- [TargetPackage/api-key-impact](https://github.com/TargetPackage/api-key-impact) - A list of different types of API keys and how to prove impact for bug bounty programs.
- [dark-kingA/cloudTools](https://github.com/dark-kingA/cloudTools) - 云资产管理工具 目前工具定位是云安全相关工具,目前是两个模块 云存储工具、云服务工具, 云存储工具主要是针对oss存储、查看、删除、上传、下载、预览等等 云服务工具主要是针对rds、服务器的管理,查看、执行命令、接管等等
- [itgoyo/TelegramGroup](https://github.com/itgoyo/TelegramGroup) - 2024最新悄咪咪收集的10000+个Telegram群合集,附带全网最有趣最好用的机器人BOT🤖【tg百科】
- [simplerhacking/Evilginx3-Phishlets](https://github.com/simplerhacking/Evilginx3-Phishlets) - This repository provides penetration testers and red teams with an extensive collection of dynamic phishing templates designed specifically for use with Evilginx3. May be updated periodically.
- [djytmdj/Network-security-study-notes](https://github.com/djytmdj/Network-security-study-notes) - 主要记录网络安全学习笔记,包含WEB安全、提权、APP渗透、内网渗透、横向移动、红队、工具学习等
- [yzddmr6/Java-Js-Engine-Payloads](https://github.com/yzddmr6/Java-Js-Engine-Payloads) - Java Js Engine Payloads All in one
- [TonyNPham/GodzillaPlugin-Suo5-MemProxy](https://github.com/TonyNPham/GodzillaPlugin-Suo5-MemProxy) - 一款高性能 HTTP 内存代理 | 哥斯拉插件 | readteam | 红队 | 内存马 | Suo5 | Godzilla | 正向代理
- [CuriousLearnerDev/Online_tools](https://github.com/CuriousLearnerDev/Online_tools) - 该工具是一个集成了非常多渗透测试工具,类似软件商城的工具可以进行工具下载,工具的更新,工具编写了自动化的安装脚本,不用担心工具跑不起来。
- [doimet/AuxTools](https://github.com/doimet/AuxTools) - 图形化渗透测试辅助工具
- [yichensec/yichen_Password_dictionary](https://github.com/yichensec/yichen_Password_dictionary) - 逸尘的字典 渗透测试个人专用的字典,搜索网上,及自己平常收集的一些路径,其中信息包括HVV中常见的各大厂商的弱密码,web常见漏洞测试,会遇到的邮箱,密码,服务弱口令,中间件,子域名,漏洞路径,账户密码,等等,这些内容都是基于本人在实战中收集到的,其中包含Github上公布的密码字典整合,堪称最经典的字典,用这个足以满足日常src,渗透测试,资产梳理,红蓝对抗等前期探测工作。
- [merdw/Threads-SSLPinningBypass](https://github.com/merdw/Threads-SSLPinningBypass) - Bypass Instagram new app Threads App SSL pinning
- [merdw/iOS-Instagram-SSL-Pinning-Bypass](https://github.com/merdw/iOS-Instagram-SSL-Pinning-Bypass) - Bypass Instagram SSL pinning on iOS devices. Latest version Instagram 289.1
- [UltimateSec/ultimaste-nuclei-templates](https://github.com/UltimateSec/ultimaste-nuclei-templates) - 极致攻防实验室 nuclei 检测 POC
- [outmansec/SelfIPAdressQuery](https://github.com/outmansec/SelfIPAdressQuery) - 一款基于javafx的自有IP地址查询工具(适用于重保、蓝队、攻防演习等场景)
- [wafinfo/Hikvision](https://github.com/wafinfo/Hikvision) - 海康威视综合安防平台后渗透利用工具
- [FuzzySecurity/FuzzySecurity](https://github.com/FuzzySecurity/FuzzySecurity) -
- [shockerli/mac-initialize](https://github.com/shockerli/mac-initialize) - 💻 Mac 开光指南(V2),为你的新 Mac 系统提供一份快速食用方法
- [Tsojan/TsojanScan](https://github.com/Tsojan/TsojanScan) - An integrated BurpSuite vulnerability detection plug-in.
- [tib36/PhishingBook](https://github.com/tib36/PhishingBook) - 红蓝对抗:钓鱼演练资源汇总&备忘录
- [KimJun1010/WeblogicTool](https://github.com/KimJun1010/WeblogicTool) - WeblogicTool,GUI漏洞利用工具,支持漏洞检测、命令执行、内存马注入、密码解密等(深信服深蓝实验室天威战队强力驱动)
- [Funcy33/Vluninfo_Repo](https://github.com/Funcy33/Vluninfo_Repo) - 一些漏洞信息
- [KuGmonkey/Vulnerability-mining](https://github.com/KuGmonkey/Vulnerability-mining) - 综合利用各种技术和工具进行漏洞挖掘实践
- [Ignitetechnologies/Mindmap](https://github.com/Ignitetechnologies/Mindmap) - This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
- [rissor41/SolarWinds-CVE-2021-35250](https://github.com/rissor41/SolarWinds-CVE-2021-35250) -
- [safest-place/ExploitPcapCollection](https://github.com/safest-place/ExploitPcapCollection) - collect some exploit traffic pcap
- [CnHack3r/Goby_PoC_RedTeam](https://github.com/CnHack3r/Goby_PoC_RedTeam) - 致力于收集Goby PoC,请勿用于非法操作,后果自负。
- [Awrrays/FrameVul](https://github.com/Awrrays/FrameVul) - POC集合,框架nday漏洞利用
- [smallfox233/ExpToPocsuite3](https://github.com/smallfox233/ExpToPocsuite3) - goby exp批量转换为pocsuite3 exp脚本
- [Kamigami55/awesome-chatgpt](https://github.com/Kamigami55/awesome-chatgpt) - Curated list of ChatGPT related resource, tools, prompts, apps / ChatGPT 相關優質資源、工具、應用的精選清單。
- [n0kovo/n0kovo_subdomains](https://github.com/n0kovo/n0kovo_subdomains) - An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.
- [tdragon6/Supershell](https://github.com/tdragon6/Supershell) - Supershell C2 远控平台,基于反向SSH隧道获取完全交互式Shell
- [langsasec/c2-shellcode-py](https://github.com/langsasec/c2-shellcode-py) - 免杀360,火绒的Python-shellcode加载器,可直接生成可执行文件exe
- [darktohka/clean-flash-builds](https://github.com/darktohka/clean-flash-builds) - Repository of clean Flash Player builds.
- [nu11pointer/fuzzlists](https://github.com/nu11pointer/fuzzlists) - A collection of useful lists for Penetration Testing & Bug Bounty - Content Discovery, Payloads, Variables, Sandbox Escaping, etc
- [trickest/wordlists](https://github.com/trickest/wordlists) - Real-world infosec wordlists, updated regularly
- [zzzteph/probable_subdomains](https://github.com/zzzteph/probable_subdomains) - Subdomains analysis and generation tool. Reveal the hidden!
- [xx025/carrot](https://github.com/xx025/carrot) - Free ChatGPT Site List 这儿为你准备了众多免费好用的ChatGPT镜像站点
- [H4ckBu7eer-EX/h4tools](https://github.com/H4ckBu7eer-EX/h4tools) - 一个安卓渗透工具盒子
- [Dghpi9/NacosDefaultToken](https://github.com/Dghpi9/NacosDefaultToken) - Alibaba Nacos存在默认token.secret.key,导致远程攻击者可以绕过密钥认证接管Nacos
- [taielab/awesome-hacking-lists](https://github.com/taielab/awesome-hacking-lists) - 平常看到好的渗透hacking工具和多领域效率工具的集合
- [AabyssZG/WebShell-Bypass-Guide](https://github.com/AabyssZG/WebShell-Bypass-Guide) - 从零学习Webshell免杀手册
- [cseroad/Exp-Tools](https://github.com/cseroad/Exp-Tools) - 一款集成高危漏洞exp的实用性工具
- [jatrost/awesome-detection-rules](https://github.com/jatrost/awesome-detection-rules) - This is a collection of threat detection rules / rules engines that I have come across.
- [TakSec/chatgpt-prompts-bug-bounty](https://github.com/TakSec/chatgpt-prompts-bug-bounty) - ChatGPT Prompts for Bug Bounty & Pentesting
- [topscoder/lurk-sonar](https://github.com/topscoder/lurk-sonar) - Download source code of all projects in a SonarQube instance. #bugbounty #opsec #infosec #sonarqube
- [MFMokbel/Crawlector](https://github.com/MFMokbel/Crawlector) - Crawlector is a threat hunting framework designed for scanning websites for malicious objects.
- [dark-kingA/arsenalTools](https://github.com/dark-kingA/arsenalTools) - 桌面版本-superSearchPlus是聚合型信息收集插件,支持综合查询,资产测绘查询,信息收集 js敏感信息提取 注释资源扫描 目录扫描 整合了目前常见的资产测绘平台 同时支持数据导出
- [burpheart/koko-moni](https://github.com/burpheart/koko-moni) - 一个基于网络空间搜索引擎的攻击面管理平台,可定时进行资产信息爬取,及时发现新增资产,本项目聚合了 Fofa、Hunter、Quake、Zoomeye 和 Threatbook 的数据源,并对获取到的数据进行去重与清洗
- [Safe3/tianji](https://github.com/Safe3/tianji) - 天机办公安全平台(简称:TJOSG)是有安科技推出的一款全方位办公安全防护产品,包含SWG、CASB、FIDO2、PassKey、ZTNA、SASE、DLP等功能。
- [elliot-bia/nessus](https://github.com/elliot-bia/nessus) - nessus crack for docker
- [DevHackz/Android-Pentesting](https://github.com/DevHackz/Android-Pentesting) - Android Pentesting Zone
- [darkarmorlab/video-api-check](https://github.com/darkarmorlab/video-api-check) - check hikvision/ys7 api
- [OffcierCia/On-Chain-Investigations-Tools-List](https://github.com/OffcierCia/On-Chain-Investigations-Tools-List) - Here we discuss how one can investigate crypto hacks and security incidents, and collect all the possible tools and manuals! PRs are welcome! If any tool is missing - please open PR!
- [apachecn/crack-tool-disk](https://github.com/apachecn/crack-tool-disk) - :books: 磁盘取证工具集
- [RowTeam/SharpExchangeKing](https://github.com/RowTeam/SharpExchangeKing) - Exchange 服务器安全性的辅助测试工具
- [cseroad/Webshell_Generate](https://github.com/cseroad/Webshell_Generate) - 用于生成各类免杀webshell
- [ExpLangcn/NucleiTP](https://github.com/ExpLangcn/NucleiTP) - 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC!
- [duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC](https://github.com/duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC) - CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator
- [bestspear/SharkOne](https://github.com/bestspear/SharkOne) - Cobalt Strike 二开项目
- [PlexPt/awesome-chatgpt-prompts-zh](https://github.com/PlexPt/awesome-chatgpt-prompts-zh) - ChatGPT 中文调教指南。各种场景使用指南。学习怎么让它听你的话。
- [yichensec/Yichen-GUI](https://github.com/yichensec/Yichen-GUI) - 渗透测试工具箱框架,基于FreeGui二开,该工具箱,自由度较高,样式外观等皆可优化自己处理,同时具备保存笔记的优秀功能。
- [reewardius/bbFuzzing.txt](https://github.com/reewardius/bbFuzzing.txt) -
- [A-poc/BlueTeam-Tools](https://github.com/A-poc/BlueTeam-Tools) - Tools and Techniques for Blue Team / Incident Response
- [x364e3ab6/DudeSuite](https://github.com/x364e3ab6/DudeSuite) - Dude Suite Web Security Tools
- [rebeyond/JNDInjector](https://github.com/rebeyond/JNDInjector) - 一个高度可定制化的JNDI和Java反序列化利用工具
- [immersive-translate/immersive-translate](https://github.com/immersive-translate/immersive-translate) - 沉浸式双语网页翻译扩展 , 支持输入框翻译, 鼠标悬停翻译, PDF, Epub, 字幕文件, TXT 文件翻译 - Immersive Dual Web Page Translation Extension
- [bobby-lin/study-bug-bounty](https://github.com/bobby-lin/study-bug-bounty) - Beginner Guide to Bug Hunting
- [TryGOTry/CobaltStrike_Cat_4.5](https://github.com/TryGOTry/CobaltStrike_Cat_4.5) - 猫猫Cs:基于Cobalt Strike[4.5]二开 (原dogcs二开移植)
- [NHPT/Xray_Cracked](https://github.com/NHPT/Xray_Cracked) - Update Xray1.9.11 Cracked for Windows,Linux and Mac OS.
- [FridaZhbk/UrlRedirectScan](https://github.com/FridaZhbk/UrlRedirectScan) -
- [komomon/CVE-2022-44877-RCE](https://github.com/komomon/CVE-2022-44877-RCE) - CVE-2022-44877 Centos Web Panel 7 Unauthenticated Remote Code Execution
- [numanturle/CVE-2022-44877](https://github.com/numanturle/CVE-2022-44877) -
- [A-poc/RedTeam-Tools](https://github.com/A-poc/RedTeam-Tools) - Tools and Techniques for Red Team / Penetration Testing
- [itwanger/toBeBetterJavaer](https://github.com/itwanger/toBeBetterJavaer) - 一份通俗易懂、风趣幽默的Java学习指南,内容涵盖Java基础、Java并发编程、Java虚拟机、Java企业级开发、Java面试等核心知识点。学Java,就认准二哥的Java进阶之路😄
- [saisathvik1/Linux-Privilege-Escalation-Notes](https://github.com/saisathvik1/Linux-Privilege-Escalation-Notes) - My Linux Privilege Escalation notes which is part of my OSCP Preperation
- [CyberSecurityUP/Cloud-Security-Attacks](https://github.com/CyberSecurityUP/Cloud-Security-Attacks) - Azure and AWS Attacks
- [AbelChe/macos-all](https://github.com/AbelChe/macos-all) - macos all, 关于macos的实用内容 不仅是macos...还有各种常用的渗透、命令行技巧
- [Betsy0/CMSVulSource](https://github.com/Betsy0/CMSVulSource) - CMS(内容管理系统)漏洞源码
- [aliesbelik/load-testing-toolkit](https://github.com/aliesbelik/load-testing-toolkit) - Collection of open-source tools for debugging, benchmarking, load and stress testing your code or services.
- [Bywalks/K8s-Mind-Map](https://github.com/Bywalks/K8s-Mind-Map) - K8S安全攻防思维导图 | Docker安全攻防思维导图
- [xNaughty/BugBountyTips](https://github.com/xNaughty/BugBountyTips) - BugBountyTips en Español
- [bin-maker/EasyFish](https://github.com/bin-maker/EasyFish) - 参考Gophish框架,重构的轻量级钓鱼追踪工具
- [HackingCost/CyberSpace-Security-Learning](https://github.com/HackingCost/CyberSpace-Security-Learning) - 网络安全学习wiki,包括Web安全、内网安全、云安全、免杀绕过等(持续更新)
- [k88hudson/git-flight-rules](https://github.com/k88hudson/git-flight-rules) - Flight rules for git
- [itodaro/WhiteSharkSystem_cve](https://github.com/itodaro/WhiteSharkSystem_cve) -
- [HackingCost/AD_Pentest](https://github.com/HackingCost/AD_Pentest) - 红队|域渗透重要漏洞汇总(持续更新)
- [StarCrossPortal/scalpel](https://github.com/StarCrossPortal/scalpel) - scalpel是一款命令行漏洞扫描工具,支持深度参数注入,拥有一个强大的数据解析和变异算法,可以将常见的数据格式(json, xml, form等)解析为树结构,然后根据poc中的规则,对树进行变异,包括对叶子节点和树结构 的变异。变异完成之后,将树结构还原为原始的数据格式。
- [wjl110/MacGosh-Pro](https://github.com/wjl110/MacGosh-Pro) - 将你的Mac打造成最强渗透测试装备--自用Mac渗透测试软件:App,框架,脚本,shell,编辑器等
- [sulab999/AppMessenger](https://github.com/sulab999/AppMessenger) - 一款适用于以APP病毒分析、APP漏洞挖掘、APP开发、HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、鸿蒙)辅助分析工具
- [Pik-sec/Payer](https://github.com/Pik-sec/Payer) - 子域名爆破神器
- [RuanLang0777/CreateUser](https://github.com/RuanLang0777/CreateUser) - 绕过360,火绒添加用户
- [liangyimingcom/AWS-Security-Hub-usage-tutorial-and-effect-display](https://github.com/liangyimingcom/AWS-Security-Hub-usage-tutorial-and-effect-display) - AWS Security Hub usage tutorial and effect display /AWS Security Hub安全合规中心使用教程和效果展示
- [Proviesec/directory-files-payload-lists](https://github.com/Proviesec/directory-files-payload-lists) - Directory scans
- [su18/hack-fastjson-1.2.80](https://github.com/su18/hack-fastjson-1.2.80) -
- [Mr-xn/BLACKHAT_USA2022](https://github.com/Mr-xn/BLACKHAT_USA2022) - BLACKHAT USA2022 PDF Public
- [ExpLangcn/HvvInfo](https://github.com/ExpLangcn/HvvInfo) - 一款在红蓝对抗中快速对目标单位进行资产探测和基本扫描的工具
- [Vu1nT0tal/IDA-Pro-tips](https://github.com/Vu1nT0tal/IDA-Pro-tips) - IDA Pro每周小技巧
- [Kento-Sec/AsamF](https://github.com/Kento-Sec/AsamF) - AsamF是集成Fofa、Quake、Hunter、Shodan、Zoomeye、Chinaz、0.zone及爱企查的一站式企业信息资产收集、网络资产测绘工具。
- [Junehck/SQL-injection-bypass](https://github.com/Junehck/SQL-injection-bypass) - 记录实战中的各种sql注入绕过姿势
- [mitre/cti](https://github.com/mitre/cti) - Cyber Threat Intelligence Repository expressed in STIX 2.0
- [subhajit0x/Node-JS-Security-Tips](https://github.com/subhajit0x/Node-JS-Security-Tips) - All the resources for code review ;)
- [EnnioX/IPWarden](https://github.com/EnnioX/IPWarden) - IPWarden(守望者)是一个IP资产风险巡查工具。持续发现系统、Web两个维度的资产和安全风险。所有扫描结果可通过API访问json数据,方便二次开发或数据整理。适合甲方安全人员用于监控管理公网/内网IP资产风险暴露面。
- [CrackerCat/strongR-frida-android](https://github.com/CrackerCat/strongR-frida-android) - An anti detection version frida-server for android.
- [h33tlit/secret-regex-list](https://github.com/h33tlit/secret-regex-list) - List of regex for scraping secret API keys and juicy information.
- [zeroc00I/DNS-exfiltration-using-blind-xss-](https://github.com/zeroc00I/DNS-exfiltration-using-blind-xss-) - These payloads will help u in your blind xss dumping cookies through dns exfiltration using subdomain dns queries
- [trickest/resolvers](https://github.com/trickest/resolvers) - The most exhaustive list of reliable DNS resolvers.
- [eryajf/Thanks-Mirror](https://github.com/eryajf/Thanks-Mirror) - 整理记录各个包管理器,系统镜像,以及常用软件的好用镜像,Thanks Mirror。 走过路过,如觉不错,麻烦点个赞👆🌟
- [Ormicron/chatViewTool](https://github.com/Ormicron/chatViewTool) - 基于Java实现的图形化微信聊天记录解密查看器
- [saeidshirazi/Awesome-Smart-Contract-Security](https://github.com/saeidshirazi/Awesome-Smart-Contract-Security) - A curated list of Smart Contract Security materials and resources For Researchers
- [Firebasky/ScanShiro](https://github.com/Firebasky/ScanShiro) - 一个批量扫描shiro漏洞的工具,支持AES/CMG
- [TryGOTry/DogCs4.4](https://github.com/TryGOTry/DogCs4.4) - cs4.4修改去特征狗狗版(美化ui,去除特征,自带bypass核晶截图等..)
- [PeiQi0/PeiQi-WIKI-Book](https://github.com/PeiQi0/PeiQi-WIKI-Book) - 面向网络安全从业者的知识文库🍃
- [httpwaf/httpwaf2.0](https://github.com/httpwaf/httpwaf2.0) - httpwaf是一款永久免费的web应用防火墙,是最好用的waf。
- [HackingLZ/ExtractedDefender](https://github.com/HackingLZ/ExtractedDefender) -
- [samogod/bugradar](https://github.com/samogod/bugradar) - Advanced external automation on bug bounty programs by running the best set of tools to perform scanning and finding out vulnerabilities.
- [d3ckx1/OLa](https://github.com/d3ckx1/OLa) -
- [coffeehb/nginx_swagger](https://github.com/coffeehb/nginx_swagger) - 这个项目主要用于辅助测试Swagger的XSS漏洞
- [ExpLangcn/InfoSearchAll](https://github.com/ExpLangcn/InfoSearchAll) - 为了方便安全从业人员在使用网络测绘平台进行信息搜集时的效率,本程序集合了多个网络测绘平台,可以快速在多个网络测绘平台搜索信息并且合并展示及导出。
- [Y000o/Confluence-CVE-2022-26134](https://github.com/Y000o/Confluence-CVE-2022-26134) -
- [achuna33/Memoryshell-JavaALL](https://github.com/achuna33/Memoryshell-JavaALL) - 收集内存马打入方式
- [sssqp/bypass-script](https://github.com/sssqp/bypass-script) - cobaltstrike免杀插件
- [HackJava/JNDI](https://github.com/HackJava/JNDI) - 《JNDI-深入理解Java万恶之源》
- [birdhan/SecurityTools](https://github.com/birdhan/SecurityTools) - 渗透测试工具包 | 开源安全测试工具 | 网络安全工具
- [nomi-sec/CVE-Easy-List](https://github.com/nomi-sec/CVE-Easy-List) - 👀CVE Simple List
- [Liqunkit/webfinder-next](https://github.com/Liqunkit/webfinder-next) - 对小米范webfinder http://www.cnblogs.com/SEC-fsq/p/5610981.html 进行了小修改
- [DavidProbinsky/RedTeam-Physical-Tools](https://github.com/DavidProbinsky/RedTeam-Physical-Tools) - Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry.
- [Getshell/PassiveScan](https://github.com/Getshell/PassiveScan) - PassiveScan-被动扫描之巅
- [sp4zcmd/WeblogicExploit-GUI](https://github.com/sp4zcmd/WeblogicExploit-GUI) - Weblogic漏洞利用图形化工具 支持注入内存马、一键上传webshell、命令执行
- [komomon/POC_Collect](https://github.com/komomon/POC_Collect) - (持续更新)本项目为存储团队Bot小K每日监测到的最新POC,EXP,以及自己平时总结的POC,为了方便渗透测试过程中,漏洞查询,脱网环境的渗透测试。
- [wangfly-me/Apache_Penetration_Tool](https://github.com/wangfly-me/Apache_Penetration_Tool) - CVE-2021-41773&CVE-2021-42013图形化漏洞检测利用工具
- [yuyan-sec/Doraemon](https://github.com/yuyan-sec/Doraemon) - 渗透辅助 BurpSuite 小插件
- [guchangan1/All-Defense-Tool](https://github.com/guchangan1/All-Defense-Tool) - 本项目集成了全网优秀的攻防武器工具项目,包含自动化利用,子域名、目录扫描、端口扫描等信息收集工具,各大中间件、cms、OA漏洞利用工具,爆破工具、内网横向、免杀、社工钓鱼以及应急响应、甲方安全资料等其他安全攻防资料。
- [ExpLangcn/FuYao-Go](https://github.com/ExpLangcn/FuYao-Go) - 自动化进行目标资产探测和安全漏洞扫描|适用于赏金活动、SRC活动、大规模使用、大范围使用|通过使用被动在线资源来发现网站的有效子域|通过强大且灵活的模板,模拟各种安全漏洞检查!Automate target asset detection and security vulnerability scanning | Suitable for bounty campaigns, SRC campaig
- [q601333824/xray_crack](https://github.com/q601333824/xray_crack) - xray高级版本破解通用启动器
- [cipher387/Dorks-collections-list](https://github.com/cipher387/Dorks-collections-list) - List of Github repositories and articles with list of dorks for different search engines
- [litangbo/Android_Study](https://github.com/litangbo/Android_Study) - 《第一行代码 Android 第2版》学习笔记
- [nascentxyz/simple-security-toolkit](https://github.com/nascentxyz/simple-security-toolkit) - A collection of practical security-focused guides and checklists for smart contract development
- [mdecrevoisier/Microsoft-eventlog-mindmap](https://github.com/mdecrevoisier/Microsoft-eventlog-mindmap) - Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...
- [hktalent/spring-spel-0day-poc](https://github.com/hktalent/spring-spel-0day-poc) - spring-cloud / spring-cloud-function,spring.cloud.function.routing-expression,RCE,0day,0-day,POC,EXP,CVE-2022-22963
- [j5s/GetDomainAdmin](https://github.com/j5s/GetDomainAdmin) - 获取域控权限方法枚举
- [facert/awesome-spider](https://github.com/facert/awesome-spider) - 爬虫集合
- [Wechat-ggGitHub/Awesome-GitHub-Repo](https://github.com/Wechat-ggGitHub/Awesome-GitHub-Repo) - 收集整理 GitHub 上高质量、有趣的开源项目。
- [lucky-ecat/wechat_info_collect](https://github.com/lucky-ecat/wechat_info_collect) - 调查取证 | 针对微信客户端的信息收集工具, 自动化提取本地PC所有的微信信息, 包括微信号, 手机号等
- [sottlmarek/DevSecOps](https://github.com/sottlmarek/DevSecOps) - Ultimate DevSecOps library
- [alt3kx/CVE-2022-1388_PoC](https://github.com/alt3kx/CVE-2022-1388_PoC) - F5 BIG-IP RCE exploitation (CVE-2022-1388)
- [shifa123/shodandorks](https://github.com/shifa123/shodandorks) -
- [ThestaRY7/supplier](https://github.com/ThestaRY7/supplier) - 主流供应商的一些攻击性漏洞汇总
- [Cobalt-Strike/beacon_health_check](https://github.com/Cobalt-Strike/beacon_health_check) - This aggressor script uses a beacon's note field to indicate the health status of a beacon.
- [JDArmy/DCSec](https://github.com/JDArmy/DCSec) - 域控安全one for all
- [Ryze-T/Sylas](https://github.com/Ryze-T/Sylas) - 数据库综合利用工具
- [daffainfo/match-replace-burp](https://github.com/daffainfo/match-replace-burp) - Useful "Match and Replace" burpsuite rules
- [Bo0oM/fuzz.txt](https://github.com/Bo0oM/fuzz.txt) - Potentially dangerous files
- [luckyfuture0177/VULOnceMore](https://github.com/luckyfuture0177/VULOnceMore) - 记录个人的漏洞复现过程
- [Whitebird0/Vulnerability_Analysis](https://github.com/Whitebird0/Vulnerability_Analysis) - 恶意代码与漏洞
- [reidmu/sec-note](https://github.com/reidmu/sec-note) - 记录安全方面的笔记/工具/漏洞合集
- [Threekiii/Awesome-POC](https://github.com/Threekiii/Awesome-POC) - 一个漏洞POC知识库 目前数量 1000+
- [Threekiii/Vulhub-Reproduce](https://github.com/Threekiii/Vulhub-Reproduce) - 一个Vulhub漏洞复现知识库
- [shengshengli/vulntarget](https://github.com/shengshengli/vulntarget) - vulntarget靶场其中涵盖Web漏洞、主机漏洞、域漏洞、工控漏洞等等。
- [For3stCo1d/myvulpoc](https://github.com/For3stCo1d/myvulpoc) - 漏洞复现,xraypoc编写
- [69337a398c/Zer0DayLab-SCAMMERS](https://github.com/69337a398c/Zer0DayLab-SCAMMERS) - Zer0Day Lab Are SCAMMERS
- [malienist/lupo](https://github.com/malienist/lupo) - Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation
- [ayadim/Nuclei-bug-hunter](https://github.com/ayadim/Nuclei-bug-hunter) - i will upload more templates here to share with the comunity.
- [Getshell/CobaltStrike](https://github.com/Getshell/CobaltStrike) - CobaltStrike资源大全
- [f0ng/JavaFileDict](https://github.com/f0ng/JavaFileDict) - Java应用的一些配置文件字典,来源于公开的字典与平时收集
- [zapstiko/Hacking-PDF](https://github.com/zapstiko/Hacking-PDF) - Here Are Some Popular Hacking PDF
- [casbin/Summer2022](https://github.com/casbin/Summer2022) - 开源软件供应链点亮计划-暑期2022 for Casbin 【学生报名请加QQ群:540163681】
- [slowmist/Cryptocurrency-Security-Audit-Guide](https://github.com/slowmist/Cryptocurrency-Security-Audit-Guide) -
- [phith0n/collision-webshell](https://github.com/phith0n/collision-webshell) - A webshell and a normal file that have the same MD5
- [zangcc/Aazhen-RexHa](https://github.com/zangcc/Aazhen-RexHa) - 自研JavaFX图形化漏洞扫描工具,支持扫描的漏洞分别是: ThinkPHP-2.x-RCE, ThinkPHP-5.0.23-RCE, ThinkPHP5.0.x-5.0.23通杀RCE, ThinkPHP5-SQL注入&敏感信息泄露, ThinkPHP 3.x 日志泄露NO.1, ThinkPHP 3.x 日志泄露NO.2, ThinkPHP 5.x 数据库信息泄露的漏洞检测,以及批量检测的功
- [wwl012345/Vuln-List](https://github.com/wwl012345/Vuln-List) - (持续更新)对网上出现的各种OA、中间件、CMS等漏洞进行整理,主要包括漏洞介绍、漏洞影响版本以及漏洞POC/EXP等,并且会持续更新。
- [shirouQwQ/CVE-2022-2333](https://github.com/shirouQwQ/CVE-2022-2333) - SXF VPN RCE
- [j2ekim/Security_Service_Interviews](https://github.com/j2ekim/Security_Service_Interviews) - 安服面经☞渗透测试/代码审计/安全研究
- [biggerduck/RedTeamNotes](https://github.com/biggerduck/RedTeamNotes) - 红队笔记
- [allanlw/svg-cheatsheet](https://github.com/allanlw/svg-cheatsheet) - A cheatsheet for exploiting server-side SVG processors.
- [safe6Sec/command](https://github.com/safe6Sec/command) - 红队常用命令速查
- [Dongdongshe/K-Scheduler](https://github.com/Dongdongshe/K-Scheduler) - A universal seed scheduler for fuzzers (LibFuzzer and AFL havoc mode) and concolic execution engine (qsym).
- [ra66itmachine/GetInfo](https://github.com/ra66itmachine/GetInfo) - Windows Emergency Response (应急响应信息采集)
- [RistBS/Awesome-RedTeam-Cheatsheet](https://github.com/RistBS/Awesome-RedTeam-Cheatsheet) - Red Team Cheatsheet in constant expansion.
- [nirajkharel/AD-Pentesting-Notes](https://github.com/nirajkharel/AD-Pentesting-Notes) -
- [geekan/HowToLiveLonger](https://github.com/geekan/HowToLiveLonger) - 程序员延寿指南 | A programmer's guide to live longer
- [teamssix/awesome-cloud-security](https://github.com/teamssix/awesome-cloud-security) - awesome cloud security 收集一些国内外不错的云安全资源,该项目主要面向国内的安全人员
- [slowmist/Blockchain-dark-forest-selfguard-handbook](https://github.com/slowmist/Blockchain-dark-forest-selfguard-handbook) - Blockchain dark forest selfguard handbook. Master these, master the security of your cryptocurrency.
- [mamba-2021/fscan-POC](https://github.com/mamba-2021/fscan-POC) - 强化fscan的漏扫POC库
- [prettyrecon/OSINT_Intel_Tracker](https://github.com/prettyrecon/OSINT_Intel_Tracker) - OSINT Intelligence for different areas ( useful for different type of investigations and learning etc)
- [trickest/insiders](https://github.com/trickest/insiders) - Archive of Potential Insider Threats
- [cryptofinlabs/audit-checklist](https://github.com/cryptofinlabs/audit-checklist) - A Solidity smart contract auditing checklist
- [M1k0er/pentest-notes](https://github.com/M1k0er/pentest-notes) - 记录自己在内网渗透学习中的一些心得和技巧,不定期记录中:)
- [sherlocksecurity/VMware-CVE-2022-22954](https://github.com/sherlocksecurity/VMware-CVE-2022-22954) - POC for VMWARE CVE-2022-22954
- [BlueTeamSteve/CVE-2021-41773](https://github.com/BlueTeamSteve/CVE-2021-41773) - Vulnerable docker images for CVE-2021-41773
- [coffeehb/Spring4Shell](https://github.com/coffeehb/Spring4Shell) - 一个Spring4Shell 被动式检测的Burp插件
- [HuskyHacks/CobaltNotion](https://github.com/HuskyHacks/CobaltNotion) - A spin-off research project. Cobalt Strike x Notion collab 2022
- [d3ckx1/Fvuln](https://github.com/d3ckx1/Fvuln) - F-vuln(全称:Find-Vulnerability)是为了自己工作方便专门编写的一款自动化工具,主要适用于日常安全服务、渗透测试人员和RedTeam红队人员,它集合的功能包括:存活IP探测、开放端口探测、web服务探测、web漏洞扫描、smb爆破、ssh爆破、ftp爆破、mssql爆破等其他数据库爆破工作以及大量web漏洞检测模块。
- [makoto56/penetration-suite-toolkit](https://github.com/makoto56/penetration-suite-toolkit) - 本项目制作的初衷是帮助渗透新手快速搭建工作环境,工欲善其事,必先利其器。
- [kh4sh3i/Gitlab-CVE](https://github.com/kh4sh3i/Gitlab-CVE) - a Curated list of gitlab vulnerability
- [1n7erface/Template](https://github.com/1n7erface/Template) - Next generation RedTeam heuristic intranet scanning | 下一代RedTeam启发式内网扫描
- [luckyfuture0177/ReZeroBypassAV](https://github.com/luckyfuture0177/ReZeroBypassAV) - 从零开始学免杀
- [Firebasky/CodeqlLearn](https://github.com/Firebasky/CodeqlLearn) - 记录学习codeql的过程
- [mstxq17/SecurityArticleLogger](https://github.com/mstxq17/SecurityArticleLogger) - 分类和整理自己看过的所有文章,方便知识体系的建立和查漏补缺
- [kensh1ro/flutter-ssl-bypass](https://github.com/kensh1ro/flutter-ssl-bypass) - Flutter SSL pinning bypass using IP forwarding
- [delikely/Automotive-Security-Timeline](https://github.com/delikely/Automotive-Security-Timeline) - 汽车信息安全事件时间轴
- [o1mate/AppLocker-Bypass](https://github.com/o1mate/AppLocker-Bypass) - Bypassing AppLocker with C#
- [CyberSecurityUP/Awesome-Cloud-PenTest](https://github.com/CyberSecurityUP/Awesome-Cloud-PenTest) -
- [MartinsAwojide/Process-System-Engineering-Catalogue](https://github.com/MartinsAwojide/Process-System-Engineering-Catalogue) - Catalogue of Articles, Projects, Papers and Resources relating to PSE
- [admin360bug/Compendium-of-Materia-Medica](https://github.com/admin360bug/Compendium-of-Materia-Medica) - 本草纲目V1.4版本
- [cyprosecurity/API-SecurityEmpire](https://github.com/cyprosecurity/API-SecurityEmpire) - API Security Project aims to present unique attack & defense methods in API Security field
- [nhthongDfVn/File-Converter-Exploit](https://github.com/nhthongDfVn/File-Converter-Exploit) - A small collection of File converter vulnerability
- [EAimTY/tuic](https://github.com/EAimTY/tuic) -
- [safe6Sec/PentestDB](https://github.com/safe6Sec/PentestDB) - 各种数据库的利用姿势
- [xmhwws/strongR-frida](https://github.com/xmhwws/strongR-frida) -
- [Y4er/dotnet-deserialization](https://github.com/Y4er/dotnet-deserialization) - dotnet 反序列化学习笔记
- [ASTTeam/CodeQL](https://github.com/ASTTeam/CodeQL) - 《深入理解CodeQL》Finding vulnerabilities with CodeQL.
- [AJMartel/MeGa-RAT-Pack](https://github.com/AJMartel/MeGa-RAT-Pack) - Remote Administration Tools & Remote access trojans in MEGA RAT PACK by B®AGA
- [caesar0301/awesome-pcaptools](https://github.com/caesar0301/awesome-pcaptools) - A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.
- [cider-security-research/top-10-cicd-security-risks](https://github.com/cider-security-research/top-10-cicd-security-risks) -
- [Tas9er/ByPassBehinder4J](https://github.com/Tas9er/ByPassBehinder4J) - 冰蝎Java WebShell自动化免杀生成
- [tangxiaofeng7/Security_Q-A](https://github.com/tangxiaofeng7/Security_Q-A) - 安全面试题
- [twosmi1e/Static-Analysis-and-Automated-Code-Audit](https://github.com/twosmi1e/Static-Analysis-and-Automated-Code-Audit) - 静态分析及代码审计自动化相关资料收集
- [ics-iot-bootcamp/ICS_Awesome_List](https://github.com/ics-iot-bootcamp/ICS_Awesome_List) - Eclectic ICS (Industrial Control Systems) Resources & References
- [mehgrmlhmpf/AttackGraphGeneratorMasterThesis](https://github.com/mehgrmlhmpf/AttackGraphGeneratorMasterThesis) - This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial control system environments. This viability is evaluated and confirm
- [kh4sh3i/ICS-Pentesting-Tools](https://github.com/kh4sh3i/ICS-Pentesting-Tools) - A curated list of tools related to Industrial Control System (ICS) security and Penetration Testing
- [paulveillard/cybersecurity-industrial-control-systems-security](https://github.com/paulveillard/cybersecurity-industrial-control-systems-security) - A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity.
- [neutrinoguy/awesome-ics-writeups](https://github.com/neutrinoguy/awesome-ics-writeups) - Collection of writeups on ICS/SCADA security.
- [J0o1ey/BountyHunterInChina](https://github.com/J0o1ey/BountyHunterInChina) - 重生之我在安全行业讨口子系列,分享在安全行业讨口子过程中,SRC、项目实战的有趣案例
- [krol3/container-security-checklist](https://github.com/krol3/container-security-checklist) - Checklist for container security - devsecops practices
- [CreditTone/studycrawler](https://github.com/CreditTone/studycrawler) - 爬虫从入门到入土心得体会
- [evilbuffer/malware-and-exploitdev-resources](https://github.com/evilbuffer/malware-and-exploitdev-resources) -
- [vvmdx/Sec-Interview-4-2023](https://github.com/vvmdx/Sec-Interview-4-2023) - 一个2023届毕业生在毕业前持续更新、收集的安全岗面试题及面试经验分享~
- [CVEProject/cvelist](https://github.com/CVEProject/cvelist) - Pilot program for CVE submission through GitHub. CVE Record Submission via Pilot PRs ending 6/30/2023
- [jixing-lab/lbb](https://github.com/jixing-lab/lbb) - lbb是一个企业信息查询工具,可以帮助企业查询自身对外公开的应用、新媒体,网站等。
- [lcvvvv/backway](https://github.com/lcvvvv/backway) - backway是一款跨平台远程控制工具,在启动之后,会新建一个http服务,可通过该服务进行远程控制。
- [ycdxsb/WindowsPrivilegeEscalation](https://github.com/ycdxsb/WindowsPrivilegeEscalation) - Collection of Windows Privilege Escalation (Analyse/PoC/Exp...)
- [allen1881996/WeChat-Data-Analysis](https://github.com/allen1881996/WeChat-Data-Analysis) - 微信聊天记录导出、数据库破解、数据分析 (iPhone & MacBook)
- [Qihoo360/safe-rules](https://github.com/Qihoo360/safe-rules) - 详细的C/C++编程规范指南,由360质量工程部编著,适用于桌面、服务端及嵌入式软件系统。
- [binganao/vulns-2022](https://github.com/binganao/vulns-2022) - 本项目用于搜集 2022 年的漏洞,注意:本项目并不刻意搜集 POC 或 EXP,主要以CVE-2021、CVE-2022 为关键词,包含但不限于漏洞资讯、漏洞复现、漏洞分析、漏洞验证、漏洞利用
- [yavolo/eventlistener-xss-recon](https://github.com/yavolo/eventlistener-xss-recon) -
- [NineRiverSec/Mac_Tools](https://github.com/NineRiverSec/Mac_Tools) - 为了方便Mac用户参与渗透工作而创建的项目
- [snyk/zip-slip-vulnerability](https://github.com/snyk/zip-slip-vulnerability) - Zip Slip Vulnerability (Arbitrary file write through archive extraction)
- [0range-x/Domain-penetration_one-stop](https://github.com/0range-x/Domain-penetration_one-stop) - 域渗透一条龙
- [Goqi/Banli](https://github.com/Goqi/Banli) - Banli-高危资产识别和高危漏洞扫描
- [hluwa/Patchs](https://github.com/hluwa/Patchs) - strongR-frida
- [NyDubh3/Pentesting-Active-Directory-CN](https://github.com/NyDubh3/Pentesting-Active-Directory-CN) - 域渗透脑图中文翻译版
- [Puliczek/awesome-list-of-secrets-in-environment-variables](https://github.com/Puliczek/awesome-list-of-secrets-in-environment-variables) - 🦄🔒 Awesome list of secrets in environment variables 🖥️
- [packing-box/awesome-executable-packing](https://github.com/packing-box/awesome-executable-packing) - A curated list of awesome resources related to executable packing
- [jsecurity101/MSRPC-to-ATTACK](https://github.com/jsecurity101/MSRPC-to-ATTACK) - A repository that maps commonly used attacks using MSRPC protocols to ATT&CK
- [Wker666/wJa](https://github.com/Wker666/wJa) - java decompile audit tools
- [Yihsiwei/GetOut360](https://github.com/Yihsiwei/GetOut360) - 强制关闭360 需要管理员权限
- [0xAwali/Blind-SSRF](https://github.com/0xAwali/Blind-SSRF) - Nuclei Templates to reproduce Cracking the lens's Research
- [ahmetgurel/Pentest-Hints](https://github.com/ahmetgurel/Pentest-Hints) - Tips for Penetration Testing
- [xen0vas/Pentest-Tips-and-Tricks](https://github.com/xen0vas/Pentest-Tips-and-Tricks) - Tools and tricks gathered
- [samirettali/bounty-notes](https://github.com/samirettali/bounty-notes) - My bug bounty notes
- [aetkrad/goby_poc](https://github.com/aetkrad/goby_poc) - goby poc or exp,分享goby最新网络安全漏洞检测或利用代码
- [arainho/awesome-api-security](https://github.com/arainho/awesome-api-security) - A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.
- [SpiralBL0CK/Browser-Pwning-](https://github.com/SpiralBL0CK/Browser-Pwning-) - A proper well structured documentation for getting started with chrome pwning & v8 pwning
- [crisprss/goHashDumper](https://github.com/crisprss/goHashDumper) - 用于Dump指定进程的内存,主要利用静默退出机制(SilentProcessExit)和Windows API(MiniDumpW)实现
- [haby0/sec-note](https://github.com/haby0/sec-note) - 记录各语言、框架中危险的sink,个人代码审计、漏洞研究使用。
- [HackJava/Log4j2](https://github.com/HackJava/Log4j2) - 《HackLog4j-永恒之恶龙》致敬全宇宙最无敌的Java日志库!Tribute to the most invincible Java logging library in the universe!
- [aquasecurity/cloud-security-remediation-guides](https://github.com/aquasecurity/cloud-security-remediation-guides) - Security Remediation Guides
- [XTeam-Wing/Awesome-Jetbrains-Plugin](https://github.com/XTeam-Wing/Awesome-Jetbrains-Plugin) - A series of useful idea plugins
- [ak1t4/log4j-wordlists](https://github.com/ak1t4/log4j-wordlists) - headers
- [atnetws/fail2ban-log4j](https://github.com/atnetws/fail2ban-log4j) - fail2ban filter that catches attacks againts log4j CVE-2021-44228
- [google/clusterfuzzlite](https://github.com/google/clusterfuzzlite) - ClusterFuzzLite - Simple continuous fuzzing that runs in CI.
- [imfht/log4shell_payload_extract](https://github.com/imfht/log4shell_payload_extract) -
- [fastfire/deepdarkCTI](https://github.com/fastfire/deepdarkCTI) - Collection of Cyber Threat Intelligence sources from the deep and dark web
- [yanbo92/sonarqube-cn-docker](https://github.com/yanbo92/sonarqube-cn-docker) - 基于代码扫描工具sonarqube社区版docker镜像集成一些常用插件以及PostgreSQL数据库的docker-compose项目
- [ksoclabs/awesome-kubernetes-security](https://github.com/ksoclabs/awesome-kubernetes-security) - A curated list of awesome Kubernetes security resources
- [LoRexxar/log_dependency_checklist](https://github.com/LoRexxar/log_dependency_checklist) - Dependencies with Log4j2 Checklist
- [MohamedTarekq/log4j_Signature](https://github.com/MohamedTarekq/log4j_Signature) -
- [jas502n/woodpecker-plugins](https://github.com/jas502n/woodpecker-plugins) - woodpecker-plugins
- [authomize/log4j-log4shell-affected](https://github.com/authomize/log4j-log4shell-affected) - Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulne
- [RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs](https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs) -
- [fengxuangit/log4j_vuln](https://github.com/fengxuangit/log4j_vuln) - log4j漏洞靶场docker-compose
- [jas502n/Log4j2-CVE-2021-44228](https://github.com/jas502n/Log4j2-CVE-2021-44228) - Remote Code Injection In Log4j
- [YfryTchsGD/Log4jAttackSurface](https://github.com/YfryTchsGD/Log4jAttackSurface) -
- [RabbyHub/Web3AppStoreProtocol](https://github.com/RabbyHub/Web3AppStoreProtocol) - the first solution for the security and accessibility of Web3 Apps!
- [star-sg/Presentations](https://github.com/star-sg/Presentations) -
- [burpheart/PHPAuditGuideBook](https://github.com/burpheart/PHPAuditGuideBook) - 《PHP代码审计入门指南》 这本指南包含了我在学习PHP代码审计过程中整理出的一些技巧和对漏洞的一些理解
- [sidxparab/Subdomain-Enumeration-Guide](https://github.com/sidxparab/Subdomain-Enumeration-Guide) - This is a comprehensive Subdomain Enumeration Guide that traces back to my GitBook.
- [kleiton0x00/Advanced-SQL-Injection-Cheatsheet](https://github.com/kleiton0x00/Advanced-SQL-Injection-Cheatsheet) - A cheat sheet that contains advanced queries for SQL Injection of all types.
- [ColdFusionX/CVE-2021-26086](https://github.com/ColdFusionX/CVE-2021-26086) - Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)
- [CodingDocs/awesome-java](https://github.com/CodingDocs/awesome-java) - Collection of awesome Java project on Github(非常棒的 Java 开源项目集合).
- [Cyber-Guy1/theCyberGuy_Recon_V1.0](https://github.com/Cyber-Guy1/theCyberGuy_Recon_V1.0) -
- [A-D-Team/attackRmi](https://github.com/A-D-Team/attackRmi) -
- [l0ggg/VMware_vCenter](https://github.com/l0ggg/VMware_vCenter) - VMware vCenter 7.0.2.00100 unauth Arbitrary File Read + SSRF + Reflected XSS
- [waterrr/BlackIP](https://github.com/waterrr/BlackIP) - 扫描CobaltStrike的恶意IP
- [center-for-threat-informed-defense/attack_to_cve](https://github.com/center-for-threat-informed-defense/attack_to_cve) - 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
- [RoqueNight/Linux-Privilege-Escalation-Basics](https://github.com/RoqueNight/Linux-Privilege-Escalation-Basics) - Simple and accurate guide for linux privilege escalation tactics
- [Karanxa/Bug-Bounty-Wordlists](https://github.com/Karanxa/Bug-Bounty-Wordlists) - A repository that includes all the important wordlists used while bug hunting.
- [fangzesheng/free-api](https://github.com/fangzesheng/free-api) - 收集免费的接口服务,做一个api的搬运工
- [flydoos/DingTalkRevokeMsgPatcher](https://github.com/flydoos/DingTalkRevokeMsgPatcher) - 钉钉消息防撤回补丁PC版(原名:钉钉电脑版防撤回插件,也叫:钉钉防撤回补丁、钉钉消息防撤回补丁)由“吾乐吧软件站”开发制作,本程序用于钉钉电脑版6.0以上版本,主要功能如下:1、支持文字消息防撤回 2、支持图片消息防撤回,支持查看高清原图 3、支持文件识别、URL识别、卡片回复消息识别等 4、支持富文本消息防撤回 5、支持个人消息防撤回,以及群主或管理员消息防撤回 6、支持自己发送的消息
- [crow821/vulntarget](https://github.com/crow821/vulntarget) - vulntarget靶场系列
- [xinxin999/My-Summarizing](https://github.com/xinxin999/My-Summarizing) - 我自己的一些总结
- [spring2go/cs_study_plan](https://github.com/spring2go/cs_study_plan) - 一份硬核(hardcore)计算机科学CS自学计划,偏向软件工程和系统架构方向
- [sdslabs/recommends](https://github.com/sdslabs/recommends) - A collection of resources and reading material that we recommend
- [geeksonsecurity/vuln-web-apps](https://github.com/geeksonsecurity/vuln-web-apps) - A curated list of vulnerable web applications.
- [XRSec/AWVS-Update](https://github.com/XRSec/AWVS-Update) - Awvs Scanner、fahai
- [Relkci/Zabbix_Nessus-Professional_Monitoring](https://github.com/Relkci/Zabbix_Nessus-Professional_Monitoring) - Zabbix Nessus Professional Monitor (API)
- [Liqunkit/LiqunKit_](https://github.com/Liqunkit/LiqunKit_) - 下架
- [diegolnasc/kubernetes-best-practices](https://github.com/diegolnasc/kubernetes-best-practices) - A cookbook with the best practices to working with kubernetes.
- [knownsec/Ethereum-Smart-Contracts-Security-CheckList](https://github.com/knownsec/Ethereum-Smart-Contracts-Security-CheckList) - Ethereum Smart Contracts Security CheckList From Knownsec 404 Team
- [i11us0ry/gofun](https://github.com/i11us0ry/gofun) - 一些内网渗透中可能用到的东拼西凑做出来的小工具
- [ninoseki/phishing_kits_2021](https://github.com/ninoseki/phishing_kits_2021) - A dataset of phishing kits in the wild
- [iceyhexman/flask_memory_shell](https://github.com/iceyhexman/flask_memory_shell) - Flask 内存马
- [HackJava/HackJava](https://github.com/HackJava/HackJava) - 《Java安全-只有Java安全才能拯救宇宙》Only Java Security Can Save The Universe.
- [fengupupup/RocB](https://github.com/fengupupup/RocB) - 鹏 RocB - Java代码审计IDEA插件 SAST
- [r0eXpeR/supplier](https://github.com/r0eXpeR/supplier) - 主流供应商的一些攻击性漏洞汇总
- [AndrewRathbun/DFIRMindMaps](https://github.com/AndrewRathbun/DFIRMindMaps) - A repository of DFIR-related Mind Maps geared towards the visual learners!
- [bigsizeme/fastjson-check](https://github.com/bigsizeme/fastjson-check) - fastjson 被动扫描、不出网payload生成
- [daffainfo/all-about-apikey](https://github.com/daffainfo/all-about-apikey) - Detailed information about API key / OAuth token (Description, Request, Response, Regex, Example)
- [aufzayed/bugbounty](https://github.com/aufzayed/bugbounty) - Bugbounty Resources
- [Bo0oM/WAF-bypass-Cheat-Sheet](https://github.com/Bo0oM/WAF-bypass-Cheat-Sheet) - Another way to bypass WAF Cheat Sheet (draft)
- [mobile-roadmap/android-developer-roadmap](https://github.com/mobile-roadmap/android-developer-roadmap) - Android Developer Roadmap 2020
- [Y4er/CVE-2021-35215](https://github.com/Y4er/CVE-2021-35215) - SolarWinds Orion Platform ActionPluginBaseView 反序列化RCE
- [weartist/computer-book-list](https://github.com/weartist/computer-book-list) - 一个综合了豆瓣,goodreads综合评分的计算机书籍书单
- [safe6Sec/PentestNote](https://github.com/safe6Sec/PentestNote) - 一些渗透姿势记录
- [Vinum-Security/kubernetes-security-checklist](https://github.com/Vinum-Security/kubernetes-security-checklist) - Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, workloads, dockerfile)
- [yangyiRunning/Beijing-House](https://github.com/yangyiRunning/Beijing-House) - 面向北京码农同胞的从0开始的买房踩盘实录,目标只有一个: 每一分钱都花的明白(持续补充和完善ing…)
- [httptoolkit/httptoolkit](https://github.com/httptoolkit/httptoolkit) - HTTP Toolkit is a beautiful & open-source tool for debugging, testing and building with HTTP(S) on Windows, Linux & Mac :tada: Open an issue here to give feedback or ask for help.
- [daem0nc0re/Abusing_Weak_ACL_on_Certificate_Templates](https://github.com/daem0nc0re/Abusing_Weak_ACL_on_Certificate_Templates) - Investigation about ACL abusing for Active Directory Certificate Services (AD CS)
- [Astartgo/easy-for-webscan](https://github.com/Astartgo/easy-for-webscan) - 根据WebBatchRequest图形化二次开发:增加了指纹识别模块,可识别大概上千条指纹,增加了IP段处理,支持C段和B段处理,增加了301处理,增加了去重空节点的功能,可节省内存消耗,推荐勾选此选项
- [antonio-morales/Fuzzing101](https://github.com/antonio-morales/Fuzzing101) - An step by step fuzzing tutorial. A GitHub Security Lab initiative
- [lehui99/articles](https://github.com/lehui99/articles) -
- [kingz40o/Aggressor_dingding](https://github.com/kingz40o/Aggressor_dingding) - cobaltstrike 上线提醒
- [clarkvoss/AEM-List](https://github.com/clarkvoss/AEM-List) -
- [Ignitetechnologies/Command-Control](https://github.com/Ignitetechnologies/Command-Control) - This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploit remote session.
- [hetmehtaa/bug-bounty-noob](https://github.com/hetmehtaa/bug-bounty-noob) -
- [lintstar/About-Attack](https://github.com/lintstar/About-Attack) - 一个旨在通过应用场景 / 标签对 Github 红队向工具 / 资源进行分类收集,降低红队技术门槛的手册【持续更新】
- [he1m4n6a/Go_Security_Study](https://github.com/he1m4n6a/Go_Security_Study) - golang安全学习总结
- [Ignitetechnologies/Nmap-For-Pentester](https://github.com/Ignitetechnologies/Nmap-For-Pentester) - This cheatsheet was created to assist Red Teamers and Penetration Testers in hunting down vulnerabilities using "Nmap."
- [JoshuaProvoste/URL-Encode-Injection](https://github.com/JoshuaProvoste/URL-Encode-Injection) - URL Encode Injection List
- [Zeyad-Azima/Offensive-Resources](https://github.com/Zeyad-Azima/Offensive-Resources) - A Huge Learning Resources with Labs For Offensive Security Players
- [hmaverickadams/TCM-Security-Sample-Pentest-Report](https://github.com/hmaverickadams/TCM-Security-Sample-Pentest-Report) - Sample pentest report provided by TCM Security
- [mstxq17/CVE-2021-1675_RDL_LPE](https://github.com/mstxq17/CVE-2021-1675_RDL_LPE) - PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender/EDR。
- [zhangxiangliang/civil-service-exam](https://github.com/zhangxiangliang/civil-service-exam) - 考试攻略 | 公务员 | 事业单位
- [sigp/solidity-security-blog](https://github.com/sigp/solidity-security-blog) - Comprehensive list of known attack vectors and common anti-patterns
- [NitinYadav00/My-Nuclei-Templates](https://github.com/NitinYadav00/My-Nuclei-Templates) - Nuclei Templates - Here you will find the templates I use while hunting
- [iamsarvagyaa/AndroidSecNotes](https://github.com/iamsarvagyaa/AndroidSecNotes) - An actively maintained, Self curated notes related to android application security for security professionals, bugbounty hunters, pentesters, reverse engineer, and redteamers.
- [thelikes/fuzzmost](https://github.com/thelikes/fuzzmost) - all manner of wordlists
- [vavkamil/awesome-vulnerable-apps](https://github.com/vavkamil/awesome-vulnerable-apps) - Awesome Vulnerable Applications
- [Bhagavan-Bollina/BugBounty-Dorks](https://github.com/Bhagavan-Bollina/BugBounty-Dorks) - Highly recommended dorks for bug bounty
- [0xmaximus/Galaxy-Bugbounty-Checklist](https://github.com/0xmaximus/Galaxy-Bugbounty-Checklist) - Tips and Tutorials for Bug Bounty and also Penetration Tests.
- [RiskySignal/Devil-Whisper-Attack](https://github.com/RiskySignal/Devil-Whisper-Attack) - Devil-Whisper-Attack
- [stratosphereips/awesome-ml-privacy-attacks](https://github.com/stratosphereips/awesome-ml-privacy-attacks) - An awesome list of papers on privacy attacks against machine learning
- [bkrem/awesome-solidity](https://github.com/bkrem/awesome-solidity) - ⟠ A curated list of awesome Solidity resources, libraries, tools and more
- [The-Hacker-Recipes/The-Hacker-Recipes](https://github.com/The-Hacker-Recipes/The-Hacker-Recipes) - This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, intelligence gathering, physical intrusion, phishing, mobile app
- [pdelteil/BugBountyReportTemplates](https://github.com/pdelteil/BugBountyReportTemplates) - List of reporting templates I have used since I started doing BBH.
- [dorkerdevil/Azorult-hunter](https://github.com/dorkerdevil/Azorult-hunter) - Azorult C&C hunter with bash onliner and nuclei yaml rule
- [vestjoe/cobaltstrike_services](https://github.com/vestjoe/cobaltstrike_services) - AutoStart teamserver and listeners with services
- [threatexpress/cobaltstrike_payload_generator](https://github.com/threatexpress/cobaltstrike_payload_generator) - Quickly generate every payload type for each listener and optionally host via HTTP.
- [roadwy/RIP](https://github.com/roadwy/RIP) -
- [rarecoil/pantagrule](https://github.com/rarecoil/pantagrule) - large hashcat rulesets generated from real-world compromised passwords
- [MountCloud/FireKylin](https://github.com/MountCloud/FireKylin) - 🔥火麒麟-网络安全应急响应工具(系统痕迹采集)Cybersecurity emergency response tool.👍👍👍
- [optiv/OSINT_Encyclopedia](https://github.com/optiv/OSINT_Encyclopedia) - Your go-to resource for all things OSINT
- [the-xentropy/samlists](https://github.com/the-xentropy/samlists) - Free, libre, effective, and data-driven wordlists for all!
- [flothrone/smm](https://github.com/flothrone/smm) -
- [Rabb1tQ/SickleOfSkyCurtain](https://github.com/Rabb1tQ/SickleOfSkyCurtain) - zoomeyeGUI
- [subat0mik/whoamsi](https://github.com/subat0mik/whoamsi) - An effort to track security vendors' use of Microsoft's Antimalware Scan Interface
- [eastlakeside/awesome-productivity-cn](https://github.com/eastlakeside/awesome-productivity-cn) - 绝妙的个人生产力(Awesome Productivity - Chinese version)
- [IT-Weekly/APP](https://github.com/IT-Weekly/APP) -
- [zwjjustdoit/Xstream-1.4.17](https://github.com/zwjjustdoit/Xstream-1.4.17) - XSTREAM<=1.4.17漏洞复现(CVE-2021-39141、CVE-2021-39144、CVE-2021-39150)
- [galdeleon/Conferences](https://github.com/galdeleon/Conferences) -
- [optiv/Registry-Recon](https://github.com/optiv/Registry-Recon) - Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon
- [baiduxlab/sgxray](https://github.com/baiduxlab/sgxray) -
- [r0eXpeR/Online_Tools](https://github.com/r0eXpeR/Online_Tools) - 一些在线的工具,情报资源
- [Mel0day/RedTeam-BCS](https://github.com/Mel0day/RedTeam-BCS) - BCS(北京网络安全大会)2019 红队行动会议重点内容
- [EdgeSecurityTeam/Eeyes](https://github.com/EdgeSecurityTeam/Eeyes) - Eeyes(棱眼)-快速筛选真实IP并整理为C段
- [Cobalt-Strike/teamserver-prop](https://github.com/Cobalt-Strike/teamserver-prop) - TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot and keylog callback data, which allows you to tweak the fix fo
- [joswha/Secure-Coding-Handbook](https://github.com/joswha/Secure-Coding-Handbook) - Web Application Secure Coding Handbook resource.
- [CnTransGroup/EffectiveModernCppChinese](https://github.com/CnTransGroup/EffectiveModernCppChinese) - 《Effective Modern C++》- 完成翻译
- [BigGan/Windows-Hack-Programming](https://github.com/BigGan/Windows-Hack-Programming) - 《WINDOWS黑客编程技术详解》,作者甘迪文,2018年12月由人民邮电出版社出版,是一本面向黑客编程初学者的书,较为全面的地总结黑客编程技术。其内容重在实践,着重剖析技术实现原理,向读者讲解黑客编程技术的实现方法。
- [cloudcommunity/Free-Certifications](https://github.com/cloudcommunity/Free-Certifications) - A curated list of free courses & certifications.
- [bakke92/awesome-gdpr](https://github.com/bakke92/awesome-gdpr) - Protection of natural persons with regard to the processing of personal data and on the free movement of such data.
- [PhishyAlice/awesome-phishing](https://github.com/PhishyAlice/awesome-phishing) - Collection of resources related to phishing
- [nevillegrech/MadMax](https://github.com/nevillegrech/MadMax) - Ethereum Static Vulnerability Detector for Gas-Focussed Vulnerabilities
- [JerryLinLinLin/Huorong-HIPS-Rule-Schema](https://github.com/JerryLinLinLin/Huorong-HIPS-Rule-Schema) - The project includes two json schemas of Huorong Host-based Intrusion Prevention System (HIPS) custom rule files (json). They can be used to validate Huorong HIPS rules and speed up editing.
- [decalage2/awesome-security-hardening](https://github.com/decalage2/awesome-security-hardening) - A collection of awesome security hardening guides, tools and other resources
- [taterbrown/cisco-secure-config](https://github.com/taterbrown/cisco-secure-config) - Security hardening for Cisco devices
- [sametsazak/sysmon](https://github.com/sametsazak/sysmon) - Sysmon and wazuh integration with Sigma sysmon rules [updated]
- [limiteci/sql-injection-payloads](https://github.com/limiteci/sql-injection-payloads) - simple markdown-list to operate SQL injections
- [jamestiotio/NoMoreRansom](https://github.com/jamestiotio/NoMoreRansom) - All-in-One Ransomware Decryption Tools (Unofficial Mirror)
- [s4dhul4bs/vimana-framework](https://github.com/s4dhul4bs/vimana-framework) - Vimana is an experimental security tool that aims to provide resources for auditing Python web applications.
- [talsec/Free-RASP-Community](https://github.com/talsec/Free-RASP-Community) - SDK providing app protection and threat monitoring for mobile devices, available for Flutter, Cordova, Android and iOS.
- [spaze/hashes](https://github.com/spaze/hashes) - Magic hashes – PHP hash "collisions"
- [xxycfhb/pku_exploit_files](https://github.com/xxycfhb/pku_exploit_files) -
- [safe6Sec/Fastjson](https://github.com/safe6Sec/Fastjson) - Fastjson姿势技巧集合
- [404notf0und/AI-for-Security-Landing](https://github.com/404notf0und/AI-for-Security-Landing) - 企业级安全智能化实践
- [XTeam-Wing/SharpMimikatz](https://github.com/XTeam-Wing/SharpMimikatz) - Csharp 反射加载dll
- [phonchi/awesome-side-channel-attack](https://github.com/phonchi/awesome-side-channel-attack) - A curated list of awesome side-channel attack resources
- [x1ah/gena-template](https://github.com/x1ah/gena-template) - 一键生成导航网站(GitHub Template of generating personal start page)
- [arialdomartini/Back-End-Developer-Interview-Questions](https://github.com/arialdomartini/Back-End-Developer-Interview-Questions) - A list of back-end related questions you can be inspired from to interview potential candidates, test yourself or completely ignore
- [TimelifeCzy/Windows-emergency-servicetools](https://github.com/TimelifeCzy/Windows-emergency-servicetools) - Windows一键检测应急响应服务工具/r3数据采集
- [wyzxxz/heapdump_tool](https://github.com/wyzxxz/heapdump_tool) - heapdump敏感信息查询工具,例如查找 spring heapdump中的密码明文,AK,SK等
- [magoo/ato-checklist](https://github.com/magoo/ato-checklist) - A checklist of practices for organizations dealing with account takeover (ATO)
- [FDlucifer/DroidJack-cracked-version-](https://github.com/FDlucifer/DroidJack-cracked-version-) - DroidJack (安卓远控神器 破解版)
- [ch33r10/EnterprisePurpleTeaming](https://github.com/ch33r10/EnterprisePurpleTeaming) - Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
- [jaiswalakshansh/Facebook-BugBounty-Writeups](https://github.com/jaiswalakshansh/Facebook-BugBounty-Writeups) - Collection of Facebook Bug Bounty Writeups
- [S3cur3Th1sSh1t/LDAP-Signing-Scanner](https://github.com/S3cur3Th1sSh1t/LDAP-Signing-Scanner) - A little scanner to check the LDAP Signing state
- [payloadbox/xxe-injection-payload-list](https://github.com/payloadbox/xxe-injection-payload-list) - 🎯 XML External Entity (XXE) Injection Payload List
- [emadshanab/facebook-bug-bounty-writeups](https://github.com/emadshanab/facebook-bug-bounty-writeups) - Facebook Bug Bounties
- [bilalmerokhel/bugbounty](https://github.com/bilalmerokhel/bugbounty) -
- [wangtielei/Slides](https://github.com/wangtielei/Slides) - slides for conference talks
- [WBGlIl/Beacon_re](https://github.com/WBGlIl/Beacon_re) -
- [bohops/UltimateWDACBypassList](https://github.com/bohops/UltimateWDACBypassList) - A centralized resource for previously documented WDAC bypass techniques
- [cfalta/MicrosoftWontFixList](https://github.com/cfalta/MicrosoftWontFixList) - A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. This list covers only vulnerabilities that came up in July 2021
- [InfosecHouse/InfosecHouse](https://github.com/InfosecHouse/InfosecHouse) - Tools & Resources for Cyber Security Operations
- [cpkkcb/fuzzDicts](https://github.com/cpkkcb/fuzzDicts) - 渗透测试路径字典,爆破字典。内容来自互联网和实战积累。
- [disclose/bug-bounty-platforms](https://github.com/disclose/bug-bounty-platforms) - A community-powered collection of all known bug bounty platforms, vulnerability disclosure platforms, and crowdsourced security platforms currently active on the Internet.
- [glitchedgitz/cook-ingredients](https://github.com/glitchedgitz/cook-ingredients) - The largest collection of wordlists in yaml for bug bounty tools
- [shramos/Awesome-Cybersecurity-Datasets](https://github.com/shramos/Awesome-Cybersecurity-Datasets) - A curated list of amazingly awesome Cybersecurity datasets
- [kot-behemoth/awesome-joplin](https://github.com/kot-behemoth/awesome-joplin) - 📒 A curated list of awesome Joplin themes and tools.
- [tjnull/TJ-JPT](https://github.com/tjnull/TJ-JPT) - This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used in Joplin
- [daikerSec/windows_protocol](https://github.com/daikerSec/windows_protocol) -
- [murataydemir/CVE-2020-3452](https://github.com/murataydemir/CVE-2020-3452) - [CVE-2020-3452] Cisco Adaptive Security Appliance (ASA) & Cisco Firepower Threat Defense (FTD) Web Service Read-Only Directory Traversal
- [MistSpark/DNS-Wordlists](https://github.com/MistSpark/DNS-Wordlists) - part of my wordlist to bruteforce DNS to find subdoamains.
- [i11us0ry/goon](https://github.com/i11us0ry/goon) - goon,集合了fscan和kscan等优秀工具功能的扫描爆破工具。功能包含:ip探活、port扫描、web指纹扫描、title扫描、压缩文件扫描、fofa获取、ms17010、mssql、mysql、postgres、redis、ssh、smb、rdp、telnet、tomcat等爆破以及如netbios探测等功能。
- [sectool/redteam-hardware-toolkit](https://github.com/sectool/redteam-hardware-toolkit) - 🔺 Red Team Hardware Toolkit 🔺
- [nccgroup/exploit_mitigations](https://github.com/nccgroup/exploit_mitigations) - Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.
- [vavkamil/awesome-bugbounty-tools](https://github.com/vavkamil/awesome-bugbounty-tools) - A curated list of various bug bounty tools
- [emadshanab/Scan-Apple-ASN-for-vulnerabilities-and-leave-no-port](https://github.com/emadshanab/Scan-Apple-ASN-for-vulnerabilities-and-leave-no-port) -
- [sapegin/jest-cheat-sheet](https://github.com/sapegin/jest-cheat-sheet) - Jest cheat sheet
- [bkerler/Loaders](https://github.com/bkerler/Loaders) - EDL Loaders
- [XTeam-Wing/Active-Directory-Security-101](https://github.com/XTeam-Wing/Active-Directory-Security-101) - Active-Directory-Security-101
- [NagliNagli/Shockwave-OSS](https://github.com/NagliNagli/Shockwave-OSS) -
- [bin-maker/apkshell](https://github.com/bin-maker/apkshell) - 实用的针对安卓应用加壳类型判断的小工具,涵盖各大商业、企业壳, 长期保持更新
- [We5ter/Flerken](https://github.com/We5ter/Flerken) - A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会
- [RavikumarRamesh/hpAndro1337](https://github.com/RavikumarRamesh/hpAndro1337) - Repository for download all version of @hpAndro1337 (Android AppSec) application.
- [BlackFan/content-type-research](https://github.com/BlackFan/content-type-research) - Content-Type Research
- [chefyuan/algorithm-base](https://github.com/chefyuan/algorithm-base) - 一位酷爱做饭的程序员,立志用动画将算法说的通俗易懂。我的面试网站 www.chengxuchu.com
- [eastmountyxz/Sui-AIResearch](https://github.com/eastmountyxz/Sui-AIResearch) - 该资源将应用人工智能技术研究水族文化、文字和古籍。为更好的抢救和保护濒危水族文字和非物质文化遗产,作者申请并开源了该项目,主要通过人工智能技术识别水书,构建与汉字的自动翻译系统,实现水族本体和文献知识图谱构建,挖掘新词并溯源民族变迁历史。作者回到家乡贵州教书以来,对利用AI抢救民族文物研究产生浓厚兴趣并后半生都将致力于该研究中,包括侗族大歌、苗族飞歌语音识别研究,王阳明文化研究,少数民族古籍文字保
- [othneildrew/Best-README-Template](https://github.com/othneildrew/Best-README-Template) - An awesome README template to jumpstart your projects!
- [Avileox/BB-SH-B](https://github.com/Avileox/BB-SH-B) -
- [forced-request/xssValidator](https://github.com/forced-request/xssValidator) - This is a burp intruder extender that is designed for automation and validation of XSS vulnerabilities.
- [wyzxxz/aksk_tool](https://github.com/wyzxxz/aksk_tool) - AK资源管理工具,阿里云/腾讯云/华为云/AWS/UCLOUD/京东云/百度云/七牛云存储 AccessKey AccessKeySecret,利用AK获取资源信息和操作资源,ECS/CVM/E2/UHOST/ECI/BCC执行命令,OSS/COS/S3/BOS管理,RDS/DB管理,域名管理,添加RAM/CAM/IAM账号等
- [awslabs/aws-security-analytics-bootstrap](https://github.com/awslabs/aws-security-analytics-bootstrap) - AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena analysis environment that's quick to deploy, ready to use, and e
- [purabparihar/Web-Application-Pentest-Checklist](https://github.com/purabparihar/Web-Application-Pentest-Checklist) -
- [0voice/campus_recruitmen_questions](https://github.com/0voice/campus_recruitmen_questions) - 2021年最新整理,5000道秋招/提前批/春招/常用面试题(含答案),包括leetcode,校招笔试题,面试题,算法题,语法题。
- [binance/binance-spot-api-docs](https://github.com/binance/binance-spot-api-docs) - Official Documentation for the Binance Spot APIs and Streams
- [TROUBLE-1/Cloud-Pentesting](https://github.com/TROUBLE-1/Cloud-Pentesting) - This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.
- [gh0stkey/Binary-Learning](https://github.com/gh0stkey/Binary-Learning) - 二进制安全相关的学习笔记,感谢滴水逆向的所有老师辛苦教学。
- [FalconForceTeam/FalconFriday](https://github.com/FalconForceTeam/FalconFriday) - Hunting queries and detections
- [xxjwxc/uber_go_guide_cn](https://github.com/xxjwxc/uber_go_guide_cn) - Uber Go 语言编码规范中文版. The Uber Go Style Guide .
- [Ondrik8/byPass_AV](https://github.com/Ondrik8/byPass_AV) -
- [PDWR/3vilMacro](https://github.com/PDWR/3vilMacro) - This is a easy tool for gen VBA code, and bypass most antivirus
- [wsummerhill/C2_RedTeam_CheatSheets](https://github.com/wsummerhill/C2_RedTeam_CheatSheets) - Useful C2 techniques and cheatsheets learned from engagements
- [Green-m/msfvenom-zsh-completion](https://github.com/Green-m/msfvenom-zsh-completion) - zsh completion for msfvenom in Metasploit
- [boy-hack/go-strip](https://github.com/boy-hack/go-strip) - 清除Go编译时自带的信息
- [mzlogin/awesome-adb](https://github.com/mzlogin/awesome-adb) - ADB Usage Complete / ADB 用法大全
- [hhxy/e-message_exp](https://github.com/hhxy/e-message_exp) - e-mesaage <=4.15 后台jar包上传exp
- [adi0x90/attifyos](https://github.com/adi0x90/attifyos) - Attify OS - Distro for pentesting IoT devices
- [TomBener/stay-away-from-wechat](https://github.com/TomBener/stay-away-from-wechat) - 人生苦短,远离微信
- [benjamin-schultz/wow-such-miner](https://github.com/benjamin-schultz/wow-such-miner) - A FPGA Dogecoin Miner
- [ydycjz6j/VICIdial](https://github.com/ydycjz6j/VICIdial) - Concept:
- [emadshanab/admin-login](https://github.com/emadshanab/admin-login) -
- [SCUBSRGroup/Automatic-Exploit-Generation](https://github.com/SCUBSRGroup/Automatic-Exploit-Generation) - Something about AEG
- [emadshanab/Subdomains-brutforce-wordlists-collection](https://github.com/emadshanab/Subdomains-brutforce-wordlists-collection) -
- [emadshanab/Burp-Bounty-free-Profiles-Collection](https://github.com/emadshanab/Burp-Bounty-free-Profiles-Collection) -
- [emadshanab/VOIP-Pentesting-checklist-Cheatsheet-Tools](https://github.com/emadshanab/VOIP-Pentesting-checklist-Cheatsheet-Tools) -
- [yuyan-sec/druid_sessions](https://github.com/yuyan-sec/druid_sessions) - 获取 alibaba druid 一些 sessions , sql , urls
- [salmonx/dictionaries](https://github.com/salmonx/dictionaries) - Fuzzing dictionaries for afl-fuzz/LibFuzzer
- [Ignitetechnologies/Credential-Dumping](https://github.com/Ignitetechnologies/Credential-Dumping) - This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential Access) with examples. There are multiple ways to perform the sa
- [Ph4l4nx/CTF-s-Tools](https://github.com/Ph4l4nx/CTF-s-Tools) - Repository to index useful tools for CTF's
- [MountCloud/JavaDecompileTool-GUI](https://github.com/MountCloud/JavaDecompileTool-GUI) - Java Decompile Tool GUI-JAVA反编译工具(界面版)
- [SofianeHamlaoui/Pentest-Bookmarkz](https://github.com/SofianeHamlaoui/Pentest-Bookmarkz) - A collection of useful links for Pentesters
- [MustafaSky/Guide-to-SSRF](https://github.com/MustafaSky/Guide-to-SSRF) - Guide to SSRF
- [naozibuhao/fofatools](https://github.com/naozibuhao/fofatools) -
- [obreinx/nuceli-templates](https://github.com/obreinx/nuceli-templates) - My Custom made Nuceli-Templates
- [optiv/mobile-nuclei-templates](https://github.com/optiv/mobile-nuclei-templates) -
- [geeknik/the-nuclei-templates](https://github.com/geeknik/the-nuclei-templates) - Nuclei templates written by us.
- [woodpecker-framework/woodpecker-framework-release](https://github.com/woodpecker-framework/woodpecker-framework-release) - 高危漏洞精准检测与深度利用框架
- [Tencent/secguide](https://github.com/Tencent/secguide) - 面向开发人员梳理的代码安全指南
- [dievus/printspoofer](https://github.com/dievus/printspoofer) -
- [eastmountyxz/APT_Digital_Weapon](https://github.com/eastmountyxz/APT_Digital_Weapon) - Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.
- [outflanknl/HelpColor](https://github.com/outflanknl/HelpColor) - Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type
- [stackblitz/webcontainer-core](https://github.com/stackblitz/webcontainer-core) - Dev environments. In your web app.
- [samwcyo/CVE-2021-27651-PoC](https://github.com/samwcyo/CVE-2021-27651-PoC) - RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2
- [digitalarche/OnlineToolsForBlueTeam](https://github.com/digitalarche/OnlineToolsForBlueTeam) - By Categories all online tools for blueteam
- [Securityinbits/cheatsheet](https://github.com/Securityinbits/cheatsheet) - These are some of the commands which I use frequently during Malware Analysis and DFIR.
- [scythe-io/purple-team-exercise-framework](https://github.com/scythe-io/purple-team-exercise-framework) - Purple Team Exercise Framework
- [Ershu1/2021_Hvv](https://github.com/Ershu1/2021_Hvv) - 2021 hw
- [dr0op/shiro-550-with-NoCC](https://github.com/dr0op/shiro-550-with-NoCC) - Shiro-550 不依赖CC链利用工具
- [twseptian/oneliner-bugbounty](https://github.com/twseptian/oneliner-bugbounty) - oneliner commands for bug bounties
- [MinoTauro2020/AndroidBugBounty](https://github.com/MinoTauro2020/AndroidBugBounty) - Find interesting things in APK
- [XTeam-Wing/X-AV](https://github.com/XTeam-Wing/X-AV) - X系列安全工具-AV免杀框架-BypassAV
- [hmaverickadams/External-Pentest-Checklist](https://github.com/hmaverickadams/External-Pentest-Checklist) -
- [halencarjunior/BugBuntu](https://github.com/halencarjunior/BugBuntu) - BugBuntu Linux
- [BushidoUK/CTI-Lexicon](https://github.com/BushidoUK/CTI-Lexicon) - Dictionary of CTI-related acronyms, terms, and jargon
- [haidragon/study_Android_Mchange](https://github.com/haidragon/study_Android_Mchange) - android 系统定制(魔改)
- [nnjun/BlackBox](https://github.com/nnjun/BlackBox) - 黑盒BlackBox,是一款虚拟引擎,支持5.0~12.0,可以在Android上克隆、运行虚拟应用,拥有免安装运行能力,已集成Xposed框架。黑盒可以掌控被运行的虚拟应用,做任何想做的事情。
- [JeremyBlackthorne/Ghidra-Keybindings](https://github.com/JeremyBlackthorne/Ghidra-Keybindings) -
- [XTeam-Wing/Hunting-Active-Directory](https://github.com/XTeam-Wing/Hunting-Active-Directory) - 个人整理的一些域渗透Tricks,可能有一些错误。
- [GetRektBoy724/MeterPwrShell](https://github.com/GetRektBoy724/MeterPwrShell) - Automated Tool That Generates The Perfect Meterpreter Powershell Payload
- [BBerastegui/fresh-dns-servers](https://github.com/BBerastegui/fresh-dns-servers) - Fresh DNS servers
- [Kevin-Robertson/InveighZero](https://github.com/Kevin-Robertson/InveighZero) - .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers
- [MoisesTapia/TWAPT](https://github.com/MoisesTapia/TWAPT) - Deploy your own lab of web application penetration testing with docker and docker-compose, webgoat, dvwap, bwapp and Juice Shop
- [ehsaanqazi/Bug-Bounty](https://github.com/ehsaanqazi/Bug-Bounty) - Resources and Guides for Web Application Vulnerabilities
- [cujanovic/Markdown-XSS-Payloads](https://github.com/cujanovic/Markdown-XSS-Payloads) - XSS payloads for exploiting Markdown syntax
- [r0eXpeR/pentest](https://github.com/r0eXpeR/pentest) - 内网渗透中的一些工具及项目资料
- [hslatman/awesome-threat-intelligence](https://github.com/hslatman/awesome-threat-intelligence) - A curated list of Awesome Threat Intelligence resources
- [Richard-Tang/x1DecoderPlus](https://github.com/Richard-Tang/x1DecoderPlus) - AntSword(蚁剑)全参数流量XOR和Base64加伪装WebShell
- [EXHades/CyberSpaceSearchEngine-Research](https://github.com/EXHades/CyberSpaceSearchEngine-Research) - 网络空间测绘/搜索引擎相关的资料
- [maxandersen/internet-monitoring](https://github.com/maxandersen/internet-monitoring) - Monitor your network and internet speed with Docker & Prometheus
- [timwhitez/Doge-Defense-Evasion-Ref](https://github.com/timwhitez/Doge-Defense-Evasion-Ref) - Defense Evasion & Bypass AntiVirus reference
- [Airboi/bypass-av-note](https://github.com/Airboi/bypass-av-note) - 免杀技术大杂烩---乱拳也打不死老师傅
- [ftpmorph/ftprivacy](https://github.com/ftpmorph/ftprivacy) - A collection of ad block lists for Pi Hole, AdGuard Home, pfBlockerNG, uBlock Origin, and more... - https://ftprivacy.cloud
- [dsopas/MindAPI](https://github.com/dsopas/MindAPI) - Organize your API security assessment by using MindAPI. It's free and open for community collaboration.
- [aahmad097/ZoomPersistence](https://github.com/aahmad097/ZoomPersistence) - Zoom Persistence Aggressor and Handler
- [HolyBugx/HolyTips](https://github.com/HolyBugx/HolyTips) - A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.
- [Lotlab/Lot60-BLE-Keyboard](https://github.com/Lotlab/Lot60-BLE-Keyboard) - A 60% bluetooth keyboard (Hardware)
- [onceupon/Bash-Oneliner](https://github.com/onceupon/Bash-Oneliner) - A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.
- [dustyfresh/PHP-vulnerability-audit-cheatsheet](https://github.com/dustyfresh/PHP-vulnerability-audit-cheatsheet) - This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabilities you generally find with that function.
- [eastmountyxz/CSDNBlog-Security-Based](https://github.com/eastmountyxz/CSDNBlog-Security-Based) - 为了更好地管理博客文章,分享更好的知识,该系列资源为作者CSDN博客的备份文件。本资源为网络安全自学篇,包括作者安全工具利用、Web渗透、系统安全、CVE漏洞复现、安全论文及会议等知识,希望对您有所帮助!一起加油。
- [harsh-bothra/Security-Talks-Slides](https://github.com/harsh-bothra/Security-Talks-Slides) - This repository contains all the Talk slides that I have given at various security conferences, events & meetups.
- [YinWC/Security_Learning](https://github.com/YinWC/Security_Learning) - Security Learning For All~
- [ruanbekker/ansible-docker-swarm](https://github.com/ruanbekker/ansible-docker-swarm) - Initialize Docker Swarm with Ansible
- [lokles/Web-Development-Interview-With-Java](https://github.com/lokles/Web-Development-Interview-With-Java) - Java 开发相关技术栈(大中厂)高频面试问题收录。
- [w2n1ck/vulwiki](https://github.com/w2n1ck/vulwiki) - 常见漏洞知识库文档
- [shifa123/bugbountyDorks](https://github.com/shifa123/bugbountyDorks) - This repo contains all the Bug Bounty Dorks sourced from different awesome sources and compiled at one place
- [kuchin/awesome-cto](https://github.com/kuchin/awesome-cto) - A curated and opinionated list of resources for Chief Technology Officers, with the emphasis on startups
- [FuzzySecurity/AzureWireGuard](https://github.com/FuzzySecurity/AzureWireGuard) - Automated WireGuard Deployment on Azure
- [taojintianxia/github-bookmark](https://github.com/taojintianxia/github-bookmark) - 收集了Github上的优秀工具,框架,知识合集
- [broken5/bscan](https://github.com/broken5/bscan) -
- [WilliamL71Oi/FOFA_PRO_GUI](https://github.com/WilliamL71Oi/FOFA_PRO_GUI) - 用python做的十分好用且强大的FOFA的GUI版本,原创版本,点个star,谢谢支持
- [TheCrysp/Gitty](https://github.com/TheCrysp/Gitty) -
- [xalgord/Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes](https://github.com/xalgord/Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes) -
- [waylau/git-for-win](https://github.com/waylau/git-for-win) - Git for Windows. 国内直接从官网下载比较困难,需要翻墙。这里提供一个国内的下载站,方便网友下载
- [blockthreat/blocksec-ctfs](https://github.com/blockthreat/blocksec-ctfs) - A curated list of blockchain security Capture the Flag (CTF) competitions
- [PalindromeLabs/Java-Deserialization-CVEs](https://github.com/PalindromeLabs/Java-Deserialization-CVEs) - Compiled dataset of Java deserialization CVEs
- [biws-byte/pdf](https://github.com/biws-byte/pdf) - 上传资料文档
- [evets007/OSCP-Prep-cheatsheet](https://github.com/evets007/OSCP-Prep-cheatsheet) -
- [sourceincite/CVE-2021-26121](https://github.com/sourceincite/CVE-2021-26121) -
- [KathanP19/OpenBB-Scope](https://github.com/KathanP19/OpenBB-Scope) - OpenBugBounty - https://www.openbugbounty.org/ programs list
- [TeraSecTeam/ary](https://github.com/TeraSecTeam/ary) - Ary 是一个集成类工具,主要用于调用各种安全工具,从而形成便捷的一键式渗透。
- [boh/RedCsharp](https://github.com/boh/RedCsharp) - Collection of C# projects. Useful for pentesting and redteaming.
- [bin-maker/BYPASS-CDN](https://github.com/bin-maker/BYPASS-CDN) -
- [zhengmin1989/POP_AND_PUSH](https://github.com/zhengmin1989/POP_AND_PUSH) - A collection of POP exploits.
- [ethicalhackingplayground/recon_db_scripts](https://github.com/ethicalhackingplayground/recon_db_scripts) - Creating a Database for Mass Recon
- [k8gege/KaliLadon](https://github.com/k8gege/KaliLadon) - Ladon for Linux (Kali), Large Network Penetration Scanner, vulnerability / exploit / detection / MS17010 / password
- [harsh-bothra/learn365](https://github.com/harsh-bothra/learn365) - This repository is about @harshbothra_'s 365 days of Learning Tweets & Mindmaps collection.
- [e11i0t4lders0n/SAML-SSO](https://github.com/e11i0t4lders0n/SAML-SSO) -
- [Ignitetechnologies/bugbounty](https://github.com/Ignitetechnologies/bugbounty) -
- [TheBinitGhimire/GitHub-Recon](https://github.com/TheBinitGhimire/GitHub-Recon) - GitHub Recon — and what you can achieve with it!
- [novanazizr/10-Reset-Password-Flaws](https://github.com/novanazizr/10-Reset-Password-Flaws) - 10 Reset Password Flaws Based on Web Application Security
- [crisxuan/bestJavaer](https://github.com/crisxuan/bestJavaer) - 这是一个成为更好的Java程序员的系列教程
- [marcosValle/awesome-windows-red-team](https://github.com/marcosValle/awesome-windows-red-team) - A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams
- [Jewel591/Vulnerability-Summary](https://github.com/Jewel591/Vulnerability-Summary) - 常见漏洞描述、漏洞影响及修复建议,为规范的渗透测试报告提供参考 | Common vulnerability descriptions, vulnerability impacts and remediation recommendations for standardized penetration testing reports
- [MyKings/security-study-tutorial](https://github.com/MyKings/security-study-tutorial) - Summary of online learning materials
- [lutfumertceylan/top25-parameter](https://github.com/lutfumertceylan/top25-parameter) - For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙
- [Al1ex/CVE-2020-13937](https://github.com/Al1ex/CVE-2020-13937) - Apache Kylin API Unauthorized Access
- [Tas9er/RedisSSHKey](https://github.com/Tas9er/RedisSSHKey) - Code By:Tas9er / Redis未授权SSH协议公钥写入漏洞验证
- [WillOram/cyber-incident-management](https://github.com/WillOram/cyber-incident-management) - Notes on managing and coordinating the response to major cyber incidents
- [aws-samples/aws-incident-response-playbooks](https://github.com/aws-samples/aws-incident-response-playbooks) -
- [tamimhasan404/Nmap-Cheat-Sheet](https://github.com/tamimhasan404/Nmap-Cheat-Sheet) - Here I am trying to show you some cheat-sheet of nmap. Which may help you on penetration testing and bug hunting.
- [SnollyG0st3r/android-security-awesome](https://github.com/SnollyG0st3r/android-security-awesome) - A collection of android security related resources
- [SnollyG0st3r/android_app_security_checklist](https://github.com/SnollyG0st3r/android_app_security_checklist) - Android App Security Checklist
- [997509/pentest-mobile-cheatsheet](https://github.com/997509/pentest-mobile-cheatsheet) - The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
- [kyawthiha7/Mobile-App-Pentest](https://github.com/kyawthiha7/Mobile-App-Pentest) -
- [w0lfzhang/some_nday_bugs](https://github.com/w0lfzhang/some_nday_bugs) -
- [TheMRLL/WinXray](https://github.com/TheMRLL/WinXray) - 支持Xray / V2Ray(vmess / vless),Shadowsocks,SSR,Trojan,NaïveProxy,Trojan-go通用客户端(Windows)!默认基于xray核心!本程序采用aardio设计与开发!
- [Qftm/Information_Collection_Handbook](https://github.com/Qftm/Information_Collection_Handbook) - Handbook of information collection for penetration testing and src
- [iamthefrogy/Web-Application-Pentest-Checklist](https://github.com/iamthefrogy/Web-Application-Pentest-Checklist) - This is one of the largest checklist available so far on the Internet.
- [chriskaliX/AD-Pentest-Notes](https://github.com/chriskaliX/AD-Pentest-Notes) - 用于记录内网渗透(域渗透)学习 :-)
- [bg6cq/ITTS](https://github.com/bg6cq/ITTS) - Campus IT Technical Specifications
- [mr-r3b00t/CVE-2021-3156](https://github.com/mr-r3b00t/CVE-2021-3156) -
- [novanazizr/BugBountyHunting](https://github.com/novanazizr/BugBountyHunting) - Some Tutorials and Things to Help Bug Hunter
- [ClownQq/YDArk](https://github.com/ClownQq/YDArk) - X64内核小工具
- [k-lazarev/joplin-ctf-template](https://github.com/k-lazarev/joplin-ctf-template) - Joplin template for CTF events / OSCP labs & exam
- [WinkoErades/Joplin-note-taking-templates](https://github.com/WinkoErades/Joplin-note-taking-templates) - Joplin note taking templates
- [tess-ss/writeups](https://github.com/tess-ss/writeups) -
- [dubey-amit/Web-Cheatsheet](https://github.com/dubey-amit/Web-Cheatsheet) - Vulnerability Cheatsheet
- [ffffffff0x/Pentest101](https://github.com/ffffffff0x/Pentest101) - 一些关于渗透测试的Tips
- [Power7089/PenetrationTest-Tips](https://github.com/Power7089/PenetrationTest-Tips) - 渗透测试,渗透测试小技巧,渗透测试Tips,师傅们跟我一起维护更新吧~
- [dloss/python-pentest-tools](https://github.com/dloss/python-pentest-tools) - Python tools for penetration testers
- [mrtouch93/awesome-security-feed](https://github.com/mrtouch93/awesome-security-feed) - A semi-curated list of Security Feeds
- [security-cheatsheet/metasploit-cheat-sheet](https://github.com/security-cheatsheet/metasploit-cheat-sheet) - Metasploit Cheat Sheet 💣
- [outflanknl/FindObjects-BOF](https://github.com/outflanknl/FindObjects-BOF) - A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or process handles.
- [cqsd/daily-commonspeak2](https://github.com/cqsd/daily-commonspeak2) - commonspeak2 subdomains wordlist generated daily **DEPRECATED** The author(s) of commonspeak2 maintain an official repo with more lists. Please use it instead: https://github.com/assetnote/wordlists
- [GrapheneOS/platform_manifest](https://github.com/GrapheneOS/platform_manifest) - Repo manifest for the GrapheneOS mobile privacy and security hardening project.
- [Malayke/nofingerprint](https://github.com/Malayke/nofingerprint) - remove common pentest tools fingerprint
- [ayoubfathi/leaky-paths](https://github.com/ayoubfathi/leaky-paths) - A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to sca
- [httpvoid/writeups](https://github.com/httpvoid/writeups) -
- [sbousseaden/macOS-ATTACK-DATASET](https://github.com/sbousseaden/macOS-ATTACK-DATASET) - JSON DataSet for macOS mapped to MITRE ATT&CK Tactics.
- [assetnote/blind-ssrf-chains](https://github.com/assetnote/blind-ssrf-chains) - An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability
- [coder2gwy/coder2gwy](https://github.com/coder2gwy/coder2gwy) - 互联网首份程序员考公指南,由3位已经进入体制内的前大厂程序员联合献上。
- [Al1ex/CVE-2020-36179](https://github.com/Al1ex/CVE-2020-36179) - CVE-2020-36179~82 Jackson-databind SSRF&RCE
- [418sec/huntr](https://github.com/418sec/huntr) - Public Roadmap | huntr.dev
- [Adminisme/SharpRDPLog](https://github.com/Adminisme/SharpRDPLog) - Windows rdp相关的登录记录导出工具,可用于后渗透中Windows服务器的信息收集阶段。输出内容包括:本地rdp端口、mstsc缓存、cmdkey缓存、登录成功、失败日志事件。
- [R0X4R/D4rkXSS](https://github.com/R0X4R/D4rkXSS) - A list of useful payloads and Bypass for Web Application Security and Bug Bounty/CTF
- [ch1nghz/CVE-2020-11851](https://github.com/ch1nghz/CVE-2020-11851) - Remote Code Execution vulnerability on ArcSight Logger
- [aceld/golang](https://github.com/aceld/golang) - 《Golang修养之路》本书针对Golang专题性热门技术深入理解,修养在Golang领域深入话题,脱胎换骨。
- [sjsdfg/effective-java-3rd-chinese](https://github.com/sjsdfg/effective-java-3rd-chinese) -
- [uzzzval/CVE-2020-17530](https://github.com/uzzzval/CVE-2020-17530) -
- [BrodieInfoSec/Gift](https://github.com/BrodieInfoSec/Gift) -
- [thunderbarca/Caesar](https://github.com/thunderbarca/Caesar) - 一个全新的敏感文件发现工具
- [Quikko/Recon-Methodology](https://github.com/Quikko/Recon-Methodology) - Recon Methodology
- [TeraSecTeam/poc-collection](https://github.com/TeraSecTeam/poc-collection) - poc-collection 是对 github 上公开的 PoC 进行收集的一个项目。
- [MichaelKoczwara/Awesome-CobaltStrike-Defence](https://github.com/MichaelKoczwara/Awesome-CobaltStrike-Defence) - Defences against Cobalt Strike
- [cpuu/awesome-fuzzing](https://github.com/cpuu/awesome-fuzzing) - A curated list of awesome Fuzzing(or Fuzz Testing) for software security
- [FunnyWolf/Viper](https://github.com/FunnyWolf/Viper) - Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
- [Al1ex/CVE-2020-35728](https://github.com/Al1ex/CVE-2020-35728) - CVE-2020-35728 & Jackson-databind RCE
- [xiaolai/spreadsheets-for-investors](https://github.com/xiaolai/spreadsheets-for-investors) - 投资人必会知识 —— 电子表格简明进阶教程
- [afatcoder/LeetcodeTop](https://github.com/afatcoder/LeetcodeTop) - 汇总各大互联网公司容易考察的高频leetcode题🔥
- [attacker-codeninja/100DaysToLearnandImprove](https://github.com/attacker-codeninja/100DaysToLearnandImprove) - My notes of Day1 Day2 will be posted here as journey
- [RangerNJU/Static-Program-Analysis-Book](https://github.com/RangerNJU/Static-Program-Analysis-Book) - Getting started with static program analysis. 静态程序分析入门教程。
- [outflanknl/WdToggle](https://github.com/outflanknl/WdToggle) - A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.
- [chenjj/Awesome-HTTPRequestSmuggling](https://github.com/chenjj/Awesome-HTTPRequestSmuggling) - A curated list of awesome blogs and tools about HTTP request smuggling attacks. Feel free to contribute! 🍻
- [birdbee44/Resources](https://github.com/birdbee44/Resources) -
- [Proteas/apple-cve](https://github.com/Proteas/apple-cve) - apple cve list
- [jas502n/CVE-2020-17008](https://github.com/jas502n/CVE-2020-17008) - CVE-2020-17008 splWOW64 Elevation of Privilege
- [attacker-codeninja/AllThingsBugHunting](https://github.com/attacker-codeninja/AllThingsBugHunting) -
- [xfiftyone/xTools](https://github.com/xfiftyone/xTools) - xTools,一个辅助小工具
- [gobysec/GobyExtension](https://github.com/gobysec/GobyExtension) - Goby extension doc.
- [tigerszk/aws_sec_traning](https://github.com/tigerszk/aws_sec_traning) -
- [frostbits-security/MITM-cheatsheet](https://github.com/frostbits-security/MITM-cheatsheet) - All MITM attacks in one place.
- [IQTLabs/software-supply-chain-compromises](https://github.com/IQTLabs/software-supply-chain-compromises) - A dataset of software supply chain compromises. Please help us maintain it!
- [cedowens/C2-JARM](https://github.com/cedowens/C2-JARM) - A list of JARM hashes for different ssl implementations used by some C2/red team tools.
- [RASSec/burpsuite-plugins-notes](https://github.com/RASSec/burpsuite-plugins-notes) -
- [RedDrip7/APT_Digital_Weapon](https://github.com/RedDrip7/APT_Digital_Weapon) - Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.
- [doubleee/WebFuzzing](https://github.com/doubleee/WebFuzzing) - 自用字典,收集实战中遇到的奇特目录名、后门文件名等。不定期更新!
- [qigpig/bypass-beacon-config-scan](https://github.com/qigpig/bypass-beacon-config-scan) - Bypass cobaltstrike beacon config scan
- [cypher3107/GF-Patterns](https://github.com/cypher3107/GF-Patterns) -
- [Matir/gf-patterns](https://github.com/Matir/gf-patterns) -
- [r00tkie/grep-pattern](https://github.com/r00tkie/grep-pattern) - collection of various grep patterns collected from tomnomnom/gf and other places
- [bp0lr/myGF_patterns](https://github.com/bp0lr/myGF_patterns) -
- [bfuzzy/auditd-attack](https://github.com/bfuzzy/auditd-attack) - A Linux Auditd rule set mapped to MITRE's Attack Framework
- [oskarsve/ms-teams-rce](https://github.com/oskarsve/ms-teams-rce) -
- [r0eXpeR/redteam_vul](https://github.com/r0eXpeR/redteam_vul) - 红队作战中比较常遇到的一些重点系统漏洞整理。
- [doyensec/awesome-electronjs-hacking](https://github.com/doyensec/awesome-electronjs-hacking) - A curated list of awesome resources about Electron.js (in)security
- [Nanguage/Rainbow-Fart-MBG](https://github.com/Nanguage/Rainbow-Fart-MBG) - 程序员要讲码德,耗子尾汁,好好反思!
- [Ignitetechnologies/Web-Application-Cheatsheet](https://github.com/Ignitetechnologies/Web-Application-Cheatsheet) - This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.
- [devsecops/awesome-devsecops](https://github.com/devsecops/awesome-devsecops) - An authoritative list of awesome devsecops tools with the help from community experiments and contributions.
- [ghsec/webHunt](https://github.com/ghsec/webHunt) - Web App bug hunting
- [secoba/SomePubRegex](https://github.com/secoba/SomePubRegex) - Some useful regexes
- [StyraInc/awesome-opa](https://github.com/StyraInc/awesome-opa) - A curated list of OPA related tools, frameworks and articles
- [amrandazz/attack-guardduty-navigator](https://github.com/amrandazz/attack-guardduty-navigator) - A MITRE ATT&CK Navigator export for AWS GuardDuty Findings
- [ptswarm/ptswarm-twitter](https://github.com/ptswarm/ptswarm-twitter) -
- [Y000o/Sql_injection_medium-advanced.md](https://github.com/Y000o/Sql_injection_medium-advanced.md) -
- [mark0smith/Kunlun-M-GUI](https://github.com/mark0smith/Kunlun-M-GUI) - Kunlun-M 的GUI程序
- [kallydev/privacy](https://github.com/kallydev/privacy) - 个人隐私泄露检测工具。
- [ChandlerBang/awesome-graph-attack-papers](https://github.com/ChandlerBang/awesome-graph-attack-papers) - Adversarial attacks and defenses on Graph Neural Networks.
- [disclose/resources](https://github.com/disclose/resources) - Tools, data, and contact lists relevant to The disclose.io Project.
- [msaponja/Manual](https://github.com/msaponja/Manual) - The project is based on Ben Clark's book: Red Team Field Manual.
- [0x90n/InfoSec-Black-Friday](https://github.com/0x90n/InfoSec-Black-Friday) - All the deals for InfoSec related software/tools this Black Friday
- [pingfangx/jetbrains-in-chinese](https://github.com/pingfangx/jetbrains-in-chinese) - JetBrains 系列软件汉化包 关键字: Android Studio 3.5 汉化包 CLion 2019.3 汉化包 DataGrip 2019.3 汉化包 GoLand 2019.3 汉化包 IntelliJ IDEA 2019.3 汉化包 PhpStorm 2019.3 汉化包 PyCharm 2019.3 汉化包 Rider 2019.3 汉化包 RubyMine 2019.3 汉化
- [mitre/advmlthreatmatrix](https://github.com/mitre/advmlthreatmatrix) - Adversarial Threat Landscape for AI Systems
- [joker2a/OSCP](https://github.com/joker2a/OSCP) - OSCP cheatsheet
- [push0ebp/sig-database](https://github.com/push0ebp/sig-database) - IDA FLIRT Signature Database
- [ziadoz/awesome-php](https://github.com/ziadoz/awesome-php) - A curated list of amazingly awesome PHP libraries, resources and shiny things.
- [driverCzn/Glibc-source-browser](https://github.com/driverCzn/Glibc-source-browser) - Multi-version glibc source browser based on code.woboq.org 's product.
- [0voice/expert_readed_books](https://github.com/0voice/expert_readed_books) - 2021年最新总结,推荐工程师合适读本,计算机科学,软件技术,创业,思想类,数学类,人物传记书籍
- [zer0yu/RedTeam_CheetSheets](https://github.com/zer0yu/RedTeam_CheetSheets) - RedTeam参考,修改自Ridter的https://github.com/Ridter/Intranet_Penetration_Tips
- [hausec/Bloodhound-Custom-Queries](https://github.com/hausec/Bloodhound-Custom-Queries) - Custom Query list for the Bloodhound GUI based off my cheatsheet
- [cyber-research/APTMalware](https://github.com/cyber-research/APTMalware) - APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples
- [whitespots/fast-security-scanners](https://github.com/whitespots/fast-security-scanners) - Security checks for your researches
- [CTF-MissFeng/nmaps](https://github.com/CTF-MissFeng/nmaps) - 采用Golang编写的新一代端口及指纹扫描器
- [dgryski/awesome-go-style](https://github.com/dgryski/awesome-go-style) - A collection of Go style guides
- [kdeldycke/awesome-iam](https://github.com/kdeldycke/awesome-iam) - 👤 Identity and Access Management knowledge for cloud platforms
- [OlivierLaflamme/Cheatsheet-God](https://github.com/OlivierLaflamme/Cheatsheet-God) - Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
- [Ignitetechnologies/BurpSuite-For-Pentester](https://github.com/Ignitetechnologies/BurpSuite-For-Pentester) - This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 solely and completely with "BurpSuite".
- [c0rdis/security-champions-playbook](https://github.com/c0rdis/security-champions-playbook) - Security Champions Playbook v 2.1
- [ReconInfoSec/rhq](https://github.com/ReconInfoSec/rhq) - Recon Hunt Queries
- [VillanCh/palm-kit-desktop](https://github.com/VillanCh/palm-kit-desktop) - 发布 palm-kit 桌面版
- [blanboom/awesome-home-networking-cn](https://github.com/blanboom/awesome-home-networking-cn) - 家庭网络知识整理
- [ManuZhu0728/Windows-Terminal-beautify](https://github.com/ManuZhu0728/Windows-Terminal-beautify) - Windows Terminal美化教程
- [PolarisLab/AESGFIC](https://github.com/PolarisLab/AESGFIC) - 互联网企业安全高级指南读书笔记脑图 - http://www.mottoin.com/95816.html & http://www.mottoin.com/95828.html Author:hblf@MottoIN Team
- [irsl/apache-openoffice-rce-via-uno-links](https://github.com/irsl/apache-openoffice-rce-via-uno-links) -
- [saeidshirazi/awesome-android-security](https://github.com/saeidshirazi/awesome-android-security) - A curated list of Android Security materials and resources For Pentesters and Bug Hunters
- [JnuSimba/AndroidSecNotes](https://github.com/JnuSimba/AndroidSecNotes) - some learning notes about Android Security
- [uknowsec/TailorScan](https://github.com/uknowsec/TailorScan) - 自用缝合怪内网扫描器,支持端口扫描,识别服务,获取title,扫描多网卡,ms17010扫描,icmp存活探测。
- [jas502n/database-jasypt](https://github.com/jas502n/database-jasypt) - jasypt Decrypt Encrypt
- [jas502n/oracleShell](https://github.com/jas502n/oracleShell) - oracle 数据库命令执行
- [anhkgg/anhkgg-tools](https://github.com/anhkgg/anhkgg-tools) - Anhkgg's Tools
- [WinMin/Protocol-Vul](https://github.com/WinMin/Protocol-Vul) - Some Vulnerability in the some protocol are collected.
- [Virdoexhunter/OneLinerBashrcCommands](https://github.com/Virdoexhunter/OneLinerBashrcCommands) -
- [zodiacon/AllTools](https://github.com/zodiacon/AllTools) - All reasonably stable tools
- [HackerYunen/CTFWPS](https://github.com/HackerYunen/CTFWPS) - All the writeups of www.ctfwp.com
- [resumejob/interview-questions](https://github.com/resumejob/interview-questions) - Interview Questions for Google, Amazon, Apple, etc. 根据超过 2000 篇真实面经整理的腾讯,阿里,字节跳动,Shopee,美团,滴滴高频面试题
- [kongsec/Wordpress-BruteForce-List](https://github.com/kongsec/Wordpress-BruteForce-List) - WordPress Bruteforce List, Default paths and endpoints
- [hellodword/wechat-feeds](https://github.com/hellodword/wechat-feeds) - [已停止服务] 给微信公众号生成 RSS 订阅源
- [xiaokanghub/Android](https://github.com/xiaokanghub/Android) - Android 加固应用Hook方式-Frida
- [Purp1eW0lf/HackTheBoxWriteups](https://github.com/Purp1eW0lf/HackTheBoxWriteups) - Writeups for the machines on ethical hacking site Hack the Box
- [Neo23x0/vti-dorks](https://github.com/Neo23x0/vti-dorks) - Awesome VirusTotal Intelligence Search Queries
- [KingFalse/ojdk](https://github.com/KingFalse/ojdk) - 最新的JDK国内下载地址
- [wcventure/FuzzingPaper](https://github.com/wcventure/FuzzingPaper) - Recent Fuzzing Paper
- [mahavivo/english-wordlists](https://github.com/mahavivo/english-wordlists) - 常用英语词汇表
- [six2dez/pentest-book](https://github.com/six2dez/pentest-book) -
- [nil0x42/awesome-hacker-note-taking](https://github.com/nil0x42/awesome-hacker-note-taking) - Awesome note-taking apps for hackers & pentesters !
- [k8gege/PasswordDic](https://github.com/k8gege/PasswordDic) - 2011-2019年Top100弱口令密码字典 Top1000密码字典 服务器SSH/VPS密码字典 后台管理密码字典 数据库密码字典 子域名字典
- [gtworek/Priv2Admin](https://github.com/gtworek/Priv2Admin) - Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
- [taielab/Taie-Bugbounty-killer](https://github.com/taielab/Taie-Bugbounty-killer) - 挖掘国内外漏洞平台必备的自动化捡钱赏金技巧,看了并去做了捡钱如喝水。
- [mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet](https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet) - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
- [aleenzz/php_bug_wiki](https://github.com/aleenzz/php_bug_wiki) - 代码审计相关的一些知识
- [Y000o/Payloads_xss_sql_bypass](https://github.com/Y000o/Payloads_xss_sql_bypass) -
- [0neb1n/CVE-2020-16947](https://github.com/0neb1n/CVE-2020-16947) - PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)
- [JakobTheDev/awesome-devsecops](https://github.com/JakobTheDev/awesome-devsecops) - Curating the best DevSecOps resources and tooling.
- [Imanfeng/Apache-Solr-RCE](https://github.com/Imanfeng/Apache-Solr-RCE) - Apache Solr Exploits 🌟
- [foryujian/yujianportscan](https://github.com/foryujian/yujianportscan) - 一个基于VB.NET + IOCP模型开发的高效端口扫描工具,支持IP区间合并,端口区间合并,端口指纹深度探测
- [pyn3rd/my-presentation-slide](https://github.com/pyn3rd/my-presentation-slide) -
- [RabiAPI/RabiAPI-Support](https://github.com/RabiAPI/RabiAPI-Support) - RabiAPI是一个开箱即用的Java接口文档生成工具,界面美观易用,支持多种框架注解。
- [Fawadkhanfk/Hunting-Tips](https://github.com/Fawadkhanfk/Hunting-Tips) - Tips For Bug Bounty Hunters
- [cvebase/cvebase.com](https://github.com/cvebase/cvebase.com) - cvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
- [decoder-it/whoami-priv-Hackinparis2019](https://github.com/decoder-it/whoami-priv-Hackinparis2019) - Slides from my talk in "Hackinparis" 2019 edition
- [jas502n/Flink_RCE](https://github.com/jas502n/Flink_RCE) - Apache Flink Web Dashboard 未授权访问,上传恶意jar导致远程代码命令执行
- [dr0op/CrossC2](https://github.com/dr0op/CrossC2) - generate CobaltStrike's cross-platform payload
- [jas502n/BurpSuite-icns](https://github.com/jas502n/BurpSuite-icns) - 制作BurpSuite icns 在Mac OS上
- [droberson/rtfm](https://github.com/droberson/rtfm) - Cheat sheet and notes inspired by the book RTFM - Red Team Field Manual
- [L1ves/windows-pentesting-resources](https://github.com/L1ves/windows-pentesting-resources) -
- [chennylmf/OWASP-Web-App-Pentesting-checklists](https://github.com/chennylmf/OWASP-Web-App-Pentesting-checklists) -
- [cranelab/webapp-tech](https://github.com/cranelab/webapp-tech) -
- [ahmetumitbayram/kortto-admin-panel-finder-bypasser](https://github.com/ahmetumitbayram/kortto-admin-panel-finder-bypasser) -
- [jas502n/Jboss_JMXInvokerServlet_Deserialization_RCE](https://github.com/jas502n/Jboss_JMXInvokerServlet_Deserialization_RCE) - Jboss_JMXInvokerServlet_Deserialization_RCE
- [jas502n/JWT_Brute](https://github.com/jas502n/JWT_Brute) - JWT_Brute
- [Ascotbe/HackerMind](https://github.com/Ascotbe/HackerMind) - 各种安全相关思维导图整理收集。渗透步骤,web安全,CTF,业务安全,人工智能,区块链安全,数据安全,安全开发,无线安全,社会工程学,二进制安全,移动安全,红蓝对抗,运维安全,风控安全,linux安全
- [Flangvik/SharpCollection](https://github.com/Flangvik/SharpCollection) - Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
- [jcesarstef/ghhdb-Github-Hacking-Database](https://github.com/jcesarstef/ghhdb-Github-Hacking-Database) - Github Hacking Database - My personal collection of Github Dorks to search for Confidential Information (Yes, it's a Github version of Google Dorks)
- [oracle/oraclejet](https://github.com/oracle/oraclejet) - Oracle JET is a modular JavaScript Extension Toolkit for developers working on client-side applications.
- [oskarkrawczyk/honukai-iterm-zsh](https://github.com/oskarkrawczyk/honukai-iterm-zsh) - Honukai theme and colors for Oh My ZSH and iTerm
- [LGBT-CN/LGBTQIA-In-China](https://github.com/LGBT-CN/LGBTQIA-In-China) - 🏳️🌈 中国的性少数群体一直渴望着自由平等
- [RASSec/Subdomain-Enumaration](https://github.com/RASSec/Subdomain-Enumaration) -
- [foryujian/yjdirscan](https://github.com/foryujian/yjdirscan) - 御剑目录扫描专业版,简单实用的命令行网站目录扫描工具,支持爬虫、fuzz、自定义字典、字典变量、UA修改、假404自动过滤、扫描控速等功能。
- [sillydadddy/huge-list-probed-BB-subdomains](https://github.com/sillydadddy/huge-list-probed-BB-subdomains) - List of nearly 7 lakhs subdomains in scope probed using httpx to feed to nuclei
- [random-robbie/rb-recon](https://github.com/random-robbie/rb-recon) -
- [paulmillr/encrypted-dns](https://github.com/paulmillr/encrypted-dns) - DNS over HTTPS config profiles for iOS & macOS
- [xairy/vmware-exploitation](https://github.com/xairy/vmware-exploitation) - A collection of links related to VMware escape exploits
- [facyber/awesome-networking](https://github.com/facyber/awesome-networking) - A collection of awesome networking courses, books, tutorials and other resources
- [tprynn/web-methodology](https://github.com/tprynn/web-methodology) - Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki
- [dark-warlord14/crt.sh-one-liner](https://github.com/dark-warlord14/crt.sh-one-liner) - Updated crt.sh one liner to get subdomains
- [fupinglee/JavaTools](https://github.com/fupinglee/JavaTools) - 一些Java编写的小工具。
- [JavierOlmedo/UltimateCMSWordlists](https://github.com/JavierOlmedo/UltimateCMSWordlists) - 📚 An ultimate collection wordlists of the best-known CMS
- [Swordfish-Security/awesome-devsecops-russia](https://github.com/Swordfish-Security/awesome-devsecops-russia) - Awesome DevSecOps на русском языке
- [mxm0z/awesome-sec-s3](https://github.com/mxm0z/awesome-sec-s3) - A collection of awesome AWS S3 tools that collects and enumerates exposed S3 buckets
- [ghsec/ghsec-jaeles-signatures](https://github.com/ghsec/ghsec-jaeles-signatures) - Signatures for jaeles scanner by @j3ssie
- [RogueSMG/PrivEscCon-Slides](https://github.com/RogueSMG/PrivEscCon-Slides) - Slide Deck I presented at PrivEscCon Webinar
- [gitrobtest/Java-Security](https://github.com/gitrobtest/Java-Security) - Java Security Documents
- [S3cur3Th1sSh1t/Amsi-Bypass-Powershell](https://github.com/S3cur3Th1sSh1t/Amsi-Bypass-Powershell) - This repo contains some Amsi Bypass methods i found on different Blog Posts.
