GithubHelp home page GithubHelp logo

md50x's Projects

algo icon algo

Set up a personal VPN in the cloud

andromeda icon andromeda

Andromeda - Interactive Reverse Engineering Tool for Android Applications

awesome-cpp icon awesome-cpp

A curated list of awesome C++ (or C) frameworks, libraries, resources, and shiny things. Inspired by awesome-... stuff.

awesome-hacking icon awesome-hacking

A collection of various awesome lists for hackers, pentesters and security researchers

awesome-shodan-queries icon awesome-shodan-queries

🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩‍💻

botnets icon botnets

This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY

brutespray icon brutespray

Brute-Forcing from Nmap output - Automatically attempts default creds on found services.

byob icon byob

BYOB (Build Your Own Botnet)

cloudbunny icon cloudbunny

CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search engines to search domain information: Shodan, Censys and Zoomeye.

ghidra icon ghidra

Ghidra is a software reverse engineering (SRE) framework

ipwndfu icon ipwndfu

open-source jailbreaking tool for many iOS devices

litetools icon litetools

Tools Installer From Indonesia security Lite

lmg icon lmg

Script for automating Linux memory capture and analysis

massdns icon massdns

A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)

morpheus icon morpheus

Morpheus - Automated Ettercap TCP/IP Hijacking Tool

multitor icon multitor

Create multiple TOR instances with a load-balancing.

open-myrtus icon open-myrtus

RCEed version of computer malware / rootkit MyRTUs / Stuxnet.

pixload icon pixload

Image Payload Creating/Injecting tools

pyrdp icon pyrdp

RDP man-in-the-middle (mitm) and library for Python 3 with the ability to watch connections live or after the fact

red_hawk icon red_hawk

All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers

seclists icon seclists

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

sigploit icon sigploit

SigPloit: Telecom Signaling Exploitation Framework - SS7, GTP, Diameter & SIP

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.