Count Dracul Yeamin the Scorpio's Projects
Tips and Tutorials for Bug Bounty and also Penetration Tests.
Android gallery spyware
penetration testing hands on introduction to hacking
Ghidra is a software reverse engineering (SRE) framework
:ghost: RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
:octocat: personal website + blog for every github user
A Ruby VM written in Go aims to exploit parallelism via Software Transactional Memory
GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.
Simple program for detecting if host(s) are vulnerable to SMB exploit(MS17-010)
googleads-mobile-android
A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy.
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Hacking Toolkit
Collection tools for hack android, java
The all-in-one Red Team extension for Web Pentester 🛠
Decrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。
A collection of hacking tools, resources and references to practice ethical hacking.
Source code for Hacker101.com - a free online web and mobile security class.
Exploits for the TryHackMe room hackerNote
hacking is a kind of spirit ! 🚀
Source code from Hacking: The Art of Exploitation (Second Edition).
Ha3Mrx Pentesting and Security Hacking
Please refer to The Treasure Trove repo below and read the guidelines before accessing this database
My personal collection of hacking scripts
Top 100 Hacking & Security E-Books (Free Download)
A list of security/hacking tools that have been collected from the internet. Suggestions are welcomed.
APT, Cyber warfare, Penetration testing, Zero-day,Exploiting, Spyware,Malwares evade anti-virus detection, Rookit CYPTER, Antiviruses Bypassing-av, WORMS,Sandbox-Escape, Memory-injection, Ethical,Gray,White,RedTeam...
“玄魂工作室--安全圈” 知识星球内资源汇总