CINXE.COM

GitHub - fengjixuchui/awesome-cyber-security: (!!! Github shows less than 4000 lines, and more than 5000 lines is missing. Please download Readme.md and open it in markdown viewer to review the FULL version)[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.

<!DOCTYPE html> <html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark" data-a11y-animated-images="system" data-a11y-link-underlines="true" > <head> <meta charset="utf-8"> <link rel="dns-prefetch" href="https://github.githubassets.com"> <link rel="dns-prefetch" href="https://avatars.githubusercontent.com"> <link rel="dns-prefetch" href="https://github-cloud.s3.amazonaws.com"> <link rel="dns-prefetch" href="https://user-images.githubusercontent.com/"> <link rel="preconnect" href="https://github.githubassets.com" crossorigin> <link rel="preconnect" href="https://avatars.githubusercontent.com"> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/light-74231a1f3bbb.css" /><link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/dark-8a995f0bacd4.css" /><link data-color-theme="dark_dimmed" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_dimmed-f37fb7684b1f.css" /><link data-color-theme="dark_high_contrast" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_high_contrast-9ac301c3ebe5.css" /><link data-color-theme="dark_colorblind" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_colorblind-cd826e8636dc.css" /><link data-color-theme="light_colorblind" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/light_colorblind-f91b0f603451.css" /><link data-color-theme="light_high_contrast" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/light_high_contrast-83beb16e0ecf.css" /><link data-color-theme="light_tritanopia" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/light_tritanopia-6e122dab64fc.css" /><link data-color-theme="dark_tritanopia" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_tritanopia-18119e682df0.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/primer-primitives-225433424a87.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/primer-aaa714e5674d.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/global-0a3c53b9d1c2.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/github-ea73c9cb5377.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/repository-4fce88777fa8.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/code-0210be90f4d3.css" /> <script type="application/json" id="client-env">{"locale":"en","featureFlags":["a11y_quote_reply_fix","copilot_immersive_issue_preview","copilot_new_references_ui","copilot_chat_repo_custom_instructions_preview","copilot_no_floating_button","copilot_topics_as_references","copilot_read_shared_conversation","copilot_duplicate_thread","copilot_buffered_streaming","dotcom_chat_client_side_skills","experimentation_azure_variant_endpoint","failbot_handle_non_errors","geojson_azure_maps","ghost_pilot_confidence_truncation_25","ghost_pilot_confidence_truncation_40","github_models_gateway_parse_params","github_models_o3_mini_streaming","insert_before_patch","issues_react_remove_placeholders","issues_react_blur_item_picker_on_close","marketing_pages_search_explore_provider","primer_react_css_modules_ga","react_data_router_pull_requests","remove_child_patch","sample_network_conn_type","swp_enterprise_contact_form","site_proxima_australia_update","viewscreen_sandbox","issues_react_create_milestone","issues_react_cache_fix_workaround","lifecycle_label_name_updates","copilot_task_oriented_assistive_prompts","issue_types_prevent_private_type_creation","refresh_image_video_src","react_router_dispose_on_disconnect","codespaces_prebuild_region_target_update","turbo_app_id_restore","copilot_code_review_sign_up_closed"]}</script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/wp-runtime-900d20148682.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_oddbird_popover-polyfill_dist_popover_js-9da652f58479.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_arianotify-polyfill_ariaNotify-polyfill_js-node_modules_github_mi-3abb8f-46b9f4874d95.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/ui_packages_failbot_failbot_ts-75968cfb5298.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/environment-f04cb2a9fc8c.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_behaviors_dist_esm_index_mjs-0dbb79f97f8f.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_selector-observer_dist_index_esm_js-f690fd9ae3d5.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_relative-time-element_dist_index_js-62d275b7ddd9.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_text-expander-element_dist_index_js-78748950cb0c.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_auto-complete-element_dist_index_js-node_modules_github_catalyst_-8e9f78-a90ac05d2469.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_filter-input-element_dist_index_js-node_modules_github_remote-inp-b5f1d7-a1760ffda83d.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_markdown-toolbar-element_dist_index_js-ceef33f593fa.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_file-attachment-element_dist_index_js-node_modules_primer_view-co-c44a69-efa32db3a345.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/github-elements-394f8eb34f19.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/element-registry-25113a65b77f.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_braintree_browser-detection_dist_browser-detection_js-node_modules_githu-2906d7-2a07a295af40.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_lit-html_lit-html_js-be8cb88f481b.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_mini-throttle_dist_index_js-node_modules_morphdom_dist_morphdom-e-7c534c-a4a1922eb55f.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_turbo_dist_turbo_es2017-esm_js-a03ee12d659a.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_remote-form_dist_index_js-node_modules_delegated-events_dist_inde-893f9f-b6294cf703b7.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_color-convert_index_js-e3180fe3bcb3.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_quote-selection_dist_index_js-node_modules_github_session-resume_-947061-e7a6c4a19f98.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/ui_packages_updatable-content_updatable-content_ts-eb3147a21e96.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/app_assets_modules_github_behaviors_task-list_ts-app_assets_modules_github_sso_ts-ui_packages-900dde-768abe60b1f8.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/app_assets_modules_github_sticky-scroll-into-view_ts-3e000c5d31a9.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/app_assets_modules_github_behaviors_ajax-error_ts-app_assets_modules_github_behaviors_include-87a4ae-4c160a67a3f8.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/app_assets_modules_github_behaviors_commenting_edit_ts-app_assets_modules_github_behaviors_ht-83c235-e429cff6ceb1.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/behaviors-1f167e0c2aee.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_delegated-events_dist_index_js-node_modules_github_catalyst_lib_index_js-f6223d90c7ba.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/notifications-global-01e85cd1be94.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_virtualized-list_es_index_js-node_modules_github_template-parts_lib_index_js-94dc7a2157c1.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_remote-form_dist_index_js-node_modules_delegated-events_dist_inde-70450e-4b93df70b903.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/app_assets_modules_github_ref-selector_ts-3e9d848bab5f.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/codespaces-f76fb2dd7b91.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_filter-input-element_dist_index_js-node_modules_github_remote-inp-3eebbd-0763620ad7bf.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_mini-throttle_dist_decorators_js-node_modules_delegated-events_di-e161aa-9d41fb1b6c9e.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_file-attachment-element_dist_index_js-node_modules_github_remote--3c9c82-b71ef90fbdc7.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/repositories-e6e7c7ff47a3.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_mini-throttle_dist_index_js-node_modules_github_catalyst_lib_inde-dbbea9-26cce2010167.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/code-menu-1c0aedc134b1.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/primer-react-602097a4b0db.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/react-core-0bc17999cb79.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/react-lib-f1bca44e0926.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/octicons-react-cf2f2ab8dab4.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_emotion_is-prop-valid_dist_emotion-is-prop-valid_esm_js-node_modules_emo-62da9f-2df2f32ec596.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_mini-throttle_dist_index_js-node_modules_stacktrace-parser_dist_s-e7dcdd-9a233856b02c.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_oddbird_popover-polyfill_dist_popover-fn_js-55fea94174bf.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/notifications-subscriptions-menu-57956eade845.js"></script> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/primer-react.8157a56b30ae88a1b356.module.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/notifications-subscriptions-menu.1bcff9205c241e99cff2.module.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/primer-react.8157a56b30ae88a1b356.module.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/notifications-subscriptions-menu.1bcff9205c241e99cff2.module.css" /> <title>GitHub - fengjixuchui/awesome-cyber-security: (!!! Github shows less than 4000 lines, and more than 5000 lines is missing. Please download Readme.md and open it in markdown viewer to review the FULL version)[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.</title> <meta name="route-pattern" content="/:user_id/:repository" data-turbo-transient> <meta name="route-controller" content="files" data-turbo-transient> <meta name="route-action" content="disambiguate" data-turbo-transient> <meta name="current-catalog-service-hash" content="f3abb0cc802f3d7b95fc8762b94bdcb13bf39634c40c357301c4aa1d67a256fb"> <meta name="request-id" content="8458:1DE3E6:12423C:17EA43:67E99E25" data-pjax-transient="true"/><meta name="html-safe-nonce" content="197c7ea0e469f348441ae1b57341286063f5b7818962d226d9ec675695b2a606" data-pjax-transient="true"/><meta name="visitor-payload" content="eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiI4NDU4OjFERTNFNjoxMjQyM0M6MTdFQTQzOjY3RTk5RTI1IiwidmlzaXRvcl9pZCI6IjM4MTkyNDEyNzEwNDEwMzk5MDkiLCJyZWdpb25fZWRnZSI6InNvdXRoZWFzdGFzaWEiLCJyZWdpb25fcmVuZGVyIjoic291dGhlYXN0YXNpYSJ9" data-pjax-transient="true"/><meta name="visitor-hmac" content="d545da07c630667e2d4e7b2efe3362f25a15a610f83ed11370d3233e92d06ea9" data-pjax-transient="true"/> <meta name="hovercard-subject-tag" content="repository:223063470" data-turbo-transient> <meta name="github-keyboard-shortcuts" content="repository,copilot" data-turbo-transient="true" /> <meta name="selected-link" value="repo_source" data-turbo-transient> <link rel="assets" href="https://github.githubassets.com/"> <meta name="google-site-verification" content="Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I"> <meta name="octolytics-url" content="https://collector.github.com/github/collect" /> <meta name="analytics-location" content="/&lt;user-name&gt;/&lt;repo-name&gt;" data-turbo-transient="true" /> <meta name="user-login" content=""> <meta name="viewport" content="width=device-width"> <meta name="description" content="(!!! Github shows less than 4000 lines, and more than 5000 lines is missing. Please download Readme.md and open it in markdown viewer to review the FULL version)[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version. - fengjixuchui/awesome-cyber-security"> <link rel="search" type="application/opensearchdescription+xml" href="/opensearch.xml" title="GitHub"> <link rel="fluid-icon" href="https://github.com/fluidicon.png" title="GitHub"> <meta property="fb:app_id" content="1401488693436528"> <meta name="apple-itunes-app" content="app-id=1477376905, app-argument=https://github.com/fengjixuchui/awesome-cyber-security" /> <meta name="twitter:image" content="https://opengraph.githubassets.com/69a74522e8e631b83752025194e2370077d4842c8e288ce9176ab0d9b12648d5/fengjixuchui/awesome-cyber-security" /><meta name="twitter:site" content="@github" /><meta name="twitter:card" content="summary_large_image" /><meta name="twitter:title" content="GitHub - fengjixuchui/awesome-cyber-security: (!!! Github shows less than 4000 lines, and more than 5000 lines is missing. Please download Readme.md and open it in markdown viewer to review the FULL version)[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version." /><meta name="twitter:description" content="(!!! Github shows less than 4000 lines, and more than 5000 lines is missing. Please download Readme.md and open it in markdown viewer to review the FULL version)[Draft]Awesome Cyber Security Resour..." /> <meta property="og:image" content="https://opengraph.githubassets.com/69a74522e8e631b83752025194e2370077d4842c8e288ce9176ab0d9b12648d5/fengjixuchui/awesome-cyber-security" /><meta property="og:image:alt" content="(!!! Github shows less than 4000 lines, and more than 5000 lines is missing. Please download Readme.md and open it in markdown viewer to review the FULL version)[Draft]Awesome Cyber Security Resour..." /><meta property="og:image:width" content="1200" /><meta property="og:image:height" content="600" /><meta property="og:site_name" content="GitHub" /><meta property="og:type" content="object" /><meta property="og:title" content="GitHub - fengjixuchui/awesome-cyber-security: (!!! Github shows less than 4000 lines, and more than 5000 lines is missing. Please download Readme.md and open it in markdown viewer to review the FULL version)[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version." /><meta property="og:url" content="https://github.com/fengjixuchui/awesome-cyber-security" /><meta property="og:description" content="(!!! Github shows less than 4000 lines, and more than 5000 lines is missing. Please download Readme.md and open it in markdown viewer to review the FULL version)[Draft]Awesome Cyber Security Resour..." /> <meta name="hostname" content="github.com"> <meta name="expected-hostname" content="github.com"> <meta http-equiv="x-pjax-version" content="154e3ed6ec9e0d6fff5da6846be55e3cefb81f7aa557cdcfe2a45d929fc158d2" data-turbo-track="reload"> <meta http-equiv="x-pjax-csp-version" content="e26f9f0ba624ee85cc7ac057d8faa8618a4f25a85eab052c33d018ac0f6b1a46" data-turbo-track="reload"> <meta http-equiv="x-pjax-css-version" content="159e03504eed5183f9787c72780a7d8c1460af30746ab09d728b048c41719efa" data-turbo-track="reload"> <meta http-equiv="x-pjax-js-version" content="3ef84064f1c111becc704df35223db168ecae977ac2d9ec422601ed98490e586" data-turbo-track="reload"> <meta name="turbo-cache-control" content="no-preview" data-turbo-transient=""> <meta data-hydrostats="publish"> <meta name="go-import" content="github.com/fengjixuchui/awesome-cyber-security git https://github.com/fengjixuchui/awesome-cyber-security.git"> <meta name="octolytics-dimension-user_id" content="2487206" /><meta name="octolytics-dimension-user_login" content="fengjixuchui" /><meta name="octolytics-dimension-repository_id" content="223063470" /><meta name="octolytics-dimension-repository_nwo" content="fengjixuchui/awesome-cyber-security" /><meta name="octolytics-dimension-repository_public" content="true" /><meta name="octolytics-dimension-repository_is_fork" content="false" /><meta name="octolytics-dimension-repository_network_root_id" content="223063470" /><meta name="octolytics-dimension-repository_network_root_nwo" content="fengjixuchui/awesome-cyber-security" /> <link rel="canonical" href="https://github.com/fengjixuchui/awesome-cyber-security" data-turbo-transient> <meta name="turbo-body-classes" content="logged-out env-production page-responsive"> <meta name="browser-stats-url" content="https://api.github.com/_private/browser/stats"> <meta name="browser-errors-url" content="https://api.github.com/_private/browser/errors"> <meta name="release" content="e4df4c5836d283ae011f7e3d74c48a4a579478a3"> <link rel="mask-icon" href="https://github.githubassets.com/assets/pinned-octocat-093da3e6fa40.svg" color="#000000"> <link rel="alternate icon" class="js-site-favicon" type="image/png" href="https://github.githubassets.com/favicons/favicon.png"> <link rel="icon" class="js-site-favicon" type="image/svg+xml" href="https://github.githubassets.com/favicons/favicon.svg" data-base-href="https://github.githubassets.com/favicons/favicon"> <meta name="theme-color" content="#1e2327"> <meta name="color-scheme" content="light dark" /> <link rel="manifest" href="/manifest.json" crossOrigin="use-credentials"> </head> <body class="logged-out env-production page-responsive" style="word-wrap: break-word;"> <div data-turbo-body class="logged-out env-production page-responsive" style="word-wrap: break-word;"> <div class="position-relative header-wrapper js-header-wrapper "> <a href="#start-of-content" data-skip-target-assigned="false" class="px-2 py-4 color-bg-accent-emphasis color-fg-on-emphasis show-on-focus js-skip-to-content">Skip to content</a> <span data-view-component="true" class="progress-pjax-loader Progress position-fixed width-full"> <span style="width: 0%;" data-view-component="true" class="Progress-item progress-pjax-loader-bar left-0 top-0 color-bg-accent-emphasis"></span> </span> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/ui_packages_ui-commands_ui-commands_ts-2ea4e93613c0.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/keyboard-shortcuts-dialog-79d6a754ebf9.js"></script> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/primer-react.8157a56b30ae88a1b356.module.css" /> <react-partial partial-name="keyboard-shortcuts-dialog" data-ssr="false" data-attempted-ssr="false" > <script type="application/json" data-target="react-partial.embeddedData">{"props":{"docsUrl":"https://docs.github.com/get-started/accessibility/keyboard-shortcuts"}}</script> <div data-target="react-partial.reactRoot"></div> </react-partial> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_remote-form_dist_index_js-node_modules_delegated-events_dist_inde-94fd67-4898d1bf4b51.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/sessions-730dca81d0a2.js"></script> <header class="HeaderMktg header-logged-out js-details-container js-header Details f4 py-3" role="banner" data-is-top="true" data-color-mode=light data-light-theme=light data-dark-theme=dark> <h2 class="sr-only">Navigation Menu</h2> <button type="button" class="HeaderMktg-backdrop d-lg-none border-0 position-fixed top-0 left-0 width-full height-full js-details-target" aria-label="Toggle navigation"> <span class="d-none">Toggle navigation</span> </button> <div class="d-flex flex-column flex-lg-row flex-items-center px-3 px-md-4 px-lg-5 height-full position-relative z-1"> <div class="d-flex flex-justify-between flex-items-center width-full width-lg-auto"> <div class="flex-1"> <button aria-label="Toggle navigation" aria-expanded="false" type="button" data-view-component="true" class="js-details-target js-nav-padding-recalculate js-header-menu-toggle Button--link Button--medium Button d-lg-none color-fg-inherit p-1"> <span class="Button-content"> <span class="Button-label"><div class="HeaderMenu-toggle-bar rounded my-1"></div> <div class="HeaderMenu-toggle-bar rounded my-1"></div> <div class="HeaderMenu-toggle-bar rounded my-1"></div></span> </span> </button> </div> <a class="mr-lg-3 color-fg-inherit flex-order-2 js-prevent-focus-on-mobile-nav" href="/" aria-label="Homepage" data-analytics-event="{&quot;category&quot;:&quot;Marketing nav&quot;,&quot;action&quot;:&quot;click to go to homepage&quot;,&quot;label&quot;:&quot;ref_page:Marketing;ref_cta:Logomark;ref_loc:Header&quot;}"> <svg height="32" aria-hidden="true" viewBox="0 0 24 24" version="1.1" width="32" data-view-component="true" class="octicon octicon-mark-github"> <path d="M12 1C5.9225 1 1 5.9225 1 12C1 16.8675 4.14875 20.9787 8.52125 22.4362C9.07125 22.5325 9.2775 22.2025 9.2775 21.9137C9.2775 21.6525 9.26375 20.7862 9.26375 19.865C6.5 20.3737 5.785 19.1912 5.565 18.5725C5.44125 18.2562 4.905 17.28 4.4375 17.0187C4.0525 16.8125 3.5025 16.3037 4.42375 16.29C5.29 16.2762 5.90875 17.0875 6.115 17.4175C7.105 19.0812 8.68625 18.6137 9.31875 18.325C9.415 17.61 9.70375 17.1287 10.02 16.8537C7.5725 16.5787 5.015 15.63 5.015 11.4225C5.015 10.2262 5.44125 9.23625 6.1425 8.46625C6.0325 8.19125 5.6475 7.06375 6.2525 5.55125C6.2525 5.55125 7.17375 5.2625 9.2775 6.67875C10.1575 6.43125 11.0925 6.3075 12.0275 6.3075C12.9625 6.3075 13.8975 6.43125 14.7775 6.67875C16.8813 5.24875 17.8025 5.55125 17.8025 5.55125C18.4075 7.06375 18.0225 8.19125 17.9125 8.46625C18.6138 9.23625 19.04 10.2125 19.04 11.4225C19.04 15.6437 16.4688 16.5787 14.0213 16.8537C14.42 17.1975 14.7638 17.8575 14.7638 18.8887C14.7638 20.36 14.75 21.5425 14.75 21.9137C14.75 22.2025 14.9563 22.5462 15.5063 22.4362C19.8513 20.9787 23 16.8537 23 12C23 5.9225 18.0775 1 12 1Z"></path> </svg> </a> <div class="flex-1 flex-order-2 text-right"> <a href="/login?return_to=https%3A%2F%2Fgithub.com%2Ffengjixuchui%2Fawesome-cyber-security" class="HeaderMenu-link HeaderMenu-button d-inline-flex d-lg-none flex-order-1 f5 no-underline border color-border-default rounded-2 px-2 py-1 color-fg-inherit js-prevent-focus-on-mobile-nav" data-hydro-click="{&quot;event_type&quot;:&quot;authentication.click&quot;,&quot;payload&quot;:{&quot;location_in_page&quot;:&quot;site header menu&quot;,&quot;repository_id&quot;:null,&quot;auth_type&quot;:&quot;SIGN_UP&quot;,&quot;originating_url&quot;:&quot;https://github.com/fengjixuchui/awesome-cyber-security&quot;,&quot;user_id&quot;:null}}" data-hydro-click-hmac="c412579df63c6d7e84e2977536b5f4958724f406c30b826ab332fbb9a3060797" data-analytics-event="{&quot;category&quot;:&quot;Marketing nav&quot;,&quot;action&quot;:&quot;click to Sign in&quot;,&quot;label&quot;:&quot;ref_page:Marketing;ref_cta:Sign in;ref_loc:Header&quot;}" > Sign in </a> </div> </div> <div class="HeaderMenu js-header-menu height-fit position-lg-relative d-lg-flex flex-column flex-auto top-0"> <div class="HeaderMenu-wrapper d-flex flex-column flex-self-start flex-lg-row flex-auto rounded rounded-lg-0"> <nav class="HeaderMenu-nav" aria-label="Global"> <ul class="d-lg-flex list-style-none"> <li class="HeaderMenu-item position-relative flex-wrap flex-justify-between flex-items-center d-block d-lg-flex flex-lg-nowrap flex-lg-items-center js-details-container js-header-menu-item"> <button type="button" class="HeaderMenu-link border-0 width-full width-lg-auto px-0 px-lg-2 py-lg-2 no-wrap d-flex flex-items-center flex-justify-between js-details-target" aria-expanded="false"> Product <svg opacity="0.5" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-chevron-down HeaderMenu-icon ml-1"> <path d="M12.78 5.22a.749.749 0 0 1 0 1.06l-4.25 4.25a.749.749 0 0 1-1.06 0L3.22 6.28a.749.749 0 1 1 1.06-1.06L8 8.939l3.72-3.719a.749.749 0 0 1 1.06 0Z"></path> </svg> </button> <div class="HeaderMenu-dropdown dropdown-menu rounded m-0 p-0 pt-2 pt-lg-4 position-relative position-lg-absolute left-0 left-lg-n3 pb-2 pb-lg-4 d-lg-flex flex-wrap dropdown-menu-wide"> <div class="HeaderMenu-column px-lg-4 border-lg-right mb-4 mb-lg-0 pr-lg-7"> <div class="border-bottom pb-3 pb-lg-0 border-lg-bottom-0"> <ul class="list-style-none f5" > <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary d-flex flex-items-center Link--has-description pb-lg-3" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;github_copilot&quot;,&quot;context&quot;:&quot;product&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;github_copilot_link_product_navbar&quot;}" href="https://github.com/features/copilot"> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-copilot color-fg-subtle mr-3"> <path d="M23.922 16.992c-.861 1.495-5.859 5.023-11.922 5.023-6.063 0-11.061-3.528-11.922-5.023A.641.641 0 0 1 0 16.736v-2.869a.841.841 0 0 1 .053-.22c.372-.935 1.347-2.292 2.605-2.656.167-.429.414-1.055.644-1.517a10.195 10.195 0 0 1-.052-1.086c0-1.331.282-2.499 1.132-3.368.397-.406.89-.717 1.474-.952 1.399-1.136 3.392-2.093 6.122-2.093 2.731 0 4.767.957 6.166 2.093.584.235 1.077.546 1.474.952.85.869 1.132 2.037 1.132 3.368 0 .368-.014.733-.052 1.086.23.462.477 1.088.644 1.517 1.258.364 2.233 1.721 2.605 2.656a.832.832 0 0 1 .053.22v2.869a.641.641 0 0 1-.078.256ZM12.172 11h-.344a4.323 4.323 0 0 1-.355.508C10.703 12.455 9.555 13 7.965 13c-1.725 0-2.989-.359-3.782-1.259a2.005 2.005 0 0 1-.085-.104L4 11.741v6.585c1.435.779 4.514 2.179 8 2.179 3.486 0 6.565-1.4 8-2.179v-6.585l-.098-.104s-.033.045-.085.104c-.793.9-2.057 1.259-3.782 1.259-1.59 0-2.738-.545-3.508-1.492a4.323 4.323 0 0 1-.355-.508h-.016.016Zm.641-2.935c.136 1.057.403 1.913.878 2.497.442.544 1.134.938 2.344.938 1.573 0 2.292-.337 2.657-.751.384-.435.558-1.15.558-2.361 0-1.14-.243-1.847-.705-2.319-.477-.488-1.319-.862-2.824-1.025-1.487-.161-2.192.138-2.533.529-.269.307-.437.808-.438 1.578v.021c0 .265.021.562.063.893Zm-1.626 0c.042-.331.063-.628.063-.894v-.02c-.001-.77-.169-1.271-.438-1.578-.341-.391-1.046-.69-2.533-.529-1.505.163-2.347.537-2.824 1.025-.462.472-.705 1.179-.705 2.319 0 1.211.175 1.926.558 2.361.365.414 1.084.751 2.657.751 1.21 0 1.902-.394 2.344-.938.475-.584.742-1.44.878-2.497Z"></path><path d="M14.5 14.25a1 1 0 0 1 1 1v2a1 1 0 0 1-2 0v-2a1 1 0 0 1 1-1Zm-5 0a1 1 0 0 1 1 1v2a1 1 0 0 1-2 0v-2a1 1 0 0 1 1-1Z"></path> </svg> <div> <div class="color-fg-default h4">GitHub Copilot</div> Write better code with AI </div> </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary d-flex flex-items-center Link--has-description pb-lg-3" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;security&quot;,&quot;context&quot;:&quot;product&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;security_link_product_navbar&quot;}" href="https://github.com/features/security"> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-shield-check color-fg-subtle mr-3"> <path d="M16.53 9.78a.75.75 0 0 0-1.06-1.06L11 13.19l-1.97-1.97a.75.75 0 0 0-1.06 1.06l2.5 2.5a.75.75 0 0 0 1.06 0l5-5Z"></path><path d="m12.54.637 8.25 2.675A1.75 1.75 0 0 1 22 4.976V10c0 6.19-3.771 10.704-9.401 12.83a1.704 1.704 0 0 1-1.198 0C5.77 20.705 2 16.19 2 10V4.976c0-.758.489-1.43 1.21-1.664L11.46.637a1.748 1.748 0 0 1 1.08 0Zm-.617 1.426-8.25 2.676a.249.249 0 0 0-.173.237V10c0 5.46 3.28 9.483 8.43 11.426a.199.199 0 0 0 .14 0C17.22 19.483 20.5 15.461 20.5 10V4.976a.25.25 0 0 0-.173-.237l-8.25-2.676a.253.253 0 0 0-.154 0Z"></path> </svg> <div> <div class="color-fg-default h4">Security</div> Find and fix vulnerabilities </div> </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary d-flex flex-items-center Link--has-description pb-lg-3" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;actions&quot;,&quot;context&quot;:&quot;product&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;actions_link_product_navbar&quot;}" href="https://github.com/features/actions"> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-workflow color-fg-subtle mr-3"> <path d="M1 3a2 2 0 0 1 2-2h6.5a2 2 0 0 1 2 2v6.5a2 2 0 0 1-2 2H7v4.063C7 16.355 7.644 17 8.438 17H12.5v-2.5a2 2 0 0 1 2-2H21a2 2 0 0 1 2 2V21a2 2 0 0 1-2 2h-6.5a2 2 0 0 1-2-2v-2.5H8.437A2.939 2.939 0 0 1 5.5 15.562V11.5H3a2 2 0 0 1-2-2Zm2-.5a.5.5 0 0 0-.5.5v6.5a.5.5 0 0 0 .5.5h6.5a.5.5 0 0 0 .5-.5V3a.5.5 0 0 0-.5-.5ZM14.5 14a.5.5 0 0 0-.5.5V21a.5.5 0 0 0 .5.5H21a.5.5 0 0 0 .5-.5v-6.5a.5.5 0 0 0-.5-.5Z"></path> </svg> <div> <div class="color-fg-default h4">Actions</div> Automate any workflow </div> </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary d-flex flex-items-center Link--has-description pb-lg-3" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;codespaces&quot;,&quot;context&quot;:&quot;product&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;codespaces_link_product_navbar&quot;}" href="https://github.com/features/codespaces"> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-codespaces color-fg-subtle mr-3"> <path d="M3.5 3.75C3.5 2.784 4.284 2 5.25 2h13.5c.966 0 1.75.784 1.75 1.75v7.5A1.75 1.75 0 0 1 18.75 13H5.25a1.75 1.75 0 0 1-1.75-1.75Zm-2 12c0-.966.784-1.75 1.75-1.75h17.5c.966 0 1.75.784 1.75 1.75v4a1.75 1.75 0 0 1-1.75 1.75H3.25a1.75 1.75 0 0 1-1.75-1.75ZM5.25 3.5a.25.25 0 0 0-.25.25v7.5c0 .138.112.25.25.25h13.5a.25.25 0 0 0 .25-.25v-7.5a.25.25 0 0 0-.25-.25Zm-2 12a.25.25 0 0 0-.25.25v4c0 .138.112.25.25.25h17.5a.25.25 0 0 0 .25-.25v-4a.25.25 0 0 0-.25-.25Z"></path><path d="M10 17.75a.75.75 0 0 1 .75-.75h6.5a.75.75 0 0 1 0 1.5h-6.5a.75.75 0 0 1-.75-.75Zm-4 0a.75.75 0 0 1 .75-.75h.5a.75.75 0 0 1 0 1.5h-.5a.75.75 0 0 1-.75-.75Z"></path> </svg> <div> <div class="color-fg-default h4">Codespaces</div> Instant dev environments </div> </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary d-flex flex-items-center Link--has-description pb-lg-3" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;issues&quot;,&quot;context&quot;:&quot;product&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;issues_link_product_navbar&quot;}" href="https://github.com/features/issues"> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-issue-opened color-fg-subtle mr-3"> <path d="M12 1c6.075 0 11 4.925 11 11s-4.925 11-11 11S1 18.075 1 12 5.925 1 12 1ZM2.5 12a9.5 9.5 0 0 0 9.5 9.5 9.5 9.5 0 0 0 9.5-9.5A9.5 9.5 0 0 0 12 2.5 9.5 9.5 0 0 0 2.5 12Zm9.5 2a2 2 0 1 1-.001-3.999A2 2 0 0 1 12 14Z"></path> </svg> <div> <div class="color-fg-default h4">Issues</div> Plan and track work </div> </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary d-flex flex-items-center Link--has-description pb-lg-3" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;code_review&quot;,&quot;context&quot;:&quot;product&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;code_review_link_product_navbar&quot;}" href="https://github.com/features/code-review"> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-code-review color-fg-subtle mr-3"> <path d="M10.3 6.74a.75.75 0 0 1-.04 1.06l-2.908 2.7 2.908 2.7a.75.75 0 1 1-1.02 1.1l-3.5-3.25a.75.75 0 0 1 0-1.1l3.5-3.25a.75.75 0 0 1 1.06.04Zm3.44 1.06a.75.75 0 1 1 1.02-1.1l3.5 3.25a.75.75 0 0 1 0 1.1l-3.5 3.25a.75.75 0 1 1-1.02-1.1l2.908-2.7-2.908-2.7Z"></path><path d="M1.5 4.25c0-.966.784-1.75 1.75-1.75h17.5c.966 0 1.75.784 1.75 1.75v12.5a1.75 1.75 0 0 1-1.75 1.75h-9.69l-3.573 3.573A1.458 1.458 0 0 1 5 21.043V18.5H3.25a1.75 1.75 0 0 1-1.75-1.75ZM3.25 4a.25.25 0 0 0-.25.25v12.5c0 .138.112.25.25.25h2.5a.75.75 0 0 1 .75.75v3.19l3.72-3.72a.749.749 0 0 1 .53-.22h10a.25.25 0 0 0 .25-.25V4.25a.25.25 0 0 0-.25-.25Z"></path> </svg> <div> <div class="color-fg-default h4">Code Review</div> Manage code changes </div> </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary d-flex flex-items-center Link--has-description pb-lg-3" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;discussions&quot;,&quot;context&quot;:&quot;product&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;discussions_link_product_navbar&quot;}" href="https://github.com/features/discussions"> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-comment-discussion color-fg-subtle mr-3"> <path d="M1.75 1h12.5c.966 0 1.75.784 1.75 1.75v9.5A1.75 1.75 0 0 1 14.25 14H8.061l-2.574 2.573A1.458 1.458 0 0 1 3 15.543V14H1.75A1.75 1.75 0 0 1 0 12.25v-9.5C0 1.784.784 1 1.75 1ZM1.5 2.75v9.5c0 .138.112.25.25.25h2a.75.75 0 0 1 .75.75v2.19l2.72-2.72a.749.749 0 0 1 .53-.22h6.5a.25.25 0 0 0 .25-.25v-9.5a.25.25 0 0 0-.25-.25H1.75a.25.25 0 0 0-.25.25Z"></path><path d="M22.5 8.75a.25.25 0 0 0-.25-.25h-3.5a.75.75 0 0 1 0-1.5h3.5c.966 0 1.75.784 1.75 1.75v9.5A1.75 1.75 0 0 1 22.25 20H21v1.543a1.457 1.457 0 0 1-2.487 1.03L15.939 20H10.75A1.75 1.75 0 0 1 9 18.25v-1.465a.75.75 0 0 1 1.5 0v1.465c0 .138.112.25.25.25h5.5a.75.75 0 0 1 .53.22l2.72 2.72v-2.19a.75.75 0 0 1 .75-.75h2a.25.25 0 0 0 .25-.25v-9.5Z"></path> </svg> <div> <div class="color-fg-default h4">Discussions</div> Collaborate outside of code </div> </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary d-flex flex-items-center Link--has-description" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;code_search&quot;,&quot;context&quot;:&quot;product&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;code_search_link_product_navbar&quot;}" href="https://github.com/features/code-search"> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-code-square color-fg-subtle mr-3"> <path d="M10.3 8.24a.75.75 0 0 1-.04 1.06L7.352 12l2.908 2.7a.75.75 0 1 1-1.02 1.1l-3.5-3.25a.75.75 0 0 1 0-1.1l3.5-3.25a.75.75 0 0 1 1.06.04Zm3.44 1.06a.75.75 0 1 1 1.02-1.1l3.5 3.25a.75.75 0 0 1 0 1.1l-3.5 3.25a.75.75 0 1 1-1.02-1.1l2.908-2.7-2.908-2.7Z"></path><path d="M2 3.75C2 2.784 2.784 2 3.75 2h16.5c.966 0 1.75.784 1.75 1.75v16.5A1.75 1.75 0 0 1 20.25 22H3.75A1.75 1.75 0 0 1 2 20.25Zm1.75-.25a.25.25 0 0 0-.25.25v16.5c0 .138.112.25.25.25h16.5a.25.25 0 0 0 .25-.25V3.75a.25.25 0 0 0-.25-.25Z"></path> </svg> <div> <div class="color-fg-default h4">Code Search</div> Find more, search less </div> </a></li> </ul> </div> </div> <div class="HeaderMenu-column px-lg-4"> <div class="border-bottom pb-3 pb-lg-0 border-lg-bottom-0 border-bottom-0"> <span class="d-block h4 color-fg-default my-1" id="product-explore-heading">Explore</span> <ul class="list-style-none f5" aria-labelledby="product-explore-heading"> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;all_features&quot;,&quot;context&quot;:&quot;product&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;all_features_link_product_navbar&quot;}" href="https://github.com/features"> All features </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary Link--external" target="_blank" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;documentation&quot;,&quot;context&quot;:&quot;product&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;documentation_link_product_navbar&quot;}" href="https://docs.github.com"> Documentation <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path> </svg> </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary Link--external" target="_blank" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;github_skills&quot;,&quot;context&quot;:&quot;product&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;github_skills_link_product_navbar&quot;}" href="https://skills.github.com"> GitHub Skills <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path> </svg> </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary Link--external" target="_blank" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;blog&quot;,&quot;context&quot;:&quot;product&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;blog_link_product_navbar&quot;}" href="https://github.blog"> Blog <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path> </svg> </a></li> </ul> </div> </div> </div> </li> <li class="HeaderMenu-item position-relative flex-wrap flex-justify-between flex-items-center d-block d-lg-flex flex-lg-nowrap flex-lg-items-center js-details-container js-header-menu-item"> <button type="button" class="HeaderMenu-link border-0 width-full width-lg-auto px-0 px-lg-2 py-lg-2 no-wrap d-flex flex-items-center flex-justify-between js-details-target" aria-expanded="false"> Solutions <svg opacity="0.5" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-chevron-down HeaderMenu-icon ml-1"> <path d="M12.78 5.22a.749.749 0 0 1 0 1.06l-4.25 4.25a.749.749 0 0 1-1.06 0L3.22 6.28a.749.749 0 1 1 1.06-1.06L8 8.939l3.72-3.719a.749.749 0 0 1 1.06 0Z"></path> </svg> </button> <div class="HeaderMenu-dropdown dropdown-menu rounded m-0 p-0 pt-2 pt-lg-4 position-relative position-lg-absolute left-0 left-lg-n3 d-lg-flex flex-wrap dropdown-menu-wide"> <div class="HeaderMenu-column px-lg-4 border-lg-right mb-4 mb-lg-0 pr-lg-7"> <div class="border-bottom pb-3 pb-lg-0 border-lg-bottom-0 pb-lg-3 mb-3 mb-lg-0"> <span class="d-block h4 color-fg-default my-1" id="solutions-by-company-size-heading">By company size</span> <ul class="list-style-none f5" aria-labelledby="solutions-by-company-size-heading"> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;enterprises&quot;,&quot;context&quot;:&quot;solutions&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;enterprises_link_solutions_navbar&quot;}" href="https://github.com/enterprise"> Enterprises </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;small_and_medium_teams&quot;,&quot;context&quot;:&quot;solutions&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;small_and_medium_teams_link_solutions_navbar&quot;}" href="https://github.com/team"> Small and medium teams </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;startups&quot;,&quot;context&quot;:&quot;solutions&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;startups_link_solutions_navbar&quot;}" href="https://github.com/enterprise/startups"> Startups </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;nonprofits&quot;,&quot;context&quot;:&quot;solutions&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;nonprofits_link_solutions_navbar&quot;}" href="/solutions/industry/nonprofits"> Nonprofits </a></li> </ul> </div> <div class="border-bottom pb-3 pb-lg-0 border-lg-bottom-0"> <span class="d-block h4 color-fg-default my-1" id="solutions-by-use-case-heading">By use case</span> <ul class="list-style-none f5" aria-labelledby="solutions-by-use-case-heading"> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;devsecops&quot;,&quot;context&quot;:&quot;solutions&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;devsecops_link_solutions_navbar&quot;}" href="/solutions/use-case/devsecops"> DevSecOps </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;devops&quot;,&quot;context&quot;:&quot;solutions&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;devops_link_solutions_navbar&quot;}" href="/solutions/use-case/devops"> DevOps </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;ci_cd&quot;,&quot;context&quot;:&quot;solutions&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;ci_cd_link_solutions_navbar&quot;}" href="/solutions/use-case/ci-cd"> CI/CD </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;view_all_use_cases&quot;,&quot;context&quot;:&quot;solutions&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;view_all_use_cases_link_solutions_navbar&quot;}" href="/solutions/use-case"> View all use cases </a></li> </ul> </div> </div> <div class="HeaderMenu-column px-lg-4"> <div class="border-bottom pb-3 pb-lg-0 border-lg-bottom-0"> <span class="d-block h4 color-fg-default my-1" id="solutions-by-industry-heading">By industry</span> <ul class="list-style-none f5" aria-labelledby="solutions-by-industry-heading"> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;healthcare&quot;,&quot;context&quot;:&quot;solutions&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;healthcare_link_solutions_navbar&quot;}" href="/solutions/industry/healthcare"> Healthcare </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;financial_services&quot;,&quot;context&quot;:&quot;solutions&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;financial_services_link_solutions_navbar&quot;}" href="/solutions/industry/financial-services"> Financial services </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;manufacturing&quot;,&quot;context&quot;:&quot;solutions&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;manufacturing_link_solutions_navbar&quot;}" href="/solutions/industry/manufacturing"> Manufacturing </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;government&quot;,&quot;context&quot;:&quot;solutions&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;government_link_solutions_navbar&quot;}" href="/solutions/industry/government"> Government </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;view_all_industries&quot;,&quot;context&quot;:&quot;solutions&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;view_all_industries_link_solutions_navbar&quot;}" href="/solutions/industry"> View all industries </a></li> </ul> </div> </div> <div class="HeaderMenu-trailing-link rounded-bottom-2 flex-shrink-0 mt-lg-4 px-lg-4 py-4 py-lg-3 f5 text-semibold"> <a href="/solutions"> View all solutions <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-chevron-right HeaderMenu-trailing-link-icon"> <path d="M6.22 3.22a.75.75 0 0 1 1.06 0l4.25 4.25a.75.75 0 0 1 0 1.06l-4.25 4.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042L9.94 8 6.22 4.28a.75.75 0 0 1 0-1.06Z"></path> </svg> </a> </div> </div> </li> <li class="HeaderMenu-item position-relative flex-wrap flex-justify-between flex-items-center d-block d-lg-flex flex-lg-nowrap flex-lg-items-center js-details-container js-header-menu-item"> <button type="button" class="HeaderMenu-link border-0 width-full width-lg-auto px-0 px-lg-2 py-lg-2 no-wrap d-flex flex-items-center flex-justify-between js-details-target" aria-expanded="false"> Resources <svg opacity="0.5" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-chevron-down HeaderMenu-icon ml-1"> <path d="M12.78 5.22a.749.749 0 0 1 0 1.06l-4.25 4.25a.749.749 0 0 1-1.06 0L3.22 6.28a.749.749 0 1 1 1.06-1.06L8 8.939l3.72-3.719a.749.749 0 0 1 1.06 0Z"></path> </svg> </button> <div class="HeaderMenu-dropdown dropdown-menu rounded m-0 p-0 pt-2 pt-lg-4 position-relative position-lg-absolute left-0 left-lg-n3 pb-2 pb-lg-4 d-lg-flex flex-wrap dropdown-menu-wide"> <div class="HeaderMenu-column px-lg-4 border-lg-right mb-4 mb-lg-0 pr-lg-7"> <div class="border-bottom pb-3 pb-lg-0 border-lg-bottom-0"> <span class="d-block h4 color-fg-default my-1" id="resources-topics-heading">Topics</span> <ul class="list-style-none f5" aria-labelledby="resources-topics-heading"> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;ai&quot;,&quot;context&quot;:&quot;resources&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;ai_link_resources_navbar&quot;}" href="/resources/articles/ai"> AI </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;devops&quot;,&quot;context&quot;:&quot;resources&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;devops_link_resources_navbar&quot;}" href="/resources/articles/devops"> DevOps </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;security&quot;,&quot;context&quot;:&quot;resources&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;security_link_resources_navbar&quot;}" href="/resources/articles/security"> Security </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;software_development&quot;,&quot;context&quot;:&quot;resources&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;software_development_link_resources_navbar&quot;}" href="/resources/articles/software-development"> Software Development </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;view_all&quot;,&quot;context&quot;:&quot;resources&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;view_all_link_resources_navbar&quot;}" href="/resources/articles"> View all </a></li> </ul> </div> </div> <div class="HeaderMenu-column px-lg-4"> <div class="border-bottom pb-3 pb-lg-0 border-lg-bottom-0 border-bottom-0"> <span class="d-block h4 color-fg-default my-1" id="resources-explore-heading">Explore</span> <ul class="list-style-none f5" aria-labelledby="resources-explore-heading"> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary Link--external" target="_blank" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;learning_pathways&quot;,&quot;context&quot;:&quot;resources&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;learning_pathways_link_resources_navbar&quot;}" href="https://resources.github.com/learn/pathways"> Learning Pathways <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path> </svg> </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary Link--external" target="_blank" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;events_amp_webinars&quot;,&quot;context&quot;:&quot;resources&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;events_amp_webinars_link_resources_navbar&quot;}" href="https://resources.github.com"> Events &amp; Webinars <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path> </svg> </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;ebooks_amp_whitepapers&quot;,&quot;context&quot;:&quot;resources&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;ebooks_amp_whitepapers_link_resources_navbar&quot;}" href="https://github.com/resources/whitepapers"> Ebooks &amp; Whitepapers </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;customer_stories&quot;,&quot;context&quot;:&quot;resources&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;customer_stories_link_resources_navbar&quot;}" href="https://github.com/customer-stories"> Customer Stories </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary Link--external" target="_blank" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;partners&quot;,&quot;context&quot;:&quot;resources&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;partners_link_resources_navbar&quot;}" href="https://partner.github.com"> Partners <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path> </svg> </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;executive_insights&quot;,&quot;context&quot;:&quot;resources&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;executive_insights_link_resources_navbar&quot;}" href="https://github.com/solutions/executive-insights"> Executive Insights </a></li> </ul> </div> </div> </div> </li> <li class="HeaderMenu-item position-relative flex-wrap flex-justify-between flex-items-center d-block d-lg-flex flex-lg-nowrap flex-lg-items-center js-details-container js-header-menu-item"> <button type="button" class="HeaderMenu-link border-0 width-full width-lg-auto px-0 px-lg-2 py-lg-2 no-wrap d-flex flex-items-center flex-justify-between js-details-target" aria-expanded="false"> Open Source <svg opacity="0.5" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-chevron-down HeaderMenu-icon ml-1"> <path d="M12.78 5.22a.749.749 0 0 1 0 1.06l-4.25 4.25a.749.749 0 0 1-1.06 0L3.22 6.28a.749.749 0 1 1 1.06-1.06L8 8.939l3.72-3.719a.749.749 0 0 1 1.06 0Z"></path> </svg> </button> <div class="HeaderMenu-dropdown dropdown-menu rounded m-0 p-0 pt-2 pt-lg-4 position-relative position-lg-absolute left-0 left-lg-n3 pb-2 pb-lg-4 px-lg-4"> <div class="HeaderMenu-column"> <div class="border-bottom pb-3 pb-lg-0 pb-lg-3 mb-3 mb-lg-0 mb-lg-3"> <ul class="list-style-none f5" > <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary d-flex flex-items-center Link--has-description" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;github_sponsors&quot;,&quot;context&quot;:&quot;open_source&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;github_sponsors_link_open_source_navbar&quot;}" href="/sponsors"> <div> <div class="color-fg-default h4">GitHub Sponsors</div> Fund open source developers </div> </a></li> </ul> </div> <div class="border-bottom pb-3 pb-lg-0 pb-lg-3 mb-3 mb-lg-0 mb-lg-3"> <ul class="list-style-none f5" > <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary d-flex flex-items-center Link--has-description" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;the_readme_project&quot;,&quot;context&quot;:&quot;open_source&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;the_readme_project_link_open_source_navbar&quot;}" href="https://github.com/readme"> <div> <div class="color-fg-default h4">The ReadME Project</div> GitHub community articles </div> </a></li> </ul> </div> <div class="border-bottom pb-3 pb-lg-0 border-bottom-0"> <span class="d-block h4 color-fg-default my-1" id="open-source-repositories-heading">Repositories</span> <ul class="list-style-none f5" aria-labelledby="open-source-repositories-heading"> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;topics&quot;,&quot;context&quot;:&quot;open_source&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;topics_link_open_source_navbar&quot;}" href="https://github.com/topics"> Topics </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;trending&quot;,&quot;context&quot;:&quot;open_source&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;trending_link_open_source_navbar&quot;}" href="https://github.com/trending"> Trending </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;collections&quot;,&quot;context&quot;:&quot;open_source&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;collections_link_open_source_navbar&quot;}" href="https://github.com/collections"> Collections </a></li> </ul> </div> </div> </div> </li> <li class="HeaderMenu-item position-relative flex-wrap flex-justify-between flex-items-center d-block d-lg-flex flex-lg-nowrap flex-lg-items-center js-details-container js-header-menu-item"> <button type="button" class="HeaderMenu-link border-0 width-full width-lg-auto px-0 px-lg-2 py-lg-2 no-wrap d-flex flex-items-center flex-justify-between js-details-target" aria-expanded="false"> Enterprise <svg opacity="0.5" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-chevron-down HeaderMenu-icon ml-1"> <path d="M12.78 5.22a.749.749 0 0 1 0 1.06l-4.25 4.25a.749.749 0 0 1-1.06 0L3.22 6.28a.749.749 0 1 1 1.06-1.06L8 8.939l3.72-3.719a.749.749 0 0 1 1.06 0Z"></path> </svg> </button> <div class="HeaderMenu-dropdown dropdown-menu rounded m-0 p-0 pt-2 pt-lg-4 position-relative position-lg-absolute left-0 left-lg-n3 pb-2 pb-lg-4 px-lg-4"> <div class="HeaderMenu-column"> <div class="border-bottom pb-3 pb-lg-0 pb-lg-3 mb-3 mb-lg-0 mb-lg-3"> <ul class="list-style-none f5" > <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary d-flex flex-items-center Link--has-description" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;enterprise_platform&quot;,&quot;context&quot;:&quot;enterprise&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;enterprise_platform_link_enterprise_navbar&quot;}" href="/enterprise"> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-stack color-fg-subtle mr-3"> <path d="M11.063 1.456a1.749 1.749 0 0 1 1.874 0l8.383 5.316a1.751 1.751 0 0 1 0 2.956l-8.383 5.316a1.749 1.749 0 0 1-1.874 0L2.68 9.728a1.751 1.751 0 0 1 0-2.956Zm1.071 1.267a.25.25 0 0 0-.268 0L3.483 8.039a.25.25 0 0 0 0 .422l8.383 5.316a.25.25 0 0 0 .268 0l8.383-5.316a.25.25 0 0 0 0-.422Z"></path><path d="M1.867 12.324a.75.75 0 0 1 1.035-.232l8.964 5.685a.25.25 0 0 0 .268 0l8.964-5.685a.75.75 0 0 1 .804 1.267l-8.965 5.685a1.749 1.749 0 0 1-1.874 0l-8.965-5.685a.75.75 0 0 1-.231-1.035Z"></path><path d="M1.867 16.324a.75.75 0 0 1 1.035-.232l8.964 5.685a.25.25 0 0 0 .268 0l8.964-5.685a.75.75 0 0 1 .804 1.267l-8.965 5.685a1.749 1.749 0 0 1-1.874 0l-8.965-5.685a.75.75 0 0 1-.231-1.035Z"></path> </svg> <div> <div class="color-fg-default h4">Enterprise platform</div> AI-powered developer platform </div> </a></li> </ul> </div> <div class="border-bottom pb-3 pb-lg-0 border-bottom-0"> <span class="d-block h4 color-fg-default my-1" id="enterprise-available-add-ons-heading">Available add-ons</span> <ul class="list-style-none f5" aria-labelledby="enterprise-available-add-ons-heading"> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary d-flex flex-items-center Link--has-description pb-lg-3" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;advanced_security&quot;,&quot;context&quot;:&quot;enterprise&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;advanced_security_link_enterprise_navbar&quot;}" href="https://github.com/enterprise/advanced-security"> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-shield-check color-fg-subtle mr-3"> <path d="M16.53 9.78a.75.75 0 0 0-1.06-1.06L11 13.19l-1.97-1.97a.75.75 0 0 0-1.06 1.06l2.5 2.5a.75.75 0 0 0 1.06 0l5-5Z"></path><path d="m12.54.637 8.25 2.675A1.75 1.75 0 0 1 22 4.976V10c0 6.19-3.771 10.704-9.401 12.83a1.704 1.704 0 0 1-1.198 0C5.77 20.705 2 16.19 2 10V4.976c0-.758.489-1.43 1.21-1.664L11.46.637a1.748 1.748 0 0 1 1.08 0Zm-.617 1.426-8.25 2.676a.249.249 0 0 0-.173.237V10c0 5.46 3.28 9.483 8.43 11.426a.199.199 0 0 0 .14 0C17.22 19.483 20.5 15.461 20.5 10V4.976a.25.25 0 0 0-.173-.237l-8.25-2.676a.253.253 0 0 0-.154 0Z"></path> </svg> <div> <div class="color-fg-default h4">Advanced Security</div> Enterprise-grade security features </div> </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary d-flex flex-items-center Link--has-description pb-lg-3" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;copilot_for_business&quot;,&quot;context&quot;:&quot;enterprise&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;copilot_for_business_link_enterprise_navbar&quot;}" href="/features/copilot/copilot-business"> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-copilot color-fg-subtle mr-3"> <path d="M23.922 16.992c-.861 1.495-5.859 5.023-11.922 5.023-6.063 0-11.061-3.528-11.922-5.023A.641.641 0 0 1 0 16.736v-2.869a.841.841 0 0 1 .053-.22c.372-.935 1.347-2.292 2.605-2.656.167-.429.414-1.055.644-1.517a10.195 10.195 0 0 1-.052-1.086c0-1.331.282-2.499 1.132-3.368.397-.406.89-.717 1.474-.952 1.399-1.136 3.392-2.093 6.122-2.093 2.731 0 4.767.957 6.166 2.093.584.235 1.077.546 1.474.952.85.869 1.132 2.037 1.132 3.368 0 .368-.014.733-.052 1.086.23.462.477 1.088.644 1.517 1.258.364 2.233 1.721 2.605 2.656a.832.832 0 0 1 .053.22v2.869a.641.641 0 0 1-.078.256ZM12.172 11h-.344a4.323 4.323 0 0 1-.355.508C10.703 12.455 9.555 13 7.965 13c-1.725 0-2.989-.359-3.782-1.259a2.005 2.005 0 0 1-.085-.104L4 11.741v6.585c1.435.779 4.514 2.179 8 2.179 3.486 0 6.565-1.4 8-2.179v-6.585l-.098-.104s-.033.045-.085.104c-.793.9-2.057 1.259-3.782 1.259-1.59 0-2.738-.545-3.508-1.492a4.323 4.323 0 0 1-.355-.508h-.016.016Zm.641-2.935c.136 1.057.403 1.913.878 2.497.442.544 1.134.938 2.344.938 1.573 0 2.292-.337 2.657-.751.384-.435.558-1.15.558-2.361 0-1.14-.243-1.847-.705-2.319-.477-.488-1.319-.862-2.824-1.025-1.487-.161-2.192.138-2.533.529-.269.307-.437.808-.438 1.578v.021c0 .265.021.562.063.893Zm-1.626 0c.042-.331.063-.628.063-.894v-.02c-.001-.77-.169-1.271-.438-1.578-.341-.391-1.046-.69-2.533-.529-1.505.163-2.347.537-2.824 1.025-.462.472-.705 1.179-.705 2.319 0 1.211.175 1.926.558 2.361.365.414 1.084.751 2.657.751 1.21 0 1.902-.394 2.344-.938.475-.584.742-1.44.878-2.497Z"></path><path d="M14.5 14.25a1 1 0 0 1 1 1v2a1 1 0 0 1-2 0v-2a1 1 0 0 1 1-1Zm-5 0a1 1 0 0 1 1 1v2a1 1 0 0 1-2 0v-2a1 1 0 0 1 1-1Z"></path> </svg> <div> <div class="color-fg-default h4">Copilot for business</div> Enterprise-grade AI features </div> </a></li> <li> <a class="HeaderMenu-dropdown-link d-block no-underline position-relative py-2 Link--secondary d-flex flex-items-center Link--has-description" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;premium_support&quot;,&quot;context&quot;:&quot;enterprise&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;premium_support_link_enterprise_navbar&quot;}" href="/premium-support"> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-comment-discussion color-fg-subtle mr-3"> <path d="M1.75 1h12.5c.966 0 1.75.784 1.75 1.75v9.5A1.75 1.75 0 0 1 14.25 14H8.061l-2.574 2.573A1.458 1.458 0 0 1 3 15.543V14H1.75A1.75 1.75 0 0 1 0 12.25v-9.5C0 1.784.784 1 1.75 1ZM1.5 2.75v9.5c0 .138.112.25.25.25h2a.75.75 0 0 1 .75.75v2.19l2.72-2.72a.749.749 0 0 1 .53-.22h6.5a.25.25 0 0 0 .25-.25v-9.5a.25.25 0 0 0-.25-.25H1.75a.25.25 0 0 0-.25.25Z"></path><path d="M22.5 8.75a.25.25 0 0 0-.25-.25h-3.5a.75.75 0 0 1 0-1.5h3.5c.966 0 1.75.784 1.75 1.75v9.5A1.75 1.75 0 0 1 22.25 20H21v1.543a1.457 1.457 0 0 1-2.487 1.03L15.939 20H10.75A1.75 1.75 0 0 1 9 18.25v-1.465a.75.75 0 0 1 1.5 0v1.465c0 .138.112.25.25.25h5.5a.75.75 0 0 1 .53.22l2.72 2.72v-2.19a.75.75 0 0 1 .75-.75h2a.25.25 0 0 0 .25-.25v-9.5Z"></path> </svg> <div> <div class="color-fg-default h4">Premium Support</div> Enterprise-grade 24/7 support </div> </a></li> </ul> </div> </div> </div> </li> <li class="HeaderMenu-item position-relative flex-wrap flex-justify-between flex-items-center d-block d-lg-flex flex-lg-nowrap flex-lg-items-center js-details-container js-header-menu-item"> <a class="HeaderMenu-link no-underline px-0 px-lg-2 py-3 py-lg-2 d-block d-lg-inline-block" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;pricing&quot;,&quot;context&quot;:&quot;global&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;pricing_link_global_navbar&quot;}" href="https://github.com/pricing">Pricing</a> </li> </ul> </nav> <div class="d-flex flex-column flex-lg-row width-full flex-justify-end flex-lg-items-center text-center mt-3 mt-lg-0 text-lg-left ml-lg-3"> <qbsearch-input class="search-input" data-scope="repo:fengjixuchui/awesome-cyber-security" data-custom-scopes-path="/search/custom_scopes" data-delete-custom-scopes-csrf="Xu9k19F5SIorAJE5rN0IyOekuIwRjgmf3iA5c1GQk4S8CrKyaYwUg9igl9SjquH-GvBD4BPLSZHOrZVeXZ0q5A" data-max-custom-scopes="10" data-header-redesign-enabled="false" data-initial-value="" data-blackbird-suggestions-path="/search/suggestions" data-jump-to-suggestions-path="/_graphql/GetSuggestedNavigationDestinations" data-current-repository="fengjixuchui/awesome-cyber-security" data-current-org="" data-current-owner="fengjixuchui" data-logged-in="false" data-copilot-chat-enabled="false" data-nl-search-enabled="false" data-retain-scroll-position="true"> <div class="search-input-container search-with-dialog position-relative d-flex flex-row flex-items-center mr-4 rounded" data-action="click:qbsearch-input#searchInputContainerClicked" > <button type="button" class="header-search-button placeholder input-button form-control d-flex flex-1 flex-self-stretch flex-items-center no-wrap width-full py-0 pl-2 pr-0 text-left border-0 box-shadow-none" data-target="qbsearch-input.inputButton" aria-label="Search or jump to…" aria-haspopup="dialog" placeholder="Search or jump to..." data-hotkey=s,/ autocapitalize="off" data-analytics-event="{&quot;location&quot;:&quot;navbar&quot;,&quot;action&quot;:&quot;searchbar&quot;,&quot;context&quot;:&quot;global&quot;,&quot;tag&quot;:&quot;input&quot;,&quot;label&quot;:&quot;searchbar_input_global_navbar&quot;}" data-action="click:qbsearch-input#handleExpand" > <div class="mr-2 color-fg-muted"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-search"> <path d="M10.68 11.74a6 6 0 0 1-7.922-8.982 6 6 0 0 1 8.982 7.922l3.04 3.04a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215ZM11.5 7a4.499 4.499 0 1 0-8.997 0A4.499 4.499 0 0 0 11.5 7Z"></path> </svg> </div> <span class="flex-1" data-target="qbsearch-input.inputButtonText">Search or jump to...</span> <div class="d-flex" data-target="qbsearch-input.hotkeyIndicator"> <svg xmlns="http://www.w3.org/2000/svg" width="22" height="20" aria-hidden="true" class="mr-1"><path fill="none" stroke="#979A9C" opacity=".4" d="M3.5.5h12c1.7 0 3 1.3 3 3v13c0 1.7-1.3 3-3 3h-12c-1.7 0-3-1.3-3-3v-13c0-1.7 1.3-3 3-3z"></path><path fill="#979A9C" d="M11.8 6L8 15.1h-.9L10.8 6h1z"></path></svg> </div> </button> <input type="hidden" name="type" class="js-site-search-type-field"> <div class="Overlay--hidden " data-modal-dialog-overlay> <modal-dialog data-action="close:qbsearch-input#handleClose cancel:qbsearch-input#handleClose" data-target="qbsearch-input.searchSuggestionsDialog" role="dialog" id="search-suggestions-dialog" aria-modal="true" aria-labelledby="search-suggestions-dialog-header" data-view-component="true" class="Overlay Overlay--width-large Overlay--height-auto"> <h1 id="search-suggestions-dialog-header" class="sr-only">Search code, repositories, users, issues, pull requests...</h1> <div class="Overlay-body Overlay-body--paddingNone"> <div data-view-component="true"> <div class="search-suggestions position-fixed width-full color-shadow-large border color-fg-default color-bg-default overflow-hidden d-flex flex-column query-builder-container" style="border-radius: 12px;" data-target="qbsearch-input.queryBuilderContainer" hidden > <!-- '"` --><!-- </textarea></xmp> --></option></form><form id="query-builder-test-form" action="" accept-charset="UTF-8" method="get"> <query-builder data-target="qbsearch-input.queryBuilder" id="query-builder-query-builder-test" data-filter-key=":" data-view-component="true" class="QueryBuilder search-query-builder"> <div class="FormControl FormControl--fullWidth"> <label id="query-builder-test-label" for="query-builder-test" class="FormControl-label sr-only"> Search </label> <div class="QueryBuilder-StyledInput width-fit " data-target="query-builder.styledInput" > <span id="query-builder-test-leadingvisual-wrap" class="FormControl-input-leadingVisualWrap QueryBuilder-leadingVisualWrap"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-search FormControl-input-leadingVisual"> <path d="M10.68 11.74a6 6 0 0 1-7.922-8.982 6 6 0 0 1 8.982 7.922l3.04 3.04a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215ZM11.5 7a4.499 4.499 0 1 0-8.997 0A4.499 4.499 0 0 0 11.5 7Z"></path> </svg> </span> <div data-target="query-builder.styledInputContainer" class="QueryBuilder-StyledInputContainer"> <div aria-hidden="true" class="QueryBuilder-StyledInputContent" data-target="query-builder.styledInputContent" ></div> <div class="QueryBuilder-InputWrapper"> <div aria-hidden="true" class="QueryBuilder-Sizer" data-target="query-builder.sizer"></div> <input id="query-builder-test" name="query-builder-test" value="" autocomplete="off" type="text" role="combobox" spellcheck="false" aria-expanded="false" aria-describedby="validation-03345d3c-d32b-4b51-86d6-561e2a6a8caf" data-target="query-builder.input" data-action=" input:query-builder#inputChange blur:query-builder#inputBlur keydown:query-builder#inputKeydown focus:query-builder#inputFocus " data-view-component="true" class="FormControl-input QueryBuilder-Input FormControl-medium" /> </div> </div> <span class="sr-only" id="query-builder-test-clear">Clear</span> <button role="button" id="query-builder-test-clear-button" aria-labelledby="query-builder-test-clear query-builder-test-label" data-target="query-builder.clearButton" data-action=" click:query-builder#clear focus:query-builder#clearButtonFocus blur:query-builder#clearButtonBlur " variant="small" hidden="hidden" type="button" data-view-component="true" class="Button Button--iconOnly Button--invisible Button--medium mr-1 px-2 py-0 d-flex flex-items-center rounded-1 color-fg-muted"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x-circle-fill Button-visual"> <path d="M2.343 13.657A8 8 0 1 1 13.658 2.343 8 8 0 0 1 2.343 13.657ZM6.03 4.97a.751.751 0 0 0-1.042.018.751.751 0 0 0-.018 1.042L6.94 8 4.97 9.97a.749.749 0 0 0 .326 1.275.749.749 0 0 0 .734-.215L8 9.06l1.97 1.97a.749.749 0 0 0 1.275-.326.749.749 0 0 0-.215-.734L9.06 8l1.97-1.97a.749.749 0 0 0-.326-1.275.749.749 0 0 0-.734.215L8 6.94Z"></path> </svg> </button> </div> <template id="search-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-search"> <path d="M10.68 11.74a6 6 0 0 1-7.922-8.982 6 6 0 0 1 8.982 7.922l3.04 3.04a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215ZM11.5 7a4.499 4.499 0 1 0-8.997 0A4.499 4.499 0 0 0 11.5 7Z"></path> </svg> </template> <template id="code-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-code"> <path d="m11.28 3.22 4.25 4.25a.75.75 0 0 1 0 1.06l-4.25 4.25a.749.749 0 0 1-1.275-.326.749.749 0 0 1 .215-.734L13.94 8l-3.72-3.72a.749.749 0 0 1 .326-1.275.749.749 0 0 1 .734.215Zm-6.56 0a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042L2.06 8l3.72 3.72a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L.47 8.53a.75.75 0 0 1 0-1.06Z"></path> </svg> </template> <template id="file-code-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-file-code"> <path d="M4 1.75C4 .784 4.784 0 5.75 0h5.586c.464 0 .909.184 1.237.513l2.914 2.914c.329.328.513.773.513 1.237v8.586A1.75 1.75 0 0 1 14.25 15h-9a.75.75 0 0 1 0-1.5h9a.25.25 0 0 0 .25-.25V6h-2.75A1.75 1.75 0 0 1 10 4.25V1.5H5.75a.25.25 0 0 0-.25.25v2.5a.75.75 0 0 1-1.5 0Zm1.72 4.97a.75.75 0 0 1 1.06 0l2 2a.75.75 0 0 1 0 1.06l-2 2a.749.749 0 0 1-1.275-.326.749.749 0 0 1 .215-.734l1.47-1.47-1.47-1.47a.75.75 0 0 1 0-1.06ZM3.28 7.78 1.81 9.25l1.47 1.47a.751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018l-2-2a.75.75 0 0 1 0-1.06l2-2a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042Zm8.22-6.218V4.25c0 .138.112.25.25.25h2.688l-.011-.013-2.914-2.914-.013-.011Z"></path> </svg> </template> <template id="history-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-history"> <path d="m.427 1.927 1.215 1.215a8.002 8.002 0 1 1-1.6 5.685.75.75 0 1 1 1.493-.154 6.5 6.5 0 1 0 1.18-4.458l1.358 1.358A.25.25 0 0 1 3.896 6H.25A.25.25 0 0 1 0 5.75V2.104a.25.25 0 0 1 .427-.177ZM7.75 4a.75.75 0 0 1 .75.75v2.992l2.028.812a.75.75 0 0 1-.557 1.392l-2.5-1A.751.751 0 0 1 7 8.25v-3.5A.75.75 0 0 1 7.75 4Z"></path> </svg> </template> <template id="repo-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo"> <path d="M2 2.5A2.5 2.5 0 0 1 4.5 0h8.75a.75.75 0 0 1 .75.75v12.5a.75.75 0 0 1-.75.75h-2.5a.75.75 0 0 1 0-1.5h1.75v-2h-8a1 1 0 0 0-.714 1.7.75.75 0 1 1-1.072 1.05A2.495 2.495 0 0 1 2 11.5Zm10.5-1h-8a1 1 0 0 0-1 1v6.708A2.486 2.486 0 0 1 4.5 9h8ZM5 12.25a.25.25 0 0 1 .25-.25h3.5a.25.25 0 0 1 .25.25v3.25a.25.25 0 0 1-.4.2l-1.45-1.087a.249.249 0 0 0-.3 0L5.4 15.7a.25.25 0 0 1-.4-.2Z"></path> </svg> </template> <template id="bookmark-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-bookmark"> <path d="M3 2.75C3 1.784 3.784 1 4.75 1h6.5c.966 0 1.75.784 1.75 1.75v11.5a.75.75 0 0 1-1.227.579L8 11.722l-3.773 3.107A.751.751 0 0 1 3 14.25Zm1.75-.25a.25.25 0 0 0-.25.25v9.91l3.023-2.489a.75.75 0 0 1 .954 0l3.023 2.49V2.75a.25.25 0 0 0-.25-.25Z"></path> </svg> </template> <template id="plus-circle-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-plus-circle"> <path d="M8 0a8 8 0 1 1 0 16A8 8 0 0 1 8 0ZM1.5 8a6.5 6.5 0 1 0 13 0 6.5 6.5 0 0 0-13 0Zm7.25-3.25v2.5h2.5a.75.75 0 0 1 0 1.5h-2.5v2.5a.75.75 0 0 1-1.5 0v-2.5h-2.5a.75.75 0 0 1 0-1.5h2.5v-2.5a.75.75 0 0 1 1.5 0Z"></path> </svg> </template> <template id="circle-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-dot-fill"> <path d="M8 4a4 4 0 1 1 0 8 4 4 0 0 1 0-8Z"></path> </svg> </template> <template id="trash-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-trash"> <path d="M11 1.75V3h2.25a.75.75 0 0 1 0 1.5H2.75a.75.75 0 0 1 0-1.5H5V1.75C5 .784 5.784 0 6.75 0h2.5C10.216 0 11 .784 11 1.75ZM4.496 6.675l.66 6.6a.25.25 0 0 0 .249.225h5.19a.25.25 0 0 0 .249-.225l.66-6.6a.75.75 0 0 1 1.492.149l-.66 6.6A1.748 1.748 0 0 1 10.595 15h-5.19a1.75 1.75 0 0 1-1.741-1.575l-.66-6.6a.75.75 0 1 1 1.492-.15ZM6.5 1.75V3h3V1.75a.25.25 0 0 0-.25-.25h-2.5a.25.25 0 0 0-.25.25Z"></path> </svg> </template> <template id="team-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-people"> <path d="M2 5.5a3.5 3.5 0 1 1 5.898 2.549 5.508 5.508 0 0 1 3.034 4.084.75.75 0 1 1-1.482.235 4 4 0 0 0-7.9 0 .75.75 0 0 1-1.482-.236A5.507 5.507 0 0 1 3.102 8.05 3.493 3.493 0 0 1 2 5.5ZM11 4a3.001 3.001 0 0 1 2.22 5.018 5.01 5.01 0 0 1 2.56 3.012.749.749 0 0 1-.885.954.752.752 0 0 1-.549-.514 3.507 3.507 0 0 0-2.522-2.372.75.75 0 0 1-.574-.73v-.352a.75.75 0 0 1 .416-.672A1.5 1.5 0 0 0 11 5.5.75.75 0 0 1 11 4Zm-5.5-.5a2 2 0 1 0-.001 3.999A2 2 0 0 0 5.5 3.5Z"></path> </svg> </template> <template id="project-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-project"> <path d="M1.75 0h12.5C15.216 0 16 .784 16 1.75v12.5A1.75 1.75 0 0 1 14.25 16H1.75A1.75 1.75 0 0 1 0 14.25V1.75C0 .784.784 0 1.75 0ZM1.5 1.75v12.5c0 .138.112.25.25.25h12.5a.25.25 0 0 0 .25-.25V1.75a.25.25 0 0 0-.25-.25H1.75a.25.25 0 0 0-.25.25ZM11.75 3a.75.75 0 0 1 .75.75v7.5a.75.75 0 0 1-1.5 0v-7.5a.75.75 0 0 1 .75-.75Zm-8.25.75a.75.75 0 0 1 1.5 0v5.5a.75.75 0 0 1-1.5 0ZM8 3a.75.75 0 0 1 .75.75v3.5a.75.75 0 0 1-1.5 0v-3.5A.75.75 0 0 1 8 3Z"></path> </svg> </template> <template id="pencil-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-pencil"> <path d="M11.013 1.427a1.75 1.75 0 0 1 2.474 0l1.086 1.086a1.75 1.75 0 0 1 0 2.474l-8.61 8.61c-.21.21-.47.364-.756.445l-3.251.93a.75.75 0 0 1-.927-.928l.929-3.25c.081-.286.235-.547.445-.758l8.61-8.61Zm.176 4.823L9.75 4.81l-6.286 6.287a.253.253 0 0 0-.064.108l-.558 1.953 1.953-.558a.253.253 0 0 0 .108-.064Zm1.238-3.763a.25.25 0 0 0-.354 0L10.811 3.75l1.439 1.44 1.263-1.263a.25.25 0 0 0 0-.354Z"></path> </svg> </template> <template id="copilot-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-copilot"> <path d="M7.998 15.035c-4.562 0-7.873-2.914-7.998-3.749V9.338c.085-.628.677-1.686 1.588-2.065.013-.07.024-.143.036-.218.029-.183.06-.384.126-.612-.201-.508-.254-1.084-.254-1.656 0-.87.128-1.769.693-2.484.579-.733 1.494-1.124 2.724-1.261 1.206-.134 2.262.034 2.944.765.05.053.096.108.139.165.044-.057.094-.112.143-.165.682-.731 1.738-.899 2.944-.765 1.23.137 2.145.528 2.724 1.261.566.715.693 1.614.693 2.484 0 .572-.053 1.148-.254 1.656.066.228.098.429.126.612.012.076.024.148.037.218.924.385 1.522 1.471 1.591 2.095v1.872c0 .766-3.351 3.795-8.002 3.795Zm0-1.485c2.28 0 4.584-1.11 5.002-1.433V7.862l-.023-.116c-.49.21-1.075.291-1.727.291-1.146 0-2.059-.327-2.71-.991A3.222 3.222 0 0 1 8 6.303a3.24 3.24 0 0 1-.544.743c-.65.664-1.563.991-2.71.991-.652 0-1.236-.081-1.727-.291l-.023.116v4.255c.419.323 2.722 1.433 5.002 1.433ZM6.762 2.83c-.193-.206-.637-.413-1.682-.297-1.019.113-1.479.404-1.713.7-.247.312-.369.789-.369 1.554 0 .793.129 1.171.308 1.371.162.181.519.379 1.442.379.853 0 1.339-.235 1.638-.54.315-.322.527-.827.617-1.553.117-.935-.037-1.395-.241-1.614Zm4.155-.297c-1.044-.116-1.488.091-1.681.297-.204.219-.359.679-.242 1.614.091.726.303 1.231.618 1.553.299.305.784.54 1.638.54.922 0 1.28-.198 1.442-.379.179-.2.308-.578.308-1.371 0-.765-.123-1.242-.37-1.554-.233-.296-.693-.587-1.713-.7Z"></path><path d="M6.25 9.037a.75.75 0 0 1 .75.75v1.501a.75.75 0 0 1-1.5 0V9.787a.75.75 0 0 1 .75-.75Zm4.25.75v1.501a.75.75 0 0 1-1.5 0V9.787a.75.75 0 0 1 1.5 0Z"></path> </svg> </template> <template id="copilot-error-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-copilot-error"> <path d="M16 11.24c0 .112-.072.274-.21.467L13 9.688V7.862l-.023-.116c-.49.21-1.075.291-1.727.291-.198 0-.388-.009-.571-.029L6.833 5.226a4.01 4.01 0 0 0 .17-.782c.117-.935-.037-1.395-.241-1.614-.193-.206-.637-.413-1.682-.297-.683.076-1.115.231-1.395.415l-1.257-.91c.579-.564 1.413-.877 2.485-.996 1.206-.134 2.262.034 2.944.765.05.053.096.108.139.165.044-.057.094-.112.143-.165.682-.731 1.738-.899 2.944-.765 1.23.137 2.145.528 2.724 1.261.566.715.693 1.614.693 2.484 0 .572-.053 1.148-.254 1.656.066.228.098.429.126.612.012.076.024.148.037.218.924.385 1.522 1.471 1.591 2.095Zm-5.083-8.707c-1.044-.116-1.488.091-1.681.297-.204.219-.359.679-.242 1.614.091.726.303 1.231.618 1.553.299.305.784.54 1.638.54.922 0 1.28-.198 1.442-.379.179-.2.308-.578.308-1.371 0-.765-.123-1.242-.37-1.554-.233-.296-.693-.587-1.713-.7Zm2.511 11.074c-1.393.776-3.272 1.428-5.43 1.428-4.562 0-7.873-2.914-7.998-3.749V9.338c.085-.628.677-1.686 1.588-2.065.013-.07.024-.143.036-.218.029-.183.06-.384.126-.612-.18-.455-.241-.963-.252-1.475L.31 4.107A.747.747 0 0 1 0 3.509V3.49a.748.748 0 0 1 .625-.73c.156-.026.306.047.435.139l14.667 10.578a.592.592 0 0 1 .227.264.752.752 0 0 1 .046.249v.022a.75.75 0 0 1-1.19.596Zm-1.367-.991L5.635 7.964a5.128 5.128 0 0 1-.889.073c-.652 0-1.236-.081-1.727-.291l-.023.116v4.255c.419.323 2.722 1.433 5.002 1.433 1.539 0 3.089-.505 4.063-.934Z"></path> </svg> </template> <template id="workflow-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-workflow"> <path d="M0 1.75C0 .784.784 0 1.75 0h3.5C6.216 0 7 .784 7 1.75v3.5A1.75 1.75 0 0 1 5.25 7H4v4a1 1 0 0 0 1 1h4v-1.25C9 9.784 9.784 9 10.75 9h3.5c.966 0 1.75.784 1.75 1.75v3.5A1.75 1.75 0 0 1 14.25 16h-3.5A1.75 1.75 0 0 1 9 14.25v-.75H5A2.5 2.5 0 0 1 2.5 11V7h-.75A1.75 1.75 0 0 1 0 5.25Zm1.75-.25a.25.25 0 0 0-.25.25v3.5c0 .138.112.25.25.25h3.5a.25.25 0 0 0 .25-.25v-3.5a.25.25 0 0 0-.25-.25Zm9 9a.25.25 0 0 0-.25.25v3.5c0 .138.112.25.25.25h3.5a.25.25 0 0 0 .25-.25v-3.5a.25.25 0 0 0-.25-.25Z"></path> </svg> </template> <template id="book-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-book"> <path d="M0 1.75A.75.75 0 0 1 .75 1h4.253c1.227 0 2.317.59 3 1.501A3.743 3.743 0 0 1 11.006 1h4.245a.75.75 0 0 1 .75.75v10.5a.75.75 0 0 1-.75.75h-4.507a2.25 2.25 0 0 0-1.591.659l-.622.621a.75.75 0 0 1-1.06 0l-.622-.621A2.25 2.25 0 0 0 5.258 13H.75a.75.75 0 0 1-.75-.75Zm7.251 10.324.004-5.073-.002-2.253A2.25 2.25 0 0 0 5.003 2.5H1.5v9h3.757a3.75 3.75 0 0 1 1.994.574ZM8.755 4.75l-.004 7.322a3.752 3.752 0 0 1 1.992-.572H14.5v-9h-3.495a2.25 2.25 0 0 0-2.25 2.25Z"></path> </svg> </template> <template id="code-review-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-code-review"> <path d="M1.75 1h12.5c.966 0 1.75.784 1.75 1.75v8.5A1.75 1.75 0 0 1 14.25 13H8.061l-2.574 2.573A1.458 1.458 0 0 1 3 14.543V13H1.75A1.75 1.75 0 0 1 0 11.25v-8.5C0 1.784.784 1 1.75 1ZM1.5 2.75v8.5c0 .138.112.25.25.25h2a.75.75 0 0 1 .75.75v2.19l2.72-2.72a.749.749 0 0 1 .53-.22h6.5a.25.25 0 0 0 .25-.25v-8.5a.25.25 0 0 0-.25-.25H1.75a.25.25 0 0 0-.25.25Zm5.28 1.72a.75.75 0 0 1 0 1.06L5.31 7l1.47 1.47a.751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018l-2-2a.75.75 0 0 1 0-1.06l2-2a.75.75 0 0 1 1.06 0Zm2.44 0a.75.75 0 0 1 1.06 0l2 2a.75.75 0 0 1 0 1.06l-2 2a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042L10.69 7 9.22 5.53a.75.75 0 0 1 0-1.06Z"></path> </svg> </template> <template id="codespaces-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-codespaces"> <path d="M0 11.25c0-.966.784-1.75 1.75-1.75h12.5c.966 0 1.75.784 1.75 1.75v3A1.75 1.75 0 0 1 14.25 16H1.75A1.75 1.75 0 0 1 0 14.25Zm2-9.5C2 .784 2.784 0 3.75 0h8.5C13.216 0 14 .784 14 1.75v5a1.75 1.75 0 0 1-1.75 1.75h-8.5A1.75 1.75 0 0 1 2 6.75Zm1.75-.25a.25.25 0 0 0-.25.25v5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-5a.25.25 0 0 0-.25-.25Zm-2 9.5a.25.25 0 0 0-.25.25v3c0 .138.112.25.25.25h12.5a.25.25 0 0 0 .25-.25v-3a.25.25 0 0 0-.25-.25Z"></path><path d="M7 12.75a.75.75 0 0 1 .75-.75h4.5a.75.75 0 0 1 0 1.5h-4.5a.75.75 0 0 1-.75-.75Zm-4 0a.75.75 0 0 1 .75-.75h.5a.75.75 0 0 1 0 1.5h-.5a.75.75 0 0 1-.75-.75Z"></path> </svg> </template> <template id="comment-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-comment"> <path d="M1 2.75C1 1.784 1.784 1 2.75 1h10.5c.966 0 1.75.784 1.75 1.75v7.5A1.75 1.75 0 0 1 13.25 12H9.06l-2.573 2.573A1.458 1.458 0 0 1 4 13.543V12H2.75A1.75 1.75 0 0 1 1 10.25Zm1.75-.25a.25.25 0 0 0-.25.25v7.5c0 .138.112.25.25.25h2a.75.75 0 0 1 .75.75v2.19l2.72-2.72a.749.749 0 0 1 .53-.22h4.5a.25.25 0 0 0 .25-.25v-7.5a.25.25 0 0 0-.25-.25Z"></path> </svg> </template> <template id="comment-discussion-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-comment-discussion"> <path d="M1.75 1h8.5c.966 0 1.75.784 1.75 1.75v5.5A1.75 1.75 0 0 1 10.25 10H7.061l-2.574 2.573A1.458 1.458 0 0 1 2 11.543V10h-.25A1.75 1.75 0 0 1 0 8.25v-5.5C0 1.784.784 1 1.75 1ZM1.5 2.75v5.5c0 .138.112.25.25.25h1a.75.75 0 0 1 .75.75v2.19l2.72-2.72a.749.749 0 0 1 .53-.22h3.5a.25.25 0 0 0 .25-.25v-5.5a.25.25 0 0 0-.25-.25h-8.5a.25.25 0 0 0-.25.25Zm13 2a.25.25 0 0 0-.25-.25h-.5a.75.75 0 0 1 0-1.5h.5c.966 0 1.75.784 1.75 1.75v5.5A1.75 1.75 0 0 1 14.25 12H14v1.543a1.458 1.458 0 0 1-2.487 1.03L9.22 12.28a.749.749 0 0 1 .326-1.275.749.749 0 0 1 .734.215l2.22 2.22v-2.19a.75.75 0 0 1 .75-.75h1a.25.25 0 0 0 .25-.25Z"></path> </svg> </template> <template id="organization-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-organization"> <path d="M1.75 16A1.75 1.75 0 0 1 0 14.25V1.75C0 .784.784 0 1.75 0h8.5C11.216 0 12 .784 12 1.75v12.5c0 .085-.006.168-.018.25h2.268a.25.25 0 0 0 .25-.25V8.285a.25.25 0 0 0-.111-.208l-1.055-.703a.749.749 0 1 1 .832-1.248l1.055.703c.487.325.779.871.779 1.456v5.965A1.75 1.75 0 0 1 14.25 16h-3.5a.766.766 0 0 1-.197-.026c-.099.017-.2.026-.303.026h-3a.75.75 0 0 1-.75-.75V14h-1v1.25a.75.75 0 0 1-.75.75Zm-.25-1.75c0 .138.112.25.25.25H4v-1.25a.75.75 0 0 1 .75-.75h2.5a.75.75 0 0 1 .75.75v1.25h2.25a.25.25 0 0 0 .25-.25V1.75a.25.25 0 0 0-.25-.25h-8.5a.25.25 0 0 0-.25.25ZM3.75 6h.5a.75.75 0 0 1 0 1.5h-.5a.75.75 0 0 1 0-1.5ZM3 3.75A.75.75 0 0 1 3.75 3h.5a.75.75 0 0 1 0 1.5h-.5A.75.75 0 0 1 3 3.75Zm4 3A.75.75 0 0 1 7.75 6h.5a.75.75 0 0 1 0 1.5h-.5A.75.75 0 0 1 7 6.75ZM7.75 3h.5a.75.75 0 0 1 0 1.5h-.5a.75.75 0 0 1 0-1.5ZM3 9.75A.75.75 0 0 1 3.75 9h.5a.75.75 0 0 1 0 1.5h-.5A.75.75 0 0 1 3 9.75ZM7.75 9h.5a.75.75 0 0 1 0 1.5h-.5a.75.75 0 0 1 0-1.5Z"></path> </svg> </template> <template id="rocket-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-rocket"> <path d="M14.064 0h.186C15.216 0 16 .784 16 1.75v.186a8.752 8.752 0 0 1-2.564 6.186l-.458.459c-.314.314-.641.616-.979.904v3.207c0 .608-.315 1.172-.833 1.49l-2.774 1.707a.749.749 0 0 1-1.11-.418l-.954-3.102a1.214 1.214 0 0 1-.145-.125L3.754 9.816a1.218 1.218 0 0 1-.124-.145L.528 8.717a.749.749 0 0 1-.418-1.11l1.71-2.774A1.748 1.748 0 0 1 3.31 4h3.204c.288-.338.59-.665.904-.979l.459-.458A8.749 8.749 0 0 1 14.064 0ZM8.938 3.623h-.002l-.458.458c-.76.76-1.437 1.598-2.02 2.5l-1.5 2.317 2.143 2.143 2.317-1.5c.902-.583 1.74-1.26 2.499-2.02l.459-.458a7.25 7.25 0 0 0 2.123-5.127V1.75a.25.25 0 0 0-.25-.25h-.186a7.249 7.249 0 0 0-5.125 2.123ZM3.56 14.56c-.732.732-2.334 1.045-3.005 1.148a.234.234 0 0 1-.201-.064.234.234 0 0 1-.064-.201c.103-.671.416-2.273 1.15-3.003a1.502 1.502 0 1 1 2.12 2.12Zm6.94-3.935c-.088.06-.177.118-.266.175l-2.35 1.521.548 1.783 1.949-1.2a.25.25 0 0 0 .119-.213ZM3.678 8.116 5.2 5.766c.058-.09.117-.178.176-.266H3.309a.25.25 0 0 0-.213.119l-1.2 1.95ZM12 5a1 1 0 1 1-2 0 1 1 0 0 1 2 0Z"></path> </svg> </template> <template id="shield-check-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-shield-check"> <path d="m8.533.133 5.25 1.68A1.75 1.75 0 0 1 15 3.48V7c0 1.566-.32 3.182-1.303 4.682-.983 1.498-2.585 2.813-5.032 3.855a1.697 1.697 0 0 1-1.33 0c-2.447-1.042-4.049-2.357-5.032-3.855C1.32 10.182 1 8.566 1 7V3.48a1.75 1.75 0 0 1 1.217-1.667l5.25-1.68a1.748 1.748 0 0 1 1.066 0Zm-.61 1.429.001.001-5.25 1.68a.251.251 0 0 0-.174.237V7c0 1.36.275 2.666 1.057 3.859.784 1.194 2.121 2.342 4.366 3.298a.196.196 0 0 0 .154 0c2.245-.957 3.582-2.103 4.366-3.297C13.225 9.666 13.5 8.358 13.5 7V3.48a.25.25 0 0 0-.174-.238l-5.25-1.68a.25.25 0 0 0-.153 0ZM11.28 6.28l-3.5 3.5a.75.75 0 0 1-1.06 0l-1.5-1.5a.749.749 0 0 1 .326-1.275.749.749 0 0 1 .734.215l.97.97 2.97-2.97a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042Z"></path> </svg> </template> <template id="heart-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-heart"> <path d="m8 14.25.345.666a.75.75 0 0 1-.69 0l-.008-.004-.018-.01a7.152 7.152 0 0 1-.31-.17 22.055 22.055 0 0 1-3.434-2.414C2.045 10.731 0 8.35 0 5.5 0 2.836 2.086 1 4.25 1 5.797 1 7.153 1.802 8 3.02 8.847 1.802 10.203 1 11.75 1 13.914 1 16 2.836 16 5.5c0 2.85-2.045 5.231-3.885 6.818a22.066 22.066 0 0 1-3.744 2.584l-.018.01-.006.003h-.002ZM4.25 2.5c-1.336 0-2.75 1.164-2.75 3 0 2.15 1.58 4.144 3.365 5.682A20.58 20.58 0 0 0 8 13.393a20.58 20.58 0 0 0 3.135-2.211C12.92 9.644 14.5 7.65 14.5 5.5c0-1.836-1.414-3-2.75-3-1.373 0-2.609.986-3.029 2.456a.749.749 0 0 1-1.442 0C6.859 3.486 5.623 2.5 4.25 2.5Z"></path> </svg> </template> <template id="server-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-server"> <path d="M1.75 1h12.5c.966 0 1.75.784 1.75 1.75v4c0 .372-.116.717-.314 1 .198.283.314.628.314 1v4a1.75 1.75 0 0 1-1.75 1.75H1.75A1.75 1.75 0 0 1 0 12.75v-4c0-.358.109-.707.314-1a1.739 1.739 0 0 1-.314-1v-4C0 1.784.784 1 1.75 1ZM1.5 2.75v4c0 .138.112.25.25.25h12.5a.25.25 0 0 0 .25-.25v-4a.25.25 0 0 0-.25-.25H1.75a.25.25 0 0 0-.25.25Zm.25 5.75a.25.25 0 0 0-.25.25v4c0 .138.112.25.25.25h12.5a.25.25 0 0 0 .25-.25v-4a.25.25 0 0 0-.25-.25ZM7 4.75A.75.75 0 0 1 7.75 4h4.5a.75.75 0 0 1 0 1.5h-4.5A.75.75 0 0 1 7 4.75ZM7.75 10h4.5a.75.75 0 0 1 0 1.5h-4.5a.75.75 0 0 1 0-1.5ZM3 4.75A.75.75 0 0 1 3.75 4h.5a.75.75 0 0 1 0 1.5h-.5A.75.75 0 0 1 3 4.75ZM3.75 10h.5a.75.75 0 0 1 0 1.5h-.5a.75.75 0 0 1 0-1.5Z"></path> </svg> </template> <template id="globe-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-globe"> <path d="M8 0a8 8 0 1 1 0 16A8 8 0 0 1 8 0ZM5.78 8.75a9.64 9.64 0 0 0 1.363 4.177c.255.426.542.832.857 1.215.245-.296.551-.705.857-1.215A9.64 9.64 0 0 0 10.22 8.75Zm4.44-1.5a9.64 9.64 0 0 0-1.363-4.177c-.307-.51-.612-.919-.857-1.215a9.927 9.927 0 0 0-.857 1.215A9.64 9.64 0 0 0 5.78 7.25Zm-5.944 1.5H1.543a6.507 6.507 0 0 0 4.666 5.5c-.123-.181-.24-.365-.352-.552-.715-1.192-1.437-2.874-1.581-4.948Zm-2.733-1.5h2.733c.144-2.074.866-3.756 1.58-4.948.12-.197.237-.381.353-.552a6.507 6.507 0 0 0-4.666 5.5Zm10.181 1.5c-.144 2.074-.866 3.756-1.58 4.948-.12.197-.237.381-.353.552a6.507 6.507 0 0 0 4.666-5.5Zm2.733-1.5a6.507 6.507 0 0 0-4.666-5.5c.123.181.24.365.353.552.714 1.192 1.436 2.874 1.58 4.948Z"></path> </svg> </template> <template id="issue-opened-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-issue-opened"> <path d="M8 9.5a1.5 1.5 0 1 0 0-3 1.5 1.5 0 0 0 0 3Z"></path><path d="M8 0a8 8 0 1 1 0 16A8 8 0 0 1 8 0ZM1.5 8a6.5 6.5 0 1 0 13 0 6.5 6.5 0 0 0-13 0Z"></path> </svg> </template> <template id="device-mobile-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-device-mobile"> <path d="M3.75 0h8.5C13.216 0 14 .784 14 1.75v12.5A1.75 1.75 0 0 1 12.25 16h-8.5A1.75 1.75 0 0 1 2 14.25V1.75C2 .784 2.784 0 3.75 0ZM3.5 1.75v12.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25V1.75a.25.25 0 0 0-.25-.25h-8.5a.25.25 0 0 0-.25.25ZM8 13a1 1 0 1 1 0-2 1 1 0 0 1 0 2Z"></path> </svg> </template> <template id="package-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-package"> <path d="m8.878.392 5.25 3.045c.54.314.872.89.872 1.514v6.098a1.75 1.75 0 0 1-.872 1.514l-5.25 3.045a1.75 1.75 0 0 1-1.756 0l-5.25-3.045A1.75 1.75 0 0 1 1 11.049V4.951c0-.624.332-1.201.872-1.514L7.122.392a1.75 1.75 0 0 1 1.756 0ZM7.875 1.69l-4.63 2.685L8 7.133l4.755-2.758-4.63-2.685a.248.248 0 0 0-.25 0ZM2.5 5.677v5.372c0 .09.047.171.125.216l4.625 2.683V8.432Zm6.25 8.271 4.625-2.683a.25.25 0 0 0 .125-.216V5.677L8.75 8.432Z"></path> </svg> </template> <template id="credit-card-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-credit-card"> <path d="M10.75 9a.75.75 0 0 0 0 1.5h1.5a.75.75 0 0 0 0-1.5h-1.5Z"></path><path d="M0 3.75C0 2.784.784 2 1.75 2h12.5c.966 0 1.75.784 1.75 1.75v8.5A1.75 1.75 0 0 1 14.25 14H1.75A1.75 1.75 0 0 1 0 12.25ZM14.5 6.5h-13v5.75c0 .138.112.25.25.25h12.5a.25.25 0 0 0 .25-.25Zm0-2.75a.25.25 0 0 0-.25-.25H1.75a.25.25 0 0 0-.25.25V5h13Z"></path> </svg> </template> <template id="play-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-play"> <path d="M8 0a8 8 0 1 1 0 16A8 8 0 0 1 8 0ZM1.5 8a6.5 6.5 0 1 0 13 0 6.5 6.5 0 0 0-13 0Zm4.879-2.773 4.264 2.559a.25.25 0 0 1 0 .428l-4.264 2.559A.25.25 0 0 1 6 10.559V5.442a.25.25 0 0 1 .379-.215Z"></path> </svg> </template> <template id="gift-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-gift"> <path d="M2 2.75A2.75 2.75 0 0 1 4.75 0c.983 0 1.873.42 2.57 1.232.268.318.497.668.68 1.042.183-.375.411-.725.68-1.044C9.376.42 10.266 0 11.25 0a2.75 2.75 0 0 1 2.45 4h.55c.966 0 1.75.784 1.75 1.75v2c0 .698-.409 1.301-1 1.582v4.918A1.75 1.75 0 0 1 13.25 16H2.75A1.75 1.75 0 0 1 1 14.25V9.332C.409 9.05 0 8.448 0 7.75v-2C0 4.784.784 4 1.75 4h.55c-.192-.375-.3-.8-.3-1.25ZM7.25 9.5H2.5v4.75c0 .138.112.25.25.25h4.5Zm1.5 0v5h4.5a.25.25 0 0 0 .25-.25V9.5Zm0-4V8h5.5a.25.25 0 0 0 .25-.25v-2a.25.25 0 0 0-.25-.25Zm-7 0a.25.25 0 0 0-.25.25v2c0 .138.112.25.25.25h5.5V5.5h-5.5Zm3-4a1.25 1.25 0 0 0 0 2.5h2.309c-.233-.818-.542-1.401-.878-1.793-.43-.502-.915-.707-1.431-.707ZM8.941 4h2.309a1.25 1.25 0 0 0 0-2.5c-.516 0-1 .205-1.43.707-.337.392-.646.975-.879 1.793Z"></path> </svg> </template> <template id="code-square-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-code-square"> <path d="M0 1.75C0 .784.784 0 1.75 0h12.5C15.216 0 16 .784 16 1.75v12.5A1.75 1.75 0 0 1 14.25 16H1.75A1.75 1.75 0 0 1 0 14.25Zm1.75-.25a.25.25 0 0 0-.25.25v12.5c0 .138.112.25.25.25h12.5a.25.25 0 0 0 .25-.25V1.75a.25.25 0 0 0-.25-.25Zm7.47 3.97a.75.75 0 0 1 1.06 0l2 2a.75.75 0 0 1 0 1.06l-2 2a.749.749 0 0 1-1.275-.326.749.749 0 0 1 .215-.734L10.69 8 9.22 6.53a.75.75 0 0 1 0-1.06ZM6.78 6.53 5.31 8l1.47 1.47a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215l-2-2a.75.75 0 0 1 0-1.06l2-2a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042Z"></path> </svg> </template> <template id="device-desktop-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-device-desktop"> <path d="M14.25 1c.966 0 1.75.784 1.75 1.75v7.5A1.75 1.75 0 0 1 14.25 12h-3.727c.099 1.041.52 1.872 1.292 2.757A.752.752 0 0 1 11.25 16h-6.5a.75.75 0 0 1-.565-1.243c.772-.885 1.192-1.716 1.292-2.757H1.75A1.75 1.75 0 0 1 0 10.25v-7.5C0 1.784.784 1 1.75 1ZM1.75 2.5a.25.25 0 0 0-.25.25v7.5c0 .138.112.25.25.25h12.5a.25.25 0 0 0 .25-.25v-7.5a.25.25 0 0 0-.25-.25ZM9.018 12H6.982a5.72 5.72 0 0 1-.765 2.5h3.566a5.72 5.72 0 0 1-.765-2.5Z"></path> </svg> </template> <div class="position-relative"> <ul role="listbox" class="ActionListWrap QueryBuilder-ListWrap" aria-label="Suggestions" data-action=" combobox-commit:query-builder#comboboxCommit mousedown:query-builder#resultsMousedown " data-target="query-builder.resultsList" data-persist-list=false id="query-builder-test-results" ></ul> </div> <div class="FormControl-inlineValidation" id="validation-03345d3c-d32b-4b51-86d6-561e2a6a8caf" hidden="hidden"> <span class="FormControl-inlineValidation--visual"> <svg aria-hidden="true" height="12" viewBox="0 0 12 12" version="1.1" width="12" data-view-component="true" class="octicon octicon-alert-fill"> <path d="M4.855.708c.5-.896 1.79-.896 2.29 0l4.675 8.351a1.312 1.312 0 0 1-1.146 1.954H1.33A1.313 1.313 0 0 1 .183 9.058ZM7 7V3H5v4Zm-1 3a1 1 0 1 0 0-2 1 1 0 0 0 0 2Z"></path> </svg> </span> <span></span> </div> </div> <div data-target="query-builder.screenReaderFeedback" aria-live="polite" aria-atomic="true" class="sr-only"></div> </query-builder></form> <div class="d-flex flex-row color-fg-muted px-3 text-small color-bg-default search-feedback-prompt"> <a target="_blank" href="https://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax" data-view-component="true" class="Link color-fg-accent text-normal ml-2">Search syntax tips</a> <div class="d-flex flex-1"></div> </div> </div> </div> </div> </modal-dialog></div> </div> <div data-action="click:qbsearch-input#retract" class="dark-backdrop position-fixed" hidden data-target="qbsearch-input.darkBackdrop"></div> <div class="color-fg-default"> <dialog-helper> <dialog data-target="qbsearch-input.feedbackDialog" data-action="close:qbsearch-input#handleDialogClose cancel:qbsearch-input#handleDialogClose" id="feedback-dialog" aria-modal="true" aria-labelledby="feedback-dialog-title" aria-describedby="feedback-dialog-description" data-view-component="true" class="Overlay Overlay-whenNarrow Overlay--size-medium Overlay--motion-scaleFade Overlay--disableScroll"> <div data-view-component="true" class="Overlay-header"> <div class="Overlay-headerContentWrap"> <div class="Overlay-titleWrap"> <h1 class="Overlay-title " id="feedback-dialog-title"> Provide feedback </h1> </div> <div class="Overlay-actionWrap"> <button data-close-dialog-id="feedback-dialog" aria-label="Close" type="button" data-view-component="true" class="close-button Overlay-closeButton"><svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path d="M3.72 3.72a.75.75 0 0 1 1.06 0L8 6.94l3.22-3.22a.749.749 0 0 1 1.275.326.749.749 0 0 1-.215.734L9.06 8l3.22 3.22a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L8 9.06l-3.22 3.22a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042L6.94 8 3.72 4.78a.75.75 0 0 1 0-1.06Z"></path> </svg></button> </div> </div> </div> <scrollable-region data-labelled-by="feedback-dialog-title"> <div data-view-component="true" class="Overlay-body"> <!-- '"` --><!-- </textarea></xmp> --></option></form><form id="code-search-feedback-form" data-turbo="false" action="/search/feedback" accept-charset="UTF-8" method="post"><input type="hidden" data-csrf="true" name="authenticity_token" value="2NQzjPSd2raeQ60gnnpqy8bysgwnwe12YI+0SdOX0GHQ7jH3nX7jv9ATwW4f3Kg4O72Zj40QpQD1RmkzmUqJ5g==" /> <p>We read every piece of feedback, and take your input very seriously.</p> <textarea name="feedback" class="form-control width-full mb-2" style="height: 120px" id="feedback"></textarea> <input name="include_email" id="include_email" aria-label="Include my email address so I can be contacted" class="form-control mr-2" type="checkbox"> <label for="include_email" style="font-weight: normal">Include my email address so I can be contacted</label> </form></div> </scrollable-region> <div data-view-component="true" class="Overlay-footer Overlay-footer--alignEnd"> <button data-close-dialog-id="feedback-dialog" type="button" data-view-component="true" class="btn"> Cancel </button> <button form="code-search-feedback-form" data-action="click:qbsearch-input#submitFeedback" type="submit" data-view-component="true" class="btn-primary btn"> Submit feedback </button> </div> </dialog></dialog-helper> <custom-scopes data-target="qbsearch-input.customScopesManager"> <dialog-helper> <dialog data-target="custom-scopes.customScopesModalDialog" data-action="close:qbsearch-input#handleDialogClose cancel:qbsearch-input#handleDialogClose" id="custom-scopes-dialog" aria-modal="true" aria-labelledby="custom-scopes-dialog-title" aria-describedby="custom-scopes-dialog-description" data-view-component="true" class="Overlay Overlay-whenNarrow Overlay--size-medium Overlay--motion-scaleFade Overlay--disableScroll"> <div data-view-component="true" class="Overlay-header Overlay-header--divided"> <div class="Overlay-headerContentWrap"> <div class="Overlay-titleWrap"> <h1 class="Overlay-title " id="custom-scopes-dialog-title"> Saved searches </h1> <h2 id="custom-scopes-dialog-description" class="Overlay-description">Use saved searches to filter your results more quickly</h2> </div> <div class="Overlay-actionWrap"> <button data-close-dialog-id="custom-scopes-dialog" aria-label="Close" type="button" data-view-component="true" class="close-button Overlay-closeButton"><svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path d="M3.72 3.72a.75.75 0 0 1 1.06 0L8 6.94l3.22-3.22a.749.749 0 0 1 1.275.326.749.749 0 0 1-.215.734L9.06 8l3.22 3.22a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L8 9.06l-3.22 3.22a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042L6.94 8 3.72 4.78a.75.75 0 0 1 0-1.06Z"></path> </svg></button> </div> </div> </div> <scrollable-region data-labelled-by="custom-scopes-dialog-title"> <div data-view-component="true" class="Overlay-body"> <div data-target="custom-scopes.customScopesModalDialogFlash"></div> <div hidden class="create-custom-scope-form" data-target="custom-scopes.createCustomScopeForm"> <!-- '"` --><!-- </textarea></xmp> --></option></form><form id="custom-scopes-dialog-form" data-turbo="false" action="/search/custom_scopes" accept-charset="UTF-8" method="post"><input type="hidden" data-csrf="true" name="authenticity_token" value="iVqrFz248dO6BjVrgjvkOD1WjRz811Y72hYA+evLY1V9E0cMVQLoUiS8h8VmkoEdWdFszlRb2VJbWLQVhBEZ7A==" /> <div data-target="custom-scopes.customScopesModalDialogFlash"></div> <input type="hidden" id="custom_scope_id" name="custom_scope_id" data-target="custom-scopes.customScopesIdField"> <div class="form-group"> <label for="custom_scope_name">Name</label> <auto-check src="/search/custom_scopes/check_name" required only-validate-on-blur="false"> <input type="text" name="custom_scope_name" id="custom_scope_name" data-target="custom-scopes.customScopesNameField" class="form-control" autocomplete="off" placeholder="github-ruby" required maxlength="50"> <input type="hidden" data-csrf="true" value="DJtXjSKAcmK/1tR8dLKJJMPMwCvi6XpmWNurgeAZv3eztKFgjCTLyTWuE/iOElZVxSH0OCCUKj2IztyuulfX1A==" /> </auto-check> </div> <div class="form-group"> <label for="custom_scope_query">Query</label> <input type="text" name="custom_scope_query" id="custom_scope_query" data-target="custom-scopes.customScopesQueryField" class="form-control" autocomplete="off" placeholder="(repo:mona/a OR repo:mona/b) AND lang:python" required maxlength="500"> </div> <p class="text-small color-fg-muted"> To see all available qualifiers, see our <a class="Link--inTextBlock" href="https://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax">documentation</a>. </p> </form> </div> <div data-target="custom-scopes.manageCustomScopesForm"> <div data-target="custom-scopes.list"></div> </div> </div> </scrollable-region> <div data-view-component="true" class="Overlay-footer Overlay-footer--alignEnd Overlay-footer--divided"> <button data-action="click:custom-scopes#customScopesCancel" type="button" data-view-component="true" class="btn"> Cancel </button> <button form="custom-scopes-dialog-form" data-action="click:custom-scopes#customScopesSubmit" data-target="custom-scopes.customScopesSubmitButton" type="submit" data-view-component="true" class="btn-primary btn"> Create saved search </button> </div> </dialog></dialog-helper> </custom-scopes> </div> </qbsearch-input> <div class="position-relative HeaderMenu-link-wrap d-lg-inline-block"> <a href="/login?return_to=https%3A%2F%2Fgithub.com%2Ffengjixuchui%2Fawesome-cyber-security" class="HeaderMenu-link HeaderMenu-link--sign-in HeaderMenu-button flex-shrink-0 no-underline d-none d-lg-inline-flex border border-lg-0 rounded rounded-lg-0 px-2 py-1" style="margin-left: 12px;" data-hydro-click="{&quot;event_type&quot;:&quot;authentication.click&quot;,&quot;payload&quot;:{&quot;location_in_page&quot;:&quot;site header menu&quot;,&quot;repository_id&quot;:null,&quot;auth_type&quot;:&quot;SIGN_UP&quot;,&quot;originating_url&quot;:&quot;https://github.com/fengjixuchui/awesome-cyber-security&quot;,&quot;user_id&quot;:null}}" data-hydro-click-hmac="c412579df63c6d7e84e2977536b5f4958724f406c30b826ab332fbb9a3060797" data-analytics-event="{&quot;category&quot;:&quot;Marketing nav&quot;,&quot;action&quot;:&quot;click to go to homepage&quot;,&quot;label&quot;:&quot;ref_page:Marketing;ref_cta:Sign in;ref_loc:Header&quot;}" > Sign in </a> </div> <a href="/signup?ref_cta=Sign+up&amp;ref_loc=header+logged+out&amp;ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E&amp;source=header-repo&amp;source_repo=fengjixuchui%2Fawesome-cyber-security" class="HeaderMenu-link HeaderMenu-link--sign-up HeaderMenu-button flex-shrink-0 d-flex d-lg-inline-flex no-underline border color-border-default rounded px-2 py-1" data-hydro-click="{&quot;event_type&quot;:&quot;authentication.click&quot;,&quot;payload&quot;:{&quot;location_in_page&quot;:&quot;site header menu&quot;,&quot;repository_id&quot;:null,&quot;auth_type&quot;:&quot;SIGN_UP&quot;,&quot;originating_url&quot;:&quot;https://github.com/fengjixuchui/awesome-cyber-security&quot;,&quot;user_id&quot;:null}}" data-hydro-click-hmac="c412579df63c6d7e84e2977536b5f4958724f406c30b826ab332fbb9a3060797" data-analytics-event="{&quot;category&quot;:&quot;Sign up&quot;,&quot;action&quot;:&quot;click to sign up for account&quot;,&quot;label&quot;:&quot;ref_page:/&lt;user-name&gt;/&lt;repo-name&gt;;ref_cta:Sign up;ref_loc:header logged out&quot;}" > Sign up </a> <button type="button" class="sr-only js-header-menu-focus-trap d-block d-lg-none">Reseting focus</button> </div> </div> </div> </div> </header> <div hidden="hidden" data-view-component="true" class="js-stale-session-flash stale-session-flash flash flash-warn flash-full"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-alert"> <path d="M6.457 1.047c.659-1.234 2.427-1.234 3.086 0l6.082 11.378A1.75 1.75 0 0 1 14.082 15H1.918a1.75 1.75 0 0 1-1.543-2.575Zm1.763.707a.25.25 0 0 0-.44 0L1.698 13.132a.25.25 0 0 0 .22.368h12.164a.25.25 0 0 0 .22-.368Zm.53 3.996v2.5a.75.75 0 0 1-1.5 0v-2.5a.75.75 0 0 1 1.5 0ZM9 11a1 1 0 1 1-2 0 1 1 0 0 1 2 0Z"></path> </svg> <span class="js-stale-session-flash-signed-in" hidden>You signed in with another tab or window. <a class="Link--inTextBlock" href="">Reload</a> to refresh your session.</span> <span class="js-stale-session-flash-signed-out" hidden>You signed out in another tab or window. <a class="Link--inTextBlock" href="">Reload</a> to refresh your session.</span> <span class="js-stale-session-flash-switched" hidden>You switched accounts on another tab or window. <a class="Link--inTextBlock" href="">Reload</a> to refresh your session.</span> <button id="icon-button-63e372a1-1e43-4370-a5e9-e48eb95e80c0" aria-labelledby="tooltip-b8c1aaa3-45d3-4b9c-af8f-b260835d564a" type="button" data-view-component="true" class="Button Button--iconOnly Button--invisible Button--medium flash-close js-flash-close"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x Button-visual"> <path d="M3.72 3.72a.75.75 0 0 1 1.06 0L8 6.94l3.22-3.22a.749.749 0 0 1 1.275.326.749.749 0 0 1-.215.734L9.06 8l3.22 3.22a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L8 9.06l-3.22 3.22a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042L6.94 8 3.72 4.78a.75.75 0 0 1 0-1.06Z"></path> </svg> </button><tool-tip id="tooltip-b8c1aaa3-45d3-4b9c-af8f-b260835d564a" for="icon-button-63e372a1-1e43-4370-a5e9-e48eb95e80c0" popover="manual" data-direction="s" data-type="label" data-view-component="true" class="sr-only position-absolute">Dismiss alert</tool-tip> </div> </div> <div id="start-of-content" class="show-on-focus"></div> <div id="js-flash-container" class="flash-container" data-turbo-replace> <template class="js-flash-template"> <div class="flash flash-full {{ className }}"> <div > <button autofocus class="flash-close js-flash-close" type="button" aria-label="Dismiss this message"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path d="M3.72 3.72a.75.75 0 0 1 1.06 0L8 6.94l3.22-3.22a.749.749 0 0 1 1.275.326.749.749 0 0 1-.215.734L9.06 8l3.22 3.22a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L8 9.06l-3.22 3.22a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042L6.94 8 3.72 4.78a.75.75 0 0 1 0-1.06Z"></path> </svg> </button> <div aria-atomic="true" role="alert" class="js-flash-alert"> <div>{{ message }}</div> </div> </div> </div> </template> </div> <div class="application-main " data-commit-hovercards-enabled data-discussion-hovercards-enabled data-issue-and-pr-hovercards-enabled data-project-hovercards-enabled > <div itemscope itemtype="http://schema.org/SoftwareSourceCode" class=""> <main id="js-repo-pjax-container" > <div id="repository-container-header" class="pt-3 hide-full-screen" style="background-color: var(--page-header-bgColor, var(--color-page-header-bg));" data-turbo-replace> <div class="d-flex flex-nowrap flex-justify-end mb-3 px-3 px-lg-5" style="gap: 1rem;"> <div class="flex-auto min-width-0 width-fit"> <div class=" d-flex flex-wrap flex-items-center wb-break-word f3 text-normal"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo color-fg-muted mr-2"> <path d="M2 2.5A2.5 2.5 0 0 1 4.5 0h8.75a.75.75 0 0 1 .75.75v12.5a.75.75 0 0 1-.75.75h-2.5a.75.75 0 0 1 0-1.5h1.75v-2h-8a1 1 0 0 0-.714 1.7.75.75 0 1 1-1.072 1.05A2.495 2.495 0 0 1 2 11.5Zm10.5-1h-8a1 1 0 0 0-1 1v6.708A2.486 2.486 0 0 1 4.5 9h8ZM5 12.25a.25.25 0 0 1 .25-.25h3.5a.25.25 0 0 1 .25.25v3.25a.25.25 0 0 1-.4.2l-1.45-1.087a.249.249 0 0 0-.3 0L5.4 15.7a.25.25 0 0 1-.4-.2Z"></path> </svg> <span class="author flex-self-stretch" itemprop="author"> <a class="url fn" rel="author" data-hovercard-type="user" data-hovercard-url="/users/fengjixuchui/hovercard" data-octo-click="hovercard-link-click" data-octo-dimensions="link_type:self" href="/fengjixuchui"> fengjixuchui </a> </span> <span class="mx-1 flex-self-stretch color-fg-muted">/</span> <strong itemprop="name" class="mr-2 flex-self-stretch"> <a data-pjax="#repo-content-pjax-container" data-turbo-frame="repo-content-turbo-frame" href="/fengjixuchui/awesome-cyber-security">awesome-cyber-security</a> </strong> <span></span><span class="Label Label--secondary v-align-middle mr-1">Public</span> </div> </div> <div id="repository-details-container" class="flex-shrink-0" data-turbo-replace style="max-width: 70%;"> <ul class="pagehead-actions flex-shrink-0 d-none d-md-inline" style="padding: 2px 0;"> <li> <a href="/login?return_to=%2Ffengjixuchui%2Fawesome-cyber-security" rel="nofollow" id="repository-details-watch-button" data-hydro-click="{&quot;event_type&quot;:&quot;authentication.click&quot;,&quot;payload&quot;:{&quot;location_in_page&quot;:&quot;notification subscription menu watch&quot;,&quot;repository_id&quot;:null,&quot;auth_type&quot;:&quot;LOG_IN&quot;,&quot;originating_url&quot;:&quot;https://github.com/fengjixuchui/awesome-cyber-security&quot;,&quot;user_id&quot;:null}}" data-hydro-click-hmac="968615f0ec76ec768c6747dde4eb3efc4b8b2ac0320ff3e0c821f1a70f0fe01f" aria-label="You must be signed in to change notification settings" data-view-component="true" class="btn-sm btn"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-bell mr-2"> <path d="M8 16a2 2 0 0 0 1.985-1.75c.017-.137-.097-.25-.235-.25h-3.5c-.138 0-.252.113-.235.25A2 2 0 0 0 8 16ZM3 5a5 5 0 0 1 10 0v2.947c0 .05.015.098.042.139l1.703 2.555A1.519 1.519 0 0 1 13.482 13H2.518a1.516 1.516 0 0 1-1.263-2.36l1.703-2.554A.255.255 0 0 0 3 7.947Zm5-3.5A3.5 3.5 0 0 0 4.5 5v2.947c0 .346-.102.683-.294.97l-1.703 2.556a.017.017 0 0 0-.003.01l.001.006c0 .002.002.004.004.006l.006.004.007.001h10.964l.007-.001.006-.004.004-.006.001-.007a.017.017 0 0 0-.003-.01l-1.703-2.554a1.745 1.745 0 0 1-.294-.97V5A3.5 3.5 0 0 0 8 1.5Z"></path> </svg>Notifications </a> <tool-tip id="tooltip-d0801826-093a-4238-914d-5b4cb4adc81b" for="repository-details-watch-button" popover="manual" data-direction="s" data-type="description" data-view-component="true" class="sr-only position-absolute">You must be signed in to change notification settings</tool-tip> </li> <li> <a icon="repo-forked" id="fork-button" href="/login?return_to=%2Ffengjixuchui%2Fawesome-cyber-security" rel="nofollow" data-hydro-click="{&quot;event_type&quot;:&quot;authentication.click&quot;,&quot;payload&quot;:{&quot;location_in_page&quot;:&quot;repo details fork button&quot;,&quot;repository_id&quot;:223063470,&quot;auth_type&quot;:&quot;LOG_IN&quot;,&quot;originating_url&quot;:&quot;https://github.com/fengjixuchui/awesome-cyber-security&quot;,&quot;user_id&quot;:null}}" data-hydro-click-hmac="8d75acefaf0298b833767116de4dcfa3cfd1c30166d4687c044eca17cc5d465c" data-view-component="true" class="btn-sm btn"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo-forked mr-2"> <path d="M5 5.372v.878c0 .414.336.75.75.75h4.5a.75.75 0 0 0 .75-.75v-.878a2.25 2.25 0 1 1 1.5 0v.878a2.25 2.25 0 0 1-2.25 2.25h-1.5v2.128a2.251 2.251 0 1 1-1.5 0V8.5h-1.5A2.25 2.25 0 0 1 3.5 6.25v-.878a2.25 2.25 0 1 1 1.5 0ZM5 3.25a.75.75 0 1 0-1.5 0 .75.75 0 0 0 1.5 0Zm6.75.75a.75.75 0 1 0 0-1.5.75.75 0 0 0 0 1.5Zm-3 8.75a.75.75 0 1 0-1.5 0 .75.75 0 0 0 1.5 0Z"></path> </svg>Fork <span id="repo-network-counter" data-pjax-replace="true" data-turbo-replace="true" title="199" data-view-component="true" class="Counter">199</span> </a> </li> <li> <div data-view-component="true" class="BtnGroup d-flex"> <a href="/login?return_to=%2Ffengjixuchui%2Fawesome-cyber-security" rel="nofollow" data-hydro-click="{&quot;event_type&quot;:&quot;authentication.click&quot;,&quot;payload&quot;:{&quot;location_in_page&quot;:&quot;star button&quot;,&quot;repository_id&quot;:223063470,&quot;auth_type&quot;:&quot;LOG_IN&quot;,&quot;originating_url&quot;:&quot;https://github.com/fengjixuchui/awesome-cyber-security&quot;,&quot;user_id&quot;:null}}" data-hydro-click-hmac="9bfa1413ef8543c03e48ad929fb85b39337430f6cf9dbb07206f8dcc266ae7ee" aria-label="You must be signed in to star a repository" data-view-component="true" class="tooltipped tooltipped-sw btn-sm btn"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-star v-align-text-bottom d-inline-block mr-2"> <path d="M8 .25a.75.75 0 0 1 .673.418l1.882 3.815 4.21.612a.75.75 0 0 1 .416 1.279l-3.046 2.97.719 4.192a.751.751 0 0 1-1.088.791L8 12.347l-3.766 1.98a.75.75 0 0 1-1.088-.79l.72-4.194L.818 6.374a.75.75 0 0 1 .416-1.28l4.21-.611L7.327.668A.75.75 0 0 1 8 .25Zm0 2.445L6.615 5.5a.75.75 0 0 1-.564.41l-3.097.45 2.24 2.184a.75.75 0 0 1 .216.664l-.528 3.084 2.769-1.456a.75.75 0 0 1 .698 0l2.77 1.456-.53-3.084a.75.75 0 0 1 .216-.664l2.24-2.183-3.096-.45a.75.75 0 0 1-.564-.41L8 2.694Z"></path> </svg><span data-view-component="true" class="d-inline"> Star </span> <span id="repo-stars-counter-star" aria-label="6 users starred this repository" data-singular-suffix="user starred this repository" data-plural-suffix="users starred this repository" data-turbo-replace="true" title="6" data-view-component="true" class="Counter js-social-count">6</span> </a></div> </li> </ul> </div> </div> <div id="responsive-meta-container" data-turbo-replace> <div class="d-block d-md-none mb-2 px-3 px-md-4 px-lg-5"> <p class="f4 mb-3 "> (!!! Github shows less than 4000 lines, and more than 5000 lines is missing. Please download Readme.md and open it in markdown viewer to review the FULL version)[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, … </p> <div class="mb-3"> <a class="Link--secondary no-underline mr-3" href="/fengjixuchui/awesome-cyber-security/stargazers"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-star mr-1"> <path d="M8 .25a.75.75 0 0 1 .673.418l1.882 3.815 4.21.612a.75.75 0 0 1 .416 1.279l-3.046 2.97.719 4.192a.751.751 0 0 1-1.088.791L8 12.347l-3.766 1.98a.75.75 0 0 1-1.088-.79l.72-4.194L.818 6.374a.75.75 0 0 1 .416-1.28l4.21-.611L7.327.668A.75.75 0 0 1 8 .25Zm0 2.445L6.615 5.5a.75.75 0 0 1-.564.41l-3.097.45 2.24 2.184a.75.75 0 0 1 .216.664l-.528 3.084 2.769-1.456a.75.75 0 0 1 .698 0l2.77 1.456-.53-3.084a.75.75 0 0 1 .216-.664l2.24-2.183-3.096-.45a.75.75 0 0 1-.564-.41L8 2.694Z"></path> </svg> <span class="text-bold">6</span> stars </a> <a class="Link--secondary no-underline mr-3" href="/fengjixuchui/awesome-cyber-security/forks"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo-forked mr-1"> <path d="M5 5.372v.878c0 .414.336.75.75.75h4.5a.75.75 0 0 0 .75-.75v-.878a2.25 2.25 0 1 1 1.5 0v.878a2.25 2.25 0 0 1-2.25 2.25h-1.5v2.128a2.251 2.251 0 1 1-1.5 0V8.5h-1.5A2.25 2.25 0 0 1 3.5 6.25v-.878a2.25 2.25 0 1 1 1.5 0ZM5 3.25a.75.75 0 1 0-1.5 0 .75.75 0 0 0 1.5 0Zm6.75.75a.75.75 0 1 0 0-1.5.75.75 0 0 0 0 1.5Zm-3 8.75a.75.75 0 1 0-1.5 0 .75.75 0 0 0 1.5 0Z"></path> </svg> <span class="text-bold">199</span> forks </a> <a class="Link--secondary no-underline mr-3 d-inline-block" href="/fengjixuchui/awesome-cyber-security/branches"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-git-branch mr-1"> <path d="M9.5 3.25a2.25 2.25 0 1 1 3 2.122V6A2.5 2.5 0 0 1 10 8.5H6a1 1 0 0 0-1 1v1.128a2.251 2.251 0 1 1-1.5 0V5.372a2.25 2.25 0 1 1 1.5 0v1.836A2.493 2.493 0 0 1 6 7h4a1 1 0 0 0 1-1v-.628A2.25 2.25 0 0 1 9.5 3.25Zm-6 0a.75.75 0 1 0 1.5 0 .75.75 0 0 0-1.5 0Zm8.25-.75a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5ZM4.25 12a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Z"></path> </svg> <span>Branches</span> </a> <a class="Link--secondary no-underline d-inline-block" href="/fengjixuchui/awesome-cyber-security/tags"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-tag mr-1"> <path d="M1 7.775V2.75C1 1.784 1.784 1 2.75 1h5.025c.464 0 .91.184 1.238.513l6.25 6.25a1.75 1.75 0 0 1 0 2.474l-5.026 5.026a1.75 1.75 0 0 1-2.474 0l-6.25-6.25A1.752 1.752 0 0 1 1 7.775Zm1.5 0c0 .066.026.13.073.177l6.25 6.25a.25.25 0 0 0 .354 0l5.025-5.025a.25.25 0 0 0 0-.354l-6.25-6.25a.25.25 0 0 0-.177-.073H2.75a.25.25 0 0 0-.25.25ZM6 5a1 1 0 1 1 0 2 1 1 0 0 1 0-2Z"></path> </svg> <span>Tags</span> </a> <a class="Link--secondary no-underline d-inline-block" href="/fengjixuchui/awesome-cyber-security/activity"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-pulse mr-1"> <path d="M6 2c.306 0 .582.187.696.471L10 10.731l1.304-3.26A.751.751 0 0 1 12 7h3.25a.75.75 0 0 1 0 1.5h-2.742l-1.812 4.528a.751.751 0 0 1-1.392 0L6 4.77 4.696 8.03A.75.75 0 0 1 4 8.5H.75a.75.75 0 0 1 0-1.5h2.742l1.812-4.529A.751.751 0 0 1 6 2Z"></path> </svg> <span>Activity</span> </a> </div> <div class="d-flex flex-wrap gap-2"> <div class="flex-1"> <div data-view-component="true" class="BtnGroup d-flex"> <a href="/login?return_to=%2Ffengjixuchui%2Fawesome-cyber-security" rel="nofollow" data-hydro-click="{&quot;event_type&quot;:&quot;authentication.click&quot;,&quot;payload&quot;:{&quot;location_in_page&quot;:&quot;star button&quot;,&quot;repository_id&quot;:223063470,&quot;auth_type&quot;:&quot;LOG_IN&quot;,&quot;originating_url&quot;:&quot;https://github.com/fengjixuchui/awesome-cyber-security&quot;,&quot;user_id&quot;:null}}" data-hydro-click-hmac="9bfa1413ef8543c03e48ad929fb85b39337430f6cf9dbb07206f8dcc266ae7ee" aria-label="You must be signed in to star a repository" data-view-component="true" class="tooltipped tooltipped-sw btn-sm btn btn-block"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-star v-align-text-bottom d-inline-block mr-2"> <path d="M8 .25a.75.75 0 0 1 .673.418l1.882 3.815 4.21.612a.75.75 0 0 1 .416 1.279l-3.046 2.97.719 4.192a.751.751 0 0 1-1.088.791L8 12.347l-3.766 1.98a.75.75 0 0 1-1.088-.79l.72-4.194L.818 6.374a.75.75 0 0 1 .416-1.28l4.21-.611L7.327.668A.75.75 0 0 1 8 .25Zm0 2.445L6.615 5.5a.75.75 0 0 1-.564.41l-3.097.45 2.24 2.184a.75.75 0 0 1 .216.664l-.528 3.084 2.769-1.456a.75.75 0 0 1 .698 0l2.77 1.456-.53-3.084a.75.75 0 0 1 .216-.664l2.24-2.183-3.096-.45a.75.75 0 0 1-.564-.41L8 2.694Z"></path> </svg><span data-view-component="true" class="d-inline"> Star </span> </a></div> </div> <div class="flex-1"> <a href="/login?return_to=%2Ffengjixuchui%2Fawesome-cyber-security" rel="nofollow" id="files-overview-watch-button" data-hydro-click="{&quot;event_type&quot;:&quot;authentication.click&quot;,&quot;payload&quot;:{&quot;location_in_page&quot;:&quot;notification subscription menu watch&quot;,&quot;repository_id&quot;:null,&quot;auth_type&quot;:&quot;LOG_IN&quot;,&quot;originating_url&quot;:&quot;https://github.com/fengjixuchui/awesome-cyber-security&quot;,&quot;user_id&quot;:null}}" data-hydro-click-hmac="968615f0ec76ec768c6747dde4eb3efc4b8b2ac0320ff3e0c821f1a70f0fe01f" aria-label="You must be signed in to change notification settings" data-view-component="true" class="btn-sm btn btn-block"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-bell mr-2"> <path d="M8 16a2 2 0 0 0 1.985-1.75c.017-.137-.097-.25-.235-.25h-3.5c-.138 0-.252.113-.235.25A2 2 0 0 0 8 16ZM3 5a5 5 0 0 1 10 0v2.947c0 .05.015.098.042.139l1.703 2.555A1.519 1.519 0 0 1 13.482 13H2.518a1.516 1.516 0 0 1-1.263-2.36l1.703-2.554A.255.255 0 0 0 3 7.947Zm5-3.5A3.5 3.5 0 0 0 4.5 5v2.947c0 .346-.102.683-.294.97l-1.703 2.556a.017.017 0 0 0-.003.01l.001.006c0 .002.002.004.004.006l.006.004.007.001h10.964l.007-.001.006-.004.004-.006.001-.007a.017.017 0 0 0-.003-.01l-1.703-2.554a1.745 1.745 0 0 1-.294-.97V5A3.5 3.5 0 0 0 8 1.5Z"></path> </svg>Notifications </a> <tool-tip id="tooltip-3b1a2d6c-9f73-4308-a38a-a373e3944f1c" for="files-overview-watch-button" popover="manual" data-direction="s" data-type="description" data-view-component="true" class="sr-only position-absolute">You must be signed in to change notification settings</tool-tip> </div> <span> </span> </div> </div> </div> <nav data-pjax="#js-repo-pjax-container" aria-label="Repository" data-view-component="true" class="js-repo-nav js-sidenav-container-pjax js-responsive-underlinenav overflow-hidden UnderlineNav px-3 px-md-4 px-lg-5"> <ul data-view-component="true" class="UnderlineNav-body list-style-none"> <li data-view-component="true" class="d-inline-flex"> <a id="code-tab" href="/fengjixuchui/awesome-cyber-security" data-tab-item="i0code-tab" data-selected-links="repo_source repo_downloads repo_commits repo_releases repo_tags repo_branches repo_packages repo_deployments repo_attestations /fengjixuchui/awesome-cyber-security" data-pjax="#repo-content-pjax-container" data-turbo-frame="repo-content-turbo-frame" data-hotkey="g c" data-analytics-event="{&quot;category&quot;:&quot;Underline navbar&quot;,&quot;action&quot;:&quot;Click tab&quot;,&quot;label&quot;:&quot;Code&quot;,&quot;target&quot;:&quot;UNDERLINE_NAV.TAB&quot;}" aria-current="page" data-view-component="true" class="UnderlineNav-item no-wrap js-responsive-underlinenav-item js-selected-navigation-item selected"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-code UnderlineNav-octicon d-none d-sm-inline"> <path d="m11.28 3.22 4.25 4.25a.75.75 0 0 1 0 1.06l-4.25 4.25a.749.749 0 0 1-1.275-.326.749.749 0 0 1 .215-.734L13.94 8l-3.72-3.72a.749.749 0 0 1 .326-1.275.749.749 0 0 1 .734.215Zm-6.56 0a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042L2.06 8l3.72 3.72a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L.47 8.53a.75.75 0 0 1 0-1.06Z"></path> </svg> <span data-content="Code">Code</span> <span id="code-repo-tab-count" data-pjax-replace="" data-turbo-replace="" title="Not available" data-view-component="true" class="Counter"></span> </a></li> <li data-view-component="true" class="d-inline-flex"> <a id="pull-requests-tab" href="/fengjixuchui/awesome-cyber-security/pulls" data-tab-item="i1pull-requests-tab" data-selected-links="repo_pulls checks /fengjixuchui/awesome-cyber-security/pulls" data-pjax="#repo-content-pjax-container" data-turbo-frame="repo-content-turbo-frame" data-hotkey="g p" data-analytics-event="{&quot;category&quot;:&quot;Underline navbar&quot;,&quot;action&quot;:&quot;Click tab&quot;,&quot;label&quot;:&quot;Pull requests&quot;,&quot;target&quot;:&quot;UNDERLINE_NAV.TAB&quot;}" data-view-component="true" class="UnderlineNav-item no-wrap js-responsive-underlinenav-item js-selected-navigation-item"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-git-pull-request UnderlineNav-octicon d-none d-sm-inline"> <path d="M1.5 3.25a2.25 2.25 0 1 1 3 2.122v5.256a2.251 2.251 0 1 1-1.5 0V5.372A2.25 2.25 0 0 1 1.5 3.25Zm5.677-.177L9.573.677A.25.25 0 0 1 10 .854V2.5h1A2.5 2.5 0 0 1 13.5 5v5.628a2.251 2.251 0 1 1-1.5 0V5a1 1 0 0 0-1-1h-1v1.646a.25.25 0 0 1-.427.177L7.177 3.427a.25.25 0 0 1 0-.354ZM3.75 2.5a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm0 9.5a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm8.25.75a.75.75 0 1 0 1.5 0 .75.75 0 0 0-1.5 0Z"></path> </svg> <span data-content="Pull requests">Pull requests</span> <span id="pull-requests-repo-tab-count" data-pjax-replace="" data-turbo-replace="" title="0" hidden="hidden" data-view-component="true" class="Counter">0</span> </a></li> <li data-view-component="true" class="d-inline-flex"> <a id="actions-tab" href="/fengjixuchui/awesome-cyber-security/actions" data-tab-item="i2actions-tab" data-selected-links="repo_actions /fengjixuchui/awesome-cyber-security/actions" data-pjax="#repo-content-pjax-container" data-turbo-frame="repo-content-turbo-frame" data-hotkey="g a" data-analytics-event="{&quot;category&quot;:&quot;Underline navbar&quot;,&quot;action&quot;:&quot;Click tab&quot;,&quot;label&quot;:&quot;Actions&quot;,&quot;target&quot;:&quot;UNDERLINE_NAV.TAB&quot;}" data-view-component="true" class="UnderlineNav-item no-wrap js-responsive-underlinenav-item js-selected-navigation-item"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-play UnderlineNav-octicon d-none d-sm-inline"> <path d="M8 0a8 8 0 1 1 0 16A8 8 0 0 1 8 0ZM1.5 8a6.5 6.5 0 1 0 13 0 6.5 6.5 0 0 0-13 0Zm4.879-2.773 4.264 2.559a.25.25 0 0 1 0 .428l-4.264 2.559A.25.25 0 0 1 6 10.559V5.442a.25.25 0 0 1 .379-.215Z"></path> </svg> <span data-content="Actions">Actions</span> <span id="actions-repo-tab-count" data-pjax-replace="" data-turbo-replace="" title="Not available" data-view-component="true" class="Counter"></span> </a></li> <li data-view-component="true" class="d-inline-flex"> <a id="projects-tab" href="/fengjixuchui/awesome-cyber-security/projects" data-tab-item="i3projects-tab" data-selected-links="repo_projects new_repo_project repo_project /fengjixuchui/awesome-cyber-security/projects" data-pjax="#repo-content-pjax-container" data-turbo-frame="repo-content-turbo-frame" data-hotkey="g b" data-analytics-event="{&quot;category&quot;:&quot;Underline navbar&quot;,&quot;action&quot;:&quot;Click tab&quot;,&quot;label&quot;:&quot;Projects&quot;,&quot;target&quot;:&quot;UNDERLINE_NAV.TAB&quot;}" data-view-component="true" class="UnderlineNav-item no-wrap js-responsive-underlinenav-item js-selected-navigation-item"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-table UnderlineNav-octicon d-none d-sm-inline"> <path d="M0 1.75C0 .784.784 0 1.75 0h12.5C15.216 0 16 .784 16 1.75v12.5A1.75 1.75 0 0 1 14.25 16H1.75A1.75 1.75 0 0 1 0 14.25ZM6.5 6.5v8h7.75a.25.25 0 0 0 .25-.25V6.5Zm8-1.5V1.75a.25.25 0 0 0-.25-.25H6.5V5Zm-13 1.5v7.75c0 .138.112.25.25.25H5v-8ZM5 5V1.5H1.75a.25.25 0 0 0-.25.25V5Z"></path> </svg> <span data-content="Projects">Projects</span> <span id="projects-repo-tab-count" data-pjax-replace="" data-turbo-replace="" title="0" hidden="hidden" data-view-component="true" class="Counter">0</span> </a></li> <li data-view-component="true" class="d-inline-flex"> <a id="security-tab" href="/fengjixuchui/awesome-cyber-security/security" data-tab-item="i4security-tab" data-selected-links="security overview alerts policy token_scanning code_scanning /fengjixuchui/awesome-cyber-security/security" data-pjax="#repo-content-pjax-container" data-turbo-frame="repo-content-turbo-frame" data-hotkey="g s" data-analytics-event="{&quot;category&quot;:&quot;Underline navbar&quot;,&quot;action&quot;:&quot;Click tab&quot;,&quot;label&quot;:&quot;Security&quot;,&quot;target&quot;:&quot;UNDERLINE_NAV.TAB&quot;}" data-view-component="true" class="UnderlineNav-item no-wrap js-responsive-underlinenav-item js-selected-navigation-item"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-shield UnderlineNav-octicon d-none d-sm-inline"> <path d="M7.467.133a1.748 1.748 0 0 1 1.066 0l5.25 1.68A1.75 1.75 0 0 1 15 3.48V7c0 1.566-.32 3.182-1.303 4.682-.983 1.498-2.585 2.813-5.032 3.855a1.697 1.697 0 0 1-1.33 0c-2.447-1.042-4.049-2.357-5.032-3.855C1.32 10.182 1 8.566 1 7V3.48a1.75 1.75 0 0 1 1.217-1.667Zm.61 1.429a.25.25 0 0 0-.153 0l-5.25 1.68a.25.25 0 0 0-.174.238V7c0 1.358.275 2.666 1.057 3.86.784 1.194 2.121 2.34 4.366 3.297a.196.196 0 0 0 .154 0c2.245-.956 3.582-2.104 4.366-3.298C13.225 9.666 13.5 8.36 13.5 7V3.48a.251.251 0 0 0-.174-.237l-5.25-1.68ZM8.75 4.75v3a.75.75 0 0 1-1.5 0v-3a.75.75 0 0 1 1.5 0ZM9 10.5a1 1 0 1 1-2 0 1 1 0 0 1 2 0Z"></path> </svg> <span data-content="Security">Security</span> <include-fragment src="/fengjixuchui/awesome-cyber-security/security/overall-count" accept="text/fragment+html"></include-fragment> </a></li> <li data-view-component="true" class="d-inline-flex"> <a id="insights-tab" href="/fengjixuchui/awesome-cyber-security/pulse" data-tab-item="i5insights-tab" data-selected-links="repo_graphs repo_contributors dependency_graph dependabot_updates pulse people community /fengjixuchui/awesome-cyber-security/pulse" data-pjax="#repo-content-pjax-container" data-turbo-frame="repo-content-turbo-frame" data-analytics-event="{&quot;category&quot;:&quot;Underline navbar&quot;,&quot;action&quot;:&quot;Click tab&quot;,&quot;label&quot;:&quot;Insights&quot;,&quot;target&quot;:&quot;UNDERLINE_NAV.TAB&quot;}" data-view-component="true" class="UnderlineNav-item no-wrap js-responsive-underlinenav-item js-selected-navigation-item"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-graph UnderlineNav-octicon d-none d-sm-inline"> <path d="M1.5 1.75V13.5h13.75a.75.75 0 0 1 0 1.5H.75a.75.75 0 0 1-.75-.75V1.75a.75.75 0 0 1 1.5 0Zm14.28 2.53-5.25 5.25a.75.75 0 0 1-1.06 0L7 7.06 4.28 9.