Giter Site home page Giter Site logo

saraiva's Projects

password-list icon password-list

Password lists with top passwords to optimize bruteforce attacks

patator icon patator

Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.

peda icon peda

PEDA - Python Exploit Development Assistance for GDB

pentesting-bible icon pentesting-bible

Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.

pentestkit icon pentestkit

Tools, scripts and tips useful during Penetration Testing engagements.

phantap icon phantap

Phantom Tap (PhanTap) - an โ€˜invisibleโ€™ network tap aimed at red teams

php-webshells icon php-webshells

Common PHP webshells you might need for your Penetration Testing assignments or CTF challenges. Do not host the file(s) on your server!

pijuice icon pijuice

Resources for PiJuice HAT for Raspberry Pi - use your Pi Anywhere

pinkit icon pinkit

A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.

procspy icon procspy

Python tool that monitors and logs user-run commands on a Linux system for either offensive or defensive purposes..

pspy icon pspy

Monitor linux processes without root permissions

pwndbg icon pwndbg

Exploit Development and Reverse Engineering with GDB Made Easy

pydata-book icon pydata-book

Materials and IPython notebooks for "Python for Data Analysis" by Wes McKinney, published by O'Reilly Media

pyexfil icon pyexfil

A Python Package for Data Exfiltration

pywhat icon pywhat

๐Ÿธ Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! ๐Ÿง™โ€โ™€๏ธ

r-fair-risk-pert icon r-fair-risk-pert

Simple code written in R to calculate risk using the factor analysis of information risk (FAIR) methodology. Uses PERT distributions for the monte carlo simulations.

r-shiny-fair-risk icon r-shiny-fair-risk

Shiny application that uses Monte Carlo simulation to estimate risk using factor analysis of information risk (FAIR) methods.

r-sipmath-tools icon r-sipmath-tools

Import and export functions for maintaining the SIP standard, as well as an auditable RNG

reconnoitre icon reconnoitre

A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.

red_hawk icon red_hawk

All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers

redghost icon redghost

Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.

responder icon responder

Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.