Giter VIP home page Giter VIP logo

cyb1l's Projects

nse-scripts icon nse-scripts

NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473

octopus icon octopus

Open source pre-operation C2 server based on python and powershell

oggotthis icon oggotthis

Virus with no intention of harming anyone except Newbee fans

ohm icon ohm

Android RAT with web panel and undetectable App

operative-framework icon operative-framework

operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links with target, export rapport to PDF file, add note to target or results, interact with RESTFul API, write your own modules.

orca icon orca

Advanced Malware with multifeatures written in ASM/C/C++ , work on all windows versions !

osrframework icon osrframework

OSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accurate online researches.

paper_collection icon paper_collection

Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read

pentbox icon pentbox

PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.

pentest-handbook icon pentest-handbook

This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it batter.

phishmailer icon phishmailer

Generate Professional Phishing Emails Fast And Easy

pivotal icon pivotal

A MITM proxy server for reflective DLL injection through WinINet

pixload icon pixload

Image Payload Creating/Injecting tools

poc-exp icon poc-exp

poc or exp of android vulnerability

poc-in-github icon poc-in-github

📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.

poshc2 icon poshc2

A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.

powerhub icon powerhub

A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting

powersccm icon powersccm

PowerSCCM - PowerShell module to interact with SCCM deployments

powersploit icon powersploit

PowerSploit - A PowerShell Post-Exploitation Framework

proxify icon proxify

Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go.

proxyee icon proxyee

HTTP proxy server,support HTTPS&websocket.MITM impl,intercept and tamper HTTPS traffic.

proxylogon-exploit icon proxylogon-exploit

Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.

pupy icon pupy

Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.