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.25-3.25a.75.75 0 0 1 1.06 0L10 7.94l4.72-4.72a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042Z"></path> </svg> <span data-content="Insights">Insights</span> <span id="insights-repo-tab-count" data-pjax-replace="" data-turbo-replace="" title="Not available" data-view-component="true" class="Counter"></span> </a></li> </ul> <div style="visibility:hidden;" data-view-component="true" class="UnderlineNav-actions js-responsive-underlinenav-overflow position-absolute pr-3 pr-md-4 pr-lg-5 right-0"> <action-menu data-select-variant="none" data-view-component="true"> <focus-group direction="vertical" mnemonics retain> <button id="action-menu-8a3a3d36-a00d-4ee5-a4ba-5f1a5886dbcc-button" popovertarget="action-menu-8a3a3d36-a00d-4ee5-a4ba-5f1a5886dbcc-overlay" aria-controls="action-menu-8a3a3d36-a00d-4ee5-a4ba-5f1a5886dbcc-list" aria-haspopup="true" aria-labelledby="tooltip-3bfe571d-ec86-4c44-b7f5-e81239dad47f" type="button" data-view-component="true" class="Button Button--iconOnly Button--secondary Button--medium UnderlineNav-item"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-kebab-horizontal Button-visual"> <path d="M8 9a1.5 1.5 0 1 0 0-3 1.5 1.5 0 0 0 0 3ZM1.5 9a1.5 1.5 0 1 0 0-3 1.5 1.5 0 0 0 0 3Zm13 0a1.5 1.5 0 1 0 0-3 1.5 1.5 0 0 0 0 3Z"></path> </svg> </button><tool-tip id="tooltip-3bfe571d-ec86-4c44-b7f5-e81239dad47f" for="action-menu-8a3a3d36-a00d-4ee5-a4ba-5f1a5886dbcc-button" popover="manual" data-direction="s" data-type="label" data-view-component="true" class="sr-only position-absolute">Additional navigation options</tool-tip> <anchored-position data-target="action-menu.overlay" id="action-menu-8a3a3d36-a00d-4ee5-a4ba-5f1a5886dbcc-overlay" anchor="action-menu-8a3a3d36-a00d-4ee5-a4ba-5f1a5886dbcc-button" align="start" side="outside-bottom" anchor-offset="normal" popover="auto" data-view-component="true"> <div data-view-component="true" class="Overlay Overlay--size-auto"> <div data-view-component="true" class="Overlay-body Overlay-body--paddingNone"> <action-list> <div data-view-component="true"> <ul aria-labelledby="action-menu-8a3a3d36-a00d-4ee5-a4ba-5f1a5886dbcc-button" id="action-menu-8a3a3d36-a00d-4ee5-a4ba-5f1a5886dbcc-list" role="menu" data-view-component="true" class="ActionListWrap--inset ActionListWrap"> <li hidden="hidden" data-menu-item="i0code-tab" data-targets="action-list.items" role="none" data-view-component="true" class="ActionListItem"> <a tabindex="-1" id="item-fbe3ee50-3de1-4006-a2e9-93418b800bd5" href="/fengjixuchui/awesome-cyber-security" role="menuitem" data-view-component="true" class="ActionListContent ActionListContent--visual16"> <span class="ActionListItem-visual ActionListItem-visual--leading"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-code"> <path d="m11.28 3.22 4.25 4.25a.75.75 0 0 1 0 1.06l-4.25 4.25a.749.749 0 0 1-1.275-.326.749.749 0 0 1 .215-.734L13.94 8l-3.72-3.72a.749.749 0 0 1 .326-1.275.749.749 0 0 1 .734.215Zm-6.56 0a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042L2.06 8l3.72 3.72a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L.47 8.53a.75.75 0 0 1 0-1.06Z"></path> </svg> </span> <span data-view-component="true" class="ActionListItem-label"> Code </span> </a> </li> <li hidden="hidden" data-menu-item="i1pull-requests-tab" data-targets="action-list.items" role="none" data-view-component="true" class="ActionListItem"> <a tabindex="-1" id="item-fadc0c4c-609f-43a9-8444-465c5f6ededd" href="/fengjixuchui/awesome-cyber-security/pulls" role="menuitem" data-view-component="true" class="ActionListContent ActionListContent--visual16"> <span class="ActionListItem-visual ActionListItem-visual--leading"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-git-pull-request"> <path d="M1.5 3.25a2.25 2.25 0 1 1 3 2.122v5.256a2.251 2.251 0 1 1-1.5 0V5.372A2.25 2.25 0 0 1 1.5 3.25Zm5.677-.177L9.573.677A.25.25 0 0 1 10 .854V2.5h1A2.5 2.5 0 0 1 13.5 5v5.628a2.251 2.251 0 1 1-1.5 0V5a1 1 0 0 0-1-1h-1v1.646a.25.25 0 0 1-.427.177L7.177 3.427a.25.25 0 0 1 0-.354ZM3.75 2.5a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm0 9.5a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm8.25.75a.75.75 0 1 0 1.5 0 .75.75 0 0 0-1.5 0Z"></path> </svg> </span> <span data-view-component="true" class="ActionListItem-label"> Pull requests </span> </a> </li> <li hidden="hidden" data-menu-item="i2actions-tab" data-targets="action-list.items" role="none" data-view-component="true" class="ActionListItem"> <a tabindex="-1" id="item-42e43bde-02a2-4c11-bfb0-3afeb7cbb53b" href="/fengjixuchui/awesome-cyber-security/actions" role="menuitem" data-view-component="true" class="ActionListContent ActionListContent--visual16"> <span class="ActionListItem-visual ActionListItem-visual--leading"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-play"> <path d="M8 0a8 8 0 1 1 0 16A8 8 0 0 1 8 0ZM1.5 8a6.5 6.5 0 1 0 13 0 6.5 6.5 0 0 0-13 0Zm4.879-2.773 4.264 2.559a.25.25 0 0 1 0 .428l-4.264 2.559A.25.25 0 0 1 6 10.559V5.442a.25.25 0 0 1 .379-.215Z"></path> </svg> </span> <span data-view-component="true" class="ActionListItem-label"> Actions </span> </a> </li> <li hidden="hidden" data-menu-item="i3projects-tab" data-targets="action-list.items" role="none" data-view-component="true" class="ActionListItem"> <a tabindex="-1" id="item-33ce6d87-dd6c-4558-ae9e-96a30b7dc62e" href="/fengjixuchui/awesome-cyber-security/projects" role="menuitem" data-view-component="true" class="ActionListContent ActionListContent--visual16"> <span class="ActionListItem-visual ActionListItem-visual--leading"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-table"> <path d="M0 1.75C0 .784.784 0 1.75 0h12.5C15.216 0 16 .784 16 1.75v12.5A1.75 1.75 0 0 1 14.25 16H1.75A1.75 1.75 0 0 1 0 14.25ZM6.5 6.5v8h7.75a.25.25 0 0 0 .25-.25V6.5Zm8-1.5V1.75a.25.25 0 0 0-.25-.25H6.5V5Zm-13 1.5v7.75c0 .138.112.25.25.25H5v-8ZM5 5V1.5H1.75a.25.25 0 0 0-.25.25V5Z"></path> </svg> </span> <span data-view-component="true" class="ActionListItem-label"> Projects </span> </a> </li> <li hidden="hidden" data-menu-item="i4security-tab" data-targets="action-list.items" role="none" data-view-component="true" class="ActionListItem"> <a tabindex="-1" id="item-1f91906b-fef4-4776-9a8f-099af8007cbd" href="/fengjixuchui/awesome-cyber-security/security" role="menuitem" data-view-component="true" class="ActionListContent ActionListContent--visual16"> <span class="ActionListItem-visual ActionListItem-visual--leading"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-shield"> <path d="M7.467.133a1.748 1.748 0 0 1 1.066 0l5.25 1.68A1.75 1.75 0 0 1 15 3.48V7c0 1.566-.32 3.182-1.303 4.682-.983 1.498-2.585 2.813-5.032 3.855a1.697 1.697 0 0 1-1.33 0c-2.447-1.042-4.049-2.357-5.032-3.855C1.32 10.182 1 8.566 1 7V3.48a1.75 1.75 0 0 1 1.217-1.667Zm.61 1.429a.25.25 0 0 0-.153 0l-5.25 1.68a.25.25 0 0 0-.174.238V7c0 1.358.275 2.666 1.057 3.86.784 1.194 2.121 2.34 4.366 3.297a.196.196 0 0 0 .154 0c2.245-.956 3.582-2.104 4.366-3.298C13.225 9.666 13.5 8.36 13.5 7V3.48a.251.251 0 0 0-.174-.237l-5.25-1.68ZM8.75 4.75v3a.75.75 0 0 1-1.5 0v-3a.75.75 0 0 1 1.5 0ZM9 10.5a1 1 0 1 1-2 0 1 1 0 0 1 2 0Z"></path> </svg> </span> <span data-view-component="true" class="ActionListItem-label"> Security </span> </a> </li> <li hidden="hidden" data-menu-item="i5insights-tab" data-targets="action-list.items" role="none" data-view-component="true" class="ActionListItem"> <a tabindex="-1" id="item-57dc2796-f1c8-4a7b-8d80-60316a744d72" href="/fengjixuchui/awesome-cyber-security/pulse" role="menuitem" data-view-component="true" class="ActionListContent ActionListContent--visual16"> <span class="ActionListItem-visual ActionListItem-visual--leading"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-graph"> <path d="M1.5 1.75V13.5h13.75a.75.75 0 0 1 0 1.5H.75a.75.75 0 0 1-.75-.75V1.75a.75.75 0 0 1 1.5 0Zm14.28 2.53-5.25 5.25a.75.75 0 0 1-1.06 0L7 7.06 4.28 9.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.25-3.25a.75.75 0 0 1 1.06 0L10 7.94l4.72-4.72a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042Z"></path> </svg> </span> <span data-view-component="true" class="ActionListItem-label"> Insights </span> </a> </li> </ul> </div></action-list> </div> </div></anchored-position> </focus-group> </action-menu></div> </nav> </div> <turbo-frame id="repo-content-turbo-frame" target="_top" data-turbo-action="advance" class=""> <div id="repo-content-pjax-container" class="repository-content " > <h1 class='sr-only'>fengjixuchui/awesome-cyber-security</h1> <div class="clearfix container-xl px-md-4 px-lg-5 px-3"> <div> <div style="max-width: 100%" data-view-component="true" class="Layout Layout--flowRow-until-md react-repos-overview-margin Layout--sidebarPosition-end Layout--sidebarPosition-flowRow-end"> <div data-view-component="true" class="Layout-main"> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_dompurify_dist_purify_es_mjs-dd1d3ea6a436.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_tanstack_query-core_build_modern_queryObserver_js-node_modules_tanstack_-defd52-843b41414e0e.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/ui_packages_aria-live_aria-live_ts-ui_packages_history_history_ts-ui_packages_promise-with-re-01dc80-134579ff449f.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/ui_packages_paths_index_ts-3adbcf6faa83.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/ui_packages_ref-selector_RefSelector_tsx-7496afc3784d.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/ui_packages_commit-attribution_index_ts-ui_packages_commit-checks-status_index_ts-ui_packages-7094d4-b869a469ca5e.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/ui_packages_hydro-analytics_hydro-analytics_ts-ui_packages_verified-fetch_verified-fetch_ts-u-4672d1-96a19eaeffb7.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/ui_packages_code-view-shared_hooks_use-canonical-object_ts-ui_packages_code-view-shared_hooks-d63960-3a5579c864b4.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/repos-overview-fa360a7b1b46.js"></script> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/primer-react.8157a56b30ae88a1b356.module.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/repos-overview.0ee7cac3ab511a65d9f9.module.css" /> <react-partial partial-name="repos-overview" data-ssr="true" data-attempted-ssr="true" > <script type="application/json" data-target="react-partial.embeddedData">{"props":{"initialPayload":{"allShortcutsEnabled":false,"path":"/","repo":{"id":223063470,"defaultBranch":"master","name":"awesome-cyber-security","ownerLogin":"fengjixuchui","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2019-11-21T01:41:31.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/2487206?v=4","public":true,"private":false,"isOrgOwned":false},"currentUser":null,"refInfo":{"name":"master","listCacheKey":"v0:1623912330.6000261","canEdit":false,"refType":"branch","currentOid":"29d0b97559497373d5c3534ef69c136d447eae7a"},"tree":{"items":[{"name":"history","path":"history","contentType":"directory"},{"name":".directory","path":".directory","contentType":"file"},{"name":"Readme.md","path":"Readme.md","contentType":"file"},{"name":"Readme_en.md","path":"Readme_en.md","contentType":"file"},{"name":"Readme_full.md","path":"Readme_full.md","contentType":"file"},{"name":"Readme_full_en.md","path":"Readme_full_en.md","contentType":"file"}],"templateDirectorySuggestionUrl":null,"readme":null,"totalCount":6,"showBranchInfobar":false},"fileTree":null,"fileTreeProcessingTime":null,"foldersToFetch":[],"treeExpanded":false,"symbolsExpanded":false,"isOverview":true,"overview":{"banners":{"shouldRecommendReadme":false,"isPersonalRepo":false,"showUseActionBanner":false,"actionSlug":null,"actionId":null,"showProtectBranchBanner":false,"publishBannersInfo":{"dismissActionNoticePath":"/settings/dismiss-notice/publish_action_from_repo","releasePath":"/fengjixuchui/awesome-cyber-security/releases/new?marketplace=true","showPublishActionBanner":false},"interactionLimitBanner":null,"showInvitationBanner":false,"inviterName":null,"actionsMigrationBannerInfo":{"releaseTags":[],"showImmutableActionsMigrationBanner":false,"initialMigrationStatus":null}},"codeButton":{"contactPath":"/contact","isEnterprise":false,"local":{"protocolInfo":{"httpAvailable":true,"sshAvailable":null,"httpUrl":"https://github.com/fengjixuchui/awesome-cyber-security.git","showCloneWarning":null,"sshUrl":null,"sshCertificatesRequired":null,"sshCertificatesAvailable":null,"ghCliUrl":"gh repo clone fengjixuchui/awesome-cyber-security","defaultProtocol":"http","newSshKeyUrl":"/settings/ssh/new","setProtocolPath":"/users/set_protocol"},"platformInfo":{"cloneUrl":"https://desktop.github.com","showVisualStudioCloneButton":false,"visualStudioCloneUrl":"https://windows.github.com","showXcodeCloneButton":false,"xcodeCloneUrl":"xcode://clone?repo=https%3A%2F%2Fgithub.com%2Ffengjixuchui%2Fawesome-cyber-security","zipballUrl":"/fengjixuchui/awesome-cyber-security/archive/refs/heads/master.zip"}},"newCodespacePath":"/codespaces/new?hide_repo_select=true\u0026repo=223063470"},"popovers":{"rename":null,"renamedParentRepo":null},"commitCount":"8","overviewFiles":[{"displayName":"Readme.md","repoName":"awesome-cyber-security","refName":"master","path":"Readme.md","preferredFileType":"readme","tabName":"README","richText":"\u003carticle class=\"markdown-body entry-content container-lg\" itemprop=\"text\"\u003e\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e所有收集类项目:\u003c/h1\u003e\u003ca id=\"user-content-所有收集类项目\" class=\"anchor\" aria-label=\"Permalink: 所有收集类项目:\" href=\"#所有收集类项目\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"https://github.com/alphaSeclab/sec-tool-list\"\u003e收集的所有开源工具\u003c/a\u003e: 超过18K, 包括Markdown和Json两种格式\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://github.com/alphaSeclab/awesome-reverse-engineering\"\u003e逆向资源\u003c/a\u003e: IDA/Ghidra/x64dbg/OllDbg/WinDBG/CuckooSandbox/Radare2/BinaryNinja/DynamoRIO/IntelPin/Frida/QEMU/Android安全/iOS安全/Window安全/Linux安全/macOS安全/游戏Hacking/Bootkit/Rootkit/Angr/Shellcode/进程注入/代码注入/DLL注入/WSL/Sysmon/...\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://github.com/alphaSeclab/awesome-network-stuff\"\u003e网络相关的安全资源\u003c/a\u003e: 代理/GFW/反向代理/隧道/VPN/Tor/I2P,以及中间人/PortKnocking/嗅探/网络分析/网络诊断等\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://github.com/alphaSeclab/awesome-cyber-security\"\u003e攻击性网络安全资源\u003c/a\u003e: 漏洞/渗透/物联网安全/数据渗透/Metasploit/BurpSuite/KaliLinux/C\u0026amp;C/OWASP/免杀/CobaltStrike/侦查/OSINT/社工/密码/凭证/威胁狩猎/Payload/WifiHacking/无线攻击/后渗透/提权/UAC绕过/...\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003ePenetrationTesting\u003c/h1\u003e\u003ca id=\"user-content-penetrationtesting\" class=\"anchor\" aria-label=\"Permalink: PenetrationTesting\" href=\"#penetrationtesting\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cp dir=\"auto\"\u003e\u003ca href=\"https://github.com/alphaSeclab/awesome-cyber-security/blob/master/Readme_en.md\"\u003eEnglish Version\u003c/a\u003e\u003c/p\u003e\n\u003cp dir=\"auto\"\u003eGithub的Readme显示不会超过4000行,而此Repo添加的工具和文章近万行,默认显示不全。当前页面是减配版:工具星数少于200且500天内没更新的不在此文档中显示。\u003c/p\u003e\n\u003cp dir=\"auto\"\u003e点击这里查看完整版:\u003ca href=\"https://github.com/alphaSeclab/awesome-cyber-security/blob/master/Readme_full.md\"\u003e中文-完整版\u003c/a\u003e\u003c/p\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e目录\u003c/h1\u003e\u003ca id=\"user-content-目录\" class=\"anchor\" aria-label=\"Permalink: 目录\" href=\"#目录\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#94ca60d12e210fdd7fd9e387339b293e\"\u003e新添加的\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#9eee96404f868f372a6cbc6769ccb7f8\"\u003e工具\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#31185b925d5152c7469b963809ceb22d\"\u003e(1103) 新添加的\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#f34b4da04f2a77a185729b5af752efc5\"\u003e未分类\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#b9dc08e7e118fc7af41df5e0ef9ddc3c\"\u003e新添加1\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#efb2cfb167e34b03243547cfb3a662ac\"\u003e新添加2\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#f04dd1be8e552b074dde7cb33ae6c84c\"\u003e未分类3\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#cbb37de8d70e314ce905d78c566ef384\"\u003e未分类4\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#bb7173c3a2ea52d046c8abe3c57e3291\"\u003e未分类5\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#f7654997cf8b691617b89c5e523a942f\"\u003e(1) 其他\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#d5e869a870d6e2c14911de2bc527a6ef\"\u003e(3) 古老的\u0026amp;\u0026amp;有新的替代版本的\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#8603294b7c1f136b866b6402d63a9978\"\u003e文章\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#f110da0bf67359d3abc62b27d717e55e\"\u003e新添加的\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#a4ee2f4d4a944b54b2246c72c037cd2e\"\u003e收集\u0026amp;\u0026amp;集合\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#e97d183e67fa3f530e7d0e7e8c33ee62\"\u003e(222) 未分类\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#664ff1dbdafefd7d856c88112948a65b\"\u003e(9) 混合型收集\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#67acc04b20c99f87ee625b073330d8c2\"\u003e(12) 无工具类收集\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#24707dd322098f73c7e450d6b1eddf12\"\u003e(1) 收集类的收集\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#9101434a896f20263d09c25ace65f398\"\u003e(7) 教育资源\u0026amp;\u0026amp;课程\u0026amp;\u0026amp;教程\u0026amp;\u0026amp;书籍\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#8088e46fc533286d88b945f1d472bf57\"\u003e笔记\u0026amp;\u0026amp;Tips\u0026amp;\u0026amp;Tricks\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#f57ccaab4279b60c17a03f90d96b815c\"\u003e(12) 未分类\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#0476f6b97e87176da0a0d7328f8747e7\"\u003e(1) blog\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#df8ec4a66ef5027bbcc591c94f8de1e5\"\u003eTalk\u0026amp;\u0026amp;Conference \u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#4be58a3a00f83975b0321425db3b9b68\"\u003e(1) 文档\u0026amp;\u0026amp;Documentation\u0026amp;\u0026amp;规则说明\u0026amp;\u0026amp;RFC\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#7e840ca27f1ff222fd25bc61a79b07ba\"\u003e特定目标\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#eb2d1ffb231cee014ed24d59ca987da2\"\u003e(4) 未分类-XxTarget\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#c71ad1932bbf9c908af83917fe1fd5da\"\u003e(113) AWS\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#88716f4591b1df2149c2b7778d15d04e\"\u003e(1) Phoenix\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#4fd96686a470ff4e9e974f1503d735a2\"\u003e(4) Kubernetes\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#786201db0bcc40fdf486cee406fdad31\"\u003e(1) Azure\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#40dbffa18ec695a618eef96d6fd09176\"\u003e(1) Nginx\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#6b90a3993f9846922396ec85713dc760\"\u003e(1) ELK\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#6730dabeca61fcf64d4f7631abae6734\"\u003e(1) GoogleCloud\u0026amp;\u0026amp;谷歌云\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#d55d9dfd081aa2a02e636b97ca1bad0b\"\u003e物联网(IoT)\u0026amp;\u0026amp;嵌入式设备\u0026amp;\u0026amp;路由器\u0026amp;\u0026amp;交换机\u0026amp;\u0026amp;智能设备\u0026amp;\u0026amp;打印机\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#9a20a70f58ea7946f24224c5d73fac15\"\u003e工具\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#cda63179d132f43441f8844c5df10024\"\u003e(46) 未分类-IoT\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#72bffacc109d51ea286797a7d5079392\"\u003e(1) 打印机 \u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#c9fd442ecac4e22d142731165b06b3fe\"\u003e(4) 路由器\u0026amp;\u0026amp;交换机\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#3d345feb9fee1c101aea3838da8cbaca\"\u003e(1) 嵌入式设备\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#01e638f09e44280ae9a1a95fc376edc5\"\u003e文章\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#a4a3bcead86d9f9f7977479dfe94797d\"\u003e新添加\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#1233584261c0cd5224b6e90a98cc9a94\"\u003e渗透\u0026amp;\u0026amp;offensive\u0026amp;\u0026amp;渗透框架\u0026amp;\u0026amp;后渗透框架\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#5dd93fbc2f2ebc8d98672b2d95782af3\"\u003e工具\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#2e40f2f1df5d7f93a7de47bf49c24a0e\"\u003e(310) 未分类-Pentest\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#2051fd9e171f2698d8e7486e3dd35d87\"\u003e(13) 渗透多合一\u0026amp;\u0026amp;渗透框架\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#fc8737aef0f59c3952d11749fe582dac\"\u003e(4) 自动化\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#9081db81f6f4b78d5c263723a3f7bd6d\"\u003e(4) 收集\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#39e9a0fe929fffe5721f7d7bb2dae547\"\u003eBurp\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#6366edc293f25b57bf688570b11d6584\"\u003e(2) 收集\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#5b761419863bc686be12c76451f49532\"\u003e(425) 未分类-Burp\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#3ae4408f4ab03f99bab9ef9ee69642a8\"\u003e(4) 数据渗透\u0026amp;\u0026amp;DataExfiltration\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#8e7a6a74ff322cbf2bad59092598de77\"\u003eMetasploit\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#01be61d5bb9f6f7199208ff0fba86b5d\"\u003e(178) 未分类-metasploit\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#adfa06d452147ebacd35981ce56f916b\"\u003e横向渗透\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#b1161d6c4cb520d0cd574347cd18342e\"\u003e(36) 免杀\u0026amp;\u0026amp;躲避AV检测\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#98a851c8e6744850efcb27b8e93dff73\"\u003e(107) C\u0026amp;C\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#a0897294e74a0863ea8b83d11994fad6\"\u003e(96) DDOS\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#7667f6a0381b6cded2014a0d279b5722\"\u003e(148) Kali\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#8e1069b2bce90b87eea762ee3d0935d8\"\u003e(163) OWASP\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#0b8e79b79094082d0906153445d6ef9a\"\u003e(76) CobaltStrike\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#fb821e664950df22549557cb8cc54afe\"\u003eCMS\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#53f3011d262d2554156afe18d7ad6a43\"\u003e日志\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#b0233cd346f5ee456ee04bf653b12ae2\"\u003e劫持\u0026amp;\u0026amp;各种劫持\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#b087f1741bcf7c449d2910d052a7f312\"\u003e(51) 未分类-Hijack\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#ecdeb90ce9bd347ca7f9d366d157689d\"\u003e点击劫持\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#8afafc25f4fb0805556003864cce90e2\"\u003e(31) RedTeam\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#4c42a9cc007de389f975cb0ce146c0ed\"\u003e(15) BlueTeam\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#f21aa1088a437dbb001a137f6f885530\"\u003e文章\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#7229723a22769af40b96ab31fb09dcc7\"\u003e新添加的\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#6280e13d236b0f18c75894d304309416\"\u003eMetasploit\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#082a9e72817adcf2f824767e3e2ce597\"\u003eBurpSuite\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#6710d6fe61cbbc36b2ba75de156eda8a\"\u003eCobaltStrike \u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#8f92ead9997a4b68d06a9acf9b01ef63\"\u003e扫描器\u0026amp;\u0026amp;安全扫描\u0026amp;\u0026amp;App扫描\u0026amp;\u0026amp;漏洞扫描\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#132036452bfacf61471e3ea0b7bf7a55\"\u003e工具\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#de63a029bda6a7e429af272f291bb769\"\u003e(291) 未分类-Scanner\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#58d8b993ffc34f7ded7f4a0077129eb2\"\u003e(20) 隐私\u0026amp;\u0026amp;Secret\u0026amp;\u0026amp;Privacy扫描\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#1927ed0a77ff4f176b0b7f7abc551e4a\"\u003e隐私存储\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#1af1c4f9dba1db2a4137be9c441778b8\"\u003e(1) 未分类\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#362dfd9c1f530dd20f922fd4e0faf0e3\"\u003e(26) 隐写\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#1d8298e4ee4ad3c3028a1e157f85f27b\"\u003e文章\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#7669ebab00d00c744abc35195fbaa833\"\u003e新添加的\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#a76463feb91d09b3d024fae798b92be6\"\u003e侦察\u0026amp;\u0026amp;信息收集\u0026amp;\u0026amp;子域名发现与枚举\u0026amp;\u0026amp;OSINT\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#170048b7d8668c50681c0ab1e92c679a\"\u003e工具\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#05ab1b75266fddafc7195f5b395e4d99\"\u003e(210) 未分类-OSINT\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#e945721056c78a53003e01c3d2f3b8fe\"\u003e(81) 子域名枚举\u0026amp;\u0026amp;爆破\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#375a8baa06f24de1b67398c1ac74ed24\"\u003e(183) 信息收集\u0026amp;\u0026amp;侦查\u0026amp;\u0026amp;Recon\u0026amp;\u0026amp;InfoGather\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#016bb6bd00f1e0f8451f779fe09766db\"\u003e(75) 指纹\u0026amp;\u0026amp;Fingerprinting\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#6ea9006a5325dd21d246359329a3ede2\"\u003e(1) 收集\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#dc74ad2dd53aa8c8bf3a3097ad1f12b7\"\u003e社交网络\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#de93515e77c0ca100bbf92c83f82dc2a\"\u003e(2) Twitter\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#6d36e9623aadaf40085ef5af89c8d698\"\u003e(5) 其他-SocialNetwork\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#8d1ae776898748b8249132e822f6c919\"\u003e(13) Github\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#a695111d8e30d645354c414cb27b7843\"\u003e(71) DNS\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#18c7c1df2e6ae5e9135dfa2e4eb1d4db\"\u003e(68) Shodan\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#94c01f488096fafc194b9a07f065594c\"\u003e(187) nmap\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#b0ca6c8512a268e8438d5e5247a88c2f\"\u003e文章\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#5a855113503106950acff4d7dbb2403e\"\u003e新添加\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#546f4fe70faa2236c0fbc2d486a83391\"\u003e社工(SET)\u0026amp;\u0026amp;钓鱼\u0026amp;\u0026amp;鱼叉攻击\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#3e622bff3199cf22fe89db026b765cd4\"\u003e工具\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#ce734598055ad3885d45d0b35d2bf0d7\"\u003e(11) 未分类-SET\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#f30507893511f89b19934e082a54023e\"\u003e(2) 社工\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#290e9ae48108d21d6d8b9ea9e74d077d\"\u003e(156) 钓鱼\u0026amp;\u0026amp;Phish\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#ab3e6e6526d058e35c7091d8801ebf3a\"\u003e鱼叉攻击\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#8f6c7489870c7358c39c920c83fa2b6b\"\u003e文章\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#d7e332e9e235fd5a60687800f5ce184c\"\u003e新添加的\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#dc89c90b80529c1f62f413288bca89c4\"\u003e环境配置\u0026amp;\u0026amp;分析系统\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#9763d00cbe773aa10502dbe258f9c385\"\u003e工具\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#f5a7a43f964b2c50825f3e2fee5078c8\"\u003e(10) 未分类-Env\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#cf07b04dd2db1deedcf9ea18c05c83e0\"\u003e(5) Linux-Distro\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#4709b10a8bb691204c0564a3067a0004\"\u003e(3) 环境自动配置\u0026amp;\u0026amp;自动安装\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#6454949c0d580904537643b8f4cd5a6b\"\u003e文章\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#873294ea77bc292b6fc4cfb2f9b40049\"\u003e新添加的\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#c49aef477cf3397f97f8b72185c3d100\"\u003e密码\u0026amp;\u0026amp;凭证\u0026amp;\u0026amp;认证\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#862af330f45f21fbb0d495837fc7e879\"\u003e工具\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#20bf2e2fefd6de7aadbf0774f4921824\"\u003e(98) 未分类-Password\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#86dc226ae8a71db10e4136f4b82ccd06\"\u003e(43) 密码\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#764122f9a7cf936cd9bce316b09df5aa\"\u003e(15) 认证\u0026amp;\u0026amp;Authenticate\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#5fda419e854b390c8361d347f48607ce\"\u003e文章\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#776c034543a65be69c061d1aafce3127\"\u003e新添加的\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#43b0310ac54c147a62c545a2b0f4bce2\"\u003e辅助周边\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#569887799ee0148230cc5d7bf98e96d0\"\u003e(12) 未分类-Assist\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#86d5daccb4ed597e85a0ec9c87f3c66f\"\u003e(34) TLS\u0026amp;\u0026amp;SSL\u0026amp;\u0026amp;HTTPS\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#946d766c6a0fb23b480ff59d4029ec71\"\u003e防护\u0026amp;\u0026amp;Defense\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#0abd611fc3e9a4d9744865ca6e47a6b2\"\u003e工具\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#784ea32a3f4edde1cd424b58b17e7269\"\u003e(101) WAF\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#ce6532938f729d4c9d66a5c75d1676d3\"\u003e(119) 防火墙\u0026amp;\u0026amp;FireWall\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#ff3e0b52a1477704b5f6a94ccf784b9a\"\u003e(39) IDS\u0026amp;\u0026amp;IPS\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#7a277f8b0e75533e0b50d93c902fb351\"\u003e(43) 未分类-Defense\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#6543c237786d1f334d375f4d9acdeee4\"\u003e(3) 隐私保护\u0026amp;\u0026amp;Privacy\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#5aac7367edfef7c63fc95afd6762b773\"\u003e文章\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#04aac0e81b87788343930e9dbf01ba9c\"\u003e新添加的\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#52b481533d065d9e80cfd3cca9d91c7f\"\u003eSoftwareDefinedRadio\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#015984b1dae0c9aa03b3aa74ea449f3f\"\u003e(6) 工具\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#043e62cc373eb3e7b3910b622cf220d8\"\u003e文章\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#507f1a48f4709abb1c6b0d2689fd15e6\"\u003eLOLBin\u0026amp;\u0026amp;LOLScript\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#ec32edc7b3e441f29c70f6e9bca0174a\"\u003e(2) 工具\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#9bffad3ac781090ab31d4013bf858dd9\"\u003e文章\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#e25d233159b1dc40898ff0c74574f790\"\u003e日志\u0026amp;\u0026amp;Log\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#13df0f4d5c7a1386b329fd9e43d8fc15\"\u003e(1) 工具\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#06e7d46942d5159d19aa5c36f66f174a\"\u003e文章\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#9b026a07fdf243c6870ce91f00191214\"\u003e威胁狩猎\u0026amp;\u0026amp;ThreatHunt\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#b911aad7512e253660092942e06d00ad\"\u003e工具\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#0b27f97199330c4945572a1f9c229000\"\u003e(1) 未分类\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#f613271a55b177f626b42b8c728a0b1c\"\u003e文章\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#3828e67170e5db714c9c16f663b42a5e\"\u003e新添加的\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#d6b02213a74372407371f77dd6e39c99\"\u003eCrypto\u0026amp;\u0026amp;加密\u0026amp;\u0026amp;密码学\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#41d260119ad54db2739a9ae393bd87a5\"\u003e(13) 工具\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#cc043f672c90d4b834cdae80bfbe8851\"\u003e文章\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#8cb1c42a29fa3e8825a0f8fca780c481\"\u003e恶意代码\u0026amp;\u0026amp;Malware\u0026amp;\u0026amp;APT\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#e2fd0947924229d7de24b9902e1f54a0\"\u003e(12) 工具\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#cfffc63a6302bd3aa79a0305ed7afd55\"\u003e文章\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#7d5d2d22121ed8456f0c79098f5012bb\"\u003eREST_API\u0026amp;\u0026amp;RESTFUL \u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#3b127f2a89bc8d18b4ecb0d9c61f1d58\"\u003e(3) 工具\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#b16baff7e1b11133efecf1b5b6e10aab\"\u003e文章\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#ceb90405292daed9bb32ac20836c219a\"\u003e蓝牙\u0026amp;\u0026amp;Bluetooth\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#c72811e491c68f75ac2e7eb7afd3b01f\"\u003e(3) 工具\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#97e1bdced96fc7fcd502174d6eecee36\"\u003e文章\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#76df273beb09f6732b37a6420649179c\"\u003e浏览器\u0026amp;\u0026amp;browser\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#47a03071becd6df66b469df7c2c6f9b5\"\u003e(21) 工具\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#ca0c0694dc0aa87534e9bb19be4ee4d5\"\u003e文章\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#249c9d207ed6743e412c8c8bcd8a2927\"\u003eMitreATT\u0026amp;CK\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#a88c0c355b342b835fb42abee283bd71\"\u003e工具\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#6ab6835b55cf5c8462c4229a4a0ee94c\"\u003e(27) 未分类的\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#8512ba6c3855733a1474ca2f16153906\"\u003e文章\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#4b17464da487fbdf719e9a1482abf8f1\"\u003e新添加的\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#de81f9dd79c219c876c1313cd97852ce\"\u003e破解\u0026amp;\u0026amp;Crack\u0026amp;\u0026amp;爆破\u0026amp;\u0026amp;BruteForce\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#73c3c9225523cbb05333246f23342846\"\u003e工具\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#53084c21ff85ffad3dd9ce445684978b\"\u003e(255) 未分类的\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#171e396a8965775c27602762c6638694\"\u003e文章\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#fc3c73849911ede2ce0d6d02f1f5b0b9\"\u003e新添加的\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#96171a80e158b8752595329dd42e8bcf\"\u003e泄漏\u0026amp;\u0026amp;Breach\u0026amp;\u0026amp;Leak\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#602bb9759b0b2ba5555b05b7218a2d6f\"\u003e工具\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#dc507c5be7c09e1e88af7a1ad91e2703\"\u003e(15) 未分类\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#fb3bccf80281e11fdf4ef06ddaa34566\"\u003e文章\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#339727dd5a006d7a5bd8f0173dc80bb9\"\u003e新添加的\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#785ad72c95e857273dce41842f5e8873\"\u003e爬虫\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#0f931c85ab54698d0bcfaf9a3e6dac73\"\u003e工具\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#442f9390fd56008def077a21ab65d4aa\"\u003e(1) 未分类\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#23b008498c8b41ec3128bd9855660b7d\"\u003e文章\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#37ca6907aa42dfd32db5973ff9eec83d\"\u003e新添加的\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#39931e776c23e80229368dfc6fd54770\"\u003e无线\u0026amp;\u0026amp;WiFi\u0026amp;\u0026amp;AP\u0026amp;\u0026amp;802.11\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#d4efda1853b2cb0909727188116a2a8c\"\u003e(184) 未分类-WiFi\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#8d233e2d068cce2b36fd0cf44d10f5d8\"\u003e(7) WPS\u0026amp;\u0026amp;WPA\u0026amp;\u0026amp;WPA2\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#8863b7ba27658d687a85585e43b23245\"\u003e(2) 802.11\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#80301821d0f5d8ec2dd3754ebb1b4b10\"\u003ePayload\u0026amp;\u0026amp;远控\u0026amp;\u0026amp;RAT\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#783f861b9f822127dba99acb55687cbb\"\u003e工具\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#6602e118e0245c83b13ff0db872c3723\"\u003e(134) 未分类-payload\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#b5d99a78ddb383c208aae474fc2cb002\"\u003e(20) Payload收集\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#b318465d0d415e35fc0883e9894261d1\"\u003e(44) 远控\u0026amp;\u0026amp;RAT\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#ad92f6b801a18934f1971e2512f5ae4f\"\u003e(58) Payload生成\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#c45a90ab810d536a889e4e2dd45132f8\"\u003e(34) Botnet\u0026amp;\u0026amp;僵尸网络\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#b6efee85bca01cde45faa45a92ece37f\"\u003e(70) 后门\u0026amp;\u0026amp;添加后门\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#85bb0c28850ffa2b4fd44f70816db306\"\u003e(105) 混淆器\u0026amp;\u0026amp;Obfuscate\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#78d0ac450a56c542e109c07a3b0225ae\"\u003e(1) Payload管理\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#d08b7bd562a4bf18275c63ffe7d8fc91\"\u003e(32) 勒索软件\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#82f546c7277db7919986ecf47f3c9495\"\u003e(32) 键盘记录器\u0026amp;\u0026amp;Keylogger\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#8f99087478f596139922cd1ad9ec961b\"\u003e(13) Meterpreter\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#63e0393e375e008af46651a3515072d8\"\u003e(6) Payload投递\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#0b644b2d8119abf6643755ef455fcf2c\"\u003e文章\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#27962a7633b86d43cae2dd2d4c32f1b6\"\u003e新添加\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#a9494547a9359c60f09aea89f96a2c83\"\u003e后渗透\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#3ed50213c2818f1455eff4e30372c542\"\u003e工具\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#12abc279c69d1fcf10692b9cb89bcdf7\"\u003e(49) 未分类-post-exp\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#4c2095e7e192ac56f6ae17c8fc045c51\"\u003e(53) 提权\u0026amp;\u0026amp;PrivilegeEscalation\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#caab36bba7fa8bb931a9133e37d397f6\"\u003eWindows\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#58f3044f11a31d0371daa91486d3694e\"\u003e(19) UAC\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#7ed8ee71c4a733d5e5e5d239f0e8b9e0\"\u003e(72) 未分类-Windows\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#b84c84a853416b37582c3b7f13eabb51\"\u003e(3) AppLocker\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#e3c4c83dfed529ceee65040e565003c4\"\u003e(10) ActiveDirectory\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#25697cca32bd8c9492b8e2c8a3a93bfe\"\u003e域渗透\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#a5c1d88a8e35b6c6223a6d64dbfb5358\"\u003eWET\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#2dd40db455d3c6f1f53f8a9c25bbe63e\"\u003e(10) 驻留\u0026amp;\u0026amp;Persistence\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#4fc56d3dd1977b882ba14a9fd820f8e2\"\u003eLinux\u0026amp;\u0026amp;Xnix\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"#c86567da7d4004149912383575be3b45\"\u003e文章\u003c/a\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\u003ca href=\"#fdf10af493284be94033d1350f1e9b5c\"\u003e新添加\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-94ca60d12e210fdd7fd9e387339b293e\"\u003e\u003c/a\u003e新添加的\u003c/h1\u003e\u003ca id=\"user-content-新添加的\" class=\"anchor\" aria-label=\"Permalink: 新添加的\" href=\"#新添加的\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-9eee96404f868f372a6cbc6769ccb7f8\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-31185b925d5152c7469b963809ceb22d\"\u003e\u003c/a\u003e新添加的\u003c/h3\u003e\u003ca id=\"user-content-新添加的-1\" class=\"anchor\" aria-label=\"Permalink: 新添加的\" href=\"#新添加的-1\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e825\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/corelan/mona\"\u003ecorelan/mona\u003c/a\u003e 用于Immunity Debugger的mona.py\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e813\u003c/strong\u003e星][26d] [JS] \u003ca href=\"https://github.com/sindresorhus/is-online\"\u003esindresorhus/is-online\u003c/a\u003e 检查互联网连接是否正常\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e810\u003c/strong\u003e星][2m] [Shell] \u003ca href=\"https://github.com/andreyvit/create-dmg\"\u003eandreyvit/create-dmg\u003c/a\u003e 用于构建精美DMG的Shell脚本\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e793\u003c/strong\u003e星][2m] [Go] \u003ca href=\"https://github.com/dreddsa5dies/gohacktools\"\u003edreddsa5dies/gohacktools\u003c/a\u003e Golang编写的多款Hacking工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e786\u003c/strong\u003e星][1y] [PS] \u003ca href=\"https://github.com/kevin-robertson/invoke-thehash\"\u003ekevin-robertson/invoke-thehash\u003c/a\u003e 执行 pass the hash WMI 和 SMB 任务的PowerShell函数\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e783\u003c/strong\u003e星][26d] [Go] \u003ca href=\"https://github.com/bishopfox/sliver\"\u003ebishopfox/sliver\u003c/a\u003e 一个通用的跨平台植入程序框架,该框架C3支持Mutual-TLS,HTTP(S)和DNS\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e770\u003c/strong\u003e星][13d] [C++] \u003ca href=\"https://github.com/shekyan/slowhttptest\"\u003eshekyan/slowhttptest\u003c/a\u003e 应用层DoS攻击模拟器\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e770\u003c/strong\u003e星][18d] [C++] \u003ca href=\"https://github.com/snort3/snort3\"\u003esnort3/snort3\u003c/a\u003e 下一代Snort IPS(入侵防御系统)。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e761\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/greatsct/greatsct\"\u003egreatsct/greatsct\u003c/a\u003e 生成绕过常见防病毒解决方案和应用程序白名单解决方案的metasploit payload\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e760\u003c/strong\u003e星][11d] [HTML] \u003ca href=\"https://github.com/m4cs/babysploit\"\u003em4cs/babysploit\u003c/a\u003e 渗透测试工具包,旨在使您轻松学习如何使用更大,更复杂的框架(例如Metasploit)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e743\u003c/strong\u003e星][1y] [C#] \u003ca href=\"https://github.com/eladshamir/internal-monologue\"\u003eeladshamir/internal-monologue\u003c/a\u003e 在不接触LSASS的情况下提取NTLM hash\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e742\u003c/strong\u003e星][6m] [Go] \u003ca href=\"https://github.com/talkingdata/owl\"\u003etalkingdata/owl\u003c/a\u003e 企业级分布式监控告警系\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e731\u003c/strong\u003e星][2d] [Go] \u003ca href=\"https://github.com/gruntwork-io/cloud-nuke\"\u003egruntwork-io/cloud-nuke\u003c/a\u003e 通过检查(删除)其中的所有资源来清理云帐户\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e731\u003c/strong\u003e星][1m] [C] \u003ca href=\"https://github.com/iaik/zombieload\"\u003eiaik/zombieload\u003c/a\u003e ZombieLoad攻击PoC\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e729\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/shawndevans/smbmap\"\u003eshawndevans/smbmap\u003c/a\u003e SMB枚举\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e728\u003c/strong\u003e星][6m] [Go] \u003ca href=\"https://github.com/anshumanbh/git-all-secrets\"\u003eanshumanbh/git-all-secrets\u003c/a\u003e 结合多个开源 git 搜索工具实现的代码审计工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e723\u003c/strong\u003e星][6d] [Py] \u003ca href=\"https://github.com/skelsec/pypykatz\"\u003eskelsec/pypykatz\u003c/a\u003e 纯Python实现的Mimikatz\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e720\u003c/strong\u003e星][1y] [C#] \u003ca href=\"https://github.com/p3nt4/powershdll\"\u003ep3nt4/powershdll\u003c/a\u003e 使用rundll32执行PowerShell,绕过软件限制\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e716\u003c/strong\u003e星][6m] [Py] \u003ca href=\"https://github.com/adamlaurie/rfidiot\"\u003eadamlaurie/rfidiot\u003c/a\u003e python RFID / NFC library \u0026amp; tools\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e715\u003c/strong\u003e星][21d] [Py] \u003ca href=\"https://github.com/f-secure/see\"\u003ef-secure/see\u003c/a\u003e 在安全环境中构建测试自动化的框架\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e703\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/mjg59/python-broadlink\"\u003emjg59/python-broadlink\u003c/a\u003e Python模块,用于控制Broadlink RM2 / 3(Pro)遥控器、A1传感器平台和SP2 / 3智能插头\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e695\u003c/strong\u003e星][3m] \u003ca href=\"https://github.com/netflix/security-bulletins\"\u003enetflix/security-bulletins\u003c/a\u003e Security Bulletins that relate to Netflix Open Source\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e693\u003c/strong\u003e星][7m] [Py] \u003ca href=\"https://github.com/mr-un1k0d3r/powerlessshell\"\u003emr-un1k0d3r/powerlessshell\u003c/a\u003e 依靠MSBuild.exe远程执行PowerShell脚本和命令\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e686\u003c/strong\u003e星][3m] [Go] \u003ca href=\"https://github.com/pquerna/otp\"\u003epquerna/otp\u003c/a\u003e 一次性密码工具,Golang编写\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e683\u003c/strong\u003e星][1y] [PS] \u003ca href=\"https://github.com/Arvanaghi/SessionGopher\"\u003earvanaghi/sessiongopher\u003c/a\u003e 使用WMI为远程访问工具(如WinSCP,PuTTY,SuperPuTTY,FileZilla和Microsoft远程桌面)提取保存的会话信息。PowerShell编写\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e682\u003c/strong\u003e星][1m] \u003ca href=\"https://github.com/ptresearch/attackdetection\"\u003eptresearch/attackdetection\u003c/a\u003e 搜索新的漏洞和0day,进行服现并创建PoC exp,以了解这些安全漏洞的工作方式,以及如何在网络层上检测到相关的攻击\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e679\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/endgameinc/rta\"\u003eendgameinc/rta\u003c/a\u003e 根据MITER ATT&CK进行建模,针对恶意tradecraft测试其检测功能。脚本框架\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e679\u003c/strong\u003e星][5d] [C#] \u003ca href=\"https://github.com/ghostpack/rubeus\"\u003eghostpack/rubeus\u003c/a\u003e 原始Kerberos交互和滥用,C#编写\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e665\u003c/strong\u003e星][6m] [Py] \u003ca href=\"https://github.com/golismero/golismero\"\u003egolismero/golismero\u003c/a\u003e 安全测试框架,当前主要是Web安全,可轻松扩展到其他扫描\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e665\u003c/strong\u003e星][12m] [C#] \u003ca href=\"https://github.com/wwillv/godofhacker\"\u003ewwillv/godofhacker\u003c/a\u003e 由各种顶级黑客技术结合而成,基本功能覆盖面广,可满足大多数人的基本需求\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e656\u003c/strong\u003e星][6m] [PHP] \u003ca href=\"https://github.com/l3m0n/bypass_disable_functions_shell\"\u003el3m0n/bypass_disable_functions_shell\u003c/a\u003e 一个各种方式突破Disable_functions达到命令执行的shell\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e647\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/gquere/pwn_jenkins\"\u003egquere/pwn_jenkins\u003c/a\u003e 有关攻击Jenkins服务器的笔记\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e639\u003c/strong\u003e星][10m] [Py] \u003ca href=\"https://github.com/dirkjanm/privexchange\"\u003edirkjanm/privexchange\u003c/a\u003e 通过滥用Exchange交换您对Domain Admin privs的特权\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e635\u003c/strong\u003e星][1y] [JS] \u003ca href=\"https://github.com/alcuadrado/hieroglyphy\"\u003ealcuadrado/hieroglyphy\u003c/a\u003e 将所有JavaScript代码转换为等价的()[] {}!+字符序列!,可在浏览器中运行\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e630\u003c/strong\u003e星][5m] \u003ca href=\"https://github.com/ankane/secure_rails\"\u003eankane/secure_rails\u003c/a\u003e Rails安全最佳实战\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e621\u003c/strong\u003e星][1m] [Go] \u003ca href=\"https://github.com/evilsocket/arc\"\u003eevilsocket/arc\u003c/a\u003e 可用于管理私密数据的工具. 后端是 Go 语言编写的 RESTful 服务器, 前台是Html + JavaScript\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e605\u003c/strong\u003e星][30d] [Py] \u003ca href=\"https://github.com/webrecorder/pywb\"\u003ewebrecorder/pywb\u003c/a\u003e 重放和记录Web存档\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e601\u003c/strong\u003e星][4d] [YARA] \u003ca href=\"https://github.com/didierstevens/didierstevenssuite\"\u003edidierstevens/didierstevenssuite\u003c/a\u003e 工具、脚本列表\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e601\u003c/strong\u003e星][17d] [C] \u003ca href=\"https://github.com/mrexodia/titanhide\"\u003emrexodia/titanhide\u003c/a\u003e 用于隐藏某些进程调试器的驱动程序\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e599\u003c/strong\u003e星][2m] [PS] \u003ca href=\"https://github.com/ramblingcookiemonster/powershell\"\u003eramblingcookiemonster/powershell\u003c/a\u003e 各种PowerShell函数和脚本\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e588\u003c/strong\u003e星][11m] [C] \u003ca href=\"https://github.com/justinsteven/dostackbufferoverflowgood\"\u003ejustinsteven/dostackbufferoverflowgood\u003c/a\u003e 跨站点脚本编写者的演示和教程,这些站点编写者不能很好地堆积缓冲区溢出,并且也想做其他事情\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e583\u003c/strong\u003e星][10m] [Py] \u003ca href=\"https://github.com/romanz/amodem\"\u003eromanz/amodem\u003c/a\u003e 使用简单的耳机在两台计算机之间传输文件,实现真正的气密通信(通过扬声器和麦克风)或音频电缆(以提高传输速度)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e582\u003c/strong\u003e星][1y] [C#] \u003ca href=\"https://github.com/tyranid/dotnettojscript\"\u003etyranid/dotnettojscript\u003c/a\u003e 创建从内存中加载.NET v2程序集的JScript文件\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e580\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/nidem/kerberoast\"\u003enidem/kerberoast\u003c/a\u003e 一系列用于攻击MS Kerberos实现的工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e570\u003c/strong\u003e星][1y] [Solidity] \u003ca href=\"https://github.com/crytic/not-so-smart-contracts\"\u003ecrytic/not-so-smart-contracts\u003c/a\u003e 常见的以太坊智能合约漏洞示例,包括来自真实智能合约的代码。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e567\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/its-a-feature/apfell\"\u003eits-a-feature/apfell\u003c/a\u003e 利用python3,docker,docker-compose和Web浏览器UI构建的跨平台,后渗透的Red Team框架。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e557\u003c/strong\u003e星][1m] [C] \u003ca href=\"https://github.com/vanhauser-thc/thc-ipv6\"\u003evanhauser-thc/thc-ipv6\u003c/a\u003e IPv6攻击工具包\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e550\u003c/strong\u003e星][6m] [HCL] \u003ca href=\"https://github.com/coalfire-research/red-baron\"\u003ecoalfire-research/red-baron\u003c/a\u003e 为Red Teams自动创建有弹性,disposable,安全和敏捷的基础架构。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e542\u003c/strong\u003e星][9m] [C] \u003ca href=\"https://github.com/hfiref0x/upgdsed\"\u003ehfiref0x/upgdsed\u003c/a\u003e 通用PG和DSE禁用工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e539\u003c/strong\u003e星][3m] [C] \u003ca href=\"https://github.com/EliasOenal/multimon-ng\"\u003eeliasoenal/multimon-ng\u003c/a\u003e multimon-ng是multimon的继承者。解码多种数字传输模式\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e537\u003c/strong\u003e星][1y] [C#] \u003ca href=\"https://github.com/ghostpack/safetykatz\"\u003eghostpack/safetykatz\u003c/a\u003e Mimikatz和 .NET PE Loader的结合\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e531\u003c/strong\u003e星][13d] [Go] \u003ca href=\"https://github.com/sensepost/gowitness\"\u003esensepost/gowitness\u003c/a\u003e Go 语言编写的网站快照工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e526\u003c/strong\u003e星][5d] [Ruby] \u003ca href=\"https://github.com/hdm/mac-ages\"\u003ehdm/mac-ages\u003c/a\u003e 确定IEEE分配的硬件地址范围的大概发布日期\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e520\u003c/strong\u003e星][2m] [Shell] \u003ca href=\"https://github.com/trailofbits/twa\"\u003etrailofbits/twa\u003c/a\u003e 小型网页审计工具,可灵活设置参数\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e517\u003c/strong\u003e星][2m] [JS] \u003ca href=\"https://github.com/mr-un1k0d3r/thundershell\"\u003emr-un1k0d3r/thundershell\u003c/a\u003e 通过HTTP请求进行通信的C#RAT\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e517\u003c/strong\u003e星][5m] [C++] \u003ca href=\"https://github.com/shuax/greenchrome\"\u003eshuax/greenchrome\u003c/a\u003e 超好用的Chrome浏览器增强软件\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e516\u003c/strong\u003e星][8m] [Visual Basic .NET] \u003ca href=\"https://github.com/mr-un1k0d3r/maliciousmacrogenerator\"\u003emr-un1k0d3r/maliciousmacrogenerator\u003c/a\u003e 生成混淆的宏,可进行AV /沙箱逃逸\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e510\u003c/strong\u003e星][12m] [Go] \u003ca href=\"https://github.com/mthbernardes/gtrs\"\u003emthbernardes/gtrs\u003c/a\u003e 使用Google翻译器作为代理将任意命令发送到受感染的计算机\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e505\u003c/strong\u003e星][12m] [C] \u003ca href=\"https://github.com/google/ktsan\"\u003egoogle/ktsan\u003c/a\u003e 用于Linux内核的快速数据竞赛检测器\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e503\u003c/strong\u003e星][1m] [JS] \u003ca href=\"https://github.com/sindresorhus/public-ip\"\u003esindresorhus/public-ip\u003c/a\u003e 快速获取外网IP地址\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e501\u003c/strong\u003e星][2m] [C] \u003ca href=\"https://github.com/m0nad/diamorphine\"\u003em0nad/diamorphine\u003c/a\u003e 适用于Linux Kernels 2.6.x / 3.x / 4.x(x86和x86_64)的LKM rootkit\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e500\u003c/strong\u003e星][11m] [C] \u003ca href=\"https://github.com/yangyangwithgnu/bypass_disablefunc_via_ld_preload\"\u003eyangyangwithgnu/bypass_disablefunc_via_ld_preload\u003c/a\u003e 通过LD_PRELOA绕过disable_functions(不需要/ usr / sbin / sendmail)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e495\u003c/strong\u003e星][3m] [PHP] \u003ca href=\"https://github.com/nzedb/nzedb\"\u003enzedb/nzedb\u003c/a\u003e 自动扫描Usenet,类似于爬虫扫描互联网的方式\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e492\u003c/strong\u003e星][3m] [Go] \u003ca href=\"https://github.com/gen2brain/cam2ip\"\u003egen2brain/cam2ip\u003c/a\u003e 将任何网络摄像头转换为IP 摄像机\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e488\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/aoii103/darknet_chinesetrading\"\u003eaoii103/darknet_chinesetrading\u003c/a\u003e 暗网中文网监控实时爬虫\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e488\u003c/strong\u003e星][3m] [Go] \u003ca href=\"https://github.com/gorilla/csrf\"\u003egorilla/csrf\u003c/a\u003e 为Go Web应用程序和服务提供CSRF预防中间件\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e487\u003c/strong\u003e星][12m] [Go] \u003ca href=\"https://github.com/evanmiller/hecate\"\u003eevanmiller/hecate\u003c/a\u003e Hex编辑器\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e486\u003c/strong\u003e星][11m] [Shell] \u003ca href=\"https://github.com/craigz28/firmwalker\"\u003ecraigz28/firmwalker\u003c/a\u003e 一个简单的bash脚本,用于搜索提取或安装的固件文件系统。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e478\u003c/strong\u003e星][1m] \u003ca href=\"https://github.com/xiangpasama/jdsrc-small-classroom\"\u003exiangpasama/jdsrc-small-classroom\u003c/a\u003e 京东SRC小课堂系列文章\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e478\u003c/strong\u003e星][2m] [TS] \u003ca href=\"https://github.com/mitre-attack/attack-navigator\"\u003emitre-attack/attack-navigator\u003c/a\u003e 提供ATT&CK矩阵的基本导航和注释的Web App\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e472\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/bit4woo/teemo\"\u003ebit4woo/teemo\u003c/a\u003e 域名和电子邮件地址收集工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e469\u003c/strong\u003e星][20d] [Py] \u003ca href=\"https://github.com/fportantier/habu\"\u003efportantier/habu\u003c/a\u003e Python 编写的网络工具工具包,主要用于教学/理解网络攻击中的一些概念\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e468\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/coleifer/micawber\"\u003ecoleifer/micawber\u003c/a\u003e 用于从URL中提取丰富的内容库\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e467\u003c/strong\u003e星][1m] [Shell] \u003ca href=\"https://github.com/wireghoul/graudit\"\u003ewireghoul/graudit\u003c/a\u003e 简单的脚本和签名集,进行源代码审计\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e465\u003c/strong\u003e星][2m] [Go] \u003ca href=\"https://github.com/gen0cide/gscript\"\u003egen0cide/gscript\u003c/a\u003e 基于运行时参数,动态安装恶意软件\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e462\u003c/strong\u003e星][5m] [C] \u003ca href=\"https://github.com/phoenhex/files\"\u003ephoenhex/files\u003c/a\u003e Phoenhex 团队的exploits/POCs/presentation\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e461\u003c/strong\u003e星][3m] [PS] \u003ca href=\"https://github.com/rvrsh3ll/misc-powershell-scripts\"\u003ervrsh3ll/misc-powershell-scripts\u003c/a\u003e PowerShell工具集\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e454\u003c/strong\u003e星][19d] [PS] \u003ca href=\"https://github.com/mr-un1k0d3r/redteampowershellscripts\"\u003emr-un1k0d3r/redteampowershellscripts\u003c/a\u003e 在红队练习中可能会有用的各种PowerShell脚本\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e454\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/super-l/superl-url\"\u003esuper-l/superl-url\u003c/a\u003e 根据关键词,对搜索引擎内容检索结果的网址内容进行采集的一款轻量级软程序。 程序主要运用于安全渗透测试项目,以及批量评估各类CMS系统0DAY的影响程度,同时也是批量采集自己获取感兴趣的网站的一个小程序~~ 可自动从搜索引擎采集相关网站的真实地址与标题等信息,可保存为文件,自动去除重复URL。同时,也可以自定义忽略多条域名等。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e450\u003c/strong\u003e星][4m] [C++] \u003ca href=\"https://github.com/omerya/invisi-shell\"\u003eomerya/invisi-shell\u003c/a\u003e 隐藏您的Powershell脚本。绕过所有Powershell安全功能\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e431\u003c/strong\u003e星][7m] [Pascal] \u003ca href=\"https://github.com/mojtabatajik/robber\"\u003emojtabatajik/robber\u003c/a\u003e 查找易于发生DLL劫持的可执行文件\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e431\u003c/strong\u003e星][11d] [C++] \u003ca href=\"https://github.com/tenable/routeros\"\u003etenable/routeros\u003c/a\u003e 对 MikroTik的RouterOS进行安全性研究时使用的各种工具和漏洞\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e421\u003c/strong\u003e星][8m] \u003ca href=\"https://github.com/7kbstorm/7kbscan-webpathbrute\"\u003e7kbstorm/7kbscan-webpathbrute\u003c/a\u003e 路径暴力探测工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e420\u003c/strong\u003e星][11m] [Py] \u003ca href=\"https://github.com/powerscript/katanaframework\"\u003epowerscript/katanaframework\u003c/a\u003e 用于进行渗透测试的框架,基于一个简单而全面的结构,任何人都可以使用,修改和共享。Python编写\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e411\u003c/strong\u003e星][5d] [HTML] \u003ca href=\"https://github.com/w3c/webappsec\"\u003ew3c/webappsec\u003c/a\u003e Web App安全工作组\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e411\u003c/strong\u003e星][15d] [Py] \u003ca href=\"https://github.com/ytisf/pyexfil\"\u003eytisf/pyexfil\u003c/a\u003e 用于数据渗透的Python包\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e409\u003c/strong\u003e星][10m] [Py] \u003ca href=\"https://github.com/linklayer/pyvit\"\u003elinklayer/pyvit\u003c/a\u003e 与汽车接口的工具包。它旨在实现汽车系统中使用的通用硬件接口和协议。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e408\u003c/strong\u003e星][2d] [Go] \u003ca href=\"https://github.com/cloudfoundry/gorouter\"\u003ecloudfoundry/gorouter\u003c/a\u003e CF Router\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e401\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/fbngrm/Matroschka\"\u003efbngrm/matroschka\u003c/a\u003e Python隐写术工具,可在图像中红隐藏文本或图像\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e391\u003c/strong\u003e星][12d] [C++] \u003ca href=\"https://github.com/simsong/bulk_extractor\"\u003esimsong/bulk_extractor\u003c/a\u003e 取证工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e389\u003c/strong\u003e星][24d] [Ruby] \u003ca href=\"https://github.com/david942j/seccomp-tools\"\u003edavid942j/seccomp-tools\u003c/a\u003e 用于seccomp分析\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e386\u003c/strong\u003e星][4m] [PHP] \u003ca href=\"https://github.com/msurguy/honeypot\"\u003emsurguy/honeypot\u003c/a\u003e 一种简单有效的方法,来阻止某些进入您网站的垃圾邮件机器人\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e384\u003c/strong\u003e星][11d] [C#] \u003ca href=\"https://github.com/bloodhoundad/sharphound\"\u003ebloodhoundad/sharphound\u003c/a\u003e C#重写BloodHound Ingestor\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e383\u003c/strong\u003e星][1y] [JS] \u003ca href=\"https://github.com/empireproject/empire-gui\"\u003eempireproject/empire-gui\u003c/a\u003e Empire开渗透框架的图形界面\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e383\u003c/strong\u003e星][1m] [JS] \u003ca href=\"https://github.com/nccgroup/tracy\"\u003enccgroup/tracy\u003c/a\u003e 查找web app中所有的sinks and sources, 并以易于理解的方式显示这些结果\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e381\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/fox-it/bloodhound.py\"\u003efox-it/bloodhound.py\u003c/a\u003e 基于Python的BloodHound Ingestor,基于Impacket\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e379\u003c/strong\u003e星][9m] [Py] \u003ca href=\"https://github.com/k4m4/onioff\"\u003ek4m4/onioff\u003c/a\u003e url检测器,深度检测网页链接\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e376\u003c/strong\u003e星][2d] [Ruby] \u003ca href=\"https://github.com/dradis/dradis-ce\"\u003edradis/dradis-ce\u003c/a\u003e 面向信息安全团队的协作框架\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e376\u003c/strong\u003e星][7m] [Py] \u003ca href=\"https://github.com/tidesec/tidefinger\"\u003etidesec/tidefinger\u003c/a\u003e 指纹识别小工具,汲取整合了多个web指纹库,结合了多种指纹检测方法,让指纹检测更快捷、准确。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e375\u003c/strong\u003e星][] [C] \u003ca href=\"https://github.com/vanhauser-thc/aflplusplus\"\u003evanhauser-thc/aflplusplus\u003c/a\u003e 带社区补丁的afl 2.56b\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e375\u003c/strong\u003e星][6m] [Py] \u003ca href=\"https://github.com/vysecurity/DomLink\"\u003evysecurity/domlink\u003c/a\u003e 一种将具有注册组织名称和电子邮件的域链接到其他域的工具。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e369\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/emtunc/slackpirate\"\u003eemtunc/slackpirate\u003c/a\u003e Slack枚举和提取工具-从Slack工作区中提取敏感信息\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e367\u003c/strong\u003e星][20d] [Shell] \u003ca href=\"https://github.com/trimstray/otseca\"\u003etrimstray/otseca\u003c/a\u003e 安全审计工具, 搜索并转储系统配置\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e364\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/tenable/poc\"\u003etenable/poc\u003c/a\u003e 漏洞PoC\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e363\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/codingo/interlace\"\u003ecodingo/interlace\u003c/a\u003e 轻松将单线程命令行应用程序转换为具有CIDR和glob支持的快速,多线程应用程序。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e363\u003c/strong\u003e星][11m] [Py] \u003ca href=\"https://github.com/secynic/ipwhois\"\u003esecynic/ipwhois\u003c/a\u003e 检索和解析IPv4和IPv6地址的Whois数据\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e359\u003c/strong\u003e星][4d] [C#] \u003ca href=\"https://github.com/sonarsource/sonar-dotnet\"\u003esonarsource/sonar-dotnet\u003c/a\u003e 用于C#和VB.NET语言的静态代码分析器,用作SonarQube和SonarCloud平台的扩展。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e356\u003c/strong\u003e星][7d] [TeX] \u003ca href=\"https://github.com/vlsergey/infosec\"\u003evlsergey/infosec\u003c/a\u003e MIPT无线电工程与控制系统部信息保护教科书\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e356\u003c/strong\u003e星][21d] \u003ca href=\"https://github.com/hackerschoice/thc-tesla-powerwall2-hack\"\u003ehackerschoice/thc-tesla-powerwall2-hack\u003c/a\u003e TESLA PowerWall 2安全雪茄\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e355\u003c/strong\u003e星][19d] [Py] \u003ca href=\"https://github.com/lockgit/hacking\"\u003elockgit/hacking\u003c/a\u003e Hacking工具收集\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e355\u003c/strong\u003e星][5m] [Makefile] \u003ca href=\"https://github.com/xdite/internet-security\"\u003exdite/internet-security\u003c/a\u003e 互联网资安风控实战\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e347\u003c/strong\u003e星][7d] [Ruby] \u003ca href=\"https://github.com/sunitparekh/data-anonymization\"\u003esunitparekh/data-anonymization\u003c/a\u003e 帮助您构建匿名的生产数据转储,可用于性能测试,安全性测试,调试和开发。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e346\u003c/strong\u003e星][19d] [Perl] \u003ca href=\"https://github.com/keydet89/regripper2.8\"\u003ekeydet89/regripper2.8\u003c/a\u003e 从注册表中提取/解析信息(键,值,数据)并将其呈现出来进行分析。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e344\u003c/strong\u003e星][1y] [Assembly] \u003ca href=\"https://github.com/egebalci/amber\"\u003eegebalci/amber\u003c/a\u003e 反射式PE加壳器,用于绕过安全产品和缓解措施\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e343\u003c/strong\u003e星][2m] \u003ca href=\"https://github.com/veracode-research/solr-injection\"\u003everacode-research/solr-injection\u003c/a\u003e Apache Solr注入研究\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e342\u003c/strong\u003e星][9m] [Py] \u003ca href=\"https://github.com/skorov/ridrelay\"\u003eskorov/ridrelay\u003c/a\u003e 通过使用具有低priv的SMB中继来枚举您没有信誉的域上的用户名。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e340\u003c/strong\u003e星][11d] [C#] \u003ca href=\"https://github.com/mr-un1k0d3r/scshell\"\u003emr-un1k0d3r/scshell\u003c/a\u003e Fileless lateral movement tool that relies on ChangeServiceConfigA to run command\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e339\u003c/strong\u003e星][4d] [JS] \u003ca href=\"https://github.com/meituan-dianping/lyrebird\"\u003emeituan-dianping/lyrebird\u003c/a\u003e 基于拦截以及模拟HTTP/HTTPS网络请求的面向移动应用的插件化测试工作台\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e339\u003c/strong\u003e星][1y] [Ruby] \u003ca href=\"https://github.com/srcclr/commit-watcher\"\u003esrcclr/commit-watcher\u003c/a\u003e Find interesting and potentially hazardous commits in git projects\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e335\u003c/strong\u003e星][4m] [C] \u003ca href=\"https://github.com/csete/gpredict\"\u003ecsete/gpredict\u003c/a\u003e a real time satellite tracking and orbit prediction program\nfor the Linux desktop\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e332\u003c/strong\u003e星][11m] [C#] \u003ca href=\"https://github.com/ghostpack/sharpdump\"\u003eghostpack/sharpdump\u003c/a\u003e SharpDump is a C# port of PowerSploit's Out-Minidump.ps1 functionality.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e332\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/leapsecurity/InSpy\"\u003eleapsecurity/inspy\u003c/a\u003e A python based LinkedIn enumeration tool\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e331\u003c/strong\u003e星][1y] [Shell] \u003ca href=\"https://github.com/1n3/goohak\"\u003e1n3/goohak\u003c/a\u003e Automatically Launch Google Hacking Queries Against A Target Domain\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e328\u003c/strong\u003e星][1y] [Java] \u003ca href=\"https://github.com/ysrc/liudao\"\u003eysrc/liudao\u003c/a\u003e “六道”实时业务风控系统\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e327\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/defaultnamehere/cookie_crimes\"\u003edefaultnamehere/cookie_crimes\u003c/a\u003e Read local Chrome cookies without root or decrypting\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e326\u003c/strong\u003e星][2m] [PS] \u003ca href=\"https://github.com/joelgmsec/autordpwn\"\u003ejoelgmsec/autordpwn\u003c/a\u003e The Shadow Attack Framework\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e326\u003c/strong\u003e星][1y] [JS] \u003ca href=\"https://github.com/nccgroup/wssip\"\u003enccgroup/wssip\u003c/a\u003e 服务器和客户端之间通信时自定义 WebSocket 数据的捕获、修改和发送。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e326\u003c/strong\u003e星][1m] [Go] \u003ca href=\"https://github.com/wangyihang/platypus\"\u003ewangyihang/platypus\u003c/a\u003e A modern multiple reverse shell sessions/clients manager via terminal written in go\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e325\u003c/strong\u003e星][21d] [Shell] \u003ca href=\"https://github.com/al0ne/linuxcheck\"\u003eal0ne/linuxcheck\u003c/a\u003e linux信息收集/应急响应/常见后门检测脚本\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e324\u003c/strong\u003e星][12d] [JS] \u003ca href=\"https://github.com/privacypass/challenge-bypass-extension\"\u003eprivacypass/challenge-bypass-extension\u003c/a\u003e 用于匿名认证的浏览器扩展\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e323\u003c/strong\u003e星][1m] \u003ca href=\"https://github.com/trustedsec/physical-docs\"\u003etrustedsec/physical-docs\u003c/a\u003e This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselves when conducting physical security assessments.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e322\u003c/strong\u003e星][1y] \u003ca href=\"https://github.com/crazywa1ker/darthsidious-chinese\"\u003ecrazywa1ker/darthsidious-chinese\u003c/a\u003e 从0开始你的域渗透之旅\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e318\u003c/strong\u003e星][2m] [Visual Basic .NET] \u003ca href=\"https://github.com/nccgroup/vcg\"\u003enccgroup/vcg\u003c/a\u003e Code security scanning tool.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e317\u003c/strong\u003e星][5d] [Py] \u003ca href=\"https://github.com/circl/lookyloo\"\u003ecircl/lookyloo\u003c/a\u003e Lookyloo is a web interface allowing to scrape a website and then displays a tree of domains calling each other.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e316\u003c/strong\u003e星][22d] [HTML] \u003ca href=\"https://github.com/vanhauser-thc/thc-archive\"\u003evanhauser-thc/thc-archive\u003c/a\u003e All releases of the security research group (a.k.a. hackers) The Hacker's Choice\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e315\u003c/strong\u003e星][6d] [VBA] \u003ca href=\"https://github.com/itm4n/vba-runpe\"\u003eitm4n/vba-runpe\u003c/a\u003e A VBA implementation of the RunPE technique or how to bypass application whitelisting.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e315\u003c/strong\u003e星][8m] [C] \u003ca href=\"https://github.com/tomac/yersinia\"\u003etomac/yersinia\u003c/a\u003e layer 2 攻击框架\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e315\u003c/strong\u003e星][1y] [Go] \u003ca href=\"https://github.com/benjojo/bgp-battleships\"\u003ebenjojo/bgp-battleships\u003c/a\u003e Play battleships using BGP\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e313\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/coalfire-research/slackor\"\u003ecoalfire-research/slackor\u003c/a\u003e A Golang implant that uses Slack as a command and control server\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e312\u003c/strong\u003e星][7m] [C] \u003ca href=\"https://github.com/pmem/syscall_intercept\"\u003epmem/syscall_intercept\u003c/a\u003e Linux系统调用拦截框架,通过 hotpatching 进程标准C库的机器码实现。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e312\u003c/strong\u003e星][5m] [Java] \u003ca href=\"https://github.com/shengqi158/fastjson-remote-code-execute-poc\"\u003eshengqi158/fastjson-remote-code-execute-poc\u003c/a\u003e 直接用intellij IDEA打开即可 首先编译得到Test.class,然后运行Poc.java\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e311\u003c/strong\u003e星][7m] [HTML] \u003ca href=\"https://github.com/nccgroup/crosssitecontenthijacking\"\u003enccgroup/crosssitecontenthijacking\u003c/a\u003e Content hijacking proof-of-concept using Flash, PDF and Silverlight\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e311\u003c/strong\u003e星][1m] [YARA] \u003ca href=\"https://github.com/needmorecowbell/hamburglar\"\u003eneedmorecowbell/hamburglar\u003c/a\u003e collect useful information from urls, directories, and files\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e310\u003c/strong\u003e星][2m] [PS] \u003ca href=\"https://github.com/darkoperator/posh-secmod\"\u003edarkoperator/posh-secmod\u003c/a\u003e PowerShell Module with Security cmdlets for security work\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e309\u003c/strong\u003e星][4m] [PS] \u003ca href=\"https://github.com/enigma0x3/misc-powershell-stuff\"\u003eenigma0x3/misc-powershell-stuff\u003c/a\u003e random powershell goodness\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e305\u003c/strong\u003e星][3m] [C] \u003ca href=\"https://github.com/9176324/shark\"\u003e9176324/shark\u003c/a\u003e Turn off PatchGuard in real time for win7 (7600) ~ win10 (18950).\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e305\u003c/strong\u003e星][7d] \u003ca href=\"https://github.com/ugvf2009/miles\"\u003eugvf2009/miles\u003c/a\u003e 二爷翻墙,专注翻墙30年,但没有掌握核心科技^_^\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e305\u003c/strong\u003e星][11d] [Py] \u003ca href=\"https://github.com/xinsss/conf-for-surge-shadowrocket\"\u003exinsss/conf-for-surge-shadowrocket\u003c/a\u003e Surge Shadowrocket conf\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e304\u003c/strong\u003e星][2m] [JS] \u003ca href=\"https://github.com/doyensec/electronegativity\"\u003edoyensec/electronegativity\u003c/a\u003e Electronegativity is a tool to identify misconfigurations and security anti-patterns in Electron applications.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e300\u003c/strong\u003e星][] [C++] \u003ca href=\"https://github.com/squalr/squally\"\u003esqualr/squally\u003c/a\u003e 2D Platformer Game for Teaching Game Hacking - C++/cocos2d-x\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e300\u003c/strong\u003e星][1m] [C] \u003ca href=\"https://github.com/tarsnap/scrypt\"\u003etarsnap/scrypt\u003c/a\u003e The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more secure against hardware brute-force attacks than alternative functions such as PBKDF2 or bcrypt.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e299\u003c/strong\u003e星][10m] [C++] \u003ca href=\"https://github.com/anhkgg/superdllhijack\"\u003eanhkgg/superdllhijack\u003c/a\u003e SuperDllHijack:A general DLL hijack technology, don't need to manually export the same function interface of the DLL, so easy! 一种通用Dll劫持技术,不再需要手工导出Dll的函数接口了\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e299\u003c/strong\u003e星][1y] [C#] \u003ca href=\"https://github.com/ghostpack/sharpup\"\u003eghostpack/sharpup\u003c/a\u003e SharpUp is a C# port of various PowerUp functionality.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e298\u003c/strong\u003e星][7m] [Py] \u003ca href=\"https://github.com/edent/bmw-i-remote\"\u003eedent/bmw-i-remote\u003c/a\u003e A reverse engineered interface for the BMW i3 Electric Car\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e298\u003c/strong\u003e星][14d] [Shell] \u003ca href=\"https://github.com/fdiskyou/zines\"\u003efdiskyou/zines\u003c/a\u003e Mirror of my favourite hacking Zines for the lulz, nostalgy, and reference\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e297\u003c/strong\u003e星][10d] [JS] \u003ca href=\"https://github.com/jesusprubio/strong-node\"\u003ejesusprubio/strong-node\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e297\u003c/strong\u003e星][1y] [JS] \u003ca href=\"https://github.com/xxxily/fiddler-plus\"\u003exxxily/fiddler-plus\u003c/a\u003e 自定义的Fiddler规则,多环境切换、解决跨域开发、快速调试线上代码必备|高效调试分析利器\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e296\u003c/strong\u003e星][9m] [C] \u003ca href=\"https://github.com/gianlucaborello/libprocesshider\"\u003egianlucaborello/libprocesshider\u003c/a\u003e Hide a process under Linux using the ld preloader (\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e295\u003c/strong\u003e星][2m] [Go] \u003ca href=\"https://github.com/mdsecactivebreach/o365-attack-toolkit\"\u003emdsecactivebreach/o365-attack-toolkit\u003c/a\u003e A toolkit to attack Office365\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e295\u003c/strong\u003e星][9m] [C] \u003ca href=\"https://github.com/rhboot/shim\"\u003erhboot/shim\u003c/a\u003e a trivial EFI application that, when run, attempts to open and execute another application\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e292\u003c/strong\u003e星][9d] [Go] \u003ca href=\"https://github.com/cruise-automation/fwanalyzer\"\u003ecruise-automation/fwanalyzer\u003c/a\u003e a tool to analyze filesystem images for security\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e292\u003c/strong\u003e星][2m] [C] \u003ca href=\"https://github.com/mboehme/aflfast\"\u003emboehme/aflfast\u003c/a\u003e AFLFast (extends AFL with Power Schedules)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e292\u003c/strong\u003e星][2d] [Py] \u003ca href=\"https://github.com/vulnerscom/api\"\u003evulnerscom/api\u003c/a\u003e Python 2/3 library for the Vulners Database\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e290\u003c/strong\u003e星][20d] [C#] \u003ca href=\"https://github.com/matterpreter/offensivecsharp\"\u003ematterpreter/offensivecsharp\u003c/a\u003e Collection of Offensive C# Tooling\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e290\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/opsdisk/pagodo\"\u003eopsdisk/pagodo\u003c/a\u003e pagodo (Passive Google Dork) - Automate Google Hacking Database scraping\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e288\u003c/strong\u003e星][12m] [Py] \u003ca href=\"https://github.com/justicerage/ffm\"\u003ejusticerage/ffm\u003c/a\u003e Freedom Fighting Mode: open source hacking harness\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e287\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/apache/incubator-spot\"\u003eapache/incubator-spot\u003c/a\u003e Mirror of Apache Spot\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e283\u003c/strong\u003e星][16d] [PS] \u003ca href=\"https://github.com/nullbind/powershellery\"\u003enullbind/powershellery\u003c/a\u003e This repo contains Powershell scripts used for general hackery.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e282\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/hacktoolspack/hack-tools\"\u003ehacktoolspack/hack-tools\u003c/a\u003e hack tools\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e282\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/joxeankoret/pyew\"\u003ejoxeankoret/pyew\u003c/a\u003e Official repository for Pyew.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e282\u003c/strong\u003e星][13d] [PHP] \u003ca href=\"https://github.com/nico3333fr/csp-useful\"\u003enico3333fr/csp-useful\u003c/a\u003e Collection of scripts, thoughts about CSP (Content Security Policy)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e282\u003c/strong\u003e星][1y] [HTML] \u003ca href=\"https://github.com/googleprojectzero/p0tools\"\u003egoogleprojectzero/p0tools\u003c/a\u003e Project Zero Docs and Tools\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e278\u003c/strong\u003e星][5d] \u003ca href=\"https://github.com/geerlingguy/ansible-role-security\"\u003egeerlingguy/ansible-role-security\u003c/a\u003e Ansible Role - Security\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e277\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/18f/domain-scan\"\u003e18f/domain-scan\u003c/a\u003e A lightweight pipeline, locally or in Lambda, for scanning things like HTTPS, third party service use, and web accessibility.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e277\u003c/strong\u003e星][8m] \u003ca href=\"https://github.com/s0md3v/mypapers\"\u003es0md3v/mypapers\u003c/a\u003e Repository for hosting my research papers\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e276\u003c/strong\u003e星][28d] [C#] \u003ca href=\"https://github.com/mkaring/confuserex\"\u003emkaring/confuserex\u003c/a\u003e An open-source, free protector for .NET applications\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e274\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/invernizzi/scapy-http\"\u003einvernizzi/scapy-http\u003c/a\u003e Support for HTTP in Scapy\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e273\u003c/strong\u003e星][15d] [Py] \u003ca href=\"https://github.com/den1al/jsshell\"\u003eden1al/jsshell\u003c/a\u003e An interactive multi-user web JS shell\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e271\u003c/strong\u003e星][8m] \u003ca href=\"https://github.com/offensive-security/nethunter-lrt\"\u003eoffensive-security/nethunter-lrt\u003c/a\u003e The Nethunter Linux Root Toolkit is a collection of bash scripts which install Nethunter onto a supported device.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e271\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/s0md3v/Breacher\"\u003es0md3v/breacher\u003c/a\u003e An advanced multithreaded admin panel finder written in python.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e269\u003c/strong\u003e星][18d] [Py] \u003ca href=\"https://github.com/ledger-donjon/lascar\"\u003eledger-donjon/lascar\u003c/a\u003e Ledger's Advanced Side-Channel Analysis Repository\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e269\u003c/strong\u003e星][5d] [JS] \u003ca href=\"https://github.com/nodejs/security-wg\"\u003enodejs/security-wg\u003c/a\u003e Node.js Security Working Group\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e265\u003c/strong\u003e星][5d] [C] \u003ca href=\"https://github.com/eua/wxhexeditor\"\u003eeua/wxhexeditor\u003c/a\u003e wxHexEditor official GIT repo\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e265\u003c/strong\u003e星][1y] [PS] \u003ca href=\"https://github.com/fox-it/invoke-aclpwn\"\u003efox-it/invoke-aclpwn\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e264\u003c/strong\u003e星][11m] [Py] \u003ca href=\"https://github.com/ant4g0nist/susanoo\"\u003eant4g0nist/susanoo\u003c/a\u003e A REST API security testing framework.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e264\u003c/strong\u003e星][t] [C++] \u003ca href=\"https://github.com/fransbouma/injectablegenericcamerasystem\"\u003efransbouma/injectablegenericcamerasystem\u003c/a\u003e This is a generic camera system to be used as the base for cameras for taking screenshots within games. The main purpose of the system is to hijack the in-game 3D camera by overwriting values in its camera structure with our own values so we can control where the camera is located, it's pitch/yaw/roll values, its FoV and the camera's look vector.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e264\u003c/strong\u003e星][9m] [C] \u003ca href=\"https://github.com/landhb/hideprocess\"\u003elandhb/hideprocess\u003c/a\u003e A basic Direct Kernel Object Manipulation rootkit that removes a process from the EPROCESS list, hiding it from the Task Manager\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e264\u003c/strong\u003e星][1y] [JS] \u003ca href=\"https://github.com/roccomuso/netcat\"\u003eroccomuso/netcat\u003c/a\u003e Netcat client and server modules written in pure Javascript for Node.j\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e263\u003c/strong\u003e星][25d] [Py] \u003ca href=\"https://github.com/guimaizi/get_domain\"\u003eguimaizi/get_domain\u003c/a\u003e 域名收集与监测\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e263\u003c/strong\u003e星][1m] [Ruby] \u003ca href=\"https://github.com/rapid7/recog\"\u003erapid7/recog\u003c/a\u003e Pattern recognition for hosts, services, and content\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e262\u003c/strong\u003e星][4m] [C] \u003ca href=\"https://github.com/portcullislabs/linikatz\"\u003eportcullislabs/linikatz\u003c/a\u003e UNIX版本的Mimikatz\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e262\u003c/strong\u003e星][] \u003ca href=\"https://github.com/rustsec/advisory-db\"\u003erustsec/advisory-db\u003c/a\u003e Security advisory database for Rust crates published through crates.io\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e262\u003c/strong\u003e星][6d] [Py] \u003ca href=\"https://github.com/sofianehamlaoui/lockdoor-framework\"\u003esofianehamlaoui/lockdoor-framework\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e260\u003c/strong\u003e星][12m] [Py] \u003ca href=\"https://github.com/hysnsec/DevSecOps-Studio\"\u003ehysnsec/devsecops-studio\u003c/a\u003e DevSecOps Distribution - Virtual Environment to learn DevSecOps\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e259\u003c/strong\u003e星][10d] [C++] \u003ca href=\"https://github.com/poweradminllc/paexec\"\u003epoweradminllc/paexec\u003c/a\u003e Remote execution, like PsExec\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e258\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/m4ll0k/galileo\"\u003em4ll0k/galileo\u003c/a\u003e Galileo - Web Application Audit Framework\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e257\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/frint0/email-enum\"\u003efrint0/email-enum\u003c/a\u003e Email-Enum searches mainstream websites and tells you if an email is registered! #DEPRECATED\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e257\u003c/strong\u003e星][10m] [C] \u003ca href=\"https://github.com/p0f/p0f\"\u003ep0f/p0f\u003c/a\u003e p0f unofficial git repo\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e255\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/cloudflare/python-cloudflare\"\u003ecloudflare/python-cloudflare\u003c/a\u003e Python wrapper for the Cloudflare Client API v4\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e254\u003c/strong\u003e星][7m] [Go] \u003ca href=\"https://github.com/lavalamp-/ipv666\"\u003elavalamp-/ipv666\u003c/a\u003e IPV6地址枚举工具. Go编写\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e254\u003c/strong\u003e星][10m] [Py] \u003ca href=\"https://github.com/wh0ale/src-experience\"\u003ewh0ale/src-experience\u003c/a\u003e 工欲善其事,必先利其器\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e252\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/cvandeplas/pystemon\"\u003ecvandeplas/pystemon\u003c/a\u003e Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e252\u003c/strong\u003e星][7m] [Py] \u003ca href=\"https://github.com/itskindred/procspy\"\u003eitskindred/procspy\u003c/a\u003e Python tool that monitors and logs user-run commands on a Linux system for either offensive or defensive purposes..\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e252\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/rvrsh3ll/findfrontabledomains\"\u003ervrsh3ll/findfrontabledomains\u003c/a\u003e Search for potential frontable domains\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e250\u003c/strong\u003e星][9m] [C] \u003ca href=\"https://github.com/jakeajames/rootlessjb\"\u003ejakeajames/rootlessjb\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e249\u003c/strong\u003e星][19d] [Py] \u003ca href=\"https://github.com/cisco-config-analysis-tool/ccat\"\u003ecisco-config-analysis-tool/ccat\u003c/a\u003e Cisco Config Analysis Tool\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e248\u003c/strong\u003e星][8d] [Py] \u003ca href=\"https://github.com/SusmithKrishnan/torghost\"\u003esusmithkrishnan/torghost\u003c/a\u003e Tor anonimizer\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e246\u003c/strong\u003e星][8m] \u003ca href=\"https://github.com/ethicalhack3r/wordpress_plugin_security_testing_cheat_sheet\"\u003eethicalhack3r/wordpress_plugin_security_testing_cheat_sheet\u003c/a\u003e WordPress插件安全测试备忘录。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e246\u003c/strong\u003e星][1y] \u003ca href=\"https://github.com/xcsh/unity-game-hacking\"\u003excsh/unity-game-hacking\u003c/a\u003e A guide for hacking unity games\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e244\u003c/strong\u003e星][9m] [Py] \u003ca href=\"https://github.com/mazen160/bfac\"\u003emazen160/bfac\u003c/a\u003e 自动化 web app 备份文件测试工具,可检测备份文件是否会泄露 web app 源代码\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e244\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/openstack/syntribos\"\u003eopenstack/syntribos\u003c/a\u003e 自动化的 API 安全测试工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e242\u003c/strong\u003e星][19d] [Rust] \u003ca href=\"https://github.com/Hirrolot/anevicon\"\u003ehirrolot/anevicon\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e239\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/matthewclarkmay/geoip-attack-map\"\u003ematthewclarkmay/geoip-attack-map\u003c/a\u003e Cyber security geoip attack map that follows syslog and parses IPs/port numbers to visualize attackers in real time.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e238\u003c/strong\u003e星][2m] [JS] \u003ca href=\"https://github.com/martinzhou2015/srcms\"\u003emartinzhou2015/srcms\u003c/a\u003e SRCMS企业应急响应与缺陷管理系统\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e238\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/timlib/webxray\"\u003etimlib/webxray\u003c/a\u003e webxray is a tool for analyzing third-party content on webpages and identifying the companies which collect user data.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e237\u003c/strong\u003e星][11m] \u003ca href=\"https://github.com/duoergun0729/2book\"\u003eduoergun0729/2book\u003c/a\u003e 《Web安全之深度学习实战》\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e236\u003c/strong\u003e星][10m] [Py] \u003ca href=\"https://github.com/cryin/javaid\"\u003ecryin/javaid\u003c/a\u003e java source code static code analysis and danger function identify prog\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e236\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/xhak9x/fbi\"\u003exhak9x/fbi\u003c/a\u003e Facebook Information\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e231\u003c/strong\u003e星][18d] \u003ca href=\"https://github.com/o-mg/demonseed\"\u003eo-mg/demonseed\u003c/a\u003e minimal malicious USB cabl\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e231\u003c/strong\u003e星][3d] [Py] \u003ca href=\"https://github.com/webbreacher/whatsmyname\"\u003ewebbreacher/whatsmyname\u003c/a\u003e This repository has the unified data required to perform user enumeration on various websites. Content is in a JSON file and can easily be used in other projects.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e230\u003c/strong\u003e星][2m] [Java] \u003ca href=\"https://github.com/commonsguy/cwac-netsecurity\"\u003ecommonsguy/cwac-netsecurity\u003c/a\u003e CWAC-NetSecurity: Simplifying Secure Internet Access\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e230\u003c/strong\u003e星][2m] [PS] \u003ca href=\"https://github.com/miriamxyra/eventlist\"\u003emiriamxyra/eventlist\u003c/a\u003e help improving your Audit capabilities and to help to build your Security Operation Center.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e229\u003c/strong\u003e星][1m] [C] \u003ca href=\"https://github.com/vusec/ridl\"\u003evusec/ridl\u003c/a\u003e RIDL test suite and exploits\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e226\u003c/strong\u003e星][1y] [Go] \u003ca href=\"https://github.com/netxfly/sec_check\"\u003enetxfly/sec_check\u003c/a\u003e 服务器安全检测的辅助工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e226\u003c/strong\u003e星][1y] \u003ca href=\"https://github.com/lanjelot/kb\"\u003elanjelot/kb\u003c/a\u003e Respositoy of all my notes on infosec I have been building up over the years\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e224\u003c/strong\u003e星][1y] \u003ca href=\"https://github.com/basilfx/tradfri-hacking\"\u003ebasilfx/tradfri-hacking\u003c/a\u003e Hacking the IKEA TRÅDFRI light bulbs and accessories.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e223\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/tkcert/mail-security-tester\"\u003etkcert/mail-security-tester\u003c/a\u003e A testing framework for mail security and filtering solutions.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e221\u003c/strong\u003e星][7m] \u003ca href=\"https://github.com/bhdresh/dejavu\"\u003ebhdresh/dejavu\u003c/a\u003e deception framework which can be used to deploy decoys across the infrastructure\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e220\u003c/strong\u003e星][5m] [Shell] \u003ca href=\"https://github.com/vedetta-com/vedetta\"\u003evedetta-com/vedetta\u003c/a\u003e OpenBSD Router Boilerplate\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e220\u003c/strong\u003e星][15d] [Py] \u003ca href=\"https://github.com/wazuh/wazuh-ruleset\"\u003ewazuh/wazuh-ruleset\u003c/a\u003e ruleset is used to detect attacks, intrusions, software misuse, configuration problems, application errors, malware, rootkits, system anomalies or security policy violations.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e219\u003c/strong\u003e星][9m] [JS] \u003ca href=\"https://github.com/zhuyingda/veneno\"\u003ezhuyingda/veneno\u003c/a\u003e 用Node.js编写的Web安全测试框架\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e218\u003c/strong\u003e星][10m] [C] \u003ca href=\"https://github.com/feexd/pocs\"\u003efeexd/pocs\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e218\u003c/strong\u003e星][10m] [JS] \u003ca href=\"https://github.com/jopyth/mmm-remote-control\"\u003ejopyth/mmm-remote-control\u003c/a\u003e Magic Mirror Module to shutdown or configure your mirror\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e217\u003c/strong\u003e星][10m] [Py] \u003ca href=\"https://github.com/Mckinsey666/vocabs\"\u003emckinsey666/vocabs\u003c/a\u003e A lightweight online dictionary integration to the command line\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e216\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/jordanpotti/cloudscraper\"\u003ejordanpotti/cloudscraper\u003c/a\u003e Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e216\u003c/strong\u003e星][9m] [C] \u003ca href=\"https://github.com/sleinen/samplicator\"\u003esleinen/samplicator\u003c/a\u003e Send copies of (UDP) datagrams to multiple receivers, with optional sampling and spoofing\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e215\u003c/strong\u003e星][6m] [C#] \u003ca href=\"https://github.com/erfg12/memory.dll\"\u003eerfg12/memory.dll\u003c/a\u003e C# Hacking library for making PC game trainers.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e214\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/infosecn1nja/maliciousmacromsbuild\"\u003einfosecn1nja/maliciousmacromsbuild\u003c/a\u003e Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e213\u003c/strong\u003e星][6m] [Py] \u003ca href=\"https://github.com/dirkjanm/krbrelayx\"\u003edirkjanm/krbrelayx\u003c/a\u003e Kerberos unconstrained delegation abuse toolkit\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e213\u003c/strong\u003e星][27d] [Py] \u003ca href=\"https://github.com/nyxgeek/lyncsmash\"\u003enyxgeek/lyncsmash\u003c/a\u003e locate and attack Lync/Skype for Business\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e210\u003c/strong\u003e星][5m] [Java] \u003ca href=\"https://github.com/dschanoeh/kayak\"\u003edschanoeh/kayak\u003c/a\u003e Kayak is a CAN bus analysis tool based on SocketCAN\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e210\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/si9int/cc.py\"\u003esi9int/cc.py\u003c/a\u003e Extracting URLs of a specific target based on the results of \"commoncrawl.org\"\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e210\u003c/strong\u003e星][2m] [Shell] \u003ca href=\"https://github.com/hak5/lanturtle-modules\"\u003ehak5/lanturtle-modules\u003c/a\u003e The Official LAN Turtle Module Repository\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e209\u003c/strong\u003e星][5m] [PS] \u003ca href=\"https://github.com/harmj0y/damp\"\u003eharmj0y/damp\u003c/a\u003e The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e208\u003c/strong\u003e星][11d] [C#] \u003ca href=\"https://github.com/b4rtik/redpeanut\"\u003eb4rtik/redpeanut\u003c/a\u003e RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e208\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/seahoh/gotox\"\u003eseahoh/gotox\u003c/a\u003e 本地自动代理,修改自 goagent。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e207\u003c/strong\u003e星][8m] \u003ca href=\"https://github.com/1hack0/facebook-bug-bounty-write-ups\"\u003e1hack0/facebook-bug-bounty-write-ups\u003c/a\u003e Hunting Bugs for Fun and Profit\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e207\u003c/strong\u003e星][4m] [HCL] \u003ca href=\"https://github.com/byt3bl33d3r/red-baron\"\u003ebyt3bl33d3r/red-baron\u003c/a\u003e Automate creating resilient, disposable, secure and agile infrastructure for Red Teams\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e207\u003c/strong\u003e星][5m] [YARA] \u003ca href=\"https://github.com/th3hurrican3/pepper\"\u003eth3hurrican3/pepper\u003c/a\u003e An open source script to perform malware static analysis on Portable Executable\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e206\u003c/strong\u003e星][1y] [JS] \u003ca href=\"https://github.com/jpcertcc/sysmonsearch\"\u003ejpcertcc/sysmonsearch\u003c/a\u003e Investigate suspicious activity by visualizing Sysmon's event log\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e206\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/orf/xcat\"\u003eorf/xcat\u003c/a\u003e 辅助盲 Xpath 注入,检索正在由 Xpath 查询处理的整个 XML 文档,读取主机文件系统上的任意文件,并使用出站 HTTP 请求,使服务器将数据直接发送到xcat\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e206\u003c/strong\u003e星][9m] [Py] \u003ca href=\"https://github.com/openstack/hacking\"\u003eopenstack/hacking\u003c/a\u003e OpenStack Hacking Style Checks\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e204\u003c/strong\u003e星][1m] [Jupyter Notebook] \u003ca href=\"https://github.com/hunters-forge/ATTACK-Python-Client\"\u003ehunters-forge/attack-python-client\u003c/a\u003e Python Script to access ATT\u0026amp;CK content available in STIX via a public TAXII server\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e203\u003c/strong\u003e星][2m] [TS] \u003ca href=\"https://github.com/helmetjs/csp\"\u003ehelmetjs/csp\u003c/a\u003e Content Security Policy middleware\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e203\u003c/strong\u003e星][7m] [JS] \u003ca href=\"https://github.com/wingleung/save-page-state\"\u003ewingleung/save-page-state\u003c/a\u003e A chrome extension to save the state of a page for further analysis\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e202\u003c/strong\u003e星][10d] [C++] \u003ca href=\"https://github.com/oisf/libhtp\"\u003eoisf/libhtp\u003c/a\u003e LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-f34b4da04f2a77a185729b5af752efc5\"\u003e\u003c/a\u003e未分类\u003c/h3\u003e\u003ca id=\"user-content-未分类\" class=\"anchor\" aria-label=\"Permalink: 未分类\" href=\"#未分类\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-b9dc08e7e118fc7af41df5e0ef9ddc3c\"\u003e\u003c/a\u003e新添加1\u003c/h3\u003e\u003ca id=\"user-content-新添加1\" class=\"anchor\" aria-label=\"Permalink: 新添加1\" href=\"#新添加1\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-efb2cfb167e34b03243547cfb3a662ac\"\u003e\u003c/a\u003e新添加2\u003c/h3\u003e\u003ca id=\"user-content-新添加2\" class=\"anchor\" aria-label=\"Permalink: 新添加2\" href=\"#新添加2\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-f04dd1be8e552b074dde7cb33ae6c84c\"\u003e\u003c/a\u003e未分类3\u003c/h3\u003e\u003ca id=\"user-content-未分类3\" class=\"anchor\" aria-label=\"Permalink: 未分类3\" href=\"#未分类3\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-cbb37de8d70e314ce905d78c566ef384\"\u003e\u003c/a\u003e未分类4\u003c/h3\u003e\u003ca id=\"user-content-未分类4\" class=\"anchor\" aria-label=\"Permalink: 未分类4\" href=\"#未分类4\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-bb7173c3a2ea52d046c8abe3c57e3291\"\u003e\u003c/a\u003e未分类5\u003c/h3\u003e\u003ca id=\"user-content-未分类5\" class=\"anchor\" aria-label=\"Permalink: 未分类5\" href=\"#未分类5\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-f7654997cf8b691617b89c5e523a942f\"\u003e\u003c/a\u003e其他\u003c/h3\u003e\u003ca id=\"user-content-其他\" class=\"anchor\" aria-label=\"Permalink: 其他\" href=\"#其他\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e923\u003c/strong\u003e星][3d] [C] \u003ca href=\"https://github.com/arm-software/arm-trusted-firmware\"\u003earm-software/arm-trusted-firmware\u003c/a\u003e Arm A-Profile体系结构(Armv8-A和Armv7-A)的安全世界软件的参考实现,其中包括Exception Level 3(EL3)安全监视器。\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-d5e869a870d6e2c14911de2bc527a6ef\"\u003e\u003c/a\u003e古老的\u0026amp;\u0026amp;有新的替代版本的\u003c/h2\u003e\u003ca id=\"user-content-古老的有新的替代版本的\" class=\"anchor\" aria-label=\"Permalink: 古老的\u0026amp;\u0026amp;有新的替代版本的\" href=\"#古老的有新的替代版本的\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1605\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/knownsec/pocsuite\"\u003eknownsec/pocsuite\u003c/a\u003e This project has stopped to maintenance, please to\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-8603294b7c1f136b866b6402d63a9978\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-f110da0bf67359d3abc62b27d717e55e\"\u003e\u003c/a\u003e新添加的\u003c/h3\u003e\u003ca id=\"user-content-新添加的-2\" class=\"anchor\" aria-label=\"Permalink: 新添加的\" href=\"#新添加的-2\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-a4ee2f4d4a944b54b2246c72c037cd2e\"\u003e\u003c/a\u003e收集\u0026amp;\u0026amp;集合\u003c/h1\u003e\u003ca id=\"user-content-收集集合\" class=\"anchor\" aria-label=\"Permalink: 收集\u0026amp;\u0026amp;集合\" href=\"#收集集合\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-e97d183e67fa3f530e7d0e7e8c33ee62\"\u003e\u003c/a\u003e未分类\u003c/h2\u003e\u003ca id=\"user-content-未分类-1\" class=\"anchor\" aria-label=\"Permalink: 未分类\" href=\"#未分类-1\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e4252\u003c/strong\u003e星][22d] \u003ca href=\"https://github.com/qazbnm456/awesome-web-security\"\u003eqazbnm456/awesome-web-security\u003c/a\u003e web 安全资源列表\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3168\u003c/strong\u003e星][8d] [CSS] \u003ca href=\"https://github.com/juliocesarfort/public-pentesting-reports\"\u003ejuliocesarfort/public-pentesting-reports\u003c/a\u003e Curated list of public penetration test reports released by several consulting firms and academic security groups\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2904\u003c/strong\u003e星][3m] \u003ca href=\"https://github.com/infosecn1nja/red-teaming-toolkit\"\u003einfosecn1nja/red-teaming-toolkit\u003c/a\u003e A collection of open source and commercial tools that aid in red team operations.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2680\u003c/strong\u003e星][4d] \u003ca href=\"https://github.com/rmusser01/infosec_reference\"\u003ermusser01/infosec_reference\u003c/a\u003e An Information Security Reference That Doesn't Suck\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2529\u003c/strong\u003e星][3m] \u003ca href=\"https://github.com/kbandla/aptnotes\"\u003ekbandla/aptnotes\u003c/a\u003e Various public documents, whitepapers and articles about APT campaigns\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2474\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/0xinfection/awesome-waf\"\u003e0xinfection/awesome-waf\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2345\u003c/strong\u003e星][12d] \u003ca href=\"https://github.com/yeyintminthuhtut/awesome-red-teaming\"\u003eyeyintminthuhtut/awesome-red-teaming\u003c/a\u003e List of Awesome Red Teaming Resources\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2161\u003c/strong\u003e星][10m] \u003ca href=\"https://github.com/exakat/php-static-analysis-tools\"\u003eexakat/php-static-analysis-tools\u003c/a\u003e A reviewed list of useful PHP static analysis tools\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2116\u003c/strong\u003e星][1m] \u003ca href=\"https://github.com/infoslack/awesome-web-hacking\"\u003einfoslack/awesome-web-hacking\u003c/a\u003e A list of web application security\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2067\u003c/strong\u003e星][2d] \u003ca href=\"https://github.com/tanprathan/mobileapp-pentest-cheatsheet\"\u003etanprathan/mobileapp-pentest-cheatsheet\u003c/a\u003e The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2066\u003c/strong\u003e星][1y] \u003ca href=\"https://github.com/bluscreenofjeff/red-team-infrastructure-wiki\"\u003ebluscreenofjeff/red-team-infrastructure-wiki\u003c/a\u003e Wiki to collect Red Team infrastructure hardening resources\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1930\u003c/strong\u003e星][3m] \u003ca href=\"https://github.com/toolswatch/blackhat-arsenal-tools\"\u003etoolswatch/blackhat-arsenal-tools\u003c/a\u003e Black Hat 武器库\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1845\u003c/strong\u003e星][2m] \u003ca href=\"https://github.com/djadmin/awesome-bug-bounty\"\u003edjadmin/awesome-bug-bounty\u003c/a\u003e A comprehensive curated list of available Bug Bounty \u0026amp; Disclosure Programs and Write-ups.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1760\u003c/strong\u003e星][1y] \u003ca href=\"https://github.com/coreb1t/awesome-pentest-cheat-sheets\"\u003ecoreb1t/awesome-pentest-cheat-sheets\u003c/a\u003e Collection of the cheat sheets useful for pentesting\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1752\u003c/strong\u003e星][1m] \u003ca href=\"https://github.com/ngalongc/bug-bounty-reference\"\u003engalongc/bug-bounty-reference\u003c/a\u003e Inspired by\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1716\u003c/strong\u003e星][4m] [R] \u003ca href=\"https://github.com/briatte/awesome-network-analysis\"\u003ebriatte/awesome-network-analysis\u003c/a\u003e A curated list of awesome network analysis resources.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1602\u003c/strong\u003e星][7m] [Py] \u003ca href=\"https://github.com/w1109790800/penetration\"\u003ew1109790800/penetration\u003c/a\u003e 渗透 超全面的渗透资料\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1585\u003c/strong\u003e星][7m] [Ruby] \u003ca href=\"https://github.com/brunofacca/zen-rails-security-checklist\"\u003ebrunofacca/zen-rails-security-checklist\u003c/a\u003e Checklist of security precautions for Ruby on Rails applications.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1546\u003c/strong\u003e星][9d] \u003ca href=\"https://github.com/emijrp/awesome-awesome\"\u003eemijrp/awesome-awesome\u003c/a\u003e A curated list of awesome curated lists of many topics.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1534\u003c/strong\u003e星][6m] \u003ca href=\"https://github.com/snowming04/the-hacker-playbook-3-translation\"\u003esnowming04/the-hacker-playbook-3-translation\u003c/a\u003e 对 The Hacker Playbook 3 的翻译。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1376\u003c/strong\u003e星][2m] \u003ca href=\"https://github.com/grrrdog/java-deserialization-cheat-sheet\"\u003egrrrdog/java-deserialization-cheat-sheet\u003c/a\u003e The cheat sheet about Java Deserialization vulnerabilities\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1242\u003c/strong\u003e星][1y] [Ruby] \u003ca href=\"https://github.com/eliotsykes/rails-security-checklist\"\u003eeliotsykes/rails-security-checklist\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1207\u003c/strong\u003e星][8m] \u003ca href=\"https://github.com/joe-shenouda/awesome-cyber-skills\"\u003ejoe-shenouda/awesome-cyber-skills\u003c/a\u003e A curated list of hacking environments where you can train your cyber skills legally and safely\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1197\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/cujanovic/ssrf-testing\"\u003ecujanovic/ssrf-testing\u003c/a\u003e SSRF (Server Side Request Forgery) testing resources\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1172\u003c/strong\u003e星][7d] \u003ca href=\"https://github.com/m4ll0k/awesome-hacking-tools\"\u003em4ll0k/awesome-hacking-tools\u003c/a\u003e Awesome Hacking Tools\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1164\u003c/strong\u003e星][4d] \u003ca href=\"https://github.com/w00t3k/awesome-cellular-hacking\"\u003ew00t3k/awesome-cellular-hacking\u003c/a\u003e Awesome-Cellular-Hacking\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1145\u003c/strong\u003e星][1m] [Batchfile] \u003ca href=\"https://github.com/ckjbug/hacking\"\u003eckjbug/hacking\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1116\u003c/strong\u003e星][11d] \u003ca href=\"https://github.com/slowmist/knowledge-base\"\u003eslowmist/knowledge-base\u003c/a\u003e Knowledge Base 慢雾安全团队知识库\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1115\u003c/strong\u003e星][1y] \u003ca href=\"https://github.com/PaulSec/awesome-windows-domain-hardening\"\u003epaulsec/awesome-windows-domain-hardening\u003c/a\u003e A curated list of awesome Security Hardening techniques for Windows.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1110\u003c/strong\u003e星][5m] \u003ca href=\"https://github.com/zbetcheckin/security_list\"\u003ezbetcheckin/security_list\u003c/a\u003e Great security list for fun and profit\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1080\u003c/strong\u003e星][1m] \u003ca href=\"https://github.com/guardrailsio/awesome-golang-security\"\u003eguardrailsio/awesome-golang-security\u003c/a\u003e Awesome Golang Security resources\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1030\u003c/strong\u003e星][7m] \u003ca href=\"https://github.com/stephenturner/oneliners\"\u003estephenturner/oneliners\u003c/a\u003e Useful bash one-liners for bioinformatics.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1026\u003c/strong\u003e星][7d] \u003ca href=\"https://github.com/sundowndev/hacker-roadmap\"\u003esundowndev/hacker-roadmap\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1013\u003c/strong\u003e星][1y] [JS] \u003ca href=\"https://github.com/0xsobky/hackvault\"\u003e0xsobky/hackvault\u003c/a\u003e A container repository for my public web hacks!\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e993\u003c/strong\u003e星][9d] [Py] \u003ca href=\"https://github.com/jekil/awesome-hacking\"\u003ejekil/awesome-hacking\u003c/a\u003e Awesome hacking is an awesome collection of hacking tools.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e986\u003c/strong\u003e星][7m] \u003ca href=\"https://github.com/0x4d31/awesome-threat-detection\"\u003e0x4d31/awesome-threat-detection\u003c/a\u003e A curated list of awesome threat detection and hunting resources\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e959\u003c/strong\u003e星][9m] \u003ca href=\"https://github.com/wtsxdev/penetration-testing\"\u003ewtsxdev/penetration-testing\u003c/a\u003e List of awesome penetration testing resources, tools and other shiny things\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e929\u003c/strong\u003e星][2m] \u003ca href=\"https://github.com/tom0li/collection-document\"\u003etom0li/collection-document\u003c/a\u003e Collection of quality safety articles\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e921\u003c/strong\u003e星][7m] [PS] \u003ca href=\"https://github.com/api0cradle/ultimateapplockerbypasslist\"\u003eapi0cradle/ultimateapplockerbypasslist\u003c/a\u003e The goal of this repository is to document the most common techniques to bypass AppLocker.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e917\u003c/strong\u003e星][7m] \u003ca href=\"https://github.com/cn0xroot/rfsec-toolkit\"\u003ecn0xroot/rfsec-toolkit\u003c/a\u003e RFSec-ToolKit is a collection of Radio Frequency Communication Protocol Hacktools.无线通信协议相关的工具集,可借助SDR硬件+相关工具对无线通信进行研究。Collect with ♥ by HackSmith\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e906\u003c/strong\u003e星][24d] [Shell] \u003ca href=\"https://github.com/dominicbreuker/stego-toolkit\"\u003edominicbreuker/stego-toolkit\u003c/a\u003e Collection of steganography tools - helps with CTF challenges\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e871\u003c/strong\u003e星][3d] \u003ca href=\"https://github.com/explife0011/awesome-windows-kernel-security-development\"\u003eexplife0011/awesome-windows-kernel-security-development\u003c/a\u003e windows kernel security development\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e829\u003c/strong\u003e星][5m] [Shell] \u003ca href=\"https://github.com/danielmiessler/robotsdisallowed\"\u003edanielmiessler/robotsdisallowed\u003c/a\u003e A curated list of the most common and most interesting robots.txt disallowed directories.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e823\u003c/strong\u003e星][3m] \u003ca href=\"https://github.com/feeicn/security-ppt\"\u003efeeicn/security-ppt\u003c/a\u003e 大安全各领域各公司各会议分享的PPT\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e788\u003c/strong\u003e星][11m] \u003ca href=\"https://github.com/v2-dev/awesome-social-engineering\"\u003ev2-dev/awesome-social-engineering\u003c/a\u003e 社会工程学资源集合\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e766\u003c/strong\u003e星][2m] \u003ca href=\"https://github.com/daviddias/awesome-hacking-locations\"\u003edaviddias/awesome-hacking-locations\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e736\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/averagesecurityguy/scripts\"\u003eaveragesecurityguy/scripts\u003c/a\u003e Scripts I use during pentest engagements.