GithubHelp home page GithubHelp logo

h0r57's Projects

afe icon afe

Android Framework for Exploitation, is a framework for exploiting android based devices

airgeddon icon airgeddon

This is a multi-use bash script for Linux systems to audit wireless networks.

anonym8 icon anonym8

Sets Transparent proxy tunnel through Tor, I2P, Privoxy, Polipo and modify DNS; Include Anonymizing Relay Monitor (arm), macchanger and wipe (Cleans ram/cache & swap-space) features, ID spoofing has never been so easy.

arachni icon arachni

Web Application Security Scanner Framework

armitage icon armitage

Automatically exported from code.google.com/p/armitage

atear icon atear

Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration

atscan icon atscan

Advanced Search & Mass Exploit Scanner- فاحص متقدم لبحث و استغلال الثغرات بالجملة

autopsy icon autopsy

Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card. Installers can be found at: http://www.sf.net/projects/autopsy/files/autopsy

ava icon ava

AVA - Human Vulnerability Scanner (Core)

bashobfus icon bashobfus

A small bash minifier/obfuscator written in Perl.

beef icon beef

The Browser Exploitation Framework Project

bettercap icon bettercap

A complete, modular, portable and easily extensible MITM framework.

bingoo icon bingoo

BinGoo! A Linux bash based Bing and Google Dorking Tool

bohatei icon bohatei

Bohatei is a first of its kind platform that enables flexible and elastic DDoS defense using SDN and NFV.

brut3k1t icon brut3k1t

brut3k1t is a framework for bruteforcing variety of protocols and services

brutal icon brutal

Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )

cewl icon cewl

CeWL is a Custom Word List Generator

chrome-decrypter icon chrome-decrypter

Python script to decrypt saved Chrome usernames and passwords on windows

chromebackdoor icon chromebackdoor

Chromebackdoor is a pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malicious extension or script on most popular browsers, and send all DOM datas on command and control.

cloakify icon cloakify

CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings; Evade DLP/MLS Devices; Defeat Data Whitelisting Controls; Social Engineering of Analysts; Evade AV Detection

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.