Ling 丶's repositories
goby_poc
goby poc or exp,分享goby最新网络安全漏洞检测或利用代码
Penetration_Testing_POC
渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
DNS-Fender
A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
CVE-2021-40444
CVE-2021-40444 PoC
Ehoney
Seccome Teamer积累十几年的安全经验,都将对外逐步开放,首开的Ehoney欺骗防御系统,该系统是基于云原生的欺骗防御系统,也是业界唯一开源的对标商业系统的产品,欺骗防御系统通过部署高交互高仿真蜜罐及流量代理转发,再结合自研密签及诱饵,将攻击者攻击引导到蜜罐中达到扰乱引导以及延迟攻击的效果,可以很大程度上保护业务的安全。护网必备良药
PoC-in-GitHub
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
awesome-vehicle-security
🚗 A curated list of resources for learning about vehicle security and car hacking.
vulbase
各大漏洞文库合集
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
Resources-for-Beginner-Bug-Bounty-Hunters
A list of resources for those interested in getting started in bug bounties
bylibrary
白阁文库是白泽Sec安全团队维护的一个漏洞POC和EXP公开项目
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
public-pentesting-reports
Curated list of public penetration test reports released by several consulting firms and academic security groups
Information_Security_Books
150本信息安全方面的书籍书籍(持续更新)
cheatsheets
My cheatsheets
Loki
Loki - Simple IOC and Incident Response Scanner
blockchain
A simple Blockchain in Python
metasploitable3
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.
MemProcFS
The Memory Process File System
awesome-cheatsheets
👩💻👨💻 Awesome cheatsheets for popular programming languages, frameworks and development tools. They include everything you should know in one single file.
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
blackhat-arsenal-tools
Official Black Hat Arsenal Security Tools Repository
vulhub
Pre-Built Vulnerable Environments Based on Docker-Compose
ip2region
Ip2region is a offline IP location library with accuracy rate of 99.9% and 0.0x millseconds searching performance. DB file is ONLY a few megabytes with all IP address stored. binding for Java,PHP,C,Python,Nodejs,Golang,C#,lua. Binary,B-tree,Memory searching algorithm
Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
Intranet_Penetration_Tips
2018年初整理的一些内网渗透TIPS,后面更新的慢,所以整理出来希望跟小伙伴们一起更新维护~
jieba
结巴中文分词
movies-for-hackers
🎬 A curated list of movies every hacker & cyberpunk must watch.