pythonone's repositories
tensorflow-1.4-billion-password-analysis
Deep Learning model to analyze a large corpus of clear text passwords.
android-scripts
Collection of Android reverse engineering scripts
AngelSword
Python3编写的CMS漏洞检测框架
AutoSploit
Automated Mass Exploiter
crawlvault7
因为政策,所以代理
deepfakes_faceswap
from deekfakes' faceswap: https://www.reddit.com/user/deepfakes/
fuckChinaCarrieroperator
人不犯我我不犯人,**运营商太TMD贱了,搞dns劫持是吧
GSIL
Github Sensitive Information Leakage(Github敏感信息泄露)
haven
Haven is for people who need a way to protect their personal spaces and possessions without compromising their own privacy, through an Android app and on-device sensors
Infosec_Reference
An Information Security Reference That Doesn't Suck
Invoke-PSImage
Embeds a PowerShell script in the pixels of a PNG file and generates a oneliner to execute
Invoke-WCMDump
PowerShell Script to Dump Windows Credentials from the Credential Manager
isf
ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python
makin
makin - reveal anti-debugging tricks
Parat
Python based Remote Administration Tool(RAT)
PasteHunter
Scanning pastebin with yara rules
retdec
RetDec is a retargetable machine-code decompiler based on LLVM.
SecLists
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
SourceCodeSniffer
The Source Code Sniffer is a poor man’s static code analysis tool (SCA) that leverages regular expressions. Designed to highlight high risk functions (Injection, LFI/RFI, file uploads etc) across multiple languages (ASP, Java, CSharp, PHP, Perl, Python, JavaScript, HTML etc) in a highly configurable manner.
sshLooter
Script to steal passwords from ssh.
trojanizer
Trojanize your payload - WinRAR (SFX) automatization - under Linux distros
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Wi-PWN
ESP8266 Deauther with advanced features and material interface
x-waf
适用于中小企业的云waf
ZeroNet
ZeroNet - Decentralized websites using Bitcoin crypto and BitTorrent network