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e728\u003c/strong\u003e星][3m] [C#] \u003ca href=\"https://github.com/harleyqu1nn/aggressorscripts\"\u003eharleyqu1nn/aggressorscripts\u003c/a\u003e Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e714\u003c/strong\u003e星][1y] \u003ca href=\"https://github.com/snifer/security-cheatsheets\"\u003esnifer/security-cheatsheets\u003c/a\u003e A collection of cheatsheets for various infosec tools and topics.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e712\u003c/strong\u003e星][5m] \u003ca href=\"https://github.com/bit4woo/python_sec\"\u003ebit4woo/python_sec\u003c/a\u003e python安全和代码审计相关资料收集 resource collection of python security and code review\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e685\u003c/strong\u003e星][24d] [XSLT] \u003ca href=\"https://github.com/adon90/pentest_compilation\"\u003eadon90/pentest_compilation\u003c/a\u003e Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e684\u003c/strong\u003e星][2m] \u003ca href=\"https://github.com/andrewjkerr/security-cheatsheets\"\u003eandrewjkerr/security-cheatsheets\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e671\u003c/strong\u003e星][1y] \u003ca href=\"https://github.com/dsasmblr/hacking-online-games\"\u003edsasmblr/hacking-online-games\u003c/a\u003e A curated list of tutorials/resources for hacking online games.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e665\u003c/strong\u003e星][1m] \u003ca href=\"https://github.com/redhuntlabs/awesome-asset-discovery\"\u003eredhuntlabs/awesome-asset-discovery\u003c/a\u003e List of Awesome Asset Discovery Resources\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e633\u003c/strong\u003e星][4m] \u003ca href=\"https://github.com/3gstudent/pentest-and-development-tips\"\u003e3gstudent/pentest-and-development-tips\u003c/a\u003e A collection of pentest and development tips\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e632\u003c/strong\u003e星][10m] \u003ca href=\"https://github.com/webbreacher/offensiveinterview\"\u003ewebbreacher/offensiveinterview\u003c/a\u003e Interview questions to screen offensive (red team/pentest) candidates\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e629\u003c/strong\u003e星][4m] \u003ca href=\"https://github.com/bypass007/safety-project-collection\"\u003ebypass007/safety-project-collection\u003c/a\u003e 收集一些比较优秀的开源安全项目,以帮助甲方安全从业人员构建企业安全能力。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e619\u003c/strong\u003e星][1y] \u003ca href=\"https://github.com/jiangsir404/audit-learning\"\u003ejiangsir404/audit-learning\u003c/a\u003e 记录自己对《代码审计》的理解和总结,对危险函数的深入分析以及在p牛的博客和代码审计圈的收获\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e613\u003c/strong\u003e星][3m] [Shell] \u003ca href=\"https://github.com/ashishb/osx-and-ios-security-awesome\"\u003eashishb/osx-and-ios-security-awesome\u003c/a\u003e OSX and iOS related security tools\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e601\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/hslatman/awesome-industrial-control-system-security\"\u003ehslatman/awesome-industrial-control-system-security\u003c/a\u003e 工控系统安全资源列表\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e593\u003c/strong\u003e星][23d] \u003ca href=\"https://github.com/lirantal/awesome-nodejs-security\"\u003elirantal/awesome-nodejs-security\u003c/a\u003e Awesome Node.js Security resources\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e592\u003c/strong\u003e星][12m] \u003ca href=\"https://github.com/pandazheng/ioshackstudy\"\u003epandazheng/ioshackstudy\u003c/a\u003e IOS安全学习资料汇总\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e571\u003c/strong\u003e星][3m] \u003ca href=\"https://github.com/r35tart/penetration_testing_case\"\u003er35tart/penetration_testing_case\u003c/a\u003e 用于记录分享一些有趣的案例\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e560\u003c/strong\u003e星][9m] \u003ca href=\"https://github.com/guardrailsio/awesome-python-security\"\u003eguardrailsio/awesome-python-security\u003c/a\u003e Awesome Python Security resources\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e558\u003c/strong\u003e星][10m] \u003ca href=\"https://github.com/guardrailsio/awesome-php-security\"\u003eguardrailsio/awesome-php-security\u003c/a\u003e Awesome PHP Security Resources\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e530\u003c/strong\u003e星][20d] \u003ca href=\"https://github.com/a13xp0p0v/linux-kernel-defence-map\"\u003ea13xp0p0v/linux-kernel-defence-map\u003c/a\u003e Linux内核防御地图\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e477\u003c/strong\u003e星][1y] \u003ca href=\"https://github.com/hack-with-github/powerful-plugins\"\u003ehack-with-github/powerful-plugins\u003c/a\u003e Powerful plugins and add-ons for hackers\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e468\u003c/strong\u003e星][19d] \u003ca href=\"https://github.com/meitar/awesome-cybersecurity-blueteam\"\u003emeitar/awesome-cybersecurity-blueteam\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e465\u003c/strong\u003e星][26d] \u003ca href=\"https://github.com/gradiuscypher/infosec_getting_started\"\u003egradiuscypher/infosec_getting_started\u003c/a\u003e A collection of resources/documentation/links/etc to help people learn about Infosec and break into the field.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e460\u003c/strong\u003e星][4m] [C++] \u003ca href=\"https://github.com/comaeio/opcde\"\u003ecomaeio/opcde\u003c/a\u003e OPCDE Cybersecurity Conference Materials\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e448\u003c/strong\u003e星][7m] \u003ca href=\"https://github.com/jnusimba/miscsecnotes\"\u003ejnusimba/miscsecnotes\u003c/a\u003e some learning notes about Web/Cloud/Docker Security、 Penetration Test、 Security Building\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e438\u003c/strong\u003e星][1y] \u003ca href=\"https://github.com/meitar/awesome-lockpicking\"\u003emeitar/awesome-lockpicking\u003c/a\u003e 有关锁、保险箱、钥匙的指南、工具及其他资源的列表\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e437\u003c/strong\u003e星][4m] \u003ca href=\"https://github.com/re4lity/hacking-with-golang\"\u003ere4lity/hacking-with-golang\u003c/a\u003e Golang安全资源合集\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e426\u003c/strong\u003e星][21d] \u003ca href=\"https://github.com/dropsofzut/awesome-security-weixin-official-accounts\"\u003edropsofzut/awesome-security-weixin-official-accounts\u003c/a\u003e 网络安全类公众号推荐,欢迎大家推荐\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e423\u003c/strong\u003e星][12m] [Lua] \u003ca href=\"https://github.com/w3h/icsmaster\"\u003ew3h/icsmaster\u003c/a\u003e 整合工控安全相关资源\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e411\u003c/strong\u003e星][5d] [Py] \u003ca href=\"https://github.com/bl4de/security-tools\"\u003ebl4de/security-tools\u003c/a\u003e Collection of small security tools created mostly in Python. CTFs, pentests and so on\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e411\u003c/strong\u003e星][1m] \u003ca href=\"https://github.com/husnainfareed/Awesome-Ethical-Hacking-Resources\"\u003ehusnainfareed/awesome-ethical-hacking-resources\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e407\u003c/strong\u003e星][8m] \u003ca href=\"https://github.com/kai5263499/osx-security-awesome\"\u003ekai5263499/osx-security-awesome\u003c/a\u003e A collection of OSX and iOS security resources\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e397\u003c/strong\u003e星][7m] [HTML] \u003ca href=\"https://github.com/gexos/hacking-tools-repository\"\u003egexos/hacking-tools-repository\u003c/a\u003e A list of security/hacking tools that have been collected from the internet. Suggestions are welcomed.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e392\u003c/strong\u003e星][2m] \u003ca href=\"https://github.com/dsopas/assessment-mindset\"\u003edsopas/assessment-mindset\u003c/a\u003e 安全相关的思维导图, 可用于pentesting, bug bounty, red-teamassessments\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e383\u003c/strong\u003e星][2m] \u003ca href=\"https://github.com/thejambo/awesome-testing\"\u003ethejambo/awesome-testing\u003c/a\u003e A curated list of testing resources\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e375\u003c/strong\u003e星][8m] \u003ca href=\"https://github.com/opencybertranslationproject/linux-basics-for-hackers\"\u003eopencybertranslationproject/linux-basics-for-hackers\u003c/a\u003e 书籍《Linux Basics for Hackers》2019版中文翻译版\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e369\u003c/strong\u003e星][20d] \u003ca href=\"https://github.com/fkromer/awesome-ros2\"\u003efkromer/awesome-ros2\u003c/a\u003e The Robot Operating System Version 2.0 is awesome!\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e363\u003c/strong\u003e星][3d] \u003ca href=\"https://github.com/hongrisec/web-security-attack\"\u003ehongrisec/web-security-attack\u003c/a\u003e Web安全相关内容\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e345\u003c/strong\u003e星][2m] \u003ca href=\"https://github.com/softwareunderground/awesome-open-geoscience\"\u003esoftwareunderground/awesome-open-geoscience\u003c/a\u003e Curated from repositories that make our lives as geoscientists, hackers and data wranglers easier or just more awesome\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e335\u003c/strong\u003e星][t] \u003ca href=\"https://github.com/stamparm/ipsum\"\u003estamparm/ipsum\u003c/a\u003e Daily feed of bad IPs (with blacklist hit scores)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e334\u003c/strong\u003e星][5d] [PS] \u003ca href=\"https://github.com/mgeeky/penetration-testing-tools\"\u003emgeeky/penetration-testing-tools\u003c/a\u003e A collection of my Penetration Testing scripts, tools, cheatsheets collected over years, used during real-world assignments or collected from various good quality sources.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e327\u003c/strong\u003e星][9m] \u003ca href=\"https://github.com/pxlpnk/awesome-ruby-security\"\u003epxlpnk/awesome-ruby-security\u003c/a\u003e Awesome Ruby Security resources\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e321\u003c/strong\u003e星][2m] [HTML] \u003ca href=\"https://github.com/eugenekolo/sec-tools\"\u003eeugenekolo/sec-tools\u003c/a\u003e A set of security related tools\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e318\u003c/strong\u003e星][3d] \u003ca href=\"https://github.com/cryptax/confsec\"\u003ecryptax/confsec\u003c/a\u003e Security, hacking conferences (list)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e315\u003c/strong\u003e星][22d] \u003ca href=\"https://github.com/trimstray/technical-whitepapers\"\u003etrimstray/technical-whitepapers\u003c/a\u003e 收集:IT白皮书、PPT、PDF、Hacking、Web应用程序安全性、数据库、逆向等\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e312\u003c/strong\u003e星][10m] [Shell] \u003ca href=\"https://github.com/swoodford/aws\"\u003eswoodford/aws\u003c/a\u003e A collection of bash shell scripts for automating various tasks with Amazon Web Services using the AWS CLI and jq.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e310\u003c/strong\u003e星][1y] \u003ca href=\"https://github.com/1522402210/2018-blackhat-tools-list\"\u003e1522402210/2018-blackhat-tools-list\u003c/a\u003e 2018 BlackHat Tools List\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e309\u003c/strong\u003e星][2m] \u003ca href=\"https://github.com/no-github/dork-admin\"\u003eno-github/dork-admin\u003c/a\u003e 盘点近年来的数据泄露、供应链污染事件\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e299\u003c/strong\u003e星][15d] [JS] \u003ca href=\"https://github.com/aws-samples/aws-serverless-security-workshop\"\u003eaws-samples/aws-serverless-security-workshop\u003c/a\u003e In this workshop, you will learn techniques to secure a serverless application built with AWS Lambda, Amazon API Gateway and RDS Aurora. We will cover AWS services and features you can leverage to improve the security of a serverless applications in 5 domains: identity \u0026amp; access management, code, data, infrastructure, logging \u0026amp; monitoring.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e295\u003c/strong\u003e星][1y] \u003ca href=\"https://github.com/findneo/newbie-security-list\"\u003efindneo/newbie-security-list\u003c/a\u003e 网络安全学习资料,欢迎补充\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e294\u003c/strong\u003e星][7m] [JS] \u003ca href=\"https://github.com/ma3k4h3d/papers\"\u003ema3k4h3d/papers\u003c/a\u003e Some papers about cyber security\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e287\u003c/strong\u003e星][10m] \u003ca href=\"https://github.com/wallarm/awesome-nginx-security\"\u003ewallarm/awesome-nginx-security\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e276\u003c/strong\u003e星][4m] \u003ca href=\"https://github.com/mattnotmax/cyberchef-recipes\"\u003emattnotmax/cyberchef-recipes\u003c/a\u003e A list of cyber-chef recipes\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e272\u003c/strong\u003e星][8d] [JS] \u003ca href=\"https://github.com/ropnop/serverless_toolkit\"\u003eropnop/serverless_toolkit\u003c/a\u003e A collection of useful Serverless functions I use when pentesting\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e260\u003c/strong\u003e星][5m] \u003ca href=\"https://github.com/zhaoweiho/web-sec-interview\"\u003ezhaoweiho/web-sec-interview\u003c/a\u003e Information Security (Web Security/Penetration Testing Direction) Interview Questions/Solutions 信息安全(Web安全/渗透测试方向)面试题/解题思路\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e260\u003c/strong\u003e星][27d] \u003ca href=\"https://github.com/thelsa/cs-checklist\"\u003ethelsa/cs-checklist\u003c/a\u003e PC客户端(C-S架构)渗透测试checklist / Client side(C-S) penestration checklist\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e243\u003c/strong\u003e星][7d] \u003ca href=\"https://github.com/euphrat1ca/security_w1k1\"\u003eeuphrat1ca/security_w1k1\u003c/a\u003e collect\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e239\u003c/strong\u003e星][6d] \u003ca href=\"https://github.com/pe3zx/my-infosec-awesome\"\u003epe3zx/my-infosec-awesome\u003c/a\u003e My curated list of awesome links, resources and tools on infosec related topics\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e228\u003c/strong\u003e星][6m] \u003ca href=\"https://github.com/guardrailsio/awesome-dotnet-security\"\u003eguardrailsio/awesome-dotnet-security\u003c/a\u003e Awesome .NET Security Resources\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e223\u003c/strong\u003e星][5d] \u003ca href=\"https://github.com/decalage2/awesome-security-hardening\"\u003edecalage2/awesome-security-hardening\u003c/a\u003e A collection of awesome security hardening guides, tools and other resources\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e222\u003c/strong\u003e星][9m] \u003ca href=\"https://github.com/jesusprubio/awesome-nodejs-pentest\"\u003ejesusprubio/awesome-nodejs-pentest\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e221\u003c/strong\u003e星][4m] \u003ca href=\"https://github.com/security-checklist/php-security-check-list\"\u003esecurity-checklist/php-security-check-list\u003c/a\u003e PHP Security Check List [ EN ]\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e216\u003c/strong\u003e星][10m] \u003ca href=\"https://github.com/puresec/awesome-serverless-security\"\u003epuresec/awesome-serverless-security\u003c/a\u003e A curated list of awesome serverless security resources such as (e)books, articles, whitepapers, blogs and research papers.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e214\u003c/strong\u003e星][3d] \u003ca href=\"https://github.com/shogunlab/awesome-hyper-v-exploitation\"\u003eshogunlab/awesome-hyper-v-exploitation\u003c/a\u003e A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e213\u003c/strong\u003e星][10m] \u003ca href=\"https://github.com/jeansgit/redteam\"\u003ejeansgit/redteam\u003c/a\u003e RedTeam资料收集整理\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e213\u003c/strong\u003e星][3m] [Shell] \u003ca href=\"https://github.com/xu-jian/vps\"\u003exu-jian/vps\u003c/a\u003e 个人笔记汇总\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e209\u003c/strong\u003e星][28d] \u003ca href=\"https://github.com/sigp/solidity-security-blog\"\u003esigp/solidity-security-blog\u003c/a\u003e Comprehensive list of known attack vectors and common anti-patterns\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e207\u003c/strong\u003e星][1y] \u003ca href=\"https://github.com/faizann24/resources-for-learning-hacking\"\u003efaizann24/resources-for-learning-hacking\u003c/a\u003e All the resources I could find for learning Ethical Hacking and penetration testing.\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-664ff1dbdafefd7d856c88112948a65b\"\u003e\u003c/a\u003e混合型收集\u003c/h2\u003e\u003ca id=\"user-content-混合型收集\" class=\"anchor\" aria-label=\"Permalink: 混合型收集\" href=\"#混合型收集\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e24868\u003c/strong\u003e星][8d] \u003ca href=\"https://github.com/trimstray/the-book-of-secret-knowledge\"\u003etrimstray/the-book-of-secret-knowledge\u003c/a\u003e A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e10920\u003c/strong\u003e星][26d] \u003ca href=\"https://github.com/enaqx/awesome-pentest\"\u003eenaqx/awesome-pentest\u003c/a\u003e 渗透测试资源/工具集\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e5513\u003c/strong\u003e星][9m] \u003ca href=\"https://github.com/carpedm20/awesome-hacking\"\u003ecarpedm20/awesome-hacking\u003c/a\u003e Hacking教程、工具和资源\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e5121\u003c/strong\u003e星][2m] \u003ca href=\"https://github.com/sbilly/awesome-security\"\u003esbilly/awesome-security\u003c/a\u003e 与安全相关的软件、库、文档、书籍、资源和工具等收集\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3230\u003c/strong\u003e星][6d] [Rich Text Format] \u003ca href=\"https://github.com/The-Art-of-Hacking/h4cker\"\u003ethe-art-of-hacking/h4cker\u003c/a\u003e 资源收集:hacking、渗透、数字取证、事件响应、漏洞研究、漏洞开发、逆向\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1904\u003c/strong\u003e星][20d] \u003ca href=\"https://github.com/olivierlaflamme/cheatsheet-god\"\u003eolivierlaflamme/cheatsheet-god\u003c/a\u003e Penetration Testing Reference Bank - OSCP / PTP \u0026amp; PTX Cheatsheet\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e591\u003c/strong\u003e星][6d] [Perl] \u003ca href=\"https://github.com/bollwarm/sectoolset\"\u003ebollwarm/sectoolset\u003c/a\u003e 安全项目工具集合\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e587\u003c/strong\u003e星][6m] \u003ca href=\"https://github.com/d30sa1/rootkits-list-download\"\u003ed30sa1/rootkits-list-download\u003c/a\u003e Rootkit收集\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-67acc04b20c99f87ee625b073330d8c2\"\u003e\u003c/a\u003e无工具类收集\u003c/h2\u003e\u003ca id=\"user-content-无工具类收集\" class=\"anchor\" aria-label=\"Permalink: 无工具类收集\" href=\"#无工具类收集\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e34045\u003c/strong\u003e星][21d] [Py] \u003ca href=\"https://github.com/minimaxir/big-list-of-naughty-strings\"\u003eminimaxir/big-list-of-naughty-strings\u003c/a\u003e “淘气”的字符串列表,当作为用户输入时很容易引发问题\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e9042\u003c/strong\u003e星][3m] \u003ca href=\"https://github.com/vitalysim/awesome-hacking-resources\"\u003evitalysim/awesome-hacking-resources\u003c/a\u003e A collection of hacking / penetration testing resources to make you better!\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3616\u003c/strong\u003e星][9d] \u003ca href=\"https://github.com/blacckhathaceekr/pentesting-bible\"\u003eblacckhathaceekr/pentesting-bible\u003c/a\u003e links reaches 10000 links \u0026amp; 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking \u0026amp; penetration testing \u0026amp; red team \u0026amp; cyber security \u0026amp; computer science resources.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2800\u003c/strong\u003e星][2m] \u003ca href=\"https://github.com/secwiki/sec-chart\"\u003esecwiki/sec-chart\u003c/a\u003e 安全思维导图集合\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2671\u003c/strong\u003e星][1y] [HTML] \u003ca href=\"https://github.com/chybeta/web-security-learning\"\u003echybeta/web-security-learning\u003c/a\u003e Web-Security-Learning\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2519\u003c/strong\u003e星][17d] \u003ca href=\"https://github.com/onlurking/awesome-infosec\"\u003eonlurking/awesome-infosec\u003c/a\u003e A curated list of awesome infosec courses and training resources.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2356\u003c/strong\u003e星][11m] \u003ca href=\"https://github.com/hack-with-github/free-security-ebooks\"\u003ehack-with-github/free-security-ebooks\u003c/a\u003e Free Security and Hacking eBooks\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2118\u003c/strong\u003e星][3m] \u003ca href=\"https://github.com/yeahhub/hacking-security-ebooks\"\u003eyeahhub/hacking-security-ebooks\u003c/a\u003e Top 100 Hacking \u0026amp; Security E-Books (Free Download)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1956\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/nixawk/pentest-wiki\"\u003enixawk/pentest-wiki\u003c/a\u003e PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1955\u003c/strong\u003e星][1m] \u003ca href=\"https://github.com/hmaverickadams/beginner-network-pentesting\"\u003ehmaverickadams/beginner-network-pentesting\u003c/a\u003e Notes for Beginner Network Pentesting Course\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-24707dd322098f73c7e450d6b1eddf12\"\u003e\u003c/a\u003e收集类的收集\u003c/h2\u003e\u003ca id=\"user-content-收集类的收集\" class=\"anchor\" aria-label=\"Permalink: 收集类的收集\" href=\"#收集类的收集\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e33101\u003c/strong\u003e星][3m] \u003ca href=\"https://github.com/hack-with-github/awesome-hacking\"\u003ehack-with-github/awesome-hacking\u003c/a\u003e A collection of various awesome lists for hackers, pentesters and security researchers\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-9101434a896f20263d09c25ace65f398\"\u003e\u003c/a\u003e教育资源\u0026amp;\u0026amp;课程\u0026amp;\u0026amp;教程\u0026amp;\u0026amp;书籍\u003c/h2\u003e\u003ca id=\"user-content-教育资源课程教程书籍\" class=\"anchor\" aria-label=\"Permalink: 教育资源\u0026amp;\u0026amp;课程\u0026amp;\u0026amp;教程\u0026amp;\u0026amp;书籍\" href=\"#教育资源课程教程书籍\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e10944\u003c/strong\u003e星][2m] [CSS] \u003ca href=\"https://github.com/hacker0x01/hacker101\"\u003ehacker0x01/hacker101\u003c/a\u003e Hacker101\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3945\u003c/strong\u003e星][4m] [PHP] \u003ca href=\"https://github.com/paragonie/awesome-appsec\"\u003eparagonie/awesome-appsec\u003c/a\u003e A curated list of resources for learning about application security\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e959\u003c/strong\u003e星][5m] \u003ca href=\"https://github.com/bugcrowd/bugcrowd_university\"\u003ebugcrowd/bugcrowd_university\u003c/a\u003e 研究者社区的教育内容\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e936\u003c/strong\u003e星][7m] [Py] \u003ca href=\"https://github.com/osirislab/Hack-Night\"\u003eosirislab/hack-night\u003c/a\u003e a sobering introduction to offensive security\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-8088e46fc533286d88b945f1d472bf57\"\u003e\u003c/a\u003e笔记\u0026amp;\u0026amp;Tips\u0026amp;\u0026amp;Tricks\u003c/h2\u003e\u003ca id=\"user-content-笔记tipstricks\" class=\"anchor\" aria-label=\"Permalink: 笔记\u0026amp;\u0026amp;Tips\u0026amp;\u0026amp;Tricks\" href=\"#笔记tipstricks\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-f57ccaab4279b60c17a03f90d96b815c\"\u003e\u003c/a\u003e未分类\u003c/h3\u003e\u003ca id=\"user-content-未分类-2\" class=\"anchor\" aria-label=\"Permalink: 未分类\" href=\"#未分类-2\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e2816\u003c/strong\u003e星][2m] \u003ca href=\"https://github.com/paulsec/awesome-sec-talks\"\u003epaulsec/awesome-sec-talks\u003c/a\u003e A collected list of awesome security talks\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e864\u003c/strong\u003e星][2d] [Py] \u003ca href=\"https://github.com/lylemi/learn-web-hacking\"\u003elylemi/learn-web-hacking\u003c/a\u003e Web安全学习笔记\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e723\u003c/strong\u003e星][3m] \u003ca href=\"https://github.com/uknowsec/active-directory-pentest-notes\"\u003euknowsec/active-directory-pentest-notes\u003c/a\u003e 个人域渗透学习笔记\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e593\u003c/strong\u003e星][1m] [PS] \u003ca href=\"https://github.com/threatexpress/red-team-scripts\"\u003ethreatexpress/red-team-scripts\u003c/a\u003e A collection of Red Team focused tools, scripts, and notes\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-0476f6b97e87176da0a0d7328f8747e7\"\u003e\u003c/a\u003eblog\u003c/h3\u003e\u003ca id=\"user-content-blog\" class=\"anchor\" aria-label=\"Permalink: blog\" href=\"#blog\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1229\u003c/strong\u003e星][5m] \u003ca href=\"https://github.com/chalker/notes\"\u003echalker/notes\u003c/a\u003e Some public notes\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-df8ec4a66ef5027bbcc591c94f8de1e5\"\u003e\u003c/a\u003eTalk\u0026amp;\u0026amp;Conference\u003c/h2\u003e\u003ca id=\"user-content-talkconference\" class=\"anchor\" aria-label=\"Permalink: Talk\u0026amp;\u0026amp;Conference\" href=\"#talkconference\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-4be58a3a00f83975b0321425db3b9b68\"\u003e\u003c/a\u003e文档\u0026amp;\u0026amp;Documentation\u0026amp;\u0026amp;规则说明\u0026amp;\u0026amp;RFC\u003c/h2\u003e\u003ca id=\"user-content-文档documentation规则说明rfc\" class=\"anchor\" aria-label=\"Permalink: 文档\u0026amp;\u0026amp;Documentation\u0026amp;\u0026amp;规则说明\u0026amp;\u0026amp;RFC\" href=\"#文档documentation规则说明rfc\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1705\u003c/strong\u003e星][10m] [CSS] \u003ca href=\"https://github.com/bagder/http2-explained\"\u003ebagder/http2-explained\u003c/a\u003e A detailed document explaining and documenting HTTP/2, the successor to the widely popular HTTP/1.1 protocol\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-7e840ca27f1ff222fd25bc61a79b07ba\"\u003e\u003c/a\u003e特定目标\u003c/h1\u003e\u003ca id=\"user-content-特定目标\" class=\"anchor\" aria-label=\"Permalink: 特定目标\" href=\"#特定目标\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-eb2d1ffb231cee014ed24d59ca987da2\"\u003e\u003c/a\u003e未分类-XxTarget\u003c/h2\u003e\u003ca id=\"user-content-未分类-xxtarget\" class=\"anchor\" aria-label=\"Permalink: 未分类-XxTarget\" href=\"#未分类-xxtarget\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e4177\u003c/strong\u003e星][4d] [Java] \u003ca href=\"https://github.com/spring-projects/spring-security\"\u003espring-projects/spring-security\u003c/a\u003e Spring Security\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2942\u003c/strong\u003e星][6d] [Go] \u003ca href=\"https://github.com/securego/gosec\"\u003esecurego/gosec\u003c/a\u003e Golang security checker\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1906\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/pycqa/bandit\"\u003epycqa/bandit\u003c/a\u003e 在Python代码中查找常见的安全问题\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-c71ad1932bbf9c908af83917fe1fd5da\"\u003e\u003c/a\u003eAWS\u003c/h2\u003e\u003ca id=\"user-content-aws\" class=\"anchor\" aria-label=\"Permalink: AWS\" href=\"#aws\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e4471\u003c/strong\u003e星][1y] [Go] \u003ca href=\"https://github.com/wallix/awless\"\u003ewallix/awless\u003c/a\u003e A Mighty CLI for AWS\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e4271\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/dxa4481/trufflehog\"\u003edxa4481/trufflehog\u003c/a\u003e Searches through git repositories for high entropy strings and secrets, digging deep into commit history\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3301\u003c/strong\u003e星][5d] [Shell] \u003ca href=\"https://github.com/toniblyx/my-arsenal-of-aws-security-tools\"\u003etoniblyx/my-arsenal-of-aws-security-tools\u003c/a\u003e List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3154\u003c/strong\u003e星][5d] [JS] \u003ca href=\"https://github.com/duo-labs/cloudmapper\"\u003eduo-labs/cloudmapper\u003c/a\u003e 生成AWS环境的网络拓扑图\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2895\u003c/strong\u003e星][3d] [Go] \u003ca href=\"https://github.com/99designs/aws-vault\"\u003e99designs/aws-vault\u003c/a\u003e A vault for securely storing and accessing AWS credentials in development environments\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2645\u003c/strong\u003e星][4m] [Java] \u003ca href=\"https://github.com/teevity/ice\"\u003eteevity/ice\u003c/a\u003e AWS Usage Tool\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2374\u003c/strong\u003e星][5m] [Go] \u003ca href=\"https://github.com/mlabouardy/komiser\"\u003emlabouardy/komiser\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1912\u003c/strong\u003e星][6d] [Shell] \u003ca href=\"https://github.com/toniblyx/prowler\"\u003etoniblyx/prowler\u003c/a\u003e AWS Security Best Practices Assessment, Auditing, Hardening and Forensics Readiness Tool. It follows guidelines of the CIS Amazon Web Services Foundations Benchmark and DOZENS of additional checks including GDPR and HIPAA (+100). Official CIS for AWS guide:\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1895\u003c/strong\u003e星][3d] [Py] \u003ca href=\"https://github.com/mozilla/mozdef\"\u003emozilla/mozdef\u003c/a\u003e Mozilla Enterprise Defense Platform\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1604\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/nccgroup/Scout2\"\u003enccgroup/scout2\u003c/a\u003e Security auditing tool for AWS environments\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1386\u003c/strong\u003e星][12m] [Py] \u003ca href=\"https://github.com/eth0izzle/bucket-stream\"\u003eeth0izzle/bucket-stream\u003c/a\u003e 通过certstream 监控多种证书 transparency 日志, 进而查找有趣的 Amazon S3 Buckets\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1198\u003c/strong\u003e星][17d] [Py] \u003ca href=\"https://github.com/lyft/cartography\"\u003elyft/cartography\u003c/a\u003e Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powered by a Neo4j database.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1149\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/rhinosecuritylabs/pacu\"\u003erhinosecuritylabs/pacu\u003c/a\u003e The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e938\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/sa7mon/s3scanner\"\u003esa7mon/s3scanner\u003c/a\u003e Scan for open AWS S3 buckets and dump the contents\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e844\u003c/strong\u003e星][26d] [Py] \u003ca href=\"https://github.com/jordanpotti/awsbucketdump\"\u003ejordanpotti/awsbucketdump\u003c/a\u003e 快速枚举 AWS S3 Buckets,查找感兴趣的文件。类似于子域名爆破,但针对S3 Bucket,有额外功能,例如下载文件等\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e814\u003c/strong\u003e星][7d] [Go] \u003ca href=\"https://github.com/rebuy-de/aws-nuke\"\u003erebuy-de/aws-nuke\u003c/a\u003e Nuke a whole AWS account and delete all its resources.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e804\u003c/strong\u003e星][2d] [Py] \u003ca href=\"https://github.com/awslabs/aws-config-rules\"\u003eawslabs/aws-config-rules\u003c/a\u003e [Node, Python, Java] Repository of sample Custom Rules for AWS Config.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e786\u003c/strong\u003e星][11d] [Go] \u003ca href=\"https://github.com/liamg/tfsec\"\u003eliamg/tfsec\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e774\u003c/strong\u003e星][13d] [Java] \u003ca href=\"https://github.com/tmobile/pacbot\"\u003etmobile/pacbot\u003c/a\u003e PacBot (Policy as Code Bot)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e613\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/netflix/repokid\"\u003enetflix/repokid\u003c/a\u003e AWS Least Privilege for Distributed, High-Velocity Deployment\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e609\u003c/strong\u003e星][21d] [Shell] \u003ca href=\"https://github.com/securityftw/cs-suite\"\u003esecurityftw/cs-suite\u003c/a\u003e Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e563\u003c/strong\u003e星][3m] [Shell] \u003ca href=\"https://github.com/denizparlak/zeus\"\u003edenizparlak/zeus\u003c/a\u003e AWS Auditing \u0026amp; Hardening Tool\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e548\u003c/strong\u003e星][9d] [Ruby] \u003ca href=\"https://github.com/stelligent/cfn_nag\"\u003estelligent/cfn_nag\u003c/a\u003e Linting tool for CloudFormation templates\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e539\u003c/strong\u003e星][4d] [Py] \u003ca href=\"https://github.com/salesforce/policy_sentry\"\u003esalesforce/policy_sentry\u003c/a\u003e IAM Least Privilege Policy Generator\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e505\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/awslabs/aws-security-benchmark\"\u003eawslabs/aws-security-benchmark\u003c/a\u003e Open source demos, concept and guidance related to the AWS CIS Foundation framework.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e485\u003c/strong\u003e星][19d] [Py] \u003ca href=\"https://github.com/netflix-skunkworks/diffy\"\u003enetflix-skunkworks/diffy\u003c/a\u003e Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR) teams quickly identify suspicious hosts on which to focus their response.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e462\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/ustayready/fireprox\"\u003eustayready/fireprox\u003c/a\u003e AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e409\u003c/strong\u003e星][2m] [Ruby] \u003ca href=\"https://github.com/arkadiyt/aws_public_ips\"\u003earkadiyt/aws_public_ips\u003c/a\u003e Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e400\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/duo-labs/cloudtracker\"\u003eduo-labs/cloudtracker\u003c/a\u003e CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e389\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/riotgames/cloud-inquisitor\"\u003eriotgames/cloud-inquisitor\u003c/a\u003e Enforce ownership and data security within AWS\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e370\u003c/strong\u003e星][11m] [Py] \u003ca href=\"https://github.com/awslabs/aws-security-automation\"\u003eawslabs/aws-security-automation\u003c/a\u003e Collection of scripts and resources for DevSecOps and Automated Incident Response Security\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e365\u003c/strong\u003e星][7m] [Py] \u003ca href=\"https://github.com/carnal0wnage/weirdaal\"\u003ecarnal0wnage/weirdaal\u003c/a\u003e WeirdAAL (AWS Attack Library)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e343\u003c/strong\u003e星][2m] [Ruby] \u003ca href=\"https://github.com/anaynayak/aws-security-viz\"\u003eanaynayak/aws-security-viz\u003c/a\u003e Visualize your aws security groups.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e321\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/securing/dumpsterdiver\"\u003esecuring/dumpsterdiver\u003c/a\u003e Tool to search secrets in various filetypes.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e292\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/cesar-rodriguez/terrascan\"\u003ecesar-rodriguez/terrascan\u003c/a\u003e Collection of security and best practice test for static code analysis of terraform templates\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e289\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/nccgroup/aws-inventory\"\u003enccgroup/aws-inventory\u003c/a\u003e 发现在AWS账户中创建的资源\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e274\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/nccgroup/pmapper\"\u003enccgroup/pmapper\u003c/a\u003e A tool for quickly evaluating IAM permissions in AWS.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e260\u003c/strong\u003e星][11d] [Py] \u003ca href=\"https://github.com/voulnet/barq\"\u003evoulnet/barq\u003c/a\u003e The AWS Cloud Post Exploitation framework!\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e258\u003c/strong\u003e星][14d] [Jupyter Notebook] \u003ca href=\"https://github.com/aws-samples/aws-security-workshops\"\u003eaws-samples/aws-security-workshops\u003c/a\u003e A collection of the latest AWS Security workshops\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e242\u003c/strong\u003e星][6d] [HCL] \u003ca href=\"https://github.com/nozaq/terraform-aws-secure-baseline\"\u003enozaq/terraform-aws-secure-baseline\u003c/a\u003e Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e224\u003c/strong\u003e星][10d] [Dockerfile] \u003ca href=\"https://github.com/thinkst/canarytokens-docker\"\u003ethinkst/canarytokens-docker\u003c/a\u003e Docker configuration to quickly setup your own Canarytokens.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e204\u003c/strong\u003e星][17d] \u003ca href=\"https://github.com/stuhirst/awssecurity\"\u003estuhirst/awssecurity\u003c/a\u003e for AWS Security material\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e203\u003c/strong\u003e星][6m] [Py] \u003ca href=\"https://github.com/dowjones/hammer\"\u003edowjones/hammer\u003c/a\u003e Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-88716f4591b1df2149c2b7778d15d04e\"\u003e\u003c/a\u003ePhoenix\u003c/h2\u003e\u003ca id=\"user-content-phoenix\" class=\"anchor\" aria-label=\"Permalink: Phoenix\" href=\"#phoenix\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e820\u003c/strong\u003e星][5d] [Elixir] \u003ca href=\"https://github.com/nccgroup/sobelow\"\u003enccgroup/sobelow\u003c/a\u003e Phoenix 框架安全方面的静态分析工具(Phoenix 框架:支持对webUI,接口, web性能,mobile app 或 mobile browser 进行自动化测试和监控的平台)\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-4fd96686a470ff4e9e974f1503d735a2\"\u003e\u003c/a\u003eKubernetes\u003c/h2\u003e\u003ca id=\"user-content-kubernetes\" class=\"anchor\" aria-label=\"Permalink: Kubernetes\" href=\"#kubernetes\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1895\u003c/strong\u003e星][23d] [Py] \u003ca href=\"https://github.com/aquasecurity/kube-hunter\"\u003eaquasecurity/kube-hunter\u003c/a\u003e Hunt for security weaknesses in Kubernetes clusters\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e582\u003c/strong\u003e星][2m] [Go] \u003ca href=\"https://github.com/shopify/kubeaudit\"\u003eshopify/kubeaudit\u003c/a\u003e kubeaudit helps you audit your Kubernetes clusters against common security controls\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e385\u003c/strong\u003e星][2m] [Shell] \u003ca href=\"https://github.com/kabachook/k8s-security\"\u003ekabachook/k8s-security\u003c/a\u003e Kubernetes security notes and best practices\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e211\u003c/strong\u003e星][9m] [Go] \u003ca href=\"https://github.com/cloudflare/cloudflare-ingress-controller\"\u003ecloudflare/cloudflare-ingress-controller\u003c/a\u003e A Kubernetes ingress controller for Cloudflare's Argo Tunnels\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-786201db0bcc40fdf486cee406fdad31\"\u003e\u003c/a\u003eAzure\u003c/h2\u003e\u003ca id=\"user-content-azure\" class=\"anchor\" aria-label=\"Permalink: Azure\" href=\"#azure\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-40dbffa18ec695a618eef96d6fd09176\"\u003e\u003c/a\u003eNginx\u003c/h2\u003e\u003ca id=\"user-content-nginx\" class=\"anchor\" aria-label=\"Permalink: Nginx\" href=\"#nginx\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e6211\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/yandex/gixy\"\u003eyandex/gixy\u003c/a\u003e Nginx 配置静态分析工具,防止配置错误导致安全问题,自动化错误配置检测\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-6b90a3993f9846922396ec85713dc760\"\u003e\u003c/a\u003eELK\u003c/h2\u003e\u003ca id=\"user-content-elk\" class=\"anchor\" aria-label=\"Permalink: ELK\" href=\"#elk\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1945\u003c/strong\u003e星][4d] [CSS] \u003ca href=\"https://github.com/cyb3rward0g/helk\"\u003ecyb3rward0g/helk\u003c/a\u003e 对ELK栈进行分析,具备多种高级功能,例如SQL声明性语言,图形,结构化流,机器学习等\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-6730dabeca61fcf64d4f7631abae6734\"\u003e\u003c/a\u003eGoogleCloud\u0026amp;\u0026amp;谷歌云\u003c/h2\u003e\u003ca id=\"user-content-googlecloud谷歌云\" class=\"anchor\" aria-label=\"Permalink: GoogleCloud\u0026amp;\u0026amp;谷歌云\" href=\"#googlecloud谷歌云\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1066\u003c/strong\u003e星][2d] [Py] \u003ca href=\"https://github.com/forseti-security/forseti-security\"\u003eforseti-security/forseti-security\u003c/a\u003e A community-driven collection of open source tools to improve the security of your Google Cloud Platform environments\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-d55d9dfd081aa2a02e636b97ca1bad0b\"\u003e\u003c/a\u003e物联网(IoT)\u0026amp;\u0026amp;嵌入式设备\u0026amp;\u0026amp;路由器\u0026amp;\u0026amp;交换机\u0026amp;\u0026amp;智能设备\u0026amp;\u0026amp;打印机\u003c/h1\u003e\u003ca id=\"user-content-物联网iot嵌入式设备路由器交换机智能设备打印机\" class=\"anchor\" aria-label=\"Permalink: 物联网(IoT)\u0026amp;\u0026amp;嵌入式设备\u0026amp;\u0026amp;路由器\u0026amp;\u0026amp;交换机\u0026amp;\u0026amp;智能设备\u0026amp;\u0026amp;打印机\" href=\"#物联网iot嵌入式设备路由器交换机智能设备打印机\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-9a20a70f58ea7946f24224c5d73fac15\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-1\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-1\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-cda63179d132f43441f8844c5df10024\"\u003e\u003c/a\u003e未分类-IoT\u003c/h3\u003e\u003ca id=\"user-content-未分类-iot\" class=\"anchor\" aria-label=\"Permalink: 未分类-IoT\" href=\"#未分类-iot\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1218\u003c/strong\u003e星][] [C] \u003ca href=\"https://github.com/dgiese/dustcloud\"\u003edgiese/dustcloud\u003c/a\u003e Xiaomi Smart Home Device Reverse Engineering and Hacking\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1145\u003c/strong\u003e星][7m] \u003ca href=\"https://github.com/nebgnahz/awesome-iot-hacks\"\u003enebgnahz/awesome-iot-hacks\u003c/a\u003e A Collection of Hacks in IoT Space so that we can address them (hopefully).\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1049\u003c/strong\u003e星][29d] [Py] \u003ca href=\"https://github.com/ct-open-source/tuya-convert\"\u003ect-open-source/tuya-convert\u003c/a\u003e A collection of scripts to flash Tuya IoT devices to alternative firmwares\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e836\u003c/strong\u003e星][5d] \u003ca href=\"https://github.com/v33ru/iotsecurity101\"\u003ev33ru/iotsecurity101\u003c/a\u003e From IoT Pentesting to IoT Security\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e587\u003c/strong\u003e星][9m] [Py] \u003ca href=\"https://github.com/woj-ciech/danger-zone\"\u003ewoj-ciech/danger-zone\u003c/a\u003e Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e491\u003c/strong\u003e星][18d] [Py] \u003ca href=\"https://github.com/iti/ics-security-tools\"\u003eiti/ics-security-tools\u003c/a\u003e Tools, tips, tricks, and more for exploring ICS Security.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e461\u003c/strong\u003e星][5d] [Py] \u003ca href=\"https://github.com/rabobank-cdc/dettect\"\u003erabobank-cdc/dettect\u003c/a\u003e Detect Tactics, Techniques \u0026amp; Combat Threats\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e330\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/vmware/liota\"\u003evmware/liota\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e315\u003c/strong\u003e星][16d] [Java] \u003ca href=\"https://github.com/erudika/para\"\u003eerudika/para\u003c/a\u003e Open source back-end server for web, mobile and IoT. The backend for busy developers. (self-hosted or hosted)\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-72bffacc109d51ea286797a7d5079392\"\u003e\u003c/a\u003e打印机\u003c/h3\u003e\u003ca id=\"user-content-打印机\" class=\"anchor\" aria-label=\"Permalink: 打印机\" href=\"#打印机\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-c9fd442ecac4e22d142731165b06b3fe\"\u003e\u003c/a\u003e路由器\u0026amp;\u0026amp;交换机\u003c/h3\u003e\u003ca id=\"user-content-路由器交换机\" class=\"anchor\" aria-label=\"Permalink: 路由器\u0026amp;\u0026amp;交换机\" href=\"#路由器交换机\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-3d345feb9fee1c101aea3838da8cbaca\"\u003e\u003c/a\u003e嵌入式设备\u003c/h3\u003e\u003ca id=\"user-content-嵌入式设备\" class=\"anchor\" aria-label=\"Permalink: 嵌入式设备\" href=\"#嵌入式设备\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e7547\u003c/strong\u003e星][8d] [Py] \u003ca href=\"https://github.com/threat9/routersploit\"\u003ethreat9/routersploit\u003c/a\u003e Exploitation Framework for Embedded Devices\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-01e638f09e44280ae9a1a95fc376edc5\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-1\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-1\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-a4a3bcead86d9f9f7977479dfe94797d\"\u003e\u003c/a\u003e新添加\u003c/h3\u003e\u003ca id=\"user-content-新添加\" class=\"anchor\" aria-label=\"Permalink: 新添加\" href=\"#新添加\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-1233584261c0cd5224b6e90a98cc9a94\"\u003e\u003c/a\u003e渗透\u0026amp;\u0026amp;offensive\u0026amp;\u0026amp;渗透框架\u0026amp;\u0026amp;后渗透框架\u003c/h1\u003e\u003ca id=\"user-content-渗透offensive渗透框架后渗透框架\" class=\"anchor\" aria-label=\"Permalink: 渗透\u0026amp;\u0026amp;offensive\u0026amp;\u0026amp;渗透框架\u0026amp;\u0026amp;后渗透框架\" href=\"#渗透offensive渗透框架后渗透框架\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-5dd93fbc2f2ebc8d98672b2d95782af3\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-2\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-2\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-2e40f2f1df5d7f93a7de47bf49c24a0e\"\u003e\u003c/a\u003e未分类-Pentest\u003c/h3\u003e\u003ca id=\"user-content-未分类-pentest\" class=\"anchor\" aria-label=\"Permalink: 未分类-Pentest\" href=\"#未分类-pentest\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e3051\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/spiderlabs/responder\"\u003espiderlabs/responder\u003c/a\u003e LLMNR/NBT-NS/MDNS投毒,内置HTTP/SMB/MSSQL/FTP/LDAP认证服务器, 支持NTLMv1/NTLMv2/LMv2\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e2058\u003c/strong\u003e星][2m] [C++] \u003ca href=\"https://github.com/lordnoteworthy/al-khaser\"\u003elordnoteworthy/al-khaser\u003c/a\u003e 在野恶意软件使用的技术:虚拟机,仿真,调试器,沙盒检测。\u003c/p\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#e2fd0947924229d7de24b9902e1f54a0\"\u003e恶意代码-\u0026gt;工具\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e1957\u003c/strong\u003e星][5d] \u003ca href=\"https://github.com/chaitin/xray\"\u003echaitin/xray\u003c/a\u003e xray 安全评估工具 | 使用之前务必先阅读文档\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e1468\u003c/strong\u003e星][6d] [C] \u003ca href=\"https://github.com/ufrisk/pcileech\"\u003eufrisk/pcileech\u003c/a\u003e DMA攻击工具。通过 PCIe 硬件设备使用 DMA,直接读写目标系统的内存。目标系统不需要安装驱动。\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e1421\u003c/strong\u003e星][5m] \u003ca href=\"https://github.com/yadox666/the-hackers-hardware-toolkit\"\u003eyadox666/the-hackers-hardware-toolkit\u003c/a\u003e 用于Red Team、渗透、安全研究的最佳硬件产品集合\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e1398\u003c/strong\u003e星][4d] [Py] \u003ca href=\"https://github.com/ekultek/whatwaf\"\u003eekultek/whatwaf\u003c/a\u003e 检测并绕过WAF和保护系统\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e1223\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/owtf/owtf\"\u003eowtf/owtf\u003c/a\u003e 进攻性 Web 测试框架。着重于 OWASP + PTES,尝试统合强大的工具,提高渗透测试的效率。大部分以Python 编写\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e1020\u003c/strong\u003e星][1m] [C] \u003ca href=\"https://github.com/bt3gl/Pentesting-Toolkit\"\u003ebt3gl/pentesting-toolkit\u003c/a\u003e 渗透测试,CTF和战争游戏的工具收集\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e952\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/hatriot/zarp\"\u003ehatriot/zarp\u003c/a\u003e 网络攻击工具,主要是本地网络攻击\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e938\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/d4vinci/one-lin3r\"\u003ed4vinci/one-lin3r\u003c/a\u003e 轻量级框架,提供在渗透测试中需要的所有one-liners\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e850\u003c/strong\u003e星][8m] [JS] \u003ca href=\"https://github.com/serpicoproject/serpico\"\u003eserpicoproject/serpico\u003c/a\u003e 渗透测试报告生成和协作工具\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e820\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/jeffzh3ng/fuxi\"\u003ejeffzh3ng/fuxi\u003c/a\u003e 渗透测试平台\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e809\u003c/strong\u003e星][17d] [Py] \u003ca href=\"https://github.com/jivoi/pentest\"\u003ejivoi/pentest\u003c/a\u003e 渗透测试工具\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e775\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/gkbrk/slowloris\"\u003egkbrk/slowloris\u003c/a\u003e HTTP DoS 服务攻击,主要影响多线程服务器\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e722\u003c/strong\u003e星][19d] \u003ca href=\"https://github.com/voorivex/pentest-guide\"\u003evoorivex/pentest-guide\u003c/a\u003e 基于OWASP的渗透测试指南,包括测试案例,资源和示例。\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e713\u003c/strong\u003e星][6m] \u003ca href=\"https://github.com/leezj9671/pentest_interview\"\u003eleezj9671/pentest_interview\u003c/a\u003e 个人准备渗透测试和安全面试的经验之谈,和去部分厂商的面试题,干货真的满满~\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e685\u003c/strong\u003e星][4d] [Py] \u003ca href=\"https://github.com/gwen001/pentest-tools\"\u003egwen001/pentest-tools\u003c/a\u003e 日常使用的渗透工具集合\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e624\u003c/strong\u003e星][10m] [Py] \u003ca href=\"https://github.com/epsylon/ufonet\"\u003eepsylon/ufonet\u003c/a\u003e 用于发起DDoS和DoS攻击的工具包。\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e613\u003c/strong\u003e星][1m] [Ruby] \u003ca href=\"https://github.com/hackplayers/evil-winrm\"\u003ehackplayers/evil-winrm\u003c/a\u003e 用户Hacking/渗透的终极WinRM shell\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e545\u003c/strong\u003e星][t] [C++] \u003ca href=\"https://github.com/danielkrupinski/osiris\"\u003edanielkrupinski/osiris\u003c/a\u003e 开源培训软件/“反恐精英:全球攻势”游戏作弊工具。设计为内部作弊-可将动态链接库(DLL)加载到游戏过程中\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e514\u003c/strong\u003e星][25d] [PS] \u003ca href=\"https://github.com/S3cur3Th1sSh1t/WinPwn\"\u003es3cur3th1ssh1t/winpwn\u003c/a\u003e 内部Windows渗透测试/与安全的自动化\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e502\u003c/strong\u003e星][7d] \u003ca href=\"https://github.com/netbiosx/checklists\"\u003enetbiosx/checklists\u003c/a\u003e 参与的各种渗透测试的清单\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e491\u003c/strong\u003e星][1y] [Shell] \u003ca href=\"https://github.com/leonteale/pentestpackage\"\u003eleonteale/pentestpackage\u003c/a\u003e 一整套我已经制作或经常使用的渗透脚本\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e489\u003c/strong\u003e星][11m] [Ruby] \u003ca href=\"https://github.com/sidaf/homebrew-pentest\"\u003esidaf/homebrew-pentest\u003c/a\u003e 一个包含一些Homebrew formulas的Tap,包含与渗透测试相关的工具。\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e474\u003c/strong\u003e星][8m] [Java] \u003ca href=\"https://github.com/alpha1e0/pentestdb\"\u003ealpha1e0/pentestdb\u003c/a\u003e WEB渗透测试数据库\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e472\u003c/strong\u003e星][11m] [PHP] \u003ca href=\"https://github.com/l3m0n/pentest_tools\"\u003el3m0n/pentest_tools\u003c/a\u003e 收集一些小型实用的工具\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e464\u003c/strong\u003e星][3m] [C++] \u003ca href=\"https://github.com/FSecureLABS/C3\"\u003efsecurelabs/c3\u003c/a\u003e 一个用于快速定制C2通道原型的框架,同时仍提供与现有攻击性工具包的集成。\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e463\u003c/strong\u003e星][4m] \u003ca href=\"https://github.com/mel0day/redteam-bcs\"\u003emel0day/redteam-bcs\u003c/a\u003e BCS(北京网络安全大会)2019 红队行动会议重点内容\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e451\u003c/strong\u003e星][8m] [C++] \u003ca href=\"https://github.com/rek7/mxtract\"\u003erek7/mxtract\u003c/a\u003e 一个基于linux的开源工具,用于分析和转储内存。\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e440\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/admintony/prepare-for-awd\"\u003eadmintony/prepare-for-awd\u003c/a\u003e AWD攻防赛脚本集合\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e435\u003c/strong\u003e星][10m] [Go] \u003ca href=\"https://github.com/amyangxyz/assassingo\"\u003eamyangxyz/assassingo\u003c/a\u003e 一个可扩展的并发信息收集和漏洞扫描框架,具有基于WebSocket的Web GUI。\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e403\u003c/strong\u003e星][2d] [Py] \u003ca href=\"https://github.com/christruncer/pentestscripts\"\u003echristruncer/pentestscripts\u003c/a\u003e 渗透脚本\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e401\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/clr2of8/dpat\"\u003eclr2of8/dpat\u003c/a\u003e 域密码审核工具\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e396\u003c/strong\u003e星][4m] \u003ca href=\"https://github.com/ansjdnakjdnajkd/ios\"\u003eansjdnakjdnajkd/ios\u003c/a\u003e iOS渗透测试最有用的工具\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e395\u003c/strong\u003e星][8d] [PS] \u003ca href=\"https://github.com/d0nkeys/redteam\"\u003ed0nkeys/redteam\u003c/a\u003e Red Team 脚本\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e394\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/cr4shcod3/pureblood\"\u003ecr4shcod3/pureblood\u003c/a\u003e 为黑客/渗透测试/漏洞赏金创建的渗透测试框架\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e392\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/xuanhun/pythonhackingbook1\"\u003exuanhun/pythonhackingbook1\u003c/a\u003e Python黑客编程之极速入门\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e387\u003c/strong\u003e星][5m] [C#] \u003ca href=\"https://github.com/bitsadmin/nopowershell\"\u003ebitsadmin/nopowershell\u003c/a\u003e 使用C#\"重写\"的PowerShell, 支持执行与PowerShell类似的命令, 然而对所有的PowerShell日志机制都不可见\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e381\u003c/strong\u003e星][9m] [C] \u003ca href=\"https://github.com/ridter/pentest\"\u003eridter/pentest\u003c/a\u003e 渗透工具\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e379\u003c/strong\u003e星][7m] \u003ca href=\"https://github.com/unprovable/pentesthardware\"\u003eunprovable/pentesthardware\u003c/a\u003e 公开笔记整理\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e353\u003c/strong\u003e星][1y] [PS] \u003ca href=\"https://github.com/rootclay/powershell-attack-guide\"\u003erootclay/powershell-attack-guide\u003c/a\u003e Powershell攻击指南----黑客后渗透之道\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e351\u003c/strong\u003e星][3m] [Shell] \u003ca href=\"https://github.com/maldevel/pentestkit\"\u003emaldevel/pentestkit\u003c/a\u003e 渗透脚本和工具\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e347\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/ym2011/PEST\"\u003eym2011/pest\u003c/a\u003e 渗透脚本\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e346\u003c/strong\u003e星][11m] [Py] \u003ca href=\"https://github.com/darkspiritz/darkspiritz\"\u003edarkspiritz/darkspiritz\u003c/a\u003e 适用于Linux,MacOS和Windows系统的渗透测试框架。\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e344\u003c/strong\u003e星][1m] \u003ca href=\"https://github.com/stardustsky/saidict\"\u003estardustsky/saidict\u003c/a\u003e 弱口令,敏感目录,敏感文件等渗透测试常用攻击字典\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e340\u003c/strong\u003e星][1y] [Java] \u003ca href=\"https://github.com/rub-nds/ws-attacker\"\u003erub-nds/ws-attacker\u003c/a\u003e Web服务渗透测试框架,模块化。\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e331\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/m8r0wn/nullinux\"\u003em8r0wn/nullinux\u003c/a\u003e SMB null 会话识别和枚举工具\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e323\u003c/strong\u003e星][3m] [PS] \u003ca href=\"https://github.com/kmkz/pentesting\"\u003ekmkz/pentesting\u003c/a\u003e 渗透测试技巧\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e322\u003c/strong\u003e星][4m] [HTML] \u003ca href=\"https://github.com/koutto/jok3r\"\u003ekoutto/jok3r\u003c/a\u003e 一个Python3 CLI应用程序,旨在帮助渗透测试人员进行网络基础结构和Web黑盒安全性测试。\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e310\u003c/strong\u003e星][7m] \u003ca href=\"https://github.com/ring04h/pentest\"\u003ering04h/pentest\u003c/a\u003e 渗透测试用到的东东\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e305\u003c/strong\u003e星][3m] [Ruby] \u003ca href=\"https://github.com/fozavci/viproy-voipkit\"\u003efozavci/viproy-voipkit\u003c/a\u003e VoIP渗透测试工具和 Metasploit 框架\u003c/p\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#01be61d5bb9f6f7199208ff0fba86b5d\"\u003e渗透-\u0026gt;工具-\u0026gt;Metasploit-\u0026gt;未分类-metasploit\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e297\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/bishopfox/eyeballer\"\u003ebishopfox/eyeballer\u003c/a\u003e 用于大型网络渗透测试中需要从大量基于Web的主机中找到“有趣的”目标\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e295\u003c/strong\u003e星][2m] [Lua] \u003ca href=\"https://github.com/pentesteracademy/patoolkit\"\u003epentesteracademy/patoolkit\u003c/a\u003e 一组流量分析插件,用于将Wireshark的功能从微分析工具和协议解析器扩展到宏分析器和威胁猎人。\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e289\u003c/strong\u003e星][5d] [Java] \u003ca href=\"https://github.com/mr-xn/penetration_testing_poc\"\u003emr-xn/penetration_testing_poc\u003c/a\u003e 渗透测试有关的POC、EXP、脚本、提权、小工具等\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e287\u003c/strong\u003e星][1y] [C++] \u003ca href=\"https://github.com/paranoidninja/pandoras-box\"\u003eparanoidninja/pandoras-box\u003c/a\u003e 渗透和Red Team脚本\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e280\u003c/strong\u003e星][12d] [Go] \u003ca href=\"https://github.com/rmikehodges/hidensneak\"\u003ermikehodges/hidensneak\u003c/a\u003e 通过提供快速部署,管理和关闭各种云服务的界面,协助管理渗透测试人员的攻击基础架构\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e273\u003c/strong\u003e星][19d] [Py] \u003ca href=\"https://github.com/elevenpaths/homepwn\"\u003eelevenpaths/homepwn\u003c/a\u003e HomePwn - Swiss Army Knife for Pentesting of IoT Devices\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e262\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/giantbranch/python-hacker-code\"\u003egiantbranch/python-hacker-code\u003c/a\u003e 《python黑帽子:黑客与渗透测试编程之道》代码及实验文件,字典等\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e259\u003c/strong\u003e星][1m] \u003ca href=\"https://github.com/anyeduke/enterprise-security-skill\"\u003eanyeduke/enterprise-security-skill\u003c/a\u003e 用于记录企业安全规划,建设,运营,攻防的相关资源\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e250\u003c/strong\u003e星][5d] [PS] \u003ca href=\"https://github.com/sdcampbell/internal-pentest-playbook\"\u003esdcampbell/internal-pentest-playbook\u003c/a\u003e Internal Network Penetration Test Playbook\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e246\u003c/strong\u003e星][3m] [Shell] \u003ca href=\"https://github.com/leviathan36/kaboom\"\u003eleviathan36/kaboom\u003c/a\u003e An automated pentest tool\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e231\u003c/strong\u003e星][9m] [Go] \u003ca href=\"https://github.com/stevenaldinger/decker\"\u003estevenaldinger/decker\u003c/a\u003e Declarative penetration testing orchestration framework\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e220\u003c/strong\u003e星][] [JS] \u003ca href=\"https://github.com/giper45/dockersecurityplayground\"\u003egiper45/dockersecurityplayground\u003c/a\u003e A Microservices-based framework for the study of Network Security and Penetration Test techniques\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e219\u003c/strong\u003e星][6m] [Py] \u003ca href=\"https://github.com/mgeeky/tomcatwardeployer\"\u003emgeeky/tomcatwardeployer\u003c/a\u003e Apache Tomcat auto WAR deployment \u0026amp; pwning penetration testing tool.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e206\u003c/strong\u003e星][3m] [Shell] \u003ca href=\"https://github.com/keepwannabe/remot3d\"\u003ekeepwannabe/remot3d\u003c/a\u003e is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e203\u003c/strong\u003e星][2m] [Ruby] \u003ca href=\"https://github.com/vonahisec/leprechaun\"\u003evonahisec/leprechaun\u003c/a\u003e This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp dir=\"auto\"\u003e[\u003cstrong\u003e200\u003c/strong\u003e星][11m] [Py] \u003ca href=\"https://github.com/infamoussyn/rogue\"\u003einfamoussyn/rogue\u003c/a\u003e An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-9081db81f6f4b78d5c263723a3f7bd6d\"\u003e\u003c/a\u003e收集\u003c/h3\u003e\u003ca id=\"user-content-收集\" class=\"anchor\" aria-label=\"Permalink: 收集\" href=\"#收集\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e923\u003c/strong\u003e星][9m] [C] \u003ca href=\"https://github.com/0x90/wifi-arsenal\"\u003e0x90/wifi-arsenal\u003c/a\u003e WiFi arsenal\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e822\u003c/strong\u003e星][3m] [Shell] \u003ca href=\"https://github.com/shr3ddersec/shr3dkit\"\u003eshr3ddersec/shr3dkit\u003c/a\u003e Red Team Tool Kit\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e540\u003c/strong\u003e星][7m] [Py] \u003ca href=\"https://github.com/0xdea/tactical-exploitation\"\u003e0xdea/tactical-exploitation\u003c/a\u003e 渗透测试辅助工具包. Python/PowerShell脚本\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-2051fd9e171f2698d8e7486e3dd35d87\"\u003e\u003c/a\u003e渗透多合一\u0026amp;\u0026amp;渗透框架\u003c/h3\u003e\u003ca id=\"user-content-渗透多合一渗透框架\" class=\"anchor\" aria-label=\"Permalink: 渗透多合一\u0026amp;\u0026amp;渗透框架\" href=\"#渗透多合一渗透框架\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e5062\u003c/strong\u003e星][5m] [PS] \u003ca href=\"https://github.com/EmpireProject/Empire\"\u003eempireproject/empire\u003c/a\u003e 后渗透框架. Windows客户端用PowerShell, Linux/OSX用Python. 之前PowerShell Empire和Python EmPyre的组合\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e4752\u003c/strong\u003e星][13d] [Py] \u003ca href=\"https://github.com/manisso/fsociety\"\u003emanisso/fsociety\u003c/a\u003e fsociety Hacking Tools Pack – A Penetration Testing Framework\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3427\u003c/strong\u003e星][1m] [PS] \u003ca href=\"https://github.com/samratashok/nishang\"\u003esamratashok/nishang\u003c/a\u003e 渗透框架,脚本和Payload收集,主要是PowerShell,涵盖渗透的各个阶段\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3154\u003c/strong\u003e星][t] [Shell] \u003ca href=\"https://github.com/1n3/sn1per\"\u003e1n3/sn1per\u003c/a\u003e 自动化渗透测试框架\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3136\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/byt3bl33d3r/crackmapexec\"\u003ebyt3bl33d3r/crackmapexec\u003c/a\u003e 后渗透工具,自动化评估大型Active Directory网络的安全性\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2995\u003c/strong\u003e星][18d] [Py] \u003ca href=\"https://github.com/guardicore/monkey\"\u003eguardicore/monkey\u003c/a\u003e 自动化渗透测试工具, 测试数据中心的弹性, 以防范周边(perimeter)泄漏和内部服务器感染\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2840\u003c/strong\u003e星][8m] [C#] \u003ca href=\"https://github.com/quasar/quasarrat\"\u003equasar/quasarrat\u003c/a\u003e Remote Administration Tool for Windows\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2421\u003c/strong\u003e星][5d] [Py] \u003ca href=\"https://github.com/infobyte/faraday\"\u003einfobyte/faraday\u003c/a\u003e 渗透测试和漏洞管理平台\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1527\u003c/strong\u003e星][19d] [Py] \u003ca href=\"https://github.com/zerosum0x0/koadic\"\u003ezerosum0x0/koadic\u003c/a\u003e 类似于Meterpreter、Powershell Empire 的post-exploitation rootkit,区别在于其大多数操作都是由 Windows 脚本主机 JScript/VBScript 执行\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1096\u003c/strong\u003e星][11m] [Py] \u003ca href=\"https://github.com/secforce/sparta\"\u003esecforce/sparta\u003c/a\u003e 网络基础架构渗透测试\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e961\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/0xInfection/TIDoS-Framework\"\u003e0xinfection/tidos-framework\u003c/a\u003e Web App渗透测试框架, 攻击性, 手动\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e928\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/m4n3dw0lf/pythem\"\u003em4n3dw0lf/pythem\u003c/a\u003e 多功能渗透测试框架\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e521\u003c/strong\u003e星][t] [Py] \u003ca href=\"https://github.com/gyoisamurai/gyoithon\"\u003egyoisamurai/gyoithon\u003c/a\u003e 使用机器学习的成长型渗透测试工具\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-fc8737aef0f59c3952d11749fe582dac\"\u003e\u003c/a\u003e自动化\u003c/h3\u003e\u003ca id=\"user-content-自动化\" class=\"anchor\" aria-label=\"Permalink: 自动化\" href=\"#自动化\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1881\u003c/strong\u003e星][5m] [Shell] \u003ca href=\"https://github.com/arismelachroinos/lscript\"\u003earismelachroinos/lscript\u003c/a\u003e 自动化无线渗透和Hacking 任务的脚本\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#d4efda1853b2cb0909727188116a2a8c\"\u003e无线-\u0026gt;未分类-WiFi\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1792\u003c/strong\u003e星][t] [Shell] \u003ca href=\"https://github.com/leebaird/discover\"\u003eleebaird/discover\u003c/a\u003e 自定义的bash脚本, 用于自动化多个渗透测试任务, 包括: 侦查、扫描、解析、在Metasploit中创建恶意Payload和Listener\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#01be61d5bb9f6f7199208ff0fba86b5d\"\u003e渗透-\u0026gt;工具-\u0026gt;Metasploit-\u0026gt;未分类-metasploit\u003c/a\u003e |\u003ca href=\"#05ab1b75266fddafc7195f5b395e4d99\"\u003e侦察-\u0026gt;工具-\u0026gt;未分类-OSINT\u003c/a\u003e |\u003ca href=\"#ad92f6b801a18934f1971e2512f5ae4f\"\u003ePayload-\u0026gt;工具-\u0026gt;Payload生成\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1688\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/rootm0s/winpwnage\"\u003erootm0s/winpwnage\u003c/a\u003e UAC bypass, Elevate, Persistence and Execution methods\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-3ae4408f4ab03f99bab9ef9ee69642a8\"\u003e\u003c/a\u003e数据渗透\u0026amp;\u0026amp;DataExfiltration\u003c/h3\u003e\u003ca id=\"user-content-数据渗透dataexfiltration\" class=\"anchor\" aria-label=\"Permalink: 数据渗透\u0026amp;\u0026amp;DataExfiltration\" href=\"#数据渗透dataexfiltration\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1065\u003c/strong\u003e星][1m] [C] \u003ca href=\"https://github.com/quiet/quiet\"\u003equiet/quiet\u003c/a\u003e Transmit data with sound. Includes binaries for soundcards and .wav files.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e469\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/viralmaniar/powershell-rat\"\u003eviralmaniar/powershell-rat\u003c/a\u003e Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-adfa06d452147ebacd35981ce56f916b\"\u003e\u003c/a\u003e横向渗透\u003c/h3\u003e\u003ca id=\"user-content-横向渗透\" class=\"anchor\" aria-label=\"Permalink: 横向渗透\" href=\"#横向渗透\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-39e9a0fe929fffe5721f7d7bb2dae547\"\u003e\u003c/a\u003eBurp\u003c/h3\u003e\u003ca id=\"user-content-burp\" class=\"anchor\" aria-label=\"Permalink: Burp\" href=\"#burp\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch4 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-6366edc293f25b57bf688570b11d6584\"\u003e\u003c/a\u003e收集\u003c/h4\u003e\u003ca id=\"user-content-收集-1\" class=\"anchor\" aria-label=\"Permalink: 收集\" href=\"#收集-1\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1982\u003c/strong\u003e星][1y] [BitBake] \u003ca href=\"https://github.com/1n3/intruderpayloads\"\u003e1n3/intruderpayloads\u003c/a\u003e A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1108\u003c/strong\u003e星][2m] \u003ca href=\"https://github.com/snoopysecurity/awesome-burp-extensions\"\u003esnoopysecurity/awesome-burp-extensions\u003c/a\u003e Burp扩展收集\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch4 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-5b761419863bc686be12c76451f49532\"\u003e\u003c/a\u003e未分类-Burp\u003c/h4\u003e\u003ca id=\"user-content-未分类-burp\" class=\"anchor\" aria-label=\"Permalink: 未分类-Burp\" href=\"#未分类-burp\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1112\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/bugcrowd/HUNT\"\u003ebugcrowd/hunt\u003c/a\u003e Burp和ZAP的扩展收集\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e917\u003c/strong\u003e星][5d] [Batchfile] \u003ca href=\"https://github.com/mr-xn/burpsuite-collections\"\u003emr-xn/burpsuite-collections\u003c/a\u003e BurpSuite收集:包括不限于 Burp 文章、破解版、插件(非BApp Store)、汉化等相关教程,欢迎添砖加瓦---burpsuite-pro burpsuite-extender burpsuite cracked-version hackbar hacktools fuzzing fuzz-testing burp-plugin burp-extensions bapp-store brute-force-attacks brute-force-passwords waf sqlmap jar\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e715\u003c/strong\u003e星][1y] [Java] \u003ca href=\"https://github.com/d3vilbug/hackbar\"\u003ed3vilbug/hackbar\u003c/a\u003e HackBar plugin for Burpsuite\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e663\u003c/strong\u003e星][9m] [Java] \u003ca href=\"https://github.com/vulnerscom/burp-vulners-scanner\"\u003evulnerscom/burp-vulners-scanner\u003c/a\u003e Vulnerability scanner based on vulners.com search API\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e605\u003c/strong\u003e星][9m] [Java] \u003ca href=\"https://github.com/c0ny1/chunked-coding-converter\"\u003ec0ny1/chunked-coding-converter\u003c/a\u003e Burp suite 分块传输辅助插件\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e584\u003c/strong\u003e星][1y] [Java] \u003ca href=\"https://github.com/federicodotta/brida\"\u003efedericodotta/brida\u003c/a\u003e The new bridge between Burp Suite and Frida!\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e510\u003c/strong\u003e星][2m] [Java] \u003ca href=\"https://github.com/wagiro/burpbounty\"\u003ewagiro/burpbounty\u003c/a\u003e Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the active and passive scanner by means of personalized rules through a very intuitive graphical interface.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e496\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/romanzaikin/burpextension-whatsapp-decryption-checkpoint\"\u003eromanzaikin/burpextension-whatsapp-decryption-checkpoint\u003c/a\u003e This tool was created during our research at Checkpoint Software Technologies on Whatsapp Protocol (This repository will be updated after BlackHat 2019)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e445\u003c/strong\u003e星][6m] [Py] \u003ca href=\"https://github.com/albinowax/activescanplusplus\"\u003ealbinowax/activescanplusplus\u003c/a\u003e ActiveScan++ Burp Suite Plugin\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e423\u003c/strong\u003e星][5m] [Java] \u003ca href=\"https://github.com/bit4woo/recaptcha\"\u003ebit4woo/recaptcha\u003c/a\u003e reCAPTCHA = REcognize CAPTCHA: A Burp Suite Extender that recognize CAPTCHA and use for intruder payload 自动识别图形验证码并用于burp intruder爆破模块的插件\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e410\u003c/strong\u003e星][8m] [Java] \u003ca href=\"https://github.com/nccgroup/burpsuitehttpsmuggler\"\u003enccgroup/burpsuitehttpsmuggler\u003c/a\u003e A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e381\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/rhinosecuritylabs/sleuthql\"\u003erhinosecuritylabs/sleuthql\u003c/a\u003e Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e378\u003c/strong\u003e星][3m] [Java] \u003ca href=\"https://github.com/nccgroup/autorepeater\"\u003enccgroup/autorepeater\u003c/a\u003e Automated HTTP Request Repeating With Burp Suite\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e366\u003c/strong\u003e星][13d] [Java] \u003ca href=\"https://github.com/PortSwigger/http-request-smuggler\"\u003eportswigger/http-request-smuggler\u003c/a\u003e an extension for Burp Suite designed to help you launch HTTP Request Smuggling attack\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e364\u003c/strong\u003e星][4d] [Kotlin] \u003ca href=\"https://github.com/portswigger/turbo-intruder\"\u003eportswigger/turbo-intruder\u003c/a\u003e Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e359\u003c/strong\u003e星][5m] [Java] \u003ca href=\"https://github.com/bit4woo/domain_hunter\"\u003ebit4woo/domain_hunter\u003c/a\u003e A Burp Suite Extender that try to find sub-domain, similar-domain and related-domain of an organization, not only a domain! 利用burp收集整个企业、组织的域名(不仅仅是单个主域名)的插件\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e336\u003c/strong\u003e星][13d] [Java] \u003ca href=\"https://github.com/bit4woo/knife\"\u003ebit4woo/knife\u003c/a\u003e A burp extension that add some useful function to Context Menu 添加一些右键菜单让burp用起来更顺畅\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e310\u003c/strong\u003e星][1y] [Java] \u003ca href=\"https://github.com/ebryx/aes-killer\"\u003eebryx/aes-killer\u003c/a\u003e Burp plugin to decrypt AES Encrypted traffic of mobile apps on the fly\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e303\u003c/strong\u003e星][6d] [Java] \u003ca href=\"https://github.com/ilmila/j2eescan\"\u003eilmila/j2eescan\u003c/a\u003e J2EEScan is a plugin for Burp Suite Proxy. The goal of this plugin is to improve the test coverage during web application penetration tests on J2EE applications.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e301\u003c/strong\u003e星][1y] [Java] \u003ca href=\"https://github.com/elkokc/reflector\"\u003eelkokc/reflector\u003c/a\u003e Burp 插件,浏览网页时实时查找反射 XSS\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e299\u003c/strong\u003e星][1y] [Java] \u003ca href=\"https://github.com/vmware/burp-rest-api\"\u003evmware/burp-rest-api\u003c/a\u003e REST/JSON API to the Burp Suite security tool.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e298\u003c/strong\u003e星][12m] [Shell] \u003ca href=\"https://github.com/yw9381/burp_suite_doc_zh_cn\"\u003eyw9381/burp_suite_doc_zh_cn\u003c/a\u003e 这是基于Burp Suite官方文档翻译而来的中文版文档\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e273\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/quitten/autorize\"\u003equitten/autorize\u003c/a\u003e Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease application security people work and allow them perform an automatic authorization tests\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e257\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/rhinosecuritylabs/iprotate_burp_extension\"\u003erhinosecuritylabs/iprotate_burp_extension\u003c/a\u003e Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e250\u003c/strong\u003e星][30d] [Java] \u003ca href=\"https://github.com/c0ny1/jsencrypter\"\u003ec0ny1/jsencrypter\u003c/a\u003e 一个用于加密传输爆破的Burp Suite插件\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e246\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/initroot/burpjslinkfinder\"\u003einitroot/burpjslinkfinder\u003c/a\u003e Burp Extension for a passive scanning JS files for endpoint links.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e244\u003c/strong\u003e星][3m] [Java] \u003ca href=\"https://github.com/c0ny1/passive-scan-client\"\u003ec0ny1/passive-scan-client\u003c/a\u003e Burp被动扫描流量转发插件\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e238\u003c/strong\u003e星][2m] [Java] \u003ca href=\"https://github.com/samlraider/samlraider\"\u003esamlraider/samlraider\u003c/a\u003e SAML2 Burp Extension\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e235\u003c/strong\u003e星][1y] [Java] \u003ca href=\"https://github.com/difcareer/sqlmap4burp\"\u003edifcareer/sqlmap4burp\u003c/a\u003e sqlmap embed in burpsuite\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e230\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/audibleblink/doxycannon\"\u003eaudibleblink/doxycannon\u003c/a\u003e 为一堆OpenVPN文件分别创建Docker容器, 每个容器开启SOCKS5代理服务器并绑定至Docker主机端口, 再结合使用Burp或ProxyChains, 构建私有的Botnet\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e225\u003c/strong\u003e星][6m] [Perl] \u003ca href=\"https://github.com/modzero/mod0burpuploadscanner\"\u003emodzero/mod0burpuploadscanner\u003c/a\u003e HTTP file upload scanner for Burp Proxy\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e219\u003c/strong\u003e星][9m] [Py] \u003ca href=\"https://github.com/teag1e/burpcollector\"\u003eteag1e/burpcollector\u003c/a\u003e 通过BurpSuite来构建自己的爆破字典,可以通过字典爆破来发现隐藏资产。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e209\u003c/strong\u003e星][3m] [Java] \u003ca href=\"https://github.com/h3xstream/http-script-generator\"\u003eh3xstream/http-script-generator\u003c/a\u003e ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-8e7a6a74ff322cbf2bad59092598de77\"\u003e\u003c/a\u003eMetasploit\u003c/h3\u003e\u003ca id=\"user-content-metasploit\" class=\"anchor\" aria-label=\"Permalink: Metasploit\" href=\"#metasploit\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch4 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-01be61d5bb9f6f7199208ff0fba86b5d\"\u003e\u003c/a\u003e未分类-metasploit\u003c/h4\u003e\u003ca id=\"user-content-未分类-metasploit\" class=\"anchor\" aria-label=\"Permalink: 未分类-metasploit\" href=\"#未分类-metasploit\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e19127\u003c/strong\u003e星][4d] [Ruby] \u003ca href=\"https://github.com/rapid7/metasploit-framework\"\u003erapid7/metasploit-framework\u003c/a\u003e Metasploit Framework\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1792\u003c/strong\u003e星][t] [Shell] \u003ca href=\"https://github.com/leebaird/discover\"\u003eleebaird/discover\u003c/a\u003e 自定义的bash脚本, 用于自动化多个渗透测试任务, 包括: 侦查、扫描、解析、在Metasploit中创建恶意Payload和Listener\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#fc8737aef0f59c3952d11749fe582dac\"\u003e渗透-\u0026gt;工具-\u0026gt;自动化\u003c/a\u003e |\u003ca href=\"#05ab1b75266fddafc7195f5b395e4d99\"\u003e侦察-\u0026gt;工具-\u0026gt;未分类-OSINT\u003c/a\u003e |\u003ca href=\"#ad92f6b801a18934f1971e2512f5ae4f\"\u003ePayload-\u0026gt;工具-\u0026gt;Payload生成\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1302\u003c/strong\u003e星][1y] [Shell] \u003ca href=\"https://github.com/dana-at-cp/backdoor-apk\"\u003edana-at-cp/backdoor-apk\u003c/a\u003e backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool, the Android SDK, smali, etc. This shell script is provided as-is without warranty of any kind and is intended for educational purposes only.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e742\u003c/strong\u003e星][16d] [C] \u003ca href=\"https://github.com/rapid7/metasploit-payloads\"\u003erapid7/metasploit-payloads\u003c/a\u003e Unified repository for different Metasploit Framework payloads\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e732\u003c/strong\u003e星][3m] [Java] \u003ca href=\"https://github.com/isafeblue/trackray\"\u003eisafeblue/trackray\u003c/a\u003e 溯光 (TrackRay) 3 beta⚡渗透测试框架(资产扫描|指纹识别|暴力破解|网页爬虫|端口扫描|漏洞扫描|代码审计|AWVS|NMAP|Metasploit|SQLMap)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e534\u003c/strong\u003e星][4d] [Shell] \u003ca href=\"https://github.com/r00t-3xp10it/venom\"\u003er00t-3xp10it/venom\u003c/a\u003e venom - shellcode generator/compiler/handler (metasploit)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e456\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/cchio/deep-pwning\"\u003ecchio/deep-pwning\u003c/a\u003e 一个轻量级的框架,用于试验机器学习模型,目的是评估其对主动攻击者的鲁棒性\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e413\u003c/strong\u003e星][6m] [Ruby] \u003ca href=\"https://github.com/praetorian-code/purple-team-attack-automation\"\u003epraetorian-code/purple-team-attack-automation\u003c/a\u003e Praetorian's public release of our Metasploit automation of MITRE ATT\u0026amp;CK™ TTPs\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e310\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/3ndg4me/autoblue-ms17-010\"\u003e3ndg4me/autoblue-ms17-010\u003c/a\u003e This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e310\u003c/strong\u003e星][11m] [Ruby] \u003ca href=\"https://github.com/darkoperator/metasploit-plugins\"\u003edarkoperator/metasploit-plugins\u003c/a\u003e Plugins for Metasploit Framework\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e305\u003c/strong\u003e星][3m] [Ruby] \u003ca href=\"https://github.com/fozavci/viproy-voipkit\"\u003efozavci/viproy-voipkit\u003c/a\u003e VoIP渗透测试工具和 Metasploit 框架\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#2e40f2f1df5d7f93a7de47bf49c24a0e\"\u003e渗透-\u0026gt;工具-\u0026gt;未分类-Pentest\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e279\u003c/strong\u003e星][3m] [Vue] \u003ca href=\"https://github.com/Zerx0r/Kage\"\u003ezerx0r/kage\u003c/a\u003e Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-b1161d6c4cb520d0cd574347cd18342e\"\u003e\u003c/a\u003e免杀\u0026amp;\u0026amp;躲避AV检测\u003c/h3\u003e\u003ca id=\"user-content-免杀躲避av检测\" class=\"anchor\" aria-label=\"Permalink: 免杀\u0026amp;\u0026amp;躲避AV检测\" href=\"#免杀躲避av检测\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1032\u003c/strong\u003e星][5m] [C] \u003ca href=\"https://github.com/govolution/avet\"\u003egovolution/avet\u003c/a\u003e 免杀工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e733\u003c/strong\u003e星][10m] [Py] \u003ca href=\"https://github.com/mr-un1k0d3r/dkmc\"\u003emr-un1k0d3r/dkmc\u003c/a\u003e DKMC - Dont kill my cat - Malicious payload evasion tool\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e686\u003c/strong\u003e星][7m] [Py] \u003ca href=\"https://github.com/paranoidninja/carboncopy\"\u003eparanoidninja/carboncopy\u003c/a\u003e A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e472\u003c/strong\u003e星][18d] [Go] \u003ca href=\"https://github.com/arvanaghi/checkplease\"\u003earvanaghi/checkplease\u003c/a\u003e Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e316\u003c/strong\u003e星][1m] [C#] \u003ca href=\"https://github.com/ch0pin/aviator\"\u003ech0pin/aviator\u003c/a\u003e Antivirus evasion project\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e302\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/two06/inception\"\u003etwo06/inception\u003c/a\u003e Provides In-memory compilation and reflective loading of C# apps for AV evasion.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e276\u003c/strong\u003e星][2m] [C#] \u003ca href=\"https://github.com/hackplayers/salsa-tools\"\u003ehackplayers/salsa-tools\u003c/a\u003e Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-98a851c8e6744850efcb27b8e93dff73\"\u003e\u003c/a\u003eC\u0026amp;C\u003c/h3\u003e\u003ca id=\"user-content-cc\" class=\"anchor\" aria-label=\"Permalink: C\u0026amp;C\" href=\"#cc\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e2490\u003c/strong\u003e星][4m] [Go] \u003ca href=\"https://github.com/ne0nd0g/merlin\"\u003ene0nd0g/merlin\u003c/a\u003e Merlin is a cross-platform post-exploitation HTTP/2 Command \u0026amp; Control server and agent written in golang.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1826\u003c/strong\u003e星][6m] [C++] \u003ca href=\"https://github.com/iagox86/dnscat2\"\u003eiagox86/dnscat2\u003c/a\u003e 在 DNS 协议上创建加密的 C\u0026amp;C channel\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1110\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/byt3bl33d3r/gcat\"\u003ebyt3bl33d3r/gcat\u003c/a\u003e A PoC backdoor that uses Gmail as a C\u0026amp;C server\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e994\u003c/strong\u003e星][2m] [C#] \u003ca href=\"https://github.com/cobbr/covenant\"\u003ecobbr/covenant\u003c/a\u003e Covenant is a collaborative .NET C2 framework for red teamers.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e633\u003c/strong\u003e星][11m] [Py] \u003ca href=\"https://github.com/mehulj94/braindamage\"\u003emehulj94/braindamage\u003c/a\u003e Remote administration tool which uses Telegram as a C\u0026amp;C server\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e596\u003c/strong\u003e星][19d] [Py] \u003ca href=\"https://github.com/trustedsec/trevorc2\"\u003etrustedsec/trevorc2\u003c/a\u003e 通过正常的可浏览的网站隐藏 C\u0026amp;C 指令的客户端/服务器模型,因为时间间隔不同,检测变得更加困难,并且获取主机数据时不会使用 POST 请求\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e320\u003c/strong\u003e星][1y] [C#] \u003ca href=\"https://github.com/spiderlabs/dohc2\"\u003espiderlabs/dohc2\u003c/a\u003e DoHC2 allows the ExternalC2 library from Ryan Hanson (\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e283\u003c/strong\u003e星][t] [PS] \u003ca href=\"https://github.com/nettitude/poshc2\"\u003enettitude/poshc2\u003c/a\u003e Python Server for PoshC2\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e280\u003c/strong\u003e星][4d] [PS] \u003ca href=\"https://github.com/nettitude/PoshC2\"\u003enettitude/poshc2\u003c/a\u003e Python Server for PoshC2\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e207\u003c/strong\u003e星][1y] [C#] \u003ca href=\"https://github.com/damonmohammadbagher/nativepayload_dns\"\u003edamonmohammadbagher/nativepayload_dns\u003c/a\u003e 使用DNS流量传输Payload,绕过杀软。C#编写\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e201\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/sec-bit/awesome-buggy-erc20-tokens\"\u003esec-bit/awesome-buggy-erc20-tokens\u003c/a\u003e A Collection of Vulnerabilities in ERC20 Smart Contracts With Tokens Affected\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-a0897294e74a0863ea8b83d11994fad6\"\u003e\u003c/a\u003eDDOS\u003c/h3\u003e\u003ca id=\"user-content-ddos\" class=\"anchor\" aria-label=\"Permalink: DDOS\" href=\"#ddos\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e2466\u003c/strong\u003e星][1m] [C++] \u003ca href=\"https://github.com/pavel-odintsov/fastnetmon\"\u003epavel-odintsov/fastnetmon\u003c/a\u003e 快速 DDoS 检测/分析工具,支持 sflow/netflow/mirror\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1268\u003c/strong\u003e星][4d] [Shell] \u003ca href=\"https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker\"\u003emitchellkrogza/nginx-ultimate-bad-bot-blocker\u003c/a\u003e Nginx Block Bad Bots, Spam Referrer Blocker, Vulnerability Scanners, User-Agents, Malware, Adware, Ransomware, Malicious Sites, with anti-DDOS, Wordpress Theme Detector Blocking and Fail2Ban Jail for Repeat Offenders\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e858\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/649/memcrashed-ddos-exploit\"\u003e649/memcrashed-ddos-exploit\u003c/a\u003e DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#18c7c1df2e6ae5e9135dfa2e4eb1d4db\"\u003e侦察-\u0026gt;工具-\u0026gt;Shodan\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e510\u003c/strong\u003e星][3m] [JS] \u003ca href=\"https://github.com/Acmesec/PoCBox\"\u003eacmesec/pocbox\u003c/a\u003e 赏金猎人的脆弱性测试辅助平台\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e476\u003c/strong\u003e星][16d] [JS] \u003ca href=\"https://github.com/codemanki/cloudscraper\"\u003ecodemanki/cloudscraper\u003c/a\u003e Node.js library to bypass cloudflare's anti-ddos page\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e468\u003c/strong\u003e星][7m] [Shell] \u003ca href=\"https://github.com/jgmdev/ddos-deflate\"\u003ejgmdev/ddos-deflate\u003c/a\u003e Fork of DDoS Deflate with fixes, improvements and new features.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e385\u003c/strong\u003e星][1y] [C] \u003ca href=\"https://github.com/markus-go/bonesi\"\u003emarkus-go/bonesi\u003c/a\u003e BoNeSi - the DDoS Botnet Simulator\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e301\u003c/strong\u003e星][4m] [Shell] \u003ca href=\"https://github.com/anti-ddos/Anti-DDOS\"\u003eanti-ddos/anti-ddos\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e265\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/wenfengshi/ddos-dos-tools\"\u003ewenfengshi/ddos-dos-tools\u003c/a\u003e some sort of ddos-tools\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-8e1069b2bce90b87eea762ee3d0935d8\"\u003e\u003c/a\u003eOWASP\u003c/h3\u003e\u003ca id=\"user-content-owasp\" class=\"anchor\" aria-label=\"Permalink: OWASP\" href=\"#owasp\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e11306\u003c/strong\u003e星][2d] [Py] \u003ca href=\"https://github.com/owasp/cheatsheetseries\"\u003eowasp/cheatsheetseries\u003c/a\u003e The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e5084\u003c/strong\u003e星][7d] [HTML] \u003ca href=\"https://github.com/owasp/owasp-mstg\"\u003eowasp/owasp-mstg\u003c/a\u003e 关于移动App安全开发、测试和逆向的相近手册\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2434\u003c/strong\u003e星][13d] [Go] \u003ca href=\"https://github.com/owasp/amass\"\u003eowasp/amass\u003c/a\u003e In-depth Attack Surface Mapping and Asset Discovery\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1964\u003c/strong\u003e星][10d] [Perl] \u003ca href=\"https://github.com/spiderlabs/owasp-modsecurity-crs\"\u003espiderlabs/owasp-modsecurity-crs\u003c/a\u003e OWASP ModSecurity Core Rule Set (CRS) Project (Official Repository)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1417\u003c/strong\u003e星][3m] [HTML] \u003ca href=\"https://github.com/owasp/top10\"\u003eowasp/top10\u003c/a\u003e Official OWASP Top 10 Document Repository\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1056\u003c/strong\u003e星][3m] [HTML] \u003ca href=\"https://github.com/owasp/nodegoat\"\u003eowasp/nodegoat\u003c/a\u003e 学习OWASP安全威胁Top10如何应用到Web App的,以及如何处理\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e752\u003c/strong\u003e星][2d] [Java] \u003ca href=\"https://github.com/owasp/securityshepherd\"\u003eowasp/securityshepherd\u003c/a\u003e Web and mobile application security training platform\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e698\u003c/strong\u003e星][7d] [HTML] \u003ca href=\"https://github.com/owasp/asvs\"\u003eowasp/asvs\u003c/a\u003e Application Security Verification Standard\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e625\u003c/strong\u003e星][9d] [Py] \u003ca href=\"https://github.com/zdresearch/OWASP-Nettacker\"\u003ezdresearch/owasp-nettacker\u003c/a\u003e Automated Penetration Testing Framework\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e559\u003c/strong\u003e星][6d] [Shell] \u003ca href=\"https://github.com/owasp/owasp-masvs\"\u003eowasp/owasp-masvs\u003c/a\u003e OWASP 移动App安全标准\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e503\u003c/strong\u003e星][10d] \u003ca href=\"https://github.com/OWASP/wstg\"\u003eowasp/wstg\u003c/a\u003e The OWASP Web Security Testing Guide includes a \"best practice\" penetration testing framework which users can implement in their own organizations and a \"low level\" penetration testing guide that describes techniques for testing most common web application and web service security issues.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e503\u003c/strong\u003e星][10d] \u003ca href=\"https://github.com/owasp/wstg\"\u003eowasp/wstg\u003c/a\u003e The OWASP Web Security Testing Guide includes a \"best practice\" penetration testing framework which users can implement in their own organizations and a \"low level\" penetration testing guide that describes techniques for testing most common web application and web service security issues.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e466\u003c/strong\u003e星][8m] [Java] \u003ca href=\"https://github.com/owasp/owasp-webscarab\"\u003eowasp/owasp-webscarab\u003c/a\u003e OWASP WebScarab\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e422\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/stanislav-web/opendoor\"\u003estanislav-web/opendoor\u003c/a\u003e OWASP WEB Directory Scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e370\u003c/strong\u003e星][4d] [Java] \u003ca href=\"https://github.com/zaproxy/zap-extensions\"\u003ezaproxy/zap-extensions\u003c/a\u003e OWASP ZAP Add-ons\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e348\u003c/strong\u003e星][2m] [Java] \u003ca href=\"https://github.com/esapi/esapi-java-legacy\"\u003eesapi/esapi-java-legacy\u003c/a\u003e ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library that makes it easier for programmers to write lower-risk applications.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e305\u003c/strong\u003e星][5m] \u003ca href=\"https://github.com/0xradi/owasp-web-checklist\"\u003e0xradi/owasp-web-checklist\u003c/a\u003e OWASP Web Application Security Testing Checklist\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e297\u003c/strong\u003e星][5m] \u003ca href=\"https://github.com/tanprathan/owasp-testing-checklist\"\u003etanprathan/owasp-testing-checklist\u003c/a\u003e OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and pending test cases.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e286\u003c/strong\u003e星][5m] [JS] \u003ca href=\"https://github.com/mike-goodwin/owasp-threat-dragon\"\u003emike-goodwin/owasp-threat-dragon\u003c/a\u003e An open source, online threat modelling tool from OWASP\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e258\u003c/strong\u003e星][2m] \u003ca href=\"https://github.com/owasp/api-security\"\u003eowasp/api-security\u003c/a\u003e OWASP API Security Project\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e255\u003c/strong\u003e星][12m] [Java] \u003ca href=\"https://github.com/owasp/owasp-java-encoder\"\u003eowasp/owasp-java-encoder\u003c/a\u003e The OWASP Java Encoder is a Java 1.5+ simple-to-use drop-in high-performance encoder class with no dependencies and little baggage. This project will help Java web developers defend against Cross Site Scripting!\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e208\u003c/strong\u003e星][17d] [Java] \u003ca href=\"https://github.com/owasp/benchmark\"\u003eowasp/benchmark\u003c/a\u003e OWASP Benchmark is a test suite designed to verify the speed and accuracy of software vulnerability detection tools. A fully runnable web app written in Java, it supports analysis by Static (SAST), Dynamic (DAST), and Runtime (IAST) tools that support Java. The idea is that since it is fully runnable and all the vulnerabilities are actually expl…\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-7667f6a0381b6cded2014a0d279b5722\"\u003e\u003c/a\u003eKali\u003c/h3\u003e\u003ca id=\"user-content-kali\" class=\"anchor\" aria-label=\"Permalink: Kali\" href=\"#kali\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e2538\u003c/strong\u003e星][8m] \u003ca href=\"https://github.com/offensive-security/kali-nethunter\"\u003eoffensive-security/kali-nethunter\u003c/a\u003e The Kali NetHunter Project\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2436\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/lionsec/katoolin\"\u003elionsec/katoolin\u003c/a\u003e Automatically install all Kali linux tools\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1699\u003c/strong\u003e星][3m] [PHP] \u003ca href=\"https://github.com/xtr4nge/fruitywifi\"\u003extr4nge/fruitywifi\u003c/a\u003e FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra packages. Tested in Debian, Kali Linux, Kali Linux ARM (Raspberry Pi), Raspbian (Raspberry Pi), Pwnpi (Raspberry Pi), Bugtraq, NetHunter.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e879\u003c/strong\u003e星][11m] [Shell] \u003ca href=\"https://github.com/esc0rtd3w/wifi-hacker\"\u003eesc0rtd3w/wifi-hacker\u003c/a\u003e Shell Script For Attacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e769\u003c/strong\u003e星][13d] [Py] \u003ca href=\"https://github.com/rajkumrdusad/tool-x\"\u003erajkumrdusad/tool-x\u003c/a\u003e Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other android terminals. using Tool-X you can install almost 370+ hacking tools in termux app and other linux based distributions.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e675\u003c/strong\u003e星][8m] \u003ca href=\"https://github.com/offensive-security/kali-arm-build-scripts\"\u003eoffensive-security/kali-arm-build-scripts\u003c/a\u003e Kali Linux ARM build scripts\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e556\u003c/strong\u003e星][2m] [Shell] \u003ca href=\"https://github.com/offensive-security/kali-linux-docker\"\u003eoffensive-security/kali-linux-docker\u003c/a\u003e PLEASE USE GITLAB\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e425\u003c/strong\u003e星][4m] \u003ca href=\"https://github.com/jack-liang/kalitools\"\u003ejack-liang/kalitools\u003c/a\u003e Kali Linux工具清单\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e336\u003c/strong\u003e星][8m] \u003ca href=\"https://github.com/offensive-security/kali-linux-recipes\"\u003eoffensive-security/kali-linux-recipes\u003c/a\u003e Kali Linux Recipes\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e316\u003c/strong\u003e星][2m] [Shell] \u003ca href=\"https://github.com/brainfucksec/kalitorify\"\u003ebrainfucksec/kalitorify\u003c/a\u003e 用于Kali的shell脚本,使用iptables创建通过Tor网络的透明代理。可以执行各种检查:检查Tor出口节点(即在Tor代理下时的公共IP),或者Tor已正确配置,可以检查服务和网络设置。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e273\u003c/strong\u003e星][27d] [C++] \u003ca href=\"https://github.com/steve-m/kalibrate-rtl\"\u003esteve-m/kalibrate-rtl\u003c/a\u003e fork of\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e203\u003c/strong\u003e星][5m] \u003ca href=\"https://github.com/jiansiting/kali-windows\"\u003ejiansiting/kali-windows\u003c/a\u003e Kali Windows\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-0b8e79b79094082d0906153445d6ef9a\"\u003e\u003c/a\u003eCobaltStrike\u003c/h3\u003e\u003ca id=\"user-content-cobaltstrike\" class=\"anchor\" aria-label=\"Permalink: CobaltStrike\" href=\"#cobaltstrike\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1072\u003c/strong\u003e星][9d] [C#] \u003ca href=\"https://github.com/k8gege/ladon\"\u003ek8gege/ladon\u003c/a\u003e 大型内网渗透扫描器\u0026amp;Cobalt Strike,包含信息收集/端口扫描/服务识别/网络资产/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010、Weblogic、ActiveMQ、Tomcat等,密码口令爆破含(Mysql、Oracle、MSSQL)、FTP、SSH(Linux)、VNC、Windows(IPC、WMI、SMB)等,可高度自定义插件支持.NET程序集、DLL(C#/Delphi/VC)、PowerShell等语言编写的插件,支持通过配置INI批量调用任意外部程序或命令,EXP生成器一键生成Web漏洞POC,可快速扩展扫描或利用能力。支持Cobalt Strike插件化直接内存加载Ladon扫描快速拓展内网横向移动\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e770\u003c/strong\u003e星][5m] \u003ca href=\"https://github.com/aleenzz/cobalt_strike_wiki\"\u003ealeenzz/cobalt_strike_wiki\u003c/a\u003e Cobalt Strike系列\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e474\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/k8gege/k8cscan\"\u003ek8gege/k8cscan\u003c/a\u003e 大型内网渗透自定义插件化扫描神器,包含信息收集、网络资产、漏洞扫描、密码爆破、漏洞利用,程序采用多线程批量扫描大型内网多个IP段C段主机,目前插件包含: C段旁注扫描、子域名扫描、Ftp密码爆破、Mysql密码爆破、Oracle密码爆破、MSSQL密码爆破、Windows/Linux系统密码爆破、存活主机扫描、端口扫描、Web信息探测、操作系统版本探测、Cisco思科设备扫描等,支持调用任意外部程序或脚本,支持Cobalt Strike联动\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e397\u003c/strong\u003e星][1y] [Shell] \u003ca href=\"https://github.com/killswitch-gui/cobaltstrike-toolkit\"\u003ekillswitch-gui/cobaltstrike-toolkit\u003c/a\u003e Some useful scripts for CobaltStrike\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e287\u003c/strong\u003e星][7m] [JS] \u003ca href=\"https://github.com/joshuaferrara/node-csgo\"\u003ejoshuaferrara/node-csgo\u003c/a\u003e A node-steam plugin for Counter-Strike: Global Offensive.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e217\u003c/strong\u003e星][12d] [JS] \u003ca href=\"https://github.com/saul/demofile\"\u003esaul/demofile\u003c/a\u003e Node.js library for parsing Counter-Strike: Global Offensive demo files\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e215\u003c/strong\u003e星][9m] [PS] \u003ca href=\"https://github.com/outflanknl/excel4-dcom\"\u003eoutflanknl/excel4-dcom\u003c/a\u003e PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e207\u003c/strong\u003e星][1y] [C#] \u003ca href=\"https://github.com/spiderlabs/sharpcompile\"\u003espiderlabs/sharpcompile\u003c/a\u003e SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approach than manually compiling an .NET assembly and loading it into Cobalt Strike. The project aims to make it easier to move away from adhoc PowerShell execution instead creating a temporary assembly and executing…\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-fb821e664950df22549557cb8cc54afe\"\u003e\u003c/a\u003eCMS\u003c/h3\u003e\u003ca id=\"user-content-cms\" class=\"anchor\" aria-label=\"Permalink: CMS\" href=\"#cms\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-53f3011d262d2554156afe18d7ad6a43\"\u003e\u003c/a\u003e日志\u003c/h3\u003e\u003ca id=\"user-content-日志\" class=\"anchor\" aria-label=\"Permalink: 日志\" href=\"#日志\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-b0233cd346f5ee456ee04bf653b12ae2\"\u003e\u003c/a\u003e劫持\u0026amp;\u0026amp;各种劫持\u003c/h3\u003e\u003ca id=\"user-content-劫持各种劫持\" class=\"anchor\" aria-label=\"Permalink: 劫持\u0026amp;\u0026amp;各种劫持\" href=\"#劫持各种劫持\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch4 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-b087f1741bcf7c449d2910d052a7f312\"\u003e\u003c/a\u003e未分类-Hijack\u003c/h4\u003e\u003ca id=\"user-content-未分类-hijack\" class=\"anchor\" aria-label=\"Permalink: 未分类-Hijack\" href=\"#未分类-hijack\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1417\u003c/strong\u003e星][1m] [Java] \u003ca href=\"https://github.com/chrisk44/hijacker\"\u003echrisk44/hijacker\u003c/a\u003e Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e554\u003c/strong\u003e星][6m] [Py] \u003ca href=\"https://github.com/owasp/qrljacking\"\u003eowasp/qrljacking\u003c/a\u003e 一个简单的能够进行会话劫持的社会工程攻击向量,影响所有使用“使用 QR 码登录”作为安全登录方式的应用程序。( Quick Response CodeLogin Jacking)\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch4 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-ecdeb90ce9bd347ca7f9d366d157689d\"\u003e\u003c/a\u003e点击劫持\u003c/h4\u003e\u003ca id=\"user-content-点击劫持\" class=\"anchor\" aria-label=\"Permalink: 点击劫持\" href=\"#点击劫持\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-8afafc25f4fb0805556003864cce90e2\"\u003e\u003c/a\u003eRedTeam\u003c/h3\u003e\u003ca id=\"user-content-redteam\" class=\"anchor\" aria-label=\"Permalink: RedTeam\" href=\"#redteam\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e617\u003c/strong\u003e星][19d] [Py] \u003ca href=\"https://github.com/facebookincubator/weasel\"\u003efacebookincubator/weasel\u003c/a\u003e DNS covert channel implant for Red Teams.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e542\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/wyatu/perun\"\u003ewyatu/perun\u003c/a\u003e 主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e476\u003c/strong\u003e星][13d] [PS] \u003ca href=\"https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques\"\u003emantvydasb/redteam-tactics-and-techniques\u003c/a\u003e Red Teaming Tactics and Techniques\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e357\u003c/strong\u003e星][2m] [C] \u003ca href=\"https://github.com/nccgroup/phantap\"\u003enccgroup/phantap\u003c/a\u003e Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e221\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/khast3x/redcloud\"\u003ekhast3x/redcloud\u003c/a\u003e Comfy \u0026amp; powerful Red Team Infrastructure deployement using Docker\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e220\u003c/strong\u003e星][9m] [Py] \u003ca href=\"https://github.com/coalfire-research/deathmetal\"\u003ecoalfire-research/deathmetal\u003c/a\u003e Red team \u0026amp; penetration testing tools to exploit the capabilities of Intel AMT\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e217\u003c/strong\u003e星][1y] \u003ca href=\"https://github.com/foobarto/redteam-notebook\"\u003efoobarto/redteam-notebook\u003c/a\u003e Collection of commands, tips and tricks and references I found useful during preparation for OSCP exam.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-4c42a9cc007de389f975cb0ce146c0ed\"\u003e\u003c/a\u003eBlueTeam\u003c/h3\u003e\u003ca id=\"user-content-blueteam\" class=\"anchor\" aria-label=\"Permalink: BlueTeam\" href=\"#blueteam\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e883\u003c/strong\u003e星][4m] [CSS] \u003ca href=\"https://github.com/outflanknl/redelk\"\u003eoutflanknl/redelk\u003c/a\u003e 跟踪和警告Blue Team活动以及长期运营中的更高可用性\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e639\u003c/strong\u003e星][5m] \u003ca href=\"https://github.com/smgorelik/windows-rce-exploits\"\u003esmgorelik/windows-rce-exploits\u003c/a\u003e The exploit samples database is a repository for \u003cstrong\u003eRCE\u003c/strong\u003e (remote code execution) exploits and Proof-of-Concepts for \u003cstrong\u003eWINDOWS\u003c/strong\u003e, the samples are uploaded for education purposes for red and blue teams.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e409\u003c/strong\u003e星][1y] [C] \u003ca href=\"https://github.com/ww9210/linux_kernel_exploits\"\u003eww9210/linux_kernel_exploits\u003c/a\u003e Repo for FUZE project. I will also publish some Linux kernel LPE exploits for various real world kernel vulnerabilities here. the samples are uploaded for education purposes for red and blue teams.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e261\u003c/strong\u003e星][11d] [Ruby] \u003ca href=\"https://github.com/evait-security/envizon\"\u003eevait-security/envizon\u003c/a\u003e 网络可视化工具, 在渗透测试中快速识别最可能的目标\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-f21aa1088a437dbb001a137f6f885530\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-2\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-2\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-7229723a22769af40b96ab31fb09dcc7\"\u003e\u003c/a\u003e新添加的\u003c/h3\u003e\u003ca id=\"user-content-新添加的-3\" class=\"anchor\" aria-label=\"Permalink: 新添加的\" href=\"#新添加的-3\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-6280e13d236b0f18c75894d304309416\"\u003e\u003c/a\u003eMetasploit\u003c/h3\u003e\u003ca id=\"user-content-metasploit-1\" class=\"anchor\" aria-label=\"Permalink: Metasploit\" href=\"#metasploit-1\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-082a9e72817adcf2f824767e3e2ce597\"\u003e\u003c/a\u003eBurpSuite\u003c/h3\u003e\u003ca id=\"user-content-burpsuite\" class=\"anchor\" aria-label=\"Permalink: BurpSuite\" href=\"#burpsuite\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-6710d6fe61cbbc36b2ba75de156eda8a\"\u003e\u003c/a\u003eCobaltStrike\u003c/h3\u003e\u003ca id=\"user-content-cobaltstrike-1\" class=\"anchor\" aria-label=\"Permalink: CobaltStrike\" href=\"#cobaltstrike-1\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-8f92ead9997a4b68d06a9acf9b01ef63\"\u003e\u003c/a\u003e扫描器\u0026amp;\u0026amp;安全扫描\u0026amp;\u0026amp;App扫描\u0026amp;\u0026amp;漏洞扫描\u003c/h1\u003e\u003ca id=\"user-content-扫描器安全扫描app扫描漏洞扫描\" class=\"anchor\" aria-label=\"Permalink: 扫描器\u0026amp;\u0026amp;安全扫描\u0026amp;\u0026amp;App扫描\u0026amp;\u0026amp;漏洞扫描\" href=\"#扫描器安全扫描app扫描漏洞扫描\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-132036452bfacf61471e3ea0b7bf7a55\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-3\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-3\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-de63a029bda6a7e429af272f291bb769\"\u003e\u003c/a\u003e未分类-Scanner\u003c/h3\u003e\u003ca id=\"user-content-未分类-scanner\" class=\"anchor\" aria-label=\"Permalink: 未分类-Scanner\" href=\"#未分类-scanner\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e11486\u003c/strong\u003e星][3m] [C] \u003ca href=\"https://github.com/robertdavidgraham/masscan\"\u003erobertdavidgraham/masscan\u003c/a\u003e masscan:世界上最快的互联网端口扫描器,号称可6分钟内扫描整个互联网\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e7449\u003c/strong\u003e星][3d] [Py] \u003ca href=\"https://github.com/s0md3v/XSStrike\"\u003es0md3v/xsstrike\u003c/a\u003e Most advanced XSS scanner.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e5351\u003c/strong\u003e星][15d] [Go] \u003ca href=\"https://github.com/zricethezav/gitleaks\"\u003ezricethezav/gitleaks\u003c/a\u003e Audit git repos for secrets\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e4563\u003c/strong\u003e星][8d] [Ruby] \u003ca href=\"https://github.com/wpscanteam/wpscan\"\u003ewpscanteam/wpscan\u003c/a\u003e WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e4215\u003c/strong\u003e星][24d] \u003ca href=\"https://github.com/we5ter/scanners-box\"\u003ewe5ter/scanners-box\u003c/a\u003e 安全行业从业者自研开源扫描器合辑\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3455\u003c/strong\u003e星][26d] [Perl] \u003ca href=\"https://github.com/sullo/nikto\"\u003esullo/nikto\u003c/a\u003e Nikto web server scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3279\u003c/strong\u003e星][20d] [Go] \u003ca href=\"https://github.com/mozilla/sops\"\u003emozilla/sops\u003c/a\u003e Simple and flexible tool for managing secrets\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3252\u003c/strong\u003e星][26d] [Py] \u003ca href=\"https://github.com/maurosoria/dirsearch\"\u003emaurosoria/dirsearch\u003c/a\u003e Web path scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3092\u003c/strong\u003e星][3m] [C] \u003ca href=\"https://github.com/zmap/zmap\"\u003ezmap/zmap\u003c/a\u003e ZMap is a fast single packet network scanner designed for Internet-wide network surveys.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2960\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/andresriancho/w3af\"\u003eandresriancho/w3af\u003c/a\u003e Web App安全扫描器, 辅助开发者和渗透测试人员识别和利用Web App中的漏洞\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2669\u003c/strong\u003e星][20d] [Py] \u003ca href=\"https://github.com/cloudflare/flan\"\u003ecloudflare/flan\u003c/a\u003e A pretty sweet vulnerability scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2287\u003c/strong\u003e星][4m] [JS] \u003ca href=\"https://github.com/retirejs/retire.js\"\u003eretirejs/retire.js\u003c/a\u003e scanner detecting the use of JavaScript libraries with known vulnerabilities\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2113\u003c/strong\u003e星][12d] [Ruby] \u003ca href=\"https://github.com/urbanadventurer/whatweb\"\u003eurbanadventurer/whatweb\u003c/a\u003e Next generation web scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2050\u003c/strong\u003e星][23d] [Py] \u003ca href=\"https://github.com/nabla-c0d3/sslyze\"\u003enabla-c0d3/sslyze\u003c/a\u003e SSL/TLS服务器扫描\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1682\u003c/strong\u003e星][2m] [NSIS] \u003ca href=\"https://github.com/angryip/ipscan\"\u003eangryip/ipscan\u003c/a\u003e Angry IP Scanner - fast and friendly network scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1560\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/m4ll0k/WAScan\"\u003em4ll0k/wascan\u003c/a\u003e WAScan - Web Application Scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1511\u003c/strong\u003e星][9d] [Py] \u003ca href=\"https://github.com/hannob/snallygaster\"\u003ehannob/snallygaster\u003c/a\u003e Python脚本, 扫描HTTP服务器\"秘密文件\"\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1139\u003c/strong\u003e星][24d] [Py] \u003ca href=\"https://github.com/gerbenjavado/linkfinder\"\u003egerbenjavado/linkfinder\u003c/a\u003e A python script that finds endpoints in JavaScript files\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1102\u003c/strong\u003e星][3m] [PHP] \u003ca href=\"https://github.com/tuhinshubhra/red_hawk\"\u003etuhinshubhra/red_hawk\u003c/a\u003e 信息收集、漏洞扫描、爬虫多合一\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#05ab1b75266fddafc7195f5b395e4d99\"\u003e侦察-\u0026gt;工具-\u0026gt;未分类-OSINT\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1076\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/lucifer1993/struts-scan\"\u003elucifer1993/struts-scan\u003c/a\u003e struts2漏洞全版本检测和利用工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1062\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/h4ckforjob/dirmap\"\u003eh4ckforjob/dirmap\u003c/a\u003e 一个高级web目录、文件扫描工具,功能将会强于DirBuster、Dirsearch、cansina、御剑。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e935\u003c/strong\u003e星][6m] [PHP] \u003ca href=\"https://github.com/tidesec/wdscanner\"\u003etidesec/wdscanner\u003c/a\u003e 分布式web漏洞扫描、客户管理、漏洞定期扫描、子域名枚举、端口扫描、网站爬虫、暗链检测、坏链检测、网站指纹搜集、专项漏洞检测、代理搜集及部署等功能。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e933\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/tuhinshubhra/cmseek\"\u003etuhinshubhra/cmseek\u003c/a\u003e CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e896\u003c/strong\u003e星][20d] [Py] \u003ca href=\"https://github.com/ajinabraham/nodejsscan\"\u003eajinabraham/nodejsscan\u003c/a\u003e NodeJsScan is a static security code scanner for Node.js applications.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e855\u003c/strong\u003e星][12d] [JS] \u003ca href=\"https://github.com/cloudsploit/scans\"\u003ecloudsploit/scans\u003c/a\u003e Cloud security configuration checks\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e767\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/vesche/scanless\"\u003evesche/scanless\u003c/a\u003e 端口扫描器\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e758\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/nekmo/dirhunt\"\u003enekmo/dirhunt\u003c/a\u003e Web爬虫, 针对搜索和分析路径做了优化\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#442f9390fd56008def077a21ab65d4aa\"\u003e爬虫-\u0026gt;工具-\u0026gt;未分类\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e734\u003c/strong\u003e星][7m] [Py] \u003ca href=\"https://github.com/ztgrace/changeme\"\u003eztgrace/changeme\u003c/a\u003e 默认证书扫描器\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e725\u003c/strong\u003e星][14d] [CSS] \u003ca href=\"https://github.com/w-digital-scanner/w12scan\"\u003ew-digital-scanner/w12scan\u003c/a\u003e a network asset discovery engine that can automatically aggregate related assets for analysis and use\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e704\u003c/strong\u003e星][23d] [Py] \u003ca href=\"https://github.com/grayddq/gscan\"\u003egrayddq/gscan\u003c/a\u003e 本程序旨在为安全应急响应人员对Linux主机排查时提供便利,实现主机侧Checklist的自动全面化检测,根据检测结果自动数据聚合,进行黑客攻击路径溯源。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e703\u003c/strong\u003e星][5m] [CSS] \u003ca href=\"https://github.com/ajinabraham/cmsscan\"\u003eajinabraham/cmsscan\u003c/a\u003e Scan Wordpress, Drupal, Joomla, vBulletin websites for Security issues\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e702\u003c/strong\u003e星][1m] [C] \u003ca href=\"https://github.com/scanmem/scanmem\"\u003escanmem/scanmem\u003c/a\u003e memory scanner for Linux\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e686\u003c/strong\u003e星][14d] [Py] \u003ca href=\"https://github.com/kevthehermit/pastehunter\"\u003ekevthehermit/pastehunter\u003c/a\u003e Scanning pastebin with yara rules\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e671\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/m4ll0k/wpseku\"\u003em4ll0k/wpseku\u003c/a\u003e WPSeku - Wordpress Security Scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e671\u003c/strong\u003e星][2m] [Ruby] \u003ca href=\"https://github.com/mozilla/ssh_scan\"\u003emozilla/ssh_scan\u003c/a\u003e A prototype SSH configuration and policy scanner (Blog:\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e669\u003c/strong\u003e星][6m] [Py] \u003ca href=\"https://github.com/droope/droopescan\"\u003edroope/droopescan\u003c/a\u003e A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal \u0026amp; Silverstripe.