- [1c3z/fileleak](https://github.com/1c3z/fileleak) - 又一款敏感文件泄漏检测工具
- [Sajibekanti/Bug_Bounty_List](https://github.com/Sajibekanti/Bug_Bounty_List) - Day by day Lots of Newbie Come into bug Bounty They ask Social Site about Bug Bounty Site, So That's why I open My Hunted All Site.
- [cwkiller/Pentest_Dic](https://github.com/cwkiller/Pentest_Dic) - 自己收集整理自用的字典
- [0xtz/Enum_For_All](https://github.com/0xtz/Enum_For_All) -
- [balgan/binaryedge-cheatsheet](https://github.com/balgan/binaryedge-cheatsheet) - A list of queries and actions that I repeat over and over again
- [7hang/--Java](https://github.com/7hang/--Java) - 代码审计知识点整理-Java
- [deyaaahmed/light-map](https://github.com/deyaaahmed/light-map) - A light-map tool is used to hack any website affected by sql and XSS exploit,light-map has many websites there are affected by sql and XSS exploit, and it have a sqlmap tool,you can download and insta
- [correlatedsecurity/Awesome-SOAR](https://github.com/correlatedsecurity/Awesome-SOAR) - A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.
- [hudunkey/Red-Team-links](https://github.com/hudunkey/Red-Team-links) - 2019年红队资源链接,资源不是本人整理出来,来自互联网,因为流传的少,特意在此做个备份,做个分享。
- [geffner/CVE-2020-8289](https://github.com/geffner/CVE-2020-8289) - CVE-2020-8289 – Remote Code Execution as SYSTEM/root via Backblaze
- [0x4D31/awesome-oscp](https://github.com/0x4D31/awesome-oscp) - A curated list of awesome OSCP resources
- [xx-zh/xx-zh-roadmap](https://github.com/xx-zh/xx-zh-roadmap) - 中文翻译 Road Map
- [al0ne/suricata-rules](https://github.com/al0ne/suricata-rules) - Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等
- [daffainfo/AllAboutBugBounty](https://github.com/daffainfo/AllAboutBugBounty) - All about bug bounty (bypasses, payloads, and etc)
- [hackerscrolls/SecurityTips](https://github.com/hackerscrolls/SecurityTips) -
- [radareorg/awesome-radare2](https://github.com/radareorg/awesome-radare2) - A curated list of awesome projects, articles and the other materials powered by Radare2
- [Neelakandan-A/BugBounty_CheatSheet](https://github.com/Neelakandan-A/BugBounty_CheatSheet) - BugBounty_CheatSheet
- [lz520520/railgun](https://github.com/lz520520/railgun) -
- [kleiton0x00/CRLF-one-liner](https://github.com/kleiton0x00/CRLF-one-liner) - A simple Bash one liner with aim to automate CRLF vulnerability scanning.
- [tennc/tips](https://github.com/tennc/tips) - 顾名思义,收集国内外各大佬的奇淫技巧
- [pwicherski/TestowanieOprogramowania](https://github.com/pwicherski/TestowanieOprogramowania) - Testowanie oprogramowania - Książka dla początkujących testerów
- [Litch1-v/behinder-clone](https://github.com/Litch1-v/behinder-clone) - 魔改的冰蝎,仅供测试连接内存webshell使用
- [zhyee/Mysql8.0_Reference_Manual_Translation](https://github.com/zhyee/Mysql8.0_Reference_Manual_Translation) - MySQL8.0官方文档中文翻译
- [pikvm/pikvm](https://github.com/pikvm/pikvm) - Open and inexpensive DIY IP-KVM based on Raspberry Pi
- [d1nfinite/sec-interview](https://github.com/d1nfinite/sec-interview) - 信息安全面试题汇总
- [s0md3v/be-a-hacker](https://github.com/s0md3v/be-a-hacker) - roadmap for a self-taught hacker
- [irsdl/top10webseclist](https://github.com/irsdl/top10webseclist) - Top Ten Web Hacking Techniques List
- [Virdoexhunter/HowToHunt](https://github.com/Virdoexhunter/HowToHunt) - Some Tutorials and Things to Do while Hunting That Vulnerability.
- [lazaars/SAP-Pentest](https://github.com/lazaars/SAP-Pentest) -
- [uknowsec/SharpToolsAggressor](https://github.com/uknowsec/SharpToolsAggressor) - 内网渗透中常用的c#程序整合成cs脚本,直接内存加载。持续更新~
- [tanprathan/OWASP-Testing-Checklist](https://github.com/tanprathan/OWASP-Testing-Checklist) - OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and pending test cases.
- [imran-parray/Mind-Maps](https://github.com/imran-parray/Mind-Maps) - Mind-Maps of Several Things
- [Fawadkhanfk/Check-List](https://github.com/Fawadkhanfk/Check-List) - Check List
- [bighuang624/AI-research-tools](https://github.com/bighuang624/AI-research-tools) - :hammer:AI 方向好用的科研工具
- [KathanP19/HowToHunt](https://github.com/KathanP19/HowToHunt) - Collection of methodology and test case for various web vulnerabilities.
- [ctfwiki/ctf_game_history](https://github.com/ctfwiki/ctf_game_history) - CTF题目缓存(题目信息及附件),用于题目复现和学习
- [0xthirteen/StayKit](https://github.com/0xthirteen/StayKit) - Cobalt Strike kit for Persistence
- [riusksk/BDOpener](https://github.com/riusksk/BDOpener) - 开启APK调试与备份选项的Xposed模块
- [jfmaes/Red-Route53-Interactive](https://github.com/jfmaes/Red-Route53-Interactive) -
- [jfmaes/Red-EC2](https://github.com/jfmaes/Red-EC2) - Spin up RedTeam infrastructure on AWS via Ansible
- [cpandya2909/CVE-2020-15778](https://github.com/cpandya2909/CVE-2020-15778) -
- [BeichenDream/Godzilla-Plugin-Store](https://github.com/BeichenDream/Godzilla-Plugin-Store) -
- [zhutougg/book_notes](https://github.com/zhutougg/book_notes) -
- [knownsec/404StarLink-Project](https://github.com/knownsec/404StarLink-Project) - Focus on promoting the evolution of tools in different aspects of security research.专注于推动安全研究各个领域工具化.(项目收录逐步迁移至 https://github.com/knownsec/404StarLink)
- [shack2/skyscorpion](https://github.com/shack2/skyscorpion) - 新版将不再对外公开发布。天蝎权限管理工具采用Java平台的JavaFX技术开发的桌面客户端,支持跨平台运行,目前基于JDK1.8开发,运行必须安装JDK或JRE 1.8,注意不能是open jdk,只能是oracle的jdk。 天蝎权限管理工具基于冰蝎加密流量进行WebShell通信管理的原理,目前实现了jsp、aspx、php、asp端的常用操作功能,在原基础上,优化了大文件上传下载、Socke
- [uknowsec/Fofa-gui](https://github.com/uknowsec/Fofa-gui) - Fofa采集工具-自修改版本
- [kobs0N/Hacking-Cheatsheet](https://github.com/kobs0N/Hacking-Cheatsheet) - List of commands and techniques to while conducting any kind of hacking :)
- [security-cheatsheet/wireshark-cheatsheet](https://github.com/security-cheatsheet/wireshark-cheatsheet) - Wireshark Cheat Sheet
- [AllsafeCyberSecurity/awesome-ghidra](https://github.com/AllsafeCyberSecurity/awesome-ghidra) - A curated list of awesome Ghidra materials
- [morph3/Windows-Red-Team-Cheat-Sheet](https://github.com/morph3/Windows-Red-Team-Cheat-Sheet) - Windows for Red Teamers
- [random-robbie/wpa-cracking](https://github.com/random-robbie/wpa-cracking) - Command List for Hashcat and default keyspaces.
- [DasSecurity-HatLab/BlueRepli-Plus](https://github.com/DasSecurity-HatLab/BlueRepli-Plus) - BlueRepli-Plus
- [HenJigg/CHINA.NET-](https://github.com/HenJigg/CHINA.NET-) - 提供各类.NET、C#学习资料、免费图书社区
- [IoT-PTv/IoT-PT](https://github.com/IoT-PTv/IoT-PT) - A Virtual environment for Pentesting IoT Devices
- [BeichenDream/Godzilla](https://github.com/BeichenDream/Godzilla) - 哥斯拉
- [hasherezade/pe-bear-releases](https://github.com/hasherezade/pe-bear-releases) - PE-bear (builds only)
- [dwisiswant0/awesome-oneliner-bugbounty](https://github.com/dwisiswant0/awesome-oneliner-bugbounty) - A collection of awesome one-liner scripts especially for bug bounty tips.
- [Ka0sKl0wN/ICS-Security-Study-Resources](https://github.com/Ka0sKl0wN/ICS-Security-Study-Resources) - A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.
- [T43cr0wl3r/OSINT-RECON](https://github.com/T43cr0wl3r/OSINT-RECON) - Open source intelligence tools and resources
- [zer0yu/Awesome-CobaltStrike](https://github.com/zer0yu/Awesome-CobaltStrike) - List of Awesome CobaltStrike Resources
- [TideSec/TideWave](https://github.com/TideSec/TideWave) - 潮涌web漏洞自动化挖掘平台——自动化扫描全网或特定范围web资产,之后获取指纹信息、爬取页面url并提炼,最后进行特定payload测试。
- [Virdoexhunter/CheckLists](https://github.com/Virdoexhunter/CheckLists) -
- [mcxiaoke/RxDocs](https://github.com/mcxiaoke/RxDocs) - Rx和RxJava文档中文翻译项目
- [warp682/SubdomainEnumeration](https://github.com/warp682/SubdomainEnumeration) - All about subdomain enumeration
- [antonytuff/Red-Team-Notes](https://github.com/antonytuff/Red-Team-Notes) - OSCP guide and Red Team assessment Guide
- [chaitin/rad](https://github.com/chaitin/rad) -
- [welk1n/FastjsonPocs](https://github.com/welk1n/FastjsonPocs) - 一些结合第三方组件的Fastjson POC,在1.2.48以后版本中陆续被添加至黑名单。
- [pyn3rd/Spring-Boot-Vulnerability](https://github.com/pyn3rd/Spring-Boot-Vulnerability) -
- [NagliNagli/OneLiners](https://github.com/NagliNagli/OneLiners) - Simple bash Oneliners to make life easier
- [jas502n/DBconfigReader](https://github.com/jas502n/DBconfigReader) - 泛微ecology OA系统接口存在数据库配置信息泄露漏洞
- [ossf/wg-vulnerability-disclosures](https://github.com/ossf/wg-vulnerability-disclosures) - The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by helping mature and advocate well-managed vulnerability reporting
- [ossf/wg-metrics-and-metadata](https://github.com/ossf/wg-metrics-and-metadata) - The purpose of the Metrics & Metadata (formerly Identifying Security Threats) working group is to enable stakeholders to have informed confidence in the security of open source projects. We do this by
- [ossf/wg-security-tooling](https://github.com/ossf/wg-security-tooling) - OpenSSF Security Tooling Working Group
- [Bypass007/Learn-security-from-0](https://github.com/Bypass007/Learn-security-from-0) - 从0开始学安全,注重实战+技巧的运用,分享各种安全攻防干货,包括但不限于:Web安全、代码审计 、内网渗透、企业安全等。
- [Accept008/ubuntu-system-local-use-k8s-minikube](https://github.com/Accept008/ubuntu-system-local-use-k8s-minikube) - ubuntu系统上本地搭建单机版的Kubernetes集群minikube(笔记)
- [xiaojiaqi/k8seasy_release_page](https://github.com/xiaojiaqi/k8seasy_release_page) - 一键安装kubernets(k8s)系统,已支持云环境的发布,可以在阿里云 azure 等云环境自主部署k8s系统,golang 编写 无需任何插件,无需翻墙下载任何内容,证书10年有效期,支持 单机 集群 生产环境的高可用 完全离线安装等标准。自带dashboard 监控,镜像仓库等内容,一键可用。
- [privacycg/storage-partitioning](https://github.com/privacycg/storage-partitioning) - Client-Side Storage Partitioning
- [stylersnico/nginx-secure-config](https://github.com/stylersnico/nginx-secure-config) - Nginx configuration file for optimized security and performance
- [bugcrowd/bugcrowd_university](https://github.com/bugcrowd/bugcrowd_university) - Open source education content for the researcher community
- [piaolin/fofa2Xray](https://github.com/piaolin/fofa2Xray) - User fofa api get hosts and xray to webscan.
- [Youlor/Youpk](https://github.com/Youlor/Youpk) - 又一款基于ART的主动调用的脱壳机
- [1d8/Android-Analysis](https://github.com/1d8/Android-Analysis) - Getting Genymotion & Burpsuite setup for Android Mobile App Analysis
- [SwiftOnSecurity/sysmon-config](https://github.com/SwiftOnSecurity/sysmon-config) - Sysmon configuration file template with default high-quality event tracing
- [LappleApple/awesome-leading-and-managing](https://github.com/LappleApple/awesome-leading-and-managing) - Awesome List of resources on leading people and being a manager. Geared toward tech, but potentially useful to anyone.
- [ArpitKubadia/RVDP-Programs](https://github.com/ArpitKubadia/RVDP-Programs) - List of domains having RVDP programmes
- [ring04h/iproxy](https://github.com/ring04h/iproxy) - HTTP/HTTPS proxy server by golang [high performance version]
- [qiyeboy/kill_webshell_detect](https://github.com/qiyeboy/kill_webshell_detect) - 总结了免杀webshell的方法论
- [ezlkc/androidantivirus](https://github.com/ezlkc/androidantivirus) -
- [ezlkc/androidtrojan](https://github.com/ezlkc/androidtrojan) -
- [waylau/java-trusted-code-refactoring-exam](https://github.com/waylau/java-trusted-code-refactoring-exam) -
- [ibr2/pwk-cheatsheet](https://github.com/ibr2/pwk-cheatsheet) -
- [loecho-sec/CobaltStrike_Script_Wechat_Push](https://github.com/loecho-sec/CobaltStrike_Script_Wechat_Push) - CobatStrike-Script, Beacon上线,微信实时推送!
- [Mochazz/Struts2-Vuln](https://github.com/Mochazz/Struts2-Vuln) - 关于Struts2框架的历史漏洞个人分析文章
- [sbousseaden/PCAP-ATTACK](https://github.com/sbousseaden/PCAP-ATTACK) - PCAP Samples for Different Post Exploitation Techniques
- [gerryguy311/Free_CyberSecurity_Professional_Development_Resources](https://github.com/gerryguy311/Free_CyberSecurity_Professional_Development_Resources) - An awesome list of FREE resources for training, conferences, speaking, labs, reading, etc that are free. Originally built during COVID-19 for cybersecurity professionals with downtime can take advanta
- [bit4woo/CVE-2020-13925](https://github.com/bit4woo/CVE-2020-13925) -
- [1ndianl33t/Bugbounty-Resources](https://github.com/1ndianl33t/Bugbounty-Resources) - A list of resources for those interested in getting started in bug bounties inspired from https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
- [overnote/over-golang](https://github.com/overnote/over-golang) - Golang相关:[审稿进度80%]Go语法、Go并发思想、Go与web开发、Go微服务设施等
- [1ndianl33t/Bug-Bounty-Roadmaps](https://github.com/1ndianl33t/Bug-Bounty-Roadmaps) - Bug Bounty Roadmaps
- [xdmjun/mp-unpack](https://github.com/xdmjun/mp-unpack) -
- [aqiongbei/buy_pig_plan](https://github.com/aqiongbei/buy_pig_plan) - 电话攻击(电话轰炸、可代替短信轰炸)、留言攻击工具 | 已删库
- [ckxpress/blockchain-sociology](https://github.com/ckxpress/blockchain-sociology) - 區塊鏈社會學
- [redhuntlabs/Awesome-Asset-Discovery](https://github.com/redhuntlabs/Awesome-Asset-Discovery) - List of Awesome Asset Discovery Resources
- [jiedeidei/Safety-baseline](https://github.com/jiedeidei/Safety-baseline) - 安全基线检查
- [blackrosezy/gui-inspect-tool](https://github.com/blackrosezy/gui-inspect-tool) - Gui Inspect tool for Windows
- [EvilAnne/Violation_Pnetest](https://github.com/EvilAnne/Violation_Pnetest) - 渗透红线Checklist
- [0xricksanchez/paper_collection](https://github.com/0xricksanchez/paper_collection) - Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
- [Airboi/Citrix-ADC-RCE-CVE-2020-8193](https://github.com/Airboi/Citrix-ADC-RCE-CVE-2020-8193) - Citrix ADC从权限绕过到RCE
- [ajdumanhug/oscp-practice](https://github.com/ajdumanhug/oscp-practice) - A random set of 5 machines for OSCP
- [alphaSeclab/awesome-webshell](https://github.com/alphaSeclab/awesome-webshell) - Awesome webshell collection. Including 150 Github repo, and 200+ blog posts.
- [alphaSeclab/fuzzing-stuff](https://github.com/alphaSeclab/fuzzing-stuff) - Resources About Fuzzing, For Multiple Platforms And All Popular Fuzzers. 500+ Open Source Tools Sorted By Star Count, 800+ Blog Posts Sorted By Publish Time.
- [alphaSeclab/DBI-Stuff](https://github.com/alphaSeclab/DBI-Stuff) - Resources About Dynamic Binary Instrumentation and Dynamic Binary Analysis
- [alphaSeclab/shellcode-resources](https://github.com/alphaSeclab/shellcode-resources) - Resources About Shellcode
- [alphaSeclab/android-security](https://github.com/alphaSeclab/android-security) - Android Security Resources.
- [alphaSeclab/anti-av](https://github.com/alphaSeclab/anti-av) - Resources About Anti-Virus and Anti-Anti-Virus, including 200+ tools and 1300+ posts
- [alphaSeclab/obfuscation-stuff](https://github.com/alphaSeclab/obfuscation-stuff) - Source Code Obfuscation And Binary Obfuscation, Multiple Languages And Multiple Platforms. Including 250+ Tools and 600+ Posts
- [alphaSeclab/injection-stuff](https://github.com/alphaSeclab/injection-stuff) - PE Injection、DLL Injection、Process Injection、Thread Injection、Code Injection、Shellcode Injection、ELF Injection、Dylib Injection, including 400+Tools and 350+posts
- [inferjay/AndroidDevTools](https://github.com/inferjay/AndroidDevTools) - 收集整理Android开发所需的Android SDK、开发中用到的工具、Android开发教程、Android设计规范,免费的设计素材等。
- [Pa55w0rd/Enterprise_-Security_tools](https://github.com/Pa55w0rd/Enterprise_-Security_tools) - 企业安全建设中用到的开源or“免费”的工具
- [MHaggis/sysmon-dfir](https://github.com/MHaggis/sysmon-dfir) - Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.
- [rootclay/windows_protocol](https://github.com/rootclay/windows_protocol) -
- [pandasec888/taowu-cobalt_strike](https://github.com/pandasec888/taowu-cobalt_strike) -
- [hack2fun/BypassAV](https://github.com/hack2fun/BypassAV) - Cobalt Strike插件,用于快速生成免杀的可执行文件
- [WebBreacher/osinttools](https://github.com/WebBreacher/osinttools) - A collection of random OSINT scripts
- [juguangtool/iOSConfusion](https://github.com/juguangtool/iOSConfusion) - iOS混淆 iOS代码混淆 iOS过审工具 iOS上架 iOS代码混淆工具 iOS工具 iOS马甲包 iOS马甲包工具 iOS混淆 iOS过4.3 iOS过审 iOS confuse iOS code confuse iOS2.3.1解决 iOS账号调查解决办法 iOS账号调查解决 iOS账号调查过审 OC代码混淆 IOS源码混淆 OC混淆 OC代码混淆 OC过审工具 OC代码混淆工具 OC工具
- [StabilityMan/StabilityGuide](https://github.com/StabilityMan/StabilityGuide) - 【稳定大于一切】打造国内稳定性领域知识库,让无法解决的问题少一点点,让世界的确定性多一点点。
- [uknowsec/loginlog_windows](https://github.com/uknowsec/loginlog_windows) - 读取登录过本机的登录失败或登录成功的所有计算机信息,在内网渗透中快速定位运维管理人员。
- [gomex/docker-para-desenvolvedores](https://github.com/gomex/docker-para-desenvolvedores) - Código fonte do livro Docker para desenvolvedores
- [jhaddix/tbhm](https://github.com/jhaddix/tbhm) - The Bug Hunters Methodology
- [Maskhe/javasec](https://github.com/Maskhe/javasec) - 自己学习java安全的一些总结,主要是安全审计相关
- [xiaoy-sec/Pentest_Note](https://github.com/xiaoy-sec/Pentest_Note) - 渗透测试常规操作记录
- [threatexpress/malleable-c2](https://github.com/threatexpress/malleable-c2) - Cobalt Strike Malleable C2 Design and Reference Guide
- [iGio90/DUCKWARRIORS_Frida_Wars_1](https://github.com/iGio90/DUCKWARRIORS_Frida_Wars_1) - challenge built for first frida wars
- [CaledoniaProject/awesome-opensource-security](https://github.com/CaledoniaProject/awesome-opensource-security) - A list of interesting open-source security tools, mostly reviewed and commented by me.
- [ignis-sec/Pwdb-Public](https://github.com/ignis-sec/Pwdb-Public) - A collection of all the data i could extract from 1 billion leaked credentials from internet.
- [FULLSHADE/WindowsExploitationResources](https://github.com/FULLSHADE/WindowsExploitationResources) - Resources for Windows exploit development
- [starnightcyber/subDomains](https://github.com/starnightcyber/subDomains) - 互联网公司子域名收集
- [rsmudge/Malleable-C2-Profiles](https://github.com/rsmudge/Malleable-C2-Profiles) - Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable C2 profiles that you may use. These profiles work with Cobalt
- [cloudflare/sslconfig](https://github.com/cloudflare/sslconfig) - Cloudflare's Internet facing SSL configuration
- [platomav/CPUMicrocodes](https://github.com/platomav/CPUMicrocodes) - Intel, AMD, VIA & Freescale CPU Microcode Repositories
- [wh-Cyberspace/WH-Encryptor](https://github.com/wh-Cyberspace/WH-Encryptor) - WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspace
- [SkyBlueEternal/thinkphp-RCE-POC-Collection](https://github.com/SkyBlueEternal/thinkphp-RCE-POC-Collection) - thinkphp v5.x 远程代码执行漏洞-POC集合
- [ryan412/ADLabsReview](https://github.com/ryan412/ADLabsReview) - Active Directory Labs/exams Review
- [osamahamad/CVE-2020-5410-POC](https://github.com/osamahamad/CVE-2020-5410-POC) - CVE-2020-5410 Spring Cloud Config directory traversal vulnerability
- [lensapp/lens](https://github.com/lensapp/lens) - Lens - The way the world runs Kubernetes
- [dafthack/CloudPentestCheatsheets](https://github.com/dafthack/CloudPentestCheatsheets) - This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.
- [1ndianl33t/All-in-one_BugBounty_PDF_bundles](https://github.com/1ndianl33t/All-in-one_BugBounty_PDF_bundles) -
- [Paper-Pen/GatherInfo](https://github.com/Paper-Pen/GatherInfo) - 信息收集 OR 信息搜集
- [mrnitesh/apikey](https://github.com/mrnitesh/apikey) -
- [mirfansulaiman/Command-Mobile-Penetration-Testing-Cheatsheet](https://github.com/mirfansulaiman/Command-Mobile-Penetration-Testing-Cheatsheet) - Mobile penetration testing android & iOS command cheatsheet
- [alphaSeclab/hooking](https://github.com/alphaSeclab/hooking) - Resources About Hooking. For All Platforms. Currently 300+ Tools And 600+ Posts.
- [taielab/Taie-RedTeam-OS](https://github.com/taielab/Taie-RedTeam-OS) - 泰阿安全实验室-基于XUbuntu私人订制的红蓝对抗渗透操作系统
- [SEC-GO/Red-vs-Blue](https://github.com/SEC-GO/Red-vs-Blue) - 红蓝对抗交流心得
- [kleiton0x00/CORS-one-liner](https://github.com/kleiton0x00/CORS-one-liner) - A one liner Bash command which finds CORS in every possible endpoint.
- [veeral-patel/how-to-secure-anything](https://github.com/veeral-patel/how-to-secure-anything) - How to systematically secure anything: a repository about security engineering
- [r00tuser111/ActuatorExploitTools](https://github.com/r00tuser111/ActuatorExploitTools) - 一款用于攻击spring boot actuator的集成环境,目前集成三种攻击方式,支持1.x、2.x
- [zhengjim/Chinese-Security-RSS](https://github.com/zhengjim/Chinese-Security-RSS) - 网络安全资讯的RSS订阅,网络安全博客的RSS订阅,网络安全公众号的RSS订阅
- [alphaSeclab/persistence](https://github.com/alphaSeclab/persistence) - Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.
- [0x783kb/Security-Operation-Book](https://github.com/0x783kb/Security-Operation-Book) - 常见的攻击行为监测特征及方法,涵盖端点和流量,未包含PowerShell和Sysmon。预祝运营生活愉快!
- [alphaSeclab/cobalt-strike](https://github.com/alphaSeclab/cobalt-strike) - Resources About Cobalt Strike. 100+ Tools And 200+ Posts.
- [vulnerablecodes/vuln_uris](https://github.com/vulnerablecodes/vuln_uris) -
- [dark-warlord14/ffufalias](https://github.com/dark-warlord14/ffufalias) - Alias for storing ffuf results
- [cephurs/wildcarded-citrix-2020](https://github.com/cephurs/wildcarded-citrix-2020) - Wildcard certificates which were on vulnerable Citrix servers in 2020
- [emadshanab/subs_all](https://github.com/emadshanab/subs_all) - Subdomain Enumeration Wordlist. 8956437 unique words. Updated.
- [prakharathreya/Struts2-RCE](https://github.com/prakharathreya/Struts2-RCE) - A Burp Extender for checking for struts 2 RCE vulnerabilities.
- [jas502n/SpringBoot_Actuator_RCE](https://github.com/jas502n/SpringBoot_Actuator_RCE) - SpringBoot_Actuator_RCE
- [netbiosX/Checklists](https://github.com/netbiosX/Checklists) - Red Teaming & Pentesting checklists for various engagements
- [ngoclesydney/Cyber-Security-for-Mobile-Platforms](https://github.com/ngoclesydney/Cyber-Security-for-Mobile-Platforms) - The subject provides an in-depth technical overview of mobile security architectures, new security risks and threats of modern mobile platforms and operating systems. Lab tutorials provide students wi
- [satan1a/awesome-ios-security-cn](https://github.com/satan1a/awesome-ios-security-cn) - iOS安全资料整理(中文)
- [random-robbie/bruteforce-lists](https://github.com/random-robbie/bruteforce-lists) - Some files for bruteforcing certain things.
- [AndyFul/ConfigureDefender](https://github.com/AndyFul/ConfigureDefender) - Utility for configuring Windows 10 built-in Defender antivirus settings.
- [Dormidera/WordList-Compendium](https://github.com/Dormidera/WordList-Compendium) - Personal compilation of wordlists & dictionaries for everything. Users, passwords, directories, files, vulnerabilities, fuzzing, injections, wordlists of tools, etc.
- [al0ne/Nmap_Bypass_IDS](https://github.com/al0ne/Nmap_Bypass_IDS) - Nmap&Zmap特征识别,绕过IDS探测
- [BuildHackSecure/gitscraper](https://github.com/BuildHackSecure/gitscraper) - A tool which scrapes public github repositories for common naming conventions in variables, folders and files
- [Echocipher/Resource-list](https://github.com/Echocipher/Resource-list) - “网址”传输助手,记载一下平时用到好的在线网址。
- [vegabird/xvna](https://github.com/vegabird/xvna) - Extreme Vulnerable Node Application
- [delikely/OSINT-JUMP](https://github.com/delikely/OSINT-JUMP) - 开源情报收集 导航及快速跳转的油候脚本
- [ctfhub-team/ctfhub_base_image](https://github.com/ctfhub-team/ctfhub_base_image) - Index of CTFHub Base Images
- [Mad-robot/wordpress-exploits](https://github.com/Mad-robot/wordpress-exploits) - All known and unknown public POC's for wordpress themes and plugins
- [emadshanab/LFI-Payload-List](https://github.com/emadshanab/LFI-Payload-List) - LFI Payloads List coolected from github repos
- [RenwaX23/XSS-Payloads](https://github.com/RenwaX23/XSS-Payloads) - List of XSS Vectors/Payloads
- [1ndianl33t/Gf-Patterns](https://github.com/1ndianl33t/Gf-Patterns) - GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep
- [JHUAPL/Beat-the-Machine](https://github.com/JHUAPL/Beat-the-Machine) - Reverse engineering basics in puzzle form
- [vuepress/awesome-vuepress](https://github.com/vuepress/awesome-vuepress) - 🎉 A curated list of awesome things related to VuePress
- [dyweb/papers-notebook](https://github.com/dyweb/papers-notebook) - :page_facing_up: :cn: :page_with_curl: 论文阅读笔记(分布式系统、虚拟化、机器学习)Papers Notebook (Distributed System, Virtualization, Machine Learning)
- [BullsEye0/google_dork_list](https://github.com/BullsEye0/google_dork_list) - Google Dorks | Google helps you to find Vulnerable Websites that Indexed in Google Search Results. Here is the latest collection of Google Dorks. A collection of 13.760 Dorks. Author: Jolanda de Koff
- [iGotRootSRC/Dorkers](https://github.com/iGotRootSRC/Dorkers) - Dorks for Google, Shodan and BinaryEdge
- [sbilly/awesome-security](https://github.com/sbilly/awesome-security) - A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
- [tunz/js-vuln-db](https://github.com/tunz/js-vuln-db) - A collection of JavaScript engine CVEs with PoCs
- [latestalexey/awesome-web-hacking](https://github.com/latestalexey/awesome-web-hacking) - A list of web application security
- [wyzxxz/shiro_rce_tool](https://github.com/wyzxxz/shiro_rce_tool) - shiro 反序列 命令执行辅助检测工具
- [S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet](https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet) - A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
- [jdonsec/AllThingsAndroid](https://github.com/jdonsec/AllThingsAndroid) - A Collection of Android Pentest Learning Materials
- [sundowndev/hacker-roadmap](https://github.com/sundowndev/hacker-roadmap) - A collection of hacking tools, resources and references to practice ethical hacking.
- [TrojanAZhen/BurpSuitePro-2.1](https://github.com/TrojanAZhen/BurpSuitePro-2.1) - 什么? 你想用免费的BurpSuitePro版本!!!
- [master3values/Attack-Cloud](https://github.com/master3values/Attack-Cloud) - Att&ck Cloud相关
- [argowang/cyber-security-roadmap](https://github.com/argowang/cyber-security-roadmap) - A roadmap for learning cyber-security
- [euphrat1ca/CVE-2020-0618](https://github.com/euphrat1ca/CVE-2020-0618) - SQL Server Reporting Services(CVE-2020-0618)中的RCE
- [riramar/Web-Attack-Cheat-Sheet](https://github.com/riramar/Web-Attack-Cheat-Sheet) - Web Attack Cheat Sheet
- [u-u-z/information-security-for-everyone](https://github.com/u-u-z/information-security-for-everyone) - 写给大家看的信息安全手册
- [mingcheng/deploy-k8s-within-aliyun-mirror](https://github.com/mingcheng/deploy-k8s-within-aliyun-mirror) - 使用阿里云镜像快速部署 Kubernetes 集群
- [xdmjun/wxappUnpacker](https://github.com/xdmjun/wxappUnpacker) -
- [plenumlab/GQL-Helper](https://github.com/plenumlab/GQL-Helper) - This is a small extension to make graphql readable
- [maddiestone/AndroidAppRE](https://github.com/maddiestone/AndroidAppRE) - Android App Reverse Engineering Workshop
- [yangchong211/YCBlogs](https://github.com/yangchong211/YCBlogs) - 技术博客笔记大汇总,包括Java基础,线程,并发,数据结构;Android技术博客等等;常用设计模式;常见的算法;网络协议知识点;部分flutter笔记;还包括平时开发中遇到的bug汇总,当然也在工作之余收集了大量的面试题,长期更新维护并且修正,持续完善……开源的文件是markdown格式的!转载请注明出处,谢谢!
- [aquasecurity/vuln-list](https://github.com/aquasecurity/vuln-list) - NVD, Ubuntu, Alpine
- [we1h0/awesome-java-security-checklist](https://github.com/we1h0/awesome-java-security-checklist) - awesome-java-security-checklist(关于Java安全方面,Java基础/审计/修复/设计/规范)
- [qxl1231/2019-k8s-centos](https://github.com/qxl1231/2019-k8s-centos) - 2019最新k8s集群搭建教程(centos/ubuntu)
- [jdonsec/AllThingsSSRF](https://github.com/jdonsec/AllThingsSSRF) - This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location
- [dsopas/assessment-mindset](https://github.com/dsopas/assessment-mindset) - Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.
- [six2dez/OSCP-Human-Guide](https://github.com/six2dez/OSCP-Human-Guide) - My own OSCP guide
- [streaak/keyhacks](https://github.com/streaak/keyhacks) - Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
- [Brucetg/App_Security](https://github.com/Brucetg/App_Security) -
- [Snowming04/CobaltStrike4.0_related](https://github.com/Snowming04/CobaltStrike4.0_related) - 破解的cs4.0、cs4.0官方手册翻译和一些笔记
- [sushiwushi/bug-bounty-dorks](https://github.com/sushiwushi/bug-bounty-dorks) - List of Google Dorks for sites that have responsible disclosure program / bug bounty program
- [1-2-3/hhkb_ydkb](https://github.com/1-2-3/hhkb_ydkb) - HHKB 键盘 + YDKB 主控 = 完美键盘
- [YasserGersy/cazador_unr](https://github.com/YasserGersy/cazador_unr) - Hacking tools
- [WooyunDota/DroidDrops](https://github.com/WooyunDota/DroidDrops) - 梳理下自己之前写过的文章
- [hereappdev/Here-Plugins](https://github.com/hereappdev/Here-Plugins) - Plugins for Here App 🚀
- [tianshanghong/awesome-anki](https://github.com/tianshanghong/awesome-anki) - A curated list of awesome Anki add-ons, decks and resources
- [nomi-sec/PoC-in-GitHub](https://github.com/nomi-sec/PoC-in-GitHub) - 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
- [inonshk/31-days-of-API-Security-Tips](https://github.com/inonshk/31-days-of-API-Security-Tips) - This challenge is Inon Shkedy's 31 days API Security Tips.
- [theLSA/CS-checklist](https://github.com/theLSA/CS-checklist) - PC客户端(C-S架构)渗透测试checklist / Client side(C-S) penetration checklist
- [wooyunwang/Fortify](https://github.com/wooyunwang/Fortify) - 源代码漏洞の审计
- [renzu0/nw-tips](https://github.com/renzu0/nw-tips) - win内网_域控安全
- [proudwind/javasec_study](https://github.com/proudwind/javasec_study) - java代码审计学习笔记
- [randorisec/MobileHackingCheatSheet](https://github.com/randorisec/MobileHackingCheatSheet) - Basics on commands/tools/info on how to assess the security of mobile applications
- [vaib25vicky/awesome-mobile-security](https://github.com/vaib25vicky/awesome-mobile-security) - An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
- [randomuserid/Adama](https://github.com/randomuserid/Adama) - Searches For Threat Hunting and Security Analytics
- [rShetty/awesome-podcasts](https://github.com/rShetty/awesome-podcasts) - Collection of awesome podcasts
- [alphaSeclab/windows-security](https://github.com/alphaSeclab/windows-security) - Resources About Windows Security. 1100+ Open Source Tools. 3300+ Blog Post and Videos.
- [alphaSeclab/all-my-collection-repos](https://github.com/alphaSeclab/all-my-collection-repos) - All Security Resource Collections Repos That I Published.
- [alphaSeclab/awesome-security-collection](https://github.com/alphaSeclab/awesome-security-collection) - 1000+ Github Security Resource Collection Repos.
- [sv3nbeast/CVE-2019-1388](https://github.com/sv3nbeast/CVE-2019-1388) - guest→system(UAC手动提权)
- [bh1xuw/mca-administrative](https://github.com/bh1xuw/mca-administrative) - 中华人民共和国民政部全国行政区划信息。topojson/geojson格式,至县一级。
- [sehno/Bug-bounty](https://github.com/sehno/Bug-bounty) - Ressources for bug bounty hunting
- [xiaolai/zuoxiangqicheng](https://github.com/xiaolai/zuoxiangqicheng) - 坐享其成——最简单的大脑锻炼方式
- [zjdx1998/seucourseshare](https://github.com/zjdx1998/seucourseshare) - 东南大学课程共享计划
- [S3cur3Th1sSh1t/Pentest-Tools](https://github.com/S3cur3Th1sSh1t/Pentest-Tools) -
- [xinali/articles](https://github.com/xinali/articles) - Personal Blog/主记录漏洞挖掘相关研究(文章位于issues)
- [nobleXu/jenkins](https://github.com/nobleXu/jenkins) - jenkins payload
- [uknowsec/SharpDecryptPwd](https://github.com/uknowsec/SharpDecryptPwd) - 对密码已保存在 Windwos 系统上的部分程序进行解析,包括:Navicat,TeamViewer,FileZilla,WinSCP,Xmangager系列产品(Xshell,Xftp)。源码:https://github.com/RowTeam/SharpDecryptPwd
- [we1h0/redteam-tips](https://github.com/we1h0/redteam-tips) - 关于红队方面的学习资料
- [hackergrrl/art-of-readme](https://github.com/hackergrrl/art-of-readme) - :love_letter: Things I've learned about writing good READMEs.
- [Mochazz/ThinkPHP-Vuln](https://github.com/Mochazz/ThinkPHP-Vuln) - 关于ThinkPHP框架的历史漏洞分析集合
- [robertdebock/ansible-role-dsvpn](https://github.com/robertdebock/ansible-role-dsvpn) - Install and configure DSVPN on your system.
- [dosec-cn/harbor-scanner](https://github.com/dosec-cn/harbor-scanner) - 一个免费的镜像漏洞扫描工具, 可以扫描镜像中已安装软件包的漏洞,支持中文漏洞库,可与 Harbor 无缝集成。
- [slowmist/Ontology-Triones-Service-Node-security-checklist](https://github.com/slowmist/Ontology-Triones-Service-Node-security-checklist) - Ontology Triones Service Node security checklist(本体北斗共识集群安全执行指南)
- [slowmist/vechain-core-nodes-security-checklist](https://github.com/slowmist/vechain-core-nodes-security-checklist) - VeChain core nodes security checklist(唯链核心节点安全执行指南)
- [slowmist/eos-bp-nodes-security-checklist](https://github.com/slowmist/eos-bp-nodes-security-checklist) - EOS bp nodes security checklist(EOS超级节点安全执行指南)
- [7kbstorm/smb_version_threadpool](https://github.com/7kbstorm/smb_version_threadpool) - 于几年前二次开发自 http://www.zcgonvh.com/post/CSharp_smb_version_Detection.html
- [wisdom-projects/holer](https://github.com/wisdom-projects/holer) - Holer exposes local servers behind NATs and firewalls to the public internet over secure tunnels.
- [sk3ptre/AndroidMalware_2019](https://github.com/sk3ptre/AndroidMalware_2019) - Popular Android threats in 2019
- [alphaSeclab/awesome-burp-suite](https://github.com/alphaSeclab/awesome-burp-suite) - Awesome Burp Suite Resources. 400+ open source Burp plugins, 400+ posts and videos.
- [aozhimin/iOS-Debug-Hacks](https://github.com/aozhimin/iOS-Debug-Hacks) - :dart: Advanced debugging skills used in the iOS project development process, involves the dynamic debugging, static analysis and decompile of third-party libraries. iOS 项目开发过程中用到的高级调试技巧,涉及三方库动态调试、静态分
- [dackh/blog](https://github.com/dackh/blog) - ...
- [jakejarvis/awesome-shodan-queries](https://github.com/jakejarvis/awesome-shodan-queries) - 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
- [alphaSeclab/awesome-honeypot](https://github.com/alphaSeclab/awesome-honeypot) - Awesome Honeypot Resource Collection. Including 250+ Honeypot tools, and 350+ posts about Honeypot.
- [shadow-horse/CVE-2019-17571](https://github.com/shadow-horse/CVE-2019-17571) - Apache Log4j 1.2.X存在反序列化远程代码执行漏洞
- [SecurityRiskAdvisors/VECTR](https://github.com/SecurityRiskAdvisors/VECTR) - VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities across different attack scenarios
- [ReDTunnel/redtunnel](https://github.com/ReDTunnel/redtunnel) -
- [harismuneer/Ultimate-Social-Scrapers](https://github.com/harismuneer/Ultimate-Social-Scrapers) - 🤖 Top-rated tools to scrape all major sections from Facebook, Instagram, and Twitter (X) including posts (likes/comments), photos/videos, contact information, followers, following and much more.
- [alphaSeclab/awesome-forensics](https://github.com/alphaSeclab/awesome-forensics) - Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.
- [alphaSeclab/awesome-rat](https://github.com/alphaSeclab/awesome-rat) - RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
- [dgryski/go-perfbook](https://github.com/dgryski/go-perfbook) - Thoughts on Go performance optimization
- [ripperhe/Bob](https://github.com/ripperhe/Bob) - Bob 是一款 macOS 平台的翻译和 OCR 软件。
- [l3m0n/WebFuzzAttack](https://github.com/l3m0n/WebFuzzAttack) - web模糊测试 - 将漏洞可能性放大
- [alphaSeclab/awesome-cyber-security](https://github.com/alphaSeclab/awesome-cyber-security) - [Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count,
- [twelvesec/BearerAuthToken](https://github.com/twelvesec/BearerAuthToken) - This burpsuite extender provides a solution on testing Enterprise applications that involve security Authorization tokens into every HTTP requests.Furthermore, this solution provides a better approach
- [nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters](https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters) - A list of resources for those interested in getting started in bug bounties
- [8enet/Charles-Crack](https://github.com/8enet/Charles-Crack) - Removed according to DMCA.
- [rizinorg/cutter-plugins](https://github.com/rizinorg/cutter-plugins) - A curated list of Community Plugins and Scripts written for Cutter
- [felixgr/secure-ios-app-dev](https://github.com/felixgr/secure-ios-app-dev) - Collection of the most common vulnerabilities found in iOS applications
- [0xmachos/iOS-Security-Guides](https://github.com/0xmachos/iOS-Security-Guides) - Every iOS security guide
- [indrarahul/d4rkc0de-Android-CTF](https://github.com/indrarahul/d4rkc0de-Android-CTF) - d4rkc0de Android CTF
- [B3nac/Android-Reports-and-Resources](https://github.com/B3nac/Android-Reports-and-Resources) - A big list of Android Hackerone disclosed reports and other resources.
- [Ruturaj4/Mobile-Security-Paper_summaries](https://github.com/Ruturaj4/Mobile-Security-Paper_summaries) - Papers summaries of some of the most important Mobile Security Papers 📃
- [DataMaster-2501/DataMaster-Android-AdBlock-Hosts](https://github.com/DataMaster-2501/DataMaster-Android-AdBlock-Hosts) - Android AdBlock Hosts file for /etc/hosts
- [XecLabs/Mobile](https://github.com/XecLabs/Mobile) - The repo hold all our (mobile security) & applications reports.
- [psychsecurity/iOS-Pentesting](https://github.com/psychsecurity/iOS-Pentesting) - Wiki for Pentesting iOS apps
- [ansjdnakjdnajkd/iOS](https://github.com/ansjdnakjdnajkd/iOS) - Most usable tools for iOS penetration testing
- [xsleaks/xsleaks](https://github.com/xsleaks/xsleaks) - A collection of browser-based side channel attack vectors.
- [timip/OSWE](https://github.com/timip/OSWE) - OSWE Preparation
- [M507/AWAE-Preparation](https://github.com/M507/AWAE-Preparation) - This repository will contain all trainings and tutorials I have done/read to prepare for OSWE / AWAE.
- [alphaSeclab/awesome-network-stuff](https://github.com/alphaSeclab/awesome-network-stuff) - Resources about network security, including: Proxy/GFW/ReverseProxy/Tunnel/VPN/Tor/I2P, and MiTM/PortKnocking/NetworkSniff/NetworkAnalysis/etc。More than 1700 open source tools for now. Post incoming.
- [stars-one/ASCToolJar](https://github.com/stars-one/ASCToolJar) - Android Signature Crack Tool Jar 破解APK签名验证的jar包
- [chicharitomu14/Android-Security-Notes-personal](https://github.com/chicharitomu14/Android-Security-Notes-personal) - 个人整理的Android安全学习笔记
- [iwannabetop/Awesome-Android-Learning-Guide](https://github.com/iwannabetop/Awesome-Android-Learning-Guide) - 一份系统、全面的安卓进阶学习指南(更新中)
- [pwstrick/daily](https://github.com/pwstrick/daily) - 一份搜集的前端面试题目清单、面试相关以及各类学习的资料(不局限于前端)
- [alphaSeclab/sec-tool-list](https://github.com/alphaSeclab/sec-tool-list) - More than 21K security related open source tools, sorted by star count. Both in markdown and json format.
- [RASSec/ssrf-video-ffmpeg](https://github.com/RASSec/ssrf-video-ffmpeg) -
- [zudochkin/awesome-newsletters](https://github.com/zudochkin/awesome-newsletters) - A list of amazing Newsletters
- [blaCCkHatHacEEkr/PENTESTING-BIBLE](https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE) - articles
- [fffaraz/awesome-cpp](https://github.com/fffaraz/awesome-cpp) - A curated list of awesome C++ (or C) frameworks, libraries, resources, and shiny things. Inspired by awesome-... stuff.
- [andrews1022/web-development-course-list](https://github.com/andrews1022/web-development-course-list) - A list of Udemy courses from Brad Traversy's Web Development 2021 video
- [alphaSeclab/awesome-reverse-engineering](https://github.com/alphaSeclab/awesome-reverse-engineering) - Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
- [tangsilian/My-Github-Stars](https://github.com/tangsilian/My-Github-Stars) - My Github Stars
- [fr0gger/awesome-ida-x64-olly-plugin](https://github.com/fr0gger/awesome-ida-x64-olly-plugin) - A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.
- [XIU2/TrackersListCollection](https://github.com/XIU2/TrackersListCollection) - 🎈 Updated daily! A list of popular BitTorrent Trackers! / 每天更新!全网热门 BT Tracker 列表!
- [basketwill/Z0BPcTools](https://github.com/basketwill/Z0BPcTools) - 一个windows反汇编工具,界面风格防OllyDbg 利用业余开发了一款类似仿OLlyDbg界面的 IDA静态反编译工具,目前是1.0版本,功能不是很强大但是基本功能有了
- [fabacab/awesome-cybersecurity-blueteam](https://github.com/fabacab/awesome-cybersecurity-blueteam) - :computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
- [jobbole/awesome-go-cn](https://github.com/jobbole/awesome-go-cn) - Go 资源大全中文版, 内容包括:Web框架、模板引擎、表单、身份认证、数据库、ORM框架、图片处理、文本处理、自然语言处理、机器学习、日志、代码分析、教程和(电子)书等。由「开源前哨」和「Go开发大全」微信团队维护。
- [wyzxxz/jndi_tool](https://github.com/wyzxxz/jndi_tool) - JNDI服务利用工具 RMI/LDAP,支持部分场景回显、内存shell,高版本JDK场景下利用等,fastjson rce命令执行,log4j rce命令执行 漏洞检测辅助工具
- [ivRodriguezCA/RE-iOS-Apps](https://github.com/ivRodriguezCA/RE-iOS-Apps) - A completely free, open source and online course about Reverse Engineering iOS Applications.
- [slowmist/Knowledge-Base](https://github.com/slowmist/Knowledge-Base) - Knowledge Base 慢雾安全团队知识库
- [npubird/KnowledgeGraphCourse](https://github.com/npubird/KnowledgeGraphCourse) - 东南大学《知识图谱》研究生课程
- [pandazheng/Mac-IOS-Security](https://github.com/pandazheng/Mac-IOS-Security) - Mac&IOS安全学习资料汇总
- [gozelus/iOSReview](https://github.com/gozelus/iOSReview) - 常见iOS面试中考察的知识点整理
- [payloadbox/sql-injection-payload-list](https://github.com/payloadbox/sql-injection-payload-list) - 🎯 SQL Injection Payload List
- [CTFTraining/CTFTraining](https://github.com/CTFTraining/CTFTraining) - CTF Training 经典赛题复现环境
- [niezhiyang/open_source_team](https://github.com/niezhiyang/open_source_team) - 国内顶尖团队的开源地址
- [jaegeral/security-apis](https://github.com/jaegeral/security-apis) - A collective list of public APIs for use in security. Contributions welcome
- [dweinstein/awesome-frida](https://github.com/dweinstein/awesome-frida) - Awesome Frida - A curated list of Frida resources http://www.frida.re/ (https://github.com/frida/frida)
- [veracode-research/solr-injection](https://github.com/veracode-research/solr-injection) - Apache Solr Injection Research
- [ffffffff0x/Digital-Privacy](https://github.com/ffffffff0x/Digital-Privacy) - Information Protection & OSINT resources | 一个关于数字隐私搜集、保护、清理集一体的方案,外加开源信息收集(OSINT)对抗
- [perklet/reverse-interview-zh](https://github.com/perklet/reverse-interview-zh) - 技术面试最后反问面试官的话
- [uknowsec/Active-Directory-Pentest-Notes](https://github.com/uknowsec/Active-Directory-Pentest-Notes) - 个人域渗透学习笔记
- [serhii-londar/open-source-mac-os-apps](https://github.com/serhii-londar/open-source-mac-os-apps) - 🚀 Awesome list of open source applications for macOS. https://t.me/s/opensourcemacosapps
- [jobbole/awesome-sysadmin-cn](https://github.com/jobbole/awesome-sysadmin-cn) - 系统管理员资源大全中文版,备份/克隆软件、云计算/云存储、协作软件、配置管理、日志管理、监控、项目管理等
- [hacklcx/HFish](https://github.com/hacklcx/HFish) - 安全、可靠、简单、免费的企业级蜜罐
- [Leezj9671/offensiveinterview](https://github.com/Leezj9671/offensiveinterview) - 翻译国外的@WebBreacher的安全/渗透测试/红队面试题,有部分参考作用
- [olafhartong/ThreatHunting](https://github.com/olafhartong/ThreatHunting) - A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
- [qingshuisiyuan/electron-ssr-backup](https://github.com/qingshuisiyuan/electron-ssr-backup) - electron-ssr原作者删除了这个伟大的项目,故备份了下来,不继续开发,且用且珍惜
- [freedom-is-life/crypto-exchange](https://github.com/freedom-is-life/crypto-exchange) - 24mex,24MEX,24Mex,h5、网站app前后端源码下载。最火的差价合约交易所系统|指数型差价合约交易所系统、ICFD指数型差价合约交易所、BTC比特币杠杠交易、领先数字货币杠杆交易所(高达100倍杠杆),数字货币比特币 BTC 微盘交易系统开发、数字货币比特币 BTC 微交易系统,数字货币比特币 BTC 合约系统;
- [the-champions-of-capua/pen-tool](https://github.com/the-champions-of-capua/pen-tool) - 渗透工具使用教程,结合 vulhub, dvwa, metasploitable3 等靶场使用, 涵盖工具有菜刀,msf, sqlmap 等等。
- [Raikia/Recon-NG-API-Key-Creation](https://github.com/Raikia/Recon-NG-API-Key-Creation) - One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here I’ll outline the different API keys it can use and where to get them yourself.
- [qianguyihao/Mac-list](https://github.com/qianguyihao/Mac-list) - Mac软件清单、Mac使用技巧整理,正在不断完善中。努力做到最全。
- [ffffffff0x/Dork-Admin](https://github.com/ffffffff0x/Dork-Admin) - 盘点近年来的数据泄露、供应链污染事件
- [joshuah345/linux-dotfiles](https://github.com/joshuah345/linux-dotfiles) - I configure lots of things, sorting them out here
- [Bypass007/Safety-Project-Collection](https://github.com/Bypass007/Safety-Project-Collection) - 收集一些比较优秀的开源安全项目,以帮助甲方安全从业人员构建企业安全能力。
- [chenzhao2013/Translation-For-IoT-Penetration-Testing-Cookbook](https://github.com/chenzhao2013/Translation-For-IoT-Penetration-Testing-Cookbook) - 学习物联网渗透测试技术时,在Google上查到的一本英文书。看国内还未有该领域的书籍,因此将其翻译提供更多的同学学习。若有侵权,请联系删除。
- [piglei/one-python-craftsman](https://github.com/piglei/one-python-craftsman) - 来自一位 Pythonista 的编程经验分享,内容涵盖编码技巧、最佳实践与思维模式等方面。
- [AxtMueller/Windows-Kernel-Explorer](https://github.com/AxtMueller/Windows-Kernel-Explorer) - A free but powerful Windows kernel research tool.
- [Puuoi/SS-R-4in1](https://github.com/Puuoi/SS-R-4in1) - 由于秋水逸冰网站国内无法访问,所以为有需要的朋友复制发布到github
- [Quorafind/golang-developer-roadmap-cn](https://github.com/Quorafind/golang-developer-roadmap-cn) - 在 2019 成为一名 Go 开发者的路线图。为学习 Go 的人而准备。
- [hblvsjtu/StockTradingSignalSystem](https://github.com/hblvsjtu/StockTradingSignalSystem) - 著名的投资大师巴菲特说"我始终知道我会富有",一开始我也想成为像巴同学那样的价值投资者,后来我发现价值投资在中国A股里面是走不通的,趋势投资才是王道。刚学投资的小白,想站在前人的基础上,开发基金股票买卖信号体系,在不浪费太多精力的同时获取超额收益,我知道我也终将富有^_ ^
- [jiansiting/Decryption-Tools](https://github.com/jiansiting/Decryption-Tools) - Decryption-Tools
- [xdd666t/MyData](https://github.com/xdd666t/MyData) - 相关资料存放,noval为阅读书源,pic为Github图床
- [Bypass007/Emergency-Response-Notes](https://github.com/Bypass007/Emergency-Response-Notes) - 应急响应实战笔记,一个安全工程师的自我修养。
- [3had0w/Fuzzing-Dicts](https://github.com/3had0w/Fuzzing-Dicts) - Web Security Dictionary
- [tiaotiaolong/sec_interview_know_list](https://github.com/tiaotiaolong/sec_interview_know_list) - 信息安全方面面试清单
- [Smi1eSEC/Web-Security-Note](https://github.com/Smi1eSEC/Web-Security-Note) - Record some common Web security sites
- [Jack-Liang/kalitools](https://github.com/Jack-Liang/kalitools) - Kali Linux工具清单
- [yzddmr6/webshell-venom](https://github.com/yzddmr6/webshell-venom) - 免杀webshell无限生成工具
- [DrXie/OSFCC](https://github.com/DrXie/OSFCC) - 一个收集可用于中文字体排印的开源字体集合。
- [l0ss/Grouper2](https://github.com/l0ss/Grouper2) - Find vulnerabilities in AD Group Policy
- [nusr/hacker-laws-zh](https://github.com/nusr/hacker-laws-zh) - 💻📖对开发人员有用的定律、理论、原则和模式。(Laws, Theories, Principles and Patterns that developers will find useful.)
- [qdlaoyao/js-book](https://github.com/qdlaoyao/js-book) - 《JavaScript 迷你书》,全面夯实基础
- [infosecn1nja/Red-Teaming-Toolkit](https://github.com/infosecn1nja/Red-Teaming-Toolkit) - This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
- [aleenzz/MSSQL_SQL_BYPASS_WIKI](https://github.com/aleenzz/MSSQL_SQL_BYPASS_WIKI) - MSSQL注入提权,bypass的一些总结
- [xiangbab/web-hack](https://github.com/xiangbab/web-hack) - 一份网络安全入门的资料。
- [nusr/awesome-macos-command-line-zh](https://github.com/nusr/awesome-macos-command-line-zh) - 用你的 macOS 终端搞事情。(Use your macOS terminal shell to do awesome things. )
- [yeyintminthuhtut/Awesome-Advanced-Windows-Exploitation-References](https://github.com/yeyintminthuhtut/Awesome-Advanced-Windows-Exploitation-References) - List of Awesome Advanced Windows Exploitation References
- [zhangyongcun/OpenCore-EFI](https://github.com/zhangyongcun/OpenCore-EFI) -
- [aleenzz/MYSQL_SQL_BYPASS_WIKI](https://github.com/aleenzz/MYSQL_SQL_BYPASS_WIKI) - mysql注入,bypass的一些心得
- [Lucifer1993/cmsprint](https://github.com/Lucifer1993/cmsprint) - CMS和中间件指纹库
- [wsgzao/autoinstall](https://github.com/wsgzao/autoinstall) - Autoinst索引
- [starrtc/starrtc-android-demo](https://github.com/starrtc/starrtc-android-demo) - 🚀starRTC,即时通讯(IM)系统,免费IM系统(含单聊,群聊,聊天室,文件传输),免费一对一视频聊天,VOIP,语音对讲(回音消除),直播连麦,视频直播,RTSP拉流,RTMP推流,webRTC服务端,在线教育,白板,小班课,在线会议,视频会议,视频监控,局域网直连(无需服务器),兼容webRTC, 支持webRTC加速,P2P高清传输,安卓、iOS、web互通,支持门禁对讲,可视对讲,电视
- [lis912/Information-security-reinforcement-scheme](https://github.com/lis912/Information-security-reinforcement-scheme) - 等级保护安全加固方案
- [jeansgit/RedTeam](https://github.com/jeansgit/RedTeam) - RedTeam资料收集整理
- [coralfox/Confluence-Plugin-CN](https://github.com/coralfox/Confluence-Plugin-CN) - 这是Confluence 插件Questions For Confluence的简体中文汉化文件
- [aleenzz/Cobalt_Strike_wiki](https://github.com/aleenzz/Cobalt_Strike_wiki) - Cobalt Strike系列
- [euphrat1ca/Security-List](https://github.com/euphrat1ca/Security-List) - If you have any good suggestions or comments during the search process, please feedback some index experience in issues. Thank you for your participation.查阅过程中,如果有什么好的意见或建议,请在Issues反馈,感谢您的参与。
- [Escapingbug/awesome-browser-exploit](https://github.com/Escapingbug/awesome-browser-exploit) - awesome list of browser exploitation tutorials
- [chryzsh/DarthSidious](https://github.com/chryzsh/DarthSidious) - Building an Active Directory domain and hacking it
- [we1h0/web-sec-interview](https://github.com/we1h0/web-sec-interview) - Information Security (Web Security/Penetration Testing Direction) Interview Questions/Solutions 信息安全(Web安全/渗透测试方向)面试题/解题思路
- [visualbasic6/chatter](https://github.com/visualbasic6/chatter) - internet monitoring osint telegram bot for windows
- [FeeiCN/SecurityInterviewGuide](https://github.com/FeeiCN/SecurityInterviewGuide) - 网络信息安全从业者面试指南
- [Voorivex/pentest-guide](https://github.com/Voorivex/pentest-guide) - Penetration tests guide based on OWASP including test cases, resources and examples.
- [ruanyf/document-style-guide](https://github.com/ruanyf/document-style-guide) - 中文技术文档的写作规范
- [thanksdanny/tester-resource](https://github.com/thanksdanny/tester-resource) - 测试技术资源
- [Stardustsky/SaiDict](https://github.com/Stardustsky/SaiDict) - 弱口令,敏感目录,敏感文件等渗透测试常用攻击字典
- [findneo/Newbie-Security-List](https://github.com/findneo/Newbie-Security-List) - 网络安全学习资料,欢迎补充
- [iBreaker/bjguahao](https://github.com/iBreaker/bjguahao) - 北京市预约挂号统一平台挂号小助手
- [hq450/fancyss_history_package](https://github.com/hq450/fancyss_history_package) - 科学上网插件的离线安装包储存在这里
- [SkyBlueEternal/CVE-2018-1335-EXP-GUI](https://github.com/SkyBlueEternal/CVE-2018-1335-EXP-GUI) - GUI版 EXP
- [milabs/awesome-linux-rootkits](https://github.com/milabs/awesome-linux-rootkits) - awesome-linux-rootkits
- [yeyintminthuhtut/Awesome-Red-Teaming](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming) - List of Awesome Red Teaming Resources
- [ngalongc/bug-bounty-reference](https://github.com/ngalongc/bug-bounty-reference) - Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature
- [infosecn1nja/AD-Attack-Defense](https://github.com/infosecn1nja/AD-Attack-Defense) - Attack and defend active directory using modern post exploitation adversary tradecraft activity
- [yurii-yu/chitchat-on-translation](https://github.com/yurii-yu/chitchat-on-translation) - 翻译漫谈——我的翻译经验总结
- [FunnyKun/NessusReportInChinese](https://github.com/FunnyKun/NessusReportInChinese) - 半自动化将 Nessus 英文报告(csv格式)生成中文 excel ,中文漏洞库已有700多条常见漏洞,后续再进一步加上新漏洞自动翻译,实现全自动化
- [WebBreacher/orcs](https://github.com/WebBreacher/orcs) - OSINT Resource Classification System
- [yangliang1415/awesome-risk-control](https://github.com/yangliang1415/awesome-risk-control) - 风控知识总结
- [553899811/Java-Programmer-Advancement-Program](https://github.com/553899811/Java-Programmer-Advancement-Program) - 📚 Java 技术体系进阶指南 ,总结职场经验及感悟,积累技术面试
- [security-cheatsheet/reverse-shell-cheatsheet](https://github.com/security-cheatsheet/reverse-shell-cheatsheet) - 🙃 Reverse Shell Cheat Sheet 🙃
- [Harmoc/CTFTools](https://github.com/Harmoc/CTFTools) - Personal CTF Toolkit
- [lingcoder/OnJava8](https://github.com/lingcoder/OnJava8) - 《On Java 8》中文版
- [enkomio/Taipan](https://github.com/enkomio/Taipan) - Web application vulnerability scanner
- [1135/1135-CobaltStrike-ToolKit](https://github.com/1135/1135-CobaltStrike-ToolKit) - about CobaltStrike
- [wtsxDev/Penetration-Testing](https://github.com/wtsxDev/Penetration-Testing) - List of awesome penetration testing resources, tools and other shiny things
- [clxering/Effective-Java-3rd-edition-Chinese-English-bilingual](https://github.com/clxering/Effective-Java-3rd-edition-Chinese-English-bilingual) - Effective Java(第3版)各章节的中英文学习参考(已完成)
- [exitmsconfig/engineering-Box](https://github.com/exitmsconfig/engineering-Box) - engineering Box (简称 - engineering) 是一个集合github平台上的安全行业从业者自研开源扫描器的仓库,包括子域名枚举、数据库漏洞扫描、弱口令或信息泄漏扫描、端口扫描、指纹识别以及其他大型扫描器或模块化扫描器,同时该仓库只收录各位安全行业从业者自己编写的一般性开源扫描器,类似awvs、nmap、w3af等知名扫描工具不收录,收集全球各位同仁爱好者维护项目
- [Aptive/penetration-testing-tools](https://github.com/Aptive/penetration-testing-tools) - Penetration Testing tools - one repo to clone them all... containing latest pen testing tools
- [Snowming04/The-Hacker-Playbook-3-Translation](https://github.com/Snowming04/The-Hacker-Playbook-3-Translation) - 对 The Hacker Playbook 3 的翻译。
- [thedaviddias/Front-End-Checklist](https://github.com/thedaviddias/Front-End-Checklist) - 🗂 The perfect Front-End Checklist for modern websites and meticulous developers
- [hannoch/scaner](https://github.com/hannoch/scaner) - 扫描器是来自GitHub平台的开源扫描器的集合,包括子域枚举、数据库漏洞扫描器、弱密码或信息泄漏扫描器、端口扫描器、指纹扫描器以及其他大规模扫描仪、模块扫描器等。对于其他著名的扫描工具,如:awvs、nmap,w3af将不包含在集合范围内。
- [byt3bl33d3r/AnsiblePlaybooks](https://github.com/byt3bl33d3r/AnsiblePlaybooks) - A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools
- [payloadbox/xss-payload-list](https://github.com/payloadbox/xss-payload-list) - 🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List
- [trimstray/the-practical-linux-hardening-guide](https://github.com/trimstray/the-practical-linux-hardening-guide) - This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).
- [hongriSec/AI-Machine-Learning-Security](https://github.com/hongriSec/AI-Machine-Learning-Security) - 一个关于人工智能渗透测试分析系列
- [guardrailsio/awesome-python-security](https://github.com/guardrailsio/awesome-python-security) - Awesome Python Security resources 🕶🐍🔐
- [sdnds-tw/awesome-sdn](https://github.com/sdnds-tw/awesome-sdn) - A awesome list about Software Defined Network (SDN)
- [pe3zx/my-infosec-awesome](https://github.com/pe3zx/my-infosec-awesome) - My curated list of awesome links, resources and tools on infosec related topics
- [ityouknow/awesome-spring-boot](https://github.com/ityouknow/awesome-spring-boot) - Spring Boot Resources
- [leng-yue/Lengyue-Vcode](https://github.com/leng-yue/Lengyue-Vcode) - Project Stopped
- [naototty/awesome-el-yum-repository-additional](https://github.com/naototty/awesome-el-yum-repository-additional) - awesome EL(centos,redhat) additional yum repository
- [izombielandgit/CentOS7-Server-Configuration](https://github.com/izombielandgit/CentOS7-Server-Configuration) - CentOS7服务器的一些配置
- [guardrailsio/awesome-golang-security](https://github.com/guardrailsio/awesome-golang-security) - Awesome Golang Security resources 🕶🔐
- [Ivan1ee/NET-Deserialize](https://github.com/Ivan1ee/NET-Deserialize) - 总结了20+.Net反序列化文章,持续更新
- [tigercandy/go-read-recommend](https://github.com/tigercandy/go-read-recommend) - :fire: 让阅读变成一件有意义的事。Golang好文推荐;收录平时阅读到的一些Go相关写的比较好、质量较高的干货文章.
- [liuchengxu/git-commit-emoji-cn](https://github.com/liuchengxu/git-commit-emoji-cn) - 😁 git commit message emoji 使用指南
- [lyz8jj0/mapSource](https://github.com/lyz8jj0/mapSource) - java基础思维导图(还有mybatis,spring)
- [Leezj9671/Pentest_Interview](https://github.com/Leezj9671/Pentest_Interview) - 个人准备渗透测试和安全面试的经验之谈,和去部分厂商的面试题,干货真的满满~
- [0xMJ/AI-Security-Learning](https://github.com/0xMJ/AI-Security-Learning) - 自身学习的安全数据科学和算法的学习资料
- [Binject/awesome-go-security](https://github.com/Binject/awesome-go-security) - A dedicated place for cool golang security projects
- [upan/cheat-sheet](https://github.com/upan/cheat-sheet) - 常用工具和开源项目链接收藏
- [snoopysecurity/awesome-burp-extensions](https://github.com/snoopysecurity/awesome-burp-extensions) - A curated list of amazingly awesome Burp Extensions
- [imthenachoman/How-To-Secure-A-Linux-Server](https://github.com/imthenachoman/How-To-Secure-A-Linux-Server) - An evolving how-to guide for securing a Linux server.
- [Micropoor/Micro8](https://github.com/Micropoor/Micro8) - Gitbook
- [prakhar1989/awesome-courses](https://github.com/prakhar1989/awesome-courses) - :books: List of awesome university courses for learning Computer Science!
- [TideSec/Tide](https://github.com/TideSec/Tide) - 目前实现了网络空间资产探测、指纹检索、漏洞检测、漏洞全生命周期管理、poc定向检测、暗链检测、挂马监测、敏感字检测、DNS监测、网站可用性监测、漏洞库管理、安全预警等等~
- [AnyeDuke/Enterprise-Security-Skill](https://github.com/AnyeDuke/Enterprise-Security-Skill) - 用于记录企业安全规划,建设,运营,攻防的相关资源
- [Ridter/Intranet_Penetration_Tips](https://github.com/Ridter/Intranet_Penetration_Tips) - 2018年初整理的一些内网渗透TIPS,后面更新的慢,所以整理出来希望跟小伙伴们一起更新维护~
- [NewBee119/threat-intelligence](https://github.com/NewBee119/threat-intelligence) - 收集的一些国外能提供提供威胁情报的公司,涵盖网络安全、工控安全、终端安全、移动安全等领域
- [mezod/awesome-indie](https://github.com/mezod/awesome-indie) - Resources for independent developers to make money
- [WalterInSH/risk-management-note](https://github.com/WalterInSH/risk-management-note) - 🧯风险控制笔记,适用于互联网企业
- [yujiangshui/A-Programmers-Guide-to-English](https://github.com/yujiangshui/A-Programmers-Guide-to-English) - 专为程序员编写的英语学习指南 v1.2。在线版本请点 ->
- [carpeventus/Interview-Notes](https://github.com/carpeventus/Interview-Notes) - 秋招面试总结
- [GitHubDaily/GitHubDaily](https://github.com/GitHubDaily/GitHubDaily) - 坚持分享 GitHub 上高质量、有趣实用的开源技术教程、开发者工具、编程网站、技术资讯。A list cool, interesting projects of GitHub.
- [cvkki/src](https://github.com/cvkki/src) - 日常src平台域名收集
- [AV1080p/Hacking-With-Golang](https://github.com/AV1080p/Hacking-With-Golang) - Golang安全资源合集
- [crazywa1ker/DarthSidious-Chinese](https://github.com/crazywa1ker/DarthSidious-Chinese) - DarthSidious 中文版
- [FEGuideTeam/FEGuide](https://github.com/FEGuideTeam/FEGuide) - 【前端面试题+前端学习+面试指南】 一份涵盖大部分前端工程师所需要掌握的核心知识。这个项目就是为了帮助那些找工作的前端开发工程师去回顾前端的基础知识,如果你不想找工作,也可以通过查看这些面试问题去巩固你的前端技能。
- [T3st0r-Git/hack_postgres](https://github.com/T3st0r-Git/hack_postgres) - 便捷地使用PostgreSQL自定义函数来执行系统命令,适用于数据库管理员知道postgres密码却不知道ssh或RDP密码的时候在服务器执行系统命令。
- [bloodzer0/ossa](https://github.com/bloodzer0/ossa) - Open-Source Security Architecture | 开源安全架构
- [nailperry-zd/The-Economist](https://github.com/nailperry-zd/The-Economist) - The Economist 经济学人,持续更新
- [guobinhit/intellij-idea-tutorial](https://github.com/guobinhit/intellij-idea-tutorial) - 🌻 This is a tutorial of IntelliJ IDEA, you can know how to use IntelliJ IDEA better and better.
- [rebeyond/Behinder](https://github.com/rebeyond/Behinder) - “冰蝎”动态二进制加密网站管理客户端
- [SFLAQiu/web-develop](https://github.com/SFLAQiu/web-develop) - :seedling:《大话WEB开发》WEB开发相关经验总结分享
- [enochtangg/quick-SQL-cheatsheet](https://github.com/enochtangg/quick-SQL-cheatsheet) - A quick reminder of all SQL queries and examples on how to use them.
- [xiaohuilam/laravel](https://github.com/xiaohuilam/laravel) - Laravel 深入详解 —— 源代码解析,新手进阶指南
- [Boreas813/Burp-Suite-2.0-chinese-document](https://github.com/Boreas813/Burp-Suite-2.0-chinese-document) - 中文版burp2.0官方文档
- [sjsdfg/CS-Notes-PDF](https://github.com/sjsdfg/CS-Notes-PDF) - https://github.com/CyC2018/CS-Notes PDF版本离线阅读
- [vuejs/awesome-vue](https://github.com/vuejs/awesome-vue) - 🎉 A curated list of awesome things related to Vue.js
- [opendigg/awesome-github-vue](https://github.com/opendigg/awesome-github-vue) - Vue相关开源项目库汇总
- [EZLippi/practical-programming-books](https://github.com/EZLippi/practical-programming-books) - 这里收录比较实用的计算机相关技术书籍,可以在短期之内入门的简单实用教程、一些技术网站以及一些写的比较好的博文,欢迎Fork,你也可以通过Pull Request参与编辑。
- [233boy/chinaip](https://github.com/233boy/chinaip) - 中国大陆 IP 列表(已优化)
- [PansonPanson/Java-Notes](https://github.com/PansonPanson/Java-Notes) - :books: 计算机科学基础知识、Java开发、后端/服务端、面试相关 :books: computer-science/Java-development/backend/interview
- [technicaldada/BEST-HACKING-TOOLS](https://github.com/technicaldada/BEST-HACKING-TOOLS) - BEST HACKING TOOLS..For more tools visit our blog for Hackers
- [EarsEyesMouth/computerese-cross-references](https://github.com/EarsEyesMouth/computerese-cross-references) - 计算机专业术语中英文对照。
- [danTaler/detectionString](https://github.com/danTaler/detectionString) - list of sql-injection and XSS strings
- [slowmistio/2018-BlackHat-Tools-List](https://github.com/slowmistio/2018-BlackHat-Tools-List) - 2018 BlackHat Tools List
- [luong-komorebi/Begin-Latex-in-minutes](https://github.com/luong-komorebi/Begin-Latex-in-minutes) - 📜 Brief Intro to LaTeX for beginners that helps you use LaTeX with ease.
- [songtianyi/landscape-of-programming](https://github.com/songtianyi/landscape-of-programming) - This repo aim to show you what to learn on the way to excellence.
- [trimstray/iptables-essentials](https://github.com/trimstray/iptables-essentials) - Iptables Essentials: Common Firewall Rules and Commands.
- [trimstray/the-book-of-secret-knowledge](https://github.com/trimstray/the-book-of-secret-knowledge) - A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
- [aichinateam/chinese-ai-developer](https://github.com/aichinateam/chinese-ai-developer) - 👩🏿💻👨🏾💻👩🏼💻👨🏽💻👩🏻💻中国 AI 开发者项目列表 -- 分享大家都在做什么
- [spoock1024/web-security](https://github.com/spoock1024/web-security) - Web安全中比较好的文章
- [mdrights/antiG](https://github.com/mdrights/antiG) - Yet another live OS to resist Surveillance/Censorship and to protect digital privacy.
- [SuJunming/mac-awesomeTools](https://github.com/SuJunming/mac-awesomeTools) - mac常用软件等等,有你需要的!
- [im-bug/BlockChain-Security-List](https://github.com/im-bug/BlockChain-Security-List) -
- [NtrQQ/download](https://github.com/NtrQQ/download) -
- [resumejob/awesome-resume](https://github.com/resumejob/awesome-resume) - Resume,Resume Templates,程序员简历例句,简历模版,
- [LandGrey/upload-labs-writeup](https://github.com/LandGrey/upload-labs-writeup) - upload-labs writeup
- [JoyChou93/sks](https://github.com/JoyChou93/sks) - Security Knowledge Structure(安全知识汇总)
- [telegramlist/telegramlist](https://github.com/telegramlist/telegramlist) - Telegram中文群索引列表(言论自由版)
- [laylalaisy/TOEFL_laylalaisy](https://github.com/laylalaisy/TOEFL_laylalaisy) - 备考托福的一丢丢经验+资料~祝小可爱和大佬们都早日和托福大魔王分手(o゜▽゜)o☆
- [wangbjun/ubuntu-unity-setup](https://github.com/wangbjun/ubuntu-unity-setup) - Ubuntu unity桌面的一些优化设置以及常用软件,完全使用Ubuntu作为日常生活工作系统攻略。
- [V33RU/IoTSecurity101](https://github.com/V33RU/IoTSecurity101) - A Curated list of IoT Security Resources
- [smgorelik/Windows-RCE-exploits](https://github.com/smgorelik/Windows-RCE-exploits) - The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samples are uploaded for education purposes for red and blue teams.
- [dily3825002/awesome-blockchain](https://github.com/dily3825002/awesome-blockchain) - 区块链白皮书、书籍、交易所、币种、自媒体等资源汇总 💯
- [cerebroapp/awesome-cerebro](https://github.com/cerebroapp/awesome-cerebro) - Curated list of Cerebro plugins and resources
- [sie504/Struts-S2-xxx](https://github.com/sie504/Struts-S2-xxx) - 整理收集Struts2漏洞环境
- [Kutim/docker-security](https://github.com/Kutim/docker-security) - docker 安全基线规范
- [xitu/gold-miner](https://github.com/xitu/gold-miner) - 🥇掘金翻译计划,可能是世界最大最好的英译中技术社区,最懂读者和译者的翻译平台:
- [iCHAIT/awesome-macOS](https://github.com/iCHAIT/awesome-macOS) - A curated list of awesome applications, softwares, tools and shiny things for macOS.
- [jobbole/awesome-javascript-cn](https://github.com/jobbole/awesome-javascript-cn) - JavaScript 资源大全中文版,内容包括:包管理器、加载器、测试框架、运行器、QA、MVC框架和库、模板引擎等。由「开源前哨」和「前端大全」微信公号团队维护更新。
- [renkun-ken/MacType.Decency](https://github.com/renkun-ken/MacType.Decency) - A MacType profile that provides decent solution to font rendering and font substitutions for Windows operating systems.
- [xingshaocheng/architect-awesome](https://github.com/xingshaocheng/architect-awesome) - 后端架构师技术图谱
- [NoorQureshi/kali-linux-cheatsheet](https://github.com/NoorQureshi/kali-linux-cheatsheet) - Kali Linux Cheat Sheet for Penetration Testers
- [ihtml5/50weekly](https://github.com/ihtml5/50weekly) - 50weekly 发现高质量的前端资源
- [DictionaryHouse/The-Security-Handbook-Kali-Linux](https://github.com/DictionaryHouse/The-Security-Handbook-Kali-Linux) - A useful reference guide and a handbook of security basics for those starting out.
- [SwiftOldDriver/iOS-Weekly](https://github.com/SwiftOldDriver/iOS-Weekly) - 🇨🇳 老司机技术 iOS 周报
- [sp4rkw/Cyberspace_Security_Learning](https://github.com/sp4rkw/Cyberspace_Security_Learning) - 在学习CTF、网络安全路上整合自己博客和一些资料,持续更新~
- [zer0yu/CyberSecurityRSS](https://github.com/zer0yu/CyberSecurityRSS) - CyberSecurityRSS: A collection of cybersecurity rss to make you better!
- [1c7/chinese-independent-developer](https://github.com/1c7/chinese-independent-developer) - 👩🏿💻👨🏾💻👩🏼💻👨🏽💻👩🏻💻中国独立开发者项目列表 -- 分享大家都在做什么
- [dzharii/awesome-elasticsearch](https://github.com/dzharii/awesome-elasticsearch) - A curated list of the most important and useful resources about elasticsearch: articles, videos, blogs, tips and tricks, use cases. All about Elasticsearch!
- [l3m0n/linux_information](https://github.com/l3m0n/linux_information) - 自动化收集linux信息
- [ohmyarch/fontconfig-zh-cn](https://github.com/ohmyarch/fontconfig-zh-cn) -
- [pengshp/rpi3-package](https://github.com/pengshp/rpi3-package) - RaspberryPi3 with Raspbian
- [upyun/upyun-resty](https://github.com/upyun/upyun-resty) - UPYUN's open source software for OpenResty development
- [redhuntlabs/RedHunt-OS](https://github.com/redhuntlabs/RedHunt-OS) - Virtual Machine for Adversary Emulation and Threat Hunting
- [ccloli/developer-roadmap-zh-CN](https://github.com/ccloli/developer-roadmap-zh-CN) - 在 2020 年成为 Web 开发工程师之路线图 | Roadmap to becoming a web developer in 2020
- [goodjack/developer-roadmap-chinese](https://github.com/goodjack/developer-roadmap-chinese) - 2021 年成為 Web 開發人員的路線圖 台灣正體中文版
- [CyC2018/CS-Notes](https://github.com/CyC2018/CS-Notes) - :books: 技术面试必备基础知识、Leetcode、计算机操作系统、计算机网络、系统设计
- [Ridter/CS_Chinese_support](https://github.com/Ridter/CS_Chinese_support) - Cobalt strike 修改支持回显中文。
- [Roave/SecurityAdvisories](https://github.com/Roave/SecurityAdvisories) - :closed_lock_with_key: Security advisories as a simple composer exclusion list, updated daily
- [hylinux1024/awesome-blockchain-articles](https://github.com/hylinux1024/awesome-blockchain-articles) - A collection of awesome blockchain articles. Good learning resources about blockchain.
- [tonghuaroot/Vulnerability-Env](https://github.com/tonghuaroot/Vulnerability-Env) - 收集国内外开源CMS存在漏洞的各种版本
- [neoFelhz/various_domain_list](https://github.com/neoFelhz/various_domain_list) - A various list of domain
- [soulteary/tenant-point](https://github.com/soulteary/tenant-point) - 租房要点,适用于北上广深杭,欢迎补充。
- [lmy375/awesome-vmp](https://github.com/lmy375/awesome-vmp) - 虚拟化保护(VMP壳)分析相关资料
- [r0ysue/OSG-TranslationTeam](https://github.com/r0ysue/OSG-TranslationTeam) - 看雪iOS安全小组的翻译团队作品集合,如有勘误,欢迎斧正!
- [riusksk/secbook](https://github.com/riusksk/secbook) - 信息安全从业者书单推荐
- [Dukewill/DaiseaX](https://github.com/Dukewill/DaiseaX) - 戴西之海 - 先进数字集群:技术作者自留地
- [monklof/Back-End-Developer-Interview-Questions](https://github.com/monklof/Back-End-Developer-Interview-Questions) - 后端开发面试题,翻译自 https://github.com/arialdomartini/Back-End-Developer-Interview-Questions
- [nanqinlang-mogic/v2ray](https://github.com/nanqinlang-mogic/v2ray) - template with websocket+tls+nginx of v2ray
- [swim2sun/spring-reference-docset](https://github.com/swim2sun/spring-reference-docset) - Spring Reference Documentation docset for Dash
- [myndtt/CTF-Site](https://github.com/myndtt/CTF-Site) - 介绍一些CTF训练的站点
- [521xueweihan/git-tips](https://github.com/521xueweihan/git-tips) - :trollface:Git的奇技淫巧
- [alebcay/awesome-shell](https://github.com/alebcay/awesome-shell) - A curated list of awesome command-line frameworks, toolkits, guides and gizmos. Inspired by awesome-php.
- [vysecurity/DomainFrontingLists](https://github.com/vysecurity/DomainFrontingLists) - A list of Domain Frontable Domains by CDN
- [evilsocket/bleah](https://github.com/evilsocket/bleah) - This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.
- [enaqx/awesome-pentest](https://github.com/enaqx/awesome-pentest) - A collection of awesome penetration testing resources, tools and other shiny things
- [Schm1tz1/awesome-rtl-sdr](https://github.com/Schm1tz1/awesome-rtl-sdr) - Software (meta-)package for RTL-SDR with some additional scripts and installers
- [guanchao/AndroidChecklist](https://github.com/guanchao/AndroidChecklist) - Android应用审计checklist整理
- [kbandla/APTnotes](https://github.com/kbandla/APTnotes) - Various public documents, whitepapers and articles about APT campaigns
- [awesome-foss/awesome-sysadmin](https://github.com/awesome-foss/awesome-sysadmin) - A curated list of amazingly awesome open-source sysadmin resources.
- [bit4woo/python_sec](https://github.com/bit4woo/python_sec) - python安全和代码审计相关资料收集 resource collection of python security and code review
- [DropsOfZut/awesome-security-weixin-official-accounts](https://github.com/DropsOfZut/awesome-security-weixin-official-accounts) - 网络安全类公众号推荐,欢迎大家推荐
- [johnnyDEP/cobaltstrike](https://github.com/johnnyDEP/cobaltstrike) - cobalt strike stuff I have gathered from around github
- [postlight/awesome-cms](https://github.com/postlight/awesome-cms) - 📚 A collection of open and closed source Content Management Systems (CMS) for your perusal.
- [Gracker/Rss-IT](https://github.com/Gracker/Rss-IT) - 这个项目记录了个人订阅的一些科技人的Blog地址,欢迎大家推荐,一起来完善! 欢迎自荐......
- [HD421/Monitoring-Systems-Cheat-Sheet](https://github.com/HD421/Monitoring-Systems-Cheat-Sheet) - A cheat sheet for pentesters and researchers about vulnerabilities in well-known monitoring systems.
- [kai5263499/osx-security-awesome](https://github.com/kai5263499/osx-security-awesome) - A collection of OSX and iOS security resources
- [tanprathan/MobileApp-Pentest-Cheatsheet](https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet) - The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
- [FabioBaroni/awesome-chinese-infosec-websites](https://github.com/FabioBaroni/awesome-chinese-infosec-websites) - A curated list of Chinese websites and personal blogs about ethical hacking and pentesting
- [jobbole/awesome-php-cn](https://github.com/jobbole/awesome-php-cn) - PHP资源大全中文版,库、框架、模板、安全、代码分析、日志、第三方库、配置工具、Web 工具等
- [0x4D31/awesome-threat-detection](https://github.com/0x4D31/awesome-threat-detection) - ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
- [Tim9Liu9/TimLiu-iOS](https://github.com/Tim9Liu9/TimLiu-iOS) - iOS开发常用三方库、插件、知名博客等等
- [dat-ecosystem-archive/awesome-dat](https://github.com/dat-ecosystem-archive/awesome-dat) - Community curated resources for Dat Project [ DEPRECATED - More info on active projects and modules at https://dat-ecosystem.org/ ]
- [ethereum/pyethereum](https://github.com/ethereum/pyethereum) - Next generation cryptocurrency network
- [jiangsir404/Audit-Learning](https://github.com/jiangsir404/Audit-Learning) - 记录自己对《代码审计》的理解和总结,对危险函数的深入分析以及在p牛的博客和代码审计圈的收获
- [linonetwo/neo4j-tutorial-Chinese](https://github.com/linonetwo/neo4j-tutorial-Chinese) - 学图论数据库 Neo4j 的时候顺手翻译了它的在线课程
- [ColorfulCat/AndroidLibs](https://github.com/ColorfulCat/AndroidLibs) - :fire:正在成为史上最全分类 Android 开源大全~~~~(长期更新 Star 一下吧)
- [Z4HD/coolq-telegram-bot-docker](https://github.com/Z4HD/coolq-telegram-bot-docker) - 使用Docker容器化的QQ和Telegram的消息互转机器人。Source: jqqqqqqqqqq/coolq-telegram-bot
- [marcan/speculation-bugs](https://github.com/marcan/speculation-bugs) - Docs and resources on CPU Speculative Execution bugs
- [l3m0n/pentest_study](https://github.com/l3m0n/pentest_study) - 从零开始内网渗透学习
- [l3m0n/XSS-Filter-Evasion-Cheat-Sheet-CN](https://github.com/l3m0n/XSS-Filter-Evasion-Cheat-Sheet-CN) - XSS_Filter_Evasion_Cheat_Sheet 中文版
- [3gstudent/Pentest-and-Development-Tips](https://github.com/3gstudent/Pentest-and-Development-Tips) - A collection of pentest and development tips
- [hzlzh/Best-App](https://github.com/hzlzh/Best-App) - 收集&推荐优秀的 Apps/硬件/技巧/周边等
- [aceimnorstuvwxz/awesome-chatbot-list](https://github.com/aceimnorstuvwxz/awesome-chatbot-list) - 深度学习聊天机器人资源集合 Awesome chatbot resource list
- [KiriKira/vTemplate](https://github.com/KiriKira/vTemplate) - v2ray的模板们
- [abdelhai/awesome-bots](https://github.com/abdelhai/awesome-bots) - Awesome Links about bots.
- [MiYogurt/network-security-mind-map](https://github.com/MiYogurt/network-security-mind-map) - ☯️ 网络安全基础知识思维导图、大学笔记(Network security Mind Map)
- [nebgnahz/awesome-iot-hacks](https://github.com/nebgnahz/awesome-iot-hacks) - A Collection of Hacks in IoT Space so that we can address them (hopefully).
- [awesome-selfhosted/awesome-selfhosted](https://github.com/awesome-selfhosted/awesome-selfhosted) - A list of Free Software network services and web applications which can be hosted on your own servers
- [madneal/articles-translator](https://github.com/madneal/articles-translator) - :books:Translate the distinct technical blogs. Please star or watch. Welcome to join me.
- [arkadiyt/bounty-targets-data](https://github.com/arkadiyt/bounty-targets-data) - This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for reports
- [vah13/OracleCVE](https://github.com/vah13/OracleCVE) - Vulnerabilities which found in Oracle products
- [SangKa/PWA-Book-CN](https://github.com/SangKa/PWA-Book-CN) - 第一本 PWA 中文书
- [IamHDT/Ecommerce-Website-Security-CheckList](https://github.com/IamHDT/Ecommerce-Website-Security-CheckList) - List of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built into the Techinical Specific Document, or will be checked in the
- [tuteng/Best-websites-a-programmer-should-visit-zh](https://github.com/tuteng/Best-websites-a-programmer-should-visit-zh) - 程序员应该访问的最佳网站中文版
- [JnuSimba/LinuxSecNotes](https://github.com/JnuSimba/LinuxSecNotes) - some learning notes about Linux Security
- [tom0li/collection-document](https://github.com/tom0li/collection-document) - Collection of quality safety articles. Awesome articles.
- [onlurking/awesome-infosec](https://github.com/onlurking/awesome-infosec) - A curated list of awesome infosec courses and training resources.
- [onethawt/reverseengineering-reading-list](https://github.com/onethawt/reverseengineering-reading-list) - A list of Reverse Engineering articles, books, and papers
- [tiimgreen/github-cheat-sheet](https://github.com/tiimgreen/github-cheat-sheet) - A list of cool features of Git and GitHub.
- [stamparm/ipsum](https://github.com/stamparm/ipsum) - Daily feed of bad IPs (with blacklist hit scores)
- [zbetcheckin/Security_list](https://github.com/zbetcheckin/Security_list) - Great security list for fun and profit
- [jaredthecoder/awesome-vehicle-security](https://github.com/jaredthecoder/awesome-vehicle-security) - 🚗 A curated list of resources for learning about vehicle security and car hacking.
- [googlehosts/hosts](https://github.com/googlehosts/hosts) - 镜像:https://scaffrey.coding.net/p/hosts/git / https://git.qvq.network/googlehosts/hosts
- [jhaddix/pentest-bookmarks](https://github.com/jhaddix/pentest-bookmarks) - a collection of handy bookmarks
- [vitalysim/Awesome-Hacking-Resources](https://github.com/vitalysim/Awesome-Hacking-Resources) - A collection of hacking / penetration testing resources to make you better!
- [Debian/raspi3-image-spec](https://github.com/Debian/raspi3-image-spec) - contains the files to build the https://wiki.debian.org/RaspberryPi3 image
- [skywalker512/FlarumChina](https://github.com/skywalker512/FlarumChina) - Flarum 中文优化版
- [dataplane/serverhosting](https://github.com/dataplane/serverhosting) - Dataplane.org server hosting providers
- [hangyan/docker-resources](https://github.com/hangyan/docker-resources) - Docker resources collection. docker资源汇总
- [DieterReuter/workshop-raspberrypi-64bit-os](https://github.com/DieterReuter/workshop-raspberrypi-64bit-os) - Workshop to build a 64bit Docker OS for the Raspberry Pi 3
- [Kivy-CN/GlumPy-CN](https://github.com/Kivy-CN/GlumPy-CN) - A Chinese Translation of GlumPy Documents 中文翻译GlumPy文档
- [tylerha97/awesome-reversing](https://github.com/tylerha97/awesome-reversing) - A curated list of awesome reversing resources
- [phith0n/Mind-Map](https://github.com/phith0n/Mind-Map) - 各种安全相关思维导图整理收集
- [missdeer/avege](https://github.com/missdeer/avege) - Yet Another Redsocks Golang Fork
- [HSIS007/Useful_Websites_For_Pentester](https://github.com/HSIS007/Useful_Websites_For_Pentester) - This repository is to make life of the pentester easy as it is a collection of the websites that can be used by pentesters for day to day studies and to remain updated.
- [geekcompany/ResumeSample](https://github.com/geekcompany/ResumeSample) - Resume template for Chinese programmers . 程序员简历模板系列。包括PHP程序员简历模板、iOS程序员简历模板、Android程序员简历模板、Web前端程序员简历模板、Java程序员简历模板、C/C++程序员简历模板、NodeJS程序员简历模板、架构师简历模板以及通用程序员简历模板
- [Hack-with-Github/Awesome-Security-Gists](https://github.com/Hack-with-Github/Awesome-Security-Gists) - A collection of various GitHub gists for hackers, pentesters and security researchers
- [CHYbeta/Code-Audit-Challenges](https://github.com/CHYbeta/Code-Audit-Challenges) - Code-Audit-Challenges
- [LJ147/Awesome-WeChat](https://github.com/LJ147/Awesome-WeChat) - 技术型干货分享公众号集合,点击公众号链接即可扫描快速二维码。
- [coderzh/alfred-workflows](https://github.com/coderzh/alfred-workflows) -
- [waylau/spring-cloud-tutorial](https://github.com/waylau/spring-cloud-tutorial) - Spring Cloud Tutorial.《Spring Cloud 教程》
- [gongzisun/cnretroshare](https://github.com/gongzisun/cnretroshare) - RetroShare中文介绍、FAQ、教程
- [wahyd4/aria2-ariang-x-docker-compose](https://github.com/wahyd4/aria2-ariang-x-docker-compose) - Docker compose files for Aria2+ AriaNg+ filerun/ Nextcloud/ h5ai + Plex. 图形化BT,磁力,离线下载,文件管理,播放,投屏
- [toolswatch/blackhat-arsenal-tools](https://github.com/toolswatch/blackhat-arsenal-tools) - Official Black Hat Arsenal Security Tools Repository
- [jobbole/awesome-java-cn](https://github.com/jobbole/awesome-java-cn) - Java资源大全中文版,包括开发库、开发工具、网站、博客、微信、微博等,由伯乐在线持续更新。
- [crownpku/Awesome-Chinese-NLP](https://github.com/crownpku/Awesome-Chinese-NLP) - A curated list of resources for Chinese NLP 中文自然语言处理相关资料
- [jmpews/pwn2exploit](https://github.com/jmpews/pwn2exploit) - all mine papers, pwn & exploit
- [GrrrDog/Java-Deserialization-Cheat-Sheet](https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet) - The cheat sheet about Java Deserialization vulnerabilities
- [onethawt/idaplugins-list](https://github.com/onethawt/idaplugins-list) - A list of IDA Plugins
- [codingWang/LoveImageMore](https://github.com/codingWang/LoveImageMore) - 各种技能树/图的收集整理
- [EdOverflow/bugbounty-cheatsheet](https://github.com/EdOverflow/bugbounty-cheatsheet) - A list of interesting payloads, tips and tricks for bug bounty hunters.
- [kahun/awesome-sysadmin](https://github.com/kahun/awesome-sysadmin) - A curated list of amazingly awesome open source sysadmin resources inspired by Awesome PHP.
- [geeeeeeeeek/git-recipes](https://github.com/geeeeeeeeek/git-recipes) - 🥡 Git recipes in Chinese by Zhongyi Tong. 高质量的Git中文教程.
- [xtiankisutsa/awesome-mobile-CTF](https://github.com/xtiankisutsa/awesome-mobile-CTF) - This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the platform.
- [17mon/china_ip_list](https://github.com/17mon/china_ip_list) -
- [3gstudent/CVE-2017-8464-EXP](https://github.com/3gstudent/CVE-2017-8464-EXP) - Support x86 and x64
- [ngosang/trackerslist](https://github.com/ngosang/trackerslist) - Updated list of public BitTorrent trackers
- [wizardforcel/web-hacking-101-zh](https://github.com/wizardforcel/web-hacking-101-zh) - :book: [译] Web Hacking 101 中文版
- [sergey-pronin/Awesome-Vulnerability-Research](https://github.com/sergey-pronin/Awesome-Vulnerability-Research) - 🦄 A curated list of the awesome resources about the Vulnerability Research
- [yeahwu/Google-IP-Range](https://github.com/yeahwu/Google-IP-Range) - 一个超大的 Google 全球 IP 扫描范围库
- [sh4hin/Androl4b](https://github.com/sh4hin/Androl4b) - A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
- [muellerberndt/android_app_security_checklist](https://github.com/muellerberndt/android_app_security_checklist) - Android App Security Checklist
- [hxy9243/whotofollow](https://github.com/hxy9243/whotofollow) - Who to follow on Twitter/Telegram
- [drduh/Debian-Privacy-Server-Guide](https://github.com/drduh/Debian-Privacy-Server-Guide) - Guide to using a remote Debian server for security and privacy services
- [scar45/conky_synthwave_neon](https://github.com/scar45/conky_synthwave_neon) - Synthwave-inspired Conky theme with weather support and a spiffy layout.
- [erguotou520/bye](https://github.com/erguotou520/bye) - bye to yesterday and do yourself
- [OneSecure/ShadowAgentNotes](https://github.com/OneSecure/ShadowAgentNotes) -
- [programthink/sites](https://github.com/programthink/sites) - 【编程随想】收藏的各色网站
- [PaulSec/awesome-windows-domain-hardening](https://github.com/PaulSec/awesome-windows-domain-hardening) - A curated list of awesome Security Hardening techniques for Windows.
- [Alvin9999/new-pac](https://github.com/Alvin9999/new-pac) - 翻墙-科学上网、自由上网、免费科学上网、免费翻墙、油管youtube、fanqiang、软件、VPN、一键翻墙浏览器,vps一键搭建翻墙服务器脚本/教程,免费shadowsocks/ss/ssr/v2ray/goflyway账号/节点,翻墙梯子,电脑、手机、iOS、安卓、windows、Mac、Linux、路由器翻墙、科学上网、youtube视频下载、美区apple id共享账号
- [jxtsai/infographics](https://github.com/jxtsai/infographics) - infographic
- [ipfs/ipfs](https://github.com/ipfs/ipfs) - Peer-to-peer hypermedia protocol
- [chamuco/respin](https://github.com/chamuco/respin) - Tool to backup and clone Ubuntu or Debian distros
- [game-turn-over-skill-group/sync_hosts](https://github.com/game-turn-over-skill-group/sync_hosts) - 解除Resilio Sync/BTSync限制china地区 镜像:https://coding.net/u/renerli/p/sync_hosts/git
- [iMeiji/shadowsocks_install](https://github.com/iMeiji/shadowsocks_install) - Auto install shadowsocks server,thanks 秋水逸冰
- [mdrights/os-observe](https://github.com/mdrights/os-observe) - 我的Linux / 隐私安全笔记
- [uhub/awesome-c](https://github.com/uhub/awesome-c) - A curated list of awesome C frameworks, libraries and software.
- [sindresorhus/awesome-nodejs](https://github.com/sindresorhus/awesome-nodejs) - :zap: Delightful Node.js packages and resources
- [mawenjian/china-cdn-domain-whitelist](https://github.com/mawenjian/china-cdn-domain-whitelist) - 中国CDN服务提供商域名白名单(China CDN Service Providers' Domain Whitelist)
- [3xp10it/php_cve-2014-8142_cve-2015-0231](https://github.com/3xp10it/php_cve-2014-8142_cve-2015-0231) - php_cve-2014-8142_cve-2015-0231的漏洞环境docker
- [shieldfy/API-Security-Checklist](https://github.com/shieldfy/API-Security-Checklist) - Checklist of the most important security countermeasures when designing, testing, and releasing your API
- [m0l1ce/wooyunallbugs](https://github.com/m0l1ce/wooyunallbugs) - wooyun_all_bugs
- [gfwlist/gfwlist](https://github.com/gfwlist/gfwlist) - The one and only one gfwlist here
- [jinyu121/SurgeRule](https://github.com/jinyu121/SurgeRule) - Deprecate since 2016
- [lu4nx/Exploit-Exercises-Nebula](https://github.com/lu4nx/Exploit-Exercises-Nebula) - Exploit-Exercises Nebula全攻略——Linux平台下的漏洞分析入门
- [AonCyberLabs/Docker-Secure-Deployment-Guidelines](https://github.com/AonCyberLabs/Docker-Secure-Deployment-Guidelines) - Deployment checklist for securely deploying Docker
- [joyceqi/vulnerability-analysis-report](https://github.com/joyceqi/vulnerability-analysis-report) - here records some personal vulnerability analysis reports
- [vysecurity/RedTips](https://github.com/vysecurity/RedTips) - Red Team Tips as posted by @vysecurity on Twitter
- [XeusHack/Awesome-Hacking-Practice](https://github.com/XeusHack/Awesome-Hacking-Practice) - A curated list of websites and apps to help you practice hacking
- [mandatoryprogrammer/RussiaDNSLeak](https://github.com/mandatoryprogrammer/RussiaDNSLeak) - Summary and archives of leaked Russian TLD DNS data
- [xiaolai/INB-Principles](https://github.com/xiaolai/INB-Principles) - Blockchain related ICO Investing Principles by INBlockchain
- [hobby-kube/guide](https://github.com/hobby-kube/guide) - Kubernetes clusters for the hobbyist.
- [rshipp/awesome-malware-analysis](https://github.com/rshipp/awesome-malware-analysis) - Defund the Police.
- [kailashahirwar/cheatsheets-ai](https://github.com/kailashahirwar/cheatsheets-ai) - Essential Cheat Sheets for deep learning and machine learning researchers https://medium.com/@kailashahirwar/essential-cheat-sheets-for-machine-learning-and-deep-learning-researchers-efb6a8ebd2e5
- [alexpate/awesome-design-systems](https://github.com/alexpate/awesome-design-systems) - 💅🏻 ⚒ A collection of awesome design systems
- [djadmin/awesome-bug-bounty](https://github.com/djadmin/awesome-bug-bounty) - A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.
- [sdmg15/Best-websites-a-programmer-should-visit](https://github.com/sdmg15/Best-websites-a-programmer-should-visit) - :link: Some useful websites for programmers.
- [mbasso/awesome-wasm](https://github.com/mbasso/awesome-wasm) - 😎 Curated list of awesome things regarding WebAssembly (wasm) ecosystem.
- [chentsulin/awesome-graphql](https://github.com/chentsulin/awesome-graphql) - Awesome list of GraphQL
- [FallibleInc/security-guide-for-developers](https://github.com/FallibleInc/security-guide-for-developers) - Security Guide for Developers (实用性开发人员安全须知)
- [ptresearch/AttackDetection](https://github.com/ptresearch/AttackDetection) - Attack Detection
- [NotSoSecure/password_cracking_rules](https://github.com/NotSoSecure/password_cracking_rules) - One rule to crack all passwords. or atleast we hope so.
- [Han0nly/SecurityRSS](https://github.com/Han0nly/SecurityRSS) - 网络安全相关的RSS订阅列表
- [exakat/php-static-analysis-tools](https://github.com/exakat/php-static-analysis-tools) - A reviewed list of useful PHP static analysis tools
- [sublimino/awesome-funny-markov](https://github.com/sublimino/awesome-funny-markov) - A curated list of delightfully amusing and facetious Markov chain output.
- [mikesiko/PracticalMalwareAnalysis-Labs](https://github.com/mikesiko/PracticalMalwareAnalysis-Labs) - Binaries for the book Practical Malware Analysis
- [akullpp/awesome-java](https://github.com/akullpp/awesome-java) - A curated list of awesome frameworks, libraries and software for the Java programming language.
- [Jermic/Android-Crack-Tool](https://github.com/Jermic/Android-Crack-Tool) - 🐞Android crack tool For Mac
- [coreb1t/awesome-pentest-cheat-sheets](https://github.com/coreb1t/awesome-pentest-cheat-sheets) - Collection of the cheat sheets useful for pentesting
- [ZonkSec/persistence-aggressor-script](https://github.com/ZonkSec/persistence-aggressor-script) - initial commit
- [wainshine/Chinese-Names-Corpus](https://github.com/wainshine/Chinese-Names-Corpus) - 中文人名语料库。人名生成器。中文姓名,姓氏,名字,称呼,日本人名,翻译人名,英文人名。可用于中文分词、人名实体识别。
- [virajkulkarni14/WebDeveloperSecurityChecklist](https://github.com/virajkulkarni14/WebDeveloperSecurityChecklist) - A checklist of important security issues you should consider when creating a web application.
- [Ettack/WebshellCCL](https://github.com/Ettack/WebshellCCL) - A python script help with webshell bypassing.
- [markets/awesome-ruby](https://github.com/markets/awesome-ruby) - 💎 A collection of awesome Ruby libraries, tools, frameworks and software
- [Security-Onion-Solutions/security-onion](https://github.com/Security-Onion-Solutions/security-onion) - Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
- [carpedm20/awesome-hacking](https://github.com/carpedm20/awesome-hacking) - A curated list of awesome Hacking tutorials, tools and resources
- [embedded-boston/awesome-embedded-systems](https://github.com/embedded-boston/awesome-embedded-systems) - A curated list of delightful Embedded Systems libraries, RTOSes, modules, references and more!
- [jobbole/awesome-python-books](https://github.com/jobbole/awesome-python-books) - 如果有人让你推荐 Python 技术书,请让他看这个列表
- [aalhour/awesome-compilers](https://github.com/aalhour/awesome-compilers) - :sunglasses: Curated list of awesome resources on Compilers, Interpreters and Runtimes
- [sam-b/windows_kernel_resources](https://github.com/sam-b/windows_kernel_resources) - Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits
- [SecWiki/sec-chart](https://github.com/SecWiki/sec-chart) - 安全思维导图集合
- [drduh/macOS-Security-and-Privacy-Guide](https://github.com/drduh/macOS-Security-and-Privacy-Guide) - Guide to securing and improving privacy on macOS
- [PolarisLab/SecPaper](https://github.com/PolarisLab/SecPaper) - SecurityPaper For www.polaris-lab.com
- [skyw4tch3r/RootKits-List-Download](https://github.com/skyw4tch3r/RootKits-List-Download) - This is the list of all rootkits found so far on github and other sites.
- [secfigo/Awesome-Fuzzing](https://github.com/secfigo/Awesome-Fuzzing) - A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Developme
- [michaelliao/awesome-python3-webapp](https://github.com/michaelliao/awesome-python3-webapp) - 小白的Python入门教程实战篇:网站+iOS App源码→ http://t.cn/R2PDyWN 赞助→ http://t.cn/R5bhVpf
- [IVMachiavelli/OSINT_Team_Links](https://github.com/IVMachiavelli/OSINT_Team_Links) - Links for the OSINT Team
- [Naetw/CTF-pwn-tips](https://github.com/Naetw/CTF-pwn-tips) - Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.
- [jivoi/awesome-ml-for-cybersecurity](https://github.com/jivoi/awesome-ml-for-cybersecurity) - :octocat: Machine Learning for Cyber Security
- [vasanthk/web-security-basics](https://github.com/vasanthk/web-security-basics) - Web security concepts
- [Hack-with-Github/Powerful-Plugins](https://github.com/Hack-with-Github/Powerful-Plugins) - Powerful plugins and add-ons for hackers
- [jynychen/pasc2at](https://github.com/jynychen/pasc2at) - 高级PHP应用程序漏洞审核技术 by 80vul
- [PyroTek3/PowerShell-AD-Recon](https://github.com/PyroTek3/PowerShell-AD-Recon) - PowerShell Scripts I find useful
- [masatokinugawa/filterbypass](https://github.com/masatokinugawa/filterbypass) - Browser's XSS Filter Bypass Cheat Sheet
- [ludiosarchive/unfixed-security-bugs](https://github.com/ludiosarchive/unfixed-security-bugs) - A list of publicly known but unfixed security bugs
- [futurice/android-best-practices](https://github.com/futurice/android-best-practices) - Do's and Don'ts for Android development, by Futurice developers
- [infoslack/awesome-web-hacking](https://github.com/infoslack/awesome-web-hacking) - A list of web application security
- [ranxian/xv6-chinese](https://github.com/ranxian/xv6-chinese) - 中文版的 MIT xv6 文档
- [jonbruner/twitter-analysis](https://github.com/jonbruner/twitter-analysis) - The original dataset for my 2013 article on Twitter's network patterns
- [wsargent/docker-cheat-sheet](https://github.com/wsargent/docker-cheat-sheet) - Docker Cheat Sheet
- [BastilleResearch/mousejack](https://github.com/BastilleResearch/mousejack) - MouseJack device discovery and research tools
- [pandazheng/Threat-Intelligence-Analyst](https://github.com/pandazheng/Threat-Intelligence-Analyst) - 威胁情报,恶意样本分析,开源Malware代码收集
- [mfornos/awesome-microservices](https://github.com/mfornos/awesome-microservices) - A curated list of Microservice Architecture related principles and technologies.
- [toolinbox/iPic](https://github.com/toolinbox/iPic) - iPic could automatically upload images and save Markdown links.
- [orangetw/bug-bounty-reference](https://github.com/orangetw/bug-bounty-reference) - Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature
- [SecYouth/sec-jobs](https://github.com/SecYouth/sec-jobs) - 信息安全实习和校招的面经、真题和资料 减少安全选手找实习/工作的痛苦
- [Haixing-Hu/typesetting-standard](https://github.com/Haixing-Hu/typesetting-standard) - 中文排版所需遵循的标准和规范
- [sparanoid/chinese-copywriting-guidelines](https://github.com/sparanoid/chinese-copywriting-guidelines) - Chinese copywriting guidelines for better written communication/中文文案排版指北
- [berzerk0/Probable-Wordlists](https://github.com/berzerk0/Probable-Wordlists) - Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!
- [endymecy/awesome-deeplearning-resources](https://github.com/endymecy/awesome-deeplearning-resources) - Deep Learning and deep reinforcement learning research papers and some codes
- [jaybosamiya/security-notes](https://github.com/jaybosamiya/security-notes) - :notebook: Some security related notes
- [Cactus-proj/Reverse-Engineering-for-Beginners-CHS](https://github.com/Cactus-proj/Reverse-Engineering-for-Beginners-CHS) - Reverse Engineering for Beginners 这本书的翻译完善
- [AV1080p/Benchmarks](https://github.com/AV1080p/Benchmarks) - 常用服务器、数据库、中间件安全配置基线 - 基本包括了所有的操作系统、数据库、中间件、网络设备、浏览器,安卓、IOS、云的安全配置 For benchmarks.cisecurity.org
- [recdnsfp/recdnsfp.github.io](https://github.com/recdnsfp/recdnsfp.github.io) -
- [xNymia/Suricata-Signatures](https://github.com/xNymia/Suricata-Signatures) - Suricata rules for Emerging Threats and funkyness
- [qazbnm456/awesome-web-security](https://github.com/qazbnm456/awesome-web-security) - 🐶 A curated list of Web Security materials and resources.
- [Te-k/flexidie](https://github.com/Te-k/flexidie) - Source code and binaries of FlexiSpy from the Flexidie dump
- [jivoi/awesome-osint](https://github.com/jivoi/awesome-osint) - :scream: A curated list of amazingly awesome OSINT
- [qazbnm456/awesome-cve-poc](https://github.com/qazbnm456/awesome-cve-poc) - ✍️ A curated list of CVE PoCs.
- [veggiemonk/awesome-docker](https://github.com/veggiemonk/awesome-docker) - :whale: A curated list of Docker resources and projects
- [meirwah/awesome-incident-response](https://github.com/meirwah/awesome-incident-response) - A curated list of tools for incident response
- [bluscreenofjeff/Red-Team-Infrastructure-Wiki](https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki) - Wiki to collect Red Team infrastructure hardening resources
- [Idnan/bash-guide](https://github.com/Idnan/bash-guide) - A guide to learn bash
- [Cryptogenic/Exploit-Writeups](https://github.com/Cryptogenic/Exploit-Writeups) - A collection where my current and future writeups for exploits/CTF will go
- [TuuuNya/fuzz_dict](https://github.com/TuuuNya/fuzz_dict) - 常用的一些fuzz及爆破字典,欢迎大神继续提供新的字典及分类。
- [We5ter/Scanners-Box](https://github.com/We5ter/Scanners-Box) - A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
- [angular-pakistan/ng-conf-2017](https://github.com/angular-pakistan/ng-conf-2017) - Everything #ngConf2017 - talks - slides - resources
- [wwj718/awesome-raspberry-pi-zh](https://github.com/wwj718/awesome-raspberry-pi-zh) - 树莓派(Raspberry Pi )资源大全中文版 , 包括工具、项目、镜像、资源等
- [michalmalik/osx-re-101](https://github.com/michalmalik/osx-re-101) - A collection of resources for OSX/iOS reverse engineering.
- [caomulaodao/XSS-Filter-Evasion-Cheat-Sheet-CN](https://github.com/caomulaodao/XSS-Filter-Evasion-Cheat-Sheet-CN) - XSS_Filter_Evasion_Cheat_Sheet 中文版
- [cure53/XSSChallengeWiki](https://github.com/cure53/XSSChallengeWiki) - Welcome to the XSS Challenge Wiki!
- [shmilylty/awesome-hacking](https://github.com/shmilylty/awesome-hacking) - awesome hacking chinese version
- [Hack-with-Github/Awesome-Hacking](https://github.com/Hack-with-Github/Awesome-Hacking) - A collection of various awesome lists for hackers, pentesters and security researchers
- [Hack-with-Github/Free-Security-eBooks](https://github.com/Hack-with-Github/Free-Security-eBooks) - Free Security and Hacking eBooks
- [cn0xroot/RFSec-ToolKit](https://github.com/cn0xroot/RFSec-ToolKit) - RFSec-ToolKit is a collection of Radio Frequency Communication Protocol Hacktools.无线通信协议相关的工具集,可借助SDR硬件+相关工具对无线通信进行研究。Collect with ♥ by HackSmith
- [pillarjs/understanding-csrf](https://github.com/pillarjs/understanding-csrf) - What are CSRF tokens and how do they work?
- [automayt/FlowAnalysisDocker](https://github.com/automayt/FlowAnalysisDocker) - A Dockerfile for creation of an Ubuntu Docker with SiLK/YAF/FlowBAT for testing.
- [herrbischoff/awesome-macos-command-line](https://github.com/herrbischoff/awesome-macos-command-line) - Use your macOS terminal shell to do awesome things.
- [tiancode/learn-hacking](https://github.com/tiancode/learn-hacking) - 开始学习Kali Linux 各种破解教程 渗透测试 逆向工程 HackThisSite挑战问题解答
- [justjavac/Google-IPs](https://github.com/justjavac/Google-IPs) - :us: Google 全球 IP 地址库
- [exploitprotocol/IoT-Security-Wiki](https://github.com/exploitprotocol/IoT-Security-Wiki) -
- [AntBranch/awesome-github](https://github.com/AntBranch/awesome-github) - A curated list of awesome GitHub guides, articles, sites, tools, projects and resources. 收集这个列表,只是为了更好地使用GitHub,欢迎提交pr和issue。
- [1021683053/awesome-raspberry-pi-zh](https://github.com/1021683053/awesome-raspberry-pi-zh) - 树莓派工具,镜像,教程,文章
- [inputsh/awesome-linux](https://github.com/inputsh/awesome-linux) - :penguin: A list of awesome projects and resources that make Linux even more awesome. :penguin:
- [ihchiz/Awesome-Linux-Software-zh_CN](https://github.com/ihchiz/Awesome-Linux-Software-zh_CN) - 🐧 一个 Linux 上超赞的应用,软件,工具以及其它资源的集中地。
- [JaredCubilla/sublime](https://github.com/JaredCubilla/sublime) - A collection of some of the best Sublime Text packages, themes, and goodies.
- [BruceDone/awesome-crawler](https://github.com/BruceDone/awesome-crawler) - A collection of awesome web crawler,spider in different languages
- [dodola/Gitbook](https://github.com/dodola/Gitbook) - 收录找到的不错的文档
- [PiPHP/Resources](https://github.com/PiPHP/Resources) - A resource directory for PHP programming on a Raspberry Pi
- [youyudehexie/node123](https://github.com/youyudehexie/node123) - node.js中文资料导航
- [francistao/LearningNotes](https://github.com/francistao/LearningNotes) - Enjoy Learning.
