#python #adb #android #android_debug_bridge #android_device #android_exploit #android_hack #android_hacking #android_rat #backdoor #entynetproject #exploit #exploitation_framework #hack #hacking #hacking_tools #kali_linux #post_exploitation #rat #remote_access #remote_shell
https://github.com/entynetproject/ghost
https://github.com/entynetproject/ghost
#other #active_directory #crackmapexec #cybersecurity #engagement #enumeration #exploit #hacking #lateral_movement #metasploit #meterpreter #mimikatz #nmap #penetration_testing #pentesting #privilege_escalation #redteam #script #security_tools #tools #vulnerability
https://github.com/ihebski/A-Red-Teamer-diaries
https://github.com/ihebski/A-Red-Teamer-diaries
GitHub
GitHub - ihebski/A-Red-Teamer-diaries: RedTeam/Pentest notes and experiments tested on several infrastructures related to professional…
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements. - ihebski/A-Red-Teamer-diaries
#cplusplus #windows #library #kernel #exploit #hypervisor #vbs #rookit #hvci
https://github.com/Cr4sh/KernelForge
https://github.com/Cr4sh/KernelForge
GitHub
GitHub - Cr4sh/KernelForge: A library to develop kernel level Windows payloads for post HVCI era
A library to develop kernel level Windows payloads for post HVCI era - Cr4sh/KernelForge
#java #bugbounttips #bugbounty #bugbounty_writeups #cve #cve_2021_44228 #cybersecurity #exploit #hacking #log4j #payload #pentest #pentesting #red_team #security #security_writeups #writeups
https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
GitHub
GitHub - Puliczek/CVE-2021-44228-PoC-log4j-bypass-words: 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks - Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
#python #apple #exploit #idot #png #png_encoder
https://github.com/DavidBuchanan314/ambiguous-png-packer
https://github.com/DavidBuchanan314/ambiguous-png-packer
GitHub
GitHub - DavidBuchanan314/ambiguous-png-packer: Craft PNG files that appear completely different in Apple software [NOW PATCHED]
Craft PNG files that appear completely different in Apple software [NOW PATCHED] - DavidBuchanan314/ambiguous-png-packer
#java #android #android_application #android_rat #androrat #apk #backdoor #exploit #hacktoberfest #interpreter #interpreter_commands #python #rat #reverse_shell #sockets
https://github.com/karma9874/AndroRAT
https://github.com/karma9874/AndroRAT
GitHub
GitHub - karma9874/AndroRAT: A Simple android remote administration tool using sockets. It uses java on the client side and python…
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side - karma9874/AndroRAT
#other #cve #cve_poc #exploit #hacking #infosec #latest_cve #penetration_testing #pentesting #poc #red_team #security #security_tools #software_security #software_vulnerabilities #software_vulnerability #vulnerabilities #vulnerability
https://github.com/trickest/cve
https://github.com/trickest/cve
GitHub
GitHub - trickest/cve: Gather and update all available and newest CVEs with their PoC.
Gather and update all available and newest CVEs with their PoC. - trickest/cve
#go #cve_2021_3560 #cve_2022_0847 #dirtypipe #exploit #gtfobins #hackthebox #infosec #privesc #privilege_escalation #redteam_tools #security_tools
https://github.com/liamg/traitor
https://github.com/liamg/traitor
GitHub
GitHub - liamg/traitor: :arrow_up: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit,…
:arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock - GitHub - liamg/traitor: :arrow_up: :fire: ...
