Coder Social home page Coder Social logo

Tom Yang's Projects

holehe icon holehe

holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.

howtohunt icon howtohunt

Tutorials and Things to Do while Hunting Vulnerability.

httpsuite icon httpsuite

A toolkit for web reconnaissance, it's fast and easy to use.

huntkit icon huntkit

Docker - Ubuntu with a bunch of PenTesting tools and wordlists

iced icon iced

High performance and correct x86/x64 disassembler, assembler, decoder, encoder for .NET, Rust, JavaScript

icmp-transfertools icon icmp-transfertools

Transfer files to and from a Windows host via ICMP in restricted network environments.

igscan icon igscan

WgpSec Team IGScan 一款信息收集工具

imonitor icon imonitor

iMonitor(冰镜 - 终端行为分析系统)

intelowl icon intelowl

Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale

intelspy icon intelspy

Perform automated network reconnaissance scans

invoke-zerologon icon invoke-zerologon

Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls on their behalf.

jsrainbow icon jsrainbow

BurpSuite插件,调用外部js处理payload,可以有效解决前端js对某些字段加密的问题,以及做fuzz时,处理逻辑可以在js文件中定义,不必写python、java等代码,灵活高效,你值得拥有。

k8tools icon k8tools

K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)

kaimonkey icon kaimonkey

KaiMonkey provides example vulnerable infrastructure to help cloud security, DevSecOps and DevOps teams explore and understand common cloud security threats exposed via infrastructure as code.

kaliintelligencesuite icon kaliintelligencesuite

Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standard penetration testing tools. The collected data is internally stored in a structured manner to allow the fast identification and visualisation of the collected information.

kasperskyhook icon kasperskyhook

Hook system calls on Windows by using Kaspersky's hypervisor

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.