- [staticfile/static](https://github.com/staticfile/static) - 开放静态文件 - 为开源库提供稳定、快速的免费 CDN 服务
- [jwasham/coding-interview-university](https://github.com/jwasham/coding-interview-university) - A complete computer science study plan to become a software engineer.
- [fex-team/styleguide](https://github.com/fex-team/styleguide) - 文档与源码编写风格
- [ruanyf/jstraining](https://github.com/ruanyf/jstraining) - 全栈工程师培训材料
- [hackstoic/golang-open-source-projects](https://github.com/hackstoic/golang-open-source-projects) - 为互联网IT人打造的中文版awesome-go
- [FrankFang/best-chinese-front-end-blogs](https://github.com/FrankFang/best-chinese-front-end-blogs) - 收集优质的中文前端博客
- [ZuzooVn/machine-learning-for-software-engineers](https://github.com/ZuzooVn/machine-learning-for-software-engineers) - A complete daily plan for studying to become a machine learning engineer.
- [qyuhen/book](https://github.com/qyuhen/book) - 学习笔记
- [facert/python-data-structure-cn](https://github.com/facert/python-data-structure-cn) - problem-solving-with-algorithms-and-data-structure-using-python 中文版
- [shimohq/react-cookbook](https://github.com/shimohq/react-cookbook) - 编写简洁漂亮,可维护的 React 应用
- [a8m/golang-cheat-sheet](https://github.com/a8m/golang-cheat-sheet) - An overview of Go syntax and features.
- [TonnyL/Awesome_APIs](https://github.com/TonnyL/Awesome_APIs) - :octocat: A collection of APIs
- [judasn/IntelliJ-IDEA-Tutorial](https://github.com/judasn/IntelliJ-IDEA-Tutorial) - IntelliJ IDEA 简体中文专题教程
- [lxj616/docker-dvwa-wooyun](https://github.com/lxj616/docker-dvwa-wooyun) - docker contained dvwa with wooyun plugin## PHP
- [iQingshan/PhpPassWaf](https://github.com/iQingshan/PhpPassWaf) - Php免杀学习
- [DirectoryTree/LdapRecord](https://github.com/DirectoryTree/LdapRecord) - A fully-featured LDAP framework.
- [ProbiusOfficial/Hello-CTF](https://github.com/ProbiusOfficial/Hello-CTF) - 【Hello CTF】题目配套,免费开源的CTF入门教程,针对0基础新手编写,同时兼顾信息差的填补,对各阶段的CTFer都友好的开源教程,致力于CTF和网络安全的开源生态!
- [StarCrossPortal/swallow](https://github.com/StarCrossPortal/swallow) - 代码审计自动化系统,底层架构为蜻蜓编排系统,墨菲SCA,fortify,SemGrep,hema
- [0xs1riu5/vulawdhub](https://github.com/0xs1riu5/vulawdhub) - 该项目是利用docker技术创建的有漏洞的cms环境集合,可以进行练习
- [ine-labs/AWSGoat](https://github.com/ine-labs/AWSGoat) - AWSGoat : A Damn Vulnerable AWS Infrastructure
- [luolongfei/freenom](https://github.com/luolongfei/freenom) - Freenom 域名自动续期。Freenom domain name renews automatically.
- [zidansec/CloudPeler](https://github.com/zidansec/CloudPeler) - CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool you can easily see the real IP of websites that have been protected by CloudFlare. The resulting informat
- [SNCKER/CVE-2021-3129](https://github.com/SNCKER/CVE-2021-3129) - Laravel debug rce
- [cckuailong/reapoc](https://github.com/cckuailong/reapoc) - OpenSource Poc && Vulnerable-Target Storage Box.
- [StarCrossPortal/QingTing](https://github.com/StarCrossPortal/QingTing) - 蜻蜓安全一个安全工具编排平台,可以自由编排你的工具流,集成108款工具,包括xray、nmap、awvs等;你可以将喜欢的工具编排成一个场景,快速打造适合自己的安全工作台~
- [lu2ker/PHP-Code](https://github.com/lu2ker/PHP-Code) - 通过ThinkPHP框架学习PHP代码审计
- [scheatkode/presshell](https://github.com/scheatkode/presshell) - 🚪 Quick & dirty Wordpress Command Execution Shell
- [UlyssesTakusen/vendor](https://github.com/UlyssesTakusen/vendor) - 基于PHP-Parser生成AST抽象语法树
- [antlers12/CTFd_sqlilabs](https://github.com/antlers12/CTFd_sqlilabs) -
- [Xib3rR4dAr/WannaRace](https://github.com/Xib3rR4dAr/WannaRace) - WebApp intentionally made vulnerable to Race Condition for practicing Race Condition
- [SummerSec/BlogPapers](https://github.com/SummerSec/BlogPapers) - <a href="sumsec.me"><img src="https://readme-typing-svg.demolab.com?font=Fira+Code&size=24&pause=1000&color=FDFDFD&background=13797800¢er=true&vCenter=true&width=435&lines=%F0%9F%91%8B%EF
- [kuaifan/dootask](https://github.com/kuaifan/dootask) - DooTask是一款开源在线项目任务管理工具,提供各类文档协作工具、在线思维导图、在线流程图、项目管理、任务分发、即时IM,文件管理等工具;同时消息功能使用非对称加密技术让你的沟通更安全。
- [refengs/noteb-labs](https://github.com/refengs/noteb-labs) - Noteb-B web漏洞靶场平台
- [kalcaddle/kodbox](https://github.com/kalcaddle/kodbox) - kodbox is a file manager for web. It is a newly designed product based on kodexplorer. It is also a web code editor, which allows you to develop websites directly within the web browser.You can run ko
- [MISP/MISP](https://github.com/MISP/MISP) - MISP (core software) - Open Source Threat Intelligence and Sharing Platform
- [ianxtianxt/74cms-upload](https://github.com/ianxtianxt/74cms-upload) - 新版74cms v4.2.126-任意文件读取漏洞
- [wdjisn/laravel-admin](https://github.com/wdjisn/laravel-admin) - LaravelAdmin是基于PHP开发的基础管理后台系统,做到开箱即用,为新项目开发省去了基础功能开发的步骤;此系统采用前后端分离模式,后端使用Laravel,前端使用vue;主要包含:登录、注销、可视化数据大屏、管理员、角色管理、菜单管理、权限管理、错误日志、登录日志、访问日志、获取服务器CPU使用率、内存使用率等功能。后端主要使用Artisan命令行、Jobs消息队列、 Rules验证规则、
- [swagkarna/Rafel-Rat](https://github.com/swagkarna/Rafel-Rat) - -------> RAFEL<------ Android Rat Written in Java With WebPanel For Controlling Victims...Hack Android Devices
- [Nickguitar/YAPS](https://github.com/Nickguitar/YAPS) - Yet Another PHP Shell - The most complete PHP reverse shell
- [m9rco/algorithm-php](https://github.com/m9rco/algorithm-php) - 🍭🍭uniting the internal work in a way that is in PHP
- [oldkingcone/slopShell](https://github.com/oldkingcone/slopShell) - the only php webshell you need.
- [infosecak/defenselessV1](https://github.com/infosecak/defenselessV1) - Just another vulnerable web application.
- [Rinkish/Sqli_Edited_Version](https://github.com/Rinkish/Sqli_Edited_Version) - Edited SQLi Audi lab series so that it can work in kali linux with PhpVersion 7+
- [nicoSWD/asvs-checklist](https://github.com/nicoSWD/asvs-checklist) - OWASP Application Security Verification Standard 4.0 Checklist
- [Macr0phag3/webshell-bypassed-human](https://github.com/Macr0phag3/webshell-bypassed-human) - 过人 webshell 的生成工具
- [PrivateBin/PrivateBin](https://github.com/PrivateBin/PrivateBin) - A minimalist, open source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256 bits AES.
- [m0nkeyshell/WebSecLab-1](https://github.com/m0nkeyshell/WebSecLab-1) -
- [le31ei/ctf_challenges](https://github.com/le31ei/ctf_challenges) - 适用于一线安服的ctf培训题目,全docker环境一键启动
- [sqlsec/upload-labs-docker](https://github.com/sqlsec/upload-labs-docker) - 国光的文件上传靶场,基于 upload-labs 定制
- [sqlsec/ssrf-vuls](https://github.com/sqlsec/ssrf-vuls) - 国光的手把手带你用 SSRF 打穿内网靶场源码
- [BuildHackSecure/request_logger](https://github.com/BuildHackSecure/request_logger) - Application for logging HTTP and DNS Requests
- [sh377c0d3/Payloads](https://github.com/sh377c0d3/Payloads) - Payload Arsenal for Pentration Tester and Bug Bounty Hunters
- [Jiab77/nmap-webui](https://github.com/Jiab77/nmap-webui) - A simple web interface for Nmap with a XML to JSON reports converter
- [GemGeorge/SniperPhish](https://github.com/GemGeorge/SniperPhish) - SniperPhish - The Web-Email Spear Phishing Toolkit
- [bewhale/thinkphp_gui_tools](https://github.com/bewhale/thinkphp_gui_tools) - ThinkPHP漏洞综合利用工具, 图形化界面, 命令执行, 一键getshell, 批量检测, 日志遍历, session包含,宝塔绕过
- [vimeo/php-mysql-engine](https://github.com/vimeo/php-mysql-engine) - A MySQL engine written in pure PHP
- [securityRoad/HoneyPot](https://github.com/securityRoad/HoneyPot) - Typecho 蜜罐/日志审计安全插件
- [repoog/PassPwned](https://github.com/repoog/PassPwned) - API for querying big data of broken personal data
- [TomAPU/ThinkPHP-Unserialize-Collection](https://github.com/TomAPU/ThinkPHP-Unserialize-Collection) - ThinkPHP各版本反序列化利用代码
- [ZE3kr/Cloudflare-CNAME-Setup](https://github.com/ZE3kr/Cloudflare-CNAME-Setup) -
- [zigoo0/JSONBee](https://github.com/zigoo0/JSONBee) - A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites.
- [A3h1nt/Grawler](https://github.com/A3h1nt/Grawler) - Grawler is a tool written in PHP which comes with a web interface that automates the task of using google dorks, scrapes the results, and stores them in a file.
- [eastmountyxz/CyberSecurityBox](https://github.com/eastmountyxz/CyberSecurityBox) - 该资源为网络安全和Web渗透各种类型题目的离线靶场,主要采用PHP语言实现,包括XSS攻击、文件上传漏洞、SQL注入等,基础性资源,希望对安全初学者有所帮助。加油~
- [abhinavprasad47/Awsome-shells](https://github.com/abhinavprasad47/Awsome-shells) - Collection of reverse shells
- [choirurrizal/paraminer](https://github.com/choirurrizal/paraminer) - finds hidden parameters
- [mIcHyAmRaNe/wso-webshell](https://github.com/mIcHyAmRaNe/wso-webshell) - 🕹 wso php webshell
- [dr0op/k4l0ng_WAF](https://github.com/dr0op/k4l0ng_WAF) - A broute detect WAF by PHP using to AWD
- [valbrux/WebSecArs](https://github.com/valbrux/WebSecArs) - Web Security payloads & co.
- [MyIntervals/emogrifier](https://github.com/MyIntervals/emogrifier) - Converts CSS styles into inline style attributes in your HTML code.
- [1062497537/Awvs-Xray](https://github.com/1062497537/Awvs-Xray) - Awvs 批量添加扫描/删除任务 + 可选式对接Xray 自动化挖洞
- [adamfisk/LittleProxy](https://github.com/adamfisk/LittleProxy) - High performance HTTP proxy originally written by your friends at Lantern and now maintained by a stellar group of volunteer open source programmers.
- [zseano/InputScanner](https://github.com/zseano/InputScanner) -
- [smaranchand/bucky](https://github.com/smaranchand/bucky) - Bucky (An automatic S3 bucket discovery tool)
- [zerofox-oss/phishpond](https://github.com/zerofox-oss/phishpond) - Because phishtank was taken.. explore phishing kits in a contained environment!
- [J0o1ey/rips-Chinese](https://github.com/J0o1ey/rips-Chinese) - 本人三年前汉化的PHP代码审计工具rips
- [wofeiwo/webcgi-exploits](https://github.com/wofeiwo/webcgi-exploits) - Multi-language web CGI interfaces exploits.
- [r00tSe7en/Mail-Probe](https://github.com/r00tSe7en/Mail-Probe) - 邮箱探针后台管理系统
- [incredibleindishell/SSRF_Vulnerable_Lab](https://github.com/incredibleindishell/SSRF_Vulnerable_Lab) - This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
- [V7hinc/wooyun_final](https://github.com/V7hinc/wooyun_final) - 根据hanc00l和m0l1ce提供的数据构建docker版的乌云漏洞库,包含8.8W漏洞信息
- [DasSecurity-HatLab/AoiAWD](https://github.com/DasSecurity-HatLab/AoiAWD) - AoiAWD-专为比赛设计,便携性好,低权限运行的EDR系统。
- [beched/php_disable_functions_bypass](https://github.com/beched/php_disable_functions_bypass) - procfs-based PHP sandbox bypass
- [PlutoaCharon/AWD-Attack-Defense](https://github.com/PlutoaCharon/AWD-Attack-Defense) - CTF-AWD攻防脚本工具合集
- [ethicalhackingplayground/fuzzdb-1](https://github.com/ethicalhackingplayground/fuzzdb-1) - Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
- [ivan-sincek/penetration-testing-cheat-sheet](https://github.com/ivan-sincek/penetration-testing-cheat-sheet) - Work in progress...
- [lucasmartinelle/AnotherVulnerableWebApp](https://github.com/lucasmartinelle/AnotherVulnerableWebApp) -
- [reconmap/rest-api](https://github.com/reconmap/rest-api) - REST API backend for Reconmap
- [phpstan/phpstan](https://github.com/phpstan/phpstan) - PHP Static Analysis Tool - discover bugs in your code without running it!
- [lucideus-repo/UnSAFE_Bank](https://github.com/lucideus-repo/UnSAFE_Bank) - Vulnerable Banking Suite
- [evilc0deooo/PentesterSpecialDict](https://github.com/evilc0deooo/PentesterSpecialDict) - 构建并优化高效的渗透测试字典集合,以提升网络安全从业人员的测试效率和效果。
- [momosecurity/mosec-composer-plugin](https://github.com/momosecurity/mosec-composer-plugin) - 用于检测composer项目的第三方依赖组件是否存在安全漏洞。
- [nikic/PHP-Parser](https://github.com/nikic/PHP-Parser) - A PHP parser written in PHP
- [gyxuehu/EwoMail](https://github.com/gyxuehu/EwoMail) - EwoMail是基于Linux的企业邮箱服务器,集成了众多优秀稳定的组件,是一个快速部署、简单高效、多语言、安全稳定的邮件解决方案
- [lucasfrag/Kali-Linux-Tools-Interface](https://github.com/lucasfrag/Kali-Linux-Tools-Interface) - Graphical Web interface developed to facilitate the use of security information tools.
- [hightman/xunsearch](https://github.com/hightman/xunsearch) - 免费开源的中文搜索引擎,采用 C/C++ 编写 (基于 xapian 和 scws),提供 PHP 的开发接口和丰富文档
- [asphxg/findpass](https://github.com/asphxg/findpass) - 基于sphinx的社工库
- [DimopoulosElias/xhrStealer](https://github.com/DimopoulosElias/xhrStealer) - XHR Posts cookie and body html. PHP receives the data and saves in md format with html highling.
- [mm0r1/exploits](https://github.com/mm0r1/exploits) - Pwn stuff.
- [hisiphp/hisiphp](https://github.com/hisiphp/hisiphp) - HisiPHP V2版是基于ThinkPHP5.1和Layui开发的后台框架,承诺永久免费开源,您可用于学习和商用,但须保留版权信息正常显示。如果HisiPHP对您有帮助,您可以点击右上角 "Star" 支持一下哦,谢谢!
- [joesmithjaffa/jenkins-shell](https://github.com/joesmithjaffa/jenkins-shell) - Automating Jenkins Hacking using Shodan API
- [shouldbee/reserved-usernames](https://github.com/shouldbee/reserved-usernames) - 590+ usernames in this dictionary! A list of reserved usernames to prevent url collision with resource paths. This repository hosts the list in multiple formats like JSON, CSV, SQL and plain text. You
- [FloeDesignTechnologies/phpcs-security-audit](https://github.com/FloeDesignTechnologies/phpcs-security-audit) - phpcs-security-audit is a set of PHP_CodeSniffer rules that finds vulnerabilities and weaknesses related to security in PHP code
- [4x99/code6](https://github.com/4x99/code6) - 码小六 - GitHub 代码泄露监控系统
- [dotboris/vuejs-serverside-template-xss](https://github.com/dotboris/vuejs-serverside-template-xss) - Demo of a Vue.js app that mixes both clientside templates and serverside templates leading to an XSS vulnerability
- [EnginDemirbilek/NorthStarC2](https://github.com/EnginDemirbilek/NorthStarC2) - Web Based Command Control Framework (C2) #C2 #PostExploitation #CommandControl #RedTeam #C2Framework #PHPC2 #.NETMalware #Malware #PHPMalware #CnC #infosec #offensivesecurity #Trojan
- [whirlwind110/tphack](https://github.com/whirlwind110/tphack) - Thinkphp3/5 Log文件泄漏利用工具
- [vavkamil/dvwp](https://github.com/vavkamil/dvwp) - Damn Vulnerable WordPress
- [TheKingOfDuck/XSS-Fishing2-CS](https://github.com/TheKingOfDuck/XSS-Fishing2-CS) - 鱼儿在cs上线后自动收杆|Automatically stop fishing in javascript after the fish is hooked
- [hack2012/xssblind](https://github.com/hack2012/xssblind) - 使用docker-compose一键快速搭建ezXSS环境
- [mo-xiaoxi/CTF_Web_docker](https://github.com/mo-xiaoxi/CTF_Web_docker) - dockers for CTF_Web.
- [SpiderMate/B-XSSRF](https://github.com/SpiderMate/B-XSSRF) - Toolkit to detect and keep track on Blind XSS, XXE & SSRF
- [webshellpub/awsome-webshell](https://github.com/webshellpub/awsome-webshell) - webshell样本大合集。收集各种webshell用于webshell分析与发现。——www.shellpub.com
- [backdoorhub/shell-backdoor-list](https://github.com/backdoorhub/shell-backdoor-list) - 🎯 PHP / ASP - Shell Backdoor List 🎯
- [j4yd33/hacking-files](https://github.com/j4yd33/hacking-files) - Arquivos para estudo sobre Bug Bounty.
- [lightswitch05/php-version-audit](https://github.com/lightswitch05/php-version-audit) - Audit your PHP version for known CVEs and patches
- [BookStackApp/BookStack](https://github.com/BookStackApp/BookStack) - A platform to create documentation/wiki content built with PHP & Laravel
- [orangetw/My-CTF-Web-Challenges](https://github.com/orangetw/My-CTF-Web-Challenges) - Collection of CTF Web challenges I made
- [eboda/35c3](https://github.com/eboda/35c3) - Challenges I created for 35c3
- [monicahq/monica](https://github.com/monicahq/monica) - Personal CRM. Remember everything about your friends, family and business relationships.
- [slince/composer-registry-manager](https://github.com/slince/composer-registry-manager) - :hammer_and_wrench: :hammer: Composer registry manager that help to easily switch to the composer repository you want.
- [r00tSe7en/get_AV](https://github.com/r00tSe7en/get_AV) - Windows杀软在线对比辅助
- [jiushill/note](https://github.com/jiushill/note) - 记录自己写的工具和学习笔记
- [susers/Writeups](https://github.com/susers/Writeups) - 国内各大CTF赛题及writeup整理
- [kasuganosoras/SyncMusic](https://github.com/kasuganosoras/SyncMusic) - 🎵 PHP Swoole 开发的在线同步点歌台,支持自由点歌,切歌,调整排序,删除指定音乐以及基础权限分级
- [fecshop/yii2_fecshop](https://github.com/fecshop/yii2_fecshop) - yii2 ( PHP ) fecmall(fecshop) core code used for ecommerce shop 多语言多货币多入口的开源电商 B2C 商城,支持移动端vue, app, html5,微信小程序微店,微信小程序商城等
- [wolves-aman/AmanCTF](https://github.com/wolves-aman/AmanCTF) -
- [Jsitech/JShielder](https://github.com/Jsitech/JShielder) - Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS Benchmark
- [ssl/ezXSS](https://github.com/ssl/ezXSS) - ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
- [momosecurity/rhizobia_P](https://github.com/momosecurity/rhizobia_P) - PHP安全SDK及编码规范
- [zzb1999/xss-platform](https://github.com/zzb1999/xss-platform) - 一款基于ThinkPHP5.1的XSS管理平台。
- [weprovide/valet-plus](https://github.com/weprovide/valet-plus) - Blazing fast macOS PHP development environment
- [78778443/xssplatform](https://github.com/78778443/xssplatform) - 一个经典的XSS渗透管理平台
- [Tai7sy/LotServer_KeyGen](https://github.com/Tai7sy/LotServer_KeyGen) - A LotServer KeyGen
- [TennousuAthena/qc_classroom](https://github.com/TennousuAthena/qc_classroom) - 🕊青草课堂在线教育
- [Anankke/SSPanel-UIM](https://github.com/Anankke/SSPanel-UIM) - Multi-purpose proxy service management system
- [LudySu/Synology-LrcPlugin](https://github.com/LudySu/Synology-LrcPlugin) - Lyrics plugin for Synology Audio Station/DS Audio
- [mylxsw/wizard](https://github.com/mylxsw/wizard) - Wizard是一款开源的文档管理工具,支持Markdown/Swagger/Table类型的文档。
- [fuzzdb-project/fuzzdb](https://github.com/fuzzdb-project/fuzzdb) - Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
- [YesknStudio/vmoex-framework](https://github.com/YesknStudio/vmoex-framework) - 一个开源的二次元向的社区程序。
- [nico3333fr/CSP-useful](https://github.com/nico3333fr/CSP-useful) - Collection of scripts, thoughts about CSP (Content Security Policy)
- [zhuifengshaonianhanlu/pikachu](https://github.com/zhuifengshaonianhanlu/pikachu) - 一个好玩的Web安全-漏洞测试平台
- [ym2011/SecurityTechnique](https://github.com/ym2011/SecurityTechnique) - Security technique research and some funny work on it !
- [l3m0n/Bypass_Disable_functions_Shell](https://github.com/l3m0n/Bypass_Disable_functions_Shell) - 一个各种方式突破Disable_functions达到命令执行的shell
- [icret/easyImages](https://github.com/icret/easyImages) - 此版本不再维护,已出新版:速度更快,压缩更小:
- [TideSec/WDScanner](https://github.com/TideSec/WDScanner) - WDScanner平台目前实现了如下功能:分布式web漏洞扫描、客户管理、漏洞定期扫描、子域名枚举、端口扫描、网站爬虫、暗链检测、坏链检测、网站指纹搜集、专项漏洞检测、代理搜集及部署等功能。
- [ksanchezcld/Hacking_Cheat_Sheet](https://github.com/ksanchezcld/Hacking_Cheat_Sheet) - All my Hacking|Pentesting Notes
- [AlanDecode/Typecho-Theme-RAW](https://github.com/AlanDecode/Typecho-Theme-RAW) - “在互联网上寻找栖息之地”
- [0oVicero0/oneindex](https://github.com/0oVicero0/oneindex) - OneDrive Directory Index
- [joannesource/docker-tt-rss-arm7](https://github.com/joannesource/docker-tt-rss-arm7) - Docker image for Tiny Tiny RSS feed reader for Raspberry Pi / arm7 / arm8.
- [WangNingkai/OLAINDEX](https://github.com/WangNingkai/OLAINDEX) - ✨ Another OneDrive Directory Index
- [ganlvtech/down_52pojie_cn](https://github.com/ganlvtech/down_52pojie_cn) - A single page file explorer that can be hosted on static website. 吾爱破解论坛 爱盘 https://down.52pojie.cn/ 页面的源代码
- [HenryQW/Awesome-TTRSS](https://github.com/HenryQW/Awesome-TTRSS) - 🐋 Awesome TTRSS, a powerful Dockerised all-in-one RSS solution.
- [radenvodka/SVScanner](https://github.com/radenvodka/SVScanner) - SVScanner - Scanner Vulnerability And MaSsive Exploit.
- [jxlwqq/id-validator](https://github.com/jxlwqq/id-validator) - 中华人民共和国居民身份证、中华人民共和国港澳居民居住证以及中华人民共和国台湾居民居住证号码验证工具(PHP 版)
- [uouuou/Typecho-theme-Rinvay](https://github.com/uouuou/Typecho-theme-Rinvay) - Rinvay.H 主题预览
- [EasyEngine/easyengine](https://github.com/EasyEngine/easyengine) - Command-line control panel for Nginx Server to manage WordPress sites running on Nginx, PHP, MySQL, and Let's Encrypt
- [joshdick/miniProxy](https://github.com/joshdick/miniProxy) - 🚨⚠️ UNMAINTAINED! ⚠️🚨 A simple PHP web proxy.
- [galnetwen/Random-Image](https://github.com/galnetwen/Random-Image) - 随机图片服务
- [helloxz/phpdns](https://github.com/helloxz/phpdns) - 此项目不再维护,推荐使用AdGuard Home来替代。
- [bowu678/php_bugs](https://github.com/bowu678/php_bugs) - PHP代码审计分段讲解
- [yaofeifly/Vub_ENV](https://github.com/yaofeifly/Vub_ENV) - 跟踪真实漏洞相关靶场环境搭建
- [SecurityPaper/mail_fishing](https://github.com/SecurityPaper/mail_fishing) - 甲方安全工程师必备,内部钓鱼系统
- [s4n7h0/xvwa](https://github.com/s4n7h0/xvwa) - XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security.
- [M4DM0e/BadMod](https://github.com/M4DM0e/BadMod) - CMS auto detect and exploit.
- [prasathmani/tinyfilemanager](https://github.com/prasathmani/tinyfilemanager) - Single-file PHP file manager, browser and manage your files efficiently and easily with tinyfilemanager
- [c0ny1/upload-labs](https://github.com/c0ny1/upload-labs) - 一个想帮你总结所有类型的上传漏洞的靶场
- [LoeiFy/Diaspora](https://github.com/LoeiFy/Diaspora) - Diaspora - A WordPress theme
- [0verSp4ce/DoraBox](https://github.com/0verSp4ce/DoraBox) - DoraBox - Basic Web Vulnerability Training
- [a0xnirudh/kurukshetra](https://github.com/a0xnirudh/kurukshetra) - Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.
- [jozhn/Bigfa](https://github.com/jozhn/Bigfa) - ⚡Typecho简约精致的白色两栏主题。A Typecho Theme
- [wupco/weblogger](https://github.com/wupco/weblogger) - 针对ctf线下赛流量抓取(php)、真实环境流量抓取分析的工具
- [littleplus/url-shorter](https://github.com/littleplus/url-shorter) - A modern, safe and simple url shorter
- [assimon/dujiaoka](https://github.com/assimon/dujiaoka) - 🦄独角数卡(自动售货系统)-开源站长自动化售货解决方案、高效、稳定、快速!🚀🚀🎉🎉
- [FriendsOfPHP/security-advisories](https://github.com/FriendsOfPHP/security-advisories) - A database of PHP security advisories
- [xtr4nge/FruityWifi](https://github.com/xtr4nge/FruityWifi) - FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra packages. Tested in Debian, Kali Linux, Kali Linux ARM (Raspberry
- [Jamalc0m/wphunter](https://github.com/Jamalc0m/wphunter) - WPHunter A Wordpress Vulnerability Scanner
- [helloxz/IPinfo](https://github.com/helloxz/IPinfo) - 整合多接口的IP查询工具。
- [duoergun0729/1book](https://github.com/duoergun0729/1book) - 《Web安全之机器学习入门》
- [mrgeneralgoo/typecho-update-assistant](https://github.com/mrgeneralgoo/typecho-update-assistant) - A update plugin for Typecho.
- [bugku/BWVS](https://github.com/bugku/BWVS) - Web漏洞渗透测试靶场
- [klsf/kldns](https://github.com/klsf/kldns) - 快乐二级域名分发系统
- [lietdai/doom](https://github.com/lietdai/doom) - DOOM是在thorn上实现的分布式任务分发的ip端口漏洞扫描器
- [attackercan/regexp-security-cheatsheet](https://github.com/attackercan/regexp-security-cheatsheet) -
- [NewbMiao/typecho2Hexo](https://github.com/NewbMiao/typecho2Hexo) - typecho批量转Hexo
- [overtrue/easy-sms](https://github.com/overtrue/easy-sms) - 📲 一款满足你的多种发送需求的短信发送组件
- [Tai7sy/card-system](https://github.com/Tai7sy/card-system) - 卡密商城系统,高效安全的在线卡密商城
- [aszone/avenger-sh](https://github.com/aszone/avenger-sh) - Project for finding vunerabilities in mass.
- [honraytech/VueThink](https://github.com/honraytech/VueThink) - VueThink是一套基于Vue全家桶(Vue2.x + Vue-router2.x + Vuex)+ ThinkPHP5的前后端分离框架。
- [helloxz/imgurl](https://github.com/helloxz/imgurl) - ImgURL是一个简单、纯粹的图床程序,让个人图床多一个选择。
- [drego85/DDoS-PHP-Script](https://github.com/drego85/DDoS-PHP-Script) - Script to perform a DoS or DDoS UDP Flood by PHP
- [Bo0oM/CVE-2017-5124](https://github.com/Bo0oM/CVE-2017-5124) - Chrome < 62 uxss exploit (CVE-2017-5124)
- [l3m0n/pentest_tools](https://github.com/l3m0n/pentest_tools) - 收集一些小型实用的工具
- [maysrp/webdir](https://github.com/maysrp/webdir) - 网站目录
- [maysrp/yunBT](https://github.com/maysrp/yunBT) - Aria2 FFmpeg 的多用户下载视频转码
- [anoshop/online.net](https://github.com/anoshop/online.net) -
- [fengqi/docker-rtorrent](https://github.com/fengqi/docker-rtorrent) - rTorrent 0.9.4 加 libTorrent 0.13.4 和 ruTottent,打了加 peer 的补丁
- [WhatCD/Gazelle](https://github.com/WhatCD/Gazelle) -
- [flarum/flarum](https://github.com/flarum/flarum) - Simple forum software for building great communities.
- [BlackFan/WEB-INF-dict](https://github.com/BlackFan/WEB-INF-dict) - List of configuration files from WEB-INF and META-INF for use in Unvalidated Forwards and JSP Include vulnerabilities.
- [jockchou/gitblog](https://github.com/jockchou/gitblog) - markdown blog base on CodeIgniter, writing blog with markdown!基于CI的markdown博客
- [jvoisin/php-malware-finder](https://github.com/jvoisin/php-malware-finder) - Detect potentially malicious PHP files
- [Hood3dRob1n/SQLMAP-Web-GUI](https://github.com/Hood3dRob1n/SQLMAP-Web-GUI) - PHP Frontend to work with the SQLMAP JSON API Server (sqlmapapi.py) to allow for a Web GUI to drive near full functionality of SQLMAP!
- [paragonie/awesome-appsec](https://github.com/paragonie/awesome-appsec) - A curated list of resources for learning about application security
- [maysrp/TALD](https://github.com/maysrp/TALD) - 使用Aria2作为后端 通过视频来 采集视频作为自己的视频网站:ThinkPHP Aria2 Libav Dplayer
- [swisskyrepo/Vulny-Code-Static-Analysis](https://github.com/swisskyrepo/Vulny-Code-Static-Analysis) - Python script to detect vulnerabilities inside PHP source code using static analysis, based on regex
- [Dhayalanb/windows-php-reverse-shell](https://github.com/Dhayalanb/windows-php-reverse-shell) - Simple php reverse shell implemented using binary .
- [mddanish/Vulnerable-OTP-Application](https://github.com/mddanish/Vulnerable-OTP-Application) - Vulnerable OTP/2FA Application written in PHP using Google Authenticator
- [dotcppfile/DAws](https://github.com/dotcppfile/DAws) - Advanced Web Shell
- [hanc00l/wooyun_public](https://github.com/hanc00l/wooyun_public) - This repo is archived. Thanks for wooyun! 乌云公开漏洞、知识库爬虫和搜索 crawl and search for wooyun.org public bug(vulnerability) and drops
- [giaplv57/GuruWebScanner](https://github.com/giaplv57/GuruWebScanner) - An On-The-Cloud free "greybox" box scanner for various purposes.
- [Tuhinshubhra/RED_HAWK](https://github.com/Tuhinshubhra/RED_HAWK) - All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers
- [xl7dev/WebShell](https://github.com/xl7dev/WebShell) - Webshell && Backdoor Collection
- [SecWiki/CMS-Hunter](https://github.com/SecWiki/CMS-Hunter) - CMS漏洞测试用例集合
- [Chocobozzz/OpenVPN-Admin](https://github.com/Chocobozzz/OpenVPN-Admin) - Install and administrate OpenVPN with a web interface (logs visualisations, users managing...)
- [xiaoxiaoleo/xiao-webshell](https://github.com/xiaoxiaoleo/xiao-webshell) - a collection of webshell
- [nyufeng/tiebarobot](https://github.com/nyufeng/tiebarobot) - 贴吧自动删帖机器人
- [PingPlusPlus/pingpp-php](https://github.com/PingPlusPlus/pingpp-php) -
- [phith0n/XssHtml](https://github.com/phith0n/XssHtml) - php富文本过滤类,XSS Filter
- [interference-security/empire-web](https://github.com/interference-security/empire-web) - PowerShell Empire Web Interface
- [wkcaj/safecurl](https://github.com/wkcaj/safecurl) - SSRF Protection Library for PHP - http://safecurl.fin1te.net
- [weiboad/kafka-php](https://github.com/weiboad/kafka-php) - kafka php client
- [OneSourceCat/phpvulhunter](https://github.com/OneSourceCat/phpvulhunter) - A tool that can scan php vulnerabilities automatically using static analysis methods
- [ricoa/copywriting-correct](https://github.com/ricoa/copywriting-correct) - 中英文文案排版纠正器
- [owner888/phpspider](https://github.com/owner888/phpspider) - 《我用爬虫一天时间“偷了”知乎一百万用户,只为证明PHP是世界上最好的语言 》所使用的程序
- [tgalopin/simhashphp](https://github.com/tgalopin/simhashphp) - SimHash similarities algorithm implementation for PHP
- [3xp10it/xwebshell](https://github.com/3xp10it/xwebshell) - 免杀webshell
- [ZhuFaner/shadowsocks-manage-system](https://github.com/ZhuFaner/shadowsocks-manage-system) - 科学上网管理系统
- [incredibleindishell/LDAP-credentials-collector-backdoor-generator](https://github.com/incredibleindishell/LDAP-credentials-collector-backdoor-generator) - This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.
- [zhuzhichao/ip-location-zh](https://github.com/zhuzhichao/ip-location-zh) - 获取 IP 地址的真实地理位置
- [atymic/twitter](https://github.com/atymic/twitter) - Twitter API for Laravel 5.5+, 6.x, 7.x & 8.x
- [Daiyichen/Front-end-tutorial](https://github.com/Daiyichen/Front-end-tutorial) - :panda_face:最全的资源教程-前端涉及的所有知识体系
- [lxj616/DVWA-WooYun](https://github.com/lxj616/DVWA-WooYun) - It is a DVWA with some plugins based on real wooyun bug reports
- [BlackHole1/WebRtcXSS](https://github.com/BlackHole1/WebRtcXSS) - 利用XSS入侵内网(Use XSS automation Invade intranet)
- [hayashier/dom-based-xss-detector](https://github.com/hayashier/dom-based-xss-detector) - Detector of DOM based XSS## PLpgSQL
- [nottyjay/Ruoyi-Vue-Mybatis-plus](https://github.com/nottyjay/Ruoyi-Vue-Mybatis-plus) -
- [1eez/103976](https://github.com/1eez/103976) - 103976个英语单词库(sql版,csv版,Excel版)包含英文单词,中文翻译,单词的词性及多种词义,执行SQL语句就可以生成表,支持SQL Server,MySQL等多种数据库## Pascal
- [claudiouzelac/rootkit.com](https://github.com/claudiouzelac/rootkit.com) - Mirror of users section of rootkit.com
- [diversenok/TokenUniverse](https://github.com/diversenok/TokenUniverse) - An advanced tool for working with access tokens and Windows security policy.
- [0xsp-SRD/mortar](https://github.com/0xsp-SRD/mortar) - evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
- [lawrenceamer/TChopper](https://github.com/lawrenceamer/TChopper) - conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine
- [lawrenceamer/dns-black-cat](https://github.com/lawrenceamer/dns-black-cat) - Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands in shell mode over DNS protocol
- [stascorp/rdpwrap](https://github.com/stascorp/rdpwrap) - RDP Wrapper Library
- [ibv/LDAP-Admin](https://github.com/ibv/LDAP-Admin) - LDAP Admin for Linux
- [PhrozenIO/win-brute-logon](https://github.com/PhrozenIO/win-brute-logon) - Crack any Microsoft Windows users password without any privilege (Guest account included)
- [lawrenceamer/0xsp-Mongoose](https://github.com/lawrenceamer/0xsp-Mongoose) - a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and t
- [syhunt/sandcat](https://github.com/syhunt/sandcat) - An open-source, pentest and developer-oriented web browser, using the power of Lua## Perl
- [TheBeastofwar/linuxhacker](https://github.com/TheBeastofwar/linuxhacker) - 一款linux 内网渗透辅助工具
- [ariary/DogWalk-rce-poc](https://github.com/ariary/DogWalk-rce-poc) - 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)
- [Zimbra-Community/zimbra-tools](https://github.com/Zimbra-Community/zimbra-tools) - Various tools for Zimbra
- [truongkma/ctf-tools](https://github.com/truongkma/ctf-tools) - tổng hợp tool ctf
- [samyk/slipstream](https://github.com/samyk/slipstream) - NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by anyone on the victim's network visiting a website
- [htrgouvea/nozaki](https://github.com/htrgouvea/nozaki) - HTTP fuzzer engine security oriented
- [GuidoBartoli/sherloq](https://github.com/GuidoBartoli/sherloq) - An open-source digital image forensic toolset
- [kost/dvcs-ripper](https://github.com/kost/dvcs-ripper) - Rip web accessible (distributed) version control systems: SVN/GIT/HG...
- [ovh/the-bastion](https://github.com/ovh/the-bastion) - Authentication, authorization, traceability and auditability for SSH accesses.
- [jfcoz/postgresqltuner](https://github.com/jfcoz/postgresqltuner) - Simple script to analyse your PostgreSQL database configuration, and give tuning advice
- [leolovenet/qqwry2mmdb](https://github.com/leolovenet/qqwry2mmdb) - 为 Wireshark 能使用纯真网络 IP 数据库(QQwry)而提供的格式转换工具
- [CiscoCXSecurity/enum4linux](https://github.com/CiscoCXSecurity/enum4linux) - enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts
- [SparrowOchon/dnsenum2](https://github.com/SparrowOchon/dnsenum2) - dnsenum is a perl script that enumerates DNS information. Officially mainlined in Kali Linux
- [timebug/lua-resty-redis-ratelimit](https://github.com/timebug/lua-resty-redis-ratelimit) - Limit the request processing rate between multiple NGINX instances backed by Redis
- [jetmore/swaks](https://github.com/jetmore/swaks) - Swaks - Swiss Army Knife for SMTP
- [sighook/pixload](https://github.com/sighook/pixload) - Image Payload Creating/Injecting tools
- [nerodtm/ReconCobra---Complete-Automated-Pentest-Framework-For-Information-Gathering](https://github.com/nerodtm/ReconCobra---Complete-Automated-Pentest-Framework-For-Information-Gathering) - ReconCobra Reconcobra is Foot printing software for Ultimate Information Gathering Kali, Parrot OS, Black Arch, Termux, Android Led TV Interface Software have 82 Options with full automation with pow
- [modzero/mod0BurpUploadScanner](https://github.com/modzero/mod0BurpUploadScanner) - HTTP file upload scanner for Burp Proxy
- [0x90/vpn-arsenal](https://github.com/0x90/vpn-arsenal) - VPN pentest tools and scripts
- [Moham3dRiahi/XAttacker](https://github.com/Moham3dRiahi/XAttacker) - X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
- [hexsum/Mojo-Webqq](https://github.com/hexsum/Mojo-Webqq) - 【重要通知:WebQQ将在2019年1月1日停止服务,此项目目前已停止维护,感谢大家四年来的一路陪伴】使用Perl语言(不会没关系)编写的smartqq/webqq客户端框架(非GUI),可通过插件提供基于HTTP协议的api接口供其他语言或系统调用
- [jondonas/linux-exploit-suggester-2](https://github.com/jondonas/linux-exploit-suggester-2) - Next-Generation Linux Kernel Exploit Suggester
- [CNSRE/ABTestingGateway](https://github.com/CNSRE/ABTestingGateway) -
- [mfocuz/DNS_Hunter](https://github.com/mfocuz/DNS_Hunter) - DNS enumeration tool
- [rsnapshot/rsnapshot](https://github.com/rsnapshot/rsnapshot) - a tool for backing up your data using rsync (if you want to get help, use https://lists.sourceforge.net/lists/listinfo/rsnapshot-discuss)
- [mrash/psad](https://github.com/mrash/psad) - psad: Intrusion Detection and Log Analysis with iptables
- [riusksk/StrutScan](https://github.com/riusksk/StrutScan) - Struts2 Vuls Scanner base perl script
- [p0pr0ck5/lua-resty-waf](https://github.com/p0pr0ck5/lua-resty-waf) - High-performance WAF built on the OpenResty stack
- [sullo/nikto](https://github.com/sullo/nikto) - Nikto web server scanner
- [davebarr/dnswalk](https://github.com/davebarr/dnswalk) - A DNS database debugger
- [AlisamTechnology/ATSCAN](https://github.com/AlisamTechnology/ATSCAN) - Advanced dork Search & Mass Exploit Scanner## PostScript
- [liuchengxu/szuthesis](https://github.com/liuchengxu/szuthesis) - :pencil: SZU Undergraduate Thesis -- Recommender System
## PowerShell
- [Bains-sec/BowserSecCheckingTool](https://github.com/Bains-sec/BowserSecCheckingTool) - 浏览器数据清除脚本,可以检查浏览器中有没有存储特定网址的密码,然后实行数据的清除,主要是用于攻防演练中蓝队防止钓鱼获取浏览器密码。
- [Orange-Cyberdefense/GOAD](https://github.com/Orange-Cyberdefense/GOAD) - game of active directory
- [api0cradle/CVE-2023-23397-POC-Powershell](https://github.com/api0cradle/CVE-2023-23397-POC-Powershell) -
- [enjoiz/Privesc](https://github.com/enjoiz/Privesc) - Windows batch script that finds misconfiguration issues which can lead to privilege escalation.
- [bluecapesecurity/PWF](https://github.com/bluecapesecurity/PWF) - Practical Windows Forensics Training
- [danielbohannon/Invoke-Obfuscation](https://github.com/danielbohannon/Invoke-Obfuscation) - PowerShell Obfuscator
- [cimnode/WindowsEVTX-ETL_2HEC](https://github.com/cimnode/WindowsEVTX-ETL_2HEC) -
- [AhmedKamal1432/Evilize](https://github.com/AhmedKamal1432/Evilize) - Triaging Windows event logs based on SANS Poster
- [sailay1996/SpoolTrigger](https://github.com/sailay1996/SpoolTrigger) - Weaponizing for privileged file writes bugs with PrintNotify Service
- [Yamato-Security/WELA](https://github.com/Yamato-Security/WELA) - WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)
- [Cyb3r-Techie/CVE-Tracker](https://github.com/Cyb3r-Techie/CVE-Tracker) - With the help of this automated script, you will never lose track of recently released CVEs.
- [Windos/BurntToast](https://github.com/Windos/BurntToast) - Module for creating and displaying Toast Notifications on Microsoft Windows 10.
- [soteria-security/365Inspect](https://github.com/soteria-security/365Inspect) - A PowerShell script that automates the security assessment of Microsoft 365 environments.
- [Mr-Un1k0d3r/RedTeamPowershellScripts](https://github.com/Mr-Un1k0d3r/RedTeamPowershellScripts) - Various PowerShell scripts that may be useful during red team exercise
- [CnHack3r/Awesome-hacking-tools](https://github.com/CnHack3r/Awesome-hacking-tools) - 黑客工具收集仓库,包含主流和非主流漏洞利用工具,subdomain、备案查询工具、CVE仓库、Hacking Tools、Exploits、免杀工具、weblogic漏洞利用工具、Red Team、Cobalt Strike、C免杀、bypassAV、内网渗透工具、漏洞利用、工具插件、burpsuite插件;
- [XiaoliChan/Invoke-sAMSpoofing](https://github.com/XiaoliChan/Invoke-sAMSpoofing) - CVE-2021-42287/CVE-2021-42278 exploits in powershell
- [whoamins/SPN-Honeypot](https://github.com/whoamins/SPN-Honeypot) - Example of Kerberoasting Honeypot
- [0x6d69636b/windows_hardening](https://github.com/0x6d69636b/windows_hardening) - HardeningKitty and Windows Hardening Settings
- [tihanyin/PSSW100AVB](https://github.com/tihanyin/PSSW100AVB) - A list of useful Powershell scripts with 100% AV bypass (At the time of publication).
- [VirtualAlllocEx/Payload-Download-Cradles](https://github.com/VirtualAlllocEx/Payload-Download-Cradles) - This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR in context of download cradle detections.
- [eastmountyxz/PowershellDetect](https://github.com/eastmountyxz/PowershellDetect) - 该资源详细介绍Powershell脚本混淆、解混淆、抽象语法树提取、token提取、恶意性检测等内容,希望对您有所帮助!
- [PwnDexter/Invoke-EDRChecker](https://github.com/PwnDexter/Invoke-EDRChecker) - Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories, installed services, the registry and running drivers for the p
- [PhrozenIO/PowerRemoteDesktop](https://github.com/PhrozenIO/PowerRemoteDesktop) - Remote Desktop entirely coded in PowerShell.
- [ricardojba/Invoke-noPac](https://github.com/ricardojba/Invoke-noPac) - .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac
- [wolf0x/honeynet](https://github.com/wolf0x/honeynet) - Sentinel Guard - Use to build up Honeypot and Honeynet with ZERO cost easily and simply.
- [Kevin-Robertson/Powermad](https://github.com/Kevin-Robertson/Powermad) - PowerShell MachineAccountQuota and DNS exploit tools
- [PhrozenIO/PowerBruteLogon](https://github.com/PhrozenIO/PowerBruteLogon) - PowerBruteLogon (Ported version of WinBruteLogon in pure PowerShell)
- [JMousqueton/Badware](https://github.com/JMousqueton/Badware) - Ransomware for demonstration
- [jiushill/csplugin](https://github.com/jiushill/csplugin) - 自己开的cs插件
- [XTeam-Wing/WingKit](https://github.com/XTeam-Wing/WingKit) - CobaltStrike Extentions
- [xbufu/ADLab](https://github.com/xbufu/ADLab) - Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.
- [nyxgeek/o365recon](https://github.com/nyxgeek/o365recon) - retrieve information via O365 and AzureAD with a valid cred
- [Cloud-Architekt/AzureAD-Attack-Defense](https://github.com/Cloud-Architekt/AzureAD-Attack-Defense) - This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
- [MScholtes/PS2EXE](https://github.com/MScholtes/PS2EXE) - Module to compile powershell scripts to executables
- [darkquasar/AzureHunter](https://github.com/darkquasar/AzureHunter) - A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
- [fox-it/Invoke-ACLPwn](https://github.com/fox-it/Invoke-ACLPwn) -
- [dievus/PowerShellForPentesters](https://github.com/dievus/PowerShellForPentesters) - Course repository for PowerShell for Pentesters Course
- [yanghaoi/CobaltStrike_CNA](https://github.com/yanghaoi/CobaltStrike_CNA) - 使用多种WinAPI进行权限维持的CobaltStrike脚本,包含API设置系统服务,设置计划任务,管理用户等。
- [lintstar/LSTAR](https://github.com/lintstar/LSTAR) - LSTAR - CobaltStrike 综合后渗透插件
- [OTRF/Set-AuditRule](https://github.com/OTRF/Set-AuditRule) - Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity
- [Marshall-Hallenbeck/red_team_attack_lab](https://github.com/Marshall-Hallenbeck/red_team_attack_lab) - Red Team Attack Lab for TTP testing & research
- [xRET2pwn/PickleC2](https://github.com/xRET2pwn/PickleC2) - PickleC2 is a post-exploitation and lateral movements framework
- [GhostPack/PSPKIAudit](https://github.com/GhostPack/PSPKIAudit) - PowerShell toolkit for AD CS auditing based on the PSPKI toolkit.
- [gyaansastra/Print-Nightmare-LPE](https://github.com/gyaansastra/Print-Nightmare-LPE) -
- [vletoux/MakeMeEnterpriseAdmin](https://github.com/vletoux/MakeMeEnterpriseAdmin) -
- [jfmaes/LazySign](https://github.com/jfmaes/LazySign) - Create fake certs for binaries using windows binaries and the power of bat files
- [ziesemer/ad-privileged-audit](https://github.com/ziesemer/ad-privileged-audit) - Provides various Windows Server Active Directory (AD) security-focused reports.
- [jouleSoft/Test-Ports.ps1](https://github.com/jouleSoft/Test-Ports.ps1) - PowerShell TCP ports monitoring tool
- [crimsonlabs-io/Cache](https://github.com/crimsonlabs-io/Cache) - An arms cache for security consultants, red teams and penetration testers. Sometimes for defenders too.
- [OsbornePro/BTPS-SecPack](https://github.com/OsbornePro/BTPS-SecPack) - This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommendations of multiple cyber security researchers at Microsoft. Th
- [kf5i/k3ai](https://github.com/kf5i/k3ai) - K3ai is a lightweight, fully automated, AI infrastructure-in-a-box solution that allows anyone to experiment quickly with Kubeflow pipelines. K3ai is perfect for anything from Edge to laptops.
- [dwmetz/CyberPipe](https://github.com/dwmetz/CyberPipe) - An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.
- [cfalta/PowerShellArmoury](https://github.com/cfalta/PowerShellArmoury) - A PowerShell armoury for security guys and girls
- [JonathanERC/PCNameByUser-SCCM](https://github.com/JonathanERC/PCNameByUser-SCCM) - Powershell script to get all user devices registered in SCCM.
- [safebuffer/LightMe](https://github.com/safebuffer/LightMe) - HTTP Server serving obfuscated Powershell Scripts/Payloads
- [tokyoneon/CredPhish](https://github.com/tokyoneon/CredPhish) - CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.
- [Lucifer1993/PLtools](https://github.com/Lucifer1993/PLtools) - 整理一些内网常用渗透小工具
- [JoelGMSec/Invoke-DNSteal](https://github.com/JoelGMSec/Invoke-DNSteal) - Simple & Customizable DNS Data Exfiltrator
- [r00t-3xp10it/redpill](https://github.com/r00t-3xp10it/redpill) - Assist reverse tcp shells in post-exploration tasks
- [rvrsh3ll/TokenTactics](https://github.com/rvrsh3ll/TokenTactics) - Azure JWT Token Manipulation Toolset
- [3gstudent/Invoke-BuildAnonymousSMBServer](https://github.com/3gstudent/Invoke-BuildAnonymousSMBServer) - Use to build an anonymous SMB file server.
- [JohnHammond/CVE-2021-34527](https://github.com/JohnHammond/CVE-2021-34527) -
- [LuemmelSec/Pentest-Tools-Collection](https://github.com/LuemmelSec/Pentest-Tools-Collection) -
- [calebstewart/CVE-2021-1675](https://github.com/calebstewart/CVE-2021-1675) - Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)
- [danielbohannon/Invoke-DOSfuscation](https://github.com/danielbohannon/Invoke-DOSfuscation) - Cmd.exe Command Obfuscation Generator & Detection Test Harness
- [3gstudent/Hook-PasswordChangeNotify](https://github.com/3gstudent/Hook-PasswordChangeNotify) - Stealing passwords every time they change
- [ramiKahmed/Cloud-Penetration-Testing-and-Red-Teaming](https://github.com/ramiKahmed/Cloud-Penetration-Testing-and-Red-Teaming) - Tools, Resources & Helpful Tips
- [danielbohannon/Revoke-Obfuscation](https://github.com/danielbohannon/Revoke-Obfuscation) - PowerShell Obfuscation Detection Framework
- [S3cur3Th1sSh1t/Invoke-SharpLoader](https://github.com/S3cur3Th1sSh1t/Invoke-SharpLoader) -
- [scipag/HardeningKitty](https://github.com/scipag/HardeningKitty) - HardeningKitty - Checks and hardens your Windows configuration
- [Roshi-Codes/BlueTeamBeast](https://github.com/Roshi-Codes/BlueTeamBeast) - Powershell Scripts for Blue Teams and Incident Responce
- [leebaird/discover](https://github.com/leebaird/discover) - Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.
- [cfalta/adsec](https://github.com/cfalta/adsec) - An introduction to Active Directory security
- [JoelGMSec/Invoke-Stealth](https://github.com/JoelGMSec/Invoke-Stealth) - Simple & Powerful PowerShell Script Obfuscator
- [S3cur3Th1sSh1t/NamedPipePTH](https://github.com/S3cur3Th1sSh1t/NamedPipePTH) - Pass the Hash to a named pipe for token Impersonation
- [tide-emergency/yingji](https://github.com/tide-emergency/yingji) - 应急相关内容积累
- [StephanieSeyler/VPN-Reporting](https://github.com/StephanieSeyler/VPN-Reporting) - VPN reporting using SonicWall SonicOS API
- [cert-lv/exchange_webshell_detection](https://github.com/cert-lv/exchange_webshell_detection) - Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)
- [peewpw/Invoke-PSImage](https://github.com/peewpw/Invoke-PSImage) - Encodes a PowerShell script in the pixels of a PNG file and generates a oneliner to execute
- [kfosaaen/Get-LAPSPasswords](https://github.com/kfosaaen/Get-LAPSPasswords) - Powershell function to pull the local admin passwords from LDAP, stored there by LAPS.
- [mdsecresearch/LyncSniper](https://github.com/mdsecresearch/LyncSniper) - LyncSniper: A tool for penetration testing Skype for Business and Lync deployments
- [PSSecTools/Krbtgt](https://github.com/PSSecTools/Krbtgt) - Module to update the Krbtgt password
- [SentineLabs/SentinelLabs_RevCore_Tools](https://github.com/SentineLabs/SentinelLabs_RevCore_Tools) - The Windows Malware Analysis Reversing Core Tools
- [russelltomkins/Active-Directory](https://github.com/russelltomkins/Active-Directory) - Collection of scripts for Querying and Managing Active Directory and Domain Controllers
- [tmenochet/ADThief](https://github.com/tmenochet/ADThief) - Post-exploitation tool for attacking Active Directory domain controllers
- [rsmudge/ElevateKit](https://github.com/rsmudge/ElevateKit) - The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.
- [d0nkeys/redteam](https://github.com/d0nkeys/redteam) - Red Team Scripts by d0nkeys (ex SnadoTeam)
- [mburrough/pentestingazureapps](https://github.com/mburrough/pentestingazureapps) - Script samples from the book Pentesting Azure Applications (2018, No Starch Press)
- [mandiant/ThreatPursuit-VM](https://github.com/mandiant/ThreatPursuit-VM) - Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well a
- [NetSPI/PowerShell](https://github.com/NetSPI/PowerShell) - NetSPI PowerShell Scripts
- [proxb/PoshPrivilege](https://github.com/proxb/PoshPrivilege) - Manage user privileges on a local machine or view applied privileges on local or remote system
- [sdsecurity/pooltest](https://github.com/sdsecurity/pooltest) - 网上收集的一些利用工具
- [nccgroup/redsnarf](https://github.com/nccgroup/redsnarf) - RedSnarf is a pen-testing / red-teaming tool for Windows environments
- [Al1ex/CSPlugins](https://github.com/Al1ex/CSPlugins) - Cobaltstrike Plugins
- [C-Cracks/OSCP-Automation](https://github.com/C-Cracks/OSCP-Automation) - A collection of personal scripts used in hacking excercises.
- [3v4Si0N/HTTP-revshell](https://github.com/3v4Si0N/HTTP-revshell) - Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware
- [s4vitar/AD-AutomationLab](https://github.com/s4vitar/AD-AutomationLab) - Herramienta en PowerShell ideal para desplegar tu propio entorno AD vulnerable de forma automatizada.
- [PSSecTools/WindowsEventForwarding](https://github.com/PSSecTools/WindowsEventForwarding) - A module for working with Windows Event Collector service and maintain Windows Event Forwarding subscriptions.
- [darkoperator/powershell_scripts](https://github.com/darkoperator/powershell_scripts) - Powershell Scripts
- [safebuffer/vulnerable-AD](https://github.com/safebuffer/vulnerable-AD) - Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
- [cyberark/ACLight](https://github.com/cyberark/ACLight) - A script for advanced discovery of Privileged Accounts - includes Shadow Admins
- [vysecurity/ANGRYPUPPY](https://github.com/vysecurity/ANGRYPUPPY) - Bloodhound Attack Path Automation in CobaltStrike
- [GoFetchAD/GoFetch](https://github.com/GoFetchAD/GoFetch) - GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.
- [powerexploit/Powerexploit](https://github.com/powerexploit/Powerexploit) - Post-Exploitation :sunglasses: module for Penetration Tester and Hackers.
- [math1as/CVE-2020-1337-exploit](https://github.com/math1as/CVE-2020-1337-exploit) - CVE-2020-1337 Windows Print Spooler Privilege Escalation
- [besimorhino/powercat](https://github.com/besimorhino/powercat) - netshell features all in version 2 powershell
- [r00t-3xp10it/meterpeter](https://github.com/r00t-3xp10it/meterpeter) - C2 Powershell Command & Control Framework with BuiltIn Commands
- [danielwolfmann/Invoke-WordThief](https://github.com/danielwolfmann/Invoke-WordThief) - This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.docx,etc') and extracting their text using Word application's COM
- [InfosecMatter/Minimalistic-offensive-security-tools](https://github.com/InfosecMatter/Minimalistic-offensive-security-tools) - A repository of tools for pentesting of restricted and isolated environments.
- [cyberdefenders/DetectionLabELK](https://github.com/cyberdefenders/DetectionLabELK) - DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.
- [evi1ox/MSSQL_BackDoor](https://github.com/evi1ox/MSSQL_BackDoor) -
- [davehull/Kansa](https://github.com/davehull/Kansa) - A Powershell incident response framework
- [phackt/Invoke-Recon](https://github.com/phackt/Invoke-Recon) - "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' lab from pentesteracademy.
- [the-xentropy/xencrypt](https://github.com/the-xentropy/xencrypt) - A PowerShell script anti-virus evasion tool
- [S3cur3Th1sSh1t/PowerSharpPack](https://github.com/S3cur3Th1sSh1t/PowerSharpPack) -
- [damienvanrobaeys/PS1ToEXE-Generator](https://github.com/damienvanrobaeys/PS1ToEXE-Generator) - PS1 to EXE Generator: Create an EXE for your PS1 scripts
- [mitre-attack/attack-arsenal](https://github.com/mitre-attack/attack-arsenal) - A collection of red team and adversary emulation resources developed and released by MITRE.
- [Bearshanjun/Manual-defense](https://github.com/Bearshanjun/Manual-defense) - 红蓝对抗-手动防御
- [olafhartong/sysmon-modular](https://github.com/olafhartong/sysmon-modular) - A repository of sysmon configuration modules
- [nccgroup/acCOMplice](https://github.com/nccgroup/acCOMplice) - Tools for discovery and abuse of COM hijacks
- [Integration-IT/Active-Directory-Exploitation-Cheat-Sheet](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet) - A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
- [S3cur3Th1sSh1t/Creds](https://github.com/S3cur3Th1sSh1t/Creds) - Some usefull Scripts and Executables for Pentest & Forensics
- [JoelGMSec/AutoRDPwn](https://github.com/JoelGMSec/AutoRDPwn) - The Shadow Attack Framework
- [DeEpinGh0st/Erebus](https://github.com/DeEpinGh0st/Erebus) - CobaltStrike后渗透测试插件
- [tasooshi/pentesting-cookbook](https://github.com/tasooshi/pentesting-cookbook) - A set of recipes useful in pentesting and red teaming scenarios
- [nettitude/PoshC2](https://github.com/nettitude/PoshC2) - A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
- [itm4n/PrivescCheck](https://github.com/itm4n/PrivescCheck) - Privilege Escalation Enumeration Script for Windows
- [mgeeky/cobalt-arsenal](https://github.com/mgeeky/cobalt-arsenal) - My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+
- [BC-SECURITY/Invoke-PrintDemon](https://github.com/BC-SECURITY/Invoke-PrintDemon) - This is a PowerShell Empire launcher PoC using PrintDemon and Faxhell.
- [ivan-sincek/powershell-reverse-tcp](https://github.com/ivan-sincek/powershell-reverse-tcp) - PowerShell scripts for communicating with a remote host.
- [Sycnex/Windows10Debloater](https://github.com/Sycnex/Windows10Debloater) - Script to remove Windows 10 bloatware.
- [BC-SECURITY/Empire](https://github.com/BC-SECURITY/Empire) - Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
- [dafthack/MSOLSpray](https://github.com/dafthack/MSOLSpray) - A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the account, if a tenant doesn't exist, if a user doesn't exist, if t
- [NotMedic/NetNTLMtoSilverTicket](https://github.com/NotMedic/NetNTLMtoSilverTicket) - SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket
- [k8gege/PowerLadon](https://github.com/k8gege/PowerLadon) - Ladon hacking Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
- [Arvanaghi/SessionGopher](https://github.com/Arvanaghi/SessionGopher) - SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run
- [ZHacker13/ReverseTCPShell](https://github.com/ZHacker13/ReverseTCPShell) - PowerShell ReverseTCP Shell - Framework
- [p3nt4/Invoke-SocksProxy](https://github.com/p3nt4/Invoke-SocksProxy) - Socks proxy, and reverse socks server using powershell.
- [dafthack/DomainPasswordSpray](https://github.com/dafthack/DomainPasswordSpray) - DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will automatically generate the userlist from the domain. BE VERY CAREFU
- [hausec/PowerZure](https://github.com/hausec/PowerZure) - PowerShell framework to assess Azure security
- [davidprowe/BadBlood](https://github.com/davidprowe/BadBlood) - BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. A
- [BankSecurity/Red_Team](https://github.com/BankSecurity/Red_Team) - Some scripts useful for red team activities
- [cutaway-security/chaps](https://github.com/cutaway-security/chaps) - Configuration Hardening Assessment PowerShell Script (CHAPS)
- [mantvydasb/RedTeaming-Tactics-and-Techniques](https://github.com/mantvydasb/RedTeaming-Tactics-and-Techniques) - Red Teaming Tactics and Techniques
- [offsecginger/AES-PowerShellCode](https://github.com/offsecginger/AES-PowerShellCode) - Standalone version of my AES Powershell payload for Cobalt Strike.
- [mandiant/flare-vm](https://github.com/mandiant/flare-vm) - A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
- [TheCjw/scoop-retools](https://github.com/TheCjw/scoop-retools) - Scoop bucket for reverse engineering tools
- [QAX-A-Team/EventLogMaster](https://github.com/QAX-A-Team/EventLogMaster) - Cobalt Strike插件 - RDP日志取证&清除
- [k8gege/Ladon](https://github.com/k8gege/Ladon) - Ladon大型内网渗透工具,可PowerShell模块化、可CS插件化、可内存加载,无文件扫描。含端口扫描、服务识别、网络资产探测、密码审计、高危漏洞检测、漏洞利用、密码读取以及一键GetShell,支持批量A段/B段/C段以及跨网段扫描,支持URL、主机、域名列表扫描等。Ladon 12.2内置262个功能,网络资产探测模块32个通过多种协议(ICMP\NBT\DNS\MAC\SMB\WMI\S
- [threatexpress/red-team-scripts](https://github.com/threatexpress/red-team-scripts) - A collection of Red Team focused tools, scripts, and notes
- [sans-blue-team/DeepBlueCLI](https://github.com/sans-blue-team/DeepBlueCLI) -
- [samratashok/nishang](https://github.com/samratashok/nishang) - Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
- [absolomb/WindowsEnum](https://github.com/absolomb/WindowsEnum) - A Powershell Privilege Escalation Enumeration Script.
- [chawyehsu/dorado](https://github.com/chawyehsu/dorado) - 🐟 Yet Another bucket for lovely Scoop
- [leeberg/BlueCommand](https://github.com/leeberg/BlueCommand) - Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard
- [aaroneg/PS-CreateADLabs](https://github.com/aaroneg/PS-CreateADLabs) - Create a windows Active Directory lab
- [AutomatedLab/AutomatedLab](https://github.com/AutomatedLab/AutomatedLab) - AutomatedLab is a provisioning solution and framework that lets you deploy complex labs on HyperV and Azure with simple PowerShell scripts. It supports all Windows operating systems from 2008 R2 to 20
- [Azure-Samples/active-directory-lab-hybrid-adfs](https://github.com/Azure-Samples/active-directory-lab-hybrid-adfs) - Create a full AD/CA/ADFS/WAP lab environment with Azure AD Connect installed
- [S3cur3Th1sSh1t/WinPwn](https://github.com/S3cur3Th1sSh1t/WinPwn) - Automation for internal Windows Penetrationtest / AD-Security
- [mandiant/commando-vm](https://github.com/mandiant/commando-vm) - Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. [email protected]
- [ecstatic-nobel/pOSINT](https://github.com/ecstatic-nobel/pOSINT) - Gather Open-Source Intelligence using PowerShell.
- [mgeeky/Penetration-Testing-Tools](https://github.com/mgeeky/Penetration-Testing-Tools) - A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
- [QAX-A-Team/CobaltStrike-Toolset](https://github.com/QAX-A-Team/CobaltStrike-Toolset) - Aggressor Script, Kits, Malleable C2 Profiles, External C2 and so on
- [kkkgo/CloudXNS-DDNS-with-PowerShell](https://github.com/kkkgo/CloudXNS-DDNS-with-PowerShell) - The CloudXNS DDNS with PowerShell
- [scipag/PowerShellUtilities](https://github.com/scipag/PowerShellUtilities) - PowerShellUtilities provides various utility commandlets.
- [homjxi0e/PowerAvails](https://github.com/homjxi0e/PowerAvails) - PowerAvails is a unit of collection of Powershell modules that help you get done many things
- [Cybereason/Invoke-WMILM](https://github.com/Cybereason/Invoke-WMILM) -
- [NetSPI/PowerUpSQL](https://github.com/NetSPI/PowerUpSQL) - PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server
- [ScoopInstaller/Scoop](https://github.com/ScoopInstaller/Scoop) - A command-line installer for Windows.
- [HarmJ0y/DAMP](https://github.com/HarmJ0y/DAMP) - The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification
- [GeeLaw/PowerShellThingies](https://github.com/GeeLaw/PowerShellThingies) - My PowerShell thingies.
- [phillips321/adaudit](https://github.com/phillips321/adaudit) - Powershell script to do domain auditing automation
- [api0cradle/UltimateAppLockerByPassList](https://github.com/api0cradle/UltimateAppLockerByPassList) - The goal of this repository is to document the most common techniques to bypass AppLocker.
- [Xyntax/BadUSB-code](https://github.com/Xyntax/BadUSB-code) - 收集badusb的一些利用方式及代码
- [outflanknl/Invoke-ADLabDeployer](https://github.com/outflanknl/Invoke-ADLabDeployer) - Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.
- [ubeeri/Invoke-UserSimulator](https://github.com/ubeeri/Invoke-UserSimulator) - Simulates common user behaviour on local and remote Windows hosts.
- [gdedrouas/Exchange-AD-Privesc](https://github.com/gdedrouas/Exchange-AD-Privesc) - Exchange privilege escalations to Active Directory
- [kbdancer/TPLINKKEY](https://github.com/kbdancer/TPLINKKEY) - 根据TPLINK系列路由器存在的漏洞批量扫描获取wifi密码
- [attactics/Invoke-DCOMPowerPointPivot](https://github.com/attactics/Invoke-DCOMPowerPointPivot) - Executes lateral movement through PowerPoint DCOM objects
- [rvrsh3ll/CrypoCurrencyPowerShell](https://github.com/rvrsh3ll/CrypoCurrencyPowerShell) -
- [salu90/PSFPT](https://github.com/salu90/PSFPT) - Scripts for powershell for pentesters exam
- [411Hall/JAWS](https://github.com/411Hall/JAWS) - JAWS - Just Another Windows (Enum) Script
- [mattifestation/PSSysmonTools](https://github.com/mattifestation/PSSysmonTools) - Sysmon Tools for PowerShell
- [TkYu/PowerShellScripts](https://github.com/TkYu/PowerShellScripts) - lollollol
- [swizzlez/Invoke-EnumSecurityTools](https://github.com/swizzlez/Invoke-EnumSecurityTools) -
- [gulzar1996/Fast-Git-Clone](https://github.com/gulzar1996/Fast-Git-Clone) - Clone Git repository faster. Eliminates the repetitive typing of git clone and copy-pasting the url
- [e-sterling/Nmap-Scan.PS1](https://github.com/e-sterling/Nmap-Scan.PS1) - PowerShell wrapper for nmap, allows easy scanning of many hosts and subnets
- [giMini/mimiDbg](https://github.com/giMini/mimiDbg) - PowerShell oneliner to retrieve wdigest passwords from the memory
- [Arno0x/PowerShellScripts](https://github.com/Arno0x/PowerShellScripts) - Collection of PowerShell scripts
- [3gstudent/Windows-User-Clone](https://github.com/3gstudent/Windows-User-Clone) - Create a hidden account
- [BloodHoundAD/BloodHound](https://github.com/BloodHoundAD/BloodHound) - Six Degrees of Domain Admin
- [SadProcessor/EmpireDog](https://github.com/SadProcessor/EmpireDog) - A collection of PowerShell Modules for BloodHound/Empire Orchestration
- [xorrior/RemoteRecon](https://github.com/xorrior/RemoteRecon) - Remote Recon and Collection
- [WindowsExploits/Exploits](https://github.com/WindowsExploits/Exploits) - Windows Exploits
- [A-mIn3/WINspect](https://github.com/A-mIn3/WINspect) - Powershell-based Windows Security Auditing Toolbox
- [ankh2054/windows-pentest](https://github.com/ankh2054/windows-pentest) - Windows Pentest Scripts
- [vletoux/ms17-010-Scanner](https://github.com/vletoux/ms17-010-Scanner) -
- [rvrsh3ll/Misc-Powershell-Scripts](https://github.com/rvrsh3ll/Misc-Powershell-Scripts) - Random Tools
- [merrillmatt011/GmailPersist](https://github.com/merrillmatt011/GmailPersist) - Gmail Knocker
- [Raikia/Get-ReconInfo](https://github.com/Raikia/Get-ReconInfo) - A powershell script that prints a lot of IP and connection info to the screen
- [pentest-academy/windows-privilege-escalation](https://github.com/pentest-academy/windows-privilege-escalation) - Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.
- [PowerShell/GPRegistryPolicy](https://github.com/PowerShell/GPRegistryPolicy) -
- [gobiasinfosec/Wireless_Query](https://github.com/gobiasinfosec/Wireless_Query) - Query Active Directory for Workstations and then pull their Wireless Network Passwords
- [PowerShellMafia/PowerSploit](https://github.com/PowerShellMafia/PowerSploit) - PowerSploit - A PowerShell Post-Exploitation Framework
- [milo2012/portia](https://github.com/milo2012/portia) - Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as we
- [PowerShellEmpire/PowerTools](https://github.com/PowerShellEmpire/PowerTools) - PowerTools is a collection of PowerShell projects with a focus on offensive operations.
- [BinaryWasp/Sales_OSINT](https://github.com/BinaryWasp/Sales_OSINT) - OSINT for Sales Research
- [bkup/SlackShell](https://github.com/bkup/SlackShell) - PowerShell to Slack C2
- [3gstudent/Code-Execution-and-Process-Injection](https://github.com/3gstudent/Code-Execution-and-Process-Injection) - Powershell to CodeExecution and ProcessInjection
- [yarish/windows-update-selective-kb-](https://github.com/yarish/windows-update-selective-kb-) - Update Windows Security patch update using PowerShell and Ansible
- [darkoperator/Posh-SecMod](https://github.com/darkoperator/Posh-SecMod) - PowerShell Module with Security cmdlets for security work
- [clymb3r/PowerShell](https://github.com/clymb3r/PowerShell) - Useful PowerShell scripts
- [JavelinNetworks/IR-Tools](https://github.com/JavelinNetworks/IR-Tools) - IR-Tools - PowerShell tools for IR
- [dafthack/MailSniper](https://github.com/dafthack/MailSniper) - MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.). It can b
- [PivotAll/PivotAll](https://github.com/PivotAll/PivotAll) - Comprehensive Pivoting Framework
- [danielbohannon/Invoke-CradleCrafter](https://github.com/danielbohannon/Invoke-CradleCrafter) - PowerShell Remote Download Cradle Generator & Obfuscator
- [microsoft/WSL](https://github.com/microsoft/WSL) - Issues found on WSL
- [RedSiege/WMImplant](https://github.com/RedSiege/WMImplant) - This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported is translated into a WMI-equivalent for use on a network/remote
- [EmpireProject/Empire](https://github.com/EmpireProject/Empire) - Empire is a PowerShell and Python post-exploitation agent.
- [3gstudent/Dump-Clear-Password-after-KB2871997-installed](https://github.com/3gstudent/Dump-Clear-Password-after-KB2871997-installed) -
- [FuzzySecurity/HackSysTeam-PSKernelPwn](https://github.com/FuzzySecurity/HackSysTeam-PSKernelPwn) -
- [shellntel-acct/scripts](https://github.com/shellntel-acct/scripts) -
- [FuzzySecurity/PSKernel-Primitives](https://github.com/FuzzySecurity/PSKernel-Primitives) - Exploit primitives for PowerShell
- [rasta-mouse/Sherlock](https://github.com/rasta-mouse/Sherlock) - PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.## Propeller Spin
- [grandideastudio/jtagulator](https://github.com/grandideastudio/jtagulator) - JTAGulator: Assisted discovery of on-chip debug interfaces
## Pug
- [effortlessdevsec/ninjasworkout](https://github.com/effortlessdevsec/ninjasworkout) - Vulnerable NodeJS Web Application
- [noraj/rawsec-cybersecurity-inventory](https://github.com/noraj/rawsec-cybersecurity-inventory) - An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
- [pratikborsadiya/vali-admin](https://github.com/pratikborsadiya/vali-admin) - Free Bootstrap 5 admin/dashboard template
- [prism-break/prism-break](https://github.com/prism-break/prism-break) - Privacy/security-oriented software recommendations (mirrored from GitLab)## Python
- [i11us0ry/tools-gophish](https://github.com/i11us0ry/tools-gophish) - gophish批量操作,适用于大批量钓鱼演练
- [Funsiooo/chunsou](https://github.com/Funsiooo/chunsou) - Chunsou(春蒐),Python3编写的多线程Web指纹识别工具,适用于安全测试人员前期的资产识别、风险收敛以及企业互联网资产风险摸查。
- [a6903147/FingerVulnScanner](https://github.com/a6903147/FingerVulnScanner) - 识别指纹后进行对应cms的漏洞扫描
- [huan-cdm/info_scan](https://github.com/huan-cdm/info_scan) - 自动化漏洞扫描系统,一键完成相关漏洞扫描和信息收集、资产处理、IP基础信息探测,系统采用B/S架构,系统分为源码安装和配置好环境的虚拟机,项目会持续更新,欢迎在Issues中提交需求,如果对您有所帮助,欢迎留下宝贵的star!!!
- [Pizz33/FTPlnk_phishing](https://github.com/Pizz33/FTPlnk_phishing) - FTP lnk调用pythonw程序,用于攻防钓鱼场景下免杀运行捆绑木马文件
- [recyvan/proxy-forward](https://github.com/recyvan/proxy-forward) - 内网流量代理的转发工具
- [onewinner/POCS](https://github.com/onewinner/POCS) - 收集最新漏洞POC(Yaml\Python)
- [N3rdyN3xus/MS17-010_CVE-2017-0143](https://github.com/N3rdyN3xus/MS17-010_CVE-2017-0143) - MS17-010_CVE-2017-0143
- [Xywdmgs/XY_JSFinder-](https://github.com/Xywdmgs/XY_JSFinder-) - 获取页面上所有url支持深度爬取
- [x1hy9/WeChatUserDB](https://github.com/x1hy9/WeChatUserDB) - GetWeChat DBPassword&&UserInfo(获取PC数据库密码以及相关微信用户信息支持多系统数据库解密)
- [SylphAI-Inc/AdalFlow](https://github.com/SylphAI-Inc/AdalFlow) - AdalFlow: The “PyTorch” library to auto-optimize any LLM tasks.
- [baihengaead/wifi-crack-tool](https://github.com/baihengaead/wifi-crack-tool) - WiFi密码暴力破解工具-图形界面,支持多开并发、自动破解、自定义密码本、自动生成密码字典
- [mrknow001/API-Explorer](https://github.com/mrknow001/API-Explorer) - API接口管理工具(目前内置微信公众号、微信小程序、企业微信、飞书、钉钉等)
- [yj94/BinarySpy](https://github.com/yj94/BinarySpy) - 一个手动或自动patch shellcode到二进制文件的免杀工具/A tool for manual or automatic patch shellcode into binary file oder to bypass AV.
- [pysnow1/ICfinger](https://github.com/pysnow1/ICfinger) - 基于工控协议指纹脚本的工业资产识别
- [wzqs/endpoints_explore](https://github.com/wzqs/endpoints_explore) - Endpoints Explorer is a Python script that employs multiple bypass rules to discover sensitive endpoints
- [WDLegend/VulhubStarter](https://github.com/WDLegend/VulhubStarter) - No description, website, or topics provided.
- [qiubo123/xiaofeixia-sec](https://github.com/qiubo123/xiaofeixia-sec) - python版批量漏洞扫描,poc大部分来源网络,长期更新,也可自行扩展。
- [s1g0day/data_processor](https://github.com/s1g0day/data_processor) - 各类域名数据处理
- [s1g0day/ReportGenX](https://github.com/s1g0day/ReportGenX) - 渗透测试报告辅助生成工具
- [Cherno-x/dataBrawl](https://github.com/Cherno-x/dataBrawl) - 一键生成免杀木马的 shellcode 免杀框架
- [sec-report/SecAutoBan](https://github.com/sec-report/SecAutoBan) - 恶意IP全自动封禁平台。支持收集如下安全设备告警:长亭WAF社区版(SafeLine)、微步蜜罐HFish、奇安信天眼、奇安信椒图、绿盟WAF、科来网络安全分析审计系统。支持如下设备联动封禁:RouterOS、OPNsense、CheckPoint、奇安信防火墙、旁路阻断(无需设备配合)
- [yuag/Code-audit](https://github.com/yuag/Code-audit) - 代码审计
- [Autumn-27/ScopeSentry](https://github.com/Autumn-27/ScopeSentry) - ScopeSentry-网络空间测绘、子域名枚举、端口扫描、敏感信息发现、漏洞扫描、分布式节点
- [eeeeeeeeee-code/e0e1-wx](https://github.com/eeeeeeeeee-code/e0e1-wx) - 微信小程序辅助渗透-自动化
- [Sweelg/Kingdee-erp-Unserialize-RCE](https://github.com/Sweelg/Kingdee-erp-Unserialize-RCE) - 金蝶云星空 Kingdee-erp-Unserialize-RCE POC&&EXP
- [bingtangbanli/Data-security-check](https://github.com/bingtangbanli/Data-security-check) - 检测终端远程软件和终端涉及身份证号和手机号的文件
- [chasingboy/Xtools](https://github.com/chasingboy/Xtools) - Xtools 是一款 Sublime Text 插件,同时是一款简单的资产处理、命令行调用工具。
- [kento996/xianzhi_assistant](https://github.com/kento996/xianzhi_assistant) - 这是一个基于先知社区知识构建的向量知识库
- [c10udlnk/myReverseExps](https://github.com/c10udlnk/myReverseExps) - Some common reverse exps in CTF.自己总结编写的一些逆向常用脚本&&常见加密/编码的实现源码和比赛时用的处理脚本。
- [ProbiusOfficial/Awsome-Sec.CTF-Videomaker](https://github.com/ProbiusOfficial/Awsome-Sec.CTF-Videomaker) - 【Hello CTF】收录国内网络安全以及CTF领域的优秀视频作者
- [20142995/nuclei-templates](https://github.com/20142995/nuclei-templates) - nuclei-templates 4W+已校验
- [co01cat/SqlmapXPlus](https://github.com/co01cat/SqlmapXPlus) - sqlmap Xplus 基于 sqlmap,对经典的数据库注入漏洞利用工具进行二开!
- [tarihub/blackjump](https://github.com/tarihub/blackjump) - JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 / CVE-2023-42820 / RCE 2021
- [ChinaRan0/BlueTeamTools](https://github.com/ChinaRan0/BlueTeamTools) - 蓝队工具箱
- [fuzz4all/fuzz4all](https://github.com/fuzz4all/fuzz4all) - 🌌️Fuzz4All: Universal Fuzzing with Large Language Models
- [Y1-K1NG/poc_exp](https://github.com/Y1-K1NG/poc_exp) - 暂停更新·······正在谋划······
- [UndeadSec/SwaggerSpy](https://github.com/UndeadSec/SwaggerSpy) - Automated OSINT on SwaggerHub
- [JaveleyQAQ/WeChatOpenDevTools-Python](https://github.com/JaveleyQAQ/WeChatOpenDevTools-Python) - WeChatOpenDevTool 微信小程序强制开启开发者工具
- [MD-SEC/MDPOCS](https://github.com/MD-SEC/MDPOCS) - 猫蛋儿安全团队编写的poc能报就能打。企业微信、海康、Metabase、Openfire、泛微OA......
- [asaotomo/ZipCracker](https://github.com/asaotomo/ZipCracker) - ZipCracker是一款由Hx0战队开发的高性能多并发破解工具,专为破解密码保护的Zip文件而设计。它采用CRC32碰撞和字典攻击方式猜测Zip文件的明文或密码,并能成功提取其中的内容。这款工具具备识别"伪加密"Zip文件的能力,并能自动进行修复。因此,它非常适合在CTF比赛中使用。(ZipCracker by Hx0 team is a tool for cracking passwords
- [honmashironeko/icpscan](https://github.com/honmashironeko/icpscan) - 用于快速查询IP、域名资产备案信息及权重的工具。欢迎关注微信公众号加群反馈问题~
- [0xNslabs/CanaryTokenScanner](https://github.com/0xNslabs/CanaryTokenScanner) - Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).
- [Y0-kan/YoScan](https://github.com/Y0-kan/YoScan) - YoScan是一款综合性资产收集工具
- [Fupo-series/ICS-Tools](https://github.com/Fupo-series/ICS-Tools) - 工控设备信息识别工具箱
- [sec-report/SecReport](https://github.com/sec-report/SecReport) - ChatGPT加持的,多人在线协同信息安全报告编写平台。目前支持的报告类型:渗透测试报告,APP隐私合规报告。
- [xinyisleep/pocscan](https://github.com/xinyisleep/pocscan) - 继承大量poc检查 包含oa 如 泛微 通达 致远 万户 等。
- [p0we7/bgp-review](https://github.com/p0we7/bgp-review) -
- [yuag/Emergency-response-tools](https://github.com/yuag/Emergency-response-tools) - 应急响应检测工具
- [l3yx/jdwp-codeifier](https://github.com/l3yx/jdwp-codeifier) - 基于 jdwp-shellifier 的进阶JDWP漏洞利用脚本(动态执行Java/Js代码并获得回显)
- [huangzheng2016/CTFd-docker](https://github.com/huangzheng2016/CTFd-docker) - 用Docker一键配置CTFd,此版本的CTFd集合Whale/Owl等插件,可以实现docker-compose/dockerfile/swarm启动容器
- [lemono0/FastJsonParty](https://github.com/lemono0/FastJsonParty) - FastJson全版本Docker漏洞环境(涵盖1.2.47/1.2.68/1.2.80等版本),主要包括JNDI注入及高版本绕过、waf绕过、文件读写、原生反序列化、利用链探测绕过、不出网利用等。从黑盒的角度覆盖FastJson深入利用
- [Amulab/CAudit](https://github.com/Amulab/CAudit) - 集权设施扫描器
- [davidalami/VulnMapAI](https://github.com/davidalami/VulnMapAI) - VulnMapAI combines the power of nmap’s detailed network scanning and the advanced natural language processing capabilities of GPT-4 to generate comprehensive and intelligible vulnerability reports. It
- [AabyssZG/AWD-Guide](https://github.com/AabyssZG/AWD-Guide) - 从零学习AWD比赛指导手册以及AWD脚本整理
- [SegmaSec/Dark-Shell-V1](https://github.com/SegmaSec/Dark-Shell-V1) - Dark-Shell is a Tool for Generating ReverShell File
- [sule01u/SBSCAN](https://github.com/sule01u/SBSCAN) - SBSCAN是一款专注于spring框架的渗透测试工具,可以对指定站点进行springboot未授权扫描/敏感信息扫描以及进行spring框架漏洞扫描与验证的综合利用工具。 [SBSCAN is a penetration testing tool focused on the spring framework that can scan springboot sensitive inf
- [ivan-sincek/forbidden](https://github.com/ivan-sincek/forbidden) - Bypass 4xx HTTP response status codes and more. Based on PycURL and Python Requests.
- [ivan-sincek/chad](https://github.com/ivan-sincek/chad) - Search Google Dorks like Chad. / Social media takeover tool.
- [richardschwabe/JSFinder2](https://github.com/richardschwabe/JSFinder2) - Find subdomains and urls in Javascript files
- [yuag/bgscan](https://github.com/yuag/bgscan) - bgscan漏洞集成工具
- [hoochanlon/Free-NTFS-for-Mac](https://github.com/hoochanlon/Free-NTFS-for-Mac) - Nigate,一款支持苹果芯片的Free NTFS for Mac小工具软件。NTFS R/W for macOS. Support Intel/Apple Silicon now.
- [baiyies/PowerOneLiner](https://github.com/baiyies/PowerOneLiner) - Powershell shellcode one-liner. Powershell免杀一句话上线器便捷生成
- [BishopFox/CVE-2023-3519](https://github.com/BishopFox/CVE-2023-3519) - RCE exploit for CVE-2023-3519
- [binary-husky/gpt_academic](https://github.com/binary-husky/gpt_academic) - 为GPT/GLM等LLM大语言模型提供实用化交互接口,特别优化论文阅读/润色/写作体验,模块化设计,支持自定义快捷按钮&函数插件,支持Python和C++等项目剖析&自译解功能,PDF/LaTex论文翻译&总结功能,支持并行问询多种LLM模型,支持chatglm3等本地模型。接入通义千问, deepseekcoder, 讯飞星火, 文心一言, llama2, rwkv, claude2, moss
- [fullspectrumdev/RancidCrisco](https://github.com/fullspectrumdev/RancidCrisco) - PoC for CVE-2023-20126
- [topscoder/nuclei-wordfence-cve](https://github.com/topscoder/nuclei-wordfence-cve) - The EXCLUSIVE Collection of 40,000+ Nuclei templates based on Wordfence intel. Daily updates for bulletproof WordPress security.
- [darklotuskdb/frida-scripts-fetcher-exploiter](https://github.com/darklotuskdb/frida-scripts-fetcher-exploiter) - The Frida Scripts Fetcher & Exploiter tool helps you search and use those scripts to exploit based on the provided search keyword.
- [Veraxy00/SecVulList-Veraxy00](https://github.com/Veraxy00/SecVulList-Veraxy00) - 发布一些我发现的漏洞以及利用脚本。
- [source-xu/ossx](https://github.com/source-xu/ossx) - 存储桶遍历漏洞利用脚本
- [insightglacier/SourceMapX](https://github.com/insightglacier/SourceMapX) - 批量扫描并恢复sourcemap的源代码文件
- [ttstormxx/jjjjjjjjjjjjjs](https://github.com/ttstormxx/jjjjjjjjjjjjjs) - 爬网站JS文件,自动fuzz api接口,指定api接口(针对前后端分离项目,可指定后端接口地址),回显api响应
- [hmoytx/bp_miniprogram_decrypt](https://github.com/hmoytx/bp_miniprogram_decrypt) - 小程序登陆包加解密
- [0x2458bughunt/CVE-2023-25157](https://github.com/0x2458bughunt/CVE-2023-25157) -
- [r00tSe7en/BypassNeo-reGeorg](https://github.com/r00tSe7en/BypassNeo-reGeorg) - 免杀版Neo-reGeorg
- [Marven11/Fenjing](https://github.com/Marven11/Fenjing) - 专为CTF设计的Jinja2 SSTI全自动绕WAF脚本 | A Jinja2 SSTI cracker for bypassing WAF, designed for CTF
- [sccmdaveli/hikvision-poc](https://github.com/sccmdaveli/hikvision-poc) - 海康威视iVMS 综合安防任意文件上传 漏洞检测poc
- [assassin-9527/cdn_identify](https://github.com/assassin-9527/cdn_identify) - 一款识别域名是否使用cdn的工具
- [grimlockx/ADCSKiller](https://github.com/grimlockx/ADCSKiller) - An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer
- [0ang3el/websocket-smuggle](https://github.com/0ang3el/websocket-smuggle) - Issues with WebSocket reverse proxying allowing to smuggle HTTP requests
- [mabangde/Bloodhound_cn](https://github.com/mabangde/Bloodhound_cn) - bloodhound 汉化及规则
- [zer07z/CVE-Hunter](https://github.com/zer07z/CVE-Hunter) - 自动爬取指定组件的最新漏洞并推送至钉钉/wx
- [zylon-ai/private-gpt](https://github.com/zylon-ai/private-gpt) - Interact with your documents using the power of GPT, 100% privately, no data leaks
- [expzhizhuo/cnvd_general_assets](https://github.com/expzhizhuo/cnvd_general_assets) - 配合爱企查和fofa实现注册资本大于5000w公司的公网通用资产查询搜索,方便证书挖掘
- [LittleBear4/Find-SomeThing](https://github.com/LittleBear4/Find-SomeThing) - 红队批量脆弱点搜集工具
- [phunterlau/dont-read-gpt](https://github.com/phunterlau/dont-read-gpt) - Dont-Read-GPT is a Discord bot to summarize a long tech doc for key points and insights. It supports many sources and formats, like Github, arxiv, huggingface, Reddit etc.
- [s0md3v/SubGPT](https://github.com/s0md3v/SubGPT) - Find subdomains with GPT, for free
- [YulinSec/ChatGPTScan-SAST](https://github.com/YulinSec/ChatGPTScan-SAST) - 一个基于 ChatGPT 的开源代码审计平台。
- [Anof-cyber/PyCript](https://github.com/Anof-cyber/PyCript) - Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty
- [hatnoop/ARLaddSubdomains](https://github.com/hatnoop/ARLaddSubdomains) - 通过灯塔ARL的自定义"域名查询插件"功能,将其他渠道收集到的子域名添加至项目
- [FzBacon/CVE-2023-26976_tenda_AC6_stack_overflow](https://github.com/FzBacon/CVE-2023-26976_tenda_AC6_stack_overflow) -
- [lijiejie/MisConfig_HTTP_Proxy_Scanner](https://github.com/lijiejie/MisConfig_HTTP_Proxy_Scanner) - The scanner helps to scan misconfigured reverse proxy servers and misconfigured forward proxy servers
- [Shad0w-ops/H.I.V.E](https://github.com/Shad0w-ops/H.I.V.E) - H.I.V.E is an automated OSINT (Open Source Intelligence) multi-tool that enables efficient data gathering from various sources through the utilization of a single, unified platform.
- [TheR1D/shell_gpt](https://github.com/TheR1D/shell_gpt) - A command-line productivity tool powered by AI large language models like GPT-4, will help you accomplish your tasks faster and more efficiently.
- [morpheuslord/QuadraInspect](https://github.com/morpheuslord/QuadraInspect) - QuadraInspect is an Android framework that integrates AndroPass, APKUtil, and MobFS, providing a powerful tool for analyzing the security of Android applications.
- [RedSiege/AutoFunkt](https://github.com/RedSiege/AutoFunkt) - Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles
- [anmolksachan/TheTimeMachine](https://github.com/anmolksachan/TheTimeMachine) - Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not
- [microsoft/DeepSpeed](https://github.com/microsoft/DeepSpeed) - DeepSpeed is a deep learning optimization library that makes distributed training and inference easy, efficient, and effective.
- [ambionics/vbulletin-exploits](https://github.com/ambionics/vbulletin-exploits) - Exploits targeting vBulletin.
- [THUDM/ChatGLM-6B](https://github.com/THUDM/ChatGLM-6B) - ChatGLM-6B: An Open Bilingual Dialogue Language Model | 开源双语对话语言模型
- [ustayready/cloudgpt](https://github.com/ustayready/cloudgpt) - Vulnerability scanner for AWS customer managed policies using ChatGPT
- [sf197/nuclei_gpt](https://github.com/sf197/nuclei_gpt) - Chat automates Nuclei template generation
- [7estUser/WIKI-POC](https://github.com/7estUser/WIKI-POC) - 漏洞库
- [hisxo/ReconAIzer](https://github.com/hisxo/ReconAIzer) - A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomains and more!
- [dromara/domain-admin](https://github.com/dromara/domain-admin) - 域名SSL证书监测平台、SSL证书申请自动续签。Domain and SSL Cert monitor System.
- [nu0l/CVE-2022-46463](https://github.com/nu0l/CVE-2022-46463) - CVE-2022-46463(Harbor 未授权)
- [20142995/Goby](https://github.com/20142995/Goby) -
- [H-Limbus/NoMoney](https://github.com/H-Limbus/NoMoney) - NoMoney 是一款集成了fofa,zoomeye(钟馗之眼),censys,奇安信的鹰图平台,360quake,且完全免费的信息收集工具。fofa 和 zoomeye借助爬虫实现,其余平台利用各自的api进行信息收集。
- [ccongc/e-cology9-sql](https://github.com/ccongc/e-cology9-sql) - 泛微e-cology9 SQL注入验证脚本
- [XiaoliChan/wmiexec-Pro](https://github.com/XiaoliChan/wmiexec-Pro) - New generation of wmiexec.py
- [ZLimitless/CTFd-BerNet](https://github.com/ZLimitless/CTFd-BerNet) - 基于kubernetes容器编排的ctfd平台动态题目靶场插件,支持Web题目以及pwn题部署.
- [Moxin1044/CTFd-gocqhttp-bot](https://github.com/Moxin1044/CTFd-gocqhttp-bot) - CTFd GOCQHTTP机器人插件
- [goddemondemongod/god_param](https://github.com/goddemondemongod/god_param) - god_param
- [Abs1n7he/Struts2scan](https://github.com/Abs1n7he/Struts2scan) - Struts2 Scanning and Utilization 漏洞扫描+利用 s2_001 s2_005 s2_007 s2_008 s2_009 s2_013 s2_015 s2_032 s2_045 s2_046 s2_048 s2_052 s2_053 s2_057 s2_059 s2_061
- [AabyssZG/Web-SurvivalScan](https://github.com/AabyssZG/Web-SurvivalScan) - 对Web渗透项目资产进行快速存活验证
- [karthik558/ddos-attack](https://github.com/karthik558/ddos-attack) - This script is designed for educational purposes only and allows users to simulate a DDoS attack. Please note that hacking is illegal and this script should not be used for any malicious activities. I
- [DingyShark/nuclei-scan-sort](https://github.com/DingyShark/nuclei-scan-sort) - Simple Python script to sort nuclei scans by severity and URL
- [MattKeeley/Spoofy](https://github.com/MattKeeley/Spoofy) - Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.
- [getredash/redash](https://github.com/getredash/redash) - Make Your Company Data Driven. Connect to any data source, easily visualize, dashboard and share your data.
- [Potato-py/csIntruder](https://github.com/Potato-py/csIntruder) - 本项目包含CobaltStrike密码爆破、伪造上线以及DDos功能。其中伪造上线支持常见魔改版CS。This project includes CobaltStrike password blasting, fake online and DDos functions. Among them, fake online supports common secondary development v
- [icyguider/NewPowerDNS](https://github.com/icyguider/NewPowerDNS) - Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.
- [AabyssZG/SpringBoot-Scan](https://github.com/AabyssZG/SpringBoot-Scan) - 针对SpringBoot的开源渗透框架,以及Spring相关高危漏洞利用工具
- [A0WaQ4/HexDnsEchoT](https://github.com/A0WaQ4/HexDnsEchoT) - 命令执行不回显但DNS协议出网的命令回显场景解决方案(修改为使用ceye接收请求,添加自定义DNS服务器)
- [CHINA-china/Unauthorized](https://github.com/CHINA-china/Unauthorized) - 前端未授权访问检测工具,自动提取JS泄露的接口进行测试。
- [Axx8/HTTPServer](https://github.com/Axx8/HTTPServer) - 红队内网环境中一个能快速开启HTTP文件浏览服务的小工具 ,可执行Webshell,可用于在内网不出网时文件的下载,启动时会根据网卡IPV4地址输出URL(本地回环除外)。
- [RoderickChan/pwncli](https://github.com/RoderickChan/pwncli) - Do pwn by command line
- [depycode/burpsuite_hack](https://github.com/depycode/burpsuite_hack) - 一款代理扫描器
- [f0ng/autoDecoder-usages](https://github.com/f0ng/autoDecoder-usages) - autoDecoder的用法及案例,包含加解密方法、绕waf、替换参数等操作。
- [qianxiao996/R-Knife](https://github.com/qianxiao996/R-Knife) - R-Knife 综合渗透工具箱
- [D0gHead/masscan-tools](https://github.com/D0gHead/masscan-tools) - Format Masscan OutFile
- [D3Ext/DFShell](https://github.com/D3Ext/DFShell) - D3Ext's Forward Shell
- [father-bot/chatgpt_telegram_bot](https://github.com/father-bot/chatgpt_telegram_bot) - 💬 Telegram bot with ChatGPT, Python-based, using OpenAI's API.
- [Elinpf/cmder](https://github.com/Elinpf/cmder) - 可自定义扩展的渗透测试命令行生成工具
- [jorhelp/Ingram](https://github.com/jorhelp/Ingram) - 网络摄像头漏洞扫描工具 | Webcam vulnerability scanning tool
- [MzHmO/psexec_noinstall](https://github.com/MzHmO/psexec_noinstall) - Repository contains psexec, which will help to exploit the forgotten pipe
- [its-arun/CVE-2022-39197](https://github.com/its-arun/CVE-2022-39197) - CobaltStrike <= 4.7.1 RCE
- [AabyssZG/BinaryCutting-Tool](https://github.com/AabyssZG/BinaryCutting-Tool) - 二进制文件切割&合并工具
- [cold-try/Gank-RECON](https://github.com/cold-try/Gank-RECON) - Subdomains enumeration, various scans and testing of some vulnerabilities.
- [JoelGMSec/Thunderstorm](https://github.com/JoelGMSec/Thunderstorm) - Modular framework to exploit UPS devices
- [nemesida-waf/waf-bypass](https://github.com/nemesida-waf/waf-bypass) - Check your WAF before an attacker does
- [RapidDNS/Afuzz](https://github.com/RapidDNS/Afuzz) - Afuzz is an automated web path fuzzing tool for the Bug Bounty projects.
- [ravizhan/ICP-spider](https://github.com/ravizhan/ICP-spider) - 基于yolov8+孪生网络识别验证码的ICP备案查询程序。从工业和信息化部政务服务平台查询实时数据,高精度过验证码
- [secretsquirrel/SigThief](https://github.com/secretsquirrel/SigThief) - Stealing Signatures and Making One Invalid Signature at a Time
- [zhuima/daohang](https://github.com/zhuima/daohang) - 运维内部使用的导航地址, 运维导航系统,链接导航系统,网址导航系统,导航页面,导航网址
- [20142995/sectool](https://github.com/20142995/sectool) - 个人向的工具导航,Ctrl + F
- [lijiejie/GitHack](https://github.com/lijiejie/GitHack) - A `.git` folder disclosure exploit
- [fastnlp/fitlog](https://github.com/fastnlp/fitlog) - fitlog是一款在深度学习训练中用于辅助用户记录日志和管理代码的工具
- [RockChinQ/QChatGPT](https://github.com/RockChinQ/QChatGPT) - 😎高稳定性、🧩支持扩展、🦄多模态的 ChatGPT QQ / QQ频道 / One Bot 机器人🤖 | 支持 OpenAI GPT、GPT 4o、Claude、Gemini Pro、DeepSeek、Moonshot(Kimi)、gpt4free、One API、Ollama 的 QQ / QQ频道 / OneBot 机器人 / Agent 平台
- [XueMeijing/dingtalk-chatgpt-bot](https://github.com/XueMeijing/dingtalk-chatgpt-bot) - 钉钉机器人回复web ChatGPT消息 支持上下文
- [phplaber/yawf](https://github.com/phplaber/yawf) - Web 漏洞检测工具
- [xnl-h4ck3r/waymore](https://github.com/xnl-h4ck3r/waymore) - Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan & VirusTotal!
- [y1nglamore/IDOR_detect_tool](https://github.com/y1nglamore/IDOR_detect_tool) - 一款API水平越权漏洞检测工具
- [Hakumarachi/Bropper](https://github.com/Hakumarachi/Bropper) - An automatic Blind ROP exploitation tool
- [3a7/SQLi-Hunter-v2](https://github.com/3a7/SQLi-Hunter-v2) - The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.
- [m8sec/CVE-2021-34527](https://github.com/m8sec/CVE-2021-34527) - PrintNightmare (CVE-2021-34527) PoC Exploit
- [nettitude/ShellcodeMutator](https://github.com/nettitude/ShellcodeMutator) -
- [ggg4566/PointSearch](https://github.com/ggg4566/PointSearch) - 备份文件快速扫描工具
- [Cr4ckC4t/cve-2022-41352-zimbra-rce](https://github.com/Cr4ckC4t/cve-2022-41352-zimbra-rce) - Zimbra <9.0.0.p27 RCE
- [IncludeSecurity/RTSPhuzz](https://github.com/IncludeSecurity/RTSPhuzz) - RTSPhuzz - An RTSP Fuzzer written using the Boofuzz framework
- [Muhammd/BurpSuite_Payloads](https://github.com/Muhammd/BurpSuite_Payloads) -
- [bsysop/IpLogger](https://github.com/bsysop/IpLogger) -
- [1in9e/icp-domains](https://github.com/1in9e/icp-domains) - 输入一个域名,输出ICP备案所有关联域名
- [SCAMagic/SCAMagicScan](https://github.com/SCAMagic/SCAMagicScan) -
- [20142995/pocsuite3](https://github.com/20142995/pocsuite3) -
- [cramppet/regulator](https://github.com/cramppet/regulator) - Automated learning of regexes for DNS discovery
- [testanull/ProxyNotShell-PoC](https://github.com/testanull/ProxyNotShell-PoC) -
- [Hyperclaw79/HULK-v3](https://github.com/Hyperclaw79/HULK-v3) - Asynchronous HTTP Botnet for Distributed Denial of Service (DDoS)
- [joxeankoret/diaphora](https://github.com/joxeankoret/diaphora) - Diaphora, the most advanced Free and Open Source program diffing tool.
- [t3l3machus/wwwtree](https://github.com/t3l3machus/wwwtree) - A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesystem to a victim machine during privilege escalation.
- [onekey-sec/unblob](https://github.com/onekey-sec/unblob) - Extract files from any kind of container formats
- [Ridter/PySQLTools](https://github.com/Ridter/PySQLTools) - Mssql利用工具
- [WindXaa/Android-Vulnerability-Mining](https://github.com/WindXaa/Android-Vulnerability-Mining) - Android APP漏洞之战系列,主要讲述如何快速挖掘APP漏洞
- [ghtwf01/excavator](https://github.com/ghtwf01/excavator) - Passive DAST Scanner(被动式黑盒漏洞扫描器)
- [Vu1nT0tal/firmeye](https://github.com/Vu1nT0tal/firmeye) - IoT固件漏洞挖掘工具
- [SikretaLabs/BlueMap](https://github.com/SikretaLabs/BlueMap) - A Azure Exploitation Toolkit for Red Team & Pentesters
- [firerpa/lamda](https://github.com/firerpa/lamda) - ⚡️ Android reverse engineering & automation framework | 史上最强安卓抓包/逆向/HOOK & 云手机/远程桌面/自动化取证 ALL-IN-ONE 框架,你的工作从未如此简单快捷。
- [G3et/Search_Viewer](https://github.com/G3et/Search_Viewer) - 集Fofa、Hunter鹰图、Shodan、360 quake、Zoomeye 钟馗之眼、censys 为一体的空间测绘gui图形界面化工具,支持一键采集爬取和导出fofa、shodan等数据,方便快捷查看
- [MatrixTM/MHDDoS](https://github.com/MatrixTM/MHDDoS) - Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
- [mandiant/ADFSpoof](https://github.com/mandiant/ADFSpoof) -
- [mt0u/icp-fofa](https://github.com/mt0u/icp-fofa) - 批量备案信息查询
- [APTRS/APTRS](https://github.com/APTRS/APTRS) - Automated Penetration Testing Reporting System
- [Eilonh/s3crets_scanner](https://github.com/Eilonh/s3crets_scanner) -
- [0x14dli/cve2022-26134exp](https://github.com/0x14dli/cve2022-26134exp) - cve2022-26134
- [a1most/disu](https://github.com/a1most/disu) - 包含crt.sh、fullhunt、fofa、360quake、fofa、hunter、virustotal、zoomeye、rapiddns、certspotter、chaziyu、dnsscan、threatminer的一款收集子域名的集成工具。
- [ZororoZ/fscanOutput](https://github.com/ZororoZ/fscanOutput) - 一个用于处理fsacn输出结果的小脚本(尤其面对大量资产的fscan扫描结果做输出优化,让你打点快人一步!!!)
- [kljunowsky/CVE-2022-42889-text4shell](https://github.com/kljunowsky/CVE-2022-42889-text4shell) - Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.
- [LittleBear4/OA-EXPTOOL](https://github.com/LittleBear4/OA-EXPTOOL) - OA综合利用工具,集合将近20款OA漏洞批量扫描
- [komomon/Komo](https://github.com/komomon/Komo) - 🚀Komo, a comprehensive asset collection and vulnerability scanning tool. Komo 一个综合资产收集和漏洞扫描工具,集成了20余款工具,通过多种方式对子域进行获取,收集域名邮箱,进行存活探测,域名指纹识别,域名反查ip,ip端口扫描,web服务链接爬取并发送给xray,对web服务进行POC漏洞扫描,对主机进行主机漏洞扫描。
- [kljunowsky/CVE-2022-41040-POC](https://github.com/kljunowsky/CVE-2022-41040-POC) - CVE-2022-41040 - Server Side Request Forgery (SSRF) in Microsoft Exchange Server
- [xz-zone/Webpackfind](https://github.com/xz-zone/Webpackfind) - Webpack自动化信息收集
- [r0oth3x49/ghauri](https://github.com/r0oth3x49/ghauri) - An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
- [skelsec/msldap](https://github.com/skelsec/msldap) - LDAP library for auditing MS AD
- [OpenEthan/SMSBoom](https://github.com/OpenEthan/SMSBoom) - SMSBoom - Deprecate: Due to judicial reasons, the repository has been suspended!
- [sma11new/PocList](https://github.com/sma11new/PocList) - 漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMaste
- [d3ckx1/checkurlopen](https://github.com/d3ckx1/checkurlopen) - 用于网站(HTTP)自动化判断开放和网页快照拍摄
- [RoomaSec/RmEye](https://github.com/RoomaSec/RmEye) - 戎码之眼是一个window上的基于att&ck模型的威胁监控工具.有效检测常见的未知威胁与已知威胁.防守方的利剑
- [Bywalks/TrackAttacker](https://github.com/Bywalks/TrackAttacker) - TrackAttacker | 追踪攻击者工具 | HW蓝队 | 溯源必备
- [xnl-h4ck3r/urless](https://github.com/xnl-h4ck3r/urless) - De-clutter a list of URLs
- [mhaskar/ExchangeFinder](https://github.com/mhaskar/ExchangeFinder) - Find Microsoft Exchange instance for a given domain and identify the exact version
- [ox-eye/Ox4Shell](https://github.com/ox-eye/Ox4Shell) - Deobfuscate Log4Shell payloads with ease.
- [xiaowu-001/SearchCVEandNVD](https://github.com/xiaowu-001/SearchCVEandNVD) - 用于爬取CVE,NVD,CNVD,CNNVD漏洞数据
- [Conan924/wooyun-dic](https://github.com/Conan924/wooyun-dic) - 根据乌云提取的漏洞路径字典
- [iamultra/ssrfsocks](https://github.com/iamultra/ssrfsocks) - Creates a SOCK proxy server that transmits data over an SSRF vulnerability
- [lijiejie/chromePass](https://github.com/lijiejie/chromePass) - Decrypt all saved Chrome passwords
- [chris-anley/cq](https://github.com/chris-anley/cq) - CQ, a code security scanner
- [p0dalirius/ApacheTomcatScanner](https://github.com/p0dalirius/ApacheTomcatScanner) - A python script to scan for Apache Tomcat server vulnerabilities.
- [amanszpapaya/MacPer](https://github.com/amanszpapaya/MacPer) - MacOSX Privilege Escalation Research
- [faisalfs10x/Webmin-CVE-2022-0824-revshell](https://github.com/faisalfs10x/Webmin-CVE-2022-0824-revshell) - Webmin <=1.984, CVE-2022-0824 Post-Auth Reverse Shell PoC
- [r0eXpeR/CVE-2021-22205](https://github.com/r0eXpeR/CVE-2021-22205) - CVE-2021-22205 Unauthorized RCE
- [sry309/PwdBUD](https://github.com/sry309/PwdBUD) - 一款SRC密码生成工具,尝试top字典无果后,可以根据域名、公司名等因素来生成特定的字典
- [sv3nbeast/DnslogCmdEcho](https://github.com/sv3nbeast/DnslogCmdEcho) - 命令执行不回显但DNS协议出网的命令回显场景解决方案
- [gsmith257-cyber/GraphCrawler](https://github.com/gsmith257-cyber/GraphCrawler) - GraphQL automated security testing toolkit
- [In3tinct/See-SURF](https://github.com/In3tinct/See-SURF) - Python based scanner to find potential SSRF parameters
- [CyberCommands/exploit-sudoedit](https://github.com/CyberCommands/exploit-sudoedit) -
- [R1card0-tutu/MailDOG](https://github.com/R1card0-tutu/MailDOG) -
- [alexbieber/Bug_Bounty_writeups](https://github.com/alexbieber/Bug_Bounty_writeups) - BUG BOUNTY WRITEUPS - OWASP TOP 10 🔴🔴🔴🔴✔
- [righettod/toolbox-pentest-web](https://github.com/righettod/toolbox-pentest-web) - Docker toolbox for pentest of web based application.
- [GONZOsint/geowifi](https://github.com/GONZOsint/geowifi) - Search WiFi geolocation data by BSSID and SSID on different public databases.
- [hac425xxx/trapfuzzer](https://github.com/hac425xxx/trapfuzzer) -
- [Gifts/Rogue-MySql-Server](https://github.com/Gifts/Rogue-MySql-Server) - Rogue MySql Server
- [weishen250/Read_Path](https://github.com/weishen250/Read_Path) - js / html /josn 中获取 泄露的接口 / URL / 未授权路径 获取之后尝试访问
- [Kira-Pgr/Github-CVE-Listener](https://github.com/Kira-Pgr/Github-CVE-Listener) - 无需服务器的GitHub实时漏洞利用工具监听器,目前支持微信/TG推送,中文版(https://github.com/Kira-Pgr/Github-CVE-Listener/blob/main/README_ZH.md)
- [Wh04m1001/DFSCoerce](https://github.com/Wh04m1001/DFSCoerce) -
- [CasperGN/ActiveDirectoryEnumeration](https://github.com/CasperGN/ActiveDirectoryEnumeration) - Enumerate AD through LDAP with a collection of helpfull scripts being bundled
- [DeEpinGh0st/CVE-2022-28346](https://github.com/DeEpinGh0st/CVE-2022-28346) - Django QuerySet.annotate(), aggregate(), extra() SQL 注入
- [NafisiAslH/KnowledgeSharing](https://github.com/NafisiAslH/KnowledgeSharing) -
- [GitGuardian/ggshield](https://github.com/GitGuardian/ggshield) - Find and fix 400+ types of hardcoded secrets and 70+ types of infrastructure-as-code misconfigurations.
- [xnl-h4ck3r/xnLinkFinder](https://github.com/xnl-h4ck3r/xnLinkFinder) - A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target
- [JeffLIrion/adb_shell](https://github.com/JeffLIrion/adb_shell) - A Python implementation of ADB with shell and FileSync functionality.
- [0xacb/viewgen](https://github.com/0xacb/viewgen) - Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys
- [lyc8503/fc-proxy](https://github.com/lyc8503/fc-proxy) - 利用阿里云函数当作代理池.
- [fatmo666/InfoScripts](https://github.com/fatmo666/InfoScripts) - 一个渗透测试/SRC挖掘中用于信息收集的脚本集合,面向安全从业者、学习人员,严禁用于非法用途。
- [W01fh4cker/Serein](https://github.com/W01fh4cker/Serein) - 【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。
- [ciprianster/OSIPs](https://github.com/ciprianster/OSIPs) - A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR relays and location
- [Anof-cyber/Pentest-Mapper](https://github.com/Anof-cyber/Pentest-Mapper) - A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabilities
- [komomon/CVE-2022-30190-follina-Office-MSDT-Fixed](https://github.com/komomon/CVE-2022-30190-follina-Office-MSDT-Fixed) - CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。
- [wietze/windows-dll-hijacking](https://github.com/wietze/windows-dll-hijacking) - Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.