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e665\u003c/strong\u003e星][6m] [Py] \u003ca href=\"https://github.com/rabbitmask/weblogicscan\"\u003erabbitmask/weblogicscan\u003c/a\u003e Weblogic一键漏洞检测工具,V1.3\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e641\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/lmco/laikaboss\"\u003elmco/laikaboss\u003c/a\u003e Laika BOSS: Object Scanning System\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e618\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/faizann24/xsspy\"\u003efaizann24/xsspy\u003c/a\u003e Web Application XSS Scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e610\u003c/strong\u003e星][1y] [Ruby] \u003ca href=\"https://github.com/thesp0nge/dawnscanner\"\u003ethesp0nge/dawnscanner\u003c/a\u003e Dawn is a static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails frameworks.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e578\u003c/strong\u003e星][8d] [Py] \u003ca href=\"https://github.com/codingo/vhostscan\"\u003ecodingo/vhostscan\u003c/a\u003e A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e576\u003c/strong\u003e星][3m] [Perl] \u003ca href=\"https://github.com/alisamtechnology/atscan\"\u003ealisamtechnology/atscan\u003c/a\u003e Advanced dork Search \u0026amp; Mass Exploit Scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e574\u003c/strong\u003e星][2m] [HTML] \u003ca href=\"https://github.com/gwillem/magento-malware-scanner\"\u003egwillem/magento-malware-scanner\u003c/a\u003e 用于检测 Magento 恶意软件的规则/样本集合\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e563\u003c/strong\u003e星][8m] [Go] \u003ca href=\"https://github.com/marco-lancini/goscan\"\u003emarco-lancini/goscan\u003c/a\u003e Interactive Network Scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e539\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/cisagov/pshtt\"\u003ecisagov/pshtt\u003c/a\u003e Scan domains and return data based on HTTPS best practices\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e485\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/fcavallarin/htcap\"\u003efcavallarin/htcap\u003c/a\u003e htcap is a web application scanner able to crawl single page application (SPA) recursively by intercepting ajax calls and DOM changes.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e476\u003c/strong\u003e星][1y] [C] \u003ca href=\"https://github.com/nanshihui/scan-t\"\u003enanshihui/scan-t\u003c/a\u003e a new crawler based on python with more function including Network fingerprint search\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e442\u003c/strong\u003e星][11d] [Py] \u003ca href=\"https://github.com/w-digital-scanner/w13scan\"\u003ew-digital-scanner/w13scan\u003c/a\u003e Passive Security Scanner (被动式安全扫描器)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e401\u003c/strong\u003e星][11m] [JS] \u003ca href=\"https://github.com/eviltik/evilscan\"\u003eeviltik/evilscan\u003c/a\u003e 大规模 IP/端口扫描器,Node.js 编写\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e400\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/grayddq/publicmonitors\"\u003egrayddq/publicmonitors\u003c/a\u003e 对公网IP列表进行端口服务扫描,发现周期内的端口服务变化情况和弱口令安全风险\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e398\u003c/strong\u003e星][t] [C] \u003ca href=\"https://github.com/hasherezade/hollows_hunter\"\u003ehasherezade/hollows_hunter\u003c/a\u003e Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e393\u003c/strong\u003e星][11m] [Py] \u003ca href=\"https://github.com/mitre/multiscanner\"\u003emitre/multiscanner\u003c/a\u003e Modular file scanning/analysis framework\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e384\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/stamparm/dsss\"\u003estamparm/dsss\u003c/a\u003e Damn Small SQLi Scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e376\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/skavngr/rapidscan\"\u003eskavngr/rapidscan\u003c/a\u003e | The Multi-Tool Web Vulnerability Scanner.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e368\u003c/strong\u003e星][4d] [Swift] \u003ca href=\"https://github.com/evermeer/passportscanner\"\u003eevermeer/passportscanner\u003c/a\u003e Scan the MRZ code of a passport and extract the firstname, lastname, passport number, nationality, date of birth, expiration date and personal numer.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e356\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/swisskyrepo/wordpresscan\"\u003eswisskyrepo/wordpresscan\u003c/a\u003e WPScan rewritten in Python + some WPSeku ideas\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e346\u003c/strong\u003e星][4m] [Java] \u003ca href=\"https://github.com/portswigger/backslash-powered-scanner\"\u003eportswigger/backslash-powered-scanner\u003c/a\u003e Finds unknown classes of injection vulnerabilities\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e343\u003c/strong\u003e星][28d] [Py] \u003ca href=\"https://github.com/fgeek/pyfiscan\"\u003efgeek/pyfiscan\u003c/a\u003e Web App 漏洞及版本扫描\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e333\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/flipkart-incubator/rta\"\u003eflipkart-incubator/rta\u003c/a\u003e Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e330\u003c/strong\u003e星][2d] [C] \u003ca href=\"https://github.com/royhills/arp-scan\"\u003eroyhills/arp-scan\u003c/a\u003e The ARP Scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e320\u003c/strong\u003e星][12d] [HTML] \u003ca href=\"https://github.com/coinbase/salus\"\u003ecoinbase/salus\u003c/a\u003e Security scanner coordinator\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e314\u003c/strong\u003e星][1m] [PS] \u003ca href=\"https://github.com/canix1/adaclscanner\"\u003ecanix1/adaclscanner\u003c/a\u003e Repo for ADACLScan.ps1 - Your number one script for ACL's in Active Directory\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e305\u003c/strong\u003e星][3m] [Ruby] \u003ca href=\"https://github.com/m0nad/hellraiser\"\u003em0nad/hellraiser\u003c/a\u003e Vulnerability Scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e303\u003c/strong\u003e星][10m] [PHP] \u003ca href=\"https://github.com/steverobbins/magescan\"\u003esteverobbins/magescan\u003c/a\u003e Scan a Magento site for information\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e301\u003c/strong\u003e星][6d] [Shell] \u003ca href=\"https://github.com/mitchellkrogza/apache-ultimate-bad-bot-blocker\"\u003emitchellkrogza/apache-ultimate-bad-bot-blocker\u003c/a\u003e Apache Block Bad Bots, (Referer) Spam Referrer Blocker, Vulnerability Scanners, Malware, Adware, Ransomware, Malicious Sites, Wordpress Theme Detectors and Fail2Ban Jail for Repeat Offenders\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e296\u003c/strong\u003e星][9m] [Py] \u003ca href=\"https://github.com/boy-hack/w8fuckcdn\"\u003eboy-hack/w8fuckcdn\u003c/a\u003e 通过扫描全网绕过CDN获取网站IP地址\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e296\u003c/strong\u003e星][1y] [Shell] \u003ca href=\"https://github.com/cryptolok/ghostinthenet\"\u003ecryptolok/ghostinthenet\u003c/a\u003e Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e293\u003c/strong\u003e星][5m] \u003ca href=\"https://github.com/enkomio/Taipan\"\u003eenkomio/taipan\u003c/a\u003e Web application vulnerability scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e288\u003c/strong\u003e星][1m] [Go] \u003ca href=\"https://github.com/zmap/zgrab2\"\u003ezmap/zgrab2\u003c/a\u003e Go Application Layer Scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e287\u003c/strong\u003e星][4d] [Py] \u003ca href=\"https://github.com/target/strelka\"\u003etarget/strelka\u003c/a\u003e Real-time, container-based file scanning at enterprise scale\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e287\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/xdavidhu/portspider\"\u003exdavidhu/portspider\u003c/a\u003e A lightning fast multithreaded network scanner framework with modules.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e285\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/code-scan/dzscan\"\u003ecode-scan/dzscan\u003c/a\u003e Dzscan\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e282\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/shenril/sitadel\"\u003eshenril/sitadel\u003c/a\u003e Web Application Security Scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e271\u003c/strong\u003e星][14d] [Py] \u003ca href=\"https://github.com/abhisharma404/vault\"\u003eabhisharma404/vault\u003c/a\u003e swiss army knife for hackers\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e263\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/m4ll0k/Konan\"\u003em4ll0k/konan\u003c/a\u003e Konan - Advanced Web Application Dir Scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e252\u003c/strong\u003e星][24d] [Swift] \u003ca href=\"https://github.com/netyouli/whc_scan\"\u003enetyouli/whc_scan\u003c/a\u003e 高效强大扫描分析iOS和Android项目里没有使用的类Mac开源工具,清理项目垃圾类,让项目结构干净清爽,升级维护得心应手. Efficient and powerful scanning analysis iOS and Android project no classes used in Mac open source tools, cleaning rubbish class project, make project structure clean and relaxed, upgrade maintenance\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e251\u003c/strong\u003e星][10m] \u003ca href=\"https://github.com/jeffzh3ng/insectsawake\"\u003ejeffzh3ng/insectsawake\u003c/a\u003e Network Vulnerability Scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e246\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/gildasio/h2t\"\u003egildasio/h2t\u003c/a\u003e h2t (HTTP Hardening Tool) scans a website and suggests security headers to apply\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e239\u003c/strong\u003e星][2m] [PHP] \u003ca href=\"https://github.com/psecio/versionscan\"\u003epsecio/versionscan\u003c/a\u003e A PHP version scanner for reporting possible vulnerabilities\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e237\u003c/strong\u003e星][8m] [Go] \u003ca href=\"https://github.com/gocaio/goca\"\u003egocaio/goca\u003c/a\u003e Goca Scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e225\u003c/strong\u003e星][6m] [Py] \u003ca href=\"https://github.com/rub-nds/corstest\"\u003erub-nds/corstest\u003c/a\u003e A simple CORS misconfiguration scanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e224\u003c/strong\u003e星][6m] [JS] \u003ca href=\"https://github.com/pavanw3b/sh00t\"\u003epavanw3b/sh00t\u003c/a\u003e Security Testing is not as simple as right click \u0026gt; Scan. It's messy, a tough game. What if you had missed to test just that one thing and had to regret later? Sh00t is a highly customizable, intelligent platform that understands the life of bug hunters and emphasizes on manual security testing.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e220\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/dionach/cmsmap\"\u003edionach/cmsmap\u003c/a\u003e CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e216\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/iojw/socialscan\"\u003eiojw/socialscan\u003c/a\u003e Check email address and username availability on online platforms with 100% accuracy\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e213\u003c/strong\u003e星][10m] [Py] \u003ca href=\"https://github.com/nullarray/dorknet\"\u003enullarray/dorknet\u003c/a\u003e Selenium powered Python script to automate searching for vulnerable web apps.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e208\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/lengjibo/dedecmscan\"\u003elengjibo/dedecmscan\u003c/a\u003e 织梦全版本漏洞扫描\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e202\u003c/strong\u003e星][1y] [PS] \u003ca href=\"https://github.com/sud0woodo/dcomrade\"\u003esud0woodo/dcomrade\u003c/a\u003e Powershell script for enumerating vulnerable DCOM Applications\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-58d8b993ffc34f7ded7f4a0077129eb2\"\u003e\u003c/a\u003e隐私\u0026amp;\u0026amp;Secret\u0026amp;\u0026amp;Privacy扫描\u003c/h3\u003e\u003ca id=\"user-content-隐私secretprivacy扫描\" class=\"anchor\" aria-label=\"Permalink: 隐私\u0026amp;\u0026amp;Secret\u0026amp;\u0026amp;Privacy扫描\" href=\"#隐私secretprivacy扫描\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e6861\u003c/strong\u003e星][30d] [Shell] \u003ca href=\"https://github.com/awslabs/git-secrets\"\u003eawslabs/git-secrets\u003c/a\u003e Prevents you from committing secrets and credentials into git repositories\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e4468\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/jofpin/trape\"\u003ejofpin/trape\u003c/a\u003e 学习在互联网上跟踪别人,获取其详细信息,并避免被别人跟踪\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3091\u003c/strong\u003e星][5d] [Py] \u003ca href=\"https://github.com/tribler/tribler\"\u003etribler/tribler\u003c/a\u003e Privacy enhanced BitTorrent client with P2P content discovery\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2204\u003c/strong\u003e星][1m] \u003ca href=\"https://github.com/sobolevn/awesome-cryptography\"\u003esobolevn/awesome-cryptography\u003c/a\u003e A curated list of cryptography resources and links.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1141\u003c/strong\u003e星][5m] [Vue] \u003ca href=\"https://github.com/0xbug/hawkeye\"\u003e0xbug/hawkeye\u003c/a\u003e GitHub 泄露监控系统(GitHub Sensitive Information Leakage Monitor Spider)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e955\u003c/strong\u003e星][19d] [Py] \u003ca href=\"https://github.com/mozilla/OpenWPM\"\u003emozilla/openwpm\u003c/a\u003e A web privacy measurement framework\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e932\u003c/strong\u003e星][5d] [C#] \u003ca href=\"https://github.com/elevenpaths/foca\"\u003eelevenpaths/foca\u003c/a\u003e Tool to find metadata and hidden information in the documents.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e892\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/al0ne/vxscan\"\u003eal0ne/vxscan\u003c/a\u003e python3写的综合扫描工具,主要用来存活验证,敏感文件探测(目录扫描/js泄露接口/html注释泄露),WAF/CDN识别,端口扫描,指纹/服务识别,操作系统识别,POC扫描,SQL注入,绕过CDN,查询旁站等功能,主要用来甲方自测或乙方授权测试,请勿用来搞破坏。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e395\u003c/strong\u003e星][7m] [Py] \u003ca href=\"https://github.com/repoog/gitprey\"\u003erepoog/gitprey\u003c/a\u003e Searching sensitive files and contents in GitHub associated to company name or other key words\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e355\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/hell0w0rld0/github-hunter\"\u003ehell0w0rld0/github-hunter\u003c/a\u003e This tool is for sensitive information searching on Github - The Fast Version here:\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e324\u003c/strong\u003e星][4d] [HTML] \u003ca href=\"https://github.com/tanjiti/sec_profile\"\u003etanjiti/sec_profile\u003c/a\u003e 爬取secwiki和xuanwu.github.io/sec.today,分析安全信息站点、安全趋势、提取安全工作者账号(twitter,weixin,github等)\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#8d1ae776898748b8249132e822f6c919\"\u003e侦察-\u0026gt;工具-\u0026gt;社交网络-\u0026gt;Github\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-1927ed0a77ff4f176b0b7f7abc551e4a\"\u003e\u003c/a\u003e隐私存储\u003c/h3\u003e\u003ca id=\"user-content-隐私存储\" class=\"anchor\" aria-label=\"Permalink: 隐私存储\" href=\"#隐私存储\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch4 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-1af1c4f9dba1db2a4137be9c441778b8\"\u003e\u003c/a\u003e未分类\u003c/h4\u003e\u003ca id=\"user-content-未分类-3\" class=\"anchor\" aria-label=\"Permalink: 未分类\" href=\"#未分类-3\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e5082\u003c/strong\u003e星][3m] [Shell] \u003ca href=\"https://github.com/stackexchange/blackbox\"\u003estackexchange/blackbox\u003c/a\u003e 文件使用PGP加密后隐藏在Git/Mercurial/Subversion\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch4 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-362dfd9c1f530dd20f922fd4e0faf0e3\"\u003e\u003c/a\u003e隐写\u003c/h4\u003e\u003ca id=\"user-content-隐写\" class=\"anchor\" aria-label=\"Permalink: 隐写\" href=\"#隐写\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e583\u003c/strong\u003e星][2m] [Go] \u003ca href=\"https://github.com/dimitarpetrov/stegify\"\u003edimitarpetrov/stegify\u003c/a\u003e Go tool for LSB steganography, capable of hiding any file within an image.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e358\u003c/strong\u003e星][7m] [Go] \u003ca href=\"https://github.com/lukechampine/jsteg\"\u003elukechampine/jsteg\u003c/a\u003e JPEG steganography\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e354\u003c/strong\u003e星][6m] [Java] \u003ca href=\"https://github.com/syvaidya/openstego\"\u003esyvaidya/openstego\u003c/a\u003e OpenStego is a steganography application that provides two functionalities: a) Data Hiding: It can hide any data within a cover file (e.g. images). b) Watermarking: Watermarking files (e.g. images) with an invisible signature. It can be used to detect unauthorized file copying.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e280\u003c/strong\u003e星][1y] [C] \u003ca href=\"https://github.com/abeluck/stegdetect\"\u003eabeluck/stegdetect\u003c/a\u003e UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e258\u003c/strong\u003e星][] [Py] \u003ca href=\"https://github.com/cedricbonhomme/stegano\"\u003ecedricbonhomme/stegano\u003c/a\u003e Stegano is a pure Python steganography module.\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-1d8298e4ee4ad3c3028a1e157f85f27b\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-3\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-3\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-7669ebab00d00c744abc35195fbaa833\"\u003e\u003c/a\u003e新添加的\u003c/h3\u003e\u003ca id=\"user-content-新添加的-4\" class=\"anchor\" aria-label=\"Permalink: 新添加的\" href=\"#新添加的-4\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-a76463feb91d09b3d024fae798b92be6\"\u003e\u003c/a\u003e侦察\u0026amp;\u0026amp;信息收集\u0026amp;\u0026amp;子域名发现与枚举\u0026amp;\u0026amp;OSINT\u003c/h1\u003e\u003ca id=\"user-content-侦察信息收集子域名发现与枚举osint\" class=\"anchor\" aria-label=\"Permalink: 侦察\u0026amp;\u0026amp;信息收集\u0026amp;\u0026amp;子域名发现与枚举\u0026amp;\u0026amp;OSINT\" href=\"#侦察信息收集子域名发现与枚举osint\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-170048b7d8668c50681c0ab1e92c679a\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-4\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-4\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-05ab1b75266fddafc7195f5b395e4d99\"\u003e\u003c/a\u003e未分类-OSINT\u003c/h3\u003e\u003ca id=\"user-content-未分类-osint\" class=\"anchor\" aria-label=\"Permalink: 未分类-OSINT\" href=\"#未分类-osint\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e7307\u003c/strong\u003e星][12d] [Java] \u003ca href=\"https://github.com/lionsoul2014/ip2region\"\u003elionsoul2014/ip2region\u003c/a\u003e Ip2region is a offline IP location library with accuracy rate of 99.9% and 0.0x millseconds searching performance. DB file is less then 5Mb with all ip address stored. binding for Java,PHP,C,Python,Nodejs,Golang,C#,lua. Binary,B-tree,Memory searching algorithm\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e6964\u003c/strong\u003e星][22d] \u003ca href=\"https://github.com/greatfire/wiki\"\u003egreatfire/wiki\u003c/a\u003e 自由浏览\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e6140\u003c/strong\u003e星][10m] [Py] \u003ca href=\"https://github.com/schollz/howmanypeoplearearound\"\u003eschollz/howmanypeoplearearound\u003c/a\u003e 检测 Wifi 信号统计你周围的人数\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#d4efda1853b2cb0909727188116a2a8c\"\u003e无线-\u0026gt;未分类-WiFi\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2224\u003c/strong\u003e星][1m] [C] \u003ca href=\"https://github.com/texane/stlink\"\u003etexane/stlink\u003c/a\u003e stm32 discovery line linux programmer\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2134\u003c/strong\u003e星][t] [Py] \u003ca href=\"https://github.com/FortyNorthSecurity/EyeWitness\"\u003efortynorthsecurity/eyewitness\u003c/a\u003e 给网站做快照,提供服务器Header信息,识别默认凭证等\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1792\u003c/strong\u003e星][t] [Shell] \u003ca href=\"https://github.com/leebaird/discover\"\u003eleebaird/discover\u003c/a\u003e 自定义的bash脚本, 用于自动化多个渗透测试任务, 包括: 侦查、扫描、解析、在Metasploit中创建恶意Payload和Listener\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#fc8737aef0f59c3952d11749fe582dac\"\u003e渗透-\u0026gt;工具-\u0026gt;自动化\u003c/a\u003e |\u003ca href=\"#01be61d5bb9f6f7199208ff0fba86b5d\"\u003e渗透-\u0026gt;工具-\u0026gt;Metasploit-\u0026gt;未分类-metasploit\u003c/a\u003e |\u003ca href=\"#ad92f6b801a18934f1971e2512f5ae4f\"\u003ePayload-\u0026gt;工具-\u0026gt;Payload生成\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1666\u003c/strong\u003e星][] [Py] \u003ca href=\"https://github.com/cea-sec/ivre\"\u003ecea-sec/ivre\u003c/a\u003e Network recon framework.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1642\u003c/strong\u003e星][25d] [Go] \u003ca href=\"https://github.com/awnumar/memguard\"\u003eawnumar/memguard\u003c/a\u003e 处理内存中敏感的值,纯Go语言编写。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1609\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/mozilla/cipherscan\"\u003emozilla/cipherscan\u003c/a\u003e 查找指定目标支持的SSL ciphersuites\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1484\u003c/strong\u003e星][13d] [Py] \u003ca href=\"https://github.com/enablesecurity/wafw00f\"\u003eenablesecurity/wafw00f\u003c/a\u003e 识别保护网站的WAF产品\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1401\u003c/strong\u003e星][13d] [JS] \u003ca href=\"https://github.com/lockfale/osint-framework\"\u003elockfale/osint-framework\u003c/a\u003e OSINT Framework\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1363\u003c/strong\u003e星][2m] [CSS] \u003ca href=\"https://github.com/undeadsec/socialfish\"\u003eundeadsec/socialfish\u003c/a\u003e 网络钓鱼培训与信息收集\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#ce734598055ad3885d45d0b35d2bf0d7\"\u003e社工(SET)-\u0026gt;工具-\u0026gt;未分类-SET\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1354\u003c/strong\u003e星][8d] [Py] \u003ca href=\"https://github.com/s0md3v/Arjun\"\u003es0md3v/arjun\u003c/a\u003e HTTP parameter discovery suite.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1289\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/codingo/reconnoitre\"\u003ecodingo/reconnoitre\u003c/a\u003e A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1279\u003c/strong\u003e星][1y] [PS] \u003ca href=\"https://github.com/dafthack/mailsniper\"\u003edafthack/mailsniper\u003c/a\u003e 在Microsoft Exchange环境中搜索邮件中包含的指定内容:密码、insider intel、网络架构信息等\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1224\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/codingo/NoSQLMap\"\u003ecodingo/nosqlmap\u003c/a\u003e Automated NoSQL database enumeration and web application exploitation tool.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1199\u003c/strong\u003e星][11m] [C] \u003ca href=\"https://github.com/blechschmidt/massdns\"\u003eblechschmidt/massdns\u003c/a\u003e A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1108\u003c/strong\u003e星][t] [Py] \u003ca href=\"https://github.com/sundowndev/phoneinfoga\"\u003esundowndev/phoneinfoga\u003c/a\u003e Advanced information gathering \u0026amp; OSINT tool for phone numbers\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1102\u003c/strong\u003e星][3m] [PHP] \u003ca href=\"https://github.com/tuhinshubhra/red_hawk\"\u003etuhinshubhra/red_hawk\u003c/a\u003e 信息收集、漏洞扫描、爬虫多合一\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#de63a029bda6a7e429af272f291bb769\"\u003e扫描器-\u0026gt;工具-\u0026gt;未分类-Scanner\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1059\u003c/strong\u003e星][16d] [Rust] \u003ca href=\"https://github.com/fgribreau/mailchecker\"\u003efgribreau/mailchecker\u003c/a\u003e 邮件检测库,跨语言。覆盖33078虚假邮件提供者\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e976\u003c/strong\u003e星][5m] [C] \u003ca href=\"https://github.com/rbsec/sslscan\"\u003erbsec/sslscan\u003c/a\u003e 测试启用SSL/TLS的服务,发现其支持的cipher suites\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e931\u003c/strong\u003e星][16d] [OCaml] \u003ca href=\"https://github.com/airbus-seclab/bincat\"\u003eairbus-seclab/bincat\u003c/a\u003e 二进制代码静态分析工具。值分析(寄存器、内存)、污点分析、类型重建和传播(propagation)、前向/后向分析\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e906\u003c/strong\u003e星][5m] \u003ca href=\"https://github.com/derpopo/uabe\"\u003ederpopo/uabe\u003c/a\u003e Unity Assets Bundle Extractor\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e866\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/s0md3v/ReconDog\"\u003es0md3v/recondog\u003c/a\u003e Reconnaissance Swiss Army Knife\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e778\u003c/strong\u003e星][5m] [Shell] \u003ca href=\"https://github.com/nahamsec/lazyrecon\"\u003enahamsec/lazyrecon\u003c/a\u003e 侦查(reconnaissance)过程自动化脚本, 可自动使用Sublist3r/certspotter获取子域名, 调用nmap/dirsearch等\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e778\u003c/strong\u003e星][1y] [HTML] \u003ca href=\"https://github.com/sense-of-security/adrecon\"\u003esense-of-security/adrecon\u003c/a\u003e 收集Active Directory信息并生成报告\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e758\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/khast3x/h8mail\"\u003ekhast3x/h8mail\u003c/a\u003e Password Breach Hunting and Email OSINT tool, locally or using premium services. Supports chasing down related email\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e754\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/threatexpress/domainhunter\"\u003ethreatexpress/domainhunter\u003c/a\u003e Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#ce734598055ad3885d45d0b35d2bf0d7\"\u003e社工(SET)-\u0026gt;工具-\u0026gt;未分类-SET\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e706\u003c/strong\u003e星][21d] [Ruby] \u003ca href=\"https://github.com/intrigueio/intrigue-core\"\u003eintrigueio/intrigue-core\u003c/a\u003e 外部攻击面发现框架,自动化OSINT\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e625\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/deibit/cansina\"\u003edeibit/cansina\u003c/a\u003e web 内容发现工具。发出各种请求并过滤回复,识别是否存在请求的资源。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e595\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/1n3/blackwidow\"\u003e1n3/blackwidow\u003c/a\u003e A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e582\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/ekultek/zeus-scanner\"\u003eekultek/zeus-scanner\u003c/a\u003e Advanced reconnaissance utility\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e561\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/m4ll0k/infoga\"\u003em4ll0k/infoga\u003c/a\u003e 邮件信息收集工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e516\u003c/strong\u003e星][1m] \u003ca href=\"https://github.com/no-github/digital-privacy\"\u003eno-github/digital-privacy\u003c/a\u003e 一个关于数字隐私搜集、保护、清理集一体的方案,外加开源信息收集(OSINT)对抗\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e492\u003c/strong\u003e星][29d] [Rust] \u003ca href=\"https://github.com/kpcyrd/sn0int\"\u003ekpcyrd/sn0int\u003c/a\u003e Semi-automatic OSINT framework and package manager\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e475\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/xillwillx/skiptracer\"\u003exillwillx/skiptracer\u003c/a\u003e OSINT python webscaping framework\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e442\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/superhedgy/attacksurfacemapper\"\u003esuperhedgy/attacksurfacemapper\u003c/a\u003e AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e422\u003c/strong\u003e星][1y] [JS] \u003ca href=\"https://github.com/ciscocsirt/gosint\"\u003eciscocsirt/gosint\u003c/a\u003e 收集、处理、索引高质量IOC的框架\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e411\u003c/strong\u003e星][5m] [Shell] \u003ca href=\"https://github.com/d4rk007/redghost\"\u003ed4rk007/redghost\u003c/a\u003e Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e409\u003c/strong\u003e星][3m] \u003ca href=\"https://github.com/ph055a/osint-collection\"\u003eph055a/osint-collection\u003c/a\u003e Maintained collection of OSINT related resources. (All Free \u0026amp; Actionable)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e397\u003c/strong\u003e星][5d] [Go] \u003ca href=\"https://github.com/graniet/operative-framework\"\u003egraniet/operative-framework\u003c/a\u003e operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links with target, export rapport to PDF file, add note to target or results, interact with RESTFul API, write your own modules.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e392\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/chrismaddalena/odin\"\u003echrismaddalena/odin\u003c/a\u003e Automated network asset, email, and social media profile discovery and cataloguing.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e383\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/dedsecinside/torbot\"\u003ededsecinside/torbot\u003c/a\u003e Dark Web OSINT Tool\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e354\u003c/strong\u003e星][12m] [Py] \u003ca href=\"https://github.com/aancw/belati\"\u003eaancw/belati\u003c/a\u003e The Traditional Swiss Army Knife for OSINT\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e353\u003c/strong\u003e星][18d] [Py] \u003ca href=\"https://github.com/depthsecurity/armory\"\u003edepthsecurity/armory\u003c/a\u003e Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of related information.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e344\u003c/strong\u003e星][16d] [Py] \u003ca href=\"https://github.com/darryllane/bluto\"\u003edarryllane/bluto\u003c/a\u003e DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration | Compromised Account Checking\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e336\u003c/strong\u003e星][12m] [Py] \u003ca href=\"https://github.com/mdsecactivebreach/linkedint\"\u003emdsecactivebreach/linkedint\u003c/a\u003e A LinkedIn scraper for reconnaissance during adversary simulation\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e329\u003c/strong\u003e星][6m] [Go] \u003ca href=\"https://github.com/nhoya/gosint\"\u003enhoya/gosint\u003c/a\u003e OSINT Swiss Army Knife\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e328\u003c/strong\u003e星][17d] [Py] \u003ca href=\"https://github.com/initstring/linkedin2username\"\u003einitstring/linkedin2username\u003c/a\u003e Generate username lists for companies on LinkedIn\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e314\u003c/strong\u003e星][] [Py] \u003ca href=\"https://github.com/sharadkumar97/osint-spy\"\u003esharadkumar97/osint-spy\u003c/a\u003e Performs OSINT scan on email/domain/ip_address/organization using OSINT-SPY. It can be used by Data Miners, Infosec Researchers, Penetration Testers and cyber crime investigator in order to find deep information about their target. If you want to ask something please feel free to reach out to me at \u003ca href=\"mailto:robotcoder@protonmail.com\"\u003erobotcoder@protonmail.com\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e313\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/twelvesec/gasmask\"\u003etwelvesec/gasmask\u003c/a\u003e Information gathering tool - OSINT\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e307\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/r3vn/badkarma\"\u003er3vn/badkarma\u003c/a\u003e network reconnaissance toolkit\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e297\u003c/strong\u003e星][7m] [Shell] \u003ca href=\"https://github.com/eschultze/urlextractor\"\u003eeschultze/urlextractor\u003c/a\u003e Information gathering \u0026amp; website reconnaissance |\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e292\u003c/strong\u003e星][3m] [JS] \u003ca href=\"https://github.com/pownjs/pown-recon\"\u003epownjs/pown-recon\u003c/a\u003e A powerful target reconnaissance framework powered by graph theory.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e286\u003c/strong\u003e星][1y] [Shell] \u003ca href=\"https://github.com/ha71/namechk\"\u003eha71/namechk\u003c/a\u003e Osint tool based on namechk.com for checking usernames on more than 100 websites, forums and social networks.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e285\u003c/strong\u003e星][23d] [Py] \u003ca href=\"https://github.com/ekultek/whatbreach\"\u003eekultek/whatbreach\u003c/a\u003e OSINT tool to find breached emails, databases, pastes, and relevant information\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e269\u003c/strong\u003e星][1y] [Go] \u003ca href=\"https://github.com/tomsteele/blacksheepwall\"\u003etomsteele/blacksheepwall\u003c/a\u003e blacksheepwall is a hostname reconnaissance tool\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e259\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/thewhiteh4t/finalrecon\"\u003ethewhiteh4t/finalrecon\u003c/a\u003e OSINT Tool for All-In-One Web Reconnaissance\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e258\u003c/strong\u003e星][3m] [Shell] \u003ca href=\"https://github.com/solomonsklash/chomp-scan\"\u003esolomonsklash/chomp-scan\u003c/a\u003e A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e257\u003c/strong\u003e星][8d] [TS] \u003ca href=\"https://github.com/ninoseki/mitaka\"\u003eninoseki/mitaka\u003c/a\u003e A browser extension for OSINT search\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e253\u003c/strong\u003e星][26d] [Py] \u003ca href=\"https://github.com/zephrfish/googd0rker\"\u003ezephrfish/googd0rker\u003c/a\u003e GoogD0rker is a tool for firing off google dorks against a target domain, it is purely for OSINT against a specific target domain. READ the readme before messaging or tweeting me.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e243\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/sc1341/instagramosint\"\u003esc1341/instagramosint\u003c/a\u003e An Instagram Open Source Intelligence Tool\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e236\u003c/strong\u003e星][7m] [JS] \u003ca href=\"https://github.com/cliqz-oss/local-sheriff\"\u003ecliqz-oss/local-sheriff\u003c/a\u003e Think of Local sheriff as a recon tool in your browser (WebExtension). While you normally browse the internet, Local Sheriff works in the background to empower you in identifying what data points (PII) are being shared / leaked to which all third-parties.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e233\u003c/strong\u003e星][2m] [Propeller Spin] \u003ca href=\"https://github.com/grandideastudio/jtagulator\"\u003egrandideastudio/jtagulator\u003c/a\u003e Assisted discovery of on-chip debug interfaces\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e229\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/anon-exploiter/sitebroker\"\u003eanon-exploiter/sitebroker\u003c/a\u003e A cross-platform python based utility for information gathering and penetration testing automation!\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e226\u003c/strong\u003e星][5d] [Py] \u003ca href=\"https://github.com/eth0izzle/the-endorser\"\u003eeth0izzle/the-endorser\u003c/a\u003e An OSINT tool that allows you to draw out relationships between people on LinkedIn via endorsements/skills.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e223\u003c/strong\u003e星][1y] [Shell] \u003ca href=\"https://github.com/edoverflow/megplus\"\u003eedoverflow/megplus\u003c/a\u003e Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e222\u003c/strong\u003e星][1m] [PS] \u003ca href=\"https://github.com/tonyphipps/meerkat\"\u003etonyphipps/meerkat\u003c/a\u003e A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e220\u003c/strong\u003e星][9d] [Shell] \u003ca href=\"https://github.com/x1mdev/reconpi\"\u003ex1mdev/reconpi\u003c/a\u003e ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e217\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/spiderlabs/hosthunter\"\u003espiderlabs/hosthunter\u003c/a\u003e HostHunter a recon tool for discovering hostnames using OSINT techniques.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e211\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/inquest/omnibus\"\u003einquest/omnibus\u003c/a\u003e The OSINT Omnibus (beta release)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e201\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/sham00n/buster\"\u003esham00n/buster\u003c/a\u003e An advanced tool for email reconnaissance\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-e945721056c78a53003e01c3d2f3b8fe\"\u003e\u003c/a\u003e子域名枚举\u0026amp;\u0026amp;爆破\u003c/h3\u003e\u003ca id=\"user-content-子域名枚举爆破\" class=\"anchor\" aria-label=\"Permalink: 子域名枚举\u0026amp;\u0026amp;爆破\" href=\"#子域名枚举爆破\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e4153\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/aboul3la/sublist3r\"\u003eaboul3la/sublist3r\u003c/a\u003e Fast subdomains enumeration tool for penetration testers\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3270\u003c/strong\u003e星][27d] [Py] \u003ca href=\"https://github.com/laramies/theharvester\"\u003elaramies/theharvester\u003c/a\u003e E-mails, subdomains and names Harvester - OSINT\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3102\u003c/strong\u003e星][7m] [Go] \u003ca href=\"https://github.com/michenriksen/aquatone\"\u003emichenriksen/aquatone\u003c/a\u003e 子域名枚举工具。除了经典的爆破枚举之外,还利用多种开源工具和在线服务大幅度增加发现子域名的数量。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2028\u003c/strong\u003e星][8d] [Go] \u003ca href=\"https://github.com/projectdiscovery/subfinder\"\u003eprojectdiscovery/subfinder\u003c/a\u003e 使用Passive Sources, Search Engines, Pastebins, Internet Archives等查找子域名\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1808\u003c/strong\u003e星][7m] [Py] \u003ca href=\"https://github.com/lijiejie/subdomainsbrute\"\u003elijiejie/subdomainsbrute\u003c/a\u003e 子域名爆破\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1716\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/guelfoweb/knock\"\u003eguelfoweb/knock\u003c/a\u003e 使用 Wordlist 枚举子域名\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1561\u003c/strong\u003e星][11d] [Go] \u003ca href=\"https://github.com/caffix/amass\"\u003ecaffix/amass\u003c/a\u003e 子域名枚举, 搜索互联网数据源, 使用机器学习猜测子域名. Go语言\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1115\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/john-kurkowski/tldextract\"\u003ejohn-kurkowski/tldextract\u003c/a\u003e Accurately separate the TLD from the registered domain and subdomains of a URL, using the Public Suffix List.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e990\u003c/strong\u003e星][6d] [Py] \u003ca href=\"https://github.com/shmilylty/oneforall\"\u003eshmilylty/oneforall\u003c/a\u003e 子域收集工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e823\u003c/strong\u003e星][8d] [Rust] \u003ca href=\"https://github.com/edu4rdshl/findomain\"\u003eedu4rdshl/findomain\u003c/a\u003e The fastest and cross-platform subdomain enumerator, don't waste your time.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e773\u003c/strong\u003e星][5m] [Go] \u003ca href=\"https://github.com/haccer/subjack\"\u003ehaccer/subjack\u003c/a\u003e 异步多线程扫描子域列表,识别能够被劫持的子域。Go 编写\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e649\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/SimplySecurity/SimplyEmail\"\u003esimplysecurity/simplyemail\u003c/a\u003e Email recon made fast and easy, with a framework to build on\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e575\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/jonluca/anubis\"\u003ejonluca/anubis\u003c/a\u003e Subdomain enumeration and information gathering tool\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e553\u003c/strong\u003e星][9m] [Py] \u003ca href=\"https://github.com/feeicn/esd\"\u003efeeicn/esd\u003c/a\u003e Enumeration sub domains(枚举子域名)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e499\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/yanxiu0614/subdomain3\"\u003eyanxiu0614/subdomain3\u003c/a\u003e 简单快速的子域名爆破工具。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e498\u003c/strong\u003e星][27d] [Py] \u003ca href=\"https://github.com/TypeError/domained\"\u003etypeerror/domained\u003c/a\u003e Multi Tool Subdomain Enumeration\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e479\u003c/strong\u003e星][6m] [Py] \u003ca href=\"https://github.com/threezh1/jsfinder\"\u003ethreezh1/jsfinder\u003c/a\u003e JSFinder is a tool for quickly extracting URLs and subdomains from JS files on a website.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e454\u003c/strong\u003e星][25d] [Py] \u003ca href=\"https://github.com/nsonaniya2010/subdomainizer\"\u003ensonaniya2010/subdomainizer\u003c/a\u003e A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e445\u003c/strong\u003e星][1y] [Go] \u003ca href=\"https://github.com/ice3man543/subover\"\u003eice3man543/subover\u003c/a\u003e A Powerful Subdomain Takeover Tool\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e432\u003c/strong\u003e星][11m] [Py] \u003ca href=\"https://github.com/appsecco/bugcrowd-levelup-subdomain-enumeration\"\u003eappsecco/bugcrowd-levelup-subdomain-enumeration\u003c/a\u003e This repository contains all the material from the talk \"Esoteric sub-domain enumeration techniques\" given at Bugcrowd LevelUp 2017 virtual conference\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e334\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/chris408/ct-exposer\"\u003echris408/ct-exposer\u003c/a\u003e An OSINT tool that discovers sub-domains by searching Certificate Transparency logs\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e332\u003c/strong\u003e星][2m] [Go] \u003ca href=\"https://github.com/tomnomnom/assetfinder\"\u003etomnomnom/assetfinder\u003c/a\u003e Find domains and subdomains related to a given domain\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e293\u003c/strong\u003e星][4d] [Go] \u003ca href=\"https://github.com/anshumanbh/tko-subs\"\u003eanshumanbh/tko-subs\u003c/a\u003e A tool that can help detect and takeover subdomains with dead DNS records\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e279\u003c/strong\u003e星][26d] [Py] \u003ca href=\"https://github.com/franccesco/getaltname\"\u003efranccesco/getaltname\u003c/a\u003e 直接从SSL证书中提取子域名或虚拟域名\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e277\u003c/strong\u003e星][11m] [Py] \u003ca href=\"https://github.com/appsecco/the-art-of-subdomain-enumeration\"\u003eappsecco/the-art-of-subdomain-enumeration\u003c/a\u003e This repository contains all the supplement material for the book \"The art of sub-domain enumeration\"\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e228\u003c/strong\u003e星][2m] [Shell] \u003ca href=\"https://github.com/screetsec/sudomy\"\u003escreetsec/sudomy\u003c/a\u003e Sudomy is a subdomain enumeration tool, created using a bash script, to analyze domains and collect subdomains in fast and comprehensive way . Report output in HTML or CSV format\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-375a8baa06f24de1b67398c1ac74ed24\"\u003e\u003c/a\u003e信息收集\u0026amp;\u0026amp;侦查\u0026amp;\u0026amp;Recon\u0026amp;\u0026amp;InfoGather\u003c/h3\u003e\u003ca id=\"user-content-信息收集侦查reconinfogather\" class=\"anchor\" aria-label=\"Permalink: 信息收集\u0026amp;\u0026amp;侦查\u0026amp;\u0026amp;Recon\u0026amp;\u0026amp;InfoGather\" href=\"#信息收集侦查reconinfogather\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e3603\u003c/strong\u003e星][11d] [Shell] \u003ca href=\"https://github.com/drwetter/testssl.sh\"\u003edrwetter/testssl.sh\u003c/a\u003e 检查服务器任意端口对 TLS/SSL 的支持、协议以及一些加密缺陷,命令行工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2489\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/smicallef/spiderfoot\"\u003esmicallef/spiderfoot\u003c/a\u003e 自动收集指定目标的信息:IP、域名、主机名、网络子网、ASN、邮件地址、用户名\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2021\u003c/strong\u003e星][7d] [Py] \u003ca href=\"https://github.com/j3ssie/osmedeus\"\u003ej3ssie/osmedeus\u003c/a\u003e Fully automated offensive security framework for reconnaissance and vulnerability scanning\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1966\u003c/strong\u003e星][9m] [JS] \u003ca href=\"https://github.com/weichiachang/stacks-cli\"\u003eweichiachang/stacks-cli\u003c/a\u003e Check website stack from the terminal\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1958\u003c/strong\u003e星][30d] [Go] \u003ca href=\"https://github.com/mpolden/echoip\"\u003empolden/echoip\u003c/a\u003e IP address lookup service\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1651\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/evyatarmeged/raccoon\"\u003eevyatarmeged/raccoon\u003c/a\u003e 高性能的侦查和漏洞扫描工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1486\u003c/strong\u003e星][6m] [Py] \u003ca href=\"https://github.com/oros42/imsi-catcher\"\u003eoros42/imsi-catcher\u003c/a\u003e This program show you IMSI numbers of cellphones around you.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1305\u003c/strong\u003e星][1y] [Go] \u003ca href=\"https://github.com/evilsocket/xray\"\u003eevilsocket/xray\u003c/a\u003e 自动化执行一些信息收集、网络映射的初始化工作\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1154\u003c/strong\u003e星][23d] [C] \u003ca href=\"https://github.com/xroche/httrack\"\u003exroche/httrack\u003c/a\u003e download a World Wide website from the Internet to a local directory, building recursively all directories, getting html, images, and other files from the server to your computer.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e975\u003c/strong\u003e星][2m] [HTML] \u003ca href=\"https://github.com/n0tr00t/sreg\"\u003en0tr00t/sreg\u003c/a\u003e 可对使用者通过输入email、phone、username的返回用户注册的所有互联网护照信息。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e923\u003c/strong\u003e星][3m] [Ruby] \u003ca href=\"https://github.com/weppos/whois\"\u003eweppos/whois\u003c/a\u003e An intelligent — pure Ruby — WHOIS client and parser.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e860\u003c/strong\u003e星][11m] [Shell] \u003ca href=\"https://github.com/thelinuxchoice/userrecon\"\u003ethelinuxchoice/userrecon\u003c/a\u003e Find usernames across over 75 social networks\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e838\u003c/strong\u003e星][7d] [HTML] \u003ca href=\"https://github.com/rewardone/oscprepo\"\u003erewardone/oscprepo\u003c/a\u003e A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and reading material in 'BookmarkList' Keepnote. Reconscan in scripts folder.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e677\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/tib3rius/autorecon\"\u003etib3rius/autorecon\u003c/a\u003e AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e512\u003c/strong\u003e星][10m] [Py] \u003ca href=\"https://github.com/FortyNorthSecurity/Just-Metadata\"\u003efortynorthsecurity/just-metadata\u003c/a\u003e Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within a large dataset.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e483\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/yassineaboukir/sublert\"\u003eyassineaboukir/sublert\u003c/a\u003e Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e418\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/lanmaster53/recon-ng\"\u003elanmaster53/recon-ng\u003c/a\u003e Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e394\u003c/strong\u003e星][11m] [Swift] \u003ca href=\"https://github.com/ibm/mac-ibm-enrollment-app\"\u003eibm/mac-ibm-enrollment-app\u003c/a\u003e The Mac@IBM enrollment app makes setting up macOS with Jamf Pro more intuitive for users and easier for IT. The application offers IT admins the ability to gather additional information about their users during setup, allows users to customize their enrollment by selecting apps or bundles of apps to install during setup, and provides users with …\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e362\u003c/strong\u003e星][2m] [Shell] \u003ca href=\"https://github.com/vitalysim/totalrecon\"\u003evitalysim/totalrecon\u003c/a\u003e TotalRecon installs all the recon tools you need\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e361\u003c/strong\u003e星][5m] [C++] \u003ca href=\"https://github.com/wbenny/pdbex\"\u003ewbenny/pdbex\u003c/a\u003e pdbex is a utility for reconstructing structures and unions from the PDB into compilable C headers\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e307\u003c/strong\u003e星][5m] [PLpgSQL] \u003ca href=\"https://github.com/amachanic/sp_whoisactive\"\u003eamachanic/sp_whoisactive\u003c/a\u003e sp_whoisactive\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e300\u003c/strong\u003e星][18d] [Py] \u003ca href=\"https://github.com/govanguard/legion\"\u003egovanguard/legion\u003c/a\u003e Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconnaissance and exploitation of information systems.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e273\u003c/strong\u003e星][20d] [Rust] \u003ca href=\"https://github.com/nccgroup/dirble\"\u003enccgroup/dirble\u003c/a\u003e Fast directory scanning and scraping tool\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e269\u003c/strong\u003e星][11m] [Py] \u003ca href=\"https://bitbucket.org/lanmaster53/recon-ng\" rel=\"nofollow\"\u003eLaNMaSteR53/recon-ng\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e258\u003c/strong\u003e星][4d] [Java] \u003ca href=\"https://github.com/ripe-ncc/whois\"\u003eripe-ncc/whois\u003c/a\u003e RIPE Database whois code repository\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e233\u003c/strong\u003e星][2m] [C] \u003ca href=\"https://github.com/elfmaster/libelfmaster\"\u003eelfmaster/libelfmaster\u003c/a\u003e Secure ELF parsing/loading library for forensics reconstruction of malware, and robust reverse engineering tools\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e200\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/tylous/vibe\"\u003etylous/vibe\u003c/a\u003e A framework for stealthy domain reconnaissance\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-016bb6bd00f1e0f8451f779fe09766db\"\u003e\u003c/a\u003e指纹\u0026amp;\u0026amp;Fingerprinting\u003c/h3\u003e\u003ca id=\"user-content-指纹fingerprinting\" class=\"anchor\" aria-label=\"Permalink: 指纹\u0026amp;\u0026amp;Fingerprinting\" href=\"#指纹fingerprinting\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e9519\u003c/strong\u003e星][12d] [JS] \u003ca href=\"https://github.com/valve/fingerprintjs2\"\u003evalve/fingerprintjs2\u003c/a\u003e Modern \u0026amp; flexible browser fingerprinting library\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e4758\u003c/strong\u003e星][7m] [Py] \u003ca href=\"https://github.com/worldveil/dejavu\"\u003eworldveil/dejavu\u003c/a\u003e Audio fingerprinting and recognition in Python\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3072\u003c/strong\u003e星][2m] [JS] \u003ca href=\"https://github.com/valve/fingerprintjs\"\u003evalve/fingerprintjs\u003c/a\u003e Anonymous browser fingerprint\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1670\u003c/strong\u003e星][] [JS] \u003ca href=\"https://github.com/ghacksuserjs/ghacks-user.js\"\u003eghacksuserjs/ghacks-user.js\u003c/a\u003e An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1618\u003c/strong\u003e星][10m] [C] \u003ca href=\"https://github.com/nmikhailov/validity90\"\u003enmikhailov/validity90\u003c/a\u003e Reverse engineering of Validity/Synaptics 138a:0090, 138a:0094, 138a:0097, 06cb:0081, 06cb:009a fingerprint readers protocol\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e931\u003c/strong\u003e星][8m] [JS] \u003ca href=\"https://github.com/song-li/cross_browser\"\u003esong-li/cross_browser\u003c/a\u003e cross_browser_fingerprinting\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e831\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/salesforce/ja3\"\u003esalesforce/ja3\u003c/a\u003e SSL/TLS 客户端指纹,用于恶意代码检测\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e380\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/0x4d31/fatt\"\u003e0x4d31/fatt\u003c/a\u003e FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network traffic\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e313\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/dpwe/audfprint\"\u003edpwe/audfprint\u003c/a\u003e Landmark-based audio fingerprinting\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e312\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/salesforce/hassh\"\u003esalesforce/hassh\u003c/a\u003e HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints can be easily stored, searched and shared in the form of a small MD5 fingerprint.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e282\u003c/strong\u003e星][1y] [CSS] \u003ca href=\"https://github.com/w-digital-scanner/w11scan\"\u003ew-digital-scanner/w11scan\u003c/a\u003e 分布式WEB指纹识别平台 Distributed WEB fingerprint identification platform\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e245\u003c/strong\u003e星][3m] [C] \u003ca href=\"https://github.com/leebrotherston/tls-fingerprinting\"\u003eleebrotherston/tls-fingerprinting\u003c/a\u003e TLS Fingerprinting\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e223\u003c/strong\u003e星][25d] [GLSL] \u003ca href=\"https://github.com/westpointltd/tls_prober\"\u003ewestpointltd/tls_prober\u003c/a\u003e A tool to fingerprint SSL/TLS servers\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e220\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/sensepost/spartan\"\u003esensepost/spartan\u003c/a\u003e Frontpage and Sharepoint fingerprinting and attack tool.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-6ea9006a5325dd21d246359329a3ede2\"\u003e\u003c/a\u003e收集\u003c/h3\u003e\u003ca id=\"user-content-收集-2\" class=\"anchor\" aria-label=\"Permalink: 收集\" href=\"#收集-2\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e3868\u003c/strong\u003e星][1m] \u003ca href=\"https://github.com/jivoi/awesome-osint\"\u003ejivoi/awesome-osint\u003c/a\u003e OSINT资源收集\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-dc74ad2dd53aa8c8bf3a3097ad1f12b7\"\u003e\u003c/a\u003e社交网络\u003c/h3\u003e\u003ca id=\"user-content-社交网络\" class=\"anchor\" aria-label=\"Permalink: 社交网络\" href=\"#社交网络\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch4 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-6d36e9623aadaf40085ef5af89c8d698\"\u003e\u003c/a\u003e其他-SocialNetwork\u003c/h4\u003e\u003ca id=\"user-content-其他-socialnetwork\" class=\"anchor\" aria-label=\"Permalink: 其他-SocialNetwork\" href=\"#其他-socialnetwork\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e9767\u003c/strong\u003e星][4d] [Py] \u003ca href=\"https://github.com/sherlock-project/sherlock\"\u003esherlock-project/sherlock\u003c/a\u003e Find Usernames Across Social Networks\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2578\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/Greenwolf/social_mapper\"\u003egreenwolf/social_mapper\u003c/a\u003e 对多个社交网站的用户Profile图片进行大规模的人脸识别\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1131\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/thoughtfuldev/eagleeye\"\u003ethoughtfuldev/eagleeye\u003c/a\u003e Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e664\u003c/strong\u003e星][1y] [Go] \u003ca href=\"https://github.com/0x09al/raven\"\u003e0x09al/raven\u003c/a\u003e raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees using Linkedin.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch4 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-de93515e77c0ca100bbf92c83f82dc2a\"\u003e\u003c/a\u003eTwitter\u003c/h4\u003e\u003ca id=\"user-content-twitter\" class=\"anchor\" aria-label=\"Permalink: Twitter\" href=\"#twitter\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e3033\u003c/strong\u003e星][4d] [Py] \u003ca href=\"https://github.com/twintproject/twint\"\u003etwintproject/twint\u003c/a\u003e An advanced Twitter scraping \u0026amp; OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, following, Tweets and more while evading most API limitations.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch4 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-8d1ae776898748b8249132e822f6c919\"\u003e\u003c/a\u003eGithub\u003c/h4\u003e\u003ca id=\"user-content-github\" class=\"anchor\" aria-label=\"Permalink: Github\" href=\"#github\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1717\u003c/strong\u003e星][2m] [Go] \u003ca href=\"https://github.com/eth0izzle/shhgit\"\u003eeth0izzle/shhgit\u003c/a\u003e 监听Github Event API,实时查找Github代码和Gist中的secret和敏感文件\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1636\u003c/strong\u003e星][2m] [Shell] \u003ca href=\"https://github.com/internetwache/gittools\"\u003einternetwache/gittools\u003c/a\u003e find websites with their .git repository available to the public\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1563\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/unkl4b/gitminer\"\u003eunkl4b/gitminer\u003c/a\u003e Github内容挖掘\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1352\u003c/strong\u003e星][7m] [Py] \u003ca href=\"https://github.com/feeicn/gsil\"\u003efeeicn/gsil\u003c/a\u003e GitHub敏感信息泄露监控,几乎实时监控,发送警告\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e859\u003c/strong\u003e星][2m] [JS] \u003ca href=\"https://github.com/vksrc/github-monitor\"\u003evksrc/github-monitor\u003c/a\u003e Github Sensitive Information Leakage Monitor(Github信息泄漏监控系统)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e857\u003c/strong\u003e星][7m] [Go] \u003ca href=\"https://github.com/misecurity/x-patrol\"\u003emisecurity/x-patrol\u003c/a\u003e github泄露扫描系统\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e810\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/techgaun/github-dorks\"\u003etechgaun/github-dorks\u003c/a\u003e 快速搜索Github repo中的敏感信息\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e789\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/bishopfox/gitgot\"\u003ebishopfox/gitgot\u003c/a\u003e Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e667\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/hisxo/gitgraber\"\u003ehisxo/gitgraber\u003c/a\u003e monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e324\u003c/strong\u003e星][4d] [HTML] \u003ca href=\"https://github.com/tanjiti/sec_profile\"\u003etanjiti/sec_profile\u003c/a\u003e 爬取secwiki和xuanwu.github.io/sec.today,分析安全信息站点、安全趋势、提取安全工作者账号(twitter,weixin,github等)\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#58d8b993ffc34f7ded7f4a0077129eb2\"\u003e扫描器-\u0026gt;工具-\u0026gt;隐私\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e294\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/s0md3v/zen\"\u003es0md3v/zen\u003c/a\u003e 查找Github用户的邮箱地址\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-a695111d8e30d645354c414cb27b7843\"\u003e\u003c/a\u003eDNS\u003c/h3\u003e\u003ca id=\"user-content-dns\" class=\"anchor\" aria-label=\"Permalink: DNS\" href=\"#dns\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e2562\u003c/strong\u003e星][5m] [Go] \u003ca href=\"https://github.com/oj/gobuster\"\u003eoj/gobuster\u003c/a\u003e Directory/File, DNS and VHost busting tool written in Go\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2380\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/ab77/netflix-proxy\"\u003eab77/netflix-proxy\u003c/a\u003e Smart DNS proxy to watch Netflix\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2131\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/elceef/dnstwist\"\u003eelceef/dnstwist\u003c/a\u003e 域名置换引擎,用于检测打字错误,网络钓鱼和企业间谍活动\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#290e9ae48108d21d6d8b9ea9e74d077d\"\u003e社工(SET)-\u0026gt;工具-\u0026gt;钓鱼\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1933\u003c/strong\u003e星][7d] [C++] \u003ca href=\"https://github.com/powerdns/pdns\"\u003epowerdns/pdns\u003c/a\u003e PowerDNS\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1735\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/lgandx/responder\"\u003elgandx/responder\u003c/a\u003e Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1144\u003c/strong\u003e星][16d] [Py] \u003ca href=\"https://github.com/darkoperator/dnsrecon\"\u003edarkoperator/dnsrecon\u003c/a\u003e DNS 枚举脚本\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1090\u003c/strong\u003e星][1m] [Go] \u003ca href=\"https://github.com/looterz/grimd\"\u003elooterz/grimd\u003c/a\u003e Fast dns proxy that can run anywhere, built to black-hole internet advertisements and malware servers.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1090\u003c/strong\u003e星][2m] [Go] \u003ca href=\"https://github.com/nadoo/glider\"\u003enadoo/glider\u003c/a\u003e 正向代理,支持若干协议\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1078\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/infosec-au/altdns\"\u003einfosec-au/altdns\u003c/a\u003e Generates permutations, alterations and mutations of subdomains and then resolves them\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e977\u003c/strong\u003e星][7m] [Py] \u003ca href=\"https://github.com/m57/dnsteal\"\u003em57/dnsteal\u003c/a\u003e DNS Exfiltration tool for stealthily sending files over DNS requests.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e912\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/m0rtem/cloudfail\"\u003em0rtem/cloudfail\u003c/a\u003e 通过错误配置的DNS和老数据库,发现CloudFlare网络后面的隐藏IP\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e908\u003c/strong\u003e星][30d] [Py] \u003ca href=\"https://github.com/mschwager/fierce\"\u003emschwager/fierce\u003c/a\u003e A DNS reconnaissance tool for locating non-contiguous IP space.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e708\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/bugscanteam/dnslog\"\u003ebugscanteam/dnslog\u003c/a\u003e 监控 DNS 解析记录和 HTTP 访问记录\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e613\u003c/strong\u003e星][8m] [Shell] \u003ca href=\"https://github.com/cokebar/gfwlist2dnsmasq\"\u003ecokebar/gfwlist2dnsmasq\u003c/a\u003e A shell script which convert gfwlist into dnsmasq rules. Python version:\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e585\u003c/strong\u003e星][2m] [C] \u003ca href=\"https://github.com/getdnsapi/stubby\"\u003egetdnsapi/stubby\u003c/a\u003e Stubby is the name given to a mode of using getdns which enables it to act as a local DNS Privacy stub resolver (using DNS-over-TLS).\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e461\u003c/strong\u003e星][9m] [C] \u003ca href=\"https://github.com/cofyc/dnscrypt-wrapper\"\u003ecofyc/dnscrypt-wrapper\u003c/a\u003e This is dnscrypt wrapper (server-side dnscrypt proxy), which helps to add dnscrypt support to any name resolver.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e415\u003c/strong\u003e星][6m] [Py] \u003ca href=\"https://github.com/dnsviz/dnsviz\"\u003ednsviz/dnsviz\u003c/a\u003e s a tool suite for analysis and visualization of Domain Name System (DNS) behavior, including its security extensions (DNSSEC)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e375\u003c/strong\u003e星][1m] [JS] \u003ca href=\"https://github.com/nccgroup/singularity\"\u003enccgroup/singularity\u003c/a\u003e A DNS rebinding attack framework.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e355\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/i3visio/osrframework\"\u003ei3visio/osrframework\u003c/a\u003e 开源研究框架,提供 API 和工具执行更加精确的在线研究,例如用户名检查、DNS lookup、信息泄露研究、深度 web 研究、正则表达式提取等。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e336\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/rbsec/dnscan\"\u003erbsec/dnscan\u003c/a\u003e a python wordlist-based DNS subdomain scanner.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e267\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/trycatchhcf/packetwhisper\"\u003etrycatchhcf/packetwhisper\u003c/a\u003e Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e265\u003c/strong\u003e星][2m] [Go] \u003ca href=\"https://github.com/sensepost/godoh\"\u003esensepost/godoh\u003c/a\u003e A DNS-over-HTTPS Command \u0026amp; Control Proof of Concept\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e263\u003c/strong\u003e星][3m] [Go] \u003ca href=\"https://github.com/zmap/zdns\"\u003ezmap/zdns\u003c/a\u003e 快速DNS查找, 命令行工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e258\u003c/strong\u003e星][7d] [Go] \u003ca href=\"https://github.com/erbbysam/dnsgrep\"\u003eerbbysam/dnsgrep\u003c/a\u003e Quickly Search Large DNS Datasets\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e256\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/qunarcorp/open_dnsdb\"\u003equnarcorp/open_dnsdb\u003c/a\u003e OpenDnsdb 是去哪儿网OPS团队开源的基于Python语言的DNS管理系统\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e252\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/dirkjanm/adidnsdump\"\u003edirkjanm/adidnsdump\u003c/a\u003e Active Directory Integrated DNS dumping by any authenticated user\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e251\u003c/strong\u003e星][4m] [C#] \u003ca href=\"https://github.com/kevin-robertson/inveighzero\"\u003ekevin-robertson/inveighzero\u003c/a\u003e Windows C# LLMNR/mDNS/NBNS/DNS spoofer/man-in-the-middle tool\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e241\u003c/strong\u003e星][23d] [Py] \u003ca href=\"https://github.com/mandatoryprogrammer/trusttrees\"\u003emandatoryprogrammer/trusttrees\u003c/a\u003e a script to recursively follow all the possible delegation paths for a target domain and graph the relationships between various nameservers along the way.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-18c7c1df2e6ae5e9135dfa2e4eb1d4db\"\u003e\u003c/a\u003eShodan\u003c/h3\u003e\u003ca id=\"user-content-shodan\" class=\"anchor\" aria-label=\"Permalink: Shodan\" href=\"#shodan\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1214\u003c/strong\u003e星][8d] [Py] \u003ca href=\"https://github.com/achillean/shodan-python\"\u003eachillean/shodan-python\u003c/a\u003e The official Python library for Shodan\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1052\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/woj-ciech/kamerka\"\u003ewoj-ciech/kamerka\u003c/a\u003e 利用Shodan构建交互式摄像头地图\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e890\u003c/strong\u003e星][3m] \u003ca href=\"https://github.com/jakejarvis/awesome-shodan-queries\"\u003ejakejarvis/awesome-shodan-queries\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e858\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/649/memcrashed-ddos-exploit\"\u003e649/memcrashed-ddos-exploit\u003c/a\u003e DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#a0897294e74a0863ea8b83d11994fad6\"\u003e渗透-\u0026gt;工具-\u0026gt;DDOS\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e391\u003c/strong\u003e星][3d] [Py] \u003ca href=\"https://github.com/random-robbie/my-shodan-scripts\"\u003erandom-robbie/my-shodan-scripts\u003c/a\u003e Collection of Scripts for shodan searching stuff.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e378\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/pielco11/fav-up\"\u003epielco11/fav-up\u003c/a\u003e IP lookup from favicon using Shodan\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e234\u003c/strong\u003e星][11m] [Py] \u003ca href=\"https://github.com/nethunteros/punter\"\u003enethunteros/punter\u003c/a\u003e 使用 DNSDumpster, WHOIS, Reverse WHOIS 挖掘域名\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e220\u003c/strong\u003e星][6d] [Py] \u003ca href=\"https://github.com/shodansploit/shodansploit\"\u003eshodansploit/shodansploit\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-94c01f488096fafc194b9a07f065594c\"\u003e\u003c/a\u003enmap\u003c/h3\u003e\u003ca id=\"user-content-nmap\" class=\"anchor\" aria-label=\"Permalink: nmap\" href=\"#nmap\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e3609\u003c/strong\u003e星][7d] [C] \u003ca href=\"https://github.com/nmap/nmap\"\u003enmap/nmap\u003c/a\u003e Nmap\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2116\u003c/strong\u003e星][7m] [Py] \u003ca href=\"https://github.com/calebmadrigal/trackerjacker\"\u003ecalebmadrigal/trackerjacker\u003c/a\u003e 映射你没连接到的Wifi网络, 类似于NMap, 另外可以追踪设备\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1871\u003c/strong\u003e星][20d] [Lua] \u003ca href=\"https://github.com/vulnerscom/nmap-vulners\"\u003evulnerscom/nmap-vulners\u003c/a\u003e NSE script based on Vulners.com API\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1536\u003c/strong\u003e星][5d] [C++] \u003ca href=\"https://github.com/nmap/npcap\"\u003enmap/npcap\u003c/a\u003e Nmap项目的针对Windows系统的数据包嗅探库,基于WinPcap/Libpcap,用NDIS6和LWF做了升级\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1317\u003c/strong\u003e星][3m] [Lua] \u003ca href=\"https://github.com/scipag/vulscan\"\u003escipag/vulscan\u003c/a\u003e Nmap 模块,将 Nmap 转化为高级漏洞扫描器\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1029\u003c/strong\u003e星][1m] [Shell] \u003ca href=\"https://github.com/trimstray/sandmap\"\u003etrimstray/sandmap\u003c/a\u003e 使用NMap引擎, 辅助网络和系统侦查(reconnaissance)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e887\u003c/strong\u003e星][12m] [Py] \u003ca href=\"https://github.com/rev3rsesecurity/webmap\"\u003erev3rsesecurity/webmap\u003c/a\u003e Nmap Web Dashboard and Reporting\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e849\u003c/strong\u003e星][5d] [Py] \u003ca href=\"https://github.com/x90skysn3k/brutespray\"\u003ex90skysn3k/brutespray\u003c/a\u003e 获取 nmapGNMAP 输出,自动调用 Medusa 使用默认证书爆破服务(brute-forces services)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e733\u003c/strong\u003e星][5m] [Lua] \u003ca href=\"https://github.com/cldrn/nmap-nse-scripts\"\u003ecldrn/nmap-nse-scripts\u003c/a\u003e My collection of nmap NSE scripts\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e696\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/iceyhexman/onlinetools\"\u003eiceyhexman/onlinetools\u003c/a\u003e 在线cms识别|信息泄露|工控|系统|物联网安全|cms漏洞扫描|nmap端口扫描|子域名获取|待续..\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e503\u003c/strong\u003e星][1y] [XSLT] \u003ca href=\"https://github.com/honze-net/nmap-bootstrap-xsl\"\u003ehonze-net/nmap-bootstrap-xsl\u003c/a\u003e A Nmap XSL implementation with Bootstrap.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e394\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/savon-noir/python-libnmap\"\u003esavon-noir/python-libnmap\u003c/a\u003e libnmap is a python library to run nmap scans, parse and diff scan results. It supports python 2.6 up to 3.4. It's wonderful.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e328\u003c/strong\u003e星][10m] [Py] \u003ca href=\"https://github.com/samhaxr/hackbox\"\u003esamhaxr/hackbox\u003c/a\u003e 集合了某些Hacking工具和技巧的攻击工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e308\u003c/strong\u003e星][1y] [Java] \u003ca href=\"https://github.com/s4n7h0/halcyon\"\u003es4n7h0/halcyon\u003c/a\u003e First IDE for Nmap Script (NSE) Development.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e283\u003c/strong\u003e星][1y] [Ruby] \u003ca href=\"https://github.com/danmcinerney/pentest-machine\"\u003edanmcinerney/pentest-machine\u003c/a\u003e Automates some pentest jobs via nmap xml file\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e261\u003c/strong\u003e星][1y] [Shell] \u003ca href=\"https://github.com/m4ll0k/autonse\"\u003em4ll0k/autonse\u003c/a\u003e Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e257\u003c/strong\u003e星][1y] [Java] \u003ca href=\"https://github.com/danicuestasuarez/nmapgui\"\u003edanicuestasuarez/nmapgui\u003c/a\u003e Advanced Graphical User Interface for NMap\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e246\u003c/strong\u003e星][8m] [Lua] \u003ca href=\"https://github.com/rvn0xsy/nse_vuln\"\u003ervn0xsy/nse_vuln\u003c/a\u003e Nmap扫描、漏洞利用脚本\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e233\u003c/strong\u003e星][6m] [Py] \u003ca href=\"https://github.com/maaaaz/nmaptocsv\"\u003emaaaaz/nmaptocsv\u003c/a\u003e A simple python script to convert Nmap output to CSV\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e223\u003c/strong\u003e星][12d] [Py] \u003ca href=\"https://github.com/rackerlabs/scantron\"\u003erackerlabs/scantron\u003c/a\u003e A distributed nmap / masscan scanning framework\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e204\u003c/strong\u003e星][6m] [Py] \u003ca href=\"https://github.com/hellogoldsnakeman/masnmapscan-v1.0\"\u003ehellogoldsnakeman/masnmapscan-v1.0\u003c/a\u003e 一款端口扫描器。整合了masscan和nmap两款扫描器,masscan扫描端口,nmap扫描端口对应服务,二者结合起来实现了又快又好地扫描。并且加入了防火墙的功能\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-b0ca6c8512a268e8438d5e5247a88c2f\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-4\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-4\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-5a855113503106950acff4d7dbb2403e\"\u003e\u003c/a\u003e新添加\u003c/h3\u003e\u003ca id=\"user-content-新添加-1\" class=\"anchor\" aria-label=\"Permalink: 新添加\" href=\"#新添加-1\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-546f4fe70faa2236c0fbc2d486a83391\"\u003e\u003c/a\u003e社工(SET)\u0026amp;\u0026amp;钓鱼\u0026amp;\u0026amp;鱼叉攻击\u003c/h1\u003e\u003ca id=\"user-content-社工set钓鱼鱼叉攻击\" class=\"anchor\" aria-label=\"Permalink: 社工(SET)\u0026amp;\u0026amp;钓鱼\u0026amp;\u0026amp;鱼叉攻击\" href=\"#社工set钓鱼鱼叉攻击\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-3e622bff3199cf22fe89db026b765cd4\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-5\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-5\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-ce734598055ad3885d45d0b35d2bf0d7\"\u003e\u003c/a\u003e未分类-SET\u003c/h3\u003e\u003ca id=\"user-content-未分类-set\" class=\"anchor\" aria-label=\"Permalink: 未分类-SET\" href=\"#未分类-set\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1363\u003c/strong\u003e星][2m] [CSS] \u003ca href=\"https://github.com/undeadsec/socialfish\"\u003eundeadsec/socialfish\u003c/a\u003e 网络钓鱼培训与信息收集\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#05ab1b75266fddafc7195f5b395e4d99\"\u003e侦察-\u0026gt;工具-\u0026gt;未分类-OSINT\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e754\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/threatexpress/domainhunter\"\u003ethreatexpress/domainhunter\u003c/a\u003e Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#05ab1b75266fddafc7195f5b395e4d99\"\u003e侦察-\u0026gt;工具-\u0026gt;未分类-OSINT\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e658\u003c/strong\u003e星][18d] [Py] \u003ca href=\"https://github.com/thewhiteh4t/seeker\"\u003ethewhiteh4t/seeker\u003c/a\u003e Accurately Locate Smartphones using Social Engineering\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e342\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/raikia/uhoh365\"\u003eraikia/uhoh365\u003c/a\u003e A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is unthrottled, and is incredibly useful for social engineering assessments to find which emails exist and which don't.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-f30507893511f89b19934e082a54023e\"\u003e\u003c/a\u003e社工\u003c/h3\u003e\u003ca id=\"user-content-社工\" class=\"anchor\" aria-label=\"Permalink: 社工\" href=\"#社工\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e4966\u003c/strong\u003e星][4d] [Py] \u003ca href=\"https://github.com/trustedsec/social-engineer-toolkit\"\u003etrustedsec/social-engineer-toolkit\u003c/a\u003e The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-290e9ae48108d21d6d8b9ea9e74d077d\"\u003e\u003c/a\u003e钓鱼\u0026amp;\u0026amp;Phish\u003c/h3\u003e\u003ca id=\"user-content-钓鱼phish\" class=\"anchor\" aria-label=\"Permalink: 钓鱼\u0026amp;\u0026amp;Phish\" href=\"#钓鱼phish\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e8455\u003c/strong\u003e星][8d] [Py] \u003ca href=\"https://github.com/wifiphisher/wifiphisher\"\u003ewifiphisher/wifiphisher\u003c/a\u003e 流氓AP框架, 用于RedTeam和Wi-Fi安全测试\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#d4efda1853b2cb0909727188116a2a8c\"\u003e无线-\u0026gt;未分类-WiFi\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e4242\u003c/strong\u003e星][4d] [Go] \u003ca href=\"https://github.com/gophish/gophish\"\u003egophish/gophish\u003c/a\u003e 网络钓鱼工具包\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2829\u003c/strong\u003e星][2m] [Go] \u003ca href=\"https://github.com/kgretzky/evilginx2\"\u003ekgretzky/evilginx2\u003c/a\u003e 独立的MITM攻击工具,用于登录凭证钓鱼,可绕过双因素认证\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2131\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/elceef/dnstwist\"\u003eelceef/dnstwist\u003c/a\u003e 域名置换引擎,用于检测打字错误,网络钓鱼和企业间谍活动\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#a695111d8e30d645354c414cb27b7843\"\u003e侦察-\u0026gt;工具-\u0026gt;DNS\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1400\u003c/strong\u003e星][9m] [JS] \u003ca href=\"https://github.com/anttiviljami/browser-autofill-phishing\"\u003eanttiviljami/browser-autofill-phishing\u003c/a\u003e A simple demo of phishing by abusing the browser autofill feature\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1369\u003c/strong\u003e星][10m] [HTML] \u003ca href=\"https://github.com/thelinuxchoice/blackeye\"\u003ethelinuxchoice/blackeye\u003c/a\u003e The most complete Phishing Tool, with 32 templates +1 customizable\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1019\u003c/strong\u003e星][22d] [Py] \u003ca href=\"https://github.com/securestate/king-phisher\"\u003esecurestate/king-phisher\u003c/a\u003e Phishing Campaign Toolkit\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e996\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/x0rz/phishing_catcher\"\u003ex0rz/phishing_catcher\u003c/a\u003e 使用Certstream 捕获钓鱼域名\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e968\u003c/strong\u003e星][19d] [HTML] \u003ca href=\"https://github.com/darksecdevelopers/hiddeneye\"\u003edarksecdevelopers/hiddeneye\u003c/a\u003e Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e918\u003c/strong\u003e星][8m] [HTML] \u003ca href=\"https://github.com/thelinuxchoice/shellphish\"\u003ethelinuxchoice/shellphish\u003c/a\u003e 针对18个社交媒体的钓鱼工具:Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers, Gitlab, Pinterest\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e842\u003c/strong\u003e星][1m] [PHP] \u003ca href=\"https://github.com/Raikia/FiercePhish\"\u003eraikia/fiercephish\u003c/a\u003e FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e537\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/shellphish/driller\"\u003eshellphish/driller\u003c/a\u003e augmenting AFL with symbolic execution!\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e460\u003c/strong\u003e星][4d] [Py] \u003ca href=\"https://github.com/angr/rex\"\u003eangr/rex\u003c/a\u003e Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e351\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/tatanus/spf\"\u003etatanus/spf\u003c/a\u003e SpeedPhishing Framework\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e300\u003c/strong\u003e星][11m] [Py] \u003ca href=\"https://github.com/Mr-Un1k0d3r/CatMyPhish\"\u003emr-un1k0d3r/catmyphish\u003c/a\u003e Search for categorized domain\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e274\u003c/strong\u003e星][1m] [Go] \u003ca href=\"https://github.com/muraenateam/muraena\"\u003emuraenateam/muraena\u003c/a\u003e Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e242\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/atexio/mercure\"\u003eatexio/mercure\u003c/a\u003e 对员工进行网络钓鱼的培训\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e233\u003c/strong\u003e星][1y] [Jupyter Notebook] \u003ca href=\"https://github.com/wesleyraptor/streamingphish\"\u003ewesleyraptor/streamingphish\u003c/a\u003e 使用受监督的机器学习, 从证书透明度(Certificate Transparency)日志中检测钓鱼域名\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e228\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/duo-labs/isthislegit\"\u003eduo-labs/isthislegit\u003c/a\u003e 收集、分析和回复网络钓鱼邮件的框架\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e218\u003c/strong\u003e星][9m] [Go] \u003ca href=\"https://github.com/joncooperworks/judas\"\u003ejoncooperworks/judas\u003c/a\u003e a phishing proxy\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e207\u003c/strong\u003e星][3d] [JS] \u003ca href=\"https://github.com/409h/etheraddresslookup\"\u003e409h/etheraddresslookup\u003c/a\u003e Adds links to strings that look like Ethereum addresses to your favourite blockchain explorer. Adds protection against private key phishing. Offers custom site bookmarks.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e205\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/dionach/phemail\"\u003edionach/phemail\u003c/a\u003e PhEmail is a python open source phishing email tool that automates the process of sending phishing emails as part of a social engineering test\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-ab3e6e6526d058e35c7091d8801ebf3a\"\u003e\u003c/a\u003e鱼叉攻击\u003c/h3\u003e\u003ca id=\"user-content-鱼叉攻击\" class=\"anchor\" aria-label=\"Permalink: 鱼叉攻击\" href=\"#鱼叉攻击\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-8f6c7489870c7358c39c920c83fa2b6b\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-5\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-5\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-d7e332e9e235fd5a60687800f5ce184c\"\u003e\u003c/a\u003e新添加的\u003c/h3\u003e\u003ca id=\"user-content-新添加的-5\" class=\"anchor\" aria-label=\"Permalink: 新添加的\" href=\"#新添加的-5\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-dc89c90b80529c1f62f413288bca89c4\"\u003e\u003c/a\u003e环境配置\u0026amp;\u0026amp;分析系统\u003c/h1\u003e\u003ca id=\"user-content-环境配置分析系统\" class=\"anchor\" aria-label=\"Permalink: 环境配置\u0026amp;\u0026amp;分析系统\" href=\"#环境配置分析系统\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-9763d00cbe773aa10502dbe258f9c385\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-6\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-6\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-f5a7a43f964b2c50825f3e2fee5078c8\"\u003e\u003c/a\u003e未分类-Env\u003c/h3\u003e\u003ca id=\"user-content-未分类-env\" class=\"anchor\" aria-label=\"Permalink: 未分类-Env\" href=\"#未分类-env\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1678\u003c/strong\u003e星][2d] [HTML] \u003ca href=\"https://github.com/clong/detectionlab\"\u003eclong/detectionlab\u003c/a\u003e Vagrant \u0026amp; Packer scripts to build a lab environment complete with security tooling and logging best practices\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1433\u003c/strong\u003e星][11d] [Go] \u003ca href=\"https://github.com/crazy-max/windowsspyblocker\"\u003ecrazy-max/windowsspyblocker\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1308\u003c/strong\u003e星][18d] [C] \u003ca href=\"https://github.com/cisco-talos/pyrebox\"\u003ecisco-talos/pyrebox\u003c/a\u003e 逆向沙箱,基于QEMU,Python Scriptable\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1229\u003c/strong\u003e星][11m] [JS] \u003ca href=\"https://github.com/mame82/p4wnp1_aloa\"\u003emame82/p4wnp1_aloa\u003c/a\u003e 将 Rapsberry Pi Zero W 转变成灵活的渗透平台\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e827\u003c/strong\u003e星][1m] \u003ca href=\"https://github.com/redhuntlabs/redhunt-os\"\u003eredhuntlabs/redhunt-os\u003c/a\u003e Virtual Machine for Adversary Emulation and Threat Hunting\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e800\u003c/strong\u003e星][3m] \u003ca href=\"https://github.com/sh4hin/androl4b\"\u003esh4hin/androl4b\u003c/a\u003e 用于评估Android应用程序,逆向工程和恶意软件分析的虚拟机\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e564\u003c/strong\u003e星][6m] [Ruby] \u003ca href=\"https://github.com/sliim/pentest-env\"\u003esliim/pentest-env\u003c/a\u003e Pentest environment deployer (kali linux + targets) using vagrant and chef.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e214\u003c/strong\u003e星][12m] [Shell] \u003ca href=\"https://github.com/proxycannon/proxycannon-ng\"\u003eproxycannon/proxycannon-ng\u003c/a\u003e 使用多个云环境构建私人僵尸网络, 用于渗透测试和RedTeaming\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-cf07b04dd2db1deedcf9ea18c05c83e0\"\u003e\u003c/a\u003eLinux-Distro\u003c/h3\u003e\u003ca id=\"user-content-linux-distro\" class=\"anchor\" aria-label=\"Permalink: Linux-Distro\" href=\"#linux-distro\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e2927\u003c/strong\u003e星][4d] [Py] \u003ca href=\"https://github.com/trustedsec/ptf\"\u003etrustedsec/ptf\u003c/a\u003e 创建基于Debian/Ubuntu/ArchLinux的渗透测试环境\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2375\u003c/strong\u003e星][18d] \u003ca href=\"https://github.com/security-onion-solutions/security-onion\"\u003esecurity-onion-solutions/security-onion\u003c/a\u003e Linux distro for intrusion detection, enterprise security monitoring, and log management\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1489\u003c/strong\u003e星][t] [Shell] \u003ca href=\"https://github.com/blackarch/blackarch\"\u003eblackarch/blackarch\u003c/a\u003e BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e347\u003c/strong\u003e星][t] [Shell] \u003ca href=\"https://github.com/archstrike/archstrike\"\u003earchstrike/archstrike\u003c/a\u003e An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-4709b10a8bb691204c0564a3067a0004\"\u003e\u003c/a\u003e环境自动配置\u0026amp;\u0026amp;自动安装\u003c/h3\u003e\u003ca id=\"user-content-环境自动配置自动安装\" class=\"anchor\" aria-label=\"Permalink: 环境自动配置\u0026amp;\u0026amp;自动安装\" href=\"#环境自动配置自动安装\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e3142\u003c/strong\u003e星][3m] [PS] \u003ca href=\"https://github.com/fireeye/commando-vm\"\u003efireeye/commando-vm\u003c/a\u003e Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. \u003ca href=\"mailto:commandovm@fireeye.com\"\u003ecommandovm@fireeye.com\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1748\u003c/strong\u003e星][2m] [PS] \u003ca href=\"https://github.com/fireeye/flare-vm\"\u003efireeye/flare-vm\u003c/a\u003e 火眼发布用于 Windows 恶意代码分析的虚拟机:FLARE VM\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-6454949c0d580904537643b8f4cd5a6b\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-6\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-6\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-873294ea77bc292b6fc4cfb2f9b40049\"\u003e\u003c/a\u003e新添加的\u003c/h3\u003e\u003ca id=\"user-content-新添加的-6\" class=\"anchor\" aria-label=\"Permalink: 新添加的\" href=\"#新添加的-6\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-c49aef477cf3397f97f8b72185c3d100\"\u003e\u003c/a\u003e密码\u0026amp;\u0026amp;凭证\u0026amp;\u0026amp;认证\u003c/h1\u003e\u003ca id=\"user-content-密码凭证认证\" class=\"anchor\" aria-label=\"Permalink: 密码\u0026amp;\u0026amp;凭证\u0026amp;\u0026amp;认证\" href=\"#密码凭证认证\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-862af330f45f21fbb0d495837fc7e879\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-7\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-7\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-20bf2e2fefd6de7aadbf0774f4921824\"\u003e\u003c/a\u003e未分类-Password\u003c/h3\u003e\u003ca id=\"user-content-未分类-password\" class=\"anchor\" aria-label=\"Permalink: 未分类-Password\" href=\"#未分类-password\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e4889\u003c/strong\u003e星][13d] [Py] \u003ca href=\"https://github.com/alessandroz/lazagne\"\u003ealessandroz/lazagne\u003c/a\u003e Credentials recovery project\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1457\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/d4vinci/cr3dov3r\"\u003ed4vinci/cr3dov3r\u003c/a\u003e Know the dangers of credential reuse attacks.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1384\u003c/strong\u003e星][24d] [Shell] \u003ca href=\"https://github.com/drduh/pwd.sh\"\u003edrduh/pwd.sh\u003c/a\u003e GPG symmetric password manager\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1282\u003c/strong\u003e星][19d] [Py] \u003ca href=\"https://github.com/pyauth/pyotp\"\u003epyauth/pyotp\u003c/a\u003e Python One-Time Password Library\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1034\u003c/strong\u003e星][1y] [PS] \u003ca href=\"https://github.com/danmcinerney/icebreaker\"\u003edanmcinerney/icebreaker\u003c/a\u003e Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1000\u003c/strong\u003e星][10d] [Ruby] \u003ca href=\"https://github.com/mdp/rotp\"\u003emdp/rotp\u003c/a\u003e Ruby One Time Password library\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e913\u003c/strong\u003e星][7d] [C] \u003ca href=\"https://github.com/cossacklabs/themis\"\u003ecossacklabs/themis\u003c/a\u003e 用于存储或通信的加密库,可用于Swift, ObjC, Android, С++, JS, Python, Ruby, PHP, Go。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e814\u003c/strong\u003e星][9m] [Py] \u003ca href=\"https://github.com/nccgroup/featherduster\"\u003enccgroup/featherduster\u003c/a\u003e 自动化的密码分析工具,模块化\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e805\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/hellman/xortool\"\u003ehellman/xortool\u003c/a\u003e 分析多字节异或密码\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e740\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/ricterz/genpass\"\u003ericterz/genpass\u003c/a\u003e 中国特色的弱口令生成器\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e523\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/unode/firefox_decrypt\"\u003eunode/firefox_decrypt\u003c/a\u003e Firefox Decrypt is a tool to extract passwords from Mozilla (Firefox/Thunderbird/SeaMonkey) profiles\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e507\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/byt3bl33d3r/sprayingtoolkit\"\u003ebyt3bl33d3r/sprayingtoolkit\u003c/a\u003e Scripts to make password spraying attacks against Lync/S4B \u0026amp; OWA a lot quicker, less painful and more efficient\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e485\u003c/strong\u003e星][1y] [JS] \u003ca href=\"https://github.com/emilbayes/secure-password\"\u003eemilbayes/secure-password\u003c/a\u003e Making Password storage safer for all\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e454\u003c/strong\u003e星][1y] [Go] \u003ca href=\"https://github.com/ncsa/ssh-auditor\"\u003encsa/ssh-auditor\u003c/a\u003e 扫描网络中的弱SSH密码\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e399\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/x899/chrome_password_grabber\"\u003ex899/chrome_password_grabber\u003c/a\u003e Get unencrypted 'Saved Password' from Google Chrome\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e391\u003c/strong\u003e星][1y] [Shell] \u003ca href=\"https://github.com/mthbernardes/sshlooter\"\u003emthbernardes/sshlooter\u003c/a\u003e Script to steal passwords from ssh.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e369\u003c/strong\u003e星][4m] [Ruby] \u003ca href=\"https://github.com/digininja/pipal\"\u003edigininja/pipal\u003c/a\u003e Pipal, THE password analyser\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e361\u003c/strong\u003e星][21d] [Py] \u003ca href=\"https://github.com/davidtavarez/pwndb\"\u003edavidtavarez/pwndb\u003c/a\u003e Search for leaked credentials\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e341\u003c/strong\u003e星][11m] [C] \u003ca href=\"https://github.com/1clickman/3snake\"\u003e1clickman/3snake\u003c/a\u003e reads memory from sshd and sudo system calls that handle password based authentication\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e295\u003c/strong\u003e星][6m] [C#] \u003ca href=\"https://github.com/raikia/credninja\"\u003eraikia/credninja\u003c/a\u003e A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale via SMB, plus now with a user hunter\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e290\u003c/strong\u003e星][3m] [JS] \u003ca href=\"https://github.com/kspearrin/ff-password-exporter\"\u003ekspearrin/ff-password-exporter\u003c/a\u003e Easily export your passwords from Firefox.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e289\u003c/strong\u003e星][7m] [Shell] \u003ca href=\"https://github.com/Greenwolf/Spray\"\u003egreenwolf/spray\u003c/a\u003e A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e286\u003c/strong\u003e星][17d] [Py] \u003ca href=\"https://github.com/xfreed0m/rdpassspray\"\u003exfreed0m/rdpassspray\u003c/a\u003e Python3 tool to perform password spraying using RDP\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e256\u003c/strong\u003e星][5m] [C] \u003ca href=\"https://github.com/rub-syssec/omen\"\u003erub-syssec/omen\u003c/a\u003e Ordered Markov ENumerator - Password Guesser\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e212\u003c/strong\u003e星][4m] [Ruby] \u003ca href=\"https://github.com/bdmac/strong_password\"\u003ebdmac/strong_password\u003c/a\u003e Entropy-based password strength checking for Ruby and Rails.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-86dc226ae8a71db10e4136f4b82ccd06\"\u003e\u003c/a\u003e密码\u003c/h3\u003e\u003ca id=\"user-content-密码\" class=\"anchor\" aria-label=\"Permalink: 密码\" href=\"#密码\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e7035\u003c/strong\u003e星][t] [C] \u003ca href=\"https://github.com/hashcat/hashcat\"\u003ehashcat/hashcat\u003c/a\u003e 世界上最快最先进的密码恢复工具\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#12abc279c69d1fcf10692b9cb89bcdf7\"\u003e后渗透-\u0026gt;工具-\u0026gt;未分类-post-exp\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e5173\u003c/strong\u003e星][1y] [JS] \u003ca href=\"https://github.com/samyk/poisontap\"\u003esamyk/poisontap\u003c/a\u003e Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero \u0026amp; Node.js.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3209\u003c/strong\u003e星][2d] [C] \u003ca href=\"https://github.com/magnumripper/johntheripper\"\u003emagnumripper/johntheripper\u003c/a\u003e This is the official repo for John the Ripper, \"Jumbo\" version. The \"bleeding-jumbo\" branch is based on 1.9.0-Jumbo-1 which was released on May 14, 2019. An import of the \"core\" version of john this jumbo was based on (or newer) is found in the \"master\" branch (CVS:\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2583\u003c/strong\u003e星][2m] [C] \u003ca href=\"https://github.com/huntergregal/mimipenguin\"\u003ehuntergregal/mimipenguin\u003c/a\u003e dump 当前Linux用户的登录密码\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1162\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/mebus/cupp\"\u003emebus/cupp\u003c/a\u003e Common User Passwords Profiler (CUPP)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e874\u003c/strong\u003e星][5m] [Go] \u003ca href=\"https://github.com/fireeye/gocrack\"\u003efireeye/gocrack\u003c/a\u003e 火眼开源的密码破解工具,可以跨多个 GPU 服务器执行任务\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e852\u003c/strong\u003e星][3m] [Go] \u003ca href=\"https://github.com/ukhomeoffice/repo-security-scanner\"\u003eukhomeoffice/repo-security-scanner\u003c/a\u003e CLI tool that finds secrets accidentally committed to a git repo, eg passwords, private keys\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e652\u003c/strong\u003e星][1y] [Java] \u003ca href=\"https://github.com/faizann24/wifi-bruteforcer-fsecurify\"\u003efaizann24/wifi-bruteforcer-fsecurify\u003c/a\u003e Android app,无需 Root 即可爆破 Wifi 密码\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e602\u003c/strong\u003e星][7m] [C] \u003ca href=\"https://github.com/hashcat/hashcat-utils\"\u003ehashcat/hashcat-utils\u003c/a\u003e Small utilities that are useful in advanced password cracking\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e598\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/brannondorsey/passgan\"\u003ebrannondorsey/passgan\u003c/a\u003e A Deep Learning Approach for Password Guessing (\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e593\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/thewhiteh4t/pwnedornot\"\u003ethewhiteh4t/pwnedornot\u003c/a\u003e OSINT Tool for Finding Passwords of Compromised Email Addresses\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e493\u003c/strong\u003e星][1y] [PS] \u003ca href=\"https://github.com/dafthack/domainpasswordspray\"\u003edafthack/domainpasswordspray\u003c/a\u003e DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will automatically generate the userlist from the domain. BE VERY CAREFUL NOT TO LOCKOUT ACCOUNTS!\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e353\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/iphelix/pack\"\u003eiphelix/pack\u003c/a\u003e PACK (Password Analysis and Cracking Kit)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e334\u003c/strong\u003e星][2m] [CSS] \u003ca href=\"https://github.com/guyoung/captfencoder\"\u003eguyoung/captfencoder\u003c/a\u003e CaptfEncoder是一款跨平台网络安全工具套件,提供网络安全相关编码转换、古典密码、密码学、特殊编码等工具,并聚合各类在线工具。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e333\u003c/strong\u003e星][26d] [JS] \u003ca href=\"https://github.com/auth0/repo-supervisor\"\u003eauth0/repo-supervisor\u003c/a\u003e Serverless工具,在pull请求中扫描源码,搜索密码及其他秘密\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-764122f9a7cf936cd9bce316b09df5aa\"\u003e\u003c/a\u003e认证\u0026amp;\u0026amp;Authenticate\u003c/h3\u003e\u003ca id=\"user-content-认证authenticate\" class=\"anchor\" aria-label=\"Permalink: 认证\u0026amp;\u0026amp;Authenticate\" href=\"#认证authenticate\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e901\u003c/strong\u003e星][1m] [Go] \u003ca href=\"https://github.com/smallstep/cli\"\u003esmallstep/cli\u003c/a\u003e 🧰 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e665\u003c/strong\u003e星][9m] [C] \u003ca href=\"https://github.com/samdenty/Wi-PWN\"\u003esamdenty/wi-pwn\u003c/a\u003e performs deauth attacks on cheap Arduino boards\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e298\u003c/strong\u003e星][15d] [Java] \u003ca href=\"https://github.com/shred/acme4j\"\u003eshred/acme4j\u003c/a\u003e a protocol that a certificate authority (CA) and an applicant can use to automate the process of verification and certificate issuance\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e281\u003c/strong\u003e星][4m] [Java] \u003ca href=\"https://github.com/ztosec/secscan-authcheck\"\u003eztosec/secscan-authcheck\u003c/a\u003e 越权检测工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e214\u003c/strong\u003e星][1y] [C#] \u003ca href=\"https://github.com/leechristensen/spoolsample\"\u003eleechristensen/spoolsample\u003c/a\u003e PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as well.\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-5fda419e854b390c8361d347f48607ce\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-7\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-7\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-776c034543a65be69c061d1aafce3127\"\u003e\u003c/a\u003e新添加的\u003c/h3\u003e\u003ca id=\"user-content-新添加的-7\" class=\"anchor\" aria-label=\"Permalink: 新添加的\" href=\"#新添加的-7\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-43b0310ac54c147a62c545a2b0f4bce2\"\u003e\u003c/a\u003e辅助周边\u003c/h1\u003e\u003ca id=\"user-content-辅助周边\" class=\"anchor\" aria-label=\"Permalink: 辅助周边\" href=\"#辅助周边\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-569887799ee0148230cc5d7bf98e96d0\"\u003e\u003c/a\u003e未分类-Assist\u003c/h2\u003e\u003ca id=\"user-content-未分类-assist\" class=\"anchor\" aria-label=\"Permalink: 未分类-Assist\" href=\"#未分类-assist\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e26031\u003c/strong\u003e星][3d] [Py] \u003ca href=\"https://github.com/certbot/certbot\"\u003ecertbot/certbot\u003c/a\u003e Certbot is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server. It can also act as a client for any other CA that uses the ACME protocol.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e7784\u003c/strong\u003e星][2d] [JS] \u003ca href=\"https://github.com/gchq/cyberchef\"\u003egchq/cyberchef\u003c/a\u003e The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e4909\u003c/strong\u003e星][3m] [Rust] \u003ca href=\"https://github.com/sharkdp/hexyl\"\u003esharkdp/hexyl\u003c/a\u003e 命令行中查看hex\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e4402\u003c/strong\u003e星][] [JS] \u003ca href=\"https://github.com/cure53/dompurify\"\u003ecure53/dompurify\u003c/a\u003e a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3239\u003c/strong\u003e星][7m] [HTML] \u003ca href=\"https://github.com/leizongmin/js-xss\"\u003eleizongmin/js-xss\u003c/a\u003e Sanitize untrusted HTML (to prevent XSS) with a configuration specified by a Whitelist\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3097\u003c/strong\u003e星][8d] [Shell] \u003ca href=\"https://github.com/trimstray/htrace.sh\"\u003etrimstray/htrace.sh\u003c/a\u003e My simple Swiss Army knife for http/https troubleshooting and profiling.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1223\u003c/strong\u003e星][1y] [Go] \u003ca href=\"https://github.com/cloudflare/redoctober\"\u003ecloudflare/redoctober\u003c/a\u003e Go server for two-man rule style file encryption and decryption.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1022\u003c/strong\u003e星][9m] [Go] \u003ca href=\"https://github.com/maliceio/malice\"\u003emaliceio/malice\u003c/a\u003e 开源版的VirusTotal\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e508\u003c/strong\u003e星][6d] [Py] \u003ca href=\"https://github.com/certtools/intelmq\"\u003ecerttools/intelmq\u003c/a\u003e IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e481\u003c/strong\u003e星][5m] [JS] \u003ca href=\"https://github.com/ehrishirajsharma/swiftnessx\"\u003eehrishirajsharma/swiftnessx\u003c/a\u003e A cross-platform note-taking \u0026amp; target-tracking app for penetration testers.\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-86d5daccb4ed597e85a0ec9c87f3c66f\"\u003e\u003c/a\u003eTLS\u0026amp;\u0026amp;SSL\u0026amp;\u0026amp;HTTPS\u003c/h2\u003e\u003ca id=\"user-content-tlssslhttps\" class=\"anchor\" aria-label=\"Permalink: TLS\u0026amp;\u0026amp;SSL\u0026amp;\u0026amp;HTTPS\" href=\"#tlssslhttps\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e22020\u003c/strong\u003e星][23d] [Go] \u003ca href=\"https://github.com/filosottile/mkcert\"\u003efilosottile/mkcert\u003c/a\u003e A simple zero-config tool to make locally trusted development certificates with any names you'd like.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e4322\u003c/strong\u003e星][12d] [Py] \u003ca href=\"https://github.com/diafygi/acme-tiny\"\u003ediafygi/acme-tiny\u003c/a\u003e A tiny script to issue and renew TLS certs from Let's Encrypt\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1694\u003c/strong\u003e星][9d] [HTML] \u003ca href=\"https://github.com/chromium/badssl.com\"\u003echromium/badssl.com\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1230\u003c/strong\u003e星][1m] [Go] \u003ca href=\"https://github.com/jsha/minica\"\u003ejsha/minica\u003c/a\u003e minica is a small, simple CA intended for use in situations where the CA operator also operates each host where a certificate will be used.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1211\u003c/strong\u003e星][2d] [Go] \u003ca href=\"https://github.com/smallstep/certificates\"\u003esmallstep/certificates\u003c/a\u003e 私有的证书颁发机构(X.509和SSH)和ACME服务器,用于安全的自动证书管理,因此您可以在SSH和SSO处使用TLS\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e833\u003c/strong\u003e星][10m] [Py] \u003ca href=\"https://github.com/ietf-wg-acme/acme\"\u003eietf-wg-acme/acme\u003c/a\u003e A protocol for automating certificate issuance\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e740\u003c/strong\u003e星][21d] [Shell] \u003ca href=\"https://github.com/dokku/dokku-letsencrypt\"\u003edokku/dokku-letsencrypt\u003c/a\u003e BETA: Automatic Let's Encrypt TLS Certificate installation for dokku\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e691\u003c/strong\u003e星][5m] [C++] \u003ca href=\"https://github.com/google/certificate-transparency\"\u003egoogle/certificate-transparency\u003c/a\u003e Auditing for TLS certificates.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e512\u003c/strong\u003e星][1m] [Java] \u003ca href=\"https://github.com/rub-nds/tls-attacker\"\u003erub-nds/tls-attacker\u003c/a\u003e TLS-Attacker is a Java-based framework for analyzing TLS libraries. It is developed by the Ruhr University Bochum (\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e469\u003c/strong\u003e星][3m] [Go] \u003ca href=\"https://github.com/square/certigo\"\u003esquare/certigo\u003c/a\u003e A utility to examine and validate certificates in a variety of formats\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e279\u003c/strong\u003e星][1m] [Shell] \u003ca href=\"https://github.com/trimstray/mkchain\"\u003etrimstray/mkchain\u003c/a\u003e 建立从根证书到最终用户证书的有效的SSL证书链, 修复不完整的证书链并下载所有缺少的CA证书\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e229\u003c/strong\u003e星][7m] [Shell] \u003ca href=\"https://github.com/r00t-3xp10it/meterpreter_paranoid_mode-ssl\"\u003er00t-3xp10it/meterpreter_paranoid_mode-ssl\u003c/a\u003e Meterpreter Paranoid Mode - SSL/TLS connections\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e225\u003c/strong\u003e星][12m] [Shell] \u003ca href=\"https://github.com/nviso-be/magisktrustusercerts\"\u003enviso-be/magisktrustusercerts\u003c/a\u003e A Magisk module that automatically adds user certificates to the system root CA store\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-946d766c6a0fb23b480ff59d4029ec71\"\u003e\u003c/a\u003e防护\u0026amp;\u0026amp;Defense\u003c/h1\u003e\u003ca id=\"user-content-防护defense\" class=\"anchor\" aria-label=\"Permalink: 防护\u0026amp;\u0026amp;Defense\" href=\"#防护defense\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-0abd611fc3e9a4d9744865ca6e47a6b2\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-8\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-8\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-7a277f8b0e75533e0b50d93c902fb351\"\u003e\u003c/a\u003e未分类-Defense\u003c/h3\u003e\u003ca id=\"user-content-未分类-defense\" class=\"anchor\" aria-label=\"Permalink: 未分类-Defense\" href=\"#未分类-defense\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e9862\u003c/strong\u003e星][9m] \u003ca href=\"https://github.com/imthenachoman/how-to-secure-a-linux-server\"\u003eimthenachoman/how-to-secure-a-linux-server\u003c/a\u003e An evolving how-to guide for securing a Linux server.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e747\u003c/strong\u003e星][12m] [Py] \u003ca href=\"https://github.com/infobyte/spoilerwall\"\u003einfobyte/spoilerwall\u003c/a\u003e Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e657\u003c/strong\u003e星][6m] [TeX] \u003ca href=\"https://github.com/bettercrypto/applied-crypto-hardening\"\u003ebettercrypto/applied-crypto-hardening\u003c/a\u003e Best Current Practices regarding secure online communication and configuration of services using cryptography.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e639\u003c/strong\u003e星][2d] [Py] \u003ca href=\"https://github.com/binarydefense/artillery\"\u003ebinarydefense/artillery\u003c/a\u003e The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e589\u003c/strong\u003e星][21d] [Ruby] \u003ca href=\"https://github.com/dev-sec/ansible-ssh-hardening\"\u003edev-sec/ansible-ssh-hardening\u003c/a\u003e This Ansible role provides numerous security-related ssh configurations, providing all-round base protection.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e570\u003c/strong\u003e星][29d] [Py] \u003ca href=\"https://github.com/graphenex/graphenex\"\u003egraphenex/graphenex\u003c/a\u003e Automated System Hardening Framework\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e499\u003c/strong\u003e星][8m] \u003ca href=\"https://github.com/ernw/hardening\"\u003eernw/hardening\u003c/a\u003e Repository of Hardening Guides\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e241\u003c/strong\u003e星][20d] [Py] \u003ca href=\"https://github.com/a13xp0p0v/kconfig-hardened-check\"\u003ea13xp0p0v/kconfig-hardened-check\u003c/a\u003e A script for checking the hardening options in the Linux kernel config\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e217\u003c/strong\u003e星][27d] [Puppet] \u003ca href=\"https://github.com/dev-sec/puppet-os-hardening\"\u003edev-sec/puppet-os-hardening\u003c/a\u003e This puppet module provides numerous security-related configurations, providing all-round base protection.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-784ea32a3f4edde1cd424b58b17e7269\"\u003e\u003c/a\u003eWAF\u003c/h3\u003e\u003ca id=\"user-content-waf\" class=\"anchor\" aria-label=\"Permalink: WAF\" href=\"#waf\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e5094\u003c/strong\u003e星][2m] [Lua] \u003ca href=\"https://github.com/alexazhou/verynginx\"\u003ealexazhou/verynginx\u003c/a\u003e A very powerful and friendly nginx base on lua-nginx-module( openresty ) which provide WAF, Control Panel, and Dashboards.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3294\u003c/strong\u003e星][3m] [C] \u003ca href=\"https://github.com/nbs-system/naxsi\"\u003enbs-system/naxsi\u003c/a\u003e NAXSI is an open-source, high performance, low rules maintenance WAF for NGINX\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3207\u003c/strong\u003e星][1m] [C++] \u003ca href=\"https://github.com/spiderlabs/modsecurity\"\u003espiderlabs/modsecurity\u003c/a\u003e ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx that is developed by Trustwave's SpiderLabs. It has a robust event-based programming language which provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring, logging and real-time analys…\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e619\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/3xp10it/xwaf\"\u003e3xp10it/xwaf\u003c/a\u003e waf 自动爆破(绕过)工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e617\u003c/strong\u003e星][4m] [Lua] \u003ca href=\"https://github.com/jx-sec/jxwaf\"\u003ejx-sec/jxwaf\u003c/a\u003e JXWAF(锦衣盾)是一款基于openresty(nginx+lua)开发的web应用防火墙\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e552\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/s0md3v/Blazy\"\u003es0md3v/blazy\u003c/a\u003e Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e540\u003c/strong\u003e星][4d] [Go] \u003ca href=\"https://github.com/janusec/janusec\"\u003ejanusec/janusec\u003c/a\u003e Janusec Application Gateway, a Golang based application security solution which provides WAF (Web Application Firewall), CC attack defense, unified web administration portal, private key protection, web routing and scalable load balancing.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e481\u003c/strong\u003e星][8m] [Java] \u003ca href=\"https://github.com/chengdedeng/waf\"\u003echengdedeng/waf\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e452\u003c/strong\u003e星][3d] [PHP] \u003ca href=\"https://github.com/akaunting/firewall\"\u003eakaunting/firewall\u003c/a\u003e Web Application Firewall (WAF) package for Laravel\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e433\u003c/strong\u003e星][9m] [Py] \u003ca href=\"https://github.com/aws-samples/aws-waf-sample\"\u003eaws-samples/aws-waf-sample\u003c/a\u003e This repository contains example scripts and sets of rules for the AWS WAF service. Please be aware that the applicability of these examples to specific workloads may vary.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e423\u003c/strong\u003e星][6d] [Py] \u003ca href=\"https://github.com/awslabs/aws-waf-security-automations\"\u003eawslabs/aws-waf-security-automations\u003c/a\u003e This solution automatically deploys a single web access control list (web ACL) with a set of AWS WAF rules designed to filter common web-based attacks.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e415\u003c/strong\u003e星][5d] [C#] \u003ca href=\"https://github.com/jbe2277/waf\"\u003ejbe2277/waf\u003c/a\u003e Win Application Framework (WAF) is a lightweight Framework that helps you to create well structured XAML Applications.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e412\u003c/strong\u003e星][11m] [C] \u003ca href=\"https://github.com/titansec/openwaf\"\u003etitansec/openwaf\u003c/a\u003e Web security protection system based on openresty\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e384\u003c/strong\u003e星][6d] [PHP] \u003ca href=\"https://github.com/terrylinooo/shieldon\"\u003eterrylinooo/shieldon\u003c/a\u003e Web Application Firewall (WAF) for PHP.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e248\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/warflop/cloudbunny\"\u003ewarflop/cloudbunny\u003c/a\u003e CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search engines to search domain information: Shodan, Censys and Zoomeye.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e216\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/stamparm/identywaf\"\u003estamparm/identywaf\u003c/a\u003e Blind WAF identification tool\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e209\u003c/strong\u003e星][7m] [C] \u003ca href=\"https://github.com/coolervoid/raptor_waf\"\u003ecoolervoid/raptor_waf\u003c/a\u003e Raptor - WAF - Web application firewall using DFA [ Current version ] - Beta\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-ce6532938f729d4c9d66a5c75d1676d3\"\u003e\u003c/a\u003e防火墙\u0026amp;\u0026amp;FireWall\u003c/h3\u003e\u003ca id=\"user-content-防火墙firewall\" class=\"anchor\" aria-label=\"Permalink: 防火墙\u0026amp;\u0026amp;FireWall\" href=\"#防火墙firewall\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e4209\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/evilsocket/opensnitch\"\u003eevilsocket/opensnitch\u003c/a\u003e opensnitch:Little Snitch 应用程序防火墙的 GNU/Linux 版本。(Little Snitch:Mac操作系统的应用程序防火墙,能防止应用程序在你不知道的情况下自动访问网络)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3283\u003c/strong\u003e星][11d] [ObjC] \u003ca href=\"https://github.com/objective-see/lulu\"\u003eobjective-see/lulu\u003c/a\u003e LuLu is the free macOS firewall\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1542\u003c/strong\u003e星][6d] [Java] \u003ca href=\"https://github.com/ukanth/afwall\"\u003eukanth/afwall\u003c/a\u003e AFWall+ (Android Firewall +) - iptables based firewall for Android\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1095\u003c/strong\u003e星][3m] [PHP] \u003ca href=\"https://github.com/antonioribeiro/firewall\"\u003eantonioribeiro/firewall\u003c/a\u003e Firewall package for Laravel applications\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1049\u003c/strong\u003e星][8d] [Shell] \u003ca href=\"https://github.com/firehol/firehol\"\u003efirehol/firehol\u003c/a\u003e A firewall for humans...\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e852\u003c/strong\u003e星][20d] \u003ca href=\"https://github.com/trimstray/iptables-essentials\"\u003etrimstray/iptables-essentials\u003c/a\u003e Common Firewall Rules and Commands.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e567\u003c/strong\u003e星][7m] [Go] \u003ca href=\"https://github.com/sysdream/chashell\"\u003esysdream/chashell\u003c/a\u003e Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e468\u003c/strong\u003e星][6m] [Shell] \u003ca href=\"https://github.com/vincentcox/bypass-firewalls-by-dns-history\"\u003evincentcox/bypass-firewalls-by-dns-history\u003c/a\u003e Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e279\u003c/strong\u003e星][11d] [Shell] \u003ca href=\"https://github.com/geerlingguy/ansible-role-firewall\"\u003egeerlingguy/ansible-role-firewall\u003c/a\u003e Ansible Role - iptables Firewall configuration.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e261\u003c/strong\u003e星][2m] [C#] \u003ca href=\"https://github.com/wokhansoft/wfn\"\u003ewokhansoft/wfn\u003c/a\u003e Windows Firewall Notifier extends the default Windows embedded firewall by allowing to handle and notify about outgoing connections, offers real time connections monitoring, connections map, bandwidth usage monitoring and more...