#dockerfile #awesome_list #bugbounty #cms #code #execution #exploit #framework #rce
https://github.com/p0dalirius/Awesome-RCE-techniques
https://github.com/p0dalirius/Awesome-RCE-techniques
GitHub
GitHub - p0dalirius/Awesome-RCE-techniques: Awesome list of step by step techniques to achieve Remote Code Execution on various…
Awesome list of step by step techniques to achieve Remote Code Execution on various apps! - p0dalirius/Awesome-RCE-techniques
#other #awesome #awesome_list #awesome_lists #bugbounty #dns #domain #exploit #hacking #hacking_tools #osint #osint_tool #redteam #redteaming #search_engine #security #security_tools #url #vulnerabilities #vulnerability #wifi_network
https://github.com/edoardottt/awesome-hacker-search-engines
https://github.com/edoardottt/awesome-hacker-search-engines
GitHub
GitHub - edoardottt/awesome-hacker-search-engines: A curated list of awesome search engines useful during Penetration testing,…
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more - edoardottt/awesome-hacker-search-engines
#python #blueteam #bugbounty #cheatsheet #credentials_gathering #cybersecurity #default_password #exploit #infosec #offensive_security #pentest #pentesting
https://github.com/ihebski/DefaultCreds-cheat-sheet
https://github.com/ihebski/DefaultCreds-cheat-sheet
GitHub
GitHub - ihebski/DefaultCreds-cheat-sheet: One place for all the default credentials to assist the Blue/Red teamers identifying…
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️ - ihebski/DefaultCreds-cheat-sheet
#typescript #blueteam #burpsuite #exploit #golang #hacking #hacking_tools #pentest #redteam #redteam_tools #scanner #security
Yakit is a powerful tool for interactive application security testing. It uses a special programming language called Yaklang, which is designed specifically for cybersecurity. Here are the key benefits Yakit provides a user-friendly GUI, making it accessible even for those who don't want to write code.
- **Advanced Features** You can execute custom Yaklang scripts or plugins at any step of penetration testing.
- **Flexible Deployment** There is an active community and detailed documentation available to help you learn and use Yakit effectively.
Overall, Yakit simplifies and enhances your security testing experience with its robust features and user-friendly interface.
https://github.com/yaklang/yakit
Yakit is a powerful tool for interactive application security testing. It uses a special programming language called Yaklang, which is designed specifically for cybersecurity. Here are the key benefits Yakit provides a user-friendly GUI, making it accessible even for those who don't want to write code.
- **Advanced Features** You can execute custom Yaklang scripts or plugins at any step of penetration testing.
- **Flexible Deployment** There is an active community and detailed documentation available to help you learn and use Yakit effectively.
Overall, Yakit simplifies and enhances your security testing experience with its robust features and user-friendly interface.
https://github.com/yaklang/yakit
GitHub
GitHub - yaklang/yakit: Cyber Security ALL-IN-ONE Platform
Cyber Security ALL-IN-ONE Platform. Contribute to yaklang/yakit development by creating an account on GitHub.
#javascript #bugbounty #exploit_development #exploits #fingerprint #hacktoberfest #nuclei #nuclei_checks #nuclei_templates #security #vulnerability_detection
Nuclei Templates are pre-made scripts used by the Nuclei scanner to find security vulnerabilities in applications. These templates are created and shared by a community of users, making it easier for everyone to identify and fix security issues. You can contribute your own templates, report bugs, or request new features, which helps grow the library of available templates. This community-driven approach ensures that the scanner stays updated and effective, benefiting users by providing a robust tool for enhancing application security. You can also join discussions on GitHub or the Discord community to learn more and share ideas.
https://github.com/projectdiscovery/nuclei-templates
Nuclei Templates are pre-made scripts used by the Nuclei scanner to find security vulnerabilities in applications. These templates are created and shared by a community of users, making it easier for everyone to identify and fix security issues. You can contribute your own templates, report bugs, or request new features, which helps grow the library of available templates. This community-driven approach ensures that the scanner stays updated and effective, benefiting users by providing a robust tool for enhancing application security. You can also join discussions on GitHub or the Discord community to learn more and share ideas.
https://github.com/projectdiscovery/nuclei-templates
GitHub
GitHub - projectdiscovery/nuclei-templates: Community curated list of templates for the nuclei engine to find security vulnerabilities.
Community curated list of templates for the nuclei engine to find security vulnerabilities. - projectdiscovery/nuclei-templates