- [z1un/TongdaOA-exp](https://github.com/z1un/TongdaOA-exp) - TongdaOA 11.7 ~11.8 通达OA,任意用户登录+后台getshell
- [JohnHammond/msdt-follina](https://github.com/JohnHammond/msdt-follina) - Codebase to generate an msdt-follina payload
- [Threekiii/Awesome-Redteam](https://github.com/Threekiii/Awesome-Redteam) - 一个攻防知识仓库 Red Teaming and Offensive Security
- [XiaoliChan/Fastjson-ForwardShell](https://github.com/XiaoliChan/Fastjson-ForwardShell) - Breaking fastjson with forward shell
- [duty1g/subcat](https://github.com/duty1g/subcat) - Another fast subdomain enumeration tool
- [aboutcode-org/vulnerablecode](https://github.com/aboutcode-org/vulnerablecode) - A free and open vulnerabilities database and the packages they impact. And the tools to aggregate and correlate these vulnerabilities. Sponsored by NLnet https://nlnet.nl/project/vulnerabilitydatabase
- [laluka/bypass-url-parser](https://github.com/laluka/bypass-url-parser) - bypass-url-parser
- [WingsSec/Meppo](https://github.com/WingsSec/Meppo) - 漏洞检测框架 Meppo | By WingsSec
- [gokulapap/Reconator](https://github.com/gokulapap/Reconator) - Automated Recon for Pentesting & Bug Bounty
- [li8u99/Seeyon_exp_plus](https://github.com/li8u99/Seeyon_exp_plus) - seeyon致远OA全漏洞检测与利用
- [fortalice/bofhound](https://github.com/fortalice/bofhound) - Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel
- [fyoorer/ShadowClone](https://github.com/fyoorer/ShadowClone) - Unleash the power of cloud
- [light-Life/CVE-Search](https://github.com/light-Life/CVE-Search) - 开源软件漏洞排查脚本,接口为nvd
- [d-rn/vulBox](https://github.com/d-rn/vulBox) - 漏洞收集
- [lishang520/AutoScan](https://github.com/lishang520/AutoScan) - AutoScan:一款基于重点资产的自动识别+漏洞检测的工具
- [givemefivw/SecurityServiceBox](https://github.com/givemefivw/SecurityServiceBox) - 一个既可以满足安服仔日常渗透工作也可以批量刷洞的工具盒子。集合了常见的域名收集、目录扫描、ip扫描、指纹扫描、PoC验证等常用工具,方便安服仔快速展开渗透测试
- [givemefivw/Pocsearch](https://github.com/givemefivw/Pocsearch) - 一个在本地搜索CVE编号漏洞的PoC/EXP在Github的地址的小工具
- [d5shenwu/VulPOC](https://github.com/d5shenwu/VulPOC) - VulPOC 用于记录本人复现过的漏洞
- [awake1t/Awesome-hacking-tools](https://github.com/awake1t/Awesome-hacking-tools) - 收集网上好用、实用的红蓝对抗武器。从资产扫描、泄漏扫描、信息收集、漏洞扫描、SRC批量挖掘、内网渗透、应急响应等等工具。 大部分我都用过、部分会写上自己的感想与建议,希望对你有帮助
- [ultrasecurity/TeleKiller](https://github.com/ultrasecurity/TeleKiller) - A Tools Session Hijacking And Stealer Local Passcode Telegram Windows
- [jurelou/epagneul](https://github.com/jurelou/epagneul) - Graph Visualization for windows event logs
- [b1ackc4t/14Finger](https://github.com/b1ackc4t/14Finger) - 功能齐全的Web指纹识别和分享平台,基于vue3+django前后端分离的web架构,并集成了长亭出品的rad爬虫的功能,内置了一万多条互联网开源的指纹信息。
- [JettChenT/scan-for-webcams](https://github.com/JettChenT/scan-for-webcams) - scan for webcams on the internet
- [pwnedshell/Larascript](https://github.com/pwnedshell/Larascript) - Laravel RCE exploit. CVE-2018-15133
- [cyberark/MITM_Intercept](https://github.com/cyberark/MITM_Intercept) - A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.
- [abcd1234564499sc/analysisEvtx](https://github.com/abcd1234564499sc/analysisEvtx) - 解析windows日志文件(.evtx)
- [Nekmo/dirhunt](https://github.com/Nekmo/dirhunt) - Find web directories without bruteforce
- [UzJu/Cloud-Bucket-Leak-Detection-Tools](https://github.com/UzJu/Cloud-Bucket-Leak-Detection-Tools) - 六大云存储,泄露利用检测工具
- [H3rmesk1t/AWDTools](https://github.com/H3rmesk1t/AWDTools) - 一个简易的AWD攻击框架,希望对于该项目大家有更好的建议和改进!
- [DWiskow/CaddyGoAccessDataLoggerConverter](https://github.com/DWiskow/CaddyGoAccessDataLoggerConverter) - Caddy/GoAccess data logger & converter (translates Caddy web server JSON logs to a format that GoAccess can ingest)
- [lawiet47/autoresponder](https://github.com/lawiet47/autoresponder) - Carbon Black Response IR tool
- [Ernket/shepherd](https://github.com/Ernket/shepherd) - 将fofa quake zoomeye hunter等空间测绘聚合的小工具
- [kozmer/log4j-shell-poc](https://github.com/kozmer/log4j-shell-poc) - A Proof-Of-Concept for the CVE-2021-44228 vulnerability.
- [BeetleChunks/SpoolSploit](https://github.com/BeetleChunks/SpoolSploit) - A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.
- [Pear1y/CVE-2022-26133](https://github.com/Pear1y/CVE-2022-26133) - Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification.
- [jax7sec/EmailCollect](https://github.com/jax7sec/EmailCollect) - 帮助红队收集目标企业员工的邮箱信息,借助必应搜索引擎爬取邮箱。
- [AbelChe/whichAlive](https://github.com/AbelChe/whichAlive) - 信息收集,批量多线程探测url存活、获取基本信息(标题、ip、长度、跳转、server等)
- [GGStudy-DDUp/SafeInfoCollect](https://github.com/GGStudy-DDUp/SafeInfoCollect) - 安全信息事件收集工具
- [shengshengli/tig](https://github.com/shengshengli/tig) - Threat Intelligence Gathering 威胁情报收集,旨在提高蓝队拿到攻击 IP 后对其进行威胁情报信息收集的效率。
- [moyuwa/wechat_appinfo_wxapkg](https://github.com/moyuwa/wechat_appinfo_wxapkg) - 渗透测试:微信小程序信息在线收集,wxapkg源码包内提取信息
- [TomAPU/ev](https://github.com/TomAPU/ev) - EV: IDS Evasion via Packet Manipulation
- [Quantika14/email-prediction-asterisks](https://github.com/Quantika14/email-prediction-asterisks) -
- [ZephrFish/F5-CVE-2022-1388-Exploit](https://github.com/ZephrFish/F5-CVE-2022-1388-Exploit) - Exploit and Check Script for CVE 2022-1388
- [Lucksi/Mr.Holmes](https://github.com/Lucksi/Mr.Holmes) - A Complete Osint Tool :mag:
- [horizon3ai/CVE-2022-1388](https://github.com/horizon3ai/CVE-2022-1388) - POC for CVE-2022-1388
- [lijiejie/subDomainsBrute](https://github.com/lijiejie/subDomainsBrute) - A fast sub domain brute tool for pentesters
- [tomijerenko/KaminskyAttack](https://github.com/tomijerenko/KaminskyAttack) - DNS poisoning attack.
- [exhuz3u/Dpscanner](https://github.com/exhuz3u/Dpscanner) - 基于域名的web端口扫描器、title扫描、多线程、进度展示、端口批量扫描
- [CLincat/vulcat](https://github.com/CLincat/vulcat) - vulcat可用于扫描Web端常见的CVE、CNVD等编号的漏洞,发现漏洞时会返回Payload信息。部分漏洞还支持命令行交互模式,可以持续利用漏洞
- [0x7eTeam/Unauthorized_Application_Check](https://github.com/0x7eTeam/Unauthorized_Application_Check) - Unauthorized_Application_Check 未授权应用漏洞批量检查,包含redis,Hadoop,docker,CouchDB,ftp,zookeeper,elasticsearch,memcached,mongodb,rsync_access,mysql,target,jenkins,target,jboss的未授权访问
- [fdl66/Golang_SCA](https://github.com/fdl66/Golang_SCA) - Golang SCA(Software Composition Analysis) 通过分析你的go.mod文件,协助你发现,Golang项目的依赖库是否存在漏洞
- [zhan741965531/vmp_helper](https://github.com/zhan741965531/vmp_helper) - 启明的漏洞管理平台,用了太烦心了,写了几个小脚本。
- [Pyy-dev/IpconFig-Summ1e233](https://github.com/Pyy-dev/IpconFig-Summ1e233) - 哈喽呀,大家好,本期在Github上面分享一下小工具🔧-能快速的查找IP的归属地址与IP的子域名之类的,来帮助大家快速的认定一下CNVD或者CNNVD的实践型漏洞的挖掘认定。
- [light-Life/Climb-cnnvd](https://github.com/light-Life/Climb-cnnvd) - 随手写的爬取CNNVD高价值漏洞的脚本
- [openx-org/BLEN](https://github.com/openx-org/BLEN) - 漏洞批量验证框架
- [VMsec/ihoneyBakFileScan_Modify](https://github.com/VMsec/ihoneyBakFileScan_Modify) - 批量网站备份文件扫描器,增加文件规则,优化内存占用
- [brevityinmotion/goodfaith](https://github.com/brevityinmotion/goodfaith) - Stay within program scope
- [agentzex/chrome_v80_password_grabber](https://github.com/agentzex/chrome_v80_password_grabber) - Grab passwords from Chrome > v80 using their new AES encryption
- [Haoyunforever/Study](https://github.com/Haoyunforever/Study) - 记录渗透测试学习中的笔记
- [Subn0x/evil-xmlrpc](https://github.com/Subn0x/evil-xmlrpc) - evil-xmlrpc is a tool that I created to help me bruteforce Wordpress user accounts using xmlrpc.php while bypassing iThemes Security preventing lockouts
- [rly0nheart/osinteye](https://github.com/rly0nheart/osinteye) - Username enumeration & reconnaisance suite
- [mathfaria/Layla](https://github.com/mathfaria/Layla) - [EN] BETA: Layla - recon tool for bug bounty
- [adavarski/DevSecOps-full-integration-chain](https://github.com/adavarski/DevSecOps-full-integration-chain) - DevSecOps full integration chain : Jenkins & GitLab pipelines, Docker, k8s, Ansible, Clair, Nessus, Nmap NSE, OWASP Dependency-Check, OWASP ZAP, Nikto, Lynis, Bandit, Gauntlt, etc.
- [righel/ms-exchange-version-nse](https://github.com/righel/ms-exchange-version-nse) - Nmap script to detect a Microsoft Exchange instance version with OWA enabled.
- [idiothacker/SignChecker](https://github.com/idiothacker/SignChecker) - SignChecker is a simple Python script that uses NMAP NSE SMB scripts to check for SMB signing and outputs the results of IPs where SMB Signing is disabled to a CSV file.
- [SECUREFOREST/WebMap](https://github.com/SECUREFOREST/WebMap) - Nmap Web Interface including XML parsing, maps and reports
- [CyberDruid-Codes/Automated-Reconator](https://github.com/CyberDruid-Codes/Automated-Reconator) -
- [shirosaidev/sharesniffer](https://github.com/shirosaidev/sharesniffer) - Network share sniffer and auto-mounter for crawling remote file systems
- [c-sh0/santacruz](https://github.com/c-sh0/santacruz) - Elasticsearch and Kibana setup for Penetration testing and reconnaissance.
- [scmanjarrez/CVEScannerV2DB](https://github.com/scmanjarrez/CVEScannerV2DB) - NVD semiupdated database to be used with CVEScannerV2
- [B34MR/scanman](https://github.com/B34MR/scanman) - ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).
- [kazet/wpgarlic](https://github.com/kazet/wpgarlic) - A proof-of-concept WordPress plugin fuzzer
- [cado-security/rip_raw](https://github.com/cado-security/rip_raw) - Rip Raw is a small tool to analyse the memory of compromised Linux systems.
- [Lu3ky13/lu3ky13-SCANNER](https://github.com/Lu3ky13/lu3ky13-SCANNER) - tools to find xss in a website
- [0x7eTeam/CVE-2022-0543](https://github.com/0x7eTeam/CVE-2022-0543) - CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行
- [waderwu/extractor-java](https://github.com/waderwu/extractor-java) - CodeQL extractor for java, which don't need to compile java source
- [1oid/cms_poc_exp](https://github.com/1oid/cms_poc_exp) - cms漏洞插件搜集
- [kracer127/Mysql-Exp-Collection](https://github.com/kracer127/Mysql-Exp-Collection) - 自己编写的udf漏洞提权脚本、msf的mysql模块mof脚本以及后续的提权脚本收集。
- [F6JO/Suture_Box](https://github.com/F6JO/Suture_Box) - 集合渗透测试常用工具进行一键扫描的缝合怪
- [password123456/malwarescanner](https://github.com/password123456/malwarescanner) - Simple Malware Scanner written in python
- [mnrkbys/ma2tl](https://github.com/mnrkbys/ma2tl) - macOS forensic timeline generator using the analysis result DBs of mac_apt
- [fullhunt/spring4shell-scan](https://github.com/fullhunt/spring4shell-scan) - A fully automated, reliable, and accurate scanner for finding Spring4Shell and Spring Cloud RCE vulnerabilities
- [imfht/webhelper](https://github.com/imfht/webhelper) -
- [j2ekim/YonyouNC_Tip](https://github.com/j2ekim/YonyouNC_Tip) -
- [intel/cve-bin-tool](https://github.com/intel/cve-bin-tool) - The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 200 common, vulnerable components (openssl, libpng, libxml2, expat and others), or
- [Ostorlab/oxo](https://github.com/Ostorlab/oxo) - OXO is a security scanning orchestrator for the modern age.
- [rook1337/googlecertfarm](https://github.com/rook1337/googlecertfarm) -
- [Sc0rp10nn/AwsScraper](https://github.com/Sc0rp10nn/AwsScraper) - Automatic python tool to Scrape files from open AWS Buckets.
- [hakivvi/CVE-2022-29464](https://github.com/hakivvi/CVE-2022-29464) - WSO2 RCE (CVE-2022-29464) exploit and writeup.
- [ynikitenko/yarsync](https://github.com/ynikitenko/yarsync) - Yet Another Rsync: a file synchronization and backup tool
- [toluaina/pgsync](https://github.com/toluaina/pgsync) - Postgres to Elasticsearch/OpenSearch sync
- [wagga40/Zircolite](https://github.com/wagga40/Zircolite) - A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs
- [HellKnightsCrew/CVE-2022-26809](https://github.com/HellKnightsCrew/CVE-2022-26809) - vuln scaner and exploit
- [mcdulltii/CVE-2022-1329](https://github.com/mcdulltii/CVE-2022-1329) - WordPress Elementor 3.6.0 3.6.1 3.6.2 RCE POC
- [dievus/Oh365UserFinder](https://github.com/dievus/Oh365UserFinder) - Python3 o365 User Enumeration Tool
- [Aabyss-Team/awsKeyTools](https://github.com/Aabyss-Team/awsKeyTools) - AWS云平台 AccessKey 泄漏利用工具
- [CsEnox/CVE-2021-22911](https://github.com/CsEnox/CVE-2021-22911) - Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1
- [bewhale/CVE-2022-22954](https://github.com/bewhale/CVE-2022-22954) - CVE-2022-22954 VMware Workspace ONE Access freemarker SSTI 漏洞 命令执行、批量检测脚本、文件写入
- [9rnt/poro](https://github.com/9rnt/poro) - Scan publicly accessible assets on your AWS cloud environment
- [fortalice/modifyCertTemplate](https://github.com/fortalice/modifyCertTemplate) - ADCS cert template modification and ACL enumeration
- [icyguider/Shhhloader](https://github.com/icyguider/Shhhloader) - Syscall Shellcode Loader (Work in Progress)
- [blacklanternsecurity/writehat](https://github.com/blacklanternsecurity/writehat) - A pentest reporting tool written in Python. Free yourself from Microsoft Word.
- [Stonzyy/dumpxss](https://github.com/Stonzyy/dumpxss) - Scanner Tool For XSS Vulnerability
- [Soufaker/laoyue](https://github.com/Soufaker/laoyue) - 自动化监控赏金项目-定期收集资产,漏洞进行推送(现在可以稳定收菜,有问题issues我)-关注-夜安团队SEC-加我微信进群可下载最新自动化版本,git目前不会更新了,群里目前版本1.3.1,项目优化了非常多,功能也加入了非常多,建议进群(没收费项目放心白嫖)
- [nszy007/CN_Nessus_Plugins_Interface](https://github.com/nszy007/CN_Nessus_Plugins_Interface) - nessus插件中文查询接口
- [tarrell13/Nessus-Quick-Scripts](https://github.com/tarrell13/Nessus-Quick-Scripts) - Houses some quick Nessus API scripts to handle repetitive task
- [KonEch0/PullMyReports](https://github.com/KonEch0/PullMyReports) - PullMyReports is a tool that allows you to automatically download reports from your Nessus Scanner using the Nessus API.
- [cyberheisen/cve2nessus](https://github.com/cyberheisen/cve2nessus) - A simple python script to search the Nessus plugins for specific CVEs
- [nickrabbott/Nessus-Exporter](https://github.com/nickrabbott/Nessus-Exporter) - Automate the export of Nessus information
- [drakstik/NessCat](https://github.com/drakstik/NessCat) - NessCat is a tool that helps maintains a categorization template and summarizes Nessus scans.
- [Bandit-HaxUnit/haxunit](https://github.com/Bandit-HaxUnit/haxunit) -
- [nullt3r/rapiddns](https://github.com/nullt3r/rapiddns) - Rapidly enumerate subdomains and domains using rapiddns.io.
- [bellingcat/octosuite](https://github.com/bellingcat/octosuite) - GitHub Data Analysis Framework.
- [tunelko/CVE-2022-22954-PoC](https://github.com/tunelko/CVE-2022-22954-PoC) - VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.
- [HorizonTEL/Anti-Virus-PHP](https://github.com/HorizonTEL/Anti-Virus-PHP) - 【随机动态生成】php免杀webshell
- [ev0A/Mysqlist](https://github.com/ev0A/Mysqlist) - Mysql Server端伪造-任意文件读取-CTF快速利用脚本
- [Hamza-Megahed/odin](https://github.com/Hamza-Megahed/odin) - Central IoC scanner based on Loki
- [Sakura-501/CVE-2020-24186-exploit](https://github.com/Sakura-501/CVE-2020-24186-exploit) - CVE-2020-24186的攻击脚本
- [chipik/SAP_RECON](https://github.com/chipik/SAP_RECON) - PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)
- [allyomalley/LiveTargetsFinder](https://github.com/allyomalley/LiveTargetsFinder) - Generates lists of live hosts and URLs for targeting, automating the usage of MassDNS, Masscan and nmap to filter out unreachable hosts and gather service information
- [DistriNet/timeless-timing-attacks](https://github.com/DistriNet/timeless-timing-attacks) - A Python implementation that facilitates finding timeless timing attack vulnerabilities.
- [emalderson/ThePhish](https://github.com/emalderson/ThePhish) - ThePhish: an automated phishing email analysis tool
- [ice-doom/codeql_compile](https://github.com/ice-doom/codeql_compile) - 自动反编译闭源应用,创建codeql数据库
- [c1y2m3/ATAttack](https://github.com/c1y2m3/ATAttack) - 敌后侦察
- [Telefonica/HomePWN](https://github.com/Telefonica/HomePWN) - HomePwn - Swiss Army Knife for Pentesting of IoT Devices
- [Wrin9/weaverOA_sql_RCE](https://github.com/Wrin9/weaverOA_sql_RCE) - 泛微OA_V9全版本的SQL远程代码执行漏洞
- [midisec/Repackets-X](https://github.com/midisec/Repackets-X) - Resend and mass-utilize common packets in burpsuite and packets in wireshark. Commonly used for AWD competitions, bulk attacks using other people's packets.
- [volkandindar/agartha](https://github.com/volkandindar/agartha) - A Burp extension helps identifying injection flaws (LFI, RCE, SQLi), authentication/authorization issues, and HTTP 403 access violations, while also converting HTTP requests to JavaScript for enhanced
- [h33tlit/Parameter-Reflect-Finder](https://github.com/h33tlit/Parameter-Reflect-Finder) - Parameter-Reflect-Finder is a python based tool that helps you find reflected parameters which can have potential XSS or Open redirection vulnerabilities.
- [PDWR/AVKiller](https://github.com/PDWR/AVKiller) - 利用图形化识别技术快速关闭目标机器上的杀毒软件
- [RyanJarv/cdn-proxy](https://github.com/RyanJarv/cdn-proxy) - Bypass CDN and WAF restrictions using CDN re-fronting.
- [Ryze-T/cdb-wds](https://github.com/Ryze-T/cdb-wds) - 利用白名单文件 cdb.exe 执行 shellcode
- [PShlyundin/ldap_shell](https://github.com/PShlyundin/ldap_shell) - AD ACL abuse
- [H5a337230/ZKShS](https://github.com/H5a337230/ZKShS) - Search shodan without any knowledge about its queries
- [icyguider/ICMP-TransferTools](https://github.com/icyguider/ICMP-TransferTools) - Transfer files to and from a Windows host via ICMP in restricted network environments.
- [Ridter/owa_info](https://github.com/Ridter/owa_info) - 获取Exchange信息的小工具
- [xepor/xepor](https://github.com/xepor/xepor) - Xepor, a web routing framework for reverse engineers and security researchers, brings the best of mitmproxy & Flask
- [RaiderZP/cnvd_fofa_gather](https://github.com/RaiderZP/cnvd_fofa_gather) - (由于fofa接口改变,所以该脚本已经失效了哦)通过公司名称,在fofa上搜索可能存在通用产品的公司;如果想挖掘cnvd证书,可导出注册资金大于5000w的公司到这个脚本中进行通用系统收集。
- [Unknow101/FuckThatPacker](https://github.com/Unknow101/FuckThatPacker) - A simple python packer to easily bypass Windows Defender
- [carlospolop/PurplePanda](https://github.com/carlospolop/PurplePanda) - Identify privilege escalation paths within and across different clouds
- [dolevf/graphql-cop](https://github.com/dolevf/graphql-cop) - Security Auditor Utility for GraphQL APIs
- [nullt3r/jfscan](https://github.com/nullt3r/jfscan) - JF⚡can - Super fast port scanning & service discovery using Masscan and Nmap. Scan large networks with Masscan and use Nmap's scripting abilities to discover information about services. Generate repor
- [cisagov/gophish-tools](https://github.com/cisagov/gophish-tools) - Helpful tools for interacting with a GoPhish phishing instance
- [FirmWire/FirmWire](https://github.com/FirmWire/FirmWire) - FirmWire is a full-system baseband firmware emulation platform for fuzzing, debugging, and root-cause analysis of smartphone baseband firmwares
- [chrismaddalena/Goreport](https://github.com/chrismaddalena/Goreport) - A Python script to collect campaign data from Gophish and generate a report
- [veerendra2/wifi-deauth-attack](https://github.com/veerendra2/wifi-deauth-attack) - An automated script for deauthentication attack
- [BayesWitnesses/m2cgen](https://github.com/BayesWitnesses/m2cgen) - Transform ML models into a native code (Java, C, Python, Go, JavaScript, Visual Basic, C#, R, PowerShell, PHP, Dart, Haskell, Ruby, F#, Rust) with zero dependencies
- [Accenture/VulFi](https://github.com/Accenture/VulFi) - IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.
- [yhy0/AVByPass](https://github.com/yhy0/AVByPass) - 一款Web在线自动免杀工具
- [tcosolutions/betterscan](https://github.com/tcosolutions/betterscan) - Code Scanning/SAST/Static Analysis/Linting using many tools/Scanners with One Report (Code, IaC) - Betterscan
- [trustedsec/CrackHound](https://github.com/trustedsec/CrackHound) -
- [markgacoka/r3c0n](https://github.com/markgacoka/r3c0n) - A tool for performing reconnaissance on web targets in Python
- [v4d1/Dome](https://github.com/v4d1/Dome) - Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search for open ports.
- [kevincali/modbus-flooding-demo](https://github.com/kevincali/modbus-flooding-demo) - Modbus TCP vulnerability demonstration
- [hi-KK/PySpider-ICS](https://github.com/hi-KK/PySpider-ICS) - 使用pyspider爬虫框架爬取工控相关数据(漏洞、预警、安全事件等)
- [MDudek-ICS/TRISIS-TRITON-HATMAN](https://github.com/MDudek-ICS/TRISIS-TRITON-HATMAN) - Repository containting original and decompiled files of TRISIS/TRITON/HATMAN malware
- [d0ubl3g/Industrial-Security-Auditing-Framework](https://github.com/d0ubl3g/Industrial-Security-Auditing-Framework) - ISAF aims to be a framework that provides the necessary tools for the correct security audit of industrial environments. This repo is a mirror of https://gitlab.com/d0ubl3g/industrial-security-auditin
- [mushorg/conpot](https://github.com/mushorg/conpot) - ICS/SCADA honeypot
- [R0X4R/snetra](https://github.com/R0X4R/snetra) - A Python based scanner uses shodan-internetdb to scan the IP.
- [andreafortuna/autotimeliner](https://github.com/andreafortuna/autotimeliner) - Automagically extract forensic timeline from volatile memory dump
- [helviojunior/shellcodetester](https://github.com/helviojunior/shellcodetester) - An application to test windows and linux shellcodes
- [sec-tools/litefuzz](https://github.com/sec-tools/litefuzz) - A multi-platform fuzzer for poking at userland binaries, network clients and servers
- [atenreiro/opensquat](https://github.com/atenreiro/opensquat) - The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonating legit domains and brands.
- [xerohackcom/Chaya](https://github.com/xerohackcom/Chaya) - Advance Image Steganography
- [ClaudiuGeorgiu/Obfuscapk](https://github.com/ClaudiuGeorgiu/Obfuscapk) - An automatic obfuscation tool for Android apps that works in a black-box fashion, supports advanced obfuscation features and has a modular architecture easily extensible with new techniques
- [qiannianshuangxue/safe_message_spider](https://github.com/qiannianshuangxue/safe_message_spider) - About Solve CTF offline disconnection problem - based on python3's small crawler, support keyword search and local map bed establishment, currently support Jianshu, xianzhi,anquanke,freebuf,seebug
- [thewhiteninja/deobshell](https://github.com/thewhiteninja/deobshell) - Powershell script deobfuscation using AST in Python
- [vkit-x/pywhlobf](https://github.com/vkit-x/pywhlobf) - Python Wheel Obfuscator
- [Taonn/EmailAll](https://github.com/Taonn/EmailAll) - EmailAll is a powerful Email Collect tool — 一款强大的邮箱收集工具
- [Cr0DiX666/RSecxXx_MassDork](https://github.com/Cr0DiX666/RSecxXx_MassDork) - Priv8 Tools Software Mass Dork Auto Exploit.
- [tongchengbin/ocean_ctf](https://github.com/tongchengbin/ocean_ctf) - CTF平台 支持docker 动态部署题目、分数统计、作弊检测,静态题目,漏洞复现,ctf platform,
- [opsdisk/scantron](https://github.com/opsdisk/scantron) - A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API client for automation workflows.
- [BugScanTeam/hackhttp](https://github.com/BugScanTeam/hackhttp) - Hackhttp is an HTTP library, written in Python.
- [abhigyantrips/hackerone-bot](https://github.com/abhigyantrips/hackerone-bot) - An unofficial Discord bot that displays info using the HackerOne API.
- [p0dalirius/DumpSMBShare](https://github.com/p0dalirius/DumpSMBShare) - A script to dump files and folders remotely from a Windows SMB share.
- [c0ny1/ascii-jar](https://github.com/c0ny1/ascii-jar) - 构造字节在ASCII范围内的jar
- [celaraze/cela](https://github.com/celaraze/cela) - Cela is an asset management system with front-end and back-end separation. Also a command-line client for it.
- [sebastian-mora/AWS-Loot](https://github.com/sebastian-mora/AWS-Loot) - Pull secrets from an AWS environment
- [tr0uble-mAker/POC-bomber](https://github.com/tr0uble-mAker/POC-bomber) - 利用大量高威胁poc/exp快速获取目标权限,用于渗透和红队快速打点
- [xjjdog/crazy-email-recv-srv](https://github.com/xjjdog/crazy-email-recv-srv) - 模拟邮件服务器,批量注册利器
- [ExpLangcn/WanLi](https://github.com/ExpLangcn/WanLi) - 方便红队人员对目标站点进行安全检测,快速获取资产。It is convenient for red team personnel to conduct security detection on the target site and quickly obtain assets.
- [ANSSI-FR/bmc-tools](https://github.com/ANSSI-FR/bmc-tools) - RDP Bitmap Cache parser
- [dirkjanm/BloodHound.py](https://github.com/dirkjanm/BloodHound.py) - A Python based ingestor for BloodHound
- [Audiobahn/CVE-2022-20699](https://github.com/Audiobahn/CVE-2022-20699) - Cisco Anyconnect VPN unauth RCE (rwx stack)
- [cmrex/redis-attack](https://github.com/cmrex/redis-attack) - about the redis attack script, we can use it to crack the redis password and upload reverse shell to control the machine.
- [lxflxfcl/monitor](https://github.com/lxflxfcl/monitor) - 漏洞监控平台——Monitor。目前实现了监控GitHub、微软、CNNVD三者的漏洞信息,并使用企业微信实时推送。还可以使用邮箱推送,默认关闭。
- [p0dalirius/ipsourcebypass](https://github.com/p0dalirius/ipsourcebypass) - This Python script can be used to bypass IP source restrictions using HTTP headers.
- [toyakula/luna](https://github.com/toyakula/luna) - luna webscanner
- [phith0n/PaddingZip](https://github.com/phith0n/PaddingZip) - PaddingZip is a tool that you can craft a zip file that contains the padding characters between the file content.
- [orleven/Hamster](https://github.com/orleven/Hamster) - Hamster是基于mitmproxy开发的异步被动扫描框架,基于http代理进行被动扫描,主要功能为重写数据包、签名、漏洞扫描、敏感参数收集等功能(开发中)。
- [abcd1234564499sc/scanJSUrlThreading](https://github.com/abcd1234564499sc/scanJSUrlThreading) - 多线程扫描JS文件中可能存在的URL的扫描器
- [jonrau1/SyntheticSun](https://github.com/jonrau1/SyntheticSun) - SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, managed AWS security services and, serverless technologies to cont
- [owasp-dep-scan/dep-scan](https://github.com/owasp-dep-scan/dep-scan) - OWASP dep-scan is a next-generation security and risk audit tool based on known vulnerabilities, advisories, and license limitations for project dependencies. Both local repositories and container ima
- [bahruzjabiyev/t-reqs](https://github.com/bahruzjabiyev/t-reqs) - Grammar-based HTTP/1 fuzzer with mutation ability
- [alechilczenko/spidex](https://github.com/alechilczenko/spidex) - Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.
- [unicornunicode/FACT](https://github.com/unicornunicode/FACT) - FACT is a tool to collect, process and visualise forensic data from clusters of machines running in the cloud or on-premise.
- [khuedoan/homelab](https://github.com/khuedoan/homelab) - Fully automated homelab from empty disk to running services with a single command.
- [BloodHoundAD/BloodHound-Tools](https://github.com/BloodHoundAD/BloodHound-Tools) - Miscellaneous tools for BloodHound
- [puzzlepeaches/Log4jHorizon](https://github.com/puzzlepeaches/Log4jHorizon) - Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more.
- [quarkslab/AERoot](https://github.com/quarkslab/AERoot) - AERoot is a command line tool that allows you to give root privileges on-the-fly to any process running on the Android emulator with Google Play flavors AVDs.
- [ce-automne/FastjsonPatrol](https://github.com/ce-automne/FastjsonPatrol) - 一款探测fastjson漏洞的BurpSuite插件
- [SkewwG/BurpExtender](https://github.com/SkewwG/BurpExtender) - Burp suite 的插件集合
- [n00py/DCSync](https://github.com/n00py/DCSync) - DCSync Attack from Outside using Impacket
- [as0ler/r2flutch](https://github.com/as0ler/r2flutch) - Tool to decrypt iOS apps using r2frida
- [DoranekoSystems/frida-ceserver](https://github.com/DoranekoSystems/frida-ceserver) - Frida-based ceserver: A fusion of Cheat Engine and Frida.
- [zyn3rgy/LdapRelayScan](https://github.com/zyn3rgy/LdapRelayScan) - Check for LDAP protections regarding the relay of NTLM authentication
- [ZZ-SOCMAP/CVE-2022-21907](https://github.com/ZZ-SOCMAP/CVE-2022-21907) - HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907
- [pixelbubble/PasteMonitor](https://github.com/pixelbubble/PasteMonitor) - Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.
- [knight0x07/pyc2bytecode](https://github.com/knight0x07/pyc2bytecode) - A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Py
- [jbaines-r7/badblood](https://github.com/jbaines-r7/badblood) - SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)
- [danielpatrickhug/entity_error_identification_suite](https://github.com/danielpatrickhug/entity_error_identification_suite) - Python module for detecting spacy NER prediction errors from gold standard annotations
- [righettod/website-passive-reconnaissance](https://github.com/righettod/website-passive-reconnaissance) - Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.
- [cybersecsi/RAUDI](https://github.com/cybersecsi/RAUDI) - A repo to automatically generate and keep updated a series of Docker images through GitHub Actions.
- [wuppp/cve-2021-45232-exp](https://github.com/wuppp/cve-2021-45232-exp) -
- [Jumbo-WJB/Exchange_SSRF](https://github.com/Jumbo-WJB/Exchange_SSRF) - Some Attacks of Exchange SSRF ProxyLogon&ProxyShell
- [momosecurity/Mloger](https://github.com/momosecurity/Mloger) - 安全测试平台
- [sml2h3/ddddocr](https://github.com/sml2h3/ddddocr) - 带带弟弟 通用验证码识别OCR pypi版
- [thewhiteh4t/nexfil](https://github.com/thewhiteh4t/nexfil) - OSINT tool for finding profiles by username
- [Tencent/CodeAnalysis](https://github.com/Tencent/CodeAnalysis) - Static Code Analysis - 静态代码分析
- [cert-ee/cuckoo3](https://github.com/cert-ee/cuckoo3) - Cuckoo 3 is a Python 3 open source automated malware analysis system.
- [lintstar/CS-PushPlus](https://github.com/lintstar/CS-PushPlus) - 使用免费支持微信模板消息推送的 PushPlus 进行上线主机提醒
- [crow821/crowsec](https://github.com/crow821/crowsec) - 视频课件和工具分享
- [asaotomo/FofaMap](https://github.com/asaotomo/FofaMap) - FofaMap是一款基于Python3开发的跨平台FOFA API数据采集器,支持普通查询、网站存活检测、统计聚合查询、Host聚合查询、网站图标查询、批量查询等查询功能。同时FofaMap还能够自定义查询FOFA数据,并根据查询结果自动去重和筛选关键字,生成对应的Excel表格。另外春节特别版还可以调用Nuclei对FofaMap查询出来的目标进行漏洞扫描,让你在挖洞路上快人一步。
- [c3c/ADExplorerSnapshot.py](https://github.com/c3c/ADExplorerSnapshot.py) - ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound, and also supports full-object dumping to NDJSON.
- [klezVirus/vortex](https://github.com/klezVirus/vortex) - VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit
- [trailofbits/ManticoreUI](https://github.com/trailofbits/ManticoreUI) - The Manticore User Interface with plugins for Binary Ninja and Ghidra
- [Sunlight-Rim/SQLbit](https://github.com/Sunlight-Rim/SQLbit) - Just another script for automatize boolean-based blind SQL injections. (Demo)
- [MarkoH17/Spray365](https://github.com/MarkoH17/Spray365) - Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The built-in execution plan features options that attempt to bypas
- [kostas-pa/LFITester](https://github.com/kostas-pa/LFITester) - LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.
- [XiaoliChan/wmiexec-RegOut](https://github.com/XiaoliChan/wmiexec-RegOut) - Modify version of impacket wmiexec.py, get output(data,response) from registry, don't need SMB connection, also bypassing antivirus-software in lateral movement like WMIHACKER.
- [numba/llvmlite](https://github.com/numba/llvmlite) - A lightweight LLVM python binding for writing JIT compilers
- [ChrisTheCoolHut/Zeratool](https://github.com/ChrisTheCoolHut/Zeratool) - Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
- [zR00t1/ImageStrike](https://github.com/zR00t1/ImageStrike) - ImageStrike是一款用于CTF中图片隐写的综合利用工具
- [lijiejie/log4j2_vul_local_scanner](https://github.com/lijiejie/log4j2_vul_local_scanner) - Log4j 漏洞本地检测脚本。 Scan all java processes on your host to check whether it's affected by log4j2 remote code execution vulnerability (CVE-2021-45046)
- [YS11i/JSFinderAAA](https://github.com/YS11i/JSFinderAAA) - JSFinder魔改版
- [GoVanguard/Log4jShell_Scanner](https://github.com/GoVanguard/Log4jShell_Scanner) - Python script to tamper with pages to test for Log4J Shell vulnerability.
- [SteveD3/kit_hunter](https://github.com/SteveD3/kit_hunter) - A basic phishing kit scanner for dedicated and semi-dedicated hosting
- [jhftss/IDA2Obj](https://github.com/jhftss/IDA2Obj) - Static Binary Instrumentation
- [Narasimha1997/py4jshell](https://github.com/Narasimha1997/py4jshell) - Simulating Log4j Remote Code Execution (RCE) vulnerability in a flask web server using python's logging library with custom formatter that simulates lookup substitution by executing remote exploit cod
- [bkerler/edl](https://github.com/bkerler/edl) - Inofficial Qualcomm Firehose / Sahara / Streaming / Diag Tools :)
- [leonjza/log4jpwn](https://github.com/leonjza/log4jpwn) - log4j rce test environment and poc
- [BinaryDefense/log4j-honeypot-flask](https://github.com/BinaryDefense/log4j-honeypot-flask) - Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228
- [DarkSprings/CVE-2021-42321](https://github.com/DarkSprings/CVE-2021-42321) - Microsoft Exchange Server Poc
- [Cyber-Guy1/domainCollector](https://github.com/Cyber-Guy1/domainCollector) - Simple tool to gather domains from crt.sh using the organization name
- [cyberstruggle/L4sh](https://github.com/cyberstruggle/L4sh) - Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.
- [KissPeter/APIFuzzer](https://github.com/KissPeter/APIFuzzer) - Fuzz test your application using your OpenAPI or Swagger API definition without coding
- [kracer127/SiteScan](https://github.com/kracer127/SiteScan) - 专注一站化解决渗透测试的信息收集任务,功能包括域名ip历史解析、nmap常见端口爆破、子域名信息收集、旁站信息收集、whois信息收集、网站架构分析、cms解析、备案信息收集、CDN信息解析、是否存在waf检测、后台寻找以及生成检测结果html报告表。
- [ssrsec/SpringBootEnvDecrypt](https://github.com/ssrsec/SpringBootEnvDecrypt) - SpringBoot获取被星号脱敏的密码的明文
- [R0X4R/bhedak](https://github.com/R0X4R/bhedak) - A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.
- [albinowax/ActiveScanPlusPlus](https://github.com/albinowax/ActiveScanPlusPlus) - ActiveScan++ Burp Suite Plugin
- [gh0stkey/Command2API](https://github.com/gh0stkey/Command2API) - Command2API - 万物皆可API
- [ly4k/Pachine](https://github.com/ly4k/Pachine) - Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)
- [leovan/SciHubEVA](https://github.com/leovan/SciHubEVA) - A Cross Platform Sci-Hub GUI Application
- [SamsungLabs/ritm_interactive_segmentation](https://github.com/SamsungLabs/ritm_interactive_segmentation) - Reviving Iterative Training with Mask Guidance for Interactive Segmentation
- [fullhunt/log4j-scan](https://github.com/fullhunt/log4j-scan) - A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228
- [alexandre-lavoie/python-log4rce](https://github.com/alexandre-lavoie/python-log4rce) - An All-In-One Pure Python PoC for CVE-2021-44228
- [shmilylty/vhost_password_decrypt](https://github.com/shmilylty/vhost_password_decrypt) - vhost password decrypt
- [Ridter/noPac](https://github.com/Ridter/noPac) - Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
- [safebuffer/sam-the-admin](https://github.com/safebuffer/sam-the-admin) - Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
- [Neo23x0/log4shell-detector](https://github.com/Neo23x0/log4shell-detector) - Detector for Log4Shell exploitation attempts
- [pedrohavay/exploit-grafana-CVE-2021-43798](https://github.com/pedrohavay/exploit-grafana-CVE-2021-43798) - This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798).
- [hash3liZer/SillyRAT](https://github.com/hash3liZer/SillyRAT) - A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️
- [NotSoSecure/udp-hunter](https://github.com/NotSoSecure/udp-hunter) - Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols
- [Hamza-Megahed/LOLBins](https://github.com/Hamza-Megahed/LOLBins) - PyQT5 app for LOLBAS and GTFOBins
- [JoelGMSec/FakeDataGen](https://github.com/JoelGMSec/FakeDataGen) - Full Valid Fake Data Generator
- [PalindromeLabs/STEWS](https://github.com/PalindromeLabs/STEWS) - A Security Tool for Enumerating WebSockets
- [SecuProject/ADenum](https://github.com/SecuProject/ADenum) - AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos.
- [takito1812/log4j-detect](https://github.com/takito1812/log4j-detect) - Simple Python 3 script to detect the "Log4j" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading
- [Te-k/cobaltstrike](https://github.com/Te-k/cobaltstrike) - Code and yara rules to detect and analyze Cobalt Strike
- [tweksteen/jenkins-decrypt](https://github.com/tweksteen/jenkins-decrypt) - Credentials dumper for Jenkins
- [chopicalqui/KaliIntelligenceSuite](https://github.com/chopicalqui/KaliIntelligenceSuite) - Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standard penetration testing tools. The collected data is internall
- [Mesh3l911/Sub_Search](https://github.com/Mesh3l911/Sub_Search) -
- [captainGeech42/ransomwatch](https://github.com/captainGeech42/ransomwatch) - Ransomware leak site monitoring
- [rsmusllp/eapeak](https://github.com/rsmusllp/eapeak) - Analysis Suite For EAP Enabled Wireless Networks
- [no001ce/N-DecodeAllUnicode](https://github.com/no001ce/N-DecodeAllUnicode) - Burpsuite插件:自动解码Burpsuite中被Unicode编码的内容
- [CompassSecurity/burp-copy-request-response](https://github.com/CompassSecurity/burp-copy-request-response) - Burp extension for quickly copying request/response data.
- [donot-wong/EasyBurpVuln](https://github.com/donot-wong/EasyBurpVuln) -
- [githublihaha/ddddocr_api_for_burpsuite_captcha_killer](https://github.com/githublihaha/ddddocr_api_for_burpsuite_captcha_killer) - burpsuite插件captcha-killer的ddddocr的web接口
- [0xdln1/getlevels](https://github.com/0xdln1/getlevels) - Tool for sorting different Level of subdomains form 1...N
- [morph3/crawpy](https://github.com/morph3/crawpy) - Yet another content discovery tool
- [HuiMengYouXian/excel_analysis](https://github.com/HuiMengYouXian/excel_analysis) - Excel虽然可以非常方便地处理数据,但数据量大时速度就变慢了,本项目把Excel数据分析的常用功能:筛选、多表合并、多表汇总、多表分组,通过Python+Pandas重新实现,因为Pandas处理数据更快且能处理大的数据,此工具还可根据业务需求灵活修改少量代码实现通用。
- [ant4g0nist/Susanoo](https://github.com/ant4g0nist/Susanoo) - A REST API security testing framework.
- [HenrisonTao/ftx_grid_trading_bot](https://github.com/HenrisonTao/ftx_grid_trading_bot) - The program was designed to run the Grid Trading Strategy in FTX exchange
- [wikiZ/ServerlessScan](https://github.com/wikiZ/ServerlessScan) - 云函数扫描器实现代码
- [QAX-A-Team/redis_lua_exploit](https://github.com/QAX-A-Team/redis_lua_exploit) -
- [akkuman/HunterApi](https://github.com/akkuman/HunterApi) - 奇安信的网络空间测绘引擎 hunter 的 api 查询导出工具
- [Seals6/CVE-2021-41277](https://github.com/Seals6/CVE-2021-41277) - Metabase任意文件读取漏洞批量扫描工具
- [rizakara/teardrop](https://github.com/rizakara/teardrop) - Simple ransomware project written in Python3.
- [MrLion7/Lmap](https://github.com/MrLion7/Lmap) - A tool combined with the advantages of masscan and nmap
- [center-for-threat-informed-defense/sightings_ecosystem](https://github.com/center-for-threat-informed-defense/sightings_ecosystem) - Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE ATT&CK® techniques observed to give defenders real data on tec
- [Anish-M-code/URL-obfuscator](https://github.com/Anish-M-code/URL-obfuscator) - Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
- [timwhitez/Frog-checkCDN](https://github.com/timwhitez/Frog-checkCDN) - 批量检查目标是否为cdn
- [zh-explorer/alphanumeric_shellcode_encoder](https://github.com/zh-explorer/alphanumeric_shellcode_encoder) -
- [chibd2000/myscan](https://github.com/chibd2000/myscan) - 构建信息搜集/漏洞扫描
- [AuFeng111/for_beian](https://github.com/AuFeng111/for_beian) - 基于天眼查的批量备案域名查询脚本
- [kost/reGeorg](https://github.com/kost/reGeorg) - pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn. Fork of sensepost/regeorg.
- [ycdxsb/Security_Articles](https://github.com/ycdxsb/Security_Articles) - 爬取安全领域文章(Seebug、先知社区、安全客、freebuf等),转成pdf存到本地,离线学习
- [GoSecure/pyrdp](https://github.com/GoSecure/pyrdp) - RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
- [wavestone-cdt/abaddon](https://github.com/wavestone-cdt/abaddon) -
- [punk-security/pwnspoof](https://github.com/punk-security/pwnspoof) - Pwnspoof repository
- [asottile/all-repos](https://github.com/asottile/all-repos) - Clone all your repositories and apply sweeping changes.
- [melbadry9/WhoEnum](https://github.com/melbadry9/WhoEnum) - Mass querying whois records
- [Yash114Bansal/PyIntruder](https://github.com/Yash114Bansal/PyIntruder) - PyIntruder: A Python fuzzer boasting multithreading for accelerated performance, a user-friendly tkinter GUI interface, and a wide array of encoding options to facilitate thorough security testing and
- [ethicalhackingplayground/TProxer](https://github.com/ethicalhackingplayground/TProxer) - A Burp Suite extension made to automate the process of finding reverse proxy path based SSRF.
- [th3unkn0n/TeleGram-Scraper](https://github.com/th3unkn0n/TeleGram-Scraper) - telegram group scraper tool. fetch all information about group members
- [Retrospected/kerbmon](https://github.com/Retrospected/kerbmon) - Continuous kerberoast monitor
- [MayankPandey01/Jira-Lens](https://github.com/MayankPandey01/Jira-Lens) - Fast and customizable vulnerability scanner For JIRA written in Python
- [CravateRouge/bloodyAD](https://github.com/CravateRouge/bloodyAD) - BloodyAD is an Active Directory Privilege Escalation Framework
- [Al1ex/CVE-2021-22205](https://github.com/Al1ex/CVE-2021-22205) - CVE-2021-22205& GitLab CE/EE RCE
- [vysecurity/DomLink](https://github.com/vysecurity/DomLink) - A tool to link a domain with registered organisation names and emails, to other domains.
- [SkyBlueEternal/wifi-Mesh-monitor](https://github.com/SkyBlueEternal/wifi-Mesh-monitor) - wifi 空口监控技术
- [HDCodePractice/EnglishHelper](https://github.com/HDCodePractice/EnglishHelper) - English study corner小助手
- [tenable/pyTenable](https://github.com/tenable/pyTenable) - Python Library for interfacing into Tenable's platform APIs
- [lucasg/findrpc](https://github.com/lucasg/findrpc) - Idapython script to carve binary for internal RPC structures
- [secureworks/whiskeysamlandfriends](https://github.com/secureworks/whiskeysamlandfriends) - GoldenSAML Attack Libraries and Framework
- [xxcdd/docker_nessus_unlimited](https://github.com/xxcdd/docker_nessus_unlimited) - docker build nessus with unlimited ip
- [righel/gitlab-version-nse](https://github.com/righel/gitlab-version-nse) - Nmap script to guess* a GitLab version.
- [XTeam-Wing/PyInteractsh](https://github.com/XTeam-Wing/PyInteractsh) - Dnslog Interactsh的Py版接口查询
- [gaogaotiantian/viztracer](https://github.com/gaogaotiantian/viztracer) - VizTracer is a low-overhead logging/debugging/profiling tool that can trace and visualize your python code execution.
- [gfek/Lepus](https://github.com/gfek/Lepus) - Subdomain finder
- [horizon3ai/vcenter_saml_login](https://github.com/horizon3ai/vcenter_saml_login) - A tool to extract the IdP cert from vCenter backups and log in as Administrator
- [mr-r3bot/Gitlab-CVE-2021-22205](https://github.com/mr-r3bot/Gitlab-CVE-2021-22205) -
- [miaoyongsen/butian_Real_time_push](https://github.com/miaoyongsen/butian_Real_time_push) - 通过微信公众号推送漏洞消息
- [lawndoc/mediator](https://github.com/lawndoc/mediator) - An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.
- [ricardojoserf/http-protocol-exfil](https://github.com/ricardojoserf/http-protocol-exfil) - Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)
- [splunk/melting-cobalt](https://github.com/splunk/melting-cobalt) - A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object
- [s4dhulabs/vimana-framework](https://github.com/s4dhulabs/vimana-framework) - Vimana is an experimental security framework that aims to provide resources for auditing Python web applications.
- [karthi-the-hacker/pr0xyP4rs3](https://github.com/karthi-the-hacker/pr0xyP4rs3) - Load your data into burp
- [c0dejump/notForbidden](https://github.com/c0dejump/notForbidden) - Security tool to test different bypass of forbidden
- [test502git/Hosts_scanV2](https://github.com/test502git/Hosts_scanV2) - 这是一个用于IP和域名碰撞匹配访问的小工具优化版,能减少碰撞中出来的误报,旨意用来匹配出渗透过程中需要绑定hosts才能访问的弱主机或内部系统。
- [USTC-Hackergame/hackergame-challenge-docker](https://github.com/USTC-Hackergame/hackergame-challenge-docker) - nc 类题目的 Docker 容器资源限制、动态 flag、网页终端
- [laluka/jolokia-exploitation-toolkit](https://github.com/laluka/jolokia-exploitation-toolkit) - jolokia-exploitation-toolkit
- [Summer177/seeyon_exp](https://github.com/Summer177/seeyon_exp) - 致远OA综合利用工具
- [hpthreatresearch/subcrawl](https://github.com/hpthreatresearch/subcrawl) - SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data with optional output modules, such as MISP.
- [mpgn/CVE-2018-16341](https://github.com/mpgn/CVE-2018-16341) - CVE-2018-16341 - Nuxeo Remote Code Execution without authentication using Server Side Template Injection
- [blueudp/AF-ShellHunter](https://github.com/blueudp/AF-ShellHunter) - Shell hunter for AF
- [WSP-LAB/FUSE](https://github.com/WSP-LAB/FUSE) - A penetration testing tool for finding file upload bugs (NDSS 2020)
- [ImpostorKeanu/BruteLoops](https://github.com/ImpostorKeanu/BruteLoops) - Protocol agnostic online password guessing API.
- [domain-protect/domain-protect](https://github.com/domain-protect/domain-protect) - OWASP Domain Protect - prevent subdomain takeover
- [salesforce/metabadger](https://github.com/salesforce/metabadger) - Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).
- [ptswarm/reFlutter](https://github.com/ptswarm/reFlutter) - Flutter Reverse Engineering Framework
- [MrCl0wnLab/SimplesApachePathTraversal](https://github.com/MrCl0wnLab/SimplesApachePathTraversal) - Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519
- [herwonowr/exprolog](https://github.com/herwonowr/exprolog) - ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065)
- [chris408/ct-exposer](https://github.com/chris408/ct-exposer) - An OSINT tool that discovers sub-domains by searching Certificate Transparency logs
- [EONRaider/Packet-Sniffer](https://github.com/EONRaider/Packet-Sniffer) - A Network Packet Sniffing tool developed in Python 3.
- [JamVayne/CobaltStrikeDos](https://github.com/JamVayne/CobaltStrikeDos) - CVE-2021-36798: CobaltStrike < 4.4 Dos
- [emcghee/PayloadAutomation](https://github.com/emcghee/PayloadAutomation) -
- [pureqh/Troy](https://github.com/pureqh/Troy) - 特洛伊-免杀webshell生成工具PLUS
- [h4fan/bpext](https://github.com/h4fan/bpext) - burpsuite python extention / burp python插件
- [chrisjd20/hikvision_CVE-2017-7921_auth_bypass_config_decryptor](https://github.com/chrisjd20/hikvision_CVE-2017-7921_auth_bypass_config_decryptor) - This python file will decrypt the configurationFile used by hikvision cameras vulnerable to CVE-2017-7921.
- [ly4k/Certipy](https://github.com/ly4k/Certipy) - Tool for Active Directory Certificate Services enumeration and abuse
- [Intsights/PyDomainExtractor](https://github.com/Intsights/PyDomainExtractor) - A blazingly fast domain extraction library written in Rust
- [ambionics/laravel-exploits](https://github.com/ambionics/laravel-exploits) - Exploit for CVE-2021-3129
- [r3nt0n/bopscrk](https://github.com/r3nt0n/bopscrk) - Generate smart and powerful wordlists
- [ly4k/PrintNightmare](https://github.com/ly4k/PrintNightmare) - Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)
- [login-securite/DonPAPI](https://github.com/login-securite/DonPAPI) - Dumping DPAPI credz remotely
- [Henry4E36/Solr-SSRF](https://github.com/Henry4E36/Solr-SSRF) - Apache Solr SSRF(CVE-2021-27905)
- [shimmeris/SCFProxy](https://github.com/shimmeris/SCFProxy) - A proxy tool based on cloud function.
- [iframepm/FuckAV](https://github.com/iframepm/FuckAV) - python写的一款免杀工具(shellcode加载器)BypassAV,国内杀软全过(windows denfend)2021-9-13
- [Ridter/redis-rce](https://github.com/Ridter/redis-rce) - Redis 4.x/5.x RCE
- [PaddlePaddle/PaddleSleeve](https://github.com/PaddlePaddle/PaddleSleeve) - PaddleSleeve
- [Yelp/fuzz-lightyear](https://github.com/Yelp/fuzz-lightyear) - A pytest-inspired, DAST framework, capable of identifying vulnerabilities in a distributed, micro-service ecosystem through chaos engineering testing and stateful, Swagger fuzzing.
- [brightio/penelope](https://github.com/brightio/penelope) - Penelope Shell Handler
- [CheckPointSW/Karta](https://github.com/CheckPointSW/Karta) - Karta - source code assisted fast binary matching plugin for IDA
- [parikhakshat/autoharness](https://github.com/parikhakshat/autoharness) - A tool that automatically creates fuzzing harnesses based on a library
- [Telefonica/on-the-fly](https://github.com/Telefonica/on-the-fly) - on-the-fly
- [IlanKalendarov/PyHook](https://github.com/IlanKalendarov/PyHook) - PyHook is an offensive API hooking tool written in python designed to catch various credentials within the API call.
- [Greenwolf/ntlm_theft](https://github.com/Greenwolf/ntlm_theft) - A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
- [defparam/haptyc](https://github.com/defparam/haptyc) -
- [hosch3n/ProxyVulns](https://github.com/hosch3n/ProxyVulns) - [ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207
- [AttackTeamFamily/blackip](https://github.com/AttackTeamFamily/blackip) - 沙箱IP、网络测绘ip、全网扫描ip等等收集
- [purplebaronj/Nessus_Parser](https://github.com/purplebaronj/Nessus_Parser) - Parse Nessus scans and send data into Splunk, Elastic, Postgres or other
- [sysophost/Vulcan](https://github.com/sysophost/Vulcan) - Tool to extract various things from .nessus files
- [LimberDuck/nessus-file-reader](https://github.com/LimberDuck/nessus-file-reader) - CLI tool and python module which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc.
- [DanMcInerney/msf-autoshell](https://github.com/DanMcInerney/msf-autoshell) - Feed the tool a .nessus file and it will automatically get you MSF shell
- [center-for-threat-informed-defense/security-stack-mappings](https://github.com/center-for-threat-informed-defense/security-stack-mappings) - 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
- [angerbjorn/butcher](https://github.com/angerbjorn/butcher) - Nessus enterprise vulnerability management - visualise data from multiple nessus reports simultaneously, filter data, and output on terminal, as text, html or excel / xlsx
- [Micro-sheep/efinance](https://github.com/Micro-sheep/efinance) - efinance 是一个可以快速获取基金、股票、债券、期货数据的 Python 库,回测以及量化交易的好帮手!🚀🚀🚀
- [horizon3ai/CVE-2021-38647](https://github.com/horizon3ai/CVE-2021-38647) - Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)
- [sysopfb/malware_decoders](https://github.com/sysopfb/malware_decoders) - Static based decoders for malware samples
- [aslitsecurity/CVE-2021-40444_builders](https://github.com/aslitsecurity/CVE-2021-40444_builders) - This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit
- [d3k4z/burp-copy-as-ffuf](https://github.com/d3k4z/burp-copy-as-ffuf) - Burp Extension that copies a request and builds a FFUF skeleton
- [fofapro/fapro](https://github.com/fofapro/fapro) - Fake Protocol Server
- [CHYbeta/URLFilterBypassDemo](https://github.com/CHYbeta/URLFilterBypassDemo) -
- [t3hbb/NSGenCS](https://github.com/t3hbb/NSGenCS) - Extendable payload obfuscation and delivery framework
- [stacscan/stacs](https://github.com/stacscan/stacs) - Static Token And Credential Scanner
- [BitTheByte/Orkestra](https://github.com/BitTheByte/Orkestra) - Web-based Android debugger with inspection capabilities using Frida and Jadx as a backbone
- [Impact-I/x8-Burp](https://github.com/Impact-I/x8-Burp) - Hidden parameters discovery suite
- [incogbyte/laravel-phpunit-rce-masscaner](https://github.com/incogbyte/laravel-phpunit-rce-masscaner) - Masscanner for Laravel phpunit RCE CVE-2017-9841
- [ko2sec/apkizer](https://github.com/ko2sec/apkizer) - apkizer is a mass downloader for android applications for all available versions.
- [nsonaniya2010/sanfinder](https://github.com/nsonaniya2010/sanfinder) - It finds Subject Alternative Names for a given list of domains
- [robotshell/robotScraper](https://github.com/robotshell/robotScraper) - RobotScraper is a simple tool written in Python to check each of the paths found in the robots.txt file and what HTTP response code they return.
- [RossGeerlings/webstor](https://github.com/RossGeerlings/webstor) - WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted servers via zone transfer data - stores their responses, and lets
- [jonaslejon/lolcrawler](https://github.com/jonaslejon/lolcrawler) - Headless web crawler for bugbounty and penetration-testing/redteaming
- [sdushantha/dora](https://github.com/sdushantha/dora) - Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
- [SigmaHQ/sigma](https://github.com/SigmaHQ/sigma) - Main Sigma Rule Repository
- [knavesec/bloodhound-scripts](https://github.com/knavesec/bloodhound-scripts) - Bloodhound helper scripts
- [jrmdev/mitm_relay](https://github.com/jrmdev/mitm_relay) - Hackish way to intercept and modify non-HTTP protocols through Burp & others.
- [GDSSecurity/Jetleak-Testing-Script](https://github.com/GDSSecurity/Jetleak-Testing-Script) - Script to test if a server is vulnerable to the JetLeak vulnerability
- [dolevf/graphw00f](https://github.com/dolevf/graphw00f) - graphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology is behind a given GraphQL endpoint.
- [z1un/seeyon_exp](https://github.com/z1un/seeyon_exp) - 致远OA漏洞综合利用脚本
- [LeadroyaL/drozer-py3](https://github.com/LeadroyaL/drozer-py3) - The Leading Security Assessment Framework for Android.
- [Bashfuscator/Bashfuscator](https://github.com/Bashfuscator/Bashfuscator) - A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.
- [duc-nt/RCE-0-day-for-GhostScript-9.50](https://github.com/duc-nt/RCE-0-day-for-GhostScript-9.50) - RCE 0-day for GhostScript 9.50 - Payload generator
- [burpheart/CS_mock](https://github.com/burpheart/CS_mock) - 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.
- [luck-ying/Library-POC](https://github.com/luck-ying/Library-POC) - 基于Pocsuite3、goby编写的漏洞poc&exp存档
- [cytopia/smtp-user-enum](https://github.com/cytopia/smtp-user-enum) - SMTP user enumeration via VRFY, EXPN and RCPT with clever timeout, retry and reconnect functionality.
- [mogwailabs/mjet](https://github.com/mogwailabs/mjet) - MOGWAI LABS JMX exploitation toolkit
- [Tw1sm/HTTPS-MalleableC2-Config](https://github.com/Tw1sm/HTTPS-MalleableC2-Config) - Create Cobalt Strike malleable C2 profiles with HTTPS configs
- [GeorgePatsias/ScareCrow-CobaltStrike](https://github.com/GeorgePatsias/ScareCrow-CobaltStrike) - Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)
- [strozfriedberg/cobaltstrike-config-extractor](https://github.com/strozfriedberg/cobaltstrike-config-extractor) - Cobalt Strike Beacon configuration extractor and parser.
- [LiveOverflow/ctf-screenshotter](https://github.com/LiveOverflow/ctf-screenshotter) - a CTF web challenge about making screenshots
- [mandiant/speakeasy](https://github.com/mandiant/speakeasy) - Windows kernel and user mode emulation.
- [xFreed0m/ADFSpray](https://github.com/xFreed0m/ADFSpray) - Python3 tool to perform password spraying against Microsoft Online service using various methods
- [Shapa7276/Android-Deeplink-Parser](https://github.com/Shapa7276/Android-Deeplink-Parser) -
- [HXSecurity/DongTai](https://github.com/HXSecurity/DongTai) - Dongtai IAST is an open-source Interactive Application Security Testing (IAST) tool that enables real-time detection of common vulnerabilities in Java applications and third-party components through p
- [wrlu/bt-tester](https://github.com/wrlu/bt-tester) - Bluetooth tester on Raspberry Pi device
- [apachecn/GorgonProxy](https://github.com/apachecn/GorgonProxy) - 灵蛇·代理抓取工具
- [s0md3v/uro](https://github.com/s0md3v/uro) - declutters url lists for crawling/pentesting
- [guguyu1/IDOR-bypass-fuzz](https://github.com/guguyu1/IDOR-bypass-fuzz) - IDOR bypass fuzz 权限绕过burp 插件 fuzz (shiro 等)
- [devcoinfet/gitlab_userdump](https://github.com/devcoinfet/gitlab_userdump) - gitlab user enum
- [lintstar/CS-ServerChan](https://github.com/lintstar/CS-ServerChan) - CobaltStike 挂载脚本将上线主机信息通过 Server 酱通知到微信
- [Dump-GUY/Malware-analysis-and-Reverse-engineering](https://github.com/Dump-GUY/Malware-analysis-and-Reverse-engineering) - Some of my publicly available Malware analysis and Reverse engineering.
- [popovicn/grepgithub](https://github.com/popovicn/grepgithub) - Command line util for grep.app - Search across a half million git repos
- [bregman-arie/devops-exercises](https://github.com/bregman-arie/devops-exercises) - Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions
- [Dev-Ali/extractJS_2.0](https://github.com/Dev-Ali/extractJS_2.0) - An upgraded version of extractJS
- [jonaslejon/malicious-pdf](https://github.com/jonaslejon/malicious-pdf) - 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
- [G-Security-Team/JS-Forward](https://github.com/G-Security-Team/JS-Forward) - 前端参数加密渗透测试通用解决方案
- [G-Security-Team/GSLibrary](https://github.com/G-Security-Team/GSLibrary) - 轻量级知识库&POC管理平台
- [REW-sploit/REW-sploit](https://github.com/REW-sploit/REW-sploit) - Emulate and Dissect MSF and *other* attacks
- [TelefonicaTC2Tech/packagedna](https://github.com/TelefonicaTC2Tech/packagedna) - This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that are being or will be used in their codes, providing information t
- [nccgroup/keimpx](https://github.com/nccgroup/keimpx) - Check for valid credentials across a network over SMB
- [hhhrrrttt222111/Dorkify](https://github.com/hhhrrrttt222111/Dorkify) - Perform Google Dork search with Dorkify
- [YoungRichOG/Hosts_Boom](https://github.com/YoungRichOG/Hosts_Boom) - 通过hosts碰撞发现目标内部系统,扩大攻击面。
- [jupyter-incubator/sparkmagic](https://github.com/jupyter-incubator/sparkmagic) - Jupyter magics and kernels for working with remote Spark clusters
- [exbotanical/brutus](https://github.com/exbotanical/brutus) - extensible exploitation framework shipped on a modular and multi-tasking architecture
- [davidhalter/jedi](https://github.com/davidhalter/jedi) - Awesome autocompletion, static analysis and refactoring library for python
- [KingOfBugbounty/Discovery-Header-Bug-Bounty](https://github.com/KingOfBugbounty/Discovery-Header-Bug-Bounty) - Discovery Header Bug Bounty to DoD
- [splunk/security_content](https://github.com/splunk/security_content) - Splunk Security Content
- [StudyCat404/WhatAV](https://github.com/StudyCat404/WhatAV) - windows pc 端杀毒软件识别(需要tasklist 命令执行的结果)
- [madhuakula/kubernetes-network-security-boundaries](https://github.com/madhuakula/kubernetes-network-security-boundaries) -
- [bkfish/html2markdown_Spider](https://github.com/bkfish/html2markdown_Spider) - Solve CTF offline disconnection problem - based on python3's small crawler, support keyword search and local map bed establishment, currently support Jianshu and xianzhi
- [farfarfun/fundrive](https://github.com/farfarfun/fundrive) - 网盘,支持蓝奏云、OSS、github、gitee
- [h1pmnh/bcstats](https://github.com/h1pmnh/bcstats) - A tool to download program information from Bugcrowd, for use by researchers to compare programs they are eligible to participate in
- [zh-explorer/ida_script](https://github.com/zh-explorer/ida_script) - some ida script
- [mpgn/Padding-oracle-attack](https://github.com/mpgn/Padding-oracle-attack) - :unlock: Padding oracle attack against PKCS7 :unlock:
- [ShutdownRepo/httpmethods](https://github.com/ShutdownRepo/httpmethods) - HTTP verb tampering & methods enumeration
- [zer1t0/certi](https://github.com/zer1t0/certi) - ADCS abuser
- [BlackArch/blackarch-installer](https://github.com/BlackArch/blackarch-installer) - The official BlackArch Linux installer
- [justmorpheus/burp-automation](https://github.com/justmorpheus/burp-automation) - Performing automated scan using Burp Suite Pro & Vmware Burp Rest API
- [CERT-Polska/karton](https://github.com/CERT-Polska/karton) - Distributed malware processing framework based on Python, Redis and S3.
- [rovellipaolo/NinjaDroid](https://github.com/rovellipaolo/NinjaDroid) - Ninja Reverse Engineering on Android APK packages
- [babysor/MockingBird](https://github.com/babysor/MockingBird) - 🚀AI拟声: 5秒内克隆您的声音并生成任意语音内容 Clone a voice in 5 seconds to generate arbitrary speech in real-time
- [Ridter/proxyshell_payload](https://github.com/Ridter/proxyshell_payload) - proxyshell payload generate
- [brevityinmotion/brevityrecon](https://github.com/brevityinmotion/brevityrecon) -
- [dmaasland/proxyshell-poc](https://github.com/dmaasland/proxyshell-poc) -
- [Skiller9090/Lucifer](https://github.com/Skiller9090/Lucifer) - A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security L
- [devanshbatham/ArchiveFuzz](https://github.com/devanshbatham/ArchiveFuzz) - Hunt down the secrets from the WebArchives for Fun and Profit
- [EnableSecurity/sipvicious](https://github.com/EnableSecurity/sipvicious) - SIPVicious OSS is a VoIP security testing toolset. It helps security teams, QA and developers test SIP-based VoIP systems and applications. This toolset is useful in simulating VoIP hacking attacks ag
- [TryCatchHCF/PacketWhisper](https://github.com/TryCatchHCF/PacketWhisper) - PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data betw
- [fierceoj/ShonyDanza](https://github.com/fierceoj/ShonyDanza) - A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
- [LimberDuck/nessus-file-analyzer](https://github.com/LimberDuck/nessus-file-analyzer) - GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft Excel Workbook for effortless analysis.
- [Plabick/NPM-Vulnerability-Auditor](https://github.com/Plabick/NPM-Vulnerability-Auditor) - A tool to find and fix vulnerabilities caused by out of date packages in npm repositories
- [DeepakPawar95/cswsh](https://github.com/DeepakPawar95/cswsh) - A command-line tool for Cross-Site WebSocket Hijacking
- [prasannan-robots/Dynamic_command](https://github.com/prasannan-robots/Dynamic_command) - Tool for encryption and decryption with kinda rolling keys
- [zeuscybersec/File_Monitor.py](https://github.com/zeuscybersec/File_Monitor.py) - Detects Any File Created/Deleted/Changed in Windows /tmp folder👁️🗨️
- [dogoncouch/LogESP](https://github.com/dogoncouch/LogESP) - Open Source SIEM (Security Information and Event Management system).
- [k8scop/k8s-security-dashboard](https://github.com/k8scop/k8s-security-dashboard) - A security monitoring solution for Kubernetes
- [DrPython3/MailRipV2](https://github.com/DrPython3/MailRipV2) - Improved SMTP Checker / SMTP Cracker with proxy-support, inbox test and many more features.
- [skipmcgee/host_security](https://github.com/skipmcgee/host_security) - Red Hat Enterprise Linux 6 & 7 security tool for enumerating security and IT operations-relevant information on a host and forwarding to a SIEM or enterprise syslog server in key='value' format.
- [rsrdesarrollo/sarna](https://github.com/rsrdesarrollo/sarna) - Security Assessment Report geNerated Automatically
- [ICTU/zap2docker-auth-weekly](https://github.com/ICTU/zap2docker-auth-weekly) - Zap baseline scanner in Docker with authentication
- [Thomas-Quig/ld3p](https://github.com/Thomas-Quig/ld3p) - ld3p stands for LDap Domain Dump Parser. It is exactly as the acronym says, ld3p (ldep) quickly parses large ad dumps based on various filters and parameters both regenerated and user created.
- [0xirison/PrintNightmare-Patcher](https://github.com/0xirison/PrintNightmare-Patcher) - A patch for PrintNightmare vulnerability that occurs to print spooler service for Windows machines [CVE-2021-34527]
- [mrlew1s/BrokenSMTP](https://github.com/mrlew1s/BrokenSMTP) - Small python script to look for common vulnerabilities on SMTP server.
- [mrlew1s/SubdomainTakeover](https://github.com/mrlew1s/SubdomainTakeover) - Small python or powershell script to look for potential subdomain takeover vulnerabilities via vulnerable Alias.
- [rfc-st/humble](https://github.com/rfc-st/humble) - A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.
- [tasooshi/exfilkit](https://github.com/tasooshi/exfilkit) - Data exfiltration utility for testing detection capabilities
- [goldfiglabs/introspector](https://github.com/goldfiglabs/introspector) - A schema and set of tools for using SQL to query cloud infrastructure.
- [F5-Labs/cryptonice](https://github.com/F5-Labs/cryptonice) - CryptoNice is both a command line tool and library which provides the ability to scan and report on the configuration of SSL/TLS for your internet or internal facing web services. Built using the ssly
- [ochronasec/ochrona-cli](https://github.com/ochronasec/ochrona-cli) - A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs
- [JerryLinLinLin/VirusTotalSmartScanner](https://github.com/JerryLinLinLin/VirusTotalSmartScanner) - A Smart Anti-Virus Scanner Powered by Virus Total
- [Consensys/mythx-cli](https://github.com/Consensys/mythx-cli) - A command line interface for the MythX smart contract security analysis API
- [BishopFox/GitGot](https://github.com/BishopFox/GitGot) - Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.
- [wildcardcorp/samson](https://github.com/wildcardcorp/samson) - Cryptanalysis and attack library
- [fabidick22/inject-sec-to-devops](https://github.com/fabidick22/inject-sec-to-devops) - Security tools that you can inject into devops
- [X0RBYT3/OSINT-Tools](https://github.com/X0RBYT3/OSINT-Tools) - An Online Collection of Open Source Intelligence Tools
- [EONRaider/Web-Probe](https://github.com/EONRaider/Web-Probe) - Web Probe is a Python 3 asynchronous port scanner with the purpose of checking live web servers
- [dotanuki-labs/gradle-bodyguard](https://github.com/dotanuki-labs/gradle-bodyguard) - An experimental tool that scans dependencies in your Gradle project and warns you about potential security issues
- [0xZDH/o365spray](https://github.com/0xZDH/o365spray) - Username enumeration and password spraying tool aimed at Microsoft O365.
- [Ge0rg3/requests-ip-rotator](https://github.com/Ge0rg3/requests-ip-rotator) - A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.
- [forseti-security/forseti-security](https://github.com/forseti-security/forseti-security) - Forseti Security
- [e-m-b-a/embark](https://github.com/e-m-b-a/embark) - EMBArk - The firmware security scanning environment
- [the0cp/awesome-ddos-tools](https://github.com/the0cp/awesome-ddos-tools) - Collection of several DDos tools.
- [Litre-WU/businessInfo-api](https://github.com/Litre-WU/businessInfo-api) - 企业工商信息接口(包含天眼查、企查查、爱企查、国家企业公示系统平台、快准)
- [0xdevalias/sparty](https://github.com/0xdevalias/sparty) - Sparty - MS Sharepoint and Frontpage Auditing Tool [Unofficial]
- [NexusFuzzy/CobaltSpam](https://github.com/NexusFuzzy/CobaltSpam) - Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons
- [wdsjxh/fiddler_tools](https://github.com/wdsjxh/fiddler_tools) - 基于fiddler被动扫描(越权检测)系统
- [bigblackhat/oFx](https://github.com/bigblackhat/oFx) - 漏洞批量验证框架
- [hakril/PythonForWindows](https://github.com/hakril/PythonForWindows) - A codebase aimed to make interaction with Windows and native execution easier
- [tintinweb/ecdsa-private-key-recovery](https://github.com/tintinweb/ecdsa-private-key-recovery) - A simple library to recover the private key of ECDSA and DSA signatures sharing the same nonce k and therefore having identical signature parameter r
- [mrphrazer/obfuscation_detection](https://github.com/mrphrazer/obfuscation_detection) - Binary Ninja plugin to identify obfuscated code and other interesting code constructs
- [Regala/burp-graphql-logger](https://github.com/Regala/burp-graphql-logger) - Burp Suite extension to log GraphQL operations as a comment
- [dlegs/php-jpeg-injector](https://github.com/dlegs/php-jpeg-injector) - Injects php payloads into jpeg images
- [ReAbout/web-sec](https://github.com/ReAbout/web-sec) - WEB安全手册(红队安全技能栈),漏洞理解,漏洞利用,代码审计和渗透测试总结。【持续更新】
- [antonioCoco/SharPyShell](https://github.com/antonioCoco/SharPyShell) - SharPyShell - tiny and obfuscated ASP.NET webshell for C# web applications
- [0xHJK/TotalPass](https://github.com/0xHJK/TotalPass) - Default password scanner. 默认密码扫描器
- [stratosphereips/StratosphereLinuxIPS](https://github.com/stratosphereips/StratosphereLinuxIPS) - Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors in the network traffic. Stratosphere Laboratory, AIC, FEL, CVUT
- [Samsung/cotopaxi](https://github.com/Samsung/cotopaxi) - Set of tools for security testing of Internet of Things devices using specific network IoT protocols
- [KartheekLade/CANalyse](https://github.com/KartheekLade/CANalyse) - A vehicle network analysis and attack tool.
- [eshard/scared](https://github.com/eshard/scared) - Make your first side-channel attack on public datasets with eShard. This is a mirror of scared Gitlab repository. All contributions and merge request must be done through Gitlab project.
- [qilingframework/qiling](https://github.com/qilingframework/qiling) - A True Instrumentable Binary Emulation Framework
- [quark-engine/quark-engine](https://github.com/quark-engine/quark-engine) - Quark Agent - Your AI-powered Android APK Analyst
- [cloud-sniper/cloud-sniper](https://github.com/cloud-sniper/cloud-sniper) - Cloud Security Operations Orchestrator
- [Ridter/pyForgeCert](https://github.com/Ridter/pyForgeCert) - pyForgeCert is a Python equivalent of the ForgeCert.
- [D4Vinci/elpscrk](https://github.com/D4Vinci/elpscrk) - An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S01E01)
- [facebook/sapp](https://github.com/facebook/sapp) - Post Processor for Facebook Static Analysis Tools.
- [shanfenglan/bruteforce_cs_pwd](https://github.com/shanfenglan/bruteforce_cs_pwd) - 暴力破解cs的teamserver密码脚本
- [Vu1nT0tal/Vehicle-Security-Toolkit](https://github.com/Vu1nT0tal/Vehicle-Security-Toolkit) - 汽车/安卓/固件/代码安全测试工具集
- [SB-GC-Labs/hAFL1](https://github.com/SB-GC-Labs/hAFL1) -
- [ShutdownRepo/targetedKerberoast](https://github.com/ShutdownRepo/targetedKerberoast) - Kerberoast with ACL abuse capabilities
- [hash3liZer/Proxverter](https://github.com/hash3liZer/Proxverter) - Cross platform system wide proxy server & TLS Interception library for Python
- [zeronine9/Putter-CUP](https://github.com/zeronine9/Putter-CUP) - A tool for testing improper put method vulnerability
- [CERT-Polska/drakvuf-sandbox](https://github.com/CERT-Polska/drakvuf-sandbox) - DRAKVUF Sandbox - automated hypervisor-level malware analysis system
- [awake1t/HackReport](https://github.com/awake1t/HackReport) - 渗透测试报告/资料文档/渗透经验文档/安全书籍
- [HackerDev-Felix/Phoenix-Framework](https://github.com/HackerDev-Felix/Phoenix-Framework) - Phoenix Framework Project
- [PentHertz/5GC_API_parse](https://github.com/PentHertz/5GC_API_parse) - A BurpSuite extension to parse 5GC NF OpenAPI 3.0 files to assess 5G core networks
- [trustedsec/unicorn](https://github.com/trustedsec/unicorn) - Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented
- [ShutdownRepo/smartbrute](https://github.com/ShutdownRepo/smartbrute) - Password spraying and bruteforcing tool for Active Directory Domain Services
- [Hackndo/WebclientServiceScanner](https://github.com/Hackndo/WebclientServiceScanner) - Python tool to Check running WebClient services on multiple targets based on @leechristensen
- [long2ice/asynch](https://github.com/long2ice/asynch) - An asyncio ClickHouse Python Driver with native (TCP) interface support.
- [Cerbrutus-BruteForcer/cerbrutus](https://github.com/Cerbrutus-BruteForcer/cerbrutus) - Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force market).
- [ShutdownRepo/pywhisker](https://github.com/ShutdownRepo/pywhisker) - Python version of the C# tool for "Shadow Credentials" attacks
- [light-Life/BUG-Pocket](https://github.com/light-Life/BUG-Pocket) - 小型漏洞库,提供FOFA语法及批量脚本,具体利用法请参考别的漏洞库,共4种类型47项
- [knownsec/Kunyu](https://github.com/knownsec/Kunyu) - Kunyu, more efficient corporate asset collection
- [Ridter/RelayX](https://github.com/Ridter/RelayX) - NTLM relay test.
- [0x727/ShuiZe_0x727](https://github.com/0x727/ShuiZe_0x727) - 信息收集自动化工具
- [dirkjanm/PKINITtools](https://github.com/dirkjanm/PKINITtools) - Tools for Kerberos PKINIT and relaying to AD CS
- [fengziHK/bypass_py](https://github.com/fengziHK/bypass_py) - c++ 加载shellcode 免杀
- [NHPT/FireEyeGoldCrystal](https://github.com/NHPT/FireEyeGoldCrystal) - 一个GitHub监控和信息收集工具,支持监控和收集CVE、免杀、漏洞利用等内置关键字和自定义关键字。
- [crazy0x70/Simple-Confusion](https://github.com/crazy0x70/Simple-Confusion) - 混淆加密文件以到达免杀效果
- [devl00p/tekover](https://github.com/devl00p/tekover) - Subdomain takeover scanner using Python asyncio
- [jmrivas86/django-json-widget](https://github.com/jmrivas86/django-json-widget) - An alternative widget that makes it easy to edit the new Django's field JSONField (PostgreSQL specific model fields)
- [jerrylususu/joplin-vacuum](https://github.com/jerrylususu/joplin-vacuum) - Removes attachments (resources) that are not referred in Joplin.
- [modern-python/fastapi-sqlalchemy-template](https://github.com/modern-python/fastapi-sqlalchemy-template) - Dockerized web application with DI on FastAPI, sqlalchemy2, PostgreSQL
- [sumeshi/evtx2es](https://github.com/sumeshi/evtx2es) - A library for fast parse & import of Windows Eventlogs into Elasticsearch.
- [qonwaygameoflife/qonwaygameoflife](https://github.com/qonwaygameoflife/qonwaygameoflife) - Qiskit Camp - Hackaton Madrid 2019 - Quantum Game of Life
- [Cyberlands-io/epiphany](https://github.com/Cyberlands-io/epiphany) - A pre-DDoS security assessment tool
- [elastic/dorothy](https://github.com/elastic/dorothy) - Dorothy is a tool to test security monitoring and detection for Okta environments
- [oppsec/juumla](https://github.com/oppsec/juumla) - 🦁 Juumla is a python tool created to identify Joomla version, scan for vulnerabilities and sensitive files
- [xuanhun/PythonHackingBook1](https://github.com/xuanhun/PythonHackingBook1) - Python黑客编程之极速入门
- [emadshanab/Nuclei-Templates-Collection](https://github.com/emadshanab/Nuclei-Templates-Collection) - Nuclei Templates Collection
- [adelapie/ghidra-evm](https://github.com/adelapie/ghidra-evm) - The Ghidra EVM Module (ghidra-evm) leverages Ghidra 9.1.2 to disassemble and analyze compiled Ethereum smart contracts. Ghidra-evm was presented at BlackHat Asia 2021.
- [kira2040k/php_code_analysis](https://github.com/kira2040k/php_code_analysis) -
- [spicesouls/onelinepy](https://github.com/spicesouls/onelinepy) - Python Obfuscator to generate One-Liners and FUD Payloads.
- [gl4ssesbo1/Nebula](https://github.com/gl4ssesbo1/Nebula) - Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other Cloud Providers and DevOps Comp
- [bee-san/pyWhat](https://github.com/bee-san/pyWhat) - 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙♀️
- [Josue87/EmailFinder](https://github.com/Josue87/EmailFinder) - Search emails from a domain through search engines
- [pentest-a2p2v/pentest-a2p2v-core](https://github.com/pentest-a2p2v/pentest-a2p2v-core) - Core A2P2V functionality (command line based)
- [sec-consult/aggrokatz](https://github.com/sec-consult/aggrokatz) - Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it to parse LSASS dump files and registry hive files to extract cr
- [Hamza-Megahed/volatility-gui](https://github.com/Hamza-Megahed/volatility-gui) - GUI for Volatility forensics tool written in PyQT5
- [a13xp0p0v/kernel-hardening-checker](https://github.com/a13xp0p0v/kernel-hardening-checker) - A tool for checking the security hardening options of the Linux kernel
- [ranguli/ioccheck](https://github.com/ranguli/ioccheck) - A tool for simplifying the process of researching IOCs.
- [Telefonica/HashCheck](https://github.com/Telefonica/HashCheck) - Ideaslocas Repository
- [EntySec/CamRaptor](https://github.com/EntySec/CamRaptor) - CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.
- [AvalZ/WAF-A-MoLE](https://github.com/AvalZ/WAF-A-MoLE) - A guided mutation-based fuzzer for ML-based Web Application Firewalls
- [thunlp/OpenAttack](https://github.com/thunlp/OpenAttack) - An Open-Source Package for Textual Adversarial Attack.
- [XMCyber/MacHound](https://github.com/XMCyber/MacHound) -
- [Ebryx/GitDump](https://github.com/Ebryx/GitDump) - A pentesting tool that dumps the source code from .git even when the directory traversal is disabled
- [ConsciousHacker/WFH](https://github.com/ConsciousHacker/WFH) -
- [mhaskar/Bughound](https://github.com/mhaskar/Bughound) - Static code analysis tool based on Elasticsearch
- [k4yt3x/orbitaldump](https://github.com/k4yt3x/orbitaldump) - A simple multi-threaded distributed SSH brute-forcing tool written in Python
- [G4LB1T/pstf2](https://github.com/G4LB1T/pstf2) - Passive Security Tools Fingerprinting Framework
- [xchopath/pathprober](https://github.com/xchopath/pathprober) - Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at once
- [s0md3v/Hash-Buster](https://github.com/s0md3v/Hash-Buster) - Crack hashes in seconds.
- [HackerDev-Felix/CVEAP](https://github.com/HackerDev-Felix/CVEAP) - Send CVE information to the specified mailbox (from Github)
- [XiaoLi996/OA-EXP](https://github.com/XiaoLi996/OA-EXP) - 红队工具:各大OA利用工具,万户、致远、通达等
- [RicterZ/PySharpSphere](https://github.com/RicterZ/PySharpSphere) - Yet another SharpSphere
- [dengxmenglihua/struts2](https://github.com/dengxmenglihua/struts2) - 一个用来批量扫描的struts2漏洞利用工具
- [UnlightedOtaku/doc88Download](https://github.com/UnlightedOtaku/doc88Download) - 使用python下载道客巴巴文件并自动合并为pdf
- [rty813/doc_downloader](https://github.com/rty813/doc_downloader) - 下载豆丁、淘豆、道客巴巴、原创力、金锄头文档,并自动转换为PDF
- [DigeeX/raider](https://github.com/DigeeX/raider) - DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider
- [Random936/autobrute](https://github.com/Random936/autobrute) -
- [capt-meelo/Beaconator](https://github.com/capt-meelo/Beaconator) - A beacon generator using Cobalt Strike and a variety of tools.
- [ludwig-ai/ludwig](https://github.com/ludwig-ai/ludwig) - Low-code framework for building custom LLMs, neural networks, and other AI models
- [sajjadium/ctf-archives](https://github.com/sajjadium/ctf-archives) - CTF Archives: Collection of CTF Challenges.
- [blacklanternsecurity/MANSPIDER](https://github.com/blacklanternsecurity/MANSPIDER) - Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!
- [nccgroup/Winstrument](https://github.com/nccgroup/Winstrument) - Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack surface analysis.
- [YungGuo08/WebSpider](https://github.com/YungGuo08/WebSpider) -
- [LogicJake/WebMonitor](https://github.com/LogicJake/WebMonitor) - 实时监控网页变化,并发送通知(Monitor web page changes in real time and send notifications)
- [rook1337/hakrawlerx8chain](https://github.com/rook1337/hakrawlerx8chain) -
- [ccyanxyz/uniswap-arbitrage-analysis](https://github.com/ccyanxyz/uniswap-arbitrage-analysis) - Uniswap arbitrage problem analysis
- [rabbitmask/Libra](https://github.com/rabbitmask/Libra) - Libra [ 天秤座 ] | 网站篡改、暗链、死链监测平台
- [byt3bl33d3r/ItWasAllADream](https://github.com/byt3bl33d3r/ItWasAllADream) - A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE
- [0671/RabR](https://github.com/0671/RabR) - Redis-Attack By Replication (通过主从复制攻击Redis)
- [micahvandeusen/gMSADumper](https://github.com/micahvandeusen/gMSADumper) - Lists who can read any gMSA password blobs and parses them if the current user has access.
- [robotshell/dorkScraper](https://github.com/robotshell/dorkScraper) - DorkScraper is a simple tool written in Python to extract all the urls that appear when using a Google Dork.
- [Paradoxis/Flask-Unsign](https://github.com/Paradoxis/Flask-Unsign) - Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
- [munki/munki](https://github.com/munki/munki) - Managed software installation for macOS —
- [malwaredllc/byob](https://github.com/malwaredllc/byob) - An open-source post-exploitation framework for students, researchers and developers.
- [nccgroup/raccoon](https://github.com/nccgroup/raccoon) - Salesforce object access auditor
- [jeansgit/NessusReport](https://github.com/jeansgit/NessusReport) - Nessus Report
- [the-useless-one/pywerview](https://github.com/the-useless-one/pywerview) - A (partial) Python rewriting of PowerSploit's PowerView
- [dqzg12300/fridaUiTools](https://github.com/dqzg12300/fridaUiTools) - frida工具的缝合怪
- [abankalarm/blockchain-hacker](https://github.com/abankalarm/blockchain-hacker) - This is a tool to directly connect to any exposed block chain connection.
- [3gstudent/pyXSSPlatform](https://github.com/3gstudent/pyXSSPlatform) - Used to build an XSS platform on the command line.
- [pureqh/webshell](https://github.com/pureqh/webshell) - 免杀webshell生成工具
- [eastmountyxz/SystemSecurity-ReverseAnalysis](https://github.com/eastmountyxz/SystemSecurity-ReverseAnalysis) - 该资源为系统安全和逆向分析实验,包括作者从零学习恶意代码分析、病毒逆向分析的工具及样本,基础性文章,希望对您有所帮助~
- [0ss/byp4ss3r](https://github.com/0ss/byp4ss3r) - tool to bypass 403/401 pages ( helpful for bug hunting)
- [M4cs/traxss](https://github.com/M4cs/traxss) - traxss | Automated XSS Vulnerability Scanner Currently In Development :snake: HACKTOBERFEST PROJECT 2019
- [Sachin-v3rma/MrURL](https://github.com/Sachin-v3rma/MrURL) - A Tool to scrape URLs for a given domain from wayback machine, Commoncrawl and OTX Alienvault
- [littlebin404/CVE-2017-11882](https://github.com/littlebin404/CVE-2017-11882) - CVE-2017-11882(通杀Office 2003到2016)
- [Retr0-code/SignHere](https://github.com/Retr0-code/SignHere) - SignHere is implementation of CVE-2017-11882. SignHere is builder of malicious rtf document and VBScript payloads.
- [SecPros-Team/laravel-CVE-2021-3129-EXP](https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP) -
- [dirkjanm/forest-trust-tools](https://github.com/dirkjanm/forest-trust-tools) - Proof-of-concept tools for my AD Forest trust research
- [STMCyber/boobsnail](https://github.com/STMCyber/boobsnail) - BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.
- [P1-Team/AlliN](https://github.com/P1-Team/AlliN) - A flexible scanner
- [tristanlatr/burpa](https://github.com/tristanlatr/burpa) - Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used to setup Dynamic Application Security Testing (DAST).
- [ngalongc/openapi_security_scanner](https://github.com/ngalongc/openapi_security_scanner) -
- [xnianq/cve-2021-21985_exp](https://github.com/xnianq/cve-2021-21985_exp) - cve-2021-21985 exploit
- [s0i37/karma](https://github.com/s0i37/karma) - karma WiFi attack implementation
- [Bywalks/OnTimeHacker](https://github.com/Bywalks/OnTimeHacker) - 爬取各大SRC当日公告 | 通过微信通知的小工具 | 赏金工具
- [OneHone/HoneTool](https://github.com/OneHone/HoneTool) -
- [unode/firefox_decrypt](https://github.com/unode/firefox_decrypt) - Firefox Decrypt is a tool to extract passwords from Mozilla (Firefox™, Waterfox™, Thunderbird®, SeaMonkey®) profiles
- [FlareSolverr/FlareSolverr](https://github.com/FlareSolverr/FlareSolverr) - Proxy server to bypass Cloudflare protection
- [initstring/cloud_enum](https://github.com/initstring/cloud_enum) - Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.
- [commixproject/commix](https://github.com/commixproject/commix) - Automated All-in-One OS Command Injection Exploitation Tool.
- [TelefonicaTC2Tech/typodetect](https://github.com/TelefonicaTC2Tech/typodetect) - Typodetect
- [krzys-h/CTFd_first_blood](https://github.com/krzys-h/CTFd_first_blood) - First Blood challenges plugin for CTFd
- [offsecginger/CTFd-Docker-Challenges](https://github.com/offsecginger/CTFd-Docker-Challenges) - Docker Challenge creation for CTFd. Allows per team/user containers!
- [csnp/njit-ctf](https://github.com/csnp/njit-ctf) - Fully automated CTF for JerseyCTF | CTFd
- [Hong5489/Custom-CTFd-Engine](https://github.com/Hong5489/Custom-CTFd-Engine) - Custom CTFd platform used in SKR CTF
- [ignis-sec/CtfCryptoTool](https://github.com/ignis-sec/CtfCryptoTool) - A tool for automated analysis of ctf type crypto challenges
- [Err0rCM/CTFd_with_CTFd-whale](https://github.com/Err0rCM/CTFd_with_CTFd-whale) - This repository is used to provide a reference for CTF dynamic target machine
- [qianxiao996/CTF-Tools](https://github.com/qianxiao996/CTF-Tools) - 一款Python+Pyqt写的CTF编码、解码、加密、解密工具。
- [p1ay8y3ar/cve_monitor](https://github.com/p1ay8y3ar/cve_monitor) - Automatic monitor github cve using Github Actions
- [wgpsec/ENScan](https://github.com/wgpsec/ENScan) - 基于各大API的一款企业信息查询工具,为了更快速的获取企业的信息,省去收集的麻烦过程,web端于plat平台上线
- [qeeqbox/honeypots](https://github.com/qeeqbox/honeypots) - 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip,
- [Fly-Wuhoo/Fofa](https://github.com/Fly-Wuhoo/Fofa) - Fofa自动化采集脚本
- [MobSF/mobsfscan](https://github.com/MobSF/mobsfscan) - mobsfscan is a static analysis tool that can find insecure code patterns in your Android and iOS source code. Supports Java, Kotlin, Swift, and Objective C Code. mobsfscan uses MobSF static analysis r
- [jazwiecki/neo4j-cve](https://github.com/jazwiecki/neo4j-cve) - Graph database version of the CVE database
- [rm1984/IMAPLoginTester](https://github.com/rm1984/IMAPLoginTester) - A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by trying to login on IMAP servers.
- [dirkjanm/ldapdomaindump](https://github.com/dirkjanm/ldapdomaindump) - Active Directory information dumper via LDAP
- [nikitastupin/clairvoyance](https://github.com/nikitastupin/clairvoyance) - Obtain GraphQL API schema even if the introspection is disabled
- [mhaskar/DNSStager](https://github.com/mhaskar/DNSStager) - Hide your payload in DNS
- [xforcered/InvisibilityCloak](https://github.com/xforcered/InvisibilityCloak) - Proof-of-concept obfuscation toolkit for C# post-exploitation tools
- [eslam3kl/GG-Dorking](https://github.com/eslam3kl/GG-Dorking) - GG Dorking is a tool to generate GitHub and Google dorking for pentesters and bug bounty hunters.
- [M4tir/Github-Monitor](https://github.com/M4tir/Github-Monitor) - Github RCE/0day监控系统 My'Blog:
- [Hypdncy/NessusToReport](https://github.com/Hypdncy/NessusToReport) - Nessus扫描报告自动化生成工具
- [shadow1ng/ProxyPool](https://github.com/shadow1ng/ProxyPool) - 一款用于自动切换ip的代理池服务,无需任何依赖,能快速运行。
- [LyleMi/Learn-Binary-Hacking](https://github.com/LyleMi/Learn-Binary-Hacking) - Binary Hacking Study Notes
- [dirsoooo/Recon](https://github.com/dirsoooo/Recon) - Recon is a script to perform a full recon on a target with the main tools to search for vulnerabilities. Created based on @ofjaaah and @Jhaddix methodologies
- [santoru/shcheck](https://github.com/santoru/shcheck) - A basic tool to check security headers of a website
- [kiks7/frida-non-root](https://github.com/kiks7/frida-non-root) - Add frida-gadgets into APK for non rooted devices.
- [Leoid/MatchandReplace](https://github.com/Leoid/MatchandReplace) - Match and Replace script used to automatically generate JSON option file to BurpSuite
- [benjaminp/six](https://github.com/benjaminp/six) - Python 2 and 3 compatibility library
- [Viralmaniar/MurMurHash](https://github.com/Viralmaniar/MurMurHash) - This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
- [firatesatoglu/iot-searchengine](https://github.com/firatesatoglu/iot-searchengine) - IOT Search Engine Scanner/Crawler/Scraper
- [aleprada/exposed-assets](https://github.com/aleprada/exposed-assets) - A tool for gathering IT/OT exposed assets on the Internet and sending the results to a MISP instance for further Threat Intelligence analysis.
- [RogerRordo/fofa_scraper](https://github.com/RogerRordo/fofa_scraper) - 可无限抓取FOFA爬虫
- [9emin1/charlotte](https://github.com/9emin1/charlotte) - c++ fully undetected shellcode launcher ;)
- [sqlfluff/sqlfluff](https://github.com/sqlfluff/sqlfluff) - A modular SQL linter and auto-formatter with support for multiple dialects and templated code.
- [Sachin-v3rma/Astra](https://github.com/Sachin-v3rma/Astra) - Astra is a tool to find URLs and secrets inside a webpage/files
- [tp7309/TTDeDroid](https://github.com/tp7309/TTDeDroid) - 一键反编译工具(不需要手动安装Python) One key for quickly decompile apk/aar/dex/jar, support by jadx/dex2jar/enjarify.
- [xnl-h4ck3r/GAP-Burp-Extension](https://github.com/xnl-h4ck3r/GAP-Burp-Extension) - Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist
- [ycdxsb/PocOrExp_in_Github](https://github.com/ycdxsb/PocOrExp_in_Github) - Automatically Collect POC or EXP from GitHub by CVE ID. If you are unable to find the POC/EXP on GitHub, you can also check here: https://pocorexps.nsa.im/
- [D0g3-Lab/H1ve](https://github.com/D0g3-Lab/H1ve) - An Easy / Quick / Cheap Integrated Platform
- [ahmedkhlief/APT-Hunter](https://github.com/ahmedkhlief/APT-Hunter) - APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspi
- [dirkjanm/krbrelayx](https://github.com/dirkjanm/krbrelayx) - Kerberos unconstrained delegation abuse toolkit
- [7Ragnarok7/DEDMAP](https://github.com/7Ragnarok7/DEDMAP) - A Network Automation framework focused on Cyber-Security
- [0vercl0k/CVE-2021-31166](https://github.com/0vercl0k/CVE-2021-31166) - Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.
- [mgeeky/RedWarden](https://github.com/mgeeky/RedWarden) - Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation
- [wongzeon/ICP-Checker](https://github.com/wongzeon/ICP-Checker) - ICP备案查询,可查询企业或域名的ICP备案信息,自动完成滑动验证,保存结果到Excel表格,适用于新版的工信部备案管理系统网站,告别频繁拖动验证,以及某站*工具要开通VIP才可查看备案信息的坑
- [paralax/awesome-honeypots](https://github.com/paralax/awesome-honeypots) - an awesome list of honeypot resources
- [fastapi-admin/fastapi-admin](https://github.com/fastapi-admin/fastapi-admin) - A fast admin dashboard based on FastAPI and TortoiseORM with tabler ui, inspired by Django admin
- [Julian-Nash/cwe](https://github.com/Julian-Nash/cwe) - Common weakness enumeration library for Python
- [unknwncharlie/Metamap](https://github.com/unknwncharlie/Metamap) - Nmap/Vulners Automated Vulnerability Scanner
- [snobear/nmapvis](https://github.com/snobear/nmapvis) - A web-based dashboard for importing and viewing nmap scan results
- [brnoleal/nmap-summarize-results](https://github.com/brnoleal/nmap-summarize-results) - Repository containing the scripts used to run nmap and summarize its results.
- [snovvcrash/DivideAndScan](https://github.com/snovvcrash/DivideAndScan) - Divide full port scan results and use it for targeted Nmap runs
- [RedCursorSecurityConsulting/NMap-xml-to-docx](https://github.com/RedCursorSecurityConsulting/NMap-xml-to-docx) -
- [gh0x0st/pythonizing_nmap](https://github.com/gh0x0st/pythonizing_nmap) - A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.
- [howie6879/liuli](https://github.com/howie6879/liuli) - 一站式构建多源、干净、个性化的阅读环境(Build a multi-source, clean and personalized reading environment in one stop.)
- [Metarget/metarget](https://github.com/Metarget/metarget) - Metarget is a framework providing automatic constructions of vulnerable infrastructures.
- [Ben0xA/HoneyCreds](https://github.com/Ben0xA/HoneyCreds) - HoneyCreds network credential injection to detect responder and other network poisoners.
- [ice-doom/EyeJo](https://github.com/ice-doom/EyeJo) - EyeJo是一款自动化资产风险评估平台,可以协助甲方安全人员或乙方安全人员对授权的资产中进行排查,快速发现存在的薄弱点和攻击面。
- [b0bac/PyNoPSExec](https://github.com/b0bac/PyNoPSExec) - 修改自SharpNoPSExec的基于python的横移工具 A Lateral Movement Tool Learned From SharpNoPSExec -- Twitter: @juliourena
- [blazeinfosec/ssrf-ntlm](https://github.com/blazeinfosec/ssrf-ntlm) - Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.
- [D00MFist/Mystikal](https://github.com/D00MFist/Mystikal) - macOS Initial Access Payload Generator
- [Accenture/jenkins-attack-framework](https://github.com/Accenture/jenkins-attack-framework) -
- [franccesco/getaltname](https://github.com/franccesco/getaltname) - Extract subdomains from SSL certificates in HTTPS sites.
- [YinWC/2021hvv_vul](https://github.com/YinWC/2021hvv_vul) - 2021hvv漏洞汇总
- [blazeinfosec/bt2](https://github.com/blazeinfosec/bt2) - Blaze Telegram Backdoor Toolkit is a post-exploitation tool that leverages the infrastructure of Telegram as a C&C
- [verctor/Cobalt_Homework](https://github.com/verctor/Cobalt_Homework) - 分析cobaltstrike c2 协议
- [EventGhost/EventGhost](https://github.com/EventGhost/EventGhost) - EventGhost is an advanced, yet easy-to-use extensible automation tool for Windows.
- [jeffbryner/pyKeylogger](https://github.com/jeffbryner/pyKeylogger) - python client/server keystroke logger
- [sevagas/macro_pack](https://github.com/sevagas/macro_pack) - macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. T
- [NewBeginning6/nologin-upload-cpy](https://github.com/NewBeginning6/nologin-upload-cpy) - 未授权任意文件上传检测脚本
- [BishopFox/SpoofcheckSelfTest](https://github.com/BishopFox/SpoofcheckSelfTest) - Web application that lets you test if your domain is vulnerable to email spoofing
- [WeAreCloudar/s3-account-search](https://github.com/WeAreCloudar/s3-account-search) - S3 Account Search
- [adbar/trafilatura](https://github.com/adbar/trafilatura) - Python & Command-line tool to gather text and metadata on the Web: Crawling, scraping, extraction, output as CSV, JSON, HTML, MD, TXT, XML
- [boy-hack/nmap-parser](https://github.com/boy-hack/nmap-parser) - nmap-service-probes parser
- [mmioimm/shiro_echo](https://github.com/mmioimm/shiro_echo) - shiro 反序列化 回显检测
- [gaasedelen/tenet](https://github.com/gaasedelen/tenet) - A Trace Explorer for Reverse Engineers
- [b0bac/GetMail](https://github.com/b0bac/GetMail) - 利用NTLM Hash读取Exchange邮件
- [calebstewart/pwncat](https://github.com/calebstewart/pwncat) - Fancy reverse and bind shell handler
- [qianxiao996/Super-PortScan](https://github.com/qianxiao996/Super-PortScan) - 端口扫描工具
- [M4tsuri/Autopwn](https://github.com/M4tsuri/Autopwn) - 更好的包装pwntools,提高编写pwn题exp效率的工具
- [zPrototype/bugbounty_stuff](https://github.com/zPrototype/bugbounty_stuff) -
- [wireghoul/traversty](https://github.com/wireghoul/traversty) - Directory traversal tool
- [VitthalS/Az-Blob-Attacker](https://github.com/VitthalS/Az-Blob-Attacker) - You can check below blog post on attacks related to azure storage.
- [iakat/cloudflare-phishing-report](https://github.com/iakat/cloudflare-phishing-report) - CloudFlare Phishing Report API I use in combination with n8n
- [ricardojoserf/adfsbrute](https://github.com/ricardojoserf/adfsbrute) - A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.
- [epi052/osed-scripts](https://github.com/epi052/osed-scripts) - bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)
- [byt3bl33d3r/pyMalleableC2](https://github.com/byt3bl33d3r/pyMalleableC2) - Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.
- [sensepost/dwn](https://github.com/sensepost/dwn) - d(ockerp)wn - a docker pwn tool manager
- [The-XSS-Rat/SecurityTesting](https://github.com/The-XSS-Rat/SecurityTesting) -
- [noptrix/sshprank](https://github.com/noptrix/sshprank) - A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module.
- [RealityNet/attack-coverage](https://github.com/RealityNet/attack-coverage) - an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques
- [ninefiger/shiroDecrypt](https://github.com/ninefiger/shiroDecrypt) - remeberMe的AES解密脚本
- [yang8e/jdbc_mysql_redfile](https://github.com/yang8e/jdbc_mysql_redfile) -
- [MoralCode/pihole-antitelemetry](https://github.com/MoralCode/pihole-antitelemetry) - A research-based starter pihole list to improve your privacy
- [visma-prodsec/columbo](https://github.com/visma-prodsec/columbo) - Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.
- [oldrho/ip2provider](https://github.com/oldrho/ip2provider) - Resolves an IP address to the cloud provider it is hosted on
- [martinradev/gdb-pt-dump](https://github.com/martinradev/gdb-pt-dump) -
- [gwen001/dnspy](https://github.com/gwen001/dnspy) - Find subdomains and takeovers.
- [evilsocket/pwnagotchi](https://github.com/evilsocket/pwnagotchi) - (⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.
- [ce-automne/OrderbyHunter](https://github.com/ce-automne/OrderbyHunter) - 一款辅助探测Orderby注入漏洞的BurpSuite插件
- [ecederstrand/exchangelib](https://github.com/ecederstrand/exchangelib) - Python client for Microsoft Exchange Web Services (EWS)
- [sc0tfree/mentalist](https://github.com/sc0tfree/mentalist) - Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can output the full wordlist as well as rules compatible with Hashcat an
- [SECFORCE/SNMP-Brute](https://github.com/SECFORCE/SNMP-Brute) - Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script.
- [0vercl0k/CVE-2021-24086](https://github.com/0vercl0k/CVE-2021-24086) - Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.
- [UnaPibaGeek/ctfr](https://github.com/UnaPibaGeek/ctfr) - Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
- [wapiti-scanner/wapiti](https://github.com/wapiti-scanner/wapiti) - Web vulnerability scanner written in Python3
- [threatexpress/random_c2_profile](https://github.com/threatexpress/random_c2_profile) - Cobalt Strike random C2 Profile generator
- [darmado/Atomic-Red-Team-C2](https://github.com/darmado/Atomic-Red-Team-C2) - ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
- [MohamedTarekq/trailso](https://github.com/MohamedTarekq/trailso) - [+]An Automation Tool Based on [ securitytrails.com ]
- [ghostlulzhacks/s3brute](https://github.com/ghostlulzhacks/s3brute) - s3 brute force tool
- [saleem8054/clickjack](https://github.com/saleem8054/clickjack) - A simple tool to check subdomains for clickjacking attack.
- [HXSecurity/vulhub-compose](https://github.com/HXSecurity/vulhub-compose) - vulhub-compose是一款屏蔽docker-compose的命令行工具,目的是降低火线平台社区用户使用vulhub靶场的难度,减少学习docker-compose的时间成本;同时,支持直接安装洞态IAST(原灵芝IAST)到vulhub靶场,用于漏洞复现、漏洞挖掘。
- [h4x0r-dz/RCE-Exploit-in-BIG-IP](https://github.com/h4x0r-dz/RCE-Exploit-in-BIG-IP) -
- [microsoft/playwright-python](https://github.com/microsoft/playwright-python) - Python version of the Playwright testing and automation library.
- [GuoKerS/Charset_encoding-Burp](https://github.com/GuoKerS/Charset_encoding-Burp) - 利用字符集编码绕过waf的burpsuite插件
- [EASY233/Finger](https://github.com/EASY233/Finger) - 一款红队在大量的资产中存活探测与重点攻击系统指纹探测工具
- [kaluche/bloodhound-quickwin](https://github.com/kaluche/bloodhound-quickwin) - Simple script to extract useful informations from the combo BloodHound + Neo4j
- [Malfrats/xeuledoc](https://github.com/Malfrats/xeuledoc) - Fetch information about a public Google document.
- [hausec/ProxyLogon](https://github.com/hausec/ProxyLogon) -
- [S1xHcL/f5_rce_poc](https://github.com/S1xHcL/f5_rce_poc) - cve-2021-22986 f5 rce 漏洞批量检测 poc
- [mandiant/ReelPhish](https://github.com/mandiant/ReelPhish) -
- [luodameinv/SonicWallSSL-VPN_RCE](https://github.com/luodameinv/SonicWallSSL-VPN_RCE) - 一个简单的SonicWallSSL-VPN远程命令执行批量检测脚本
- [dogasantos/masstomap](https://github.com/dogasantos/masstomap) - A bridge between masscan and nmap - run fast masscan, parse output, execute nmap using masscan as input
- [bugcrowd/vulnerability-rating-taxonomy](https://github.com/bugcrowd/vulnerability-rating-taxonomy) - Bugcrowd’s baseline priority ratings for common security vulnerabilities
- [JohnTroony/Blisqy](https://github.com/JohnTroony/Blisqy) - Version 0.2 - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB).
- [kabilan1290/grapX](https://github.com/kabilan1290/grapX) - grapX will iterate through the URLs and grep the endpoints with all possible extensions.
- [atdpa4sw0rd/Search-Tools](https://github.com/atdpa4sw0rd/Search-Tools) - 聚合空间测绘搜索(Fofa,Zoomeye,Quake,Shodan,Censys,BinaryEdge)
- [jeansgit/Pentest](https://github.com/jeansgit/Pentest) - Pentest 收集、整理、分享
- [worawit/CVE-2021-3156](https://github.com/worawit/CVE-2021-3156) - Sudo Baron Samedit Exploit
- [tehryanx/normal.py](https://github.com/tehryanx/normal.py) - Find unicode codepoints to use in normalisation and transformation attacks.
- [s0md3v/dump](https://github.com/s0md3v/dump) - Stuff that doesn't deserves its own repository.
- [HJ23/Raptor](https://github.com/HJ23/Raptor) - Passive subdomain enumeration tool with http-probe.
- [phor3nsic/graphqlBrute](https://github.com/phor3nsic/graphqlBrute) -
- [Bhadresh-Malankiya/SendGET](https://github.com/Bhadresh-Malankiya/SendGET) - Basically this open source python script for linux users to send automatically GET requests in bulk from input file and save output having response code and domain name
- [wgpsec/tig](https://github.com/wgpsec/tig) - Threat Intelligence Gathering 威胁情报收集,旨在提高蓝队拿到攻击 IP 后对其进行威胁情报信息收集的效率。
- [FabriceSalvaire/CodeReview](https://github.com/FabriceSalvaire/CodeReview) - CodeReview is a Git GUI tool to perform code review (Diff Viewer) written in Python3 and Qt5.
- [pylava/pylava](https://github.com/pylava/pylava) - Code audit tool for python (a community maintained fork of Pylama)
- [wafinfo/Sunflower_get_Password](https://github.com/wafinfo/Sunflower_get_Password) - 一款针对向日葵的识别码和验证码提取工具
- [WithSecureLabs/awspx](https://github.com/WithSecureLabs/awspx) - A graph-based tool for visualizing effective access and resource relationships in AWS environments.
- [doyensec/regexploit](https://github.com/doyensec/regexploit) - Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)
- [yhy0/github-cve-monitor](https://github.com/yhy0/github-cve-monitor) - 实时监控github上新增的cve、自定义关键字、安全工具更新、大佬仓库监控,并多渠道推送通知
- [EnableSecurity/wafw00f](https://github.com/EnableSecurity/wafw00f) - WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.
- [unipacker/unipacker](https://github.com/unipacker/unipacker) - Automatic and platform-independent unpacker for Windows binaries based on emulation
- [firmianay/security-paper](https://github.com/firmianay/security-paper) - (与本人兴趣强相关的)各种安全or计算机资料收集
- [luckyster895/GoldenRecon](https://github.com/luckyster895/GoldenRecon) -
- [extremecoders-re/pyinstxtractor](https://github.com/extremecoders-re/pyinstxtractor) - PyInstaller Extractor
- [vchinnipilli/kubestriker](https://github.com/vchinnipilli/kubestriker) - A Blazing fast Security Auditing tool for Kubernetes
- [KrispyCamel4u/SysMonTask](https://github.com/KrispyCamel4u/SysMonTask) - Linux system monitor with the compactness and usefulness of windows task manager to allow higher control and monitoring.
- [zongdeiqianxing/Autoscanner](https://github.com/zongdeiqianxing/Autoscanner) - 输入域名>爆破子域名>扫描子域名端口>发现扫描web服务>集成报告的全流程全自动扫描器。集成oneforall、masscan、nmap、dirsearch、crawlergo、xray等工具,另支持cdn识别、网页截图、站点定位;动态识别域名并添加功能、工具超时中断等
- [HoangKien1020/CVE-2021-23132](https://github.com/HoangKien1020/CVE-2021-23132) - com_media allowed paths that are not intended for image uploads to RCE
- [kmahyyg/my-htb-tools2](https://github.com/kmahyyg/my-htb-tools2) -
- [pureqh/bypassAV](https://github.com/pureqh/bypassAV) - 免杀shellcode加载器
- [eveem-org/panoramix](https://github.com/eveem-org/panoramix) - Decompiler at the heart of Eveem.org
- [ghostop14/sparrow-wifi](https://github.com/ghostop14/sparrow-wifi) - Next-Gen GUI-based WiFi and Bluetooth Analyzer for Linux
- [swisskyrepo/GraphQLmap](https://github.com/swisskyrepo/GraphQLmap) - GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)
- [ekiojp/dfex](https://github.com/ekiojp/dfex) - DNS File EXfiltration
- [aedoo/ACMSDiscovery](https://github.com/aedoo/ACMSDiscovery) - CMS识别,CMS检测,多线程,超大指纹库。CMS identification, CMS detection, multi-threading, large fingerprint library.
- [0xrishabh/websy](https://github.com/0xrishabh/websy) - Keep track of changes in website with WEBSY
- [PushpenderIndia/apkinfector](https://github.com/PushpenderIndia/apkinfector) - Advanced Android AV Evasion Tool Written In Python 3 that can Embed/Bind meterpreter APK to any Legitimate APK
- [DC3x6/FOFA_API](https://github.com/DC3x6/FOFA_API) - 以excel表形式输出通过fofa-api查询获得的结果,需要开通fofa会员。
- [BishopFox/json-interop-vuln-labs](https://github.com/BishopFox/json-interop-vuln-labs) - Companion labs to "An Exploration of JSON Interoperability Vulnerabilities"
- [SummerSec/BypassSuper](https://github.com/SummerSec/BypassSuper) - Bypass 403 or 401 or 404
- [conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972](https://github.com/conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972) - VMware vCenter 未授权RCE(CVE-2021-21972)
- [milo2012/CVE-2021-21972](https://github.com/milo2012/CVE-2021-21972) - CVE-2021-21972
- [demonxian3/crack-yakpro-php](https://github.com/demonxian3/crack-yakpro-php) - 破解由 yakpro 混淆的PHP代码 (cracking PHP code obfuscation using yarkpo method)
- [Zarcolio/grepaddr](https://github.com/Zarcolio/grepaddr) - Use grepaddr to extract (grep) all kinds of addresses from stdin like URLs (incl. IPv4/IPv6), IP addresses & ranges (IPv4/IPv6), e-mail addresses, MAC addresses.
- [QmF0c3UK/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC](https://github.com/QmF0c3UK/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC) -
- [thatstraw/PwnLnX](https://github.com/thatstraw/PwnLnX) - An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to help out with the development. Disclaimer: This reverse shell sho
- [NorthwaveSecurity/wikiraider](https://github.com/NorthwaveSecurity/wikiraider) - Want to crack passwords faster by using a wordlist that fits your 'target audience'? Use WikiRaider.
- [pierky/arouteserver](https://github.com/pierky/arouteserver) - A tool to automatically build (and test) feature-rich configurations for BGP route servers.
- [NS-Sp4ce/huaweiSwitchCrack](https://github.com/NS-Sp4ce/huaweiSwitchCrack) - 华为交换机批量爆破脚本【WEB+Telnet】
- [NS-Sp4ce/NpsCrack](https://github.com/NS-Sp4ce/NpsCrack) - 一款适用于爆破NPS服务器的脚本
- [burpheart/mbtm](https://github.com/burpheart/mbtm) - 攻击流量模拟 用于迷惑蓝队 分散蓝队精力 混淆真实攻击流量
- [smackerdodi/allowed-methods](https://github.com/smackerdodi/allowed-methods) - get the http allowed methods for URLs list
- [yzhao062/pyod](https://github.com/yzhao062/pyod) - A Python Library for Outlier and Anomaly Detection, Integrating Classical and Deep Learning Techniques
- [scoringengine/scoringengine](https://github.com/scoringengine/scoringengine) - Scoring Engine for Red/White/Blue Team Competitions
- [lipoja/URLExtract](https://github.com/lipoja/URLExtract) - URLExtract is python class for collecting (extracting) URLs from given text based on locating TLD.