\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e260\u003c/strong\u003e星][4d] [Ruby] \u003ca href=\"https://github.com/puppetlabs/puppetlabs-firewall\"\u003epuppetlabs/puppetlabs-firewall\u003c/a\u003e Puppet Firewall Module\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e240\u003c/strong\u003e星][7d] [Shell] \u003ca href=\"https://github.com/essandess/macos-fortress\"\u003eessandess/macos-fortress\u003c/a\u003e Firewall and Privatizing Proxy for Trackers, Attackers, Malware, Adware, and Spammers with Anti-Virus On-Demand and On-Access Scanning (PF, squid, privoxy, hphosts, dshield, emergingthreats, hostsfile, PAC file, clamav)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e220\u003c/strong\u003e星][1y] [Go] \u003ca href=\"https://github.com/maksadbek/tcpovericmp\"\u003emaksadbek/tcpovericmp\u003c/a\u003e TCP implementation over ICMP protocol to bypass firewalls\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-ff3e0b52a1477704b5f6a94ccf784b9a\"\u003e\u003c/a\u003eIDS\u0026amp;\u0026amp;IPS\u003c/h3\u003e\u003ca id=\"user-content-idsips\" class=\"anchor\" aria-label=\"Permalink: IDS\u0026amp;\u0026amp;IPS\" href=\"#idsips\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e2938\u003c/strong\u003e星][4d] [Zeek] \u003ca href=\"https://github.com/zeek/zeek\"\u003ezeek/zeek\u003c/a\u003e Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2852\u003c/strong\u003e星][10d] [C] \u003ca href=\"https://github.com/ossec/ossec-hids\"\u003eossec/ossec-hids\u003c/a\u003e 入侵检测系统\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1622\u003c/strong\u003e星][2m] [Go] \u003ca href=\"https://github.com/ysrc/yulong-hids\"\u003eysrc/yulong-hids\u003c/a\u003e 一款由 YSRC 开源的主机入侵检测系统\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1325\u003c/strong\u003e星][9d] [C] \u003ca href=\"https://github.com/OISF/suricata\"\u003eoisf/suricata\u003c/a\u003e a network IDS, IPS and NSM engine\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e581\u003c/strong\u003e星][5d] [Py] \u003ca href=\"https://github.com/0kee-team/watchad\"\u003e0kee-team/watchad\u003c/a\u003e AD Security Intrusion Detection System\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e512\u003c/strong\u003e星][5m] [C] \u003ca href=\"https://github.com/decaf-project/DECAF\"\u003edecaf-project/decaf\u003c/a\u003e DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidScope is now an extension to DECAF.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e499\u003c/strong\u003e星][8m] [Shell] \u003ca href=\"https://github.com/stamusnetworks/selks\"\u003estamusnetworks/selks\u003c/a\u003e A Suricata based IDS/IPS distro\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e383\u003c/strong\u003e星][7m] \u003ca href=\"https://github.com/jnusimba/androidsecnotes\"\u003ejnusimba/androidsecnotes\u003c/a\u003e some learning notes about Android Security\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e298\u003c/strong\u003e星][4d] [C] \u003ca href=\"https://github.com/EBWi11/AgentSmith-HIDS\"\u003eebwi11/agentsmith-hids\u003c/a\u003e By Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e248\u003c/strong\u003e星][1y] [Perl] \u003ca href=\"https://github.com/mrash/psad\"\u003emrash/psad\u003c/a\u003e iptables 的入侵检测和日志分析\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e225\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/secureworks/dalton\"\u003esecureworks/dalton\u003c/a\u003e 使用预定义/指定的规则, 针对IDS传感器(例如Snort/Suricata)进行网络数据包捕获\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-6543c237786d1f334d375f4d9acdeee4\"\u003e\u003c/a\u003e隐私保护\u0026amp;\u0026amp;Privacy\u003c/h3\u003e\u003ca id=\"user-content-隐私保护privacy\" class=\"anchor\" aria-label=\"Permalink: 隐私保护\u0026amp;\u0026amp;Privacy\" href=\"#隐私保护privacy\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e3236\u003c/strong\u003e星][5m] [Go] \u003ca href=\"https://github.com/meshbird/meshbird\"\u003emeshbird/meshbird\u003c/a\u003e cloud-native multi-region multi-cloud decentralized private networking\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1069\u003c/strong\u003e星][20d] [Py] \u003ca href=\"https://github.com/yelp/detect-secrets\"\u003eyelp/detect-secrets\u003c/a\u003e An enterprise friendly way of detecting and preventing secrets in code.\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-5aac7367edfef7c63fc95afd6762b773\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-8\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-8\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-04aac0e81b87788343930e9dbf01ba9c\"\u003e\u003c/a\u003e新添加的\u003c/h3\u003e\u003ca id=\"user-content-新添加的-8\" class=\"anchor\" aria-label=\"Permalink: 新添加的\" href=\"#新添加的-8\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-52b481533d065d9e80cfd3cca9d91c7f\"\u003e\u003c/a\u003eSoftwareDefinedRadio\u003c/h1\u003e\u003ca id=\"user-content-softwaredefinedradio\" class=\"anchor\" aria-label=\"Permalink: SoftwareDefinedRadio\" href=\"#softwaredefinedradio\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-015984b1dae0c9aa03b3aa74ea449f3f\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-9\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-9\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e934\u003c/strong\u003e星][1y] [C++] \u003ca href=\"https://github.com/miek/inspectrum\"\u003emiek/inspectrum\u003c/a\u003e analysing captured signals, primarily from software-defined radio receivers.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e454\u003c/strong\u003e星][10m] [C] \u003ca href=\"https://github.com/martinmarinov/tempestsdr\"\u003emartinmarinov/tempestsdr\u003c/a\u003e Remote video eavesdropping using a software-defined radio platform\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e369\u003c/strong\u003e星][4d] [Py] \u003ca href=\"https://github.com/p1sec/qcsuper\"\u003ep1sec/qcsuper\u003c/a\u003e QCSuper is a tool communicating with Qualcomm-based phones and modems, allowing to capture raw 2G/3G/4G radio frames, among other things.\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-043e62cc373eb3e7b3910b622cf220d8\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-9\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-9\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-507f1a48f4709abb1c6b0d2689fd15e6\"\u003e\u003c/a\u003eLOLBin\u0026amp;\u0026amp;LOLScript\u003c/h1\u003e\u003ca id=\"user-content-lolbinlolscript\" class=\"anchor\" aria-label=\"Permalink: LOLBin\u0026amp;\u0026amp;LOLScript\" href=\"#lolbinlolscript\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-ec32edc7b3e441f29c70f6e9bca0174a\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-10\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-10\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1433\u003c/strong\u003e星][1m] [XSLT] \u003ca href=\"https://github.com/lolbas-project/lolbas\"\u003elolbas-project/lolbas\u003c/a\u003e Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1349\u003c/strong\u003e星][1y] [XSLT] \u003ca href=\"https://github.com/api0cradle/lolbas\"\u003eapi0cradle/lolbas\u003c/a\u003e Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-9bffad3ac781090ab31d4013bf858dd9\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-10\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-10\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-e25d233159b1dc40898ff0c74574f790\"\u003e\u003c/a\u003e日志\u0026amp;\u0026amp;Log\u003c/h1\u003e\u003ca id=\"user-content-日志log\" class=\"anchor\" aria-label=\"Permalink: 日志\u0026amp;\u0026amp;Log\" href=\"#日志log\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-13df0f4d5c7a1386b329fd9e43d8fc15\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-11\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-11\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-06e7d46942d5159d19aa5c36f66f174a\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-11\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-11\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-9b026a07fdf243c6870ce91f00191214\"\u003e\u003c/a\u003e威胁狩猎\u0026amp;\u0026amp;ThreatHunt\u003c/h1\u003e\u003ca id=\"user-content-威胁狩猎threathunt\" class=\"anchor\" aria-label=\"Permalink: 威胁狩猎\u0026amp;\u0026amp;ThreatHunt\" href=\"#威胁狩猎threathunt\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-b911aad7512e253660092942e06d00ad\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-12\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-12\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-0b27f97199330c4945572a1f9c229000\"\u003e\u003c/a\u003e未分类\u003c/h3\u003e\u003ca id=\"user-content-未分类-4\" class=\"anchor\" aria-label=\"Permalink: 未分类\" href=\"#未分类-4\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1998\u003c/strong\u003e星][10d] [Py] \u003ca href=\"https://github.com/momosecurity/aswan\"\u003emomosecurity/aswan\u003c/a\u003e 陌陌风控系统静态规则引擎,零基础简易便捷的配置多种复杂规则,实时高效管控用户异常行为。\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-f613271a55b177f626b42b8c728a0b1c\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-12\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-12\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-3828e67170e5db714c9c16f663b42a5e\"\u003e\u003c/a\u003e新添加的\u003c/h3\u003e\u003ca id=\"user-content-新添加的-9\" class=\"anchor\" aria-label=\"Permalink: 新添加的\" href=\"#新添加的-9\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-d6b02213a74372407371f77dd6e39c99\"\u003e\u003c/a\u003eCrypto\u0026amp;\u0026amp;加密\u0026amp;\u0026amp;密码学\u003c/h1\u003e\u003ca id=\"user-content-crypto加密密码学\" class=\"anchor\" aria-label=\"Permalink: Crypto\u0026amp;\u0026amp;加密\u0026amp;\u0026amp;密码学\" href=\"#crypto加密密码学\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-41d260119ad54db2739a9ae393bd87a5\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-13\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-13\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e2151\u003c/strong\u003e星][5d] [Java] \u003ca href=\"https://github.com/google/wycheproof\"\u003egoogle/wycheproof\u003c/a\u003e Project Wycheproof tests crypto libraries against known attacks.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1077\u003c/strong\u003e星][3m] [C] \u003ca href=\"https://github.com/tpruvot/cpuminer-multi\"\u003etpruvot/cpuminer-multi\u003c/a\u003e crypto cpuminer (linux + windows)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e448\u003c/strong\u003e星][14d] [Py] \u003ca href=\"https://github.com/sidechannelmarvels/deadpool\"\u003esidechannelmarvels/deadpool\u003c/a\u003e Repository of various public white-box cryptographic implementations and their practical attacks.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e378\u003c/strong\u003e星][2m] [C++] \u003ca href=\"https://github.com/crypto2011/idr\"\u003ecrypto2011/idr\u003c/a\u003e Interactive Delphi Reconstructor\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e214\u003c/strong\u003e星][5m] [Shell] \u003ca href=\"https://github.com/cryptolok/crykex\"\u003ecryptolok/crykex\u003c/a\u003e Linux Memory Cryptographic Keys Extractor\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-cc043f672c90d4b834cdae80bfbe8851\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-13\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-13\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-8cb1c42a29fa3e8825a0f8fca780c481\"\u003e\u003c/a\u003e恶意代码\u0026amp;\u0026amp;Malware\u0026amp;\u0026amp;APT\u003c/h1\u003e\u003ca id=\"user-content-恶意代码malwareapt\" class=\"anchor\" aria-label=\"Permalink: 恶意代码\u0026amp;\u0026amp;Malware\u0026amp;\u0026amp;APT\" href=\"#恶意代码malwareapt\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-e2fd0947924229d7de24b9902e1f54a0\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-14\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-14\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e2058\u003c/strong\u003e星][2m] [C++] \u003ca href=\"https://github.com/lordnoteworthy/al-khaser\"\u003elordnoteworthy/al-khaser\u003c/a\u003e 在野恶意软件使用的技术:虚拟机,仿真,调试器,沙盒检测。\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#2e40f2f1df5d7f93a7de47bf49c24a0e\"\u003e渗透-\u0026gt;工具-\u0026gt;未分类-Pentest\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e893\u003c/strong\u003e星][1m] \u003ca href=\"https://github.com/aptnotes/data\"\u003eaptnotes/data\u003c/a\u003e APTnotes data\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e219\u003c/strong\u003e星][8d] [JS] \u003ca href=\"https://github.com/strangerealintel/cyberthreatintel\"\u003estrangerealintel/cyberthreatintel\u003c/a\u003e Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e203\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/thesph1nx/absolutezero\"\u003ethesph1nx/absolutezero\u003c/a\u003e Python APT Backdoor 1.0.0.1\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-cfffc63a6302bd3aa79a0305ed7afd55\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-14\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-14\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-7d5d2d22121ed8456f0c79098f5012bb\"\u003e\u003c/a\u003eREST_API\u0026amp;\u0026amp;RESTFUL\u003c/h1\u003e\u003ca id=\"user-content-rest_apirestful\" class=\"anchor\" aria-label=\"Permalink: REST_API\u0026amp;\u0026amp;RESTFUL\" href=\"#rest_apirestful\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-3b127f2a89bc8d18b4ecb0d9c61f1d58\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-15\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-15\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1233\u003c/strong\u003e星][9m] [Py] \u003ca href=\"https://github.com/flipkart-incubator/astra\"\u003eflipkart-incubator/astra\u003c/a\u003e 自动化的REST API安全测试脚本\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-b16baff7e1b11133efecf1b5b6e10aab\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-15\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-15\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-ceb90405292daed9bb32ac20836c219a\"\u003e\u003c/a\u003e蓝牙\u0026amp;\u0026amp;Bluetooth\u003c/h1\u003e\u003ca id=\"user-content-蓝牙bluetooth\" class=\"anchor\" aria-label=\"Permalink: 蓝牙\u0026amp;\u0026amp;Bluetooth\" href=\"#蓝牙bluetooth\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-c72811e491c68f75ac2e7eb7afd3b01f\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-16\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-16\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e274\u003c/strong\u003e星][19d] [Py] \u003ca href=\"https://github.com/ghostop14/sparrow-wifi\"\u003eghostop14/sparrow-wifi\u003c/a\u003e Next-Gen GUI-based WiFi and Bluetooth Analyzer for Linux\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#d4efda1853b2cb0909727188116a2a8c\"\u003e无线-\u0026gt;未分类-WiFi\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e201\u003c/strong\u003e星][t] [Py] \u003ca href=\"https://github.com/seemoo-lab/internalblue\"\u003eseemoo-lab/internalblue\u003c/a\u003e Bluetooth experimentation framework for Broadcom and Cypress chips.\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-97e1bdced96fc7fcd502174d6eecee36\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-16\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-16\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-76df273beb09f6732b37a6420649179c\"\u003e\u003c/a\u003e浏览器\u0026amp;\u0026amp;browser\u003c/h1\u003e\u003ca id=\"user-content-浏览器browser\" class=\"anchor\" aria-label=\"Permalink: 浏览器\u0026amp;\u0026amp;browser\" href=\"#浏览器browser\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-47a03071becd6df66b469df7c2c6f9b5\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-17\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-17\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e4672\u003c/strong\u003e星][5d] [JS] \u003ca href=\"https://github.com/beefproject/beef\"\u003ebeefproject/beef\u003c/a\u003e The Browser Exploitation Framework Project\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e970\u003c/strong\u003e星][9m] [Py] \u003ca href=\"https://github.com/selwin/python-user-agents\"\u003eselwin/python-user-agents\u003c/a\u003e A Python library that provides an easy way to identify devices like mobile phones, tablets and their capabilities by parsing (browser) user agent strings.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e883\u003c/strong\u003e星][3m] \u003ca href=\"https://github.com/escapingbug/awesome-browser-exploit\"\u003eescapingbug/awesome-browser-exploit\u003c/a\u003e awesome list of browser exploitation tutorials\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e459\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/globaleaks/tor2web\"\u003eglobaleaks/tor2web\u003c/a\u003e Tor2web is an HTTP proxy software that enables access to Tor Hidden Services by mean of common web browsers\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e455\u003c/strong\u003e星][12d] \u003ca href=\"https://github.com/m1ghtym0/browser-pwn\"\u003em1ghtym0/browser-pwn\u003c/a\u003e An updated collection of resources targeting browser-exploitation.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e411\u003c/strong\u003e星][3m] [Pascal] \u003ca href=\"https://github.com/felipedaragon/sandcat\"\u003efelipedaragon/sandcat\u003c/a\u003e 为渗透测试和开发者准备的轻量级浏览器, 基于Chromium和Lua\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e320\u003c/strong\u003e星][3m] \u003ca href=\"https://github.com/xsleaks/xsleaks\"\u003exsleaks/xsleaks\u003c/a\u003e A collection of browser-based side channel attack vectors.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e232\u003c/strong\u003e星][1y] [C#] \u003ca href=\"https://github.com/djhohnstein/sharpweb\"\u003edjhohnstein/sharpweb\u003c/a\u003e .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e217\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/icsec/airpwn-ng\"\u003eicsec/airpwn-ng\u003c/a\u003e force the target's browser to do what we want\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-ca0c0694dc0aa87534e9bb19be4ee4d5\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-17\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-17\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-249c9d207ed6743e412c8c8bcd8a2927\"\u003e\u003c/a\u003eMitreATT\u0026amp;CK\u003c/h1\u003e\u003ca id=\"user-content-mitreattck\" class=\"anchor\" aria-label=\"Permalink: MitreATT\u0026amp;CK\" href=\"#mitreattck\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-a88c0c355b342b835fb42abee283bd71\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-18\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-18\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-6ab6835b55cf5c8462c4229a4a0ee94c\"\u003e\u003c/a\u003e未分类的\u003c/h3\u003e\u003ca id=\"user-content-未分类的\" class=\"anchor\" aria-label=\"Permalink: 未分类的\" href=\"#未分类的\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e2758\u003c/strong\u003e星][] [PS] \u003ca href=\"https://github.com/redcanaryco/atomic-red-team\"\u003eredcanaryco/atomic-red-team\u003c/a\u003e Small and highly portable detection tests based on MITRE's ATT\u0026amp;CK.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1396\u003c/strong\u003e星][2d] [Py] \u003ca href=\"https://github.com/mitre/caldera\"\u003emitre/caldera\u003c/a\u003e 自动化 adversary emulation 系统\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e568\u003c/strong\u003e星][6m] [HTML] \u003ca href=\"https://github.com/nshalabi/attack-tools\"\u003enshalabi/attack-tools\u003c/a\u003e Utilities for MITRE™ ATT\u0026amp;CK\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e491\u003c/strong\u003e星][1y] \u003ca href=\"https://github.com/bfuzzy/auditd-attack\"\u003ebfuzzy/auditd-attack\u003c/a\u003e A Linux Auditd rule set mapped to MITRE's Attack Framework\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e478\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/olafhartong/threathunting\"\u003eolafhartong/threathunting\u003c/a\u003e A Splunk app mapped to MITRE ATT\u0026amp;CK to guide your threat hunts\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e344\u003c/strong\u003e星][6m] \u003ca href=\"https://github.com/teoseller/osquery-attck\"\u003eteoseller/osquery-attck\u003c/a\u003e Mapping the MITRE ATT\u0026amp;CK Matrix with Osquery\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e333\u003c/strong\u003e星][t] [Py] \u003ca href=\"https://github.com/atc-project/atomic-threat-coverage\"\u003eatc-project/atomic-threat-coverage\u003c/a\u003e Actionable analytics designed to combat threats based on MITRE's ATT\u0026amp;CK.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e312\u003c/strong\u003e星][11m] [PS] \u003ca href=\"https://github.com/cyb3rward0g/invoke-attackapi\"\u003ecyb3rward0g/invoke-attackapi\u003c/a\u003e A PowerShell script to interact with the MITRE ATT\u0026amp;CK Framework via its own API\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e201\u003c/strong\u003e星][3m] \u003ca href=\"https://github.com/infosecn1nja/awesome-mitre-attack\"\u003einfosecn1nja/awesome-mitre-attack\u003c/a\u003e A curated list of awesome resources related to Mitre ATT\u0026amp;CK™ Framework\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-8512ba6c3855733a1474ca2f16153906\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-18\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-18\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-4b17464da487fbdf719e9a1482abf8f1\"\u003e\u003c/a\u003e新添加的\u003c/h3\u003e\u003ca id=\"user-content-新添加的-10\" class=\"anchor\" aria-label=\"Permalink: 新添加的\" href=\"#新添加的-10\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-de81f9dd79c219c876c1313cd97852ce\"\u003e\u003c/a\u003e破解\u0026amp;\u0026amp;Crack\u0026amp;\u0026amp;爆破\u0026amp;\u0026amp;BruteForce\u003c/h1\u003e\u003ca id=\"user-content-破解crack爆破bruteforce\" class=\"anchor\" aria-label=\"Permalink: 破解\u0026amp;\u0026amp;Crack\u0026amp;\u0026amp;爆破\u0026amp;\u0026amp;BruteForce\" href=\"#破解crack爆破bruteforce\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-73c3c9225523cbb05333246f23342846\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-19\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-19\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-53084c21ff85ffad3dd9ce445684978b\"\u003e\u003c/a\u003e未分类的\u003c/h3\u003e\u003ca id=\"user-content-未分类的-1\" class=\"anchor\" aria-label=\"Permalink: 未分类的\" href=\"#未分类的-1\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e3325\u003c/strong\u003e星][1m] [C] \u003ca href=\"https://github.com/vanhauser-thc/thc-hydra\"\u003evanhauser-thc/thc-hydra\u003c/a\u003e 网络登录破解,支持多种服务\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1925\u003c/strong\u003e星][29d] [Py] \u003ca href=\"https://github.com/lanjelot/patator\"\u003elanjelot/patator\u003c/a\u003e Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1096\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/landgrey/pydictor\"\u003elandgrey/pydictor\u003c/a\u003e A powerful and useful hacker dictionary builder for a brute-force attack\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e898\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/trustedsec/hate_crack\"\u003etrustedsec/hate_crack\u003c/a\u003e 使用HashCat 的自动哈希破解工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e894\u003c/strong\u003e星][29d] [Py] \u003ca href=\"https://github.com/ticarpi/jwt_tool\"\u003eticarpi/jwt_tool\u003c/a\u003e 测试,调整和破解JSON Web Token 的工具包\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e857\u003c/strong\u003e星][7m] [C] \u003ca href=\"https://github.com/brendan-rius/c-jwt-cracker\"\u003ebrendan-rius/c-jwt-cracker\u003c/a\u003e C 语言编写的 JWT 爆破工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e803\u003c/strong\u003e星][11m] [Py] \u003ca href=\"https://github.com/mak-/parameth\"\u003emak-/parameth\u003c/a\u003e 在文件中(例如PHP 文件)暴力搜索GET 和 POST 请求的参数\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e763\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/s0md3v/Hash-Buster\"\u003es0md3v/hash-buster\u003c/a\u003e Crack hashes in seconds.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e690\u003c/strong\u003e星][8m] [Shell] \u003ca href=\"https://github.com/1n3/brutex\"\u003e1n3/brutex\u003c/a\u003e Automatically brute force all services running on a target.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e687\u003c/strong\u003e星][9d] [JS] \u003ca href=\"https://github.com/animir/node-rate-limiter-flexible\"\u003eanimir/node-rate-limiter-flexible\u003c/a\u003e Node.js rate limit requests by key with atomic increments. Protection from DDoS and Brute-Force attacks in process Memory, Redis, MongoDb, Memcached, MySQL, PostgreSQL, Cluster or PM\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e659\u003c/strong\u003e星][5m] [C#] \u003ca href=\"https://github.com/shack2/snetcracker\"\u003eshack2/snetcracker\u003c/a\u003e 超级弱口令检查工具是一款Windows平台的弱口令审计工具,支持批量多线程检查,可快速发现弱密码、弱口令账号,密码支持和用户名结合进行检查,大大提高成功率,支持自定义服务端口和字典。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e588\u003c/strong\u003e星][6m] [PHP] \u003ca href=\"https://github.com/s3inlc/hashtopolis\"\u003es3inlc/hashtopolis\u003c/a\u003e Hashcat wrapper, 用于跨平台分布式Hash破解\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e563\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/pure-l0g1c/instagram\"\u003epure-l0g1c/instagram\u003c/a\u003e Bruteforce attack for Instagram\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e559\u003c/strong\u003e星][1y] [CSS] \u003ca href=\"https://github.com/hashview/hashview\"\u003ehashview/hashview\u003c/a\u003e 密码破解和分析工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e538\u003c/strong\u003e星][27d] [C] \u003ca href=\"https://github.com/nmap/ncrack\"\u003enmap/ncrack\u003c/a\u003e Ncrack network authentication tool\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e528\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/ypeleg/hungabunga\"\u003eypeleg/hungabunga\u003c/a\u003e HungaBunga: Brute-Force all sklearn models with all parameters using .fit .predict!\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e520\u003c/strong\u003e星][4m] \u003ca href=\"https://github.com/duyetdev/bruteforce-database\"\u003eduyetdev/bruteforce-database\u003c/a\u003e Bruteforce database\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e490\u003c/strong\u003e星][1y] [C] \u003ca href=\"https://github.com/mikeryan/crackle\"\u003emikeryan/crackle\u003c/a\u003e Crack and decrypt BLE encryption\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e451\u003c/strong\u003e星][6m] [JS] \u003ca href=\"https://github.com/coalfire-research/npk\"\u003ecoalfire-research/npk\u003c/a\u003e A mostly-serverless distributed hash cracking platform\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e442\u003c/strong\u003e星][1y] [C] \u003ca href=\"https://github.com/ryancdotorg/brainflayer\"\u003eryancdotorg/brainflayer\u003c/a\u003e A proof-of-concept cracker for cryptocurrency brainwallets and other low entropy key alogrithms.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e358\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/denyhosts/denyhosts\"\u003edenyhosts/denyhosts\u003c/a\u003e Automated host blocking from SSH brute force attacks\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e356\u003c/strong\u003e星][28d] [Java] \u003ca href=\"https://github.com/wycm/selenium-geetest-crack\"\u003ewycm/selenium-geetest-crack\u003c/a\u003e selenium破解滑动验证码\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e332\u003c/strong\u003e星][11m] [C] \u003ca href=\"https://github.com/e-ago/bitcracker\"\u003ee-ago/bitcracker\u003c/a\u003e BitLocker密码破解器\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e309\u003c/strong\u003e星][8d] [Go] \u003ca href=\"https://github.com/ropnop/kerbrute\"\u003eropnop/kerbrute\u003c/a\u003e A tool to perform Kerberos pre-auth bruteforcing\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e304\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/yzddmr6/webcrack\"\u003eyzddmr6/webcrack\u003c/a\u003e 网站后台弱口令/万能密码批量检测工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e292\u003c/strong\u003e星][12m] [Shell] \u003ca href=\"https://github.com/Cyb0r9/SocialBox\"\u003ecyb0r9/socialbox\u003c/a\u003e SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e286\u003c/strong\u003e星][9d] [Shell] \u003ca href=\"https://github.com/wuseman/emagnet\"\u003ewuseman/emagnet\u003c/a\u003e Emagnet is a tool for find leaked databases with 97.1% accurate to grab mail + password together from pastebin leaks. Support for brute forcing spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e275\u003c/strong\u003e星][1y] [C] \u003ca href=\"https://github.com/jmk-foofus/medusa\"\u003ejmk-foofus/medusa\u003c/a\u003e Medusa is a speedy, parallel, and modular, login brute-forcer.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e274\u003c/strong\u003e星][1y] [Shell] \u003ca href=\"https://github.com/thelinuxchoice/instainsane\"\u003ethelinuxchoice/instainsane\u003c/a\u003e Multi-threaded Instagram Brute Forcer (100 attemps at once)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e250\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/avramit/instahack\"\u003eavramit/instahack\u003c/a\u003e Instagram bruteforce tool\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e250\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/hsury/geetest3-crack\"\u003ehsury/geetest3-crack\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e248\u003c/strong\u003e星][11d] [Py] \u003ca href=\"https://github.com/evilmog/ntlmv1-multi\"\u003eevilmog/ntlmv1-multi\u003c/a\u003e 修改NTLMv1/NTLMv1-ESS/MSCHAPv1 Hask, 使其可以在hashcat中用DES模式14000破解\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e235\u003c/strong\u003e星][7m] [Py] \u003ca href=\"https://github.com/blark/aiodnsbrute\"\u003eblark/aiodnsbrute\u003c/a\u003e Python 3.5+ DNS asynchronous brute force utility\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e233\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/paradoxis/stegcracker\"\u003eparadoxis/stegcracker\u003c/a\u003e Steganography brute-force utility to uncover hidden data inside files\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e221\u003c/strong\u003e星][12m] [Py] \u003ca href=\"https://github.com/chris408/known_hosts-hashcat\"\u003echris408/known_hosts-hashcat\u003c/a\u003e A guide and tool for cracking ssh known_hosts files with hashcat\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e219\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/isaacdelly/plutus\"\u003eisaacdelly/plutus\u003c/a\u003e An automated bitcoin wallet collider that brute forces random wallet addresses\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e215\u003c/strong\u003e星][2m] [C] \u003ca href=\"https://github.com/hyc/fcrackzip\"\u003ehyc/fcrackzip\u003c/a\u003e A braindead program for cracking encrypted ZIP archives. Forked from\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e207\u003c/strong\u003e星][27d] [Py] \u003ca href=\"https://github.com/m4ll0k/smbrute\"\u003em4ll0k/smbrute\u003c/a\u003e SMB Protocol Bruteforce\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e206\u003c/strong\u003e星][5m] [Shell] \u003ca href=\"https://github.com/anshumanbh/brutesubs\"\u003eanshumanbh/brutesubs\u003c/a\u003e An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker Compose\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e204\u003c/strong\u003e星][1y] [JS] \u003ca href=\"https://github.com/lmammino/jwt-cracker\"\u003elmammino/jwt-cracker\u003c/a\u003e jwt-cracker:HS256JWT 令牌暴力破解工具,只对弱密码有效\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e200\u003c/strong\u003e星][1y] [ObjC] \u003ca href=\"https://github.com/sunweiliang/neteasemusiccrack\"\u003esunweiliang/neteasemusiccrack\u003c/a\u003e iOS网易云音乐 免VIP下载、去广告、去更新 无需越狱...\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-171e396a8965775c27602762c6638694\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-19\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-19\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-fc3c73849911ede2ce0d6d02f1f5b0b9\"\u003e\u003c/a\u003e新添加的\u003c/h3\u003e\u003ca id=\"user-content-新添加的-11\" class=\"anchor\" aria-label=\"Permalink: 新添加的\" href=\"#新添加的-11\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-96171a80e158b8752595329dd42e8bcf\"\u003e\u003c/a\u003e泄漏\u0026amp;\u0026amp;Breach\u0026amp;\u0026amp;Leak\u003c/h1\u003e\u003ca id=\"user-content-泄漏breachleak\" class=\"anchor\" aria-label=\"Permalink: 泄漏\u0026amp;\u0026amp;Breach\u0026amp;\u0026amp;Leak\" href=\"#泄漏breachleak\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-602bb9759b0b2ba5555b05b7218a2d6f\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-20\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-20\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-dc507c5be7c09e1e88af7a1ad91e2703\"\u003e\u003c/a\u003e未分类\u003c/h3\u003e\u003ca id=\"user-content-未分类-5\" class=\"anchor\" aria-label=\"Permalink: 未分类\" href=\"#未分类-5\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1437\u003c/strong\u003e星][6m] \u003ca href=\"https://github.com/gitguardian/apisecuritybestpractices\"\u003egitguardian/apisecuritybestpractices\u003c/a\u003e Resources to help you keep secrets (API keys, database credentials, certificates, ...) out of source code and remediate the issue in case of a leaked API key. Made available by GitGuardian.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1398\u003c/strong\u003e星][1y] [Go] \u003ca href=\"https://github.com/filosottile/whosthere\"\u003efilosottile/whosthere\u003c/a\u003e A ssh server that knows who you are\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1147\u003c/strong\u003e星][3m] [HTML] \u003ca href=\"https://github.com/cure53/httpleaks\"\u003ecure53/httpleaks\u003c/a\u003e HTTPLeaks - All possible ways, a website can leak HTTP requests\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e906\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/woj-ciech/leaklooker\"\u003ewoj-ciech/leaklooker\u003c/a\u003e Find open databases - Powered by Binaryedge.io\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e862\u003c/strong\u003e星][3d] [Py] \u003ca href=\"https://github.com/circl/ail-framework\"\u003ecircl/ail-framework\u003c/a\u003e AIL framework - Analysis Information Leak framework\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e728\u003c/strong\u003e星][2m] \u003ca href=\"https://github.com/streaak/keyhacks\"\u003estreaak/keyhacks\u003c/a\u003e Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e726\u003c/strong\u003e星][3d] [Py] \u003ca href=\"https://github.com/globaleaks/globaleaks\"\u003eglobaleaks/globaleaks\u003c/a\u003e The Open-Source Whistleblowing Software\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e301\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/wangyihang/githacker\"\u003ewangyihang/githacker\u003c/a\u003e a multiple threads tool to detect whether a site has git source leaks, and has the ability to download the site source to the local\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-fb3bccf80281e11fdf4ef06ddaa34566\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-20\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-20\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-339727dd5a006d7a5bd8f0173dc80bb9\"\u003e\u003c/a\u003e新添加的\u003c/h3\u003e\u003ca id=\"user-content-新添加的-12\" class=\"anchor\" aria-label=\"Permalink: 新添加的\" href=\"#新添加的-12\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-785ad72c95e857273dce41842f5e8873\"\u003e\u003c/a\u003e爬虫\u003c/h1\u003e\u003ca id=\"user-content-爬虫\" class=\"anchor\" aria-label=\"Permalink: 爬虫\" href=\"#爬虫\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-0f931c85ab54698d0bcfaf9a3e6dac73\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-21\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-21\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-442f9390fd56008def077a21ab65d4aa\"\u003e\u003c/a\u003e未分类\u003c/h3\u003e\u003ca id=\"user-content-未分类-6\" class=\"anchor\" aria-label=\"Permalink: 未分类\" href=\"#未分类-6\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e758\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/nekmo/dirhunt\"\u003enekmo/dirhunt\u003c/a\u003e Web爬虫, 针对搜索和分析路径做了优化\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#de63a029bda6a7e429af272f291bb769\"\u003e扫描器-\u0026gt;工具-\u0026gt;未分类-Scanner\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-23b008498c8b41ec3128bd9855660b7d\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-21\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-21\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-37ca6907aa42dfd32db5973ff9eec83d\"\u003e\u003c/a\u003e新添加的\u003c/h3\u003e\u003ca id=\"user-content-新添加的-13\" class=\"anchor\" aria-label=\"Permalink: 新添加的\" href=\"#新添加的-13\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-39931e776c23e80229368dfc6fd54770\"\u003e\u003c/a\u003e无线\u0026amp;\u0026amp;WiFi\u0026amp;\u0026amp;AP\u0026amp;\u0026amp;802.11\u003c/h1\u003e\u003ca id=\"user-content-无线wifiap80211\" class=\"anchor\" aria-label=\"Permalink: 无线\u0026amp;\u0026amp;WiFi\u0026amp;\u0026amp;AP\u0026amp;\u0026amp;802.11\" href=\"#无线wifiap80211\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-d4efda1853b2cb0909727188116a2a8c\"\u003e\u003c/a\u003e未分类-WiFi\u003c/h2\u003e\u003ca id=\"user-content-未分类-wifi\" class=\"anchor\" aria-label=\"Permalink: 未分类-WiFi\" href=\"#未分类-wifi\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e8455\u003c/strong\u003e星][8d] [Py] \u003ca href=\"https://github.com/wifiphisher/wifiphisher\"\u003ewifiphisher/wifiphisher\u003c/a\u003e 流氓AP框架, 用于RedTeam和Wi-Fi安全测试\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#290e9ae48108d21d6d8b9ea9e74d077d\"\u003e社工(SET)-\u0026gt;工具-\u0026gt;钓鱼\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e6140\u003c/strong\u003e星][10m] [Py] \u003ca href=\"https://github.com/schollz/howmanypeoplearearound\"\u003eschollz/howmanypeoplearearound\u003c/a\u003e 检测 Wifi 信号统计你周围的人数\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#05ab1b75266fddafc7195f5b395e4d99\"\u003e侦察-\u0026gt;工具-\u0026gt;未分类-OSINT\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e5824\u003c/strong\u003e星][2m] [C] \u003ca href=\"https://github.com/spacehuhn/esp8266_deauther\"\u003espacehuhn/esp8266_deauther\u003c/a\u003e 使用ESP8266 制作Wifi干扰器\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e4494\u003c/strong\u003e星][19d] [Py] \u003ca href=\"https://github.com/jopohl/urh\"\u003ejopohl/urh\u003c/a\u003e Universal Radio Hacker: investigate wireless protocols like a boss\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2989\u003c/strong\u003e星][5d] [JS] \u003ca href=\"https://github.com/evilsocket/pwnagotchi\"\u003eevilsocket/pwnagotchi\u003c/a\u003e 深度学习+Bettercap,基于A2C,从周围的WiFi环境中学习,以最大程度地利用捕获的WPA关键信息\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2939\u003c/strong\u003e星][4d] [Py] \u003ca href=\"https://github.com/danmcinerney/wifijammer\"\u003edanmcinerney/wifijammer\u003c/a\u003e 持续劫持范围内的Wifi客户端和AP\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2756\u003c/strong\u003e星][9m] [Py] \u003ca href=\"https://github.com/P0cL4bs/WiFi-Pumpkin\"\u003ep0cl4bs/wifi-pumpkin\u003c/a\u003e AP攻击框架, 创建虚假网络, 取消验证攻击、请求和凭证监控、透明代理、Windows更新攻击、钓鱼管理、ARP投毒、DNS嗅探、Pumpkin代理、动态图片捕获等\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2745\u003c/strong\u003e星][1y] [C] \u003ca href=\"https://github.com/vanhoefm/krackattacks-scripts\"\u003evanhoefm/krackattacks-scripts\u003c/a\u003e 检测客户端和AP是否受KRACK漏洞影响\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2476\u003c/strong\u003e星][3m] [C] \u003ca href=\"https://github.com/martin-ger/esp_wifi_repeater\"\u003emartin-ger/esp_wifi_repeater\u003c/a\u003e A full functional WiFi Repeater (correctly: a WiFi NAT Router)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2378\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/danmcinerney/lans.py\"\u003edanmcinerney/lans.py\u003c/a\u003e Inject code and spy on wifi users\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2303\u003c/strong\u003e星][2m] [Shell] \u003ca href=\"https://github.com/v1s1t0r1sh3r3/airgeddon\"\u003ev1s1t0r1sh3r3/airgeddon\u003c/a\u003e This is a multi-use bash script for Linux systems to audit wireless networks.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1924\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/derv82/wifite2\"\u003ederv82/wifite2\u003c/a\u003e 无线网络审计工具wifite 的升级版/重制版\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1881\u003c/strong\u003e星][5m] [Shell] \u003ca href=\"https://github.com/arismelachroinos/lscript\"\u003earismelachroinos/lscript\u003c/a\u003e 自动化无线渗透和Hacking 任务的脚本\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#fc8737aef0f59c3952d11749fe582dac\"\u003e渗透-\u0026gt;工具-\u0026gt;自动化\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1567\u003c/strong\u003e星][25d] [Py] \u003ca href=\"https://github.com/k4m4/kickthemout\"\u003ek4m4/kickthemout\u003c/a\u003e 使用ARP欺骗,将设备从网络中踢出去\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1424\u003c/strong\u003e星][19d] [C] \u003ca href=\"https://github.com/ettercap/ettercap\"\u003eettercap/ettercap\u003c/a\u003e Ettercap Project\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1286\u003c/strong\u003e星][4d] [C] \u003ca href=\"https://github.com/aircrack-ng/aircrack-ng\"\u003eaircrack-ng/aircrack-ng\u003c/a\u003e WiFi security auditing tools suite\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1280\u003c/strong\u003e星][2m] [C] \u003ca href=\"https://github.com/seemoo-lab/nexmon\"\u003eseemoo-lab/nexmon\u003c/a\u003e The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1057\u003c/strong\u003e星][2d] [C] \u003ca href=\"https://github.com/s0lst1c3/eaphammer\"\u003es0lst1c3/eaphammer\u003c/a\u003e 针对WPA2-Enterprise 网络的定向双重攻击(evil twin attacks)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1038\u003c/strong\u003e星][2m] [C] \u003ca href=\"https://github.com/t6x/reaver-wps-fork-t6x\"\u003et6x/reaver-wps-fork-t6x\u003c/a\u003e 攻击 Wi-Fi Protected Setup (WPS), 恢复 WPA/WPA2 密码\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1007\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/entropy1337/infernal-twin\"\u003eentropy1337/infernal-twin\u003c/a\u003e 自动化无线Hack 工具\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e994\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/tylous/sniffair\"\u003etylous/sniffair\u003c/a\u003e 无线渗透框架. 解析被动收集的无线数据, 执行复杂的无线攻击\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e991\u003c/strong\u003e星][2m] [C] \u003ca href=\"https://github.com/wiire-a/pixiewps\"\u003ewiire-a/pixiewps\u003c/a\u003e An offline Wi-Fi Protected Setup brute-force utility\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e985\u003c/strong\u003e星][1y] [HTML] \u003ca href=\"https://github.com/sensepost/mana\"\u003esensepost/mana\u003c/a\u003e \u003cem\u003eDEPRECATED\u003c/em\u003e mana toolkit for wifi rogue AP attacks and MitM\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e916\u003c/strong\u003e星][2m] [TeX] \u003ca href=\"https://github.com/ethereum/yellowpaper\"\u003eethereum/yellowpaper\u003c/a\u003e The \"Yellow Paper\": Ethereum's formal specification\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e854\u003c/strong\u003e星][2m] [C] \u003ca href=\"https://github.com/spacehuhn/wifi_ducky\"\u003espacehuhn/wifi_ducky\u003c/a\u003e Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e799\u003c/strong\u003e星][1y] [ObjC] \u003ca href=\"https://github.com/igrsoft/kismac2\"\u003eigrsoft/kismac2\u003c/a\u003e KisMAC is a free, open source wireless stumbling and security tool for Mac OS X.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e781\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/konradit/gopro-py-api\"\u003ekonradit/gopro-py-api\u003c/a\u003e Unofficial GoPro API Library for Python - connect to GoPro via WiFi.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e761\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/MisterBianco/BoopSuite\"\u003emisterbianco/boopsuite\u003c/a\u003e 无线审计与安全测试\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e685\u003c/strong\u003e星][11m] [ObjC] \u003ca href=\"https://github.com/unixpickle/jamwifi\"\u003eunixpickle/jamwifi\u003c/a\u003e A GUI, easy to use WiFi network jammer for Mac OS X\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e654\u003c/strong\u003e星][8m] [C] \u003ca href=\"https://github.com/wifidog/wifidog-gateway\"\u003ewifidog/wifidog-gateway\u003c/a\u003e Repository for the wifidog-gateway captive portal designed for embedded systems\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e617\u003c/strong\u003e星][4m] [C] \u003ca href=\"https://github.com/matheus-garbelini/esp32_esp8266_attacks\"\u003ematheus-garbelini/esp32_esp8266_attacks\u003c/a\u003e Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e527\u003c/strong\u003e星][] [C++] \u003ca href=\"https://github.com/cyberman54/esp32-paxcounter\"\u003ecyberman54/esp32-paxcounter\u003c/a\u003e Wifi \u0026amp; BLE driven passenger flow metering with cheap ESP32 boards\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e477\u003c/strong\u003e星][3m] [Shell] \u003ca href=\"https://github.com/staz0t/hashcatch\"\u003estaz0t/hashcatch\u003c/a\u003e Capture handshakes of nearby WiFi networks automatically\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e467\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/savio-code/fern-wifi-cracker\"\u003esavio-code/fern-wifi-cracker\u003c/a\u003e 无线安全审计和攻击工具, 能破解/恢复 WEP/WPA/WPSkey等\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e462\u003c/strong\u003e星][21d] [Java] \u003ca href=\"https://github.com/lennartkoopmann/nzyme\"\u003elennartkoopmann/nzyme\u003c/a\u003e 直接收集空中的802.11 管理帧,并将其发送到 Graylog,用于WiFi IDS, 监控, 及事件响应。(Graylog:开源的日志管理系统)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e419\u003c/strong\u003e星][9d] [Py] \u003ca href=\"https://github.com/jpaulmora/pyrit\"\u003ejpaulmora/pyrit\u003c/a\u003e The famous WPA precomputed cracker, Migrated from Google.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e397\u003c/strong\u003e星][4d] [C] \u003ca href=\"https://github.com/freifunk-gluon/gluon\"\u003efreifunk-gluon/gluon\u003c/a\u003e a modular framework for creating OpenWrt-based firmwares for wireless mesh nodes\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e384\u003c/strong\u003e星][5d] [C++] \u003ca href=\"https://github.com/bastibl/gr-ieee802-11\"\u003ebastibl/gr-ieee802-11\u003c/a\u003e IEEE 802.11 a/g/p Transceiver\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e327\u003c/strong\u003e星][3m] [Shell] \u003ca href=\"https://github.com/vanhoefm/modwifi\"\u003evanhoefm/modwifi\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e321\u003c/strong\u003e星][4d] [Java] \u003ca href=\"https://github.com/wiglenet/wigle-wifi-wardriving\"\u003ewiglenet/wigle-wifi-wardriving\u003c/a\u003e Nethugging client for Android, from wigle.net\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e313\u003c/strong\u003e星][4m] [TeX] \u003ca href=\"https://github.com/chronaeon/beigepaper\"\u003echronaeon/beigepaper\u003c/a\u003e Rewrite of the Yellowpaper in non-Yellowpaper syntax.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e278\u003c/strong\u003e星][3m] [C] \u003ca href=\"https://github.com/sensepost/hostapd-mana\"\u003esensepost/hostapd-mana\u003c/a\u003e SensePost's modified hostapd for wifi attacks.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e277\u003c/strong\u003e星][18d] [C] \u003ca href=\"https://github.com/br101/horst\"\u003ebr101/horst\u003c/a\u003e “horst” - lightweight IEEE802.11 wireless LAN analyzer with a text interface\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e274\u003c/strong\u003e星][19d] [Py] \u003ca href=\"https://github.com/ghostop14/sparrow-wifi\"\u003eghostop14/sparrow-wifi\u003c/a\u003e Next-Gen GUI-based WiFi and Bluetooth Analyzer for Linux\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#c72811e491c68f75ac2e7eb7afd3b01f\"\u003e蓝牙-\u0026gt;工具\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e260\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/wipi-hunter/pidense\"\u003ewipi-hunter/pidense\u003c/a\u003e Monitor illegal wireless network activities.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e255\u003c/strong\u003e星][1m] [C] \u003ca href=\"https://github.com/mame82/logitacker\"\u003emame82/logitacker\u003c/a\u003e Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e240\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/lionsec/wifresti\"\u003elionsec/wifresti\u003c/a\u003e Find your wireless network password in Windows , Linux and Mac OS\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e212\u003c/strong\u003e星][1m] [Shell] \u003ca href=\"https://github.com/aress31/wirespy\"\u003earess31/wirespy\u003c/a\u003e Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-8d233e2d068cce2b36fd0cf44d10f5d8\"\u003e\u003c/a\u003eWPS\u0026amp;\u0026amp;WPA\u0026amp;\u0026amp;WPA2\u003c/h2\u003e\u003ca id=\"user-content-wpswpawpa2\" class=\"anchor\" aria-label=\"Permalink: WPS\u0026amp;\u0026amp;WPA\u0026amp;\u0026amp;WPA2\" href=\"#wpswpawpa2\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e319\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/hash3lizer/wifibroot\"\u003ehash3lizer/wifibroot\u003c/a\u003e A WiFi Pentest Cracking tool for WPA/WPA2 (Handshake, PMKID, Cracking, EAPOL, Deauthentication)\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-8863b7ba27658d687a85585e43b23245\"\u003e\u003c/a\u003e802.11\u003c/h2\u003e\u003ca id=\"user-content-80211\" class=\"anchor\" aria-label=\"Permalink: 802.11\" href=\"#80211\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-80301821d0f5d8ec2dd3754ebb1b4b10\"\u003e\u003c/a\u003ePayload\u0026amp;\u0026amp;远控\u0026amp;\u0026amp;RAT\u003c/h1\u003e\u003ca id=\"user-content-payload远控rat\" class=\"anchor\" aria-label=\"Permalink: Payload\u0026amp;\u0026amp;远控\u0026amp;\u0026amp;RAT\" href=\"#payload远控rat\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-783f861b9f822127dba99acb55687cbb\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-22\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-22\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-6602e118e0245c83b13ff0db872c3723\"\u003e\u003c/a\u003e未分类-payload\u003c/h3\u003e\u003ca id=\"user-content-未分类-payload\" class=\"anchor\" aria-label=\"Permalink: 未分类-payload\" href=\"#未分类-payload\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e1829\u003c/strong\u003e星][6m] [Py] \u003ca href=\"https://github.com/veil-framework/veil\"\u003eveil-framework/veil\u003c/a\u003e generate metasploit payloads that bypass common anti-virus solutions\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1258\u003c/strong\u003e星][2m] [PS] \u003ca href=\"https://github.com/hak5/bashbunny-payloads\"\u003ehak5/bashbunny-payloads\u003c/a\u003e The Official Bash Bunny Payload Repository\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e982\u003c/strong\u003e星][2m] [C] \u003ca href=\"https://github.com/zardus/preeny\"\u003ezardus/preeny\u003c/a\u003e Some helpful preload libraries for pwning stuff.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e569\u003c/strong\u003e星][11m] [Py] \u003ca href=\"https://github.com/genetic-malware/ebowla\"\u003egenetic-malware/ebowla\u003c/a\u003e Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e546\u003c/strong\u003e星][3m] [C++] \u003ca href=\"https://github.com/screetsec/brutal\"\u003escreetsec/brutal\u003c/a\u003e Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e493\u003c/strong\u003e星][5d] [Py] \u003ca href=\"https://github.com/ctxis/cape\"\u003ectxis/cape\u003c/a\u003e Malware Configuration And Payload Extraction\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e343\u003c/strong\u003e星][8m] [Java] \u003ca href=\"https://github.com/portswigger/param-miner\"\u003eportswigger/param-miner\u003c/a\u003e identifies hidden, unlinked parameters. It's particularly useful for finding web cache poisoning vulnerabilities\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e339\u003c/strong\u003e星][12m] [JS] \u003ca href=\"https://github.com/gabemarshall/brosec\"\u003egabemarshall/brosec\u003c/a\u003e Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e288\u003c/strong\u003e星][1m] [Shell] \u003ca href=\"https://github.com/petit-miner/blueberry-pi\"\u003epetit-miner/blueberry-pi\u003c/a\u003e Blueberry PI\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e262\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/felixweyne/imaginaryc2\"\u003efelixweyne/imaginaryc2\u003c/a\u003e Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which captures HTTP requests towards selectively chosen domains/IPs. Additionally, the tool aims to make it easy to replay captured Command-and-Control responses/served payloads.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e246\u003c/strong\u003e星][13d] [C] \u003ca href=\"https://github.com/shchmue/lockpick_rcm\"\u003eshchmue/lockpick_rcm\u003c/a\u003e Nintendo Switch encryption key derivation bare metal RCM payload\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e244\u003c/strong\u003e星][7d] \u003ca href=\"https://github.com/cujanovic/open-redirect-payloads\"\u003ecujanovic/open-redirect-payloads\u003c/a\u003e Open Redirect Payloads\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e238\u003c/strong\u003e星][6d] \u003ca href=\"https://github.com/cujanovic/markdown-xss-payloads\"\u003ecujanovic/markdown-xss-payloads\u003c/a\u003e XSS payloads for exploiting Markdown syntax\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e235\u003c/strong\u003e星][5m] [Shell] \u003ca href=\"https://github.com/hak5/packetsquirrel-payloads\"\u003ehak5/packetsquirrel-payloads\u003c/a\u003e The Official Packet Squirrel Payload Repository\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e233\u003c/strong\u003e星][6m] \u003ca href=\"https://github.com/cr0hn/nosqlinjection_wordlists\"\u003ecr0hn/nosqlinjection_wordlists\u003c/a\u003e This repository contains payload to test NoSQL Injections\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e232\u003c/strong\u003e星][18d] [PS] \u003ca href=\"https://github.com/rsmudge/elevatekit\"\u003ersmudge/elevatekit\u003c/a\u003e The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e229\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/whitel1st/docem\"\u003ewhitel1st/docem\u003c/a\u003e Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e227\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/brent-stone/can_reverse_engineering\"\u003ebrent-stone/can_reverse_engineering\u003c/a\u003e Automated Payload Reverse Engineering Pipeline for the Controller Area Network (CAN) protocol\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e217\u003c/strong\u003e星][2m] [PHP] \u003ca href=\"https://github.com/zigoo0/jsonbee\"\u003ezigoo0/jsonbee\u003c/a\u003e A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e210\u003c/strong\u003e星][4d] [Py] \u003ca href=\"https://github.com/danmcinerney/msf-autoshell\"\u003edanmcinerney/msf-autoshell\u003c/a\u003e Feed the tool a .nessus file and it will automatically get you MSF shell\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-b5d99a78ddb383c208aae474fc2cb002\"\u003e\u003c/a\u003ePayload收集\u003c/h3\u003e\u003ca id=\"user-content-payload收集\" class=\"anchor\" aria-label=\"Permalink: Payload收集\" href=\"#payload收集\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e22055\u003c/strong\u003e星][20d] [PHP] \u003ca href=\"https://github.com/danielmiessler/seclists\"\u003edanielmiessler/seclists\u003c/a\u003e 多种类型资源收集:用户名、密码、URL、敏感数据类型、Fuzzing Payload、WebShell等\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e11389\u003c/strong\u003e星][3d] [Py] \u003ca href=\"https://github.com/swisskyrepo/payloadsallthethings\"\u003eswisskyrepo/payloadsallthethings\u003c/a\u003e A list of useful payloads and bypass for Web Application Security and Pentest/CTF\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2078\u003c/strong\u003e星][2m] \u003ca href=\"https://github.com/edoverflow/bugbounty-cheatsheet\"\u003eedoverflow/bugbounty-cheatsheet\u003c/a\u003e A list of interesting payloads, tips and tricks for bug bounty hunters.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2057\u003c/strong\u003e星][9m] [Shell] \u003ca href=\"https://github.com/foospidy/payloads\"\u003efoospidy/payloads\u003c/a\u003e web 攻击 Payload 集合\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1870\u003c/strong\u003e星][11m] [PHP] \u003ca href=\"https://github.com/bartblaze/php-backdoors\"\u003ebartblaze/php-backdoors\u003c/a\u003e A collection of PHP backdoors. For educational or testing purposes only.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e783\u003c/strong\u003e星][19d] \u003ca href=\"https://github.com/payloadbox/xss-payload-list\"\u003epayloadbox/xss-payload-list\u003c/a\u003e XSS 漏洞Payload列表\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e373\u003c/strong\u003e星][3m] \u003ca href=\"https://github.com/renwax23/xss-payloads\"\u003erenwax23/xss-payloads\u003c/a\u003e List of XSS Vectors/Payloads\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e298\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/thekingofduck/easyxsspayload\"\u003ethekingofduck/easyxsspayload\u003c/a\u003e XssPayload List . Usage:\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e262\u003c/strong\u003e星][4m] \u003ca href=\"https://github.com/payloadbox/command-injection-payload-list\"\u003epayloadbox/command-injection-payload-list\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-b318465d0d415e35fc0883e9894261d1\"\u003e\u003c/a\u003e远控\u0026amp;\u0026amp;RAT\u003c/h3\u003e\u003ca id=\"user-content-远控rat\" class=\"anchor\" aria-label=\"Permalink: 远控\u0026amp;\u0026amp;RAT\" href=\"#远控rat\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e5131\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/n1nj4sec/pupy\"\u003en1nj4sec/pupy\u003c/a\u003e Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1745\u003c/strong\u003e星][7m] [Smali] \u003ca href=\"https://github.com/ahmyth/ahmyth-android-rat\"\u003eahmyth/ahmyth-android-rat\u003c/a\u003e Android Remote Administration Tool\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1335\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/marten4n6/evilosx\"\u003emarten4n6/evilosx\u003c/a\u003e An evil RAT (Remote Administration Tool) for macOS / OS X.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e780\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/kevthehermit/ratdecoders\"\u003ekevthehermit/ratdecoders\u003c/a\u003e Python Decoders for Common Remote Access Trojans\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e599\u003c/strong\u003e星][1y] [PS] \u003ca href=\"https://github.com/FortyNorthSecurity/WMImplant\"\u003efortynorthsecurity/wmimplant\u003c/a\u003e This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported is translated into a WMI-equivalent for use on a network/remote machine. WMImplant is WMI based.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e500\u003c/strong\u003e星][6m] [Visual Basic .NET] \u003ca href=\"https://github.com/nyan-x-cat/lime-rat\"\u003enyan-x-cat/lime-rat\u003c/a\u003e LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e372\u003c/strong\u003e星][3m] [C++] \u003ca href=\"https://github.com/werkamsus/lilith\"\u003ewerkamsus/lilith\u003c/a\u003e Lilith, The Open Source C++ Remote Administration Tool (RAT)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e323\u003c/strong\u003e星][3d] [C#] \u003ca href=\"https://github.com/nyan-x-cat/asyncrat-c-sharp\"\u003enyan-x-cat/asyncrat-c-sharp\u003c/a\u003e Open-Source Remote Administration Tool For Windows C# (RAT)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e317\u003c/strong\u003e星][6m] [Py] \u003ca href=\"https://github.com/mvrozanti/rat-via-telegram\"\u003emvrozanti/rat-via-telegram\u003c/a\u003e Windows Remote Administration Tool via Telegram\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e293\u003c/strong\u003e星][4m] [C++] \u003ca href=\"https://github.com/yuanyuanxiang/simpleremoter\"\u003eyuanyuanxiang/simpleremoter\u003c/a\u003e 基于gh0st的远程控制器:实现了终端管理、进程管理、窗口管理、远程桌面、文件管理、语音管理、视频管理、服务管理、注册表管理等功能,优化全部代码及整理排版,修复内存泄漏缺陷,程序运行稳定。此项目初版见:\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-ad92f6b801a18934f1971e2512f5ae4f\"\u003e\u003c/a\u003ePayload生成\u003c/h3\u003e\u003ca id=\"user-content-payload生成\" class=\"anchor\" aria-label=\"Permalink: Payload生成\" href=\"#payload生成\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e3369\u003c/strong\u003e星][8d] [C] \u003ca href=\"https://github.com/screetsec/thefatrat\"\u003escreetsec/thefatrat\u003c/a\u003e Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#12abc279c69d1fcf10692b9cb89bcdf7\"\u003e后渗透-\u0026gt;工具-\u0026gt;未分类-post-exp\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2678\u003c/strong\u003e星][4m] [Java] \u003ca href=\"https://github.com/frohoff/ysoserial\"\u003efrohoff/ysoserial\u003c/a\u003e 生成会利用不安全的Java对象反序列化的Payload\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1792\u003c/strong\u003e星][t] [Shell] \u003ca href=\"https://github.com/leebaird/discover\"\u003eleebaird/discover\u003c/a\u003e 自定义的bash脚本, 用于自动化多个渗透测试任务, 包括: 侦查、扫描、解析、在Metasploit中创建恶意Payload和Listener\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#fc8737aef0f59c3952d11749fe582dac\"\u003e渗透-\u0026gt;工具-\u0026gt;自动化\u003c/a\u003e |\u003ca href=\"#01be61d5bb9f6f7199208ff0fba86b5d\"\u003e渗透-\u0026gt;工具-\u0026gt;Metasploit-\u0026gt;未分类-metasploit\u003c/a\u003e |\u003ca href=\"#05ab1b75266fddafc7195f5b395e4d99\"\u003e侦察-\u0026gt;工具-\u0026gt;未分类-OSINT\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1339\u003c/strong\u003e星][3m] [PS] \u003ca href=\"https://github.com/peewpw/invoke-psimage\"\u003epeewpw/invoke-psimage\u003c/a\u003e Encodes a PowerShell script in the pixels of a PNG file and generates a oneliner to execute\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1075\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/nccgroup/winpayloads\"\u003enccgroup/winpayloads\u003c/a\u003e Undetectable Windows Payload Generation\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1016\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/d4vinci/dr0p1t-framework\"\u003ed4vinci/dr0p1t-framework\u003c/a\u003e 创建免杀的Dropper\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e884\u003c/strong\u003e星][19d] [PHP] \u003ca href=\"https://github.com/ambionics/phpggc\"\u003eambionics/phpggc\u003c/a\u003e PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e872\u003c/strong\u003e星][10m] [Visual Basic .NET] \u003ca href=\"https://github.com/mdsecactivebreach/sharpshooter\"\u003emdsecactivebreach/sharpshooter\u003c/a\u003e Payload Generation Framework\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e836\u003c/strong\u003e星][28d] [C#] \u003ca href=\"https://github.com/pwntester/ysoserial.net\"\u003epwntester/ysoserial.net\u003c/a\u003e 生成Payload,恶意利用不安全的 .NET 对象反序列化\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e832\u003c/strong\u003e星][7m] [Go] \u003ca href=\"https://github.com/tiagorlampert/chaos\"\u003etiagorlampert/chaos\u003c/a\u003e a PoC that allow generate payloads and control remote operating system\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e752\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/oddcod3/phantom-evasion\"\u003eoddcod3/phantom-evasion\u003c/a\u003e Python AV evasion tool capable to generate FUD executable even with the most common 32 bit metasploit payload(exe/elf/dmg/apk)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e713\u003c/strong\u003e星][6d] [Py] \u003ca href=\"https://github.com/sevagas/macro_pack\"\u003esevagas/macro_pack\u003c/a\u003e 自动生成并混淆MS 文档, 用于渗透测试、演示、社会工程评估等\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e634\u003c/strong\u003e星][2d] [C] \u003ca href=\"https://github.com/thewover/donut\"\u003ethewover/donut\u003c/a\u003e Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e633\u003c/strong\u003e星][8m] [Shell] \u003ca href=\"https://github.com/g0tmi1k/msfpc\"\u003eg0tmi1k/msfpc\u003c/a\u003e MSFvenom Payload Creator (MSFPC)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e419\u003c/strong\u003e星][27d] [Perl] \u003ca href=\"https://github.com/chinarulezzz/pixload\"\u003echinarulezzz/pixload\u003c/a\u003e Image Payload Creating/Injecting tools\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e301\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/0xacb/viewgen\"\u003e0xacb/viewgen\u003c/a\u003e viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e278\u003c/strong\u003e星][1y] [Java] \u003ca href=\"https://github.com/ewilded/shelling\"\u003eewilded/shelling\u003c/a\u003e SHELLING - a comprehensive OS command injection payload generator\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e268\u003c/strong\u003e星][1y] [Shell] \u003ca href=\"https://github.com/abedalqaderswedan1/aswcrypter\"\u003eabedalqaderswedan1/aswcrypter\u003c/a\u003e An Bash\u0026amp;Python Script For Generating Payloads that Bypasses All Antivirus so far [FUD]\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-c45a90ab810d536a889e4e2dd45132f8\"\u003e\u003c/a\u003eBotnet\u0026amp;\u0026amp;僵尸网络\u003c/h3\u003e\u003ca id=\"user-content-botnet僵尸网络\" class=\"anchor\" aria-label=\"Permalink: Botnet\u0026amp;\u0026amp;僵尸网络\" href=\"#botnet僵尸网络\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e3747\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/malwaredllc/byob\"\u003emalwaredllc/byob\u003c/a\u003e BYOB (Build Your Own Botnet)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2163\u003c/strong\u003e星][1y] [C++] \u003ca href=\"https://github.com/maestron/botnets\"\u003emaestron/botnets\u003c/a\u003e This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e412\u003c/strong\u003e星][1m] [C++] \u003ca href=\"https://github.com/souhardya/uboat\"\u003esouhardya/uboat\u003c/a\u003e HTTP Botnet Project\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e328\u003c/strong\u003e星][6m] [Go] \u003ca href=\"https://github.com/saturnsvoid/gobot2\"\u003esaturnsvoid/gobot2\u003c/a\u003e Second Version of The GoBot Botnet, But more advanced.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-b6efee85bca01cde45faa45a92ece37f\"\u003e\u003c/a\u003e后门\u0026amp;\u0026amp;添加后门\u003c/h3\u003e\u003ca id=\"user-content-后门添加后门\" class=\"anchor\" aria-label=\"Permalink: 后门\u0026amp;\u0026amp;添加后门\" href=\"#后门添加后门\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e386\u003c/strong\u003e星][8m] [C] \u003ca href=\"https://github.com/zerosum0x0/smbdoor\"\u003ezerosum0x0/smbdoor\u003c/a\u003e Windows kernel backdoor via registering a malicious SMB handler\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e378\u003c/strong\u003e星][3m] [Shell] \u003ca href=\"https://github.com/screetsec/vegile\"\u003escreetsec/vegile\u003c/a\u003e This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e370\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/s0md3v/Cloak\"\u003es0md3v/cloak\u003c/a\u003e Cloak can backdoor any python script with some tricks.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e349\u003c/strong\u003e星][15d] [Shell] \u003ca href=\"https://github.com/r00t-3xp10it/backdoorppt\"\u003er00t-3xp10it/backdoorppt\u003c/a\u003e 将Exe格式Payload伪装成Doc(.ppt)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e348\u003c/strong\u003e星][9d] [C] \u003ca href=\"https://github.com/cr4sh/smmbackdoor\"\u003ecr4sh/smmbackdoor\u003c/a\u003e System Management Mode backdoor for UEFI\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e318\u003c/strong\u003e星][1y] [Ruby] \u003ca href=\"https://github.com/CarletonStuberg/browser-backdoor\"\u003ecarletonstuberg/browser-backdoor\u003c/a\u003e BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e301\u003c/strong\u003e星][4m] [C#] \u003ca href=\"https://github.com/mvelazc0/defcon27_csharp_workshop\"\u003emvelazc0/defcon27_csharp_workshop\u003c/a\u003e Writing custom backdoor payloads with C# - Defcon 27\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e205\u003c/strong\u003e星][9m] [C] \u003ca href=\"https://github.com/Paradoxis/PHP-Backdoor\"\u003eparadoxis/php-backdoor\u003c/a\u003e Your interpreter isn’t safe anymore  —  The PHP module backdoor\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-85bb0c28850ffa2b4fd44f70816db306\"\u003e\u003c/a\u003e混淆器\u0026amp;\u0026amp;Obfuscate\u003c/h3\u003e\u003ca id=\"user-content-混淆器obfuscate\" class=\"anchor\" aria-label=\"Permalink: 混淆器\u0026amp;\u0026amp;Obfuscate\" href=\"#混淆器obfuscate\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e3676\u003c/strong\u003e星][3d] [TS] \u003ca href=\"https://github.com/javascript-obfuscator/javascript-obfuscator\"\u003ejavascript-obfuscator/javascript-obfuscator\u003c/a\u003e A powerful obfuscator for JavaScript and Node.js\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2477\u003c/strong\u003e星][11m] [C#] \u003ca href=\"https://github.com/yck1509/confuserex\"\u003eyck1509/confuserex\u003c/a\u003e An open-source, free protector for .NET applications\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1397\u003c/strong\u003e星][9m] [PS] \u003ca href=\"https://github.com/danielbohannon/invoke-obfuscation\"\u003edanielbohannon/invoke-obfuscation\u003c/a\u003e PowerShell Obfuscator\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1147\u003c/strong\u003e星][8m] \u003ca href=\"https://github.com/HikariObfuscator/Hikari\"\u003ehikariobfuscator/hikari\u003c/a\u003e LLVM Obfuscator\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1021\u003c/strong\u003e星][1m] [Swift] \u003ca href=\"https://github.com/rockbruno/swiftshield\"\u003erockbruno/swiftshield\u003c/a\u003e wift/OBJ-C Obfuscator\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e676\u003c/strong\u003e星][1m] [C#] \u003ca href=\"https://github.com/obfuscar/obfuscar\"\u003eobfuscar/obfuscar\u003c/a\u003e Open source obfuscation tool for .NET assemblies\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e675\u003c/strong\u003e星][7m] [C++] \u003ca href=\"https://github.com/gossip-sjtu/armariris\"\u003egossip-sjtu/armariris\u003c/a\u003e 孤挺花(Armariris) -- 由上海交通大学密码与计算机安全实验室维护的LLVM混淆框架\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e653\u003c/strong\u003e星][6m] [Go] \u003ca href=\"https://github.com/yawning/obfs4\"\u003eyawning/obfs4\u003c/a\u003e The obfourscator (Courtesy mirror)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e482\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/bashfuscator/bashfuscator\"\u003ebashfuscator/bashfuscator\u003c/a\u003e A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e467\u003c/strong\u003e星][2m] [LLVM] \u003ca href=\"https://github.com/jonathansalwan/tigress_protection\"\u003ejonathansalwan/tigress_protection\u003c/a\u003e Playing with the Tigress binary protection. Break some of its protections and solve some of its challenges. Automatic deobfuscation using symbolic execution, taint analysis and LLVM.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e458\u003c/strong\u003e星][1m] [PHP] \u003ca href=\"https://github.com/pk-fr/yakpro-po\"\u003epk-fr/yakpro-po\u003c/a\u003e YAK Pro - Php Obfuscator\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e423\u003c/strong\u003e星][11m] [Py] \u003ca href=\"https://github.com/d4vinci/cuteit\"\u003ed4vinci/cuteit\u003c/a\u003e IP obfuscator made to make a malicious ip a bit cuter\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e420\u003c/strong\u003e星][5d] [Py] \u003ca href=\"https://github.com/dashingsoft/pyarmor\"\u003edashingsoft/pyarmor\u003c/a\u003e A tool used to obfuscate python scripts, bind obfuscated scripts to fixed machine or expire obfuscated scripts.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e394\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/essandess/isp-data-pollution\"\u003eessandess/isp-data-pollution\u003c/a\u003e ISP Data Pollution to Protect Private Browsing History with Obfuscation\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e348\u003c/strong\u003e星][1y] [C] \u003ca href=\"https://github.com/codermjlee/mjcodeobfuscation\"\u003ecodermjlee/mjcodeobfuscation\u003c/a\u003e 一个用于代码混淆和字符串加密的Mac小Demo\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e337\u003c/strong\u003e星][22d] [Go] \u003ca href=\"https://github.com/unixpickle/gobfuscate\"\u003eunixpickle/gobfuscate\u003c/a\u003e Obfuscate Go binaries and packages\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e311\u003c/strong\u003e星][3m] [PHP] \u003ca href=\"https://github.com/elfsundae/laravel-hashid\"\u003eelfsundae/laravel-hashid\u003c/a\u003e Obfuscate your data by generating reversible, non-sequential, URL-safe identifiers.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e282\u003c/strong\u003e星][29d] [Py] \u003ca href=\"https://github.com/hnfull/intensio-obfuscator\"\u003ehnfull/intensio-obfuscator\u003c/a\u003e Obfuscate a python code 2.x and 3.x\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e276\u003c/strong\u003e星][5d] [TS] \u003ca href=\"https://github.com/javascript-obfuscator/webpack-obfuscator\"\u003ejavascript-obfuscator/webpack-obfuscator\u003c/a\u003e javascript-obfuscator plugin for Webpack\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e263\u003c/strong\u003e星][6m] [C++] \u003ca href=\"https://github.com/d35ha/callobfuscator\"\u003ed35ha/callobfuscator\u003c/a\u003e Obfuscate specific windows apis with different apis\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e263\u003c/strong\u003e星][4m] [ObjC] \u003ca href=\"https://github.com/preemptive/ppios-rename\"\u003epreemptive/ppios-rename\u003c/a\u003e Symbol obfuscator for iOS apps\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e235\u003c/strong\u003e星][21d] [C#] \u003ca href=\"https://github.com/xenocoderce/neo-confuserex\"\u003exenocoderce/neo-confuserex\u003c/a\u003e Updated ConfuserEX, an open-source, free obfuscator for .NET applications\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e202\u003c/strong\u003e星][6m] [C#] \u003ca href=\"https://github.com/bedthegod/confuserex-mod-by-bed\"\u003ebedthegod/confuserex-mod-by-bed\u003c/a\u003e Beds Protector | Best free obfuscation out right now\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-78d0ac450a56c542e109c07a3b0225ae\"\u003e\u003c/a\u003ePayload管理\u003c/h3\u003e\u003ca id=\"user-content-payload管理\" class=\"anchor\" aria-label=\"Permalink: Payload管理\" href=\"#payload管理\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-d08b7bd562a4bf18275c63ffe7d8fc91\"\u003e\u003c/a\u003e勒索软件\u003c/h3\u003e\u003ca id=\"user-content-勒索软件\" class=\"anchor\" aria-label=\"Permalink: 勒索软件\" href=\"#勒索软件\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e391\u003c/strong\u003e星][1y] [Go] \u003ca href=\"https://github.com/mauri870/ransomware\"\u003emauri870/ransomware\u003c/a\u003e A POC Windows crypto-ransomware (Academic)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e331\u003c/strong\u003e星][t] [Batchfile] \u003ca href=\"https://github.com/mitchellkrogza/ultimate.hosts.blacklist\"\u003emitchellkrogza/ultimate.hosts.blacklist\u003c/a\u003e The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-82f546c7277db7919986ecf47f3c9495\"\u003e\u003c/a\u003e键盘记录器\u0026amp;\u0026amp;Keylogger\u003c/h3\u003e\u003ca id=\"user-content-键盘记录器keylogger\" class=\"anchor\" aria-label=\"Permalink: 键盘记录器\u0026amp;\u0026amp;Keylogger\" href=\"#键盘记录器keylogger\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e710\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/giacomolaw/keylogger\"\u003egiacomolaw/keylogger\u003c/a\u003e A simple keylogger for Windows, Linux and Mac\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e462\u003c/strong\u003e星][1y] [Py] \u003ca href=\"https://github.com/mehulj94/Radium\"\u003emehulj94/radium\u003c/a\u003e Python keylogger with multiple features.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e364\u003c/strong\u003e星][12m] [Py] \u003ca href=\"https://github.com/ajinabraham/xenotix-python-keylogger\"\u003eajinabraham/xenotix-python-keylogger\u003c/a\u003e Xenotix Python Keylogger for Windows.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-8f99087478f596139922cd1ad9ec961b\"\u003e\u003c/a\u003eMeterpreter\u003c/h3\u003e\u003ca id=\"user-content-meterpreter\" class=\"anchor\" aria-label=\"Permalink: Meterpreter\" href=\"#meterpreter\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e244\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/mez0cc/ms17-010-python\"\u003emez0cc/ms17-010-python\u003c/a\u003e MS17-010: Python and Meterpreter\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-63e0393e375e008af46651a3515072d8\"\u003e\u003c/a\u003ePayload投递\u003c/h3\u003e\u003ca id=\"user-content-payload投递\" class=\"anchor\" aria-label=\"Permalink: Payload投递\" href=\"#payload投递\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e263\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/no0be/dnslivery\"\u003eno0be/dnslivery\u003c/a\u003e Easy files and payloads delivery over DNS\u003c/li\u003e\n\u003c/ul\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-0b644b2d8119abf6643755ef455fcf2c\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-22\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-22\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-27962a7633b86d43cae2dd2d4c32f1b6\"\u003e\u003c/a\u003e新添加\u003c/h3\u003e\u003ca id=\"user-content-新添加-2\" class=\"anchor\" aria-label=\"Permalink: 新添加\" href=\"#新添加-2\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-a9494547a9359c60f09aea89f96a2c83\"\u003e\u003c/a\u003e后渗透\u003c/h1\u003e\u003ca id=\"user-content-后渗透\" class=\"anchor\" aria-label=\"Permalink: 后渗透\" href=\"#后渗透\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-3ed50213c2818f1455eff4e30372c542\"\u003e\u003c/a\u003e工具\u003c/h2\u003e\u003ca id=\"user-content-工具-23\" class=\"anchor\" aria-label=\"Permalink: 工具\" href=\"#工具-23\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-12abc279c69d1fcf10692b9cb89bcdf7\"\u003e\u003c/a\u003e未分类-post-exp\u003c/h3\u003e\u003ca id=\"user-content-未分类-post-exp\" class=\"anchor\" aria-label=\"Permalink: 未分类-post-exp\" href=\"#未分类-post-exp\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e7035\u003c/strong\u003e星][t] [C] \u003ca href=\"https://github.com/hashcat/hashcat\"\u003ehashcat/hashcat\u003c/a\u003e 世界上最快最先进的密码恢复工具\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#86dc226ae8a71db10e4136f4b82ccd06\"\u003e密码-\u0026gt;工具-\u0026gt;密码\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e3369\u003c/strong\u003e星][8d] [C] \u003ca href=\"https://github.com/screetsec/thefatrat\"\u003escreetsec/thefatrat\u003c/a\u003e Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e重复区段: \u003ca href=\"#ad92f6b801a18934f1971e2512f5ae4f\"\u003ePayload-\u0026gt;工具-\u0026gt;Payload生成\u003c/a\u003e |\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2479\u003c/strong\u003e星][1m] [Shell] \u003ca href=\"https://github.com/rebootuser/linenum\"\u003erebootuser/linenum\u003c/a\u003e Scripted Local Linux Enumeration \u0026amp; Privilege Escalation Checks\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2171\u003c/strong\u003e星][1m] [Py] \u003ca href=\"https://github.com/commixproject/commix\"\u003ecommixproject/commix\u003c/a\u003e Automated All-in-One OS command injection and exploitation tool.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1243\u003c/strong\u003e星][10m] [C] \u003ca href=\"https://github.com/a0rtega/pafish\"\u003ea0rtega/pafish\u003c/a\u003e Pafish is a demonstration tool that employs several techniques to detect sandboxes and analysis environments in the same way as malware families do.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1225\u003c/strong\u003e星][1y] [C#] \u003ca href=\"https://github.com/cn33liz/p0wnedshell\"\u003ecn33liz/p0wnedshell\u003c/a\u003e PowerShell Runspace Post Exploitation Toolkit\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1116\u003c/strong\u003e星][9m] [Py] \u003ca href=\"https://github.com/0x00-0x00/shellpop\"\u003e0x00-0x00/shellpop\u003c/a\u003e 在渗透中生产简易的/复杂的反向/绑定Shell\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1062\u003c/strong\u003e星][2m] [Boo] \u003ca href=\"https://github.com/byt3bl33d3r/silenttrinity\"\u003ebyt3bl33d3r/silenttrinity\u003c/a\u003e An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1024\u003c/strong\u003e星][4m] [Py] \u003ca href=\"https://github.com/byt3bl33d3r/deathstar\"\u003ebyt3bl33d3r/deathstar\u003c/a\u003e 在Active Directory环境中使用Empire自动获取域管理员权限\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e765\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/lgandx/pcredz\"\u003elgandx/pcredz\u003c/a\u003e This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e743\u003c/strong\u003e星][5m] [PS] \u003ca href=\"https://github.com/hausec/adape-script\"\u003ehausec/adape-script\u003c/a\u003e Active Directory Assessment and Privilege Escalation Script\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e697\u003c/strong\u003e星][2m] [C#] \u003ca href=\"https://github.com/cobbr/sharpsploit\"\u003ecobbr/sharpsploit\u003c/a\u003e SharpSploit is a .NET post-exploitation library written in C#\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e422\u003c/strong\u003e星][16d] [Shell] \u003ca href=\"https://github.com/thesecondsun/bashark\"\u003ethesecondsun/bashark\u003c/a\u003e Bash post exploitation toolkit\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e344\u003c/strong\u003e星][5m] [Py] \u003ca href=\"https://github.com/adrianvollmer/powerhub\"\u003eadrianvollmer/powerhub\u003c/a\u003e A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e282\u003c/strong\u003e星][1y] [JS] \u003ca href=\"https://github.com/chrisallenlane/novahot\"\u003echrisallenlane/novahot\u003c/a\u003e Webshell框架,实现了基于Json的API,可与任何语言编写的后门(默认支持PHP/Ruby/Python)进行通信。\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e233\u003c/strong\u003e星][2d] [Go] \u003ca href=\"https://github.com/brompwnie/botb\"\u003ebrompwnie/botb\u003c/a\u003e A container analysis and exploitation tool for pentesters and engineers.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e204\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/elevenpaths/ibombshell\"\u003eelevenpaths/ibombshell\u003c/a\u003e Tool to deploy a post-exploitation prompt at any time\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-4c2095e7e192ac56f6ae17c8fc045c51\"\u003e\u003c/a\u003e提权\u0026amp;\u0026amp;PrivilegeEscalation\u003c/h3\u003e\u003ca id=\"user-content-提权privilegeescalation\" class=\"anchor\" aria-label=\"Permalink: 提权\u0026amp;\u0026amp;PrivilegeEscalation\" href=\"#提权privilegeescalation\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e3699\u003c/strong\u003e星][5m] [C] \u003ca href=\"https://github.com/secwiki/windows-kernel-exploits\"\u003esecwiki/windows-kernel-exploits\u003c/a\u003e windows-kernel-exploits Windows平台提权漏洞集合\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e1283\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/alessandroz/beroot\"\u003ealessandroz/beroot\u003c/a\u003e Privilege Escalation Project - Windows / Linux / Mac\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e638\u003c/strong\u003e星][11m] [C++] \u003ca href=\"https://github.com/ohpe/juicy-potato\"\u003eohpe/juicy-potato\u003c/a\u003e A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\\SYSTEM.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e547\u003c/strong\u003e星][5m] \u003ca href=\"https://github.com/rhinosecuritylabs/aws-iam-privilege-escalation\"\u003erhinosecuritylabs/aws-iam-privilege-escalation\u003c/a\u003e A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e496\u003c/strong\u003e星][8m] [Py] \u003ca href=\"https://github.com/initstring/dirty_sock\"\u003einitstring/dirty_sock\u003c/a\u003e Linux privilege escalation exploit via snapd (CVE-2019-7304)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e492\u003c/strong\u003e星][2m] [C#] \u003ca href=\"https://github.com/rasta-mouse/watson\"\u003erasta-mouse/watson\u003c/a\u003e Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e485\u003c/strong\u003e星][8m] [C] \u003ca href=\"https://github.com/nongiach/sudo_inject\"\u003enongiach/sudo_inject\u003c/a\u003e [Linux] Two Privilege Escalation techniques abusing sudo token\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e392\u003c/strong\u003e星][4m] [PS] \u003ca href=\"https://github.com/cyberark/ACLight\"\u003ecyberark/aclight\u003c/a\u003e A script for advanced discovery of Privileged Accounts - includes Shadow Admins\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e371\u003c/strong\u003e星][3m] [PS] \u003ca href=\"https://github.com/gdedrouas/exchange-ad-privesc\"\u003egdedrouas/exchange-ad-privesc\u003c/a\u003e Exchange privilege escalations to Active Directory\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e340\u003c/strong\u003e星][2m] [Shell] \u003ca href=\"https://github.com/nullarray/roothelper\"\u003enullarray/roothelper\u003c/a\u003e 辅助在被攻克系统上的提权过程:自动枚举、下载、解压并执行提权脚本\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e308\u003c/strong\u003e星][5m] [Batchfile] \u003ca href=\"https://github.com/frizb/windows-privilege-escalation\"\u003efrizb/windows-privilege-escalation\u003c/a\u003e Windows Privilege Escalation Techniques and Scripts\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e269\u003c/strong\u003e星][4m] [PHP] \u003ca href=\"https://github.com/lawrenceamer/0xsp-mongoose\"\u003elawrenceamer/0xsp-mongoose\u003c/a\u003e Privilege Escalation Enumeration Toolkit (64/32 ) , fast , intelligent enumeration with Web API integration . Mastering Your Own Finding\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e223\u003c/strong\u003e星][3m] [Py] \u003ca href=\"https://github.com/initstring/uptux\"\u003einitstring/uptux\u003c/a\u003e Linux privilege escalation checks (systemd, dbus, socket fun, etc)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e222\u003c/strong\u003e星][4d] [C#] \u003ca href=\"https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite\"\u003ecarlospolop/privilege-escalation-awesome-scripts-suite\u003c/a\u003e PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e222\u003c/strong\u003e星][4d] [C#] \u003ca href=\"https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite\"\u003ecarlospolop/privilege-escalation-awesome-scripts-suite\u003c/a\u003e PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-caab36bba7fa8bb931a9133e37d397f6\"\u003e\u003c/a\u003eWindows\u003c/h3\u003e\u003ca id=\"user-content-windows\" class=\"anchor\" aria-label=\"Permalink: Windows\" href=\"#windows\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch4 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-7ed8ee71c4a733d5e5e5d239f0e8b9e0\"\u003e\u003c/a\u003e未分类-Windows\u003c/h4\u003e\u003ca id=\"user-content-未分类-windows\" class=\"anchor\" aria-label=\"Permalink: 未分类-Windows\" href=\"#未分类-windows\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e8785\u003c/strong\u003e星][28d] [C] \u003ca href=\"https://github.com/gentilkiwi/mimikatz\"\u003egentilkiwi/mimikatz\u003c/a\u003e A little tool to play with Windows security\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2153\u003c/strong\u003e星][2m] [Py] \u003ca href=\"https://github.com/trustedsec/unicorn\"\u003etrustedsec/unicorn\u003c/a\u003e 通过PowerShell降级攻击, 直接将Shellcode注入到内存\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2045\u003c/strong\u003e星][13d] [C++] \u003ca href=\"https://github.com/darthton/blackbone\"\u003edarthton/blackbone\u003c/a\u003e Windows memory hacking library\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e999\u003c/strong\u003e星][11m] [Batchfile] \u003ca href=\"https://github.com/sagishahar-zz/lpeworkshop\"\u003esagishahar-zz/lpeworkshop\u003c/a\u003e Windows / Linux Local Privilege Escalation Workshop\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e931\u003c/strong\u003e星][6d] [C#] \u003ca href=\"https://github.com/googleprojectzero/sandbox-attacksurface-analysis-tools\"\u003egoogleprojectzero/sandbox-attacksurface-analysis-tools\u003c/a\u003e 沙箱攻击面(Attack Surface)分析工具,用于测试 Windows 上沙箱的各种属性\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e700\u003c/strong\u003e星][8m] [C] \u003ca href=\"https://github.com/hfiref0x/tdl\"\u003ehfiref0x/tdl\u003c/a\u003e Driver loader for bypassing Windows x64 Driver Signature Enforcement\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e694\u003c/strong\u003e星][5m] [C#] \u003ca href=\"https://github.com/outflanknl/evilclippy\"\u003eoutflanknl/evilclippy\u003c/a\u003e A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e611\u003c/strong\u003e星][9m] [C#] \u003ca href=\"https://github.com/0xbadjuju/tokenvator\"\u003e0xbadjuju/tokenvator\u003c/a\u003e A tool to elevate privilege with Windows Tokens\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e519\u003c/strong\u003e星][12m] [PS] \u003ca href=\"https://github.com/a-min3/winspect\"\u003ea-min3/winspect\u003c/a\u003e Powershell-based Windows Security Auditing Toolbox\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e416\u003c/strong\u003e星][1m] [C++] \u003ca href=\"https://github.com/hoshimin/kernel-bridge\"\u003ehoshimin/kernel-bridge\u003c/a\u003e Windows kernel hacking framework, driver template, hypervisor and API written on C++\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e391\u003c/strong\u003e星][2m] [Java] \u003ca href=\"https://github.com/tiagorlampert/saint\"\u003etiagorlampert/saint\u003c/a\u003e a Spyware Generator for Windows systems written in Java\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e349\u003c/strong\u003e星][2m] [Shell] \u003ca href=\"https://github.com/orlikoski/Skadi\"\u003eorlikoski/skadi\u003c/a\u003e collection, processing and advanced analysis of forensic artifacts and images.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e341\u003c/strong\u003e星][1y] [C++] \u003ca href=\"https://github.com/QAX-A-Team/EventCleaner\"\u003eqax-a-team/eventcleaner\u003c/a\u003e A tool mainly to erase specified records from Windows event logs, with additional functionalities.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e340\u003c/strong\u003e星][19d] [C] \u003ca href=\"https://github.com/mattiwatti/efiguard\"\u003emattiwatti/efiguard\u003c/a\u003e Disable PatchGuard and DSE at boot time\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e302\u003c/strong\u003e星][2d] [Py] \u003ca href=\"https://github.com/skylined/bugid\"\u003eskylined/bugid\u003c/a\u003e Detect, analyze and uniquely identify crashes in Windows applications\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e298\u003c/strong\u003e星][1y] [PS] \u003ca href=\"https://github.com/onelogicalmyth/zeroday-powershell\"\u003eonelogicalmyth/zeroday-powershell\u003c/a\u003e A PowerShell example of the Windows zero day priv esc\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e290\u003c/strong\u003e星][7m] [Py] \u003ca href=\"https://github.com/ropnop/windapsearch\"\u003eropnop/windapsearch\u003c/a\u003e Python script to enumerate users, groups and computers from a Windows domain through LDAP queries\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e288\u003c/strong\u003e星][11m] \u003ca href=\"https://github.com/maaaaz/impacket-examples-windows\"\u003emaaaaz/impacket-examples-windows\u003c/a\u003e The great impacket example scripts compiled for Windows\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e213\u003c/strong\u003e星][4m] [PHP] \u003ca href=\"https://github.com/rizer0/log-killer\"\u003erizer0/log-killer\u003c/a\u003e Clear all your logs in [linux/windows] servers\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e212\u003c/strong\u003e星][1m] [C++] \u003ca href=\"https://github.com/can1357/byepg\"\u003ecan1357/byepg\u003c/a\u003e Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e211\u003c/strong\u003e星][1y] [C++] \u003ca href=\"https://github.com/tandasat/pgresarch\"\u003etandasat/pgresarch\u003c/a\u003e PatchGuard Research\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e206\u003c/strong\u003e星][20d] [Py] \u003ca href=\"https://github.com/mzfr/rsh\"\u003emzfr/rsh\u003c/a\u003e generate reverse shell from CLI for linux and Windows.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e203\u003c/strong\u003e星][5d] [Py] \u003ca href=\"https://github.com/ropnop/impacket_static_binaries\"\u003eropnop/impacket_static_binaries\u003c/a\u003e Standalone binaries for Linux/Windows of Impacket's examples\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e201\u003c/strong\u003e星][10m] [HTML] \u003ca href=\"https://github.com/mxmssh/drltrace\"\u003emxmssh/drltrace\u003c/a\u003e Drltrace is a library calls tracer for Windows and Linux applications.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch4 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-58f3044f11a31d0371daa91486d3694e\"\u003e\u003c/a\u003eUAC\u003c/h4\u003e\u003ca id=\"user-content-uac\" class=\"anchor\" aria-label=\"Permalink: UAC\" href=\"#uac\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e2355\u003c/strong\u003e星][3d] [C] \u003ca href=\"https://github.com/hfiref0x/uacme\"\u003ehfiref0x/uacme\u003c/a\u003e Defeating Windows User Account Control\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch4 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-b84c84a853416b37582c3b7f13eabb51\"\u003e\u003c/a\u003eAppLocker\u003c/h4\u003e\u003ca id=\"user-content-applocker\" class=\"anchor\" aria-label=\"Permalink: AppLocker\" href=\"#applocker\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch4 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-e3c4c83dfed529ceee65040e565003c4\"\u003e\u003c/a\u003eActiveDirectory\u003c/h4\u003e\u003ca id=\"user-content-activedirectory\" class=\"anchor\" aria-label=\"Permalink: ActiveDirectory\" href=\"#activedirectory\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e3652\u003c/strong\u003e星][19d] [PS] \u003ca href=\"https://github.com/BloodHoundAD/BloodHound\"\u003ebloodhoundad/bloodhound\u003c/a\u003e a single page Javascript web application, uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment.\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e2009\u003c/strong\u003e星][3m] \u003ca href=\"https://github.com/infosecn1nja/ad-attack-defense\"\u003einfosecn1nja/ad-attack-defense\u003c/a\u003e Attack and defend active directory using modern post exploitation adversary tradecraft activity\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e338\u003c/strong\u003e星][9m] [Py] \u003ca href=\"https://github.com/dirkjanm/ldapdomaindump\"\u003edirkjanm/ldapdomaindump\u003c/a\u003e Active Directory information dumper via LDAP\u003c/li\u003e\n\u003cli\u003e[\u003cstrong\u003e242\u003c/strong\u003e星][1y] [Go] \u003ca href=\"https://github.com/netspi/goddi\"\u003enetspi/goddi\u003c/a\u003e goddi (go dump domain info) dumps Active Directory domain information\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch4 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-25697cca32bd8c9492b8e2c8a3a93bfe\"\u003e\u003c/a\u003e域渗透\u003c/h4\u003e\u003ca id=\"user-content-域渗透\" class=\"anchor\" aria-label=\"Permalink: 域渗透\" href=\"#域渗透\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch4 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-a5c1d88a8e35b6c6223a6d64dbfb5358\"\u003e\u003c/a\u003eWET\u003c/h4\u003e\u003ca id=\"user-content-wet\" class=\"anchor\" aria-label=\"Permalink: WET\" href=\"#wet\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-2dd40db455d3c6f1f53f8a9c25bbe63e\"\u003e\u003c/a\u003e驻留\u0026amp;\u0026amp;Persistence\u003c/h3\u003e\u003ca id=\"user-content-驻留persistence\" class=\"anchor\" aria-label=\"Permalink: 驻留\u0026amp;\u0026amp;Persistence\" href=\"#驻留persistence\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cul dir=\"auto\"\u003e\n\u003cli\u003e[\u003cstrong\u003e306\u003c/strong\u003e星][3m] [C#] \u003ca href=\"https://github.com/fireeye/sharpersist\"\u003efireeye/sharpersist\u003c/a\u003e Windows persistence toolkit\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-4fc56d3dd1977b882ba14a9fd820f8e2\"\u003e\u003c/a\u003eLinux\u0026amp;\u0026amp;Xnix\u003c/h3\u003e\u003ca id=\"user-content-linuxxnix\" class=\"anchor\" aria-label=\"Permalink: Linux\u0026amp;\u0026amp;Xnix\" href=\"#linuxxnix\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003chr\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch2 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-c86567da7d4004149912383575be3b45\"\u003e\u003c/a\u003e文章\u003c/h2\u003e\u003ca id=\"user-content-文章-23\" class=\"anchor\" aria-label=\"Permalink: 文章\" href=\"#文章-23\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch3 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e\u003ca id=\"user-content-fdf10af493284be94033d1350f1e9b5c\"\u003e\u003c/a\u003e新添加\u003c/h3\u003e\u003ca id=\"user-content-新添加-3\" class=\"anchor\" aria-label=\"Permalink: 新添加\" href=\"#新添加-3\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv class=\"markdown-heading\" dir=\"auto\"\u003e\u003ch1 tabindex=\"-1\" class=\"heading-element\" dir=\"auto\"\u003e贡献\u003c/h1\u003e\u003ca id=\"user-content-贡献\" class=\"anchor\" aria-label=\"Permalink: 贡献\" href=\"#贡献\"\u003e\u003csvg class=\"octicon octicon-link\" viewBox=\"0 0 16 16\" version=\"1.1\" width=\"16\" height=\"16\" aria-hidden=\"true\"\u003e\u003cpath d=\"m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z\"\u003e\u003c/path\u003e\u003c/svg\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cp dir=\"auto\"\u003e内容为系统自动导出, 有任何问题请提issue\u003c/p\u003e\n\u003c/article\u003e","loaded":true,"timedOut":false,"errorMessage":null,"headerInfo":{"toc":[{"level":1,"text":"所有收集类项目:","anchor":"所有收集类项目","htmlText":"所有收集类项目:"},{"level":1,"text":"PenetrationTesting","anchor":"penetrationtesting","htmlText":"PenetrationTesting"},{"level":1,"text":"目录","anchor":"目录","htmlText":"目录"},{"level":1,"text":"新添加的","anchor":"新添加的","htmlText":"新添加的"},{"level":2,"text":"工具","anchor":"工具","htmlText":"工具"},{"level":3,"text":"新添加的","anchor":"新添加的-1","htmlText":"新添加的"},{"level":3,"text":"未分类","anchor":"未分类","htmlText":"未分类"},{"level":3,"text":"新添加1","anchor":"新添加1","htmlText":"新添加1"},{"level":3,"text":"新添加2","anchor":"新添加2","htmlText":"新添加2"},{"level":3,"text":"未分类3","anchor":"未分类3","htmlText":"未分类3"},{"level":3,"text":"未分类4","anchor":"未分类4","htmlText":"未分类4"},{"level":3,"text":"未分类5","anchor":"未分类5","htmlText":"未分类5"},{"level":3,"text":"其他","anchor":"其他","htmlText":"其他"},{"level":2,"text":"古老的\u0026\u0026有新的替代版本的","anchor":"古老的有新的替代版本的","htmlText":"古老的\u0026amp;\u0026amp;有新的替代版本的"},{"level":2,"text":"文章","anchor":"文章","htmlText":"文章"},{"level":3,"text":"新添加的","anchor":"新添加的-2","htmlText":"新添加的"},{"level":1,"text":"收集\u0026\u0026集合","anchor":"收集集合","htmlText":"收集\u0026amp;\u0026amp;集合"},{"level":2,"text":"未分类","anchor":"未分类-1","htmlText":"未分类"},{"level":2,"text":"混合型收集","anchor":"混合型收集","htmlText":"混合型收集"},{"level":2,"text":"无工具类收集","anchor":"无工具类收集","htmlText":"无工具类收集"},{"level":2,"text":"收集类的收集","anchor":"收集类的收集","htmlText":"收集类的收集"},{"level":2,"text":"教育资源\u0026\u0026课程\u0026\u0026教程\u0026\u0026书籍","anchor":"教育资源课程教程书籍","htmlText":"教育资源\u0026amp;\u0026amp;课程\u0026amp;\u0026amp;教程\u0026amp;\u0026amp;书籍"},{"level":2,"text":"笔记\u0026\u0026Tips\u0026\u0026Tricks","anchor":"笔记tipstricks","htmlText":"笔记\u0026amp;\u0026amp;Tips\u0026amp;\u0026amp;Tricks"},{"level":3,"text":"未分类","anchor":"未分类-2","htmlText":"未分类"},{"level":3,"text":"blog","anchor":"blog","htmlText":"blog"},{"level":2,"text":"Talk\u0026\u0026Conference","anchor":"talkconference","htmlText":"Talk\u0026amp;\u0026amp;Conference"},{"level":2,"text":"文档\u0026\u0026Documentation\u0026\u0026规则说明\u0026\u0026RFC","anchor":"文档documentation规则说明rfc","htmlText":"文档\u0026amp;\u0026amp;Documentation\u0026amp;\u0026amp;规则说明\u0026amp;\u0026amp;RFC"},{"level":1,"text":"特定目标","anchor":"特定目标","htmlText":"特定目标"},{"level":2,"text":"未分类-XxTarget","anchor":"未分类-xxtarget","htmlText":"未分类-XxTarget"},{"level":2,"text":"AWS","anchor":"aws","htmlText":"AWS"},{"level":2,"text":"Phoenix","anchor":"phoenix","htmlText":"Phoenix"},{"level":2,"text":"Kubernetes","anchor":"kubernetes","htmlText":"Kubernetes"},{"level":2,"text":"Azure","anchor":"azure","htmlText":"Azure"},{"level":2,"text":"Nginx","anchor":"nginx","htmlText":"Nginx"},{"level":2,"text":"ELK","anchor":"elk","htmlText":"ELK"},{"level":2,"text":"GoogleCloud\u0026\u0026谷歌云","anchor":"googlecloud谷歌云","htmlText":"GoogleCloud\u0026amp;\u0026amp;谷歌云"},{"level":1,"text":"物联网(IoT)\u0026\u0026嵌入式设备\u0026\u0026路由器\u0026\u0026交换机\u0026\u0026智能设备\u0026\u0026打印机","anchor":"物联网iot嵌入式设备路由器交换机智能设备打印机","htmlText":"物联网(IoT)\u0026amp;\u0026amp;嵌入式设备\u0026amp;\u0026amp;路由器\u0026amp;\u0026amp;交换机\u0026amp;\u0026amp;智能设备\u0026amp;\u0026amp;打印机"},{"level":2,"text":"工具","anchor":"工具-1","htmlText":"工具"},{"level":3,"text":"未分类-IoT","anchor":"未分类-iot","htmlText":"未分类-IoT"},{"level":3,"text":"打印机","anchor":"打印机","htmlText":"打印机"},{"level":3,"text":"路由器\u0026\u0026交换机","anchor":"路由器交换机","htmlText":"路由器\u0026amp;\u0026amp;交换机"},{"level":3,"text":"嵌入式设备","anchor":"嵌入式设备","htmlText":"嵌入式设备"},{"level":2,"text":"文章","anchor":"文章-1","htmlText":"文章"},{"level":3,"text":"新添加","anchor":"新添加","htmlText":"新添加"},{"level":1,"text":"渗透\u0026\u0026offensive\u0026\u0026渗透框架\u0026\u0026后渗透框架","anchor":"渗透offensive渗透框架后渗透框架","htmlText":"渗透\u0026amp;\u0026amp;offensive\u0026amp;\u0026amp;渗透框架\u0026amp;\u0026amp;后渗透框架"},{"level":2,"text":"工具","anchor":"工具-2","htmlText":"工具"},{"level":3,"text":"未分类-Pentest","anchor":"未分类-pentest","htmlText":"未分类-Pentest"},{"level":3,"text":"收集","anchor":"收集","htmlText":"收集"},{"level":3,"text":"渗透多合一\u0026\u0026渗透框架","anchor":"渗透多合一渗透框架","htmlText":"渗透多合一\u0026amp;\u0026amp;渗透框架"},{"level":3,"text":"自动化","anchor":"自动化","htmlText":"自动化"},{"level":3,"text":"数据渗透\u0026\u0026DataExfiltration","anchor":"数据渗透dataexfiltration","htmlText":"数据渗透\u0026amp;\u0026amp;DataExfiltration"},{"level":3,"text":"横向渗透","anchor":"横向渗透","htmlText":"横向渗透"},{"level":3,"text":"Burp","anchor":"burp","htmlText":"Burp"},{"level":4,"text":"收集","anchor":"收集-1","htmlText":"收集"},{"level":4,"text":"未分类-Burp","anchor":"未分类-burp","htmlText":"未分类-Burp"},{"level":3,"text":"Metasploit","anchor":"metasploit","htmlText":"Metasploit"},{"level":4,"text":"未分类-metasploit","anchor":"未分类-metasploit","htmlText":"未分类-metasploit"},{"level":3,"text":"免杀\u0026\u0026躲避AV检测","anchor":"免杀躲避av检测","htmlText":"免杀\u0026amp;\u0026amp;躲避AV检测"},{"level":3,"text":"C\u0026C","anchor":"cc","htmlText":"C\u0026amp;C"},{"level":3,"text":"DDOS","anchor":"ddos","htmlText":"DDOS"},{"level":3,"text":"OWASP","anchor":"owasp","htmlText":"OWASP"},{"level":3,"text":"Kali","anchor":"kali","htmlText":"Kali"},{"level":3,"text":"CobaltStrike","anchor":"cobaltstrike","htmlText":"CobaltStrike"},{"level":3,"text":"CMS","anchor":"cms","htmlText":"CMS"},{"level":3,"text":"日志","anchor":"日志","htmlText":"日志"},{"level":3,"text":"劫持\u0026\u0026各种劫持","anchor":"劫持各种劫持","htmlText":"劫持\u0026amp;\u0026amp;各种劫持"},{"level":4,"text":"未分类-Hijack","anchor":"未分类-hijack","htmlText":"未分类-Hijack"},{"level":4,"text":"点击劫持","anchor":"点击劫持","htmlText":"点击劫持"},{"level":3,"text":"RedTeam","anchor":"redteam","htmlText":"RedTeam"},{"level":3,"text":"BlueTeam","anchor":"blueteam","htmlText":"BlueTeam"},{"level":2,"text":"文章","anchor":"文章-2","htmlText":"文章"},{"level":3,"text":"新添加的","anchor":"新添加的-3","htmlText":"新添加的"},{"level":3,"text":"Metasploit","anchor":"metasploit-1","htmlText":"Metasploit"},{"level":3,"text":"BurpSuite","anchor":"burpsuite","htmlText":"BurpSuite"},{"level":3,"text":"CobaltStrike","anchor":"cobaltstrike-1","htmlText":"CobaltStrike"},{"level":1,"text":"扫描器\u0026\u0026安全扫描\u0026\u0026App扫描\u0026\u0026漏洞扫描","anchor":"扫描器安全扫描app扫描漏洞扫描","htmlText":"扫描器\u0026amp;\u0026amp;安全扫描\u0026amp;\u0026amp;App扫描\u0026amp;\u0026amp;漏洞扫描"},{"level":2,"text":"工具","anchor":"工具-3","htmlText":"工具"},{"level":3,"text":"未分类-Scanner","anchor":"未分类-scanner","htmlText":"未分类-Scanner"},{"level":3,"text":"隐私\u0026\u0026Secret\u0026\u0026Privacy扫描","anchor":"隐私secretprivacy扫描","htmlText":"隐私\u0026amp;\u0026amp;Secret\u0026amp;\u0026amp;Privacy扫描"},{"level":3,"text":"隐私存储","anchor":"隐私存储","htmlText":"隐私存储"},{"level":4,"text":"未分类","anchor":"未分类-3","htmlText":"未分类"},{"level":4,"text":"隐写","anchor":"隐写","htmlText":"隐写"},{"level":2,"text":"文章","anchor":"文章-3","htmlText":"文章"},{"level":3,"text":"新添加的","anchor":"新添加的-4","htmlText":"新添加的"},{"level":1,"text":"侦察\u0026\u0026信息收集\u0026\u0026子域名发现与枚举\u0026\u0026OSINT","anchor":"侦察信息收集子域名发现与枚举osint","htmlText":"侦察\u0026amp;\u0026amp;信息收集\u0026amp;\u0026amp;子域名发现与枚举\u0026amp;\u0026amp;OSINT"},{"level":2,"text":"工具","anchor":"工具-4","htmlText":"工具"},{"level":3,"text":"未分类-OSINT","anchor":"未分类-osint","htmlText":"未分类-OSINT"},{"level":3,"text":"子域名枚举\u0026\u0026爆破","anchor":"子域名枚举爆破","htmlText":"子域名枚举\u0026amp;\u0026amp;爆破"},{"level":3,"text":"信息收集\u0026\u0026侦查\u0026\u0026Recon\u0026\u0026InfoGather","anchor":"信息收集侦查reconinfogather","htmlText":"信息收集\u0026amp;\u0026amp;侦查\u0026amp;\u0026amp;Recon\u0026amp;\u0026amp;InfoGather"},{"level":3,"text":"指纹\u0026\u0026Fingerprinting","anchor":"指纹fingerprinting","htmlText":"指纹\u0026amp;\u0026amp;Fingerprinting"},{"level":3,"text":"收集","anchor":"收集-2","htmlText":"收集"},{"level":3,"text":"社交网络","anchor":"社交网络","htmlText":"社交网络"},{"level":4,"text":"其他-SocialNetwork","anchor":"其他-socialnetwork","htmlText":"其他-SocialNetwork"},{"level":4,"text":"Twitter","anchor":"twitter","htmlText":"Twitter"},{"level":4,"text":"Github","anchor":"github","htmlText":"Github"},{"level":3,"text":"DNS","anchor":"dns","htmlText":"DNS"},{"level":3,"text":"Shodan","anchor":"shodan","htmlText":"Shodan"},{"level":3,"text":"nmap","anchor":"nmap","htmlText":"nmap"},{"level":2,"text":"文章","anchor":"文章-4","htmlText":"文章"},{"level":3,"text":"新添加","anchor":"新添加-1","htmlText":"新添加"},{"level":1,"text":"社工(SET)\u0026\u0026钓鱼\u0026\u0026鱼叉攻击","anchor":"社工set钓鱼鱼叉攻击","htmlText":"社工(SET)\u0026amp;\u0026amp;钓鱼\u0026amp;\u0026amp;鱼叉攻击"},{"level":2,"text":"工具","anchor":"工具-5","htmlText":"工具"},{"level":3,"text":"未分类-SET","anchor":"未分类-set","htmlText":"未分类-SET"},{"level":3,"text":"社工","anchor":"社工","htmlText":"社工"},{"level":3,"text":"钓鱼\u0026\u0026Phish","anchor":"钓鱼phish","htmlText":"钓鱼\u0026amp;\u0026amp;Phish"},{"level":3,"text":"鱼叉攻击","anchor":"鱼叉攻击","htmlText":"鱼叉攻击"},{"level":2,"text":"文章","anchor":"文章-5","htmlText":"文章"},{"level":3,"text":"新添加的","anchor":"新添加的-5","htmlText":"新添加的"},{"level":1,"text":"环境配置\u0026\u0026分析系统","anchor":"环境配置分析系统","htmlText":"环境配置\u0026amp;\u0026amp;分析系统"},{"level":2,"text":"工具","anchor":"工具-6","htmlText":"工具"},{"level":3,"text":"未分类-Env","anchor":"未分类-env","htmlText":"未分类-Env"},{"level":3,"text":"Linux-Distro","anchor":"linux-distro","htmlText":"Linux-Distro"},{"level":3,"text":"环境自动配置\u0026\u0026自动安装","anchor":"环境自动配置自动安装","htmlText":"环境自动配置\u0026amp;\u0026amp;自动安装"},{"level":2,"text":"文章","anchor":"文章-6","htmlText":"文章"},{"level":3,"text":"新添加的","anchor":"新添加的-6","htmlText":"新添加的"},{"level":1,"text":"密码\u0026\u0026凭证\u0026\u0026认证","anchor":"密码凭证认证","htmlText":"密码\u0026amp;\u0026amp;凭证\u0026amp;\u0026amp;认证"},{"level":2,"text":"工具","anchor":"工具-7","htmlText":"工具"},{"level":3,"text":"未分类-Password","anchor":"未分类-password","htmlText":"未分类-Password"},{"level":3,"text":"密码","anchor":"密码","htmlText":"密码"},{"level":3,"text":"认证\u0026\u0026Authenticate","anchor":"认证authenticate","htmlText":"认证\u0026amp;\u0026amp;Authenticate"},{"level":2,"text":"文章","anchor":"文章-7","htmlText":"文章"},{"level":3,"text":"新添加的","anchor":"新添加的-7","htmlText":"新添加的"},{"level":1,"text":"辅助周边","anchor":"辅助周边","htmlText":"辅助周边"},{"level":2,"text":"未分类-Assist","anchor":"未分类-assist","htmlText":"未分类-Assist"},{"level":2,"text":"TLS\u0026\u0026SSL\u0026\u0026HTTPS","anchor":"tlssslhttps","htmlText":"TLS\u0026amp;\u0026amp;SSL\u0026amp;\u0026amp;HTTPS"},{"level":1,"text":"防护\u0026\u0026Defense","anchor":"防护defense","htmlText":"防护\u0026amp;\u0026amp;Defense"},{"level":2,"text":"工具","anchor":"工具-8","htmlText":"工具"},{"level":3,"text":"未分类-Defense","anchor":"未分类-defense","htmlText":"未分类-Defense"},{"level":3,"text":"WAF","anchor":"waf","htmlText":"WAF"},{"level":3,"text":"防火墙\u0026\u0026FireWall","anchor":"防火墙firewall","htmlText":"防火墙\u0026amp;\u0026amp;FireWall"},{"level":3,"text":"IDS\u0026\u0026IPS","anchor":"idsips","htmlText":"IDS\u0026amp;\u0026amp;IPS"},{"level":3,"text":"隐私保护\u0026\u0026Privacy","anchor":"隐私保护privacy","htmlText":"隐私保护\u0026amp;\u0026amp;Privacy"},{"level":2,"text":"文章","anchor":"文章-8","htmlText":"文章"},{"level":3,"text":"新添加的","anchor":"新添加的-8","htmlText":"新添加的"},{"level":1,"text":"SoftwareDefinedRadio","anchor":"softwaredefinedradio","htmlText":"SoftwareDefinedRadio"},{"level":2,"text":"工具","anchor":"工具-9","htmlText":"工具"},{"level":2,"text":"文章","anchor":"文章-9","htmlText":"文章"},{"level":1,"text":"LOLBin\u0026\u0026LOLScript","anchor":"lolbinlolscript","htmlText":"LOLBin\u0026amp;\u0026amp;LOLScript"},{"level":2,"text":"工具","anchor":"工具-10","htmlText":"工具"},{"level":2,"text":"文章","anchor":"文章-10","htmlText":"文章"},{"level":1,"text":"日志\u0026\u0026Log","anchor":"日志log","htmlText":"日志\u0026amp;\u0026amp;Log"},{"level":2,"text":"工具","anchor":"工具-11","htmlText":"工具"},{"level":2,"text":"文章","anchor":"文章-11","htmlText":"文章"},{"level":1,"text":"威胁狩猎\u0026\u0026ThreatHunt","anchor":"威胁狩猎threathunt","htmlText":"威胁狩猎\u0026amp;\u0026amp;ThreatHunt"},{"level":2,"text":"工具","anchor":"工具-12","htmlText":"工具"},{"level":3,"text":"未分类","anchor":"未分类-4","htmlText":"未分类"},{"level":2,"text":"文章","anchor":"文章-12","htmlText":"文章"},{"level":3,"text":"新添加的","anchor":"新添加的-9","htmlText":"新添加的"},{"level":1,"text":"Crypto\u0026\u0026加密\u0026\u0026密码学","anchor":"crypto加密密码学","htmlText":"Crypto\u0026amp;\u0026amp;加密\u0026amp;\u0026amp;密码学"},{"level":2,"text":"工具","anchor":"工具-13","htmlText":"工具"},{"level":2,"text":"文章","anchor":"文章-13","htmlText":"文章"},{"level":1,"text":"恶意代码\u0026\u0026Malware\u0026\u0026APT","anchor":"恶意代码malwareapt","htmlText":"恶意代码\u0026amp;\u0026amp;Malware\u0026amp;\u0026amp;APT"},{"level":2,"text":"工具","anchor":"工具-14","htmlText":"工具"},{"level":2,"text":"文章","anchor":"文章-14","htmlText":"文章"},{"level":1,"text":"REST_API\u0026\u0026RESTFUL","anchor":"rest_apirestful","htmlText":"REST_API\u0026amp;\u0026amp;RESTFUL"},{"level":2,"text":"工具","anchor":"工具-15","htmlText":"工具"},{"level":2,"text":"文章","anchor":"文章-15","htmlText":"文章"},{"level":1,"text":"蓝牙\u0026\u0026Bluetooth","anchor":"蓝牙bluetooth","htmlText":"蓝牙\u0026amp;\u0026amp;Bluetooth"},{"level":2,"text":"工具","anchor":"工具-16","htmlText":"工具"},{"level":2,"text":"文章","anchor":"文章-16","htmlText":"文章"},{"level":1,"text":"浏览器\u0026\u0026browser","anchor":"浏览器browser","htmlText":"浏览器\u0026amp;\u0026amp;browser"},{"level":2,"text":"工具","anchor":"工具-17","htmlText":"工具"},{"level":2,"text":"文章","anchor":"文章-17","htmlText":"文章"},{"level":1,"text":"MitreATT\u0026CK","anchor":"mitreattck","htmlText":"MitreATT\u0026amp;CK"},{"level":2,"text":"工具","anchor":"工具-18","htmlText":"工具"},{"level":3,"text":"未分类的","anchor":"未分类的","htmlText":"未分类的"},{"level":2,"text":"文章","anchor":"文章-18","htmlText":"文章"},{"level":3,"text":"新添加的","anchor":"新添加的-10","htmlText":"新添加的"},{"level":1,"text":"破解\u0026\u0026Crack\u0026\u0026爆破\u0026\u0026BruteForce","anchor":"破解crack爆破bruteforce","htmlText":"破解\u0026amp;\u0026amp;Crack\u0026amp;\u0026amp;爆破\u0026amp;\u0026amp;BruteForce"},{"level":2,"text":"工具","anchor":"工具-19","htmlText":"工具"},{"level":3,"text":"未分类的","anchor":"未分类的-1","htmlText":"未分类的"},{"level":2,"text":"文章","anchor":"文章-19","htmlText":"文章"},{"level":3,"text":"新添加的","anchor":"新添加的-11","htmlText":"新添加的"},{"level":1,"text":"泄漏\u0026\u0026Breach\u0026\u0026Leak","anchor":"泄漏breachleak","htmlText":"泄漏\u0026amp;\u0026amp;Breach\u0026amp;\u0026amp;Leak"},{"level":2,"text":"工具","anchor":"工具-20","htmlText":"工具"},{"level":3,"text":"未分类","anchor":"未分类-5","htmlText":"未分类"},{"level":2,"text":"文章","anchor":"文章-20","htmlText":"文章"},{"level":3,"text":"新添加的","anchor":"新添加的-12","htmlText":"新添加的"},{"level":1,"text":"爬虫","anchor":"爬虫","htmlText":"爬虫"},{"level":2,"text":"工具","anchor":"工具-21","htmlText":"工具"},{"level":3,"text":"未分类","anchor":"未分类-6","htmlText":"未分类"},{"level":2,"text":"文章","anchor":"文章-21","htmlText":"文章"},{"level":3,"text":"新添加的","anchor":"新添加的-13","htmlText":"新添加的"},{"level":1,"text":"无线\u0026\u0026WiFi\u0026\u0026AP\u0026\u0026802.11","anchor":"无线wifiap80211","htmlText":"无线\u0026amp;\u0026amp;WiFi\u0026amp;\u0026amp;AP\u0026amp;\u0026amp;802.11"},{"level":2,"text":"未分类-WiFi","anchor":"未分类-wifi","htmlText":"未分类-WiFi"},{"level":2,"text":"WPS\u0026\u0026WPA\u0026\u0026WPA2","anchor":"wpswpawpa2","htmlText":"WPS\u0026amp;\u0026amp;WPA\u0026amp;\u0026amp;WPA2"},{"level":2,"text":"802.11","anchor":"80211","htmlText":"802.11"},{"level":1,"text":"Payload\u0026\u0026远控\u0026\u0026RAT","anchor":"payload远控rat","htmlText":"Payload\u0026amp;\u0026amp;远控\u0026amp;\u0026amp;RAT"},{"level":2,"text":"工具","anchor":"工具-22","htmlText":"工具"},{"level":3,"text":"未分类-payload","anchor":"未分类-payload","htmlText":"未分类-payload"},{"level":3,"text":"Payload收集","anchor":"payload收集","htmlText":"Payload收集"},{"level":3,"text":"远控\u0026\u0026RAT","anchor":"远控rat","htmlText":"远控\u0026amp;\u0026amp;RAT"},{"level":3,"text":"Payload生成","anchor":"payload生成","htmlText":"Payload生成"},{"level":3,"text":"Botnet\u0026\u0026僵尸网络","anchor":"botnet僵尸网络","htmlText":"Botnet\u0026amp;\u0026amp;僵尸网络"},{"level":3,"text":"后门\u0026\u0026添加后门","anchor":"后门添加后门","htmlText":"后门\u0026amp;\u0026amp;添加后门"},{"level":3,"text":"混淆器\u0026\u0026Obfuscate","anchor":"混淆器obfuscate","htmlText":"混淆器\u0026amp;\u0026amp;Obfuscate"},{"level":3,"text":"Payload管理","anchor":"payload管理","htmlText":"Payload管理"},{"level":3,"text":"勒索软件","anchor":"勒索软件","htmlText":"勒索软件"},{"level":3,"text":"键盘记录器\u0026\u0026Keylogger","anchor":"键盘记录器keylogger","htmlText":"键盘记录器\u0026amp;\u0026amp;Keylogger"},{"level":3,"text":"Meterpreter","anchor":"meterpreter","htmlText":"Meterpreter"},{"level":3,"text":"Payload投递","anchor":"payload投递","htmlText":"Payload投递"},{"level":2,"text":"文章","anchor":"文章-22","htmlText":"文章"},{"level":3,"text":"新添加","anchor":"新添加-2","htmlText":"新添加"},{"level":1,"text":"后渗透","anchor":"后渗透","htmlText":"后渗透"},{"level":2,"text":"工具","anchor":"工具-23","htmlText":"工具"},{"level":3,"text":"未分类-post-exp","anchor":"未分类-post-exp","htmlText":"未分类-post-exp"},{"level":3,"text":"提权\u0026\u0026PrivilegeEscalation","anchor":"提权privilegeescalation","htmlText":"提权\u0026amp;\u0026amp;PrivilegeEscalation"},{"level":3,"text":"Windows","anchor":"windows","htmlText":"Windows"},{"level":4,"text":"未分类-Windows","anchor":"未分类-windows","htmlText":"未分类-Windows"},{"level":4,"text":"UAC","anchor":"uac","htmlText":"UAC"},{"level":4,"text":"AppLocker","anchor":"applocker","htmlText":"AppLocker"},{"level":4,"text":"ActiveDirectory","anchor":"activedirectory","htmlText":"ActiveDirectory"},{"level":4,"text":"域渗透","anchor":"域渗透","htmlText":"域渗透"},{"level":4,"text":"WET","anchor":"wet","htmlText":"WET"},{"level":3,"text":"驻留\u0026\u0026Persistence","anchor":"驻留persistence","htmlText":"驻留\u0026amp;\u0026amp;Persistence"},{"level":3,"text":"Linux\u0026\u0026Xnix","anchor":"linuxxnix","htmlText":"Linux\u0026amp;\u0026amp;Xnix"},{"level":2,"text":"文章","anchor":"文章-23","htmlText":"文章"},{"level":3,"text":"新添加","anchor":"新添加-3","htmlText":"新添加"},{"level":1,"text":"贡献","anchor":"贡献","htmlText":"贡献"}],"siteNavLoginPath":"/login?return_to=https%3A%2F%2Fgithub.com%2Ffengjixuchui%2Fawesome-cyber-security"}}],"overviewFilesProcessingTime":0}},"appPayload":{"helpUrl":"https://docs.github.com","findFileWorkerPath":"/assets-cdn/worker/find-file-worker-7d7eb7c71814.js","findInFileWorkerPath":"/assets-cdn/worker/find-in-file-worker-96e76d5fdb2c.js","githubDevUrl":null,"enabled_features":{"copilot_workspace":null,"code_nav_ui_events":false,"overview_shared_code_dropdown_button":false,"react_blob_overlay":false,"accessible_code_button":true,"github_models_repo_integration":false}}}}</script> <div data-target="react-partial.reactRoot"><style data-styled="true" data-styled-version="5.3.11">.iVEunk{margin-top:16px;margin-bottom:16px;}/*!sc*/ .jzuOtQ{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;}/*!sc*/ .bGojzy{margin-bottom:0;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;row-gap:16px;}/*!sc*/ .iNSVHo{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;-webkit-box-flex:1;-webkit-flex-grow:1;-ms-flex-positive:1;flex-grow:1;padding-bottom:16px;padding-top:8px;}/*!sc*/ .bVgnfw{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:row;-ms-flex-direction:row;flex-direction:row;gap:8px;}/*!sc*/ @media screen and (max-width:320px){.bVgnfw{-webkit-box-flex:1;-webkit-flex-grow:1;-ms-flex-positive:1;flex-grow:1;}}/*!sc*/ .CEgMp{position:relative;}/*!sc*/ @media screen and (max-width:380px){.CEgMp .ref-selector-button-text-container{max-width:80px;}}/*!sc*/ @media screen and (max-width:320px){.CEgMp{-webkit-box-flex:1;-webkit-flex-grow:1;-ms-flex-positive:1;flex-grow:1;}.CEgMp .overview-ref-selector{width:100%;}.CEgMp .overview-ref-selector > span{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:start;-webkit-justify-content:flex-start;-ms-flex-pack:start;justify-content:flex-start;}.CEgMp .overview-ref-selector > span > span[data-component="text"]{-webkit-box-flex:1;-webkit-flex-grow:1;-ms-flex-positive:1;flex-grow:1;}}/*!sc*/ .gMOVLe[data-size="medium"]{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;min-width:0;}/*!sc*/ .gMOVLe[data-size="medium"] svg{color:var(--fgColor-muted,var(--color-fg-muted,#656d76));}/*!sc*/ .gMOVLe[data-size="medium"] > span{width:inherit;}/*!sc*/ .gUkoLg{-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;}/*!sc*/ .bZBlpz{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;width:100%;}/*!sc*/ .lhTYNA{margin-right:4px;color:var(--fgColor-muted,var(--color-fg-muted,#656d76));}/*!sc*/ .ffLUq{font-size:14px;min-width:0;overflow:hidden;text-overflow:ellipsis;white-space:nowrap;}/*!sc*/ .bmcJak{min-width:0;}/*!sc*/ .fLXEGX{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;}/*!sc*/ @media screen and (max-width:1079px){.fLXEGX{display:none;}}/*!sc*/ .lmSMZJ[data-size="medium"]{color:var(--fgColor-muted,var(--color-fg-muted,#656d76));padding-left:4px;padding-right:4px;}/*!sc*/ .lmSMZJ[data-size="medium"] span[data-component="leadingVisual"]{margin-right:4px !important;}/*!sc*/ .dqfxud{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;}/*!sc*/ @media screen and (min-width:1080px){.dqfxud{display:none;}}/*!sc*/ @media screen and (max-width:543px){.dqfxud{display:none;}}/*!sc*/ .fGwBZA[data-size="medium"][data-no-visuals]{color:var(--fgColor-muted,var(--color-fg-muted,#656d76));}/*!sc*/ .jxTzTd{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;padding-left:8px;gap:8px;}/*!sc*/ .gqqBXN{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;gap:8px;}/*!sc*/ @media screen and (max-width:543px){.gqqBXN{display:none;}}/*!sc*/ .dzXgxt{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;}/*!sc*/ @media screen and (max-width:1011px){.dzXgxt{display:none;}}/*!sc*/ .iWFGlI{margin-left:8px;margin-right:8px;margin:0;}/*!sc*/ .vcvyP{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;min-width:160px;}/*!sc*/ .YUPas{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;}/*!sc*/ @media screen and (min-width:1012px){.YUPas{display:none;}}/*!sc*/ .izFOf{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;}/*!sc*/ @media screen and (min-width:544px){.izFOf{display:none;}}/*!sc*/ .vIPPs{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;gap:16px;}/*!sc*/ .fdROMU{width:100%;border-collapse:separate;border-spacing:0;border:1px solid;border-color:var(--borderColor-default,var(--color-border-default,#d0d7de));border-radius:6px;table-layout:fixed;overflow:unset;}/*!sc*/ .jGKpsv{height:0px;line-height:0px;}/*!sc*/ .jGKpsv tr{height:0px;font-size:0px;}/*!sc*/ .jdgHnn{padding:16px;color:var(--fgColor-muted,var(--color-fg-muted,#656d76));font-size:12px;text-align:left;height:40px;}/*!sc*/ .jdgHnn th{padding-left:16px;background-color:var(--bgColor-muted,var(--color-canvas-subtle,#f6f8fa));}/*!sc*/ .bQivRW{width:100%;border-top-left-radius:6px;}/*!sc*/ @media screen and (min-width:544px){.bQivRW{display:none;}}/*!sc*/ .ldkMIO{width:40%;border-top-left-radius:6px;}/*!sc*/ @media screen and (max-width:543px){.ldkMIO{display:none;}}/*!sc*/ .jMbWeI{text-align:right;padding-right:16px;width:136px;border-top-right-radius:6px;}/*!sc*/ .gpqjiB{color:var(--fgColor-muted,var(--color-fg-muted,#656d76));font-size:12px;height:40px;}/*!sc*/ .dzCJzi{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:row;-ms-flex-direction:row;flex-direction:row;-webkit-flex-wrap:wrap;-ms-flex-wrap:wrap;flex-wrap:wrap;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;gap:8px;min-width:273px;padding:8px;}/*!sc*/ @media screen and (min-width:544px){.dzCJzi{-webkit-flex-wrap:nowrap;-ms-flex-wrap:nowrap;flex-wrap:nowrap;}}/*!sc*/ .eNCcrz{text-align:center;vertical-align:center;height:40px;border-top:1px solid;border-color:var(--borderColor-default,var(--color-border-default,#d0d7de));}/*!sc*/ .bHTcCe{border-top:1px solid var(--borderColor-default,var(--color-border-default));cursor:pointer;}/*!sc*/ .csrIcr{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-flex:1;-webkit-flex-grow:1;-ms-flex-positive:1;flex-grow:1;gap:16px;}/*!sc*/ .bUQNHB{border:1px solid;border-color:var(--borderColor-default,var(--color-border-default,#d0d7de));border-radius:6px;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;-webkit-box-flex:1;-webkit-flex-grow:1;-ms-flex-positive:1;flex-grow:1;}/*!sc*/ @media screen and (max-width:543px){.bUQNHB{margin-left:-16px;margin-right:-16px;max-width:calc(100% + 32px);}}/*!sc*/ @media screen and (min-width:544px){.bUQNHB{max-width:100%;}}/*!sc*/ .jPdcfu{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;border-bottom:1px solid;border-bottom-color:var(--borderColor-default,var(--color-border-default,#d0d7de));-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;padding-right:8px;position:-webkit-sticky;position:sticky;top:0;background-color:var(--bgColor-default,var(--color-canvas-default,#ffffff));z-index:1;border-top-left-radius:6px;border-top-right-radius:6px;}/*!sc*/ .iphEWz{-webkit-box-flex:1;-webkit-flex-grow:1;-ms-flex-positive:1;flex-grow:1;border-bottom:none;max-width:100%;padding-left:8px;padding-right:8px;}/*!sc*/ .hUCRAk{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ .cwoBXV[data-size="medium"]{color:var(--fgColor-muted,var(--color-fg-subtle,#6e7781));padding-left:8px;padding-right:8px;}/*!sc*/ .QkQOb{padding:32px;overflow:auto;}/*!sc*/ data-styled.g1[id="Box-sc-g0xbh4-0"]{content:"iVEunk,jzuOtQ,bGojzy,iNSVHo,bVgnfw,CEgMp,gMOVLe,gUkoLg,bZBlpz,lhTYNA,ffLUq,bmcJak,fLXEGX,lmSMZJ,dqfxud,fGwBZA,jxTzTd,gqqBXN,dzXgxt,iWFGlI,vcvyP,YUPas,izFOf,vIPPs,fdROMU,jGKpsv,jdgHnn,bQivRW,ldkMIO,jMbWeI,gpqjiB,dzCJzi,eNCcrz,bHTcCe,csrIcr,bUQNHB,jPdcfu,iphEWz,hUCRAk,cwoBXV,QkQOb,"}/*!sc*/ .brGdpi{position:absolute;width:1px;height:1px;padding:0;margin:-1px;overflow:hidden;-webkit-clip:rect(0,0,0,0);clip:rect(0,0,0,0);white-space:nowrap;border-width:0;}/*!sc*/ data-styled.g5[id="_VisuallyHidden__VisuallyHidden-sc-11jhm7a-0"]{content:"brGdpi,"}/*!sc*/ .hWlpPn{position:relative;display:inline-block;}/*!sc*/ .hWlpPn::after{position:absolute;z-index:1000000;display:none;padding:0.5em 0.75em;font:normal normal 11px/1.5 -apple-system,BlinkMacSystemFont,"Segoe UI","Noto Sans",Helvetica,Arial,sans-serif,"Apple Color Emoji","Segoe UI Emoji";-webkit-font-smoothing:subpixel-antialiased;color:var(--tooltip-fgColor,var(--fgColor-onEmphasis,var(--color-fg-on-emphasis,#ffffff)));text-align:center;-webkit-text-decoration:none;text-decoration:none;text-shadow:none;text-transform:none;-webkit-letter-spacing:normal;-moz-letter-spacing:normal;-ms-letter-spacing:normal;letter-spacing:normal;word-wrap:break-word;white-space:pre;pointer-events:none;content:attr(aria-label);background:var(--tooltip-bgColor,var(--bgColor-emphasis,var(--color-neutral-emphasis-plus,#24292f)));border-radius:6px;opacity:0;}/*!sc*/ @-webkit-keyframes tooltip-appear{from{opacity:0;}to{opacity:1;}}/*!sc*/ @keyframes tooltip-appear{from{opacity:0;}to{opacity:1;}}/*!sc*/ .hWlpPn:hover::after,.hWlpPn:active::after,.hWlpPn:focus::after,.hWlpPn:focus-within::after{display:inline-block;-webkit-text-decoration:none;text-decoration:none;-webkit-animation-name:tooltip-appear;animation-name:tooltip-appear;-webkit-animation-duration:0.1s;animation-duration:0.1s;-webkit-animation-fill-mode:forwards;animation-fill-mode:forwards;-webkit-animation-timing-function:ease-in;animation-timing-function:ease-in;-webkit-animation-delay:0s;animation-delay:0s;}/*!sc*/ .hWlpPn.tooltipped-no-delay:hover::after,.hWlpPn.tooltipped-no-delay:active::after,.hWlpPn.tooltipped-no-delay:focus::after,.hWlpPn.tooltipped-no-delay:focus-within::after{-webkit-animation-delay:0s;animation-delay:0s;}/*!sc*/ .hWlpPn.tooltipped-multiline:hover::after,.hWlpPn.tooltipped-multiline:active::after,.hWlpPn.tooltipped-multiline:focus::after,.hWlpPn.tooltipped-multiline:focus-within::after{display:table-cell;}/*!sc*/ .hWlpPn.tooltipped-s::after,.hWlpPn.tooltipped-se::after,.hWlpPn.tooltipped-sw::after{top:100%;right:50%;margin-top:6px;}/*!sc*/ .hWlpPn.tooltipped-se::after{right:auto;left:50%;margin-left:-16px;}/*!sc*/ .hWlpPn.tooltipped-sw::after{margin-right:-16px;}/*!sc*/ .hWlpPn.tooltipped-n::after,.hWlpPn.tooltipped-ne::after,.hWlpPn.tooltipped-nw::after{right:50%;bottom:100%;margin-bottom:6px;}/*!sc*/ .hWlpPn.tooltipped-ne::after{right:auto;left:50%;margin-left:-16px;}/*!sc*/ .hWlpPn.tooltipped-nw::after{margin-right:-16px;}/*!sc*/ .hWlpPn.tooltipped-s::after,.hWlpPn.tooltipped-n::after{-webkit-transform:translateX(50%);-ms-transform:translateX(50%);transform:translateX(50%);}/*!sc*/ .hWlpPn.tooltipped-w::after{right:100%;bottom:50%;margin-right:6px;-webkit-transform:translateY(50%);-ms-transform:translateY(50%);transform:translateY(50%);}/*!sc*/ .hWlpPn.tooltipped-e::after{bottom:50%;left:100%;margin-left:6px;-webkit-transform:translateY(50%);-ms-transform:translateY(50%);transform:translateY(50%);}/*!sc*/ .hWlpPn.tooltipped-multiline::after{width:-webkit-max-content;width:-moz-max-content;width:max-content;max-width:250px;word-wrap:break-word;white-space:pre-line;border-collapse:separate;}/*!sc*/ .hWlpPn.tooltipped-multiline.tooltipped-s::after,.hWlpPn.tooltipped-multiline.tooltipped-n::after{right:auto;left:50%;-webkit-transform:translateX(-50%);-ms-transform:translateX(-50%);transform:translateX(-50%);}/*!sc*/ .hWlpPn.tooltipped-multiline.tooltipped-w::after,.hWlpPn.tooltipped-multiline.tooltipped-e::after{right:100%;}/*!sc*/ .hWlpPn.tooltipped-align-right-2::after{right:0;margin-right:0;}/*!sc*/ .hWlpPn.tooltipped-align-left-2::after{left:0;margin-left:0;}/*!sc*/ data-styled.g16[id="Tooltip__TooltipBase-sc-17tf59c-0"]{content:"hWlpPn,"}/*!sc*/ .liVpTx{display:inline-block;overflow:hidden;text-overflow:ellipsis;vertical-align:top;white-space:nowrap;max-width:125px;}/*!sc*/ data-styled.g18[id="Truncate__StyledTruncate-sc-23o1d2-0"]{content:"liVpTx,"}/*!sc*/ </style> <!