Mandex's repositories
The-Hacker-Recipes
This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, intelligence gathering, physical intrusion, phishing, mobile apps, iot, social engineering, etc.
php-credit-card-validator
Validates popular debit and credit cards numbers against regular expressions and Luhn algorithm. Also validates the CVC and the expiration date.
Practical-Ethical-Hacking---The-Complete-Course-Notes-and-Resources-
Practical Ethical Hacking - The Complete Course (Notes and Resources)
Scanners-Box
A powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑
bbht
A script to set up a quick Ubuntu 17.10 x64 box with tools I use.
captcha_bypass
Captcha bypassing methods for Selenium
Cheat-Sheets
Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)
Cryptoggy
Cryptoggy is an open source, fully python ransomware .
deksterecon
Web Application recon automation
ezXSS
ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
Fake-Sandbox-Artifacts
This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or analysis tools
gatee
⛔️ Advanced protection for your Telegram chat
GitHub-Dark
:octocat: Dark GitHub style
gitjacker
🔪 :octocat: Leak git repositories from misconfigured websites
HackBar
HackBar is a security audit tool that will enable you to pentest websites more easily. ... You can use it to check site security by performing SQL injections, XSS holes and more. It also has a user-friendly interface that makes it easy for you to do fuzz testing, hash generation, encoding and more.
halo
💫 Beautiful spinners for terminal, IPython and Jupyter
hardware-hacking
Some stuff about Hardware Hacking
How-To-Ask-Questions-The-Smart-Way
本文原文由知名 Hacker Eric S. Raymond 所撰寫,教你如何正確的提出技術問題並獲得你滿意的答案。
Invoke-ZeroLogon
Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls on their behalf.
kb
A minimalist knowledge base manager
learn_gnuawk
Example based guide to mastering GNU awk
SecGen
Create randomly insecure VMs
ultimate-python
Ultimate Python study guide for newcomers and professionals alike. :snake: :snake: :snake:
xss-cheatsheet-data
This repository contains all the XSS cheatsheet data to allow contributions from the community.