- [zj1244/beholder_scanner](https://github.com/zj1244/beholder_scanner) - 一款监控端口变化的系统——beholder_scanner端
- [smackerdodi/403bypasser](https://github.com/smackerdodi/403bypasser) - automate the procedure of 403 response code bypass
- [bartdag/pylinkvalidator](https://github.com/bartdag/pylinkvalidator) - pylinkvalidator is a standalone and pure python link validator and crawler that traverses a web site and reports errors (e.g., 500 and 404 errors) encountered.
- [mrtc0/speedtest-exporter](https://github.com/mrtc0/speedtest-exporter) -
- [hpthreatresearch/tools](https://github.com/hpthreatresearch/tools) - Scripts and tools accompanying HP Threat Research blog posts and reports.
- [knassar702/zaphoster](https://github.com/knassar702/zaphoster) - Fix host header error in zaproxy
- [ctxis/crackerjack](https://github.com/ctxis/crackerjack) - CrackerJack / Hashcat Web Interface / Context Information Security
- [rortega/Frukah](https://github.com/rortega/Frukah) - This is a Frida/Gui tool is used for dynamic analysis of android applications. The tool allows you to inject/hook javascript to various java methods. This will allow you to follow/modify the applicat
- [blabla1337/skf-labs](https://github.com/blabla1337/skf-labs) - Repo for all the OWASP-SKF Docker lab examples
- [oerlex/ZoneTransferFuzzer](https://github.com/oerlex/ZoneTransferFuzzer) -
- [Rodney-O-C-Melby/dns-zone-transfer-test](https://github.com/Rodney-O-C-Melby/dns-zone-transfer-test) - Automates Domain Name System (DNS) zone transfer testing. Checks for CVE-1999-0532 by automatically finding a given domains nameservers, and tests for zone transfers, if successful, subdomains are pr
- [Veraxy00/Shiro-EXP](https://github.com/Veraxy00/Shiro-EXP) - Apache Shiro 反序列化漏洞检测与利用工具,一键注入内存马
- [0x802/LinkSniper](https://github.com/0x802/LinkSniper) - Spider or repeater to find all links.
- [it-jhack/subsort](https://github.com/it-jhack/subsort) - Subsort removes grep redundancies for subdomains in a list.
- [gnebbia/pdlist](https://github.com/gnebbia/pdlist) - A passive subdomain finder
- [Zarcolio/1pfuscat0r](https://github.com/Zarcolio/1pfuscat0r) - A tool to automatically generate alternative IP representations, a rewritten version of IPFuscator
- [loseys/BlackMamba](https://github.com/loseys/BlackMamba) - C2/post-exploitation framework
- [allyomalley/BurpParamFlagger](https://github.com/allyomalley/BurpParamFlagger) - A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or LFI.
- [DimopoulosElias/CIExtender](https://github.com/DimopoulosElias/CIExtender) -
- [tothi/rbcd-attack](https://github.com/tothi/rbcd-attack) - Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket
- [byt3bl33d3r/Utinni](https://github.com/byt3bl33d3r/Utinni) - An async Python client library for Empire's RESTful API
- [Veraxy00/Jumpserver-EXP](https://github.com/Veraxy00/Jumpserver-EXP) - JumpServer远程代码执行漏洞检测利用脚本
- [yunemse48/403bypasser](https://github.com/yunemse48/403bypasser) -
- [cyberark/BlobHunter](https://github.com/cyberark/BlobHunter) - Find exposed data in Azure with this public blob scanner
- [google/osv.dev](https://github.com/google/osv.dev) - Open source vulnerability DB and triage service.
- [jasperla/CVE-2020-11651-poc](https://github.com/jasperla/CVE-2020-11651-poc) - PoC exploit of CVE-2020-11651 and CVE-2020-11652
- [tgbot-collection/YYeTsBot](https://github.com/tgbot-collection/YYeTsBot) - 🎬 人人影视 机器人和网站,包含人人影视全部资源以及众多网友的网盘分享
- [rotemreiss/uddup](https://github.com/rotemreiss/uddup) - Urls de-duplication tool for better recon.
- [tjnull/OSCP-Stuff](https://github.com/tjnull/OSCP-Stuff) - List of Stuff I did to get through the OSCP :D
- [rakjong/Jumpserver-unauthorized-POC](https://github.com/rakjong/Jumpserver-unauthorized-POC) - Jumpserver未授权读取漏洞
- [JYanger/redis-unauthorized-check](https://github.com/JYanger/redis-unauthorized-check) - 内网redis未授权弱口令批量检测工具
- [m7xss/fastcgi-exploits](https://github.com/m7xss/fastcgi-exploits) - fastcgi-client 、php-fpm未授权访问漏洞、exploit
- [mrknow001/xxl-job-rce](https://github.com/mrknow001/xxl-job-rce) - xxl-job未授权命令执行
- [Juneah/Rsync-unauthorized-scan](https://github.com/Juneah/Rsync-unauthorized-scan) - rsync未授权空密码扫描
- [L1Kec0de/Redis-Getshell](https://github.com/L1Kec0de/Redis-Getshell) - Redis 未授权检测,密码爆破,Webshell写入,SSH公私钥写入,定时计划反弹Shell.
- [rakjong/seeyon-unauthorized-upload-getshell](https://github.com/rakjong/seeyon-unauthorized-upload-getshell) - 致远OA未授权文件上传漏洞批量getshell
- [burningmantech/ranger-ims-server](https://github.com/burningmantech/ranger-ims-server) - Ranger Incident Management System—Server
- [jwhitt3r/SIEMEz](https://github.com/jwhitt3r/SIEMEz) - A open-source Django Security Incident and Event Management System
- [certsocietegenerale/FIR](https://github.com/certsocietegenerale/FIR) - Fast Incident Response
- [guptabless/unclaim-s3-finder](https://github.com/guptabless/unclaim-s3-finder) -
- [Mesh3l911/Sub_Analyser](https://github.com/Mesh3l911/Sub_Analyser) -
- [ambionics/symfony-exploits](https://github.com/ambionics/symfony-exploits) - Exploits targeting Symfony
- [pypa/pipx](https://github.com/pypa/pipx) - Install and Run Python Applications in Isolated Environments
- [BiZken/PhishMailer](https://github.com/BiZken/PhishMailer) - Generate Professional Phishing Emails Fast And Easy
- [fumengze/rad_xray](https://github.com/fumengze/rad_xray) - 基于radium爬虫编写的批量任务处理脚本,使用进程池
- [shanyuhe/follow](https://github.com/shanyuhe/follow) - 一个web安全深度爬虫,可以和漏扫软件进行联动,如 burp xray ,效果棒棒哒
- [redfast00/malidate](https://github.com/redfast00/malidate) - A logging DNS and HTTP(S) server. Opensource alternative to some parts of the Burpsuite Collaborator server.
- [SygniaLabs/security-cloud-scout](https://github.com/SygniaLabs/security-cloud-scout) -
- [possib1e/OneDragon](https://github.com/possib1e/OneDragon) - OneDragon 安全圈一条龙服务,全自动化挖洞,助力挖SRC的赏金猎人白帽子,一键实现子域名扫描,全端口扫描,目录扫描,漏洞扫描。
- [opendevops-cn/codo-cmdb](https://github.com/opendevops-cn/codo-cmdb) - 旨在提供统一的云资源和日常操作管控,解决了在运维多云、多账号、多业务、多地域的情况下所面临的差异化操作挑战。用户可以轻松地管理跨多个云服务提供商、多个账号、多个业务线以及多个地域的云资源。实现了资源层面的运维流程标准化,提高运维效率并降低操作复杂度。
- [tsug0d/AndroidMobilePentest101](https://github.com/tsug0d/AndroidMobilePentest101) - Pentesting Android Application Course For Kids+ (English and Vietnamese edition)
- [thibmaek/vrt-http-flask](https://github.com/thibmaek/vrt-http-flask) - Small example of running pyvrt in a Flask HTTP server
- [jayus0821/swagger-hack](https://github.com/jayus0821/swagger-hack) - 自动化爬取并自动测试所有swagger接口
- [MrCl0wnLab/ShellShockHunter](https://github.com/MrCl0wnLab/ShellShockHunter) - It's a simple tool for test vulnerability shellshock
- [lanjelot/patator](https://github.com/lanjelot/patator) - Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
- [Roo7K1d/D0x-K1t-v2](https://github.com/Roo7K1d/D0x-K1t-v2) - Active reconaissance, information gathering and OSINT built in a portable web application test.
- [s7ckTeam/Glass](https://github.com/s7ckTeam/Glass) - Glass是一款针对资产列表的快速指纹识别工具,通过调用Fofa/ZoomEye/Shodan/360等api接口快速查询资产信息并识别重点资产的指纹,也可针对IP/IP段或资产列表进行快速的指纹识别。
- [opencve/opencve](https://github.com/opencve/opencve) - CVE Alerting Platform
- [HashPals/Name-That-Hash](https://github.com/HashPals/Name-That-Hash) - 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes with a neat web app 🔥
- [deafmute1/refeed](https://github.com/deafmute1/refeed) - Monitors an imap mailbox and converts incoming email matching filters to atom/rss feeds.
- [hypn0s/AJPy](https://github.com/hypn0s/AJPy) -
- [NobleSiXSS/getjswords.py_fork](https://github.com/NobleSiXSS/getjswords.py_fork) - getjswords.py with local files support
- [dkgee/public_monitors](https://github.com/dkgee/public_monitors) - 公网IP扫描
- [dawn0207/python_masscan_nmap](https://github.com/dawn0207/python_masscan_nmap) - 通过python调取masscan扫描开放端口,然后通过nmap对端口服务和版本进行确认,最终输出表格
- [screetsec/BruteSploit](https://github.com/screetsec/BruteSploit) - BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used
- [eslam3kl/3klector](https://github.com/eslam3kl/3klector) - 3klector is an automation Recon tool which collecting information about Acquisitions and ASN which related to Big Scope company
- [eslam3kl/crtfinder](https://github.com/eslam3kl/crtfinder) - Fast tool to extract all subdomains from crt.sh website. Output will be up to sub.sub.sub.subdomain.com with standard and advanced search techniques
- [zhuifengshen/DingtalkChatbot](https://github.com/zhuifengshen/DingtalkChatbot) - 钉钉群自定义机器人消息Python封装
- [knqyf263/dnspooq](https://github.com/knqyf263/dnspooq) - DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)
- [pmiaowu/BurpHttpForwardRequests](https://github.com/pmiaowu/BurpHttpForwardRequests) - burp-http请求转发至其他模块的插件
- [Hzllaga/BT_Panel_Privilege_Escalation](https://github.com/Hzllaga/BT_Panel_Privilege_Escalation) - 宝塔面板Windows版提权方法
- [ocrmypdf/OCRmyPDF](https://github.com/ocrmypdf/OCRmyPDF) - OCRmyPDF adds an OCR text layer to scanned PDF files, allowing them to be searched
- [PaddlePaddle/PaddleOCR](https://github.com/PaddlePaddle/PaddleOCR) - Awesome multilingual OCR toolkits based on PaddlePaddle (practical ultra lightweight OCR system, support 80+ languages recognition, provide data annotation and synthesis tools, support training and de
- [Y4er/CVE-2020-14756](https://github.com/Y4er/CVE-2020-14756) - WebLogic T3/IIOP RCE ExternalizableHelper.class of coherence.jar
- [oppo-security/rpktool](https://github.com/oppo-security/rpktool) - A toolkit to unpack, debug and repack an rpk file.
- [ajinabraham/package_scan](https://github.com/ajinabraham/package_scan) - PoC: Python package static and dynamic analysis to detect environment variable stealing
- [darrenmartyn/VisualDoor](https://github.com/darrenmartyn/VisualDoor) - SonicWall SSL-VPN Exploit
- [knownsec/LSpider](https://github.com/knownsec/LSpider) - LSpider 一个为被动扫描器定制的前端爬虫
- [synacktiv/eos](https://github.com/synacktiv/eos) - Enemies Of Symfony - Debug mode Symfony looter
- [DontPanicO/jwtXploiter](https://github.com/DontPanicO/jwtXploiter) - A tool to test security of json web token
- [AidenPearce369/exif-gps-tracer](https://github.com/AidenPearce369/exif-gps-tracer) - A python script which allows you to parse GeoLocation data from your Image files stored in a dataset.It also produces output in CSV file and also in HTML Google Maps
- [Raikia/UhOh365](https://github.com/Raikia/UhOh365) - A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is unthrottled, and is incredibly useful for social engineering ass
- [KTZgraph/sarenka](https://github.com/KTZgraph/sarenka) - OSINT tool - gets data from services like shodan, censys etc. in one app
- [pixelbubble/ProtOSINT](https://github.com/pixelbubble/ProtOSINT) - ProtOSINT is a Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses
- [edoardottt/longtongue](https://github.com/edoardottt/longtongue) - Customized Password/Passphrase List inputting Target Info
- [ssh-mitm/ssh-mitm](https://github.com/ssh-mitm/ssh-mitm) - SSH-MITM - ssh audits made simple
- [tyki6/MyJWT](https://github.com/tyki6/MyJWT) - A cli for cracking, testing vulnerabilities on Json Web Token(JWT)
- [Josue87/MetaFinder](https://github.com/Josue87/MetaFinder) - Search for documents in a domain through Search Engines (Google, Bing and Baidu). The objective is to extract metadata
- [omarhashem123/venom](https://github.com/omarhashem123/venom) - Tool designed for fast crawl and extract endpoints
- [s0md3v/MyPapers](https://github.com/s0md3v/MyPapers) - Repository for hosting my research papers
- [josehelps/git-wild-hunt](https://github.com/josehelps/git-wild-hunt) - A tool to hunt for credentials in github wild AKA git*hunt
- [w0x68y/bypassWAF](https://github.com/w0x68y/bypassWAF) - bypassD盾、安全狗、云锁
- [m8sec/subscraper](https://github.com/m8sec/subscraper) - Subdomain and target enumeration tool built for offensive security testing
- [m8sec/pymeta](https://github.com/m8sec/pymeta) - Utility to download and extract document metadata from an organization. This technique can be used to identify: domains, usernames, software/version numbers and naming conventions.
- [0x240x23elu/JSScanner](https://github.com/0x240x23elu/JSScanner) - Js File Scanner
- [WangYihang/GitHacker](https://github.com/WangYihang/GitHacker) - 🕷️ A `.git` folder exploiting tool that is able to restore the entire Git repository, including stash, common branches and common tags.
- [potats0/javaSerializationTools](https://github.com/potats0/javaSerializationTools) -
- [Sumeet-R/L7-Inspector](https://github.com/Sumeet-R/L7-Inspector) - A python based security auditing tool that can find various injection payloads from web server and application logs
- [ScRiPt1337/hackthebox_notes](https://github.com/ScRiPt1337/hackthebox_notes) - random script and tools and notes i create while doing hack the box
- [epi052/recon-pipeline](https://github.com/epi052/recon-pipeline) - An automated target reconnaissance pipeline.
- [notmarshmllow/credax](https://github.com/notmarshmllow/credax) - Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.
- [zh-explorer/openvpn_route](https://github.com/zh-explorer/openvpn_route) - openvpn route config helper
- [byt3bl33d3r/webview_d3](https://github.com/byt3bl33d3r/webview_d3) - Generate graphs with NetworkX, natively visualize with D3.js and pywebview
- [denandz/OpManager-Decrypter](https://github.com/denandz/OpManager-Decrypter) - Some simple scripts for decrypting passwords retrieved from a Manage Engine OpManager installation
- [DreyAnd/DeadDNS](https://github.com/DreyAnd/DeadDNS) - DNS hijacking via dead records automation tool
- [moloch--/RootTheBox](https://github.com/moloch--/RootTheBox) - A Game of Hackers (CTF Scoreboard & Game Manager)
- [micah5/ace-attorney-reddit-bot](https://github.com/micah5/ace-attorney-reddit-bot) - 👨🏼⚖️ reddit bot that turns comment chains into ace attorney scenes
- [dtmilano/AndroidViewClient](https://github.com/dtmilano/AndroidViewClient) - Android ViewServer and ADB client
- [0xInfection/XSRFProbe](https://github.com/0xInfection/XSRFProbe) - The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.
- [zongdeiqianxing/hscan](https://github.com/zongdeiqianxing/hscan) - 集成crawlergo、xray、dirsearch、nmap等工具的src漏洞挖掘工具,使用docker封装运行;使用oneforall自动遍历子域名并扫描;
- [r0x0r/pywebview](https://github.com/r0x0r/pywebview) - Build GUI for your Python program with JavaScript, HTML, and CSS
- [Higurashi-kagome/pythontools](https://github.com/Higurashi-kagome/pythontools) - 微信读书笔记助手、Markdown 添加标题、Markdown 标题添加序号...
- [SabyasachiRana/WebMap](https://github.com/SabyasachiRana/WebMap) - WebMap-Nmap Web Dashboard and Reporting
- [lijiejie/BBScan](https://github.com/lijiejie/BBScan) - A fast vulnerability scanner helps pentesters pinpoint possibly vulnerable targets from a large number of web servers
- [dotPY-hax/gitlab_RCE](https://github.com/dotPY-hax/gitlab_RCE) - RCE for old gitlab version <= 11.4.7 & 12.4.0-12.8.1 and LFI for old gitlab versions 10.4 - 12.8.1
- [bitranox/fingerprint](https://github.com/bitranox/fingerprint) - Monitoring Registry and File Changes in Windows
- [DEMON1A/Blinder](https://github.com/DEMON1A/Blinder) - A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers
- [ankit0183/Wifi-Hacking](https://github.com/ankit0183/Wifi-Hacking) - Cyber Security Tool For Hacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2/TKIP/IES)
- [darkoperator/dnsrecon](https://github.com/darkoperator/dnsrecon) - DNS Enumeration Script
- [zeronine9/Blind_SPOT](https://github.com/zeronine9/Blind_SPOT) - Blind spot is a python tool for blind injection vulnerabilities , SQLi time based , Command injection , code injection , SSTI
- [dirkjanm/ROADtools](https://github.com/dirkjanm/ROADtools) - A collection of Azure AD/Entra tools for offensive and defensive security purposes
- [adarshshetty18/fcm_server_key](https://github.com/adarshshetty18/fcm_server_key) - Tool to extract & validate google fcm server keys from apks
- [SharonBrizinov/s3viewer](https://github.com/SharonBrizinov/s3viewer) - Storage Explorer - Publicly open storage viewer (Amazon S3 Bucket, Azure Blob, FTP server, HTTP Index Of/)
- [MrWQ/vulnerability-paper](https://github.com/MrWQ/vulnerability-paper) - 收集的文章 https://mrwq.github.io/tools/paper/
- [f0cker/crackq](https://github.com/f0cker/crackq) - CrackQ: A Python Hashcat cracking queue system
- [ihebski/DefaultCreds-cheat-sheet](https://github.com/ihebski/DefaultCreds-cheat-sheet) - One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
- [enemy-submarine/pidrila](https://github.com/enemy-submarine/pidrila) - Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
- [oasiszrz/XAIGen](https://github.com/oasiszrz/XAIGen) -
- [SkyBlueEternal/Nessus-update](https://github.com/SkyBlueEternal/Nessus-update) - Nessus 一键下载 最新更新脚本
- [BugBountyResources/targets](https://github.com/BugBountyResources/targets) - A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
- [six2dez/degoogle_hunter](https://github.com/six2dez/degoogle_hunter) - Simple fork from degoogle original project with bug hunting purposes
- [s0md3v/ote](https://github.com/s0md3v/ote) - Generate Email, Register for anything, Get the OTP/Link
- [w9w/JSA](https://github.com/w9w/JSA) - Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.
- [n0x08/ShodanTools](https://github.com/n0x08/ShodanTools) - Collection of scripts & fingerprinting tricks for Shodan.io
- [breenmachine/httpscreenshot](https://github.com/breenmachine/httpscreenshot) -
- [loseys/Oblivion](https://github.com/loseys/Oblivion) - Data leak checker & OSINT Tool
- [UserExistsError/webshooter](https://github.com/UserExistsError/webshooter) - Inspired by gowitness and EyeWitness
- [gquere/pwn_jenkins](https://github.com/gquere/pwn_jenkins) - Notes about attacking Jenkins servers
- [Ridter/CVE-2019-1040-dcpwn](https://github.com/Ridter/CVE-2019-1040-dcpwn) - CVE-2019-1040 with Kerberos delegation
- [Loveforkeeps/ThreatReputationQuery](https://github.com/Loveforkeeps/ThreatReputationQuery) - 基于威胁情报厂商服务平台API的即时Domain/IP/URL信誉查询系统
- [maxmind/MaxMind-DB-Reader-python](https://github.com/maxmind/MaxMind-DB-Reader-python) - Python MaxMind DB reader extension
- [w5teams/w5](https://github.com/w5teams/w5) - Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
- [irsl/google-osconfig-privesc](https://github.com/irsl/google-osconfig-privesc) - Proof of concept about the privilege escalation flaw identified in Google's Osconfig
- [ARPSyndicate/dmass](https://github.com/ARPSyndicate/dmass) - scrapes domains from VDP/BBP scopes
- [vulnersCom/mikrot8over](https://github.com/vulnersCom/mikrot8over) - mikrot8over: Fast exploitation tool for Mikrotik RouterOS up to 6.38.4
- [SourceCode-AI/aura](https://github.com/SourceCode-AI/aura) - Python source code auditing and static analysis on a large scale
- [shazsyed/FavHunt](https://github.com/shazsyed/FavHunt) - Favicon based recon for faster fingerprinting of web services
- [TebbaaX/GRecon](https://github.com/TebbaaX/GRecon) - Another version of katana, more automated but less stable. the purpose of this small tool is to run a Google based passive recon against your scope.
- [captain-woof/DirtyPortScanner](https://github.com/captain-woof/DirtyPortScanner) - A simple, fast port scanner that can work with Nmap.
- [f-froehlich/nmap-scan](https://github.com/f-froehlich/nmap-scan) - Nmap wrapper for python with full Nmap DTD support, parallel scans and threaded callback methods support for faster analytics.
- [creditease-sec/insight2](https://github.com/creditease-sec/insight2) -
- [r3change/TPLogScan](https://github.com/r3change/TPLogScan) - ThinkPHP全日志扫描工具,命令行版和BurpSuite插件版
- [mrknow001/aliyun-accesskey-Tools](https://github.com/mrknow001/aliyun-accesskey-Tools) - 阿里云accesskey利用工具
- [7hj4/links-html](https://github.com/7hj4/links-html) -
- [anshumanpattnaik/http-request-smuggling](https://github.com/anshumanpattnaik/http-request-smuggling) - HTTP Request Smuggling Detection Tool
- [j3ers3/Searpy](https://github.com/j3ers3/Searpy) - 🥀 Search Engine Tookit,URL采集、Favicon哈希值查找真实IP、子域名查找
- [bak6ry/Getshell](https://github.com/bak6ry/Getshell) - 一款基于shodan识别漏洞,批量getshell的脚本,可以用来渗透测试练手使用,只写了海康威视一个漏洞的,感兴趣可以自己修改
- [7CLewis/SAAST_Project](https://github.com/7CLewis/SAAST_Project) - Shodan API Automated Search Tool
- [Ethancck/TFofa](https://github.com/Ethancck/TFofa) - 一个使用Fofa API查询的小工具
- [n00py/LAPSDumper](https://github.com/n00py/LAPSDumper) - Dumping LAPS from Python
- [jordan9001/dobby2](https://github.com/jordan9001/dobby2) - Build your emulation environment as needed
- [defparam/Coldsnap](https://github.com/defparam/Coldsnap) -
- [PeterL1n/BackgroundMattingV2](https://github.com/PeterL1n/BackgroundMattingV2) - Real-Time High-Resolution Background Matting
- [JYanger/Weblogic_Scan](https://github.com/JYanger/Weblogic_Scan) - 一款Weblogic漏洞扫描工具,批量ip,多端口检测。
- [philipperemy/3.7-billion-passwords-tools](https://github.com/philipperemy/3.7-billion-passwords-tools) - Tools to manipulate the data behind Collection #1 (and #2–5) - AntiPublic.
- [NoDataFound/RiskIQ.SunBurst.Hunter](https://github.com/NoDataFound/RiskIQ.SunBurst.Hunter) - The Purpose of this research tool is to provide a Python client into RiskIQ API services.
- [Arno0x/NtlmRelayToEWS](https://github.com/Arno0x/NtlmRelayToEWS) - ntlm relay attack to Exchange Web Services
- [stamparm/identYwaf](https://github.com/stamparm/identYwaf) - Blind WAF identification tool
- [Margular/frida-skeleton](https://github.com/Margular/frida-skeleton) - 基于frida的安卓hook框架,提供了很多frida自身不支持的功能,将hook安卓变成简单便捷,人人都会的事情
- [Santandersecurityresearch/corsair_scan](https://github.com/Santandersecurityresearch/corsair_scan) - Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).
- [MurkFox/Otter_scan](https://github.com/MurkFox/Otter_scan) -
- [zeronetworks/BloodHound-Tools](https://github.com/zeronetworks/BloodHound-Tools) - Collection of tools that reflect the network dimension into Bloodhound's data
- [TheKingOfDuck/easyXssPayload](https://github.com/TheKingOfDuck/easyXssPayload) - XssPayload List . Usage:
- [synacktiv/lumina_server](https://github.com/synacktiv/lumina_server) - Local server for IDA Lumina feature
- [TheTwitchy/xxer](https://github.com/TheTwitchy/xxer) - A blind XXE injection callback handler. Uses HTTP and FTP to extract information. Originally written in Ruby by ONsec-Lab.
- [noperator/CVE-2019-18935](https://github.com/noperator/CVE-2019-18935) - RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.
- [Manjesh24/JSON-JS-Beautifier](https://github.com/Manjesh24/JSON-JS-Beautifier) - Burp Suite JSON/JS-Beautifier
- [grayddq/EBurst](https://github.com/grayddq/EBurst) - 这个脚本主要提供对Exchange邮件服务器的账户爆破功能,集成了现有主流接口的爆破方式。
- [gotr00t0day/forbiddenpass](https://github.com/gotr00t0day/forbiddenpass) -
- [markgacoka/selenium-proxy-rotator](https://github.com/markgacoka/selenium-proxy-rotator) - A python wrapper around selenium that makes web automation anonymous through proxy rotation
- [EvilPulsar/S2-061](https://github.com/EvilPulsar/S2-061) - some struts tag , attributes which out of the range will call SetDynamicAttribute() function, it will cause ONGL expression execute
- [theLSA/burp-sensitive-param-extractor](https://github.com/theLSA/burp-sensitive-param-extractor) - burpsuite extension for check and extract sensitive request parameter
- [wmathor/Rubbish-Video-Generator](https://github.com/wmathor/Rubbish-Video-Generator) - 营销号视频生成器
- [wuzuowei/CVE-2020-17530](https://github.com/wuzuowei/CVE-2020-17530) - S2-061 的payload,以及对应简单的PoC/Exp
- [ka1n4t/CVE-2020-17530](https://github.com/ka1n4t/CVE-2020-17530) -
- [m8sec/taser](https://github.com/m8sec/taser) - Python resource library for creating security related tooling
- [deepseagirl/degoogle](https://github.com/deepseagirl/degoogle) - search Google and extract results directly. skip all the click-through links and other sketchiness
- [Damian89/simple-oob-scanner](https://github.com/Damian89/simple-oob-scanner) - Simple tool to test for SSRF/OOB HTTP Read within the Path of a request
- [demantz/frizzer](https://github.com/demantz/frizzer) - Frida-based general purpose fuzzer
- [dephell/dephell](https://github.com/dephell/dephell) - :package: :fire: Python project management. Manage packages: convert between formats, lock, install, resolve, isolate, test, build graph, show outdated, audit. Manage venvs, build package, bump versio
- [QPromise/EasyTrans](https://github.com/QPromise/EasyTrans) - 支持谷歌翻译、百度翻译、有道翻译的免费接口,基于Django、PyMuPDF实现了pdf文档英译汉的功能,翻译后的pdf格式基本保持不变,可以下载docx和pdf格式的翻译文档,基本解决复制caj中文论文时的格式问题,简单的满足看论文以及写总结的需求。
- [RodrickOMG/PDF-translator](https://github.com/RodrickOMG/PDF-translator) - A PDF translator which can translate English pdf into Chinese pdf. 将英文的PDF翻译并自动生成中文版PDF
- [HACHp1/chptrans](https://github.com/HACHp1/chptrans) - 翻译英文pdf论文的小工具,类似于不使用浏览器的划词翻译
- [mcepl/M2Crypto](https://github.com/mcepl/M2Crypto) - OpenSSL for Python (both 2.x and 3.x) (generated by SWIG)
- [spipm/Depix](https://github.com/spipm/Depix) - Recovers passwords from pixelized screenshots
- [SimplySecurity/SimplyEmail](https://github.com/SimplySecurity/SimplyEmail) - Email recon made fast and easy, with a framework to build on
- [Rockyzsu/stock](https://github.com/Rockyzsu/stock) - 30天掌握量化交易 (持续更新)
- [codingo/NoSQLMap](https://github.com/codingo/NoSQLMap) - Automated NoSQL database enumeration and web application exploitation tool.
- [NS-Sp4ce/TongDaOA-Fake-User](https://github.com/NS-Sp4ce/TongDaOA-Fake-User) - 通达OA 任意用户登录漏洞
- [jpadilla/pyjwt](https://github.com/jpadilla/pyjwt) - JSON Web Token implementation in Python
- [Mesh3l911/SQLi_Checker_v1.1](https://github.com/Mesh3l911/SQLi_Checker_v1.1) -
- [mitre-attack/car](https://github.com/mitre-attack/car) - Cyber Analytics Repository
- [py2exe/py2exe](https://github.com/py2exe/py2exe) - Create standalone Windows programs from Python code
- [sv3nbeast/ShiroScan](https://github.com/sv3nbeast/ShiroScan) - Shiro<=1.2.4反序列化,一键检测工具
- [r0ysue/r0capture](https://github.com/r0ysue/r0capture) - 安卓应用层抓包通杀脚本
- [ptoomey3/evilarc](https://github.com/ptoomey3/evilarc) - Create tar/zip archives that can exploit directory traversal vulnerabilities
- [alphaSeclab/malware-ioc-hash](https://github.com/alphaSeclab/malware-ioc-hash) - Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.
- [LandGrey/domainNamePredictor](https://github.com/LandGrey/domainNamePredictor) - 一个简单的现代化公司域名使用规律预测及生成工具
- [imjdl/Apache-NiFi-Api-RCE](https://github.com/imjdl/Apache-NiFi-Api-RCE) -
- [prisma-cloud/IAMFinder](https://github.com/prisma-cloud/IAMFinder) - IAMFinder enumerates and finds users and IAM roles in a target AWS account.
- [nccgroup/s3_objects_check](https://github.com/nccgroup/s3_objects_check) - Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.
- [ARPSyndicate/kenzer](https://github.com/ARPSyndicate/kenzer) - automated web assets enumeration & scanning [DEPRECATED]
- [BC-SECURITY/Empire-Cli](https://github.com/BC-SECURITY/Empire-Cli) - CLI Frontend for PowerShell Empire.
- [xenoscr/SessionHound](https://github.com/xenoscr/SessionHound) - A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo4j database.
- [GGyao/CVE-2020-14882_ALL](https://github.com/GGyao/CVE-2020-14882_ALL) - CVE-2020-14882_ALL综合利用工具,支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。
- [dariusztytko/jwt-key-id-injector](https://github.com/dariusztytko/jwt-key-id-injector) - Simple python script to check against hypothetical JWT vulnerability.
- [righettod/burp-piper-custom-scripts](https://github.com/righettod/burp-piper-custom-scripts) - Custom scripts for the PIPER Burp extensions.
- [panch0r3d/Bug_Bounty_Tools](https://github.com/panch0r3d/Bug_Bounty_Tools) - Random tools I've made for bug bounty hunting
- [z3dc0ps/0x0p1n3r](https://github.com/z3dc0ps/0x0p1n3r) - 0x0p1n3r is set of combination of other tools and one line scripts to find subdomains easily and to check subdomain takeover
- [EXP-Tools/threat-broadcast](https://github.com/EXP-Tools/threat-broadcast) - 威胁情报播报
- [seemoo-lab/toothpicker](https://github.com/seemoo-lab/toothpicker) -
- [htr-tech/fake-mailer](https://github.com/htr-tech/fake-mailer) - Send Mail Anonymously with this Script
- [S2-group/android-runner](https://github.com/S2-group/android-runner) - Python framework for automatically executing measurement-based experiments on native and web apps running on Android devices
- [disclose/diodb](https://github.com/disclose/diodb) - Open-source vulnerability disclosure and bug bounty program database
- [hoat23/Nessus2Elasticsearch](https://github.com/hoat23/Nessus2Elasticsearch) -
- [Ovi3/awvs_xray](https://github.com/Ovi3/awvs_xray) - AWVS13和xray的自动化扫描脚本
- [Hefei-Harden/AUTO-AWVS](https://github.com/Hefei-Harden/AUTO-AWVS) -
- [0671/MyCT](https://github.com/0671/MyCT) - 用于渗透测试、安全运维的插件化并发框架,自写插件可进行-PoC测试、子域发现、端口扫描等。
- [airob0t/idcardgenerator](https://github.com/airob0t/idcardgenerator) - 身份证图片生成工具 generate an id card picture
- [CaledoniaProject/password-distance](https://github.com/CaledoniaProject/password-distance) - 常见密码变形方法
- [gakki429/Git_Extract](https://github.com/gakki429/Git_Extract) - 提取远程 git 泄露或本地 git 的工具
- [raoweijian/jacoco-diff](https://github.com/raoweijian/jacoco-diff) - 在 jacoco 覆盖率报告的基础上,计算出增量覆盖率
- [nabilm/aneo4j](https://github.com/nabilm/aneo4j) - Yet another simple async client wrapper for neo4j
- [Charmve/BLE-Security-Attack-Defence](https://github.com/Charmve/BLE-Security-Attack-Defence) - ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
- [nyxgeek/ntlmscan](https://github.com/nyxgeek/ntlmscan) - scan for NTLM directories
- [Dliv3/redis-rogue-server](https://github.com/Dliv3/redis-rogue-server) - Redis 4.x/5.x RCE
- [sting8k/BurpSuite_403Bypasser](https://github.com/sting8k/BurpSuite_403Bypasser) - Burpsuite Extension to bypass 403 restricted directory
- [PaytmLabs/nerve](https://github.com/PaytmLabs/nerve) - NERVE Continuous Vulnerability Scanner
- [Miagz/XrayFofa](https://github.com/Miagz/XrayFofa) - 一款将xray和fofa完美结合的自动化工具,调用fofaAPI进行查询扫描,新增爬虫爬取扫描(懒人必备)
- [n3k/Pentest](https://github.com/n3k/Pentest) - Notes/Tools for pentesting
- [Gality369/CS-Loader](https://github.com/Gality369/CS-Loader) - CS免杀
- [dhaneshsivasamy07/hackthebox](https://github.com/dhaneshsivasamy07/hackthebox) - Notes Taken for HTB Machines & InfoSec Community.
- [salesforce/jarm](https://github.com/salesforce/jarm) -
- [Ganofins/subcapture](https://github.com/Ganofins/subcapture) - Another automated script to check for subdomain takeover
- [DiegoCaraballo/Email-extractor](https://github.com/DiegoCaraballo/Email-extractor) - The main functionality is to extract all the emails from one or several URLs - La funcionalidad principal es extraer todos los correos electrónicos de una o varias Url
- [sameera-madushan/Print-My-Shell](https://github.com/sameera-madushan/Print-My-Shell) - Python script wrote to automate the process of generating various reverse shells.
- [rtcatc/Packer-Fuzzer](https://github.com/rtcatc/Packer-Fuzzer) - Packer Fuzzer is a fast and efficient scanner for security detection of websites constructed by javascript module bundler such as Webpack.
- [timwhitez/Frog-Fp](https://github.com/timwhitez/Frog-Fp) - 🐸fingerprint detect framework 批量深度指纹识别框架
- [mschwager/0wned](https://github.com/mschwager/0wned) - Code execution via Python package installation.
- [Ithrael/beian_miit_spider](https://github.com/Ithrael/beian_miit_spider) - 一个工业和信息化部ICP备案查询的爬虫
- [WBGlIl/CS_Decrypt](https://github.com/WBGlIl/CS_Decrypt) -
- [profmoriarity/rexsser](https://github.com/profmoriarity/rexsser) - This is a burp plugin that extracts keywords from response using regexes and test for reflected XSS on the target scope.
- [uknowsec/BurpSuite-Extender-fastjson](https://github.com/uknowsec/BurpSuite-Extender-fastjson) - Reference:https://www.w2n1ck.com/article/44/
- [dcsync/pycobalt](https://github.com/dcsync/pycobalt) - Cobalt Strike Python API
- [XTeam-Wing/SSRF_BYPASS](https://github.com/XTeam-Wing/SSRF_BYPASS) - SSRF 绕过 Payload
- [morpheus65535/bazarr](https://github.com/morpheus65535/bazarr) - Bazarr is a companion application to Sonarr and Radarr. It manages and downloads subtitles based on your requirements. You define your preferences by TV show or movie and Bazarr takes care of everythi
- [cve-search/cve-search](https://github.com/cve-search/cve-search) - cve-search - a tool to perform local searches for known vulnerabilities
- [0cirius0/Subdomains-Tracker](https://github.com/0cirius0/Subdomains-Tracker) - A notification script to help with Recon Stuff
- [bytebutcher/decoder-plus-plus](https://github.com/bytebutcher/decoder-plus-plus) - An extensible application for penetration testers and software developers to decode/encode data into various formats.
- [google/nogotofail](https://github.com/google/nogotofail) - An on-path blackbox network traffic security testing tool
- [FSecureLABS/N1QLMap](https://github.com/FSecureLABS/N1QLMap) - The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.
- [skynet0x01/tugarecon](https://github.com/skynet0x01/tugarecon) - Pentest: Subdomains enumeration tool for penetration testers.
- [ascr0b/PCWT](https://github.com/ascr0b/PCWT) -
- [apache/rocketmq-client-python](https://github.com/apache/rocketmq-client-python) - Apache RocketMQ python client
- [Ch1ngg/JCE](https://github.com/Ch1ngg/JCE) - JCE - JSP/JPSX CodeEncode - 用于 Webshell 逃避静态查杀的辅助脚本
- [evilpenguin/APKProxyHelper](https://github.com/evilpenguin/APKProxyHelper) - Patches those pesky APKs for proxy use.
- [LanikSJ/dfimage](https://github.com/LanikSJ/dfimage) - Reverse-engineer a Dockerfile from a Docker image.
- [amcai/myscan](https://github.com/amcai/myscan) - myscan 被动扫描
- [jofpin/brutto](https://github.com/jofpin/brutto) - Easy brute forcing to whatever you want - Jose Pino
- [lightspin-tech/red-kube](https://github.com/lightspin-tech/red-kube) - Red Team K8S Adversary Emulation Based on kubectl
- [samloader/samloader](https://github.com/samloader/samloader) - Download Samsung firmware from official servers
- [Rozendantz/subforce](https://github.com/Rozendantz/subforce) - A commandline forced browsing tool for subdomain lists
- [blackorbird/APT_REPORT](https://github.com/blackorbird/APT_REPORT) - Interesting APT Report Collection And Some Special IOC
- [s1kr10s/CVE-2020-14882](https://github.com/s1kr10s/CVE-2020-14882) - CVE-2020–14882 by Jang
- [LyleMi/papers](https://github.com/LyleMi/papers) - Academic papers and articles that I read related to web hacking, fuzzing, etc. / 阅读过的Web安全方向、模糊测试方向的一些论文与阅读笔记
- [withdk/pulse-secure-vpn-mitm-research](https://github.com/withdk/pulse-secure-vpn-mitm-research) - Pulse Secure VPN mitm Research - CVE-2020-8241, CVE-2020-8239
- [timwhitez/Frog-Auth](https://github.com/timwhitez/Frog-Auth) - 🐸Unauthorized Detection Framework未授权访问检测框架
- [elfarsaouiomar/monitor-new-subdomain](https://github.com/elfarsaouiomar/monitor-new-subdomain) - MNS is a security and reconnaissance tool for monitoring new subdomains
- [devanshbatham/CertEagle](https://github.com/devanshbatham/CertEagle) - Weaponizing Live CT logs for automated monitoring of assets
- [shemesh999/oregami](https://github.com/shemesh999/oregami) - IDA plugins and scripts for analyzing register usage frame
- [NetSPI/NetblockTool](https://github.com/NetSPI/NetblockTool) - Find netblocks owned by a company
- [threat9/routersploit](https://github.com/threat9/routersploit) - Exploitation Framework for Embedded Devices
- [S1lkys/CVE-2020-15906](https://github.com/S1lkys/CVE-2020-15906) - Writeup of CVE-2020-15906
- [kbandla/ImmunityDebugger](https://github.com/kbandla/ImmunityDebugger) - ImmunityDebugger
- [devoteam-cybertrust/burpcollaborator-docker](https://github.com/devoteam-cybertrust/burpcollaborator-docker) - This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate. The objective is to simplify as much as possible the
- [jiansiting/cve-2020-16898](https://github.com/jiansiting/cve-2020-16898) - PoC BSOD for CVE-2020-16898
- [suanve/recode](https://github.com/suanve/recode) - 基于python的代码审计工具
- [refraction-ray/xalpha](https://github.com/refraction-ray/xalpha) - 基金投资管理回测引擎
- [an00byss/TheCl0n3r](https://github.com/an00byss/TheCl0n3r) - TheCl0n3r will allow you to download and manage your git repositories.
- [BitTheByte/Eagle](https://github.com/BitTheByte/Eagle) - Multithreaded Plugin based vulnerability scanner for mass detection of web-based applications vulnerabilities
- [hu4wufu/CVE-2020-15227](https://github.com/hu4wufu/CVE-2020-15227) - CVE-2020-15227 exploit
- [BitTheByte/Monitorizer](https://github.com/BitTheByte/Monitorizer) - Monitoring framework to detect and report newly found subdomains on a specific target using various scanning tools
- [arbazkiraak/certstream-subdomains-monitor](https://github.com/arbazkiraak/certstream-subdomains-monitor) - Monitor subdomains with certstream
- [strikergoutham/Anti-Takeover](https://github.com/strikergoutham/Anti-Takeover) - Anti-Takeover is a sub domain monitoring tool for (blue/purple) team / internal security team which uses cloud flare. Currently Anti-Takeover monitors more than a dozen third party services for dangli
- [timwhitez/Frog-Submon](https://github.com/timwhitez/Frog-Submon) - 🐸Subdomain Monitor, 子域名监控
- [ZacharyZcR/AWD](https://github.com/ZacharyZcR/AWD) - AWD线下攻防常用Python库及集成框架
- [theLSA/burp-unauth-checker](https://github.com/theLSA/burp-unauth-checker) - burpsuite extension for check unauthorized vulnerability
- [BigFaceCat2017/frida_ssl_logger](https://github.com/BigFaceCat2017/frida_ssl_logger) - ssl_logger based on frida
- [PaperMtn/gitlab-watchman](https://github.com/PaperMtn/gitlab-watchman) - Finding exposed secrets and personal data in GitLab
- [thalesgroup-cert/Watcher](https://github.com/thalesgroup-cert/Watcher) - Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
- [SomeKirill/wordlist_generator](https://github.com/SomeKirill/wordlist_generator) - Unique wordlist generator of unique wordlists.
- [TesterlifeRaymond/doraemon](https://github.com/TesterlifeRaymond/doraemon) - Doraemon-接口自动化测试工具
- [laike9m/Cyberbrain](https://github.com/laike9m/Cyberbrain) - Python debugging, redefined.
- [Ares-X/shiro-exploit](https://github.com/Ares-X/shiro-exploit) - Shiro反序列化利用工具,支持新版本(AES-GCM)Shiro的key爆破,配合ysoserial,生成回显Payload
- [zhzyker/vulmap](https://github.com/zhzyker/vulmap) - Vulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞验证功能
- [mzfr/liffy](https://github.com/mzfr/liffy) - Local file inclusion exploitation tool
- [mame82/misc](https://github.com/mame82/misc) -
- [Cisco-Talos/DynDataResolver](https://github.com/Cisco-Talos/DynDataResolver) -
- [PCanyi/CAPEv2](https://github.com/PCanyi/CAPEv2) - Malware Configuration And Payload Extraction
- [obheda12/GitDorker](https://github.com/obheda12/GitDorker) - A Python program to scrape secrets from GitHub through usage of a large repository of dorks.
- [lexfo/rpc2socks](https://github.com/lexfo/rpc2socks) - Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.
- [honoki/bbrf-client](https://github.com/honoki/bbrf-client) - The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices
- [amygdela09/discrete-console](https://github.com/amygdela09/discrete-console) - A terminal emulator that automatically proxies commands through ProxyChains.
- [LandGrey/flink-unauth-rce](https://github.com/LandGrey/flink-unauth-rce) - exploit Apache Flink Web Dashboard unauth rce on right way by python2 scripts
- [mgeeky/tomcatWarDeployer](https://github.com/mgeeky/tomcatWarDeployer) - Apache Tomcat auto WAR deployment & pwning penetration testing tool.
- [patois/HexraysToolbox](https://github.com/patois/HexraysToolbox) - Hexrays Toolbox - Find code patterns within the Hexrays ctree
- [Wenzel/checksec.py](https://github.com/Wenzel/checksec.py) - Checksec tool in Python, Rich output. Based on LIEF
- [iphelix/pack](https://github.com/iphelix/pack) - PACK (Password Analysis and Cracking Kit)
- [sp00ks-git/hat](https://github.com/sp00ks-git/hat) - HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes during engagements. Created for Linux based systems
- [Ridter/cve-2020-0688](https://github.com/Ridter/cve-2020-0688) - cve-2020-0688
- [GainSec/GoldenNuggets-1](https://github.com/GainSec/GoldenNuggets-1) - Burp Extension for easily creating Wordlists
- [elastic/detection-rules](https://github.com/elastic/detection-rules) -
- [mxrch/GHunt](https://github.com/mxrch/GHunt) - 🕵️♂️ Offensive Google framework.
- [monkey-wenjun/get_domain_info](https://github.com/monkey-wenjun/get_domain_info) - 批量查询备案和域名解析的工具
- [PushpenderIndia/ORhunter](https://github.com/PushpenderIndia/ORhunter) - ORhunter is an Open Redirect Vulnerability Scanner which Passively Crawls URLs from 3 Sources & Then Filter Potential URLs based on Parameter Values, then finally hunt them for Unvalidated Open Redire
- [gnothiseautonlw/burp-shell-fwd-lfi](https://github.com/gnothiseautonlw/burp-shell-fwd-lfi) - A Burp Suite plugin/extension that offers a shell in Burp. Both useful for OS Command injection and LFI exploration
- [gquere/CVE-2020-7931](https://github.com/gquere/CVE-2020-7931) - Hacking Artifactory with server side template injection
- [wxq0309/fastapi](https://github.com/wxq0309/fastapi) - 基于Fastapi开发,集成Celery-redis分布式任务队列、JWT 用户系统、ElasticSearch和encode orm的基础项目模板,大家可以根据自己的需求在本模板上进行修改
- [leezp/SubdomainWash](https://github.com/leezp/SubdomainWash) - 子域名清洗工具+awvs12联动xray分布式
- [guohongze/adminset](https://github.com/guohongze/adminset) - 自动化运维平台:CMDB、CD、DevOps、资产管理、任务编排、持续交付、系统监控、运维管理、配置管理
- [er10yi/MagiCude](https://github.com/er10yi/MagiCude) - 分布式端口(漏洞)扫描、资产安全管理、实时威胁监控与通知、高效漏洞闭环、漏洞wiki、邮件报告通知、poc框架
- [matterport/Mask_RCNN](https://github.com/matterport/Mask_RCNN) - Mask R-CNN for object detection and instance segmentation on Keras and TensorFlow
- [FunnyWolf/CThun](https://github.com/FunnyWolf/CThun) - 集成快速端口扫描服务识别和暴力破解
- [bwiko/UrlAutoFire](https://github.com/bwiko/UrlAutoFire) - URLAUTOFIRE made to make your life easier, this tool allow you to browse a file of urls faster just by adding shortcut to your machine(linux)
- [AhmedConstant/BlindCrawler](https://github.com/AhmedConstant/BlindCrawler) - A tool for web crawling & content discovery
- [ihebski/db](https://github.com/ihebski/db) - Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]
- [knownsec/LBot](https://github.com/knownsec/LBot) - A simple xss bot template
- [knownsec/Minitools-bin_extractor](https://github.com/knownsec/Minitools-bin_extractor) - A simple script for quickly mining sensitive information in binary files.
- [knownsec/Minitools-CookieTest](https://github.com/knownsec/Minitools-CookieTest) - A script used to quickly test APIs or required parameters and cookies for a certain request.
- [Echocipher/Subdomain-Takeover](https://github.com/Echocipher/Subdomain-Takeover) - 一个子域名接管检测工具
- [k8gege/CVE-2019-0708](https://github.com/k8gege/CVE-2019-0708) - 3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)
- [asmjmp0/fridaMemoryAccessTrace](https://github.com/asmjmp0/fridaMemoryAccessTrace) - android memory access trace utility powered by frida framework
- [3NC0D/Powershell-Obfuscator](https://github.com/3NC0D/Powershell-Obfuscator) - Powerful script for logical obfuscation of powershell scripts
- [bb00/zer0dump](https://github.com/bb00/zer0dump) - Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.
- [fortra/impacket](https://github.com/fortra/impacket) - Impacket is a collection of Python classes for working with network protocols.
- [CERT-Polska/hfinger](https://github.com/CERT-Polska/hfinger) - Hfinger - fingerprinting HTTP requests
- [Phoenix1112/subtakeover](https://github.com/Phoenix1112/subtakeover) -
- [VoidSec/CVE-2020-1472](https://github.com/VoidSec/CVE-2020-1472) - Exploit Code for CVE-2020-1472 aka Zerologon
- [mxrch/darkshot](https://github.com/mxrch/darkshot) - Lightshot scraper on steroids with OCR.
- [httpvoid/CVE-Reverse](https://github.com/httpvoid/CVE-Reverse) -
- [sslab-gatech/freedom](https://github.com/sslab-gatech/freedom) - A DOM fuzzer
- [jtpereyda/boofuzz](https://github.com/jtpereyda/boofuzz) - A fork and successor of the Sulley Fuzzing Framework
- [gnebbia/kb](https://github.com/gnebbia/kb) - A minimalist command line knowledge base manager
- [Vu1nT0tal/IoT-vulhub](https://github.com/Vu1nT0tal/IoT-vulhub) - IoT固件漏洞复现环境
- [SecuraBV/CVE-2020-1472](https://github.com/SecuraBV/CVE-2020-1472) - Test tool for CVE-2020-1472
- [securing/DumpsterDiver](https://github.com/securing/DumpsterDiver) - Tool to search secrets in various filetypes.
- [TheNittam/RPOscanner](https://github.com/TheNittam/RPOscanner) - Relative Path Overwrite Vulnerability Scanner
- [nil0x42/cracking-utils](https://github.com/nil0x42/cracking-utils) - scripts for generating password wordlists
- [freqtrade/freqtrade](https://github.com/freqtrade/freqtrade) - Free, open source crypto trading bot
- [rudSarkar/Payloads](https://github.com/rudSarkar/Payloads) - Exploits for different vulnerabilities
- [Bitwise-01/Loki](https://github.com/Bitwise-01/Loki) - Remote Access Tool
- [sinfulz/JustTryHarder](https://github.com/sinfulz/JustTryHarder) - JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)
- [TebbaaX/Katana](https://github.com/TebbaaX/Katana) - Python Tool that gives you the ability to run Advanced Google Queries (Known as Google Dorks - Google Dorking)
- [smackerdodi/CVE-bruter](https://github.com/smackerdodi/CVE-bruter) - take a list of subdomain and the required path for specific CVE and give the response code for each url
- [arthaud/git-dumper](https://github.com/arthaud/git-dumper) - A tool to dump a git repository from a website
- [L-codes/oneshellcrack](https://github.com/L-codes/oneshellcrack) - a very very fast brute force webshell password tool
- [zeroSteiner/crimson-forge](https://github.com/zeroSteiner/crimson-forge) - Sustainable shellcode evasion
- [BishopFox/h2csmuggler](https://github.com/BishopFox/h2csmuggler) - HTTP Request Smuggling over HTTP/2 Cleartext (h2c)
- [jfarley248/MEAT](https://github.com/jfarley248/MEAT) - This toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices
- [PushpenderIndia/subdover](https://github.com/PushpenderIndia/subdover) - Subdover is a MultiThreaded Subdomain Takeover Vulnerability Scanner Written In Python3
- [d1y1n/xxetester](https://github.com/d1y1n/xxetester) - Test your XXE Payloads
- [daxAKAhackerman/XSS-Catcher](https://github.com/daxAKAhackerman/XSS-Catcher) - A blind XSS detection and XSS data capture framework
- [mrknow001/fastjson_rec_exploit](https://github.com/mrknow001/fastjson_rec_exploit) - fastjson一键命令执行
- [pyupio/safety](https://github.com/pyupio/safety) - Safety checks Python dependencies for known security vulnerabilities and suggests the proper remediations for vulnerabilities detected.
- [SAP/credential-digger](https://github.com/SAP/credential-digger) - A Github scanning tool that identifies hardcoded credentials while filtering the false positive data through machine learning models :lock:
- [aress31/jwtcat](https://github.com/aress31/jwtcat) - A CPU-based JSON Web Token (JWT) cracker and - to some extent - scanner.
- [theori-io/ctf](https://github.com/theori-io/ctf) - writeup from some ctfs
- [craighays/bucketkicker](https://github.com/craighays/bucketkicker) - Brute force AWS bucket finder
- [jordanpotti/CloudScraper](https://github.com/jordanpotti/CloudScraper) - CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.
- [Err0rzz/Attack_Defense_Framework](https://github.com/Err0rzz/Attack_Defense_Framework) - XMAN2017 结营攻防赛漏洞利用及Flag提交框架
- [mainframed/DOGECICS](https://github.com/mainframed/DOGECICS) - Doge bank expensive new COBOL front end. The retail branches are gonna love this!
- [evyatarmeged/Raccoon](https://github.com/evyatarmeged/Raccoon) - A high performance offensive security tool for reconnaissance and vulnerability scanning
- [Gerapy/Gerapy](https://github.com/Gerapy/Gerapy) - Distributed Crawler Management Framework Based on Scrapy, Scrapyd, Django and Vue.js
- [guidepointsecurity/RedCommander](https://github.com/guidepointsecurity/RedCommander) - Red Team C2 Infrastructure built in AWS using Ansible!
- [a0rtega/metame](https://github.com/a0rtega/metame) - metame is a metamorphic code engine for arbitrary executables
- [VainlyStrain/Vailyn](https://github.com/VainlyStrain/Vailyn) - A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
- [kelvinBen/iosReverseTools](https://github.com/kelvinBen/iosReverseTools) - iosReverseTools是ios逆向渗透测试辅助工具集合
- [kelvinBen/AppInfoScanner](https://github.com/kelvinBen/AppInfoScanner) - 一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
- [Chirantar7004/Android-Pentesting-Project](https://github.com/Chirantar7004/Android-Pentesting-Project) - Exploited a bank application to find vulnerabilities in the app using Drozer, IDA-Pro and X-posed framework
- [ronaldyho/hacking_Mobile](https://github.com/ronaldyho/hacking_Mobile) - Drozer scripts, Knowledge and how-tos from all over the internet - all on hacking Android
- [HackTricks-wiki/hacktricks](https://github.com/HackTricks-wiki/hacktricks) - Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
- [chriskiehl/Gooey](https://github.com/chriskiehl/Gooey) - Turn (almost) any Python command line program into a full GUI application with one line
- [w4fz5uck5/wp-file-manager-0day](https://github.com/w4fz5uck5/wp-file-manager-0day) - wp-file-manager 6.7 (Aug 2020) Wordpress Plugin 0day - Remote Code Execution
- [iSafeBlue/redis-rce](https://github.com/iSafeBlue/redis-rce) - Redis RCE 的几种方法
- [aatlasis/Pholus](https://github.com/aatlasis/Pholus) - A multicast DNS and DNS Service Discovery Security Assessment Tool
- [melbadry9/ScanApi](https://github.com/melbadry9/ScanApi) - Subdomains-enumeration, subdomain-takeover monitoring api and S3 bucket scanner.
- [7hj4/Fuzzing](https://github.com/7hj4/Fuzzing) - A simple script to guess on the website directory
- [spicesouls/spicescan](https://github.com/spicesouls/spicescan) - Fingerprinting, Port Scanning, Directory Brute Forcing, it's got it all!
- [kootenpv/gittyleaks](https://github.com/kootenpv/gittyleaks) - :droplet: Find sensitive information for a git repo
- [tenable/poc](https://github.com/tenable/poc) - Proof of Concepts
- [ztgrace/mole](https://github.com/ztgrace/mole) - Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.
- [h0ffayyy/Jira-CVE-2019-8451](https://github.com/h0ffayyy/Jira-CVE-2019-8451) - POC to check for Jira instances vulnerable to CVE-2019-8451
- [pwn0sec/PwnSSRF](https://github.com/pwn0sec/PwnSSRF) - A Python based scanner to find potential SSRF parameters in a web application.
- [AFLplusplus/Grammar-Mutator](https://github.com/AFLplusplus/Grammar-Mutator) - A grammar-based custom mutator for AFL++
- [ropnop/impacket_static_binaries](https://github.com/ropnop/impacket_static_binaries) - Standalone binaries for Linux/Windows of Impacket's examples
- [strazzere/golang_loader_assist](https://github.com/strazzere/golang_loader_assist) - Making GO reversing easier in IDA Pro
- [Rhynorater/reports](https://github.com/Rhynorater/reports) -
- [SkyBlueEternal/667788](https://github.com/SkyBlueEternal/667788) - 动态爬虫+logo识别
- [ianzhao05/textshot](https://github.com/ianzhao05/textshot) - Python tool for grabbing text via screenshot
- [gfek/Hunting-New-Registered-Domains](https://github.com/gfek/Hunting-New-Registered-Domains) - Hunting Newly Registered Domains
- [allyshka/Rogue-MySql-Server](https://github.com/allyshka/Rogue-MySql-Server) - MySQL fake server for read files of connected clients
- [quentinhardy/odat](https://github.com/quentinhardy/odat) - ODAT: Oracle Database Attacking Tool
- [darryllane/Bluto](https://github.com/darryllane/Bluto) - DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration | Compromised Account Checking
- [stanislav-web/OpenDoor](https://github.com/stanislav-web/OpenDoor) - OWASP WEB Directory Scanner
- [kangvcar/InfoSpider](https://github.com/kangvcar/InfoSpider) - INFO-SPIDER 是一个集众多数据源于一身的爬虫工具箱🧰,旨在安全快捷的帮助用户拿回自己的数据,工具代码开源,流程透明。支持数据源包括GitHub、QQ邮箱、网易邮箱、阿里邮箱、新浪邮箱、Hotmail邮箱、Outlook邮箱、京东、淘宝、支付宝、中国移动、中国联通、中国电信、知乎、哔哩哔哩、网易云音乐、QQ好友、QQ群、生成朋友圈相册、浏览器浏览历史、12306、博客园、CSDN博客、开源
- [rarecoil/unwebpack-sourcemap](https://github.com/rarecoil/unwebpack-sourcemap) - Extract uncompiled, uncompressed SPA code from Webpack source maps.
- [bkerler/android_universal](https://github.com/bkerler/android_universal) - Universal android boot to root
- [smackerdodi/http_r_code](https://github.com/smackerdodi/http_r_code) - python tool take a list of subdomains and give you the response code for each
- [BitTheByte/BitMapper](https://github.com/BitTheByte/BitMapper) - Burp-suite Extension For finding .map files
- [fO-000/bluing](https://github.com/fO-000/bluing) - An intelligence gathering tool for hacking Bluetooth
- [smackerdodi/domain-ip](https://github.com/smackerdodi/domain-ip) - this tool take a list of subdomains and give you the ip for each
- [ustayready/fireprox](https://github.com/ustayready/fireprox) - AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation
- [blackberry/pe_tree](https://github.com/blackberry/pe_tree) - Python module for viewing Portable Executable (PE) files in a tree-view using pefile and PyQt5. Can also be used with IDA Pro and Rekall to dump in-memory PE files and reconstruct imports.
- [nil0x42/phpsploit](https://github.com/nil0x42/phpsploit) - Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
- [lakemoon602/snail2.0](https://github.com/lakemoon602/snail2.0) - 批量检测敏感信息泄露
- [FunnyWolf/DarkGuardian](https://github.com/FunnyWolf/DarkGuardian) - RDP远程登录挂盘监控工具
- [cnucky/DarkGuardian](https://github.com/cnucky/DarkGuardian) - RDP远程登录挂盘监控工具
- [orleven/srcscan](https://github.com/orleven/srcscan) - SRCScan(submon) is a SRC assistant tool that periodically scans subdomains and requests WEB services on port 80/443 to check if it is available, and send result to you by e-mail.
- [kurogai/nero-phishing-server](https://github.com/kurogai/nero-phishing-server) - An full HTTP server for Phishing. Downloads recursively the entire webpage.
- [IntelligenceX/SDK](https://github.com/IntelligenceX/SDK) - Public SDK for Intelligence X
- [yzddmr6/WebCrack](https://github.com/yzddmr6/WebCrack) - WebCrack是一款web后台弱口令/万能密码批量检测工具,在工具中导入后台地址即可进行自动化检测。
- [fatihsirin/Tweettioc-Splunk-App](https://github.com/fatihsirin/Tweettioc-Splunk-App) - Tweettioc Splunk App
- [s0md3v/Parth](https://github.com/s0md3v/Parth) - Heuristic Vulnerable Parameter Scanner
- [guardicore/vmware_vcenter_cve_2020_3952](https://github.com/guardicore/vmware_vcenter_cve_2020_3952) - Exploit for CVE-2020-3952 in vCenter 6.7
- [TopScrew/CVE-2019-2725](https://github.com/TopScrew/CVE-2019-2725) - CVE-2019-2725命令回显+webshell上传+最新绕过
- [smackerdodi/get-title](https://github.com/smackerdodi/get-title) - multi threaded python tool to get pages's title
- [mazen160/server-status_PWN](https://github.com/mazen160/server-status_PWN) - A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-status instances.
- [sensepost/routopsy](https://github.com/sensepost/routopsy) - Routopsy - Hacking Routers with Routers
- [SPuerBRead/HTMLSimilarity](https://github.com/SPuerBRead/HTMLSimilarity) - 网页相似度判断:根据网页结构判断页面相似性 ,可用于相似度计算、越权检测等(Determine page similarity based on HTML page structure)
- [swimlane/soc-faker](https://github.com/swimlane/soc-faker) - A python package for use in generating fake data for SOC and security automation.
- [spacesiren/spacesiren](https://github.com/spacesiren/spacesiren) - A honey token manager and alert system for AWS.
- [VirusTotal/vt-ida-plugin](https://github.com/VirusTotal/vt-ida-plugin) - Official VirusTotal plugin for IDA Pro
- [pureqh/bypasswaf](https://github.com/pureqh/bypasswaf) - 关于安全狗和云锁的自动化绕过脚本
- [nicolas-carolo/houndsploit](https://github.com/nicolas-carolo/houndsploit) - An advanced graphical search engine for Exploit-DB
- [jfmaes/Parsers](https://github.com/jfmaes/Parsers) - parsers to make life easier
- [SkyBlueEternal/FOFA_Search_Tools](https://github.com/SkyBlueEternal/FOFA_Search_Tools) - FOFA 搜索工具 Python 版 - FOFA Search Tools | Version Python
- [mandiant/capa](https://github.com/mandiant/capa) - The FLARE team's open-source tool to identify capabilities in executable files.
- [ambionics/mt_rand-reverse](https://github.com/ambionics/mt_rand-reverse) - Script to recover mt_rand()'s seed with only two outputs and without any bruteforce.
- [Verizon/redshell](https://github.com/Verizon/redshell) - An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Optional Cobalt Strike integration pulls beacon SOCKS4/5 proxies f
- [hamoshwani/Archive-py](https://github.com/hamoshwani/Archive-py) - Customizing web archives result
- [M-Kings/WEB-shiro_rememberMe_encode_decode](https://github.com/M-Kings/WEB-shiro_rememberMe_encode_decode) - shiro rememberMe 在线加解密工具
- [smallcham/sec-admin](https://github.com/smallcham/sec-admin) - 分布式资产安全扫描核心管理系统(弱口令扫描,漏洞扫描)
- [Lonely-night/fastjson_gadgets_scanner](https://github.com/Lonely-night/fastjson_gadgets_scanner) -
- [Jewel591/xssmap](https://github.com/Jewel591/xssmap) - XSSMap 是一款基于 Python3 开发用于检测 XSS 漏洞的工具
- [kiang70/Github-Monitor](https://github.com/kiang70/Github-Monitor) - 对github新CVE,0DAY,RCE等的监控并推送到微信
- [miracle2k/k8s-snapshots](https://github.com/miracle2k/k8s-snapshots) - Automatic Volume Snapshots on Kubernetes.
- [andxyz/slack-history-export](https://github.com/andxyz/slack-history-export) - export your slack-history
- [RedSiege/C2concealer](https://github.com/RedSiege/C2concealer) - C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
- [D4Vinci/bugz-tools](https://github.com/D4Vinci/bugz-tools) - A collection of tools I wrote for bug bounty or hacking and don't mind publishing it :smile:
- [aufzayed/digit](https://github.com/aufzayed/digit) - Extract endpoints from specific Git repository for fuzzing
- [joefizz/autofindomain](https://github.com/joefizz/autofindomain) -
- [TheZ3ro/gogsownz](https://github.com/TheZ3ro/gogsownz) - Gogs CVEs
- [mnemonic-no/SNIcat](https://github.com/mnemonic-no/SNIcat) - SNIcat
- [intelowlproject/IntelOwl](https://github.com/intelowlproject/IntelOwl) - IntelOwl: manage your Threat Intelligence at scale
- [ttonys/Scrapy-CVE-CNVD](https://github.com/ttonys/Scrapy-CVE-CNVD) - 漏洞监控,基于scrapy,scrapy-redis,获取每日最新的CVE和CNVD漏洞,邮件通知
- [lwangenheim/PW_Spy](https://github.com/lwangenheim/PW_Spy) -
- [cr0hn/rsm](https://github.com/cr0hn/rsm) - Redis Security Map - Anti-hacking for Redis
- [Lucifer1993/TPscan](https://github.com/Lucifer1993/TPscan) - 一键ThinkPHP漏洞检测
- [serain/bbrecon](https://github.com/serain/bbrecon) - Python library and CLI for the Bug Bounty Recon API
- [cr0hn/festin](https://github.com/cr0hn/festin) - FestIn - Open S3 Bucket Scanner
- [admintony/shiro_rememberMe_Rce](https://github.com/admintony/shiro_rememberMe_Rce) - 利用长亭xray高级版的回显Gadget重写的一个shiro反序列化利用工具。
- [xer0times/SQLi-Query-Tampering](https://github.com/xer0times/SQLi-Query-Tampering) - SQLi Query Tampering extends and adds custom Payload Generator/Processor in Burp Suite's Intruder. This extension gives you the flexibility of manual testing with many powerful evasion techniques.
- [arno567/ShiroScanF](https://github.com/arno567/ShiroScanF) - shiro反序列化批量ip快速检测脚本
- [chenjj/espoofer](https://github.com/chenjj/espoofer) - An email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures.🍻
- [r35tart/GetIPinfo](https://github.com/r35tart/GetIPinfo) - 用于寻找多网卡主机方便内网跨网段渗透避免瞎打找不到核心网
- [Hxzeroone/quoted-printable-Parser](https://github.com/Hxzeroone/quoted-printable-Parser) - A Burp Suite extension to parse Content-Transfer-Encoding: quoted-printable emails received in Burpcollaborator's SMTP
- [theLSA/f5-bigip-rce-cve-2020-5902](https://github.com/theLSA/f5-bigip-rce-cve-2020-5902) - F5 BIG-IP RCE CVE-2020-5902 automatic check tool
- [donot-wong/dnslog](https://github.com/donot-wong/dnslog) - weblog/dnslog平台 Docker容器化部署
- [yzddmr6/cmd2bx](https://github.com/yzddmr6/cmd2bx) - 把jsp的cmdshell升级为冰蝎一句话
- [7hang/Fuzz_dic](https://github.com/7hang/Fuzz_dic) - 参数 | 字典 collections
- [microsoft/MSRC-Security-Research](https://github.com/microsoft/MSRC-Security-Research) - Security Research from the Microsoft Security Response Center (MSRC)
- [codingo/Interlace](https://github.com/codingo/Interlace) - Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
- [Ciphey/Ciphey](https://github.com/Ciphey/Ciphey) - ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
- [sv3nbeast/X-Fofa](https://github.com/sv3nbeast/X-Fofa) - Fofa的API快速调用,使用了一些小Tips,自用勿传
- [wnma3mz/wechat_articles_spider](https://github.com/wnma3mz/wechat_articles_spider) - 微信公众号文章的爬虫
- [0neOfU4/spider_butian_src](https://github.com/0neOfU4/spider_butian_src) - Spider of butian src
- [Cynthrial/butian_urls](https://github.com/Cynthrial/butian_urls) - 补天公益厂商域名列表
- [cwkiller/unauthorized-check](https://github.com/cwkiller/unauthorized-check) - 扫描常见未授权访问(redis、mongodb、memcached、elasticsearch、zookeeper、ftp、CouchDB、docker、Hadoop)
- [L-codes/Neo-reGeorg](https://github.com/L-codes/Neo-reGeorg) - Neo-reGeorg is a project that seeks to aggressively refactor reGeorg
- [ox01024/Xray_and_crwlergo_in_server](https://github.com/ox01024/Xray_and_crwlergo_in_server) - 雇一位免费的360工程师和一位长亭工程师为你挖洞,还有听话的server酱给你汇报
- [fasalmbt/reconme](https://github.com/fasalmbt/reconme) - Recon tool
- [ac0d3r/WebHunt](https://github.com/ac0d3r/WebHunt) - A command line tool for analyzing web components for security testing. 𒈯
- [aatlasis/cve_manager](https://github.com/aatlasis/cve_manager) - A python script that a) parses NIST NVD CVEs, b) prcoesses and exports them to CSV files, c) creates a postgres database and imports all the data in it, d) provides query capabilities for this CVEs da
- [0x5ECF4ULT/CVE-2020-3452](https://github.com/0x5ECF4ULT/CVE-2020-3452) - CVE-2020-3452 exploit
- [D4Vinci/CWFF](https://github.com/D4Vinci/CWFF) - Create your Custom Wordlist For Fuzzing
- [repnz/ida-plugins](https://github.com/repnz/ida-plugins) - A collection of my IDA plugins
- [ggolawski/CVE-2020-9495](https://github.com/ggolawski/CVE-2020-9495) -
- [momosecurity/mosec-pip-plugin](https://github.com/momosecurity/mosec-pip-plugin) - 用于检测python项目的第三方依赖组件是否存在安全漏洞。
- [momosecurity/mosec-x-plugin-backend](https://github.com/momosecurity/mosec-x-plugin-backend) - MOSEC-X-PLUGIN 后端API服务
- [arxsys/dff](https://github.com/arxsys/dff) - DFF (Digital Forensics Framework) is a Forensics Framework coming with command line and graphical interfaces. DFF can be used to investigate hard drives and volatile memory and create reports about us
- [AngelSecurityTeam/RapidPayload](https://github.com/AngelSecurityTeam/RapidPayload) - Framework RapidPayload - Metasploit Payload Generator | Crypter FUD AntiVirus Evasion
- [knassar702/pmg](https://github.com/knassar702/pmg) - Extract parameters/paths from urls
- [ShielderSec/CVE-2020-11579](https://github.com/ShielderSec/CVE-2020-11579) - Exploit code for CVE-2020-11579, an arbitrary file disclosure through the MySQL client in PHPKB
- [test502git/awvs14-scan](https://github.com/test502git/awvs14-scan) - 针对 Acunetix AWVS扫描器开发的批量扫描脚本,支持log4j漏洞、SpringShell、SQL注入、XSS、弱口令等专项,支持联动xray、burp、w13scan等被动批量
- [alexhude/uEmu](https://github.com/alexhude/uEmu) - Tiny cute emulator plugin for IDA based on unicorn.
- [skelsec/jackdaw](https://github.com/skelsec/jackdaw) - gather gather gather
- [jipegit/dfir-ioc-ut](https://github.com/jipegit/dfir-ioc-ut) - DFIR IoC Unit Testing
- [PortSwigger/lightbulb-framework](https://github.com/PortSwigger/lightbulb-framework) - Tools for auditing WAFS
- [coco413/DiscoverPort](https://github.com/coco413/DiscoverPort) - 轻量化端口扫描工具
- [SkyoKen/RasCon_NS](https://github.com/SkyoKen/RasCon_NS) - Connect to Nintendo Switch over Bluetooth, emulate amiibo and use script from the web.(蓝牙连接Nintendo Switch,并可通过网页控制和使用脚本与amiibo)
- [s1kr10s/BurpFuzz](https://github.com/s1kr10s/BurpFuzz) -
- [vi3k6i5/flashtext](https://github.com/vi3k6i5/flashtext) - Extract Keywords from sentence or Replace keywords in sentences.
- [jas502n/Shiro_Xray](https://github.com/jas502n/Shiro_Xray) - CommonsBeanutils1,CommonsCollectionsK1
- [ksharinarayanan/SourceWolf](https://github.com/ksharinarayanan/SourceWolf) - Amazingly fast response crawler to find juicy stuff in the source code! 😎🔥
- [MIMAZHAN/PVD-HACK](https://github.com/MIMAZHAN/PVD-HACK) - 自动化越权检测PVD
- [PR3R00T/CVE-2020-3452-Cisco-Scanner](https://github.com/PR3R00T/CVE-2020-3452-Cisco-Scanner) - CVE-2020-3452 Cisco ASA Scanner -unauth Path Traversal Check
- [esecuritylab/kostebek](https://github.com/esecuritylab/kostebek) -
- [virt-manager/virt-manager](https://github.com/virt-manager/virt-manager) - Desktop tool for managing virtual machines via libvirt
- [ra1nb0rn/avain](https://github.com/ra1nb0rn/avain) - A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
- [smackerdodi/cidr2ip](https://github.com/smackerdodi/cidr2ip) - take a list of CIDR and the output is ip list of these CIDR
- [wetw0rk/CA-UIM-Nimbus-Research](https://github.com/wetw0rk/CA-UIM-Nimbus-Research) - Vulnerability research on the CA UIM Nimbus protocol
- [google/clusterfuzz](https://github.com/google/clusterfuzz) - Scalable fuzzing infrastructure.
- [utkusen/jeopardize](https://github.com/utkusen/jeopardize) - a low(zero) cost threat intelligence&response tool against phishing domains
- [abhinavsingh/proxy.py](https://github.com/abhinavsingh/proxy.py) - 💫 Ngrok FRP Alternative • ⚡ Fast • 🪶 Lightweight • 0️⃣ Dependency • 🔌 Pluggable • 😈 TLS interception • 🔒 DNS-over-HTTPS • 🔥 Poor Man's VPN • ⏪ Reverse & ⏩ Forward • 👮🏿 "Proxy Server" framework • 🌐 "We
- [00theway/Ghostcat-CNVD-2020-10487](https://github.com/00theway/Ghostcat-CNVD-2020-10487) - Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938)
- [aydinnyunus/Keylogger](https://github.com/aydinnyunus/Keylogger) - Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
- [PostHog/posthog](https://github.com/PostHog/posthog) - 🦔 PostHog provides open-source product analytics, session recording, feature flagging and A/B testing that you can self-host.
- [WithSecureLabs/captcha22](https://github.com/WithSecureLabs/captcha22) - CAPTCHA22 is a toolset for building, and training, CAPTCHA cracking models using neural networks.
- [davidson679/Bypass-Web-Application-Firewalls](https://github.com/davidson679/Bypass-Web-Application-Firewalls) - Bypassing-Web-Application-Firewalls-And-XSS-Filters A series of python scripts for generating weird character combinations and lists for BurpSuite Pro for bypassing web application firewalls (WAF) an
- [mhaskar/CVE-2020-14947](https://github.com/mhaskar/CVE-2020-14947) - The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947
- [jiushill/powershell_c2](https://github.com/jiushill/powershell_c2) - powershell and py -> c2
- [redhuntlabs/BurpSuite-Asset_History](https://github.com/redhuntlabs/BurpSuite-Asset_History) -
- [redhuntlabs/BurpSuite-Asset_Discover](https://github.com/redhuntlabs/BurpSuite-Asset_Discover) - Burp Suite extension to discover assets from HTTP response.
- [sweetsoftware/Ares](https://github.com/sweetsoftware/Ares) - Python botnet and backdoor
- [yakuza8/peniot](https://github.com/yakuza8/peniot) - PENIOT: Penetration Testing Tool for IoT
- [r0075h3ll/Oralyzer](https://github.com/r0075h3ll/Oralyzer) - Open Redirection Analyzer
- [duc-nt/CVE-2020-6287-exploit](https://github.com/duc-nt/CVE-2020-6287-exploit) - PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Original Metasploit PR module: https://github.com/rapid7/metasplo
- [rabbitmask/SB-Actuator](https://github.com/rabbitmask/SB-Actuator) - Spring Boot Actuator未授权访问【XXE、RCE】单/多目标检测
- [BeWhoYouWantToBe/ShellScan](https://github.com/BeWhoYouWantToBe/ShellScan) -
- [404notf0und/CVE-Flow](https://github.com/404notf0und/CVE-Flow) - CVE Data Analysis, CVE Monitor, CVE EXP Prediction Based on Deep Learning. 1999-2020年存量CVE数据分析、监控CVE增量更新、基于深度学习的CVE EXP预测和自动化推送
- [Tib3rius/AutoRecon](https://github.com/Tib3rius/AutoRecon) - AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
- [twelvesec/rootend](https://github.com/twelvesec/rootend) - A *nix Enumerator & Auto Privilege Escalation tool.
- [mrh0wl/Cloudmare](https://github.com/mrh0wl/Cloudmare) - Cloudflare, Sucuri, Incapsula real IP tracker.
- [A-YATTA/AMDH](https://github.com/A-YATTA/AMDH) - Android Mobile Device Hardening
- [GoonSecurity/EAN_CLI](https://github.com/GoonSecurity/EAN_CLI) - Tool to find leaked tokens in JavaScript
- [snooppr/snoop](https://github.com/snooppr/snoop) - Snoop — инструмент разведки на основе открытых данных (OSINT world)
- [saucer-man/Hscan](https://github.com/saucer-man/Hscan) - Host scan:Host vulnerability scan主机漏洞扫描
- [capture0x/XSS-LOADER](https://github.com/capture0x/XSS-LOADER) - Xss Payload Generator ~ Xss Scanner ~ Xss Dork Finder
- [timfrazier1/AdversarySimulation](https://github.com/timfrazier1/AdversarySimulation) - Compilation of resources to help with Adversary Simulation automation harness
- [ShiftLeftSecurity/sast-scan](https://github.com/ShiftLeftSecurity/sast-scan) - Scan is a free & Open Source DevSecOps tool for performing static analysis based security testing of your applications and its dependencies. CI and Git friendly.
- [jas502n/CVE-2020-8193](https://github.com/jas502n/CVE-2020-8193) - Citrix ADC Vulns
- [Barriuso/SMBGhost_AutomateExploitation](https://github.com/Barriuso/SMBGhost_AutomateExploitation) - SMBGhost (CVE-2020-0796) Automate Exploitation and Detection
- [Healdb/Gather](https://github.com/Healdb/Gather) - URL Screenshot Utility
- [GrrrDog/weird_proxies](https://github.com/GrrrDog/weird_proxies) - Reverse proxies cheatsheet
- [0x0mar/smod](https://github.com/0x0mar/smod) - MODBUS Penetration Testing Framework
- [tmasto/nike-deobfuscator](https://github.com/tmasto/nike-deobfuscator) - Script for libnike-obfuscator
- [google/turbinia](https://github.com/google/turbinia) - Automation and Scaling of Digital Forensics Tools
- [noperator/panos-scanner](https://github.com/noperator/panos-scanner) - Determine the Palo Alto PAN-OS software version of a remote GlobalProtect portal or management interface.
- [madhavmehndiratta/dorkScanner](https://github.com/madhavmehndiratta/dorkScanner) - A typical search engine dork scanner scrapes search engines with dorks that you provide in order to find vulnerable URLs.
- [mzfr/slicer](https://github.com/mzfr/slicer) - A tool to automate the boring process of APK recon
- [knassar702/scant3r](https://github.com/knassar702/scant3r) - ScanT3r - Module based Bug Bounty Automation Tool ( use Lotus instead github.com/bugBlocker/lotus )
- [byt3bl33d3r/WitnessMe](https://github.com/byt3bl33d3r/WitnessMe) - Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to make life easier.
- [JaidedAI/EasyOCR](https://github.com/JaidedAI/EasyOCR) - Ready-to-use OCR with 80+ supported languages and all popular writing scripts including Latin, Chinese, Arabic, Devanagari, Cyrillic and etc.
- [robre/jsmon](https://github.com/robre/jsmon) - a javascript change monitoring tool for bugbounties
- [Z4nzu/hackingtool](https://github.com/Z4nzu/hackingtool) - ALL IN ONE Hacking Tool For Hackers
- [Ch0pin/medusa](https://github.com/Ch0pin/medusa) - Binary instrumentation framework based on FRIDA
- [daeken/httprebind](https://github.com/daeken/httprebind) - Automatic tool for DNS rebinding-based SSRF attacks
- [sorokinpf/ApiWordlistGenerator](https://github.com/sorokinpf/ApiWordlistGenerator) - Generate wordlists for fuzzing API method names
- [minimaxir/big-list-of-naughty-strings](https://github.com/minimaxir/big-list-of-naughty-strings) - The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
- [devanshbatham/FavFreak](https://github.com/devanshbatham/FavFreak) - Making Favicon.ico based Recon Great again !
- [IncideDigital/Mistica](https://github.com/IncideDigital/Mistica) - An open source swiss army knife for arbitrary communication over application protocols
- [qsecure-labs/overlord](https://github.com/qsecure-labs/overlord) - Overlord - Red Teaming Infrastructure Automation
- [microsoft/msticpy](https://github.com/microsoft/msticpy) - Microsoft Threat Intelligence Security Tools
- [s-tip/stip-common](https://github.com/s-tip/stip-common) - Seamless Threat Intelligence Platform
- [Marten4n6/EvilOSX](https://github.com/Marten4n6/EvilOSX) - An evil RAT (Remote Administration Tool) for macOS / OS X.
- [orleven/Tentacle](https://github.com/orleven/Tentacle) - Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It supports calls to zoomeye, fofa, shodan and other APIs to perform bu
- [alfiopuglisi/guietta](https://github.com/alfiopuglisi/guietta) -
- [ShawnDEvans/smbmap](https://github.com/ShawnDEvans/smbmap) - SMBMap is a handy SMB enumeration tool
- [0ang3el/aem-hacker](https://github.com/0ang3el/aem-hacker) -
- [Bl1nnnk/kAFL](https://github.com/Bl1nnnk/kAFL) - Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels
- [dtmsecurity/bof_helper](https://github.com/dtmsecurity/bof_helper) - Beacon Object File (BOF) Creation Helper
- [josh0xA/Espionage](https://github.com/josh0xA/Espionage) - A Linux Packet Sniffing Suite for Automated MiTM Attacks
- [Matrix07ksa/EvilNet](https://github.com/Matrix07ksa/EvilNet) - Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../
- [mufeedvh/basecrack](https://github.com/mufeedvh/basecrack) - Decode All Bases - Base Scheme Decoder
- [majksec/grom](https://github.com/majksec/grom) - Http/Https multi threading checker
- [Stu2014/scan](https://github.com/Stu2014/scan) - 自用脚本 欢迎star
- [RhinoSecurityLabs/pacu](https://github.com/RhinoSecurityLabs/pacu) - The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
- [JE2Se/J2ExpSuite](https://github.com/JE2Se/J2ExpSuite) - 一个以python3编写的的漏洞检测框架,可自定义,添加poc,exp,,不需要修改其他内容,只需要编写POC自动执行检测
- [dhondta/dronesploit](https://github.com/dhondta/dronesploit) - Drone pentesting framework console
- [google/python-adb](https://github.com/google/python-adb) - Python ADB + Fastboot implementation
- [chopicalqui/TurboDataMiner](https://github.com/chopicalqui/TurboDataMiner) - The objective of this Burp Suite extension is the flexible and dynamic extraction, correlation, and structured presentation of information from the Burp Suite project as well as the flexible and dynam
- [login-securite/lsassy](https://github.com/login-securite/lsassy) - Extract credentials from lsass remotely
- [dhondta/webgrep](https://github.com/dhondta/webgrep) - Grep Web pages with extra features like JS deobfuscation and OCR
- [PerezMascato/URLCADIZ](https://github.com/PerezMascato/URLCADIZ) - A simple script to generate a hidden url for social engineering.
- [m4ll0k/BBTz](https://github.com/m4ll0k/BBTz) - BBT - Bug Bounty Tools (examples💡)
- [encoderlee/android_tools](https://github.com/encoderlee/android_tools) - some useful tools for android reverse engineer
- [lgandx/PCredz](https://github.com/lgandx/PCredz) - This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.
- [ozguralp/gmapsapiscanner](https://github.com/ozguralp/gmapsapiscanner) -
- [Tribler/tribler](https://github.com/Tribler/tribler) - Privacy enhanced BitTorrent client with P2P content discovery
- [aldo-moreno-leon/ORtester](https://github.com/aldo-moreno-leon/ORtester) - Open Redirect scanner - (out of date)
- [TRSTN4/EagleShell](https://github.com/TRSTN4/EagleShell) - EagleShell is a high-quality tool that aims to improve your pentest.
- [hugsy/gef](https://github.com/hugsy/gef) - GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
- [NickstaDB/patch-apk](https://github.com/NickstaDB/patch-apk) - Wrapper to inject an Objection/Frida gadget into an APK, with support for app bundles/split APKs.
- [sidaf/scripts](https://github.com/sidaf/scripts) - Some useful scripts I have written or collected
- [Emoe/OpenBugBounty-Scrapper](https://github.com/Emoe/OpenBugBounty-Scrapper) - This script scrapes the list of open Bug Bounty Programs from openbugbounty.org
- [EdOverflow/can-i-take-over-xyz](https://github.com/EdOverflow/can-i-take-over-xyz) - "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
- [ritiksahni/ASN-Eagle](https://github.com/ritiksahni/ASN-Eagle) - A tool to discover ASN of any host and fetch IP ranges.
- [orlyjamie/asnrecon](https://github.com/orlyjamie/asnrecon) - ASN reconnaissance script
- [wgpsec/urlscan](https://github.com/wgpsec/urlscan) - 一款url快速检测工具,能够根据关键词搜索域名信息、快速获取url信息 来自Plat狼组安全平台
- [schenkd/nginx-ui](https://github.com/schenkd/nginx-ui) - Nginx UI allows you to access and modify the nginx configurations files without cli.
- [moyuwa/0sec-search](https://github.com/moyuwa/0sec-search) - 新版零组资料文库离线漏洞名搜索,功能:更新 、查询 (不包含漏洞详情)
- [Knowledge-Wisdom-Understanding/recon](https://github.com/Knowledge-Wisdom-Understanding/recon) - Enumerate a target Based off of Nmap Results
- [caffeinedoom/Subvenkon](https://github.com/caffeinedoom/Subvenkon) - Subvenkon is a subdomain enumerator from Venkon
- [7hj4/Brute-force-otp](https://github.com/7hj4/Brute-force-otp) - Brute force otp on has no rate limit
- [alwentiu/COVIDSafe-CVE-2020-12856](https://github.com/alwentiu/COVIDSafe-CVE-2020-12856) - A bluetooth-related vulnerability in some contact tracing apps
- [MisakiKata/python_code_audit](https://github.com/MisakiKata/python_code_audit) - python 代码审计项目
- [fellchase/flumberboozle](https://github.com/fellchase/flumberboozle) - Suite of programs meant to aid in bug hunting and security assessments
- [OTRF/bloodhound-notebook](https://github.com/OTRF/bloodhound-notebook) - BloodHound Cypher Queries Ported to a Jupyter Notebook
- [jstrosch/Username_Generator](https://github.com/jstrosch/Username_Generator) - A Burp Extension that parses emails from HTTP content and can optionally generate usernames.
- [dariusztytko/vhosts-sieve](https://github.com/dariusztytko/vhosts-sieve) - Searching for virtual hosts among non-resolvable domains
- [inforion/idapython-cheatsheet](https://github.com/inforion/idapython-cheatsheet) - Scripts and cheatsheets for IDAPython
- [lengjibo/RedTeamTools](https://github.com/lengjibo/RedTeamTools) - 记录自己编写、修改的部分工具
- [SofianeHamlaoui/Lockdoor-Framework](https://github.com/SofianeHamlaoui/Lockdoor-Framework) - 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
- [hluwa/Wallbreaker](https://github.com/hluwa/Wallbreaker) - 🔨 Break Java Reverse Engineering form Memory World!
- [christophetd/CloudFlair](https://github.com/christophetd/CloudFlair) - 🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.
- [zzwlpx/weblogicPoc](https://github.com/zzwlpx/weblogicPoc) - Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。
- [xiaoheiwo/GGSCAN](https://github.com/xiaoheiwo/GGSCAN) - 一款渗透时快速资产探测工具
- [Lucifer1993/SatanSword](https://github.com/Lucifer1993/SatanSword) - 红队综合渗透框架
- [FunnyWolf/pystinger](https://github.com/FunnyWolf/pystinger) - Bypass firewall for traffic forwarding using webshell 一款使用webshell进行流量转发的出网工具
- [JehadAlqurashi/BlackDir-Framework](https://github.com/JehadAlqurashi/BlackDir-Framework) - Web Application Vulnerability Scanner
- [immunityinc/bravestarr](https://github.com/immunityinc/bravestarr) - Fedora 31 netkit-telnet-0.17 telnetd remote exploit
- [vsec7/BurpSuite-Xkeys](https://github.com/vsec7/BurpSuite-Xkeys) - A Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.
- [kingkaki/ctf-wscan](https://github.com/kingkaki/ctf-wscan) - 为ctf而生的web扫描器
- [qiygan/fofa-dump](https://github.com/qiygan/fofa-dump) - Fofa Pro Api下载工具
- [CERTCC/PoC-Exploits](https://github.com/CERTCC/PoC-Exploits) - Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.
- [yassineaboukir/Asnlookup](https://github.com/yassineaboukir/Asnlookup) - Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
- [lucky-luk3/Grafiki](https://github.com/lucky-luk3/Grafiki) - Threat Hunting tool about Sysmon and graphs
- [amazigh-kil3r/Reconkil3r](https://github.com/amazigh-kil3r/Reconkil3r) - Script Recon Bug Bounty
- [vaguileradiaz/tinfoleak](https://github.com/vaguileradiaz/tinfoleak) - The most complete open-source tool for Twitter intelligence analysis
- [Jumbo-WJB/burp_find_shiro](https://github.com/Jumbo-WJB/burp_find_shiro) - 通过burp代理流量寻找shiro站点
- [defparam/tiscripts](https://github.com/defparam/tiscripts) - Turbo Intruder Scripts
- [rndinfosecguy/Scavenger](https://github.com/rndinfosecguy/Scavenger) - Crawler (Bot) searching for credential leaks on paste sites.
- [mlgualtieri/NTLMRawUnHide](https://github.com/mlgualtieri/NTLMRawUnHide) - NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The following binary network packet capture formats are supported:
- [defparam/smuggler](https://github.com/defparam/smuggler) - Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3
- [bigb0sss/RedTeam-OffensiveSecurity](https://github.com/bigb0sss/RedTeam-OffensiveSecurity) - Tools & Interesting Things for RedTeam Ops
- [WYSyyyyyy/vulnReport](https://github.com/WYSyyyyyy/vulnReport) - 安服自动化脚本:包括 Nessus、天境主机漏洞扫描6.0、APPscan、awvs等漏洞报告的整理,Google翻译等
- [jamf/CVE-2020-0796-RCE-POC](https://github.com/jamf/CVE-2020-0796-RCE-POC) - CVE-2020-0796 Remote Code Execution POC
- [Yezz123-Archive/tools](https://github.com/Yezz123-Archive/tools) - Install Nmap/Hydra/SQLMap/Metasploit & others on your device :rocket:
- [p1g3/Fastjson-Scanner](https://github.com/p1g3/Fastjson-Scanner) - a burp extension to find where use fastjson
- [deadjakk/patch-checker](https://github.com/deadjakk/patch-checker) - Web-based check for Windows privesc vulnerabilities
- [zeropwn/spyse.py](https://github.com/zeropwn/spyse.py) - Python API wrapper and command-line client for the tools hosted on spyse.com.
- [ggg4566/SQLEXP](https://github.com/ggg4566/SQLEXP) - SQL 注入利用工具,存在waf的情况下自定义编写tamper脚本 dump数据
- [omergunal/Attacker-Group-Predictor](https://github.com/omergunal/Attacker-Group-Predictor) - Tool to predict attacker groups from the techniques and software used
- [kholia/OSX-KVM](https://github.com/kholia/OSX-KVM) - Run macOS on QEMU/KVM. With OpenCore + Monterey + Ventura + Sonoma support now! Only commercial (paid) support is available now to avoid spammy issues. No Mac system is required.
- [sukabuliet/ThinkphpRCE](https://github.com/sukabuliet/ThinkphpRCE) - Thinkphp rce扫描脚本,附带日志扫描
- [grayddq/ScanCVE](https://github.com/grayddq/ScanCVE) - 监控github上CVE增量,并发送微信通知
- [s0md3v/hardcodes](https://github.com/s0md3v/hardcodes) - find hardcoded strings from source code
- [Sentinel-One/CobaltStrikeParser](https://github.com/Sentinel-One/CobaltStrikeParser) -
- [windy-purple/AndroidManifestCheck](https://github.com/windy-purple/AndroidManifestCheck) - AndroidManifest.xml文件校验工具
- [Talkaboutcybersecurity/GitMonitor](https://github.com/Talkaboutcybersecurity/GitMonitor) - One way to continuously monitor sensitive information that could be exposed on Github
- [justcatthefish/ctf-writeups](https://github.com/justcatthefish/ctf-writeups) - CTF write-ups
- [Cillian-Collins/subscraper](https://github.com/Cillian-Collins/subscraper) - Reconnaissance tool which scans javascript files for subdomains and then iterates over all javascript files hosted on subsequent subdomains to enumerate a list of subdomains for a given URL.
- [fnmsd/MySQL_Fake_Server](https://github.com/fnmsd/MySQL_Fake_Server) - MySQL Fake Server use to help MySQL Client File Reading and JDBC Client Java Deserialize
- [nian-hua/BurpExtender](https://github.com/nian-hua/BurpExtender) -
- [chompie1337/SMBGhost_RCE_PoC](https://github.com/chompie1337/SMBGhost_RCE_PoC) -
- [zxcvbn001/password_brute_dictionary](https://github.com/zxcvbn001/password_brute_dictionary) - 口令爆破字典,有键盘组合字典、拼音字典、字母与数字混合这三种类型
- [byt3bl33d3r/SprayingToolkit](https://github.com/byt3bl33d3r/SprayingToolkit) - Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
- [ninoseki/shodan-dojo](https://github.com/ninoseki/shodan-dojo) - Learning Shodan through katas
- [samuelcolvin/python-devtools](https://github.com/samuelcolvin/python-devtools) - Dev tools for python
- [blackarrowsec/pivotnacci](https://github.com/blackarrowsec/pivotnacci) - A tool to make socks connections through HTTP agents
- [EntySec/Ghost](https://github.com/EntySec/Ghost) - Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
- [facebook/chisel](https://github.com/facebook/chisel) - Chisel is a collection of LLDB commands to assist debugging iOS apps.
- [lanmaster53/recon-ng](https://github.com/lanmaster53/recon-ng) - Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.
- [rbsec/dnscan](https://github.com/rbsec/dnscan) -
- [JLospinoso/unfurl](https://github.com/JLospinoso/unfurl) - An Entropy-Based Link Vulnerability Tool
- [maaaaz/webscreenshot](https://github.com/maaaaz/webscreenshot) - A simple script to screenshot a list of websites
- [nahamsec/JSParser](https://github.com/nahamsec/JSParser) -
- [threatexpress/edc](https://github.com/threatexpress/edc) - Event Data Collector
- [artssec/burp-exporter](https://github.com/artssec/burp-exporter) - Exporter is a Burp Suite extension to copy a request to a file or the clipboard as multiple programming languages functions.
- [dwisiswant0/apkleaks](https://github.com/dwisiswant0/apkleaks) - Scanning APK file for URIs, endpoints & secrets.
- [rishuranjanofficial/JWTweak](https://github.com/rishuranjanofficial/JWTweak) - Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.
- [c0dejump/HawkScan](https://github.com/c0dejump/HawkScan) - Security Tool for Reconnaissance and Information Gathering on a website. (python 3.x)
- [daeken/SSRFTest](https://github.com/daeken/SSRFTest) - SSRF testing tool
- [oddcod3/Phantom-Evasion](https://github.com/oddcod3/Phantom-Evasion) - Python antivirus evasion tool
- [guimaizi/testing_wave](https://github.com/guimaizi/testing_wave) -
- [HexNio/ssl_pinning_remover](https://github.com/HexNio/ssl_pinning_remover) - An Android SSL Pinning Remover tool for Security research and Bug Bounty
- [mitre-attack/joystick](https://github.com/mitre-attack/joystick) - Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances in the results.
- [r35tart/RedisWriteFile](https://github.com/r35tart/RedisWriteFile) - 通过 Redis 主从写出无损文件
- [MuhammadKhizerJaved/Insecure-Firebase-Exploit](https://github.com/MuhammadKhizerJaved/Insecure-Firebase-Exploit) - A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the app have set the security rules as true for both "read" & "write
- [devcoinfet/Static_Analysis.py](https://github.com/devcoinfet/Static_Analysis.py) - My stab at some basic static analysis needs allot of work but works on things like yahoo.com etc may need better requests handling to dodge waf's
- [0xKira/api_palette](https://github.com/0xKira/api_palette) - A code-searching/completion tool, for IDA APIs
- [3gstudent/Worse-PDF](https://github.com/3gstudent/Worse-PDF) - Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.
- [wrlu/SecurityBulletinPush](https://github.com/wrlu/SecurityBulletinPush) - Security bulletin pulling tools
- [5alt/ssl_logger](https://github.com/5alt/ssl_logger) - Decrypts and logs a process's SSL traffic.
- [Macr0phag3/email_hack](https://github.com/Macr0phag3/email_hack) - A email bomb/fake email tool, by Python
- [utkusen/shotlooter](https://github.com/utkusen/shotlooter) - a recon tool that finds sensitive data inside the screenshots uploaded to prnt.sc
- [EveYen/Injection_Test](https://github.com/EveYen/Injection_Test) - Command injection extension for Burpsuite
- [misskiki/MysqlLogmonitor](https://github.com/misskiki/MysqlLogmonitor) - 代码审计辅助工具
- [xmsec/redis-ssrf](https://github.com/xmsec/redis-ssrf) - redis ssrf gopher generater & redis ssrf to rce by master-slave-sync
- [madhuakula/aws-iam-analyser](https://github.com/madhuakula/aws-iam-analyser) - AWS IAM Analysis utility to gather entire useful information from an AWS account
- [Azure/Stormspotter](https://github.com/Azure/Stormspotter) - Azure Red Team tool for graphing Azure and Azure Active Directory objects
- [zsdlove/ApkVulCheck](https://github.com/zsdlove/ApkVulCheck) - This is a tool to help androidcoder to check the flaws in their projects.
- [aufzayed/HydraRecon](https://github.com/aufzayed/HydraRecon) - All In One, Fast, Easy Recon Tool
- [hluwa/frida-dexdump](https://github.com/hluwa/frida-dexdump) - A frida tool to dump dex in memory to support security engineers analyzing malware.
- [Meteorix/airtest-douyin](https://github.com/Meteorix/airtest-douyin) -
- [jcesarstef/dotdotslash](https://github.com/jcesarstef/dotdotslash) - Search for Directory Traversal Vulnerabilities
- [Zarcolio/sitedorks](https://github.com/Zarcolio/sitedorks) - Search Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term (dork) with a default set of websites, bug bounty programs or custom collection.
- [DissectMalware/XLMMacroDeobfuscator](https://github.com/DissectMalware/XLMMacroDeobfuscator) - Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)
- [alexMyG/AndroPyTool](https://github.com/alexMyG/AndroPyTool) - A framework for automated extraction of static and dynamic features from Android applications
- [Zarcolio/wwwordlist](https://github.com/Zarcolio/wwwordlist) - Wwwordlist is a wordlist generator for pentesters and bug bounty hunters. It extracts words from HTML, URLs, JS/HTTP/input variables, quoted texts in the text and mail files in order to generate wordl
- [m57/dnsteal](https://github.com/m57/dnsteal) - DNS Exfiltration tool for stealthily sending files over DNS requests.
- [Skyscanner/whispers](https://github.com/Skyscanner/whispers) - Identify hardcoded secrets in static structured text
- [ReddyyZ/URLBrute-Py](https://github.com/ReddyyZ/URLBrute-Py) - Tool to brute website sub-domains and dirs.
- [BetterDefender/AwvsBatchImport](https://github.com/BetterDefender/AwvsBatchImport) - AWVS12&AWVS13 通用API批量导入脚本 AWVS12 & AWVS13 common API batch import script.
- [sibears/IDAGolangHelper](https://github.com/sibears/IDAGolangHelper) - Set of IDA Pro scripts for parsing GoLang types information stored in compiled binary
- [CTF-MissFeng/Watchdog](https://github.com/CTF-MissFeng/Watchdog) - Watchdog是bayonet修改版,重新优化了数据库及web及扫描程序,加入多节点
- [PlumHound/PlumHound](https://github.com/PlumHound/PlumHound) - Bloodhound Reporting for Blue and Purple Teams
- [Tecnativa/docker-socket-proxy](https://github.com/Tecnativa/docker-socket-proxy) - Proxy over your Docker socket to restrict which requests it accepts
- [pwn0sec/PwnXSS](https://github.com/pwn0sec/PwnXSS) - PwnXSS: Vulnerability (XSS) scanner exploit
- [r0ysue/AndroidSecurityStudy](https://github.com/r0ysue/AndroidSecurityStudy) - 安卓应用安全学习
- [dstmath/frida-unpack](https://github.com/dstmath/frida-unpack) - 基于Frida的脱壳工具
- [LeadroyaL/JebScript](https://github.com/LeadroyaL/JebScript) -
- [GuoKerS/domain_scan_demo](https://github.com/GuoKerS/domain_scan_demo) - 一个简陋的分布式子域名扫描轮子
- [Tuhinshubhra/ExtAnalysis](https://github.com/Tuhinshubhra/ExtAnalysis) - Browser Extension Analysis Framework - Scan, Analyze Chrome, firefox and Brave extensions for vulnerabilities and intels
- [ClaudiuGeorgiu/PlaystoreDownloader](https://github.com/ClaudiuGeorgiu/PlaystoreDownloader) - A command line tool to download Android applications directly from the Google Play Store by specifying their package name (an initial one-time configuration is required)
- [adeojoemmanuel/Switching-IP-address](https://github.com/adeojoemmanuel/Switching-IP-address) - Python Script which changes the Public IP address randomly to different location around the world in every 10 Seconds Interval with the help tor package
- [lijiaxing1997/Gr33k](https://github.com/lijiaxing1997/Gr33k) - 图形化漏洞利用集成工具
- [P0cL4bs/wifipumpkin3](https://github.com/P0cL4bs/wifipumpkin3) - Powerful framework for rogue access point attack.
- [cwolff411/powerob](https://github.com/cwolff411/powerob) - An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.
- [ShutdownRepo/shellerator](https://github.com/ShutdownRepo/shellerator) - Simple CLI tool for the generation of bind and reverse shells in multiple languages
- [benbusby/whoogle-search](https://github.com/benbusby/whoogle-search) - A self-hosted, ad-free, privacy-respecting metasearch engine
- [jimmy-ly00/dirlister](https://github.com/jimmy-ly00/dirlister) - Create wordlists from source codes files/directories for enumeration
- [sv3nbeast/2019_Vul_warning_Poc_Collect](https://github.com/sv3nbeast/2019_Vul_warning_Poc_Collect) - 整理的2019年厂商发布的漏洞预警公开POC集合,不足之处还希望多多补充,完善
- [ThePorgs/Exegol](https://github.com/ThePorgs/Exegol) - Fully featured and community-driven hacking environment
- [ashishb/androidtool](https://github.com/ashishb/androidtool) - A better version of the command-line android tool with a more intuitive command-line interface.
- [skelsec/pypykatz](https://github.com/skelsec/pypykatz) - Mimikatz implementation in pure Python
- [insightglacier/Shiro_exploit](https://github.com/insightglacier/Shiro_exploit) - Apache Shiro 反序列化漏洞检测与利用工具
- [nsonaniya2010/SubDomainizer](https://github.com/nsonaniya2010/SubDomainizer) - A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.
- [PaperMtn/slack-watchman](https://github.com/PaperMtn/slack-watchman) - Slack enumeration and exposed secrets detection tool
- [ahmetumitbayram/subscraper-security-trails-module](https://github.com/ahmetumitbayram/subscraper-security-trails-module) -
- [spenkk/rapiddns-extractor](https://github.com/spenkk/rapiddns-extractor) - Extract subdomains from rapiddns.io
- [devanshbatham/Awesome-Bugbounty-Writeups](https://github.com/devanshbatham/Awesome-Bugbounty-Writeups) - A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
- [doyensec/inql](https://github.com/doyensec/inql) - InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable scans, and seamless Burp integration.
- [broken5/WebAliveScan](https://github.com/broken5/WebAliveScan) - 对目标域名进行快速的存活扫描、简单的指纹识别、目录扫描
- [hxnoyd/ossem-power-up](https://github.com/hxnoyd/ossem-power-up) - A tool to assess data quality, built on top of the awesome OSSEM.
- [hayasec/reGeorg-Weblogic](https://github.com/hayasec/reGeorg-Weblogic) - reGeorg的特殊版本,适用于老版本weblogic。
- [opendevops-cn/opendevops](https://github.com/opendevops-cn/opendevops) - CODO是一款为用户提供企业多混合云、全球一站式DevOps、自动化运维、完全开源的云管理平台、自动化运维平台
- [ail-project/ail-framework](https://github.com/ail-project/ail-framework) - AIL framework - Analysis Information Leak framework
- [hackxc/Dir_Monitor](https://github.com/hackxc/Dir_Monitor) - Dir_Monitor — 可以防御文件上传漏洞的监控脚本
- [gauravnarwani97/Trishul](https://github.com/gauravnarwani97/Trishul) - Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vulnerabilities and teach how to exploit them.
- [sdnewhop/grinder](https://github.com/sdnewhop/grinder) - :mag_right: Python framework to automatically discover and enumerate hosts from different back-end systems (Shodan, Censys)
- [gwen001/github-search](https://github.com/gwen001/github-search) - A collection of tools to perform searches on GitHub.
- [shivsahni/APKEnum](https://github.com/shivsahni/APKEnum) -
- [rabbitmask/AssetsHunter](https://github.com/rabbitmask/AssetsHunter) - 资产狩猎框架-AssetsHunter,信息收集是一项艺术~
- [gwen001/pentest-tools](https://github.com/gwen001/pentest-tools) - A collection of custom security tools for quick needs.
- [hisxo/gitGraber](https://github.com/hisxo/gitGraber) - gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...
- [vortexau/dnsvalidator](https://github.com/vortexau/dnsvalidator) - Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses.
- [idealclover/RSS-OPML-to-Markdown](https://github.com/idealclover/RSS-OPML-to-Markdown) - 🎁 Convert RSS OPML file to Markdown - easy to read and share
- [ispras/rop-benchmark](https://github.com/ispras/rop-benchmark) - ROP Benchmark is a tool to compare ROP compilers
- [noptrix/nullscan](https://github.com/noptrix/nullscan) - A modular framework designed to chain and automate security tests.
- [noptrix/httpgrep](https://github.com/noptrix/httpgrep) - Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.
- [m4ll0k/Atlas](https://github.com/m4ll0k/Atlas) - Quick SQLMap Tamper Suggester
- [devanshbatham/OpenRedireX](https://github.com/devanshbatham/OpenRedireX) - A fuzzer for detecting open redirect vulnerabilities
- [abrignoni/JSON-to-HTML-and-XLS](https://github.com/abrignoni/JSON-to-HTML-and-XLS) - Simple script to convert JSON to html or excel
- [Gallopsled/pwntools](https://github.com/Gallopsled/pwntools) - CTF framework and exploit development library
- [l0n3rs/ctf-wscan](https://github.com/l0n3rs/ctf-wscan) - 为ctf而生的web扫描器
- [WithSecureLabs/Jamf-Attack-Toolkit](https://github.com/WithSecureLabs/Jamf-Attack-Toolkit) - Suite of tools to facilitate attacks against the Jamf macOS management platform.
- [Symbo1/wsltools](https://github.com/Symbo1/wsltools) - Web Scan Lazy Tools - Python Package
- [devanshbatham/ParamSpider](https://github.com/devanshbatham/ParamSpider) - Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing
- [joshbressers/cve-analysis](https://github.com/joshbressers/cve-analysis) - Tools for conducting analysis of CVE data in Elasticsearch
- [xuchaoa/WebScan](https://github.com/xuchaoa/WebScan) - 正在写的一个资产管理和扫描相结合的分布式扫描器
- [zhzyker/exphub](https://github.com/zhzyker/exphub) - Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-201
- [HacTF/poc--exp](https://github.com/HacTF/poc--exp) - 常用渗透poc收集
- [khast3x/h8mail](https://github.com/khast3x/h8mail) - Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
- [m8sec/ActiveReign](https://github.com/m8sec/ActiveReign) - A Network Enumeration and Attack Toolset for Windows Active Directory Environments.
- [janmasarik/bucketsperm](https://github.com/janmasarik/bucketsperm) -
- [saeeddhqan/Maryam](https://github.com/saeeddhqan/Maryam) - Maryam: Open-source Intelligence(OSINT) Framework
- [virink/awd_auto_attack_framework](https://github.com/virink/awd_auto_attack_framework) - AWD 自动化攻击框架
- [NEALWE/AWD_FrameWork](https://github.com/NEALWE/AWD_FrameWork) - 近乎无解的AWD框架
- [pikpikcu/Pentest-Tools-Framework](https://github.com/pikpikcu/Pentest-Tools-Framework) - Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabili
- [hackxc/Pyhacker](https://github.com/hackxc/Pyhacker) - 【Pyhacker】Python安全开发
- [initstring/evil-ssdp](https://github.com/initstring/evil-ssdp) - Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.
- [morsoli/python-interview-guide](https://github.com/morsoli/python-interview-guide) - Python Web 开发面试过程中的知识点总结
- [miyakogi/pyppeteer](https://github.com/miyakogi/pyppeteer) - Headless chrome/chromium automation library (unofficial port of puppeteer)
- [sth2018/FastWordQuery](https://github.com/sth2018/FastWordQuery) - Query words definitions or examples etc. from local or web dictionaries to fill into Anki cards.
- [AlephNullSK/dnsgen](https://github.com/AlephNullSK/dnsgen) - Generates combination of domain names from the provided input.
- [zsdlove/Hades](https://github.com/zsdlove/Hades) - Static code auditing system
- [pinnace/burp-jwt-fuzzhelper-extension](https://github.com/pinnace/burp-jwt-fuzzhelper-extension) - JWT Fuzzer for BurpSuite. Adds an Intruder hook for on-the-fly JWT fuzzing.
- [taomujian/linbing](https://github.com/taomujian/linbing) - 本系统是对Web中间件和Web框架进行自动化渗透的一个系统,根据扫描选项去自动化收集资产,然后进行POC扫描,POC扫描时会根据指纹选择POC插件去扫描,POC插件扫描用异步方式扫描.前端采用vue技术,后端采用python fastapi.
- [wargio/fufluns](https://github.com/wargio/fufluns) - Easy to use APK/IPA Mobile App Inspector
- [Heart-Sky/port-multiplexing](https://github.com/Heart-Sky/port-multiplexing) - 端口复用相关思路和工具
- [blackarrowsec/mssqlproxy](https://github.com/blackarrowsec/mssqlproxy) - mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
- [RhinoSecurityLabs/IPRotate_Burp_Extension](https://github.com/RhinoSecurityLabs/IPRotate_Burp_Extension) - Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.
- [Damian89/extended-ssrf-search](https://github.com/Damian89/extended-ssrf-search) - Smart ssrf scanner using different methods like parameter brute forcing in post and get...
- [webanalyzer/rules](https://github.com/webanalyzer/rules) - 通用的指纹识别规则
- [jiangsir404/POC-S](https://github.com/jiangsir404/POC-S) - POC-T强化版本 POC-S , 用于红蓝对抗中快速验证Web应用漏洞, 对功能进行强化以及脚本进行分类添加,自带dnslog等, 平台补充来自vulhub靶机及其他开源项目的高可用POC
- [kr1shn4murt1/get_Team_Pass](https://github.com/kr1shn4murt1/get_Team_Pass) - Get teamviewer's ID and password from a remote computer in the LAN
- [dariusztytko/progress-burp](https://github.com/dariusztytko/progress-burp) - Burp Suite extension to track vulnerability assessment progress
- [testert1ng/hacker101-ctf](https://github.com/testert1ng/hacker101-ctf) - Hacker101 CTF Writeup
- [Lhaihai/PythonPersistence](https://github.com/Lhaihai/PythonPersistence) - python3 写的一些权限维持脚本
- [tarunkant/Gopherus](https://github.com/tarunkant/Gopherus) - This tool generates gopher link for exploiting SSRF and gaining RCE in various servers
- [YDHCUI/CNVD-2020-10487-Tomcat-Ajp-lfi](https://github.com/YDHCUI/CNVD-2020-10487-Tomcat-Ajp-lfi) - Tomcat-Ajp协议文件读取漏洞
- [CTF-MissFeng/bayonet](https://github.com/CTF-MissFeng/bayonet) - bayonet是一款src资产管理系统,从子域名、端口服务、漏洞、爬虫等一体化的资产管理系统
- [0xn0ne/weblogicScanner](https://github.com/0xn0ne/weblogicScanner) - weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、
- [nccgroup/fuzzowski](https://github.com/nccgroup/fuzzowski) - the Network Protocol Fuzzer that we will want to use.
- [NotSoSecure/android_application_analyzer](https://github.com/NotSoSecure/android_application_analyzer) - The tool is used to analyze the content of the android application in local storage.
- [wshuSuperman/HawkeyeMonitor](https://github.com/wshuSuperman/HawkeyeMonitor) - HawkeyeMonitor 可用于企业内部的安全管理,自动化漏洞检测漏洞、企业内部资产管理,周期巡检,实时监控等服务
- [nfstream/nfstream](https://github.com/nfstream/nfstream) - NFStream: a Flexible Network Data Analysis Framework.