-- --> <!-- --> <div class="Box-sc-g0xbh4-0 iVEunk"><div class="Box-sc-g0xbh4-0 jzuOtQ"><div class="Box-sc-g0xbh4-0 bGojzy"></div></div><div class="Box-sc-g0xbh4-0 iNSVHo"><div class="Box-sc-g0xbh4-0 bVgnfw"><div class="Box-sc-g0xbh4-0 CEgMp"><button type="button" aria-haspopup="true" aria-expanded="false" tabindex="0" aria-label="master branch" data-testid="anchor-button" class="Box-sc-g0xbh4-0 gMOVLe prc-Button-ButtonBase-c50BI overview-ref-selector width-full" data-loading="false" data-size="medium" data-variant="default" aria-describedby="branch-picker-repos-header-ref-selector-loading-announcement" id="branch-picker-repos-header-ref-selector"><span data-component="buttonContent" class="Box-sc-g0xbh4-0 gUkoLg prc-Button-ButtonContent-HKbr-"><span data-component="text" class="prc-Button-Label-pTQ3x"><div class="Box-sc-g0xbh4-0 bZBlpz"><div class="Box-sc-g0xbh4-0 lhTYNA"><svg aria-hidden="true" focusable="false" class="octicon octicon-git-branch" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M9.5 3.25a2.25 2.25 0 1 1 3 2.122V6A2.5 2.5 0 0 1 10 8.5H6a1 1 0 0 0-1 1v1.128a2.251 2.251 0 1 1-1.5 0V5.372a2.25 2.25 0 1 1 1.5 0v1.836A2.493 2.493 0 0 1 6 7h4a1 1 0 0 0 1-1v-.628A2.25 2.25 0 0 1 9.5 3.25Zm-6 0a.75.75 0 1 0 1.5 0 .75.75 0 0 0-1.5 0Zm8.25-.75a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5ZM4.25 12a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Z"></path></svg></div><div class="Box-sc-g0xbh4-0 ffLUq ref-selector-button-text-container"><span class="Box-sc-g0xbh4-0 bmcJak prc-Text-Text-0ima0"> <!-- -->master</span></div></div></span><span data-component="trailingVisual" class="prc-Button-Visual-2epfX prc-Button-VisualWrap-Db-eB"><svg aria-hidden="true" focusable="false" class="octicon octicon-triangle-down" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="m4.427 7.427 3.396 3.396a.25.25 0 0 0 .354 0l3.396-3.396A.25.25 0 0 0 11.396 7H4.604a.25.25 0 0 0-.177.427Z"></path></svg></span></span></button><button hidden="" data-hotkey-scope="read-only-cursor-text-area"></button></div><div class="Box-sc-g0xbh4-0 fLXEGX"><a style="--button-color:fg.muted" type="button" href="/fengjixuchui/awesome-cyber-security/branches" class="Box-sc-g0xbh4-0 lmSMZJ prc-Button-ButtonBase-c50BI" data-loading="false" data-size="medium" data-variant="invisible" aria-describedby=":Rclab:-loading-announcement"><span data-component="buttonContent" class="Box-sc-g0xbh4-0 gUkoLg prc-Button-ButtonContent-HKbr-"><span data-component="leadingVisual" class="prc-Button-Visual-2epfX prc-Button-VisualWrap-Db-eB"><svg aria-hidden="true" focusable="false" class="octicon octicon-git-branch" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M9.5 3.25a2.25 2.25 0 1 1 3 2.122V6A2.5 2.5 0 0 1 10 8.5H6a1 1 0 0 0-1 1v1.128a2.251 2.251 0 1 1-1.5 0V5.372a2.25 2.25 0 1 1 1.5 0v1.836A2.493 2.493 0 0 1 6 7h4a1 1 0 0 0 1-1v-.628A2.25 2.25 0 0 1 9.5 3.25Zm-6 0a.75.75 0 1 0 1.5 0 .75.75 0 0 0-1.5 0Zm8.25-.75a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5ZM4.25 12a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Z"></path></svg></span><span data-component="text" class="prc-Button-Label-pTQ3x">Branches</span></span></a><a style="--button-color:fg.muted" type="button" href="/fengjixuchui/awesome-cyber-security/tags" class="Box-sc-g0xbh4-0 lmSMZJ prc-Button-ButtonBase-c50BI" data-loading="false" data-size="medium" data-variant="invisible" aria-describedby=":Rklab:-loading-announcement"><span data-component="buttonContent" class="Box-sc-g0xbh4-0 gUkoLg prc-Button-ButtonContent-HKbr-"><span data-component="leadingVisual" class="prc-Button-Visual-2epfX prc-Button-VisualWrap-Db-eB"><svg aria-hidden="true" focusable="false" class="octicon octicon-tag" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M1 7.775V2.75C1 1.784 1.784 1 2.75 1h5.025c.464 0 .91.184 1.238.513l6.25 6.25a1.75 1.75 0 0 1 0 2.474l-5.026 5.026a1.75 1.75 0 0 1-2.474 0l-6.25-6.25A1.752 1.752 0 0 1 1 7.775Zm1.5 0c0 .066.026.13.073.177l6.25 6.25a.25.25 0 0 0 .354 0l5.025-5.025a.25.25 0 0 0 0-.354l-6.25-6.25a.25.25 0 0 0-.177-.073H2.75a.25.25 0 0 0-.25.25ZM6 5a1 1 0 1 1 0 2 1 1 0 0 1 0-2Z"></path></svg></span><span data-component="text" class="prc-Button-Label-pTQ3x">Tags</span></span></a></div><div class="Box-sc-g0xbh4-0 dqfxud"><a style="--button-color:fg.muted" type="button" aria-label="Go to Branches page" href="/fengjixuchui/awesome-cyber-security/branches" class="Box-sc-g0xbh4-0 fGwBZA prc-Button-ButtonBase-c50BI" data-loading="false" data-no-visuals="true" data-size="medium" data-variant="invisible" aria-describedby=":Relab:-loading-announcement"><svg aria-hidden="true" focusable="false" class="octicon octicon-git-branch" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M9.5 3.25a2.25 2.25 0 1 1 3 2.122V6A2.5 2.5 0 0 1 10 8.5H6a1 1 0 0 0-1 1v1.128a2.251 2.251 0 1 1-1.5 0V5.372a2.25 2.25 0 1 1 1.5 0v1.836A2.493 2.493 0 0 1 6 7h4a1 1 0 0 0 1-1v-.628A2.25 2.25 0 0 1 9.5 3.25Zm-6 0a.75.75 0 1 0 1.5 0 .75.75 0 0 0-1.5 0Zm8.25-.75a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5ZM4.25 12a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Z"></path></svg></a><a style="--button-color:fg.muted" type="button" aria-label="Go to Tags page" href="/fengjixuchui/awesome-cyber-security/tags" class="Box-sc-g0xbh4-0 fGwBZA prc-Button-ButtonBase-c50BI" data-loading="false" data-no-visuals="true" data-size="medium" data-variant="invisible" aria-describedby=":Rmlab:-loading-announcement"><svg aria-hidden="true" focusable="false" class="octicon octicon-tag" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M1 7.775V2.75C1 1.784 1.784 1 2.75 1h5.025c.464 0 .91.184 1.238.513l6.25 6.25a1.75 1.75 0 0 1 0 2.474l-5.026 5.026a1.75 1.75 0 0 1-2.474 0l-6.25-6.25A1.752 1.752 0 0 1 1 7.775Zm1.5 0c0 .066.026.13.073.177l6.25 6.25a.25.25 0 0 0 .354 0l5.025-5.025a.25.25 0 0 0 0-.354l-6.25-6.25a.25.25 0 0 0-.177-.073H2.75a.25.25 0 0 0-.25.25ZM6 5a1 1 0 1 1 0 2 1 1 0 0 1 0-2Z"></path></svg></a></div></div><div class="Box-sc-g0xbh4-0 jxTzTd"><div class="Box-sc-g0xbh4-0 gqqBXN"><div class="Box-sc-g0xbh4-0 dzXgxt"><!--$--><div class="Box-sc-g0xbh4-0 iWFGlI"><span class="Box-sc-g0xbh4-0 vcvyP TextInput-wrapper prc-components-TextInputWrapper-i1ofR prc-components-TextInputBaseWrapper-ueK9q" data-leading-visual="true" data-trailing-visual="true" aria-busy="false"><span class="TextInput-icon" id=":R2j5ab:" aria-hidden="true"><svg aria-hidden="true" focusable="false" class="octicon octicon-search" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M10.68 11.74a6 6 0 0 1-7.922-8.982 6 6 0 0 1 8.982 7.922l3.04 3.04a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215ZM11.5 7a4.499 4.499 0 1 0-8.997 0A4.499 4.499 0 0 0 11.5 7Z"></path></svg></span><input type="text" aria-label="Go to file" role="combobox" aria-controls="file-results-list" aria-expanded="false" aria-haspopup="dialog" autoCorrect="off" spellcheck="false" placeholder="Go to file" aria-describedby=":R2j5ab: :R2j5abH1:" data-component="input" class="prc-components-Input-Ic-y8" value=""/><span class="TextInput-icon" id=":R2j5abH1:" aria-hidden="true"></span></span></div><!--/$--></div><div class="Box-sc-g0xbh4-0 YUPas"><button type="button" class="prc-Button-ButtonBase-c50BI" data-loading="false" data-no-visuals="true" data-size="medium" data-variant="default" aria-describedby=":Rr5ab:-loading-announcement"><span data-component="buttonContent" data-align="center" class="prc-Button-ButtonContent-HKbr-"><span data-component="text" class="prc-Button-Label-pTQ3x">Go to file</span></span></button></div><div class="react-directory-add-file-icon"></div><div class="react-directory-remove-file-icon"></div></div><button type="button" aria-haspopup="true" aria-expanded="false" tabindex="0" class="prc-Button-ButtonBase-c50BI" data-loading="false" data-size="medium" data-variant="primary" aria-describedby=":R55ab:-loading-announcement" id=":R55ab:"><span data-component="buttonContent" data-align="center" class="prc-Button-ButtonContent-HKbr-"><span data-component="leadingVisual" class="prc-Button-Visual-2epfX prc-Button-VisualWrap-Db-eB"><svg aria-hidden="true" focusable="false" class="octicon octicon-code hide-sm" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="m11.28 3.22 4.25 4.25a.75.75 0 0 1 0 1.06l-4.25 4.25a.749.749 0 0 1-1.275-.326.749.749 0 0 1 .215-.734L13.94 8l-3.72-3.72a.749.749 0 0 1 .326-1.275.749.749 0 0 1 .734.215Zm-6.56 0a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042L2.06 8l3.72 3.72a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L.47 8.53a.75.75 0 0 1 0-1.06Z"></path></svg></span><span data-component="text" class="prc-Button-Label-pTQ3x">Code</span><span data-component="trailingVisual" class="prc-Button-Visual-2epfX prc-Button-VisualWrap-Db-eB"><svg aria-hidden="true" focusable="false" class="octicon octicon-triangle-down" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="m4.427 7.427 3.396 3.396a.25.25 0 0 0 .354 0l3.396-3.396A.25.25 0 0 0 11.396 7H4.604a.25.25 0 0 0-.177.427Z"></path></svg></span></span></button><div class="Box-sc-g0xbh4-0 izFOf"><button data-component="IconButton" type="button" aria-label="Open more actions menu" aria-haspopup="true" aria-expanded="false" tabindex="0" class="prc-Button-ButtonBase-c50BI prc-Button-IconButton-szpyj" data-loading="false" data-no-visuals="true" data-size="medium" data-variant="default" aria-describedby=":R75ab:-loading-announcement" id=":R75ab:"><svg aria-hidden="true" focusable="false" class="octicon octicon-kebab-horizontal" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M8 9a1.5 1.5 0 1 0 0-3 1.5 1.5 0 0 0 0 3ZM1.5 9a1.5 1.5 0 1 0 0-3 1.5 1.5 0 0 0 0 3Zm13 0a1.5 1.5 0 1 0 0-3 1.5 1.5 0 0 0 0 3Z"></path></svg></button></div></div></div><div class="Box-sc-g0xbh4-0 vIPPs"><div data-hpc="true"><button hidden="" data-testid="focus-next-element-button" data-hotkey="j"></button><button hidden="" data-testid="focus-previous-element-button" data-hotkey="k"></button><h2 class="sr-only ScreenReaderHeading-module__userSelectNone--vW4Cq prc-Heading-Heading-6CmGO" data-testid="screen-reader-heading" id="folders-and-files">Folders and files</h2><table aria-labelledby="folders-and-files" class="Box-sc-g0xbh4-0 fdROMU"><thead class="Box-sc-g0xbh4-0 jGKpsv"><tr class="Box-sc-g0xbh4-0 jdgHnn"><th colSpan="2" class="Box-sc-g0xbh4-0 bQivRW"><span class="text-bold">Name</span></th><th colSpan="1" class="Box-sc-g0xbh4-0 ldkMIO"><span class="text-bold">Name</span></th><th class="hide-sm"><div title="Last commit message" class="Truncate__StyledTruncate-sc-23o1d2-0 liVpTx width-fit"><span class="text-bold">Last commit message</span></div></th><th colSpan="1" class="Box-sc-g0xbh4-0 jMbWeI"><div title="Last commit date" class="Truncate__StyledTruncate-sc-23o1d2-0 liVpTx width-fit"><span class="text-bold">Last commit date</span></div></th></tr></thead><tbody><tr class="Box-sc-g0xbh4-0 gpqjiB"><td colSpan="3" class="bgColor-muted p-1 rounded-top-2"><div class="Box-sc-g0xbh4-0 dzCJzi"><h2 class="sr-only ScreenReaderHeading-module__userSelectNone--vW4Cq prc-Heading-Heading-6CmGO" data-testid="screen-reader-heading">Latest commit</h2><div style="width:120px" class="Skeleton Skeleton--text" data-testid="loading"> </div><div class="d-flex flex-shrink-0 gap-2"><div data-testid="latest-commit-details" class="d-none d-sm-flex flex-items-center"></div><div class="d-flex gap-2"><h2 class="sr-only ScreenReaderHeading-module__userSelectNone--vW4Cq prc-Heading-Heading-6CmGO" data-testid="screen-reader-heading">History</h2><a href="/fengjixuchui/awesome-cyber-security/commits/master/" class="prc-Button-ButtonBase-c50BI d-none d-lg-flex LinkButton-module__code-view-link-button--xvCGA flex-items-center fgColor-default" data-loading="false" data-size="small" data-variant="invisible" aria-describedby=":Raqj8pab:-loading-announcement"><span data-component="buttonContent" data-align="center" class="prc-Button-ButtonContent-HKbr-"><span data-component="leadingVisual" class="prc-Button-Visual-2epfX prc-Button-VisualWrap-Db-eB"><svg aria-hidden="true" focusable="false" class="octicon octicon-history" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="m.427 1.927 1.215 1.215a8.002 8.002 0 1 1-1.6 5.685.75.75 0 1 1 1.493-.154 6.5 6.5 0 1 0 1.18-4.458l1.358 1.358A.25.25 0 0 1 3.896 6H.25A.25.25 0 0 1 0 5.75V2.104a.25.25 0 0 1 .427-.177ZM7.75 4a.75.75 0 0 1 .75.75v2.992l2.028.812a.75.75 0 0 1-.557 1.392l-2.5-1A.751.751 0 0 1 7 8.25v-3.5A.75.75 0 0 1 7.75 4Z"></path></svg></span><span data-component="text" class="prc-Button-Label-pTQ3x"><span class="fgColor-default">8 Commits</span></span></span></a><div class="d-sm-none"></div><div class="d-flex d-lg-none"><span role="tooltip" aria-label="8 Commits" id="history-icon-button-tooltip" class="Tooltip__TooltipBase-sc-17tf59c-0 hWlpPn tooltipped-n"><a href="/fengjixuchui/awesome-cyber-security/commits/master/" class="prc-Button-ButtonBase-c50BI LinkButton-module__code-view-link-button--xvCGA flex-items-center fgColor-default" data-loading="false" data-size="small" data-variant="invisible" aria-describedby=":R1iqj8pab:-loading-announcement history-icon-button-tooltip"><span data-component="buttonContent" data-align="center" class="prc-Button-ButtonContent-HKbr-"><span data-component="leadingVisual" class="prc-Button-Visual-2epfX prc-Button-VisualWrap-Db-eB"><svg aria-hidden="true" focusable="false" class="octicon octicon-history" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="m.427 1.927 1.215 1.215a8.002 8.002 0 1 1-1.6 5.685.75.75 0 1 1 1.493-.154 6.5 6.5 0 1 0 1.18-4.458l1.358 1.358A.25.25 0 0 1 3.896 6H.25A.25.25 0 0 1 0 5.75V2.104a.25.25 0 0 1 .427-.177ZM7.75 4a.75.75 0 0 1 .75.75v2.992l2.028.812a.75.75 0 0 1-.557 1.392l-2.5-1A.751.751 0 0 1 7 8.25v-3.5A.75.75 0 0 1 7.75 4Z"></path></svg></span></span></a></span></div></div></div></div></td></tr><tr class="react-directory-row undefined" id="folder-row-0"><td class="react-directory-row-name-cell-small-screen" colSpan="2"><div class="react-directory-filename-column"><svg aria-hidden="true" focusable="false" class="octicon octicon-file-directory-fill icon-directory" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M1.75 1A1.75 1.75 0 0 0 0 2.75v10.5C0 14.216.784 15 1.75 15h12.5A1.75 1.75 0 0 0 16 13.25v-8.5A1.75 1.75 0 0 0 14.25 3H7.5a.25.25 0 0 1-.2-.1l-.9-1.2C6.07 1.26 5.55 1 5 1H1.75Z"></path></svg><div class="overflow-hidden"><div class="react-directory-filename-cell"><div class="react-directory-truncate"><a title="history" aria-label="history, (Directory)" class="Link--primary" href="/fengjixuchui/awesome-cyber-security/tree/master/history">history</a></div></div></div></div></td><td class="react-directory-row-name-cell-large-screen" colSpan="1"><div class="react-directory-filename-column"><svg aria-hidden="true" focusable="false" class="octicon octicon-file-directory-fill icon-directory" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M1.75 1A1.75 1.75 0 0 0 0 2.75v10.5C0 14.216.784 15 1.75 15h12.5A1.75 1.75 0 0 0 16 13.25v-8.5A1.75 1.75 0 0 0 14.25 3H7.5a.25.25 0 0 1-.2-.1l-.9-1.2C6.07 1.26 5.55 1 5 1H1.75Z"></path></svg><div class="overflow-hidden"><div class="react-directory-filename-cell"><div class="react-directory-truncate"><a title="history" aria-label="history, (Directory)" class="Link--primary" href="/fengjixuchui/awesome-cyber-security/tree/master/history">history</a></div></div></div></div></td><td class="react-directory-row-commit-cell"><div class="Skeleton Skeleton--text"> </div></td><td><div class="Skeleton Skeleton--text"> </div></td></tr><tr class="react-directory-row undefined" id="folder-row-1"><td class="react-directory-row-name-cell-small-screen" colSpan="2"><div class="react-directory-filename-column"><svg aria-hidden="true" focusable="false" class="octicon octicon-file color-fg-muted" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M2 1.75C2 .784 2.784 0 3.75 0h6.586c.464 0 .909.184 1.237.513l2.914 2.914c.329.328.513.773.513 1.237v9.586A1.75 1.75 0 0 1 13.25 16h-9.5A1.75 1.75 0 0 1 2 14.25Zm1.75-.25a.25.25 0 0 0-.25.25v12.5c0 .138.112.25.25.25h9.5a.25.25 0 0 0 .25-.25V6h-2.75A1.75 1.75 0 0 1 9 4.25V1.5Zm6.75.062V4.25c0 .138.112.25.25.25h2.688l-.011-.013-2.914-2.914-.013-.011Z"></path></svg><div class="overflow-hidden"><div class="react-directory-filename-cell"><div class="react-directory-truncate"><a title=".directory" aria-label=".directory, (File)" class="Link--primary" href="/fengjixuchui/awesome-cyber-security/blob/master/.directory">.directory</a></div></div></div></div></td><td class="react-directory-row-name-cell-large-screen" colSpan="1"><div class="react-directory-filename-column"><svg aria-hidden="true" focusable="false" class="octicon octicon-file color-fg-muted" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M2 1.75C2 .784 2.784 0 3.75 0h6.586c.464 0 .909.184 1.237.513l2.914 2.914c.329.328.513.773.513 1.237v9.586A1.75 1.75 0 0 1 13.25 16h-9.5A1.75 1.75 0 0 1 2 14.25Zm1.75-.25a.25.25 0 0 0-.25.25v12.5c0 .138.112.25.25.25h9.5a.25.25 0 0 0 .25-.25V6h-2.75A1.75 1.75 0 0 1 9 4.25V1.5Zm6.75.062V4.25c0 .138.112.25.25.25h2.688l-.011-.013-2.914-2.914-.013-.011Z"></path></svg><div class="overflow-hidden"><div class="react-directory-filename-cell"><div class="react-directory-truncate"><a title=".directory" aria-label=".directory, (File)" class="Link--primary" href="/fengjixuchui/awesome-cyber-security/blob/master/.directory">.directory</a></div></div></div></div></td><td class="react-directory-row-commit-cell"><div class="Skeleton Skeleton--text"> </div></td><td><div class="Skeleton Skeleton--text"> </div></td></tr><tr class="react-directory-row undefined" id="folder-row-2"><td class="react-directory-row-name-cell-small-screen" colSpan="2"><div class="react-directory-filename-column"><svg aria-hidden="true" focusable="false" class="octicon octicon-file color-fg-muted" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M2 1.75C2 .784 2.784 0 3.75 0h6.586c.464 0 .909.184 1.237.513l2.914 2.914c.329.328.513.773.513 1.237v9.586A1.75 1.75 0 0 1 13.25 16h-9.5A1.75 1.75 0 0 1 2 14.25Zm1.75-.25a.25.25 0 0 0-.25.25v12.5c0 .138.112.25.25.25h9.5a.25.25 0 0 0 .25-.25V6h-2.75A1.75 1.75 0 0 1 9 4.25V1.5Zm6.75.062V4.25c0 .138.112.25.25.25h2.688l-.011-.013-2.914-2.914-.013-.011Z"></path></svg><div class="overflow-hidden"><div class="react-directory-filename-cell"><div class="react-directory-truncate"><a title="Readme.md" aria-label="Readme.md, (File)" class="Link--primary" href="/fengjixuchui/awesome-cyber-security/blob/master/Readme.md">Readme.md</a></div></div></div></div></td><td class="react-directory-row-name-cell-large-screen" colSpan="1"><div class="react-directory-filename-column"><svg aria-hidden="true" focusable="false" class="octicon octicon-file color-fg-muted" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M2 1.75C2 .784 2.784 0 3.75 0h6.586c.464 0 .909.184 1.237.513l2.914 2.914c.329.328.513.773.513 1.237v9.586A1.75 1.75 0 0 1 13.25 16h-9.5A1.75 1.75 0 0 1 2 14.25Zm1.75-.25a.25.25 0 0 0-.25.25v12.5c0 .138.112.25.25.25h9.5a.25.25 0 0 0 .25-.25V6h-2.75A1.75 1.75 0 0 1 9 4.25V1.5Zm6.75.062V4.25c0 .138.112.25.25.25h2.688l-.011-.013-2.914-2.914-.013-.011Z"></path></svg><div class="overflow-hidden"><div class="react-directory-filename-cell"><div class="react-directory-truncate"><a title="Readme.md" aria-label="Readme.md, (File)" class="Link--primary" href="/fengjixuchui/awesome-cyber-security/blob/master/Readme.md">Readme.md</a></div></div></div></div></td><td class="react-directory-row-commit-cell"><div class="Skeleton Skeleton--text"> </div></td><td><div class="Skeleton Skeleton--text"> </div></td></tr><tr class="react-directory-row undefined" id="folder-row-3"><td class="react-directory-row-name-cell-small-screen" colSpan="2"><div class="react-directory-filename-column"><svg aria-hidden="true" focusable="false" class="octicon octicon-file color-fg-muted" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M2 1.75C2 .784 2.784 0 3.75 0h6.586c.464 0 .909.184 1.237.513l2.914 2.914c.329.328.513.773.513 1.237v9.586A1.75 1.75 0 0 1 13.25 16h-9.5A1.75 1.75 0 0 1 2 14.25Zm1.75-.25a.25.25 0 0 0-.25.25v12.5c0 .138.112.25.25.25h9.5a.25.25 0 0 0 .25-.25V6h-2.75A1.75 1.75 0 0 1 9 4.25V1.5Zm6.75.062V4.25c0 .138.112.25.25.25h2.688l-.011-.013-2.914-2.914-.013-.011Z"></path></svg><div class="overflow-hidden"><div class="react-directory-filename-cell"><div class="react-directory-truncate"><a title="Readme_en.md" aria-label="Readme_en.md, (File)" class="Link--primary" href="/fengjixuchui/awesome-cyber-security/blob/master/Readme_en.md">Readme_en.md</a></div></div></div></div></td><td class="react-directory-row-name-cell-large-screen" colSpan="1"><div class="react-directory-filename-column"><svg aria-hidden="true" focusable="false" class="octicon octicon-file color-fg-muted" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M2 1.75C2 .784 2.784 0 3.75 0h6.586c.464 0 .909.184 1.237.513l2.914 2.914c.329.328.513.773.513 1.237v9.586A1.75 1.75 0 0 1 13.25 16h-9.5A1.75 1.75 0 0 1 2 14.25Zm1.75-.25a.25.25 0 0 0-.25.25v12.5c0 .138.112.25.25.25h9.5a.25.25 0 0 0 .25-.25V6h-2.75A1.75 1.75 0 0 1 9 4.25V1.5Zm6.75.062V4.25c0 .138.112.25.25.25h2.688l-.011-.013-2.914-2.914-.013-.011Z"></path></svg><div class="overflow-hidden"><div class="react-directory-filename-cell"><div class="react-directory-truncate"><a title="Readme_en.md" aria-label="Readme_en.md, (File)" class="Link--primary" href="/fengjixuchui/awesome-cyber-security/blob/master/Readme_en.md">Readme_en.md</a></div></div></div></div></td><td class="react-directory-row-commit-cell"><div class="Skeleton Skeleton--text"> </div></td><td><div class="Skeleton Skeleton--text"> </div></td></tr><tr class="react-directory-row undefined" id="folder-row-4"><td class="react-directory-row-name-cell-small-screen" colSpan="2"><div class="react-directory-filename-column"><svg aria-hidden="true" focusable="false" class="octicon octicon-file color-fg-muted" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M2 1.75C2 .784 2.784 0 3.75 0h6.586c.464 0 .909.184 1.237.513l2.914 2.914c.329.328.513.773.513 1.237v9.586A1.75 1.75 0 0 1 13.25 16h-9.5A1.75 1.75 0 0 1 2 14.25Zm1.75-.25a.25.25 0 0 0-.25.25v12.5c0 .138.112.25.25.25h9.5a.25.25 0 0 0 .25-.25V6h-2.75A1.75 1.75 0 0 1 9 4.25V1.5Zm6.75.062V4.25c0 .138.112.25.25.25h2.688l-.011-.013-2.914-2.914-.013-.011Z"></path></svg><div class="overflow-hidden"><div class="react-directory-filename-cell"><div class="react-directory-truncate"><a title="Readme_full.md" aria-label="Readme_full.md, (File)" class="Link--primary" href="/fengjixuchui/awesome-cyber-security/blob/master/Readme_full.md">Readme_full.md</a></div></div></div></div></td><td class="react-directory-row-name-cell-large-screen" colSpan="1"><div class="react-directory-filename-column"><svg aria-hidden="true" focusable="false" class="octicon octicon-file color-fg-muted" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M2 1.75C2 .784 2.784 0 3.75 0h6.586c.464 0 .909.184 1.237.513l2.914 2.914c.329.328.513.773.513 1.237v9.586A1.75 1.75 0 0 1 13.25 16h-9.5A1.75 1.75 0 0 1 2 14.25Zm1.75-.25a.25.25 0 0 0-.25.25v12.5c0 .138.112.25.25.25h9.5a.25.25 0 0 0 .25-.25V6h-2.75A1.75 1.75 0 0 1 9 4.25V1.5Zm6.75.062V4.25c0 .138.112.25.25.25h2.688l-.011-.013-2.914-2.914-.013-.011Z"></path></svg><div class="overflow-hidden"><div class="react-directory-filename-cell"><div class="react-directory-truncate"><a title="Readme_full.md" aria-label="Readme_full.md, (File)" class="Link--primary" href="/fengjixuchui/awesome-cyber-security/blob/master/Readme_full.md">Readme_full.md</a></div></div></div></div></td><td class="react-directory-row-commit-cell"><div class="Skeleton Skeleton--text"> </div></td><td><div class="Skeleton Skeleton--text"> </div></td></tr><tr class="react-directory-row undefined" id="folder-row-5"><td class="react-directory-row-name-cell-small-screen" colSpan="2"><div class="react-directory-filename-column"><svg aria-hidden="true" focusable="false" class="octicon octicon-file color-fg-muted" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M2 1.75C2 .784 2.784 0 3.75 0h6.586c.464 0 .909.184 1.237.513l2.914 2.914c.329.328.513.773.513 1.237v9.586A1.75 1.75 0 0 1 13.25 16h-9.5A1.75 1.75 0 0 1 2 14.25Zm1.75-.25a.25.25 0 0 0-.25.25v12.5c0 .138.112.25.25.25h9.5a.25.25 0 0 0 .25-.25V6h-2.75A1.75 1.75 0 0 1 9 4.25V1.5Zm6.75.062V4.25c0 .138.112.25.25.25h2.688l-.011-.013-2.914-2.914-.013-.011Z"></path></svg><div class="overflow-hidden"><div class="react-directory-filename-cell"><div class="react-directory-truncate"><a title="Readme_full_en.md" aria-label="Readme_full_en.md, (File)" class="Link--primary" href="/fengjixuchui/awesome-cyber-security/blob/master/Readme_full_en.md">Readme_full_en.md</a></div></div></div></div></td><td class="react-directory-row-name-cell-large-screen" colSpan="1"><div class="react-directory-filename-column"><svg aria-hidden="true" focusable="false" class="octicon octicon-file color-fg-muted" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M2 1.75C2 .784 2.784 0 3.75 0h6.586c.464 0 .909.184 1.237.513l2.914 2.914c.329.328.513.773.513 1.237v9.586A1.75 1.75 0 0 1 13.25 16h-9.5A1.75 1.75 0 0 1 2 14.25Zm1.75-.25a.25.25 0 0 0-.25.25v12.5c0 .138.112.25.25.25h9.5a.25.25 0 0 0 .25-.25V6h-2.75A1.75 1.75 0 0 1 9 4.25V1.5Zm6.75.062V4.25c0 .138.112.25.25.25h2.688l-.011-.013-2.914-2.914-.013-.011Z"></path></svg><div class="overflow-hidden"><div class="react-directory-filename-cell"><div class="react-directory-truncate"><a title="Readme_full_en.md" aria-label="Readme_full_en.md, (File)" class="Link--primary" href="/fengjixuchui/awesome-cyber-security/blob/master/Readme_full_en.md">Readme_full_en.md</a></div></div></div></div></td><td class="react-directory-row-commit-cell"><div class="Skeleton Skeleton--text"> </div></td><td><div class="Skeleton Skeleton--text"> </div></td></tr><tr class="Box-sc-g0xbh4-0 eNCcrz d-none" data-testid="view-all-files-row"><td colSpan="3" class="Box-sc-g0xbh4-0 bHTcCe"><div><button class="prc-Link-Link-85e08">View all files</button></div></td></tr></tbody></table></div><div class="Box-sc-g0xbh4-0 csrIcr"><div class="Box-sc-g0xbh4-0 bUQNHB"><div itemscope="" itemType="https://schema.org/abstract" class="Box-sc-g0xbh4-0 jPdcfu"><h2 class="_VisuallyHidden__VisuallyHidden-sc-11jhm7a-0 brGdpi">Repository files navigation</h2><nav class="Box-sc-g0xbh4-0 iphEWz prc-components-UnderlineWrapper-oOh5J" aria-label="Repository files"><ul class="prc-components-UnderlineItemList-b23Hf" role="list"><li class="Box-sc-g0xbh4-0 hUCRAk"><a class="prc-components-UnderlineItem-lJsg-" href="#" aria-current="page"><span data-component="icon"><svg aria-hidden="true" focusable="false" class="octicon octicon-book" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M0 1.75A.75.75 0 0 1 .75 1h4.253c1.227 0 2.317.59 3 1.501A3.743 3.743 0 0 1 11.006 1h4.245a.75.75 0 0 1 .75.75v10.5a.75.75 0 0 1-.75.75h-4.507a2.25 2.25 0 0 0-1.591.659l-.622.621a.75.75 0 0 1-1.06 0l-.622-.621A2.25 2.25 0 0 0 5.258 13H.75a.75.75 0 0 1-.75-.75Zm7.251 10.324.004-5.073-.002-2.253A2.25 2.25 0 0 0 5.003 2.5H1.5v9h3.757a3.75 3.75 0 0 1 1.994.574ZM8.755 4.75l-.004 7.322a3.752 3.752 0 0 1 1.992-.572H14.5v-9h-3.495a2.25 2.25 0 0 0-2.25 2.25Z"></path></svg></span><span data-component="text" data-content="README">README</span></a></li></ul></nav><button style="--button-color:fg.subtle" type="button" aria-label="Outline" aria-haspopup="true" aria-expanded="false" tabindex="0" class="Box-sc-g0xbh4-0 cwoBXV prc-Button-ButtonBase-c50BI" data-loading="false" data-size="medium" data-variant="invisible" aria-describedby=":Rr9ab:-loading-announcement" id=":Rr9ab:"><svg aria-hidden="true" focusable="false" class="octicon octicon-list-unordered" viewBox="0 0 16 16" width="16" height="16" fill="currentColor" display="inline-block" overflow="visible" style="vertical-align:text-bottom"><path d="M5.75 2.5h8.5a.75.75 0 0 1 0 1.5h-8.5a.75.75 0 0 1 0-1.5Zm0 5h8.5a.75.75 0 0 1 0 1.5h-8.5a.75.75 0 0 1 0-1.5Zm0 5h8.5a.75.75 0 0 1 0 1.5h-8.5a.75.75 0 0 1 0-1.5ZM2 14a1 1 0 1 1 0-2 1 1 0 0 1 0 2Zm1-6a1 1 0 1 1-2 0 1 1 0 0 1 2 0ZM2 4a1 1 0 1 1 0-2 1 1 0 0 1 0 2Z"></path></svg></button></div><div class="Box-sc-g0xbh4-0 QkQOb js-snippet-clipboard-copy-unpositioned undefined" data-hpc="true"><article class="markdown-body entry-content container-lg" itemprop="text"><div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto">所有收集类项目:</h1><a id="user-content-所有收集类项目" class="anchor" aria-label="Permalink: 所有收集类项目:" href="#所有收集类项目"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li><a href="https://github.com/alphaSeclab/sec-tool-list">收集的所有开源工具</a>: 超过18K, 包括Markdown和Json两种格式</li> <li><a href="https://github.com/alphaSeclab/awesome-reverse-engineering">逆向资源</a>: IDA/Ghidra/x64dbg/OllDbg/WinDBG/CuckooSandbox/Radare2/BinaryNinja/DynamoRIO/IntelPin/Frida/QEMU/Android安全/iOS安全/Window安全/Linux安全/macOS安全/游戏Hacking/Bootkit/Rootkit/Angr/Shellcode/进程注入/代码注入/DLL注入/WSL/Sysmon/...</li> <li><a href="https://github.com/alphaSeclab/awesome-network-stuff">网络相关的安全资源</a>: 代理/GFW/反向代理/隧道/VPN/Tor/I2P,以及中间人/PortKnocking/嗅探/网络分析/网络诊断等</li> <li><a href="https://github.com/alphaSeclab/awesome-cyber-security">攻击性网络安全资源</a>: 漏洞/渗透/物联网安全/数据渗透/Metasploit/BurpSuite/KaliLinux/C&amp;C/OWASP/免杀/CobaltStrike/侦查/OSINT/社工/密码/凭证/威胁狩猎/Payload/WifiHacking/无线攻击/后渗透/提权/UAC绕过/...</li> </ul> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto">PenetrationTesting</h1><a id="user-content-penetrationtesting" class="anchor" aria-label="Permalink: PenetrationTesting" href="#penetrationtesting"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <p dir="auto"><a href="https://github.com/alphaSeclab/awesome-cyber-security/blob/master/Readme_en.md">English Version</a></p> <p dir="auto">Github的Readme显示不会超过4000行,而此Repo添加的工具和文章近万行,默认显示不全。当前页面是减配版:工具星数少于200且500天内没更新的不在此文档中显示。</p> <p dir="auto">点击这里查看完整版:<a href="https://github.com/alphaSeclab/awesome-cyber-security/blob/master/Readme_full.md">中文-完整版</a></p> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto">目录</h1><a id="user-content-目录" class="anchor" aria-label="Permalink: 目录" href="#目录"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li><a href="#94ca60d12e210fdd7fd9e387339b293e">新添加的</a> <ul dir="auto"> <li><a href="#9eee96404f868f372a6cbc6769ccb7f8">工具</a> <ul dir="auto"> <li><a href="#31185b925d5152c7469b963809ceb22d">(1103) 新添加的</a></li> <li><a href="#f34b4da04f2a77a185729b5af752efc5">未分类</a></li> <li><a href="#b9dc08e7e118fc7af41df5e0ef9ddc3c">新添加1</a></li> <li><a href="#efb2cfb167e34b03243547cfb3a662ac">新添加2</a></li> <li><a href="#f04dd1be8e552b074dde7cb33ae6c84c">未分类3</a></li> <li><a href="#cbb37de8d70e314ce905d78c566ef384">未分类4</a></li> <li><a href="#bb7173c3a2ea52d046c8abe3c57e3291">未分类5</a></li> <li><a href="#f7654997cf8b691617b89c5e523a942f">(1) 其他</a></li> </ul> </li> <li><a href="#d5e869a870d6e2c14911de2bc527a6ef">(3) 古老的&amp;&amp;有新的替代版本的</a></li> <li><a href="#8603294b7c1f136b866b6402d63a9978">文章</a> <ul dir="auto"> <li><a href="#f110da0bf67359d3abc62b27d717e55e">新添加的</a></li> </ul> </li> </ul> </li> <li><a href="#a4ee2f4d4a944b54b2246c72c037cd2e">收集&amp;&amp;集合</a> <ul dir="auto"> <li><a href="#e97d183e67fa3f530e7d0e7e8c33ee62">(222) 未分类</a></li> <li><a href="#664ff1dbdafefd7d856c88112948a65b">(9) 混合型收集</a></li> <li><a href="#67acc04b20c99f87ee625b073330d8c2">(12) 无工具类收集</a></li> <li><a href="#24707dd322098f73c7e450d6b1eddf12">(1) 收集类的收集</a></li> <li><a href="#9101434a896f20263d09c25ace65f398">(7) 教育资源&amp;&amp;课程&amp;&amp;教程&amp;&amp;书籍</a></li> <li><a href="#8088e46fc533286d88b945f1d472bf57">笔记&amp;&amp;Tips&amp;&amp;Tricks</a> <ul dir="auto"> <li><a href="#f57ccaab4279b60c17a03f90d96b815c">(12) 未分类</a></li> <li><a href="#0476f6b97e87176da0a0d7328f8747e7">(1) blog</a></li> </ul> </li> <li><a href="#df8ec4a66ef5027bbcc591c94f8de1e5">Talk&amp;&amp;Conference </a></li> <li><a href="#4be58a3a00f83975b0321425db3b9b68">(1) 文档&amp;&amp;Documentation&amp;&amp;规则说明&amp;&amp;RFC</a></li> </ul> </li> <li><a href="#7e840ca27f1ff222fd25bc61a79b07ba">特定目标</a> <ul dir="auto"> <li><a href="#eb2d1ffb231cee014ed24d59ca987da2">(4) 未分类-XxTarget</a></li> <li><a href="#c71ad1932bbf9c908af83917fe1fd5da">(113) AWS</a></li> <li><a href="#88716f4591b1df2149c2b7778d15d04e">(1) Phoenix</a></li> <li><a href="#4fd96686a470ff4e9e974f1503d735a2">(4) Kubernetes</a></li> <li><a href="#786201db0bcc40fdf486cee406fdad31">(1) Azure</a></li> <li><a href="#40dbffa18ec695a618eef96d6fd09176">(1) Nginx</a></li> <li><a href="#6b90a3993f9846922396ec85713dc760">(1) ELK</a></li> <li><a href="#6730dabeca61fcf64d4f7631abae6734">(1) GoogleCloud&amp;&amp;谷歌云</a></li> </ul> </li> <li><a href="#d55d9dfd081aa2a02e636b97ca1bad0b">物联网(IoT)&amp;&amp;嵌入式设备&amp;&amp;路由器&amp;&amp;交换机&amp;&amp;智能设备&amp;&amp;打印机</a> <ul dir="auto"> <li><a href="#9a20a70f58ea7946f24224c5d73fac15">工具</a> <ul dir="auto"> <li><a href="#cda63179d132f43441f8844c5df10024">(46) 未分类-IoT</a></li> <li><a href="#72bffacc109d51ea286797a7d5079392">(1) 打印机 </a></li> <li><a href="#c9fd442ecac4e22d142731165b06b3fe">(4) 路由器&amp;&amp;交换机</a></li> <li><a href="#3d345feb9fee1c101aea3838da8cbaca">(1) 嵌入式设备</a></li> </ul> </li> <li><a href="#01e638f09e44280ae9a1a95fc376edc5">文章</a> <ul dir="auto"> <li><a href="#a4a3bcead86d9f9f7977479dfe94797d">新添加</a></li> </ul> </li> </ul> </li> <li><a href="#1233584261c0cd5224b6e90a98cc9a94">渗透&amp;&amp;offensive&amp;&amp;渗透框架&amp;&amp;后渗透框架</a> <ul dir="auto"> <li><a href="#5dd93fbc2f2ebc8d98672b2d95782af3">工具</a> <ul dir="auto"> <li><a href="#2e40f2f1df5d7f93a7de47bf49c24a0e">(310) 未分类-Pentest</a></li> <li><a href="#2051fd9e171f2698d8e7486e3dd35d87">(13) 渗透多合一&amp;&amp;渗透框架</a></li> <li><a href="#fc8737aef0f59c3952d11749fe582dac">(4) 自动化</a></li> <li><a href="#9081db81f6f4b78d5c263723a3f7bd6d">(4) 收集</a></li> <li><a href="#39e9a0fe929fffe5721f7d7bb2dae547">Burp</a> <ul dir="auto"> <li><a href="#6366edc293f25b57bf688570b11d6584">(2) 收集</a></li> <li><a href="#5b761419863bc686be12c76451f49532">(425) 未分类-Burp</a></li> </ul> </li> <li><a href="#3ae4408f4ab03f99bab9ef9ee69642a8">(4) 数据渗透&amp;&amp;DataExfiltration</a></li> <li><a href="#8e7a6a74ff322cbf2bad59092598de77">Metasploit</a> <ul dir="auto"> <li><a href="#01be61d5bb9f6f7199208ff0fba86b5d">(178) 未分类-metasploit</a></li> </ul> </li> <li><a href="#adfa06d452147ebacd35981ce56f916b">横向渗透</a></li> <li><a href="#b1161d6c4cb520d0cd574347cd18342e">(36) 免杀&amp;&amp;躲避AV检测</a></li> <li><a href="#98a851c8e6744850efcb27b8e93dff73">(107) C&amp;C</a></li> <li><a href="#a0897294e74a0863ea8b83d11994fad6">(96) DDOS</a></li> <li><a href="#7667f6a0381b6cded2014a0d279b5722">(148) Kali</a></li> <li><a href="#8e1069b2bce90b87eea762ee3d0935d8">(163) OWASP</a></li> <li><a href="#0b8e79b79094082d0906153445d6ef9a">(76) CobaltStrike</a></li> <li><a href="#fb821e664950df22549557cb8cc54afe">CMS</a></li> <li><a href="#53f3011d262d2554156afe18d7ad6a43">日志</a></li> <li><a href="#b0233cd346f5ee456ee04bf653b12ae2">劫持&amp;&amp;各种劫持</a> <ul dir="auto"> <li><a href="#b087f1741bcf7c449d2910d052a7f312">(51) 未分类-Hijack</a></li> <li><a href="#ecdeb90ce9bd347ca7f9d366d157689d">点击劫持</a></li> </ul> </li> <li><a href="#8afafc25f4fb0805556003864cce90e2">(31) RedTeam</a></li> <li><a href="#4c42a9cc007de389f975cb0ce146c0ed">(15) BlueTeam</a></li> </ul> </li> <li><a href="#f21aa1088a437dbb001a137f6f885530">文章</a> <ul dir="auto"> <li><a href="#7229723a22769af40b96ab31fb09dcc7">新添加的</a></li> <li><a href="#6280e13d236b0f18c75894d304309416">Metasploit</a></li> <li><a href="#082a9e72817adcf2f824767e3e2ce597">BurpSuite</a></li> <li><a href="#6710d6fe61cbbc36b2ba75de156eda8a">CobaltStrike </a></li> </ul> </li> </ul> </li> <li><a href="#8f92ead9997a4b68d06a9acf9b01ef63">扫描器&amp;&amp;安全扫描&amp;&amp;App扫描&amp;&amp;漏洞扫描</a> <ul dir="auto"> <li><a href="#132036452bfacf61471e3ea0b7bf7a55">工具</a> <ul dir="auto"> <li><a href="#de63a029bda6a7e429af272f291bb769">(291) 未分类-Scanner</a></li> <li><a href="#58d8b993ffc34f7ded7f4a0077129eb2">(20) 隐私&amp;&amp;Secret&amp;&amp;Privacy扫描</a></li> <li><a href="#1927ed0a77ff4f176b0b7f7abc551e4a">隐私存储</a> <ul dir="auto"> <li><a href="#1af1c4f9dba1db2a4137be9c441778b8">(1) 未分类</a></li> <li><a href="#362dfd9c1f530dd20f922fd4e0faf0e3">(26) 隐写</a></li> </ul> </li> </ul> </li> <li><a href="#1d8298e4ee4ad3c3028a1e157f85f27b">文章</a> <ul dir="auto"> <li><a href="#7669ebab00d00c744abc35195fbaa833">新添加的</a></li> </ul> </li> </ul> </li> <li><a href="#a76463feb91d09b3d024fae798b92be6">侦察&amp;&amp;信息收集&amp;&amp;子域名发现与枚举&amp;&amp;OSINT</a> <ul dir="auto"> <li><a href="#170048b7d8668c50681c0ab1e92c679a">工具</a> <ul dir="auto"> <li><a href="#05ab1b75266fddafc7195f5b395e4d99">(210) 未分类-OSINT</a></li> <li><a href="#e945721056c78a53003e01c3d2f3b8fe">(81) 子域名枚举&amp;&amp;爆破</a></li> <li><a href="#375a8baa06f24de1b67398c1ac74ed24">(183) 信息收集&amp;&amp;侦查&amp;&amp;Recon&amp;&amp;InfoGather</a></li> <li><a href="#016bb6bd00f1e0f8451f779fe09766db">(75) 指纹&amp;&amp;Fingerprinting</a></li> <li><a href="#6ea9006a5325dd21d246359329a3ede2">(1) 收集</a></li> <li><a href="#dc74ad2dd53aa8c8bf3a3097ad1f12b7">社交网络</a> <ul dir="auto"> <li><a href="#de93515e77c0ca100bbf92c83f82dc2a">(2) Twitter</a></li> <li><a href="#6d36e9623aadaf40085ef5af89c8d698">(5) 其他-SocialNetwork</a></li> <li><a href="#8d1ae776898748b8249132e822f6c919">(13) Github</a></li> </ul> </li> <li><a href="#a695111d8e30d645354c414cb27b7843">(71) DNS</a></li> <li><a href="#18c7c1df2e6ae5e9135dfa2e4eb1d4db">(68) Shodan</a></li> <li><a href="#94c01f488096fafc194b9a07f065594c">(187) nmap</a></li> </ul> </li> <li><a href="#b0ca6c8512a268e8438d5e5247a88c2f">文章</a> <ul dir="auto"> <li><a href="#5a855113503106950acff4d7dbb2403e">新添加</a></li> </ul> </li> </ul> </li> <li><a href="#546f4fe70faa2236c0fbc2d486a83391">社工(SET)&amp;&amp;钓鱼&amp;&amp;鱼叉攻击</a> <ul dir="auto"> <li><a href="#3e622bff3199cf22fe89db026b765cd4">工具</a> <ul dir="auto"> <li><a href="#ce734598055ad3885d45d0b35d2bf0d7">(11) 未分类-SET</a></li> <li><a href="#f30507893511f89b19934e082a54023e">(2) 社工</a></li> <li><a href="#290e9ae48108d21d6d8b9ea9e74d077d">(156) 钓鱼&amp;&amp;Phish</a></li> <li><a href="#ab3e6e6526d058e35c7091d8801ebf3a">鱼叉攻击</a></li> </ul> </li> <li><a href="#8f6c7489870c7358c39c920c83fa2b6b">文章</a> <ul dir="auto"> <li><a href="#d7e332e9e235fd5a60687800f5ce184c">新添加的</a></li> </ul> </li> </ul> </li> <li><a href="#dc89c90b80529c1f62f413288bca89c4">环境配置&amp;&amp;分析系统</a> <ul dir="auto"> <li><a href="#9763d00cbe773aa10502dbe258f9c385">工具</a> <ul dir="auto"> <li><a href="#f5a7a43f964b2c50825f3e2fee5078c8">(10) 未分类-Env</a></li> <li><a href="#cf07b04dd2db1deedcf9ea18c05c83e0">(5) Linux-Distro</a></li> <li><a href="#4709b10a8bb691204c0564a3067a0004">(3) 环境自动配置&amp;&amp;自动安装</a></li> </ul> </li> <li><a href="#6454949c0d580904537643b8f4cd5a6b">文章</a> <ul dir="auto"> <li><a href="#873294ea77bc292b6fc4cfb2f9b40049">新添加的</a></li> </ul> </li> </ul> </li> <li><a href="#c49aef477cf3397f97f8b72185c3d100">密码&amp;&amp;凭证&amp;&amp;认证</a> <ul dir="auto"> <li><a href="#862af330f45f21fbb0d495837fc7e879">工具</a> <ul dir="auto"> <li><a href="#20bf2e2fefd6de7aadbf0774f4921824">(98) 未分类-Password</a></li> <li><a href="#86dc226ae8a71db10e4136f4b82ccd06">(43) 密码</a></li> <li><a href="#764122f9a7cf936cd9bce316b09df5aa">(15) 认证&amp;&amp;Authenticate</a></li> </ul> </li> <li><a href="#5fda419e854b390c8361d347f48607ce">文章</a> <ul dir="auto"> <li><a href="#776c034543a65be69c061d1aafce3127">新添加的</a></li> </ul> </li> </ul> </li> <li><a href="#43b0310ac54c147a62c545a2b0f4bce2">辅助周边</a> <ul dir="auto"> <li><a href="#569887799ee0148230cc5d7bf98e96d0">(12) 未分类-Assist</a></li> <li><a href="#86d5daccb4ed597e85a0ec9c87f3c66f">(34) TLS&amp;&amp;SSL&amp;&amp;HTTPS</a></li> </ul> </li> <li><a href="#946d766c6a0fb23b480ff59d4029ec71">防护&amp;&amp;Defense</a> <ul dir="auto"> <li><a href="#0abd611fc3e9a4d9744865ca6e47a6b2">工具</a> <ul dir="auto"> <li><a href="#784ea32a3f4edde1cd424b58b17e7269">(101) WAF</a></li> <li><a href="#ce6532938f729d4c9d66a5c75d1676d3">(119) 防火墙&amp;&amp;FireWall</a></li> <li><a href="#ff3e0b52a1477704b5f6a94ccf784b9a">(39) IDS&amp;&amp;IPS</a></li> <li><a href="#7a277f8b0e75533e0b50d93c902fb351">(43) 未分类-Defense</a></li> <li><a href="#6543c237786d1f334d375f4d9acdeee4">(3) 隐私保护&amp;&amp;Privacy</a></li> </ul> </li> <li><a href="#5aac7367edfef7c63fc95afd6762b773">文章</a> <ul dir="auto"> <li><a href="#04aac0e81b87788343930e9dbf01ba9c">新添加的</a></li> </ul> </li> </ul> </li> <li><a href="#52b481533d065d9e80cfd3cca9d91c7f">SoftwareDefinedRadio</a> <ul dir="auto"> <li><a href="#015984b1dae0c9aa03b3aa74ea449f3f">(6) 工具</a></li> <li><a href="#043e62cc373eb3e7b3910b622cf220d8">文章</a></li> </ul> </li> <li><a href="#507f1a48f4709abb1c6b0d2689fd15e6">LOLBin&amp;&amp;LOLScript</a> <ul dir="auto"> <li><a href="#ec32edc7b3e441f29c70f6e9bca0174a">(2) 工具</a></li> <li><a href="#9bffad3ac781090ab31d4013bf858dd9">文章</a></li> </ul> </li> <li><a href="#e25d233159b1dc40898ff0c74574f790">日志&amp;&amp;Log</a> <ul dir="auto"> <li><a href="#13df0f4d5c7a1386b329fd9e43d8fc15">(1) 工具</a></li> <li><a href="#06e7d46942d5159d19aa5c36f66f174a">文章</a></li> </ul> </li> <li><a href="#9b026a07fdf243c6870ce91f00191214">威胁狩猎&amp;&amp;ThreatHunt</a> <ul dir="auto"> <li><a href="#b911aad7512e253660092942e06d00ad">工具</a> <ul dir="auto"> <li><a href="#0b27f97199330c4945572a1f9c229000">(1) 未分类</a></li> </ul> </li> <li><a href="#f613271a55b177f626b42b8c728a0b1c">文章</a> <ul dir="auto"> <li><a href="#3828e67170e5db714c9c16f663b42a5e">新添加的</a></li> </ul> </li> </ul> </li> <li><a href="#d6b02213a74372407371f77dd6e39c99">Crypto&amp;&amp;加密&amp;&amp;密码学</a> <ul dir="auto"> <li><a href="#41d260119ad54db2739a9ae393bd87a5">(13) 工具</a></li> <li><a href="#cc043f672c90d4b834cdae80bfbe8851">文章</a></li> </ul> </li> <li><a href="#8cb1c42a29fa3e8825a0f8fca780c481">恶意代码&amp;&amp;Malware&amp;&amp;APT</a> <ul dir="auto"> <li><a href="#e2fd0947924229d7de24b9902e1f54a0">(12) 工具</a></li> <li><a href="#cfffc63a6302bd3aa79a0305ed7afd55">文章</a></li> </ul> </li> <li><a href="#7d5d2d22121ed8456f0c79098f5012bb">REST_API&amp;&amp;RESTFUL </a> <ul dir="auto"> <li><a href="#3b127f2a89bc8d18b4ecb0d9c61f1d58">(3) 工具</a></li> <li><a href="#b16baff7e1b11133efecf1b5b6e10aab">文章</a></li> </ul> </li> <li><a href="#ceb90405292daed9bb32ac20836c219a">蓝牙&amp;&amp;Bluetooth</a> <ul dir="auto"> <li><a href="#c72811e491c68f75ac2e7eb7afd3b01f">(3) 工具</a></li> <li><a href="#97e1bdced96fc7fcd502174d6eecee36">文章</a></li> </ul> </li> <li><a href="#76df273beb09f6732b37a6420649179c">浏览器&amp;&amp;browser</a> <ul dir="auto"> <li><a href="#47a03071becd6df66b469df7c2c6f9b5">(21) 工具</a></li> <li><a href="#ca0c0694dc0aa87534e9bb19be4ee4d5">文章</a></li> </ul> </li> <li><a href="#249c9d207ed6743e412c8c8bcd8a2927">MitreATT&amp;CK</a> <ul dir="auto"> <li><a href="#a88c0c355b342b835fb42abee283bd71">工具</a> <ul dir="auto"> <li><a href="#6ab6835b55cf5c8462c4229a4a0ee94c">(27) 未分类的</a></li> </ul> </li> <li><a href="#8512ba6c3855733a1474ca2f16153906">文章</a> <ul dir="auto"> <li><a href="#4b17464da487fbdf719e9a1482abf8f1">新添加的</a></li> </ul> </li> </ul> </li> <li><a href="#de81f9dd79c219c876c1313cd97852ce">破解&amp;&amp;Crack&amp;&amp;爆破&amp;&amp;BruteForce</a> <ul dir="auto"> <li><a href="#73c3c9225523cbb05333246f23342846">工具</a> <ul dir="auto"> <li><a href="#53084c21ff85ffad3dd9ce445684978b">(255) 未分类的</a></li> </ul> </li> <li><a href="#171e396a8965775c27602762c6638694">文章</a> <ul dir="auto"> <li><a href="#fc3c73849911ede2ce0d6d02f1f5b0b9">新添加的</a></li> </ul> </li> </ul> </li> <li><a href="#96171a80e158b8752595329dd42e8bcf">泄漏&amp;&amp;Breach&amp;&amp;Leak</a> <ul dir="auto"> <li><a href="#602bb9759b0b2ba5555b05b7218a2d6f">工具</a> <ul dir="auto"> <li><a href="#dc507c5be7c09e1e88af7a1ad91e2703">(15) 未分类</a></li> </ul> </li> <li><a href="#fb3bccf80281e11fdf4ef06ddaa34566">文章</a> <ul dir="auto"> <li><a href="#339727dd5a006d7a5bd8f0173dc80bb9">新添加的</a></li> </ul> </li> </ul> </li> <li><a href="#785ad72c95e857273dce41842f5e8873">爬虫</a> <ul dir="auto"> <li><a href="#0f931c85ab54698d0bcfaf9a3e6dac73">工具</a> <ul dir="auto"> <li><a href="#442f9390fd56008def077a21ab65d4aa">(1) 未分类</a></li> </ul> </li> <li><a href="#23b008498c8b41ec3128bd9855660b7d">文章</a> <ul dir="auto"> <li><a href="#37ca6907aa42dfd32db5973ff9eec83d">新添加的</a></li> </ul> </li> </ul> </li> <li><a href="#39931e776c23e80229368dfc6fd54770">无线&amp;&amp;WiFi&amp;&amp;AP&amp;&amp;802.11</a> <ul dir="auto"> <li><a href="#d4efda1853b2cb0909727188116a2a8c">(184) 未分类-WiFi</a></li> <li><a href="#8d233e2d068cce2b36fd0cf44d10f5d8">(7) WPS&amp;&amp;WPA&amp;&amp;WPA2</a></li> <li><a href="#8863b7ba27658d687a85585e43b23245">(2) 802.11</a></li> </ul> </li> <li><a href="#80301821d0f5d8ec2dd3754ebb1b4b10">Payload&amp;&amp;远控&amp;&amp;RAT</a> <ul dir="auto"> <li><a href="#783f861b9f822127dba99acb55687cbb">工具</a> <ul dir="auto"> <li><a href="#6602e118e0245c83b13ff0db872c3723">(134) 未分类-payload</a></li> <li><a href="#b5d99a78ddb383c208aae474fc2cb002">(20) Payload收集</a></li> <li><a href="#b318465d0d415e35fc0883e9894261d1">(44) 远控&amp;&amp;RAT</a></li> <li><a href="#ad92f6b801a18934f1971e2512f5ae4f">(58) Payload生成</a></li> <li><a href="#c45a90ab810d536a889e4e2dd45132f8">(34) Botnet&amp;&amp;僵尸网络</a></li> <li><a href="#b6efee85bca01cde45faa45a92ece37f">(70) 后门&amp;&amp;添加后门</a></li> <li><a href="#85bb0c28850ffa2b4fd44f70816db306">(105) 混淆器&amp;&amp;Obfuscate</a></li> <li><a href="#78d0ac450a56c542e109c07a3b0225ae">(1) Payload管理</a></li> <li><a href="#d08b7bd562a4bf18275c63ffe7d8fc91">(32) 勒索软件</a></li> <li><a href="#82f546c7277db7919986ecf47f3c9495">(32) 键盘记录器&amp;&amp;Keylogger</a></li> <li><a href="#8f99087478f596139922cd1ad9ec961b">(13) Meterpreter</a></li> <li><a href="#63e0393e375e008af46651a3515072d8">(6) Payload投递</a></li> </ul> </li> <li><a href="#0b644b2d8119abf6643755ef455fcf2c">文章</a> <ul dir="auto"> <li><a href="#27962a7633b86d43cae2dd2d4c32f1b6">新添加</a></li> </ul> </li> </ul> </li> <li><a href="#a9494547a9359c60f09aea89f96a2c83">后渗透</a> <ul dir="auto"> <li><a href="#3ed50213c2818f1455eff4e30372c542">工具</a> <ul dir="auto"> <li><a href="#12abc279c69d1fcf10692b9cb89bcdf7">(49) 未分类-post-exp</a></li> <li><a href="#4c2095e7e192ac56f6ae17c8fc045c51">(53) 提权&amp;&amp;PrivilegeEscalation</a></li> <li><a href="#caab36bba7fa8bb931a9133e37d397f6">Windows</a> <ul dir="auto"> <li><a href="#58f3044f11a31d0371daa91486d3694e">(19) UAC</a></li> <li><a href="#7ed8ee71c4a733d5e5e5d239f0e8b9e0">(72) 未分类-Windows</a></li> <li><a href="#b84c84a853416b37582c3b7f13eabb51">(3) AppLocker</a></li> <li><a href="#e3c4c83dfed529ceee65040e565003c4">(10) ActiveDirectory</a></li> <li><a href="#25697cca32bd8c9492b8e2c8a3a93bfe">域渗透</a></li> <li><a href="#a5c1d88a8e35b6c6223a6d64dbfb5358">WET</a></li> </ul> </li> <li><a href="#2dd40db455d3c6f1f53f8a9c25bbe63e">(10) 驻留&amp;&amp;Persistence</a></li> <li><a href="#4fc56d3dd1977b882ba14a9fd820f8e2">Linux&amp;&amp;Xnix</a></li> </ul> </li> <li><a href="#c86567da7d4004149912383575be3b45">文章</a> <ul dir="auto"> <li><a href="#fdf10af493284be94033d1350f1e9b5c">新添加</a></li> </ul> </li> </ul> </li> </ul> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-94ca60d12e210fdd7fd9e387339b293e"></a>新添加的</h1><a id="user-content-新添加的" class="anchor" aria-label="Permalink: 新添加的" href="#新添加的"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-9eee96404f868f372a6cbc6769ccb7f8"></a>工具</h2><a id="user-content-工具" class="anchor" aria-label="Permalink: 工具" href="#工具"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-31185b925d5152c7469b963809ceb22d"></a>新添加的</h3><a id="user-content-新添加的-1" class="anchor" aria-label="Permalink: 新添加的" href="#新添加的-1"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>825</strong>星][2m] [Py] <a href="https://github.com/corelan/mona">corelan/mona</a> 用于Immunity Debugger的mona.py</li> <li>[<strong>813</strong>星][26d] [JS] <a href="https://github.com/sindresorhus/is-online">sindresorhus/is-online</a> 检查互联网连接是否正常</li> <li>[<strong>810</strong>星][2m] [Shell] <a href="https://github.com/andreyvit/create-dmg">andreyvit/create-dmg</a> 用于构建精美DMG的Shell脚本</li> <li>[<strong>793</strong>星][2m] [Go] <a href="https://github.com/dreddsa5dies/gohacktools">dreddsa5dies/gohacktools</a> Golang编写的多款Hacking工具</li> <li>[<strong>786</strong>星][1y] [PS] <a href="https://github.com/kevin-robertson/invoke-thehash">kevin-robertson/invoke-thehash</a> 执行 pass the hash WMI 和 SMB 任务的PowerShell函数</li> <li>[<strong>783</strong>星][26d] [Go] <a href="https://github.com/bishopfox/sliver">bishopfox/sliver</a> 一个通用的跨平台植入程序框架,该框架C3支持Mutual-TLS,HTTP(S)和DNS</li> <li>[<strong>770</strong>星][13d] [C++] <a href="https://github.com/shekyan/slowhttptest">shekyan/slowhttptest</a> 应用层DoS攻击模拟器</li> <li>[<strong>770</strong>星][18d] [C++] <a href="https://github.com/snort3/snort3">snort3/snort3</a> 下一代Snort IPS(入侵防御系统)。</li> <li>[<strong>761</strong>星][1y] [Py] <a href="https://github.com/greatsct/greatsct">greatsct/greatsct</a> 生成绕过常见防病毒解决方案和应用程序白名单解决方案的metasploit payload</li> <li>[<strong>760</strong>星][11d] [HTML] <a href="https://github.com/m4cs/babysploit">m4cs/babysploit</a> 渗透测试工具包,旨在使您轻松学习如何使用更大,更复杂的框架(例如Metasploit)</li> <li>[<strong>743</strong>星][1y] [C#] <a href="https://github.com/eladshamir/internal-monologue">eladshamir/internal-monologue</a> 在不接触LSASS的情况下提取NTLM hash</li> <li>[<strong>742</strong>星][6m] [Go] <a href="https://github.com/talkingdata/owl">talkingdata/owl</a> 企业级分布式监控告警系</li> <li>[<strong>731</strong>星][2d] [Go] <a href="https://github.com/gruntwork-io/cloud-nuke">gruntwork-io/cloud-nuke</a> 通过检查(删除)其中的所有资源来清理云帐户</li> <li>[<strong>731</strong>星][1m] [C] <a href="https://github.com/iaik/zombieload">iaik/zombieload</a> ZombieLoad攻击PoC</li> <li>[<strong>729</strong>星][2m] [Py] <a href="https://github.com/shawndevans/smbmap">shawndevans/smbmap</a> SMB枚举</li> <li>[<strong>728</strong>星][6m] [Go] <a href="https://github.com/anshumanbh/git-all-secrets">anshumanbh/git-all-secrets</a> 结合多个开源 git 搜索工具实现的代码审计工具</li> <li>[<strong>723</strong>星][6d] [Py] <a href="https://github.com/skelsec/pypykatz">skelsec/pypykatz</a> 纯Python实现的Mimikatz</li> <li>[<strong>720</strong>星][1y] [C#] <a href="https://github.com/p3nt4/powershdll">p3nt4/powershdll</a> 使用rundll32执行PowerShell,绕过软件限制</li> <li>[<strong>716</strong>星][6m] [Py] <a href="https://github.com/adamlaurie/rfidiot">adamlaurie/rfidiot</a> python RFID / NFC library &amp; tools</li> <li>[<strong>715</strong>星][21d] [Py] <a href="https://github.com/f-secure/see">f-secure/see</a> 在安全环境中构建测试自动化的框架</li> <li>[<strong>703</strong>星][2m] [Py] <a href="https://github.com/mjg59/python-broadlink">mjg59/python-broadlink</a> Python模块,用于控制Broadlink RM2 / 3(Pro)遥控器、A1传感器平台和SP2 / 3智能插头</li> <li>[<strong>695</strong>星][3m] <a href="https://github.com/netflix/security-bulletins">netflix/security-bulletins</a> Security Bulletins that relate to Netflix Open Source</li> <li>[<strong>693</strong>星][7m] [Py] <a href="https://github.com/mr-un1k0d3r/powerlessshell">mr-un1k0d3r/powerlessshell</a> 依靠MSBuild.exe远程执行PowerShell脚本和命令</li> <li>[<strong>686</strong>星][3m] [Go] <a href="https://github.com/pquerna/otp">pquerna/otp</a> 一次性密码工具,Golang编写</li> <li>[<strong>683</strong>星][1y] [PS] <a href="https://github.com/Arvanaghi/SessionGopher">arvanaghi/sessiongopher</a> 使用WMI为远程访问工具(如WinSCP,PuTTY,SuperPuTTY,FileZilla和Microsoft远程桌面)提取保存的会话信息。PowerShell编写</li> <li>[<strong>682</strong>星][1m] <a href="https://github.com/ptresearch/attackdetection">ptresearch/attackdetection</a> 搜索新的漏洞和0day,进行服现并创建PoC exp,以了解这些安全漏洞的工作方式,以及如何在网络层上检测到相关的攻击</li> <li>[<strong>679</strong>星][1y] [Py] <a href="https://github.com/endgameinc/rta">endgameinc/rta</a> 根据MITER ATT&CK进行建模,针对恶意tradecraft测试其检测功能。脚本框架</li> <li>[<strong>679</strong>星][5d] [C#] <a href="https://github.com/ghostpack/rubeus">ghostpack/rubeus</a> 原始Kerberos交互和滥用,C#编写</li> <li>[<strong>665</strong>星][6m] [Py] <a href="https://github.com/golismero/golismero">golismero/golismero</a> 安全测试框架,当前主要是Web安全,可轻松扩展到其他扫描</li> <li>[<strong>665</strong>星][12m] [C#] <a href="https://github.com/wwillv/godofhacker">wwillv/godofhacker</a> 由各种顶级黑客技术结合而成,基本功能覆盖面广,可满足大多数人的基本需求</li> <li>[<strong>656</strong>星][6m] [PHP] <a href="https://github.com/l3m0n/bypass_disable_functions_shell">l3m0n/bypass_disable_functions_shell</a> 一个各种方式突破Disable_functions达到命令执行的shell</li> <li>[<strong>647</strong>星][3m] [Py] <a href="https://github.com/gquere/pwn_jenkins">gquere/pwn_jenkins</a> 有关攻击Jenkins服务器的笔记</li> <li>[<strong>639</strong>星][10m] [Py] <a href="https://github.com/dirkjanm/privexchange">dirkjanm/privexchange</a> 通过滥用Exchange交换您对Domain Admin privs的特权</li> <li>[<strong>635</strong>星][1y] [JS] <a href="https://github.com/alcuadrado/hieroglyphy">alcuadrado/hieroglyphy</a> 将所有JavaScript代码转换为等价的()[] {}!+字符序列!,可在浏览器中运行</li> <li>[<strong>630</strong>星][5m] <a href="https://github.com/ankane/secure_rails">ankane/secure_rails</a> Rails安全最佳实战</li> <li>[<strong>621</strong>星][1m] [Go] <a href="https://github.com/evilsocket/arc">evilsocket/arc</a> 可用于管理私密数据的工具. 后端是 Go 语言编写的 RESTful 服务器, 前台是Html + JavaScript</li> <li>[<strong>605</strong>星][30d] [Py] <a href="https://github.com/webrecorder/pywb">webrecorder/pywb</a> 重放和记录Web存档</li> <li>[<strong>601</strong>星][4d] [YARA] <a href="https://github.com/didierstevens/didierstevenssuite">didierstevens/didierstevenssuite</a> 工具、脚本列表</li> <li>[<strong>601</strong>星][17d] [C] <a href="https://github.com/mrexodia/titanhide">mrexodia/titanhide</a> 用于隐藏某些进程调试器的驱动程序</li> <li>[<strong>599</strong>星][2m] [PS] <a href="https://github.com/ramblingcookiemonster/powershell">ramblingcookiemonster/powershell</a> 各种PowerShell函数和脚本</li> <li>[<strong>588</strong>星][11m] [C] <a href="https://github.com/justinsteven/dostackbufferoverflowgood">justinsteven/dostackbufferoverflowgood</a> 跨站点脚本编写者的演示和教程,这些站点编写者不能很好地堆积缓冲区溢出,并且也想做其他事情</li> <li>[<strong>583</strong>星][10m] [Py] <a href="https://github.com/romanz/amodem">romanz/amodem</a> 使用简单的耳机在两台计算机之间传输文件,实现真正的气密通信(通过扬声器和麦克风)或音频电缆(以提高传输速度)</li> <li>[<strong>582</strong>星][1y] [C#] <a href="https://github.com/tyranid/dotnettojscript">tyranid/dotnettojscript</a> 创建从内存中加载.NET v2程序集的JScript文件</li> <li>[<strong>580</strong>星][5m] [Py] <a href="https://github.com/nidem/kerberoast">nidem/kerberoast</a> 一系列用于攻击MS Kerberos实现的工具</li> <li>[<strong>570</strong>星][1y] [Solidity] <a href="https://github.com/crytic/not-so-smart-contracts">crytic/not-so-smart-contracts</a> 常见的以太坊智能合约漏洞示例,包括来自真实智能合约的代码。</li> <li>[<strong>567</strong>星][4m] [Py] <a href="https://github.com/its-a-feature/apfell">its-a-feature/apfell</a> 利用python3,docker,docker-compose和Web浏览器UI构建的跨平台,后渗透的Red Team框架。</li> <li>[<strong>557</strong>星][1m] [C] <a href="https://github.com/vanhauser-thc/thc-ipv6">vanhauser-thc/thc-ipv6</a> IPv6攻击工具包</li> <li>[<strong>550</strong>星][6m] [HCL] <a href="https://github.com/coalfire-research/red-baron">coalfire-research/red-baron</a> 为Red Teams自动创建有弹性,disposable,安全和敏捷的基础架构。</li> <li>[<strong>542</strong>星][9m] [C] <a href="https://github.com/hfiref0x/upgdsed">hfiref0x/upgdsed</a> 通用PG和DSE禁用工具</li> <li>[<strong>539</strong>星][3m] [C] <a href="https://github.com/EliasOenal/multimon-ng">eliasoenal/multimon-ng</a> multimon-ng是multimon的继承者。解码多种数字传输模式</li> <li>[<strong>537</strong>星][1y] [C#] <a href="https://github.com/ghostpack/safetykatz">ghostpack/safetykatz</a> Mimikatz和 .NET PE Loader的结合</li> <li>[<strong>531</strong>星][13d] [Go] <a href="https://github.com/sensepost/gowitness">sensepost/gowitness</a> Go 语言编写的网站快照工具</li> <li>[<strong>526</strong>星][5d] [Ruby] <a href="https://github.com/hdm/mac-ages">hdm/mac-ages</a> 确定IEEE分配的硬件地址范围的大概发布日期</li> <li>[<strong>520</strong>星][2m] [Shell] <a href="https://github.com/trailofbits/twa">trailofbits/twa</a> 小型网页审计工具,可灵活设置参数</li> <li>[<strong>517</strong>星][2m] [JS] <a href="https://github.com/mr-un1k0d3r/thundershell">mr-un1k0d3r/thundershell</a> 通过HTTP请求进行通信的C#RAT</li> <li>[<strong>517</strong>星][5m] [C++] <a href="https://github.com/shuax/greenchrome">shuax/greenchrome</a> 超好用的Chrome浏览器增强软件</li> <li>[<strong>516</strong>星][8m] [Visual Basic .NET] <a href="https://github.com/mr-un1k0d3r/maliciousmacrogenerator">mr-un1k0d3r/maliciousmacrogenerator</a> 生成混淆的宏,可进行AV /沙箱逃逸</li> <li>[<strong>510</strong>星][12m] [Go] <a href="https://github.com/mthbernardes/gtrs">mthbernardes/gtrs</a> 使用Google翻译器作为代理将任意命令发送到受感染的计算机</li> <li>[<strong>505</strong>星][12m] [C] <a href="https://github.com/google/ktsan">google/ktsan</a> 用于Linux内核的快速数据竞赛检测器</li> <li>[<strong>503</strong>星][1m] [JS] <a href="https://github.com/sindresorhus/public-ip">sindresorhus/public-ip</a> 快速获取外网IP地址</li> <li>[<strong>501</strong>星][2m] [C] <a href="https://github.com/m0nad/diamorphine">m0nad/diamorphine</a> 适用于Linux Kernels 2.6.x / 3.x / 4.x(x86和x86_64)的LKM rootkit</li> <li>[<strong>500</strong>星][11m] [C] <a href="https://github.com/yangyangwithgnu/bypass_disablefunc_via_ld_preload">yangyangwithgnu/bypass_disablefunc_via_ld_preload</a> 通过LD_PRELOA绕过disable_functions(不需要/ usr / sbin / sendmail)</li> <li>[<strong>495</strong>星][3m] [PHP] <a href="https://github.com/nzedb/nzedb">nzedb/nzedb</a> 自动扫描Usenet,类似于爬虫扫描互联网的方式</li> <li>[<strong>492</strong>星][3m] [Go] <a href="https://github.com/gen2brain/cam2ip">gen2brain/cam2ip</a> 将任何网络摄像头转换为IP 摄像机</li> <li>[<strong>488</strong>星][2m] [Py] <a href="https://github.com/aoii103/darknet_chinesetrading">aoii103/darknet_chinesetrading</a> 暗网中文网监控实时爬虫</li> <li>[<strong>488</strong>星][3m] [Go] <a href="https://github.com/gorilla/csrf">gorilla/csrf</a> 为Go Web应用程序和服务提供CSRF预防中间件</li> <li>[<strong>487</strong>星][12m] [Go] <a href="https://github.com/evanmiller/hecate">evanmiller/hecate</a> Hex编辑器</li> <li>[<strong>486</strong>星][11m] [Shell] <a href="https://github.com/craigz28/firmwalker">craigz28/firmwalker</a> 一个简单的bash脚本,用于搜索提取或安装的固件文件系统。</li> <li>[<strong>478</strong>星][1m] <a href="https://github.com/xiangpasama/jdsrc-small-classroom">xiangpasama/jdsrc-small-classroom</a> 京东SRC小课堂系列文章</li> <li>[<strong>478</strong>星][2m] [TS] <a href="https://github.com/mitre-attack/attack-navigator">mitre-attack/attack-navigator</a> 提供ATT&CK矩阵的基本导航和注释的Web App</li> <li>[<strong>472</strong>星][2m] [Py] <a href="https://github.com/bit4woo/teemo">bit4woo/teemo</a> 域名和电子邮件地址收集工具</li> <li>[<strong>469</strong>星][20d] [Py] <a href="https://github.com/fportantier/habu">fportantier/habu</a> Python 编写的网络工具工具包,主要用于教学/理解网络攻击中的一些概念</li> <li>[<strong>468</strong>星][2m] [Py] <a href="https://github.com/coleifer/micawber">coleifer/micawber</a> 用于从URL中提取丰富的内容库</li> <li>[<strong>467</strong>星][1m] [Shell] <a href="https://github.com/wireghoul/graudit">wireghoul/graudit</a> 简单的脚本和签名集,进行源代码审计</li> <li>[<strong>465</strong>星][2m] [Go] <a href="https://github.com/gen0cide/gscript">gen0cide/gscript</a> 基于运行时参数,动态安装恶意软件</li> <li>[<strong>462</strong>星][5m] [C] <a href="https://github.com/phoenhex/files">phoenhex/files</a> Phoenhex 团队的exploits/POCs/presentation</li> <li>[<strong>461</strong>星][3m] [PS] <a href="https://github.com/rvrsh3ll/misc-powershell-scripts">rvrsh3ll/misc-powershell-scripts</a> PowerShell工具集</li> <li>[<strong>454</strong>星][19d] [PS] <a href="https://github.com/mr-un1k0d3r/redteampowershellscripts">mr-un1k0d3r/redteampowershellscripts</a> 在红队练习中可能会有用的各种PowerShell脚本</li> <li>[<strong>454</strong>星][2m] [Py] <a href="https://github.com/super-l/superl-url">super-l/superl-url</a> 根据关键词,对搜索引擎内容检索结果的网址内容进行采集的一款轻量级软程序。 程序主要运用于安全渗透测试项目,以及批量评估各类CMS系统0DAY的影响程度,同时也是批量采集自己获取感兴趣的网站的一个小程序~~ 可自动从搜索引擎采集相关网站的真实地址与标题等信息,可保存为文件,自动去除重复URL。同时,也可以自定义忽略多条域名等。</li> <li>[<strong>450</strong>星][4m] [C++] <a href="https://github.com/omerya/invisi-shell">omerya/invisi-shell</a> 隐藏您的Powershell脚本。绕过所有Powershell安全功能</li> <li>[<strong>431</strong>星][7m] [Pascal] <a href="https://github.com/mojtabatajik/robber">mojtabatajik/robber</a> 查找易于发生DLL劫持的可执行文件</li> <li>[<strong>431</strong>星][11d] [C++] <a href="https://github.com/tenable/routeros">tenable/routeros</a> 对 MikroTik的RouterOS进行安全性研究时使用的各种工具和漏洞</li> <li>[<strong>421</strong>星][8m] <a href="https://github.com/7kbstorm/7kbscan-webpathbrute">7kbstorm/7kbscan-webpathbrute</a> 路径暴力探测工具</li> <li>[<strong>420</strong>星][11m] [Py] <a href="https://github.com/powerscript/katanaframework">powerscript/katanaframework</a> 用于进行渗透测试的框架,基于一个简单而全面的结构,任何人都可以使用,修改和共享。Python编写</li> <li>[<strong>411</strong>星][5d] [HTML] <a href="https://github.com/w3c/webappsec">w3c/webappsec</a> Web App安全工作组</li> <li>[<strong>411</strong>星][15d] [Py] <a href="https://github.com/ytisf/pyexfil">ytisf/pyexfil</a> 用于数据渗透的Python包</li> <li>[<strong>409</strong>星][10m] [Py] <a href="https://github.com/linklayer/pyvit">linklayer/pyvit</a> 与汽车接口的工具包。它旨在实现汽车系统中使用的通用硬件接口和协议。</li> <li>[<strong>408</strong>星][2d] [Go] <a href="https://github.com/cloudfoundry/gorouter">cloudfoundry/gorouter</a> CF Router</li> <li>[<strong>401</strong>星][1m] [Py] <a href="https://github.com/fbngrm/Matroschka">fbngrm/matroschka</a> Python隐写术工具,可在图像中红隐藏文本或图像</li> <li>[<strong>391</strong>星][12d] [C++] <a href="https://github.com/simsong/bulk_extractor">simsong/bulk_extractor</a> 取证工具</li> <li>[<strong>389</strong>星][24d] [Ruby] <a href="https://github.com/david942j/seccomp-tools">david942j/seccomp-tools</a> 用于seccomp分析</li> <li>[<strong>386</strong>星][4m] [PHP] <a href="https://github.com/msurguy/honeypot">msurguy/honeypot</a> 一种简单有效的方法,来阻止某些进入您网站的垃圾邮件机器人</li> <li>[<strong>384</strong>星][11d] [C#] <a href="https://github.com/bloodhoundad/sharphound">bloodhoundad/sharphound</a> C#重写BloodHound Ingestor</li> <li>[<strong>383</strong>星][1y] [JS] <a href="https://github.com/empireproject/empire-gui">empireproject/empire-gui</a> Empire开渗透框架的图形界面</li> <li>[<strong>383</strong>星][1m] [JS] <a href="https://github.com/nccgroup/tracy">nccgroup/tracy</a> 查找web app中所有的sinks and sources, 并以易于理解的方式显示这些结果</li> <li>[<strong>381</strong>星][1m] [Py] <a href="https://github.com/fox-it/bloodhound.py">fox-it/bloodhound.py</a> 基于Python的BloodHound Ingestor,基于Impacket</li> <li>[<strong>379</strong>星][9m] [Py] <a href="https://github.com/k4m4/onioff">k4m4/onioff</a> url检测器,深度检测网页链接</li> <li>[<strong>376</strong>星][2d] [Ruby] <a href="https://github.com/dradis/dradis-ce">dradis/dradis-ce</a> 面向信息安全团队的协作框架</li> <li>[<strong>376</strong>星][7m] [Py] <a href="https://github.com/tidesec/tidefinger">tidesec/tidefinger</a> 指纹识别小工具,汲取整合了多个web指纹库,结合了多种指纹检测方法,让指纹检测更快捷、准确。</li> <li>[<strong>375</strong>星][] [C] <a href="https://github.com/vanhauser-thc/aflplusplus">vanhauser-thc/aflplusplus</a> 带社区补丁的afl 2.56b</li> <li>[<strong>375</strong>星][6m] [Py] <a href="https://github.com/vysecurity/DomLink">vysecurity/domlink</a> 一种将具有注册组织名称和电子邮件的域链接到其他域的工具。</li> <li>[<strong>369</strong>星][2m] [Py] <a href="https://github.com/emtunc/slackpirate">emtunc/slackpirate</a> Slack枚举和提取工具-从Slack工作区中提取敏感信息</li> <li>[<strong>367</strong>星][20d] [Shell] <a href="https://github.com/trimstray/otseca">trimstray/otseca</a> 安全审计工具, 搜索并转储系统配置</li> <li>[<strong>364</strong>星][1m] [Py] <a href="https://github.com/tenable/poc">tenable/poc</a> 漏洞PoC</li> <li>[<strong>363</strong>星][2m] [Py] <a href="https://github.com/codingo/interlace">codingo/interlace</a> 轻松将单线程命令行应用程序转换为具有CIDR和glob支持的快速,多线程应用程序。</li> <li>[<strong>363</strong>星][11m] [Py] <a href="https://github.com/secynic/ipwhois">secynic/ipwhois</a> 检索和解析IPv4和IPv6地址的Whois数据</li> <li>[<strong>359</strong>星][4d] [C#] <a href="https://github.com/sonarsource/sonar-dotnet">sonarsource/sonar-dotnet</a> 用于C#和VB.NET语言的静态代码分析器,用作SonarQube和SonarCloud平台的扩展。</li> <li>[<strong>356</strong>星][7d] [TeX] <a href="https://github.com/vlsergey/infosec">vlsergey/infosec</a> MIPT无线电工程与控制系统部信息保护教科书</li> <li>[<strong>356</strong>星][21d] <a href="https://github.com/hackerschoice/thc-tesla-powerwall2-hack">hackerschoice/thc-tesla-powerwall2-hack</a> TESLA PowerWall 2安全雪茄</li> <li>[<strong>355</strong>星][19d] [Py] <a href="https://github.com/lockgit/hacking">lockgit/hacking</a> Hacking工具收集</li> <li>[<strong>355</strong>星][5m] [Makefile] <a href="https://github.com/xdite/internet-security">xdite/internet-security</a> 互联网资安风控实战</li> <li>[<strong>347</strong>星][7d] [Ruby] <a href="https://github.com/sunitparekh/data-anonymization">sunitparekh/data-anonymization</a> 帮助您构建匿名的生产数据转储,可用于性能测试,安全性测试,调试和开发。</li> <li>[<strong>346</strong>星][19d] [Perl] <a href="https://github.com/keydet89/regripper2.8">keydet89/regripper2.8</a> 从注册表中提取/解析信息(键,值,数据)并将其呈现出来进行分析。</li> <li>[<strong>344</strong>星][1y] [Assembly] <a href="https://github.com/egebalci/amber">egebalci/amber</a> 反射式PE加壳器,用于绕过安全产品和缓解措施</li> <li>[<strong>343</strong>星][2m] <a href="https://github.com/veracode-research/solr-injection">veracode-research/solr-injection</a> Apache Solr注入研究</li> <li>[<strong>342</strong>星][9m] [Py] <a href="https://github.com/skorov/ridrelay">skorov/ridrelay</a> 通过使用具有低priv的SMB中继来枚举您没有信誉的域上的用户名。</li> <li>[<strong>340</strong>星][11d] [C#] <a href="https://github.com/mr-un1k0d3r/scshell">mr-un1k0d3r/scshell</a> Fileless lateral movement tool that relies on ChangeServiceConfigA to run command</li> <li>[<strong>339</strong>星][4d] [JS] <a href="https://github.com/meituan-dianping/lyrebird">meituan-dianping/lyrebird</a> 基于拦截以及模拟HTTP/HTTPS网络请求的面向移动应用的插件化测试工作台</li> <li>[<strong>339</strong>星][1y] [Ruby] <a href="https://github.com/srcclr/commit-watcher">srcclr/commit-watcher</a> Find interesting and potentially hazardous commits in git projects</li> <li>[<strong>335</strong>星][4m] [C] <a href="https://github.com/csete/gpredict">csete/gpredict</a> a real time satellite tracking and orbit prediction program for the Linux desktop</li> <li>[<strong>332</strong>星][11m] [C#] <a href="https://github.com/ghostpack/sharpdump">ghostpack/sharpdump</a> SharpDump is a C# port of PowerSploit's Out-Minidump.ps1 functionality.</li> <li>[<strong>332</strong>星][1y] [Py] <a href="https://github.com/leapsecurity/InSpy">leapsecurity/inspy</a> A python based LinkedIn enumeration tool</li> <li>[<strong>331</strong>星][1y] [Shell] <a href="https://github.com/1n3/goohak">1n3/goohak</a> Automatically Launch Google Hacking Queries Against A Target Domain</li> <li>[<strong>328</strong>星][1y] [Java] <a href="https://github.com/ysrc/liudao">ysrc/liudao</a> “六道”实时业务风控系统</li> <li>[<strong>327</strong>星][3m] [Py] <a href="https://github.com/defaultnamehere/cookie_crimes">defaultnamehere/cookie_crimes</a> Read local Chrome cookies without root or decrypting</li> <li>[<strong>326</strong>星][2m] [PS] <a href="https://github.com/joelgmsec/autordpwn">joelgmsec/autordpwn</a> The Shadow Attack Framework</li> <li>[<strong>326</strong>星][1y] [JS] <a href="https://github.com/nccgroup/wssip">nccgroup/wssip</a> 服务器和客户端之间通信时自定义 WebSocket 数据的捕获、修改和发送。</li> <li>[<strong>326</strong>星][1m] [Go] <a href="https://github.com/wangyihang/platypus">wangyihang/platypus</a> A modern multiple reverse shell sessions/clients manager via terminal written in go</li> <li>[<strong>325</strong>星][21d] [Shell] <a href="https://github.com/al0ne/linuxcheck">al0ne/linuxcheck</a> linux信息收集/应急响应/常见后门检测脚本</li> <li>[<strong>324</strong>星][12d] [JS] <a href="https://github.com/privacypass/challenge-bypass-extension">privacypass/challenge-bypass-extension</a> 用于匿名认证的浏览器扩展</li> <li>[<strong>323</strong>星][1m] <a href="https://github.com/trustedsec/physical-docs">trustedsec/physical-docs</a> This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselves when conducting physical security assessments.</li> <li>[<strong>322</strong>星][1y] <a href="https://github.com/crazywa1ker/darthsidious-chinese">crazywa1ker/darthsidious-chinese</a> 从0开始你的域渗透之旅</li> <li>[<strong>318</strong>星][2m] [Visual Basic .NET] <a href="https://github.com/nccgroup/vcg">nccgroup/vcg</a> Code security scanning tool.</li> <li>[<strong>317</strong>星][5d] [Py] <a href="https://github.com/circl/lookyloo">circl/lookyloo</a> Lookyloo is a web interface allowing to scrape a website and then displays a tree of domains calling each other.</li> <li>[<strong>316</strong>星][22d] [HTML] <a href="https://github.com/vanhauser-thc/thc-archive">vanhauser-thc/thc-archive</a> All releases of the security research group (a.k.a. hackers) The Hacker's Choice</li> <li>[<strong>315</strong>星][6d] [VBA] <a href="https://github.com/itm4n/vba-runpe">itm4n/vba-runpe</a> A VBA implementation of the RunPE technique or how to bypass application whitelisting.</li> <li>[<strong>315</strong>星][8m] [C] <a href="https://github.com/tomac/yersinia">tomac/yersinia</a> layer 2 攻击框架</li> <li>[<strong>315</strong>星][1y] [Go] <a href="https://github.com/benjojo/bgp-battleships">benjojo/bgp-battleships</a> Play battleships using BGP</li> <li>[<strong>313</strong>星][2m] [Py] <a href="https://github.com/coalfire-research/slackor">coalfire-research/slackor</a> A Golang implant that uses Slack as a command and control server</li> <li>[<strong>312</strong>星][7m] [C] <a href="https://github.com/pmem/syscall_intercept">pmem/syscall_intercept</a> Linux系统调用拦截框架,通过 hotpatching 进程标准C库的机器码实现。</li> <li>[<strong>312</strong>星][5m] [Java] <a href="https://github.com/shengqi158/fastjson-remote-code-execute-poc">shengqi158/fastjson-remote-code-execute-poc</a> 直接用intellij IDEA打开即可 首先编译得到Test.class,然后运行Poc.java</li> <li>[<strong>311</strong>星][7m] [HTML] <a href="https://github.com/nccgroup/crosssitecontenthijacking">nccgroup/crosssitecontenthijacking</a> Content hijacking proof-of-concept using Flash, PDF and Silverlight</li> <li>[<strong>311</strong>星][1m] [YARA] <a href="https://github.com/needmorecowbell/hamburglar">needmorecowbell/hamburglar</a> collect useful information from urls, directories, and files</li> <li>[<strong>310</strong>星][2m] [PS] <a href="https://github.com/darkoperator/posh-secmod">darkoperator/posh-secmod</a> PowerShell Module with Security cmdlets for security work</li> <li>[<strong>309</strong>星][4m] [PS] <a href="https://github.com/enigma0x3/misc-powershell-stuff">enigma0x3/misc-powershell-stuff</a> random powershell goodness</li> <li>[<strong>305</strong>星][3m] [C] <a href="https://github.com/9176324/shark">9176324/shark</a> Turn off PatchGuard in real time for win7 (7600) ~ win10 (18950).</li> <li>[<strong>305</strong>星][7d] <a href="https://github.com/ugvf2009/miles">ugvf2009/miles</a> 二爷翻墙,专注翻墙30年,但没有掌握核心科技^_^</li> <li>[<strong>305</strong>星][11d] [Py] <a href="https://github.com/xinsss/conf-for-surge-shadowrocket">xinsss/conf-for-surge-shadowrocket</a> Surge Shadowrocket conf</li> <li>[<strong>304</strong>星][2m] [JS] <a href="https://github.com/doyensec/electronegativity">doyensec/electronegativity</a> Electronegativity is a tool to identify misconfigurations and security anti-patterns in Electron applications.</li> <li>[<strong>300</strong>星][] [C++] <a href="https://github.com/squalr/squally">squalr/squally</a> 2D Platformer Game for Teaching Game Hacking - C++/cocos2d-x</li> <li>[<strong>300</strong>星][1m] [C] <a href="https://github.com/tarsnap/scrypt">tarsnap/scrypt</a> The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more secure against hardware brute-force attacks than alternative functions such as PBKDF2 or bcrypt.</li> <li>[<strong>299</strong>星][10m] [C++] <a href="https://github.com/anhkgg/superdllhijack">anhkgg/superdllhijack</a> SuperDllHijack:A general DLL hijack technology, don't need to manually export the same function interface of the DLL, so easy! 一种通用Dll劫持技术,不再需要手工导出Dll的函数接口了</li> <li>[<strong>299</strong>星][1y] [C#] <a href="https://github.com/ghostpack/sharpup">ghostpack/sharpup</a> SharpUp is a C# port of various PowerUp functionality.</li> <li>[<strong>298</strong>星][7m] [Py] <a href="https://github.com/edent/bmw-i-remote">edent/bmw-i-remote</a> A reverse engineered interface for the BMW i3 Electric Car</li> <li>[<strong>298</strong>星][14d] [Shell] <a href="https://github.com/fdiskyou/zines">fdiskyou/zines</a> Mirror of my favourite hacking Zines for the lulz, nostalgy, and reference</li> <li>[<strong>297</strong>星][10d] [JS] <a href="https://github.com/jesusprubio/strong-node">jesusprubio/strong-node</a></li> <li>[<strong>297</strong>星][1y] [JS] <a href="https://github.com/xxxily/fiddler-plus">xxxily/fiddler-plus</a> 自定义的Fiddler规则,多环境切换、解决跨域开发、快速调试线上代码必备|高效调试分析利器</li> <li>[<strong>296</strong>星][9m] [C] <a href="https://github.com/gianlucaborello/libprocesshider">gianlucaborello/libprocesshider</a> Hide a process under Linux using the ld preloader (</li> <li>[<strong>295</strong>星][2m] [Go] <a href="https://github.com/mdsecactivebreach/o365-attack-toolkit">mdsecactivebreach/o365-attack-toolkit</a> A toolkit to attack Office365</li> <li>[<strong>295</strong>星][9m] [C] <a href="https://github.com/rhboot/shim">rhboot/shim</a> a trivial EFI application that, when run, attempts to open and execute another application</li> <li>[<strong>292</strong>星][9d] [Go] <a href="https://github.com/cruise-automation/fwanalyzer">cruise-automation/fwanalyzer</a> a tool to analyze filesystem images for security</li> <li>[<strong>292</strong>星][2m] [C] <a href="https://github.com/mboehme/aflfast">mboehme/aflfast</a> AFLFast (extends AFL with Power Schedules)</li> <li>[<strong>292</strong>星][2d] [Py] <a href="https://github.com/vulnerscom/api">vulnerscom/api</a> Python 2/3 library for the Vulners Database</li> <li>[<strong>290</strong>星][20d] [C#] <a href="https://github.com/matterpreter/offensivecsharp">matterpreter/offensivecsharp</a> Collection of Offensive C# Tooling</li> <li>[<strong>290</strong>星][5m] [Py] <a href="https://github.com/opsdisk/pagodo">opsdisk/pagodo</a> pagodo (Passive Google Dork) - Automate Google Hacking Database scraping</li> <li>[<strong>288</strong>星][12m] [Py] <a href="https://github.com/justicerage/ffm">justicerage/ffm</a> Freedom Fighting Mode: open source hacking harness</li> <li>[<strong>287</strong>星][3m] [Py] <a href="https://github.com/apache/incubator-spot">apache/incubator-spot</a> Mirror of Apache Spot</li> <li>[<strong>283</strong>星][16d] [PS] <a href="https://github.com/nullbind/powershellery">nullbind/powershellery</a> This repo contains Powershell scripts used for general hackery.</li> <li>[<strong>282</strong>星][3m] [Py] <a href="https://github.com/hacktoolspack/hack-tools">hacktoolspack/hack-tools</a> hack tools</li> <li>[<strong>282</strong>星][4m] [Py] <a href="https://github.com/joxeankoret/pyew">joxeankoret/pyew</a> Official repository for Pyew.</li> <li>[<strong>282</strong>星][13d] [PHP] <a href="https://github.com/nico3333fr/csp-useful">nico3333fr/csp-useful</a> Collection of scripts, thoughts about CSP (Content Security Policy)</li> <li>[<strong>282</strong>星][1y] [HTML] <a href="https://github.com/googleprojectzero/p0tools">googleprojectzero/p0tools</a> Project Zero Docs and Tools</li> <li>[<strong>278</strong>星][5d] <a href="https://github.com/geerlingguy/ansible-role-security">geerlingguy/ansible-role-security</a> Ansible Role - Security</li> <li>[<strong>277</strong>星][5m] [Py] <a href="https://github.com/18f/domain-scan">18f/domain-scan</a> A lightweight pipeline, locally or in Lambda, for scanning things like HTTPS, third party service use, and web accessibility.</li> <li>[<strong>277</strong>星][8m] <a href="https://github.com/s0md3v/mypapers">s0md3v/mypapers</a> Repository for hosting my research papers</li> <li>[<strong>276</strong>星][28d] [C#] <a href="https://github.com/mkaring/confuserex">mkaring/confuserex</a> An open-source, free protector for .NET applications</li> <li>[<strong>274</strong>星][4m] [Py] <a href="https://github.com/invernizzi/scapy-http">invernizzi/scapy-http</a> Support for HTTP in Scapy</li> <li>[<strong>273</strong>星][15d] [Py] <a href="https://github.com/den1al/jsshell">den1al/jsshell</a> An interactive multi-user web JS shell</li> <li>[<strong>271</strong>星][8m] <a href="https://github.com/offensive-security/nethunter-lrt">offensive-security/nethunter-lrt</a> The Nethunter Linux Root Toolkit is a collection of bash scripts which install Nethunter onto a supported device.</li> <li>[<strong>271</strong>星][8m] [Py] <a href="https://github.com/s0md3v/Breacher">s0md3v/breacher</a> An advanced multithreaded admin panel finder written in python.</li> <li>[<strong>269</strong>星][18d] [Py] <a href="https://github.com/ledger-donjon/lascar">ledger-donjon/lascar</a> Ledger's Advanced Side-Channel Analysis Repository</li> <li>[<strong>269</strong>星][5d] [JS] <a href="https://github.com/nodejs/security-wg">nodejs/security-wg</a> Node.js Security Working Group</li> <li>[<strong>265</strong>星][5d] [C] <a href="https://github.com/eua/wxhexeditor">eua/wxhexeditor</a> wxHexEditor official GIT repo</li> <li>[<strong>265</strong>星][1y] [PS] <a href="https://github.com/fox-it/invoke-aclpwn">fox-it/invoke-aclpwn</a></li> <li>[<strong>264</strong>星][11m] [Py] <a href="https://github.com/ant4g0nist/susanoo">ant4g0nist/susanoo</a> A REST API security testing framework.</li> <li>[<strong>264</strong>星][t] [C++] <a href="https://github.com/fransbouma/injectablegenericcamerasystem">fransbouma/injectablegenericcamerasystem</a> This is a generic camera system to be used as the base for cameras for taking screenshots within games. The main purpose of the system is to hijack the in-game 3D camera by overwriting values in its camera structure with our own values so we can control where the camera is located, it's pitch/yaw/roll values, its FoV and the camera's look vector.</li> <li>[<strong>264</strong>星][9m] [C] <a href="https://github.com/landhb/hideprocess">landhb/hideprocess</a> A basic Direct Kernel Object Manipulation rootkit that removes a process from the EPROCESS list, hiding it from the Task Manager</li> <li>[<strong>264</strong>星][1y] [JS] <a href="https://github.com/roccomuso/netcat">roccomuso/netcat</a> Netcat client and server modules written in pure Javascript for Node.j</li> <li>[<strong>263</strong>星][25d] [Py] <a href="https://github.com/guimaizi/get_domain">guimaizi/get_domain</a> 域名收集与监测</li> <li>[<strong>263</strong>星][1m] [Ruby] <a href="https://github.com/rapid7/recog">rapid7/recog</a> Pattern recognition for hosts, services, and content</li> <li>[<strong>262</strong>星][4m] [C] <a href="https://github.com/portcullislabs/linikatz">portcullislabs/linikatz</a> UNIX版本的Mimikatz</li> <li>[<strong>262</strong>星][] <a href="https://github.com/rustsec/advisory-db">rustsec/advisory-db</a> Security advisory database for Rust crates published through crates.io</li> <li>[<strong>262</strong>星][6d] [Py] <a href="https://github.com/sofianehamlaoui/lockdoor-framework">sofianehamlaoui/lockdoor-framework</a></li> <li>[<strong>260</strong>星][12m] [Py] <a href="https://github.com/hysnsec/DevSecOps-Studio">hysnsec/devsecops-studio</a> DevSecOps Distribution - Virtual Environment to learn DevSecOps</li> <li>[<strong>259</strong>星][10d] [C++] <a href="https://github.com/poweradminllc/paexec">poweradminllc/paexec</a> Remote execution, like PsExec</li> <li>[<strong>258</strong>星][1y] [Py] <a href="https://github.com/m4ll0k/galileo">m4ll0k/galileo</a> Galileo - Web Application Audit Framework</li> <li>[<strong>257</strong>星][1m] [Py] <a href="https://github.com/frint0/email-enum">frint0/email-enum</a> Email-Enum searches mainstream websites and tells you if an email is registered! #DEPRECATED</li> <li>[<strong>257</strong>星][10m] [C] <a href="https://github.com/p0f/p0f">p0f/p0f</a> p0f unofficial git repo</li> <li>[<strong>255</strong>星][1m] [Py] <a href="https://github.com/cloudflare/python-cloudflare">cloudflare/python-cloudflare</a> Python wrapper for the Cloudflare Client API v4</li> <li>[<strong>254</strong>星][7m] [Go] <a href="https://github.com/lavalamp-/ipv666">lavalamp-/ipv666</a> IPV6地址枚举工具. Go编写</li> <li>[<strong>254</strong>星][10m] [Py] <a href="https://github.com/wh0ale/src-experience">wh0ale/src-experience</a> 工欲善其事,必先利其器</li> <li>[<strong>252</strong>星][3m] [Py] <a href="https://github.com/cvandeplas/pystemon">cvandeplas/pystemon</a> Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon</li> <li>[<strong>252</strong>星][7m] [Py] <a href="https://github.com/itskindred/procspy">itskindred/procspy</a> Python tool that monitors and logs user-run commands on a Linux system for either offensive or defensive purposes..</li> <li>[<strong>252</strong>星][1m] [Py] <a href="https://github.com/rvrsh3ll/findfrontabledomains">rvrsh3ll/findfrontabledomains</a> Search for potential frontable domains</li> <li>[<strong>250</strong>星][9m] [C] <a href="https://github.com/jakeajames/rootlessjb">jakeajames/rootlessjb</a></li> <li>[<strong>249</strong>星][19d] [Py] <a href="https://github.com/cisco-config-analysis-tool/ccat">cisco-config-analysis-tool/ccat</a> Cisco Config Analysis Tool</li> <li>[<strong>248</strong>星][8d] [Py] <a href="https://github.com/SusmithKrishnan/torghost">susmithkrishnan/torghost</a> Tor anonimizer</li> <li>[<strong>246</strong>星][8m] <a href="https://github.com/ethicalhack3r/wordpress_plugin_security_testing_cheat_sheet">ethicalhack3r/wordpress_plugin_security_testing_cheat_sheet</a> WordPress插件安全测试备忘录。</li> <li>[<strong>246</strong>星][1y] <a href="https://github.com/xcsh/unity-game-hacking">xcsh/unity-game-hacking</a> A guide for hacking unity games</li> <li>[<strong>244</strong>星][9m] [Py] <a href="https://github.com/mazen160/bfac">mazen160/bfac</a> 自动化 web app 备份文件测试工具,可检测备份文件是否会泄露 web app 源代码</li> <li>[<strong>244</strong>星][8m] [Py] <a href="https://github.com/openstack/syntribos">openstack/syntribos</a> 自动化的 API 安全测试工具</li> <li>[<strong>242</strong>星][19d] [Rust] <a href="https://github.com/Hirrolot/anevicon">hirrolot/anevicon</a></li> <li>[<strong>239</strong>星][1y] [Py] <a href="https://github.com/matthewclarkmay/geoip-attack-map">matthewclarkmay/geoip-attack-map</a> Cyber security geoip attack map that follows syslog and parses IPs/port numbers to visualize attackers in real time.</li> <li>[<strong>238</strong>星][2m] [JS] <a href="https://github.com/martinzhou2015/srcms">martinzhou2015/srcms</a> SRCMS企业应急响应与缺陷管理系统</li> <li>[<strong>238</strong>星][2m] [Py] <a href="https://github.com/timlib/webxray">timlib/webxray</a> webxray is a tool for analyzing third-party content on webpages and identifying the companies which collect user data.</li> <li>[<strong>237</strong>星][11m] <a href="https://github.com/duoergun0729/2book">duoergun0729/2book</a> 《Web安全之深度学习实战》</li> <li>[<strong>236</strong>星][10m] [Py] <a href="https://github.com/cryin/javaid">cryin/javaid</a> java source code static code analysis and danger function identify prog</li> <li>[<strong>236</strong>星][8m] [Py] <a href="https://github.com/xhak9x/fbi">xhak9x/fbi</a> Facebook Information</li> <li>[<strong>231</strong>星][18d] <a href="https://github.com/o-mg/demonseed">o-mg/demonseed</a> minimal malicious USB cabl</li> <li>[<strong>231</strong>星][3d] [Py] <a href="https://github.com/webbreacher/whatsmyname">webbreacher/whatsmyname</a> This repository has the unified data required to perform user enumeration on various websites. Content is in a JSON file and can easily be used in other projects.</li> <li>[<strong>230</strong>星][2m] [Java] <a href="https://github.com/commonsguy/cwac-netsecurity">commonsguy/cwac-netsecurity</a> CWAC-NetSecurity: Simplifying Secure Internet Access</li> <li>[<strong>230</strong>星][2m] [PS] <a href="https://github.com/miriamxyra/eventlist">miriamxyra/eventlist</a> help improving your Audit capabilities and to help to build your Security Operation Center.</li> <li>[<strong>229</strong>星][1m] [C] <a href="https://github.com/vusec/ridl">vusec/ridl</a> RIDL test suite and exploits</li> <li>[<strong>226</strong>星][1y] [Go] <a href="https://github.com/netxfly/sec_check">netxfly/sec_check</a> 服务器安全检测的辅助工具</li> <li>[<strong>226</strong>星][1y] <a href="https://github.com/lanjelot/kb">lanjelot/kb</a> Respositoy of all my notes on infosec I have been building up over the years</li> <li>[<strong>224</strong>星][1y] <a href="https://github.com/basilfx/tradfri-hacking">basilfx/tradfri-hacking</a> Hacking the IKEA TRÅDFRI light bulbs and accessories.</li> <li>[<strong>223</strong>星][1y] [Py] <a href="https://github.com/tkcert/mail-security-tester">tkcert/mail-security-tester</a> A testing framework for mail security and filtering solutions.</li> <li>[<strong>221</strong>星][7m] <a href="https://github.com/bhdresh/dejavu">bhdresh/dejavu</a> deception framework which can be used to deploy decoys across the infrastructure</li> <li>[<strong>220</strong>星][5m] [Shell] <a href="https://github.com/vedetta-com/vedetta">vedetta-com/vedetta</a> OpenBSD Router Boilerplate</li> <li>[<strong>220</strong>星][15d] [Py] <a href="https://github.com/wazuh/wazuh-ruleset">wazuh/wazuh-ruleset</a> ruleset is used to detect attacks, intrusions, software misuse, configuration problems, application errors, malware, rootkits, system anomalies or security policy violations.</li> <li>[<strong>219</strong>星][9m] [JS] <a href="https://github.com/zhuyingda/veneno">zhuyingda/veneno</a> 用Node.js编写的Web安全测试框架</li> <li>[<strong>218</strong>星][10m] [C] <a href="https://github.com/feexd/pocs">feexd/pocs</a></li> <li>[<strong>218</strong>星][10m] [JS] <a href="https://github.com/jopyth/mmm-remote-control">jopyth/mmm-remote-control</a> Magic Mirror Module to shutdown or configure your mirror</li> <li>[<strong>217</strong>星][10m] [Py] <a href="https://github.com/Mckinsey666/vocabs">mckinsey666/vocabs</a> A lightweight online dictionary integration to the command line</li> <li>[<strong>216</strong>星][3m] [Py] <a href="https://github.com/jordanpotti/cloudscraper">jordanpotti/cloudscraper</a> Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.</li> <li>[<strong>216</strong>星][9m] [C] <a href="https://github.com/sleinen/samplicator">sleinen/samplicator</a> Send copies of (UDP) datagrams to multiple receivers, with optional sampling and spoofing</li> <li>[<strong>215</strong>星][6m] [C#] <a href="https://github.com/erfg12/memory.dll">erfg12/memory.dll</a> C# Hacking library for making PC game trainers.</li> <li>[<strong>214</strong>星][5m] [Py] <a href="https://github.com/infosecn1nja/maliciousmacromsbuild">infosecn1nja/maliciousmacromsbuild</a> Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.</li> <li>[<strong>213</strong>星][6m] [Py] <a href="https://github.com/dirkjanm/krbrelayx">dirkjanm/krbrelayx</a> Kerberos unconstrained delegation abuse toolkit</li> <li>[<strong>213</strong>星][27d] [Py] <a href="https://github.com/nyxgeek/lyncsmash">nyxgeek/lyncsmash</a> locate and attack Lync/Skype for Business</li> <li>[<strong>210</strong>星][5m] [Java] <a href="https://github.com/dschanoeh/kayak">dschanoeh/kayak</a> Kayak is a CAN bus analysis tool based on SocketCAN</li> <li>[<strong>210</strong>星][3m] [Py] <a href="https://github.com/si9int/cc.py">si9int/cc.py</a> Extracting URLs of a specific target based on the results of "commoncrawl.org"</li> <li>[<strong>210</strong>星][2m] [Shell] <a href="https://github.com/hak5/lanturtle-modules">hak5/lanturtle-modules</a> The Official LAN Turtle Module Repository</li> <li>[<strong>209</strong>星][5m] [PS] <a href="https://github.com/harmj0y/damp">harmj0y/damp</a> The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification</li> <li>[<strong>208</strong>星][11d] [C#] <a href="https://github.com/b4rtik/redpeanut">b4rtik/redpeanut</a> RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.</li> <li>[<strong>208</strong>星][1m] [Py] <a href="https://github.com/seahoh/gotox">seahoh/gotox</a> 本地自动代理,修改自 goagent。</li> <li>[<strong>207</strong>星][8m] <a href="https://github.com/1hack0/facebook-bug-bounty-write-ups">1hack0/facebook-bug-bounty-write-ups</a> Hunting Bugs for Fun and Profit</li> <li>[<strong>207</strong>星][4m] [HCL] <a href="https://github.com/byt3bl33d3r/red-baron">byt3bl33d3r/red-baron</a> Automate creating resilient, disposable, secure and agile infrastructure for Red Teams</li> <li>[<strong>207</strong>星][5m] [YARA] <a href="https://github.com/th3hurrican3/pepper">th3hurrican3/pepper</a> An open source script to perform malware static analysis on Portable Executable</li> <li>[<strong>206</strong>星][1y] [JS] <a href="https://github.com/jpcertcc/sysmonsearch">jpcertcc/sysmonsearch</a> Investigate suspicious activity by visualizing Sysmon's event log</li> <li>[<strong>206</strong>星][1y] [Py] <a href="https://github.com/orf/xcat">orf/xcat</a> 辅助盲 Xpath 注入,检索正在由 Xpath 查询处理的整个 XML 文档,读取主机文件系统上的任意文件,并使用出站 HTTP 请求,使服务器将数据直接发送到xcat</li> <li>[<strong>206</strong>星][9m] [Py] <a href="https://github.com/openstack/hacking">openstack/hacking</a> OpenStack Hacking Style Checks</li> <li>[<strong>204</strong>星][1m] [Jupyter Notebook] <a href="https://github.com/hunters-forge/ATTACK-Python-Client">hunters-forge/attack-python-client</a> Python Script to access ATT&amp;CK content available in STIX via a public TAXII server</li> <li>[<strong>203</strong>星][2m] [TS] <a href="https://github.com/helmetjs/csp">helmetjs/csp</a> Content Security Policy middleware</li> <li>[<strong>203</strong>星][7m] [JS] <a href="https://github.com/wingleung/save-page-state">wingleung/save-page-state</a> A chrome extension to save the state of a page for further analysis</li> <li>[<strong>202</strong>星][10d] [C++] <a href="https://github.com/oisf/libhtp">oisf/libhtp</a> LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces.</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-f34b4da04f2a77a185729b5af752efc5"></a>未分类</h3><a id="user-content-未分类" class="anchor" aria-label="Permalink: 未分类" href="#未分类"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-b9dc08e7e118fc7af41df5e0ef9ddc3c"></a>新添加1</h3><a id="user-content-新添加1" class="anchor" aria-label="Permalink: 新添加1" href="#新添加1"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-efb2cfb167e34b03243547cfb3a662ac"></a>新添加2</h3><a id="user-content-新添加2" class="anchor" aria-label="Permalink: 新添加2" href="#新添加2"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-f04dd1be8e552b074dde7cb33ae6c84c"></a>未分类3</h3><a id="user-content-未分类3" class="anchor" aria-label="Permalink: 未分类3" href="#未分类3"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-cbb37de8d70e314ce905d78c566ef384"></a>未分类4</h3><a id="user-content-未分类4" class="anchor" aria-label="Permalink: 未分类4" href="#未分类4"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-bb7173c3a2ea52d046c8abe3c57e3291"></a>未分类5</h3><a id="user-content-未分类5" class="anchor" aria-label="Permalink: 未分类5" href="#未分类5"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-f7654997cf8b691617b89c5e523a942f"></a>其他</h3><a id="user-content-其他" class="anchor" aria-label="Permalink: 其他" href="#其他"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>923</strong>星][3d] [C] <a href="https://github.com/arm-software/arm-trusted-firmware">arm-software/arm-trusted-firmware</a> Arm A-Profile体系结构(Armv8-A和Armv7-A)的安全世界软件的参考实现,其中包括Exception Level 3(EL3)安全监视器。</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-d5e869a870d6e2c14911de2bc527a6ef"></a>古老的&amp;&amp;有新的替代版本的</h2><a id="user-content-古老的有新的替代版本的" class="anchor" aria-label="Permalink: 古老的&amp;&amp;有新的替代版本的" href="#古老的有新的替代版本的"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1605</strong>星][3m] [Py] <a href="https://github.com/knownsec/pocsuite">knownsec/pocsuite</a> This project has stopped to maintenance, please to</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-8603294b7c1f136b866b6402d63a9978"></a>文章</h2><a id="user-content-文章" class="anchor" aria-label="Permalink: 文章" href="#文章"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-f110da0bf67359d3abc62b27d717e55e"></a>新添加的</h3><a id="user-content-新添加的-2" class="anchor" aria-label="Permalink: 新添加的" href="#新添加的-2"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-a4ee2f4d4a944b54b2246c72c037cd2e"></a>收集&amp;&amp;集合</h1><a id="user-content-收集集合" class="anchor" aria-label="Permalink: 收集&amp;&amp;集合" href="#收集集合"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-e97d183e67fa3f530e7d0e7e8c33ee62"></a>未分类</h2><a id="user-content-未分类-1" class="anchor" aria-label="Permalink: 未分类" href="#未分类-1"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>4252</strong>星][22d] <a href="https://github.com/qazbnm456/awesome-web-security">qazbnm456/awesome-web-security</a> web 安全资源列表</li> <li>[<strong>3168</strong>星][8d] [CSS] <a href="https://github.com/juliocesarfort/public-pentesting-reports">juliocesarfort/public-pentesting-reports</a> Curated list of public penetration test reports released by several consulting firms and academic security groups</li> <li>[<strong>2904</strong>星][3m] <a href="https://github.com/infosecn1nja/red-teaming-toolkit">infosecn1nja/red-teaming-toolkit</a> A collection of open source and commercial tools that aid in red team operations.</li> <li>[<strong>2680</strong>星][4d] <a href="https://github.com/rmusser01/infosec_reference">rmusser01/infosec_reference</a> An Information Security Reference That Doesn't Suck</li> <li>[<strong>2529</strong>星][3m] <a href="https://github.com/kbandla/aptnotes">kbandla/aptnotes</a> Various public documents, whitepapers and articles about APT campaigns</li> <li>[<strong>2474</strong>星][2m] [Py] <a href="https://github.com/0xinfection/awesome-waf">0xinfection/awesome-waf</a></li> <li>[<strong>2345</strong>星][12d] <a href="https://github.com/yeyintminthuhtut/awesome-red-teaming">yeyintminthuhtut/awesome-red-teaming</a> List of Awesome Red Teaming Resources</li> <li>[<strong>2161</strong>星][10m] <a href="https://github.com/exakat/php-static-analysis-tools">exakat/php-static-analysis-tools</a> A reviewed list of useful PHP static analysis tools</li> <li>[<strong>2116</strong>星][1m] <a href="https://github.com/infoslack/awesome-web-hacking">infoslack/awesome-web-hacking</a> A list of web application security</li> <li>[<strong>2067</strong>星][2d] <a href="https://github.com/tanprathan/mobileapp-pentest-cheatsheet">tanprathan/mobileapp-pentest-cheatsheet</a> The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.</li> <li>[<strong>2066</strong>星][1y] <a href="https://github.com/bluscreenofjeff/red-team-infrastructure-wiki">bluscreenofjeff/red-team-infrastructure-wiki</a> Wiki to collect Red Team infrastructure hardening resources</li> <li>[<strong>1930</strong>星][3m] <a href="https://github.com/toolswatch/blackhat-arsenal-tools">toolswatch/blackhat-arsenal-tools</a> Black Hat 武器库</li> <li>[<strong>1845</strong>星][2m] <a href="https://github.com/djadmin/awesome-bug-bounty">djadmin/awesome-bug-bounty</a> A comprehensive curated list of available Bug Bounty &amp; Disclosure Programs and Write-ups.</li> <li>[<strong>1760</strong>星][1y] <a href="https://github.com/coreb1t/awesome-pentest-cheat-sheets">coreb1t/awesome-pentest-cheat-sheets</a> Collection of the cheat sheets useful for pentesting</li> <li>[<strong>1752</strong>星][1m] <a href="https://github.com/ngalongc/bug-bounty-reference">ngalongc/bug-bounty-reference</a> Inspired by</li> <li>[<strong>1716</strong>星][4m] [R] <a href="https://github.com/briatte/awesome-network-analysis">briatte/awesome-network-analysis</a> A curated list of awesome network analysis resources.</li> <li>[<strong>1602</strong>星][7m] [Py] <a href="https://github.com/w1109790800/penetration">w1109790800/penetration</a> 渗透 超全面的渗透资料</li> <li>[<strong>1585</strong>星][7m] [Ruby] <a href="https://github.com/brunofacca/zen-rails-security-checklist">brunofacca/zen-rails-security-checklist</a> Checklist of security precautions for Ruby on Rails applications.</li> <li>[<strong>1546</strong>星][9d] <a href="https://github.com/emijrp/awesome-awesome">emijrp/awesome-awesome</a> A curated list of awesome curated lists of many topics.</li> <li>[<strong>1534</strong>星][6m] <a href="https://github.com/snowming04/the-hacker-playbook-3-translation">snowming04/the-hacker-playbook-3-translation</a> 对 The Hacker Playbook 3 的翻译。</li> <li>[<strong>1376</strong>星][2m] <a href="https://github.com/grrrdog/java-deserialization-cheat-sheet">grrrdog/java-deserialization-cheat-sheet</a> The cheat sheet about Java Deserialization vulnerabilities</li> <li>[<strong>1242</strong>星][1y] [Ruby] <a href="https://github.com/eliotsykes/rails-security-checklist">eliotsykes/rails-security-checklist</a></li> <li>[<strong>1207</strong>星][8m] <a href="https://github.com/joe-shenouda/awesome-cyber-skills">joe-shenouda/awesome-cyber-skills</a> A curated list of hacking environments where you can train your cyber skills legally and safely</li> <li>[<strong>1197</strong>星][1m] [Py] <a href="https://github.com/cujanovic/ssrf-testing">cujanovic/ssrf-testing</a> SSRF (Server Side Request Forgery) testing resources</li> <li>[<strong>1172</strong>星][7d] <a href="https://github.com/m4ll0k/awesome-hacking-tools">m4ll0k/awesome-hacking-tools</a> Awesome Hacking Tools</li> <li>[<strong>1164</strong>星][4d] <a href="https://github.com/w00t3k/awesome-cellular-hacking">w00t3k/awesome-cellular-hacking</a> Awesome-Cellular-Hacking</li> <li>[<strong>1145</strong>星][1m] [Batchfile] <a href="https://github.com/ckjbug/hacking">ckjbug/hacking</a></li> <li>[<strong>1116</strong>星][11d] <a href="https://github.com/slowmist/knowledge-base">slowmist/knowledge-base</a> Knowledge Base 慢雾安全团队知识库</li> <li>[<strong>1115</strong>星][1y] <a href="https://github.com/PaulSec/awesome-windows-domain-hardening">paulsec/awesome-windows-domain-hardening</a> A curated list of awesome Security Hardening techniques for Windows.</li> <li>[<strong>1110</strong>星][5m] <a href="https://github.com/zbetcheckin/security_list">zbetcheckin/security_list</a> Great security list for fun and profit</li> <li>[<strong>1080</strong>星][1m] <a href="https://github.com/guardrailsio/awesome-golang-security">guardrailsio/awesome-golang-security</a> Awesome Golang Security resources</li> <li>[<strong>1030</strong>星][7m] <a href="https://github.com/stephenturner/oneliners">stephenturner/oneliners</a> Useful bash one-liners for bioinformatics.</li> <li>[<strong>1026</strong>星][7d] <a href="https://github.com/sundowndev/hacker-roadmap">sundowndev/hacker-roadmap</a></li> <li>[<strong>1013</strong>星][1y] [JS] <a href="https://github.com/0xsobky/hackvault">0xsobky/hackvault</a> A container repository for my public web hacks!</li> <li>[<strong>993</strong>星][9d] [Py] <a href="https://github.com/jekil/awesome-hacking">jekil/awesome-hacking</a> Awesome hacking is an awesome collection of hacking tools.</li> <li>[<strong>986</strong>星][7m] <a href="https://github.com/0x4d31/awesome-threat-detection">0x4d31/awesome-threat-detection</a> A curated list of awesome threat detection and hunting resources</li> <li>[<strong>959</strong>星][9m] <a href="https://github.com/wtsxdev/penetration-testing">wtsxdev/penetration-testing</a> List of awesome penetration testing resources, tools and other shiny things</li> <li>[<strong>929</strong>星][2m] <a href="https://github.com/tom0li/collection-document">tom0li/collection-document</a> Collection of quality safety articles</li> <li>[<strong>921</strong>星][7m] [PS] <a href="https://github.com/api0cradle/ultimateapplockerbypasslist">api0cradle/ultimateapplockerbypasslist</a> The goal of this repository is to document the most common techniques to bypass AppLocker.</li> <li>[<strong>917</strong>星][7m] <a href="https://github.com/cn0xroot/rfsec-toolkit">cn0xroot/rfsec-toolkit</a> RFSec-ToolKit is a collection of Radio Frequency Communication Protocol Hacktools.无线通信协议相关的工具集,可借助SDR硬件+相关工具对无线通信进行研究。Collect with ♥ by HackSmith</li> <li>[<strong>906</strong>星][24d] [Shell] <a href="https://github.com/dominicbreuker/stego-toolkit">dominicbreuker/stego-toolkit</a> Collection of steganography tools - helps with CTF challenges</li> <li>[<strong>871</strong>星][3d] <a href="https://github.com/explife0011/awesome-windows-kernel-security-development">explife0011/awesome-windows-kernel-security-development</a> windows kernel security development</li> <li>[<strong>829</strong>星][5m] [Shell] <a href="https://github.com/danielmiessler/robotsdisallowed">danielmiessler/robotsdisallowed</a> A curated list of the most common and most interesting robots.txt disallowed directories.</li> <li>[<strong>823</strong>星][3m] <a href="https://github.com/feeicn/security-ppt">feeicn/security-ppt</a> 大安全各领域各公司各会议分享的PPT</li> <li>[<strong>788</strong>星][11m] <a href="https://github.com/v2-dev/awesome-social-engineering">v2-dev/awesome-social-engineering</a> 社会工程学资源集合</li> <li>[<strong>766</strong>星][2m] <a href="https://github.com/daviddias/awesome-hacking-locations">daviddias/awesome-hacking-locations</a></li> <li>[<strong>736</strong>星][1y] [Py] <a href="https://github.com/averagesecurityguy/scripts">averagesecurityguy/scripts</a> Scripts I use during pentest engagements.</li> <li>[<strong>728</strong>星][3m] [C#] <a href="https://github.com/harleyqu1nn/aggressorscripts">harleyqu1nn/aggressorscripts</a> Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources</li> <li>[<strong>714</strong>星][1y] <a href="https://github.com/snifer/security-cheatsheets">snifer/security-cheatsheets</a> A collection of cheatsheets for various infosec tools and topics.</li> <li>[<strong>712</strong>星][5m] <a href="https://github.com/bit4woo/python_sec">bit4woo/python_sec</a> python安全和代码审计相关资料收集 resource collection of python security and code review</li> <li>[<strong>685</strong>星][24d] [XSLT] <a href="https://github.com/adon90/pentest_compilation">adon90/pentest_compilation</a> Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios</li> <li>[<strong>684</strong>星][2m] <a href="https://github.com/andrewjkerr/security-cheatsheets">andrewjkerr/security-cheatsheets</a></li> <li>[<strong>671</strong>星][1y] <a href="https://github.com/dsasmblr/hacking-online-games">dsasmblr/hacking-online-games</a> A curated list of tutorials/resources for hacking online games.</li> <li>[<strong>665</strong>星][1m] <a href="https://github.com/redhuntlabs/awesome-asset-discovery">redhuntlabs/awesome-asset-discovery</a> List of Awesome Asset Discovery Resources</li> <li>[<strong>633</strong>星][4m] <a href="https://github.com/3gstudent/pentest-and-development-tips">3gstudent/pentest-and-development-tips</a> A collection of pentest and development tips</li> <li>[<strong>632</strong>星][10m] <a href="https://github.com/webbreacher/offensiveinterview">webbreacher/offensiveinterview</a> Interview questions to screen offensive (red team/pentest) candidates</li> <li>[<strong>629</strong>星][4m] <a href="https://github.com/bypass007/safety-project-collection">bypass007/safety-project-collection</a> 收集一些比较优秀的开源安全项目,以帮助甲方安全从业人员构建企业安全能力。</li> <li>[<strong>619</strong>星][1y] <a href="https://github.com/jiangsir404/audit-learning">jiangsir404/audit-learning</a> 记录自己对《代码审计》的理解和总结,对危险函数的深入分析以及在p牛的博客和代码审计圈的收获</li> <li>[<strong>613</strong>星][3m] [Shell] <a href="https://github.com/ashishb/osx-and-ios-security-awesome">ashishb/osx-and-ios-security-awesome</a> OSX and iOS related security tools</li> <li>[<strong>601</strong>星][1m] [Py] <a href="https://github.com/hslatman/awesome-industrial-control-system-security">hslatman/awesome-industrial-control-system-security</a> 工控系统安全资源列表</li> <li>[<strong>593</strong>星][23d] <a href="https://github.com/lirantal/awesome-nodejs-security">lirantal/awesome-nodejs-security</a> Awesome Node.js Security resources</li> <li>[<strong>592</strong>星][12m] <a href="https://github.com/pandazheng/ioshackstudy">pandazheng/ioshackstudy</a> IOS安全学习资料汇总</li> <li>[<strong>571</strong>星][3m] <a href="https://github.com/r35tart/penetration_testing_case">r35tart/penetration_testing_case</a> 用于记录分享一些有趣的案例</li> <li>[<strong>560</strong>星][9m] <a href="https://github.com/guardrailsio/awesome-python-security">guardrailsio/awesome-python-security</a> Awesome Python Security resources</li> <li>[<strong>558</strong>星][10m] <a href="https://github.com/guardrailsio/awesome-php-security">guardrailsio/awesome-php-security</a> Awesome PHP Security Resources</li> <li>[<strong>530</strong>星][20d] <a href="https://github.com/a13xp0p0v/linux-kernel-defence-map">a13xp0p0v/linux-kernel-defence-map</a> Linux内核防御地图</li> <li>[<strong>477</strong>星][1y] <a href="https://github.com/hack-with-github/powerful-plugins">hack-with-github/powerful-plugins</a> Powerful plugins and add-ons for hackers</li> <li>[<strong>468</strong>星][19d] <a href="https://github.com/meitar/awesome-cybersecurity-blueteam">meitar/awesome-cybersecurity-blueteam</a></li> <li>[<strong>465</strong>星][26d] <a href="https://github.com/gradiuscypher/infosec_getting_started">gradiuscypher/infosec_getting_started</a> A collection of resources/documentation/links/etc to help people learn about Infosec and break into the field.