crypt0b0y's repositories
WiFi-Pumpkin
Framework for Rogue Wi-Fi Access Point Attack
angryFuzzer
Tools for information gathering
esp8266_deauther
ESP8266 deauther
javascript-obfuscator
A powerful obfuscator for JavaScript and Node.js
Security_list
Great security list for fun and profit
awesome-pcaptools
A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.
brut3k1t
brut3k1t is a framework for bruteforcing various services and protocols
BruteX
Automatically brute force all services running on a target.
Empire
Empire is a PowerShell and Python post-exploitation agent.
EQGRP
Decrypted content of eqgrp-auction-file.tar.xz
gophish
Open-Source Phishing Toolkit
HTTPLeaks
HTTPLeaks - All possible ways, a website can leak HTTP requests
mimikatz
A little tool to play with Windows security
odat
ODAT: Oracle Database Attacking Tool
oxml_xxe
A tool for embedding XXE/XML exploits into different filetypes
pydictor
A powerful and useful hacker dictionary builder for a brute-force attack
rePy2exe
A Reverse Engineering Tool for py2exe applications.
reverseengineering-reading-list
A list of Reverse Engineering articles, books, and papers
silk-guardian
<< Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious files, and turns off your computer.
socialmedia-leak
A demo of cross origin login detection for most major web platforms
sshuttle
Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
sslstrip
A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.
TheFatRat
Thefatrat a massive exploiting tool revealed >> An easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
unhidens
Small DNS Recon utility, allows you to obtain some useful info about NS-servers placed behind relays, firewalls, etc.
usb-canary
A Linux tool that uses pyudev to monitor devices while your computer is locked. In the case it detects someone plugging in or unplugging devices it can be configured to send you an SMS or alert you via Slack of the potential security breach.
Veil
Veil 3.0
wifi-arsenal
WiFi arsenal
ysoserial
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.