Stars
A personal knowledge management and sharing system for VSCode
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
BlackJackToken / Fermion
Forked from FuzzySecurity/FermionFermion, an electron wrapper for Frida & Monaco.
Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-…
CyberSecurityRSS: A collection of cybersecurity rss to make you better!
A high performance offensive security tool for reconnaissance and vulnerability scanning
DJY Nethunter And Andrax Kernel Oneplus6-Oneplus6T
An updated collection of resources targeting browser-exploitation.
Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature
Attack and defend active directory using modern post exploitation adversary tradecraft activity
PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)
Guide to securing and improving privacy on macOS
The TV-B-Gone software ported to the Arduino platform
Borrow cookies from your browser's authenticated session for use in Python scripts.
OSX and iOS related security tools
Collection of android malware samples
A collection of android security related resources
USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoor, and rerouting DNS within seconds of plugging it in.
KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over GSM) all keystrokes from an…
A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC/RFID) readers. It can disable Chip&PIN and predict AMEX car…
A drone engineered to autonomously seek out, hack, and wirelessly take full control over any other Parrot or 3DR drones within wireless or flying distance, creating an army of zombie drones under y…
Produces persistent, respawning "super" cookies in a browser, abusing over a dozen techniques. Its goal is to identify users after they've removed standard cookies and other privacy data such as Fl…
Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.