unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Zi - A Swiss Army Knife for Zsh - Unix Shell
A Swiss Army Knife for Zsh - Unix Shell.RoadmapSee the open issues for a list of proposed feat...
2022-5-7 22:30:0 | 阅读: 32 |
收藏
|
www.kitploit.com
zi
security
army
swiss
GoSH - Golang Reverse/Bind Shell Generator
Golang reverse/bind shell generator. Description This tool generates a Go binary that laun...
2022-5-7 13:30:0 | 阅读: 41 |
收藏
|
www.kitploit.com
reverse
launches
partial
removes
Email-Prediction-Asterisks - Script That Allows You To Identify The Emails Hidden Behind Asterisks
Email prediction asterisks is a script that allows you to identify the emails hidden behind...
2022-5-7 05:30:0 | 阅读: 57 |
收藏
|
www.kitploit.com
asterisks
identify
quantika14
python
intelx
PEzor-Docker - With The Help Of This Docker Image, You Can Easily Access PEzor On Your System!
With the help of this kali linux image, you can easily access PEzor on your system! Basic...
2022-5-6 13:30:0 | 阅读: 25 |
收藏
|
www.kitploit.com
pezor
4d0niis
rolling
kalilinux
phra
Malicious-Pdf - Generate A Bunch Of Malicious Pdf Files With Phone-Home Functionality
Generate ten different malicious pdf files with phone-home functionality. Can be used with...
2022-5-5 22:30:0 | 阅读: 26 |
收藏
|
www.kitploit.com
malicious
burp
bunch
xfa
Graphql-Threat-Matrix - GraphQL Threat Framework Used By Security Professionals To Research Security Gaps In GraphQL Implementations
Why graphql-threat-matrix? graphql-threat-matrix was built for bug bounty hunters, security...
2022-5-5 13:30:0 | 阅读: 17 |
收藏
|
www.kitploit.com
security
gaps
gql
dolev
Cliam - Multi Cloud IAM Permissions Enumeration Tool
Multi cloud iam permissions enumeration tool. Currently covers: AWS GCP [TODO] Azure [...
2022-5-5 05:30:0 | 阅读: 21 |
收藏
|
www.kitploit.com
cliam
gcp
cloud
ec2
central1
LDAPFragger - Command And Control Tool That Enables Attackers To Route Cobalt Strike Beacon Data Over LDAP
LDAPFragger is a Command and Control tool that enables attackers to route Cobalt Strike beac...
2022-5-4 13:30:0 | 阅读: 16 |
收藏
|
www.kitploit.com
cobalt
ldapfragger
ldaps
username
cshost
LeakedHandlesFinder - Leaked Windows Processes Handles Identification Tool
Leaked Windows processes handles identification tool. Useful for identify new LPE vulnerabil...
2022-5-4 07:30:0 | 阅读: 38 |
收藏
|
www.kitploit.com
windows
lpe
processes
rootedcon
FirmWire -b Full-System Baseband Firmware Emulation Platform For Fuzzing, Debugging, And Root-Cause Analysis Of Smartphone Baseband Firmwares
FirmWire is a full-system baseband firmware analysis platform that supports Samsung and Medi...
2022-5-3 20:30:0 | 阅读: 26 |
收藏
|
www.kitploit.com
firmwire
baseband
analysis
firmware
ndss
Pybatfish - Python Client For Batfish (Network Configuration Analysis Tool)
Pybatfish is a Python client for Batfish. What is Batfish? Batfish is a network validatio...
2022-5-2 22:30:0 | 阅读: 15 |
收藏
|
www.kitploit.com
batfish
network
pybatfish
jupyter
analysis
Moonwalk - Cover Your Tracks During Linux Exploitation By Leaving Zero Traces On System Logs And Filesystem Timestamps
Introduction moonwalk is a 400 KB single-binary executable that can clear your traces while...
2022-5-2 20:30:0 | 阅读: 19 |
收藏
|
www.kitploit.com
moonwalk
machine
traces
timestamps
github
Nanodump - A Crappy LSASS Dumper With No ASCII Art
A flexible tool that creates a minidump of the LSASS process. 1. Features It uses syscal...
2022-5-2 05:30:0 | 阅读: 61 |
收藏
|
www.kitploit.com
nanodump
malseclogon
beacon
ssp
windows
BackupOperatorToDA - From An Account Member Of The Group Backup Operators To Domain Admin Without RDP Or WinRM On The Domain Controller
If you compromise an account member of the group Backup Operators you can become the Domain...
2022-5-1 20:30:0 | 阅读: 24 |
收藏
|
www.kitploit.com
backup
dragovic
database
mpgn
Dora - Find Exposed API Keys Based On RegEx And Get Exploitation Methods For Some Of Keys That Are Found
Features Blazing fast as we are using ripgrep in backend Exploit/PoC steps for many of...
2022-5-1 05:30:0 | 阅读: 39 |
收藏
|
www.kitploit.com
dora
ripgrep
rg
github
sherlock
Requests-Ip-Rotator - A Python Library To Utilize AWS API Gateway's Large IP Pool As A Proxy To Generate Pseudo-Infinite IPs For Web Scraping And Brute Forcing
A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infi...
2022-4-30 20:30:0 | 阅读: 23 |
收藏
|
www.kitploit.com
apigateway
regions
rotator
proxy
west
Osinteye - Username Enumeration And Reconnaisance Suite
Username Enumeration And Reconnaisance Suite PyPI Github TestPypi About.me Instagram...
2022-4-30 05:30:0 | 阅读: 26 |
收藏
|
www.kitploit.com
osinteye
username
github
testpypi
dockerhub
Lupo - Malware IOC Extractor. Debugging Module For Malware Analysis Automation
Debugging module for Malware Analysis Automation For a step by step post on how to use Lupo...
2022-4-29 20:30:0 | 阅读: 26 |
收藏
|
www.kitploit.com
lupo
analysis
debugger
ragno
thakur
IOSSecuritySuite - iOS Platform Security And Anti-Tampering Swift Library
iOS Security Suite is an advanced and easy-to-use platform security & anti-tampering libra...
2022-4-29 05:30:0 | 阅读: 24 |
收藏
|
www.kitploit.com
jailbroken
detector
security
Rip Raw - Small Tool To Analyse The Memory Of Compromised Linux Systems
Rip Raw is a small tool to analyse the memory of compromised Linux systems. It is similar i...
2022-4-28 20:30:0 | 阅读: 20 |
收藏
|
www.kitploit.com
memory
kubernetes
analyse
eks
cloud
Previous
43
44
45
46
47
48
49
50
Next