- [reddelexc/hackerone-reports](https://github.com/reddelexc/hackerone-reports) - Top disclosed reports from HackerOne
- [AlessandroZ/LaZagneForensic](https://github.com/AlessandroZ/LaZagneForensic) - Windows passwords decryption from dump files
- [RUB-NDS/CORStest](https://github.com/RUB-NDS/CORStest) - A simple CORS misconfiguration scanner
- [d4em0n/exrop](https://github.com/d4em0n/exrop) - Automatic ROPChain Generation
- [Clayeee/Win-Logs-Parse-tool](https://github.com/Clayeee/Win-Logs-Parse-tool) -
- [ztosec/hunter](https://github.com/ztosec/hunter) - Hunter作为中通DevSecOps闭环方案中的一环,扮演着很重要的角色,开源之后希望能帮助到更多企业。
- [Ascotbe/Medusa](https://github.com/Ascotbe/Medusa) - :cat2:Medusa是一个红队武器库平台,目前包括XSS平台、协同平台、CVE监控、免杀生成、DNSLOG、钓鱼邮件、文件获取等功能,持续开发中
- [matrix1001/heapinspect](https://github.com/matrix1001/heapinspect) - 🔍Heap analysis tool for CTF pwn.
- [matrix1001/nadbg](https://github.com/matrix1001/nadbg) - 👀Dynamic memory watcher/tracer/analyzer for CTF pwn
- [darkarnium/secpub](https://github.com/darkarnium/secpub) - Published security vulnerabilities, research, and associated information.
- [lwzSoviet/NoXss](https://github.com/lwzSoviet/NoXss) - Faster xss scanner,support reflected-xss and dom-xss
- [MatthewPierson/Vieux](https://github.com/MatthewPierson/Vieux) - Vieux - A tool for 32/64 Bit iOS downgrades using OTA Blobs
- [nict-csl/exist](https://github.com/nict-csl/exist) - EXIST is a web application for aggregating and analyzing cyber threat intelligence.
- [ucsb-seclab/karonte](https://github.com/ucsb-seclab/karonte) - Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware
- [sahilmgandhi/IotShark](https://github.com/sahilmgandhi/IotShark) - IotShark - Monitoring and Analyzing IoT Traffic
- [Viralmaniar/XposedOrNot](https://github.com/Viralmaniar/XposedOrNot) - XposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of such compromised passwords is detrimental to individual accoun
- [anouarbensaad/vulnx](https://github.com/anouarbensaad/vulnx) - vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information collecti
- [icryo/RFCpwn](https://github.com/icryo/RFCpwn) - An enumeration and exploitation toolkit using RFC calls to SAP
- [patois/dsync](https://github.com/patois/dsync) - IDAPython plugin that synchronizes disassembler and decompiler views
- [redteam-project/lem](https://github.com/redteam-project/lem) - Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits
- [lgandx/Responder](https://github.com/lgandx/Responder) - Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication
- [Go0p/emmmm](https://github.com/Go0p/emmmm) - struts2系列漏洞,jboss,weblogic,webshell(爆破的方式),thinkphp5_rce....
- [ivre/ivre](https://github.com/ivre/ivre) - Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool, colle
- [appsecco/vulnerable-apps](https://github.com/appsecco/vulnerable-apps) -
- [ankane/s3tk](https://github.com/ankane/s3tk) - A security toolkit for Amazon S3
- [ehForwarderBot/ehForwarderBot](https://github.com/ehForwarderBot/ehForwarderBot) - An extensible message tunneling chat bot framework. Delivers messages to and from multiple platforms and remotely control your accounts.
- [laconicwolf/Masscan-to-CSV](https://github.com/laconicwolf/Masscan-to-CSV) - Converts the Masscan XML output option (-oX) to a csv format.
- [guardicore/monkey](https://github.com/guardicore/monkey) - Infection Monkey - An open-source adversary emulation platform
- [0xInfection/TIDoS-Framework](https://github.com/0xInfection/TIDoS-Framework) - The Offensive Manual Web Application Penetration Testing Framework.
- [InitRoot/BurpJSLinkFinder](https://github.com/InitRoot/BurpJSLinkFinder) - Burp Extension for a passive scanning JS files for endpoint links.
- [aas-n/spraykatz](https://github.com/aas-n/spraykatz) - Credentials gathering tool automating remote procdump and parse of lsass process.
- [insightglacier/IMAP_Bruteforce](https://github.com/insightglacier/IMAP_Bruteforce) - IMAP Bruteforce Script
- [password-reset/TrelloC2](https://github.com/password-reset/TrelloC2) - Simple C2 over the Trello API
- [xtiankisutsa/MARA_Framework](https://github.com/xtiankisutsa/MARA_Framework) - MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a toolkit that puts together commonly used mobile application reverse engineering and analysis tools to assist in testing
- [pahaz/sshtunnel](https://github.com/pahaz/sshtunnel) - SSH tunnels to remote server.
- [cve-search/git-vuln-finder](https://github.com/cve-search/git-vuln-finder) - Finding potential software vulnerabilities from git commit messages
- [grayddq/PypiScan](https://github.com/grayddq/PypiScan) - 这个脚本主要提供对pypi供应链的源头进行安全扫描研究,扫描并发现未知的恶意包情况。
- [Concinnity-Risks/RansomCoinPublic](https://github.com/Concinnity-Risks/RansomCoinPublic) - A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.
- [timwhitez/crawlergo_x_XRAY](https://github.com/timwhitez/crawlergo_x_XRAY) - 360/0Kee-Team/crawlergo动态爬虫结合长亭XRAY扫描器的被动扫描功能
- [DavidBuchanan314/dlinject](https://github.com/DavidBuchanan314/dlinject) - Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace
- [PunitTailor55/WebMap](https://github.com/PunitTailor55/WebMap) - Nmap Web Dashboard and Reporting
- [cyberark/KubiScan](https://github.com/cyberark/KubiScan) - A tool to scan Kubernetes cluster for risky permissions
- [cylance/CyBot](https://github.com/cylance/CyBot) - Open Source Threat Intelligence Chat Bot
- [tatanus/SPF](https://github.com/tatanus/SPF) - SpeedPhishing Framework
- [kudelskisecurity/fumblechain](https://github.com/kudelskisecurity/fumblechain) - A Purposefully Vulnerable Blockchain
- [laincode/shodan-seeker](https://github.com/laincode/shodan-seeker) - Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of specific ports/IPs, etc.
- [anirudhduggal/medaudit](https://github.com/anirudhduggal/medaudit) - A tool for auditing medical devices and healthcare infrastructure
- [nccgroup/ScoutSuite](https://github.com/nccgroup/ScoutSuite) - Multi-Cloud Security Auditing Tool
- [aquasecurity/kube-hunter](https://github.com/aquasecurity/kube-hunter) - Hunt for security weaknesses in Kubernetes clusters
- [Viralmaniar/Powershell-RAT](https://github.com/Viralmaniar/Powershell-RAT) - Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen c
- [akamai-threat-research/mqtt-pwn](https://github.com/akamai-threat-research/mqtt-pwn) - MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.
- [izar/pytm](https://github.com/izar/pytm) - A Pythonic framework for threat modeling
- [yampelo/beagle](https://github.com/yampelo/beagle) - Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
- [ytisf/PyExfil](https://github.com/ytisf/PyExfil) - A Python Package for Data Exfiltration
- [twosixlabs/acsploit](https://github.com/twosixlabs/acsploit) - A tool for generating worst-case inputs to commonly used algorithms
- [ragulbalaji/RF-Xfil](https://github.com/ragulbalaji/RF-Xfil) - Prototype Toolkit for Data Exfiltration over Radio Frequencies -- Developed @ HackSmith v2.0
- [sensepost/DNS-Shell](https://github.com/sensepost/DNS-Shell) - DNS-Shell is an interactive Shell over DNS channel
- [OWASP/QRLJacking](https://github.com/OWASP/QRLJacking) - QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login with QR code” feature as a secure way to login into accounts wh
- [mIcHyAmRaNe/okadminfinder](https://github.com/mIcHyAmRaNe/okadminfinder) - [ Admin panel finder / Admin Login Page Finder ] ¢σ∂є∂ ву 👻 (❤-❤) 👻
- [bambish/ScanQLi](https://github.com/bambish/ScanQLi) - SQLi scanner to detect SQL vulns
- [ThoughtfulDev/EagleEye](https://github.com/ThoughtfulDev/EagleEye) - Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.
- [alexandreborges/malwoverview](https://github.com/alexandreborges/malwoverview) - Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, Threa
- [anyant/rssant](https://github.com/anyant/rssant) - 蚁阅 - 让 RSS 更好用,轻松订阅你喜欢的博客和资讯
- [rackerlabs/scantron](https://github.com/rackerlabs/scantron) - A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API client for automation workflows.
- [BitTheByte/BitBlinder](https://github.com/BitTheByte/BitBlinder) - BurpSuite extension to inject custom cross-site scripting payloads on every form/request submitted to detect blind XSS vulnerabilities
- [s0md3v/XSStrike](https://github.com/s0md3v/XSStrike) - Most advanced XSS scanner.
- [GerbenJavado/LinkFinder](https://github.com/GerbenJavado/LinkFinder) - A python script that finds endpoints in JavaScript files
- [fleetcaptain/Turbolist3r](https://github.com/fleetcaptain/Turbolist3r) - Subdomain enumeration tool with analysis features for discovered domains
- [s0md3v/Arjun](https://github.com/s0md3v/Arjun) - HTTP parameter discovery suite.
- [LangziFun/LangSrcCurise](https://github.com/LangziFun/LangSrcCurise) - SRC子域名资产监控
- [dr0op/bufferfly](https://github.com/dr0op/bufferfly) - 攻防演习/渗透测试资产处理小工具,对攻防演习/渗透测试前的信息搜集到的大批量资产/域名进行存活检测、获取标题头、语料提取、常见web端口检测等。
- [pnfsoftware/jeb-samplecode](https://github.com/pnfsoftware/jeb-samplecode) - Sample scripts and extensions for JEB Decompiler.
- [orlikoski/CDQR](https://github.com/orlikoski/CDQR) - The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted drives and extracted artifacts from Windows, Linux, MacOS, and Andr
- [ph4ntonn/Behold3r](https://github.com/ph4ntonn/Behold3r) - 👻Behold3r -- 收集指定网站的子域名,并可监控指定网站的子域名更新情况,发送变更报告至指定邮箱
- [ownthink/KnowledgeGraphData](https://github.com/ownthink/KnowledgeGraphData) - 史上最大规模1.4亿中文知识图谱开源下载
- [superhedgy/AttackSurfaceMapper](https://github.com/superhedgy/AttackSurfaceMapper) - AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.
- [NtesEyes/pylane](https://github.com/NtesEyes/pylane) - An python vm injector with debug tools, based on gdb.
- [AndroBugs/AndroBugs_Framework](https://github.com/AndroBugs/AndroBugs_Framework) - AndroBugs Framework is an efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications. No need to install on Windows.
- [tintinweb/ethereum-dasm](https://github.com/tintinweb/ethereum-dasm) - An ethereum evm bytecode disassembler and static/dynamic analysis tool
- [Tencent/HaboMalHunter](https://github.com/Tencent/HaboMalHunter) - HaboMalHunter is a sub-project of Habo Malware Analysis System (https://habo.qq.com), which can be used for automated malware analysis and security assessment on the Linux system.
- [safebuffer/metateta](https://github.com/safebuffer/metateta) - Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit
- [xebia/mobilehacktools](https://github.com/xebia/mobilehacktools) - A repository for scripting a mobile attack toolchain
- [4ch12dy/xia0LLDB](https://github.com/4ch12dy/xia0LLDB) - LLDB python scripts for iOS arm64 reversing by xia0
- [wulio/Coeus](https://github.com/wulio/Coeus) - Android apk/sdk Scan包括android apk/sdk 安全审计代码扫描以及国内政策扫描
- [patois/HRDevHelper](https://github.com/patois/HRDevHelper) - HexRays ctree visualization plugin
- [gaasedelen/lighthouse](https://github.com/gaasedelen/lighthouse) - A Coverage Explorer for Reverse Engineers
- [zhkl0228/AndroidAttacher](https://github.com/zhkl0228/AndroidAttacher) - IDA debugging plugin for android armv7 so
- [L4ys/LazyIDA](https://github.com/L4ys/LazyIDA) - Make your IDA Lazy!
- [IDArlingTeam/IDArling](https://github.com/IDArlingTeam/IDArling) - Collaborative Reverse Engineering plugin for IDA Pro & Hex-Rays
- [nologic/idaref](https://github.com/nologic/idaref) - IDA Pro Instruction Reference Plugin
- [mandiant/flare-ida](https://github.com/mandiant/flare-ida) - IDA Pro utilities from FLARE team
- [maddiestone/IDAPythonEmbeddedToolkit](https://github.com/maddiestone/IDAPythonEmbeddedToolkit) - IDA Python Embedded Toolkit -- IDAPython scripts for automating analysis of firmware of embedded devices
- [haqpl/automate_knoxss](https://github.com/haqpl/automate_knoxss) - Automation of KNOXSS extension.
- [VincentDS/HackerOne-Notifier](https://github.com/VincentDS/HackerOne-Notifier) - Send notifications if a new program is published on HackerOne using Pushbullet
- [M507/Kali-TX](https://github.com/M507/Kali-TX) - Customized Kali Linux - Ansible playbook
- [0xgalz/Virtuailor](https://github.com/0xgalz/Virtuailor) - IDAPython tool for creating automatic C++ virtual tables in IDA Pro
- [WithSecureLabs/Jandroid](https://github.com/WithSecureLabs/Jandroid) -
- [YagamiiLight/Cerberus](https://github.com/YagamiiLight/Cerberus) - 一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Think
- [deepfakes/faceswap](https://github.com/deepfakes/faceswap) - Deepfakes Software For All
- [ray-project/ray](https://github.com/ray-project/ray) - Ray is a unified framework for scaling AI and Python applications. Ray consists of a core distributed runtime and a set of AI Libraries for accelerating ML workloads.
- [OWASP/CheatSheetSeries](https://github.com/OWASP/CheatSheetSeries) - The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
- [Flo354/Androick](https://github.com/Flo354/Androick) -
- [OWASP/owasp-masvs](https://github.com/OWASP/owasp-masvs) - The OWASP MASVS (Mobile Application Security Verification Standard) is the industry standard for mobile app security.
- [snare/voltron](https://github.com/snare/voltron) - A hacky debugger UI for hackers
- [Luth1er/KitPloit_Arsenal](https://github.com/Luth1er/KitPloit_Arsenal) - It is a tool that brings together exploits and news about security and vulnerabilities, with the intention of contributing to the open source community, developed from the site http://www.kitploit.com
- [s0md3v/Silver](https://github.com/s0md3v/Silver) - Mass scan IPs for vulnerable services
- [sensepost/objection](https://github.com/sensepost/objection) - 📱 objection - runtime mobile exploration
- [nettitude/scrounger](https://github.com/nettitude/scrounger) - Mobile application testing toolkit
- [Imtiazkarimik23/ATFuzzer](https://github.com/Imtiazkarimik23/ATFuzzer) - "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019
- [nightwatchcybersecurity/truegaze](https://github.com/nightwatchcybersecurity/truegaze) - Static analysis tool for Android/iOS apps focusing on security issues outside the source code
- [meolu/walle-web](https://github.com/meolu/walle-web) - walle - 瓦力 Devops开源项目代码部署平台
- [giantbranch/pwn_deploy_chroot](https://github.com/giantbranch/pwn_deploy_chroot) - 可以方便地部署一个或者多个pwn题到一个docker容器中(使用chroot,并可以设置是否使用我自己写的catflag程序替换默认的/bin/sh程序,以增加安全性)
- [N1ckDunn/Exploitivator](https://github.com/N1ckDunn/Exploitivator) - Automate Metasploit scanning and exploitation
- [blark/aiodnsbrute](https://github.com/blark/aiodnsbrute) - Python 3.5+ DNS asynchronous brute force utility
- [0voice/interview_internal_reference](https://github.com/0voice/interview_internal_reference) - 2023年最新总结,阿里,腾讯,百度,美团,头条等技术面试题目,以及答案,专家出题人分析汇总。
- [0xzmz/burpsuite_jsapi](https://github.com/0xzmz/burpsuite_jsapi) - A BurpSuite extension written by Python,used to find API interface in JS file.
- [linkedin/qark](https://github.com/linkedin/qark) - Tool to look for several security related Android application vulnerabilities
- [nilboy/pixel-recursive-super-resolution](https://github.com/nilboy/pixel-recursive-super-resolution) - Tensorflow implementation of pixel-recursive-super-resolution(Google Brain paper: https://arxiv.org/abs/1702.00783)
- [404notf0und/FXY](https://github.com/404notf0und/FXY) - Security-Scenes-Feature-Engineering-Toolkit, Continuous Integration.一款安全数据特征化工具
- [LandGrey/ClassHound](https://github.com/LandGrey/ClassHound) - 利用任意文件下载漏洞循环下载反编译 Class 文件获得网站 Java 源代码
- [amimo/ollvm-breaker](https://github.com/amimo/ollvm-breaker) - 使用Binary Ninja去除ollvm流程平坦混淆
- [mhaskar/Octopus](https://github.com/mhaskar/Octopus) - Open source pre-operation C2 server based on python and powershell
- [7dog7/bottleneckOsmosis](https://github.com/7dog7/bottleneckOsmosis) - 瓶颈渗透,web渗透,red红队,fuzz param,注释,js字典,ctf
- [facebookarchive/WEASEL](https://github.com/facebookarchive/WEASEL) - DNS covert channel implant for Red Teams.
- [AeonLucid/AndroidNativeEmu](https://github.com/AeonLucid/AndroidNativeEmu) - Allows you to partly emulate an Android native library.
- [amimo/dcc](https://github.com/amimo/dcc) - DCC (Dex-to-C Compiler) is method-based aot compiler that can translate DEX code to C code.
- [hanbinglengyue/FART](https://github.com/hanbinglengyue/FART) - ART环境下自动化脱壳方案
- [WithSecureLabs/drozer](https://github.com/WithSecureLabs/drozer) - The Leading Security Assessment Framework for Android.
- [LoRexxar/redis-rogue-server](https://github.com/LoRexxar/redis-rogue-server) - Redis 4.x & 5.x RCE
- [pwnfoo/NTLMRecon](https://github.com/pwnfoo/NTLMRecon) - Enumerate information from NTLM authentication enabled web endpoints 🔎
- [misterch0c/BeaconTelegram](https://github.com/misterch0c/BeaconTelegram) - Send message on Telegram when you get a new Cobalt Strike beacon
- [netspooky/gtfoplus](https://github.com/netspooky/gtfoplus) - Linux Local Privesc Helper and Agent
- [lyzz0612/iosMixTools](https://github.com/lyzz0612/iosMixTools) - ios混淆脚本工具
- [Tiangewang0524/sms_verification_code_API](https://github.com/Tiangewang0524/sms_verification_code_API) - 在线接收市面大部分app和网页的短信验证码,多平台,代替客户端使用
- [baidu-security/openrasp-iast](https://github.com/baidu-security/openrasp-iast) - IAST 灰盒扫描工具
- [JE2Se/AssetScan](https://github.com/JE2Se/AssetScan) - 资产探测工具,检测存活,检测风险端口,常规端口,全端口探测等等,对探测的端口的脆弱面进行安全分析进行
- [RhinoSecurityLabs/ccat](https://github.com/RhinoSecurityLabs/ccat) - Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
- [kivy/python-for-android](https://github.com/kivy/python-for-android) - Turn your Python application into an Android APK
- [AbsoZed/DockerPwn.py](https://github.com/AbsoZed/DockerPwn.py) - Python automation of Docker.sock abuse
- [sunyoubo/code2docx](https://github.com/sunyoubo/code2docx) - java、python、go、shell等项目代码读取并存储到一个word文档中,软著申请工具。
- [nihaohello/proxypool](https://github.com/nihaohello/proxypool) - ip代理池,提供在线查询
- [striver-ing/wechat-spider](https://github.com/striver-ing/wechat-spider) - 开源微信爬虫:爬取公众号所有 文章、阅读量、点赞量和评论内容。易部署。持续维护!!!
- [idhyt/jeb-keygen](https://github.com/idhyt/jeb-keygen) - JEB install env
- [CorentinJ/Real-Time-Voice-Cloning](https://github.com/CorentinJ/Real-Time-Voice-Cloning) - Clone a voice in 5 seconds to generate arbitrary speech in real-time
- [cloudflare/flan](https://github.com/cloudflare/flan) - A pretty sweet vulnerability scanner
- [qianxiao996/FrameScan](https://github.com/qianxiao996/FrameScan) - FrameScan 一款python3编写的简易的cms漏洞检测框架
- [WithSecureLabs/drozer-modules](https://github.com/WithSecureLabs/drozer-modules) -
- [gehaxelt/Python-dsstore](https://github.com/gehaxelt/Python-dsstore) - A library for parsing .DS_Store files and extracting file names
- [andreafioraldi/IDAngr](https://github.com/andreafioraldi/IDAngr) - Use angr in the IDA Pro debugger generating a state from the current debug session
- [njcx/pocsuite_poc_collect](https://github.com/njcx/pocsuite_poc_collect) - collection poc use pocsuite framework 收集一些 poc with pocsuite框架
- [hanc00l/some_pocsuite](https://github.com/hanc00l/some_pocsuite) - 用于漏洞排查的pocsuite3验证POC代码
- [newpanjing/simpleui](https://github.com/newpanjing/simpleui) - A modern theme based on vue+element-ui for django admin.一款基于vue+element-ui的django admin现代化主题。全球20000+网站都在使用!喜欢可以点个star✨
- [Hsury/BiliDrive](https://github.com/Hsury/BiliDrive) - ☁️ 哔哩云,不支持任意文件的全速上传与下载
- [glzjin/CTFd-Whale](https://github.com/glzjin/CTFd-Whale) - A plugin for CTFd which allow your users to deploy a standalone instance for challenges.
- [HaoZhang95/Python24](https://github.com/HaoZhang95/Python24) - 网上搜集的自学python语言的资料集合,包括整套代码和讲义集合,这是至今为止所开放网上能够查找到的最新视频教程,网上找不到其他最新的python整套视频了,. 具体的无加密的mp4视频教程和讲义集合可以在更新的Readme文件中找到,下载直接打开就能播放,项目从零基础的Python教程到深度学习,总共30章节,其中包含Python基础中的飞机大战项目,WSGI项目,Flask新经资讯项目, Dj
- [ZO1RO/CVE-2019-2890](https://github.com/ZO1RO/CVE-2019-2890) - CVE-2019-2890 Exploit for WebLogic with T3
- [5alt/hrida](https://github.com/5alt/hrida) - Hrida is a http interface for Frida
- [Qianlitp/WatchAD](https://github.com/Qianlitp/WatchAD) - AD Security Intrusion Detection System
- [secretsquirrel/the-backdoor-factory](https://github.com/secretsquirrel/the-backdoor-factory) - Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors
- [SpiderLabs/Responder](https://github.com/SpiderLabs/Responder) - Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication
- [USArmyResearchLab/Dshell](https://github.com/USArmyResearchLab/Dshell) - Dshell is a network forensic analysis framework.
- [p1g3/JSINFO-SCAN](https://github.com/p1g3/JSINFO-SCAN) - 递归式寻找域名和api。
- [vnpy/vnpy](https://github.com/vnpy/vnpy) - 基于Python的开源量化交易平台开发框架
- [nccgroup/ABPTTS](https://github.com/nccgroup/ABPTTS) - TCP tunneling over HTTP/HTTPS for web application servers
- [X0Leon/XQuant](https://github.com/X0Leon/XQuant) - Simple backtester for human.
- [zer0yu/Berserker](https://github.com/zer0yu/Berserker) - A list of useful payloads for Web Application Security and Pentest/CTF
- [shmilylty/OneForAll](https://github.com/shmilylty/OneForAll) - OneForAll是一款功能强大的子域收集工具
- [GhostManager/Ghostwriter](https://github.com/GhostManager/Ghostwriter) - The SpecterOps project management and reporting engine
- [jofpin/trape](https://github.com/jofpin/trape) - People tracker on the Internet: OSINT analysis and research tool by Jose Pino
- [tp4a/teleport](https://github.com/tp4a/teleport) - Teleport是一款简单易用的堡垒机系统。
- [trustedsec/ptf](https://github.com/trustedsec/ptf) - The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.
- [HASecuritySolutions/VulnWhisperer](https://github.com/HASecuritySolutions/VulnWhisperer) - Create actionable data from your Vulnerability Scans
- [swimlane/pyattck](https://github.com/swimlane/pyattck) - A Python package to interact with the Mitre ATT&CK Framework
- [seemoo-lab/internalblue](https://github.com/seemoo-lab/internalblue) - Bluetooth experimentation framework for Broadcom and Cypress chips.
- [iGio90/Dwarf](https://github.com/iGio90/Dwarf) - Full featured multi arch/os debugger built on top of PyQt5 and frida
- [huashengdun/webssh](https://github.com/huashengdun/webssh) - :seedling: Web based ssh client
- [xiaolai/regular-investing-in-box](https://github.com/xiaolai/regular-investing-in-box) - 定投改变命运 —— 让时间陪你慢慢变富 https://onregularinvesting.com
- [nashcontrol/bounty-monitor](https://github.com/nashcontrol/bounty-monitor) - Leverage certificate transparency live feed to monitor for newly issued subdomain certificates (last 90 days, configurable), for domains participating in bug bounty programs.
- [sethsec/celerystalk](https://github.com/sethsec/celerystalk) - An asynchronous enumeration & vulnerability scanner. Run all the tools on all the hosts.
- [devsecboy/DomainRecon](https://github.com/devsecboy/DomainRecon) - Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for uphost and Run Masscan to grap CNAME entries, take the screenshot o
- [mkorman90/regipy](https://github.com/mkorman90/regipy) - Regipy is an os independent python library for parsing offline registry hives
- [nidem/kerberoast](https://github.com/nidem/kerberoast) -
- [13o-bbr-bbq/machine_learning_security](https://github.com/13o-bbr-bbq/machine_learning_security) - Source code about machine learning and security.
- [Artemis1029/Java_xmlhack](https://github.com/Artemis1029/Java_xmlhack) - 帮助java环境下任意文件下载情况自动化读取源码的小工具
- [Ciyfly/y_subdomain](https://github.com/Ciyfly/y_subdomain) - 🐗 造轮子之子域名获取工具
- [Threezh1/JSFinder](https://github.com/Threezh1/JSFinder) - JSFinder is a tool for quickly extracting URLs and subdomains from JS files on a website.
- [guimaizi/get_domain](https://github.com/guimaizi/get_domain) -
- [al0ne/Vxscan](https://github.com/al0ne/Vxscan) - python3写的综合扫描工具,主要用来存活验证,敏感文件探测(目录扫描/js泄露接口/html注释泄露),WAF/CDN识别,端口扫描,指纹/服务识别,操作系统识别,POC扫描,SQL注入,绕过CDN,查询旁站等功能,主要用来甲方自测或乙方授权测试,请勿用来搞破坏。
- [Wfzsec/awd_attack_framework](https://github.com/Wfzsec/awd_attack_framework) - awd攻防常用脚本+不死马+crontab+防御方法
- [xuchaoa/CTF_AWD_Platform](https://github.com/xuchaoa/CTF_AWD_Platform) - CTF 攻防对抗平台
- [Fieyina/evernote_remove_duplicates](https://github.com/Fieyina/evernote_remove_duplicates) - 印象笔记去重
- [yassineaboukir/sublert](https://github.com/yassineaboukir/sublert) - Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
- [hoochanlon/hamulete](https://github.com/hoochanlon/hamulete) - 🏔️国立台湾大学、新加坡国立大学、早稻田大学、东京大学,中央研究院(台湾)以及中国重点高校及科研机构,社科、经济、数学、博弈论、哲学、系统工程类学术论文等知识库。
- [lufeirider/CVE-2019-2725](https://github.com/lufeirider/CVE-2019-2725) - CVE-2019-2725 命令回显
- [Raikia/Kali-Setup](https://github.com/Raikia/Kali-Setup) - Script for Kali that adds a bunch of tools and customizes it to be much better
- [Ridter/Exchange2domain](https://github.com/Ridter/Exchange2domain) - CVE-2018-8581
- [Ridter/CVE-2019-1040](https://github.com/Ridter/CVE-2019-1040) - CVE-2019-1040 with Exchange
- [PINGXcpost/F-NAScan-PLUS](https://github.com/PINGXcpost/F-NAScan-PLUS) - F-NAScan-PLUS 安服资产搜集
- [hellogoldsnakeman/masnmapscan-V1.0](https://github.com/hellogoldsnakeman/masnmapscan-V1.0) - 一款用于资产探测的端口扫描工具。整合了masscan和nmap两款扫描器,masscan扫描端口,nmap扫描端口对应服务,二者结合起来实现了又快又好地扫描。
- [xmendez/wfuzz](https://github.com/xmendez/wfuzz) - Web application fuzzer
- [HatBoy/Pcap-Analyzer](https://github.com/HatBoy/Pcap-Analyzer) - Python编写的可视化的离线数据包分析器
- [Srinivas11789/PcapXray](https://github.com/Srinivas11789/PcapXray) - :snowflake: PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
- [BugScanTeam/DNSLog](https://github.com/BugScanTeam/DNSLog) - DNSLog 是一款监控 DNS 解析记录和 HTTP 访问记录的工具。
- [wangzheng0822/algo](https://github.com/wangzheng0822/algo) - 数据结构和算法必知必会的50个代码实现
- [Ekultek/Graffiti](https://github.com/Ekultek/Graffiti) - A tool to generate obfuscated one liners to aid in penetration testing
- [HatBoy/Struts2-Scan](https://github.com/HatBoy/Struts2-Scan) - Struts2全漏洞扫描利用工具
- [WangYihang/Reverse-Shell-Manager](https://github.com/WangYihang/Reverse-Shell-Manager) - :hammer: A multiple reverse shell session/client manager via terminal
- [rabbitmask/WeblogicScanLot](https://github.com/rabbitmask/WeblogicScanLot) - WeblogicScanLot系列,Weblogic漏洞批量检测工具,V2.2
- [NguyenKhong/CrackNetDrive3](https://github.com/NguyenKhong/CrackNetDrive3) -
- [stewartmcgown/uds](https://github.com/stewartmcgown/uds) - 📀 Unlimited Google Drive Storage by splitting binary files into base64
- [lightless233/geye](https://github.com/lightless233/geye) - 🚀Faster Github Monitor🚀
- [hhyo/Archery](https://github.com/hhyo/Archery) - SQL 审核查询平台
- [w-digital-scanner/w9scan](https://github.com/w-digital-scanner/w9scan) - Plug-in type web vulnerability scanner
- [TheKingOfDuck/fuzzDicts](https://github.com/TheKingOfDuck/fuzzDicts) - Web Pentesting Fuzz 字典,一个就够了。
- [HurricaneLabs/machinae](https://github.com/HurricaneLabs/machinae) - Machinae Security Intelligence Collector
- [ticarpi/jwt_tool](https://github.com/ticarpi/jwt_tool) - :snake: A toolkit for testing, tweaking and cracking JSON Web Tokens
- [orleven/BurpCollect](https://github.com/orleven/BurpCollect) - 基于BurpCollector的二次开发, 记录Burpsuite Site Map记录的里的数据包中的目录路径参数名信息,并存入Sqlite,并可导出txt文件。
- [se55i0n/Webfinger](https://github.com/se55i0n/Webfinger) - web指纹识别
- [TideSec/TideFinger](https://github.com/TideSec/TideFinger) - TideFinger——指纹识别小工具,汲取整合了多个web指纹库,结合了多种指纹检测方法,让指纹检测更快捷、准确。
- [ecstatic-nobel/OSweep](https://github.com/ecstatic-nobel/OSweep) - Don't Just Search OSINT. Sweep It.
- [thewhiteh4t/FinalRecon](https://github.com/thewhiteh4t/FinalRecon) - All In One Web Recon
- [jiangsir404/pbscan](https://github.com/jiangsir404/pbscan) - 基于burpsuite headless 的代理式被动扫描系统
- [jackfrued/Python-100-Days](https://github.com/jackfrued/Python-100-Days) - Python - 100天从新手到大师
- [TophantTechnology/osprey](https://github.com/TophantTechnology/osprey) -
- [r35tart/RedisDirScan](https://github.com/r35tart/RedisDirScan) - 此脚本用于测试 Rdies 未授权访问,在没权限写ssh私钥和定时任务又不知道web绝对路径的情况下,进行WEB目录探测
- [chrismaddalena/ODIN](https://github.com/chrismaddalena/ODIN) - Automated network asset, email, and social media profile discovery and cataloguing.
- [SpiderLabs/HostHunter](https://github.com/SpiderLabs/HostHunter) - HostHunter a recon tool for discovering hostnames using OSINT techniques.
- [dyboy2017/WTF_Scan](https://github.com/dyboy2017/WTF_Scan) - 一款WEB端的在线敏感资产扫描器,扫描网站中的指纹、漏洞及相关敏感信息,针对已经识别的CMS指纹,进行二次0day扫描利用,一键GetShell也不是不可能!!!
- [MyKings/python-masscan](https://github.com/MyKings/python-masscan) - python-masscan is a python library which helps in using masscan port scanner.
- [mseclab/PyJFuzz](https://github.com/mseclab/PyJFuzz) - PyJFuzz - Python JSON Fuzzer
- [opensec-cn/vtest](https://github.com/opensec-cn/vtest) - 用于辅助安全工程师漏洞挖掘、测试、复现,集合了mock、httplog、dns tools、xss,可用于测试各类无回显、无法直观判断或特定场景下的漏洞。
- [H4ckForJob/dirmap](https://github.com/H4ckForJob/dirmap) - An advanced web directory & file scanning tool that will be more powerful than DirBuster, Dirsearch, cansina, and Yu Jian.一个高级web目录、文件扫描工具,功能将会强于DirBuster、Dirsearch、cansina、御剑。
- [needmorecowbell/sniff-paste](https://github.com/needmorecowbell/sniff-paste) - Pastebin OSINT Harvester
- [jerrychan807/WSPIH](https://github.com/jerrychan807/WSPIH) - Website Sensitive Personal Information Hunter 网站个人敏感信息文件扫描器
- [trubitsyn/bookmarks2markdown](https://github.com/trubitsyn/bookmarks2markdown) - Convert bookmarks to Markdown
- [pyinstaller/pyinstaller](https://github.com/pyinstaller/pyinstaller) - Freeze (package) Python programs into stand-alone executables
- [zhl2008/awd-platform](https://github.com/zhl2008/awd-platform) - platform for awd
- [grayddq/FileCheck](https://github.com/grayddq/FileCheck) - 本脚本是HIDS组成的一部分,旨在对指定监控目录进行文件hash记录,定时运行,发现文件替换、修改等后门可疑程序。
- [zhaoolee/StarsAndClown](https://github.com/zhaoolee/StarsAndClown) - ☀️Github星聚弃疗榜, 让吃瓜群众也能享受Github带来的乐趣~Github StarsAndClown, Let the people who eat me can enjoy the fun of Github~
- [grayddq/GScan](https://github.com/grayddq/GScan) - 本程序旨在为安全应急响应人员对Linux主机排查时提供便利,实现主机侧Checklist的自动全面化检测,根据检测结果自动数据聚合,进行黑客攻击路径溯源。
- [aStrowxyu/pocscan](https://github.com/aStrowxyu/pocscan) -
- [nihaohello/N-MiddlewareScan](https://github.com/nihaohello/N-MiddlewareScan) - N-MiddlewareScan 魔改,自写的一款中间件漏洞扫描脚本
- [gojek/dollhouse](https://github.com/gojek/dollhouse) -
- [QAX-A-Team/LuWu](https://github.com/QAX-A-Team/LuWu) - 红队基础设施自动化部署工具
- [lufeirider/SqlChecker](https://github.com/lufeirider/SqlChecker) - 注入检测工具
- [TideSec/web_pwd_common_crack](https://github.com/TideSec/web_pwd_common_crack) - 通用web弱口令破解脚本,旨在批量检测那些没有验证码的管理后台,可用于刷分~
- [LyleMi/Learn-Web-Hacking](https://github.com/LyleMi/Learn-Web-Hacking) - Study Notes For Web Hacking / Web安全学习笔记
- [Lucifer1993/ALB](https://github.com/Lucifer1993/ALB) - 攻击日志分析工具
- [jiushill/Ipscan](https://github.com/jiushill/Ipscan) -
- [T3st0r-Git/HackMySQL](https://github.com/T3st0r-Git/HackMySQL) - Using To MySQL Elevate Privileges.
- [Who1sCarl/Pictures-Trojans](https://github.com/Who1sCarl/Pictures-Trojans) -
- [gildasio/h2t](https://github.com/gildasio/h2t) - h2t (HTTP Hardening Tool) scans a website and suggests security headers to apply
- [GoVanguard/legion](https://github.com/GoVanguard/legion) - Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconnaissance and exploitation of information systems.
- [dark-lbp/isf](https://github.com/dark-lbp/isf) - ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python
- [ryanohoro/csbruter](https://github.com/ryanohoro/csbruter) - Cobalt Strike team server password brute force tool
- [tanjiti/mysql_log_check](https://github.com/tanjiti/mysql_log_check) - MySQL Log Analysis
- [groundcat/disposable-email-domain-list](https://github.com/groundcat/disposable-email-domain-list) - A list of disposable email domains, cleaned and validated by scanning MX records.
- [ramen0x3f/AggressorScripts](https://github.com/ramen0x3f/AggressorScripts) -
- [GhostManager/Shepherd](https://github.com/GhostManager/Shepherd) - A Django application to help red team operators manage a library of domain names
- [GhostManager/DomainCheck](https://github.com/GhostManager/DomainCheck) - DomainCheck is designed to assist operators with monitoring changes related to their domain names. This includes negative changes in categorization, VirusTotal detections, and appearances on malware b
- [euphrat1ca/fuzzdb-collect](https://github.com/euphrat1ca/fuzzdb-collect) - 网络上安全资源的搜集
- [akkuman/yujian_keygen](https://github.com/akkuman/yujian_keygen) - 御剑算号破解激活工具
- [avantasia/inventedAttack](https://github.com/avantasia/inventedAttack) - A POC attack combining IP SPoofing, SYN Flood and IP Fragmentation
- [r35tart/RW_Password](https://github.com/r35tart/RW_Password) - 此项目用来提取收集以往泄露的密码中符合条件的强弱密码
- [Wookai/paper-tips-and-tricks](https://github.com/Wookai/paper-tips-and-tricks) - Best practice and tips & tricks to write scientific papers in LaTeX, with figures generated in Python or Matlab.
- [chrispetrou/FDsploit](https://github.com/chrispetrou/FDsploit) - File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
- [google/vulncode-db](https://github.com/google/vulncode-db) - Vulncode-DB project
- [Macr0phag3/GithubMonitor](https://github.com/Macr0phag3/GithubMonitor) - 根据关键字与 hosts 生成的关键词,利用 github 提供的 api,监控 git 泄漏。
- [s045pd/DarkNet_ChineseTrading](https://github.com/s045pd/DarkNet_ChineseTrading) - 🚇暗网中文网监控爬虫(DEEPMIX)
- [blackye/Jenkins](https://github.com/blackye/Jenkins) - Jenkins漏洞探测、用户抓取爆破
- [theLSA/tp5-getshell](https://github.com/theLSA/tp5-getshell) - thinkphp5 rce getshell
- [Kr1s77/Python-crawler-tutorial-starts-from-zero](https://github.com/Kr1s77/Python-crawler-tutorial-starts-from-zero) - python爬虫教程,带你从零到一,包含js逆向,selenium, tesseract OCR识别,mongodb的使用,以及scrapy框架
- [instantbox/instantbox](https://github.com/instantbox/instantbox) - 📦 Get a clean, ready-to-go Linux box in seconds.
- [TheKingOfDuck/FileMonitor](https://github.com/TheKingOfDuck/FileMonitor) - 文件变化实时监控工具(代码审计/黑盒/白盒审计辅助工具)
- [c0ny1/xxe-lab](https://github.com/c0ny1/xxe-lab) - 一个包含php,java,python,C#等各种语言版本的XXE漏洞Demo
- [abdulgaphy/r3con1z3r](https://github.com/abdulgaphy/r3con1z3r) - R3con1z3r is a lightweight Web information gathering tool with an intuitive features written in python. it provides a powerful environment in which open source intelligence (OSINT) web-based footprint
- [lyft/cartography](https://github.com/lyft/cartography) - Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powered by a Neo4j database.
- [MrFk/WebShellCheck](https://github.com/MrFk/WebShellCheck) - Webshell Detection Based on Deep Learning
- [p3pperp0tts/leaks_parser](https://github.com/p3pperp0tts/leaks_parser) - Parser for data dumps Collection #1 / Collection #2-5
- [PyxYuYu/MyBlog](https://github.com/PyxYuYu/MyBlog) - 记录和分享学习的旅程!
- [boy-hack/POC-T](https://github.com/boy-hack/POC-T) - 基于poc-t 并在此基础上增加批量功能!
- [BinaryDefense/artillery](https://github.com/BinaryDefense/artillery) - The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.
- [Mr-Un1k0d3r/SPFAbuse](https://github.com/Mr-Un1k0d3r/SPFAbuse) - SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp
- [initstring/dirty_sock](https://github.com/initstring/dirty_sock) - Linux privilege escalation exploit via snapd (CVE-2019-7304)
- [he1m4n6a/findWebshell](https://github.com/he1m4n6a/findWebshell) - findWebshell是一款基于python开发的webshell检测工具。
- [shengqi158/CVE-2018-2628](https://github.com/shengqi158/CVE-2018-2628) - CVE-2018-2628 & CVE-2018-2893
- [AttackandDefenceSecurityLab/AD_WebScanner](https://github.com/AttackandDefenceSecurityLab/AD_WebScanner) - AD工作室精心研发漏洞安全扫描器
- [hanc00l/weblogic_unserialize_exploit](https://github.com/hanc00l/weblogic_unserialize_exploit) - java unserialize vul for weblogic exploit
- [jas502n/CVE-2018-3191](https://github.com/jas502n/CVE-2018-3191) - Weblogic-CVE-2018-3191远程代码命令执行漏洞
- [blacknbunny/mcreator](https://github.com/blacknbunny/mcreator) - Encoded Reverse Shell Generator With Techniques To Bypass AV's
- [Ivan1ee/struts2-057-exp](https://github.com/Ivan1ee/struts2-057-exp) - s2-057 最新漏洞分析和EXP脚本
- [firefart/CVE-2018-7600](https://github.com/firefart/CVE-2018-7600) - CVE-2018-7600 - Drupal 7.x RCE
- [k8gege/K8CScan](https://github.com/k8gege/K8CScan) - K8Ladon大型内网渗透自定义插件化扫描神器,包含信息收集、网络资产、漏洞扫描、密码爆破、漏洞利用,程序采用多线程批量扫描大型内网多个IP段C段主机,目前插件包含: C段旁注扫描、子域名扫描、Ftp密码爆破、Mysql密码爆破、Oracle密码爆破、MSSQL密码爆破、Windows/Linux系统密码爆破、存活主机扫描、端口扫描、Web信息探测、操作系统版本探测、Cisco思科设备扫描等,支持
- [LandGrey/CVE-2018-2894](https://github.com/LandGrey/CVE-2018-2894) - CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script
- [az0ne/BitcoinPriceReader](https://github.com/az0ne/BitcoinPriceReader) - Bitcoin Price Reader
- [chenxuuu/24h-raspberry-live-on-bilibili](https://github.com/chenxuuu/24h-raspberry-live-on-bilibili) - 🎦树莓派/VPS驱动的b站直播弹幕点播台,代码写得很烂,看之前请吃点降压药。已计划重写
- [s0md3v/Photon](https://github.com/s0md3v/Photon) - Incredibly fast crawler designed for OSINT.
- [meliht/Mr.SIP](https://github.com/meliht/Mr.SIP) - SIP-Based Audit and Attack Tool
- [imp0wd3r/Scanner](https://github.com/imp0wd3r/Scanner) - 端口扫描 + 敏感文件扫描 + POC批量调用框架
- [vulscanteam/vulscan](https://github.com/vulscanteam/vulscan) - vulscan 扫描系统:最新的poc&exp漏洞扫描,redis未授权、敏感文件、java反序列化、tomcat命令执行及各种未授权扫描等...
- [random-robbie/My-Shodan-Scripts](https://github.com/random-robbie/My-Shodan-Scripts) - Collection of Scripts for shodan searching stuff.
- [shodansploit/shodansploit](https://github.com/shodansploit/shodansploit) - 🔎 shodansploit > v1.3.0
- [chenjj/CORScanner](https://github.com/chenjj/CORScanner) - 🎯 Fast CORS misconfiguration vulnerabilities scanner
- [threatexpress/cs2modrewrite](https://github.com/threatexpress/cs2modrewrite) - Convert Cobalt Strike profiles to modrewrite scripts
- [1120362990/vulnerability-list](https://github.com/1120362990/vulnerability-list) - 在渗透测试中快速检测常见中间件、组件的高危漏洞。
- [agrawalsmart7/autoRecon](https://github.com/agrawalsmart7/autoRecon) - This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.
- [shenril/Sitadel](https://github.com/shenril/Sitadel) - Web Application Security Scanner
- [medbenali/CyberScan](https://github.com/medbenali/CyberScan) - CyberScan: Network's Forensics ToolKit
- [hahwul/a2sv](https://github.com/hahwul/a2sv) - Auto Scanning to SSL Vulnerability
- [highmeh/pentest_scripts](https://github.com/highmeh/pentest_scripts) - penetration testing scripts
- [sfyc23/EverydayWechat](https://github.com/sfyc23/EverydayWechat) - 微信助手:1.每日定时给好友(女友)发送定制消息。2.机器人自动回复好友。3.群助手功能(例如:查询垃圾分类、天气、日历、电影实时票房、快递物流、PM2.5等)
- [wish-i-was/femida](https://github.com/wish-i-was/femida) - Automated blind-xss search for Burp Suite
- [fnmsd/ChunkedHTTPAdapter](https://github.com/fnmsd/ChunkedHTTPAdapter) - 参考《利用分块传输吊打所有WAF》修改的requests的Adapter
- [ym2011/POC-EXP](https://github.com/ym2011/POC-EXP) - Collecting and writing PoC or EXP for vulnerabilities on some application
- [saucer-man/saucerframe](https://github.com/saucer-man/saucerframe) - python3批量poc检测工具
- [milo2012/metasploitHelper](https://github.com/milo2012/metasploitHelper) - metasploitHelper
- [githubmaidou/tools](https://github.com/githubmaidou/tools) - Python渗透漏洞工具
- [laconicwolf/burp-extensions](https://github.com/laconicwolf/burp-extensions) - A collection of scripts to extend Burp Suite
- [TEag1e/BurpCollector](https://github.com/TEag1e/BurpCollector) - 通过BurpSuite来构建自己的爆破字典,可以通过字典爆破来发现隐藏资产。
- [bonsaiviking/NfSpy](https://github.com/bonsaiviking/NfSpy) - ID-spoofing NFS client
- [mildsunrise/protobuf-inspector](https://github.com/mildsunrise/protobuf-inspector) - 🕵️ Tool to reverse-engineer Protocol Buffers with unknown definition
- [knownsec/pocsuite3](https://github.com/knownsec/pocsuite3) - pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.
- [w-digital-scanner/w12scan-client](https://github.com/w-digital-scanner/w12scan-client) - 网络资产搜索发现引擎,w12scan 扫描端程序
- [rabbitmask/WeblogicScan](https://github.com/rabbitmask/WeblogicScan) - Weblogic一键漏洞检测工具,V1.5,更新时间:20200730
- [swisskyrepo/SSRFmap](https://github.com/swisskyrepo/SSRFmap) - Automatic SSRF fuzzer and exploitation tool
- [kingkaki/weblogic-scan](https://github.com/kingkaki/weblogic-scan) - weblogic 漏洞扫描工具
- [02husky/domain_pass_generate](https://github.com/02husky/domain_pass_generate) - 通过域名生成爆破字典
- [c0ny1/upload-fuzz-dic-builder](https://github.com/c0ny1/upload-fuzz-dic-builder) - 上传漏洞fuzz字典生成脚本
- [rfunix/Pompem](https://github.com/rfunix/Pompem) - Find exploit tool
- [we1h0/SecurityManageFramwork](https://github.com/we1h0/SecurityManageFramwork) - Security Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security s
- [teal33t/poopak](https://github.com/teal33t/poopak) - POOPAK - TOR Hidden Service Crawler
- [nikallass/sharesearch](https://github.com/nikallass/sharesearch) - Samba, NFS shares spider and grepper
- [0oVicero0/OneList](https://github.com/0oVicero0/OneList) - A simple directory index for OneDrive
- [RhinoSecurityLabs/Security-Research](https://github.com/RhinoSecurityLabs/Security-Research) - Exploits written by the Rhino Security Labs team
- [TuuuNya/WebPocket](https://github.com/TuuuNya/WebPocket) - Exploit management framework
- [bitsadmin/wesng](https://github.com/bitsadmin/wesng) - Windows Exploit Suggester - Next Generation
- [skavngr/rapidscan](https://github.com/skavngr/rapidscan) - :new: The Multi-Tool Web Vulnerability Scanner.
- [0x00-0x00/ShellPop](https://github.com/0x00-0x00/ShellPop) - Pop shells like a master.
- [laconicwolf/Nmap-Scan-to-CSV](https://github.com/laconicwolf/Nmap-Scan-to-CSV) - Converts Nmap XML output to csv file, and other useful functions
- [0xInfection/Awesome-WAF](https://github.com/0xInfection/Awesome-WAF) - 🔥 Web-application firewalls (WAFs) from security standpoint.
- [manulqwerty/Evil-WinRAR-Gen](https://github.com/manulqwerty/Evil-WinRAR-Gen) - Generator of malicious Ace files for WinRAR < 5.70 beta 1
- [codeshold/ddos-dos-tools](https://github.com/codeshold/ddos-dos-tools) - some sort of ddos-tools
- [jimywork/stretcher](https://github.com/jimywork/stretcher) - Tool designed to help identify open Elasticsearch servers that are exposing sensitive information
- [TideSec/TDScanner](https://github.com/TideSec/TDScanner) - 自动化检测小工具,主要实现了域名枚举、链接爬取、注入检测、主机扫描、目录枚举、敏感信息检测等功能~
- [hadg/sgk_data_handler](https://github.com/hadg/sgk_data_handler) - 社工库半自动处理
- [grayddq/PicLocation](https://github.com/grayddq/PicLocation) - 快速获取图片的GPS和其拍摄地理位置
- [schutzwerk/CANalyzat0r](https://github.com/schutzwerk/CANalyzat0r) - Security analysis toolkit for proprietary car protocols
- [aliasrobotics/aztarna](https://github.com/aliasrobotics/aztarna) - aztarna, a footprinting tool for robots.
- [kezhenxu94/house-renting](https://github.com/kezhenxu94/house-renting) - Possibly the best practice of Scrapy 🕷 and renting a house 🏡
- [entropage/mijisou](https://github.com/entropage/mijisou) - Privacy-respecting metasearch engine
- [dirkjanm/PrivExchange](https://github.com/dirkjanm/PrivExchange) - Exchange your privileges for Domain Admin privs by abusing Exchange
- [pjialin/py12306](https://github.com/pjialin/py12306) - 🚂 12306 购票助手,支持集群,多账号,多任务购票以及 Web 页面管理
- [WyAtu/Perun](https://github.com/WyAtu/Perun) - Perun是一款主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架
- [maaaaz/nmaptocsv](https://github.com/maaaaz/nmaptocsv) - A simple python script to convert Nmap output to CSV
- [ahuigo/xcut](https://github.com/ahuigo/xcut) - Enhanced cut command
- [ahuigo/xlparser](https://github.com/ahuigo/xlparser) - Parse file(xlsx/xls/csv) to other format(dict, csv, json, ...).
- [phantom0301/VulCloud](https://github.com/phantom0301/VulCloud) - A Simple Web-UI for Vulhub (Docker) / 便捷的漏洞镜像管理部署Web应用
- [nbedos/termtosvg](https://github.com/nbedos/termtosvg) - Record terminal sessions as SVG animations
- [Hsury/Geetest3-Crack](https://github.com/Hsury/Geetest3-Crack) - 🤖 Geetest3 Distributed Cracking Platform 极验3代分布式破解平台
- [3xp10it/xupload](https://github.com/3xp10it/xupload) - A tool for automatically testing whether the upload function can upload webshell
- [fighting41love/funNLP](https://github.com/fighting41love/funNLP) - 中英文敏感词、语言检测、中外手机/电话归属地/运营商查询、名字推断性别、手机号抽取、身份证抽取、邮箱抽取、中日文人名库、中文缩写库、拆字词典、词汇情感值、停用词、反动词表、暴恐词表、繁简体转换、英文模拟中文发音、汪峰歌词生成器、职业名称词库、同义词库、反义词库、否定词库、汽车品牌词库、汽车零件词库、连续英文切割、各种中文词向量、公司名字大全、古诗词库、IT词库、财经词库、成语词库、地名词库、历史名
- [c0ny1/WorkScripts](https://github.com/c0ny1/WorkScripts) - 信息安全工程师工作常用脚本
- [tapannallan/awesome-scoop](https://github.com/tapannallan/awesome-scoop) - A collection of awesome resources for the scoop package manager for windows
- [nopernik/mpDNS](https://github.com/nopernik/mpDNS) - Multi-Purpose DNS Server
- [zricethezav/h1domains](https://github.com/zricethezav/h1domains) - HackerOne "in scope" domains
- [3xp10it/stockbook](https://github.com/3xp10it/stockbook) - 豆瓣经典证券书籍收录并排名
- [verctor/CS_xor64](https://github.com/verctor/CS_xor64) - cobaltstrike xor64.bin补完计划
- [CcphAmy/NetEaseCloudMusic-nonmembership-list-download](https://github.com/CcphAmy/NetEaseCloudMusic-nonmembership-list-download) - 网易云音乐歌曲批量下载,免VIP【支持歌单,排名榜】
- [outflanknl/RedELK](https://github.com/outflanknl/RedELK) - Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.
- [TypeError/domained](https://github.com/TypeError/domained) - Multi Tool Subdomain Enumeration
- [yulingtianxia/FuckFakeGitHubStars](https://github.com/yulingtianxia/FuckFakeGitHubStars) - GitHub 虚假 Star 净网行动
- [cc06/DNS_Transfer_Check](https://github.com/cc06/DNS_Transfer_Check) - 一个用来批量检测网站是否存在域传送漏洞的Python脚本
- [Jrohy/multi-v2ray](https://github.com/Jrohy/multi-v2ray) - v2ray/xray多用户管理部署程序
- [SkewwG/VulScan](https://github.com/SkewwG/VulScan) - 漏洞扫描:st2、tomcat、未授权访问等等
- [jachinlin/geektime_dl](https://github.com/jachinlin/geektime_dl) - 把极客时间装进 Kindle
- [TKCERT/mail-security-tester](https://github.com/TKCERT/mail-security-tester) - A testing framework for mail security and filtering solutions.
- [tiaotiaolong/TTLScan](https://github.com/tiaotiaolong/TTLScan) - 一款简易的插件化的漏洞扫描器框架
- [y1ng1996/F-Scrack](https://github.com/y1ng1996/F-Scrack) -
- [boy-hack/airbug](https://github.com/boy-hack/airbug) - Airbug(空气洞),收集漏洞poc用于安全产品
- [snowkylin/TensorFlow-cn](https://github.com/snowkylin/TensorFlow-cn) - 简单粗暴 TensorFlow (1.X) | A Concise Handbook of TensorFlow (1.X) | 此版本不再更新,新版见 https://tf.wiki
- [buckhacker/SubDomainTakeoverTools](https://github.com/buckhacker/SubDomainTakeoverTools) -
- [WinHeapExplorer/WinHeap-Explorer](https://github.com/WinHeapExplorer/WinHeap-Explorer) - WinHeap Explorer repository.
- [brianlam38/Sec-Cheatsheets](https://github.com/brianlam38/Sec-Cheatsheets) - Cheatsheets on security vulnerabilities and exploits.
- [p1r06u3/opencanary_web](https://github.com/p1r06u3/opencanary_web) - The web management platform of honeypot
- [zutianbiao/baize](https://github.com/zutianbiao/baize) - 白泽自动化运维系统:配置管理、网络探测、资产管理、业务管理、CMDB、CD、DevOps、作业编排、任务编排等功能,未来将添加监控、报警、日志分析、大数据分析等部分内容
- [tcpiplab/Web-App-Hacking-Notes](https://github.com/tcpiplab/Web-App-Hacking-Notes) - Notes I've taken while working through various web app pentesting labs.
- [ctf-wiki/ctf-wiki](https://github.com/ctf-wiki/ctf-wiki) - Come and join us, we need you!
- [boy-hack/hack-requests](https://github.com/boy-hack/hack-requests) - The hack-requests is an http network library for hackers
- [callmefeifei/SvnHack](https://github.com/callmefeifei/SvnHack) - 一个Svn信息泄露辅助工具,可以使用这个脚本列取网站目录,读取源码文件以及下载整站代码。
- [aleenzz/mybugscan](https://github.com/aleenzz/mybugscan) - fofa_api+bugscan插件扫描
- [Tuhinshubhra/CMSeeK](https://github.com/Tuhinshubhra/CMSeeK) - CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs
- [lcatro/etherum_rpc_steal](https://github.com/lcatro/etherum_rpc_steal) - The Etherum RPC Steal Toolset and honeypot .以太坊"偷渡"漏洞利用和蜜罐工具集.
- [liuhuanyong/EventMonitor](https://github.com/liuhuanyong/EventMonitor) - Event monitor based on online news corpus including event storyline and analysis,基于给定事件关键词,采集事件资讯,对事件进行挖掘和分析。
- [thehackingsage/hacktronian](https://github.com/thehackingsage/hacktronian) - Tools for Pentesting
- [Jumbo-WJB/JPentest](https://github.com/Jumbo-WJB/JPentest) - Jumbo Python Penetration testing framework
- [super-l/superl-url](https://github.com/super-l/superl-url) - 根据关键词,对搜索引擎内容检索结果的网址内容进行采集的一款程序。可自动从多个搜索引擎采集相关网站的真实地址与标题等信息,可保存为文件,自动去除重复URL。同时,也可以自定义忽略多条域名等。
- [sshuttle/sshuttle](https://github.com/sshuttle/sshuttle) - Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
- [xjh22222228/awesome-web-editor](https://github.com/xjh22222228/awesome-web-editor) - 🔨 Open source WEB editor summary
- [wstart/DB_BaseLine](https://github.com/wstart/DB_BaseLine) - 数据库基线检查工具
- [JPCERTCC/LogonTracer](https://github.com/JPCERTCC/LogonTracer) - Investigate malicious Windows logon by visualizing and analyzing Windows event log
- [zer0h/httpscan](https://github.com/zer0h/httpscan) - 一个爬虫式的网段Web主机发现小工具 # A HTTP Service detector with a crawler from IP/CIDR
- [jeffzh3ng/fuxi](https://github.com/jeffzh3ng/fuxi) - Penetration Testing Platform
- [BugScanTeam/GitHack](https://github.com/BugScanTeam/GitHack) - .git 泄漏利用工具,可还原历史版本
- [AonCyberLabs/Windows-Exploit-Suggester](https://github.com/AonCyberLabs/Windows-Exploit-Suggester) - This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploit
- [duoergun0729/nlp](https://github.com/duoergun0729/nlp) - 兜哥出品 <一本开源的NLP入门书籍>
- [bit4woo/teemo](https://github.com/bit4woo/teemo) - A Domain Name & Email Address Collection Tool
- [philipperemy/tensorflow-1.4-billion-password-analysis](https://github.com/philipperemy/tensorflow-1.4-billion-password-analysis) - Deep Learning model to analyze a large corpus of clear text passwords.
- [SYWorks/waidps](https://github.com/SYWorks/waidps) - Wireless Auditing, Intrusion Detection & Prevention System
- [LennonChin/Code-Confuse-Plugin](https://github.com/LennonChin/Code-Confuse-Plugin) - iOS代码混淆插件;A plugin to confuse codes in iOS Platform.
- [naozibuhao/iGuardForPython](https://github.com/naozibuhao/iGuardForPython) -
- [welliamcao/OpsManage](https://github.com/welliamcao/OpsManage) - 自动化运维平台: 代码及应用部署CI/CD、资产管理CMDB、计划任务管理平台、SQL审核|回滚、任务调度、站内WIKI
- [gr4ym4ntx/attackintel](https://github.com/gr4ym4ntx/attackintel) - A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.
- [tlkh/prowler](https://github.com/tlkh/prowler) - Distributed Network Vulnerability Scanner
- [imWildCat/scylla](https://github.com/imWildCat/scylla) - Intelligent proxy pool for Humans™ to extract content from the internet and build your own Large Language Models in this new AI era
- [Lucifer1993/struts-scan](https://github.com/Lucifer1993/struts-scan) - Python2编写的struts2漏洞全版本检测和利用工具
- [ropnop/windows_sshagent_extract](https://github.com/ropnop/windows_sshagent_extract) - PoC code to extract private keys from Windows 10's built in ssh-agent service
- [boy-hack/w8fuckcdn](https://github.com/boy-hack/w8fuckcdn) - Get website IP address by scanning the entire net 通过扫描全网绕过CDN获取网站IP地址
- [superhj1987/awesome-scripts](https://github.com/superhj1987/awesome-scripts) - useful scripts for Linux op
- [Brucetg/Pentest-tools](https://github.com/Brucetg/Pentest-tools) - 内网渗透工具
- [lcatro/PHP_Source_Audit_Tools](https://github.com/lcatro/PHP_Source_Audit_Tools) - PHP 白盒分析工具,结合AST 和数据流跟踪分析代码,达到自动化白盒审计功能
- [WangYihang/SourceLeakHacker](https://github.com/WangYihang/SourceLeakHacker) - :bug: A multi threads web application source leak scanner
- [yuxiaokui/Intranet-Penetration](https://github.com/yuxiaokui/Intranet-Penetration) - 内网渗透必备工具。
- [ezelf/CVE-2018-9995_dvr_credentials](https://github.com/ezelf/CVE-2018-9995_dvr_credentials) - (CVE-2018-9995) Get DVR Credentials
- [he1m4n6a/btScan](https://github.com/he1m4n6a/btScan) - 批量漏洞扫描框架
- [Fplyth0ner-Combie/Bug-Project-Framework](https://github.com/Fplyth0ner-Combie/Bug-Project-Framework) - 漏洞利用框架模块分享仓库
- [Tycx2ry/docker_api_vul](https://github.com/Tycx2ry/docker_api_vul) - docker 未授权访问漏洞利用脚本
- [malleum-inc/canari3](https://github.com/malleum-inc/canari3) - Canari v3 - next gen Maltego framework for rapid remote and local transform development
- [doyler/SecurityTools](https://github.com/doyler/SecurityTools) - A single repository for any security tools, scripts, documentation, etc. that I add
- [flipkart-incubator/Astra](https://github.com/flipkart-incubator/Astra) - Automated Security Testing For REST API's
- [klsecservices/rpivot](https://github.com/klsecservices/rpivot) - socks4 reverse proxy for penetration testing
- [wwong99/pentest-notes](https://github.com/wwong99/pentest-notes) -
- [initstring/passphrase-wordlist](https://github.com/initstring/passphrase-wordlist) - Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords
- [rvrsh3ll/FindFrontableDomains](https://github.com/rvrsh3ll/FindFrontableDomains) - Search for potential frontable domains
- [SecWiki/office-exploits](https://github.com/SecWiki/office-exploits) - office-exploits Office漏洞集合 https://www.sec-wiki.com
- [WangYihang/ccupp](https://github.com/WangYihang/ccupp) - 基于社会工程学的弱口令密码字典生成工具
- [rootm0s/WinPwnage](https://github.com/rootm0s/WinPwnage) - UAC bypass, Elevate, Persistence methods
- [giovanifss/Gitmails](https://github.com/giovanifss/Gitmails) - An information gathering tool to collect git commit emails in version control host services
- [51x/WHP](https://github.com/51x/WHP) - Micro$oft Windows Hacking Pack
- [3gstudent/GetExpiredDomains](https://github.com/3gstudent/GetExpiredDomains) - Search for available domain from expireddomains.net
- [pimps/CVE-2018-7600](https://github.com/pimps/CVE-2018-7600) - Exploit for Drupal 7 <= 7.57 CVE-2018-7600
- [feicong/jni_helper](https://github.com/feicong/jni_helper) - Android SO自动化分析工具
- [samhaxr/hackbox](https://github.com/samhaxr/hackbox) - HackBox is a powerful and comprehensive tool that combines a variety of techniques for web application and network security assessments, including XSS testing, subdomain scanning, SSRF injection, and
- [lbp0200/PRCDNS](https://github.com/lbp0200/PRCDNS) - 准确、CDN友好
- [bieberg0n/bjdns](https://github.com/bieberg0n/bjdns) - A dns server which can protect yourself against DNS poisoning in China. / 抗污染 带缓存的dns服务器
- [jekil/awesome-hacking](https://github.com/jekil/awesome-hacking) - Awesome hacking is an awesome collection of hacking tools.
- [jmcgrath207/DnsCryptProxyPiTool](https://github.com/jmcgrath207/DnsCryptProxyPiTool) - DnsCrypt Proxy 2 for PiHole Raspberry Pi 3
- [ThunderEX/py-kms](https://github.com/ThunderEX/py-kms) - A KMS server written in python.
- [ngalongc/AutoLocalPrivilegeEscalation](https://github.com/ngalongc/AutoLocalPrivilegeEscalation) - An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically
- [naozibuhao/crackedmysql](https://github.com/naozibuhao/crackedmysql) -
- [FallenGaven/AWVS11_Python3](https://github.com/FallenGaven/AWVS11_Python3) - 之前做系统,要对接AWVS11,写了一个可以python3的调用文档,感兴趣的可以看看
- [AV1080p/LayerPyAwvs](https://github.com/AV1080p/LayerPyAwvs) - Python结合Layer子域名挖掘机实现Awvs自动扫描
- [KiriKira/scripts](https://github.com/KiriKira/scripts) - Simple repo just for fun and for personal usage. Use them at your own risk.
- [chrissimpkins/codeface](https://github.com/chrissimpkins/codeface) - Typefaces for source code beautification
- [fendouai/Awesome-TensorFlow-Chinese](https://github.com/fendouai/Awesome-TensorFlow-Chinese) - Awesome-TensorFlow-Chinese,TensorFlow 中文资源精选,官方网站,安装教程,入门教程,视频教程,实战项目,学习路径。QQ群:167122861,公众号:磐创AI,微信群二维码:http://www.tensorflownews.com/
- [5up3rc/NagaScan](https://github.com/5up3rc/NagaScan) - NagaScan is a distributed passive scanner for Web application.
- [operatorequals/SMBRat](https://github.com/operatorequals/SMBRat) - A Windows Remote Administration Tool in Visual Basic with UNC paths
- [bonkc/BugBountySubdomains](https://github.com/bonkc/BugBountySubdomains) - Tools to gather subdomains from Bug Bounty programs
- [lyyyuna/DHT_sniffer](https://github.com/lyyyuna/DHT_sniffer) - DHT 公网嗅探器
- [getpatchwork/patchwork](https://github.com/getpatchwork/patchwork) - Patchwork is a web-based patch tracking system designed to facilitate the contribution and management of contributions to an open-source project.
- [Crypt0s/FakeDns](https://github.com/Crypt0s/FakeDns) - A regular-expression based python MITM DNS server with support for DNS Rebinding attacks
- [blackye/lalascan](https://github.com/blackye/lalascan) - 自主开发的分布式web漏洞扫描框架,集合webkit爬虫,Subdomain子域名发现,sqli、反射xss、Domxss等owasp top10漏洞扫描和边界资产发现能力。同时为通用CMS POC扫描提供了插件扩展平台
- [euske/pyrexecd](https://github.com/euske/pyrexecd) - Standalone SSH server for Windows
- [crazyguitar/pysheeet](https://github.com/crazyguitar/pysheeet) - Python Cheat Sheet
- [Rhilip/PT-help](https://github.com/Rhilip/PT-help) -
- [se55i0n/DBScanner](https://github.com/se55i0n/DBScanner) - 自动扫描内网常见sql、no-sql数据库脚本(mysql、mssql、oracle、postgresql、redis、mongodb、memcached、elasticsearch),包含未授权访问及常规弱口令检测
- [c0mmand3rOpSec/CVE-2017-10271](https://github.com/c0mmand3rOpSec/CVE-2017-10271) - WebLogic Exploit
- [yhangf/PyQuickInstall](https://github.com/yhangf/PyQuickInstall) - :zap::zap::zap:超好用的pip下载加速工具,谁用谁知道!
- [anhkgg/PyRat](https://github.com/anhkgg/PyRat) - PyRat,a rat by python xmlrpc
- [jiangsir404/S7scan](https://github.com/jiangsir404/S7scan) - a pentest scanner / 一个漏洞综合利用工具轮子,大佬请忽略
- [tuna/blogroll](https://github.com/tuna/blogroll) - 世界一流兼容并包TUNA协会收集的周围同学们的Blog
- [mandiant/flare-fakenet-ng](https://github.com/mandiant/flare-fakenet-ng) - FakeNet-NG - Next Generation Dynamic Network Analysis Tool
- [649/Memcrashed-DDoS-Exploit](https://github.com/649/Memcrashed-DDoS-Exploit) - DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API
- [AlessandroZ/LaZagne](https://github.com/AlessandroZ/LaZagne) - Credentials recovery project
- [bisguzar/twitter-scraper](https://github.com/bisguzar/twitter-scraper) - Scrape the Twitter Frontend API without authentication.
- [FeeiCN/ESD](https://github.com/FeeiCN/ESD) - Enumeration sub domains(枚举子域名)
- [SECFORCE/Tunna](https://github.com/SECFORCE/Tunna) - Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in fully firewalled environments.
- [SungYK/DoubanHistory](https://github.com/SungYK/DoubanHistory) - 豆瓣热映电影30天历史评分
- [quentinhardy/msdat](https://github.com/quentinhardy/msdat) - MSDAT: Microsoft SQL Database Attacking Tool
- [v1cker/src_edu](https://github.com/v1cker/src_edu) - 为各位出色的渗透工程师提供攻击目标。
- [azizaltuntas/Pymap-Scanner](https://github.com/azizaltuntas/Pymap-Scanner) -
- [jamiecaesar/securecrt-tools](https://github.com/jamiecaesar/securecrt-tools) - SecureCRT scripts, written in Python, for doing various tasks when connected to Cisco equipment.
- [cym13/vbs-reverse-shell](https://github.com/cym13/vbs-reverse-shell) - VBS reverse shell scripts
- [laixintao/feed](https://github.com/laixintao/feed) - Some feeds output from feedly.
- [SECFORCE/sparta](https://github.com/SECFORCE/sparta) - Network Infrastructure Penetration Testing Tool
- [shakenetwork/mimipenguin](https://github.com/shakenetwork/mimipenguin) - Mimipenguin密码抓取神器
- [bl4de/security-tools](https://github.com/bl4de/security-tools) - My collection of various security tools created mostly in Python and Bash. For CTFs and Bug Bounty.
- [iceyhexman/onlinetools](https://github.com/iceyhexman/onlinetools) - 在线cms识别|信息泄露|工控|系统|物联网安全|cms漏洞扫描|nmap端口扫描|子域名获取|待续..
- [wetw0rk/Sickle](https://github.com/wetw0rk/Sickle) - Payload development framework
- [jobroche/InSpy](https://github.com/jobroche/InSpy) - A python based LinkedIn enumeration tool
- [FunctionClub/uPing](https://github.com/FunctionClub/uPing) - 一个24小时监测VPS延迟的工具
- [safebuffer/CVE-2018-6389](https://github.com/safebuffer/CVE-2018-6389) - CVE-2018-6389 Exploit In WordPress DoS
- [admintony/svnExploit](https://github.com/admintony/svnExploit) - SvnExploit支持SVN源代码泄露全版本Dump源码
- [alpha1e0/kiwi](https://github.com/alpha1e0/kiwi) - kiwi:安全源码审计工具
- [ropnop/windapsearch](https://github.com/ropnop/windapsearch) - Python script to enumerate users, groups and computers from a Windows domain through LDAP queries
- [mstxq17/dbLeakscan](https://github.com/mstxq17/dbLeakscan) - this scanner try to scan some dbbak or ctf #源码泄露
- [0xbug/SQLiScanner](https://github.com/0xbug/SQLiScanner) - Automatic SQL injection with Charles and sqlmap api
- [joh/when-changed](https://github.com/joh/when-changed) - Execute a command when a file is changed
- [rxwx/CVE-2018-0802](https://github.com/rxwx/CVE-2018-0802) - PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)
- [stevecoward/ansible-pentest-deploy](https://github.com/stevecoward/ansible-pentest-deploy) - Using Ansible as an orchestrator, this project is another solution for testers looking to configure and deploy a new VM or VPS box with the tools that they need for penetration testing.
- [trustedsec/hate_crack](https://github.com/trustedsec/hate_crack) - A tool for automating cracking methodologies through Hashcat from the TrustedSec team.
- [NullArray/AutoSploit](https://github.com/NullArray/AutoSploit) - Automated Mass Exploiter
- [naozibuhao/QQLocation](https://github.com/naozibuhao/QQLocation) -
- [5alt/ZeroScan](https://github.com/5alt/ZeroScan) - ZeroScan is a tool that auto gathers subdomains and scan ports
- [almandin/fuxploider](https://github.com/almandin/fuxploider) - File upload vulnerability scanner and exploitation tool.
- [PegasusLab/WiFi-Miner-Detector](https://github.com/PegasusLab/WiFi-Miner-Detector) - Detecting malicious WiFi with mining cryptocurrency.
- [twelvesec/gasmask](https://github.com/twelvesec/gasmask) - Information gathering tool - OSINT
- [bit4woo/DNSLog](https://github.com/bit4woo/DNSLog) - DNSLog 是一款监控 DNS 解析记录和 HTTP 访问记录的工具。
- [neargle/ver-observer](https://github.com/neargle/ver-observer) - 🐽 Detection version of framework \ CMS \ dev-dependence on target website.
- [FortuneC00kie/bug-monitor](https://github.com/FortuneC00kie/bug-monitor) - Seebug、structs、cve漏洞实时监控推送系统🔦
- [odboy/shadowProxy](https://github.com/odboy/shadowProxy) -
- [mh4x0f/kinproxy](https://github.com/mh4x0f/kinproxy) - my implements transparent proxies (mitmproxy) can use to intercept and manipulate HTTP traffic modifying requests and responses. CLI
- [sgayou/medfusion-4000-research](https://github.com/sgayou/medfusion-4000-research) - Medfusion 4000 security research & a MQX RCE.
- [nathanlopez/Stitch](https://github.com/nathanlopez/Stitch) - Python Remote Administration Tool (RAT)
- [securifera/MaltegoNessusParser](https://github.com/securifera/MaltegoNessusParser) - Maltego transform for visualizing Nessus scan data
- [UndeadSec/EvilURL](https://github.com/UndeadSec/EvilURL) - Generate unicode domains for IDN Homograph Attack and detect them.
- [Fanduzi/MySQL-Scripts](https://github.com/Fanduzi/MySQL-Scripts) - 收集的一些MySQL维护脚本
- [1N3/BlackWidow](https://github.com/1N3/BlackWidow) - A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.
- [OWASP/owasp-mastg](https://github.com/OWASP/owasp-mastg) - The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls
- [D4Vinci/One-Lin3r](https://github.com/D4Vinci/One-Lin3r) - Gives you one-liners that aids in penetration testing operations, privilege escalation and more
- [SigPloiter/GTScan](https://github.com/SigPloiter/GTScan) - The Nmap Scanner for Telco
- [se55i0n/Awvs_Nessus_Scanner_API](https://github.com/se55i0n/Awvs_Nessus_Scanner_API) - 扫描器Awvs 11和Nessus 7 Api利用脚本
- [OWASP/Nettacker](https://github.com/OWASP/Nettacker) - Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
- [jiangsir404/PHP-code-audit](https://github.com/jiangsir404/PHP-code-audit) - php code audit for cms vulnerabilities / 代码审计,对一些大型cms漏洞的复现研究,更新源码和漏洞exp
- [FeeiCN/GSIL](https://github.com/FeeiCN/GSIL) - GitHub Sensitive Information Leakage(GitHub敏感信息泄露监控)
- [yuhang-dong/CTF_tools](https://github.com/yuhang-dong/CTF_tools) - 用于CTF密码学和编码转换的小工具
- [haikouxuege/better-ctf-tools](https://github.com/haikouxuege/better-ctf-tools) - 更好的ctf密码学加解密及编解码工具
- [dirkjanm/mitm6](https://github.com/dirkjanm/mitm6) - pwning IPv4 via IPv6
- [Ridter/RTF_11882_0802](https://github.com/Ridter/RTF_11882_0802) - PoC for CVE-2018-0802 And CVE-2017-11882
- [Manisso/fsociety](https://github.com/Manisso/fsociety) - fsociety Hacking Tools Pack – A Penetration Testing Framework
- [1oid/webknife](https://github.com/1oid/webknife) - Web在线菜刀
- [blackye/webdirdig](https://github.com/blackye/webdirdig) - web敏感目录、信息泄漏批量扫描脚本,结合爬虫、目录深度遍历。
- [owocki/pytrader](https://github.com/owocki/pytrader) - cryptocurrency trading robot
- [CryptoSignal/Crypto-Signal](https://github.com/CryptoSignal/Crypto-Signal) - Github.com/CryptoSignal - Trading & Technical Analysis Bot - 4,100+ stars, 1,100+ forks
- [artkond/cisco-snmp-rce](https://github.com/artkond/cisco-snmp-rce) - Cisco IOS SNMP RCE PoC
- [ethereum/py-evm](https://github.com/ethereum/py-evm) - A Python implementation of the Ethereum Virtual Machine
- [coco413/DiscoverSubdomain](https://github.com/coco413/DiscoverSubdomain) - 前渗透信息探测工具集-子域名
- [3xp10it/xcdn](https://github.com/3xp10it/xcdn) - Try to find out the real ip behind cdn
- [borgmatic-collective/borgmatic](https://github.com/borgmatic-collective/borgmatic) - Simple, configuration-driven backup software for servers and workstations
- [JQ-Networks/UnifiedMessageRelay](https://github.com/JQ-Networks/UnifiedMessageRelay) - Group Message Forward Framework (supports QQ Telegram Line Discord)
- [grayddq/PublicMonitors](https://github.com/grayddq/PublicMonitors) - 对公网IP列表进行端口服务扫描,发现周期内的端口服务变化情况和弱口令安全风险
- [vipkidzhangxiao/exchangecrack](https://github.com/vipkidzhangxiao/exchangecrack) - 用于探测公司用户是否存在弱口令
- [CHYbeta/cmsPoc](https://github.com/CHYbeta/cmsPoc) - CMS渗透测试框架-A CMS Exploit Framework
- [rudSarkar/crlf-injector](https://github.com/rudSarkar/crlf-injector) - A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commonly done by modifying an HTTP parameter or URL.
- [maK-/parameth](https://github.com/maK-/parameth) - This tool can be used to brute discover GET and POST parameters
- [utiso/dorkbot](https://github.com/utiso/dorkbot) - Command-line tool to scan Google search results for vulnerabilities
- [ajinabraham/WebAppSec](https://github.com/ajinabraham/WebAppSec) - Web Application Security
- [miaouPlop/GWT-3D](https://github.com/miaouPlop/GWT-3D) -
- [SewellDinG/SitePathScan](https://github.com/SewellDinG/SitePathScan) - 🔨基于Python的网站路径扫描工具
- [We5ter/GSDF](https://github.com/We5ter/GSDF) - A domain searcher named GoogleSSLdomainFinder - 基于谷歌SSL透明证书的子域名查询工具
- [grayddq/PubilcAssetInfo](https://github.com/grayddq/PubilcAssetInfo) - 以甲方安全人员的视角,尽可能收集发现企业的域名和服务器公网IP资产
- [LockGit/Hacking](https://github.com/LockGit/Hacking) - Hacker, ready for more of our story ! 🚀
- [linroid/sadb](https://github.com/linroid/sadb) - (safe adb) Easy your adb operation when connected multiple devices
- [bit4woo/passmaker](https://github.com/bit4woo/passmaker) - 可以自定义规则的密码字典生成器,支持图形界面 A password-generator that base on the rules that you specified
- [public-apis/public-apis](https://github.com/public-apis/public-apis) - A collective list of free APIs
- [elliotgao2/toapi](https://github.com/elliotgao2/toapi) - Every web site provides APIs.
- [1337g/CVE-2017-10271](https://github.com/1337g/CVE-2017-10271) - CVE-2017-10271 WEBLOGIC RCE (TESTED)
- [AlessandroZ/BeRoot](https://github.com/AlessandroZ/BeRoot) - Privilege Escalation Project - Windows / Linux / Mac
- [livc/CryptoHub_Bot](https://github.com/livc/CryptoHub_Bot) - Everything you desire in the revolution of cryptocurrency.
- [yutiansut/QUANTAXIS](https://github.com/yutiansut/QUANTAXIS) - QUANTAXIS 支持任务调度 分布式部署的 股票/期货/期权 数据/回测/模拟/交易/可视化/多账户 纯本地量化解决方案
- [bbfamily/abu](https://github.com/bbfamily/abu) - 阿布量化交易系统(股票,期权,期货,比特币,机器学习) 基于python的开源量化交易,量化投资架构
- [brannondorsey/PassGAN](https://github.com/brannondorsey/PassGAN) - A Deep Learning Approach for Password Guessing (https://arxiv.org/abs/1709.00440)
- [firejq/mdpicker-qiniu](https://github.com/firejq/mdpicker-qiniu) - :scissors: 简化使用 markdown 写作时插入图片的繁琐流程,自动将截图后剪贴板中的图片上传至个人七牛云空间,并获取图片外链,输出到剪贴板
- [cls1991/gy](https://github.com/cls1991/gy) - Yet another .gitignore magician in your command line.
- [jonluca/Anubis](https://github.com/jonluca/Anubis) - Subdomain enumeration and information gathering tool
- [Cisco-Talos/Decept](https://github.com/Cisco-Talos/Decept) - Decept Network Protocol Proxy
- [budtmo/docker-android](https://github.com/budtmo/docker-android) - Android in docker solution with noVNC supported and video recording
- [WeblateOrg/weblate](https://github.com/WeblateOrg/weblate) - Web based localization tool with tight version control integration.
- [003random/003Recon](https://github.com/003random/003Recon) - Some tools to automate recon - 003random
- [llxxs/awada](https://github.com/llxxs/awada) - lcx in python edition
- [pritunl/pritunl](https://github.com/pritunl/pritunl) - Enterprise VPN server
- [0x27/ssh_keyscanner](https://github.com/0x27/ssh_keyscanner) - ssh public host key scanner using shodan
- [gelim/nmap-sap](https://github.com/gelim/nmap-sap) - Nmap custom probes for better detecting SAP services
- [vah13/SAP_vulnerabilities](https://github.com/vah13/SAP_vulnerabilities) - DoS PoC's for SAP products
- [h2y/Shadowrocket-ADBlock-Rules](https://github.com/h2y/Shadowrocket-ADBlock-Rules) - 提供多款 Shadowrocket 规则,带广告过滤功能。用于 iOS 未越狱设备选择性地自动翻墙。
- [pypa/pipenv](https://github.com/pypa/pipenv) - Python Development Workflow for Humans.
- [Cryin/JavaID](https://github.com/Cryin/JavaID) - java source code static code analysis and danger function identify prog
- [Ridter/CVE-2017-11882](https://github.com/Ridter/CVE-2017-11882) - CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882
- [embedi/CVE-2017-11882](https://github.com/embedi/CVE-2017-11882) - Proof-of-Concept exploits for CVE-2017-11882
- [ideal/mirror](https://github.com/ideal/mirror) - Task scheduler for open source mirror site (initially for https://mirror.bjtu.edu.cn)
- [mzeyong/CVE-2017-13089](https://github.com/mzeyong/CVE-2017-13089) - CVE-2017-13089
- [s0md3v/Striker](https://github.com/s0md3v/Striker) - Striker is an offensive information and vulnerability scanner.
- [JohannesEbke/aws_list_all](https://github.com/JohannesEbke/aws_list_all) - List all your AWS resources, all regions, all services.
- [hlldz/SpookFlare](https://github.com/hlldz/SpookFlare) - Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
- [RoganDawes/P4wnP1](https://github.com/RoganDawes/P4wnP1) - P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.
- [elceef/dnstwist](https://github.com/elceef/dnstwist) - Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
- [Lucifer1993/AngelSword](https://github.com/Lucifer1993/AngelSword) - Python3编写的CMS漏洞检测框架
- [cdhowie/netflix-no-ipv6-dns-proxy](https://github.com/cdhowie/netflix-no-ipv6-dns-proxy) - NOTE: I am no longer a Netflix subscriber and therefore cannot reasonably maintain this project anymore. (Fix for Netflix blocking various IPv6 tunnels by returning no results for AAAA queries of Netf
- [chubin/cheat.sh](https://github.com/chubin/cheat.sh) - the only cheat sheet you need
- [knownsec/rtcp](https://github.com/knownsec/rtcp) - 利用 Python 的 Socket 端口转发,用于远程维护
- [LoRexxar/Kunlun-M](https://github.com/LoRexxar/Kunlun-M) - KunLun-M是一个完全开源的静态白盒扫描工具,支持PHP、JavaScript的语义扫描,基础安全、组件安全扫描,Chrome Ext\Solidity的基础扫描。
- [leonteale/pentestpackage](https://github.com/leonteale/pentestpackage) - a package of Pentest scripts I have made or commonly use
- [Voulnet/CVE-2017-8759-Exploit-sample](https://github.com/Voulnet/CVE-2017-8759-Exploit-sample) - Running CVE-2017-8759 exploit sample.
- [lennylxx/ipv6-hosts](https://github.com/lennylxx/ipv6-hosts) - Fork of https://code.google.com/archive/p/ipv6-hosts/, focusing on automation
- [coffeehb/Some-PoC-oR-ExP](https://github.com/coffeehb/Some-PoC-oR-ExP) - 各种漏洞poc、Exp的收集或编写
- [MA3STR0/kimsufi-crawler](https://github.com/MA3STR0/kimsufi-crawler) - Crawler that will send you an email alert as soon as servers on OVH/Kimsufi become available for purchase
- [aploium/zmirror](https://github.com/aploium/zmirror) - The next-gen reverse proxy for full site mirroring
- [i-am-myrte/CloudXNS-DDNS](https://github.com/i-am-myrte/CloudXNS-DDNS) - The Python shell of CloudXNS DDNS
- [sivel/speedtest-cli](https://github.com/sivel/speedtest-cli) - Command line interface for testing internet bandwidth using speedtest.net
- [zhongzhi107/raspberry-pi-tutorials](https://github.com/zhongzhi107/raspberry-pi-tutorials) - 面向软件工程师的树莓派入门教程
- [codingo/VHostScan](https://github.com/codingo/VHostScan) - A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
- [mmmwhy/pure_attention](https://github.com/mmmwhy/pure_attention) - 使用 attention 实现 nlp 和 cv 相关模型。
- [onvno/resizeup](https://github.com/onvno/resizeup) - Dropzone3's Action Plugin - Markdown insert images solution
- [nopernik/SSHPry2.0](https://github.com/nopernik/SSHPry2.0) - SSHPry v2 - Spy & Control os SSH Connected client's TTY
- [mozilla/cipherscan](https://github.com/mozilla/cipherscan) - A very simple way to find out which SSL ciphersuites are supported by a target.
- [Mr-Un1k0d3r/ThunderShell](https://github.com/Mr-Un1k0d3r/ThunderShell) - Python / C# Unmanaged PowerShell based RAT
- [ojasookert/CVE-2017-0785](https://github.com/ojasookert/CVE-2017-0785) - Blueborne CVE-2017-0785 Android information leak vulnerability
- [Tylous/SniffAir](https://github.com/Tylous/SniffAir) - A framework for wireless pentesting.
- [OsandaMalith/LFiFreak](https://github.com/OsandaMalith/LFiFreak) - A unique automated LFi Exploiter with Bind/Reverse Shells
- [Ekultek/Zeus-Scanner](https://github.com/Ekultek/Zeus-Scanner) - Advanced reconnaissance utility
- [googleprojectzero/domato](https://github.com/googleprojectzero/domato) - DOM fuzzer
- [nopernik/sshpry](https://github.com/nopernik/sshpry) - Seamlessly spy on SSH session like it is your tty
- [DanMcInerney/net-creds](https://github.com/DanMcInerney/net-creds) - Sniffs sensitive data from interface or pcap
- [airbnb/binaryalert](https://github.com/airbnb/binaryalert) - BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.
- [kevthehermit/PasteHunter](https://github.com/kevthehermit/PasteHunter) - Scanning pastebin with yara rules
- [cujanovic/SSRF-Testing](https://github.com/cujanovic/SSRF-Testing) - SSRF (Server Side Request Forgery) testing resources
- [sh1nu11bi/Routerhunter-2.0](https://github.com/sh1nu11bi/Routerhunter-2.0) - Testing vulnerabilities in devices and routers connected to the Internet.
- [chroming/pdfdir](https://github.com/chroming/pdfdir) - PDF导航(大纲/目录)添加工具
- [Nitr4x/whichCDN](https://github.com/Nitr4x/whichCDN) - WhichCDN allows to detect if a given website is protected by a Content Delivery Network
- [GreatSCT/GreatSCT](https://github.com/GreatSCT/GreatSCT) - The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool is intended for BOTH red and blue team.
- [WangYihang/Webshell-Sniper](https://github.com/WangYihang/Webshell-Sniper) - :hammer: Manage your website via terminal
- [Yggdroot/LeaderF](https://github.com/Yggdroot/LeaderF) - An efficient fuzzy finder that helps to locate files, buffers, mrus, gtags, etc. on the fly for both vim and neovim.
- [brianwrf/S2-053-CVE-2017-12611](https://github.com/brianwrf/S2-053-CVE-2017-12611) - A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)
- [gelstudios/gitfiti](https://github.com/gelstudios/gitfiti) - abusing github commit history for the lulz
- [sleventyeleven/linuxprivchecker](https://github.com/sleventyeleven/linuxprivchecker) - linuxprivchecker.py -- a Linux Privilege Escalation Check Script
- [Nandaka/PixivUtil2](https://github.com/Nandaka/PixivUtil2) - Download images from Pixiv and more!
- [honeynet/beeswarm](https://github.com/honeynet/beeswarm) - Honeypot deployment made easy
- [Dragon2fly/vpngate-with-proxy](https://github.com/Dragon2fly/vpngate-with-proxy) - vpn gate client for linux, be able to connect to open vpn server through proxy
- [zam1024t/LocalizedMenu](https://github.com/zam1024t/LocalizedMenu) - Localize Tool & Localized Menu for Sublime Text 2/3/4 End User. Localization with 简体中文(Simplified Chinese)/繁体中文(Traditional Chinese)/Русский(Russian)/Español(Spanish)/Հայերեն(Armenian)/Svenska(Swedish
- [fengyouchao/webzmap](https://github.com/fengyouchao/webzmap) - Zmap on Web
- [telekom-security/explo](https://github.com/telekom-security/explo) - Human and machine readable web vulnerability testing format
- [satwikkansal/wtfpython](https://github.com/satwikkansal/wtfpython) - What the f*ck Python? 😱
- [DanMcInerney/LANs.py](https://github.com/DanMcInerney/LANs.py) - Inject code and spy on wifi users
- [swisskyrepo/Wordpresscan](https://github.com/swisskyrepo/Wordpresscan) - WPScan rewritten in Python + some WPSeku ideas
- [billy-osullivan/IOT-Protect-Continous-Vulnerability-Scanner](https://github.com/billy-osullivan/IOT-Protect-Continous-Vulnerability-Scanner) - A continous vulnerability scanner which scanys for Qbot and Mirai vulnerabilites and displays results in a browser
- [ohmyadd/wetland](https://github.com/ohmyadd/wetland) - A high interaction SSH honeypot
- [LoveCppp/Http-Proxy-Scan](https://github.com/LoveCppp/Http-Proxy-Scan) - Use Censys.io Scan Http Proxy
- [eldraco/domain_analyzer](https://github.com/eldraco/domain_analyzer) - Analyze the security of any domain by finding all the information possible. Made in python.
- [A3sal0n/CyberThreatHunting](https://github.com/A3sal0n/CyberThreatHunting) - A collection of resources for Threat Hunters
- [drego85/JoomlaScan](https://github.com/drego85/JoomlaScan) - A free software to find the components installed in Joomla CMS, built out of the ashes of Joomscan.
- [SilverBlog/silverblog](https://github.com/SilverBlog/silverblog) - A fast and lightweight blog framework based on Python3 development
- [RsaCtfTool/RsaCtfTool](https://github.com/RsaCtfTool/RsaCtfTool) - RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data
- [ius/rsatool](https://github.com/ius/rsatool) - rsatool can be used to calculate RSA and RSA-CRT parameters
- [hillsbird/db_security](https://github.com/hillsbird/db_security) - 数据库安全审计平台
- [smgoller/rangehttpserver](https://github.com/smgoller/rangehttpserver) - Python module that implements a simple HTTP server that understands the HTTP Range header.
- [ferstar/qiniu4blog](https://github.com/ferstar/qiniu4blog) - 使用七牛云存储创建自己的图床,用于写博客
- [LiuXingMing/QQSpider](https://github.com/LiuXingMing/QQSpider) - QQ空间爬虫(日志、说说、个人信息)
- [coderzh/coderzh-hugo-blog](https://github.com/coderzh/coderzh-hugo-blog) - My Perfect Hugo Blog
- [pentestmonkey/windows-privesc-check](https://github.com/pentestmonkey/windows-privesc-check) - Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems
- [sensepost/reGeorg](https://github.com/sensepost/reGeorg) - The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.
- [deibit/cansina](https://github.com/deibit/cansina) - Web Content Discovery Tool
- [vishnubob/wait-for-it](https://github.com/vishnubob/wait-for-it) - Pure bash script to test and wait on the availability of a TCP host and port
- [alainiamburg/sniffROM](https://github.com/alainiamburg/sniffROM) - A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to reconstruct flash memory contents and extract contextual information
- [jjf012/PassiveScanner](https://github.com/jjf012/PassiveScanner) - a passive scanner based on Mitmproxy and Arachni
- [earwig/git-repo-updater](https://github.com/earwig/git-repo-updater) - A console script that allows you to easily update multiple git repositories at once
- [lahwaacz/arch-wiki-docs](https://github.com/lahwaacz/arch-wiki-docs) - A script to download pages from Arch Wiki for offline browsing
- [fooying/fthreadpool](https://github.com/fooying/fthreadpool) - 线程池模块,增加超时监控,自动Kill
- [derv82/wifite2](https://github.com/derv82/wifite2) - Rewrite of the popular wireless network auditor, "wifite"
- [tor2web/Tor2web](https://github.com/tor2web/Tor2web) - Tor2web is an HTTP proxy software that enables access to Tor Hidden Services by mean of common web browsers
- [anhkgg/hxsec_search](https://github.com/anhkgg/hxsec_search) -
- [PaulSec/DET](https://github.com/PaulSec/DET) - (extensible) Data Exfiltration Toolkit (DET)
- [k4m4/onioff](https://github.com/k4m4/onioff) - 🌰 An onion url inspector for inspecting deep web links.
- [mazen160/GithubCloner](https://github.com/mazen160/GithubCloner) - A script that clones Github repositories of users and organizations.
- [hslatman/awesome-industrial-control-system-security](https://github.com/hslatman/awesome-industrial-control-system-security) - A curated list of resources related to Industrial Control System (ICS) security.
- [Mosuan/FileScan](https://github.com/Mosuan/FileScan) - FileScan: 敏感文件扫描 / 二次判断降低误报率 / 扫描内容规则化 / 多目录扫描
- [SharadKumar97/OSINT-SPY](https://github.com/SharadKumar97/OSINT-SPY) - Performs OSINT scan on email/domain/ip_address/organization using OSINT-SPY. It can be used by Data Miners, Infosec Researchers, Penetration Testers and cyber crime investigator in order to find deep
- [codezjx/netease-cloud-music-dl](https://github.com/codezjx/netease-cloud-music-dl) - Netease cloud music song downloader, with full ID3 metadata, eg: front cover image, artist name, album name, song title and so on.
- [hongfeioo/UserDeviceTracker](https://github.com/hongfeioo/UserDeviceTracker) - 快速定位一个IP或MAC在你的网络中的位置,是网络工程师提高工作效率的利器,也可以为CMDB提供基础网络数据。
- [erevus-cn/scan_webshell](https://github.com/erevus-cn/scan_webshell) - 很简单的webshell扫描
- [Heurs/parseNTFS](https://github.com/Heurs/parseNTFS) - Simple NTFS crawler.
- [temesgeny/ppsx-file-generator](https://github.com/temesgeny/ppsx-file-generator) - ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)
- [shadowsocksrr/shadowsocksr](https://github.com/shadowsocksrr/shadowsocksr) - Python port of ShadowsocksR
- [pwning/defcon25-public](https://github.com/pwning/defcon25-public) - Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals
- [bugcrowd/HUNT](https://github.com/bugcrowd/HUNT) -
- [jpiechowka/jenkins-cve-2016-0792](https://github.com/jpiechowka/jenkins-cve-2016-0792) - Exploit for Jenkins serialization vulnerability - CVE-2016-0792
- [salesforce/ja3](https://github.com/salesforce/ja3) - JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.
- [ggusoft/inforfinder](https://github.com/ggusoft/inforfinder) - Inforfinder is a tool to collect information of any domains pointing at some server (ip, domain, range, file). Is able to detect all domains pointing to an IP address and detect CMS version installed
- [LandGrey/pydictor](https://github.com/LandGrey/pydictor) - A powerful and useful hacker dictionary builder for a brute-force attack
- [SparkSharly/DL_for_xss](https://github.com/SparkSharly/DL_for_xss) - Deep learnning for detection with xss
- [madeye/sssniff](https://github.com/madeye/sssniff) - ShadowSocks(SS) traffic sniffer
- [s0md3v/ReconDog](https://github.com/s0md3v/ReconDog) - Reconnaissance Swiss Army Knife
- [infosec-au/altdns](https://github.com/infosec-au/altdns) - Generates permutations, alterations and mutations of subdomains and then resolves them
- [dowsnature/dowsDNS](https://github.com/dowsnature/dowsDNS) - 快速翻跃中国防火墙
- [XX-net/XX-Net](https://github.com/XX-net/XX-Net) - A proxy tool to bypass GFW.
- [out0fmemory/GoAgent-Always-Available](https://github.com/out0fmemory/GoAgent-Always-Available) - 一直可用的GoAgent,会定时扫描可用的google gae ip,提供可自动化获取ip运行的版本
- [ccbikai/backup-to-qiniu](https://github.com/ccbikai/backup-to-qiniu) - 备份 VPS 到七牛云存储脚本
- [Lee-0x00/sec-awvs-agent](https://github.com/Lee-0x00/sec-awvs-agent) - High Concurrency of Awvs Scan Agent By AWVS HTTP API
- [PeterDing/aget](https://github.com/PeterDing/aget) - Aget - An Asynchronous Downloader
- [JusticeRage/freedomfighting](https://github.com/JusticeRage/freedomfighting) - A collection of scripts which may come in handy during your freedom fighting activities.
- [appsecco/bugcrowd-levelup-subdomain-enumeration](https://github.com/appsecco/bugcrowd-levelup-subdomain-enumeration) - This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtual conference
- [zjy-ucas/ChineseNER](https://github.com/zjy-ucas/ChineseNER) - A neural network model for Chinese named entity recognition
- [rikonaka/katoolin4china](https://github.com/rikonaka/katoolin4china) - Kali tools installer
- [jimywork/shodanwave](https://github.com/jimywork/shodanwave) - Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.
- [loveshell/rtcp](https://github.com/loveshell/rtcp) -
- [rdiff-backup/rdiff-backup](https://github.com/rdiff-backup/rdiff-backup) - Reverse differential backup tool, over a network or locally.
- [magic-wormhole/magic-wormhole](https://github.com/magic-wormhole/magic-wormhole) - get things from one computer to another, safely
- [RUB-NDS/PRET](https://github.com/RUB-NDS/PRET) - Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.
- [mps-youtube/yewtube](https://github.com/mps-youtube/yewtube) - yewtube, forked from mps-youtube , is a Terminal based YouTube player and downloader. No Youtube API key required.
- [aploium/shootback](https://github.com/aploium/shootback) - a reverse TCP tunnel let you access target behind NAT or firewall
- [Fare9/OSINTretasNoHayPastebines](https://github.com/Fare9/OSINTretasNoHayPastebines) - Trabajo de OSINT para búsqueda de patrones en pastebin.
- [rossant/awesome-math](https://github.com/rossant/awesome-math) - A curated list of awesome mathematics resources
- [williballenthin/python-idb](https://github.com/williballenthin/python-idb) - Pure Python parser and analyzer for IDA Pro database files (.idb).
- [tornadoweb/tornado](https://github.com/tornadoweb/tornado) - Tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.
- [dragoneeg/Struts2-048](https://github.com/dragoneeg/Struts2-048) - CVE-2017-9791
- [sonickun/ctf-crypto-writeups](https://github.com/sonickun/ctf-crypto-writeups) -
- [jordanpotti/AWSBucketDump](https://github.com/jordanpotti/AWSBucketDump) - Security Tool to Look For Interesting Files in S3 Buckets
- [google/ssl_logger](https://github.com/google/ssl_logger) - Decrypts and logs a process's SSL traffic.
- [spipm/crackcoin](https://github.com/spipm/crackcoin) - Very basic blockchain-free cryptocurrency PoC in Python
- [lightbulb-framework/lightbulb-framework](https://github.com/lightbulb-framework/lightbulb-framework) - Tools for auditing WAFS
- [ThomasTJdev/WMD](https://github.com/ThomasTJdev/WMD) - Python framework for IT security tools
- [borgbackup/borg-import](https://github.com/borgbackup/borg-import) - importer for rsync+hardlink based backups / rsnapshot
- [XuShaohua/bcloud](https://github.com/XuShaohua/bcloud) - 百度网盘的linux桌面客户端
- [retext-project/retext](https://github.com/retext-project/retext) - ReText: Simple but powerful editor for Markdown and reStructuredText
- [Yelp/osxcollector](https://github.com/Yelp/osxcollector) - A forensic evidence collection & analysis toolkit for OS X
- [m0rtem/CloudFail](https://github.com/m0rtem/CloudFail) - Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
- [D35m0nd142/LFISuite](https://github.com/D35m0nd142/LFISuite) - Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner
- [AdamLaurie/RFIDIOt](https://github.com/AdamLaurie/RFIDIOt) - python RFID / NFC library & tools
- [ethereum/web3.py](https://github.com/ethereum/web3.py) - A python interface for interacting with the Ethereum blockchain and ecosystem.
- [attify/firmware-analysis-toolkit](https://github.com/attify/firmware-analysis-toolkit) - Toolkit to emulate firmware and analyse it for security vulnerabilities
- [CTFd/CTFd](https://github.com/CTFd/CTFd) - CTFs as you need them
- [D4Vinci/Dr0p1t-Framework](https://github.com/D4Vinci/Dr0p1t-Framework) - A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
- [sensepost/autoDANE](https://github.com/sensepost/autoDANE) - Auto Domain Admin and Network Exploitation.
- [feeluown/FeelUOwn](https://github.com/feeluown/FeelUOwn) - trying to be a robust, user-friendly and hackable music player
- [fcavallarin/htcap](https://github.com/fcavallarin/htcap) - htcap is a web application scanner able to crawl single page application (SPA) recursively by intercepting ajax calls and DOM changes.
- [nccgroup/Winpayloads](https://github.com/nccgroup/Winpayloads) - Undetectable Windows Payload Generation
- [letiantian/TextRank4ZH](https://github.com/letiantian/TextRank4ZH) - :deciduous_tree:从中文文本中自动提取关键词和摘要
- [attardi/wikiextractor](https://github.com/attardi/wikiextractor) - A tool for extracting plain text from Wikipedia dumps
- [3xp10it/xwaf](https://github.com/3xp10it/xwaf) - Automatic bypass (brute force) waf
- [monperrus/crawler-user-agents](https://github.com/monperrus/crawler-user-agents) - Syntactic patterns of HTTP user-agents used by bots / robots / crawlers / scrapers / spiders. pull-request welcome :star:
- [nanshihui/PocCollect](https://github.com/nanshihui/PocCollect) - a plenty of poc based on python
- [fgeek/pyfiscan](https://github.com/fgeek/pyfiscan) - Free web-application vulnerability and version scanner
- [Tr3jer/dnsAutoRebinding](https://github.com/Tr3jer/dnsAutoRebinding) - ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6
- [praetorian-inc/pentestly](https://github.com/praetorian-inc/pentestly) - Python and Powershell internal penetration testing framework
- [sizzop/HEVD-Exploits](https://github.com/sizzop/HEVD-Exploits) - Various exploits for the HackSys Extreme Vulnerable Driver
- [coffeehb/struts2_check](https://github.com/coffeehb/struts2_check) - 一个用于识别目标网站是否采用Struts2框架开发的工具demo
- [ldionmarcil/sudo-backdoor](https://github.com/ldionmarcil/sudo-backdoor) - Wraps sudo; transparently steals user's credentials and exfiltrate over DNS. For those annoying times when you get a shell/file write on a sudoers account and need to leverage their credentials.
- [NetSPI/crossdomainscanner](https://github.com/NetSPI/crossdomainscanner) - Python tool for expired domain discovery in crossdomain.xml files
- [shipengtaov/discover-books](https://github.com/shipengtaov/discover-books) - 发现图书:豆瓣图书关系图
- [netxfly/passive_scan](https://github.com/netxfly/passive_scan) - 基于http代理的web漏洞扫描器的实现
- [fate0/getproxy](https://github.com/fate0/getproxy) - getproxy 是一个抓取发放代理网站,获取 http/https 代理的程序
- [superhuahua/xunfengES](https://github.com/superhuahua/xunfengES) -
- [mellow-hype/keysniffer-poc](https://github.com/mellow-hype/keysniffer-poc) - Simple PoC Linux keysniffer showing impact of a lack of GUI-isolation in X display server.
- [nsacyber/goSecure](https://github.com/nsacyber/goSecure) - An easy to use and portable Virtual Private Network (VPN) system built with Linux and a Raspberry Pi. #nsacyber
- [leostat/rtfm](https://github.com/leostat/rtfm) - A database of common, interesting or useful commands, in one handy referable form
- [royharoush/rtools](https://github.com/royharoush/rtools) - pentest floating repo (based off git submodules), and some useful scripts i wrote
- [Saferman/cupper](https://github.com/Saferman/cupper) - It comes!!
- [koutto/java-binary-deserializer](https://github.com/koutto/java-binary-deserializer) - Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML
- [ywolf/F-NAScan](https://github.com/ywolf/F-NAScan) - Scanning a network asset information script
- [RoliSoft/ReconScan](https://github.com/RoliSoft/ReconScan) - Network reconnaissance and vulnerability assessment tools.
- [swisskyrepo/DamnWebScanner](https://github.com/swisskyrepo/DamnWebScanner) - Another web vulnerabilities scanner, this extension works on Chrome and Opera
- [threatexpress/domainhunter](https://github.com/threatexpress/domainhunter) - Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names
- [maurosoria/dirsearch](https://github.com/maurosoria/dirsearch) - Web path scanner
- [elliotgao2/gain](https://github.com/elliotgao2/gain) - Web crawling framework based on asyncio.
- [wafpassproject/wafpass](https://github.com/wafpassproject/wafpass) - Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.
- [0x09AL/WordSteal](https://github.com/0x09AL/WordSteal) - This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does not keep responsibility for any illegal action you do.
- [FSecureLABS/win_driver_plugin](https://github.com/FSecureLABS/win_driver_plugin) - A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.
- [gonzalo/cryptoradio](https://github.com/gonzalo/cryptoradio) - Python script to encrypt and publish on Twitter. Also decrypt tweets from file
- [Coalfire-Research/java-deserialization-exploits](https://github.com/Coalfire-Research/java-deserialization-exploits) - A collection of curated Java Deserialization Exploits
- [shengqi158/svn_git_scanner](https://github.com/shengqi158/svn_git_scanner) - 用于扫描git,svn泄露
- [joxeankoret/CVE-2017-7494](https://github.com/joxeankoret/CVE-2017-7494) - Remote root exploit for the SAMBA CVE-2017-7494 vulnerability
- [nickjj/ansigenome](https://github.com/nickjj/ansigenome) - A tool to help you gather information and manage your Ansible roles.
- [debops/debops-tools](https://github.com/debops/debops-tools) - Your Debian-based data center in a box
- [debops/debops-playbooks](https://github.com/debops/debops-playbooks) - Ansible playbooks used by DebOps project
- [yanxiu0614/subdomain3](https://github.com/yanxiu0614/subdomain3) - A new generation of tool for discovering subdomains( ip , cdn and so on)
- [dvopsway/datasploit](https://github.com/dvopsway/datasploit) - A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitoring on the data.
- [anantshri/svn-extractor](https://github.com/anantshri/svn-extractor) - simple script to extract all web resources by means of .SVN folder exposed over network.
- [faizann24/Fwaf-Machine-Learning-driven-Web-Application-Firewall](https://github.com/faizann24/Fwaf-Machine-Learning-driven-Web-Application-Firewall) - Machine learning driven web application firewall to detect malicious queries with high accuracy.
- [xdavidhu/portSpider](https://github.com/xdavidhu/portSpider) - 🕷 A lightning fast multithreaded network scanner framework with modules.
- [vulnersCom/getsploit](https://github.com/vulnersCom/getsploit) - Command line utility for searching and downloading exploits
- [TheRook/subbrute](https://github.com/TheRook/subbrute) - A DNS meta-query spider that enumerates DNS records, and subdomains.
- [Lingerhk/fshell](https://github.com/Lingerhk/fshell) - 基于机器学习的分布式webshell检测系统
- [TravisFSmith/SweetSecurity](https://github.com/TravisFSmith/SweetSecurity) - Network Security Monitoring on Raspberry Pi type devices
- [pathetiq/BurpSmartBuster](https://github.com/pathetiq/BurpSmartBuster) - A Burp Suite content discovery plugin that add the smart into the Buster!
- [owtf/owtf](https://github.com/owtf/owtf) - Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.org https://twitter.com/owtfp
- [stamparm/maltrail](https://github.com/stamparm/maltrail) - Malicious traffic detection system
- [smxlabs/gibbersense](https://github.com/smxlabs/gibbersense) - Extract Sense out of Gibberish stuff
- [vysecurity/morphHTA](https://github.com/vysecurity/morphHTA) - morphHTA - Morphing Cobalt Strike's evil.HTA
- [dev-zzo/pwn-tools](https://github.com/dev-zzo/pwn-tools) - Various tools I have made for pwnage.
- [g3tsyst3m/HVACScanner](https://github.com/g3tsyst3m/HVACScanner) - Locates Honeywell/Tridium/Niagara HVAC JACEs/Controllers via HTTP fingerprints/strings. Very handy for vulnerability/pentesting.
- [RicterZ/zabbixPwn](https://github.com/RicterZ/zabbixPwn) - Zabbix Jsrpc.php Injection Exploit
- [i3visio/osrframework](https://github.com/i3visio/osrframework) - OSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accurate online researches.
- [Mr-Un1k0d3r/PowerLessShell](https://github.com/Mr-Un1k0d3r/PowerLessShell) - Run PowerShell command without invoking powershell.exe
- [darknessomi/musicbox](https://github.com/darknessomi/musicbox) - 网易云音乐命令行版本
- [brianwrf/SambaHunter](https://github.com/brianwrf/SambaHunter) - It is a simple script to exploit RCE for Samba (CVE-2017-7494 ).
- [byt3bl33d3r/DeathStar](https://github.com/byt3bl33d3r/DeathStar) - Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive TTP
- [andialbrecht/sqlparse](https://github.com/andialbrecht/sqlparse) - A non-validating SQL parser module for Python
- [jm33-m0/mec](https://github.com/jm33-m0/mec) - for mass exploiting
- [Hadi999/NXcrypt](https://github.com/Hadi999/NXcrypt) - NXcrypt - 'python backdoor' framework
- [denyhosts/denyhosts](https://github.com/denyhosts/denyhosts) - Automated host blocking from SSH brute force attacks
- [ahhh/Reverse_DNS_Shell](https://github.com/ahhh/Reverse_DNS_Shell) - A python reverse shell that uses DNS as the c2 channel
- [dazhouzhou/ICS-Vulnerabilities](https://github.com/dazhouzhou/ICS-Vulnerabilities) - Some ICS Vulnerabilities I've found will be listed here.
- [RUB-SysSec/Password-Guessing-Framework](https://github.com/RUB-SysSec/Password-Guessing-Framework) - A Framework for Comparing Password Guessing Strategies
- [kownet/osint-series](https://github.com/kownet/osint-series) - Source codes related to the articles about OSINT. Using social media APIs and Python language.
- [lbarman/kali-tools](https://github.com/lbarman/kali-tools) - Run Kali tools on all distributions. Offline search, including in package descriptions.
- [betab0t/cve-2017-7494](https://github.com/betab0t/cve-2017-7494) - Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)
- [jmortega/osint_tools_security_auditing](https://github.com/jmortega/osint_tools_security_auditing) - osint_tools_security_auditing
- [shaanen/osint-combiner](https://github.com/shaanen/osint-combiner) - Combining OSINT sources in Elastic Stack
- [keithjjones/hostintel](https://github.com/keithjjones/hostintel) - A modular Python application to collect intelligence for malicious hosts.
- [fluproject/flunym0us](https://github.com/fluproject/flunym0us) - Flunym0us is a Vulnerability Scanner for Wordpress and Moodle designed by Flu Project Team. Flunym0us has been developed in Python. Flunym0us performs dictionary attacks against Web sites. By default
- [ziirish/burp-ui](https://github.com/ziirish/burp-ui) - Burp-UI is a web-ui for burp backup written in python with Flask and jQuery/Bootstrap
- [fnk0c/cangibrina](https://github.com/fnk0c/cangibrina) - A fast and powerfull dashboard (admin) finder
- [CubicaLabs/IDASynergy](https://github.com/CubicaLabs/IDASynergy) - A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pro. By
- [claudioviviani/ms17-010-m4ss-sc4nn3r](https://github.com/claudioviviani/ms17-010-m4ss-sc4nn3r) - MS17-010 multithreading scanner written in python.
- [ruter/free-PACKT-eBooks-Crawler](https://github.com/ruter/free-PACKT-eBooks-Crawler) - A tool for claim and save PACKT's FREE TECHNOLOGY EBOOKS.
- [wanjunzh/ssct](https://github.com/wanjunzh/ssct) - A wrapper tool for shadowsocks to consistently bypass firewalls.
- [vincd/burpproxypacextension](https://github.com/vincd/burpproxypacextension) - Exemple d'extension Burp permettant d'utiliser les fichiers de configuration de proxy PAC
- [brianwrf/Joomla3.7-SQLi-CVE-2017-8917](https://github.com/brianwrf/Joomla3.7-SQLi-CVE-2017-8917) - Joomla 3.7 SQL injection (CVE-2017-8917)
- [lcatro/CVE-2017-7269-Echo-PoC](https://github.com/lcatro/CVE-2017-7269-Echo-PoC) - CVE-2017-7269 回显PoC ,用于远程漏洞检测..
