Count Dracul Yeamin the Scorpio's Projects
Working POC of Mikrotik exploit from Vault 7 CIA Leaks
Citizen Intelligence Agency
Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/
WikiLeaks Vault 7 CIA Hacking Tools
Hive, a major component of the CIA infrastructure to control its malware.
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution/CVE-2019-1653/Cisco SNMP RCE/Dump Cisco RV320 Password)
CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs
CMS Scanner: Scan Wordpress, Drupal, Joomla, vBulletin websites for Security issues
A simple exploit to execute system command on codiad
Collection of quality safety articles. Awesome articles.
Created a VERY SIMPLE remote access Trojan that will establish administrative control over any windows machine it compromises.
RCS Agent for Linux
A simple CORS misconfiguration scanner
Know the dangers of credential reuse attacks.
A swiss army knife for pentesting networks
Web Recon & Exploitation Tool.
Crawl website extract links
:hocho: CRIME attack PoC : a compression oracle attacks CVE-2012-4929 :hocho:
Payloads for CRLF Injection
Crypter - Python-based builder and ransomware compiled to Windows executable using PyInstaller
Windows Crypter
Various Crypter Project
CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system and send keys back to the server. Multi-threaded functionality helps to this tool make encryption faster.
This HTML file creates a CSRF PoC form to any HTTP request.
CTF竞赛权威指南
This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.
Some setup scripts for security research tools.
CTFs as you need them
Some tools for CTF off line