</li> <li>[<strong>460</strong>星][4m] [C++] <a href="https://github.com/comaeio/opcde">comaeio/opcde</a> OPCDE Cybersecurity Conference Materials</li> <li>[<strong>448</strong>星][7m] <a href="https://github.com/jnusimba/miscsecnotes">jnusimba/miscsecnotes</a> some learning notes about Web/Cloud/Docker Security、 Penetration Test、 Security Building</li> <li>[<strong>438</strong>星][1y] <a href="https://github.com/meitar/awesome-lockpicking">meitar/awesome-lockpicking</a> 有关锁、保险箱、钥匙的指南、工具及其他资源的列表</li> <li>[<strong>437</strong>星][4m] <a href="https://github.com/re4lity/hacking-with-golang">re4lity/hacking-with-golang</a> Golang安全资源合集</li> <li>[<strong>426</strong>星][21d] <a href="https://github.com/dropsofzut/awesome-security-weixin-official-accounts">dropsofzut/awesome-security-weixin-official-accounts</a> 网络安全类公众号推荐,欢迎大家推荐</li> <li>[<strong>423</strong>星][12m] [Lua] <a href="https://github.com/w3h/icsmaster">w3h/icsmaster</a> 整合工控安全相关资源</li> <li>[<strong>411</strong>星][5d] [Py] <a href="https://github.com/bl4de/security-tools">bl4de/security-tools</a> Collection of small security tools created mostly in Python. CTFs, pentests and so on</li> <li>[<strong>411</strong>星][1m] <a href="https://github.com/husnainfareed/Awesome-Ethical-Hacking-Resources">husnainfareed/awesome-ethical-hacking-resources</a></li> <li>[<strong>407</strong>星][8m] <a href="https://github.com/kai5263499/osx-security-awesome">kai5263499/osx-security-awesome</a> A collection of OSX and iOS security resources</li> <li>[<strong>397</strong>星][7m] [HTML] <a href="https://github.com/gexos/hacking-tools-repository">gexos/hacking-tools-repository</a> A list of security/hacking tools that have been collected from the internet. Suggestions are welcomed.</li> <li>[<strong>392</strong>星][2m] <a href="https://github.com/dsopas/assessment-mindset">dsopas/assessment-mindset</a> 安全相关的思维导图, 可用于pentesting, bug bounty, red-teamassessments</li> <li>[<strong>383</strong>星][2m] <a href="https://github.com/thejambo/awesome-testing">thejambo/awesome-testing</a> A curated list of testing resources</li> <li>[<strong>375</strong>星][8m] <a href="https://github.com/opencybertranslationproject/linux-basics-for-hackers">opencybertranslationproject/linux-basics-for-hackers</a> 书籍《Linux Basics for Hackers》2019版中文翻译版</li> <li>[<strong>369</strong>星][20d] <a href="https://github.com/fkromer/awesome-ros2">fkromer/awesome-ros2</a> The Robot Operating System Version 2.0 is awesome!</li> <li>[<strong>363</strong>星][3d] <a href="https://github.com/hongrisec/web-security-attack">hongrisec/web-security-attack</a> Web安全相关内容</li> <li>[<strong>345</strong>星][2m] <a href="https://github.com/softwareunderground/awesome-open-geoscience">softwareunderground/awesome-open-geoscience</a> Curated from repositories that make our lives as geoscientists, hackers and data wranglers easier or just more awesome</li> <li>[<strong>335</strong>星][t] <a href="https://github.com/stamparm/ipsum">stamparm/ipsum</a> Daily feed of bad IPs (with blacklist hit scores)</li> <li>[<strong>334</strong>星][5d] [PS] <a href="https://github.com/mgeeky/penetration-testing-tools">mgeeky/penetration-testing-tools</a> A collection of my Penetration Testing scripts, tools, cheatsheets collected over years, used during real-world assignments or collected from various good quality sources.</li> <li>[<strong>327</strong>星][9m] <a href="https://github.com/pxlpnk/awesome-ruby-security">pxlpnk/awesome-ruby-security</a> Awesome Ruby Security resources</li> <li>[<strong>321</strong>星][2m] [HTML] <a href="https://github.com/eugenekolo/sec-tools">eugenekolo/sec-tools</a> A set of security related tools</li> <li>[<strong>318</strong>星][3d] <a href="https://github.com/cryptax/confsec">cryptax/confsec</a> Security, hacking conferences (list)</li> <li>[<strong>315</strong>星][22d] <a href="https://github.com/trimstray/technical-whitepapers">trimstray/technical-whitepapers</a> 收集:IT白皮书、PPT、PDF、Hacking、Web应用程序安全性、数据库、逆向等</li> <li>[<strong>312</strong>星][10m] [Shell] <a href="https://github.com/swoodford/aws">swoodford/aws</a> A collection of bash shell scripts for automating various tasks with Amazon Web Services using the AWS CLI and jq.</li> <li>[<strong>310</strong>星][1y] <a href="https://github.com/1522402210/2018-blackhat-tools-list">1522402210/2018-blackhat-tools-list</a> 2018 BlackHat Tools List</li> <li>[<strong>309</strong>星][2m] <a href="https://github.com/no-github/dork-admin">no-github/dork-admin</a> 盘点近年来的数据泄露、供应链污染事件</li> <li>[<strong>299</strong>星][15d] [JS] <a href="https://github.com/aws-samples/aws-serverless-security-workshop">aws-samples/aws-serverless-security-workshop</a> In this workshop, you will learn techniques to secure a serverless application built with AWS Lambda, Amazon API Gateway and RDS Aurora. We will cover AWS services and features you can leverage to improve the security of a serverless applications in 5 domains: identity &amp; access management, code, data, infrastructure, logging &amp; monitoring.</li> <li>[<strong>295</strong>星][1y] <a href="https://github.com/findneo/newbie-security-list">findneo/newbie-security-list</a> 网络安全学习资料,欢迎补充</li> <li>[<strong>294</strong>星][7m] [JS] <a href="https://github.com/ma3k4h3d/papers">ma3k4h3d/papers</a> Some papers about cyber security</li> <li>[<strong>287</strong>星][10m] <a href="https://github.com/wallarm/awesome-nginx-security">wallarm/awesome-nginx-security</a></li> <li>[<strong>276</strong>星][4m] <a href="https://github.com/mattnotmax/cyberchef-recipes">mattnotmax/cyberchef-recipes</a> A list of cyber-chef recipes</li> <li>[<strong>272</strong>星][8d] [JS] <a href="https://github.com/ropnop/serverless_toolkit">ropnop/serverless_toolkit</a> A collection of useful Serverless functions I use when pentesting</li> <li>[<strong>260</strong>星][5m] <a href="https://github.com/zhaoweiho/web-sec-interview">zhaoweiho/web-sec-interview</a> Information Security (Web Security/Penetration Testing Direction) Interview Questions/Solutions 信息安全(Web安全/渗透测试方向)面试题/解题思路</li> <li>[<strong>260</strong>星][27d] <a href="https://github.com/thelsa/cs-checklist">thelsa/cs-checklist</a> PC客户端(C-S架构)渗透测试checklist / Client side(C-S) penestration checklist</li> <li>[<strong>243</strong>星][7d] <a href="https://github.com/euphrat1ca/security_w1k1">euphrat1ca/security_w1k1</a> collect</li> <li>[<strong>239</strong>星][6d] <a href="https://github.com/pe3zx/my-infosec-awesome">pe3zx/my-infosec-awesome</a> My curated list of awesome links, resources and tools on infosec related topics</li> <li>[<strong>228</strong>星][6m] <a href="https://github.com/guardrailsio/awesome-dotnet-security">guardrailsio/awesome-dotnet-security</a> Awesome .NET Security Resources</li> <li>[<strong>223</strong>星][5d] <a href="https://github.com/decalage2/awesome-security-hardening">decalage2/awesome-security-hardening</a> A collection of awesome security hardening guides, tools and other resources</li> <li>[<strong>222</strong>星][9m] <a href="https://github.com/jesusprubio/awesome-nodejs-pentest">jesusprubio/awesome-nodejs-pentest</a></li> <li>[<strong>221</strong>星][4m] <a href="https://github.com/security-checklist/php-security-check-list">security-checklist/php-security-check-list</a> PHP Security Check List [ EN ]</li> <li>[<strong>216</strong>星][10m] <a href="https://github.com/puresec/awesome-serverless-security">puresec/awesome-serverless-security</a> A curated list of awesome serverless security resources such as (e)books, articles, whitepapers, blogs and research papers.</li> <li>[<strong>214</strong>星][3d] <a href="https://github.com/shogunlab/awesome-hyper-v-exploitation">shogunlab/awesome-hyper-v-exploitation</a> A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.</li> <li>[<strong>213</strong>星][10m] <a href="https://github.com/jeansgit/redteam">jeansgit/redteam</a> RedTeam资料收集整理</li> <li>[<strong>213</strong>星][3m] [Shell] <a href="https://github.com/xu-jian/vps">xu-jian/vps</a> 个人笔记汇总</li> <li>[<strong>209</strong>星][28d] <a href="https://github.com/sigp/solidity-security-blog">sigp/solidity-security-blog</a> Comprehensive list of known attack vectors and common anti-patterns</li> <li>[<strong>207</strong>星][1y] <a href="https://github.com/faizann24/resources-for-learning-hacking">faizann24/resources-for-learning-hacking</a> All the resources I could find for learning Ethical Hacking and penetration testing.</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-664ff1dbdafefd7d856c88112948a65b"></a>混合型收集</h2><a id="user-content-混合型收集" class="anchor" aria-label="Permalink: 混合型收集" href="#混合型收集"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>24868</strong>星][8d] <a href="https://github.com/trimstray/the-book-of-secret-knowledge">trimstray/the-book-of-secret-knowledge</a> A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.</li> <li>[<strong>10920</strong>星][26d] <a href="https://github.com/enaqx/awesome-pentest">enaqx/awesome-pentest</a> 渗透测试资源/工具集</li> <li>[<strong>5513</strong>星][9m] <a href="https://github.com/carpedm20/awesome-hacking">carpedm20/awesome-hacking</a> Hacking教程、工具和资源</li> <li>[<strong>5121</strong>星][2m] <a href="https://github.com/sbilly/awesome-security">sbilly/awesome-security</a> 与安全相关的软件、库、文档、书籍、资源和工具等收集</li> <li>[<strong>3230</strong>星][6d] [Rich Text Format] <a href="https://github.com/The-Art-of-Hacking/h4cker">the-art-of-hacking/h4cker</a> 资源收集:hacking、渗透、数字取证、事件响应、漏洞研究、漏洞开发、逆向</li> <li>[<strong>1904</strong>星][20d] <a href="https://github.com/olivierlaflamme/cheatsheet-god">olivierlaflamme/cheatsheet-god</a> Penetration Testing Reference Bank - OSCP / PTP &amp; PTX Cheatsheet</li> <li>[<strong>591</strong>星][6d] [Perl] <a href="https://github.com/bollwarm/sectoolset">bollwarm/sectoolset</a> 安全项目工具集合</li> <li>[<strong>587</strong>星][6m] <a href="https://github.com/d30sa1/rootkits-list-download">d30sa1/rootkits-list-download</a> Rootkit收集</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-67acc04b20c99f87ee625b073330d8c2"></a>无工具类收集</h2><a id="user-content-无工具类收集" class="anchor" aria-label="Permalink: 无工具类收集" href="#无工具类收集"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>34045</strong>星][21d] [Py] <a href="https://github.com/minimaxir/big-list-of-naughty-strings">minimaxir/big-list-of-naughty-strings</a> “淘气”的字符串列表,当作为用户输入时很容易引发问题</li> <li>[<strong>9042</strong>星][3m] <a href="https://github.com/vitalysim/awesome-hacking-resources">vitalysim/awesome-hacking-resources</a> A collection of hacking / penetration testing resources to make you better!</li> <li>[<strong>3616</strong>星][9d] <a href="https://github.com/blacckhathaceekr/pentesting-bible">blacckhathaceekr/pentesting-bible</a> links reaches 10000 links &amp; 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking &amp; penetration testing &amp; red team &amp; cyber security &amp; computer science resources.</li> <li>[<strong>2800</strong>星][2m] <a href="https://github.com/secwiki/sec-chart">secwiki/sec-chart</a> 安全思维导图集合</li> <li>[<strong>2671</strong>星][1y] [HTML] <a href="https://github.com/chybeta/web-security-learning">chybeta/web-security-learning</a> Web-Security-Learning</li> <li>[<strong>2519</strong>星][17d] <a href="https://github.com/onlurking/awesome-infosec">onlurking/awesome-infosec</a> A curated list of awesome infosec courses and training resources.</li> <li>[<strong>2356</strong>星][11m] <a href="https://github.com/hack-with-github/free-security-ebooks">hack-with-github/free-security-ebooks</a> Free Security and Hacking eBooks</li> <li>[<strong>2118</strong>星][3m] <a href="https://github.com/yeahhub/hacking-security-ebooks">yeahhub/hacking-security-ebooks</a> Top 100 Hacking &amp; Security E-Books (Free Download)</li> <li>[<strong>1956</strong>星][1m] [Py] <a href="https://github.com/nixawk/pentest-wiki">nixawk/pentest-wiki</a> PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.</li> <li>[<strong>1955</strong>星][1m] <a href="https://github.com/hmaverickadams/beginner-network-pentesting">hmaverickadams/beginner-network-pentesting</a> Notes for Beginner Network Pentesting Course</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-24707dd322098f73c7e450d6b1eddf12"></a>收集类的收集</h2><a id="user-content-收集类的收集" class="anchor" aria-label="Permalink: 收集类的收集" href="#收集类的收集"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>33101</strong>星][3m] <a href="https://github.com/hack-with-github/awesome-hacking">hack-with-github/awesome-hacking</a> A collection of various awesome lists for hackers, pentesters and security researchers</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-9101434a896f20263d09c25ace65f398"></a>教育资源&amp;&amp;课程&amp;&amp;教程&amp;&amp;书籍</h2><a id="user-content-教育资源课程教程书籍" class="anchor" aria-label="Permalink: 教育资源&amp;&amp;课程&amp;&amp;教程&amp;&amp;书籍" href="#教育资源课程教程书籍"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>10944</strong>星][2m] [CSS] <a href="https://github.com/hacker0x01/hacker101">hacker0x01/hacker101</a> Hacker101</li> <li>[<strong>3945</strong>星][4m] [PHP] <a href="https://github.com/paragonie/awesome-appsec">paragonie/awesome-appsec</a> A curated list of resources for learning about application security</li> <li>[<strong>959</strong>星][5m] <a href="https://github.com/bugcrowd/bugcrowd_university">bugcrowd/bugcrowd_university</a> 研究者社区的教育内容</li> <li>[<strong>936</strong>星][7m] [Py] <a href="https://github.com/osirislab/Hack-Night">osirislab/hack-night</a> a sobering introduction to offensive security</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-8088e46fc533286d88b945f1d472bf57"></a>笔记&amp;&amp;Tips&amp;&amp;Tricks</h2><a id="user-content-笔记tipstricks" class="anchor" aria-label="Permalink: 笔记&amp;&amp;Tips&amp;&amp;Tricks" href="#笔记tipstricks"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-f57ccaab4279b60c17a03f90d96b815c"></a>未分类</h3><a id="user-content-未分类-2" class="anchor" aria-label="Permalink: 未分类" href="#未分类-2"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>2816</strong>星][2m] <a href="https://github.com/paulsec/awesome-sec-talks">paulsec/awesome-sec-talks</a> A collected list of awesome security talks</li> <li>[<strong>864</strong>星][2d] [Py] <a href="https://github.com/lylemi/learn-web-hacking">lylemi/learn-web-hacking</a> Web安全学习笔记</li> <li>[<strong>723</strong>星][3m] <a href="https://github.com/uknowsec/active-directory-pentest-notes">uknowsec/active-directory-pentest-notes</a> 个人域渗透学习笔记</li> <li>[<strong>593</strong>星][1m] [PS] <a href="https://github.com/threatexpress/red-team-scripts">threatexpress/red-team-scripts</a> A collection of Red Team focused tools, scripts, and notes</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-0476f6b97e87176da0a0d7328f8747e7"></a>blog</h3><a id="user-content-blog" class="anchor" aria-label="Permalink: blog" href="#blog"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1229</strong>星][5m] <a href="https://github.com/chalker/notes">chalker/notes</a> Some public notes</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-df8ec4a66ef5027bbcc591c94f8de1e5"></a>Talk&amp;&amp;Conference</h2><a id="user-content-talkconference" class="anchor" aria-label="Permalink: Talk&amp;&amp;Conference" href="#talkconference"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-4be58a3a00f83975b0321425db3b9b68"></a>文档&amp;&amp;Documentation&amp;&amp;规则说明&amp;&amp;RFC</h2><a id="user-content-文档documentation规则说明rfc" class="anchor" aria-label="Permalink: 文档&amp;&amp;Documentation&amp;&amp;规则说明&amp;&amp;RFC" href="#文档documentation规则说明rfc"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1705</strong>星][10m] [CSS] <a href="https://github.com/bagder/http2-explained">bagder/http2-explained</a> A detailed document explaining and documenting HTTP/2, the successor to the widely popular HTTP/1.1 protocol</li> </ul> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-7e840ca27f1ff222fd25bc61a79b07ba"></a>特定目标</h1><a id="user-content-特定目标" class="anchor" aria-label="Permalink: 特定目标" href="#特定目标"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-eb2d1ffb231cee014ed24d59ca987da2"></a>未分类-XxTarget</h2><a id="user-content-未分类-xxtarget" class="anchor" aria-label="Permalink: 未分类-XxTarget" href="#未分类-xxtarget"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>4177</strong>星][4d] [Java] <a href="https://github.com/spring-projects/spring-security">spring-projects/spring-security</a> Spring Security</li> <li>[<strong>2942</strong>星][6d] [Go] <a href="https://github.com/securego/gosec">securego/gosec</a> Golang security checker</li> <li>[<strong>1906</strong>星][2m] [Py] <a href="https://github.com/pycqa/bandit">pycqa/bandit</a> 在Python代码中查找常见的安全问题</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-c71ad1932bbf9c908af83917fe1fd5da"></a>AWS</h2><a id="user-content-aws" class="anchor" aria-label="Permalink: AWS" href="#aws"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>4471</strong>星][1y] [Go] <a href="https://github.com/wallix/awless">wallix/awless</a> A Mighty CLI for AWS</li> <li>[<strong>4271</strong>星][4m] [Py] <a href="https://github.com/dxa4481/trufflehog">dxa4481/trufflehog</a> Searches through git repositories for high entropy strings and secrets, digging deep into commit history</li> <li>[<strong>3301</strong>星][5d] [Shell] <a href="https://github.com/toniblyx/my-arsenal-of-aws-security-tools">toniblyx/my-arsenal-of-aws-security-tools</a> List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.</li> <li>[<strong>3154</strong>星][5d] [JS] <a href="https://github.com/duo-labs/cloudmapper">duo-labs/cloudmapper</a> 生成AWS环境的网络拓扑图</li> <li>[<strong>2895</strong>星][3d] [Go] <a href="https://github.com/99designs/aws-vault">99designs/aws-vault</a> A vault for securely storing and accessing AWS credentials in development environments</li> <li>[<strong>2645</strong>星][4m] [Java] <a href="https://github.com/teevity/ice">teevity/ice</a> AWS Usage Tool</li> <li>[<strong>2374</strong>星][5m] [Go] <a href="https://github.com/mlabouardy/komiser">mlabouardy/komiser</a></li> <li>[<strong>1912</strong>星][6d] [Shell] <a href="https://github.com/toniblyx/prowler">toniblyx/prowler</a> AWS Security Best Practices Assessment, Auditing, Hardening and Forensics Readiness Tool. It follows guidelines of the CIS Amazon Web Services Foundations Benchmark and DOZENS of additional checks including GDPR and HIPAA (+100). Official CIS for AWS guide:</li> <li>[<strong>1895</strong>星][3d] [Py] <a href="https://github.com/mozilla/mozdef">mozilla/mozdef</a> Mozilla Enterprise Defense Platform</li> <li>[<strong>1604</strong>星][1y] [Py] <a href="https://github.com/nccgroup/Scout2">nccgroup/scout2</a> Security auditing tool for AWS environments</li> <li>[<strong>1386</strong>星][12m] [Py] <a href="https://github.com/eth0izzle/bucket-stream">eth0izzle/bucket-stream</a> 通过certstream 监控多种证书 transparency 日志, 进而查找有趣的 Amazon S3 Buckets</li> <li>[<strong>1198</strong>星][17d] [Py] <a href="https://github.com/lyft/cartography">lyft/cartography</a> Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powered by a Neo4j database.</li> <li>[<strong>1149</strong>星][4m] [Py] <a href="https://github.com/rhinosecuritylabs/pacu">rhinosecuritylabs/pacu</a> The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.</li> <li>[<strong>938</strong>星][3m] [Py] <a href="https://github.com/sa7mon/s3scanner">sa7mon/s3scanner</a> Scan for open AWS S3 buckets and dump the contents</li> <li>[<strong>844</strong>星][26d] [Py] <a href="https://github.com/jordanpotti/awsbucketdump">jordanpotti/awsbucketdump</a> 快速枚举 AWS S3 Buckets,查找感兴趣的文件。类似于子域名爆破,但针对S3 Bucket,有额外功能,例如下载文件等</li> <li>[<strong>814</strong>星][7d] [Go] <a href="https://github.com/rebuy-de/aws-nuke">rebuy-de/aws-nuke</a> Nuke a whole AWS account and delete all its resources.</li> <li>[<strong>804</strong>星][2d] [Py] <a href="https://github.com/awslabs/aws-config-rules">awslabs/aws-config-rules</a> [Node, Python, Java] Repository of sample Custom Rules for AWS Config.</li> <li>[<strong>786</strong>星][11d] [Go] <a href="https://github.com/liamg/tfsec">liamg/tfsec</a></li> <li>[<strong>774</strong>星][13d] [Java] <a href="https://github.com/tmobile/pacbot">tmobile/pacbot</a> PacBot (Policy as Code Bot)</li> <li>[<strong>613</strong>星][3m] [Py] <a href="https://github.com/netflix/repokid">netflix/repokid</a> AWS Least Privilege for Distributed, High-Velocity Deployment</li> <li>[<strong>609</strong>星][21d] [Shell] <a href="https://github.com/securityftw/cs-suite">securityftw/cs-suite</a> Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.</li> <li>[<strong>563</strong>星][3m] [Shell] <a href="https://github.com/denizparlak/zeus">denizparlak/zeus</a> AWS Auditing &amp; Hardening Tool</li> <li>[<strong>548</strong>星][9d] [Ruby] <a href="https://github.com/stelligent/cfn_nag">stelligent/cfn_nag</a> Linting tool for CloudFormation templates</li> <li>[<strong>539</strong>星][4d] [Py] <a href="https://github.com/salesforce/policy_sentry">salesforce/policy_sentry</a> IAM Least Privilege Policy Generator</li> <li>[<strong>505</strong>星][3m] [Py] <a href="https://github.com/awslabs/aws-security-benchmark">awslabs/aws-security-benchmark</a> Open source demos, concept and guidance related to the AWS CIS Foundation framework.</li> <li>[<strong>485</strong>星][19d] [Py] <a href="https://github.com/netflix-skunkworks/diffy">netflix-skunkworks/diffy</a> Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR) teams quickly identify suspicious hosts on which to focus their response.</li> <li>[<strong>462</strong>星][8m] [Py] <a href="https://github.com/ustayready/fireprox">ustayready/fireprox</a> AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation</li> <li>[<strong>409</strong>星][2m] [Ruby] <a href="https://github.com/arkadiyt/aws_public_ips">arkadiyt/aws_public_ips</a> Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services</li> <li>[<strong>400</strong>星][4m] [Py] <a href="https://github.com/duo-labs/cloudtracker">duo-labs/cloudtracker</a> CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.</li> <li>[<strong>389</strong>星][2m] [Py] <a href="https://github.com/riotgames/cloud-inquisitor">riotgames/cloud-inquisitor</a> Enforce ownership and data security within AWS</li> <li>[<strong>370</strong>星][11m] [Py] <a href="https://github.com/awslabs/aws-security-automation">awslabs/aws-security-automation</a> Collection of scripts and resources for DevSecOps and Automated Incident Response Security</li> <li>[<strong>365</strong>星][7m] [Py] <a href="https://github.com/carnal0wnage/weirdaal">carnal0wnage/weirdaal</a> WeirdAAL (AWS Attack Library)</li> <li>[<strong>343</strong>星][2m] [Ruby] <a href="https://github.com/anaynayak/aws-security-viz">anaynayak/aws-security-viz</a> Visualize your aws security groups.</li> <li>[<strong>321</strong>星][1y] [Py] <a href="https://github.com/securing/dumpsterdiver">securing/dumpsterdiver</a> Tool to search secrets in various filetypes.</li> <li>[<strong>292</strong>星][8m] [Py] <a href="https://github.com/cesar-rodriguez/terrascan">cesar-rodriguez/terrascan</a> Collection of security and best practice test for static code analysis of terraform templates</li> <li>[<strong>289</strong>星][1y] [Py] <a href="https://github.com/nccgroup/aws-inventory">nccgroup/aws-inventory</a> 发现在AWS账户中创建的资源</li> <li>[<strong>274</strong>星][2m] [Py] <a href="https://github.com/nccgroup/pmapper">nccgroup/pmapper</a> A tool for quickly evaluating IAM permissions in AWS.</li> <li>[<strong>260</strong>星][11d] [Py] <a href="https://github.com/voulnet/barq">voulnet/barq</a> The AWS Cloud Post Exploitation framework!</li> <li>[<strong>258</strong>星][14d] [Jupyter Notebook] <a href="https://github.com/aws-samples/aws-security-workshops">aws-samples/aws-security-workshops</a> A collection of the latest AWS Security workshops</li> <li>[<strong>242</strong>星][6d] [HCL] <a href="https://github.com/nozaq/terraform-aws-secure-baseline">nozaq/terraform-aws-secure-baseline</a> Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations.</li> <li>[<strong>224</strong>星][10d] [Dockerfile] <a href="https://github.com/thinkst/canarytokens-docker">thinkst/canarytokens-docker</a> Docker configuration to quickly setup your own Canarytokens.</li> <li>[<strong>204</strong>星][17d] <a href="https://github.com/stuhirst/awssecurity">stuhirst/awssecurity</a> for AWS Security material</li> <li>[<strong>203</strong>星][6m] [Py] <a href="https://github.com/dowjones/hammer">dowjones/hammer</a> Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-88716f4591b1df2149c2b7778d15d04e"></a>Phoenix</h2><a id="user-content-phoenix" class="anchor" aria-label="Permalink: Phoenix" href="#phoenix"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>820</strong>星][5d] [Elixir] <a href="https://github.com/nccgroup/sobelow">nccgroup/sobelow</a> Phoenix 框架安全方面的静态分析工具(Phoenix 框架:支持对webUI,接口, web性能,mobile app 或 mobile browser 进行自动化测试和监控的平台)</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-4fd96686a470ff4e9e974f1503d735a2"></a>Kubernetes</h2><a id="user-content-kubernetes" class="anchor" aria-label="Permalink: Kubernetes" href="#kubernetes"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1895</strong>星][23d] [Py] <a href="https://github.com/aquasecurity/kube-hunter">aquasecurity/kube-hunter</a> Hunt for security weaknesses in Kubernetes clusters</li> <li>[<strong>582</strong>星][2m] [Go] <a href="https://github.com/shopify/kubeaudit">shopify/kubeaudit</a> kubeaudit helps you audit your Kubernetes clusters against common security controls</li> <li>[<strong>385</strong>星][2m] [Shell] <a href="https://github.com/kabachook/k8s-security">kabachook/k8s-security</a> Kubernetes security notes and best practices</li> <li>[<strong>211</strong>星][9m] [Go] <a href="https://github.com/cloudflare/cloudflare-ingress-controller">cloudflare/cloudflare-ingress-controller</a> A Kubernetes ingress controller for Cloudflare's Argo Tunnels</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-786201db0bcc40fdf486cee406fdad31"></a>Azure</h2><a id="user-content-azure" class="anchor" aria-label="Permalink: Azure" href="#azure"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-40dbffa18ec695a618eef96d6fd09176"></a>Nginx</h2><a id="user-content-nginx" class="anchor" aria-label="Permalink: Nginx" href="#nginx"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>6211</strong>星][2m] [Py] <a href="https://github.com/yandex/gixy">yandex/gixy</a> Nginx 配置静态分析工具,防止配置错误导致安全问题,自动化错误配置检测</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-6b90a3993f9846922396ec85713dc760"></a>ELK</h2><a id="user-content-elk" class="anchor" aria-label="Permalink: ELK" href="#elk"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1945</strong>星][4d] [CSS] <a href="https://github.com/cyb3rward0g/helk">cyb3rward0g/helk</a> 对ELK栈进行分析,具备多种高级功能,例如SQL声明性语言,图形,结构化流,机器学习等</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-6730dabeca61fcf64d4f7631abae6734"></a>GoogleCloud&amp;&amp;谷歌云</h2><a id="user-content-googlecloud谷歌云" class="anchor" aria-label="Permalink: GoogleCloud&amp;&amp;谷歌云" href="#googlecloud谷歌云"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1066</strong>星][2d] [Py] <a href="https://github.com/forseti-security/forseti-security">forseti-security/forseti-security</a> A community-driven collection of open source tools to improve the security of your Google Cloud Platform environments</li> </ul> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-d55d9dfd081aa2a02e636b97ca1bad0b"></a>物联网(IoT)&amp;&amp;嵌入式设备&amp;&amp;路由器&amp;&amp;交换机&amp;&amp;智能设备&amp;&amp;打印机</h1><a id="user-content-物联网iot嵌入式设备路由器交换机智能设备打印机" class="anchor" aria-label="Permalink: 物联网(IoT)&amp;&amp;嵌入式设备&amp;&amp;路由器&amp;&amp;交换机&amp;&amp;智能设备&amp;&amp;打印机" href="#物联网iot嵌入式设备路由器交换机智能设备打印机"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-9a20a70f58ea7946f24224c5d73fac15"></a>工具</h2><a id="user-content-工具-1" class="anchor" aria-label="Permalink: 工具" href="#工具-1"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-cda63179d132f43441f8844c5df10024"></a>未分类-IoT</h3><a id="user-content-未分类-iot" class="anchor" aria-label="Permalink: 未分类-IoT" href="#未分类-iot"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1218</strong>星][] [C] <a href="https://github.com/dgiese/dustcloud">dgiese/dustcloud</a> Xiaomi Smart Home Device Reverse Engineering and Hacking</li> <li>[<strong>1145</strong>星][7m] <a href="https://github.com/nebgnahz/awesome-iot-hacks">nebgnahz/awesome-iot-hacks</a> A Collection of Hacks in IoT Space so that we can address them (hopefully).</li> <li>[<strong>1049</strong>星][29d] [Py] <a href="https://github.com/ct-open-source/tuya-convert">ct-open-source/tuya-convert</a> A collection of scripts to flash Tuya IoT devices to alternative firmwares</li> <li>[<strong>836</strong>星][5d] <a href="https://github.com/v33ru/iotsecurity101">v33ru/iotsecurity101</a> From IoT Pentesting to IoT Security</li> <li>[<strong>587</strong>星][9m] [Py] <a href="https://github.com/woj-ciech/danger-zone">woj-ciech/danger-zone</a> Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.</li> <li>[<strong>491</strong>星][18d] [Py] <a href="https://github.com/iti/ics-security-tools">iti/ics-security-tools</a> Tools, tips, tricks, and more for exploring ICS Security.</li> <li>[<strong>461</strong>星][5d] [Py] <a href="https://github.com/rabobank-cdc/dettect">rabobank-cdc/dettect</a> Detect Tactics, Techniques &amp; Combat Threats</li> <li>[<strong>330</strong>星][1y] [Py] <a href="https://github.com/vmware/liota">vmware/liota</a></li> <li>[<strong>315</strong>星][16d] [Java] <a href="https://github.com/erudika/para">erudika/para</a> Open source back-end server for web, mobile and IoT. The backend for busy developers. (self-hosted or hosted)</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-72bffacc109d51ea286797a7d5079392"></a>打印机</h3><a id="user-content-打印机" class="anchor" aria-label="Permalink: 打印机" href="#打印机"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-c9fd442ecac4e22d142731165b06b3fe"></a>路由器&amp;&amp;交换机</h3><a id="user-content-路由器交换机" class="anchor" aria-label="Permalink: 路由器&amp;&amp;交换机" href="#路由器交换机"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-3d345feb9fee1c101aea3838da8cbaca"></a>嵌入式设备</h3><a id="user-content-嵌入式设备" class="anchor" aria-label="Permalink: 嵌入式设备" href="#嵌入式设备"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>7547</strong>星][8d] [Py] <a href="https://github.com/threat9/routersploit">threat9/routersploit</a> Exploitation Framework for Embedded Devices</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-01e638f09e44280ae9a1a95fc376edc5"></a>文章</h2><a id="user-content-文章-1" class="anchor" aria-label="Permalink: 文章" href="#文章-1"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-a4a3bcead86d9f9f7977479dfe94797d"></a>新添加</h3><a id="user-content-新添加" class="anchor" aria-label="Permalink: 新添加" href="#新添加"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-1233584261c0cd5224b6e90a98cc9a94"></a>渗透&amp;&amp;offensive&amp;&amp;渗透框架&amp;&amp;后渗透框架</h1><a id="user-content-渗透offensive渗透框架后渗透框架" class="anchor" aria-label="Permalink: 渗透&amp;&amp;offensive&amp;&amp;渗透框架&amp;&amp;后渗透框架" href="#渗透offensive渗透框架后渗透框架"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-5dd93fbc2f2ebc8d98672b2d95782af3"></a>工具</h2><a id="user-content-工具-2" class="anchor" aria-label="Permalink: 工具" href="#工具-2"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-2e40f2f1df5d7f93a7de47bf49c24a0e"></a>未分类-Pentest</h3><a id="user-content-未分类-pentest" class="anchor" aria-label="Permalink: 未分类-Pentest" href="#未分类-pentest"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li> <p dir="auto">[<strong>3051</strong>星][4m] [Py] <a href="https://github.com/spiderlabs/responder">spiderlabs/responder</a> LLMNR/NBT-NS/MDNS投毒,内置HTTP/SMB/MSSQL/FTP/LDAP认证服务器, 支持NTLMv1/NTLMv2/LMv2</p> </li> <li> <p dir="auto">[<strong>2058</strong>星][2m] [C++] <a href="https://github.com/lordnoteworthy/al-khaser">lordnoteworthy/al-khaser</a> 在野恶意软件使用的技术:虚拟机,仿真,调试器,沙盒检测。</p> <ul dir="auto"> <li>重复区段: <a href="#e2fd0947924229d7de24b9902e1f54a0">恶意代码-&gt;工具</a> |</li> </ul> </li> <li> <p dir="auto">[<strong>1957</strong>星][5d] <a href="https://github.com/chaitin/xray">chaitin/xray</a> xray 安全评估工具 | 使用之前务必先阅读文档</p> </li> <li> <p dir="auto">[<strong>1468</strong>星][6d] [C] <a href="https://github.com/ufrisk/pcileech">ufrisk/pcileech</a> DMA攻击工具。通过 PCIe 硬件设备使用 DMA,直接读写目标系统的内存。目标系统不需要安装驱动。</p> </li> <li> <p dir="auto">[<strong>1421</strong>星][5m] <a href="https://github.com/yadox666/the-hackers-hardware-toolkit">yadox666/the-hackers-hardware-toolkit</a> 用于Red Team、渗透、安全研究的最佳硬件产品集合</p> </li> <li> <p dir="auto">[<strong>1398</strong>星][4d] [Py] <a href="https://github.com/ekultek/whatwaf">ekultek/whatwaf</a> 检测并绕过WAF和保护系统</p> </li> <li> <p dir="auto">[<strong>1223</strong>星][4m] [Py] <a href="https://github.com/owtf/owtf">owtf/owtf</a> 进攻性 Web 测试框架。着重于 OWASP + PTES,尝试统合强大的工具,提高渗透测试的效率。大部分以Python 编写</p> </li> <li> <p dir="auto">[<strong>1020</strong>星][1m] [C] <a href="https://github.com/bt3gl/Pentesting-Toolkit">bt3gl/pentesting-toolkit</a> 渗透测试,CTF和战争游戏的工具收集</p> </li> <li> <p dir="auto">[<strong>952</strong>星][4m] [Py] <a href="https://github.com/hatriot/zarp">hatriot/zarp</a> 网络攻击工具,主要是本地网络攻击</p> </li> <li> <p dir="auto">[<strong>938</strong>星][2m] [Py] <a href="https://github.com/d4vinci/one-lin3r">d4vinci/one-lin3r</a> 轻量级框架,提供在渗透测试中需要的所有one-liners</p> </li> <li> <p dir="auto">[<strong>850</strong>星][8m] [JS] <a href="https://github.com/serpicoproject/serpico">serpicoproject/serpico</a> 渗透测试报告生成和协作工具</p> </li> <li> <p dir="auto">[<strong>820</strong>星][2m] [Py] <a href="https://github.com/jeffzh3ng/fuxi">jeffzh3ng/fuxi</a> 渗透测试平台</p> </li> <li> <p dir="auto">[<strong>809</strong>星][17d] [Py] <a href="https://github.com/jivoi/pentest">jivoi/pentest</a> 渗透测试工具</p> </li> <li> <p dir="auto">[<strong>775</strong>星][8m] [Py] <a href="https://github.com/gkbrk/slowloris">gkbrk/slowloris</a> HTTP DoS 服务攻击,主要影响多线程服务器</p> </li> <li> <p dir="auto">[<strong>722</strong>星][19d] <a href="https://github.com/voorivex/pentest-guide">voorivex/pentest-guide</a> 基于OWASP的渗透测试指南,包括测试案例,资源和示例。</p> </li> <li> <p dir="auto">[<strong>713</strong>星][6m] <a href="https://github.com/leezj9671/pentest_interview">leezj9671/pentest_interview</a> 个人准备渗透测试和安全面试的经验之谈,和去部分厂商的面试题,干货真的满满~</p> </li> <li> <p dir="auto">[<strong>685</strong>星][4d] [Py] <a href="https://github.com/gwen001/pentest-tools">gwen001/pentest-tools</a> 日常使用的渗透工具集合</p> </li> <li> <p dir="auto">[<strong>624</strong>星][10m] [Py] <a href="https://github.com/epsylon/ufonet">epsylon/ufonet</a> 用于发起DDoS和DoS攻击的工具包。</p> </li> <li> <p dir="auto">[<strong>613</strong>星][1m] [Ruby] <a href="https://github.com/hackplayers/evil-winrm">hackplayers/evil-winrm</a> 用户Hacking/渗透的终极WinRM shell</p> </li> <li> <p dir="auto">[<strong>545</strong>星][t] [C++] <a href="https://github.com/danielkrupinski/osiris">danielkrupinski/osiris</a> 开源培训软件/“反恐精英:全球攻势”游戏作弊工具。设计为内部作弊-可将动态链接库(DLL)加载到游戏过程中</p> </li> <li> <p dir="auto">[<strong>514</strong>星][25d] [PS] <a href="https://github.com/S3cur3Th1sSh1t/WinPwn">s3cur3th1ssh1t/winpwn</a> 内部Windows渗透测试/与安全的自动化</p> </li> <li> <p dir="auto">[<strong>502</strong>星][7d] <a href="https://github.com/netbiosx/checklists">netbiosx/checklists</a> 参与的各种渗透测试的清单</p> </li> <li> <p dir="auto">[<strong>491</strong>星][1y] [Shell] <a href="https://github.com/leonteale/pentestpackage">leonteale/pentestpackage</a> 一整套我已经制作或经常使用的渗透脚本</p> </li> <li> <p dir="auto">[<strong>489</strong>星][11m] [Ruby] <a href="https://github.com/sidaf/homebrew-pentest">sidaf/homebrew-pentest</a> 一个包含一些Homebrew formulas的Tap,包含与渗透测试相关的工具。</p> </li> <li> <p dir="auto">[<strong>474</strong>星][8m] [Java] <a href="https://github.com/alpha1e0/pentestdb">alpha1e0/pentestdb</a> WEB渗透测试数据库</p> </li> <li> <p dir="auto">[<strong>472</strong>星][11m] [PHP] <a href="https://github.com/l3m0n/pentest_tools">l3m0n/pentest_tools</a> 收集一些小型实用的工具</p> </li> <li> <p dir="auto">[<strong>464</strong>星][3m] [C++] <a href="https://github.com/FSecureLABS/C3">fsecurelabs/c3</a> 一个用于快速定制C2通道原型的框架,同时仍提供与现有攻击性工具包的集成。</p> </li> <li> <p dir="auto">[<strong>463</strong>星][4m] <a href="https://github.com/mel0day/redteam-bcs">mel0day/redteam-bcs</a> BCS(北京网络安全大会)2019 红队行动会议重点内容</p> </li> <li> <p dir="auto">[<strong>451</strong>星][8m] [C++] <a href="https://github.com/rek7/mxtract">rek7/mxtract</a> 一个基于linux的开源工具,用于分析和转储内存。</p> </li> <li> <p dir="auto">[<strong>440</strong>星][2m] [Py] <a href="https://github.com/admintony/prepare-for-awd">admintony/prepare-for-awd</a> AWD攻防赛脚本集合</p> </li> <li> <p dir="auto">[<strong>435</strong>星][10m] [Go] <a href="https://github.com/amyangxyz/assassingo">amyangxyz/assassingo</a> 一个可扩展的并发信息收集和漏洞扫描框架,具有基于WebSocket的Web GUI。</p> </li> <li> <p dir="auto">[<strong>403</strong>星][2d] [Py] <a href="https://github.com/christruncer/pentestscripts">christruncer/pentestscripts</a> 渗透脚本</p> </li> <li> <p dir="auto">[<strong>401</strong>星][2m] [Py] <a href="https://github.com/clr2of8/dpat">clr2of8/dpat</a> 域密码审核工具</p> </li> <li> <p dir="auto">[<strong>396</strong>星][4m] <a href="https://github.com/ansjdnakjdnajkd/ios">ansjdnakjdnajkd/ios</a> iOS渗透测试最有用的工具</p> </li> <li> <p dir="auto">[<strong>395</strong>星][8d] [PS] <a href="https://github.com/d0nkeys/redteam">d0nkeys/redteam</a> Red Team 脚本</p> </li> <li> <p dir="auto">[<strong>394</strong>星][1y] [Py] <a href="https://github.com/cr4shcod3/pureblood">cr4shcod3/pureblood</a> 为黑客/渗透测试/漏洞赏金创建的渗透测试框架</p> </li> <li> <p dir="auto">[<strong>392</strong>星][4m] [Py] <a href="https://github.com/xuanhun/pythonhackingbook1">xuanhun/pythonhackingbook1</a> Python黑客编程之极速入门</p> </li> <li> <p dir="auto">[<strong>387</strong>星][5m] [C#] <a href="https://github.com/bitsadmin/nopowershell">bitsadmin/nopowershell</a> 使用C#"重写"的PowerShell, 支持执行与PowerShell类似的命令, 然而对所有的PowerShell日志机制都不可见</p> </li> <li> <p dir="auto">[<strong>381</strong>星][9m] [C] <a href="https://github.com/ridter/pentest">ridter/pentest</a> 渗透工具</p> </li> <li> <p dir="auto">[<strong>379</strong>星][7m] <a href="https://github.com/unprovable/pentesthardware">unprovable/pentesthardware</a> 公开笔记整理</p> </li> <li> <p dir="auto">[<strong>353</strong>星][1y] [PS] <a href="https://github.com/rootclay/powershell-attack-guide">rootclay/powershell-attack-guide</a> Powershell攻击指南----黑客后渗透之道</p> </li> <li> <p dir="auto">[<strong>351</strong>星][3m] [Shell] <a href="https://github.com/maldevel/pentestkit">maldevel/pentestkit</a> 渗透脚本和工具</p> </li> <li> <p dir="auto">[<strong>347</strong>星][1m] [Py] <a href="https://github.com/ym2011/PEST">ym2011/pest</a> 渗透脚本</p> </li> <li> <p dir="auto">[<strong>346</strong>星][11m] [Py] <a href="https://github.com/darkspiritz/darkspiritz">darkspiritz/darkspiritz</a> 适用于Linux,MacOS和Windows系统的渗透测试框架。</p> </li> <li> <p dir="auto">[<strong>344</strong>星][1m] <a href="https://github.com/stardustsky/saidict">stardustsky/saidict</a> 弱口令,敏感目录,敏感文件等渗透测试常用攻击字典</p> </li> <li> <p dir="auto">[<strong>340</strong>星][1y] [Java] <a href="https://github.com/rub-nds/ws-attacker">rub-nds/ws-attacker</a> Web服务渗透测试框架,模块化。</p> </li> <li> <p dir="auto">[<strong>331</strong>星][1m] [Py] <a href="https://github.com/m8r0wn/nullinux">m8r0wn/nullinux</a> SMB null 会话识别和枚举工具</p> </li> <li> <p dir="auto">[<strong>323</strong>星][3m] [PS] <a href="https://github.com/kmkz/pentesting">kmkz/pentesting</a> 渗透测试技巧</p> </li> <li> <p dir="auto">[<strong>322</strong>星][4m] [HTML] <a href="https://github.com/koutto/jok3r">koutto/jok3r</a> 一个Python3 CLI应用程序,旨在帮助渗透测试人员进行网络基础结构和Web黑盒安全性测试。</p> </li> <li> <p dir="auto">[<strong>310</strong>星][7m] <a href="https://github.com/ring04h/pentest">ring04h/pentest</a> 渗透测试用到的东东</p> </li> <li> <p dir="auto">[<strong>305</strong>星][3m] [Ruby] <a href="https://github.com/fozavci/viproy-voipkit">fozavci/viproy-voipkit</a> VoIP渗透测试工具和 Metasploit 框架</p> <ul dir="auto"> <li>重复区段: <a href="#01be61d5bb9f6f7199208ff0fba86b5d">渗透-&gt;工具-&gt;Metasploit-&gt;未分类-metasploit</a> |</li> </ul> </li> <li> <p dir="auto">[<strong>297</strong>星][2m] [Py] <a href="https://github.com/bishopfox/eyeballer">bishopfox/eyeballer</a> 用于大型网络渗透测试中需要从大量基于Web的主机中找到“有趣的”目标</p> </li> <li> <p dir="auto">[<strong>295</strong>星][2m] [Lua] <a href="https://github.com/pentesteracademy/patoolkit">pentesteracademy/patoolkit</a> 一组流量分析插件,用于将Wireshark的功能从微分析工具和协议解析器扩展到宏分析器和威胁猎人。</p> </li> <li> <p dir="auto">[<strong>289</strong>星][5d] [Java] <a href="https://github.com/mr-xn/penetration_testing_poc">mr-xn/penetration_testing_poc</a> 渗透测试有关的POC、EXP、脚本、提权、小工具等</p> </li> <li> <p dir="auto">[<strong>287</strong>星][1y] [C++] <a href="https://github.com/paranoidninja/pandoras-box">paranoidninja/pandoras-box</a> 渗透和Red Team脚本</p> </li> <li> <p dir="auto">[<strong>280</strong>星][12d] [Go] <a href="https://github.com/rmikehodges/hidensneak">rmikehodges/hidensneak</a> 通过提供快速部署,管理和关闭各种云服务的界面,协助管理渗透测试人员的攻击基础架构</p> </li> <li> <p dir="auto">[<strong>273</strong>星][19d] [Py] <a href="https://github.com/elevenpaths/homepwn">elevenpaths/homepwn</a> HomePwn - Swiss Army Knife for Pentesting of IoT Devices</p> </li> <li> <p dir="auto">[<strong>262</strong>星][4m] [Py] <a href="https://github.com/giantbranch/python-hacker-code">giantbranch/python-hacker-code</a> 《python黑帽子:黑客与渗透测试编程之道》代码及实验文件,字典等</p> </li> <li> <p dir="auto">[<strong>259</strong>星][1m] <a href="https://github.com/anyeduke/enterprise-security-skill">anyeduke/enterprise-security-skill</a> 用于记录企业安全规划,建设,运营,攻防的相关资源</p> </li> <li> <p dir="auto">[<strong>250</strong>星][5d] [PS] <a href="https://github.com/sdcampbell/internal-pentest-playbook">sdcampbell/internal-pentest-playbook</a> Internal Network Penetration Test Playbook</p> </li> <li> <p dir="auto">[<strong>246</strong>星][3m] [Shell] <a href="https://github.com/leviathan36/kaboom">leviathan36/kaboom</a> An automated pentest tool</p> </li> <li> <p dir="auto">[<strong>231</strong>星][9m] [Go] <a href="https://github.com/stevenaldinger/decker">stevenaldinger/decker</a> Declarative penetration testing orchestration framework</p> </li> <li> <p dir="auto">[<strong>220</strong>星][] [JS] <a href="https://github.com/giper45/dockersecurityplayground">giper45/dockersecurityplayground</a> A Microservices-based framework for the study of Network Security and Penetration Test techniques</p> </li> <li> <p dir="auto">[<strong>219</strong>星][6m] [Py] <a href="https://github.com/mgeeky/tomcatwardeployer">mgeeky/tomcatwardeployer</a> Apache Tomcat auto WAR deployment &amp; pwning penetration testing tool.</p> </li> <li> <p dir="auto">[<strong>206</strong>星][3m] [Shell] <a href="https://github.com/keepwannabe/remot3d">keepwannabe/remot3d</a> is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors</p> </li> <li> <p dir="auto">[<strong>203</strong>星][2m] [Ruby] <a href="https://github.com/vonahisec/leprechaun">vonahisec/leprechaun</a> This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.</p> </li> <li> <p dir="auto">[<strong>200</strong>星][11m] [Py] <a href="https://github.com/infamoussyn/rogue">infamoussyn/rogue</a> An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.</p> </li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-9081db81f6f4b78d5c263723a3f7bd6d"></a>收集</h3><a id="user-content-收集" class="anchor" aria-label="Permalink: 收集" href="#收集"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>923</strong>星][9m] [C] <a href="https://github.com/0x90/wifi-arsenal">0x90/wifi-arsenal</a> WiFi arsenal</li> <li>[<strong>822</strong>星][3m] [Shell] <a href="https://github.com/shr3ddersec/shr3dkit">shr3ddersec/shr3dkit</a> Red Team Tool Kit</li> <li>[<strong>540</strong>星][7m] [Py] <a href="https://github.com/0xdea/tactical-exploitation">0xdea/tactical-exploitation</a> 渗透测试辅助工具包. Python/PowerShell脚本</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-2051fd9e171f2698d8e7486e3dd35d87"></a>渗透多合一&amp;&amp;渗透框架</h3><a id="user-content-渗透多合一渗透框架" class="anchor" aria-label="Permalink: 渗透多合一&amp;&amp;渗透框架" href="#渗透多合一渗透框架"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>5062</strong>星][5m] [PS] <a href="https://github.com/EmpireProject/Empire">empireproject/empire</a> 后渗透框架. Windows客户端用PowerShell, Linux/OSX用Python. 之前PowerShell Empire和Python EmPyre的组合</li> <li>[<strong>4752</strong>星][13d] [Py] <a href="https://github.com/manisso/fsociety">manisso/fsociety</a> fsociety Hacking Tools Pack – A Penetration Testing Framework</li> <li>[<strong>3427</strong>星][1m] [PS] <a href="https://github.com/samratashok/nishang">samratashok/nishang</a> 渗透框架,脚本和Payload收集,主要是PowerShell,涵盖渗透的各个阶段</li> <li>[<strong>3154</strong>星][t] [Shell] <a href="https://github.com/1n3/sn1per">1n3/sn1per</a> 自动化渗透测试框架</li> <li>[<strong>3136</strong>星][2m] [Py] <a href="https://github.com/byt3bl33d3r/crackmapexec">byt3bl33d3r/crackmapexec</a> 后渗透工具,自动化评估大型Active Directory网络的安全性</li> <li>[<strong>2995</strong>星][18d] [Py] <a href="https://github.com/guardicore/monkey">guardicore/monkey</a> 自动化渗透测试工具, 测试数据中心的弹性, 以防范周边(perimeter)泄漏和内部服务器感染</li> <li>[<strong>2840</strong>星][8m] [C#] <a href="https://github.com/quasar/quasarrat">quasar/quasarrat</a> Remote Administration Tool for Windows</li> <li>[<strong>2421</strong>星][5d] [Py] <a href="https://github.com/infobyte/faraday">infobyte/faraday</a> 渗透测试和漏洞管理平台</li> <li>[<strong>1527</strong>星][19d] [Py] <a href="https://github.com/zerosum0x0/koadic">zerosum0x0/koadic</a> 类似于Meterpreter、Powershell Empire 的post-exploitation rootkit,区别在于其大多数操作都是由 Windows 脚本主机 JScript/VBScript 执行</li> <li>[<strong>1096</strong>星][11m] [Py] <a href="https://github.com/secforce/sparta">secforce/sparta</a> 网络基础架构渗透测试</li> <li>[<strong>961</strong>星][4m] [Py] <a href="https://github.com/0xInfection/TIDoS-Framework">0xinfection/tidos-framework</a> Web App渗透测试框架, 攻击性, 手动</li> <li>[<strong>928</strong>星][1y] [Py] <a href="https://github.com/m4n3dw0lf/pythem">m4n3dw0lf/pythem</a> 多功能渗透测试框架</li> <li>[<strong>521</strong>星][t] [Py] <a href="https://github.com/gyoisamurai/gyoithon">gyoisamurai/gyoithon</a> 使用机器学习的成长型渗透测试工具</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-fc8737aef0f59c3952d11749fe582dac"></a>自动化</h3><a id="user-content-自动化" class="anchor" aria-label="Permalink: 自动化" href="#自动化"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1881</strong>星][5m] [Shell] <a href="https://github.com/arismelachroinos/lscript">arismelachroinos/lscript</a> 自动化无线渗透和Hacking 任务的脚本 <ul dir="auto"> <li>重复区段: <a href="#d4efda1853b2cb0909727188116a2a8c">无线-&gt;未分类-WiFi</a> |</li> </ul> </li> <li>[<strong>1792</strong>星][t] [Shell] <a href="https://github.com/leebaird/discover">leebaird/discover</a> 自定义的bash脚本, 用于自动化多个渗透测试任务, 包括: 侦查、扫描、解析、在Metasploit中创建恶意Payload和Listener <ul dir="auto"> <li>重复区段: <a href="#01be61d5bb9f6f7199208ff0fba86b5d">渗透-&gt;工具-&gt;Metasploit-&gt;未分类-metasploit</a> |<a href="#05ab1b75266fddafc7195f5b395e4d99">侦察-&gt;工具-&gt;未分类-OSINT</a> |<a href="#ad92f6b801a18934f1971e2512f5ae4f">Payload-&gt;工具-&gt;Payload生成</a> |</li> </ul> </li> <li>[<strong>1688</strong>星][3m] [Py] <a href="https://github.com/rootm0s/winpwnage">rootm0s/winpwnage</a> UAC bypass, Elevate, Persistence and Execution methods</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-3ae4408f4ab03f99bab9ef9ee69642a8"></a>数据渗透&amp;&amp;DataExfiltration</h3><a id="user-content-数据渗透dataexfiltration" class="anchor" aria-label="Permalink: 数据渗透&amp;&amp;DataExfiltration" href="#数据渗透dataexfiltration"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1065</strong>星][1m] [C] <a href="https://github.com/quiet/quiet">quiet/quiet</a> Transmit data with sound. Includes binaries for soundcards and .wav files.</li> <li>[<strong>469</strong>星][4m] [Py] <a href="https://github.com/viralmaniar/powershell-rat">viralmaniar/powershell-rat</a> Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-adfa06d452147ebacd35981ce56f916b"></a>横向渗透</h3><a id="user-content-横向渗透" class="anchor" aria-label="Permalink: 横向渗透" href="#横向渗透"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-39e9a0fe929fffe5721f7d7bb2dae547"></a>Burp</h3><a id="user-content-burp" class="anchor" aria-label="Permalink: Burp" href="#burp"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h4 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-6366edc293f25b57bf688570b11d6584"></a>收集</h4><a id="user-content-收集-1" class="anchor" aria-label="Permalink: 收集" href="#收集-1"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1982</strong>星][1y] [BitBake] <a href="https://github.com/1n3/intruderpayloads">1n3/intruderpayloads</a> A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.</li> <li>[<strong>1108</strong>星][2m] <a href="https://github.com/snoopysecurity/awesome-burp-extensions">snoopysecurity/awesome-burp-extensions</a> Burp扩展收集</li> </ul> <div class="markdown-heading" dir="auto"><h4 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-5b761419863bc686be12c76451f49532"></a>未分类-Burp</h4><a id="user-content-未分类-burp" class="anchor" aria-label="Permalink: 未分类-Burp" href="#未分类-burp"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1112</strong>星][1y] [Py] <a href="https://github.com/bugcrowd/HUNT">bugcrowd/hunt</a> Burp和ZAP的扩展收集</li> <li>[<strong>917</strong>星][5d] [Batchfile] <a href="https://github.com/mr-xn/burpsuite-collections">mr-xn/burpsuite-collections</a> BurpSuite收集:包括不限于 Burp 文章、破解版、插件(非BApp Store)、汉化等相关教程,欢迎添砖加瓦---burpsuite-pro burpsuite-extender burpsuite cracked-version hackbar hacktools fuzzing fuzz-testing burp-plugin burp-extensions bapp-store brute-force-attacks brute-force-passwords waf sqlmap jar</li> <li>[<strong>715</strong>星][1y] [Java] <a href="https://github.com/d3vilbug/hackbar">d3vilbug/hackbar</a> HackBar plugin for Burpsuite</li> <li>[<strong>663</strong>星][9m] [Java] <a href="https://github.com/vulnerscom/burp-vulners-scanner">vulnerscom/burp-vulners-scanner</a> Vulnerability scanner based on vulners.com search API</li> <li>[<strong>605</strong>星][9m] [Java] <a href="https://github.com/c0ny1/chunked-coding-converter">c0ny1/chunked-coding-converter</a> Burp suite 分块传输辅助插件</li> <li>[<strong>584</strong>星][1y] [Java] <a href="https://github.com/federicodotta/brida">federicodotta/brida</a> The new bridge between Burp Suite and Frida!</li> <li>[<strong>510</strong>星][2m] [Java] <a href="https://github.com/wagiro/burpbounty">wagiro/burpbounty</a> Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the active and passive scanner by means of personalized rules through a very intuitive graphical interface.</li> <li>[<strong>496</strong>星][2m] [Py] <a href="https://github.com/romanzaikin/burpextension-whatsapp-decryption-checkpoint">romanzaikin/burpextension-whatsapp-decryption-checkpoint</a> This tool was created during our research at Checkpoint Software Technologies on Whatsapp Protocol (This repository will be updated after BlackHat 2019)</li> <li>[<strong>445</strong>星][6m] [Py] <a href="https://github.com/albinowax/activescanplusplus">albinowax/activescanplusplus</a> ActiveScan++ Burp Suite Plugin</li> <li>[<strong>423</strong>星][5m] [Java] <a href="https://github.com/bit4woo/recaptcha">bit4woo/recaptcha</a> reCAPTCHA = REcognize CAPTCHA: A Burp Suite Extender that recognize CAPTCHA and use for intruder payload 自动识别图形验证码并用于burp intruder爆破模块的插件</li> <li>[<strong>410</strong>星][8m] [Java] <a href="https://github.com/nccgroup/burpsuitehttpsmuggler">nccgroup/burpsuitehttpsmuggler</a> A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques</li> <li>[<strong>381</strong>星][1y] [Py] <a href="https://github.com/rhinosecuritylabs/sleuthql">rhinosecuritylabs/sleuthql</a> Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.</li> <li>[<strong>378</strong>星][3m] [Java] <a href="https://github.com/nccgroup/autorepeater">nccgroup/autorepeater</a> Automated HTTP Request Repeating With Burp Suite</li> <li>[<strong>366</strong>星][13d] [Java] <a href="https://github.com/PortSwigger/http-request-smuggler">portswigger/http-request-smuggler</a> an extension for Burp Suite designed to help you launch HTTP Request Smuggling attack</li> <li>[<strong>364</strong>星][4d] [Kotlin] <a href="https://github.com/portswigger/turbo-intruder">portswigger/turbo-intruder</a> Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.</li> <li>[<strong>359</strong>星][5m] [Java] <a href="https://github.com/bit4woo/domain_hunter">bit4woo/domain_hunter</a> A Burp Suite Extender that try to find sub-domain, similar-domain and related-domain of an organization, not only a domain! 利用burp收集整个企业、组织的域名(不仅仅是单个主域名)的插件</li> <li>[<strong>336</strong>星][13d] [Java] <a href="https://github.com/bit4woo/knife">bit4woo/knife</a> A burp extension that add some useful function to Context Menu 添加一些右键菜单让burp用起来更顺畅</li> <li>[<strong>310</strong>星][1y] [Java] <a href="https://github.com/ebryx/aes-killer">ebryx/aes-killer</a> Burp plugin to decrypt AES Encrypted traffic of mobile apps on the fly</li> <li>[<strong>303</strong>星][6d] [Java] <a href="https://github.com/ilmila/j2eescan">ilmila/j2eescan</a> J2EEScan is a plugin for Burp Suite Proxy. The goal of this plugin is to improve the test coverage during web application penetration tests on J2EE applications.</li> <li>[<strong>301</strong>星][1y] [Java] <a href="https://github.com/elkokc/reflector">elkokc/reflector</a> Burp 插件,浏览网页时实时查找反射 XSS</li> <li>[<strong>299</strong>星][1y] [Java] <a href="https://github.com/vmware/burp-rest-api">vmware/burp-rest-api</a> REST/JSON API to the Burp Suite security tool.</li> <li>[<strong>298</strong>星][12m] [Shell] <a href="https://github.com/yw9381/burp_suite_doc_zh_cn">yw9381/burp_suite_doc_zh_cn</a> 这是基于Burp Suite官方文档翻译而来的中文版文档</li> <li>[<strong>273</strong>星][2m] [Py] <a href="https://github.com/quitten/autorize">quitten/autorize</a> Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease application security people work and allow them perform an automatic authorization tests</li> <li>[<strong>257</strong>星][3m] [Py] <a href="https://github.com/rhinosecuritylabs/iprotate_burp_extension">rhinosecuritylabs/iprotate_burp_extension</a> Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.</li> <li>[<strong>250</strong>星][30d] [Java] <a href="https://github.com/c0ny1/jsencrypter">c0ny1/jsencrypter</a> 一个用于加密传输爆破的Burp Suite插件</li> <li>[<strong>246</strong>星][5m] [Py] <a href="https://github.com/initroot/burpjslinkfinder">initroot/burpjslinkfinder</a> Burp Extension for a passive scanning JS files for endpoint links.</li> <li>[<strong>244</strong>星][3m] [Java] <a href="https://github.com/c0ny1/passive-scan-client">c0ny1/passive-scan-client</a> Burp被动扫描流量转发插件</li> <li>[<strong>238</strong>星][2m] [Java] <a href="https://github.com/samlraider/samlraider">samlraider/samlraider</a> SAML2 Burp Extension</li> <li>[<strong>235</strong>星][1y] [Java] <a href="https://github.com/difcareer/sqlmap4burp">difcareer/sqlmap4burp</a> sqlmap embed in burpsuite</li> <li>[<strong>230</strong>星][1y] [Py] <a href="https://github.com/audibleblink/doxycannon">audibleblink/doxycannon</a> 为一堆OpenVPN文件分别创建Docker容器, 每个容器开启SOCKS5代理服务器并绑定至Docker主机端口, 再结合使用Burp或ProxyChains, 构建私有的Botnet</li> <li>[<strong>225</strong>星][6m] [Perl] <a href="https://github.com/modzero/mod0burpuploadscanner">modzero/mod0burpuploadscanner</a> HTTP file upload scanner for Burp Proxy</li> <li>[<strong>219</strong>星][9m] [Py] <a href="https://github.com/teag1e/burpcollector">teag1e/burpcollector</a> 通过BurpSuite来构建自己的爆破字典,可以通过字典爆破来发现隐藏资产。</li> <li>[<strong>209</strong>星][3m] [Java] <a href="https://github.com/h3xstream/http-script-generator">h3xstream/http-script-generator</a> ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-8e7a6a74ff322cbf2bad59092598de77"></a>Metasploit</h3><a id="user-content-metasploit" class="anchor" aria-label="Permalink: Metasploit" href="#metasploit"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h4 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-01be61d5bb9f6f7199208ff0fba86b5d"></a>未分类-metasploit</h4><a id="user-content-未分类-metasploit" class="anchor" aria-label="Permalink: 未分类-metasploit" href="#未分类-metasploit"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>19127</strong>星][4d] [Ruby] <a href="https://github.com/rapid7/metasploit-framework">rapid7/metasploit-framework</a> Metasploit Framework</li> <li>[<strong>1792</strong>星][t] [Shell] <a href="https://github.com/leebaird/discover">leebaird/discover</a> 自定义的bash脚本, 用于自动化多个渗透测试任务, 包括: 侦查、扫描、解析、在Metasploit中创建恶意Payload和Listener <ul dir="auto"> <li>重复区段: <a href="#fc8737aef0f59c3952d11749fe582dac">渗透-&gt;工具-&gt;自动化</a> |<a href="#05ab1b75266fddafc7195f5b395e4d99">侦察-&gt;工具-&gt;未分类-OSINT</a> |<a href="#ad92f6b801a18934f1971e2512f5ae4f">Payload-&gt;工具-&gt;Payload生成</a> |</li> </ul> </li> <li>[<strong>1302</strong>星][1y] [Shell] <a href="https://github.com/dana-at-cp/backdoor-apk">dana-at-cp/backdoor-apk</a> backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool, the Android SDK, smali, etc. This shell script is provided as-is without warranty of any kind and is intended for educational purposes only.</li> <li>[<strong>742</strong>星][16d] [C] <a href="https://github.com/rapid7/metasploit-payloads">rapid7/metasploit-payloads</a> Unified repository for different Metasploit Framework payloads</li> <li>[<strong>732</strong>星][3m] [Java] <a href="https://github.com/isafeblue/trackray">isafeblue/trackray</a> 溯光 (TrackRay) 3 beta⚡渗透测试框架(资产扫描|指纹识别|暴力破解|网页爬虫|端口扫描|漏洞扫描|代码审计|AWVS|NMAP|Metasploit|SQLMap)</li> <li>[<strong>534</strong>星][4d] [Shell] <a href="https://github.com/r00t-3xp10it/venom">r00t-3xp10it/venom</a> venom - shellcode generator/compiler/handler (metasploit)</li> <li>[<strong>456</strong>星][5m] [Py] <a href="https://github.com/cchio/deep-pwning">cchio/deep-pwning</a> 一个轻量级的框架,用于试验机器学习模型,目的是评估其对主动攻击者的鲁棒性</li> <li>[<strong>413</strong>星][6m] [Ruby] <a href="https://github.com/praetorian-code/purple-team-attack-automation">praetorian-code/purple-team-attack-automation</a> Praetorian's public release of our Metasploit automation of MITRE ATT&amp;CK™ TTPs</li> <li>[<strong>310</strong>星][2m] [Py] <a href="https://github.com/3ndg4me/autoblue-ms17-010">3ndg4me/autoblue-ms17-010</a> This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010</li> <li>[<strong>310</strong>星][11m] [Ruby] <a href="https://github.com/darkoperator/metasploit-plugins">darkoperator/metasploit-plugins</a> Plugins for Metasploit Framework</li> <li>[<strong>305</strong>星][3m] [Ruby] <a href="https://github.com/fozavci/viproy-voipkit">fozavci/viproy-voipkit</a> VoIP渗透测试工具和 Metasploit 框架 <ul dir="auto"> <li>重复区段: <a href="#2e40f2f1df5d7f93a7de47bf49c24a0e">渗透-&gt;工具-&gt;未分类-Pentest</a> |</li> </ul> </li> <li>[<strong>279</strong>星][3m] [Vue] <a href="https://github.com/Zerx0r/Kage">zerx0r/kage</a> Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-b1161d6c4cb520d0cd574347cd18342e"></a>免杀&amp;&amp;躲避AV检测</h3><a id="user-content-免杀躲避av检测" class="anchor" aria-label="Permalink: 免杀&amp;&amp;躲避AV检测" href="#免杀躲避av检测"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1032</strong>星][5m] [C] <a href="https://github.com/govolution/avet">govolution/avet</a> 免杀工具</li> <li>[<strong>733</strong>星][10m] [Py] <a href="https://github.com/mr-un1k0d3r/dkmc">mr-un1k0d3r/dkmc</a> DKMC - Dont kill my cat - Malicious payload evasion tool</li> <li>[<strong>686</strong>星][7m] [Py] <a href="https://github.com/paranoidninja/carboncopy">paranoidninja/carboncopy</a> A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux</li> <li>[<strong>472</strong>星][18d] [Go] <a href="https://github.com/arvanaghi/checkplease">arvanaghi/checkplease</a> Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.</li> <li>[<strong>316</strong>星][1m] [C#] <a href="https://github.com/ch0pin/aviator">ch0pin/aviator</a> Antivirus evasion project</li> <li>[<strong>302</strong>星][1y] [Py] <a href="https://github.com/two06/inception">two06/inception</a> Provides In-memory compilation and reflective loading of C# apps for AV evasion.</li> <li>[<strong>276</strong>星][2m] [C#] <a href="https://github.com/hackplayers/salsa-tools">hackplayers/salsa-tools</a> Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-98a851c8e6744850efcb27b8e93dff73"></a>C&amp;C</h3><a id="user-content-cc" class="anchor" aria-label="Permalink: C&amp;C" href="#cc"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>2490</strong>星][4m] [Go] <a href="https://github.com/ne0nd0g/merlin">ne0nd0g/merlin</a> Merlin is a cross-platform post-exploitation HTTP/2 Command &amp; Control server and agent written in golang.</li> <li>[<strong>1826</strong>星][6m] [C++] <a href="https://github.com/iagox86/dnscat2">iagox86/dnscat2</a> 在 DNS 协议上创建加密的 C&amp;C channel</li> <li>[<strong>1110</strong>星][1y] [Py] <a href="https://github.com/byt3bl33d3r/gcat">byt3bl33d3r/gcat</a> A PoC backdoor that uses Gmail as a C&amp;C server</li> <li>[<strong>994</strong>星][2m] [C#] <a href="https://github.com/cobbr/covenant">cobbr/covenant</a> Covenant is a collaborative .NET C2 framework for red teamers.</li> <li>[<strong>633</strong>星][11m] [Py] <a href="https://github.com/mehulj94/braindamage">mehulj94/braindamage</a> Remote administration tool which uses Telegram as a C&amp;C server</li> <li>[<strong>596</strong>星][19d] [Py] <a href="https://github.com/trustedsec/trevorc2">trustedsec/trevorc2</a> 通过正常的可浏览的网站隐藏 C&amp;C 指令的客户端/服务器模型,因为时间间隔不同,检测变得更加困难,并且获取主机数据时不会使用 POST 请求</li> <li>[<strong>320</strong>星][1y] [C#] <a href="https://github.com/spiderlabs/dohc2">spiderlabs/dohc2</a> DoHC2 allows the ExternalC2 library from Ryan Hanson (</li> <li>[<strong>283</strong>星][t] [PS] <a href="https://github.com/nettitude/poshc2">nettitude/poshc2</a> Python Server for PoshC2</li> <li>[<strong>280</strong>星][4d] [PS] <a href="https://github.com/nettitude/PoshC2">nettitude/poshc2</a> Python Server for PoshC2</li> <li>[<strong>207</strong>星][1y] [C#] <a href="https://github.com/damonmohammadbagher/nativepayload_dns">damonmohammadbagher/nativepayload_dns</a> 使用DNS流量传输Payload,绕过杀软。C#编写</li> <li>[<strong>201</strong>星][1y] [Py] <a href="https://github.com/sec-bit/awesome-buggy-erc20-tokens">sec-bit/awesome-buggy-erc20-tokens</a> A Collection of Vulnerabilities in ERC20 Smart Contracts With Tokens Affected</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-a0897294e74a0863ea8b83d11994fad6"></a>DDOS</h3><a id="user-content-ddos" class="anchor" aria-label="Permalink: DDOS" href="#ddos"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>2466</strong>星][1m] [C++] <a href="https://github.com/pavel-odintsov/fastnetmon">pavel-odintsov/fastnetmon</a> 快速 DDoS 检测/分析工具,支持 sflow/netflow/mirror</li> <li>[<strong>1268</strong>星][4d] [Shell] <a href="https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker">mitchellkrogza/nginx-ultimate-bad-bot-blocker</a> Nginx Block Bad Bots, Spam Referrer Blocker, Vulnerability Scanners, User-Agents, Malware, Adware, Ransomware, Malicious Sites, with anti-DDOS, Wordpress Theme Detector Blocking and Fail2Ban Jail for Repeat Offenders</li> <li>[<strong>858</strong>星][3m] [Py] <a href="https://github.com/649/memcrashed-ddos-exploit">649/memcrashed-ddos-exploit</a> DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API <ul dir="auto"> <li>重复区段: <a href="#18c7c1df2e6ae5e9135dfa2e4eb1d4db">侦察-&gt;工具-&gt;Shodan</a> |</li> </ul> </li> <li>[<strong>510</strong>星][3m] [JS] <a href="https://github.com/Acmesec/PoCBox">acmesec/pocbox</a> 赏金猎人的脆弱性测试辅助平台</li> <li>[<strong>476</strong>星][16d] [JS] <a href="https://github.com/codemanki/cloudscraper">codemanki/cloudscraper</a> Node.js library to bypass cloudflare's anti-ddos page</li> <li>[<strong>468</strong>星][7m] [Shell] <a href="https://github.com/jgmdev/ddos-deflate">jgmdev/ddos-deflate</a> Fork of DDoS Deflate with fixes, improvements and new features.</li> <li>[<strong>385</strong>星][1y] [C] <a href="https://github.com/markus-go/bonesi">markus-go/bonesi</a> BoNeSi - the DDoS Botnet Simulator</li> <li>[<strong>301</strong>星][4m] [Shell] <a href="https://github.com/anti-ddos/Anti-DDOS">anti-ddos/anti-ddos</a></li> <li>[<strong>265</strong>星][1y] [Py] <a href="https://github.com/wenfengshi/ddos-dos-tools">wenfengshi/ddos-dos-tools</a> some sort of ddos-tools</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-8e1069b2bce90b87eea762ee3d0935d8"></a>OWASP</h3><a id="user-content-owasp" class="anchor" aria-label="Permalink: OWASP" href="#owasp"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>11306</strong>星][2d] [Py] <a href="https://github.com/owasp/cheatsheetseries">owasp/cheatsheetseries</a> The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.</li> <li>[<strong>5084</strong>星][7d] [HTML] <a href="https://github.com/owasp/owasp-mstg">owasp/owasp-mstg</a> 关于移动App安全开发、测试和逆向的相近手册</li> <li>[<strong>2434</strong>星][13d] [Go] <a href="https://github.com/owasp/amass">owasp/amass</a> In-depth Attack Surface Mapping and Asset Discovery</li> <li>[<strong>1964</strong>星][10d] [Perl] <a href="https://github.com/spiderlabs/owasp-modsecurity-crs">spiderlabs/owasp-modsecurity-crs</a> OWASP ModSecurity Core Rule Set (CRS) Project (Official Repository)</li> <li>[<strong>1417</strong>星][3m] [HTML] <a href="https://github.com/owasp/top10">owasp/top10</a> Official OWASP Top 10 Document Repository</li> <li>[<strong>1056</strong>星][3m] [HTML] <a href="https://github.com/owasp/nodegoat">owasp/nodegoat</a> 学习OWASP安全威胁Top10如何应用到Web App的,以及如何处理</li> <li>[<strong>752</strong>星][2d] [Java] <a href="https://github.com/owasp/securityshepherd">owasp/securityshepherd</a> Web and mobile application security training platform</li> <li>[<strong>698</strong>星][7d] [HTML] <a href="https://github.com/owasp/asvs">owasp/asvs</a> Application Security Verification Standard</li> <li>[<strong>625</strong>星][9d] [Py] <a href="https://github.com/zdresearch/OWASP-Nettacker">zdresearch/owasp-nettacker</a> Automated Penetration Testing Framework</li> <li>[<strong>559</strong>星][6d] [Shell] <a href="https://github.com/owasp/owasp-masvs">owasp/owasp-masvs</a> OWASP 移动App安全标准</li> <li>[<strong>503</strong>星][10d] <a href="https://github.com/OWASP/wstg">owasp/wstg</a> The OWASP Web Security Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and a "low level" penetration testing guide that describes techniques for testing most common web application and web service security issues.</li> <li>[<strong>503</strong>星][10d] <a href="https://github.com/owasp/wstg">owasp/wstg</a> The OWASP Web Security Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and a "low level" penetration testing guide that describes techniques for testing most common web application and web service security issues.</li> <li>[<strong>466</strong>星][8m] [Java] <a href="https://github.com/owasp/owasp-webscarab">owasp/owasp-webscarab</a> OWASP WebScarab</li> <li>[<strong>422</strong>星][5m] [Py] <a href="https://github.com/stanislav-web/opendoor">stanislav-web/opendoor</a> OWASP WEB Directory Scanner</li> <li>[<strong>370</strong>星][4d] [Java] <a href="https://github.com/zaproxy/zap-extensions">zaproxy/zap-extensions</a> OWASP ZAP Add-ons</li> <li>[<strong>348</strong>星][2m] [Java] <a href="https://github.com/esapi/esapi-java-legacy">esapi/esapi-java-legacy</a> ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library that makes it easier for programmers to write lower-risk applications.</li> <li>[<strong>305</strong>星][5m] <a href="https://github.com/0xradi/owasp-web-checklist">0xradi/owasp-web-checklist</a> OWASP Web Application Security Testing Checklist</li> <li>[<strong>297</strong>星][5m] <a href="https://github.com/tanprathan/owasp-testing-checklist">tanprathan/owasp-testing-checklist</a> OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and pending test cases.</li> <li>[<strong>286</strong>星][5m] [JS] <a href="https://github.com/mike-goodwin/owasp-threat-dragon">mike-goodwin/owasp-threat-dragon</a> An open source, online threat modelling tool from OWASP</li> <li>[<strong>258</strong>星][2m] <a href="https://github.com/owasp/api-security">owasp/api-security</a> OWASP API Security Project</li> <li>[<strong>255</strong>星][12m] [Java] <a href="https://github.com/owasp/owasp-java-encoder">owasp/owasp-java-encoder</a> The OWASP Java Encoder is a Java 1.5+ simple-to-use drop-in high-performance encoder class with no dependencies and little baggage. This project will help Java web developers defend against Cross Site Scripting!</li> <li>[<strong>208</strong>星][17d] [Java] <a href="https://github.com/owasp/benchmark">owasp/benchmark</a> OWASP Benchmark is a test suite designed to verify the speed and accuracy of software vulnerability detection tools. A fully runnable web app written in Java, it supports analysis by Static (SAST), Dynamic (DAST), and Runtime (IAST) tools that support Java. The idea is that since it is fully runnable and all the vulnerabilities are actually expl…</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-7667f6a0381b6cded2014a0d279b5722"></a>Kali</h3><a id="user-content-kali" class="anchor" aria-label="Permalink: Kali" href="#kali"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>2538</strong>星][8m] <a href="https://github.com/offensive-security/kali-nethunter">offensive-security/kali-nethunter</a> The Kali NetHunter Project</li> <li>[<strong>2436</strong>星][8m] [Py] <a href="https://github.com/lionsec/katoolin">lionsec/katoolin</a> Automatically install all Kali linux tools</li> <li>[<strong>1699</strong>星][3m] [PHP] <a href="https://github.com/xtr4nge/fruitywifi">xtr4nge/fruitywifi</a> FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra packages. Tested in Debian, Kali Linux, Kali Linux ARM (Raspberry Pi), Raspbian (Raspberry Pi), Pwnpi (Raspberry Pi), Bugtraq, NetHunter.</li> <li>[<strong>879</strong>星][11m] [Shell] <a href="https://github.com/esc0rtd3w/wifi-hacker">esc0rtd3w/wifi-hacker</a> Shell Script For Attacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2)</li> <li>[<strong>769</strong>星][13d] [Py] <a href="https://github.com/rajkumrdusad/tool-x">rajkumrdusad/tool-x</a> Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other android terminals. using Tool-X you can install almost 370+ hacking tools in termux app and other linux based distributions.</li> <li>[<strong>675</strong>星][8m] <a href="https://github.com/offensive-security/kali-arm-build-scripts">offensive-security/kali-arm-build-scripts</a> Kali Linux ARM build scripts</li> <li>[<strong>556</strong>星][2m] [Shell] <a href="https://github.com/offensive-security/kali-linux-docker">offensive-security/kali-linux-docker</a> PLEASE USE GITLAB</li> <li>[<strong>425</strong>星][4m] <a href="https://github.com/jack-liang/kalitools">jack-liang/kalitools</a> Kali Linux工具清单</li> <li>[<strong>336</strong>星][8m] <a href="https://github.com/offensive-security/kali-linux-recipes">offensive-security/kali-linux-recipes</a> Kali Linux Recipes</li> <li>[<strong>316</strong>星][2m] [Shell] <a href="https://github.com/brainfucksec/kalitorify">brainfucksec/kalitorify</a> 用于Kali的shell脚本,使用iptables创建通过Tor网络的透明代理。可以执行各种检查:检查Tor出口节点(即在Tor代理下时的公共IP),或者Tor已正确配置,可以检查服务和网络设置。</li> <li>[<strong>273</strong>星][27d] [C++] <a href="https://github.com/steve-m/kalibrate-rtl">steve-m/kalibrate-rtl</a> fork of</li> <li>[<strong>203</strong>星][5m] <a href="https://github.com/jiansiting/kali-windows">jiansiting/kali-windows</a> Kali Windows</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-0b8e79b79094082d0906153445d6ef9a"></a>CobaltStrike</h3><a id="user-content-cobaltstrike" class="anchor" aria-label="Permalink: CobaltStrike" href="#cobaltstrike"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1072</strong>星][9d] [C#] <a href="https://github.com/k8gege/ladon">k8gege/ladon</a> 大型内网渗透扫描器&amp;Cobalt Strike,包含信息收集/端口扫描/服务识别/网络资产/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010、Weblogic、ActiveMQ、Tomcat等,密码口令爆破含(Mysql、Oracle、MSSQL)、FTP、SSH(Linux)、VNC、Windows(IPC、WMI、SMB)等,可高度自定义插件支持.NET程序集、DLL(C#/Delphi/VC)、PowerShell等语言编写的插件,支持通过配置INI批量调用任意外部程序或命令,EXP生成器一键生成Web漏洞POC,可快速扩展扫描或利用能力。支持Cobalt Strike插件化直接内存加载Ladon扫描快速拓展内网横向移动</li> <li>[<strong>770</strong>星][5m] <a href="https://github.com/aleenzz/cobalt_strike_wiki">aleenzz/cobalt_strike_wiki</a> Cobalt Strike系列</li> <li>[<strong>474</strong>星][1m] [Py] <a href="https://github.com/k8gege/k8cscan">k8gege/k8cscan</a> 大型内网渗透自定义插件化扫描神器,包含信息收集、网络资产、漏洞扫描、密码爆破、漏洞利用,程序采用多线程批量扫描大型内网多个IP段C段主机,目前插件包含: C段旁注扫描、子域名扫描、Ftp密码爆破、Mysql密码爆破、Oracle密码爆破、MSSQL密码爆破、Windows/Linux系统密码爆破、存活主机扫描、端口扫描、Web信息探测、操作系统版本探测、Cisco思科设备扫描等,支持调用任意外部程序或脚本,支持Cobalt Strike联动</li> <li>[<strong>397</strong>星][1y] [Shell] <a href="https://github.com/killswitch-gui/cobaltstrike-toolkit">killswitch-gui/cobaltstrike-toolkit</a> Some useful scripts for CobaltStrike</li> <li>[<strong>287</strong>星][7m] [JS] <a href="https://github.com/joshuaferrara/node-csgo">joshuaferrara/node-csgo</a> A node-steam plugin for Counter-Strike: Global Offensive.</li> <li>[<strong>217</strong>星][12d] [JS] <a href="https://github.com/saul/demofile">saul/demofile</a> Node.js library for parsing Counter-Strike: Global Offensive demo files</li> <li>[<strong>215</strong>星][9m] [PS] <a href="https://github.com/outflanknl/excel4-dcom">outflanknl/excel4-dcom</a> PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)</li> <li>[<strong>207</strong>星][1y] [C#] <a href="https://github.com/spiderlabs/sharpcompile">spiderlabs/sharpcompile</a> SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approach than manually compiling an .NET assembly and loading it into Cobalt Strike. The project aims to make it easier to move away from adhoc PowerShell execution instead creating a temporary assembly and executing…</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-fb821e664950df22549557cb8cc54afe"></a>CMS</h3><a id="user-content-cms" class="anchor" aria-label="Permalink: CMS" href="#cms"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-53f3011d262d2554156afe18d7ad6a43"></a>日志</h3><a id="user-content-日志" class="anchor" aria-label="Permalink: 日志" href="#日志"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-b0233cd346f5ee456ee04bf653b12ae2"></a>劫持&amp;&amp;各种劫持</h3><a id="user-content-劫持各种劫持" class="anchor" aria-label="Permalink: 劫持&amp;&amp;各种劫持" href="#劫持各种劫持"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h4 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-b087f1741bcf7c449d2910d052a7f312"></a>未分类-Hijack</h4><a id="user-content-未分类-hijack" class="anchor" aria-label="Permalink: 未分类-Hijack" href="#未分类-hijack"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1417</strong>星][1m] [Java] <a href="https://github.com/chrisk44/hijacker">chrisk44/hijacker</a> Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android</li> <li>[<strong>554</strong>星][6m] [Py] <a href="https://github.com/owasp/qrljacking">owasp/qrljacking</a> 一个简单的能够进行会话劫持的社会工程攻击向量,影响所有使用“使用 QR 码登录”作为安全登录方式的应用程序。( Quick Response CodeLogin Jacking)</li> </ul> <div class="markdown-heading" dir="auto"><h4 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-ecdeb90ce9bd347ca7f9d366d157689d"></a>点击劫持</h4><a id="user-content-点击劫持" class="anchor" aria-label="Permalink: 点击劫持" href="#点击劫持"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-8afafc25f4fb0805556003864cce90e2"></a>RedTeam</h3><a id="user-content-redteam" class="anchor" aria-label="Permalink: RedTeam" href="#redteam"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>617</strong>星][19d] [Py] <a href="https://github.com/facebookincubator/weasel">facebookincubator/weasel</a> DNS covert channel implant for Red Teams.</li> <li>[<strong>542</strong>星][8m] [Py] <a href="https://github.com/wyatu/perun">wyatu/perun</a> 主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架</li> <li>[<strong>476</strong>星][13d] [PS] <a href="https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques">mantvydasb/redteam-tactics-and-techniques</a> Red Teaming Tactics and Techniques</li> <li>[<strong>357</strong>星][2m] [C] <a href="https://github.com/nccgroup/phantap">nccgroup/phantap</a> Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams</li> <li>[<strong>221</strong>星][2m] [Py] <a href="https://github.com/khast3x/redcloud">khast3x/redcloud</a> Comfy &amp; powerful Red Team Infrastructure deployement using Docker</li> <li>[<strong>220</strong>星][9m] [Py] <a href="https://github.com/coalfire-research/deathmetal">coalfire-research/deathmetal</a> Red team &amp; penetration testing tools to exploit the capabilities of Intel AMT</li> <li>[<strong>217</strong>星][1y] <a href="https://github.com/foobarto/redteam-notebook">foobarto/redteam-notebook</a> Collection of commands, tips and tricks and references I found useful during preparation for OSCP exam.</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-4c42a9cc007de389f975cb0ce146c0ed"></a>BlueTeam</h3><a id="user-content-blueteam" class="anchor" aria-label="Permalink: BlueTeam" href="#blueteam"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>883</strong>星][4m] [CSS] <a href="https://github.com/outflanknl/redelk">outflanknl/redelk</a> 跟踪和警告Blue Team活动以及长期运营中的更高可用性</li> <li>[<strong>639</strong>星][5m] <a href="https://github.com/smgorelik/windows-rce-exploits">smgorelik/windows-rce-exploits</a> The exploit samples database is a repository for <strong>RCE</strong> (remote code execution) exploits and Proof-of-Concepts for <strong>WINDOWS</strong>, the samples are uploaded for education purposes for red and blue teams.</li> <li>[<strong>409</strong>星][1y] [C] <a href="https://github.com/ww9210/linux_kernel_exploits">ww9210/linux_kernel_exploits</a> Repo for FUZE project. I will also publish some Linux kernel LPE exploits for various real world kernel vulnerabilities here. the samples are uploaded for education purposes for red and blue teams.</li> <li>[<strong>261</strong>星][11d] [Ruby] <a href="https://github.com/evait-security/envizon">evait-security/envizon</a> 网络可视化工具, 在渗透测试中快速识别最可能的目标</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-f21aa1088a437dbb001a137f6f885530"></a>文章</h2><a id="user-content-文章-2" class="anchor" aria-label="Permalink: 文章" href="#文章-2"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-7229723a22769af40b96ab31fb09dcc7"></a>新添加的</h3><a id="user-content-新添加的-3" class="anchor" aria-label="Permalink: 新添加的" href="#新添加的-3"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-6280e13d236b0f18c75894d304309416"></a>Metasploit</h3><a id="user-content-metasploit-1" class="anchor" aria-label="Permalink: Metasploit" href="#metasploit-1"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-082a9e72817adcf2f824767e3e2ce597"></a>BurpSuite</h3><a id="user-content-burpsuite" class="anchor" aria-label="Permalink: BurpSuite" href="#burpsuite"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-6710d6fe61cbbc36b2ba75de156eda8a"></a>CobaltStrike</h3><a id="user-content-cobaltstrike-1" class="anchor" aria-label="Permalink: CobaltStrike" href="#cobaltstrike-1"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-8f92ead9997a4b68d06a9acf9b01ef63"></a>扫描器&amp;&amp;安全扫描&amp;&amp;App扫描&amp;&amp;漏洞扫描</h1><a id="user-content-扫描器安全扫描app扫描漏洞扫描" class="anchor" aria-label="Permalink: 扫描器&amp;&amp;安全扫描&amp;&amp;App扫描&amp;&amp;漏洞扫描" href="#扫描器安全扫描app扫描漏洞扫描"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-132036452bfacf61471e3ea0b7bf7a55"></a>工具</h2><a id="user-content-工具-3" class="anchor" aria-label="Permalink: 工具" href="#工具-3"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-de63a029bda6a7e429af272f291bb769"></a>未分类-Scanner</h3><a id="user-content-未分类-scanner" class="anchor" aria-label="Permalink: 未分类-Scanner" href="#未分类-scanner"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>11486</strong>星][3m] [C] <a href="https://github.com/robertdavidgraham/masscan">robertdavidgraham/masscan</a> masscan:世界上最快的互联网端口扫描器,号称可6分钟内扫描整个互联网</li> <li>[<strong>7449</strong>星][3d] [Py] <a href="https://github.com/s0md3v/XSStrike">s0md3v/xsstrike</a> Most advanced XSS scanner.</li> <li>[<strong>5351</strong>星][15d] [Go] <a href="https://github.com/zricethezav/gitleaks">zricethezav/gitleaks</a> Audit git repos for secrets</li> <li>[<strong>4563</strong>星][8d] [Ruby] <a href="https://github.com/wpscanteam/wpscan">wpscanteam/wpscan</a> WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites.</li> <li>[<strong>4215</strong>星][24d] <a href="https://github.com/we5ter/scanners-box">we5ter/scanners-box</a> 安全行业从业者自研开源扫描器合辑</li> <li>[<strong>3455</strong>星][26d] [Perl] <a href="https://github.com/sullo/nikto">sullo/nikto</a> Nikto web server scanner</li> <li>[<strong>3279</strong>星][20d] [Go] <a href="https://github.com/mozilla/sops">mozilla/sops</a> Simple and flexible tool for managing secrets</li> <li>[<strong>3252</strong>星][26d] [Py] <a href="https://github.com/maurosoria/dirsearch">maurosoria/dirsearch</a> Web path scanner</li> <li>[<strong>3092</strong>星][3m] [C] <a href="https://github.com/zmap/zmap">zmap/zmap</a> ZMap is a fast single packet network scanner designed for Internet-wide network surveys.</li> <li>[<strong>2960</strong>星][2m] [Py] <a href="https://github.com/andresriancho/w3af">andresriancho/w3af</a> Web App安全扫描器, 辅助开发者和渗透测试人员识别和利用Web App中的漏洞</li> <li>[<strong>2669</strong>星][20d] [Py] <a href="https://github.com/cloudflare/flan">cloudflare/flan</a> A pretty sweet vulnerability scanner</li> <li>[<strong>2287</strong>星][4m] [JS] <a href="https://github.com/retirejs/retire.js">retirejs/retire.js</a> scanner detecting the use of JavaScript libraries with known vulnerabilities</li> <li>[<strong>2113</strong>星][12d] [Ruby] <a href="https://github.com/urbanadventurer/whatweb">urbanadventurer/whatweb</a> Next generation web scanner</li> <li>[<strong>2050</strong>星][23d] [Py] <a href="https://github.com/nabla-c0d3/sslyze">nabla-c0d3/sslyze</a> SSL/TLS服务器扫描</li> <li>[<strong>1682</strong>星][2m] [NSIS] <a href="https://github.com/angryip/ipscan">angryip/ipscan</a> Angry IP Scanner - fast and friendly network scanner</li> <li>[<strong>1560</strong>星][8m] [Py] <a href="https://github.com/m4ll0k/WAScan">m4ll0k/wascan</a> WAScan - Web Application Scanner</li> <li>[<strong>1511</strong>星][9d] [Py] <a href="https://github.com/hannob/snallygaster">hannob/snallygaster</a> Python脚本, 扫描HTTP服务器"秘密文件"</li> <li>[<strong>1139</strong>星][24d] [Py] <a href="https://github.com/gerbenjavado/linkfinder">gerbenjavado/linkfinder</a> A python script that finds endpoints in JavaScript files</li> <li>[<strong>1102</strong>星][3m] [PHP] <a href="https://github.com/tuhinshubhra/red_hawk">tuhinshubhra/red_hawk</a> 信息收集、漏洞扫描、爬虫多合一 <ul dir="auto"> <li>重复区段: <a href="#05ab1b75266fddafc7195f5b395e4d99">侦察-&gt;工具-&gt;未分类-OSINT</a> |</li> </ul> </li> <li>[<strong>1076</strong>星][8m] [Py] <a href="https://github.com/lucifer1993/struts-scan">lucifer1993/struts-scan</a> struts2漏洞全版本检测和利用工具</li> <li>[<strong>1062</strong>星][4m] [Py] <a href="https://github.com/h4ckforjob/dirmap">h4ckforjob/dirmap</a> 一个高级web目录、文件扫描工具,功能将会强于DirBuster、Dirsearch、cansina、御剑。</li> <li>[<strong>935</strong>星][6m] [PHP] <a href="https://github.com/tidesec/wdscanner">tidesec/wdscanner</a> 分布式web漏洞扫描、客户管理、漏洞定期扫描、子域名枚举、端口扫描、网站爬虫、暗链检测、坏链检测、网站指纹搜集、专项漏洞检测、代理搜集及部署等功能。</li> <li>[<strong>933</strong>星][3m] [Py] <a href="https://github.com/tuhinshubhra/cmseek">tuhinshubhra/cmseek</a> CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs</li> <li>[<strong>896</strong>星][20d] [Py] <a href="https://github.com/ajinabraham/nodejsscan">ajinabraham/nodejsscan</a> NodeJsScan is a static security code scanner for Node.js applications.</li> <li>[<strong>855</strong>星][12d] [JS] <a href="https://github.com/cloudsploit/scans">cloudsploit/scans</a> Cloud security configuration checks</li> <li>[<strong>767</strong>星][2m] [Py] <a href="https://github.com/vesche/scanless">vesche/scanless</a> 端口扫描器</li> <li>[<strong>758</strong>星][2m] [Py] <a href="https://github.com/nekmo/dirhunt">nekmo/dirhunt</a> Web爬虫, 针对搜索和分析路径做了优化 <ul dir="auto"> <li>重复区段: <a href="#442f9390fd56008def077a21ab65d4aa">爬虫-&gt;工具-&gt;未分类</a> |</li> </ul> </li> <li>[<strong>734</strong>星][7m] [Py] <a href="https://github.com/ztgrace/changeme">ztgrace/changeme</a> 默认证书扫描器</li> <li>[<strong>725</strong>星][14d] [CSS] <a href="https://github.com/w-digital-scanner/w12scan">w-digital-scanner/w12scan</a> a network asset discovery engine that can automatically aggregate related assets for analysis and use</li> <li>[<strong>704</strong>星][23d] [Py] <a href="https://github.com/grayddq/gscan">grayddq/gscan</a> 本程序旨在为安全应急响应人员对Linux主机排查时提供便利,实现主机侧Checklist的自动全面化检测,根据检测结果自动数据聚合,进行黑客攻击路径溯源。</li> <li>[<strong>703</strong>星][5m] [CSS] <a href="https://github.com/ajinabraham/cmsscan">ajinabraham/cmsscan</a> Scan Wordpress, Drupal, Joomla, vBulletin websites for Security issues</li> <li>[<strong>702</strong>星][1m] [C] <a href="https://github.com/scanmem/scanmem">scanmem/scanmem</a> memory scanner for Linux</li> <li>[<strong>686</strong>星][14d] [Py] <a href="https://github.com/kevthehermit/pastehunter">kevthehermit/pastehunter</a> Scanning pastebin with yara rules</li> <li>[<strong>671</strong>星][8m] [Py] <a href="https://github.com/m4ll0k/wpseku">m4ll0k/wpseku</a> WPSeku - Wordpress Security Scanner</li> <li>[<strong>671</strong>星][2m] [Ruby] <a href="https://github.com/mozilla/ssh_scan">mozilla/ssh_scan</a> A prototype SSH configuration and policy scanner (Blog:</li> <li>[<strong>669</strong>星][6m] [Py] <a href="https://github.com/droope/droopescan">droope/droopescan</a> A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal &amp; Silverstripe.</li> <li>[<strong>665</strong>星][6m] [Py] <a href="https://github.com/rabbitmask/weblogicscan">rabbitmask/weblogicscan</a> Weblogic一键漏洞检测工具,V1.3</li> <li>[<strong>641</strong>星][1y] [Py] <a href="https://github.com/lmco/laikaboss">lmco/laikaboss</a> Laika BOSS: Object Scanning System</li> <li>[<strong>618</strong>星][5m] [Py] <a href="https://github.com/faizann24/xsspy">faizann24/xsspy</a> Web Application XSS Scanner</li> <li>[<strong>610</strong>星][1y] [Ruby] <a href="https://github.com/thesp0nge/dawnscanner">thesp0nge/dawnscanner</a> Dawn is a static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails frameworks.</li> <li>[<strong>578</strong>星][8d] [Py] <a href="https://github.com/codingo/vhostscan">codingo/vhostscan</a> A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.</li> <li>[<strong>576</strong>星][3m] [Perl] <a href="https://github.com/alisamtechnology/atscan">alisamtechnology/atscan</a> Advanced dork Search &amp; Mass Exploit Scanner</li> <li>[<strong>574</strong>星][2m] [HTML] <a href="https://github.com/gwillem/magento-malware-scanner">gwillem/magento-malware-scanner</a> 用于检测 Magento 恶意软件的规则/样本集合</li> <li>[<strong>563</strong>星][8m] [Go] <a href="https://github.com/marco-lancini/goscan">marco-lancini/goscan</a> Interactive Network Scanner</li> <li>[<strong>539</strong>星][5m] [Py] <a href="https://github.com/cisagov/pshtt">cisagov/pshtt</a> Scan domains and return data based on HTTPS best practices</li> <li>[<strong>485</strong>星][2m] [Py] <a href="https://github.com/fcavallarin/htcap">fcavallarin/htcap</a> htcap is a web application scanner able to crawl single page application (SPA) recursively by intercepting ajax calls and DOM changes.</li> <li>[<strong>476</strong>星][1y] [C] <a href="https://github.com/nanshihui/scan-t">nanshihui/scan-t</a> a new crawler based on python with more function including Network fingerprint search</li> <li>[<strong>442</strong>星][11d] [Py] <a href="https://github.com/w-digital-scanner/w13scan">w-digital-scanner/w13scan</a> Passive Security Scanner (被动式安全扫描器)</li> <li>[<strong>401</strong>星][11m] [JS] <a href="https://github.com/eviltik/evilscan">eviltik/evilscan</a> 大规模 IP/端口扫描器,Node.js 编写</li> <li>[<strong>400</strong>星][1y] [Py] <a href="https://github.com/grayddq/publicmonitors">grayddq/publicmonitors</a> 对公网IP列表进行端口服务扫描,发现周期内的端口服务变化情况和弱口令安全风险</li> <li>[<strong>398</strong>星][t] [C] <a href="https://github.com/hasherezade/hollows_hunter">hasherezade/hollows_hunter</a> Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).</li> <li>[<strong>393</strong>星][11m] [Py] <a href="https://github.com/mitre/multiscanner">mitre/multiscanner</a> Modular file scanning/analysis framework</li> <li>[<strong>384</strong>星][1m] [Py] <a href="https://github.com/stamparm/dsss">stamparm/dsss</a> Damn Small SQLi Scanner</li> <li>[<strong>376</strong>星][1m] [Py] <a href="https://github.com/skavngr/rapidscan">skavngr/rapidscan</a> | The Multi-Tool Web Vulnerability Scanner.</li> <li>[<strong>368</strong>星][4d] [Swift] <a href="https://github.com/evermeer/passportscanner">evermeer/passportscanner</a> Scan the MRZ code of a passport and extract the firstname, lastname, passport number, nationality, date of birth, expiration date and personal numer.</li> <li>[<strong>356</strong>星][5m] [Py] <a href="https://github.com/swisskyrepo/wordpresscan">swisskyrepo/wordpresscan</a> WPScan rewritten in Python + some WPSeku ideas</li> <li>[<strong>346</strong>星][4m] [Java] <a href="https://github.com/portswigger/backslash-powered-scanner">portswigger/backslash-powered-scanner</a> Finds unknown classes of injection vulnerabilities</li> <li>[<strong>343</strong>星][28d] [Py] <a href="https://github.com/fgeek/pyfiscan">fgeek/pyfiscan</a> Web App 漏洞及版本扫描</li> <li>[<strong>333</strong>星][1y] [Py] <a href="https://github.com/flipkart-incubator/rta">flipkart-incubator/rta</a> Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.</li> <li>[<strong>330</strong>星][2d] [C] <a href="https://github.com/royhills/arp-scan">royhills/arp-scan</a> The ARP Scanner</li> <li>[<strong>320</strong>星][12d] [HTML] <a href="https://github.com/coinbase/salus">coinbase/salus</a> Security scanner coordinator</li> <li>[<strong>314</strong>星][1m] [PS] <a href="https://github.com/canix1/adaclscanner">canix1/adaclscanner</a> Repo for ADACLScan.ps1 - Your number one script for ACL's in Active Directory</li> <li>[<strong>305</strong>星][3m] [Ruby] <a href="https://github.com/m0nad/hellraiser">m0nad/hellraiser</a> Vulnerability Scanner</li> <li>[<strong>303</strong>星][10m] [PHP] <a href="https://github.com/steverobbins/magescan">steverobbins/magescan</a> Scan a Magento site for information</li> <li>[<strong>301</strong>星][6d] [Shell] <a href="https://github.com/mitchellkrogza/apache-ultimate-bad-bot-blocker">mitchellkrogza/apache-ultimate-bad-bot-blocker</a> Apache Block Bad Bots, (Referer) Spam Referrer Blocker, Vulnerability Scanners, Malware, Adware, Ransomware, Malicious Sites, Wordpress Theme Detectors and Fail2Ban Jail for Repeat Offenders</li> <li>[<strong>296</strong>星][9m] [Py] <a href="https://github.com/boy-hack/w8fuckcdn">boy-hack/w8fuckcdn</a> 通过扫描全网绕过CDN获取网站IP地址</li> <li>[<strong>296</strong>星][1y] [Shell] <a href="https://github.com/cryptolok/ghostinthenet">cryptolok/ghostinthenet</a> Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan</li> <li>[<strong>293</strong>星][5m] <a href="https://github.com/enkomio/Taipan">enkomio/taipan</a> Web application vulnerability scanner</li> <li>[<strong>288</strong>星][1m] [Go] <a href="https://github.com/zmap/zgrab2">zmap/zgrab2</a> Go Application Layer Scanner</li> <li>[<strong>287</strong>星][4d] [Py] <a href="https://github.com/target/strelka">target/strelka</a> Real-time, container-based file scanning at enterprise scale</li> <li>[<strong>287</strong>星][2m] [Py] <a href="https://github.com/xdavidhu/portspider">xdavidhu/portspider</a> A lightning fast multithreaded network scanner framework with modules.</li> <li>[<strong>285</strong>星][1y] [Py] <a href="https://github.com/code-scan/dzscan">code-scan/dzscan</a> Dzscan</li> <li>[<strong>282</strong>星][4m] [Py] <a href="https://github.com/shenril/sitadel">shenril/sitadel</a> Web Application Security Scanner</li> <li>[<strong>271</strong>星][14d] [Py] <a href="https://github.com/abhisharma404/vault">abhisharma404/vault</a> swiss army knife for hackers</li> <li>[<strong>263</strong>星][3m] [Py] <a href="https://github.com/m4ll0k/Konan">m4ll0k/konan</a> Konan - Advanced Web Application Dir Scanner</li> <li>[<strong>252</strong>星][24d] [Swift] <a href="https://github.com/netyouli/whc_scan">netyouli/whc_scan</a> 高效强大扫描分析iOS和Android项目里没有使用的类Mac开源工具,清理项目垃圾类,让项目结构干净清爽,升级维护得心应手. Efficient and powerful scanning analysis iOS and Android project no classes used in Mac open source tools, cleaning rubbish class project, make project structure clean and relaxed, upgrade maintenance</li> <li>[<strong>251</strong>星][10m] <a href="https://github.com/jeffzh3ng/insectsawake">jeffzh3ng/insectsawake</a> Network Vulnerability Scanner</li> <li>[<strong>246</strong>星][2m] [Py] <a href="https://github.com/gildasio/h2t">gildasio/h2t</a> h2t (HTTP Hardening Tool) scans a website and suggests security headers to apply</li> <li>[<strong>239</strong>星][2m] [PHP] <a href="https://github.com/psecio/versionscan">psecio/versionscan</a> A PHP version scanner for reporting possible vulnerabilities</li> <li>[<strong>237</strong>星][8m] [Go] <a href="https://github.com/gocaio/goca">gocaio/goca</a> Goca Scanner</li> <li>[<strong>225</strong>星][6m] [Py] <a href="https://github.com/rub-nds/corstest">rub-nds/corstest</a> A simple CORS misconfiguration scanner</li> <li>[<strong>224</strong>星][6m] [JS] <a href="https://github.com/pavanw3b/sh00t">pavanw3b/sh00t</a> Security Testing is not as simple as right click &gt; Scan. It's messy, a tough game. What if you had missed to test just that one thing and had to regret later? Sh00t is a highly customizable, intelligent platform that understands the life of bug hunters and emphasizes on manual security testing.</li> <li>[<strong>220</strong>星][1y] [Py] <a href="https://github.com/dionach/cmsmap">dionach/cmsmap</a> CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.</li> <li>[<strong>216</strong>星][4m] [Py] <a href="https://github.com/iojw/socialscan">iojw/socialscan</a> Check email address and username availability on online platforms with 100% accuracy</li> <li>[<strong>213</strong>星][10m] [Py] <a href="https://github.com/nullarray/dorknet">nullarray/dorknet</a> Selenium powered Python script to automate searching for vulnerable web apps.</li> <li>[<strong>208</strong>星][4m] [Py] <a href="https://github.com/lengjibo/dedecmscan">lengjibo/dedecmscan</a> 织梦全版本漏洞扫描</li> <li>[<strong>202</strong>星][1y] [PS] <a href="https://github.com/sud0woodo/dcomrade">sud0woodo/dcomrade</a> Powershell script for enumerating vulnerable DCOM Applications</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-58d8b993ffc34f7ded7f4a0077129eb2"></a>隐私&amp;&amp;Secret&amp;&amp;Privacy扫描</h3><a id="user-content-隐私secretprivacy扫描" class="anchor" aria-label="Permalink: 隐私&amp;&amp;Secret&amp;&amp;Privacy扫描" href="#隐私secretprivacy扫描"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>6861</strong>星][30d] [Shell] <a href="https://github.com/awslabs/git-secrets">awslabs/git-secrets</a> Prevents you from committing secrets and credentials into git repositories</li> <li>[<strong>4468</strong>星][1m] [Py] <a href="https://github.com/jofpin/trape">jofpin/trape</a> 学习在互联网上跟踪别人,获取其详细信息,并避免被别人跟踪</li> <li>[<strong>3091</strong>星][5d] [Py] <a href="https://github.com/tribler/tribler">tribler/tribler</a> Privacy enhanced BitTorrent client with P2P content discovery</li> <li>[<strong>2204</strong>星][1m] <a href="https://github.com/sobolevn/awesome-cryptography">sobolevn/awesome-cryptography</a> A curated list of cryptography resources and links.</li> <li>[<strong>1141</strong>星][5m] [Vue] <a href="https://github.com/0xbug/hawkeye">0xbug/hawkeye</a> GitHub 泄露监控系统(GitHub Sensitive Information Leakage Monitor Spider)</li> <li>[<strong>955</strong>星][19d] [Py] <a href="https://github.com/mozilla/OpenWPM">mozilla/openwpm</a> A web privacy measurement framework</li> <li>[<strong>932</strong>星][5d] [C#] <a href="https://github.com/elevenpaths/foca">elevenpaths/foca</a> Tool to find metadata and hidden information in the documents.</li> <li>[<strong>892</strong>星][2m] [Py] <a href="https://github.com/al0ne/vxscan">al0ne/vxscan</a> python3写的综合扫描工具,主要用来存活验证,敏感文件探测(目录扫描/js泄露接口/html注释泄露),WAF/CDN识别,端口扫描,指纹/服务识别,操作系统识别,POC扫描,SQL注入,绕过CDN,查询旁站等功能,主要用来甲方自测或乙方授权测试,请勿用来搞破坏。</li> <li>[<strong>395</strong>星][7m] [Py] <a href="https://github.com/repoog/gitprey">repoog/gitprey</a> Searching sensitive files and contents in GitHub associated to company name or other key words</li> <li>[<strong>355</strong>星][2m] [Py] <a href="https://github.com/hell0w0rld0/github-hunter">hell0w0rld0/github-hunter</a> This tool is for sensitive information searching on Github - The Fast Version here:</li> <li>[<strong>324</strong>星][4d] [HTML] <a href="https://github.com/tanjiti/sec_profile">tanjiti/sec_profile</a> 爬取secwiki和xuanwu.github.io/sec.today,分析安全信息站点、安全趋势、提取安全工作者账号(twitter,weixin,github等) <ul dir="auto"> <li>重复区段: <a href="#8d1ae776898748b8249132e822f6c919">侦察-&gt;工具-&gt;社交网络-&gt;Github</a> |</li> </ul> </li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-1927ed0a77ff4f176b0b7f7abc551e4a"></a>隐私存储</h3><a id="user-content-隐私存储" class="anchor" aria-label="Permalink: 隐私存储" href="#隐私存储"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h4 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-1af1c4f9dba1db2a4137be9c441778b8"></a>未分类</h4><a id="user-content-未分类-3" class="anchor" aria-label="Permalink: 未分类" href="#未分类-3"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>5082</strong>星][3m] [Shell] <a href="https://github.com/stackexchange/blackbox">stackexchange/blackbox</a> 文件使用PGP加密后隐藏在Git/Mercurial/Subversion</li> </ul> <div class="markdown-heading" dir="auto"><h4 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-362dfd9c1f530dd20f922fd4e0faf0e3"></a>隐写</h4><a id="user-content-隐写" class="anchor" aria-label="Permalink: 隐写" href="#隐写"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>583</strong>星][2m] [Go] <a href="https://github.com/dimitarpetrov/stegify">dimitarpetrov/stegify</a> Go tool for LSB steganography, capable of hiding any file within an image.</li> <li>[<strong>358</strong>星][7m] [Go] <a href="https://github.com/lukechampine/jsteg">lukechampine/jsteg</a> JPEG steganography</li> <li>[<strong>354</strong>星][6m] [Java] <a href="https://github.com/syvaidya/openstego">syvaidya/openstego</a> OpenStego is a steganography application that provides two functionalities: a) Data Hiding: It can hide any data within a cover file (e.g. images). b) Watermarking: Watermarking files (e.g. images) with an invisible signature. It can be used to detect unauthorized file copying.</li> <li>[<strong>280</strong>星][1y] [C] <a href="https://github.com/abeluck/stegdetect">abeluck/stegdetect</a> UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.</li> <li>[<strong>258</strong>星][] [Py] <a href="https://github.com/cedricbonhomme/stegano">cedricbonhomme/stegano</a> Stegano is a pure Python steganography module.</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-1d8298e4ee4ad3c3028a1e157f85f27b"></a>文章</h2><a id="user-content-文章-3" class="anchor" aria-label="Permalink: 文章" href="#文章-3"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-7669ebab00d00c744abc35195fbaa833"></a>新添加的</h3><a id="user-content-新添加的-4" class="anchor" aria-label="Permalink: 新添加的" href="#新添加的-4"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-a76463feb91d09b3d024fae798b92be6"></a>侦察&amp;&amp;信息收集&amp;&amp;子域名发现与枚举&amp;&amp;OSINT</h1><a id="user-content-侦察信息收集子域名发现与枚举osint" class="anchor" aria-label="Permalink: 侦察&amp;&amp;信息收集&amp;&amp;子域名发现与枚举&amp;&amp;OSINT" href="#侦察信息收集子域名发现与枚举osint"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-170048b7d8668c50681c0ab1e92c679a"></a>工具</h2><a id="user-content-工具-4" class="anchor" aria-label="Permalink: 工具" href="#工具-4"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-05ab1b75266fddafc7195f5b395e4d99"></a>未分类-OSINT</h3><a id="user-content-未分类-osint" class="anchor" aria-label="Permalink: 未分类-OSINT" href="#未分类-osint"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>7307</strong>星][12d] [Java] <a href="https://github.com/lionsoul2014/ip2region">lionsoul2014/ip2region</a> Ip2region is a offline IP location library with accuracy rate of 99.9% and 0.0x millseconds searching performance. DB file is less then 5Mb with all ip address stored. binding for Java,PHP,C,Python,Nodejs,Golang,C#,lua. Binary,B-tree,Memory searching algorithm</li> <li>[<strong>6964</strong>星][22d] <a href="https://github.com/greatfire/wiki">greatfire/wiki</a> 自由浏览</li> <li>[<strong>6140</strong>星][10m] [Py] <a href="https://github.com/schollz/howmanypeoplearearound">schollz/howmanypeoplearearound</a> 检测 Wifi 信号统计你周围的人数 <ul dir="auto"> <li>重复区段: <a href="#d4efda1853b2cb0909727188116a2a8c">无线-&gt;未分类-WiFi</a> |</li> </ul> </li> <li>[<strong>2224</strong>星][1m] [C] <a href="https://github.com/texane/stlink">texane/stlink</a> stm32 discovery line linux programmer</li> <li>[<strong>2134</strong>星][t] [Py] <a href="https://github.com/FortyNorthSecurity/EyeWitness">fortynorthsecurity/eyewitness</a> 给网站做快照,提供服务器Header信息,识别默认凭证等</li> <li>[<strong>1792</strong>星][t] [Shell] <a href="https://github.com/leebaird/discover">leebaird/discover</a> 自定义的bash脚本, 用于自动化多个渗透测试任务, 包括: 侦查、扫描、解析、在Metasploit中创建恶意Payload和Listener <ul dir="auto"> <li>重复区段: <a href="#fc8737aef0f59c3952d11749fe582dac">渗透-&gt;工具-&gt;自动化</a> |<a href="#01be61d5bb9f6f7199208ff0fba86b5d">渗透-&gt;工具-&gt;Metasploit-&gt;未分类-metasploit</a> |<a href="#ad92f6b801a18934f1971e2512f5ae4f">Payload-&gt;工具-&gt;Payload生成</a> |</li> </ul> </li> <li>[<strong>1666</strong>星][] [Py] <a href="https://github.com/cea-sec/ivre">cea-sec/ivre</a> Network recon framework.</li> <li>[<strong>1642</strong>星][25d] [Go] <a href="https://github.com/awnumar/memguard">awnumar/memguard</a> 处理内存中敏感的值,纯Go语言编写。</li> <li>[<strong>1609</strong>星][5m] [Py] <a href="https://github.com/mozilla/cipherscan">mozilla/cipherscan</a> 查找指定目标支持的SSL ciphersuites</li> <li>[<strong>1484</strong>星][13d] [Py] <a href="https://github.com/enablesecurity/wafw00f">enablesecurity/wafw00f</a> 识别保护网站的WAF产品</li> <li>[<strong>1401</strong>星][13d] [JS] <a href="https://github.com/lockfale/osint-framework">lockfale/osint-framework</a> OSINT Framework</li> <li>[<strong>1363</strong>星][2m] [CSS] <a href="https://github.com/undeadsec/socialfish">undeadsec/socialfish</a> 网络钓鱼培训与信息收集 <ul dir="auto"> <li>重复区段: <a href="#ce734598055ad3885d45d0b35d2bf0d7">社工(SET)-&gt;工具-&gt;未分类-SET</a> |</li> </ul> </li> <li>[<strong>1354</strong>星][8d] [Py] <a href="https://github.com/s0md3v/Arjun">s0md3v/arjun</a> HTTP parameter discovery suite.</li> <li>[<strong>1289</strong>星][3m] [Py] <a href="https://github.com/codingo/reconnoitre">codingo/reconnoitre</a> A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.</li> <li>[<strong>1279</strong>星][1y] [PS] <a href="https://github.com/dafthack/mailsniper">dafthack/mailsniper</a> 在Microsoft Exchange环境中搜索邮件中包含的指定内容:密码、insider intel、网络架构信息等</li> <li>[<strong>1224</strong>星][1m] [Py] <a href="https://github.com/codingo/NoSQLMap">codingo/nosqlmap</a> Automated NoSQL database enumeration and web application exploitation tool.</li> <li>[<strong>1199</strong>星][11m] [C] <a href="https://github.com/blechschmidt/massdns">blechschmidt/massdns</a> A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)</li> <li>[<strong>1108</strong>星][t] [Py] <a href="https://github.com/sundowndev/phoneinfoga">sundowndev/phoneinfoga</a> Advanced information gathering &amp; OSINT tool for phone numbers</li> <li>[<strong>1102</strong>星][3m] [PHP] <a href="https://github.com/tuhinshubhra/red_hawk">tuhinshubhra/red_hawk</a> 信息收集、漏洞扫描、爬虫多合一 <ul dir="auto"> <li>重复区段: <a href="#de63a029bda6a7e429af272f291bb769">扫描器-&gt;工具-&gt;未分类-Scanner</a> |</li> </ul> </li> <li>[<strong>1059</strong>星][16d] [Rust] <a href="https://github.com/fgribreau/mailchecker">fgribreau/mailchecker</a> 邮件检测库,跨语言。覆盖33078虚假邮件提供者</li> <li>[<strong>976</strong>星][5m] [C] <a href="https://github.com/rbsec/sslscan">rbsec/sslscan</a> 测试启用SSL/TLS的服务,发现其支持的cipher suites</li> <li>[<strong>931</strong>星][16d] [OCaml] <a href="https://github.com/airbus-seclab/bincat">airbus-seclab/bincat</a> 二进制代码静态分析工具。值分析(寄存器、内存)、污点分析、类型重建和传播(propagation)、前向/后向分析</li> <li>[<strong>906</strong>星][5m] <a href="https://github.com/derpopo/uabe">derpopo/uabe</a> Unity Assets Bundle Extractor</li> <li>[<strong>866</strong>星][8m] [Py] <a href="https://github.com/s0md3v/ReconDog">s0md3v/recondog</a> Reconnaissance Swiss Army Knife</li> <li>[<strong>778</strong>星][5m] [Shell] <a href="https://github.com/nahamsec/lazyrecon">nahamsec/lazyrecon</a> 侦查(reconnaissance)过程自动化脚本, 可自动使用Sublist3r/certspotter获取子域名, 调用nmap/dirsearch等</li> <li>[<strong>778</strong>星][1y] [HTML] <a href="https://github.com/sense-of-security/adrecon">sense-of-security/adrecon</a> 收集Active Directory信息并生成报告</li> <li>[<strong>758</strong>星][2m] [Py] <a href="https://github.com/khast3x/h8mail">khast3x/h8mail</a> Password Breach Hunting and Email OSINT tool, locally or using premium services. Supports chasing down related email</li> <li>[<strong>754</strong>星][4m] [Py] <a href="https://github.com/threatexpress/domainhunter">threatexpress/domainhunter</a> Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names <ul dir="auto"> <li>重复区段: <a href="#ce734598055ad3885d45d0b35d2bf0d7">社工(SET)-&gt;工具-&gt;未分类-SET</a> |</li> </ul> </li> <li>[<strong>706</strong>星][21d] [Ruby] <a href="https://github.com/intrigueio/intrigue-core">intrigueio/intrigue-core</a> 外部攻击面发现框架,自动化OSINT</li> <li>[<strong>625</strong>星][5m] [Py] <a href="https://github.com/deibit/cansina">deibit/cansina</a> web 内容发现工具。发出各种请求并过滤回复,识别是否存在请求的资源。</li> <li>[<strong>595</strong>星][2m] [Py] <a href="https://github.com/1n3/blackwidow">1n3/blackwidow</a> A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.</li> <li>[<strong>582</strong>星][8m] [Py] <a href="https://github.com/ekultek/zeus-scanner">ekultek/zeus-scanner</a> Advanced reconnaissance utility</li> <li>[<strong>561</strong>星][1m] [Py] <a href="https://github.com/m4ll0k/infoga">m4ll0k/infoga</a> 邮件信息收集工具</li> <li>[<strong>516</strong>星][1m] <a href="https://github.com/no-github/digital-privacy">no-github/digital-privacy</a> 一个关于数字隐私搜集、保护、清理集一体的方案,外加开源信息收集(OSINT)对抗</li> <li>[<strong>492</strong>星][29d] [Rust] <a href="https://github.com/kpcyrd/sn0int">kpcyrd/sn0int</a> Semi-automatic OSINT framework and package manager</li> <li>[<strong>475</strong>星][4m] [Py] <a href="https://github.com/xillwillx/skiptracer">xillwillx/skiptracer</a> OSINT python webscaping framework</li> <li>[<strong>442</strong>星][3m] [Py] <a href="https://github.com/superhedgy/attacksurfacemapper">superhedgy/attacksurfacemapper</a> AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.</li> <li>[<strong>422</strong>星][1y] [JS] <a href="https://github.com/ciscocsirt/gosint">ciscocsirt/gosint</a> 收集、处理、索引高质量IOC的框架</li> <li>[<strong>411</strong>星][5m] [Shell] <a href="https://github.com/d4rk007/redghost">d4rk007/redghost</a> Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.</li> <li>[<strong>409</strong>星][3m] <a href="https://github.com/ph055a/osint-collection">ph055a/osint-collection</a> Maintained collection of OSINT related resources. (All Free &amp; Actionable)</li> <li>[<strong>397</strong>星][5d] [Go] <a href="https://github.com/graniet/operative-framework">graniet/operative-framework</a> operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links with target, export rapport to PDF file, add note to target or results, interact with RESTFul API, write your own modules.</li> <li>[<strong>392</strong>星][1y] [Py] <a href="https://github.com/chrismaddalena/odin">chrismaddalena/odin</a> Automated network asset, email, and social media profile discovery and cataloguing.</li> <li>[<strong>383</strong>星][2m] [Py] <a href="https://github.com/dedsecinside/torbot">dedsecinside/torbot</a> Dark Web OSINT Tool</li> <li>[<strong>354</strong>星][12m] [Py] <a href="https://github.com/aancw/belati">aancw/belati</a> The Traditional Swiss Army Knife for OSINT</li> <li>[<strong>353</strong>星][18d] [Py] <a href="https://github.com/depthsecurity/armory">depthsecurity/armory</a> Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of related information.</li> <li>[<strong>344</strong>星][16d] [Py] <a href="https://github.com/darryllane/bluto">darryllane/bluto</a> DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration | Compromised Account Checking</li> <li>[<strong>336</strong>星][12m] [Py] <a href="https://github.com/mdsecactivebreach/linkedint">mdsecactivebreach/linkedint</a> A LinkedIn scraper for reconnaissance during adversary simulation</li> <li>[<strong>329</strong>星][6m] [Go] <a href="https://github.com/nhoya/gosint">nhoya/gosint</a> OSINT Swiss Army Knife</li> <li>[<strong>328</strong>星][17d] [Py] <a href="https://github.com/initstring/linkedin2username">initstring/linkedin2username</a> Generate username lists for companies on LinkedIn</li> <li>[<strong>314</strong>星][] [Py] <a href="https://github.com/sharadkumar97/osint-spy">sharadkumar97/osint-spy</a> Performs OSINT scan on email/domain/ip_address/organization using OSINT-SPY. It can be used by Data Miners, Infosec Researchers, Penetration Testers and cyber crime investigator in order to find deep information about their target. If you want to ask something please feel free to reach out to me at <a href="mailto:robotcoder@protonmail.com">robotcoder@protonmail.com</a></li> <li>[<strong>313</strong>星][1y] [Py] <a href="https://github.com/twelvesec/gasmask">twelvesec/gasmask</a> Information gathering tool - OSINT</li> <li>[<strong>307</strong>星][1y] [Py] <a href="https://github.com/r3vn/badkarma">r3vn/badkarma</a> network reconnaissance toolkit</li> <li>[<strong>297</strong>星][7m] [Shell] <a href="https://github.com/eschultze/urlextractor">eschultze/urlextractor</a> Information gathering &amp; website reconnaissance |</li> <li>[<strong>292</strong>星][3m] [JS] <a href="https://github.com/pownjs/pown-recon">pownjs/pown-recon</a> A powerful target reconnaissance framework powered by graph theory.</li> <li>[<strong>286</strong>星][1y] [Shell] <a href="https://github.com/ha71/namechk">ha71/namechk</a> Osint tool based on namechk.com for checking usernames on more than 100 websites, forums and social networks.</li> <li>[<strong>285</strong>星][23d] [Py] <a href="https://github.com/ekultek/whatbreach">ekultek/whatbreach</a> OSINT tool to find breached emails, databases, pastes, and relevant information</li> <li>[<strong>269</strong>星][1y] [Go] <a href="https://github.com/tomsteele/blacksheepwall">tomsteele/blacksheepwall</a> blacksheepwall is a hostname reconnaissance tool</li> <li>[<strong>259</strong>星][4m] [Py] <a href="https://github.com/thewhiteh4t/finalrecon">thewhiteh4t/finalrecon</a> OSINT Tool for All-In-One Web Reconnaissance</li> <li>[<strong>258</strong>星][3m] [Shell] <a href="https://github.com/solomonsklash/chomp-scan">solomonsklash/chomp-scan</a> A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.</li> <li>[<strong>257</strong>星][8d] [TS] <a href="https://github.com/ninoseki/mitaka">ninoseki/mitaka</a> A browser extension for OSINT search</li> <li>[<strong>253</strong>星][26d] [Py] <a href="https://github.com/zephrfish/googd0rker">zephrfish/googd0rker</a> GoogD0rker is a tool for firing off google dorks against a target domain, it is purely for OSINT against a specific target domain. READ the readme before messaging or tweeting me.</li> <li>[<strong>243</strong>星][2m] [Py] <a href="https://github.com/sc1341/instagramosint">sc1341/instagramosint</a> An Instagram Open Source Intelligence Tool</li> <li>[<strong>236</strong>星][7m] [JS] <a href="https://github.com/cliqz-oss/local-sheriff">cliqz-oss/local-sheriff</a> Think of Local sheriff as a recon tool in your browser (WebExtension). While you normally browse the internet, Local Sheriff works in the background to empower you in identifying what data points (PII) are being shared / leaked to which all third-parties.</li> <li>[<strong>233</strong>星][2m] [Propeller Spin] <a href="https://github.com/grandideastudio/jtagulator">grandideastudio/jtagulator</a> Assisted discovery of on-chip debug interfaces</li> <li>[<strong>229</strong>星][2m] [Py] <a href="https://github.com/anon-exploiter/sitebroker">anon-exploiter/sitebroker</a> A cross-platform python based utility for information gathering and penetration testing automation!</li> <li>[<strong>226</strong>星][5d] [Py] <a href="https://github.com/eth0izzle/the-endorser">eth0izzle/the-endorser</a> An OSINT tool that allows you to draw out relationships between people on LinkedIn via endorsements/skills.</li> <li>[<strong>223</strong>星][1y] [Shell] <a href="https://github.com/edoverflow/megplus">edoverflow/megplus</a> Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]</li> <li>[<strong>222</strong>星][1m] [PS] <a href="https://github.com/tonyphipps/meerkat">tonyphipps/meerkat</a> A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.</li> <li>[<strong>220</strong>星][9d] [Shell] <a href="https://github.com/x1mdev/reconpi">x1mdev/reconpi</a> ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.</li> <li>[<strong>217</strong>星][5m] [Py] <a href="https://github.com/spiderlabs/hosthunter">spiderlabs/hosthunter</a> HostHunter a recon tool for discovering hostnames using OSINT techniques.</li> <li>[<strong>211</strong>星][2m] [Py] <a href="https://github.com/inquest/omnibus">inquest/omnibus</a> The OSINT Omnibus (beta release)</li> <li>[<strong>201</strong>星][4m] [Py] <a href="https://github.com/sham00n/buster">sham00n/buster</a> An advanced tool for email reconnaissance</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-e945721056c78a53003e01c3d2f3b8fe"></a>子域名枚举&amp;&amp;爆破</h3><a id="user-content-子域名枚举爆破" class="anchor" aria-label="Permalink: 子域名枚举&amp;&amp;爆破" href="#子域名枚举爆破"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>4153</strong>星][2m] [Py] <a href="https://github.com/aboul3la/sublist3r">aboul3la/sublist3r</a> Fast subdomains enumeration tool for penetration testers</li> <li>[<strong>3270</strong>星][27d] [Py] <a href="https://github.com/laramies/theharvester">laramies/theharvester</a> E-mails, subdomains and names Harvester - OSINT</li> <li>[<strong>3102</strong>星][7m] [Go] <a href="https://github.com/michenriksen/aquatone">michenriksen/aquatone</a> 子域名枚举工具。除了经典的爆破枚举之外,还利用多种开源工具和在线服务大幅度增加发现子域名的数量。</li> <li>[<strong>2028</strong>星][8d] [Go] <a href="https://github.com/projectdiscovery/subfinder">projectdiscovery/subfinder</a> 使用Passive Sources, Search Engines, Pastebins, Internet Archives等查找子域名</li> <li>[<strong>1808</strong>星][7m] [Py] <a href="https://github.com/lijiejie/subdomainsbrute">lijiejie/subdomainsbrute</a> 子域名爆破</li> <li>[<strong>1716</strong>星][8m] [Py] <a href="https://github.com/guelfoweb/knock">guelfoweb/knock</a> 使用 Wordlist 枚举子域名</li> <li>[<strong>1561</strong>星][11d] [Go] <a href="https://github.com/caffix/amass">caffix/amass</a> 子域名枚举, 搜索互联网数据源, 使用机器学习猜测子域名. Go语言</li> <li>[<strong>1115</strong>星][2m] [Py] <a href="https://github.com/john-kurkowski/tldextract">john-kurkowski/tldextract</a> Accurately separate the TLD from the registered domain and subdomains of a URL, using the Public Suffix List.</li> <li>[<strong>990</strong>星][6d] [Py] <a href="https://github.com/shmilylty/oneforall">shmilylty/oneforall</a> 子域收集工具</li> <li>[<strong>823</strong>星][8d] [Rust] <a href="https://github.com/edu4rdshl/findomain">edu4rdshl/findomain</a> The fastest and cross-platform subdomain enumerator, don't waste your time.</li> <li>[<strong>773</strong>星][5m] [Go] <a href="https://github.com/haccer/subjack">haccer/subjack</a> 异步多线程扫描子域列表,识别能够被劫持的子域。Go 编写</li> <li>[<strong>649</strong>星][1y] [Py] <a href="https://github.com/SimplySecurity/SimplyEmail">simplysecurity/simplyemail</a> Email recon made fast and easy, with a framework to build on</li> <li>[<strong>575</strong>星][3m] [Py] <a href="https://github.com/jonluca/anubis">jonluca/anubis</a> Subdomain enumeration and information gathering tool</li> <li>[<strong>553</strong>星][9m] [Py] <a href="https://github.com/feeicn/esd">feeicn/esd</a> Enumeration sub domains(枚举子域名)</li> <li>[<strong>499</strong>星][3m] [Py] <a href="https://github.com/yanxiu0614/subdomain3">yanxiu0614/subdomain3</a> 简单快速的子域名爆破工具。</li> <li>[<strong>498</strong>星][27d] [Py] <a href="https://github.com/TypeError/domained">typeerror/domained</a> Multi Tool Subdomain Enumeration</li> <li>[<strong>479</strong>星][6m] [Py] <a href="https://github.com/threezh1/jsfinder">threezh1/jsfinder</a> JSFinder is a tool for quickly extracting URLs and subdomains from JS files on a website.</li> <li>[<strong>454</strong>星][25d] [Py] <a href="https://github.com/nsonaniya2010/subdomainizer">nsonaniya2010/subdomainizer</a> A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.