- [ethvpn/code](https://github.com/ethvpn/code) - The sourecode
- [matthewearl/deep-anpr](https://github.com/matthewearl/deep-anpr) - Using neural networks to build an automatic number plate recognition system
- [mehulj94/BrainDamage](https://github.com/mehulj94/BrainDamage) - Remote administration tool which uses Telegram as a C&C server
- [SECFORCE/CVE-2017-3599](https://github.com/SECFORCE/CVE-2017-3599) - Proof of concept exploit for CVE-2017-3599
- [0x90/routerz](https://github.com/0x90/routerz) - Some exploits for ZeroNights 0x03
- [stasinopoulos/ZTExploit](https://github.com/stasinopoulos/ZTExploit) - ZTE ZXV10 H108L Router with <= V1.0.01_WIND_A01 - Remote root RCE Exploit
- [danilabs/rexploit](https://github.com/danilabs/rexploit) - RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.
- [G-bdennour/Huawei](https://github.com/G-bdennour/Huawei) - Some Of Huawei Routers Exploits
- [b40yd/security](https://github.com/b40yd/security) - Happy Hacker
- [techgaun/github-dorks](https://github.com/techgaun/github-dorks) - Find leaked secrets via github search
- [jflyup/goMS17-010](https://github.com/jflyup/goMS17-010) - Simple program for detecting if host(s) are vulnerable to SMB exploit(MS17-010)
- [Mr-Un1k0d3r/CatMyPhish](https://github.com/Mr-Un1k0d3r/CatMyPhish) - Search for categorized domain
- [zhangzhenfeng/AnyScan](https://github.com/zhangzhenfeng/AnyScan) - AnyScan
- [igogo-x86/HexRaysPyTools](https://github.com/igogo-x86/HexRaysPyTools) - IDA Pro plugin which improves work with HexRays decompiler and helps in process of reconstruction structures and classes
- [lijiejie/IIS_shortname_Scanner](https://github.com/lijiejie/IIS_shortname_Scanner) - an IIS shortname Scanner
- [lijiejie/ds_store_exp](https://github.com/lijiejie/ds_store_exp) - A .DS_Store file disclosure exploit. It parses .DS_Store file and downloads files recursively.
- [MK-Ware/Forensic-Tools](https://github.com/MK-Ware/Forensic-Tools) - A collection of tools for forensic analysis
- [schollz/howmanypeoplearearound](https://github.com/schollz/howmanypeoplearearound) - Count the number of people around you :family_man_man_boy: by monitoring wifi signals :satellite:
- [lc4t/clean-baidutieba](https://github.com/lc4t/clean-baidutieba) - 删除自己在百度贴吧的发帖和回复
- [mdiazcl/fuzzbunch-debian](https://github.com/mdiazcl/fuzzbunch-debian) - Fuzzbunch deployment for Debian - Intructions: Readme.md
- [RedSiege/EyeWitness](https://github.com/RedSiege/EyeWitness) - EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
- [zeruniverse/QQParking](https://github.com/zeruniverse/QQParking) - QQBot, QQ机器人,用于QQ挂机。自动回复私聊及临时对话,记录留言并转发至邮箱,账号(被踢)下线邮件提醒。
- [zeruniverse/QBotWebWrap](https://github.com/zeruniverse/QBotWebWrap) - Web Wrap for QBot series QQ/QQ空间在线挂机
- [ivytin/cve-crawler](https://github.com/ivytin/cve-crawler) -
- [sam-b/z3-stuff](https://github.com/sam-b/z3-stuff) - z3 scripts and ctf challenge solutions.
- [WebBreacher/emailwhois](https://github.com/WebBreacher/emailwhois) - Look up an email domain (@example.com), using Python, across all known domains.
- [jingweiz/pytorch-dnc](https://github.com/jingweiz/pytorch-dnc) - Neural Turing Machine (NTM) & Differentiable Neural Computer (DNC) with pytorch & visdom
- [zerokeeper/WebEye](https://github.com/zerokeeper/WebEye) -
- [appliedsec/pygeoip](https://github.com/appliedsec/pygeoip) - DEPRECATED: Pure Python API for Maxmind's binary GeoIP databases
- [vesche/histstat](https://github.com/vesche/histstat) - history for netstat
- [FeeiCN/Cobra](https://github.com/FeeiCN/Cobra) - Source Code Security Audit (源代码安全审计)
- [abatchy17/WindowsExploits](https://github.com/abatchy17/WindowsExploits) - Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.
- [plane636/rsync_scan](https://github.com/plane636/rsync_scan) - rsync空口令扫描器
- [gdelugre/ida-arm-system-highlight](https://github.com/gdelugre/ida-arm-system-highlight) - IDA script for highlighting and decoding ARM system instructions
- [plane636/opmanager_exp](https://github.com/plane636/opmanager_exp) - opmanager运维监控系统上传漏洞测试工具
- [xtools-at/AssistantPi](https://github.com/xtools-at/AssistantPi) - Bring both Google Assistant and Alexa to your Raspberry Pi
- [iphelix/dnschef](https://github.com/iphelix/dnschef) - DNSChef - DNS proxy for Penetration Testers and Malware Analysts
- [CIRCL/bgp-ranking](https://github.com/CIRCL/bgp-ranking) - BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN).
- [kengz/openai_lab](https://github.com/kengz/openai_lab) - An experimentation framework for Reinforcement Learning using OpenAI Gym, Tensorflow, and Keras.
- [kahunalu/pwnbin](https://github.com/kahunalu/pwnbin) - Python Pastebin Webcrawler that returns list of public pastebins containing keywords
- [vesche/scanless](https://github.com/vesche/scanless) - online port scan scraper
- [iSECPartners/RtspFuzzer](https://github.com/iSECPartners/RtspFuzzer) - RTSP network protocol fuzzer
- [roothaxor/The-Password-Manager](https://github.com/roothaxor/The-Password-Manager) - Manager/Generator With AES Encrypted Vault - Updated 27/9/2017
- [CERT-W/certitude](https://github.com/CERT-W/certitude) - The Seeker of IOC
- [arthepsy/ssh-audit](https://github.com/arthepsy/ssh-audit) - SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
- [TheRook/nsshell](https://github.com/TheRook/nsshell) - A DNS connectback shell executed by strings in payloads.txt
- [epinna/tplmap](https://github.com/epinna/tplmap) - Server-Side Template Injection and Code Injection Detection and Exploitation Tool
- [SafeBreach-Labs/pyekaboo](https://github.com/SafeBreach-Labs/pyekaboo) - Proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable
- [pwnlandia/mhn](https://github.com/pwnlandia/mhn) - Modern Honey Network
- [shengqi158/pyvulhunter](https://github.com/shengqi158/pyvulhunter) - python audit tool 审计 注入 inject
- [msracver/Deformable-ConvNets](https://github.com/msracver/Deformable-ConvNets) - Deformable Convolutional Networks
- [Xyntax/pocserver](https://github.com/Xyntax/pocserver) - Scripts running in public webserver for vulnerability PoC
- [ArchiveBox/ArchiveBox](https://github.com/ArchiveBox/ArchiveBox) - 🗃 Open source self-hosted web archiving. Takes URLs/browser history/bookmarks/Pocket/Pinboard/etc., saves HTML, JS, PDFs, media, and more...
- [hashtagcyber/bropy](https://github.com/hashtagcyber/bropy) - Basic Anomaly IDS capabilities with Python and Bro
- [wifiphisher/wifiphisher](https://github.com/wifiphisher/wifiphisher) - The Rogue Access Point Framework
- [travisbgreen/intel_amt_honeypot](https://github.com/travisbgreen/intel_amt_honeypot) - intel amt honeypot
- [byt3bl33d3r/CrackMapExec](https://github.com/byt3bl33d3r/CrackMapExec) - A swiss army knife for pentesting networks
- [n4xh4ck5/fInd0](https://github.com/n4xh4ck5/fInd0) - Tool to find domains in sold about a target
- [p4-team/ctf](https://github.com/p4-team/ctf) - Ctf solutions from p4 team
- [lijiejie/struts2_045_scan](https://github.com/lijiejie/struts2_045_scan) - Struts2-045 Scanner
- [danielplohmann/apiscout](https://github.com/danielplohmann/apiscout) - This project aims at simplifying Windows API import recovery on arbitrary memory dumps
- [nccgroup/Zulu](https://github.com/nccgroup/Zulu) - The Zulu fuzzer
- [HarmJ0y/pylnker](https://github.com/HarmJ0y/pylnker) - This is a Python port of lnk-parse-1.0, a tool to parse Windows .lnk files.
- [kacperszurek/exploits](https://github.com/kacperszurek/exploits) -
- [plasma-disassembler/plasma](https://github.com/plasma-disassembler/plasma) - Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.
- [skenan/BitcoinStrategy](https://github.com/skenan/BitcoinStrategy) - bitcoin arbitrage between Huobi and Okcoin
- [BitcoinExchangeFH/BitcoinExchangeFH](https://github.com/BitcoinExchangeFH/BitcoinExchangeFH) - Cryptocurrency exchange market data feed handler
- [tijme/not-your-average-web-crawler](https://github.com/tijme/not-your-average-web-crawler) - A web crawler (for bug hunting) that gathers more than you can imagine.
- [ctfs/write-ups-2017](https://github.com/ctfs/write-ups-2017) - Wiki-like CTF write-ups repository, maintained by the community. 2017
- [dylanmc/CryptoBook](https://github.com/dylanmc/CryptoBook) - Learning Cryptography, math and programming with Cryptol (and maybe some Python)
- [PeterDing/iScript](https://github.com/PeterDing/iScript) - 各种脚本 -- 关于 虾米 xiami.com, 百度网盘 pan.baidu.com, 115网盘 115.com, 网易音乐 music.163.com, 百度音乐 music.baidu.com, 360网盘/云盘 yunpan.cn, 视频解析 flvxz.com, bt torrent ↔ magnet, ed2k 搜索, tumblr 图片下载, unzip
- [pwndbg/pwndbg](https://github.com/pwndbg/pwndbg) - Exploit Development and Reverse Engineering with GDB Made Easy
- [farrokhi/dnsdiag](https://github.com/farrokhi/dnsdiag) - DNS Measurement, Troubleshooting and Security Auditing Toolset
- [csirtgadgets/bearded-avenger](https://github.com/csirtgadgets/bearded-avenger) - CIF v3 -- the fastest way to consume threat intelligence
- [lgandx/PoC](https://github.com/lgandx/PoC) - Various PoCs
- [root2ch/ZipCrack](https://github.com/root2ch/ZipCrack) - ZipCrack with Python
- [octodns/octodns](https://github.com/octodns/octodns) - Tools for managing DNS across multiple providers
- [fnzv/trsh](https://github.com/fnzv/trsh) - Telegram Remote-Shell
- [john-kurkowski/tldextract](https://github.com/john-kurkowski/tldextract) - Accurately separates a URL’s subdomain, domain, and public suffix, using the Public Suffix List (PSL).
- [cobrateam/splinter](https://github.com/cobrateam/splinter) - splinter - python test framework for web applications
- [yandex/gixy](https://github.com/yandex/gixy) - Nginx configuration static analyzer
- [zer0yu/ZEROScan](https://github.com/zer0yu/ZEROScan) - Multi-Thread Vulnerability Verify Framework
- [openstack/hacking](https://github.com/openstack/hacking) - OpenStack Hacking Style Checks. Mirror of code maintained at opendev.org.
- [yehia-mamdouh/XSSYA-V-2.0](https://github.com/yehia-mamdouh/XSSYA-V-2.0) -
- [coursera-dl/coursera-dl](https://github.com/coursera-dl/coursera-dl) - Script for downloading Coursera.org videos and naming them.
- [mjg59/python-broadlink](https://github.com/mjg59/python-broadlink) - Python module for controlling Broadlink RM2/3 (Pro) remote controls, A1 sensor platforms and SP2/3 smartplugs
- [NightRang3r/Broadlink-e-control-db-dump](https://github.com/NightRang3r/Broadlink-e-control-db-dump) - These two scripts will "parse" the broadlink e-Control Android application database or SharedData and dump the IR / RF codes for selected accessories into a text file which can be later used with broa
- [paxosglobal/subconscious](https://github.com/paxosglobal/subconscious) - redis-backed (in memory) db for python3 that is asyncio compatible
- [bl4de/irc-client](https://github.com/bl4de/irc-client) - Simple IRC (Internet Relay Chat) Client written in Python
- [LionSec/katoolin](https://github.com/LionSec/katoolin) - Automatically install all Kali linux tools
- [tanchao90/hexo-git-backup-tools](https://github.com/tanchao90/hexo-git-backup-tools) - Back-up the source files of my blog.
- [intezer/docker-ida](https://github.com/intezer/docker-ida) - Run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts.
- [fonttools/fonttools](https://github.com/fonttools/fonttools) - A library to manipulate font files from Python.
- [jymcheong/aptc](https://github.com/jymcheong/aptc) - Automated Payload Test Controller
- [azheng333/BigDataML](https://github.com/azheng333/BigDataML) -
- [cornerpirate/cve-offline](https://github.com/cornerpirate/cve-offline) - An easy to grep dump of the NVD database showing only; CVE-ID, CVSS Risk Score, and Summary.
- [utkusen/leviathan](https://github.com/utkusen/leviathan) - wide range mass audit toolkit
- [n0tr00t/Beehive](https://github.com/n0tr00t/Beehive) - Beehive is an open-source vulnerability detection framework based on Beebeeto-framework. Security researcher can use it to find vulnerability, exploits, subsequent attacks, etc.
- [Lekensteyn/pacemaker](https://github.com/Lekensteyn/pacemaker) - Heartbleed (CVE-2014-0160) client exploit
- [searx/searx](https://github.com/searx/searx) - Privacy-respecting metasearch engine
- [robputt/Py-DNS-over-HTTPS-Proxy](https://github.com/robputt/Py-DNS-over-HTTPS-Proxy) - Provides a simple Python based proxy for running DNS over HTTPS to Google's DNS over HTTPS service.
- [ZonkSec/weblogic-serialization-exploit-updated](https://github.com/ZonkSec/weblogic-serialization-exploit-updated) - Updated the FoxGlove Security WebLogic serialization exploit.
- [brianwrf/hackUtils](https://github.com/brianwrf/hackUtils) - It is a hack tool kit for pentest and web security research.
- [keon/algorithms](https://github.com/keon/algorithms) - Minimal examples of data structures and algorithms in Python
- [breenmachine/JavaUnserializeExploits](https://github.com/breenmachine/JavaUnserializeExploits) -
- [reyammer/shellnoob](https://github.com/reyammer/shellnoob) - A shellcode writing toolkit
- [nixawk/labs](https://github.com/nixawk/labs) - Vulnerability Labs for security analysis
- [brainsik/virtualenv-burrito](https://github.com/brainsik/virtualenv-burrito) - One command to have a working virtualenv + virtualenvwrapper environment.
- [agienka/blindy](https://github.com/agienka/blindy) - Simple script to automate brutforcing blind sql injection vulnerabilities
- [ssrselvamraju/mblogic-S2-client](https://github.com/ssrselvamraju/mblogic-S2-client) - The client side HMI for the S2 modbus control. This has many html and css pages which were custom edited and also have needed server and client base programs.
- [shmilylty/cheetah](https://github.com/shmilylty/cheetah) - a very fast brute force webshell password tool
- [mitre/multiscanner](https://github.com/mitre/multiscanner) - Modular file scanning/analysis framework
- [trailofbits/manticore](https://github.com/trailofbits/manticore) - Symbolic execution tool
- [LxiaoGirl/exp](https://github.com/LxiaoGirl/exp) - 各种流行的POC批量扫描工具,当然其中的目标需要自己去收集。
- [aboul3la/Sublist3r](https://github.com/aboul3la/Sublist3r) - Fast subdomains enumeration tool for penetration testers
- [bsmali4/sicklepoc](https://github.com/bsmali4/sicklepoc) -
- [maK-/scantastic-tool](https://github.com/maK-/scantastic-tool) - It's bloody scantastic
- [fxsjy/jieba](https://github.com/fxsjy/jieba) - 结巴中文分词
- [Lingerhk/hacking_script](https://github.com/Lingerhk/hacking_script) - 开发或收集的一些网络安全方面的脚本、小工具
- [marcotinari/CustomDeserializer](https://github.com/marcotinari/CustomDeserializer) - Custom Deserializer
- [laramies/theHarvester](https://github.com/laramies/theHarvester) - E-mails, subdomains and names Harvester - OSINT
- [torque59/Nosql-Exploitation-Framework](https://github.com/torque59/Nosql-Exploitation-Framework) - A Python Framework For NoSQL Scanning and Exploitation
- [IOActive/jdwp-shellifier](https://github.com/IOActive/jdwp-shellifier) -
- [infobyte/faraday](https://github.com/infobyte/faraday) - Open Source Vulnerability Management Platform
- [Ptr32Void/OSTrICa](https://github.com/Ptr32Void/OSTrICa) -
- [UnkL4b/GitMiner](https://github.com/UnkL4b/GitMiner) - Tool for advanced mining for content on Github
- [nneonneo/eqgrp-free-file](https://github.com/nneonneo/eqgrp-free-file) - Free sampling of files from the purported Equation Group hack.
- [MorvanZhou/tutorials](https://github.com/MorvanZhou/tutorials) - 机器学习相关教程
- [joaomatosf/jexboss](https://github.com/joaomatosf/jexboss) - JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
- [cloudburst/libheap](https://github.com/cloudburst/libheap) - python library to examine ptmalloc (the glibc userland heap implementation)
- [paraschetal/PortScan](https://github.com/paraschetal/PortScan) -
- [SQSamir/NVRScanner](https://github.com/SQSamir/NVRScanner) -
- [narata/password](https://github.com/narata/password) - 1
- [op1hacks/op1repacker](https://github.com/op1hacks/op1repacker) - 🗜 Tool for unpacking, modifying and repacking firmware for the OP-1 synth by Teenage Engineering.
- [XiphosResearch/exploits](https://github.com/XiphosResearch/exploits) - Miscellaneous exploit code
- [yeti-platform/yeti](https://github.com/yeti-platform/yeti) - Your Everyday Threat Intelligence
- [THIBER-ORG/userline](https://github.com/THIBER-ORG/userline) - Query and report user logons relations from MS Windows Security Events
- [nopernik/fuzzbunch_wrapper](https://github.com/nopernik/fuzzbunch_wrapper) - Fuzzbunch Python-Wine wrapper
- [CIRCL/AIL-framework](https://github.com/CIRCL/AIL-framework) - AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project
- [mgeeky/expdevBadChars](https://github.com/mgeeky/expdevBadChars) - Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.
- [w4kfu/IDA_loader](https://github.com/w4kfu/IDA_loader) - Some loader module for IDA
- [3gstudent/Smbtouch-Scanner](https://github.com/3gstudent/Smbtouch-Scanner) - Automatically scan the inner network to detect whether they are vulnerable.
- [0xbharath/datasploit](https://github.com/0xbharath/datasploit) - Utilizing various Open Source Intelligence (OSINT) tools and techniques that we have found to be effective, DataSploit brings them all into one place, correlates the raw data captured and gives the us
- [uber-archive/focuson](https://github.com/uber-archive/focuson) - A tool to surface security issues in python code
- [python-security/pyt](https://github.com/python-security/pyt) - A Static Analysis Tool for Detecting Security Vulnerabilities in Python Web Applications
- [bhdresh/CVE-2017-0199](https://github.com/bhdresh/CVE-2017-0199) - Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious R
- [vrnetlab/vrnetlab](https://github.com/vrnetlab/vrnetlab) - Run virtual routers with docker
- [504ensicsLabs/DAMM](https://github.com/504ensicsLabs/DAMM) - Differential Analysis of Malware in Memory
- [evilsocket/opensnitch](https://github.com/evilsocket/opensnitch) - OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.
- [Neo23x0/Loki](https://github.com/Neo23x0/Loki) - Loki - Simple IOC and YARA Scanner
- [ethereum/casper](https://github.com/ethereum/casper) - Casper contract, and related software and tests
- [kitctf/writeups](https://github.com/kitctf/writeups) - CTF writeups
- [nixawk/pentest-wiki](https://github.com/nixawk/pentest-wiki) - PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.
- [mrschyte/nmap-converter](https://github.com/mrschyte/nmap-converter) - Python script for converting nmap reports into XLS
- [fuzzbunch/fuzzbunch](https://github.com/fuzzbunch/fuzzbunch) - NSA finest tool
- [WithSecureLabs/doublepulsar-detection-script](https://github.com/WithSecureLabs/doublepulsar-detection-script) - A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.
- [the-c0d3r/pynmap](https://github.com/the-c0d3r/pynmap) - A serious attempt to implement multi-threading to nmap module, which would result in faster scanning speed. I know that one can write NSE scripts for multi-threaded scanning with it, but I wanted to t
- [houbbit/haveibeenpwned](https://github.com/houbbit/haveibeenpwned) - Python script to verify multiple email addresses for pwnage
- [icanhasfay/PyPwned](https://github.com/icanhasfay/PyPwned) - A Python client for the HaveIBeenPwned REST API
- [insecurityofthings/jackit](https://github.com/insecurityofthings/jackit) - JackIt - Exploit Code for Mousejack
- [misterch0c/GithubLeakAlert](https://github.com/misterch0c/GithubLeakAlert) -
- [codepr/creak](https://github.com/codepr/creak) - Poison, reset, spoof, redirect MITM script
- [superfashi/FakeGit](https://github.com/superfashi/FakeGit) - FakeGit: A great tool to fool yourself and others
- [SecarmaLabs/dns-parallel-prober](https://github.com/SecarmaLabs/dns-parallel-prober) - PoC for an adaptive parallelised DNS prober
- [artkond/cisco-rce](https://github.com/artkond/cisco-rce) - CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC
- [lockout/tun64](https://github.com/lockout/tun64) - IPv6 transition tunnel-based mechanism information exfiltration tool
- [kootenpv/whereami](https://github.com/kootenpv/whereami) - Uses WiFi signals :signal_strength: and machine learning to predict where you are
- [axi0mX/ipwndfu](https://github.com/axi0mX/ipwndfu) - open-source jailbreaking tool for many iOS devices
- [JinnLynn/genpac](https://github.com/JinnLynn/genpac) - PAC/Dnsmasq/Wingy file Generator, working with gfwlist, support custom rules.
- [boy-hack/pythonwebhack](https://github.com/boy-hack/pythonwebhack) - 用python实现的web框架建立的在线渗透平台
- [JasonLearning/github_trending_spider](https://github.com/JasonLearning/github_trending_spider) -
- [LJ147/githubSpider](https://github.com/LJ147/githubSpider) - 使用python爬虫批量爬取GitHub上的高star项目并定期pull保持最新
- [JamCh01/github_relationship](https://github.com/JamCh01/github_relationship) - a simple spider for github instead of api
- [TuuuNya/webdirscan](https://github.com/TuuuNya/webdirscan) - 跨平台的web目录扫描工具
- [TuuuNya/Exploit](https://github.com/TuuuNya/Exploit) - 常用的一些Exploit,经常会更新,也欢迎各位提交新的exp给我。
- [jhao104/proxy_pool](https://github.com/jhao104/proxy_pool) - Python ProxyPool for web spider
- [seb-m/pyinotify](https://github.com/seb-m/pyinotify) - Monitoring filesystems events with inotify on Linux.
- [chrizator/netattack](https://github.com/chrizator/netattack) - A simple python script to scan and attack wireless networks.
- [Xyntax/POC-T](https://github.com/Xyntax/POC-T) - 渗透测试插件化并发框架 / Open-sourced remote vulnerability PoC/EXP framework
- [nethunteros/punter](https://github.com/nethunteros/punter) - Hunt domain names using DNSDumpster, WHOIS, Reverse WHOIS, Shodan, Crimeflare
- [axi0mX/apticket-nonce-checker](https://github.com/axi0mX/apticket-nonce-checker) - Python script which parses 32-bit SHSH/APTickets and prints the APTicket nonce, if any.
- [phodal/awesome-iot](https://github.com/phodal/awesome-iot) - Awesome IoT. A collaborative list of great resources about IoT Framework, Library, OS, Platform
- [Germey/TaobaoUser](https://github.com/Germey/TaobaoUser) - Get anonymous user of Taobao
- [QingdaoU/OnlineJudge](https://github.com/QingdaoU/OnlineJudge) - Open source online judge based on Vue, Django and Docker. | 青岛大学开源 Online Judge | QQ群 496710125 | [email protected]
- [DanMcInerney/xsscrapy](https://github.com/DanMcInerney/xsscrapy) - XSS spider - 66/66 wavsep XSS detected
- [laixintao/Report-IP-hourly](https://github.com/laixintao/Report-IP-hourly) - 📬 Report Linux IP by email hourly.
- [MrNox/CTF](https://github.com/MrNox/CTF) - CTF's writeups
- [C0reL0ader/EaST](https://github.com/C0reL0ader/EaST) - Exploits and Security Tools Framework 2.0.1
- [CERT-Bund/yara-exporter](https://github.com/CERT-Bund/yara-exporter) - Exporting MISP event attributes to yara rules usable with Thor apt scanner
- [google/timesketch](https://github.com/google/timesketch) - Collaborative forensic timeline analysis
- [DavidKorczynski/RePEconstruct](https://github.com/DavidKorczynski/RePEconstruct) -
- [rajeshmajumdar/PloitKit](https://github.com/rajeshmajumdar/PloitKit) - The Hacker's ToolBox
- [smicallef/spiderfoot](https://github.com/smicallef/spiderfoot) - SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
- [sangaline/advanced-web-scraping-tutorial](https://github.com/sangaline/advanced-web-scraping-tutorial) - The Zipru scraper developed in the Advanced Web Scraping Tutorial.
- [yunjey/pytorch-tutorial](https://github.com/yunjey/pytorch-tutorial) - PyTorch Tutorial for Deep Learning Researchers
- [decalage2/oletools](https://github.com/decalage2/oletools) - oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
- [jopohl/urh](https://github.com/jopohl/urh) - Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
- [DataSploit/datasploit](https://github.com/DataSploit/datasploit) - An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the raw data, and give data in multiple formats.
- [romain-fontugne/RTTanalysis](https://github.com/romain-fontugne/RTTanalysis) - Estimation and analysis of round trip time in TCP traffic
- [polymorf/findcrypt-yara](https://github.com/polymorf/findcrypt-yara) - IDA pro plugin to find crypto constants (and more)
- [luyishisi/Anti-Anti-Spider](https://github.com/luyishisi/Anti-Anti-Spider) - 越来越多的网站具有反爬虫特性,有的用图片隐藏关键数据,有的使用反人类的验证码,建立反反爬虫的代码仓库,通过与不同特性的网站做斗争(无恶意)提高技术。(欢迎提交难以采集的网站)(因工作原因,项目暂停)
- [pagewong/Get-ip-address](https://github.com/pagewong/Get-ip-address) - python脚本自动获取本机ip,并发送到邮箱。适应linux系统和树莓派(raspberry pi)
- [jackgitgz/CnblogsSpider](https://github.com/jackgitgz/CnblogsSpider) - 用scrapy采集cnblogs列表页爬虫
- [VHTgcB1N/Sisyphus](https://github.com/VHTgcB1N/Sisyphus) - 一个方便的用来分析LOL中数据的工具
- [bharshbarger/AutOSINT](https://github.com/bharshbarger/AutOSINT) - Tool to automate common OSINT tasks
- [NullArray/DorkNet](https://github.com/NullArray/DorkNet) - Selenium powered Python script to automate searching for vulnerable web apps.
- [edouardoyallon/pyscatwave](https://github.com/edouardoyallon/pyscatwave) - Fast Scattering Transform with CuPy/PyTorch
- [essandess/isp-data-pollution](https://github.com/essandess/isp-data-pollution) - ISP Data Pollution to Protect Private Browsing History with Obfuscation
- [kgretzky/evilginx](https://github.com/kgretzky/evilginx) - PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2
- [opendns/og-miner](https://github.com/opendns/og-miner) - OpenDNS Graph Miner
- [OTRF/ThreatHunter-Playbook](https://github.com/OTRF/ThreatHunter-Playbook) - A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
- [Moving-Electrons/TravelPhotoBackup](https://github.com/Moving-Electrons/TravelPhotoBackup) - This is an OLD repository and has been left here for reference purposes only. New repository can be found at: https://github.com/Moving-Electrons/photo-backup. More information at www.movingelectrons.
- [Comsecuris/gdbida](https://github.com/Comsecuris/gdbida) - gdbida - a visual bridge between a GDB session and IDA Pro's disassembler
- [kendricktan/drawlikebobross](https://github.com/kendricktan/drawlikebobross) - Draw like Bob Ross using the power of Neural Networks (With PyTorch)!
- [az0ne/MongoDB_AutoDump](https://github.com/az0ne/MongoDB_AutoDump) - 用于快速探测未授权MongoDB数据库结构,取第一条内容,并统计数据数量。A tool for unauthorized MongoDB database , take the first content, and the number of statistical data.
- [he1m4n6a/dictBuilder](https://github.com/he1m4n6a/dictBuilder) - 渗透测试中字典生成工具
- [nxez/SAKS-tutorials](https://github.com/nxez/SAKS-tutorials) - SAKS Tutorials
- [n8henrie/pycookiecheat](https://github.com/n8henrie/pycookiecheat) - Borrow cookies from your browser's authenticated session for use in Python scripts.
- [nladuo/taobao_bra_crawler](https://github.com/nladuo/taobao_bra_crawler) - a taobao web crawler just for fun.
- [repoog/GitPrey](https://github.com/repoog/GitPrey) - Searching sensitive files and contents in GitHub associated to company name or other key words
- [stamparm/DSXS](https://github.com/stamparm/DSXS) - Damn Small XSS Scanner
- [ring04h/weakfilescan](https://github.com/ring04h/weakfilescan) - 动态多线程敏感信息泄露检测工具
- [RicterZ/genpAss](https://github.com/RicterZ/genpAss) -
- [multiangle/Distributed_Microblog_Spider](https://github.com/multiangle/Distributed_Microblog_Spider) - 分布式新浪微博爬虫
- [qiyeboy/IPProxyPool](https://github.com/qiyeboy/IPProxyPool) - IPProxyPool代理池项目,提供代理ip
- [iamdaiyuan/SinaWeiboSpider-Mongodb](https://github.com/iamdaiyuan/SinaWeiboSpider-Mongodb) - weibo spider
- [x0rz/tweets_analyzer](https://github.com/x0rz/tweets_analyzer) - Tweets metadata scraper & activity analyzer
- [tweepy/tweepy](https://github.com/tweepy/tweepy) - Twitter for Python!
- [bianjiang/twitter-user-geocoder](https://github.com/bianjiang/twitter-user-geocoder) - Resolve the `location` string in Twitter users' profiles to US states (and cities)
- [bianjiang/tweetf0rm](https://github.com/bianjiang/tweetf0rm) - A twitter crawler in Python
- [WUJJU/ScrapyTwitter](https://github.com/WUJJU/ScrapyTwitter) - Crawling twitter info Using Scrapy+Splash
- [eddiewang/TwitterScrape](https://github.com/eddiewang/TwitterScrape) - A Twitter scraping tool using Scrapy
- [molcay/msku-etkinlik](https://github.com/molcay/msku-etkinlik) - MSKU Etkinlik Kodları
- [zaycev/cbg-scrapy](https://github.com/zaycev/cbg-scrapy) - Simple HTTP server for asynchronous scrapping data from Twitter API using Twisted library
- [yall/scrapy-twitter](https://github.com/yall/scrapy-twitter) -
- [hauntek/python-ngrokd](https://github.com/hauntek/python-ngrokd) -
- [luong-komorebi/Awesome-Linux-Software](https://github.com/luong-komorebi/Awesome-Linux-Software) - 🐧 A list of awesome Linux softwares
- [wl879/SublimeOnSave](https://github.com/wl879/SublimeOnSave) - Executes commands on file save.
- [facert/github_search](https://github.com/facert/github_search) - 根据 keywords 搜索 github 上面的 repos, 并通过 web 展示
- [InRaiDi/TwitterSpider](https://github.com/InRaiDi/TwitterSpider) - Parsing tweets from Twitter Profiles with Python
- [iam-xiaoyi-zhang/woeid](https://github.com/iam-xiaoyi-zhang/woeid) - Scrapy crawling woeid and twitter trends (using api)
- [tomowang/scrapy-twitter](https://github.com/tomowang/scrapy-twitter) - crawl twitter timeline using scrapy
- [muscledreamer/twitter_scrapy](https://github.com/muscledreamer/twitter_scrapy) - Use Scrapy to crwal Twitter .THE 1.0 Edition
- [YuLin12345/Sneaker-Notify](https://github.com/YuLin12345/Sneaker-Notify) - Sneaker/Restock/Monitor Notify via Twitter coded in Python using Scrapy.
- [zoalst/reddit_all_rising](https://github.com/zoalst/reddit_all_rising) - Simple example of a Scrapy spider that scrapes Reddit + Twitter bot made with python-twitter, deployed to Heroku
- [r00k5A58/pyc2](https://github.com/r00k5A58/pyc2) - simple c2 written in python to demonstrate security concepts
- [n00py/WPForce](https://github.com/n00py/WPForce) - Wordpress Attack Suite
- [vinta/awesome-python](https://github.com/vinta/awesome-python) - An opinionated list of awesome Python frameworks, libraries, software and resources.
- [521xueweihan/HelloGitHub](https://github.com/521xueweihan/HelloGitHub) - :octocat: 分享 GitHub 上有趣、入门级的开源项目。Share interesting, entry-level open source projects on GitHub.
- [soimort/you-get](https://github.com/soimort/you-get) - :arrow_double_down: Dumb downloader that scrapes the web
- [weaming/gitbook-wiki](https://github.com/weaming/gitbook-wiki) - :book: Wiki powered by Gitbook :)
- [hexcola/gitbook-deploy](https://github.com/hexcola/gitbook-deploy) - a simple tool help me deploy gitbook to github pages.
- [kun945/weixinpy](https://github.com/kun945/weixinpy) - Python client SDK for Micro Message Public Platform API.
- [pydata/pandas-datareader](https://github.com/pydata/pandas-datareader) - Extract data from a wide range of Internet sources into a pandas DataFrame.
- [waditu/tushare](https://github.com/waditu/tushare) - TuShare is a utility for crawling historical data of China stocks
- [yhat/pandasql](https://github.com/yhat/pandasql) - sqldf for pandas
- [brianwrf/HackRequests](https://github.com/brianwrf/HackRequests) - It is a dedicated requests lib that supports cookie, headers, get/post, etc. And it also supports rendering the response (e.g. Javascript, CSS, etc.) of GET requests by using PhantomJs enginee.
- [az0ne/Github_Nuggests](https://github.com/az0ne/Github_Nuggests) - 自动爬取Github上文件敏感信息泄露,抓取邮箱密码并自动登录邮箱验证,支持126,qq,sina,163邮箱
- [houtianze/bypy](https://github.com/houtianze/bypy) - Python client for Baidu Yun (Personal Cloud Storage) 百度云/百度网盘Python客户端
- [Mebus/cupp](https://github.com/Mebus/cupp) - Common User Passwords Profiler (CUPP)
- [x-hw/amazing-qr](https://github.com/x-hw/amazing-qr) - 💮 amazing QRCode generator in Python (supporting animated gif) - Python amazing 二维码生成器(支持 gif 动态图片二维码)
- [observerss/textfilter](https://github.com/observerss/textfilter) - 敏感词过滤的几种实现+某1w词敏感词库
- [saffsd/langid.py](https://github.com/saffsd/langid.py) - Stand-alone language identification system
- [reddit-archive/reddit](https://github.com/reddit-archive/reddit) - historical code from reddit.com
- [reorx/httpstat](https://github.com/reorx/httpstat) - curl statistics made simple
- [PyMySQL/PyMySQL](https://github.com/PyMySQL/PyMySQL) - MySQL client library for Python
- [alisaifee/flask-limiter](https://github.com/alisaifee/flask-limiter) - Rate Limiting extension for Flask
- [nicolargo/glances](https://github.com/nicolargo/glances) - Glances an Eye on your system. A top/htop alternative for GNU/Linux, BSD, Mac OS and Windows operating systems.
- [amoffat/sh](https://github.com/amoffat/sh) - Python process launching
- [taobao/nginx-book](https://github.com/taobao/nginx-book) - Nginx开发从入门到精通
- [rpicard/explore-flask](https://github.com/rpicard/explore-flask) - Source of Explore Flask book
- [jumpserver/jumpserver](https://github.com/jumpserver/jumpserver) - An open-source PAM tool alternative to CyberArk. 广受欢迎的开源堡垒机。
- [locustio/locust](https://github.com/locustio/locust) - Write scalable load tests in plain Python 🚗💨
- [dbcli/mycli](https://github.com/dbcli/mycli) - A Terminal Client for MySQL with AutoCompletion and Syntax Highlighting.
- [ethan-funny/explore-python](https://github.com/ethan-funny/explore-python) - :green_book: The Beauty of Python Programming.
- [qiwsir/algorithm](https://github.com/qiwsir/algorithm) -
- [luyishisi/Raspberry_face_recognition_attendance_machine](https://github.com/luyishisi/Raspberry_face_recognition_attendance_machine) - 2016年完成,调用face++进行人脸识别语音发音的树莓派平台下的考勤机。
- [backto17/SinaHouseCrawler](https://github.com/backto17/SinaHouseCrawler) - 基于scrapy,scrapy-redis实现的一个分布式网络爬虫,爬取了新浪房产的楼盘信息及户型图片,实现了常用的爬虫功能需求.
- [szcf-weiya/SinaSpider](https://github.com/szcf-weiya/SinaSpider) - 动态IP解决新浪的反爬虫机制,快速抓取内容。
- [NewBee119/telnet-scanner](https://github.com/NewBee119/telnet-scanner) - telnet服务密码撞库
- [v3n0m-Scanner/V3n0M-Scanner](https://github.com/v3n0m-Scanner/V3n0M-Scanner) - Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
- [swisskyrepo/PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings) - A list of useful payloads and bypass for Web Application Security and Pentest/CTF
- [rajeshmajumdar/BruteXSS](https://github.com/rajeshmajumdar/BruteXSS) - BruteXSS is a tool written in python simply to find XSS vulnerabilities in web application. This tool was originally developed by Shawar Khan in CLI. I just redesigned it and made it GUI for more conv
- [m4n3dw0lf/pythem](https://github.com/m4n3dw0lf/pythem) - pentest framework
- [luyidong/log_visual](https://github.com/luyidong/log_visual) - 日志可视化
- [heiyhia/thinkstats](https://github.com/heiyhia/thinkstats) - 程序员统计入门, fork自thinkstats, 改动: 用Numpy, Pandas处理数据, Seaborn可视化
- [yutiansut/QUANTAXIS_SPIDER](https://github.com/yutiansut/QUANTAXIS_SPIDER) - QUANTAXIS 爬虫mod python/javascript/mongodb
- [boy-hack/AnalysePass](https://github.com/boy-hack/AnalysePass) -
- [fkztw/py-feedr](https://github.com/fkztw/py-feedr) - A Python parser to tweet the latest updates from multiple RSS feeds.
- [codecrack3/Shortcut-Downloader](https://github.com/codecrack3/Shortcut-Downloader) - Shortcut Downloader## QMake
- [horsicq/XPEViewer](https://github.com/horsicq/XPEViewer) - PE file viewer/editor for Windows, Linux and MacOS.
## REXX
- [drb-ra/C2IntelFeeds](https://github.com/drb-ra/C2IntelFeeds) - Automatically created C2 Feeds
## Rascal
- [kmahyyg/ban_cnshort](https://github.com/kmahyyg/ban_cnshort) - Ban China Short Video Websites
## Rich Text Format
- [asiamina/A-Course-on-Digital-Forensics](https://github.com/asiamina/A-Course-on-Digital-Forensics) - A course on "Digital Forensics" designed and offered in the Computer Science Department at Texas Tech University
- [adamshostack/eop](https://github.com/adamshostack/eop) - The Elevation of Privilege Threat Modeling Game
- [lhajh/Alfred-Powerpack](https://github.com/lhajh/Alfred-Powerpack) - Alfred-Powerpack
- [tsingui/clover-efi](https://github.com/tsingui/clover-efi) - 分享整理一些黑苹果Clover驱动配置文件
- [huangyz0918/Hackintosh-Installer-University](https://github.com/huangyz0918/Hackintosh-Installer-University) - Open source tutorial & information collector for hackintosh installation.
- [sqlsec/clover](https://github.com/sqlsec/clover) - Share some hackintosh Clover files 分享一些黑苹果clover配置文件## Roff
- [shellfeel/Ant-AntV](https://github.com/shellfeel/Ant-AntV) - 一个经过实战考验的免杀程序生成器
- [lcatro/cve_diff_checker](https://github.com/lcatro/cve_diff_checker) - 快速对自己项目中引入的第三方开源库进行1day patch检索,patch数据每天晚上11点更新
- [slimm609/checksec.sh](https://github.com/slimm609/checksec.sh) - Checksec.sh
- [NS-Sp4ce/Dict](https://github.com/NS-Sp4ce/Dict) - 一些弱口令、fuzz字典
- [hardenedlinux/harbian-qa](https://github.com/hardenedlinux/harbian-qa) - Bug hunting through fuzzer/*-sanitizer/etc...
- [ldbfpiaoran/websearch](https://github.com/ldbfpiaoran/websearch) - Search engine for web assets## Ruby
- [Anyyy111/eBSploit](https://github.com/Anyyy111/eBSploit) - eBSploit适用于内网渗透中遇到MS17-010漏洞的情况快速上线公网msf及cs,同时支持自定义dll命令执行、会话迁移等操作。
- [soulteary/Home-Network-Note](https://github.com/soulteary/Home-Network-Note) - 🚧 持续更新 🚧 记录搭建兼顾学习娱乐的家用网络环境的过程,折腾过的一些软硬件小经验。
- [ronin-rb/ronin-vulns](https://github.com/ronin-rb/ronin-vulns) - Tests URLs for Local File Inclusion (LFI), Remote File Inclusion (RFI), SQL injection (SQLi), and Cross Site Scripting (XSS), Server Side Template Injection (SSTI), and Open Redirects.
- [seeu-inspace/easyg](https://github.com/seeu-inspace/easyg) - Here I gather all the resources about hacking that I find interesting
- [Bywalks/DarkAngel](https://github.com/Bywalks/DarkAngel) - DarkAngel 是一款全自动白帽漏洞扫描器,从hackerone、bugcrowd资产监听到漏洞报告生成、漏洞URL截屏、消息通知。
- [greatghoul/remote-working](https://github.com/greatghoul/remote-working) - 收集整理远程工作相关的资料
- [Homebrew/homebrew-bundle](https://github.com/Homebrew/homebrew-bundle) - 📦 Bundler for non-Ruby dependencies from Homebrew, Homebrew Cask and the Mac App Store.
- [r0eXpeR/fingerprint](https://github.com/r0eXpeR/fingerprint) - 各种工具指纹收集分享
- [safesword/WebExp](https://github.com/safesword/WebExp) - 2020年~2021年 网站CMS、中间件、框架系统漏洞集合
- [ly4k/CurveBall](https://github.com/ly4k/CurveBall) - PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)
- [DannyBen/bashly](https://github.com/DannyBen/bashly) - Bash command line framework and CLI generator
- [mubix/local-hibp](https://github.com/mubix/local-hibp) - How to set up a local copy of Have-I-Been-Pwned's password checking service
- [eastmountyxz/CVE-2020-0601-EXP](https://github.com/eastmountyxz/CVE-2020-0601-EXP) - 这资源是作者复现微软签字证书漏洞CVE-2020-0601,结合相关资源及文章实现。推荐大家结合作者博客,理解ECC算法、Windows验证机制,并尝试自己复现可执行文件签名证书和HTTPS劫持的例子。作为网络安全初学者,自己确实很菜,但希望坚持下去,加油!
- [ZeroChaos-/blue_hydra](https://github.com/ZeroChaos-/blue_hydra) - Blue Hydra
- [presidentbeef/brakeman](https://github.com/presidentbeef/brakeman) - A static analysis security vulnerability scanner for Ruby on Rails applications
- [mschuchard/rapid-vaults](https://github.com/mschuchard/rapid-vaults) - Ad-hoc encrypt and decrypt data behind multiple layers of protection via OpenSSL or GPG
- [noraj/rabid](https://github.com/noraj/rabid) - :cookie: A CLI tool and library allowing to simply decode all kind of BigIP cookies.
- [L-codes/pwcrack-framework](https://github.com/L-codes/pwcrack-framework) - Password Crack Framework
- [Hackplayers/evil-winrm](https://github.com/Hackplayers/evil-winrm) - The ultimate WinRM shell for hacking/pentesting
- [duckstroms/Web-CTF-Cheatsheet](https://github.com/duckstroms/Web-CTF-Cheatsheet) - Web CTF CheatSheet 🐈
- [hartator/wayback-machine-downloader](https://github.com/hartator/wayback-machine-downloader) - Download an entire website from the Wayback Machine.
- [bcoles/jira_scan](https://github.com/bcoles/jira_scan) - A simple remote scanner for Atlassian Jira
- [EXP-Docs/CVE-2021-22192](https://github.com/EXP-Docs/CVE-2021-22192) - CVE-2021-22192 靶场: 未授权用户 RCE 漏洞
- [evait-security/envizon](https://github.com/evait-security/envizon) - network visualization & pentest reporting
- [m0nad/HellRaiser](https://github.com/m0nad/HellRaiser) - Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
- [FunnyWolf/execute-assembly](https://github.com/FunnyWolf/execute-assembly) -
- [bcoles/ssrf_proxy](https://github.com/bcoles/ssrf_proxy) - SSRF Proxy facilitates tunneling HTTP communications through servers vulnerable to Server-Side Request Forgery.
- [TW-D/WiFi-Pineapple-MK7_REST-Client](https://github.com/TW-D/WiFi-Pineapple-MK7_REST-Client) - WiFi Hacking Workflow with WiFi Pineapple Mark VII API
- [zed-0xff/zsteg](https://github.com/zed-0xff/zsteg) - detect stegano-hidden data in PNG & BMP
- [rapid7/dap](https://github.com/rapid7/dap) - Data Analysis Pipeline
- [kiks7/rusty_joomla_rce](https://github.com/kiks7/rusty_joomla_rce) - Rusty Joomla RCE Exploit
- [tryzealot/zealot](https://github.com/tryzealot/zealot) - 开源自部署移动应用、 macOS、Linux 和 Windows 应用分发平台,提供 iOS、Android SDK、fastlane 等丰富组件库 | Self-hosted Beta App Distribution for Android, iOS, macOS, Linux and Windows apps
- [pedrib/PoC](https://github.com/pedrib/PoC) - Advisories, proof of concept files and exploits that have been made public by @pedrib.
- [ring0lab/catphish](https://github.com/ring0lab/catphish) - CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.
- [hahwul/mad-metasploit](https://github.com/hahwul/mad-metasploit) - Metasploit custom modules, plugins, resource script and.. awesome metasploit collection
- [navisecdelta/X-Prey](https://github.com/navisecdelta/X-Prey) - A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.
- [centriascolocation/inspec-aws-baseline](https://github.com/centriascolocation/inspec-aws-baseline) - InSpec AWS Baseline Profile
- [navisecdelta/EmailGen](https://github.com/navisecdelta/EmailGen) - A simple email generator that uses dorks on Bing to generate emails from LinkedIn Profiles.
- [busyloop/lolcat](https://github.com/busyloop/lolcat) - Rainbows and unicorns!
- [intrigueio/intrigue-core](https://github.com/intrigueio/intrigue-core) - Discover Your Attack Surface!
- [appvia/krane](https://github.com/appvia/krane) - Kubernetes RBAC static analysis & visualisation tool
- [noraj/Bludit-auth-BF-bypass](https://github.com/noraj/Bludit-auth-BF-bypass) - Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass
- [bacongravy/macinbox](https://github.com/bacongravy/macinbox) - Puts macOS in a Vagrant box
- [ninoseki/mihari](https://github.com/ninoseki/mihari) - A query aggregator for OSINT based threat hunting
- [lucasallan/CVE-2020-8163](https://github.com/lucasallan/CVE-2020-8163) - CVE-2020-8163 - Remote code execution of user-provided local names in Rails
- [subhajitsaha0x/N-POT](https://github.com/subhajitsaha0x/N-POT) - N-POT is a honeypot framework, It runs on your network with advance configuration.It can be run on specific ports and have the ability to clone any web application.It also have included other tools li
- [hackedteam/rcs-common](https://github.com/hackedteam/rcs-common) - Common components for RCS backend
- [pry0cc/cloud-ranges](https://github.com/pry0cc/cloud-ranges) - A list of cloud ranges from different providers.
- [intrigueio/intrigue-ident](https://github.com/intrigueio/intrigue-ident) - Application and Service Fingerprinting
- [R3dy/capsulecorp-pentest](https://github.com/R3dy/capsulecorp-pentest) - Vagrant VirtualBox environment for conducting an internal network penetration test
- [digininja/CeWL](https://github.com/digininja/CeWL) - CeWL is a Custom Word List Generator
- [jobertabma/virtual-host-discovery](https://github.com/jobertabma/virtual-host-discovery) - A script to enumerate virtual hosts on a server.
- [nahamsec/lazys3](https://github.com/nahamsec/lazys3) -
- [TideSec/Mars](https://github.com/TideSec/Mars) - Mars(战神)——资产发现、子域名枚举、C段扫描、资产变更监测、端口变更监测、域名解析变更监测、Awvs扫描、POC检测、web指纹探测、端口指纹探测、CDN探测、操作系统指纹探测、泛解析探测、WAF探测、敏感信息检测等等
- [criteo-cookbooks/wsus-server](https://github.com/criteo-cookbooks/wsus-server) - Chef Cookbook to install and configure server for Windows Server Update Services (WSUS)
- [hahwul/WebHackersWeapons](https://github.com/hahwul/WebHackersWeapons) - ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
- [noraj/OSCP-Exam-Report-Template-Markdown](https://github.com/noraj/OSCP-Exam-Report-Template-Markdown) - :orange_book: Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report
- [udzura/bpfql](https://github.com/udzura/bpfql) - eBPF query runner (Ruby DSL or something useful)
- [thesp0nge/dawnscanner](https://github.com/thesp0nge/dawnscanner) - Dawn is a static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails frameworks.
- [hahwul/XSpear](https://github.com/hahwul/XSpear) - 🔱 Powerfull XSS Scanning and Parameter analysis tool&gem
- [s1kr10s/D-Link-DIR-859-RCE](https://github.com/s1kr10s/D-Link-DIR-859-RCE) - D-Link DIR-859 - RCE UnAutenticated (CVE-2019–17621)
- [Shopify/tainted_love](https://github.com/Shopify/tainted_love) - Dynamic Security Analysis for Ruby
- [planetruby/awesome](https://github.com/planetruby/awesome) - Awesome Ruby Collections - Web Servers, Web Frameworks, Rack, Active Record, Functional, Crypto, and More
- [dmayer/idb](https://github.com/dmayer/idb) - idb is a tool to simplify some common tasks for iOS pentesting and research
- [arkadiyt/bounty-targets](https://github.com/arkadiyt/bounty-targets) - This project crawls bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) hourly and dumps them into the bounty-targets-data repo
- [redmine/redmine](https://github.com/redmine/redmine) - Mirror of redmine code source - Official Subversion repository is at https://svn.redmine.org/redmine - contact: @vividtone or maeda (at) farend (dot) jp
- [kaich/codeobscure](https://github.com/kaich/codeobscure) - code obscure for object-c project. 方便强大的OC工程代码自动混淆工具
- [praetorian-inc/purple-team-attack-automation](https://github.com/praetorian-inc/purple-team-attack-automation) - Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs
- [TideSec/FuzzScanner](https://github.com/TideSec/FuzzScanner) - 一个主要用于信息搜集的工具集,主要是用于对网站子域名、开放端口、端口指纹、c段地址、敏感目录等信息进行批量搜集。
- [bahaabdelwahed/killshot](https://github.com/bahaabdelwahed/killshot) - A Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner
- [darkoperator/Metasploit-Plugins](https://github.com/darkoperator/Metasploit-Plugins) - Plugins for Metasploit Framework
- [feedbin/feedbin](https://github.com/feedbin/feedbin) - A nice place to read on the web.
- [prat0318/json_resume](https://github.com/prat0318/json_resume) - Generates pretty HTML, LaTeX, markdown, with biodata feeded as input in JSON
- [w181496/Web-CTF-Cheatsheet](https://github.com/w181496/Web-CTF-Cheatsheet) - Web CTF CheatSheet 🐈
- [bit4woo/Summit_PPT](https://github.com/bit4woo/Summit_PPT) - 各种安全大会PPT PDF
- [arkadiyt/aws_public_ips](https://github.com/arkadiyt/aws_public_ips) - Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services
- [Arachni/arachni-ui-web](https://github.com/Arachni/arachni-ui-web) - Arachni's Web User Interface.
- [zcgonvh/cve-2017-7269](https://github.com/zcgonvh/cve-2017-7269) - fixed msf module for cve-2017-7269
- [ociredefz/vsaudit](https://github.com/ociredefz/vsaudit) - VOIP Security Audit Framework
- [SaulLawliet/watchdog](https://github.com/SaulLawliet/watchdog) - IF (接口/网页 有变化) THEN (提醒你)
- [0x09AL/CVE-2017-11882-metasploit](https://github.com/0x09AL/CVE-2017-11882-metasploit) - This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about.
- [nopernik/msfvenom-bc-generator](https://github.com/nopernik/msfvenom-bc-generator) - Metasploit msfvenom Bash Completions Generator
- [eik00d/Reverse_DNS_Shellcode](https://github.com/eik00d/Reverse_DNS_Shellcode) - Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.
- [luizluca/bridge](https://github.com/luizluca/bridge) - brigde is a dynamic port forwarder over HTTP (with HTTP PROXY support)
- [openblockchains/awesome-blockchains](https://github.com/openblockchains/awesome-blockchains) - A collection about awesome blockchains - open distributed public databases w/ crypto hashes incl. git ;-). Blockchains are the new tulips :tulip::tulip::tulip:. Distributed is the new centralized.
- [felixonmars/dnsmasq-china-list](https://github.com/felixonmars/dnsmasq-china-list) - Chinese-specific configuration to improve your favorite DNS server. Best partner for chnroutes.
- [hahwul/metasploit-autopwn](https://github.com/hahwul/metasploit-autopwn) - db_autopwn plugin of metasploit
- [vallejocc/Hacking-Busybox-Control](https://github.com/vallejocc/Hacking-Busybox-Control) - Some metasploit scripts to help to control busybox based embedded devices
- [sidaf/homebrew-pentest](https://github.com/sidaf/homebrew-pentest) - Homebrew Tap - Pen Test Tools
- [twngo/Tails-zh_TW](https://github.com/twngo/Tails-zh_TW) - website of TAILS (l10n project for Traditional Chinese)
- [mdrights/tails-zh_CN](https://github.com/mdrights/tails-zh_CN) - Website of Tails ( l10n project for Simplified Chinese )
- [iagox86/shuffler](https://github.com/iagox86/shuffler) - Just a quick ruby script to explore perfect card shuffles. :)
- [rastating/joomlavs](https://github.com/rastating/joomlavs) - A black box, Ruby powered, Joomla vulnerability scanner
- [SpiderLabs/cve_server](https://github.com/SpiderLabs/cve_server) - Simple REST-style web service for the CVE searching
- [ffleming/timing_attack](https://github.com/ffleming/timing_attack) - Perform timing attacks against web applications
- [Fuzzapi/fuzzapi](https://github.com/Fuzzapi/fuzzapi) - Fuzzapi is a tool used for REST API pentesting and uses API_Fuzzer gem
- [siberas/watobo](https://github.com/siberas/watobo) -
- [urbanadventurer/WhatWeb](https://github.com/urbanadventurer/WhatWeb) - Next generation web scanner
- [rastating/wordpress-exploit-framework](https://github.com/rastating/wordpress-exploit-framework) - A Ruby framework designed to aid in the penetration testing of WordPress systems.
- [inspec/inspec](https://github.com/inspec/inspec) - InSpec: Auditing and Testing Framework
- [zed-0xff/pedump](https://github.com/zed-0xff/pedump) - dump windows PE files using ruby
- [DeathKing/Learning-SICP](https://github.com/DeathKing/Learning-SICP) - MIT视频公开课《计算机程序的构造和解释》中文化项目及课程学习资料搜集。
- [puppetlabs/puppetlabs-firewall](https://github.com/puppetlabs/puppetlabs-firewall) - Puppet Firewall Module
- [huginn/huginn](https://github.com/huginn/huginn) - Create agents that monitor and act on your behalf. Your agents are standing by!
- [WhitewidowScanner/whitewidow](https://github.com/WhitewidowScanner/whitewidow) - SQL Vulnerability Scanner
- [napcs/rubynew](https://github.com/napcs/rubynew) - Ruby new project generator.
- [HatBashBR/HatCloud](https://github.com/HatBashBR/HatCloud) - discontinued
- [github/secure_headers](https://github.com/github/secure_headers) - Manages application of security headers with many safe defaults
- [Telefonica/Eternalblue-Doublepulsar-Metasploit](https://github.com/Telefonica/Eternalblue-Doublepulsar-Metasploit) - Module of Metasploit to exploit the vulnerability Eternalblue-Doublepulsar.
- [brunofacca/zen-rails-security-checklist](https://github.com/brunofacca/zen-rails-security-checklist) - Checklist of security precautions for Ruby on Rails applications.
- [porterhau5/BloodHound-Owned](https://github.com/porterhau5/BloodHound-Owned) - A collection of files for adding and leveraging custom properties in BloodHound.
- [michenriksen/birdwatcher](https://github.com/michenriksen/birdwatcher) - Data analysis and OSINT framework for Twitter
- [sue445/ccc_privacy_crawler](https://github.com/sue445/ccc_privacy_crawler) - Tカードの 個人情報提供の停止 対象企業一覧 の新着を通知するためのTwitterボットです
- [kost/dockscan](https://github.com/kost/dockscan) - dockscan is security vulnerability and audit scanner for Docker installations
- [dmchell/metasploit-framework](https://github.com/dmchell/metasploit-framework) - Metasploit Framework
- [tinyclub/open-shell-book](https://github.com/tinyclub/open-shell-book) - 开源书籍:《Shell 编程范例》,面向操作对象学 Shell!本书作者发布了《360°剖析 Linux ELF》视频课程,欢迎订阅:https://www.cctalk.com/m/group/88089283
- [Arachni/arachni](https://github.com/Arachni/arachni) - Web Application Security Scanner Framework## Rust
- [Pizz33/JoJoLoader](https://github.com/Pizz33/JoJoLoader) - 助力红队成员一键生成免杀木马,使用rust实现 | Help Redteam members generate Evasive Anti-virus software Trojan
- [pumpbin/pumpbin](https://github.com/pumpbin/pumpbin) - 🎃 PumpBin is an Implant Generation Platform.
- [ZhangHanDong/prompt-description-language](https://github.com/ZhangHanDong/prompt-description-language) - Prompt Description Language [POC]
- [ethicalhackingplayground/hrekt](https://github.com/ethicalhackingplayground/hrekt) - A really fast http prober.
- [tw93/Pake](https://github.com/tw93/Pake) - 🤱🏻 Turn any webpage into a desktop app with Rust. 🤱🏻 利用 Rust 轻松构建轻量级多端桌面应用
- [ruffle-rs/ruffle](https://github.com/ruffle-rs/ruffle) - A Flash Player emulator written in Rust
- [AbelChe/rabbithole](https://github.com/AbelChe/rabbithole) - 🦀️ 一个完全使用Rust编写的代理池工具,从网络搜索socks5代理,检测可用性之后开启socks5代理服务。A proxy pool tool completely written in Rust, which searches for SOCKS5 proxies from the network, and after checking their availability, starts
- [ethicalhackingplayground/pathbuster](https://github.com/ethicalhackingplayground/pathbuster) - A path-normalization pentesting tool.
- [lencx/ChatGPT](https://github.com/lencx/ChatGPT) - 🔮 ChatGPT Desktop Application (Mac, Windows and Linux)
- [voidz0r/CVE-2022-44268](https://github.com/voidz0r/CVE-2022-44268) - A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read
- [Sndav/WeChatDB-Rust](https://github.com/Sndav/WeChatDB-Rust) - 用Rust语言编写,使用特征值从微信内存中提取数据库密钥的工具
- [raspberryhusky/lazyfinder](https://github.com/raspberryhusky/lazyfinder) - 快速遍历目标目录中所有指定后缀文件中包含的敏感信息
- [YDHCUI/manjusaka](https://github.com/YDHCUI/manjusaka) - 牛屎花 一款基于WEB界面的远程主机管理工具
- [MythicAgents/thanatos](https://github.com/MythicAgents/thanatos) - Mythic C2 agent targeting Linux and Windows hosts written in Rust
- [sharkdp/fd](https://github.com/sharkdp/fd) - A simple, fast and user-friendly alternative to 'find'
- [AbdulRhmanAlfaifi/Fennec](https://github.com/AbdulRhmanAlfaifi/Fennec) - Artifact collection tool for *nix systems
- [mufeedvh/moonwalk](https://github.com/mufeedvh/moonwalk) - Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
- [ekzhang/bore](https://github.com/ekzhang/bore) - 🕳 bore is a simple CLI tool for making tunnels to localhost
- [mttaggart/OffensiveNotion](https://github.com/mttaggart/OffensiveNotion) - Notion as a platform for offensive operations
- [Esc4iCEscEsc/skanuvaty](https://github.com/Esc4iCEscEsc/skanuvaty) - Dangerously fast DNS/network/port scanner
- [frank2/oxide](https://github.com/frank2/oxide) - A PoC packer written in Rust!
- [gamozolabs/elfloader](https://github.com/gamozolabs/elfloader) - An architecture-agnostic ELF file flattener for shellcode
- [PaulJuliusMartinez/jless](https://github.com/PaulJuliusMartinez/jless) - jless is a command-line JSON viewer designed for reading, exploring, and searching through JSON data.
- [AFLplusplus/LibAFL](https://github.com/AFLplusplus/LibAFL) - Advanced Fuzzing Library - Slot your Fuzzer together in Rust! Scales across cores and machines. For Windows, Android, MacOS, Linux, no_std, ...
- [Kibouo/rustpad](https://github.com/Kibouo/rustpad) - Multi-threaded Padding Oracle attacks against any service. Written in Rust.
- [zu1k/ldap-log](https://github.com/zu1k/ldap-log) - 一个LDAP请求监听器,摆脱dnslog平台和java
- [shmuelamar/cracken](https://github.com/shmuelamar/cracken) - a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust
- [trickster0/OffensiveRust](https://github.com/trickster0/OffensiveRust) - Rust Weaponization for Red Team Engagements.
- [RedisJSON/RedisJSON](https://github.com/RedisJSON/RedisJSON) - RedisJSON - a JSON data type for Redis
- [knownsec/ct](https://github.com/knownsec/ct) - 简单易用的域名爆破工具
- [editso/fuso](https://github.com/editso/fuso) - 一款体积小, 快速, 稳定, 高效, 轻量的内网穿透, 端口转发工具 支持多连接,级联代理,传输加密 (A small volume, fast, stable, efficient, and lightweight intranet penetration, port forwarding tool supports multiple connections, cascading proxy,
- [postrequest/link](https://github.com/postrequest/link) - link is a command and control framework written in rust
- [Agnoctopus/Tartiflette](https://github.com/Agnoctopus/Tartiflette) - Snapshot fuzzing with KVM and LibAFL
- [emo-crab/observer_ward](https://github.com/emo-crab/observer_ward) - 侦查守卫(observer_ward)Web应用和服务指纹识别工具
- [ihciah/clean-dns-bpf](https://github.com/ihciah/clean-dns-bpf) - 基于 Rust + eBPF 丢弃 GFW DNS 污染包
- [weggli-rs/weggli](https://github.com/weggli-rs/weggli) - weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interesting functionality in large codebases.
- [revoltchat/vortex](https://github.com/revoltchat/vortex) - (in development) Pluggable WebRTC Voice Server
- [knassar702/lorsrf](https://github.com/knassar702/lorsrf) - Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load :artificial_satellite: :crab:
- [str4d/rage](https://github.com/str4d/rage) - A simple, secure and modern file encryption tool (and Rust library) with small explicit keys, no config options, and UNIX-style composability.
- [WithSecureLabs/chainsaw](https://github.com/WithSecureLabs/chainsaw) - Rapidly Search and Hunt through Windows Forensic Artefacts
- [DNSCrypt/doh-server](https://github.com/DNSCrypt/doh-server) - Fast, mature, secure DoH and ODoH server proxy written in Rust. Previously known as doh-proxy and rust-doh.
- [0x727/FingerprintHub](https://github.com/0x727/FingerprintHub) - 侦查守卫(ObserverWard)的指纹库
- [skerkour/black-hat-rust](https://github.com/skerkour/black-hat-rust) - Applied offensive security with Rust - https://kerkour.com/black-hat-rust
- [Lifars/gargamel](https://github.com/Lifars/gargamel) - A forensic evidence acquirer
- [hora-search/hora](https://github.com/hora-search/hora) - 🚀 efficient approximate nearest neighbor search algorithm collections library written in Rust 🦀 .
- [Sh1Yo/request_smuggler](https://github.com/Sh1Yo/request_smuggler) - Http request smuggling vulnerability scanner
- [dwisiswant0/ppfuzz](https://github.com/dwisiswant0/ppfuzz) - A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀
- [robiot/rustcat](https://github.com/robiot/rustcat) - Rustcat(rcat) - The modern Port listener and Reverse shell
- [R4yGM/stegbrute](https://github.com/R4yGM/stegbrute) - Fast Steganography bruteforce tool written in Rust useful for CTF's
- [melbadry9/domain_reg](https://github.com/melbadry9/domain_reg) - Check domain availability for registration
- [resyncgg/armada](https://github.com/resyncgg/armada) - A high performance TCP SYN port scanner.
- [theflakes/reg_hunter](https://github.com/theflakes/reg_hunter) - Blueteam operational triage registry hunting/forensic tool.
- [Sh1Yo/x8](https://github.com/Sh1Yo/x8) - Hidden parameters discovery suite
- [doctorn/micro-mitten](https://github.com/doctorn/micro-mitten) - You might not need your garbage collector
- [Edu4rdSHL/rusolver](https://github.com/Edu4rdSHL/rusolver) - A fast and accurate DNS resolver written in Rust.
- [teloxide/teloxide](https://github.com/teloxide/teloxide) - 🤖 An elegant Telegram bots framework for Rust
- [jvns/dnspeep](https://github.com/jvns/dnspeep) - spy on the DNS queries your computer is making
- [foniod/foniod](https://github.com/foniod/foniod) - Data first monitoring agent using (e)BPF, built on RedBPF
- [pemistahl/grex](https://github.com/pemistahl/grex) - A command-line tool and Rust library with Python bindings for generating regular expressions from user-provided test cases
- [Nukesor/pueue](https://github.com/Nukesor/pueue) - :stars: Manage your shell commands.
- [TheBinitGhimire/NtHiM](https://github.com/TheBinitGhimire/NtHiM) - Now, the Host is Mine! - Super Fast Sub-domain Takeover Detection!
- [bytecodealliance/wasmtime](https://github.com/bytecodealliance/wasmtime) - A fast and secure runtime for WebAssembly
- [microsoft/windows-rs](https://github.com/microsoft/windows-rs) - Rust for Windows
- [ysf/anewer](https://github.com/ysf/anewer) - anewer appends lines from stdin to a file if they don't already exist in the file. This is a rust version of https://github.com/tomnomnom/anew
- [sharkdp/bat](https://github.com/sharkdp/bat) - A cat(1) clone with wings.
- [reacherhq/check-if-email-exists](https://github.com/reacherhq/check-if-email-exists) - Check if an email address exists without sending any email, written in Rust. Comes with a ⚙️ HTTP backend.
- [melbadry9/SSLEnum](https://github.com/melbadry9/SSLEnum) - Extract SSL certificate data (Subject Name, Subject Alt Names, Organisation)
- [ogham/dog](https://github.com/ogham/dog) - A command-line DNS client.
- [nccgroup/scrying](https://github.com/nccgroup/scrying) - A tool for collecting RDP, web and VNC screenshots all in one place
- [epi052/feroxbuster](https://github.com/epi052/feroxbuster) - A fast, simple, recursive content discovery tool written in Rust.
- [Edu4rdSHL/fhc](https://github.com/Edu4rdSHL/fhc) - Fast HTTP Checker.
- [JohnWoodman/FES](https://github.com/JohnWoodman/FES) - Fast Endpoint Scanner
- [Edu4rdSHL/unimap](https://github.com/Edu4rdSHL/unimap) - Scan only once by IP address and reduce scan times with Nmap for large amounts of data.
- [TimeToogo/tunshell](https://github.com/TimeToogo/tunshell) - Remote shell into ephemeral environments 🐚 🦀
- [hardik05/Damn_Vulnerable_C_Program](https://github.com/hardik05/Damn_Vulnerable_C_Program) - An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.
- [nushell/nushell](https://github.com/nushell/nushell) - A new type of shell
- [aws/http-desync-guardian](https://github.com/aws/http-desync-guardian) - Analyze HTTP requests to minimize risks of HTTP Desync attacks (precursor for HTTP request smuggling/splitting).
- [twilco/kosmonaut](https://github.com/twilco/kosmonaut) - A web browser engine for the space age :rocket:
- [jmdx/TLS-poison](https://github.com/jmdx/TLS-poison) -
- [gamozolabs/cookie_dough](https://github.com/gamozolabs/cookie_dough) - A fuzzing introspection tool
- [oliverdaff/hprobe](https://github.com/oliverdaff/hprobe) - A HTTP probe written in Rust
- [RustScan/RustScan](https://github.com/RustScan/RustScan) - 🤖 The Modern Port Scanner 🤖
- [0xeb-bp/subdomain_prepender](https://github.com/0xeb-bp/subdomain_prepender) - Prepend subdomains to domains for brute forcing.
- [junnlikestea/vita](https://github.com/junnlikestea/vita) - A tool to find subdomains or domains from passive sources.
- [junnlikestea/bulkssrf](https://github.com/junnlikestea/bulkssrf) - Tests for SSRF by injecting a specified location into different headers. This is a Rust port of m4ll0k's tool.
- [parallaxsecond/parsec](https://github.com/parallaxsecond/parsec) - Platform AbstRaction for SECurity service
- [phra/rustbuster](https://github.com/phra/rustbuster) - A Comprehensive Web Fuzzer and Content Discovery Tool
- [extrawurst/gitui](https://github.com/extrawurst/gitui) - Blazing 💥 fast terminal-ui for git written in rust 🦀
- [Isona/dirble](https://github.com/Isona/dirble) - Fast directory scanning and scraping tool
- [iovxw/rssbot](https://github.com/iovxw/rssbot) - Lightweight Telegram RSS notification bot. 用于消息通知的轻量级 Telegram RSS 机器人
- [joinsec/BadDNS](https://github.com/joinsec/BadDNS) -
- [Scille/parsec-cloud](https://github.com/Scille/parsec-cloud) - Open source Dropbox-like file sharing with full client encryption !
- [bottlerocket-os/bottlerocket](https://github.com/bottlerocket-os/bottlerocket) - An operating system designed for hosting containers
- [fkie-cad/cwe_checker](https://github.com/fkie-cad/cwe_checker) - cwe_checker finds vulnerable patterns in binary executables
- [SUPERAndroidAnalyzer/super](https://github.com/SUPERAndroidAnalyzer/super) - Secure, Unified, Powerful and Extensible Rust Android Analyzer
- [BurntSushi/ripgrep](https://github.com/BurntSushi/ripgrep) - ripgrep recursively searches directories for a regex pattern while respecting your gitignore
- [Findomain/Findomain](https://github.com/Findomain/Findomain) - The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, subdomain monitoring, alerts via Discord, Slack and Telegram, mul
- [Aloxaf/rbkcrack](https://github.com/Aloxaf/rbkcrack) - Crack legacy zip encryption with Biham and Kocher's known plaintext attack. 使用明文攻击破解加密的 zip 文件
- [PinkP4nther/EroDir](https://github.com/PinkP4nther/EroDir) - A fast web directory/file enumeration tool written in Rust
- [kpcyrd/sn0int](https://github.com/kpcyrd/sn0int) - Semi-automatic OSINT framework and package manager
- [square/sudo_pair](https://github.com/square/sudo_pair) - Plugin for sudo that requires another human to approve and monitor privileged sudo sessions
- [rust-unofficial/awesome-rust](https://github.com/rust-unofficial/awesome-rust) - A curated list of Rust code and resources.
- [loggerhead/shadowsocks-rust](https://github.com/loggerhead/shadowsocks-rust) - Oh my implementation of Shadowsocks in Rust
- [smoqadam/rust-youtube-downloader](https://github.com/smoqadam/rust-youtube-downloader) - Youtube video downloader written in Rust
- [isra17/dirt](https://github.com/isra17/dirt) - Dynamic Identification and Recognition Technology
- [analysis-tools-dev/static-analysis](https://github.com/analysis-tools-dev/static-analysis) - ⚙️ A curated list of static analysis (SAST) tools and linters for all programming languages, config files, build tools, and more. The focus is on tools which improve code quality.## SCSS
- [subframe7536/obsidian-theme-maple](https://github.com/subframe7536/obsidian-theme-maple) - [Refactoring] Obsidian theme for desktop with graceful animation and awesome components
- [sivan/heti](https://github.com/sivan/heti) - 赫蹏(hètí)是专为中文内容展示设计的排版样式增强。它基于通行的中文排版规范而来,可以为网站的读者带来更好的文章阅读体验。
- [Keldos-Li/typora-latex-theme](https://github.com/Keldos-Li/typora-latex-theme) - 将Typora伪装成LaTeX的中文样式主题,本科生轻量级课程论文撰写的好帮手。This is a theme disguising Typora into Chinese LaTeX style.
- [RamonGiovane/guiptables](https://github.com/RamonGiovane/guiptables) - A Graphic User Interface for Linux's Iptables Firewall. Made with Cockpit for CentOS
- [AboutRSS/ALL-about-RSS](https://github.com/AboutRSS/ALL-about-RSS) - A list of RSS related stuff: tools, services, communities and tutorials, etc.
- [nostalgic-css/NES.css](https://github.com/nostalgic-css/NES.css) - NES-style CSS Framework | ファミコン風CSSフレームワーク
- [mzfr/vulnhub-writeups](https://github.com/mzfr/vulnhub-writeups) - Writeups for Vulnhub's boot2root machines that I've done
- [rabobank-cdc/DeTTECT](https://github.com/rabobank-cdc/DeTTECT) - Detect Tactics, Techniques & Combat Threats
- [vinceliuice/Mojave-gtk-theme](https://github.com/vinceliuice/Mojave-gtk-theme) - Mojave is a macos Mojave like theme for GTK 3, GTK 2 and Gnome-Shell
- [appsecco/dvna](https://github.com/appsecco/dvna) - Damn Vulnerable NodeJS Application
- [olOwOlo/hugo-theme-even](https://github.com/olOwOlo/hugo-theme-even) - 🚀 A super concise theme for Hugo https://hugo-theme-even.netlify.app
- [mastodon/documentation](https://github.com/mastodon/documentation) - Mastodon documentation## Sage
- [pcw109550/write-up](https://github.com/pcw109550/write-up) - :smirk_cat: CTF write-ups
## SaltStack
- [skymyyang/salt-k8s-ha](https://github.com/skymyyang/salt-k8s-ha) - SaltStack自动化部署Kubernetes-HA集群、二进制部署、便于理解原理
## Sass
- [nisrulz/app-privacy-policy-generator](https://github.com/nisrulz/app-privacy-policy-generator) - Generate a customized Privacy Policy and Terms of Use document for your mobile apps
## Scala
- [seveniruby/AppCrawler](https://github.com/seveniruby/AppCrawler) - 基于appium的app自动遍历工具
- [joernio/joern](https://github.com/joernio/joern) - Open-source code analysis platform for C/C++/Java/Binary/Javascript/Python/Kotlin based on code property graphs. Discord https://discord.gg/vv4MH284Hc
- [albuch/sbt-dependency-check](https://github.com/albuch/sbt-dependency-check) - SBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). :rainbow:
- [geekyouth/SZT-bigdata](https://github.com/geekyouth/SZT-bigdata) - 深圳地铁大数据客流分析系统🚇🚄🌟
- [sbaresearch/amlsec](https://github.com/sbaresearch/amlsec) - Automated Security Risk Identification Using AutomationML-based Engineering Data
- [arguslab/Argus-SAF](https://github.com/arguslab/Argus-SAF) - Argus static analysis framework
- [TheHive-Project/TheHive](https://github.com/TheHive-Project/TheHive) - TheHive: a Scalable, Open Source and Free Security Incident Response Platform## Scheme
- [vah13/radamsa](https://github.com/vah13/radamsa) - a general purpose fuzzer
## Shell
- [bigb0sss/gogophish](https://github.com/bigb0sss/gogophish) - Fly into Gophish with One Click (Infra Automation)
- [Joe1sn/glib_stroke](https://github.com/Joe1sn/glib_stroke) - cobaltstrike 4.9缺少Glibc 2.29报错的辅助脚本
- [dirtycoder0124/XSS-Automation](https://github.com/dirtycoder0124/XSS-Automation) -
- [fazlearefin/kali-ctf-machine-setup](https://github.com/fazlearefin/kali-ctf-machine-setup) - Kali Linux extra useful packages for CTF and Pentest activities
- [huntingsec/ARL-Limited-Edition](https://github.com/huntingsec/ARL-Limited-Edition) - 原汁原味的ARL灯塔,在基础上进行了魔改优化
- [MaherAzzouzi/CVE-2022-37706-LPE-exploit](https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit) - A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)
- [ben1234560/k8s_PaaS](https://github.com/ben1234560/k8s_PaaS) - 如何基于K8s(Kubernetes)部署成PaaS/DevOps(一套完整的软件研发和部署平台)--教程/学习(实战代码/架构设计/大量注释/操作配图),你将习得部署如:K8S(Kubernetes)、Dashboard、Harbor、Jenkins、本地Gitlab、Apollo框架、Promtheus、Grafana、Spinnaker等。
- [MegaManSec/SSH-Snake](https://github.com/MegaManSec/SSH-Snake) - SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
- [SuperManito/LinuxMirrors](https://github.com/SuperManito/LinuxMirrors) - GNU/Linux 更换系统软件源脚本
- [DeadPackets/pwnbox](https://github.com/DeadPackets/pwnbox) - A Kali-based docker container pre-built with tools, ZSH, and SSH.
- [0xKayala/NucleiFuzzer](https://github.com/0xKayala/NucleiFuzzer) - NucleiFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications
- [spiritLHLS/ecs](https://github.com/spiritLHLS/ecs) - VPS融合怪服务器测评脚本(VPS Fusion Monster Server Test Script)(尽量做最全能测试服务器的脚本)
- [alexrf45/aegis](https://github.com/alexrf45/aegis) - Repeatable, immutable, and scalable security research w/ Docker
- [cisagov/gophish-docker](https://github.com/cisagov/gophish-docker) - Docker container for the gophish phishing framework.
- [DabanC/android_install_ca_certificate](https://github.com/DabanC/android_install_ca_certificate) - 安卓12安装CA根证书,抓https包
- [rohsec/bountymeter](https://github.com/rohsec/bountymeter) - [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and keep record of their bounties on a monthly basis, and track th
- [howl-anderson/unlocking-the-power-of-llms](https://github.com/howl-anderson/unlocking-the-power-of-llms) - 使用 Prompts 和 Chains 让 ChatGPT 成为神奇的生产力工具!Unlocking the power of LLMs.
- [yeahwu/check](https://github.com/yeahwu/check) - Streaming Media Unlock Test
- [kuletco/iso-helper](https://github.com/kuletco/iso-helper) - Ubuntu-20.04 Custom Helper Script
- [shouyinji1/MyTorProxy](https://github.com/shouyinji1/MyTorProxy) - Tor SOCKS5代理工具
- [retkoussa/reFresh](https://github.com/retkoussa/reFresh) - A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.
- [regorsec/Linux-Post-Exploitation](https://github.com/regorsec/Linux-Post-Exploitation) - Tips, Tricks, and Scripts for Linux Post Exploitation
- [teamssix/container-escape-check](https://github.com/teamssix/container-escape-check) - docker container escape check || Docker 容器逃逸检测
- [spiritLHLS/Oracle-server-keep-alive-script](https://github.com/spiritLHLS/Oracle-server-keep-alive-script) - 服务器资源占用脚本(甲骨文服务器保活脚本)(Oracle Server Keep Alive Script)
- [youngyangyang04/leetcode-master](https://github.com/youngyangyang04/leetcode-master) - 《代码随想录》LeetCode 刷题攻略:200道经典题目刷题顺序,共60w字的详细图解,视频难点剖析,50余张思维导图,支持C++,Java,Python,Go,JavaScript等多语言版本,从此算法学习不再迷茫!🔥🔥 来看看,你会发现相见恨晚!🚀
- [yeahwu/v2ray-wss](https://github.com/yeahwu/v2ray-wss) -
- [n3m1sys/CVE-2023-22809-sudoedit-privesc](https://github.com/n3m1sys/CVE-2023-22809-sudoedit-privesc) - A script to automate privilege escalation with CVE-2023-22809 vulnerability
- [stilleshan/frps](https://github.com/stilleshan/frps) - 基于原版 frp 内网穿透服务端 frps 的一键安装卸载脚本和 docker 镜像.支持 Linux 服务器和 docker 等多种环境安装部署.
- [9bie/sshdHooker](https://github.com/9bie/sshdHooker) - One-click injection into the SSHD process to record and send the password for ssh login
- [OrangeHacking-CyberSecurity/kali-build-config](https://github.com/OrangeHacking-CyberSecurity/kali-build-config) - 构建基于gnome桌面模式的kali Linux
- [rix4uni/SubDog](https://github.com/rix4uni/SubDog) - subdog is a subdomain enumeration tools, this tool collect number of different sources to create a list of root subdomains
- [tom-snow/wechat-windows-versions](https://github.com/tom-snow/wechat-windows-versions) - 保存微信历史版本
- [whitehatsoumya/Nutoscan](https://github.com/whitehatsoumya/Nutoscan) - An Automated Mass Network Vulnerability Scanner and Recon Tool
- [cxf-boluo/magisk_All](https://github.com/cxf-boluo/magisk_All) - magisk 一键集成环境,再也不用每次刷完机繁琐的配置环境了!
- [1N3/BruteX](https://github.com/1N3/BruteX) - Automatically brute force all services running on a target.
- [haiwen/seafile-server-installer-cn](https://github.com/haiwen/seafile-server-installer-cn) - One script to install seafile server
- [neargle/my-re0-k8s-security](https://github.com/neargle/my-re0-k8s-security) - :atom: [WIP] 整理过去的分享,从零开始的Kubernetes攻防 🧐
- [z-shell/zi](https://github.com/z-shell/zi) - ✨ A Swiss Army Knife for Zsh - Unix Shell
- [makdosx/mip22](https://github.com/makdosx/mip22) - :computer: :iphone: mip22 is a advanced phishing tool
- [githubfoam/nmap-githubactions](https://github.com/githubfoam/nmap-githubactions) - nmap nse lua vulnerability scanner githubactions
- [LeKlex/Attack-simulation-infrastructure](https://github.com/LeKlex/Attack-simulation-infrastructure) - A small and simple network infrastructure with automated attacks on a VM server documented by tshark
- [arget13/DDexec](https://github.com/arget13/DDexec) - A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.
- [decoymini/DecoyMini](https://github.com/decoymini/DecoyMini) - 🐝 A highly scalable, safe, free enterprise honeypots 一款高可扩展、安全、免费的企业级蜜罐系统
- [lefayjey/linWinPwn](https://github.com/lefayjey/linWinPwn) - linWinPwn is a bash script that streamlines the use of a number of Active Directory tools
- [snowyyowl/writeups](https://github.com/snowyyowl/writeups) -
- [JoyGhoshs/0install](https://github.com/JoyGhoshs/0install) - A bash script that will automatically install Bug Hunting tools used for recon
- [JoyGhoshs/BalerRecon](https://github.com/JoyGhoshs/BalerRecon) - Baler Recon Script
- [JoyGhoshs/Airattackit](https://github.com/JoyGhoshs/Airattackit) - Automated Wireless Attack Framework
- [oxff644/Waf_auto_pretest](https://github.com/oxff644/Waf_auto_pretest) - WAF自动化质量测试工具
- [ViRb3/magisk-frida](https://github.com/ViRb3/magisk-frida) - 🔐 Run frida-server on boot with Magisk, always up-to-date
- [basharkey/CVE-2022-0847-dirty-pipe-checker](https://github.com/basharkey/CVE-2022-0847-dirty-pipe-checker) - Bash script to check for CVE-2022-0847 "Dirty Pipe"
- [BytecodeDL/ByteCodeDL](https://github.com/BytecodeDL/ByteCodeDL) - A declarative static analysis tool for jvm bytecode based Datalog like CodeQL
- [G4rb3n/Malbox](https://github.com/G4rb3n/Malbox) - 恶意软件容器靶机
- [r1is/CVE-2022-0847](https://github.com/r1is/CVE-2022-0847) - CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此
- [philcryer/prickly-pete](https://github.com/philcryer/prickly-pete) - A script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER may not be fun, not to be taken internally, aim away from face)
- [rohsec/chaosDump](https://github.com/rohsec/chaosDump) - A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io.
- [veerendra2/elasticsearch-deploy-notes](https://github.com/veerendra2/elasticsearch-deploy-notes) - Elasticsearch deploy notes
- [nightwatchcybersecurity/gitbleed_tools](https://github.com/nightwatchcybersecurity/gitbleed_tools) -
- [ffffffff0x/403-fuzz](https://github.com/ffffffff0x/403-fuzz) - 针对 403 页面的 fuzz 脚本
- [wslutilities/wslu](https://github.com/wslutilities/wslu) - A collection of utilities for Windows Subsystem for Linux
- [v4d1/SpoofThatMail](https://github.com/v4d1/SpoofThatMail) - Bash script to check if a domain or list of domains can be spoofed based in DMARC records
- [0xJin/awesome-bugbounty-builder](https://github.com/0xJin/awesome-bugbounty-builder) - Awesome Bug bounty builder Project
- [nyxnor/onionjuggler](https://github.com/nyxnor/onionjuggler) - Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.
- [mvscode/frps-onekey](https://github.com/mvscode/frps-onekey) - Frp server one-click configuration script. The script obtains the latest Frp version by default
- [Security-Onion-Solutions/securityonion](https://github.com/Security-Onion-Solutions/securityonion) - Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, a
- [adilsoybali/Log4j-RCE-Scanner](https://github.com/adilsoybali/Log4j-RCE-Scanner) - Remote command execution vulnerability scanner for Log4j.
- [tangjie1/-Baseline-check](https://github.com/tangjie1/-Baseline-check) - windows和linux基线检查,配套自动化检查脚本。纯手打。
- [graphql/graphql-spec](https://github.com/graphql/graphql-spec) - GraphQL is a query language and execution engine tied to any backend service.
- [juaromu/wazuh-log4j](https://github.com/juaromu/wazuh-log4j) -
- [ssstonebraker/log4j-scan-turbo](https://github.com/ssstonebraker/log4j-scan-turbo) - Multithreaded log4j vulnerability scanner using only bash! Tests all JNDI protocols, HTTP GET/POST, and 84 headers.
- [redcode-labs/AirStrike](https://github.com/redcode-labs/AirStrike) - Automatically grab and crack WPA-2 handshakes with distributed client-server architecture
- [AlphabugX/csOnvps](https://github.com/AlphabugX/csOnvps) - CobaltStrike4.4 一键部署脚本 随机生成密码、key、端口号、证书等,解决cs4.x无法运行在Linux上报错问题 灰常银杏化设计
- [santosomar/log4j-ioc-detector](https://github.com/santosomar/log4j-ioc-detector) - A Simple Log4j Indicator of Compromise Linux Detector
- [hackinghippo/log4shell_ioc_ips](https://github.com/hackinghippo/log4shell_ioc_ips) - log4j / log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)
- [cisagov/log4j-affected-db](https://github.com/cisagov/log4j-affected-db) - A community sourced list of log4j-affected software
- [zhangyoufu/log4j2-without-jndi](https://github.com/zhangyoufu/log4j2-without-jndi) - log4j2-core JAR w/o JndiLookup.class
- [sindresorhus/pure](https://github.com/sindresorhus/pure) - Pretty, minimal and fast ZSH prompt
- [Jonnyan404/zerotier-planet](https://github.com/Jonnyan404/zerotier-planet) - 一分钟自建zerotier-planet
- [bodsch/docker-jolokia](https://github.com/bodsch/docker-jolokia) - Docker Container with tomcat-9, jre and jolokia
- [WeiyiGeek/SecOpsDev](https://github.com/WeiyiGeek/SecOpsDev) - 项目介绍: 自己闲来无事所写以及工作中抽取的安全/运维/开发方面的代码小脚本 ,希望大家多多star支持。
- [DamonMohammadbagher/NativePayload_Image](https://github.com/DamonMohammadbagher/NativePayload_Image) - Transferring Backdoor Payloads with BMP Image Pixels
- [lxhao61/integrated-examples](https://github.com/lxhao61/integrated-examples) - 以 V2Ray(v4 版) 或 Xray、Nginx 或 Caddy(v2 版)、Hysteria 等打造常用科学上网的最优组合示例及优化配置,且提供集成特定插件的 Caddy(v2 版) 文件,分享给大家食用及自己备份。
- [mrtc0/kubectf](https://github.com/mrtc0/kubectf) - Kubernetes CTF
- [mack-a/v2ray-agent](https://github.com/mack-a/v2ray-agent) - Xray、Tuic、hysteria2、sing-box 八合一一键脚本
- [V1n1v131r4/webdiscover](https://github.com/V1n1v131r4/webdiscover) - The purpose of this script is to automate the web enumeration process and search for exploits
- [Dheerajmadhukar/4-ZERO-3](https://github.com/Dheerajmadhukar/4-ZERO-3) - 403/401 Bypass Methods + Bash Automation + Your Support ;)
- [rohsec/Uncomment](https://github.com/rohsec/Uncomment) - A Powerful tool to fetch all the comments from the supplied URL's
- [HightechSec/scarce-apache2](https://github.com/HightechSec/scarce-apache2) - A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public
- [TheLastVvV/CVE-2021-42013_Reverse-Shell](https://github.com/TheLastVvV/CVE-2021-42013_Reverse-Shell) - PoC CVE-2021-42013 reverse shell Apache 2.4.50 with CGI
- [WithSecureLabs/LinuxCatScale](https://github.com/WithSecureLabs/LinuxCatScale) - Incident Response collection and processing scripts with automated reporting scripts
- [WSA-Community/WSAGAScript](https://github.com/WSA-Community/WSAGAScript) - Scripts to install Google Apps into a WSA image. Plus optional root
- [profuzzbench/profuzzbench](https://github.com/profuzzbench/profuzzbench) - ProFuzzBench - A Benchmark for Stateful Protocol Fuzzing
- [darklotuskdb/SSTI-XSS-Finder](https://github.com/darklotuskdb/SSTI-XSS-Finder) - XSS Finder Via SSTI
- [souravbaghz/Carpunk](https://github.com/souravbaghz/Carpunk) - The CAN Injection Toolkit
- [DK9510/automate-with-actions](https://github.com/DK9510/automate-with-actions) -
- [dn0m1n8tor/project-morya](https://github.com/dn0m1n8tor/project-morya) - Project Morya is just a collection of bash scripts that runs iteratively to carry out various tools and recon process & store output in an organized way
- [itboxltda/pentestlab](https://github.com/itboxltda/pentestlab) - Script to manage and create local pentesting training virtual lab
- [honoki/bbrf-server](https://github.com/honoki/bbrf-server) - The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices
- [YouGina/reconmaster](https://github.com/YouGina/reconmaster) - ReconMaster contest - scripts used and a write-up
- [KingOfBugbounty/DockerHunt](https://github.com/KingOfBugbounty/DockerHunt) -
- [WoeUSB/WoeUSB](https://github.com/WoeUSB/WoeUSB) - A Microsoft Windows® USB installation media preparer for GNU+Linux
- [egrullon/Wounty](https://github.com/egrullon/Wounty) - Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty processes. This tool is very important as part of the Bug Boun
- [machine1337/reverse-shells](https://github.com/machine1337/reverse-shells) - This tool will help in generating reverse shells easily for all types of OS.
- [iamthefrogy/frogy](https://github.com/iamthefrogy/frogy) - My subdomain enumeration script. It's unique in the way it is built upon.
- [Markdown-Bug-Bounty-Recon/Markdown-Bug-Bounty-Recon](https://github.com/Markdown-Bug-Bounty-Recon/Markdown-Bug-Bounty-Recon) - A recon Framework for Bug Bounty Hunters that would convert the output of a script into Markdown syntax document, which would help them to make better notes, have everything in one document, or concen
- [R0X4R/scvault](https://github.com/R0X4R/scvault) - Custom scripts for directory fuzzing, subdomain enumeration, and more.
- [A3h1nt/gimmeSH](https://github.com/A3h1nt/gimmeSH) - For pentesters who don't wanna leave their terminals.
- [clu3bot/owt](https://github.com/clu3bot/owt) - Update Version 3.1 added free SMS messaging.
- [trimstray/massh-enum](https://github.com/trimstray/massh-enum) - OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).
- [xiaoyunjie/Shell_Script](https://github.com/xiaoyunjie/Shell_Script) - Linux系统的安全,通过脚本对Linux系统进行一键检测和一键加固
- [alex-matty/bash_hunter](https://github.com/alex-matty/bash_hunter) - Tools and scripts written in bash. Created to automate common tasks.
- [Dheerajmadhukar/karma_v2](https://github.com/Dheerajmadhukar/karma_v2) - ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)
- [shifa123/nuclei-templates-all](https://github.com/shifa123/nuclei-templates-all) - Bash Script to download all Nuclei Templates from different awesome sources
- [dung-bycn/bycn-mobsf-scan](https://github.com/dung-bycn/bycn-mobsf-scan) -
- [D1rk9ghT/Recon](https://github.com/D1rk9ghT/Recon) - Bug Bounty Recon Tools
- [slsa-framework/slsa](https://github.com/slsa-framework/slsa) - Supply-chain Levels for Software Artifacts
- [k8sli/kubeplay](https://github.com/k8sli/kubeplay) - Deploy kubernetes by kubespray in offline
- [B3nac/deeplink-fuzz.sh](https://github.com/B3nac/deeplink-fuzz.sh) - A Bash wrapper for radamsa that can be used to fuzz exported activities and deep links.
- [jay-johnson/owasp-jenkins](https://github.com/jay-johnson/owasp-jenkins) - Want to test your applications using the latest OWASP security toolchains and the NIST National Vulnerability Database using Jenkins, Ansible and docker? :whale: :shield: :lock:
- [BiasedRiot/Glanadh](https://github.com/BiasedRiot/Glanadh) - Service to automatically remove Metadata from your files.
- [alcideio/kaudit](https://github.com/alcideio/kaudit) - Alcide Kubernetes Audit Log Analyzer - Alcide kAudit
- [Mixeway/MixewayHub](https://github.com/Mixeway/MixewayHub) - Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayHub project contain one click docker-compose file which configure and run
- [thomasleplus/jwt-utils](https://github.com/thomasleplus/jwt-utils) - A few utilities to work with JWTs.
- [iamthefrogy/nerdbug](https://github.com/iamthefrogy/nerdbug) - Full Nuclei automation script with logic explanation.
- [wirefalls/geo-nft](https://github.com/wirefalls/geo-nft) - Bash script to create nftables sets of country specific IP address ranges for use with firewall rulesets. The project provides a simple and flexible way to implement geolocation filtering with nftable
- [konstruktoid/hardening](https://github.com/konstruktoid/hardening) - Hardening Ubuntu. Systemd edition.
- [SDA-SE/cluster-image-scanner](https://github.com/SDA-SE/cluster-image-scanner) - Discover vulnerabilities and container image misconfiguration in production environments.
- [H21lab/tsharkVM](https://github.com/H21lab/tsharkVM) - tshark + ELK analytics virtual machine
- [mviereck/x11docker](https://github.com/mviereck/x11docker) - Run GUI applications and desktops in docker and podman containers. Focus on security.
- [threeworld/Security-baseline](https://github.com/threeworld/Security-baseline) - 安全基线
- [moranbw/https-dns-proxy-docker](https://github.com/moranbw/https-dns-proxy-docker) - Docker container for https-dns-proxy
- [oldboy21/LDAP-Password-Hunter](https://github.com/oldboy21/LDAP-Password-Hunter) - Password Hunter in Active Directory
- [supr4s/WebHackingTools](https://github.com/supr4s/WebHackingTools) - Automatically install some web hacking/bug bounty tools.
- [MacMiniVault/Mac-Scripts](https://github.com/MacMiniVault/Mac-Scripts) - Automation scripts focused around Mac OS X Server
- [wazuh/wazuh-docker](https://github.com/wazuh/wazuh-docker) - Wazuh - Docker containers
- [arismelachroinos/lscript](https://github.com/arismelachroinos/lscript) - The LAZY script will make your life easier, and of course faster.
- [sushant-kamble/kalioncloud](https://github.com/sushant-kamble/kalioncloud) - This is a shell script to install kali on cloud VPS server with a GUI.
- [m3n0sd0n4ld/uDork](https://github.com/m3n0sd0n4ld/uDork) - uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or directories, find IoT devices, detect versions of web applications,
- [justmeandopensource/vagrant](https://github.com/justmeandopensource/vagrant) - Vagrant and corresponding Vagrantfiles
- [takito1812/FireStorePwn](https://github.com/takito1812/FireStorePwn) - fsp - Firestore Database Vulnerability Scanner Using APKs
- [A3h1nt/Dnsrr](https://github.com/A3h1nt/Dnsrr) - DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.
- [owerdogan/whoami-project](https://github.com/owerdogan/whoami-project) - Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions
- [Cyber-Guy1/Subdomainer](https://github.com/Cyber-Guy1/Subdomainer) - Automated tool for domains & subdomains gathering
- [cloudsec/brootkit](https://github.com/cloudsec/brootkit) - Lightweight rootkit implemented by bash shell scripts v0.10
- [Dheerajmadhukar/karma_v1](https://github.com/Dheerajmadhukar/karma_v1) - KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Ports.
- [enomothem/Whoamifuck](https://github.com/enomothem/Whoamifuck) - 用于Linux应急响应,快速排查异常用户登录情况和入侵信息排查,准确定位溯源时间线,高效辅助还原攻击链。
- [mvallim/live-custom-ubuntu-from-scratch](https://github.com/mvallim/live-custom-ubuntu-from-scratch) - (Yes, the project is still alive 😃) This procedure shows how to create a bootable and installable Ubuntu Live (along with the automatic hardware detection and configuration) from scratch.
- [swapravo/polkadots](https://github.com/swapravo/polkadots) - CVE-2021-3560 Local PrivEsc Exploit
- [R0X4R/Pinaak](https://github.com/R0X4R/Pinaak) - A vulnerability fuzzing tool written in bash, it contains the most commonly used tools to perform vulnerability scan
- [emadshanab/Gf-Patterns-Collection](https://github.com/emadshanab/Gf-Patterns-Collection) -
- [nankeen/pwndocker](https://github.com/nankeen/pwndocker) - Docker tools for CTF pwning 👩🏻💻👨🏻💻🚩
- [ManasHarsh/Cobra](https://github.com/ManasHarsh/Cobra) - All in one tool to make your hacking easier.
- [ElliotKillick/qvm-create-windows-qube](https://github.com/ElliotKillick/qvm-create-windows-qube) - Spin up new Windows qubes quickly, effortlessly and securely on Qubes OS
- [nikhil1232/Bucket-Flaws](https://github.com/nikhil1232/Bucket-Flaws) - Bucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations
- [mrrobot1o1/asnips](https://github.com/mrrobot1o1/asnips) -
- [tunahorse/gobuster_looper](https://github.com/tunahorse/gobuster_looper) - Bust URLs directory's from a text file.
- [mdrights/LiveSlak](https://github.com/mdrights/LiveSlak) - 中文化的隐私加强 GNU/Linux 系统 - Forked from Alien Bob's powerful building script for Slackware Live.
- [pocdork/gitdomain](https://github.com/pocdork/gitdomain) - Discover endpoints using companies GitHub Repositories name
- [mcnamee/huntkit](https://github.com/mcnamee/huntkit) - Docker - Ubuntu with a bunch of PenTesting tools and wordlists
- [dreamer1eh/ultimate_bughunter_tools](https://github.com/dreamer1eh/ultimate_bughunter_tools) - Ultimate Package Of 50 Bug Bounty Hunting Tools
- [matrix-ops/kbi](https://github.com/matrix-ops/kbi) - Kubernetes Binarization Installer
- [Thrimbda/shell-set-up](https://github.com/Thrimbda/shell-set-up) - my personal shell set up script-我的超好看的oh-my-zsh配置
- [sansatart/scrapts](https://github.com/sansatart/scrapts) - Scrapts Scrapts Scrapts
- [shakalaca/MagiskOnEmulator](https://github.com/shakalaca/MagiskOnEmulator) - Install Magisk on Official Android Emulator
- [Dheerajmadhukar/Lilly](https://github.com/Dheerajmadhukar/Lilly) - Tool to find the real IP behind CDNs/WAFs like cloudflare using passive recon by retrieving the favicon hash. For the same hash value, all the possible IPs, PORTs and SSL/TLS Certs are searched to val
- [NVISOsecurity/MagiskTrustUserCerts](https://github.com/NVISOsecurity/MagiskTrustUserCerts) - A Magisk/KernelSU module that automatically adds user certificates to the system root CA store
- [phith0n/projector-runner](https://github.com/phith0n/projector-runner) - Run Swing based GUI application within the Docker container through the Jetbrains Projector, and access it from browsers.
- [Dheerajmadhukar/back-me-up](https://github.com/Dheerajmadhukar/back-me-up) - This tool will check for Sensitive Data Leakage with some useful patterns/RegEx. The patterns are mostly targeted on waybackdata and filter everything accordingly.
- [s0md3v/shades](https://github.com/s0md3v/shades) -
- [philips-labs/blackduck-scanner-action](https://github.com/philips-labs/blackduck-scanner-action) - BlackDuck GItHub Action
- [zephrax/linux-pam-backdoor](https://github.com/zephrax/linux-pam-backdoor) - Linux PAM Backdoor
- [Kitsun3Sec/Pentest-Cheat-Sheets](https://github.com/Kitsun3Sec/Pentest-Cheat-Sheets) - A collection of snippets of codes and commands to make your life easier!
- [ArpitKubadia/JS-Secret-Finder](https://github.com/ArpitKubadia/JS-Secret-Finder) -
- [21y4d/nmapAutomator](https://github.com/21y4d/nmapAutomator) - A script that you can run in the background!
- [openservicebrokerapi/servicebroker](https://github.com/openservicebrokerapi/servicebroker) - Open Service Broker API Specification
- [loyess/Shell](https://github.com/loyess/Shell) - Shadowsocks with plugins one-click installation. e.g. v2ray-plugin, kcptun, simple-obfs, goquiet, cloak, mos-tls-tunnel, rabbit-tcp, simple-tls, gost-plugin, xray-plugin, qtun, gun
- [dalbonip/theGreatRecon](https://github.com/dalbonip/theGreatRecon) -
- [iamthefrogy/bucketbunny](https://github.com/iamthefrogy/bucketbunny) - AWS S3 open bucket poc automated script.
- [TheCrysp/Hackbuntu](https://github.com/TheCrysp/Hackbuntu) -
- [nitefood/asn](https://github.com/nitefood/asn) - ASN / RPKI validity / BGP stats / IPv4v6 / Prefix / URL / ASPath / Organization / IP reputation / IP geolocation / IP fingerprinting / Network recon / lookup API server / Web traceroute server
- [jotyGill/ezsh](https://github.com/jotyGill/ezsh) - quickly install zsh, oh-my-zsh with power-level-9k zsh-completions zsh-autosuggestions zsh-syntax-highlighting history-substring-search
- [XTeam-Wing/infrastructure](https://github.com/XTeam-Wing/infrastructure) - 基础设施脚本聚合
- [jorgebucaran/fisher](https://github.com/jorgebucaran/fisher) - A plugin manager for Fish
- [obheda12/MoneyScope](https://github.com/obheda12/MoneyScope) - A Simple Tool to Pull Paid Bounty Scopes for Wide Recon Actvities
- [ffffffff0x/f8x](https://github.com/ffffffff0x/f8x) - 红/蓝队环境自动化部署工具 | Red/Blue team environment automation deployment tool
- [shubhampathak/autosetup](https://github.com/shubhampathak/autosetup) - Auto setup is a bash script compatible with Debian based distributions to install and setup necessary programs.
- [thevillagehacker/Bug-Hunting-Arsenal](https://github.com/thevillagehacker/Bug-Hunting-Arsenal) - The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down here 👇👇
- [1N3/AttackSurfaceManagement](https://github.com/1N3/AttackSurfaceManagement) - Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
- [febinrev/quester](https://github.com/febinrev/quester) - QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.
- [effortlessdevsec/ApkRecon](https://github.com/effortlessdevsec/ApkRecon) - Scanning APK file for URIs, endpoints & secrets.
- [jinwyp/one_click_script](https://github.com/jinwyp/one_click_script) - install latest or LTS linux kernel and enable BBR or BBR plus
- [jiuqi9997/Xray-yes](https://github.com/jiuqi9997/Xray-yes) - Xray安装脚本 / Xray install script (VLESS TCP XTLS)
- [woniuzfb/iptv](https://github.com/woniuzfb/iptv) - HAProxy / Docker / Traefik / Rclone / Calibre Web / Alist / FFmpeg / Nginx / Openresty / V2ray / Xray / Armbian / Proxmox VE / .. All In One Script
- [vsec7/Command-Collections](https://github.com/vsec7/Command-Collections) - Simple command shell collections
- [taherio/redi](https://github.com/taherio/redi) - Automated script for setting up CobaltStrike redirectors (nginx reverse proxy, letsencrypt)
- [vp777/surferFTP](https://github.com/vp777/surferFTP) - SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients
- [kafroc/emergency-response-toolbox](https://github.com/kafroc/emergency-response-toolbox) -
- [pwnpad/pwnpad](https://github.com/pwnpad/pwnpad) - 🐳 VMs are bloat. Dockerise your VAPT environment
- [daffainfo/bash-bounty](https://github.com/daffainfo/bash-bounty) - Random Tools for Bug Bounty
- [jinyuzu99/heroku-miniflux](https://github.com/jinyuzu99/heroku-miniflux) - one click to deploy miniflux on heroku.
- [cujanovic/Open-Redirect-Payloads](https://github.com/cujanovic/Open-Redirect-Payloads) - Open Redirect Payloads
- [2-alchemists/krossboard](https://github.com/2-alchemists/krossboard) - 📊 Krossboard is a Multi-cluster, Cross-Cloud & Cross-Distribution Kubernetes Usage Accounting & Analytics. Actively tested against Amazon EKS, Microsoft AKS, Google GKE, Red Hat OpenShift, & vanilla d
- [gibrown/bash-my-day](https://github.com/gibrown/bash-my-day) - Bash scripts for my day
- [cdpxe/nefias](https://github.com/cdpxe/nefias) - Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection
- [k1LoW/wazuh-agent-debug](https://github.com/k1LoW/wazuh-agent-debug) - Wazuh agent binary for "Agent event queue is flooded" debug
- [souravbaghz/RadareEye](https://github.com/souravbaghz/RadareEye) - Tool for especially scanning nearby devices and execute a given command on its own system while the target device comes in range.
- [burhanxd/SimpleRecon](https://github.com/burhanxd/SimpleRecon) - Simple Recon is just a simple bash script to automate my recon process.
- [jseidl/Multi-TOR](https://github.com/jseidl/Multi-TOR) - Shellscript opens multiple TOR instances
- [ArchStrike/ArchStrike](https://github.com/ArchStrike/ArchStrike) - An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
- [ev1lm0rty/Dump_Programs](https://github.com/ev1lm0rty/Dump_Programs) - Dump bug bounty scopes from bug crowd, hackerone etc.
- [e-m-b-a/emba](https://github.com/e-m-b-a/emba) - EMBA - The firmware security analyzer
- [P3TERX/Aria2-Pro-Core](https://github.com/P3TERX/Aria2-Pro-Core) - Aria2 static binaries for GNU/Linux with some powerful feature patches. | 破解无限线程 防掉线程优化 静态编译 二进制文件 增强版
- [dwisiswant0/continuous-nuclei](https://github.com/dwisiswant0/continuous-nuclei) - Running nuclei Continuously
- [six2dez/reconftw](https://github.com/six2dez/reconftw) - reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
- [vincentcox/bypass-firewalls-by-DNS-history](https://github.com/vincentcox/bypass-firewalls-by-DNS-history) - Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.
- [stealthcopter/deepce](https://github.com/stealthcopter/deepce) - Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
- [MichaIng/DietPi](https://github.com/MichaIng/DietPi) - Lightweight justice for your single-board computer!
- [darklotuskdb/CISCO-CVE-2020-3452-Scanner-Exploiter](https://github.com/darklotuskdb/CISCO-CVE-2020-3452-Scanner-Exploiter) - CISCO CVE-2020-3452 Scanner & Exploiter
- [sumerzhang/PhishingInstall](https://github.com/sumerzhang/PhishingInstall) - 发信平台自动化部署
- [3CORESec/PTRB](https://github.com/3CORESec/PTRB) - PTR Bouncer - Keeping legitimate Internet security scanners off of poor reputation IP lists
- [Dheerajmadhukar/subzzZ](https://github.com/Dheerajmadhukar/subzzZ) - SubzzZ to find possible subdomains using passive recon. Tool also support Permutations, Mutations, Alterations.
- [zeroc00I/AllVideoPocsFromHackerOne](https://github.com/zeroc00I/AllVideoPocsFromHackerOne) - This script grab public report from hacker one and make some folders with poc videos
- [thewqer/recontooler](https://github.com/thewqer/recontooler) -
- [Fadavvi/Sub-Drill](https://github.com/Fadavvi/Sub-Drill) - A very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
- [Subn0x/awesome-bbht](https://github.com/Subn0x/awesome-bbht) - A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
- [meltest/simple_shodan_recon](https://github.com/meltest/simple_shodan_recon) -
- [juewuy/ShellCrash](https://github.com/juewuy/ShellCrash) - Run sing-box/mihomo as client in shell
- [giovanifss/Gitmails-sh](https://github.com/giovanifss/Gitmails-sh) - An information gathering tool to collect git emails in version control host services
- [Nyr/wireguard-install](https://github.com/Nyr/wireguard-install) - WireGuard road warrior installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora
- [cve-search/CVE-Search-Docker](https://github.com/cve-search/CVE-Search-Docker) - Docker Image for CVE-Search
- [eslam3kl/3klCon](https://github.com/eslam3kl/3klCon) - Automation Recon tool which works with Large & Medium scopes. It performs a lot of tasks and gets back all the results in separated files.
- [chromedp/docker-headless-shell](https://github.com/chromedp/docker-headless-shell) - Minimal container for Chrome's headless shell, useful for automating / driving the web
- [InGeek-IoV-Security-Research-RedTeam/IoV-Security-Wiki](https://github.com/InGeek-IoV-Security-Research-RedTeam/IoV-Security-Wiki) - Research sharing on offense and defense of IoV.
- [starnightcyber/Miscellaneous](https://github.com/starnightcyber/Miscellaneous) - 百宝箱
- [maaaaz/thc-hydra-windows](https://github.com/maaaaz/thc-hydra-windows) - The great THC-HYDRA tool compiled for Windows
- [iamj0ker/bypass-403](https://github.com/iamj0ker/bypass-403) - A simple script just made for self use for bypassing 403
- [th3hack3rwiz/Lazy-FuzzZ](https://github.com/th3hack3rwiz/Lazy-FuzzZ) - Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the false positives we obtain in those results. To solve this probl
- [tinyclub/open-c-book](https://github.com/tinyclub/open-c-book) - 开源书籍:《C语言编程透视》,配套视频课程《360° 剖析 Linux ELF》已上线,视频讲解更为系统和深入,欢迎订阅:https://www.cctalk.com/m/group/88089283
- [elreydetoda/packer-kali_linux](https://github.com/elreydetoda/packer-kali_linux) - This is a repository that will be used to help create a process of a new kali vagrant box for hashicorp each week.
- [theinfosecguy/QuickXSS](https://github.com/theinfosecguy/QuickXSS) - Automating XSS using Bash
- [samhaxr/recox](https://github.com/samhaxr/recox) - Master script for web reconnaissance
- [xiaoZ-hc/redtool](https://github.com/xiaoZ-hc/redtool) - 日常积累的一些红队工具及自己写的脚本,更偏向于一些diy的好用的工具,并不是一些比较常用的msf/awvs/xray这种
- [0x25/useful](https://github.com/0x25/useful) - useful pentest note
- [1N3/MassBleed](https://github.com/1N3/MassBleed) - MassBleed SSL Vulnerability Scanner
- [Raywando/4xxbypass](https://github.com/Raywando/4xxbypass) - 4xxbypass
- [six2dez/OneListForAll](https://github.com/six2dez/OneListForAll) - Rockyou for web fuzzing
- [docker-easyconnect/docker-easyconnect](https://github.com/docker-easyconnect/docker-easyconnect) - 使深信服(Sangfor)开发的非自由的 VPN 软件 EasyConnect 和 aTrust 运行在 docker 或 podman 中,并作为网关和/或提供 socks5、http 代理服务
- [venom26/recon](https://github.com/venom26/recon) - information gathering
- [pprietosanchez/CVE-2020-14750](https://github.com/pprietosanchez/CVE-2020-14750) - PoC para las vulnerabilidades CVE-2020-14750 y cve-2020-14882
- [koutto/pi-pwnbox-rogueap](https://github.com/koutto/pi-pwnbox-rogueap) - Homemade Pwnbox :rocket: / Rogue AP :satellite: based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap :bulb:
- [KathanP19/JSFScan.sh](https://github.com/KathanP19/JSFScan.sh) - Automation for javascript recon in bug bounty.
- [Ysurac/openmptcprouter-vps](https://github.com/Ysurac/openmptcprouter-vps) - OpenMPTCProuter VPS scripts
- [vp777/procrustes](https://github.com/vp777/procrustes) - A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering
- [mvberg/ib-gateway-docker](https://github.com/mvberg/ib-gateway-docker) - Interactive Brokers Trading Gateway running in Docker
- [aforensics/HiddenVM](https://github.com/aforensics/HiddenVM) - HiddenVM — Use any desktop OS without leaving a trace.
- [securfreakazoid/autoPhisher](https://github.com/securfreakazoid/autoPhisher) - Script to setup a phishing server on the cloud
- [iamj0ker/Find-domains](https://github.com/iamj0ker/Find-domains) - This repo contain scripts written for finding subdomains using various available tools
- [sickcodes/Docker-eyeOS](https://github.com/sickcodes/Docker-eyeOS) - Run iPhone (xnu-arm64) in a Docker container! Supports KVM + iOS kernel debugging (GDB)! Run xnu-qemu-arm64 in Docker! Works on ANY device.
- [mansoorr123/wp-file-manager-CVE-2020-25213](https://github.com/mansoorr123/wp-file-manager-CVE-2020-25213) - https://medium.com/@mansoorr/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8
- [SixArm/gitconfig-settings](https://github.com/SixArm/gitconfig-settings) - gitconfig setttings, files, aliases, colors, branches, etc.
- [wireghoul/htshells](https://github.com/wireghoul/htshells) - Self contained htaccess shells and attacks
- [QAX-A-Team/WeblogicEnvironment](https://github.com/QAX-A-Team/WeblogicEnvironment) - Weblogic环境搭建工具
- [IoT-PTv/List-of-Tools](https://github.com/IoT-PTv/List-of-Tools) - List of the tools and usage
- [tothi/ad-honeypot-autodeploy](https://github.com/tothi/ad-honeypot-autodeploy) - Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.
- [sup3r-b0y/mobi](https://github.com/sup3r-b0y/mobi) -
- [cheshireca7/smbAutoRelay](https://github.com/cheshireca7/smbAutoRelay) - SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environments.
