Назад к каталогу
awesome-hacking-lists

awesome-hacking-lists

Сообщество

от taielab

0.0
0 отзывов

A curated collection of top-tier penetration testing tools and productivity utilities across multiple domains. Join us to explore, contribute, and enhance your hacking toolkit!

Описание

<!--lint disable awesome-contributing awesome-license awesome-list-item match-punctuation no-repeat-punctuation no-undefined-references awesome-spell-check--> # Awesome Stars [![Awesome](https://awesome.re/badge.svg)](https://github.com/sindresorhus/awesome) > A curated list of my GitHub stars! Generated by [starred](https://github.com/maguowei/starred). ## Contents - [ASL](#asl) - [ASP.NET](#asp.net) - [ActionScript](#actionscript) - [Ada](#ada) - [Arduino](#arduino) - [Assembly](#assembly) - [AutoHotkey](#autohotkey) - [AutoIt](#autoit) - [Batchfile](#batchfile) - [BitBake](#bitbake) - [Blade](#blade) - [BlitzBasic](#blitzbasic) - [Boo](#boo) - [C](#c) - [C#](#c#) - [C++](#c++) - [CMake](#cmake) - [CSS](#css) - [Classic ASP](#classic-asp) - [Clojure](#clojure) - [CodeQL](#codeql) - [ColdFusion](#coldfusion) - [Dart](#dart) - [Dockerfile](#dockerfile) - [Emacs Lisp](#emacs-lisp) - [Erlang](#erlang) - [F#](#f#) - [Fluent](#fluent) - [FreeMarker](#freemarker) - [Go](#go) - [Groovy](#groovy) - [HCL](#hcl) - [HTML](#html) - [Hack](#hack) - [Haskell](#haskell) - [Inno Setup](#inno-setup) - [Java](#java) - [JavaScript](#javascript) - [Jinja](#jinja) - [Jupyter Notebook](#jupyter-notebook) - [KiCad Layout](#kicad-layout) - [Kotlin](#kotlin) - [LLVM](#llvm) - [Logos](#logos) - [Lua](#lua) - [MATLAB](#matlab) - [Makefile](#makefile) - [Markdown](#markdown) - [Mask](#mask) - [Max](#max) - [Mustache](#mustache) - [NSIS](#nsis) - [Nginx](#nginx) - [Nim](#nim) - [Nix](#nix) - [Nunjucks](#nunjucks) - [OCaml](#ocaml) - [Objective-C](#objective-c) - [Objective-C++](#objective-c++) - [Open Policy Agent](#open-policy-agent) - [Others](#others) - [PHP](#php) - [PLpgSQL](#plpgsql) - [Pascal](#pascal) - [Perl](#perl) - [PostScript](#postscript) - [PowerShell](#powershell) - [Propeller Spin](#propeller-spin) - [Pug](#pug) - [Python](#python) - [QMake](#qmake) - [REXX](#rexx) - [Rascal](#rascal) - [Rich Text Format](#rich-text-format) - [Roff](#roff) - [Ruby](#ruby) - [Rust](#rust) - [SCSS](#scss) - [Sage](#sage) - [SaltStack](#saltstack) - [Scala](#scala) - [Scheme](#scheme) - [Shell](#shell) - [Smali](#smali) - [Smarty](#smarty) - [Solidity](#solidity) - [SourcePawn](#sourcepawn) - [Starlark](#starlark) - [Svelte](#svelte) - [Swift](#swift) - [TSQL](#tsql) - [Tcl](#tcl) - [TeX](#tex) - [TypeScript](#typescript) - [VBA](#vba) - [VBScript](#vbscript) - [VCL](#vcl) - [Vim Script](#vim-script) - [Visual Basic](#visual-basic) - [Visual Basic .NET](#visual-basic-.net) - [Vue](#vue) - [XSLT](#xslt) - [YAML](#yaml) - [YARA](#yara) - [Zeek](#zeek) - [Zig](#zig) - [nesC](#nesc) - [templ](#templ) ## ASL - [postgres-cn/pgdoc-cn](https://github.com/postgres-cn/pgdoc-cn) - PostgreSQL manual Chinese translation by China PostgreSQL Users Group ## ASP.NET - [Jean-Francois-C/Webshell-Upload-and-Web-RCE-Techniques](https://github.com/Jean-Francois-C/Webshell-Upload-and-Web-RCE-Techniques) - Classic Web shell upload techniques & Web RCE techniques ## ActionScript - [appsecco/json-flash-csrf-poc](https://github.com/appsecco/json-flash-csrf-poc) - This repo contains the files required to perform a CSRF attack using Flash and HTTP 307 redirections. ## Ada - [PatrikFehrenbach/amass-tools](https://github.com/PatrikFehrenbach/amass-tools) - ## Arduino - [UnicycleDumpTruck/MissionControl](https://github.com/UnicycleDumpTruck/MissionControl) - This kids' homework desk has top that flips up to reveal a space-themed control panel. - [spacehuhn/wifi_keylogger](https://github.com/spacehuhn/wifi_keylogger) - DIY Arduino Wi-Fi Keylogger (Proof of Concept) ## Assembly - [enkomio/AlanFramework](https://github.com/enkomio/AlanFramework) - A C2 post-exploitation framework - [MortenSchenk/Token-Stealing-Shellcode](https://github.com/MortenSchenk/Token-Stealing-Shellcode) - - [xenoscr/SysWhispers2](https://github.com/xenoscr/SysWhispers2) - AV/EDR evasion via direct system calls. - [timwhitez/Doge-Direct-Syscall](https://github.com/timwhitez/Doge-Direct-Syscall) - Golang Direct Syscall - [klezVirus/inceptor](https://github.com/klezVirus/inceptor) - Template-Driven AV/EDR Evasion Framework - [guitmz/memrun](https://github.com/guitmz/memrun) - Small tool to run ELF binaries from memory with a given process name - [DownWithUp/DynamicKernelShellcode](https://github.com/DownWithUp/DynamicKernelShellcode) - An example of how x64 kernel shellcode can dynamically find and use APIs - [mai1zhi2/SysWhispers2_x86](https://github.com/mai1zhi2/SysWhispers2_x86) - X86 version of syswhispers2 / x86 direct system call - [jthuraisamy/SysWhispers2](https://github.com/jthuraisamy/SysWhispers2) - AV/EDR evasion via direct system calls. - [Cybereason/siofra](https://github.com/Cybereason/siofra) - - [mytechnotalent/Reverse-Engineering](https://github.com/mytechnotalent/Reverse-Engineering) - A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures. - [jjyr/jonesforth_riscv](https://github.co

Отзывы (0)

Пока нет отзывов. Будьте первым!