Count Dracul Yeamin the Scorpio's Projects
Android OTA payload dumper
Payload Arsenal for Pentration Tester and Bug Bounty Hunters
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
ζΈι θΆ
ε
¨ι’ηζΈιθ΅ζπ― ε
ε«οΌ0dayοΌxssοΌsql注ε
₯οΌζζβ¦β¦
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
Penetration Testing: A Hands-On Introduction to Hacking (Georgia Weidman)
Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.
Penetration Testing with Kali Linux
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Tools for pentesting, CTFs & wargames.
Awesome Pentest Tools Collection
PENTOL - Pentester Toolkit for Fiddler2
A template for creating personal website
Python antivirus evasion tool
A collection of PHP backdoors. For educational or testing purposes only.
A collection of PHP exploit scripts, found when investigating hacked servers. These are stored for educational purposes and to test fuzzers and vulnerability scanners. Feel free to contribute.
Injects php payloads into jpeg images
Common php webshells. Do not host the file(s) on your server!
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Remote Access Trojan(RAT), Miner, DDoS
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Remote Desktop entirely coded in PowerShell.
Run application as system with interactive system process support (active Windows session)
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
A tool for sniffing PPPoE username/password for any brand of router
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Stealth post-exploitation framework for wordpress