- [jaykali/maskphish](https://github.com/jaykali/maskphish) - Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
- [R0X4R/Garud](https://github.com/R0X4R/Garud) - An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and scans for some low hanging vulnerabilities automatically.
- [robotshell/magicRecon](https://github.com/robotshell/magicRecon) - MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in
- [osamahamad/CVE-2020-9484-Mass-Scan](https://github.com/osamahamad/CVE-2020-9484-Mass-Scan) - CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE
- [Anon-Exploiter/subdomainsEnumerator](https://github.com/Anon-Exploiter/subdomainsEnumerator) - A docker image which will enumerate, sort, unique and resolve the results of various subdomains enumeration tools.
- [dylanbai8/kmspro](https://github.com/dylanbai8/kmspro) - windows系统一句命令激活,office套件一句命令激活,一键搭建kms服务器,kms一键脚本,安卓Android搭建kms服务器
- [chroblert/SecurityBaselineCheck](https://github.com/chroblert/SecurityBaselineCheck) -
- [ashishb/android-malware](https://github.com/ashishb/android-malware) - Collection of android malware samples
- [fundacaocerti/mobsf-action](https://github.com/fundacaocerti/mobsf-action) - GitHub Actions for MobSF
- [Iamstanlee/bee](https://github.com/Iamstanlee/bee) - Bee Recon Framework
- [tabbysable/POC-2020-8559](https://github.com/tabbysable/POC-2020-8559) - Proof of Concept exploit for Kubernetes CVE-2020-8559
- [Johnler/Wi-Ploit](https://github.com/Johnler/Wi-Ploit) - Wi-Fi Exploit Tool
- [m4xx101/subash](https://github.com/m4xx101/subash) -
- [redcode-labs/Citadel](https://github.com/redcode-labs/Citadel) - Collection of pentesting scripts
- [LuD1161/HackingSimplified](https://github.com/LuD1161/HackingSimplified) - This is where I share code/material shown in my videos
- [chvancooten/BugBountyScanner](https://github.com/chvancooten/BugBountyScanner) - A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.
- [m4xx101/cacert-installer](https://github.com/m4xx101/cacert-installer) -
- [MS-WEB-BN/h4rpy](https://github.com/MS-WEB-BN/h4rpy) - Automated WPA/WPA2 PSK attack tool.
- [urakesh661/port-checker](https://github.com/urakesh661/port-checker) - Script for checking connection to ports using nc.
- [fieu/discord.sh](https://github.com/fieu/discord.sh) - Write-only command-line Discord webhooks integration written in 100% Bash script
- [YashGoti/dac](https://github.com/YashGoti/dac) - Fetch ASN [Number] / CIDR [IP Range] from Domain, Fetch CIDR [IP Range] from ASN [Number] using https://ipinfo.io/ API
- [l4yton/RegHex](https://github.com/l4yton/RegHex) - A collection of regexes for every possbile use
- [dwisiswant0/bounty-targets-alert](https://github.com/dwisiswant0/bounty-targets-alert) - It's an watcher for new scopes added to bounty-targets-data and send you alert to Slack.
- [dwisiswant0/gf-secrets](https://github.com/dwisiswant0/gf-secrets) - Secret and/or credential patterns used for gf.
- [insightglacier/Dictionary-Of-Pentesting](https://github.com/insightglacier/Dictionary-Of-Pentesting) - Dictionary collection project such as Pentesing, Fuzzing, Bruteforce and BugBounty. 渗透测试、SRC漏洞挖掘、爆破、Fuzzing等字典收集项目。
- [dirtyfilthy/siem-from-scratch](https://github.com/dirtyfilthy/siem-from-scratch) - SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab
- [harsh-bothra/Bheem](https://github.com/harsh-bothra/Bheem) -
- [h0rv4th/c2matrix-analyzer](https://github.com/h0rv4th/c2matrix-analyzer) - Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack
- [NullArray/SBD](https://github.com/NullArray/SBD) - Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.
- [TomAPU/poc_and_exp](https://github.com/TomAPU/poc_and_exp) - 搜集的或者自己写的poc或者exp
- [urbanadventurer/Android-PIN-Bruteforce](https://github.com/urbanadventurer/Android-PIN-Bruteforce) - Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for Android devices! (no root, no adb)
- [triat/terraform-security-scan](https://github.com/triat/terraform-security-scan) - Run a security scan on your terraform with the very nice https://github.com/aquasecurity/tfsec
- [z0ph/aws-security-toolbox](https://github.com/z0ph/aws-security-toolbox) - AWS Security Tools (AST) in a simple Docker container. :package:
- [KathanP19/bash_script_templates](https://github.com/KathanP19/bash_script_templates) - Some Templates for Bash Scripting
- [openbridge/ob_hacky_slack](https://github.com/openbridge/ob_hacky_slack) - Hacky Slack - a bash script that sends beautiful messages to Slack
- [wunderwuzzi23/BashSpray](https://github.com/wunderwuzzi23/BashSpray) - Password Spray Testing Tool in Bash
- [PassZhang/ansible-install-k8s](https://github.com/PassZhang/ansible-install-k8s) - 自动化部署kubernetes(支持版本1.18,1.17,1.16)
- [wangao1236/k8s_single_deploy](https://github.com/wangao1236/k8s_single_deploy) - 单节点部署 k8s 集群的相关脚本和文件,Master 和 Node 位于同一机器
- [stoensin/K8s](https://github.com/stoensin/K8s) - k8s集群一键化,Kubernetesv1.13.2集群"真一键"离线安装,图形化菜单向导实测单机版支持腾讯云服务器
- [sandflysecurity/sandfly-setup](https://github.com/sandflysecurity/sandfly-setup) - Sandfly Security Agentless Compromise and Intrusion Detection System For Linux
- [devploit/put2win](https://github.com/devploit/put2win) - Script to automate PUT HTTP method exploitation to get shell
- [MS-WEB-BN/t14m4t](https://github.com/MS-WEB-BN/t14m4t) - Automated brute-forcing attack tool.
- [abdulr7mann/hackerEnv](https://github.com/abdulr7mann/hackerEnv) -
- [ASHWIN990/ADB-Toolkit](https://github.com/ASHWIN990/ADB-Toolkit) - ADB-Toolkit V2 for easy ADB tricks with many perks in all one. ENJOY!
- [fuzhengwei/CodeGuide](https://github.com/fuzhengwei/CodeGuide) - :books: 本代码库是作者小傅哥多年从事一线互联网 Java 开发的学习历程技术汇总,旨在为大家提供一个清晰详细的学习教程,侧重点更倾向编写Java核心内容。如果本仓库能为您提供帮助,请给予支持(关注、点赞、分享)!
- [nagarajcruze/cruze-the-web](https://github.com/nagarajcruze/cruze-the-web) - a simple script to do basic to advanced recon.... in simple words -> a script to automate all the lazy recon flow of the hunter with the tools great people have developed.
- [rotemreiss/subvenom](https://github.com/rotemreiss/subvenom) - Enumerate subdomains using multiple tools for bigger scope enumeration.
- [cisagov/ansible-role-cobalt-strike](https://github.com/cisagov/ansible-role-cobalt-strike) - An Ansible role for installing Cobalt Strike.
- [V2RaySSR/Tools](https://github.com/V2RaySSR/Tools) - 波仔常用的一些工具包
- [Anof-cyber/pentest-recon](https://github.com/Anof-cyber/pentest-recon) - Web application pentesting recon
- [r4d1k4l/jumpbox](https://github.com/r4d1k4l/jumpbox) -
- [g0tmi1k/msfpc](https://github.com/g0tmi1k/msfpc) - MSFvenom Payload Creator (MSFPC)
- [robre/scripthunter](https://github.com/robre/scripthunter) - Tool to find JavaScript files on Websites
- [awslabs/git-secrets](https://github.com/awslabs/git-secrets) - Prevents you from committing secrets and credentials into git repositories
- [pry0cc/multiscan](https://github.com/pry0cc/multiscan) - A set of scripts compatible with axiom-spend and axiom-execb :) For parallel scanning!
- [thomfre/OSCP-Exam-Report-Template](https://github.com/thomfre/OSCP-Exam-Report-Template) - OSCP Exam Report Template in Markdown
- [xElkomy/Workflow-Bug-Bounty](https://github.com/xElkomy/Workflow-Bug-Bounty) - My Tools For Bug Bounty
- [rene-d/mini-kali](https://github.com/rene-d/mini-kali) - Docker image for hacking
- [stevemcilwain/quiver](https://github.com/stevemcilwain/quiver) - Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
- [udit-thakkur/AdvancedKeyHacks](https://github.com/udit-thakkur/AdvancedKeyHacks) - API Key/Token Exploitation Made easy.
- [pikpikcu/XRCross](https://github.com/pikpikcu/XRCross) - XRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. This tool was built to test (XSS|SSRF|CORS|SSTI|IDOR|RCE|LFI|SQLI) vulnerabilities
- [KathanP19/portscan.sh](https://github.com/KathanP19/portscan.sh) - All in one port scanning script.
- [IvanGlinkin/Fast-Google-Dorks-Scan](https://github.com/IvanGlinkin/Fast-Google-Dorks-Scan) - The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information about the specific web-site: common admin panels, the widespread f
- [trimstray/htrace.sh](https://github.com/trimstray/htrace.sh) - My simple Swiss Army knife for http/https troubleshooting and profiling.
- [sickcodes/Docker-OSX](https://github.com/sickcodes/Docker-OSX) - Run macOS VM in a Docker! Run near native OSX-KVM in Docker! X11 Forwarding! CI/CD for OS X Security Research! Docker mac Containers.
- [tianyulab/Threat_Hunting_with_ELK](https://github.com/tianyulab/Threat_Hunting_with_ELK) - 天御攻防实验室 - 威胁猎杀实战系列
- [bing0o/bash_scripting](https://github.com/bing0o/bash_scripting) - bash scripting thing!
- [0xdekster/deksterecon](https://github.com/0xdekster/deksterecon) - Web Application recon automation
- [m9rco/Genymotion_ARM_Translation](https://github.com/m9rco/Genymotion_ARM_Translation) - 👾👾 Genymotion_ARM_Translation Please enjoy!
- [DominicBreuker/stego-toolkit](https://github.com/DominicBreuker/stego-toolkit) - Collection of steganography tools - helps with CTF challenges
- [gpakosz/.tmux](https://github.com/gpakosz/.tmux) - 🇫🇷 Oh my tmux! My self-contained, pretty & versatile tmux configuration made with ❤️
- [nahamsec/recon_profile](https://github.com/nahamsec/recon_profile) -
- [tomdev/teh_s3_bucketeers](https://github.com/tomdev/teh_s3_bucketeers) -
- [foxlet/macOS-Simple-KVM](https://github.com/foxlet/macOS-Simple-KVM) - Tools to set up a quick macOS VM in QEMU, accelerated by KVM.
- [souravbaghz/Reconx](https://github.com/souravbaghz/Reconx) - Automated Recon Framework
- [Shuffle/Shuffle](https://github.com/Shuffle/Shuffle) - Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.
- [pry0cc/axiom](https://github.com/pry0cc/axiom) - The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!
- [HightechSec/git-scanner](https://github.com/HightechSec/git-scanner) - A tool for bug hunting or pentesting for targeting websites that have open .git repositories available in public
- [activecm/BeaKer](https://github.com/activecm/BeaKer) - Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana
- [GainSec/TreeHouse-Wordlists](https://github.com/GainSec/TreeHouse-Wordlists) - Wordlist for Hacking, Penetration Testing, Vulnerability Assessments and More
- [x1mdev/ReconPi](https://github.com/x1mdev/ReconPi) - ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.
- [cihanmehmet/sub.sh](https://github.com/cihanmehmet/sub.sh) - Multiprocessing(Parallel)Subdomain Detect Script
- [bing0o/SubEnum](https://github.com/bing0o/SubEnum) - bash script for Subdomain Enumeration
- [neargle/cloud_native_security_test_case](https://github.com/neargle/cloud_native_security_test_case) - 🌶 一些和容器化/容器编排/服务网格等技术相关的安全代码片段[自用备份]
- [KathanP19/gaussrf](https://github.com/KathanP19/gaussrf) - Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl and Filter Urls With OpenRedirection or SSRF Parameters.
- [ksharinarayanan/SSRFire](https://github.com/ksharinarayanan/SSRFire) - An automated SSRF finder. Just give the domain name and your server and chill! ;) Also has options to find XSS and open redirects
- [putsi/privatecollaborator](https://github.com/putsi/privatecollaborator) - A script for installing private Burp Collaborator with free Let's Encrypt SSL-certificate
- [Mad-robot/Spartan](https://github.com/Mad-robot/Spartan) - My Recon Automation
- [CompassSecurity/Hacking_Tools_Cheat_Sheet](https://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheet) -
- [freeyoung/netfilter-persistent-plugin-ipset](https://github.com/freeyoung/netfilter-persistent-plugin-ipset) - A plugin of netfilter-persistent in debian/ubuntu to make ipset rules persistent, especially on reboot.
- [nullenc0de/vps_setup](https://github.com/nullenc0de/vps_setup) - Auto deployment of my VPS
- [aristocratos/bashtop](https://github.com/aristocratos/bashtop) - Linux/OSX/FreeBSD resource monitor
- [dark-warlord14/ffufplus](https://github.com/dark-warlord14/ffufplus) - You can read the writeup on this script here
- [BountyStrike/Bountystrike-sh](https://github.com/BountyStrike/Bountystrike-sh) - Poor (rich?) man's bug bounty pipeline https://dubell.io
- [hackerspider1/EchoPwn](https://github.com/hackerspider1/EchoPwn) - Recon Automation for hackers by hackers
- [huan/docker-wechat](https://github.com/huan/docker-wechat) - DoChat is a Dockerized WeChat (盒装微信) PC Windows Client for Linux
- [noobsec/hacktivity-notify](https://github.com/noobsec/hacktivity-notify) - Get newest public disclosed HackerOne report notifications on your Desktop
- [TheKingOfDuck/ApkAnalyser](https://github.com/TheKingOfDuck/ApkAnalyser) - 一键提取安卓应用中可能存在的敏感信息。
- [al0ne/MacCheck](https://github.com/al0ne/MacCheck) - 一个Mac下信息搜集小脚本 主要用于信息搜集/应急响应/检测挖矿进程/异常进程/异常启动项
- [linkease/synology-easyexplorer](https://github.com/linkease/synology-easyexplorer) - EasyExplorer 跨设备、点对点文件传输同步工具 http://koolshare.cn/thread-129199-1-1.html
- [screetsec/Sudomy](https://github.com/screetsec/Sudomy) - Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
- [RichardLitt/standard-readme](https://github.com/RichardLitt/standard-readme) - A standard style for README files
- [trick77/ipset-blacklist](https://github.com/trick77/ipset-blacklist) - A bash script to ban large numbers of IP addresses published in blacklists.
- [myspaghetti/macos-virtualbox](https://github.com/myspaghetti/macos-virtualbox) - Push-button installer of macOS Catalina, Mojave, and High Sierra guests in Virtualbox on x86 CPUs for Windows, Linux, and macOS
- [stuxnet999/MemLabs](https://github.com/stuxnet999/MemLabs) - Educational, CTF-styled labs for individuals interested in Memory Forensics
- [thomaspatzke/elk-detection-lab](https://github.com/thomaspatzke/elk-detection-lab) - An ELK environment containing interesting security datasets.
- [r00t-3xp10it/venom](https://github.com/r00t-3xp10it/venom) - venom - C2 shellcode generator/compiler/handler
- [Cyb0r9/SocialBox](https://github.com/Cyb0r9/SocialBox) - SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi
- [sanjusss/aria2-ariang-docker](https://github.com/sanjusss/aria2-ariang-docker) - 打包了Aria2、AriaNg,支持密码验证,无需手动设置aria2 rpc
- [nahamsec/lazyrecon](https://github.com/nahamsec/lazyrecon) - This script is intended to automate your reconnaissance process in an organized fashion
- [nahamsec/bbht](https://github.com/nahamsec/bbht) - A script to set up a quick Ubuntu 17.10 x64 box with tools I use.
- [01rabbit/PAKURI](https://github.com/01rabbit/PAKURI) - PAKURI has been merged with Python and launched as a new project, PAKURI-THON.
- [ashishb/osx-and-ios-security-awesome](https://github.com/ashishb/osx-and-ios-security-awesome) - OSX and iOS related security tools
- [ssaroussi/android-kernel-lab](https://github.com/ssaroussi/android-kernel-lab) - Automated Android Kernel Playground
- [safebuffer/PE-Linux](https://github.com/safebuffer/PE-Linux) - Linux Privilege Escalation Tool By WazeHell
- [spujadas/elk-docker](https://github.com/spujadas/elk-docker) - Elasticsearch, Logstash, Kibana (ELK) Docker image
- [toniblyx/my-arsenal-of-aws-security-tools](https://github.com/toniblyx/my-arsenal-of-aws-security-tools) - List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
- [fransr/bountyplz](https://github.com/fransr/bountyplz) - Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported)
- [ernw/static-toolbox](https://github.com/ernw/static-toolbox) - A collection of statically compiled tools like Nmap and Socat.
- [hq450/fancyss](https://github.com/hq450/fancyss) - fancyss is a project providing tools to across the GFW on asuswrt/merlin based router.
- [rtrouton/create_macos_vm_install_dmg](https://github.com/rtrouton/create_macos_vm_install_dmg) -
- [4ch12dy/xadb](https://github.com/4ch12dy/xadb) - some useful adb commands for android reversing and debugging both 32 and 64 bit and support macOS and win10's MINGW64.
- [bcoles/local-exploits](https://github.com/bcoles/local-exploits) - Various local exploits
- [mdrights/CSObot](https://github.com/mdrights/CSObot) - A IRC/Matrix bot helping Civil Society Organizations in China. #csobot:matrix.org
- [ztj1993/ShellManageSoftware](https://github.com/ztj1993/ShellManageSoftware) - 软件长期未更新,寻找合作者维护本项目
- [EtherDream/anti-portscan](https://github.com/EtherDream/anti-portscan) - 使用 iptables 防止端口扫描
- [goodboy23/shell-script-collection](https://github.com/goodboy23/shell-script-collection) - shell小框架,地址:http://www.linkops.cn/363.htm
- [agnoster/agnoster-zsh-theme](https://github.com/agnoster/agnoster-zsh-theme) - A ZSH theme designed to disclose information contextually, with a powerline aesthetic
- [yw9381/Burp_Suite_Doc_zh_cn](https://github.com/yw9381/Burp_Suite_Doc_zh_cn) - 这是基于Burp Suite官方文档翻译而来的中文版文档
- [0xspade/Automated-Scanner](https://github.com/0xspade/Automated-Scanner) - Trying to make automated recon for bug bounties
- [bkuhlmann/mac_os-config](https://github.com/bkuhlmann/mac_os-config) - Shell scripts for customized macOS machine setup.
- [TH3xACE/SUDO_KILLER](https://github.com/TH3xACE/SUDO_KILLER) - A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges
- [Kicksecure/genmkfile](https://github.com/Kicksecure/genmkfile) - Simplifies Debian Packaging and Maintenance
- [BreakerOfStems/DebianLiveBuilder](https://github.com/BreakerOfStems/DebianLiveBuilder) - Bash script for the automation of building a Debian live iso
- [fsvh/plank-themes](https://github.com/fsvh/plank-themes) -
- [erikdubois/plankthemes](https://github.com/erikdubois/plankthemes) - A repository of all planks I find
- [tliron/install-gnome-themes](https://github.com/tliron/install-gnome-themes) - Script to install the latest versions of some fine GNOME 3 themes
- [keeganjk/kali-anonymous](https://github.com/keeganjk/kali-anonymous) - :bust_in_silhouette: The `anonymous` script from ParrotSec OS and BackBox Linux, perfected to run on Kali Linux Rolling. Run the script with `sudo sh script.sh` and then it will install and configure
- [alicfeng/Linux_env](https://github.com/alicfeng/Linux_env) - This is about Unix/Linux Tool including shell 、python as well as tool,and so on
- [Distroshare/distroshare-ubuntu-imager](https://github.com/Distroshare/distroshare-ubuntu-imager) - Creates an installable live CD from an installed Ubuntu or derivative distribution
- [stockmind/dell-xps-9560-ubuntu-respin](https://github.com/stockmind/dell-xps-9560-ubuntu-respin) - Collection of scripts and tweaks to adapt Ubuntu and Linux Mint ISO images to let them run smooth on Dell XPS 15 9560.
- [myxuchangbin/dnsmasq_sniproxy_install](https://github.com/myxuchangbin/dnsmasq_sniproxy_install) - One-click Install and Configure Dnsmasq and Sniproxy for CentOS/Debian/Ubuntu
- [ramitsurana/awesome-kubernetes](https://github.com/ramitsurana/awesome-kubernetes) - A curated list for awesome kubernetes sources :ship::tada:
- [lanser2077/msfautoinstall](https://github.com/lanser2077/msfautoinstall) - copy metasploit auto install shell script.
- [dwmkerr/hacker-laws](https://github.com/dwmkerr/hacker-laws) - 💻📖 Laws, Theories, Principles and Patterns that developers will find useful. #hackerlaws
- [Leviathan36/trigmap](https://github.com/Leviathan36/trigmap) - A wrapper for Nmap to quickly run network scans
- [KALILINUXTRICKSYT/easysploit](https://github.com/KALILINUXTRICKSYT/easysploit) - EasySploit - Metasploit automation (EASIER and FASTER than EVER)
- [rwv/docker-zerotier-moon](https://github.com/rwv/docker-zerotier-moon) - 🐳 A docker image to create ZeroTier moon in one step.
- [apachecn/ai-roadmap](https://github.com/apachecn/ai-roadmap) - ApacheCN AI 路线图(知识树)
- [hanxi/dotfiles](https://github.com/hanxi/dotfiles) - bash + tmux + neovim
- [daliansky/Hackintosh](https://github.com/daliansky/Hackintosh) - Hackintosh long-term maintenance model EFI and installation tutorial
- [EtherDream/jsproxy](https://github.com/EtherDream/jsproxy) - An online proxy based on ServiceWorker
- [giovtorres/kvm-install-vm](https://github.com/giovtorres/kvm-install-vm) - Bash script to build local virtual machines using KVM/libvirt and cloud-init.
- [trawor/zerotier](https://github.com/trawor/zerotier) - Join zerotier network auto
- [pssss/Security-Baseline](https://github.com/pssss/Security-Baseline) - Linux/Windows 安全加固脚本
- [dylanbai8/frpspro](https://github.com/dylanbai8/frpspro) - Frps 一键安装脚本,Frpc Windows 便捷脚本!Frp 远程桌面!
- [si9ma/Archlinux-Installer](https://github.com/si9ma/Archlinux-Installer) - Arch Linux Installer,Install your Arch Linux more quickly
- [EnigmaCurry/arch-ppa](https://github.com/EnigmaCurry/arch-ppa) - Create and maintain personal Arch linux package repositories
- [Baiyuetribe/meedu](https://github.com/Baiyuetribe/meedu) - 基于Laravel开发的在线点播系统。
- [lordbasex/PXE-Server-Centos-7](https://github.com/lordbasex/PXE-Server-Centos-7) - PXE Server Centos 7
- [jpetazzo/pxe](https://github.com/jpetazzo/pxe) - Dockerfile to build a PXE server in a Docker container
- [random-robbie/kube-scan](https://github.com/random-robbie/kube-scan) - Kubernetes Scanner
- [trimstray/nginx-admins-handbook](https://github.com/trimstray/nginx-admins-handbook) - How to improve NGINX performance, security, and other important things.
- [nanmu42/k8s-by-kubeadm](https://github.com/nanmu42/k8s-by-kubeadm) - :building_construction: 如何使用kubeadm在国内网络环境搭建单主k8s集群
- [Tinywan/dnmp](https://github.com/Tinywan/dnmp) - docker-compose部署LNMP环境 Nginx/Openresty、MySQL(5.7、8.0、8.1)、PHP7.4(8.0、5.6)、Redis5.0、PHPMyAdmin、Xdebug、RabbitMQ、Nacos
- [HyperionGray/tor2proxy](https://github.com/HyperionGray/tor2proxy) -
- [teamatldocker/confluence](https://github.com/teamatldocker/confluence) - Dockerized Atlassian Confluence
- [PabloMansanet/c0toolkit](https://github.com/PabloMansanet/c0toolkit) - Miscellaneous pentesting scripts for OSCP
- [vishnudxb/automated-pentest](https://github.com/vishnudxb/automated-pentest) - Minimal docker container of Parrot OS for running an automated scan & pentest report.
- [paulirish/github-email](https://github.com/paulirish/github-email) - Get a GitHub user's email. :sunglasses: Use this responsibly.
- [maldevel/PenTestKit](https://github.com/maldevel/PenTestKit) - Tools, scripts and tips useful during Penetration Testing engagements.
- [RackunSec/Penetration-Testing-Grimoire](https://github.com/RackunSec/Penetration-Testing-Grimoire) - Custom Tools and Notes from my own Penetration Testing Experience
- [marcan/takeover.sh](https://github.com/marcan/takeover.sh) - Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.
- [shr3ddersec/Shr3dKit](https://github.com/shr3ddersec/Shr3dKit) - Red Team Tool Kit
- [Leviathan36/kaboom](https://github.com/Leviathan36/kaboom) - A tool to automate penetration tests
- [ctf-wiki/ctf-tools](https://github.com/ctf-wiki/ctf-tools) - CTF 工具集合
- [Zo3i/OCS](https://github.com/Zo3i/OCS) - 一键脚本(One-click script)
- [niezhiliang/java-env-install](https://github.com/niezhiliang/java-env-install) - Centos系统 Java环境自动安装脚本 jdk1.8、maven3.5.3、 Tomacat8.0、Docker、Nodejs Npm
- [kirillF/centos-tomcat](https://github.com/kirillF/centos-tomcat) - Docker CentOs 7 + Java 15 + Tomcat 9
- [cvezalis/oracledb-ansible](https://github.com/cvezalis/oracledb-ansible) - Ansible playbook to configure a CentOS/RHEL/Oracle Linux 7.1 server with Oracle 12c R1 Enterprise Edition Database
- [lis912/Evaluation_tools](https://github.com/lis912/Evaluation_tools) - 测评工具
- [al0ne/LinuxCheck](https://github.com/al0ne/LinuxCheck) - Linux应急处置/信息搜集/漏洞检测工具,支持基础配置/网络流量/任务计划/环境变量/用户信息/Services/bash/恶意文件/内核Rootkit/SSH/Webshell/挖矿文件/挖矿进程/供应链/服务器风险等13类70+项检查
- [elespec/rpi-backup](https://github.com/elespec/rpi-backup) - RaspberryPi Backup shell
- [lmc999/auto-add-routes](https://github.com/lmc999/auto-add-routes) - China Route for VPN
- [ILLKX/smokeping-onekey](https://github.com/ILLKX/smokeping-onekey) -
- [YahuiWong/docker-ss-tproxy](https://github.com/YahuiWong/docker-ss-tproxy) - ss-redir 全局透明代理 (REDIRECT + TPROXY)
- [Aniverse/inexistence](https://github.com/Aniverse/inexistence) - I know nothing, you see nothing.
- [hanxi/aria2-bt-tracker](https://github.com/hanxi/aria2-bt-tracker) - auto update aria2 bt-tracker
- [apachecn/awesome-indie-zh](https://github.com/apachecn/awesome-indie-zh) - 独立开发/自由职业/远程工作资源列表
- [jgamblin/MacOS-Security-Baseline](https://github.com/jgamblin/MacOS-Security-Baseline) - Baseline Security Configuration For MacOS
- [Corb3nik/PwnBox](https://github.com/Corb3nik/PwnBox) - A VM for RE and Pwn
- [Mr-xn/Kali-install-docker](https://github.com/Mr-xn/Kali-install-docker) - Docker-ce Install script for Kali
- [SteveMcGrath/docker-nessus_scanner](https://github.com/SteveMcGrath/docker-nessus_scanner) - Nessus Scanner Docker Image
- [ClassicOldSong/shadow](https://github.com/ClassicOldSong/shadow) - Run shadow clones of your system parallely with Docker
- [magicSwordsMan/Linux-baseline-scan](https://github.com/magicSwordsMan/Linux-baseline-scan) - Linux baseline scan,make sure the host security
- [aqzt/kjyw](https://github.com/aqzt/kjyw) - 快捷运维,代号kjyw,项目基于shell、python,运维脚本工具库,收集各类运维常用工具脚本,实现快速安装nginx、mysql、php、redis、nagios、运维经常使用的脚本等等...
- [swizzin/swizzin](https://github.com/swizzin/swizzin) - A simple, modular seedbox solution
- [shell-script/mtprotoproxy-onekey](https://github.com/shell-script/mtprotoproxy-onekey) - MTPROTOPROXY EASY TO USE.
- [ustclug/neatdns](https://github.com/ustclug/neatdns) - anti-pollution DNS server
- [mricon/tor-relay-bootstrap-rpi](https://github.com/mricon/tor-relay-bootstrap-rpi) - Script to bootstrap a Debian server to be a set-and-forget Tor relay
- [corbin-r/dots](https://github.com/corbin-r/dots) - My dotfiles (still a WIP)
- [FunctionClub/MTProxy-Bash](https://github.com/FunctionClub/MTProxy-Bash) - MTProxy 一键搭建管理脚本
- [jactor-sue/Deepin-Apps-Installation](https://github.com/jactor-sue/Deepin-Apps-Installation) - 本仓库介绍如何在基于Ubuntu的系统上安装Deepin移植的软件。This repo shows how to install apps packaged by Deepin.
- [imccie/rpi_backup_script](https://github.com/imccie/rpi_backup_script) - 树莓派备份脚本,备份出来的img可以当做系统镜像分发
- [powerline/fonts](https://github.com/powerline/fonts) - Patched fonts for Powerline users.
- [arch4edu/arch4edu](https://github.com/arch4edu/arch4edu) - Arch Linux Repository for Education
- [xlui/scripts](https://github.com/xlui/scripts) - Scripts do automation works.
- [c0ny1/vulstudy](https://github.com/c0ny1/vulstudy) - 使用docker快速搭建各大漏洞靶场,目前可以一键搭建17个靶场。
- [eoli3n/dotfiles](https://github.com/eoli3n/dotfiles) - Sway acid dark
- [helmuthdu/aui](https://github.com/helmuthdu/aui) - Archlinux Ultimate Install
- [233boy/v2ray](https://github.com/233boy/v2ray) - 最好用的 V2Ray 一键安装脚本 & 管理脚本
- [huyudong1991/setmac](https://github.com/huyudong1991/setmac) - dhcp网络通过随机mac刷新ip
- [trimstray/sandmap](https://github.com/trimstray/sandmap) - Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
- [spaceship-prompt/spaceship-prompt](https://github.com/spaceship-prompt/spaceship-prompt) - :rocket::star: Minimalistic, powerful and extremely customizable Zsh prompt
- [MathiasRenner/optimize-ubuntu](https://github.com/MathiasRenner/optimize-ubuntu) - Optimize Ubuntu for usability, security, privacy and stability
- [uxbug/ant](https://github.com/uxbug/ant) - Linux服务器信息收集脚本
- [firehol/blocklist-ipsets](https://github.com/firehol/blocklist-ipsets) - ipsets dynamically updated with firehol's update-ipsets.sh script
- [Tsuk1ko/Block-IPs-from-countries](https://github.com/Tsuk1ko/Block-IPs-from-countries) - A linux bash script help you block or unblock IPs from countries
- [altiplanogao/raspberry-ss](https://github.com/altiplanogao/raspberry-ss) - Transparent proxy server (use shadowsocks & chinadns) on raspberry pi
- [danielfree/asus-v2ray-transparent-proxy](https://github.com/danielfree/asus-v2ray-transparent-proxy) - transparent proxy with v2ray, iptables, ipset 无线路由器 v2ray 透明代理
- [tianon/gosu](https://github.com/tianon/gosu) - Simple Go-based setuid+setgid+setgroups+exec
- [Karmenzind/dotfiles-and-scripts](https://github.com/Karmenzind/dotfiles-and-scripts) - :pill: dotfiles and scripts for my Linux and Windows
- [lanjelot/twisted-honeypots](https://github.com/lanjelot/twisted-honeypots) - SSH, FTP and Telnet honeypots based on Twisted
- [mdrights/aqi-share](https://github.com/mdrights/aqi-share) - A platform for sharing aqi data from the folks
- [233boy/filebrowser](https://github.com/233boy/filebrowser) - Filebrowser 一键安装脚本
- [nanqinlang-script/CloudFlare_DNS_Record](https://github.com/nanqinlang-script/CloudFlare_DNS_Record) - Script to modify DNS Record via CloudFlare
- [docker-library/official-images](https://github.com/docker-library/official-images) - Primary source of truth for the Docker "Official Images" program
- [GONZOsint/WhatCMS](https://github.com/GONZOsint/WhatCMS) - CMS Detection and Exploit Kit based on Whatcms.org API
- [opsnull/follow-me-install-kubernetes-cluster](https://github.com/opsnull/follow-me-install-kubernetes-cluster) - 和我一步步部署 kubernetes 集群
- [bollwarm/SecToolSet](https://github.com/bollwarm/SecToolSet) - The security tool(project) Set from github。github安全项目工具集合
- [skywind3000/awesome-cheatsheets](https://github.com/skywind3000/awesome-cheatsheets) - 超级速查表 - 编程语言、框架和开发工具的速查表,单个文件包含一切你需要知道的东西 :zap:
- [nanqinlang-script/defender](https://github.com/nanqinlang-script/defender) - simple scripts to provide defence
- [dakkidaze/one-key-kms](https://github.com/dakkidaze/one-key-kms) - 在Linux上一键搭建KMS服务器
- [deviantony/docker-elk](https://github.com/deviantony/docker-elk) - The Elastic stack (ELK) powered by Docker and Compose.
- [antitree/private-tor-network](https://github.com/antitree/private-tor-network) - Run an isolated instance of a tor network in Docker containers
- [joarleymoraes/net_guard](https://github.com/joarleymoraes/net_guard) - A command line tool to detect new unknown device in your network using ARP protocol
- [brimstone/windows-ova](https://github.com/brimstone/windows-ova) - Self-Installing Windows OVA. Automate and distribute Windows as an OVA.
- [linhua55/lkl_study](https://github.com/linhua55/lkl_study) - study the LKL(linux kernel library) https://github.com/lkl/linux
- [linux-china/jenv](https://github.com/linux-china/jenv) - Java enVironment Manager
- [rebootuser/LinEnum](https://github.com/rebootuser/LinEnum) - Scripted Local Linux Enumeration & Privilege Escalation Checks
- [FunctionClub/ZBench](https://github.com/FunctionClub/ZBench) - 又一个Linux VPS测评脚本
- [jialezi/GoogleVoice](https://github.com/jialezi/GoogleVoice) -
- [zfl9/ss-tproxy](https://github.com/zfl9/ss-tproxy) - 搭建 SS/SSR/V2Ray/Trojan/Socks5 透明代理的 Shell 脚本
- [EdOverflow/contact.sh](https://github.com/EdOverflow/contact.sh) - An OSINT tool to find contacts in order to report security vulnerabilities.
- [jagerzhang/CCKiller](https://github.com/jagerzhang/CCKiller) - Linux轻量级CC攻击防御工具脚本
- [wulabing/Xray_onekey](https://github.com/wulabing/Xray_onekey) - Xray 基于 Nginx 的 VLESS + XTLS 一键安装脚本
- [sb2nov/mac-setup](https://github.com/sb2nov/mac-setup) - Installing Development environment on macOS
- [feicong/ida_for_mac_green](https://github.com/feicong/ida_for_mac_green) - IDA Pro for macOS绿化
- [recall704/Husky](https://github.com/recall704/Husky) - k8s 离线部署脚本
- [r1b/CVE-2017-13089](https://github.com/r1b/CVE-2017-13089) - PoC for wget v1.19.1
- [Jiu-Ling/Bash](https://github.com/Jiu-Ling/Bash) - Bash.
- [zardus/ctf-tools](https://github.com/zardus/ctf-tools) - Some setup scripts for security research tools.
- [jessfraz/k8s-snowflake](https://github.com/jessfraz/k8s-snowflake) - Configs and scripts for bootstrapping an opinionated Kubernetes cluster anywhere.
- [jgamblin/AWSScripts](https://github.com/jgamblin/AWSScripts) - Various AWS Automation Scripts
- [tklx/blockstack](https://github.com/tklx/blockstack) - Docker image for Blockstack
- [anti-ddos/Anti-DDOS](https://github.com/anti-ddos/Anti-DDOS) - 🔒 Anti DDOS | Bash Script Project 🔒
- [killswitch-GUI/CobaltStrike-ToolKit](https://github.com/killswitch-GUI/CobaltStrike-ToolKit) - Some useful scripts for CobaltStrike
- [pentestmonkey/unix-privesc-check](https://github.com/pentestmonkey/unix-privesc-check) - Automatically exported from code.google.com/p/unix-privesc-check
- [ANK1036Official/Git_Pentesting_Toolkit](https://github.com/ANK1036Official/Git_Pentesting_Toolkit) - Exploit pack for pentesters and ethical hackers.
- [q3aql/aria2-static-builds](https://github.com/q3aql/aria2-static-builds) - MOVED: https://git.q3aql.dev/q3aql/aria2-static-builds
- [SeedboxCreator/SeedboxCreationScript](https://github.com/SeedboxCreator/SeedboxCreationScript) - Scripts and related items for creating a fully featured Seedbox on various Linux platforms.
- [kfei/docktorrent](https://github.com/kfei/docktorrent) - :zap: Full-featured BitTorrent box runs in Docker
- [dannyti/sboxsetup](https://github.com/dannyti/sboxsetup) -
- [etiennerached/rutorrent-auto-installer-centos](https://github.com/etiennerached/rutorrent-auto-installer-centos) - ruTorrent Auto Installer Script for CentOS and Debian
- [anandslab/AtoMiC-ToolKit](https://github.com/anandslab/AtoMiC-ToolKit) - AtoMiC Toolkit simplifies HTPC / Home Server setup and management on Ubuntu and Debian variants including Raspbian. It currently supports: Couchpotato, Deluged, Emby, FFmpeg, Headphones, Htpcmanager,
- [HenryHo2006/RpiProxy](https://github.com/HenryHo2006/RpiProxy) - Make a Raspberry PI as a proxy route, work with shadowsocks server, provide clean dns/proxy service
- [91yun/uml](https://github.com/91yun/uml) -
- [lowendbox/lowendscript](https://github.com/lowendbox/lowendscript) - Bash scripts to set up/bootstrap low end virtual servers
- [duy13/VDVESTA](https://github.com/duy13/VDVESTA) - Welcome to VDVESTA, a shell script auto Custom & Install VESTACP for your CentOS Server Release 7 x86_64. Thanks you for using!
- [salakis/ssss](https://github.com/salakis/ssss) - Stupid Simple Seedbox Script
- [xjyxh1/rtinstall](https://github.com/xjyxh1/rtinstall) -
- [Wonderfall/dockerfiles](https://github.com/Wonderfall/dockerfiles) - Discontinued. Fork at your will.
- [strues/swerpbox](https://github.com/strues/swerpbox) - SwerpBox, a seedbox and Media Center combined with the power of 🐳 Docker.
- [Kelvin-Chen/seedbox](https://github.com/Kelvin-Chen/seedbox) - Docker containers for running a seedbox/media server
- [jxzy199306/ipv6_dhclient_online_net](https://github.com/jxzy199306/ipv6_dhclient_online_net) - seedbox一键脚本 Deluge+Flexget,rutorrent, rtorrent + ruTorrent,Transmission+Flexget,FTP,VPN,VNC,SSH Proxy,Rapidleec
- [dawidd6/seedbox](https://github.com/dawidd6/seedbox) - rTorrent + ruTorrent + Webserver + XMLRPC-C (un)installation script
- [DeadlockState/Seedbox-installer](https://github.com/DeadlockState/Seedbox-installer) - Preparing and installing a fully seedbox server (Plex Media Server + Sonarr/Radarr or SickRage/CouchPotato + Transmission or rTorrent/ruTorrent + Jackett + Tautulli)
- [xataz/docker-rtorrent-rutorrent](https://github.com/xataz/docker-rtorrent-rutorrent) -
- [exrat/rutorrent-essential](https://github.com/exrat/rutorrent-essential) - Auto install script for rTorrent with ruTorrent
- [binhex/arch-rtorrentvpn](https://github.com/binhex/arch-rtorrentvpn) - Docker build script for Arch Linux base with ruTorrent, rTorrent, autodl-irssi, Privoxy and OpenVPN
- [pyroscope/pimp-my-box](https://github.com/pyroscope/pimp-my-box) - :seedling: Automated seedbox install of rTorrent-PS and PyroScope CLI etc. via Ansible.
- [xombiemp/ultimate-torrent-setup](https://github.com/xombiemp/ultimate-torrent-setup) - All the files needed for the Ultimate Torrent Setup, featuring Ubuntu, rtorrent, ruTorrent, Sonarr, Radarr.
- [exrat/rutorrent-bonobox](https://github.com/exrat/rutorrent-bonobox) - Auto install script for rTorrent with ruTorrent
- [Kerwood/Rtorrent-Auto-Install](https://github.com/Kerwood/Rtorrent-Auto-Install) - Auto install script for rtorrent with Rutorrent as GUI.
- [arakasi72/rtinst](https://github.com/arakasi72/rtinst) - seedbox installation script for Ubuntu and Debian systems
- [zfl9/gfwlist2privoxy](https://github.com/zfl9/gfwlist2privoxy) - 将 gfwlist.txt(Adblock Plus 规则)转换为 privoxy.action
- [drizzt/vps2arch](https://github.com/drizzt/vps2arch) - The fastest way to convert a VPS to Arch Linux! Mirror of https://gitlab.com/drizzt/vps2arch/
- [haugene/docker-transmission-openvpn](https://github.com/haugene/docker-transmission-openvpn) - Docker container running Transmission torrent client with WebUI over an OpenVPN tunnel
- [gaoyifan/china-operator-ip](https://github.com/gaoyifan/china-operator-ip) - 中国运营商IPv4/IPv6地址库-每日更新
- [veerendra2/searx-with-dnscrypt](https://github.com/veerendra2/searx-with-dnscrypt) - Searx metadata search engine meets dnscrypt in Docker
- [oooldking/script](https://github.com/oooldking/script) - Some Linux scripts
- [PapirusDevelopmentTeam/adapta-kde](https://github.com/PapirusDevelopmentTeam/adapta-kde) - Adapta KDE customization
- [centminmod/centminmod](https://github.com/centminmod/centminmod) - CentOS Shell menu based Nginx LEMP web stack auto installer (GPLv3 licensed)
- [StamusNetworks/SELKS](https://github.com/StamusNetworks/SELKS) - A Suricata based IDS/IPS/NSM distro
- [aktos-io/dcs-tools](https://github.com/aktos-io/dcs-tools) - Tools for making remote Linux node management easy
- [nikitavoloboev/config](https://github.com/nikitavoloboev/config) - Apps/CLIs/configs I use on macOS/iOS. Fish, Karabiner, Cursor..
- [Yaoshicn/make-ngrok](https://github.com/Yaoshicn/make-ngrok) - One bash to rule ngrok all. 一键编译 Ngrok 全平台客户端。
- [WangYihang/LinuxShellScript](https://github.com/WangYihang/LinuxShellScript) - LinuxShell编程笔记
- [maravento/blackip](https://github.com/maravento/blackip) - IPv4 Blacklist for Ipset or Squid-Cache
- [conanwhf/RaspberryPi-script](https://github.com/conanwhf/RaspberryPi-script) - RaspberryPi 2-B script
- [ZZROTDesign/alpine-caddy](https://github.com/ZZROTDesign/alpine-caddy) - Alpine Linux Docker Container running Caddyserver
- [sayem314/Caddy-Web-Server-Installer](https://github.com/sayem314/Caddy-Web-Server-Installer) - Script to manage Caddy web server
- [alexellis/docker-arm](https://github.com/alexellis/docker-arm) - Build Docker and Swarm on an ARM SoC like the Raspberry Pi
- [jae-jae/docker-pan](https://github.com/jae-jae/docker-pan) - Docker:Filerun+AriaNg+Aria2,Personal cloud disk 搭建个人的可离线云盘
- [the0demiurge/CharlesScripts](https://github.com/the0demiurge/CharlesScripts) - My awesome scripts for Arch Linux or Ubuntu Gnome latest LTS or MacBook.
- [SecurityFTW/cs-suite](https://github.com/SecurityFTW/cs-suite) - Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.
- [benzBrake/whois.sh](https://github.com/benzBrake/whois.sh) - A light weight whois tools written by shell.
- [StreisandEffect/streisand](https://github.com/StreisandEffect/streisand) - Streisand sets up a new server running your choice of WireGuard, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, or a Tor bridge. It also generates custom instructions for all of these serv
- [ugukkylbklaom/Vultr-SS-Firewall](https://github.com/ugukkylbklaom/Vultr-SS-Firewall) - 一整套网络加速方案(SS),速度,安全,便捷 面面俱到,操作简单,适合非IT专业人士
- [geerlingguy/macos-virtualbox-vm](https://github.com/geerlingguy/macos-virtualbox-vm) - Instructions and script to help you create a VirtualBox VM running macOS.
- [peterpt/eternal_scanner](https://github.com/peterpt/eternal_scanner) - An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)
- [acmesh-official/acme.sh](https://github.com/acmesh-official/acme.sh) - A pure Unix shell script implementing ACME client protocol
- [quericy/one-key-ikev2-vpn](https://github.com/quericy/one-key-ikev2-vpn) - A bash script base on Centos or Ubuntu help you to create IKEV2/L2TP vpn.
- [johnnyxmas/ScanCannon](https://github.com/johnnyxmas/ScanCannon) - External attack surface discovery, enumeration and reconnaissance for massive networks
- [captainswain/EasySeedbox](https://github.com/captainswain/EasySeedbox) - Easy Seedbox is an unobtrusive transmission seedbox installation script for Ubuntu and Debian systems
- [elijahpaul/install-transmission](https://github.com/elijahpaul/install-transmission) - Transmission Install Script (CentOS)
- [stunnel/Ocserv-install-script-for-CentOS-RHEL-7](https://github.com/stunnel/Ocserv-install-script-for-CentOS-RHEL-7) - Ocserv(AnyConnect Server) install script for CentOS/RHEL 7
- [judasn/Linux-Tutorial](https://github.com/judasn/Linux-Tutorial) - 《Java 程序员眼中的 Linux》
- [kuoruan/shell-scripts](https://github.com/kuoruan/shell-scripts) - Linux Shell Scripts
- [arctg70/ssr-finalspeed-server-docker](https://github.com/arctg70/ssr-finalspeed-server-docker) -
- [malaohu/ssr-with-net-speeder](https://github.com/malaohu/ssr-with-net-speeder) - Shadowsocksr with net speeder
- [letssudormrf/ssr-bbr-docker](https://github.com/letssudormrf/ssr-bbr-docker) - Dockerfile for ssr+bbr_powered
- [FunctionClub/Fail2ban](https://github.com/FunctionClub/Fail2ban) - 最简单的防止SSH暴力破解的脚本
- [FunctionClub/YankeeBBR](https://github.com/FunctionClub/YankeeBBR) - 来自Loc大佬Yankee魔改的BBR的Debian一键安装包
- [attactics/PowerShellEmpireDocker](https://github.com/attactics/PowerShellEmpireDocker) - PowerShell Empire docker build
- [hwdsl2/setup-ipsec-vpn](https://github.com/hwdsl2/setup-ipsec-vpn) - Scripts to build your own IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2
- [hwdsl2/docker-ipsec-vpn-server](https://github.com/hwdsl2/docker-ipsec-vpn-server) - Docker image to run an IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2
- [ohmyzsh/ohmyzsh](https://github.com/ohmyzsh/ohmyzsh) - 🙃 A delightful community-driven (with 2,300+ contributors) framework for managing your zsh configuration. Includes 300+ optional plugins (rails, git, macOS, hub, docker, homebrew, node, php, python,
- [angristan/openvpn-install](https://github.com/angristan/openvpn-install) - Set up your own OpenVPN server on Debian, Ubuntu, Fedora, CentOS or Arch Linux.
- [helloxz/Resilio-Sync](https://github.com/helloxz/Resilio-Sync) - Resilio Sync一键安装脚本
- [1N3/ReverseAPK](https://github.com/1N3/ReverseAPK) - Quickly analyze and reverse engineer Android packages
- [PNPtutorials/PNP-PortableHackingMachine](https://github.com/PNPtutorials/PNP-PortableHackingMachine) - This script will convert your Raspberry Pi 3 into a portable hacking machine.
- [abiosoft/caddy-docker](https://github.com/abiosoft/caddy-docker) - Docker container for Caddy
- [52fancy/GooGle-BBR](https://github.com/52fancy/GooGle-BBR) - GooGle开源TCP加速算法
- [JulianOliver/dropkick.sh](https://github.com/JulianOliver/dropkick.sh) - Detect and disconnect hidden WiFi cameras in that AirBnB you're staying in
- [Freaky/borg-backup.sh](https://github.com/Freaky/borg-backup.sh) - A simple shell script for driving BorgBackup
- [rugk/borg-cron-helper](https://github.com/rugk/borg-cron-helper) - Helper shell scripts for BorgBackup to automate backups and make your life easier… 😉
- [Oros42/CustomDebian](https://github.com/Oros42/CustomDebian) - script to build your custom live Debian
- [Nyr/openvpn-install](https://github.com/Nyr/openvpn-install) - OpenVPN road warrior installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora
- [Tomas-M/linux-live](https://github.com/Tomas-M/linux-live) - Linux Live Kit
- [mutse/remastersys](https://github.com/mutse/remastersys) - Remastersys Tool for Backup Your Ubuntu System
- [RackunSec/dciso](https://github.com/RackunSec/dciso) - These are scripts I made to help with the design and customization of a Debian ISO (Primarily WeakerThan Linux)
- [hardenedlinux/STIG-4-Debian](https://github.com/hardenedlinux/STIG-4-Debian) - Security Technical Implementation Guide for Debian
- [riobard/bash-powerline](https://github.com/riobard/bash-powerline) - Powerline-style Bash prompt in pure Bash script. See also https://github.com/riobard/zsh-powerline
- [duguying/parsing-techniques](https://github.com/duguying/parsing-techniques) - 📕 parsing techniques 中文译本——《解析技术》
- [rccoder/Awesome-Shadowsocks-Qt5-Installation-on-Debian](https://github.com/rccoder/Awesome-Shadowsocks-Qt5-Installation-on-Debian) - Installation Script For shadowsocks-Qt5 on Debian
- [cmpitg/infinality-debian-package](https://github.com/cmpitg/infinality-debian-package) - Necessary files and scripts to build Infinality for Debian
- [DenizParlak/Zeus](https://github.com/DenizParlak/Zeus) - AWS Auditing & Hardening Tool
- [YangMame/Arch-Linux-Installer](https://github.com/YangMame/Arch-Linux-Installer) - Arch-Linux-Install-Script/Arch Linux 安装脚本
- [woolabs/Woobuntu](https://github.com/woolabs/Woobuntu) -
- [looly/elasticsearch-definitive-guide-cn](https://github.com/looly/elasticsearch-definitive-guide-cn) - Elasticsearch权威指南中文版
- [nilotpalbiswas/Auto-Root-Exploit](https://github.com/nilotpalbiswas/Auto-Root-Exploit) - Auto Root Exploit Tool
- [nccgroup/LazyDroid](https://github.com/nccgroup/LazyDroid) - bash script to facilitate some aspects of an Android application assessment
- [M4sc3r4n0/astroid](https://github.com/M4sc3r4n0/astroid) - ASTROID v 1.2 bypass most A.V softwares
- [SpiderLabs/jboss-autopwn](https://github.com/SpiderLabs/jboss-autopwn) - A JBoss script for obtaining remote shell access
- [ashishb/android-security-awesome](https://github.com/ashishb/android-security-awesome) - A collection of android security related resources
- [91yun/vpn](https://github.com/91yun/vpn) - vpn一键安装包
- [internetwache/GitTools](https://github.com/internetwache/GitTools) - A repository with 3 tools for pwn'ing websites with .git repositories available
- [teddysun/across](https://github.com/teddysun/across) - Across the Great Wall we can reach every corner in the world
- [cytopia/awesome-ci](https://github.com/cytopia/awesome-ci) - Awesome Continuous Integration - Lot's of tools for git, file and static source code analysis.
- [duoduo369/oh-my-shadowsocks](https://github.com/duoduo369/oh-my-shadowsocks) - shadowsocks config on server, supervisor support
- [superteece/OSINT_Script](https://github.com/superteece/OSINT_Script) -
- [444xxk/dumbpentester](https://github.com/444xxk/dumbpentester) - Fire and forget pentest script automating the finding of all vulns which *can* be found automaticaly
- [The-Z-Labs/linux-exploit-suggester](https://github.com/The-Z-Labs/linux-exploit-suggester) - Linux privilege escalation auditing tool
- [r00t-3xp10it/Meterpreter_Paranoid_Mode-SSL](https://github.com/r00t-3xp10it/Meterpreter_Paranoid_Mode-SSL) - Meterpreter Paranoid Mode - SSL/TLS connections
- [philhagen/sof-elk](https://github.com/philhagen/sof-elk) - Configuration files for the SOF-ELK VM
- [google/oss-fuzz](https://github.com/google/oss-fuzz) - OSS-Fuzz - continuous fuzzing for open source software.
- [rootsongjc/kubernetes-handbook](https://github.com/rootsongjc/kubernetes-handbook) - Kubernetes中文指南/云原生应用架构实战手册
- [MichielDerhaeg/build-linux](https://github.com/MichielDerhaeg/build-linux) - A short tutorial about building Linux based operating systems.
- [1N3/Goohak](https://github.com/1N3/Goohak) - Automatically Launch Google Hacking Queries Against A Target Domain
- [menzow/sn1per-docker](https://github.com/menzow/sn1per-docker) - Dockerized version of Sn1per (https://github.com/1N3/Sn1per)
- [r00t-3xp10it/FakeImageExploiter](https://github.com/r00t-3xp10it/FakeImageExploiter) - Use a Fake image.jpg to exploit targets (hide known file extensions)
- [spwhitton/git-remote-gcrypt](https://github.com/spwhitton/git-remote-gcrypt) - PGP-encrypted git remotes
- [iam4x/zsh-iterm-touchbar](https://github.com/iam4x/zsh-iterm-touchbar) - Display feedback of terminal in the 🍏 Touchbar
- [bitvijays/Pentest-Scripts](https://github.com/bitvijays/Pentest-Scripts) - Github for the scripts utilised during Penetration test
- [zjhou/E2P](https://github.com/zjhou/E2P) - Email 2 Post: 监测并解析博客管理员邮件,自动部署博文,更新博客。(针对hexo博客系统)
- [source-foundry/Hack](https://github.com/source-foundry/Hack) - A typeface designed for source code
- [sameersbn/docker-gitlab](https://github.com/sameersbn/docker-gitlab) - Dockerized GitLab
- [bitquark/dnspop](https://github.com/bitquark/dnspop) - Analysis of DNS records to find popular trends
- [cryptolok/GhostInTheNet](https://github.com/cryptolok/GhostInTheNet) - Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan
- [butteff/Ubuntu-Telemetry-Free-Privacy-Secure](https://github.com/butteff/Ubuntu-Telemetry-Free-Privacy-Secure) - This Bash script just removes a pre-installed Telemetry, a pre-installed software and libs with some potentional or high risk. Script removes them to make your experience better and more secure. Also,
- [DieterReuter/arm-docker-fixes](https://github.com/DieterReuter/arm-docker-fixes) - Scripts and hotfixes to fix some issues with Docker on ARM devices
- [MISP/misp-book](https://github.com/MISP/misp-book) - User guide of MISP
- [thibmaek/awesome-raspberry-pi](https://github.com/thibmaek/awesome-raspberry-pi) - 📝 A curated list of awesome Raspberry Pi tools, projects, images and resources
- [1N3/Sn1per](https://github.com/1N3/Sn1per) - Attack Surface Management Platform
- [WMAL/kodachi](https://github.com/WMAL/kodachi) - Linux Kodachi operating system is based on Xubuntu 18.04 it will provide you with a secure, anti-forensic, and anonymous operating system considering all features that a person who is concerned about
- [sjqlwy/ccrm](https://github.com/sjqlwy/ccrm) - 新手检测树莓派国内源脚本
- [foospidy/payloads](https://github.com/foospidy/payloads) - Git All the Payloads! A collection of web attack payloads.
- [breezecloud/myPiLFS](https://github.com/breezecloud/myPiLFS) - linux from scratch (lfs) on raspberry pi
- [adon90/ip2hosts](https://github.com/adon90/ip2hosts) - Dirty bash script to obtain hosts given an IP address
- [superkojiman/snuff](https://github.com/superkojiman/snuff) - Automate ARP poisoning, ssltrip, and ettercap.
- [eniac/crypscan](https://github.com/eniac/crypscan) - A suite of tools for cryptographic analysis developed with system administrators in mind.
- [drwetter/testssl.sh](https://github.com/drwetter/testssl.sh) - Testing TLS/SSL encryption anywhere on any port
- [b1ack0wl/OnLive](https://github.com/b1ack0wl/OnLive) - Onlive Firmware Dumps
- [wireghoul/graudit](https://github.com/wireghoul/graudit) - grep rough audit - source code auditing tool
- [hrishioa/nomohead](https://github.com/hrishioa/nomohead) - Simple Bash script that announces IP Address and ngrok tunnel of Raspberry Pi at boot
- [Hanson/ngrok-script](https://github.com/Hanson/ngrok-script) - A script to run local ngrok client for linux and windows
- [alicfeng/AShell](https://github.com/alicfeng/AShell) - 开发者常用脚本shell
- [tj/n](https://github.com/tj/n) - Node version management
- [Bash-it/bash-it](https://github.com/Bash-it/bash-it) - A community Bash framework.
- [akalongman/ubuntu-configuration](https://github.com/akalongman/ubuntu-configuration) - Configuration of Debian based OS, such as: Ubuntu, Mint, and Elementary OS
- [JREAM/config-ubuntu](https://github.com/JREAM/config-ubuntu) - Quickly Setup Ubuntu Desktop or Server with all-in-one Bash Scripts.
- [Medicean/VulApps](https://github.com/Medicean/VulApps) - 快速搭建各种漏洞环境(Various vulnerability environment)
- [ppabc/cc_iptables](https://github.com/ppabc/cc_iptables) - 收集处理DDOS、CC攻击各类脚本,包括NGINX日志中的CC攻击IP处理。
- [codingplanets/EasyKit](https://github.com/codingplanets/EasyKit) - Rootkit developed via Shell## Smali
- [ScRiPt1337/Teardroid-phprat](https://github.com/ScRiPt1337/Teardroid-phprat) - :india: :robot: It's easy to use android botnet work without port forwarding, vps and android studio
- [aszx826477/AnnhubBS](https://github.com/aszx826477/AnnhubBS) - 卓护(Annhub)加固平台是一个针对安卓平台应用进行扫描评估和安全加固的平台。
- [XploitWizer-Community/XploitSPY](https://github.com/XploitWizer-Community/XploitSPY) - XploitSPY is an Android Monitoring Tool
- [langgithub/RXjadx](https://github.com/langgithub/RXjadx) - Fart脱壳后指令抽取修复 jadx对抗 对抗jadx Fart脱壳 Android脱壳 dexDump dex主动抽取
- [plum-umd/redexer](https://github.com/plum-umd/redexer) - The Redexer binary instrumentation framework for Dalvik bytecode
- [aress31/sci](https://github.com/aress31/sci) - Framework designed to automate the process of assembly code injection (trojanising) within Android applications.
- [yifengyou/Android-software-security-and-reverse-analysis](https://github.com/yifengyou/Android-software-security-and-reverse-analysis) - Android软件安全与逆向分析
- [xxxyanchenxxx/SigKill](https://github.com/xxxyanchenxxx/SigKill) - 一键绕过App签名验证
- [AhMyth/AhMyth-Android-RAT](https://github.com/AhMyth/AhMyth-Android-RAT) - Android Remote Administration Tool## Smarty
- [leveryd-asm/asm](https://github.com/leveryd-asm/asm) - Scanner platform based on Kubernetes and Argo-Workflow 基于k8s和argo工作流的扫描器
- [chvancooten/follina.py](https://github.com/chvancooten/follina.py) - POC to replicate the full 'Follina' Office RCE vulnerability for testing purposes
- [drago-96/CVE-2022-0778](https://github.com/drago-96/CVE-2022-0778) - Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt
- [sairson/MateuszEx](https://github.com/sairson/MateuszEx) - bypass AV生成工具,目前免杀效果不是很好了,但是过个360,火绒啥的没问题
- [threatexpress/threatbox](https://github.com/threatexpress/threatbox) - ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of scripts, lived as a rolling virtual machine, existed as code to
- [rubyhan1314/Golang-100-Days](https://github.com/rubyhan1314/Golang-100-Days) - Golang - 100天从新手到大师
- [NodyHub/k8s-ctf-rocks](https://github.com/NodyHub/k8s-ctf-rocks) - Kubernetes Easter CTF
- [w-digital-scanner/w13scan](https://github.com/w-digital-scanner/w13scan) - Passive Security Scanner (被动式安全扫描器)## Solidity
- [SunWeb3Sec/DeFiVulnLabs](https://github.com/SunWeb3Sec/DeFiVulnLabs) - To learn common smart contract vulnerabilities using Foundry!
- [AmazingAng/WTF-Solidity](https://github.com/AmazingAng/WTF-Solidity) - WTF Solidity 极简入门教程,供小白们使用。Now supports English! 官网: https://wtf.academy
- [d-xo/weird-erc20](https://github.com/d-xo/weird-erc20) - weird erc20 tokens
- [xf97/JiuZhou](https://github.com/xf97/JiuZhou) - JiuZhou is a data set of Ethereum bug smart contracts (ICSME 2020).
- [Dapp-Learning-DAO/Dapp-Learning](https://github.com/Dapp-Learning-DAO/Dapp-Learning) - Dapp learning project for developers at all stages. Becoming and cultivating sovereign individuals. Nonprofit organization.
- [Tuditi/dPACE](https://github.com/Tuditi/dPACE) - dPACE, a decentralized Privacy-preserving, yet Accountable Car-sharing Environment## SourcePawn
- [fnmsd/awvs_script_decode](https://github.com/fnmsd/awvs_script_decode) - 解密好的AWVS10.5 data/script/目录下的脚本
## Svelte
- [filedescriptor/untrusted-types](https://github.com/filedescriptor/untrusted-types) -
## Swift
- [prateek147/DVIA-v2](https://github.com/prateek147/DVIA-v2) - Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security enthusiasts/professionals or students to test their iOS penetrat
- [CodeEditApp/CodeEdit](https://github.com/CodeEditApp/CodeEdit) - CodeEdit App for macOS – Elevate your code editing experience. Open source, free forever.
- [Finb/Bark](https://github.com/Finb/Bark) - Bark is an iOS App which allows you to push custom notifications to your iPhone
- [DevToys-app/DevToysMac](https://github.com/DevToys-app/DevToysMac) - DevToys For mac
- [Lakr233/mobilePillowTalkLite](https://github.com/Lakr233/mobilePillowTalkLite) - An iOS & SwiftUI server monitor tool for linux based machines using remote proc file system with script execution.
- [DeVaukz/MachO-Explorer](https://github.com/DeVaukz/MachO-Explorer) - A graphical Mach-O viewer for macOS. Powered by Mach-O Kit.
- [cedowens/Swift-Attack](https://github.com/cedowens/Swift-Attack) - Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods.
- [goranmoomin/HackerNews](https://github.com/goranmoomin/HackerNews) - macOS HackerNews client that aims to be a Mac-assed Mac app. Written in Swift + AppKit.
- [zenangst/Gray](https://github.com/zenangst/Gray) - :first_quarter_moon: Tailor your macOS Mojave experience
- [T-Pham/CoinPriceBar](https://github.com/T-Pham/CoinPriceBar) - 💰 Cryptocurrency prices on MacBook Touch Bar
- [ricoberger/Alertmanager](https://github.com/ricoberger/Alertmanager) - Alertmanager for macOS.
- [googleprojectzero/fuzzilli](https://github.com/googleprojectzero/fuzzilli) - A JavaScript Engine Fuzzer
- [neil-wu/SwiftDump](https://github.com/neil-wu/SwiftDump) - SwiftDump is a command-line tool for retriving the Swift Object info from Mach-O file.
- [securing/IOSSecuritySuite](https://github.com/securing/IOSSecuritySuite) - iOS platform security & anti-tampering Swift library
- [frida/frida-swift](https://github.com/frida/frida-swift) - Frida Swift bindings
- [MonitorControl/MonitorControl](https://github.com/MonitorControl/MonitorControl) - 🖥 Control your display's brightness & volume on your Mac as if it was a native Apple Display. Use Apple Keyboard keys or custom shortcuts. Shows the native macOS OSDs.
- [cedowens/SwiftBelt](https://github.com/cedowens/SwiftBelt) - A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens
- [L-Zephyr/Drafter](https://github.com/L-Zephyr/Drafter) - 在iOS项目中自动生成类图和方法调用图 - Generate call graph in iOS project
- [shadowsocks/ShadowsocksX-NG](https://github.com/shadowsocks/ShadowsocksX-NG) - Next Generation of ShadowsocksX
- [paradiseduo/ShadowsocksX-NG-R8](https://github.com/paradiseduo/ShadowsocksX-NG-R8) - ShadowsocksX-NG-R for MacOS, ShadowsocksR
- [utmapp/UTM](https://github.com/utmapp/UTM) - Virtual machines for iOS and macOS
- [netyouli/WHC_ConfuseSoftware](https://github.com/netyouli/WHC_ConfuseSoftware) - iOS代码混淆工具,Uniapp代码混淆工具,react-native代码混淆, iOS代码混淆助手,Android代码混淆助手,Uniapp代码混淆助手,过机器审核,过4.3审核,过other审核,android、ios、uniapp、u3d、cocos2dx、flutter、代码翻新(WHC_ConfuseSoftware)是一款运行在MAC OS平台的App、完美支持Objc和Swift、U
- [Ranchero-Software/NetNewsWire](https://github.com/Ranchero-Software/NetNewsWire) - RSS reader for macOS and iOS.
- [mas-cli/mas](https://github.com/mas-cli/mas) - :package: Mac App Store command line interface
- [EyreFree/EFResume](https://github.com/EyreFree/EFResume) - Emmmmmn, a normal resume templete in Swift.
- [Urinx/iOSAppHook](https://github.com/Urinx/iOSAppHook) - 专注于非越狱环境下iOS应用逆向研究,从dylib注入,应用重签名到App Hook
- [krayc425/ARGitHubCommits](https://github.com/krayc425/ARGitHubCommits) - Show your GitHub commit records in 3D with ARKit and SceneKit. 用 ARKit 展示你的 GitHub 提交图
- [codesourse/iInjection](https://github.com/codesourse/iInjection) -
- [zhuhaow/NEKit](https://github.com/zhuhaow/NEKit) - A toolkit for Network Extension Framework
- [darkerk/v2ex](https://github.com/darkerk/v2ex) - The unofficial V2EX app for iOS## TSQL
- [cisagov/cset](https://github.com/cisagov/cset) - Cybersecurity Evaluation Tool
- [wrlu/SecIoT-Web](https://github.com/wrlu/SecIoT-Web) - IoT漏洞检测平台,支持固件第三方库版本分析。移动安全相关功能移至SecMobile。
- [404notf0und/Security-Data-Analysis-and-Visualization](https://github.com/404notf0und/Security-Data-Analysis-and-Visualization) - 2018-2020青年安全圈-活跃技术博主/博客
- [sjr7/shoppingMall](https://github.com/sjr7/shoppingMall) - 使用主流框架组合SSM开发,并引入新技术,全面丰富的一个商城项目
- [wenguonideshou/zhuye_kim](https://github.com/wenguonideshou/zhuye_kim) - Django框架开发的仿zhuye.kim的简单个人主页/导航程序,带后台## Tcl
- [tdiesler/nessus-cardano](https://github.com/tdiesler/nessus-cardano) - A Cardano playground that explores various build/runtime aspects of the project. Something like an incubation space, before we are propose changes upstream. The initial focus is on "container first" f
- [mohemiv/TCLtools](https://github.com/mohemiv/TCLtools) - Сollection of TCL scripts for Cisco IOS penetration testing## TeX
- [qyxf/qyxf-book](https://github.com/qyxf/qyxf-book) - 钱院学辅 LaTeX 书籍模板
- [soulmachine/machine-learning-cheat-sheet](https://github.com/soulmachine/machine-learning-cheat-sheet) - Classical equations and diagrams in machine learning
- [xcfcode/Summarization-Papers](https://github.com/xcfcode/Summarization-Papers) - Summarization Papers
- [secdr/latex-template](https://github.com/secdr/latex-template) - collections of latex template source
- [Wandmalfarbe/pandoc-latex-template](https://github.com/Wandmalfarbe/pandoc-latex-template) - A pandoc LaTeX template to convert markdown files to PDF or LaTeX.
- [FengMengZhao/LaTeX_generate_Chinese_resume](https://github.com/FengMengZhao/LaTeX_generate_Chinese_resume) - 用LaTeX制作优雅的中文个人简历,适合IT从业者。FontAwesome字体+Adobe字体+有照片和无照片版本,总有一款适合你。
- [shendengnian/latex](https://github.com/shendengnian/latex) - 这是一个latex的个人简历排版与前端各类学习站点仓库
- [huwan/WanHuCV](https://github.com/huwan/WanHuCV) - LaTeX Template for Curriculum Vitæ 个人中英文简历 LaTeX 模板
- [geekplux/cv_resume](https://github.com/geekplux/cv_resume) - A latex cv/resume template.
- [zhanggyb/nndl](https://github.com/zhanggyb/nndl) - Another Chinese Translation of Neural Networks and Deep Learning
- [exacity/deeplearningbook-chinese](https://github.com/exacity/deeplearningbook-chinese) - Deep Learning Book Chinese Translation
- [edelahozuah/awesome-tls-security](https://github.com/edelahozuah/awesome-tls-security) - A collection of (not-so, yet) awesome resources related to TLS, PKI and related stuff
- [xiaoleeza/Ankihelp](https://github.com/xiaoleeza/Ankihelp) - LaTeX 排版的中文 Anki 手册
- [chenshuo/typeset](https://github.com/chenshuo/typeset) -## TypeScript
- [AEPKILL/miniprogram-track](https://github.com/AEPKILL/miniprogram-track) - miniprogram track 是用于小程序安全审计的工具包(反编译、调试、代码审计)
- [vectorisvector/Polaris](https://github.com/vectorisvector/Polaris) -
- [onxss/OneXSS](https://github.com/onxss/OneXSS) - One XSS 是一款基于Cloudflare Pages/D1/KV实现的在线XSS平台,可自定义模块和项目,用于帮助渗透测试工程师进行XSS漏洞验证.
- [zzzgydi/clash-verge](https://github.com/zzzgydi/clash-verge) - A Clash GUI based on tauri. Supports Windows, macOS and Linux.
- [metlo-labs/metlo](https://github.com/metlo-labs/metlo) - Metlo is an open-source API security platform.
- [i18n-pro/core](https://github.com/i18n-pro/core) - A lightweight, simple, flexible, automatic translation tool for JavaScript(适用于 JavaScript 的轻量、简单、灵活、自动翻译的国际化工具)
- [ChatGPTNextWeb/ChatGPT-Next-Web](https://github.com/ChatGPTNextWeb/ChatGPT-Next-Web) - A cross-platform ChatGPT/Gemini UI (Web / PWA / Linux / Win / MacOS). 一键拥有你自己的跨平台 ChatGPT/Gemini 应用。
- [devlive-community/dbm](https://github.com/devlive-community/dbm) - Full platform database management tool, supports ClickHouse, Presto, Trino, MySQL, PostgreSQL, Apache Druid, ElasticSearch...
- [Project-DARC/DARC](https://github.com/Project-DARC/DARC) - Decentralized Autonomous Regulated Company (DARC), a company virtual machine that runs on any EVM-compatible blockchain, with on-chain law system, multi-level tokens and dividends mechanism.
- [lxfater/Portal](https://github.com/lxfater/Portal) -
- [chathub-dev/chathub](https://github.com/chathub-dev/chathub) - All-in-one chatbot client
- [openai-translator/openai-translator](https://github.com/openai-translator/openai-translator) - 基于 ChatGPT API 的划词翻译浏览器插件和跨平台桌面端应用 - Browser extension and cross-platform desktop application for translation based on ChatGPT API.
- [Bin-Huang/chatbox](https://github.com/Bin-Huang/chatbox) - User-friendly Desktop Client App for AI Models/LLMs (GPT, Claude, Gemini, Ollama...)
- [JasonCLong/camille-js](https://github.com/JasonCLong/camille-js) - 基于 Frida 的 App 隐私合规检测辅助工具
- [openai-translator/bob-plugin-openai-translator](https://github.com/openai-translator/bob-plugin-openai-translator) - 基于 OpenAI API 的文本翻译、文本润色、语法纠错 Bob 插件,让我们一起迎接不需要巴别塔的新时代!Licensed under CC BY-NC-SA 4.0
- [rockbenben/ChatGPT-Shortcut](https://github.com/rockbenben/ChatGPT-Shortcut) - 🚀💪Maximize your efficiency and productivity, support for English,中文,Español,العربية. 让生产力加倍的AI快捷指令。更有效地定制、保存和分享自己的提示词。在提示词分享社区中,轻松找到适用于不同场景的指令。
- [easydu2002/chat_gpt_oicq](https://github.com/easydu2002/chat_gpt_oicq) - ChatGPT qq机器人 谁不想拥有一只可爱的猫娘呢~
- [DVKunion/SeaMoon](https://github.com/DVKunion/SeaMoon) - 月海 (Sea Moon) 是一款 FaaS/BaaS 实现的 Serverless 网络工具
- [debanjandhar12/logseq-anki-sync](https://github.com/debanjandhar12/logseq-anki-sync) - An logseq to anki syncing plugin with superpowers - image occlusion, card direction, incremental cards, and a lot more.
- [zu1k/bs-core](https://github.com/zu1k/bs-core) - Easy and blazing-fast book searcher, create and search your private library.
- [PKM-er/obsidian-editing-toolbar](https://github.com/PKM-er/obsidian-editing-toolbar) - An obsidian toolbar plugin, modified from the Cmenu plugin
- [EasyChris/obsidian-to-notion](https://github.com/EasyChris/obsidian-to-notion) - Share obsidian markdown file to notion and generate notion share link 同步obsdian文件到notion,并生成notion分享链接,可以方便的分享obsidian的文件。
- [yume-chan/ya-webadb](https://github.com/yume-chan/ya-webadb) - ADB in your browser
- [yqcs/heartsk_community](https://github.com/yqcs/heartsk_community) - Hearts K-企业资产发现与脆弱性检查工具,自动化资产信息收集与漏洞扫描
- [cars10/elasticvue](https://github.com/cars10/elasticvue) - Elasticsearch gui for the browser
- [lzghzr/TampermonkeyJS](https://github.com/lzghzr/TampermonkeyJS) - 一些自用的TM脚本
- [highlightjs/vue-plugin](https://github.com/highlightjs/vue-plugin) - Highlight.js Vue Plugin
- [turkyden/watermark-pro](https://github.com/turkyden/watermark-pro) - 💦 保护你的敏感信息,一款所见即所得的证件加水印工具
- [lunasec-io/lunasec](https://github.com/lunasec-io/lunasec) - LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requests and Builds. Protect yourself in 30 seconds with the LunaTra
- [frangoteam/FUXA](https://github.com/frangoteam/FUXA) - Web-based Process Visualization (SCADA/HMI/Dashboard) software
- [alibaba/x-render](https://github.com/alibaba/x-render) - 🚴♀️ 阿里 - 很易用的中后台「表单 / 表格 / 图表」解决方案
- [soybeanjs/soybean-admin](https://github.com/soybeanjs/soybean-admin) - A clean, elegant, beautiful and powerful admin template, based on Vue3, Vite5, TypeScript, Pinia, NaiveUI and UnoCSS. 一个清新优雅、高颜值且功能强大的后台管理模板,基于最新的前端技术栈,包括 Vue3, Vite5, TypeScript, Pinia, NaiveUI 和 Uno
- [cool-team-official/cool-admin-midway](https://github.com/cool-team-official/cool-admin-midway) - 🔥 cool-admin(midway版)一个很酷的后台权限管理框架,Ai编码、流程编排、模块化、插件化、CRUD极速开发,永久开源免费,基于midway.js 3.x、typescript、typeorm、mysql、jwt、vue3、vite、element-ui等构建
- [lusess123/web-pdm](https://github.com/lusess123/web-pdm) - An ER graph tool made with G6, the ultimate goal is to make an online PowerDesigner
- [yaklang/yakit](https://github.com/yaklang/yakit) - Cyber Security ALL-IN-ONE Platform
- [FrenchYeti/interruptor](https://github.com/FrenchYeti/interruptor) - Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker
- [deathmemory/fridaRegstNtv](https://github.com/deathmemory/fridaRegstNtv) - 利用 frida 获取 Jni RegisterNatives 动态注册的函数
- [kubeshop/monokle](https://github.com/kubeshop/monokle) - Monokle is a set of OSS tools designed to help create and maintain high-quality Kubernetes configurations throughout the application lifecycle
- [AeonLucid/frida-syscall-interceptor](https://github.com/AeonLucid/frida-syscall-interceptor) -
- [baidu/amis](https://github.com/baidu/amis) - 前端低代码框架,通过 JSON 配置就能生成各种页面。
- [leafac/kill-the-newsletter](https://github.com/leafac/kill-the-newsletter) - Convert email newsletters into Atom feeds
- [github/codeql-action](https://github.com/github/codeql-action) - Actions for running CodeQL analysis
- [projectdiscovery/interactsh-web](https://github.com/projectdiscovery/interactsh-web) - Web dashboard for Interactsh client
- [opensec-cn/crx-scouter](https://github.com/opensec-cn/crx-scouter) - 🔎 crx-scouter.js can detect which Chrome extensions we are using quietly.
- [microsoft/clarity](https://github.com/microsoft/clarity) - A behavioral analytics library that uses dom mutations and user interactions to generate aggregated insights.
- [cybersecsi/dockerized-android](https://github.com/cybersecsi/dockerized-android) - A container-based framework to enable the integration of mobile components in security training platforms
- [SeeFlowerX/frida-protobuf](https://github.com/SeeFlowerX/frida-protobuf) -
- [rubickCenter/rubick](https://github.com/rubickCenter/rubick) - 🔧 Electron based open source toolbox, free integration of rich plug-ins. 基于 electron 的开源工具箱,自由集成丰富插件。
- [honzaap/Systemizer](https://github.com/honzaap/Systemizer) - A system design tool that allows you to simulate data flow of distributed systems.
- [Milkdown/milkdown](https://github.com/Milkdown/milkdown) - 🍼 Plugin driven WYSIWYG markdown editor framework.
- [deepfence/ThreatMapper](https://github.com/deepfence/ThreatMapper) - Open Source Cloud Native Application Protection Platform (CNAPP)
- [sourcefuse/loopback4-ratelimiter](https://github.com/sourcefuse/loopback4-ratelimiter) - A Rate Limiting Extension for Loopback 4 Applications
- [alipay/AOP-Based-Runtime-Security-Analysis-Toolkit](https://github.com/alipay/AOP-Based-Runtime-Security-Analysis-Toolkit) -
- [bloomrpc/bloomrpc](https://github.com/bloomrpc/bloomrpc) - Former GUI client for gRPC services. No longer maintained.
- [rxliuli/joplin-utils](https://github.com/rxliuli/joplin-utils) - Joplin-based community tool
- [vfsfitvnm/frida-il2cpp-bridge](https://github.com/vfsfitvnm/frida-il2cpp-bridge) - A Frida module to dump, trace or hijack any Il2Cpp application at runtime, without needing the global-metadata.dat file.
- [mcuking/mobile-web-best-practice](https://github.com/mcuking/mobile-web-best-practice) - :tiger: 移动 web 最佳实践
- [ChiChou/vscode-frida](https://github.com/ChiChou/vscode-frida) - Unofficial frida extension for VSCode
- [ninoseki/mitaka](https://github.com/ninoseki/mitaka) - A browser extension for OSINT search
- [hua1995116/react-resume-site](https://github.com/hua1995116/react-resume-site) - 木及简历,一款markdown的在线简历工具。 https://www.mujicv.com
- [xjh22222228/nav](https://github.com/xjh22222228/nav) - 🔍 发现导航 , 最强轻量级导航网站
- [MariusVinaschi/Auto-Scan](https://github.com/MariusVinaschi/Auto-Scan) - Automate Auxiliary Module in Metasploit
- [CaoMeiYouRen/push-all-in-one](https://github.com/CaoMeiYouRen/push-all-in-one) - Push All In One!支持 Server 酱、自定义邮件、钉钉机器人、企业微信机器人、企业微信应用、pushplus、iGot 、Qmsg、息知、PushDeer、Discord、OneBot、Telegram 等多种推送方式。
- [n8n-io/n8n](https://github.com/n8n-io/n8n) - Free and source-available fair-code licensed workflow automation tool. Easily automate tasks across different services.
- [labring/sealos](https://github.com/labring/sealos) - Sealos is a production-ready Kubernetes distribution that provides a one-stop solution for both public and private cloud. You can run any Docker image on sealos, start high availability databases like
- [hediet/vscode-debug-visualizer](https://github.com/hediet/vscode-debug-visualizer) - An extension for VS Code that visualizes data during debugging.
- [deathmemory/FridaContainer](https://github.com/deathmemory/FridaContainer) - FridaContainer 整合了网上流行的和自己编写的常用的 frida 脚本,为逆向工作提效之用。 frida 脚本模块化,Java & Jni Trace。
- [pizzafinancebsc/frontend-ui](https://github.com/pizzafinancebsc/frontend-ui) - UI interface for Pizza Finance
- [conwnet/github1s](https://github.com/conwnet/github1s) - One second to read GitHub code with VS Code.
- [puppeteer/puppeteer](https://github.com/puppeteer/puppeteer) - JavaScript API for Chrome and Firefox
- [peter-murray/github-security-report-action](https://github.com/peter-murray/github-security-report-action) -
- [Higurashi-kagome/wereader](https://github.com/Higurashi-kagome/wereader) - 一个浏览器扩展:主要用于微信读书做笔记,对常使用 Markdown 做笔记的读者比较有帮助。
- [juice-shop/juice-shop](https://github.com/juice-shop/juice-shop) - OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
- [LeekHub/leek-fund](https://github.com/LeekHub/leek-fund) - :chart_with_upwards_trend: 韭菜盒子——VSCode 里也可以看股票 & 基金实时数据,做最好用的投资插件 🐥
- [APKLab/APKLab](https://github.com/APKLab/APKLab) - Android Reverse-Engineering Workbench for VS Code
- [TFNS/CTFNote](https://github.com/TFNS/CTFNote) - CTFNote is a collaborative tool aiming to help CTF teams to organise their work.
- [ondras/my-mind](https://github.com/ondras/my-mind) - Online Mindmapping Software
- [awehook/blink-mind](https://github.com/awehook/blink-mind) - Fully customizable mindmap framework for react.js. 支持插件的,可被完全定制的思维导图库,基于react.js和immutable.js。
- [foambubble/foam](https://github.com/foambubble/foam) - A personal knowledge management and sharing system for VSCode
- [luisfontes19/CSRFER](https://github.com/luisfontes19/CSRFER) - Tool to generate csrf payloads based on vulnerable requests
- [siyuan-note/siyuan](https://github.com/siyuan-note/siyuan) - A privacy-first, self-hosted, fully open source personal knowledge management software, written in typescript and golang.
- [javascript-obfuscator/javascript-obfuscator](https://github.com/javascript-obfuscator/javascript-obfuscator) - A powerful obfuscator for JavaScript and Node.js
- [Lakr233/iOSreExtension](https://github.com/Lakr233/iOSreExtension) - A fast and elegant extension for VSCode used for iOSre projects.
- [iorate/ublacklist](https://github.com/iorate/ublacklist) - Blocks specific sites from appearing in Google search results
- [SteveSandersonMS/WebWindow](https://github.com/SteveSandersonMS/WebWindow) - .NET Core library to open native OS windows containing web UI on Windows, Mac, and Linux. Experimental.
- [softrams/bulwark](https://github.com/softrams/bulwark) - An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
- [luisfontes19/xxexploiter](https://github.com/luisfontes19/xxexploiter) - Tool to help exploit XXE vulnerabilities
- [haishanh/yacd](https://github.com/haishanh/yacd) - Yet Another Clash Dashboard
- [x-extends/vxe-table](https://github.com/x-extends/vxe-table) - Vxe table 的表格组件
- [momosecurity/mosec-node-plugin](https://github.com/momosecurity/mosec-node-plugin) - 用于检测 node 项目的第三方依赖组件是否存在安全漏洞。
- [phodal/ledge](https://github.com/phodal/ledge) - Ledge —— DevOps knowledge learning platform. DevOps、研发效能知识和工具平台,是我们基于在 ThoughtWorks 进行的一系列 DevOps 实践、敏捷实践、软件开发与测试、精益实践提炼出来的知识体系。它包含了各种最佳实践、操作手册、原则与模式、度量、工具,用于帮助您的企业在数字化时代更好地前进,还有 DevOps 转型。
- [LasCC/HackTools](https://github.com/LasCC/HackTools) - The all-in-one browser extension for offensive security professionals 🛠
- [edp963/davinci](https://github.com/edp963/davinci) - Davinci is a DVsaaS (Data Visualization as a Service) Platform
- [yang991178/fluent-reader](https://github.com/yang991178/fluent-reader) - Modern desktop RSS reader built with Electron, React, and Fluent UI
- [Lissy93/personal-security-checklist](https://github.com/Lissy93/personal-security-checklist) - 🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
- [ritz078/moose](https://github.com/ritz078/moose) - 🦌 An application to stream, cast and download torrents.
- [kac89/vulnrepo](https://github.com/kac89/vulnrepo) - VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE,CVE,MITRE ATT&CK,PCI DSS, import Nmap/Nessus/Burp/OpenVAS/Bugcrowd/Trivy, Jira export, TXT
- [mitre-attack/attack-navigator](https://github.com/mitre-attack/attack-navigator) - Web app that provides basic navigation and annotation of ATT&CK matrices
- [Azure/container-scan](https://github.com/Azure/container-scan) - A GitHub action to help you scan your docker image for vulnerabilities
- [Place1/wg-access-server](https://github.com/Place1/wg-access-server) - An all-in-one WireGuard VPN solution with a web ui for connecting devices
- [antonycourtney/tad](https://github.com/antonycourtney/tad) - A desktop application for viewing and analyzing tabular data
- [beekeeper-studio/beekeeper-studio](https://github.com/beekeeper-studio/beekeeper-studio) - Modern and easy to use SQL client for MySQL, Postgres, SQLite, SQL Server, and more. Linux, MacOS, and Windows.
- [ChiChou/grapefruit](https://github.com/ChiChou/grapefruit) - (WIP) Runtime Application Instruments for iOS. Previously Passionfruit
- [codebdy/rxdrag](https://github.com/codebdy/rxdrag) - Design anything based on HTML, 可视化编辑, 带逻辑引擎的低代码前端。
- [voidcosmos/npkill](https://github.com/voidcosmos/npkill) - List any node_modules 📦 dir in your system and how heavy they are. You can then select which ones you want to erase to free up space 🧹
- [roshanca/autochangelog](https://github.com/roshanca/autochangelog) - A very lightweight command line tool for generating a changelog from git tags and commit history
- [OWASP/RiskAssessmentFramework](https://github.com/OWASP/RiskAssessmentFramework) - The Secure Coding Framework
- [OpenCTI-Platform/opencti](https://github.com/OpenCTI-Platform/opencti) - Open Cyber Threat Intelligence Platform
- [zenghongtu/PPet](https://github.com/zenghongtu/PPet) - 👻在你的桌面放一个萌妹子,多一点乐趣😏~(支持Mac、Win和Linux)
- [antvis/gatsby-theme-antv](https://github.com/antvis/gatsby-theme-antv) - ⚛️ Polished Gatsby theme for documentation site
- [getgridea/gridea](https://github.com/getgridea/gridea) - ✍️ A static blog writing client (一个静态博客写作客户端)
- [nowsecure/r2frida](https://github.com/nowsecure/r2frida) - Radare2 and Frida better together.
- [shroudedcode/apk-mitm](https://github.com/shroudedcode/apk-mitm) - 🤖 A CLI application that automatically prepares Android APK files for HTTPS inspection
- [hoppscotch/hoppscotch](https://github.com/hoppscotch/hoppscotch) - Open source API development ecosystem - https://hoppscotch.io (open-source alternative to Postman, Insomnia)
- [crawlab-team/artipub](https://github.com/crawlab-team/artipub) - Article publishing platform that automatically distributes your articles to various media channels
- [lit/lit](https://github.com/lit/lit) - Lit is a simple library for building fast, lightweight web components.
- [Eugeny/tabby](https://github.com/Eugeny/tabby) - A terminal for a more modern age
- [MCSManager/MCSManager](https://github.com/MCSManager/MCSManager) - Free, Secure, Distributed, Modern Control Panel for Minecraft and most Steam Game Servers.
- [0123cf/layout-ui](https://github.com/0123cf/layout-ui) - 可视化布局 纯css布局 Layout-UI
- [storybookjs/storybook](https://github.com/storybookjs/storybook) - Storybook is the industry standard workshop for building, documenting, and testing UI components in isolation
- [zenghongtu/Mob](https://github.com/zenghongtu/Mob) - Mob - 一个有颜值的喜马拉雅桌面客户端,支持 Mac、Win 和 Linux
- [fangpenlin/avataaars-generator](https://github.com/fangpenlin/avataaars-generator) - Simple generator React app for avataaars
- [ZuodaoTech/everyone-can-use-english](https://github.com/ZuodaoTech/everyone-can-use-english) - 人人都能用英语
- [3c7/aptmap](https://github.com/3c7/aptmap) - A map displaying threat actors from the misp-galaxy
- [PeterDing/chord](https://github.com/PeterDing/chord) - Chord - A Modern Music Player
- [OI-wiki/OI-wiki](https://github.com/OI-wiki/OI-wiki) - :star2: Wiki of OI / ICPC for everyone. (某大型游戏线上攻略,内含炫酷算术魔法)
- [SukkaW/DisqusJS](https://github.com/SukkaW/DisqusJS) - :speech_balloon: Render Disqus comments in Mainland China using Disqus API
- [magicdawn/yun-playlist-downloader](https://github.com/magicdawn/yun-playlist-downloader) - 网易云音乐 - 歌单/专辑/电台 - 下载器
- [Qsnh/meedu](https://github.com/Qsnh/meedu) - Meedu是一款功能强大的开源在线教育系统,适用于个人、企业或机构搭建自己的在线学习平台。它提供了完整的解决方案,满足网校搭建、在线教学、企业培训和知识付费等多种需求。
- [CopyTranslator/CopyTranslator](https://github.com/CopyTranslator/CopyTranslator) - Foreign language reading and translation assistant based on copy and translate.
- [DIYgod/RSSHub](https://github.com/DIYgod/RSSHub) - 🧡 Everything is RSSible
- [NaoTu/DesktopNaotu](https://github.com/NaoTu/DesktopNaotu) - 桌面版脑图 (百度脑图离线版,思维导图) 跨平台支持 Windows/Linux/Mac OS. (A cross-platform multilingual Mind Map Tool)
- [Molunerfinn/PicGo](https://github.com/Molunerfinn/PicGo) - :rocket:A simple & beautiful tool for pictures uploading built by vue-cli-electron-builder
- [meowtec/Imagine](https://github.com/meowtec/Imagine) - 🖼️ PNG/JPEG optimization app for macOS, Windows and Linux.
- [Srar/node-tap](https://github.com/Srar/node-tap) - 基于TypeScript实现的开源SSTap
- [Jigsaw-Code/outline-apps](https://github.com/Jigsaw-Code/outline-apps) - Outline Client and Manager, developed by Jigsaw. Outline Manager makes it easy to create your own VPN server. Outline Client lets you share access to your VPN with anyone in your network, giving them
- [Jigsaw-Code/outline-server](https://github.com/Jigsaw-Code/outline-server) - Outline Server, developed by Jigsaw. The Outline Server is a proxy server that runs a Shadowsocks instance and provides a REST API for access key management.
- [Srar/MemcacheDos](https://github.com/Srar/MemcacheDos) - Memcache 反射DDOS攻击脚本经供学习参考使用
- [kmvan/x-prober](https://github.com/kmvan/x-prober) - 🐘 A probe program for PHP environment (一款精美的 PHP 探針, 又名X探針、劉海探針)
- [HandsomeOne/Scout](https://github.com/HandsomeOne/Scout) - 可能是东半球最灵活的 URL 监控系统
- [fingerprintjs/fingerprintjs](https://github.com/fingerprintjs/fingerprintjs) - Browser fingerprinting library. BSL licensed.
- [xfoxfu/clover](https://github.com/xfoxfu/clover) - Shadowsocks and v2ray User Interface
- [geekape/geek-navigation](https://github.com/geekape/geek-navigation) - ❤️ 极客猿导航-独立开发者的导航站!
- [oldj/SwitchHosts](https://github.com/oldj/SwitchHosts) - Switch hosts quickly!
- [eyebluecn/tank-front](https://github.com/eyebluecn/tank-front) - 蓝眼系列软件之《蓝眼云盘》前端项目
- [egoist/docup](https://github.com/egoist/docup) - The easiest way to write beautiful docs.
- [solobat/Steward](https://github.com/solobat/Steward) - A command launcher for Chrome
- [CoNETProject/QTGate-Desktop-Client](https://github.com/CoNETProject/QTGate-Desktop-Client) - A revolutionary internet infrastructure enabling a truly free Network, that offers Stability, Trust, Privacy, and Security
- [tympanix/Electorrent](https://github.com/tympanix/Electorrent) - A remote control client for µTorrent, qBittorrent, rTorrent, Transmission, Synology & Deluge
- [onivim/oni](https://github.com/onivim/oni) - Oni: Modern Modal Editing - powered by Neovim
- [star-history/star-history](https://github.com/star-history/star-history) - The missing star history graph of GitHub repos - https://star-history.com
- [UWNetworksLab/uProxy-p2p](https://github.com/UWNetworksLab/uProxy-p2p) - Internet without borders
- [WebThingsIO/gateway](https://github.com/WebThingsIO/gateway) - WebThings Gateway
- [yangshun/tech-interview-handbook](https://github.com/yangshun/tech-interview-handbook) - 💯 Curated coding interview preparation materials for busy software engineers
- [learn-anything/learn-anything.xyz](https://github.com/learn-anything/learn-anything.xyz) - Organize world's knowledge, explore connections and curate learning paths
- [trufflesuite/truffle](https://github.com/trufflesuite/truffle) - :warning: The Truffle Suite is being sunset. For information on ongoing support, migration options and FAQs, visit the Consensys blog. Thank you for all the support over the years.
- [pd4d10/octohint](https://github.com/pd4d10/octohint) - The missing IntelliSense hint for GitHub and GitLab
- [google/tamperchrome](https://github.com/google/tamperchrome) - Tamper Dev is an extension that allows you to intercept and edit HTTP/HTTPS requests and responses as they happen without the need of a proxy. Works across all operating systems (including Chrome OS).
- [portainer/portainer](https://github.com/portainer/portainer) - Making Docker and Kubernetes management easy.
- [kamranahmedse/developer-roadmap](https://github.com/kamranahmedse/developer-roadmap) - Interactive roadmaps, guides and other educational content to help developers grow in their careers.## VBA
- [S3cur3Th1sSh1t/Excel-Phish](https://github.com/S3cur3Th1sSh1t/Excel-Phish) - Phish password protected Excel-Files
- [S3cur3Th1sSh1t/OffensiveVBA](https://github.com/S3cur3Th1sSh1t/OffensiveVBA) - This repo covers some code execution and AV Evasion methods for Macros in Office documents
- [itm4n/VBA-RunPE](https://github.com/itm4n/VBA-RunPE) - A VBA implementation of the RunPE technique or how to bypass application whitelisting.
- [mdsecactivebreach/SharpShooter](https://github.com/mdsecactivebreach/SharpShooter) - Payload Generation Framework
- [JohnWoodman/VBA-Macro-Projects](https://github.com/JohnWoodman/VBA-Macro-Projects) - This repository is a collection of my malicious VBA projects.
- [rmdavy/HeapsOfFun](https://github.com/rmdavy/HeapsOfFun) - AMSI Bypass Via the Heap
- [christophetd/spoofing-office-macro](https://github.com/christophetd/spoofing-office-macro) - :fish: PoC of a VBA macro spawning a process with a spoofed parent and command line.## VBScript
- [susam/aes.vbs](https://github.com/susam/aes.vbs) - AES-256-CBC Encrypt and Decrypt Functions in VBScript
- [z1un/Z1-AggressorScripts](https://github.com/z1un/Z1-AggressorScripts) - 适用于Cobalt Strike的插件
- [rootclay/WMIHACKER](https://github.com/rootclay/WMIHACKER) - A Bypass Anti-virus Software Lateral Movement Command Execution Tool
- [sailay1996/awesome_windows_logical_bugs](https://github.com/sailay1996/awesome_windows_logical_bugs) - collect for learning cases
- [pyenv-win/pyenv-win](https://github.com/pyenv-win/pyenv-win) - pyenv for Windows. pyenv is a simple python version management tool. It lets you easily switch between multiple versions of Python. It's simple, unobtrusive, and follows the UNIX tradition of single-p
- [xcanwin/XBurpCrack](https://github.com/xcanwin/XBurpCrack) - 绕过burp破解版的截止日期限制. This is a tool to bypass the cracked version of the burpsuite_pro(Larry_Lau) certification deadline through time reversal.## VCL
- [detectify/Varnish-H2-Request-Smuggling](https://github.com/detectify/Varnish-H2-Request-Smuggling) -
## Vim Script
- [vim-scripts/OIL.vim](https://github.com/vim-scripts/OIL.vim) - A syntax file for the OSEK Implementation Language (OIL).
- [skywind3000/vim-terminal-help](https://github.com/skywind3000/vim-terminal-help) - Small changes make vim/nvim's internal terminal great again !!
- [sainnhe/everforest](https://github.com/sainnhe/everforest) - 🌲 Comfortable & Pleasant Color Scheme for Vim
- [bilibili/vim-vide](https://github.com/bilibili/vim-vide) - Lightest vimrc, while strong enough. 最轻的vim配置,却足够强!
- [imxiejie/ThinkVim](https://github.com/imxiejie/ThinkVim) - Vim configuration in the 21st century
- [jaywcjlove/vim-web](https://github.com/jaywcjlove/vim-web) - ◈ 搞得像IDE一样的Vim,安装配置自己的Vim。
- [vhdsih/manjaro-linux-config](https://github.com/vhdsih/manjaro-linux-config) - configuration for manjaro linux
- [tracyone/neomake-multiprocess](https://github.com/tracyone/neomake-multiprocess) - A vim plugin for running multiple process asynchronously base on neomake.
- [ashfinal/vimrc-config](https://github.com/ashfinal/vimrc-config) - re-vim: sensible vim configuration
- [wsdjeg/vim-galore-zh_cn](https://github.com/wsdjeg/vim-galore-zh_cn) - Vim 从入门到精通
- [altercation/vim-colors-solarized](https://github.com/altercation/vim-colors-solarized) - precision colorscheme for the vim text editor
- [int32bit/dotfiles](https://github.com/int32bit/dotfiles) - A set of vim, zsh, git, and tmux configuration files.
- [wklken/k-vim](https://github.com/wklken/k-vim) - vim配置
- [superkojiman/pwnbox](https://github.com/superkojiman/pwnbox) - Docker container with tools for binary reverse engineering and exploitation.## Visual Basic
- [qwerty472123/pakUnpacker](https://github.com/qwerty472123/pakUnpacker) - Chrome pak(Chromium Grit 生成文件)解包打包工具,用以修改 Chromium 发行版翻译及资源内容。
- [bitsadmin/revbshell](https://github.com/bitsadmin/revbshell) - ReVBShell - Reverse VBS Shell
- [malwares/PlasmaRAT](https://github.com/malwares/PlasmaRAT) - Remote Access Trojan(RAT), Miner, DDoS
- [Cn33liz/StarFighters](https://github.com/Cn33liz/StarFighters) - A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.
- [Cn33liz/VBSMeter](https://github.com/Cn33liz/VBSMeter) - VBS Reversed TCP Meterpreter Stager
- [meliton/ISPiggy](https://github.com/meliton/ISPiggy) - Decentralized DNS fuzzer to mitigate ISP Snooping## Visual Basic .NET
- [jaylagorio/Craal](https://github.com/jaylagorio/Craal) - Finding Valuable Needles in Global Source Code Haystacks with Automation
- [MoscaDotTo/Winapp2](https://github.com/MoscaDotTo/Winapp2) - A database of extended cleaning routines for popular Windows PC based maintenance software.## Vue
- [LOG1997/log-lottery](https://github.com/LOG1997/log-lottery) - 🎈🎈🎈🎈年会抽奖程序,threejs+vue3 3D球体动态抽奖应用。
- [expzhizhuo/iotscan-web](https://github.com/expzhizhuo/iotscan-web) - 这是一个基于vue3+element-plus+vite4+pinia开发一个资产测绘平台+漏洞扫描的前端项目,提供多种自定义的开发,如果你的扫描器或资产测绘平台不追求UI仅仅是为了快速开发,可以参考此项目。
- [UniiemStudio/CTFever](https://github.com/UniiemStudio/CTFever) - Fantastic toolkit for CTFers and everyone.
- [JDArmy/DSRE](https://github.com/JDArmy/DSRE) - 数据安全风险枚举框架(Data Security Risk Enumeration)
- [baiy/Ctool](https://github.com/baiy/Ctool) - 程序开发常用工具 chrome / edge / firefox / utools / windows / linux / mac
- [202252197/ChatGPT_JCM](https://github.com/202252197/ChatGPT_JCM) - OpenAI管理界面,聚合了OpenAI的所有接口进行界面操作(所有模型、图片、音频、微调、文件)等,支持Markdown格式(公式、图表,表格)等,后期会一点一点的将OpenAI接口进行接入大家支持一下,右上角点个Star。
- [Chanzhaoyu/chatgpt-web](https://github.com/Chanzhaoyu/chatgpt-web) - 用 Express 和 Vue3 搭建的 ChatGPT 演示网页
- [chatpire/chatgpt-web-share](https://github.com/chatpire/chatgpt-web-share) - ChatGPT Plus 共享方案。ChatGPT Plus / OpenAI API sharing solution.
- [Zerx0r/Kage](https://github.com/Zerx0r/Kage) - Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler
- [JDArmy/BREAK](https://github.com/JDArmy/BREAK) - 业务风险枚举与规避知识框架(Business Risk Enumeration & Avoidance Kownledge)
- [AbelChe/cola_dnslog](https://github.com/AbelChe/cola_dnslog) - Cola Dnslog v1.3.2 更加强大的dnslog平台/无回显漏洞探测辅助平台 完全开源 dnslog httplog ldaplog rmilog 支持dns http ldap rmi等协议 提供API调用方式便于与其他工具结合 支持钉钉机器人、Bark等提醒 支持docker一键部署 后端完全使用python实现 前端基于vue-element-admin二开
- [vbenjs/vue-vben-admin](https://github.com/vbenjs/vue-vben-admin) - A modern vue admin panel built with Vue3, Shadcn UI, Vite, TypeScript, and Monorepo. It's fast!
- [SelfhostedPro/Yacht](https://github.com/SelfhostedPro/Yacht) - A web interface for managing docker containers with an emphasis on templating to provide 1 click deployments. Think of it like a decentralized app store for servers that anyone can make packages for.
- [fuzui/RuoYi-Antdv](https://github.com/fuzui/RuoYi-Antdv) - RuoYi-Vue版本+Ant Design Vue,将持续适配RuoYi-Vue
- [sscfaith/avue-form-design](https://github.com/sscfaith/avue-form-design) - 本项目是一款基于 Avue 的表单设计器,拖拽式操作让你快速构建一个表单。
- [Hunlongyu/ReadMe](https://github.com/Hunlongyu/ReadMe) - Github star manager
- [ysk2014/webshell](https://github.com/ysk2014/webshell) - 基于node-pty、xterm和vue的web terminal服务
- [qier222/YesPlayMusic](https://github.com/qier222/YesPlayMusic) - 高颜值的第三方网易云播放器,支持 Windows / macOS / Linux :electron:
- [L-noodle/vue-big-screen](https://github.com/L-noodle/vue-big-screen) - 一个基于 vue、datav、Echart 框架的大数据可视化(大屏展示)模板,实现大数据可视化。通过 vue 组件实现数据动态刷新渲染,内部图表可自由替换。部分图表使用 DataV 自带组件,可自由进行更改(ps:最新的更新请前往码云查看,下面有链接)。
- [Secur1ty0/P2note](https://github.com/Secur1ty0/P2note) - Penetration testing payload note
- [tsg-ut/ctfd-theme-tsgctf](https://github.com/tsg-ut/ctfd-theme-tsgctf) - Custom CTFd theme made for TSG CTF
- [huangwei9527/Ink-wash-docs](https://github.com/huangwei9527/Ink-wash-docs) - 水墨文档,一款基于egg+vue开发的在线文档管理平台,支持markdown文档, excel文档,原型托管等功能. http://139.199.172.193:7001/
- [JakHuang/form-generator](https://github.com/JakHuang/form-generator) - :sparkles:Element UI表单设计及代码生成器
- [hinesboy/mavonEditor](https://github.com/hinesboy/mavonEditor) - mavonEditor - A markdown editor based on Vue that supports a variety of personalized features
- [KeziahMoselle/export-github-stars](https://github.com/KeziahMoselle/export-github-stars) - View / Sort / Export your Starred repositories.
- [china-bin/vdesjs-drag](https://github.com/china-bin/vdesjs-drag) - 基于vue的可视化拖拽,代码生成工具。
- [parrot409/Parmy](https://github.com/parrot409/Parmy) - A extension for collecting parameters
- [0xdekster/ReconNote](https://github.com/0xdekster/ReconNote) - Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
- [momosecurity/bombus](https://github.com/momosecurity/bombus) - 合规审计平台
- [DeimosC2/DeimosC2](https://github.com/DeimosC2/DeimosC2) - DeimosC2 is a Golang command and control framework for post-exploitation.
- [a54552239/pearProject](https://github.com/a54552239/pearProject) - pear,梨子,轻量级的在线项目/任务协作系统,远程办公协作
- [yeswehack/pwn-machine](https://github.com/yeswehack/pwn-machine) - PwnMachine is a self hosting solution based on docker aiming to provide an easy to use pwning station for bug hunters.
- [zglz/vue-component-inspector](https://github.com/zglz/vue-component-inspector) - This is vue development tool which works only with Vue 2.0.
- [faloker/purify](https://github.com/faloker/purify) - All-in-one tool for managing vulnerability reports from AppSec pipelines
- [Hunlongyu/ZY-Player](https://github.com/Hunlongyu/ZY-Player) - ▶️ 跨平台桌面端视频资源播放器.简洁无广告.免费高颜值. 🎞
- [tldrrun/tools.tldr.run](https://github.com/tldrrun/tools.tldr.run) - A curated list of security tools for Hackers & Builders!
- [BC-SECURITY/Starkiller](https://github.com/BC-SECURITY/Starkiller) - Starkiller is a Frontend for PowerShell Empire.
- [cckuailong/InformationGather](https://github.com/cckuailong/InformationGather) - SRC Assets Information Gather Website(SRC资产信息聚合网站)
- [fofapro/vulfocus](https://github.com/fofapro/vulfocus) - 🚀Vulfocus 是一个漏洞集成平台,将漏洞环境 docker 镜像,放入即可使用,开箱即用。
- [NBHH711/guimetasploit](https://github.com/NBHH711/guimetasploit) - Best Graphical Hacking Platform Online
- [DataV-Team/DataV](https://github.com/DataV-Team/DataV) - Vue数据可视化组件库(类似阿里DataV,大屏数据展示),提供SVG的边框及装饰、图表、水位图、飞线图等组件,简单易用,长期更新(React版已发布)
- [chaitin/passionfruit](https://github.com/chaitin/passionfruit) - [WIP] Crappy iOS app analyzer
- [xusenlin/vue-element-ui-admin](https://github.com/xusenlin/vue-element-ui-admin) - :maple_leaf: 一个基于Vue 3(ScriptSetup) + TS + Vite + ElementPlus + Pinia + VueRouter + Axios的后台模板,做了目录结构的整理和常用方法的封装,开箱即用 :)
- [yucccc/vue-mall](https://github.com/yucccc/vue-mall) - 🔨 基于 vue+node+mongodb 实现一个锤子商城
- [chaitin/xray](https://github.com/chaitin/xray) - 一款完善的安全评估工具,支持常见 web 安全问题扫描和自定义 poc | 使用之前务必先阅读文档
- [tenweek/LiveEducation](https://github.com/tenweek/LiveEducation) - 南开大学&计蒜客2017夏季实训光宗耀组小组项目——教育直播平台
- [inoutcode/ethereum_book](https://github.com/inoutcode/ethereum_book) - 精通以太坊 (中文版)
- [fengzifz/GantTask](https://github.com/fengzifz/GantTask) - 甘特图任务管理器 - 适合新手学习的 Vue 完整案例
- [bestony/logoly](https://github.com/bestony/logoly) - A Pornhub Flavour Logo Generator
- [lsgwr/spring-boot-online-exam](https://github.com/lsgwr/spring-boot-online-exam) - 基于Spring Boot的在线考试系统(预览地址 http://129.211.88.191 ,账户分别是admin、teacher、student,密码是admin123),也有Python实现
- [lxrmido/WordCards](https://github.com/lxrmido/WordCards) -
- [loveRandy/vue-cli3.0-vueadmin](https://github.com/loveRandy/vue-cli3.0-vueadmin) - 基于vue-cli3.0+vue+elementUI+vuex+axios+权限管理的后台管理系统
- [uriver/DNS-Analysis](https://github.com/uriver/DNS-Analysis) - 非法域名挖掘与画像系统。
- [GitHub-Laziji/VBlog](https://github.com/GitHub-Laziji/VBlog) - 使用GitHub API 搭建一个可动态发布文章的博客
- [xinali/penework](https://github.com/xinali/penework) - Penetration Test Framwork
- [0xbug/Hawkeye](https://github.com/0xbug/Hawkeye) - GitHub 泄露监控系统(GitHub Sensitive Information Leakage Monitor Spider)
- [jinzhe/zee.kim_v4](https://github.com/jinzhe/zee.kim_v4) - 个人网站之 <幸福彼岸 />(此版本已废弃)
- [luyilin/Aoba](https://github.com/luyilin/Aoba) - Create a lovely resume just with a config file.
- [nluedtke/linux_kernel_cves](https://github.com/nluedtke/linux_kernel_cves) - Tracking CVEs for the linux Kernel
- [dj940212/last-blog](https://github.com/dj940212/last-blog) - 仿GitHub风格个人博客, vue+vuex+koa+mongodb
- [AT-UI/at-ui](https://github.com/AT-UI/at-ui) - A fresh and flat UI-Kit specially for desktop application, made with ♥ by Vue.js 2.0 (DEPRECATED)
- [iview/iview](https://github.com/iview/iview) - A high quality UI Toolkit built on Vue.js 2.0
- [hieeyh/tong2-family](https://github.com/hieeyh/tong2-family) - 基于vue、vuex、vue-router、echarts的数据可视化展示平台## XSLT
- [flowerwind/AutoGenerateXalanPayload](https://github.com/flowerwind/AutoGenerateXalanPayload) - cve-2022-34169 延伸出的Jdk Xalan的payload自动生成工具,可根据不同的Jdk生成出其所对应的xslt文件
- [LOLBAS-Project/LOLBAS](https://github.com/LOLBAS-Project/LOLBAS) - Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
- [ernw/nmap-parse-output](https://github.com/ernw/nmap-parse-output) - Converts/manipulates/extracts data from a Nmap scan output.
- [SofianeHamlaoui/Pentest-Notes](https://github.com/SofianeHamlaoui/Pentest-Notes) - Collection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
- [TideSec/BypassAntiVirus](https://github.com/TideSec/BypassAntiVirus) - 远控免杀系列文章及配套工具,汇总测试了互联网上的几十种免杀工具、113种白名单免杀方式、8种代码编译免杀、若干免杀实战技术,并对免杀效果进行了一一测试,为远控的免杀和杀软对抗免杀提供参考。
- [adon90/pentest_compilation](https://github.com/adon90/pentest_compilation) - Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios## YAML
- [ansible-lockdown/RHEL7-STIG-Audit](https://github.com/ansible-lockdown/RHEL7-STIG-Audit) - Audit configurations for RHEL7 STIG
## YARA
- [RoomaSec/RmTools](https://github.com/RoomaSec/RmTools) - 蓝队应急工具
- [nsacyber/Mitigating-Web-Shells](https://github.com/nsacyber/Mitigating-Web-Shells) - Guidance for mitigation web shells. #nsacyber
- [CYB3RMX/Qu1cksc0pe](https://github.com/CYB3RMX/Qu1cksc0pe) - All-in-One malware analysis tool.
- [wgpsec/whohk](https://github.com/wgpsec/whohk) - whohk,linux下一款强大的应急响应工具 在linux下的应急响应往往需要通过繁琐的命令行来查看各个点的情况,有的时候还需要做一些格式处理,这对于linux下命令不是很熟悉的人比较不友好。本工具将linux下应急响应中常用的一些操作给集合了起来,并处理成了较为友好的格式,只需要通过一个参数就能代替繁琐复杂的命令来实现对各个点的检查。
- [mandiant/red_team_tool_countermeasures](https://github.com/mandiant/red_team_tool_countermeasures) -
- [sbousseaden/YaraHunts](https://github.com/sbousseaden/YaraHunts) - Random hunting ordiented yara rules
- [ghidraninja/ghidra_scripts](https://github.com/ghidraninja/ghidra_scripts) - Scripts for the Ghidra software reverse engineering suite.
- [t4d/PhishingKit-Yara-Rules](https://github.com/t4d/PhishingKit-Yara-Rules) - Repository of Yara rules dedicated to Phishing Kits Zip files
- [CyberMonitor/APT_CyberCriminal_Campagin_Collections](https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections) - APT & CyberCriminal Campaign Collection
- [Yara-Rules/rules](https://github.com/Yara-Rules/rules) - Repository of yara rules
- [rednaga/APKiD](https://github.com/rednaga/APKiD) - Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
- [Neo23x0/signature-base](https://github.com/Neo23x0/signature-base) - YARA signature and IOC database for my scanners and tools## Zeek
- [kinomakino/Threat-Intelligence-Data](https://github.com/kinomakino/Threat-Intelligence-Data) - Snort_rules detection bad actors.
## Zig
- [darkr4y/OffensiveZig](https://github.com/darkr4y/OffensiveZig) - Some attempts at using Zig(https://ziglang.org/) in penetration testing.
## nesC
- [LeeHDsniper/TinyOS_IDS](https://github.com/LeeHDsniper/TinyOS_IDS) - A IDS system for WSN based on CTP and TinyOS
## templ
- [kkzzhizhou/scoop-apps](https://github.com/kkzzhizhou/scoop-apps) - 使用Github Action每天自动合并其他scoop仓库的更新,仓库地址:https://github.com/kkzzhizhou/scoop-apps
## License
[![CC0](http://mirrors.creativecommons.org/presskit/buttons/88x31/svg/cc-zero.svg)](https://creativecommons.org/publicdomain/zero/1.0/)
To the extent possible under law, [udpsec](https://github.com/udpsec) has waived all copyright and related or neighboring rights to this work.