A̵̱͠P̴̭̋0̷̯̂C̴̄͜4̵̣̒L̸̦̋Y̶̤̿P̴̭̋S̴̶̯͚͆̿'s repositories
DDoS-Everything
💣DDoS attacks💥exploits, botnets, proxies, spoofers, bypass, methods,stressers, browser flood,.⚡️⚡️⚡️.
reqable-app
Code source httpcanary --> https://github.com/R4GN4R0K-SEC/HttpCanary
CVE-2024-27348
Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )
CVE-2024-4577
PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC
ophiuchi-desktop
A local https proxy server using docker as backend
Termux-services
termux-services contains a set of scripts for controlling services. Instead of putting commands in ~/.bashrc or ~/.bash_profile, they can be started and stopped with termux-services.
awesome-web-hacking
A list of web application security
Awsm-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
BrowserBruter
BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python-based tool leverages Selenium and Selenium-Wire to automate web form fuzzing, making it easier to identify potential vulnerabilities in web applications.
C2-DDoS-BotNet-Saturn
C2 DDOS [BotNet Saturn]
cve-2024-6387-poc
32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Godzilla
Godzilla has 3 built-in Payloads, 6 built-in encryptors, 6 built-in script suffixes, and 20 built-in plug-ins
hurl
Hurl, run and test HTTP requests with plain text.
jasmin
Jasmin - Open source SMS gateway
lazyegg
LazyEgg is a powerful tool for extracting various types of data from a target URL. It can extract links, images, cookies, forms, JavaScript URLs, localStorage, Host, IP, and leaked credentials. Additionally, it includes a Chrome extension to log real-time JavaScript files as they are loaded.
MalwareSourceCode
Collection of malware source code for a variety of platforms in an array of different programming languages.
metasploitable3
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.
Nemesis
An offensive data enrichment pipeline
nmap
Nmap - the Network Mapper. Github mirror of official SVN repository.
OneDorkForAll
An insane list of all dorks taken from everywhere from various different sources.
pentest-arsenal
A collection of tools that I use in CTF's or for assessments
PoshC2
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
PySilon-malware
Advanced RAT written in Python language, fully controllable through Discord with dedicated GUI builder to make preparation easier.
Python-HttpFlood
This is a simple HTTP Flood script developed in Python
tellme
Save time on collecting subdomains, attributing IPs and then basic nmap scan.
theZoo
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
vt-augment
The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.
ZER0BOT
ZER0TBOT V2.1 DISCORD BOT & C2 FOR DDOS,...
ZxCDDoS
ZxCDDoS for education with LAYER 7, LAYER 4, AMP METHODS