</li> <li>[<strong>445</strong>星][1y] [Go] <a href="https://github.com/ice3man543/subover">ice3man543/subover</a> A Powerful Subdomain Takeover Tool</li> <li>[<strong>432</strong>星][11m] [Py] <a href="https://github.com/appsecco/bugcrowd-levelup-subdomain-enumeration">appsecco/bugcrowd-levelup-subdomain-enumeration</a> This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtual conference</li> <li>[<strong>334</strong>星][5m] [Py] <a href="https://github.com/chris408/ct-exposer">chris408/ct-exposer</a> An OSINT tool that discovers sub-domains by searching Certificate Transparency logs</li> <li>[<strong>332</strong>星][2m] [Go] <a href="https://github.com/tomnomnom/assetfinder">tomnomnom/assetfinder</a> Find domains and subdomains related to a given domain</li> <li>[<strong>293</strong>星][4d] [Go] <a href="https://github.com/anshumanbh/tko-subs">anshumanbh/tko-subs</a> A tool that can help detect and takeover subdomains with dead DNS records</li> <li>[<strong>279</strong>星][26d] [Py] <a href="https://github.com/franccesco/getaltname">franccesco/getaltname</a> 直接从SSL证书中提取子域名或虚拟域名</li> <li>[<strong>277</strong>星][11m] [Py] <a href="https://github.com/appsecco/the-art-of-subdomain-enumeration">appsecco/the-art-of-subdomain-enumeration</a> This repository contains all the supplement material for the book "The art of sub-domain enumeration"</li> <li>[<strong>228</strong>星][2m] [Shell] <a href="https://github.com/screetsec/sudomy">screetsec/sudomy</a> Sudomy is a subdomain enumeration tool, created using a bash script, to analyze domains and collect subdomains in fast and comprehensive way . Report output in HTML or CSV format</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-375a8baa06f24de1b67398c1ac74ed24"></a>信息收集&amp;&amp;侦查&amp;&amp;Recon&amp;&amp;InfoGather</h3><a id="user-content-信息收集侦查reconinfogather" class="anchor" aria-label="Permalink: 信息收集&amp;&amp;侦查&amp;&amp;Recon&amp;&amp;InfoGather" href="#信息收集侦查reconinfogather"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>3603</strong>星][11d] [Shell] <a href="https://github.com/drwetter/testssl.sh">drwetter/testssl.sh</a> 检查服务器任意端口对 TLS/SSL 的支持、协议以及一些加密缺陷,命令行工具</li> <li>[<strong>2489</strong>星][1m] [Py] <a href="https://github.com/smicallef/spiderfoot">smicallef/spiderfoot</a> 自动收集指定目标的信息:IP、域名、主机名、网络子网、ASN、邮件地址、用户名</li> <li>[<strong>2021</strong>星][7d] [Py] <a href="https://github.com/j3ssie/osmedeus">j3ssie/osmedeus</a> Fully automated offensive security framework for reconnaissance and vulnerability scanning</li> <li>[<strong>1966</strong>星][9m] [JS] <a href="https://github.com/weichiachang/stacks-cli">weichiachang/stacks-cli</a> Check website stack from the terminal</li> <li>[<strong>1958</strong>星][30d] [Go] <a href="https://github.com/mpolden/echoip">mpolden/echoip</a> IP address lookup service</li> <li>[<strong>1651</strong>星][1y] [Py] <a href="https://github.com/evyatarmeged/raccoon">evyatarmeged/raccoon</a> 高性能的侦查和漏洞扫描工具</li> <li>[<strong>1486</strong>星][6m] [Py] <a href="https://github.com/oros42/imsi-catcher">oros42/imsi-catcher</a> This program show you IMSI numbers of cellphones around you.</li> <li>[<strong>1305</strong>星][1y] [Go] <a href="https://github.com/evilsocket/xray">evilsocket/xray</a> 自动化执行一些信息收集、网络映射的初始化工作</li> <li>[<strong>1154</strong>星][23d] [C] <a href="https://github.com/xroche/httrack">xroche/httrack</a> download a World Wide website from the Internet to a local directory, building recursively all directories, getting html, images, and other files from the server to your computer.</li> <li>[<strong>975</strong>星][2m] [HTML] <a href="https://github.com/n0tr00t/sreg">n0tr00t/sreg</a> 可对使用者通过输入email、phone、username的返回用户注册的所有互联网护照信息。</li> <li>[<strong>923</strong>星][3m] [Ruby] <a href="https://github.com/weppos/whois">weppos/whois</a> An intelligent — pure Ruby — WHOIS client and parser.</li> <li>[<strong>860</strong>星][11m] [Shell] <a href="https://github.com/thelinuxchoice/userrecon">thelinuxchoice/userrecon</a> Find usernames across over 75 social networks</li> <li>[<strong>838</strong>星][7d] [HTML] <a href="https://github.com/rewardone/oscprepo">rewardone/oscprepo</a> A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and reading material in 'BookmarkList' Keepnote. Reconscan in scripts folder.</li> <li>[<strong>677</strong>星][2m] [Py] <a href="https://github.com/tib3rius/autorecon">tib3rius/autorecon</a> AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.</li> <li>[<strong>512</strong>星][10m] [Py] <a href="https://github.com/FortyNorthSecurity/Just-Metadata">fortynorthsecurity/just-metadata</a> Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within a large dataset.</li> <li>[<strong>483</strong>星][2m] [Py] <a href="https://github.com/yassineaboukir/sublert">yassineaboukir/sublert</a> Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.</li> <li>[<strong>418</strong>星][2m] [Py] <a href="https://github.com/lanmaster53/recon-ng">lanmaster53/recon-ng</a> Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.</li> <li>[<strong>394</strong>星][11m] [Swift] <a href="https://github.com/ibm/mac-ibm-enrollment-app">ibm/mac-ibm-enrollment-app</a> The Mac@IBM enrollment app makes setting up macOS with Jamf Pro more intuitive for users and easier for IT. The application offers IT admins the ability to gather additional information about their users during setup, allows users to customize their enrollment by selecting apps or bundles of apps to install during setup, and provides users with …</li> <li>[<strong>362</strong>星][2m] [Shell] <a href="https://github.com/vitalysim/totalrecon">vitalysim/totalrecon</a> TotalRecon installs all the recon tools you need</li> <li>[<strong>361</strong>星][5m] [C++] <a href="https://github.com/wbenny/pdbex">wbenny/pdbex</a> pdbex is a utility for reconstructing structures and unions from the PDB into compilable C headers</li> <li>[<strong>307</strong>星][5m] [PLpgSQL] <a href="https://github.com/amachanic/sp_whoisactive">amachanic/sp_whoisactive</a> sp_whoisactive</li> <li>[<strong>300</strong>星][18d] [Py] <a href="https://github.com/govanguard/legion">govanguard/legion</a> Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconnaissance and exploitation of information systems.</li> <li>[<strong>273</strong>星][20d] [Rust] <a href="https://github.com/nccgroup/dirble">nccgroup/dirble</a> Fast directory scanning and scraping tool</li> <li>[<strong>269</strong>星][11m] [Py] <a href="https://bitbucket.org/lanmaster53/recon-ng" rel="nofollow">LaNMaSteR53/recon-ng</a></li> <li>[<strong>258</strong>星][4d] [Java] <a href="https://github.com/ripe-ncc/whois">ripe-ncc/whois</a> RIPE Database whois code repository</li> <li>[<strong>233</strong>星][2m] [C] <a href="https://github.com/elfmaster/libelfmaster">elfmaster/libelfmaster</a> Secure ELF parsing/loading library for forensics reconstruction of malware, and robust reverse engineering tools</li> <li>[<strong>200</strong>星][2m] [Py] <a href="https://github.com/tylous/vibe">tylous/vibe</a> A framework for stealthy domain reconnaissance</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-016bb6bd00f1e0f8451f779fe09766db"></a>指纹&amp;&amp;Fingerprinting</h3><a id="user-content-指纹fingerprinting" class="anchor" aria-label="Permalink: 指纹&amp;&amp;Fingerprinting" href="#指纹fingerprinting"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>9519</strong>星][12d] [JS] <a href="https://github.com/valve/fingerprintjs2">valve/fingerprintjs2</a> Modern &amp; flexible browser fingerprinting library</li> <li>[<strong>4758</strong>星][7m] [Py] <a href="https://github.com/worldveil/dejavu">worldveil/dejavu</a> Audio fingerprinting and recognition in Python</li> <li>[<strong>3072</strong>星][2m] [JS] <a href="https://github.com/valve/fingerprintjs">valve/fingerprintjs</a> Anonymous browser fingerprint</li> <li>[<strong>1670</strong>星][] [JS] <a href="https://github.com/ghacksuserjs/ghacks-user.js">ghacksuserjs/ghacks-user.js</a> An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting</li> <li>[<strong>1618</strong>星][10m] [C] <a href="https://github.com/nmikhailov/validity90">nmikhailov/validity90</a> Reverse engineering of Validity/Synaptics 138a:0090, 138a:0094, 138a:0097, 06cb:0081, 06cb:009a fingerprint readers protocol</li> <li>[<strong>931</strong>星][8m] [JS] <a href="https://github.com/song-li/cross_browser">song-li/cross_browser</a> cross_browser_fingerprinting</li> <li>[<strong>831</strong>星][1m] [Py] <a href="https://github.com/salesforce/ja3">salesforce/ja3</a> SSL/TLS 客户端指纹,用于恶意代码检测</li> <li>[<strong>380</strong>星][2m] [Py] <a href="https://github.com/0x4d31/fatt">0x4d31/fatt</a> FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network traffic</li> <li>[<strong>313</strong>星][3m] [Py] <a href="https://github.com/dpwe/audfprint">dpwe/audfprint</a> Landmark-based audio fingerprinting</li> <li>[<strong>312</strong>星][4m] [Py] <a href="https://github.com/salesforce/hassh">salesforce/hassh</a> HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints can be easily stored, searched and shared in the form of a small MD5 fingerprint.</li> <li>[<strong>282</strong>星][1y] [CSS] <a href="https://github.com/w-digital-scanner/w11scan">w-digital-scanner/w11scan</a> 分布式WEB指纹识别平台 Distributed WEB fingerprint identification platform</li> <li>[<strong>245</strong>星][3m] [C] <a href="https://github.com/leebrotherston/tls-fingerprinting">leebrotherston/tls-fingerprinting</a> TLS Fingerprinting</li> <li>[<strong>223</strong>星][25d] [GLSL] <a href="https://github.com/westpointltd/tls_prober">westpointltd/tls_prober</a> A tool to fingerprint SSL/TLS servers</li> <li>[<strong>220</strong>星][1y] [Py] <a href="https://github.com/sensepost/spartan">sensepost/spartan</a> Frontpage and Sharepoint fingerprinting and attack tool.</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-6ea9006a5325dd21d246359329a3ede2"></a>收集</h3><a id="user-content-收集-2" class="anchor" aria-label="Permalink: 收集" href="#收集-2"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>3868</strong>星][1m] <a href="https://github.com/jivoi/awesome-osint">jivoi/awesome-osint</a> OSINT资源收集</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-dc74ad2dd53aa8c8bf3a3097ad1f12b7"></a>社交网络</h3><a id="user-content-社交网络" class="anchor" aria-label="Permalink: 社交网络" href="#社交网络"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h4 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-6d36e9623aadaf40085ef5af89c8d698"></a>其他-SocialNetwork</h4><a id="user-content-其他-socialnetwork" class="anchor" aria-label="Permalink: 其他-SocialNetwork" href="#其他-socialnetwork"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>9767</strong>星][4d] [Py] <a href="https://github.com/sherlock-project/sherlock">sherlock-project/sherlock</a> Find Usernames Across Social Networks</li> <li>[<strong>2578</strong>星][3m] [Py] <a href="https://github.com/Greenwolf/social_mapper">greenwolf/social_mapper</a> 对多个社交网站的用户Profile图片进行大规模的人脸识别</li> <li>[<strong>1131</strong>星][3m] [Py] <a href="https://github.com/thoughtfuldev/eagleeye">thoughtfuldev/eagleeye</a> Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.</li> <li>[<strong>664</strong>星][1y] [Go] <a href="https://github.com/0x09al/raven">0x09al/raven</a> raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees using Linkedin.</li> </ul> <div class="markdown-heading" dir="auto"><h4 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-de93515e77c0ca100bbf92c83f82dc2a"></a>Twitter</h4><a id="user-content-twitter" class="anchor" aria-label="Permalink: Twitter" href="#twitter"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>3033</strong>星][4d] [Py] <a href="https://github.com/twintproject/twint">twintproject/twint</a> An advanced Twitter scraping &amp; OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, following, Tweets and more while evading most API limitations.</li> </ul> <div class="markdown-heading" dir="auto"><h4 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-8d1ae776898748b8249132e822f6c919"></a>Github</h4><a id="user-content-github" class="anchor" aria-label="Permalink: Github" href="#github"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1717</strong>星][2m] [Go] <a href="https://github.com/eth0izzle/shhgit">eth0izzle/shhgit</a> 监听Github Event API,实时查找Github代码和Gist中的secret和敏感文件</li> <li>[<strong>1636</strong>星][2m] [Shell] <a href="https://github.com/internetwache/gittools">internetwache/gittools</a> find websites with their .git repository available to the public</li> <li>[<strong>1563</strong>星][1y] [Py] <a href="https://github.com/unkl4b/gitminer">unkl4b/gitminer</a> Github内容挖掘</li> <li>[<strong>1352</strong>星][7m] [Py] <a href="https://github.com/feeicn/gsil">feeicn/gsil</a> GitHub敏感信息泄露监控,几乎实时监控,发送警告</li> <li>[<strong>859</strong>星][2m] [JS] <a href="https://github.com/vksrc/github-monitor">vksrc/github-monitor</a> Github Sensitive Information Leakage Monitor(Github信息泄漏监控系统)</li> <li>[<strong>857</strong>星][7m] [Go] <a href="https://github.com/misecurity/x-patrol">misecurity/x-patrol</a> github泄露扫描系统</li> <li>[<strong>810</strong>星][4m] [Py] <a href="https://github.com/techgaun/github-dorks">techgaun/github-dorks</a> 快速搜索Github repo中的敏感信息</li> <li>[<strong>789</strong>星][2m] [Py] <a href="https://github.com/bishopfox/gitgot">bishopfox/gitgot</a> Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.</li> <li>[<strong>667</strong>星][3m] [Py] <a href="https://github.com/hisxo/gitgraber">hisxo/gitgraber</a> monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...</li> <li>[<strong>324</strong>星][4d] [HTML] <a href="https://github.com/tanjiti/sec_profile">tanjiti/sec_profile</a> 爬取secwiki和xuanwu.github.io/sec.today,分析安全信息站点、安全趋势、提取安全工作者账号(twitter,weixin,github等) <ul dir="auto"> <li>重复区段: <a href="#58d8b993ffc34f7ded7f4a0077129eb2">扫描器-&gt;工具-&gt;隐私</a> |</li> </ul> </li> <li>[<strong>294</strong>星][8m] [Py] <a href="https://github.com/s0md3v/zen">s0md3v/zen</a> 查找Github用户的邮箱地址</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-a695111d8e30d645354c414cb27b7843"></a>DNS</h3><a id="user-content-dns" class="anchor" aria-label="Permalink: DNS" href="#dns"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>2562</strong>星][5m] [Go] <a href="https://github.com/oj/gobuster">oj/gobuster</a> Directory/File, DNS and VHost busting tool written in Go</li> <li>[<strong>2380</strong>星][2m] [Py] <a href="https://github.com/ab77/netflix-proxy">ab77/netflix-proxy</a> Smart DNS proxy to watch Netflix</li> <li>[<strong>2131</strong>星][2m] [Py] <a href="https://github.com/elceef/dnstwist">elceef/dnstwist</a> 域名置换引擎,用于检测打字错误,网络钓鱼和企业间谍活动 <ul dir="auto"> <li>重复区段: <a href="#290e9ae48108d21d6d8b9ea9e74d077d">社工(SET)-&gt;工具-&gt;钓鱼</a> |</li> </ul> </li> <li>[<strong>1933</strong>星][7d] [C++] <a href="https://github.com/powerdns/pdns">powerdns/pdns</a> PowerDNS</li> <li>[<strong>1735</strong>星][4m] [Py] <a href="https://github.com/lgandx/responder">lgandx/responder</a> Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.</li> <li>[<strong>1144</strong>星][16d] [Py] <a href="https://github.com/darkoperator/dnsrecon">darkoperator/dnsrecon</a> DNS 枚举脚本</li> <li>[<strong>1090</strong>星][1m] [Go] <a href="https://github.com/looterz/grimd">looterz/grimd</a> Fast dns proxy that can run anywhere, built to black-hole internet advertisements and malware servers.</li> <li>[<strong>1090</strong>星][2m] [Go] <a href="https://github.com/nadoo/glider">nadoo/glider</a> 正向代理,支持若干协议</li> <li>[<strong>1078</strong>星][3m] [Py] <a href="https://github.com/infosec-au/altdns">infosec-au/altdns</a> Generates permutations, alterations and mutations of subdomains and then resolves them</li> <li>[<strong>977</strong>星][7m] [Py] <a href="https://github.com/m57/dnsteal">m57/dnsteal</a> DNS Exfiltration tool for stealthily sending files over DNS requests.</li> <li>[<strong>912</strong>星][5m] [Py] <a href="https://github.com/m0rtem/cloudfail">m0rtem/cloudfail</a> 通过错误配置的DNS和老数据库,发现CloudFlare网络后面的隐藏IP</li> <li>[<strong>908</strong>星][30d] [Py] <a href="https://github.com/mschwager/fierce">mschwager/fierce</a> A DNS reconnaissance tool for locating non-contiguous IP space.</li> <li>[<strong>708</strong>星][1y] [Py] <a href="https://github.com/bugscanteam/dnslog">bugscanteam/dnslog</a> 监控 DNS 解析记录和 HTTP 访问记录</li> <li>[<strong>613</strong>星][8m] [Shell] <a href="https://github.com/cokebar/gfwlist2dnsmasq">cokebar/gfwlist2dnsmasq</a> A shell script which convert gfwlist into dnsmasq rules. Python version:</li> <li>[<strong>585</strong>星][2m] [C] <a href="https://github.com/getdnsapi/stubby">getdnsapi/stubby</a> Stubby is the name given to a mode of using getdns which enables it to act as a local DNS Privacy stub resolver (using DNS-over-TLS).</li> <li>[<strong>461</strong>星][9m] [C] <a href="https://github.com/cofyc/dnscrypt-wrapper">cofyc/dnscrypt-wrapper</a> This is dnscrypt wrapper (server-side dnscrypt proxy), which helps to add dnscrypt support to any name resolver.</li> <li>[<strong>415</strong>星][6m] [Py] <a href="https://github.com/dnsviz/dnsviz">dnsviz/dnsviz</a> s a tool suite for analysis and visualization of Domain Name System (DNS) behavior, including its security extensions (DNSSEC)</li> <li>[<strong>375</strong>星][1m] [JS] <a href="https://github.com/nccgroup/singularity">nccgroup/singularity</a> A DNS rebinding attack framework.</li> <li>[<strong>355</strong>星][1y] [Py] <a href="https://github.com/i3visio/osrframework">i3visio/osrframework</a> 开源研究框架,提供 API 和工具执行更加精确的在线研究,例如用户名检查、DNS lookup、信息泄露研究、深度 web 研究、正则表达式提取等。</li> <li>[<strong>336</strong>星][5m] [Py] <a href="https://github.com/rbsec/dnscan">rbsec/dnscan</a> a python wordlist-based DNS subdomain scanner.</li> <li>[<strong>267</strong>星][1y] [Py] <a href="https://github.com/trycatchhcf/packetwhisper">trycatchhcf/packetwhisper</a> Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.</li> <li>[<strong>265</strong>星][2m] [Go] <a href="https://github.com/sensepost/godoh">sensepost/godoh</a> A DNS-over-HTTPS Command &amp; Control Proof of Concept</li> <li>[<strong>263</strong>星][3m] [Go] <a href="https://github.com/zmap/zdns">zmap/zdns</a> 快速DNS查找, 命令行工具</li> <li>[<strong>258</strong>星][7d] [Go] <a href="https://github.com/erbbysam/dnsgrep">erbbysam/dnsgrep</a> Quickly Search Large DNS Datasets</li> <li>[<strong>256</strong>星][3m] [Py] <a href="https://github.com/qunarcorp/open_dnsdb">qunarcorp/open_dnsdb</a> OpenDnsdb 是去哪儿网OPS团队开源的基于Python语言的DNS管理系统</li> <li>[<strong>252</strong>星][8m] [Py] <a href="https://github.com/dirkjanm/adidnsdump">dirkjanm/adidnsdump</a> Active Directory Integrated DNS dumping by any authenticated user</li> <li>[<strong>251</strong>星][4m] [C#] <a href="https://github.com/kevin-robertson/inveighzero">kevin-robertson/inveighzero</a> Windows C# LLMNR/mDNS/NBNS/DNS spoofer/man-in-the-middle tool</li> <li>[<strong>241</strong>星][23d] [Py] <a href="https://github.com/mandatoryprogrammer/trusttrees">mandatoryprogrammer/trusttrees</a> a script to recursively follow all the possible delegation paths for a target domain and graph the relationships between various nameservers along the way.</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-18c7c1df2e6ae5e9135dfa2e4eb1d4db"></a>Shodan</h3><a id="user-content-shodan" class="anchor" aria-label="Permalink: Shodan" href="#shodan"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1214</strong>星][8d] [Py] <a href="https://github.com/achillean/shodan-python">achillean/shodan-python</a> The official Python library for Shodan</li> <li>[<strong>1052</strong>星][5m] [Py] <a href="https://github.com/woj-ciech/kamerka">woj-ciech/kamerka</a> 利用Shodan构建交互式摄像头地图</li> <li>[<strong>890</strong>星][3m] <a href="https://github.com/jakejarvis/awesome-shodan-queries">jakejarvis/awesome-shodan-queries</a></li> <li>[<strong>858</strong>星][3m] [Py] <a href="https://github.com/649/memcrashed-ddos-exploit">649/memcrashed-ddos-exploit</a> DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API <ul dir="auto"> <li>重复区段: <a href="#a0897294e74a0863ea8b83d11994fad6">渗透-&gt;工具-&gt;DDOS</a> |</li> </ul> </li> <li>[<strong>391</strong>星][3d] [Py] <a href="https://github.com/random-robbie/my-shodan-scripts">random-robbie/my-shodan-scripts</a> Collection of Scripts for shodan searching stuff.</li> <li>[<strong>378</strong>星][2m] [Py] <a href="https://github.com/pielco11/fav-up">pielco11/fav-up</a> IP lookup from favicon using Shodan</li> <li>[<strong>234</strong>星][11m] [Py] <a href="https://github.com/nethunteros/punter">nethunteros/punter</a> 使用 DNSDumpster, WHOIS, Reverse WHOIS 挖掘域名</li> <li>[<strong>220</strong>星][6d] [Py] <a href="https://github.com/shodansploit/shodansploit">shodansploit/shodansploit</a></li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-94c01f488096fafc194b9a07f065594c"></a>nmap</h3><a id="user-content-nmap" class="anchor" aria-label="Permalink: nmap" href="#nmap"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>3609</strong>星][7d] [C] <a href="https://github.com/nmap/nmap">nmap/nmap</a> Nmap</li> <li>[<strong>2116</strong>星][7m] [Py] <a href="https://github.com/calebmadrigal/trackerjacker">calebmadrigal/trackerjacker</a> 映射你没连接到的Wifi网络, 类似于NMap, 另外可以追踪设备</li> <li>[<strong>1871</strong>星][20d] [Lua] <a href="https://github.com/vulnerscom/nmap-vulners">vulnerscom/nmap-vulners</a> NSE script based on Vulners.com API</li> <li>[<strong>1536</strong>星][5d] [C++] <a href="https://github.com/nmap/npcap">nmap/npcap</a> Nmap项目的针对Windows系统的数据包嗅探库,基于WinPcap/Libpcap,用NDIS6和LWF做了升级</li> <li>[<strong>1317</strong>星][3m] [Lua] <a href="https://github.com/scipag/vulscan">scipag/vulscan</a> Nmap 模块,将 Nmap 转化为高级漏洞扫描器</li> <li>[<strong>1029</strong>星][1m] [Shell] <a href="https://github.com/trimstray/sandmap">trimstray/sandmap</a> 使用NMap引擎, 辅助网络和系统侦查(reconnaissance)</li> <li>[<strong>887</strong>星][12m] [Py] <a href="https://github.com/rev3rsesecurity/webmap">rev3rsesecurity/webmap</a> Nmap Web Dashboard and Reporting</li> <li>[<strong>849</strong>星][5d] [Py] <a href="https://github.com/x90skysn3k/brutespray">x90skysn3k/brutespray</a> 获取 nmapGNMAP 输出,自动调用 Medusa 使用默认证书爆破服务(brute-forces services)</li> <li>[<strong>733</strong>星][5m] [Lua] <a href="https://github.com/cldrn/nmap-nse-scripts">cldrn/nmap-nse-scripts</a> My collection of nmap NSE scripts</li> <li>[<strong>696</strong>星][2m] [Py] <a href="https://github.com/iceyhexman/onlinetools">iceyhexman/onlinetools</a> 在线cms识别|信息泄露|工控|系统|物联网安全|cms漏洞扫描|nmap端口扫描|子域名获取|待续..</li> <li>[<strong>503</strong>星][1y] [XSLT] <a href="https://github.com/honze-net/nmap-bootstrap-xsl">honze-net/nmap-bootstrap-xsl</a> A Nmap XSL implementation with Bootstrap.</li> <li>[<strong>394</strong>星][8m] [Py] <a href="https://github.com/savon-noir/python-libnmap">savon-noir/python-libnmap</a> libnmap is a python library to run nmap scans, parse and diff scan results. It supports python 2.6 up to 3.4. It's wonderful.</li> <li>[<strong>328</strong>星][10m] [Py] <a href="https://github.com/samhaxr/hackbox">samhaxr/hackbox</a> 集合了某些Hacking工具和技巧的攻击工具</li> <li>[<strong>308</strong>星][1y] [Java] <a href="https://github.com/s4n7h0/halcyon">s4n7h0/halcyon</a> First IDE for Nmap Script (NSE) Development.</li> <li>[<strong>283</strong>星][1y] [Ruby] <a href="https://github.com/danmcinerney/pentest-machine">danmcinerney/pentest-machine</a> Automates some pentest jobs via nmap xml file</li> <li>[<strong>261</strong>星][1y] [Shell] <a href="https://github.com/m4ll0k/autonse">m4ll0k/autonse</a> Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner</li> <li>[<strong>257</strong>星][1y] [Java] <a href="https://github.com/danicuestasuarez/nmapgui">danicuestasuarez/nmapgui</a> Advanced Graphical User Interface for NMap</li> <li>[<strong>246</strong>星][8m] [Lua] <a href="https://github.com/rvn0xsy/nse_vuln">rvn0xsy/nse_vuln</a> Nmap扫描、漏洞利用脚本</li> <li>[<strong>233</strong>星][6m] [Py] <a href="https://github.com/maaaaz/nmaptocsv">maaaaz/nmaptocsv</a> A simple python script to convert Nmap output to CSV</li> <li>[<strong>223</strong>星][12d] [Py] <a href="https://github.com/rackerlabs/scantron">rackerlabs/scantron</a> A distributed nmap / masscan scanning framework</li> <li>[<strong>204</strong>星][6m] [Py] <a href="https://github.com/hellogoldsnakeman/masnmapscan-v1.0">hellogoldsnakeman/masnmapscan-v1.0</a> 一款端口扫描器。整合了masscan和nmap两款扫描器,masscan扫描端口,nmap扫描端口对应服务,二者结合起来实现了又快又好地扫描。并且加入了防火墙的功能</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-b0ca6c8512a268e8438d5e5247a88c2f"></a>文章</h2><a id="user-content-文章-4" class="anchor" aria-label="Permalink: 文章" href="#文章-4"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-5a855113503106950acff4d7dbb2403e"></a>新添加</h3><a id="user-content-新添加-1" class="anchor" aria-label="Permalink: 新添加" href="#新添加-1"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-546f4fe70faa2236c0fbc2d486a83391"></a>社工(SET)&amp;&amp;钓鱼&amp;&amp;鱼叉攻击</h1><a id="user-content-社工set钓鱼鱼叉攻击" class="anchor" aria-label="Permalink: 社工(SET)&amp;&amp;钓鱼&amp;&amp;鱼叉攻击" href="#社工set钓鱼鱼叉攻击"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-3e622bff3199cf22fe89db026b765cd4"></a>工具</h2><a id="user-content-工具-5" class="anchor" aria-label="Permalink: 工具" href="#工具-5"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-ce734598055ad3885d45d0b35d2bf0d7"></a>未分类-SET</h3><a id="user-content-未分类-set" class="anchor" aria-label="Permalink: 未分类-SET" href="#未分类-set"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1363</strong>星][2m] [CSS] <a href="https://github.com/undeadsec/socialfish">undeadsec/socialfish</a> 网络钓鱼培训与信息收集 <ul dir="auto"> <li>重复区段: <a href="#05ab1b75266fddafc7195f5b395e4d99">侦察-&gt;工具-&gt;未分类-OSINT</a> |</li> </ul> </li> <li>[<strong>754</strong>星][4m] [Py] <a href="https://github.com/threatexpress/domainhunter">threatexpress/domainhunter</a> Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names <ul dir="auto"> <li>重复区段: <a href="#05ab1b75266fddafc7195f5b395e4d99">侦察-&gt;工具-&gt;未分类-OSINT</a> |</li> </ul> </li> <li>[<strong>658</strong>星][18d] [Py] <a href="https://github.com/thewhiteh4t/seeker">thewhiteh4t/seeker</a> Accurately Locate Smartphones using Social Engineering</li> <li>[<strong>342</strong>星][2m] [Py] <a href="https://github.com/raikia/uhoh365">raikia/uhoh365</a> A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is unthrottled, and is incredibly useful for social engineering assessments to find which emails exist and which don't.</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-f30507893511f89b19934e082a54023e"></a>社工</h3><a id="user-content-社工" class="anchor" aria-label="Permalink: 社工" href="#社工"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>4966</strong>星][4d] [Py] <a href="https://github.com/trustedsec/social-engineer-toolkit">trustedsec/social-engineer-toolkit</a> The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-290e9ae48108d21d6d8b9ea9e74d077d"></a>钓鱼&amp;&amp;Phish</h3><a id="user-content-钓鱼phish" class="anchor" aria-label="Permalink: 钓鱼&amp;&amp;Phish" href="#钓鱼phish"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>8455</strong>星][8d] [Py] <a href="https://github.com/wifiphisher/wifiphisher">wifiphisher/wifiphisher</a> 流氓AP框架, 用于RedTeam和Wi-Fi安全测试 <ul dir="auto"> <li>重复区段: <a href="#d4efda1853b2cb0909727188116a2a8c">无线-&gt;未分类-WiFi</a> |</li> </ul> </li> <li>[<strong>4242</strong>星][4d] [Go] <a href="https://github.com/gophish/gophish">gophish/gophish</a> 网络钓鱼工具包</li> <li>[<strong>2829</strong>星][2m] [Go] <a href="https://github.com/kgretzky/evilginx2">kgretzky/evilginx2</a> 独立的MITM攻击工具,用于登录凭证钓鱼,可绕过双因素认证</li> <li>[<strong>2131</strong>星][2m] [Py] <a href="https://github.com/elceef/dnstwist">elceef/dnstwist</a> 域名置换引擎,用于检测打字错误,网络钓鱼和企业间谍活动 <ul dir="auto"> <li>重复区段: <a href="#a695111d8e30d645354c414cb27b7843">侦察-&gt;工具-&gt;DNS</a> |</li> </ul> </li> <li>[<strong>1400</strong>星][9m] [JS] <a href="https://github.com/anttiviljami/browser-autofill-phishing">anttiviljami/browser-autofill-phishing</a> A simple demo of phishing by abusing the browser autofill feature</li> <li>[<strong>1369</strong>星][10m] [HTML] <a href="https://github.com/thelinuxchoice/blackeye">thelinuxchoice/blackeye</a> The most complete Phishing Tool, with 32 templates +1 customizable</li> <li>[<strong>1019</strong>星][22d] [Py] <a href="https://github.com/securestate/king-phisher">securestate/king-phisher</a> Phishing Campaign Toolkit</li> <li>[<strong>996</strong>星][2m] [Py] <a href="https://github.com/x0rz/phishing_catcher">x0rz/phishing_catcher</a> 使用Certstream 捕获钓鱼域名</li> <li>[<strong>968</strong>星][19d] [HTML] <a href="https://github.com/darksecdevelopers/hiddeneye">darksecdevelopers/hiddeneye</a> Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]</li> <li>[<strong>918</strong>星][8m] [HTML] <a href="https://github.com/thelinuxchoice/shellphish">thelinuxchoice/shellphish</a> 针对18个社交媒体的钓鱼工具:Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers, Gitlab, Pinterest</li> <li>[<strong>842</strong>星][1m] [PHP] <a href="https://github.com/Raikia/FiercePhish">raikia/fiercephish</a> FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.</li> <li>[<strong>537</strong>星][2m] [Py] <a href="https://github.com/shellphish/driller">shellphish/driller</a> augmenting AFL with symbolic execution!</li> <li>[<strong>460</strong>星][4d] [Py] <a href="https://github.com/angr/rex">angr/rex</a> Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.</li> <li>[<strong>351</strong>星][5m] [Py] <a href="https://github.com/tatanus/spf">tatanus/spf</a> SpeedPhishing Framework</li> <li>[<strong>300</strong>星][11m] [Py] <a href="https://github.com/Mr-Un1k0d3r/CatMyPhish">mr-un1k0d3r/catmyphish</a> Search for categorized domain</li> <li>[<strong>274</strong>星][1m] [Go] <a href="https://github.com/muraenateam/muraena">muraenateam/muraena</a> Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.</li> <li>[<strong>242</strong>星][3m] [Py] <a href="https://github.com/atexio/mercure">atexio/mercure</a> 对员工进行网络钓鱼的培训</li> <li>[<strong>233</strong>星][1y] [Jupyter Notebook] <a href="https://github.com/wesleyraptor/streamingphish">wesleyraptor/streamingphish</a> 使用受监督的机器学习, 从证书透明度(Certificate Transparency)日志中检测钓鱼域名</li> <li>[<strong>228</strong>星][4m] [Py] <a href="https://github.com/duo-labs/isthislegit">duo-labs/isthislegit</a> 收集、分析和回复网络钓鱼邮件的框架</li> <li>[<strong>218</strong>星][9m] [Go] <a href="https://github.com/joncooperworks/judas">joncooperworks/judas</a> a phishing proxy</li> <li>[<strong>207</strong>星][3d] [JS] <a href="https://github.com/409h/etheraddresslookup">409h/etheraddresslookup</a> Adds links to strings that look like Ethereum addresses to your favourite blockchain explorer. Adds protection against private key phishing. Offers custom site bookmarks.</li> <li>[<strong>205</strong>星][3m] [Py] <a href="https://github.com/dionach/phemail">dionach/phemail</a> PhEmail is a python open source phishing email tool that automates the process of sending phishing emails as part of a social engineering test</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-ab3e6e6526d058e35c7091d8801ebf3a"></a>鱼叉攻击</h3><a id="user-content-鱼叉攻击" class="anchor" aria-label="Permalink: 鱼叉攻击" href="#鱼叉攻击"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-8f6c7489870c7358c39c920c83fa2b6b"></a>文章</h2><a id="user-content-文章-5" class="anchor" aria-label="Permalink: 文章" href="#文章-5"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-d7e332e9e235fd5a60687800f5ce184c"></a>新添加的</h3><a id="user-content-新添加的-5" class="anchor" aria-label="Permalink: 新添加的" href="#新添加的-5"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-dc89c90b80529c1f62f413288bca89c4"></a>环境配置&amp;&amp;分析系统</h1><a id="user-content-环境配置分析系统" class="anchor" aria-label="Permalink: 环境配置&amp;&amp;分析系统" href="#环境配置分析系统"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-9763d00cbe773aa10502dbe258f9c385"></a>工具</h2><a id="user-content-工具-6" class="anchor" aria-label="Permalink: 工具" href="#工具-6"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-f5a7a43f964b2c50825f3e2fee5078c8"></a>未分类-Env</h3><a id="user-content-未分类-env" class="anchor" aria-label="Permalink: 未分类-Env" href="#未分类-env"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1678</strong>星][2d] [HTML] <a href="https://github.com/clong/detectionlab">clong/detectionlab</a> Vagrant &amp; Packer scripts to build a lab environment complete with security tooling and logging best practices</li> <li>[<strong>1433</strong>星][11d] [Go] <a href="https://github.com/crazy-max/windowsspyblocker">crazy-max/windowsspyblocker</a></li> <li>[<strong>1308</strong>星][18d] [C] <a href="https://github.com/cisco-talos/pyrebox">cisco-talos/pyrebox</a> 逆向沙箱,基于QEMU,Python Scriptable</li> <li>[<strong>1229</strong>星][11m] [JS] <a href="https://github.com/mame82/p4wnp1_aloa">mame82/p4wnp1_aloa</a> 将 Rapsberry Pi Zero W 转变成灵活的渗透平台</li> <li>[<strong>827</strong>星][1m] <a href="https://github.com/redhuntlabs/redhunt-os">redhuntlabs/redhunt-os</a> Virtual Machine for Adversary Emulation and Threat Hunting</li> <li>[<strong>800</strong>星][3m] <a href="https://github.com/sh4hin/androl4b">sh4hin/androl4b</a> 用于评估Android应用程序,逆向工程和恶意软件分析的虚拟机</li> <li>[<strong>564</strong>星][6m] [Ruby] <a href="https://github.com/sliim/pentest-env">sliim/pentest-env</a> Pentest environment deployer (kali linux + targets) using vagrant and chef.</li> <li>[<strong>214</strong>星][12m] [Shell] <a href="https://github.com/proxycannon/proxycannon-ng">proxycannon/proxycannon-ng</a> 使用多个云环境构建私人僵尸网络, 用于渗透测试和RedTeaming</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-cf07b04dd2db1deedcf9ea18c05c83e0"></a>Linux-Distro</h3><a id="user-content-linux-distro" class="anchor" aria-label="Permalink: Linux-Distro" href="#linux-distro"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>2927</strong>星][4d] [Py] <a href="https://github.com/trustedsec/ptf">trustedsec/ptf</a> 创建基于Debian/Ubuntu/ArchLinux的渗透测试环境</li> <li>[<strong>2375</strong>星][18d] <a href="https://github.com/security-onion-solutions/security-onion">security-onion-solutions/security-onion</a> Linux distro for intrusion detection, enterprise security monitoring, and log management</li> <li>[<strong>1489</strong>星][t] [Shell] <a href="https://github.com/blackarch/blackarch">blackarch/blackarch</a> BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers.</li> <li>[<strong>347</strong>星][t] [Shell] <a href="https://github.com/archstrike/archstrike">archstrike/archstrike</a> An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-4709b10a8bb691204c0564a3067a0004"></a>环境自动配置&amp;&amp;自动安装</h3><a id="user-content-环境自动配置自动安装" class="anchor" aria-label="Permalink: 环境自动配置&amp;&amp;自动安装" href="#环境自动配置自动安装"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>3142</strong>星][3m] [PS] <a href="https://github.com/fireeye/commando-vm">fireeye/commando-vm</a> Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. <a href="mailto:commandovm@fireeye.com">commandovm@fireeye.com</a></li> <li>[<strong>1748</strong>星][2m] [PS] <a href="https://github.com/fireeye/flare-vm">fireeye/flare-vm</a> 火眼发布用于 Windows 恶意代码分析的虚拟机:FLARE VM</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-6454949c0d580904537643b8f4cd5a6b"></a>文章</h2><a id="user-content-文章-6" class="anchor" aria-label="Permalink: 文章" href="#文章-6"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-873294ea77bc292b6fc4cfb2f9b40049"></a>新添加的</h3><a id="user-content-新添加的-6" class="anchor" aria-label="Permalink: 新添加的" href="#新添加的-6"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-c49aef477cf3397f97f8b72185c3d100"></a>密码&amp;&amp;凭证&amp;&amp;认证</h1><a id="user-content-密码凭证认证" class="anchor" aria-label="Permalink: 密码&amp;&amp;凭证&amp;&amp;认证" href="#密码凭证认证"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-862af330f45f21fbb0d495837fc7e879"></a>工具</h2><a id="user-content-工具-7" class="anchor" aria-label="Permalink: 工具" href="#工具-7"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-20bf2e2fefd6de7aadbf0774f4921824"></a>未分类-Password</h3><a id="user-content-未分类-password" class="anchor" aria-label="Permalink: 未分类-Password" href="#未分类-password"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>4889</strong>星][13d] [Py] <a href="https://github.com/alessandroz/lazagne">alessandroz/lazagne</a> Credentials recovery project</li> <li>[<strong>1457</strong>星][1y] [Py] <a href="https://github.com/d4vinci/cr3dov3r">d4vinci/cr3dov3r</a> Know the dangers of credential reuse attacks.</li> <li>[<strong>1384</strong>星][24d] [Shell] <a href="https://github.com/drduh/pwd.sh">drduh/pwd.sh</a> GPG symmetric password manager</li> <li>[<strong>1282</strong>星][19d] [Py] <a href="https://github.com/pyauth/pyotp">pyauth/pyotp</a> Python One-Time Password Library</li> <li>[<strong>1034</strong>星][1y] [PS] <a href="https://github.com/danmcinerney/icebreaker">danmcinerney/icebreaker</a> Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment</li> <li>[<strong>1000</strong>星][10d] [Ruby] <a href="https://github.com/mdp/rotp">mdp/rotp</a> Ruby One Time Password library</li> <li>[<strong>913</strong>星][7d] [C] <a href="https://github.com/cossacklabs/themis">cossacklabs/themis</a> 用于存储或通信的加密库,可用于Swift, ObjC, Android, С++, JS, Python, Ruby, PHP, Go。</li> <li>[<strong>814</strong>星][9m] [Py] <a href="https://github.com/nccgroup/featherduster">nccgroup/featherduster</a> 自动化的密码分析工具,模块化</li> <li>[<strong>805</strong>星][2m] [Py] <a href="https://github.com/hellman/xortool">hellman/xortool</a> 分析多字节异或密码</li> <li>[<strong>740</strong>星][1m] [Py] <a href="https://github.com/ricterz/genpass">ricterz/genpass</a> 中国特色的弱口令生成器</li> <li>[<strong>523</strong>星][3m] [Py] <a href="https://github.com/unode/firefox_decrypt">unode/firefox_decrypt</a> Firefox Decrypt is a tool to extract passwords from Mozilla (Firefox/Thunderbird/SeaMonkey) profiles</li> <li>[<strong>507</strong>星][3m] [Py] <a href="https://github.com/byt3bl33d3r/sprayingtoolkit">byt3bl33d3r/sprayingtoolkit</a> Scripts to make password spraying attacks against Lync/S4B &amp; OWA a lot quicker, less painful and more efficient</li> <li>[<strong>485</strong>星][1y] [JS] <a href="https://github.com/emilbayes/secure-password">emilbayes/secure-password</a> Making Password storage safer for all</li> <li>[<strong>454</strong>星][1y] [Go] <a href="https://github.com/ncsa/ssh-auditor">ncsa/ssh-auditor</a> 扫描网络中的弱SSH密码</li> <li>[<strong>399</strong>星][2m] [Py] <a href="https://github.com/x899/chrome_password_grabber">x899/chrome_password_grabber</a> Get unencrypted 'Saved Password' from Google Chrome</li> <li>[<strong>391</strong>星][1y] [Shell] <a href="https://github.com/mthbernardes/sshlooter">mthbernardes/sshlooter</a> Script to steal passwords from ssh.</li> <li>[<strong>369</strong>星][4m] [Ruby] <a href="https://github.com/digininja/pipal">digininja/pipal</a> Pipal, THE password analyser</li> <li>[<strong>361</strong>星][21d] [Py] <a href="https://github.com/davidtavarez/pwndb">davidtavarez/pwndb</a> Search for leaked credentials</li> <li>[<strong>341</strong>星][11m] [C] <a href="https://github.com/1clickman/3snake">1clickman/3snake</a> reads memory from sshd and sudo system calls that handle password based authentication</li> <li>[<strong>295</strong>星][6m] [C#] <a href="https://github.com/raikia/credninja">raikia/credninja</a> A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale via SMB, plus now with a user hunter</li> <li>[<strong>290</strong>星][3m] [JS] <a href="https://github.com/kspearrin/ff-password-exporter">kspearrin/ff-password-exporter</a> Easily export your passwords from Firefox.</li> <li>[<strong>289</strong>星][7m] [Shell] <a href="https://github.com/Greenwolf/Spray">greenwolf/spray</a> A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)</li> <li>[<strong>286</strong>星][17d] [Py] <a href="https://github.com/xfreed0m/rdpassspray">xfreed0m/rdpassspray</a> Python3 tool to perform password spraying using RDP</li> <li>[<strong>256</strong>星][5m] [C] <a href="https://github.com/rub-syssec/omen">rub-syssec/omen</a> Ordered Markov ENumerator - Password Guesser</li> <li>[<strong>212</strong>星][4m] [Ruby] <a href="https://github.com/bdmac/strong_password">bdmac/strong_password</a> Entropy-based password strength checking for Ruby and Rails.</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-86dc226ae8a71db10e4136f4b82ccd06"></a>密码</h3><a id="user-content-密码" class="anchor" aria-label="Permalink: 密码" href="#密码"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>7035</strong>星][t] [C] <a href="https://github.com/hashcat/hashcat">hashcat/hashcat</a> 世界上最快最先进的密码恢复工具 <ul dir="auto"> <li>重复区段: <a href="#12abc279c69d1fcf10692b9cb89bcdf7">后渗透-&gt;工具-&gt;未分类-post-exp</a> |</li> </ul> </li> <li>[<strong>5173</strong>星][1y] [JS] <a href="https://github.com/samyk/poisontap">samyk/poisontap</a> Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero &amp; Node.js.</li> <li>[<strong>3209</strong>星][2d] [C] <a href="https://github.com/magnumripper/johntheripper">magnumripper/johntheripper</a> This is the official repo for John the Ripper, "Jumbo" version. The "bleeding-jumbo" branch is based on 1.9.0-Jumbo-1 which was released on May 14, 2019. An import of the "core" version of john this jumbo was based on (or newer) is found in the "master" branch (CVS:</li> <li>[<strong>2583</strong>星][2m] [C] <a href="https://github.com/huntergregal/mimipenguin">huntergregal/mimipenguin</a> dump 当前Linux用户的登录密码</li> <li>[<strong>1162</strong>星][8m] [Py] <a href="https://github.com/mebus/cupp">mebus/cupp</a> Common User Passwords Profiler (CUPP)</li> <li>[<strong>874</strong>星][5m] [Go] <a href="https://github.com/fireeye/gocrack">fireeye/gocrack</a> 火眼开源的密码破解工具,可以跨多个 GPU 服务器执行任务</li> <li>[<strong>852</strong>星][3m] [Go] <a href="https://github.com/ukhomeoffice/repo-security-scanner">ukhomeoffice/repo-security-scanner</a> CLI tool that finds secrets accidentally committed to a git repo, eg passwords, private keys</li> <li>[<strong>652</strong>星][1y] [Java] <a href="https://github.com/faizann24/wifi-bruteforcer-fsecurify">faizann24/wifi-bruteforcer-fsecurify</a> Android app,无需 Root 即可爆破 Wifi 密码</li> <li>[<strong>602</strong>星][7m] [C] <a href="https://github.com/hashcat/hashcat-utils">hashcat/hashcat-utils</a> Small utilities that are useful in advanced password cracking</li> <li>[<strong>598</strong>星][1y] [Py] <a href="https://github.com/brannondorsey/passgan">brannondorsey/passgan</a> A Deep Learning Approach for Password Guessing (</li> <li>[<strong>593</strong>星][4m] [Py] <a href="https://github.com/thewhiteh4t/pwnedornot">thewhiteh4t/pwnedornot</a> OSINT Tool for Finding Passwords of Compromised Email Addresses</li> <li>[<strong>493</strong>星][1y] [PS] <a href="https://github.com/dafthack/domainpasswordspray">dafthack/domainpasswordspray</a> DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will automatically generate the userlist from the domain. BE VERY CAREFUL NOT TO LOCKOUT ACCOUNTS!</li> <li>[<strong>353</strong>星][8m] [Py] <a href="https://github.com/iphelix/pack">iphelix/pack</a> PACK (Password Analysis and Cracking Kit)</li> <li>[<strong>334</strong>星][2m] [CSS] <a href="https://github.com/guyoung/captfencoder">guyoung/captfencoder</a> CaptfEncoder是一款跨平台网络安全工具套件,提供网络安全相关编码转换、古典密码、密码学、特殊编码等工具,并聚合各类在线工具。</li> <li>[<strong>333</strong>星][26d] [JS] <a href="https://github.com/auth0/repo-supervisor">auth0/repo-supervisor</a> Serverless工具,在pull请求中扫描源码,搜索密码及其他秘密</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-764122f9a7cf936cd9bce316b09df5aa"></a>认证&amp;&amp;Authenticate</h3><a id="user-content-认证authenticate" class="anchor" aria-label="Permalink: 认证&amp;&amp;Authenticate" href="#认证authenticate"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>901</strong>星][1m] [Go] <a href="https://github.com/smallstep/cli">smallstep/cli</a> 🧰 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.</li> <li>[<strong>665</strong>星][9m] [C] <a href="https://github.com/samdenty/Wi-PWN">samdenty/wi-pwn</a> performs deauth attacks on cheap Arduino boards</li> <li>[<strong>298</strong>星][15d] [Java] <a href="https://github.com/shred/acme4j">shred/acme4j</a> a protocol that a certificate authority (CA) and an applicant can use to automate the process of verification and certificate issuance</li> <li>[<strong>281</strong>星][4m] [Java] <a href="https://github.com/ztosec/secscan-authcheck">ztosec/secscan-authcheck</a> 越权检测工具</li> <li>[<strong>214</strong>星][1y] [C#] <a href="https://github.com/leechristensen/spoolsample">leechristensen/spoolsample</a> PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as well.</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-5fda419e854b390c8361d347f48607ce"></a>文章</h2><a id="user-content-文章-7" class="anchor" aria-label="Permalink: 文章" href="#文章-7"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-776c034543a65be69c061d1aafce3127"></a>新添加的</h3><a id="user-content-新添加的-7" class="anchor" aria-label="Permalink: 新添加的" href="#新添加的-7"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-43b0310ac54c147a62c545a2b0f4bce2"></a>辅助周边</h1><a id="user-content-辅助周边" class="anchor" aria-label="Permalink: 辅助周边" href="#辅助周边"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-569887799ee0148230cc5d7bf98e96d0"></a>未分类-Assist</h2><a id="user-content-未分类-assist" class="anchor" aria-label="Permalink: 未分类-Assist" href="#未分类-assist"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>26031</strong>星][3d] [Py] <a href="https://github.com/certbot/certbot">certbot/certbot</a> Certbot is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server. It can also act as a client for any other CA that uses the ACME protocol.</li> <li>[<strong>7784</strong>星][2d] [JS] <a href="https://github.com/gchq/cyberchef">gchq/cyberchef</a> The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis</li> <li>[<strong>4909</strong>星][3m] [Rust] <a href="https://github.com/sharkdp/hexyl">sharkdp/hexyl</a> 命令行中查看hex</li> <li>[<strong>4402</strong>星][] [JS] <a href="https://github.com/cure53/dompurify">cure53/dompurify</a> a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:</li> <li>[<strong>3239</strong>星][7m] [HTML] <a href="https://github.com/leizongmin/js-xss">leizongmin/js-xss</a> Sanitize untrusted HTML (to prevent XSS) with a configuration specified by a Whitelist</li> <li>[<strong>3097</strong>星][8d] [Shell] <a href="https://github.com/trimstray/htrace.sh">trimstray/htrace.sh</a> My simple Swiss Army knife for http/https troubleshooting and profiling.</li> <li>[<strong>1223</strong>星][1y] [Go] <a href="https://github.com/cloudflare/redoctober">cloudflare/redoctober</a> Go server for two-man rule style file encryption and decryption.</li> <li>[<strong>1022</strong>星][9m] [Go] <a href="https://github.com/maliceio/malice">maliceio/malice</a> 开源版的VirusTotal</li> <li>[<strong>508</strong>星][6d] [Py] <a href="https://github.com/certtools/intelmq">certtools/intelmq</a> IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.</li> <li>[<strong>481</strong>星][5m] [JS] <a href="https://github.com/ehrishirajsharma/swiftnessx">ehrishirajsharma/swiftnessx</a> A cross-platform note-taking &amp; target-tracking app for penetration testers.</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-86d5daccb4ed597e85a0ec9c87f3c66f"></a>TLS&amp;&amp;SSL&amp;&amp;HTTPS</h2><a id="user-content-tlssslhttps" class="anchor" aria-label="Permalink: TLS&amp;&amp;SSL&amp;&amp;HTTPS" href="#tlssslhttps"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>22020</strong>星][23d] [Go] <a href="https://github.com/filosottile/mkcert">filosottile/mkcert</a> A simple zero-config tool to make locally trusted development certificates with any names you'd like.</li> <li>[<strong>4322</strong>星][12d] [Py] <a href="https://github.com/diafygi/acme-tiny">diafygi/acme-tiny</a> A tiny script to issue and renew TLS certs from Let's Encrypt</li> <li>[<strong>1694</strong>星][9d] [HTML] <a href="https://github.com/chromium/badssl.com">chromium/badssl.com</a></li> <li>[<strong>1230</strong>星][1m] [Go] <a href="https://github.com/jsha/minica">jsha/minica</a> minica is a small, simple CA intended for use in situations where the CA operator also operates each host where a certificate will be used.</li> <li>[<strong>1211</strong>星][2d] [Go] <a href="https://github.com/smallstep/certificates">smallstep/certificates</a> 私有的证书颁发机构(X.509和SSH)和ACME服务器,用于安全的自动证书管理,因此您可以在SSH和SSO处使用TLS</li> <li>[<strong>833</strong>星][10m] [Py] <a href="https://github.com/ietf-wg-acme/acme">ietf-wg-acme/acme</a> A protocol for automating certificate issuance</li> <li>[<strong>740</strong>星][21d] [Shell] <a href="https://github.com/dokku/dokku-letsencrypt">dokku/dokku-letsencrypt</a> BETA: Automatic Let's Encrypt TLS Certificate installation for dokku</li> <li>[<strong>691</strong>星][5m] [C++] <a href="https://github.com/google/certificate-transparency">google/certificate-transparency</a> Auditing for TLS certificates.</li> <li>[<strong>512</strong>星][1m] [Java] <a href="https://github.com/rub-nds/tls-attacker">rub-nds/tls-attacker</a> TLS-Attacker is a Java-based framework for analyzing TLS libraries. It is developed by the Ruhr University Bochum (</li> <li>[<strong>469</strong>星][3m] [Go] <a href="https://github.com/square/certigo">square/certigo</a> A utility to examine and validate certificates in a variety of formats</li> <li>[<strong>279</strong>星][1m] [Shell] <a href="https://github.com/trimstray/mkchain">trimstray/mkchain</a> 建立从根证书到最终用户证书的有效的SSL证书链, 修复不完整的证书链并下载所有缺少的CA证书</li> <li>[<strong>229</strong>星][7m] [Shell] <a href="https://github.com/r00t-3xp10it/meterpreter_paranoid_mode-ssl">r00t-3xp10it/meterpreter_paranoid_mode-ssl</a> Meterpreter Paranoid Mode - SSL/TLS connections</li> <li>[<strong>225</strong>星][12m] [Shell] <a href="https://github.com/nviso-be/magisktrustusercerts">nviso-be/magisktrustusercerts</a> A Magisk module that automatically adds user certificates to the system root CA store</li> </ul> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-946d766c6a0fb23b480ff59d4029ec71"></a>防护&amp;&amp;Defense</h1><a id="user-content-防护defense" class="anchor" aria-label="Permalink: 防护&amp;&amp;Defense" href="#防护defense"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-0abd611fc3e9a4d9744865ca6e47a6b2"></a>工具</h2><a id="user-content-工具-8" class="anchor" aria-label="Permalink: 工具" href="#工具-8"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-7a277f8b0e75533e0b50d93c902fb351"></a>未分类-Defense</h3><a id="user-content-未分类-defense" class="anchor" aria-label="Permalink: 未分类-Defense" href="#未分类-defense"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>9862</strong>星][9m] <a href="https://github.com/imthenachoman/how-to-secure-a-linux-server">imthenachoman/how-to-secure-a-linux-server</a> An evolving how-to guide for securing a Linux server.</li> <li>[<strong>747</strong>星][12m] [Py] <a href="https://github.com/infobyte/spoilerwall">infobyte/spoilerwall</a> Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!</li> <li>[<strong>657</strong>星][6m] [TeX] <a href="https://github.com/bettercrypto/applied-crypto-hardening">bettercrypto/applied-crypto-hardening</a> Best Current Practices regarding secure online communication and configuration of services using cryptography.</li> <li>[<strong>639</strong>星][2d] [Py] <a href="https://github.com/binarydefense/artillery">binarydefense/artillery</a> The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.</li> <li>[<strong>589</strong>星][21d] [Ruby] <a href="https://github.com/dev-sec/ansible-ssh-hardening">dev-sec/ansible-ssh-hardening</a> This Ansible role provides numerous security-related ssh configurations, providing all-round base protection.</li> <li>[<strong>570</strong>星][29d] [Py] <a href="https://github.com/graphenex/graphenex">graphenex/graphenex</a> Automated System Hardening Framework</li> <li>[<strong>499</strong>星][8m] <a href="https://github.com/ernw/hardening">ernw/hardening</a> Repository of Hardening Guides</li> <li>[<strong>241</strong>星][20d] [Py] <a href="https://github.com/a13xp0p0v/kconfig-hardened-check">a13xp0p0v/kconfig-hardened-check</a> A script for checking the hardening options in the Linux kernel config</li> <li>[<strong>217</strong>星][27d] [Puppet] <a href="https://github.com/dev-sec/puppet-os-hardening">dev-sec/puppet-os-hardening</a> This puppet module provides numerous security-related configurations, providing all-round base protection.</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-784ea32a3f4edde1cd424b58b17e7269"></a>WAF</h3><a id="user-content-waf" class="anchor" aria-label="Permalink: WAF" href="#waf"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>5094</strong>星][2m] [Lua] <a href="https://github.com/alexazhou/verynginx">alexazhou/verynginx</a> A very powerful and friendly nginx base on lua-nginx-module( openresty ) which provide WAF, Control Panel, and Dashboards.</li> <li>[<strong>3294</strong>星][3m] [C] <a href="https://github.com/nbs-system/naxsi">nbs-system/naxsi</a> NAXSI is an open-source, high performance, low rules maintenance WAF for NGINX</li> <li>[<strong>3207</strong>星][1m] [C++] <a href="https://github.com/spiderlabs/modsecurity">spiderlabs/modsecurity</a> ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx that is developed by Trustwave's SpiderLabs. It has a robust event-based programming language which provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring, logging and real-time analys…</li> <li>[<strong>619</strong>星][3m] [Py] <a href="https://github.com/3xp10it/xwaf">3xp10it/xwaf</a> waf 自动爆破(绕过)工具</li> <li>[<strong>617</strong>星][4m] [Lua] <a href="https://github.com/jx-sec/jxwaf">jx-sec/jxwaf</a> JXWAF(锦衣盾)是一款基于openresty(nginx+lua)开发的web应用防火墙</li> <li>[<strong>552</strong>星][8m] [Py] <a href="https://github.com/s0md3v/Blazy">s0md3v/blazy</a> Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .</li> <li>[<strong>540</strong>星][4d] [Go] <a href="https://github.com/janusec/janusec">janusec/janusec</a> Janusec Application Gateway, a Golang based application security solution which provides WAF (Web Application Firewall), CC attack defense, unified web administration portal, private key protection, web routing and scalable load balancing.</li> <li>[<strong>481</strong>星][8m] [Java] <a href="https://github.com/chengdedeng/waf">chengdedeng/waf</a></li> <li>[<strong>452</strong>星][3d] [PHP] <a href="https://github.com/akaunting/firewall">akaunting/firewall</a> Web Application Firewall (WAF) package for Laravel</li> <li>[<strong>433</strong>星][9m] [Py] <a href="https://github.com/aws-samples/aws-waf-sample">aws-samples/aws-waf-sample</a> This repository contains example scripts and sets of rules for the AWS WAF service. Please be aware that the applicability of these examples to specific workloads may vary.</li> <li>[<strong>423</strong>星][6d] [Py] <a href="https://github.com/awslabs/aws-waf-security-automations">awslabs/aws-waf-security-automations</a> This solution automatically deploys a single web access control list (web ACL) with a set of AWS WAF rules designed to filter common web-based attacks.</li> <li>[<strong>415</strong>星][5d] [C#] <a href="https://github.com/jbe2277/waf">jbe2277/waf</a> Win Application Framework (WAF) is a lightweight Framework that helps you to create well structured XAML Applications.</li> <li>[<strong>412</strong>星][11m] [C] <a href="https://github.com/titansec/openwaf">titansec/openwaf</a> Web security protection system based on openresty</li> <li>[<strong>384</strong>星][6d] [PHP] <a href="https://github.com/terrylinooo/shieldon">terrylinooo/shieldon</a> Web Application Firewall (WAF) for PHP.</li> <li>[<strong>248</strong>星][1y] [Py] <a href="https://github.com/warflop/cloudbunny">warflop/cloudbunny</a> CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search engines to search domain information: Shodan, Censys and Zoomeye.</li> <li>[<strong>216</strong>星][1m] [Py] <a href="https://github.com/stamparm/identywaf">stamparm/identywaf</a> Blind WAF identification tool</li> <li>[<strong>209</strong>星][7m] [C] <a href="https://github.com/coolervoid/raptor_waf">coolervoid/raptor_waf</a> Raptor - WAF - Web application firewall using DFA [ Current version ] - Beta</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-ce6532938f729d4c9d66a5c75d1676d3"></a>防火墙&amp;&amp;FireWall</h3><a id="user-content-防火墙firewall" class="anchor" aria-label="Permalink: 防火墙&amp;&amp;FireWall" href="#防火墙firewall"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>4209</strong>星][2m] [Py] <a href="https://github.com/evilsocket/opensnitch">evilsocket/opensnitch</a> opensnitch:Little Snitch 应用程序防火墙的 GNU/Linux 版本。(Little Snitch:Mac操作系统的应用程序防火墙,能防止应用程序在你不知道的情况下自动访问网络)</li> <li>[<strong>3283</strong>星][11d] [ObjC] <a href="https://github.com/objective-see/lulu">objective-see/lulu</a> LuLu is the free macOS firewall</li> <li>[<strong>1542</strong>星][6d] [Java] <a href="https://github.com/ukanth/afwall">ukanth/afwall</a> AFWall+ (Android Firewall +) - iptables based firewall for Android</li> <li>[<strong>1095</strong>星][3m] [PHP] <a href="https://github.com/antonioribeiro/firewall">antonioribeiro/firewall</a> Firewall package for Laravel applications</li> <li>[<strong>1049</strong>星][8d] [Shell] <a href="https://github.com/firehol/firehol">firehol/firehol</a> A firewall for humans...</li> <li>[<strong>852</strong>星][20d] <a href="https://github.com/trimstray/iptables-essentials">trimstray/iptables-essentials</a> Common Firewall Rules and Commands.</li> <li>[<strong>567</strong>星][7m] [Go] <a href="https://github.com/sysdream/chashell">sysdream/chashell</a> Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.</li> <li>[<strong>468</strong>星][6m] [Shell] <a href="https://github.com/vincentcox/bypass-firewalls-by-dns-history">vincentcox/bypass-firewalls-by-dns-history</a> Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.</li> <li>[<strong>279</strong>星][11d] [Shell] <a href="https://github.com/geerlingguy/ansible-role-firewall">geerlingguy/ansible-role-firewall</a> Ansible Role - iptables Firewall configuration.</li> <li>[<strong>261</strong>星][2m] [C#] <a href="https://github.com/wokhansoft/wfn">wokhansoft/wfn</a> Windows Firewall Notifier extends the default Windows embedded firewall by allowing to handle and notify about outgoing connections, offers real time connections monitoring, connections map, bandwidth usage monitoring and more...</li> <li>[<strong>260</strong>星][4d] [Ruby] <a href="https://github.com/puppetlabs/puppetlabs-firewall">puppetlabs/puppetlabs-firewall</a> Puppet Firewall Module</li> <li>[<strong>240</strong>星][7d] [Shell] <a href="https://github.com/essandess/macos-fortress">essandess/macos-fortress</a> Firewall and Privatizing Proxy for Trackers, Attackers, Malware, Adware, and Spammers with Anti-Virus On-Demand and On-Access Scanning (PF, squid, privoxy, hphosts, dshield, emergingthreats, hostsfile, PAC file, clamav)</li> <li>[<strong>220</strong>星][1y] [Go] <a href="https://github.com/maksadbek/tcpovericmp">maksadbek/tcpovericmp</a> TCP implementation over ICMP protocol to bypass firewalls</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-ff3e0b52a1477704b5f6a94ccf784b9a"></a>IDS&amp;&amp;IPS</h3><a id="user-content-idsips" class="anchor" aria-label="Permalink: IDS&amp;&amp;IPS" href="#idsips"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>2938</strong>星][4d] [Zeek] <a href="https://github.com/zeek/zeek">zeek/zeek</a> Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.</li> <li>[<strong>2852</strong>星][10d] [C] <a href="https://github.com/ossec/ossec-hids">ossec/ossec-hids</a> 入侵检测系统</li> <li>[<strong>1622</strong>星][2m] [Go] <a href="https://github.com/ysrc/yulong-hids">ysrc/yulong-hids</a> 一款由 YSRC 开源的主机入侵检测系统</li> <li>[<strong>1325</strong>星][9d] [C] <a href="https://github.com/OISF/suricata">oisf/suricata</a> a network IDS, IPS and NSM engine</li> <li>[<strong>581</strong>星][5d] [Py] <a href="https://github.com/0kee-team/watchad">0kee-team/watchad</a> AD Security Intrusion Detection System</li> <li>[<strong>512</strong>星][5m] [C] <a href="https://github.com/decaf-project/DECAF">decaf-project/decaf</a> DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidScope is now an extension to DECAF.</li> <li>[<strong>499</strong>星][8m] [Shell] <a href="https://github.com/stamusnetworks/selks">stamusnetworks/selks</a> A Suricata based IDS/IPS distro</li> <li>[<strong>383</strong>星][7m] <a href="https://github.com/jnusimba/androidsecnotes">jnusimba/androidsecnotes</a> some learning notes about Android Security</li> <li>[<strong>298</strong>星][4d] [C] <a href="https://github.com/EBWi11/AgentSmith-HIDS">ebwi11/agentsmith-hids</a> By Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.</li> <li>[<strong>248</strong>星][1y] [Perl] <a href="https://github.com/mrash/psad">mrash/psad</a> iptables 的入侵检测和日志分析</li> <li>[<strong>225</strong>星][1m] [Py] <a href="https://github.com/secureworks/dalton">secureworks/dalton</a> 使用预定义/指定的规则, 针对IDS传感器(例如Snort/Suricata)进行网络数据包捕获</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-6543c237786d1f334d375f4d9acdeee4"></a>隐私保护&amp;&amp;Privacy</h3><a id="user-content-隐私保护privacy" class="anchor" aria-label="Permalink: 隐私保护&amp;&amp;Privacy" href="#隐私保护privacy"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>3236</strong>星][5m] [Go] <a href="https://github.com/meshbird/meshbird">meshbird/meshbird</a> cloud-native multi-region multi-cloud decentralized private networking</li> <li>[<strong>1069</strong>星][20d] [Py] <a href="https://github.com/yelp/detect-secrets">yelp/detect-secrets</a> An enterprise friendly way of detecting and preventing secrets in code.</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-5aac7367edfef7c63fc95afd6762b773"></a>文章</h2><a id="user-content-文章-8" class="anchor" aria-label="Permalink: 文章" href="#文章-8"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-04aac0e81b87788343930e9dbf01ba9c"></a>新添加的</h3><a id="user-content-新添加的-8" class="anchor" aria-label="Permalink: 新添加的" href="#新添加的-8"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-52b481533d065d9e80cfd3cca9d91c7f"></a>SoftwareDefinedRadio</h1><a id="user-content-softwaredefinedradio" class="anchor" aria-label="Permalink: SoftwareDefinedRadio" href="#softwaredefinedradio"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-015984b1dae0c9aa03b3aa74ea449f3f"></a>工具</h2><a id="user-content-工具-9" class="anchor" aria-label="Permalink: 工具" href="#工具-9"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>934</strong>星][1y] [C++] <a href="https://github.com/miek/inspectrum">miek/inspectrum</a> analysing captured signals, primarily from software-defined radio receivers.</li> <li>[<strong>454</strong>星][10m] [C] <a href="https://github.com/martinmarinov/tempestsdr">martinmarinov/tempestsdr</a> Remote video eavesdropping using a software-defined radio platform</li> <li>[<strong>369</strong>星][4d] [Py] <a href="https://github.com/p1sec/qcsuper">p1sec/qcsuper</a> QCSuper is a tool communicating with Qualcomm-based phones and modems, allowing to capture raw 2G/3G/4G radio frames, among other things.</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-043e62cc373eb3e7b3910b622cf220d8"></a>文章</h2><a id="user-content-文章-9" class="anchor" aria-label="Permalink: 文章" href="#文章-9"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-507f1a48f4709abb1c6b0d2689fd15e6"></a>LOLBin&amp;&amp;LOLScript</h1><a id="user-content-lolbinlolscript" class="anchor" aria-label="Permalink: LOLBin&amp;&amp;LOLScript" href="#lolbinlolscript"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-ec32edc7b3e441f29c70f6e9bca0174a"></a>工具</h2><a id="user-content-工具-10" class="anchor" aria-label="Permalink: 工具" href="#工具-10"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1433</strong>星][1m] [XSLT] <a href="https://github.com/lolbas-project/lolbas">lolbas-project/lolbas</a> Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)</li> <li>[<strong>1349</strong>星][1y] [XSLT] <a href="https://github.com/api0cradle/lolbas">api0cradle/lolbas</a> Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-9bffad3ac781090ab31d4013bf858dd9"></a>文章</h2><a id="user-content-文章-10" class="anchor" aria-label="Permalink: 文章" href="#文章-10"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-e25d233159b1dc40898ff0c74574f790"></a>日志&amp;&amp;Log</h1><a id="user-content-日志log" class="anchor" aria-label="Permalink: 日志&amp;&amp;Log" href="#日志log"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-13df0f4d5c7a1386b329fd9e43d8fc15"></a>工具</h2><a id="user-content-工具-11" class="anchor" aria-label="Permalink: 工具" href="#工具-11"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-06e7d46942d5159d19aa5c36f66f174a"></a>文章</h2><a id="user-content-文章-11" class="anchor" aria-label="Permalink: 文章" href="#文章-11"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-9b026a07fdf243c6870ce91f00191214"></a>威胁狩猎&amp;&amp;ThreatHunt</h1><a id="user-content-威胁狩猎threathunt" class="anchor" aria-label="Permalink: 威胁狩猎&amp;&amp;ThreatHunt" href="#威胁狩猎threathunt"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-b911aad7512e253660092942e06d00ad"></a>工具</h2><a id="user-content-工具-12" class="anchor" aria-label="Permalink: 工具" href="#工具-12"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-0b27f97199330c4945572a1f9c229000"></a>未分类</h3><a id="user-content-未分类-4" class="anchor" aria-label="Permalink: 未分类" href="#未分类-4"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1998</strong>星][10d] [Py] <a href="https://github.com/momosecurity/aswan">momosecurity/aswan</a> 陌陌风控系统静态规则引擎,零基础简易便捷的配置多种复杂规则,实时高效管控用户异常行为。</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-f613271a55b177f626b42b8c728a0b1c"></a>文章</h2><a id="user-content-文章-12" class="anchor" aria-label="Permalink: 文章" href="#文章-12"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-3828e67170e5db714c9c16f663b42a5e"></a>新添加的</h3><a id="user-content-新添加的-9" class="anchor" aria-label="Permalink: 新添加的" href="#新添加的-9"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-d6b02213a74372407371f77dd6e39c99"></a>Crypto&amp;&amp;加密&amp;&amp;密码学</h1><a id="user-content-crypto加密密码学" class="anchor" aria-label="Permalink: Crypto&amp;&amp;加密&amp;&amp;密码学" href="#crypto加密密码学"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-41d260119ad54db2739a9ae393bd87a5"></a>工具</h2><a id="user-content-工具-13" class="anchor" aria-label="Permalink: 工具" href="#工具-13"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>2151</strong>星][5d] [Java] <a href="https://github.com/google/wycheproof">google/wycheproof</a> Project Wycheproof tests crypto libraries against known attacks.</li> <li>[<strong>1077</strong>星][3m] [C] <a href="https://github.com/tpruvot/cpuminer-multi">tpruvot/cpuminer-multi</a> crypto cpuminer (linux + windows)</li> <li>[<strong>448</strong>星][14d] [Py] <a href="https://github.com/sidechannelmarvels/deadpool">sidechannelmarvels/deadpool</a> Repository of various public white-box cryptographic implementations and their practical attacks.</li> <li>[<strong>378</strong>星][2m] [C++] <a href="https://github.com/crypto2011/idr">crypto2011/idr</a> Interactive Delphi Reconstructor</li> <li>[<strong>214</strong>星][5m] [Shell] <a href="https://github.com/cryptolok/crykex">cryptolok/crykex</a> Linux Memory Cryptographic Keys Extractor</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-cc043f672c90d4b834cdae80bfbe8851"></a>文章</h2><a id="user-content-文章-13" class="anchor" aria-label="Permalink: 文章" href="#文章-13"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-8cb1c42a29fa3e8825a0f8fca780c481"></a>恶意代码&amp;&amp;Malware&amp;&amp;APT</h1><a id="user-content-恶意代码malwareapt" class="anchor" aria-label="Permalink: 恶意代码&amp;&amp;Malware&amp;&amp;APT" href="#恶意代码malwareapt"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-e2fd0947924229d7de24b9902e1f54a0"></a>工具</h2><a id="user-content-工具-14" class="anchor" aria-label="Permalink: 工具" href="#工具-14"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>2058</strong>星][2m] [C++] <a href="https://github.com/lordnoteworthy/al-khaser">lordnoteworthy/al-khaser</a> 在野恶意软件使用的技术:虚拟机,仿真,调试器,沙盒检测。 <ul dir="auto"> <li>重复区段: <a href="#2e40f2f1df5d7f93a7de47bf49c24a0e">渗透-&gt;工具-&gt;未分类-Pentest</a> |</li> </ul> </li> <li>[<strong>893</strong>星][1m] <a href="https://github.com/aptnotes/data">aptnotes/data</a> APTnotes data</li> <li>[<strong>219</strong>星][8d] [JS] <a href="https://github.com/strangerealintel/cyberthreatintel">strangerealintel/cyberthreatintel</a> Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups</li> <li>[<strong>203</strong>星][4m] [Py] <a href="https://github.com/thesph1nx/absolutezero">thesph1nx/absolutezero</a> Python APT Backdoor 1.0.0.1</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-cfffc63a6302bd3aa79a0305ed7afd55"></a>文章</h2><a id="user-content-文章-14" class="anchor" aria-label="Permalink: 文章" href="#文章-14"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-7d5d2d22121ed8456f0c79098f5012bb"></a>REST_API&amp;&amp;RESTFUL</h1><a id="user-content-rest_apirestful" class="anchor" aria-label="Permalink: REST_API&amp;&amp;RESTFUL" href="#rest_apirestful"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-3b127f2a89bc8d18b4ecb0d9c61f1d58"></a>工具</h2><a id="user-content-工具-15" class="anchor" aria-label="Permalink: 工具" href="#工具-15"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1233</strong>星][9m] [Py] <a href="https://github.com/flipkart-incubator/astra">flipkart-incubator/astra</a> 自动化的REST API安全测试脚本</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-b16baff7e1b11133efecf1b5b6e10aab"></a>文章</h2><a id="user-content-文章-15" class="anchor" aria-label="Permalink: 文章" href="#文章-15"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-ceb90405292daed9bb32ac20836c219a"></a>蓝牙&amp;&amp;Bluetooth</h1><a id="user-content-蓝牙bluetooth" class="anchor" aria-label="Permalink: 蓝牙&amp;&amp;Bluetooth" href="#蓝牙bluetooth"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-c72811e491c68f75ac2e7eb7afd3b01f"></a>工具</h2><a id="user-content-工具-16" class="anchor" aria-label="Permalink: 工具" href="#工具-16"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>274</strong>星][19d] [Py] <a href="https://github.com/ghostop14/sparrow-wifi">ghostop14/sparrow-wifi</a> Next-Gen GUI-based WiFi and Bluetooth Analyzer for Linux <ul dir="auto"> <li>重复区段: <a href="#d4efda1853b2cb0909727188116a2a8c">无线-&gt;未分类-WiFi</a> |</li> </ul> </li> <li>[<strong>201</strong>星][t] [Py] <a href="https://github.com/seemoo-lab/internalblue">seemoo-lab/internalblue</a> Bluetooth experimentation framework for Broadcom and Cypress chips.</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-97e1bdced96fc7fcd502174d6eecee36"></a>文章</h2><a id="user-content-文章-16" class="anchor" aria-label="Permalink: 文章" href="#文章-16"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-76df273beb09f6732b37a6420649179c"></a>浏览器&amp;&amp;browser</h1><a id="user-content-浏览器browser" class="anchor" aria-label="Permalink: 浏览器&amp;&amp;browser" href="#浏览器browser"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-47a03071becd6df66b469df7c2c6f9b5"></a>工具</h2><a id="user-content-工具-17" class="anchor" aria-label="Permalink: 工具" href="#工具-17"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>4672</strong>星][5d] [JS] <a href="https://github.com/beefproject/beef">beefproject/beef</a> The Browser Exploitation Framework Project</li> <li>[<strong>970</strong>星][9m] [Py] <a href="https://github.com/selwin/python-user-agents">selwin/python-user-agents</a> A Python library that provides an easy way to identify devices like mobile phones, tablets and their capabilities by parsing (browser) user agent strings.</li> <li>[<strong>883</strong>星][3m] <a href="https://github.com/escapingbug/awesome-browser-exploit">escapingbug/awesome-browser-exploit</a> awesome list of browser exploitation tutorials</li> <li>[<strong>459</strong>星][2m] [Py] <a href="https://github.com/globaleaks/tor2web">globaleaks/tor2web</a> Tor2web is an HTTP proxy software that enables access to Tor Hidden Services by mean of common web browsers</li> <li>[<strong>455</strong>星][12d] <a href="https://github.com/m1ghtym0/browser-pwn">m1ghtym0/browser-pwn</a> An updated collection of resources targeting browser-exploitation.</li> <li>[<strong>411</strong>星][3m] [Pascal] <a href="https://github.com/felipedaragon/sandcat">felipedaragon/sandcat</a> 为渗透测试和开发者准备的轻量级浏览器, 基于Chromium和Lua</li> <li>[<strong>320</strong>星][3m] <a href="https://github.com/xsleaks/xsleaks">xsleaks/xsleaks</a> A collection of browser-based side channel attack vectors.</li> <li>[<strong>232</strong>星][1y] [C#] <a href="https://github.com/djhohnstein/sharpweb">djhohnstein/sharpweb</a> .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.</li> <li>[<strong>217</strong>星][3m] [Py] <a href="https://github.com/icsec/airpwn-ng">icsec/airpwn-ng</a> force the target's browser to do what we want</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-ca0c0694dc0aa87534e9bb19be4ee4d5"></a>文章</h2><a id="user-content-文章-17" class="anchor" aria-label="Permalink: 文章" href="#文章-17"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-249c9d207ed6743e412c8c8bcd8a2927"></a>MitreATT&amp;CK</h1><a id="user-content-mitreattck" class="anchor" aria-label="Permalink: MitreATT&amp;CK" href="#mitreattck"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-a88c0c355b342b835fb42abee283bd71"></a>工具</h2><a id="user-content-工具-18" class="anchor" aria-label="Permalink: 工具" href="#工具-18"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-6ab6835b55cf5c8462c4229a4a0ee94c"></a>未分类的</h3><a id="user-content-未分类的" class="anchor" aria-label="Permalink: 未分类的" href="#未分类的"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>2758</strong>星][] [PS] <a href="https://github.com/redcanaryco/atomic-red-team">redcanaryco/atomic-red-team</a> Small and highly portable detection tests based on MITRE's ATT&amp;CK.</li> <li>[<strong>1396</strong>星][2d] [Py] <a href="https://github.com/mitre/caldera">mitre/caldera</a> 自动化 adversary emulation 系统</li> <li>[<strong>568</strong>星][6m] [HTML] <a href="https://github.com/nshalabi/attack-tools">nshalabi/attack-tools</a> Utilities for MITRE™ ATT&amp;CK</li> <li>[<strong>491</strong>星][1y] <a href="https://github.com/bfuzzy/auditd-attack">bfuzzy/auditd-attack</a> A Linux Auditd rule set mapped to MITRE's Attack Framework</li> <li>[<strong>478</strong>星][3m] [Py] <a href="https://github.com/olafhartong/threathunting">olafhartong/threathunting</a> A Splunk app mapped to MITRE ATT&amp;CK to guide your threat hunts</li> <li>[<strong>344</strong>星][6m] <a href="https://github.com/teoseller/osquery-attck">teoseller/osquery-attck</a> Mapping the MITRE ATT&amp;CK Matrix with Osquery</li> <li>[<strong>333</strong>星][t] [Py] <a href="https://github.com/atc-project/atomic-threat-coverage">atc-project/atomic-threat-coverage</a> Actionable analytics designed to combat threats based on MITRE's ATT&amp;CK.</li> <li>[<strong>312</strong>星][11m] [PS] <a href="https://github.com/cyb3rward0g/invoke-attackapi">cyb3rward0g/invoke-attackapi</a> A PowerShell script to interact with the MITRE ATT&amp;CK Framework via its own API</li> <li>[<strong>201</strong>星][3m] <a href="https://github.com/infosecn1nja/awesome-mitre-attack">infosecn1nja/awesome-mitre-attack</a> A curated list of awesome resources related to Mitre ATT&amp;CK™ Framework</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-8512ba6c3855733a1474ca2f16153906"></a>文章</h2><a id="user-content-文章-18" class="anchor" aria-label="Permalink: 文章" href="#文章-18"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-4b17464da487fbdf719e9a1482abf8f1"></a>新添加的</h3><a id="user-content-新添加的-10" class="anchor" aria-label="Permalink: 新添加的" href="#新添加的-10"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-de81f9dd79c219c876c1313cd97852ce"></a>破解&amp;&amp;Crack&amp;&amp;爆破&amp;&amp;BruteForce</h1><a id="user-content-破解crack爆破bruteforce" class="anchor" aria-label="Permalink: 破解&amp;&amp;Crack&amp;&amp;爆破&amp;&amp;BruteForce" href="#破解crack爆破bruteforce"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-73c3c9225523cbb05333246f23342846"></a>工具</h2><a id="user-content-工具-19" class="anchor" aria-label="Permalink: 工具" href="#工具-19"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-53084c21ff85ffad3dd9ce445684978b"></a>未分类的</h3><a id="user-content-未分类的-1" class="anchor" aria-label="Permalink: 未分类的" href="#未分类的-1"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>3325</strong>星][1m] [C] <a href="https://github.com/vanhauser-thc/thc-hydra">vanhauser-thc/thc-hydra</a> 网络登录破解,支持多种服务</li> <li>[<strong>1925</strong>星][29d] [Py] <a href="https://github.com/lanjelot/patator">lanjelot/patator</a> Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.</li> <li>[<strong>1096</strong>星][4m] [Py] <a href="https://github.com/landgrey/pydictor">landgrey/pydictor</a> A powerful and useful hacker dictionary builder for a brute-force attack</li> <li>[<strong>898</strong>星][3m] [Py] <a href="https://github.com/trustedsec/hate_crack">trustedsec/hate_crack</a> 使用HashCat 的自动哈希破解工具</li> <li>[<strong>894</strong>星][29d] [Py] <a href="https://github.com/ticarpi/jwt_tool">ticarpi/jwt_tool</a> 测试,调整和破解JSON Web Token 的工具包</li> <li>[<strong>857</strong>星][7m] [C] <a href="https://github.com/brendan-rius/c-jwt-cracker">brendan-rius/c-jwt-cracker</a> C 语言编写的 JWT 爆破工具</li> <li>[<strong>803</strong>星][11m] [Py] <a href="https://github.com/mak-/parameth">mak-/parameth</a> 在文件中(例如PHP 文件)暴力搜索GET 和 POST 请求的参数</li> <li>[<strong>763</strong>星][5m] [Py] <a href="https://github.com/s0md3v/Hash-Buster">s0md3v/hash-buster</a> Crack hashes in seconds.</li> <li>[<strong>690</strong>星][8m] [Shell] <a href="https://github.com/1n3/brutex">1n3/brutex</a> Automatically brute force all services running on a target.</li> <li>[<strong>687</strong>星][9d] [JS] <a href="https://github.com/animir/node-rate-limiter-flexible">animir/node-rate-limiter-flexible</a> Node.js rate limit requests by key with atomic increments. Protection from DDoS and Brute-Force attacks in process Memory, Redis, MongoDb, Memcached, MySQL, PostgreSQL, Cluster or PM</li> <li>[<strong>659</strong>星][5m] [C#] <a href="https://github.com/shack2/snetcracker">shack2/snetcracker</a> 超级弱口令检查工具是一款Windows平台的弱口令审计工具,支持批量多线程检查,可快速发现弱密码、弱口令账号,密码支持和用户名结合进行检查,大大提高成功率,支持自定义服务端口和字典。</li> <li>[<strong>588</strong>星][6m] [PHP] <a href="https://github.com/s3inlc/hashtopolis">s3inlc/hashtopolis</a> Hashcat wrapper, 用于跨平台分布式Hash破解</li> <li>[<strong>563</strong>星][2m] [Py] <a href="https://github.com/pure-l0g1c/instagram">pure-l0g1c/instagram</a> Bruteforce attack for Instagram</li> <li>[<strong>559</strong>星][1y] [CSS] <a href="https://github.com/hashview/hashview">hashview/hashview</a> 密码破解和分析工具</li> <li>[<strong>538</strong>星][27d] [C] <a href="https://github.com/nmap/ncrack">nmap/ncrack</a> Ncrack network authentication tool</li> <li>[<strong>528</strong>星][3m] [Py] <a href="https://github.com/ypeleg/hungabunga">ypeleg/hungabunga</a> HungaBunga: Brute-Force all sklearn models with all parameters using .fit .predict!</li> <li>[<strong>520</strong>星][4m] <a href="https://github.com/duyetdev/bruteforce-database">duyetdev/bruteforce-database</a> Bruteforce database</li> <li>[<strong>490</strong>星][1y] [C] <a href="https://github.com/mikeryan/crackle">mikeryan/crackle</a> Crack and decrypt BLE encryption</li> <li>[<strong>451</strong>星][6m] [JS] <a href="https://github.com/coalfire-research/npk">coalfire-research/npk</a> A mostly-serverless distributed hash cracking platform</li> <li>[<strong>442</strong>星][1y] [C] <a href="https://github.com/ryancdotorg/brainflayer">ryancdotorg/brainflayer</a> A proof-of-concept cracker for cryptocurrency brainwallets and other low entropy key alogrithms.</li> <li>[<strong>358</strong>星][2m] [Py] <a href="https://github.com/denyhosts/denyhosts">denyhosts/denyhosts</a> Automated host blocking from SSH brute force attacks</li> <li>[<strong>356</strong>星][28d] [Java] <a href="https://github.com/wycm/selenium-geetest-crack">wycm/selenium-geetest-crack</a> selenium破解滑动验证码</li> <li>[<strong>332</strong>星][11m] [C] <a href="https://github.com/e-ago/bitcracker">e-ago/bitcracker</a> BitLocker密码破解器</li> <li>[<strong>309</strong>星][8d] [Go] <a href="https://github.com/ropnop/kerbrute">ropnop/kerbrute</a> A tool to perform Kerberos pre-auth bruteforcing</li> <li>[<strong>304</strong>星][2m] [Py] <a href="https://github.com/yzddmr6/webcrack">yzddmr6/webcrack</a> 网站后台弱口令/万能密码批量检测工具</li> <li>[<strong>292</strong>星][12m] [Shell] <a href="https://github.com/Cyb0r9/SocialBox">cyb0r9/socialbox</a> SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi</li> <li>[<strong>286</strong>星][9d] [Shell] <a href="https://github.com/wuseman/emagnet">wuseman/emagnet</a> Emagnet is a tool for find leaked databases with 97.1% accurate to grab mail + password together from pastebin leaks. Support for brute forcing spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts</li> <li>[<strong>275</strong>星][1y] [C] <a href="https://github.com/jmk-foofus/medusa">jmk-foofus/medusa</a> Medusa is a speedy, parallel, and modular, login brute-forcer.</li> <li>[<strong>274</strong>星][1y] [Shell] <a href="https://github.com/thelinuxchoice/instainsane">thelinuxchoice/instainsane</a> Multi-threaded Instagram Brute Forcer (100 attemps at once)</li> <li>[<strong>250</strong>星][1y] [Py] <a href="https://github.com/avramit/instahack">avramit/instahack</a> Instagram bruteforce tool</li> <li>[<strong>250</strong>星][1y] [Py] <a href="https://github.com/hsury/geetest3-crack">hsury/geetest3-crack</a></li> <li>[<strong>248</strong>星][11d] [Py] <a href="https://github.com/evilmog/ntlmv1-multi">evilmog/ntlmv1-multi</a> 修改NTLMv1/NTLMv1-ESS/MSCHAPv1 Hask, 使其可以在hashcat中用DES模式14000破解</li> <li>[<strong>235</strong>星][7m] [Py] <a href="https://github.com/blark/aiodnsbrute">blark/aiodnsbrute</a> Python 3.5+ DNS asynchronous brute force utility</li> <li>[<strong>233</strong>星][8m] [Py] <a href="https://github.com/paradoxis/stegcracker">paradoxis/stegcracker</a> Steganography brute-force utility to uncover hidden data inside files</li> <li>[<strong>221</strong>星][12m] [Py] <a href="https://github.com/chris408/known_hosts-hashcat">chris408/known_hosts-hashcat</a> A guide and tool for cracking ssh known_hosts files with hashcat</li> <li>[<strong>219</strong>星][4m] [Py] <a href="https://github.com/isaacdelly/plutus">isaacdelly/plutus</a> An automated bitcoin wallet collider that brute forces random wallet addresses</li> <li>[<strong>215</strong>星][2m] [C] <a href="https://github.com/hyc/fcrackzip">hyc/fcrackzip</a> A braindead program for cracking encrypted ZIP archives. Forked from</li> <li>[<strong>207</strong>星][27d] [Py] <a href="https://github.com/m4ll0k/smbrute">m4ll0k/smbrute</a> SMB Protocol Bruteforce</li> <li>[<strong>206</strong>星][5m] [Shell] <a href="https://github.com/anshumanbh/brutesubs">anshumanbh/brutesubs</a> An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker Compose</li> <li>[<strong>204</strong>星][1y] [JS] <a href="https://github.com/lmammino/jwt-cracker">lmammino/jwt-cracker</a> jwt-cracker:HS256JWT 令牌暴力破解工具,只对弱密码有效</li> <li>[<strong>200</strong>星][1y] [ObjC] <a href="https://github.com/sunweiliang/neteasemusiccrack">sunweiliang/neteasemusiccrack</a> iOS网易云音乐 免VIP下载、去广告、去更新 无需越狱...</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-171e396a8965775c27602762c6638694"></a>文章</h2><a id="user-content-文章-19" class="anchor" aria-label="Permalink: 文章" href="#文章-19"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-fc3c73849911ede2ce0d6d02f1f5b0b9"></a>新添加的</h3><a id="user-content-新添加的-11" class="anchor" aria-label="Permalink: 新添加的" href="#新添加的-11"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-96171a80e158b8752595329dd42e8bcf"></a>泄漏&amp;&amp;Breach&amp;&amp;Leak</h1><a id="user-content-泄漏breachleak" class="anchor" aria-label="Permalink: 泄漏&amp;&amp;Breach&amp;&amp;Leak" href="#泄漏breachleak"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-602bb9759b0b2ba5555b05b7218a2d6f"></a>工具</h2><a id="user-content-工具-20" class="anchor" aria-label="Permalink: 工具" href="#工具-20"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-dc507c5be7c09e1e88af7a1ad91e2703"></a>未分类</h3><a id="user-content-未分类-5" class="anchor" aria-label="Permalink: 未分类" href="#未分类-5"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1437</strong>星][6m] <a href="https://github.com/gitguardian/apisecuritybestpractices">gitguardian/apisecuritybestpractices</a> Resources to help you keep secrets (API keys, database credentials, certificates, ...) out of source code and remediate the issue in case of a leaked API key. Made available by GitGuardian.</li> <li>[<strong>1398</strong>星][1y] [Go] <a href="https://github.com/filosottile/whosthere">filosottile/whosthere</a> A ssh server that knows who you are</li> <li>[<strong>1147</strong>星][3m] [HTML] <a href="https://github.com/cure53/httpleaks">cure53/httpleaks</a> HTTPLeaks - All possible ways, a website can leak HTTP requests</li> <li>[<strong>906</strong>星][2m] [Py] <a href="https://github.com/woj-ciech/leaklooker">woj-ciech/leaklooker</a> Find open databases - Powered by Binaryedge.io</li> <li>[<strong>862</strong>星][3d] [Py] <a href="https://github.com/circl/ail-framework">circl/ail-framework</a> AIL framework - Analysis Information Leak framework</li> <li>[<strong>728</strong>星][2m] <a href="https://github.com/streaak/keyhacks">streaak/keyhacks</a> Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.</li> <li>[<strong>726</strong>星][3d] [Py] <a href="https://github.com/globaleaks/globaleaks">globaleaks/globaleaks</a> The Open-Source Whistleblowing Software</li> <li>[<strong>301</strong>星][5m] [Py] <a href="https://github.com/wangyihang/githacker">wangyihang/githacker</a> a multiple threads tool to detect whether a site has git source leaks, and has the ability to download the site source to the local</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-fb3bccf80281e11fdf4ef06ddaa34566"></a>文章</h2><a id="user-content-文章-20" class="anchor" aria-label="Permalink: 文章" href="#文章-20"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-339727dd5a006d7a5bd8f0173dc80bb9"></a>新添加的</h3><a id="user-content-新添加的-12" class="anchor" aria-label="Permalink: 新添加的" href="#新添加的-12"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-785ad72c95e857273dce41842f5e8873"></a>爬虫</h1><a id="user-content-爬虫" class="anchor" aria-label="Permalink: 爬虫" href="#爬虫"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-0f931c85ab54698d0bcfaf9a3e6dac73"></a>工具</h2><a id="user-content-工具-21" class="anchor" aria-label="Permalink: 工具" href="#工具-21"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-442f9390fd56008def077a21ab65d4aa"></a>未分类</h3><a id="user-content-未分类-6" class="anchor" aria-label="Permalink: 未分类" href="#未分类-6"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>758</strong>星][2m] [Py] <a href="https://github.com/nekmo/dirhunt">nekmo/dirhunt</a> Web爬虫, 针对搜索和分析路径做了优化 <ul dir="auto"> <li>重复区段: <a href="#de63a029bda6a7e429af272f291bb769">扫描器-&gt;工具-&gt;未分类-Scanner</a> |</li> </ul> </li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-23b008498c8b41ec3128bd9855660b7d"></a>文章</h2><a id="user-content-文章-21" class="anchor" aria-label="Permalink: 文章" href="#文章-21"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-37ca6907aa42dfd32db5973ff9eec83d"></a>新添加的</h3><a id="user-content-新添加的-13" class="anchor" aria-label="Permalink: 新添加的" href="#新添加的-13"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-39931e776c23e80229368dfc6fd54770"></a>无线&amp;&amp;WiFi&amp;&amp;AP&amp;&amp;802.11</h1><a id="user-content-无线wifiap80211" class="anchor" aria-label="Permalink: 无线&amp;&amp;WiFi&amp;&amp;AP&amp;&amp;802.11" href="#无线wifiap80211"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-d4efda1853b2cb0909727188116a2a8c"></a>未分类-WiFi</h2><a id="user-content-未分类-wifi" class="anchor" aria-label="Permalink: 未分类-WiFi" href="#未分类-wifi"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>8455</strong>星][8d] [Py] <a href="https://github.com/wifiphisher/wifiphisher">wifiphisher/wifiphisher</a> 流氓AP框架, 用于RedTeam和Wi-Fi安全测试 <ul dir="auto"> <li>重复区段: <a href="#290e9ae48108d21d6d8b9ea9e74d077d">社工(SET)-&gt;工具-&gt;钓鱼</a> |</li> </ul> </li> <li>[<strong>6140</strong>星][10m] [Py] <a href="https://github.com/schollz/howmanypeoplearearound">schollz/howmanypeoplearearound</a> 检测 Wifi 信号统计你周围的人数 <ul dir="auto"> <li>重复区段: <a href="#05ab1b75266fddafc7195f5b395e4d99">侦察-&gt;工具-&gt;未分类-OSINT</a> |</li> </ul> </li> <li>[<strong>5824</strong>星][2m] [C] <a href="https://github.com/spacehuhn/esp8266_deauther">spacehuhn/esp8266_deauther</a> 使用ESP8266 制作Wifi干扰器</li> <li>[<strong>4494</strong>星][19d] [Py] <a href="https://github.com/jopohl/urh">jopohl/urh</a> Universal Radio Hacker: investigate wireless protocols like a boss</li> <li>[<strong>2989</strong>星][5d] [JS] <a href="https://github.com/evilsocket/pwnagotchi">evilsocket/pwnagotchi</a> 深度学习+Bettercap,基于A2C,从周围的WiFi环境中学习,以最大程度地利用捕获的WPA关键信息</li> <li>[<strong>2939</strong>星][4d] [Py] <a href="https://github.com/danmcinerney/wifijammer">danmcinerney/wifijammer</a> 持续劫持范围内的Wifi客户端和AP</li> <li>[<strong>2756</strong>星][9m] [Py] <a href="https://github.com/P0cL4bs/WiFi-Pumpkin">p0cl4bs/wifi-pumpkin</a> AP攻击框架, 创建虚假网络, 取消验证攻击、请求和凭证监控、透明代理、Windows更新攻击、钓鱼管理、ARP投毒、DNS嗅探、Pumpkin代理、动态图片捕获等</li> <li>[<strong>2745</strong>星][1y] [C] <a href="https://github.com/vanhoefm/krackattacks-scripts">vanhoefm/krackattacks-scripts</a> 检测客户端和AP是否受KRACK漏洞影响</li> <li>[<strong>2476</strong>星][3m] [C] <a href="https://github.com/martin-ger/esp_wifi_repeater">martin-ger/esp_wifi_repeater</a> A full functional WiFi Repeater (correctly: a WiFi NAT Router)</li> <li>[<strong>2378</strong>星][1y] [Py] <a href="https://github.com/danmcinerney/lans.py">danmcinerney/lans.py</a> Inject code and spy on wifi users</li> <li>[<strong>2303</strong>星][2m] [Shell] <a href="https://github.com/v1s1t0r1sh3r3/airgeddon">v1s1t0r1sh3r3/airgeddon</a> This is a multi-use bash script for Linux systems to audit wireless networks.</li> <li>[<strong>1924</strong>星][1y] [Py] <a href="https://github.com/derv82/wifite2">derv82/wifite2</a> 无线网络审计工具wifite 的升级版/重制版</li> <li>[<strong>1881</strong>星][5m] [Shell] <a href="https://github.com/arismelachroinos/lscript">arismelachroinos/lscript</a> 自动化无线渗透和Hacking 任务的脚本 <ul dir="auto"> <li>重复区段: <a href="#fc8737aef0f59c3952d11749fe582dac">渗透-&gt;工具-&gt;自动化</a> |</li> </ul> </li> <li>[<strong>1567</strong>星][25d] [Py] <a href="https://github.com/k4m4/kickthemout">k4m4/kickthemout</a> 使用ARP欺骗,将设备从网络中踢出去</li> <li>[<strong>1424</strong>星][19d] [C] <a href="https://github.com/ettercap/ettercap">ettercap/ettercap</a> Ettercap Project</li> <li>[<strong>1286</strong>星][4d] [C] <a href="https://github.com/aircrack-ng/aircrack-ng">aircrack-ng/aircrack-ng</a> WiFi security auditing tools suite</li> <li>[<strong>1280</strong>星][2m] [C] <a href="https://github.com/seemoo-lab/nexmon">seemoo-lab/nexmon</a> The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more</li> <li>[<strong>1057</strong>星][2d] [C] <a href="https://github.com/s0lst1c3/eaphammer">s0lst1c3/eaphammer</a> 针对WPA2-Enterprise 网络的定向双重攻击(evil twin attacks)</li> <li>[<strong>1038</strong>星][2m] [C] <a href="https://github.com/t6x/reaver-wps-fork-t6x">t6x/reaver-wps-fork-t6x</a> 攻击 Wi-Fi Protected Setup (WPS), 恢复 WPA/WPA2 密码</li> <li>[<strong>1007</strong>星][1y] [Py] <a href="https://github.com/entropy1337/infernal-twin">entropy1337/infernal-twin</a> 自动化无线Hack 工具</li> <li>[<strong>994</strong>星][1y] [Py] <a href="https://github.com/tylous/sniffair">tylous/sniffair</a> 无线渗透框架. 解析被动收集的无线数据, 执行复杂的无线攻击</li> <li>[<strong>991</strong>星][2m] [C] <a href="https://github.com/wiire-a/pixiewps">wiire-a/pixiewps</a> An offline Wi-Fi Protected Setup brute-force utility</li> <li>[<strong>985</strong>星][1y] [HTML] <a href="https://github.com/sensepost/mana">sensepost/mana</a> <em>DEPRECATED</em> mana toolkit for wifi rogue AP attacks and MitM</li> <li>[<strong>916</strong>星][2m] [TeX] <a href="https://github.com/ethereum/yellowpaper">ethereum/yellowpaper</a> The "Yellow Paper": Ethereum's formal specification</li> <li>[<strong>854</strong>星][2m] [C] <a href="https://github.com/spacehuhn/wifi_ducky">spacehuhn/wifi_ducky</a> Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4</li> <li>[<strong>799</strong>星][1y] [ObjC] <a href="https://github.com/igrsoft/kismac2">igrsoft/kismac2</a> KisMAC is a free, open source wireless stumbling and security tool for Mac OS X.</li> <li>[<strong>781</strong>星][2m] [Py] <a href="https://github.com/konradit/gopro-py-api">konradit/gopro-py-api</a> Unofficial GoPro API Library for Python - connect to GoPro via WiFi.</li> <li>[<strong>761</strong>星][8m] [Py] <a href="https://github.com/MisterBianco/BoopSuite">misterbianco/boopsuite</a> 无线审计与安全测试</li> <li>[<strong>685</strong>星][11m] [ObjC] <a href="https://github.com/unixpickle/jamwifi">unixpickle/jamwifi</a> A GUI, easy to use WiFi network jammer for Mac OS X</li> <li>[<strong>654</strong>星][8m] [C] <a href="https://github.com/wifidog/wifidog-gateway">wifidog/wifidog-gateway</a> Repository for the wifidog-gateway captive portal designed for embedded systems</li> <li>[<strong>617</strong>星][4m] [C] <a href="https://github.com/matheus-garbelini/esp32_esp8266_attacks">matheus-garbelini/esp32_esp8266_attacks</a> Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)</li> <li>[<strong>527</strong>星][] [C++] <a href="https://github.com/cyberman54/esp32-paxcounter">cyberman54/esp32-paxcounter</a> Wifi &amp; BLE driven passenger flow metering with cheap ESP32 boards</li> <li>[<strong>477</strong>星][3m] [Shell] <a href="https://github.com/staz0t/hashcatch">staz0t/hashcatch</a> Capture handshakes of nearby WiFi networks automatically</li> <li>[<strong>467</strong>星][2m] [Py] <a href="https://github.com/savio-code/fern-wifi-cracker">savio-code/fern-wifi-cracker</a> 无线安全审计和攻击工具, 能破解/恢复 WEP/WPA/WPSkey等</li> <li>[<strong>462</strong>星][21d] [Java] <a href="https://github.com/lennartkoopmann/nzyme">lennartkoopmann/nzyme</a> 直接收集空中的802.11 管理帧,并将其发送到 Graylog,用于WiFi IDS, 监控, 及事件响应。(Graylog:开源的日志管理系统)</li> <li>[<strong>419</strong>星][9d] [Py] <a href="https://github.com/jpaulmora/pyrit">jpaulmora/pyrit</a> The famous WPA precomputed cracker, Migrated from Google.</li> <li>[<strong>397</strong>星][4d] [C] <a href="https://github.com/freifunk-gluon/gluon">freifunk-gluon/gluon</a> a modular framework for creating OpenWrt-based firmwares for wireless mesh nodes</li> <li>[<strong>384</strong>星][5d] [C++] <a href="https://github.com/bastibl/gr-ieee802-11">bastibl/gr-ieee802-11</a> IEEE 802.11 a/g/p Transceiver</li> <li>[<strong>327</strong>星][3m] [Shell] <a href="https://github.com/vanhoefm/modwifi">vanhoefm/modwifi</a></li> <li>[<strong>321</strong>星][4d] [Java] <a href="https://github.com/wiglenet/wigle-wifi-wardriving">wiglenet/wigle-wifi-wardriving</a> Nethugging client for Android, from wigle.net</li> <li>[<strong>313</strong>星][4m] [TeX] <a href="https://github.com/chronaeon/beigepaper">chronaeon/beigepaper</a> Rewrite of the Yellowpaper in non-Yellowpaper syntax.</li> <li>[<strong>278</strong>星][3m] [C] <a href="https://github.com/sensepost/hostapd-mana">sensepost/hostapd-mana</a> SensePost's modified hostapd for wifi attacks.</li> <li>[<strong>277</strong>星][18d] [C] <a href="https://github.com/br101/horst">br101/horst</a> “horst” - lightweight IEEE802.11 wireless LAN analyzer with a text interface</li> <li>[<strong>274</strong>星][19d] [Py] <a href="https://github.com/ghostop14/sparrow-wifi">ghostop14/sparrow-wifi</a> Next-Gen GUI-based WiFi and Bluetooth Analyzer for Linux <ul dir="auto"> <li>重复区段: <a href="#c72811e491c68f75ac2e7eb7afd3b01f">蓝牙-&gt;工具</a> |</li> </ul> </li> <li>[<strong>260</strong>星][1y] [Py] <a href="https://github.com/wipi-hunter/pidense">wipi-hunter/pidense</a> Monitor illegal wireless network activities.</li> <li>[<strong>255</strong>星][1m] [C] <a href="https://github.com/mame82/logitacker">mame82/logitacker</a> Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle.</li> <li>[<strong>240</strong>星][8m] [Py] <a href="https://github.com/lionsec/wifresti">lionsec/wifresti</a> Find your wireless network password in Windows , Linux and Mac OS</li> <li>[<strong>212</strong>星][1m] [Shell] <a href="https://github.com/aress31/wirespy">aress31/wirespy</a> Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-8d233e2d068cce2b36fd0cf44d10f5d8"></a>WPS&amp;&amp;WPA&amp;&amp;WPA2</h2><a id="user-content-wpswpawpa2" class="anchor" aria-label="Permalink: WPS&amp;&amp;WPA&amp;&amp;WPA2" href="#wpswpawpa2"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>319</strong>星][4m] [Py] <a href="https://github.com/hash3lizer/wifibroot">hash3lizer/wifibroot</a> A WiFi Pentest Cracking tool for WPA/WPA2 (Handshake, PMKID, Cracking, EAPOL, Deauthentication)</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-8863b7ba27658d687a85585e43b23245"></a>802.11</h2><a id="user-content-80211" class="anchor" aria-label="Permalink: 802.11" href="#80211"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-80301821d0f5d8ec2dd3754ebb1b4b10"></a>Payload&amp;&amp;远控&amp;&amp;RAT</h1><a id="user-content-payload远控rat" class="anchor" aria-label="Permalink: Payload&amp;&amp;远控&amp;&amp;RAT" href="#payload远控rat"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-783f861b9f822127dba99acb55687cbb"></a>工具</h2><a id="user-content-工具-22" class="anchor" aria-label="Permalink: 工具" href="#工具-22"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-6602e118e0245c83b13ff0db872c3723"></a>未分类-payload</h3><a id="user-content-未分类-payload" class="anchor" aria-label="Permalink: 未分类-payload" href="#未分类-payload"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>1829</strong>星][6m] [Py] <a href="https://github.com/veil-framework/veil">veil-framework/veil</a> generate metasploit payloads that bypass common anti-virus solutions</li> <li>[<strong>1258</strong>星][2m] [PS] <a href="https://github.com/hak5/bashbunny-payloads">hak5/bashbunny-payloads</a> The Official Bash Bunny Payload Repository</li> <li>[<strong>982</strong>星][2m] [C] <a href="https://github.com/zardus/preeny">zardus/preeny</a> Some helpful preload libraries for pwning stuff.</li> <li>[<strong>569</strong>星][11m] [Py] <a href="https://github.com/genetic-malware/ebowla">genetic-malware/ebowla</a> Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)</li> <li>[<strong>546</strong>星][3m] [C++] <a href="https://github.com/screetsec/brutal">screetsec/brutal</a> Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )</li> <li>[<strong>493</strong>星][5d] [Py] <a href="https://github.com/ctxis/cape">ctxis/cape</a> Malware Configuration And Payload Extraction</li> <li>[<strong>343</strong>星][8m] [Java] <a href="https://github.com/portswigger/param-miner">portswigger/param-miner</a> identifies hidden, unlinked parameters. It's particularly useful for finding web cache poisoning vulnerabilities</li> <li>[<strong>339</strong>星][12m] [JS] <a href="https://github.com/gabemarshall/brosec">gabemarshall/brosec</a> Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.</li> <li>[<strong>288</strong>星][1m] [Shell] <a href="https://github.com/petit-miner/blueberry-pi">petit-miner/blueberry-pi</a> Blueberry PI</li> <li>[<strong>262</strong>星][2m] [Py] <a href="https://github.com/felixweyne/imaginaryc2">felixweyne/imaginaryc2</a> Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which captures HTTP requests towards selectively chosen domains/IPs. Additionally, the tool aims to make it easy to replay captured Command-and-Control responses/served payloads.</li> <li>[<strong>246</strong>星][13d] [C] <a href="https://github.com/shchmue/lockpick_rcm">shchmue/lockpick_rcm</a> Nintendo Switch encryption key derivation bare metal RCM payload</li> <li>[<strong>244</strong>星][7d] <a href="https://github.com/cujanovic/open-redirect-payloads">cujanovic/open-redirect-payloads</a> Open Redirect Payloads</li> <li>[<strong>238</strong>星][6d] <a href="https://github.com/cujanovic/markdown-xss-payloads">cujanovic/markdown-xss-payloads</a> XSS payloads for exploiting Markdown syntax</li> <li>[<strong>235</strong>星][5m] [Shell] <a href="https://github.com/hak5/packetsquirrel-payloads">hak5/packetsquirrel-payloads</a> The Official Packet Squirrel Payload Repository</li> <li>[<strong>233</strong>星][6m] <a href="https://github.com/cr0hn/nosqlinjection_wordlists">cr0hn/nosqlinjection_wordlists</a> This repository contains payload to test NoSQL Injections</li> <li>[<strong>232</strong>星][18d] [PS] <a href="https://github.com/rsmudge/elevatekit">rsmudge/elevatekit</a> The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.</li> <li>[<strong>229</strong>星][3m] [Py] <a href="https://github.com/whitel1st/docem">whitel1st/docem</a> Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)</li> <li>[<strong>227</strong>星][2m] [Py] <a href="https://github.com/brent-stone/can_reverse_engineering">brent-stone/can_reverse_engineering</a> Automated Payload Reverse Engineering Pipeline for the Controller Area Network (CAN) protocol</li> <li>[<strong>217</strong>星][2m] [PHP] <a href="https://github.com/zigoo0/jsonbee">zigoo0/jsonbee</a> A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites.</li> <li>[<strong>210</strong>星][4d] [Py] <a href="https://github.com/danmcinerney/msf-autoshell">danmcinerney/msf-autoshell</a> Feed the tool a .nessus file and it will automatically get you MSF shell</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-b5d99a78ddb383c208aae474fc2cb002"></a>Payload收集</h3><a id="user-content-payload收集" class="anchor" aria-label="Permalink: Payload收集" href="#payload收集"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>22055</strong>星][20d] [PHP] <a href="https://github.com/danielmiessler/seclists">danielmiessler/seclists</a> 多种类型资源收集:用户名、密码、URL、敏感数据类型、Fuzzing Payload、WebShell等</li> <li>[<strong>11389</strong>星][3d] [Py] <a href="https://github.com/swisskyrepo/payloadsallthethings">swisskyrepo/payloadsallthethings</a> A list of useful payloads and bypass for Web Application Security and Pentest/CTF</li> <li>[<strong>2078</strong>星][2m] <a href="https://github.com/edoverflow/bugbounty-cheatsheet">edoverflow/bugbounty-cheatsheet</a> A list of interesting payloads, tips and tricks for bug bounty hunters.</li> <li>[<strong>2057</strong>星][9m] [Shell] <a href="https://github.com/foospidy/payloads">foospidy/payloads</a> web 攻击 Payload 集合</li> <li>[<strong>1870</strong>星][11m] [PHP] <a href="https://github.com/bartblaze/php-backdoors">bartblaze/php-backdoors</a> A collection of PHP backdoors. For educational or testing purposes only.</li> <li>[<strong>783</strong>星][19d] <a href="https://github.com/payloadbox/xss-payload-list">payloadbox/xss-payload-list</a> XSS 漏洞Payload列表</li> <li>[<strong>373</strong>星][3m] <a href="https://github.com/renwax23/xss-payloads">renwax23/xss-payloads</a> List of XSS Vectors/Payloads</li> <li>[<strong>298</strong>星][4m] [Py] <a href="https://github.com/thekingofduck/easyxsspayload">thekingofduck/easyxsspayload</a> XssPayload List . Usage:</li> <li>[<strong>262</strong>星][4m] <a href="https://github.com/payloadbox/command-injection-payload-list">payloadbox/command-injection-payload-list</a></li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-b318465d0d415e35fc0883e9894261d1"></a>远控&amp;&amp;RAT</h3><a id="user-content-远控rat" class="anchor" aria-label="Permalink: 远控&amp;&amp;RAT" href="#远控rat"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>5131</strong>星][4m] [Py] <a href="https://github.com/n1nj4sec/pupy">n1nj4sec/pupy</a> Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python</li> <li>[<strong>1745</strong>星][7m] [Smali] <a href="https://github.com/ahmyth/ahmyth-android-rat">ahmyth/ahmyth-android-rat</a> Android Remote Administration Tool</li> <li>[<strong>1335</strong>星][1y] [Py] <a href="https://github.com/marten4n6/evilosx">marten4n6/evilosx</a> An evil RAT (Remote Administration Tool) for macOS / OS X.</li> <li>[<strong>780</strong>星][2m] [Py] <a href="https://github.com/kevthehermit/ratdecoders">kevthehermit/ratdecoders</a> Python Decoders for Common Remote Access Trojans</li> <li>[<strong>599</strong>星][1y] [PS] <a href="https://github.com/FortyNorthSecurity/WMImplant">fortynorthsecurity/wmimplant</a> This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported is translated into a WMI-equivalent for use on a network/remote machine. WMImplant is WMI based.</li> <li>[<strong>500</strong>星][6m] [Visual Basic .NET] <a href="https://github.com/nyan-x-cat/lime-rat">nyan-x-cat/lime-rat</a> LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)</li> <li>[<strong>372</strong>星][3m] [C++] <a href="https://github.com/werkamsus/lilith">werkamsus/lilith</a> Lilith, The Open Source C++ Remote Administration Tool (RAT)</li> <li>[<strong>323</strong>星][3d] [C#] <a href="https://github.com/nyan-x-cat/asyncrat-c-sharp">nyan-x-cat/asyncrat-c-sharp</a> Open-Source Remote Administration Tool For Windows C# (RAT)</li> <li>[<strong>317</strong>星][6m] [Py] <a href="https://github.com/mvrozanti/rat-via-telegram">mvrozanti/rat-via-telegram</a> Windows Remote Administration Tool via Telegram</li> <li>[<strong>293</strong>星][4m] [C++] <a href="https://github.com/yuanyuanxiang/simpleremoter">yuanyuanxiang/simpleremoter</a> 基于gh0st的远程控制器:实现了终端管理、进程管理、窗口管理、远程桌面、文件管理、语音管理、视频管理、服务管理、注册表管理等功能,优化全部代码及整理排版,修复内存泄漏缺陷,程序运行稳定。此项目初版见:</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-ad92f6b801a18934f1971e2512f5ae4f"></a>Payload生成</h3><a id="user-content-payload生成" class="anchor" aria-label="Permalink: Payload生成" href="#payload生成"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>3369</strong>星][8d] [C] <a href="https://github.com/screetsec/thefatrat">screetsec/thefatrat</a> Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw… <ul dir="auto"> <li>重复区段: <a href="#12abc279c69d1fcf10692b9cb89bcdf7">后渗透-&gt;工具-&gt;未分类-post-exp</a> |</li> </ul> </li> <li>[<strong>2678</strong>星][4m] [Java] <a href="https://github.com/frohoff/ysoserial">frohoff/ysoserial</a> 生成会利用不安全的Java对象反序列化的Payload</li> <li>[<strong>1792</strong>星][t] [Shell] <a href="https://github.com/leebaird/discover">leebaird/discover</a> 自定义的bash脚本, 用于自动化多个渗透测试任务, 包括: 侦查、扫描、解析、在Metasploit中创建恶意Payload和Listener <ul dir="auto"> <li>重复区段: <a href="#fc8737aef0f59c3952d11749fe582dac">渗透-&gt;工具-&gt;自动化</a> |<a href="#01be61d5bb9f6f7199208ff0fba86b5d">渗透-&gt;工具-&gt;Metasploit-&gt;未分类-metasploit</a> |<a href="#05ab1b75266fddafc7195f5b395e4d99">侦察-&gt;工具-&gt;未分类-OSINT</a> |</li> </ul> </li> <li>[<strong>1339</strong>星][3m] [PS] <a href="https://github.com/peewpw/invoke-psimage">peewpw/invoke-psimage</a> Encodes a PowerShell script in the pixels of a PNG file and generates a oneliner to execute</li> <li>[<strong>1075</strong>星][5m] [Py] <a href="https://github.com/nccgroup/winpayloads">nccgroup/winpayloads</a> Undetectable Windows Payload Generation</li> <li>[<strong>1016</strong>星][1y] [Py] <a href="https://github.com/d4vinci/dr0p1t-framework">d4vinci/dr0p1t-framework</a> 创建免杀的Dropper</li> <li>[<strong>884</strong>星][19d] [PHP] <a href="https://github.com/ambionics/phpggc">ambionics/phpggc</a> PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.</li> <li>[<strong>872</strong>星][10m] [Visual Basic .NET] <a href="https://github.com/mdsecactivebreach/sharpshooter">mdsecactivebreach/sharpshooter</a> Payload Generation Framework</li> <li>[<strong>836</strong>星][28d] [C#] <a href="https://github.com/pwntester/ysoserial.net">pwntester/ysoserial.net</a> 生成Payload,恶意利用不安全的 .NET 对象反序列化</li> <li>[<strong>832</strong>星][7m] [Go] <a href="https://github.com/tiagorlampert/chaos">tiagorlampert/chaos</a> a PoC that allow generate payloads and control remote operating system</li> <li>[<strong>752</strong>星][1y] [Py] <a href="https://github.com/oddcod3/phantom-evasion">oddcod3/phantom-evasion</a> Python AV evasion tool capable to generate FUD executable even with the most common 32 bit metasploit payload(exe/elf/dmg/apk)</li> <li>[<strong>713</strong>星][6d] [Py] <a href="https://github.com/sevagas/macro_pack">sevagas/macro_pack</a> 自动生成并混淆MS 文档, 用于渗透测试、演示、社会工程评估等</li> <li>[<strong>634</strong>星][2d] [C] <a href="https://github.com/thewover/donut">thewover/donut</a> Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters</li> <li>[<strong>633</strong>星][8m] [Shell] <a href="https://github.com/g0tmi1k/msfpc">g0tmi1k/msfpc</a> MSFvenom Payload Creator (MSFPC)</li> <li>[<strong>419</strong>星][27d] [Perl] <a href="https://github.com/chinarulezzz/pixload">chinarulezzz/pixload</a> Image Payload Creating/Injecting tools</li> <li>[<strong>301</strong>星][8m] [Py] <a href="https://github.com/0xacb/viewgen">0xacb/viewgen</a> viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys</li> <li>[<strong>278</strong>星][1y] [Java] <a href="https://github.com/ewilded/shelling">ewilded/shelling</a> SHELLING - a comprehensive OS command injection payload generator</li> <li>[<strong>268</strong>星][1y] [Shell] <a href="https://github.com/abedalqaderswedan1/aswcrypter">abedalqaderswedan1/aswcrypter</a> An Bash&amp;Python Script For Generating Payloads that Bypasses All Antivirus so far [FUD]</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-c45a90ab810d536a889e4e2dd45132f8"></a>Botnet&amp;&amp;僵尸网络</h3><a id="user-content-botnet僵尸网络" class="anchor" aria-label="Permalink: Botnet&amp;&amp;僵尸网络" href="#botnet僵尸网络"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>3747</strong>星][4m] [Py] <a href="https://github.com/malwaredllc/byob">malwaredllc/byob</a> BYOB (Build Your Own Botnet)</li> <li>[<strong>2163</strong>星][1y] [C++] <a href="https://github.com/maestron/botnets">maestron/botnets</a> This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY</li> <li>[<strong>412</strong>星][1m] [C++] <a href="https://github.com/souhardya/uboat">souhardya/uboat</a> HTTP Botnet Project</li> <li>[<strong>328</strong>星][6m] [Go] <a href="https://github.com/saturnsvoid/gobot2">saturnsvoid/gobot2</a> Second Version of The GoBot Botnet, But more advanced.</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-b6efee85bca01cde45faa45a92ece37f"></a>后门&amp;&amp;添加后门</h3><a id="user-content-后门添加后门" class="anchor" aria-label="Permalink: 后门&amp;&amp;添加后门" href="#后门添加后门"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>386</strong>星][8m] [C] <a href="https://github.com/zerosum0x0/smbdoor">zerosum0x0/smbdoor</a> Windows kernel backdoor via registering a malicious SMB handler</li> <li>[<strong>378</strong>星][3m] [Shell] <a href="https://github.com/screetsec/vegile">screetsec/vegile</a> This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell</li> <li>[<strong>370</strong>星][8m] [Py] <a href="https://github.com/s0md3v/Cloak">s0md3v/cloak</a> Cloak can backdoor any python script with some tricks.</li> <li>[<strong>349</strong>星][15d] [Shell] <a href="https://github.com/r00t-3xp10it/backdoorppt">r00t-3xp10it/backdoorppt</a> 将Exe格式Payload伪装成Doc(.ppt)</li> <li>[<strong>348</strong>星][9d] [C] <a href="https://github.com/cr4sh/smmbackdoor">cr4sh/smmbackdoor</a> System Management Mode backdoor for UEFI</li> <li>[<strong>318</strong>星][1y] [Ruby] <a href="https://github.com/CarletonStuberg/browser-backdoor">carletonstuberg/browser-backdoor</a> BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener</li> <li>[<strong>301</strong>星][4m] [C#] <a href="https://github.com/mvelazc0/defcon27_csharp_workshop">mvelazc0/defcon27_csharp_workshop</a> Writing custom backdoor payloads with C# - Defcon 27</li> <li>[<strong>205</strong>星][9m] [C] <a href="https://github.com/Paradoxis/PHP-Backdoor">paradoxis/php-backdoor</a> Your interpreter isn’t safe anymore  —  The PHP module backdoor</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-85bb0c28850ffa2b4fd44f70816db306"></a>混淆器&amp;&amp;Obfuscate</h3><a id="user-content-混淆器obfuscate" class="anchor" aria-label="Permalink: 混淆器&amp;&amp;Obfuscate" href="#混淆器obfuscate"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>3676</strong>星][3d] [TS] <a href="https://github.com/javascript-obfuscator/javascript-obfuscator">javascript-obfuscator/javascript-obfuscator</a> A powerful obfuscator for JavaScript and Node.js</li> <li>[<strong>2477</strong>星][11m] [C#] <a href="https://github.com/yck1509/confuserex">yck1509/confuserex</a> An open-source, free protector for .NET applications</li> <li>[<strong>1397</strong>星][9m] [PS] <a href="https://github.com/danielbohannon/invoke-obfuscation">danielbohannon/invoke-obfuscation</a> PowerShell Obfuscator</li> <li>[<strong>1147</strong>星][8m] <a href="https://github.com/HikariObfuscator/Hikari">hikariobfuscator/hikari</a> LLVM Obfuscator</li> <li>[<strong>1021</strong>星][1m] [Swift] <a href="https://github.com/rockbruno/swiftshield">rockbruno/swiftshield</a> wift/OBJ-C Obfuscator</li> <li>[<strong>676</strong>星][1m] [C#] <a href="https://github.com/obfuscar/obfuscar">obfuscar/obfuscar</a> Open source obfuscation tool for .NET assemblies</li> <li>[<strong>675</strong>星][7m] [C++] <a href="https://github.com/gossip-sjtu/armariris">gossip-sjtu/armariris</a> 孤挺花(Armariris) -- 由上海交通大学密码与计算机安全实验室维护的LLVM混淆框架</li> <li>[<strong>653</strong>星][6m] [Go] <a href="https://github.com/yawning/obfs4">yawning/obfs4</a> The obfourscator (Courtesy mirror)</li> <li>[<strong>482</strong>星][3m] [Py] <a href="https://github.com/bashfuscator/bashfuscator">bashfuscator/bashfuscator</a> A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.</li> <li>[<strong>467</strong>星][2m] [LLVM] <a href="https://github.com/jonathansalwan/tigress_protection">jonathansalwan/tigress_protection</a> Playing with the Tigress binary protection. Break some of its protections and solve some of its challenges. Automatic deobfuscation using symbolic execution, taint analysis and LLVM.</li> <li>[<strong>458</strong>星][1m] [PHP] <a href="https://github.com/pk-fr/yakpro-po">pk-fr/yakpro-po</a> YAK Pro - Php Obfuscator</li> <li>[<strong>423</strong>星][11m] [Py] <a href="https://github.com/d4vinci/cuteit">d4vinci/cuteit</a> IP obfuscator made to make a malicious ip a bit cuter</li> <li>[<strong>420</strong>星][5d] [Py] <a href="https://github.com/dashingsoft/pyarmor">dashingsoft/pyarmor</a> A tool used to obfuscate python scripts, bind obfuscated scripts to fixed machine or expire obfuscated scripts.</li> <li>[<strong>394</strong>星][1y] [Py] <a href="https://github.com/essandess/isp-data-pollution">essandess/isp-data-pollution</a> ISP Data Pollution to Protect Private Browsing History with Obfuscation</li> <li>[<strong>348</strong>星][1y] [C] <a href="https://github.com/codermjlee/mjcodeobfuscation">codermjlee/mjcodeobfuscation</a> 一个用于代码混淆和字符串加密的Mac小Demo</li> <li>[<strong>337</strong>星][22d] [Go] <a href="https://github.com/unixpickle/gobfuscate">unixpickle/gobfuscate</a> Obfuscate Go binaries and packages</li> <li>[<strong>311</strong>星][3m] [PHP] <a href="https://github.com/elfsundae/laravel-hashid">elfsundae/laravel-hashid</a> Obfuscate your data by generating reversible, non-sequential, URL-safe identifiers.</li> <li>[<strong>282</strong>星][29d] [Py] <a href="https://github.com/hnfull/intensio-obfuscator">hnfull/intensio-obfuscator</a> Obfuscate a python code 2.x and 3.x</li> <li>[<strong>276</strong>星][5d] [TS] <a href="https://github.com/javascript-obfuscator/webpack-obfuscator">javascript-obfuscator/webpack-obfuscator</a> javascript-obfuscator plugin for Webpack</li> <li>[<strong>263</strong>星][6m] [C++] <a href="https://github.com/d35ha/callobfuscator">d35ha/callobfuscator</a> Obfuscate specific windows apis with different apis</li> <li>[<strong>263</strong>星][4m] [ObjC] <a href="https://github.com/preemptive/ppios-rename">preemptive/ppios-rename</a> Symbol obfuscator for iOS apps</li> <li>[<strong>235</strong>星][21d] [C#] <a href="https://github.com/xenocoderce/neo-confuserex">xenocoderce/neo-confuserex</a> Updated ConfuserEX, an open-source, free obfuscator for .NET applications</li> <li>[<strong>202</strong>星][6m] [C#] <a href="https://github.com/bedthegod/confuserex-mod-by-bed">bedthegod/confuserex-mod-by-bed</a> Beds Protector | Best free obfuscation out right now</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-78d0ac450a56c542e109c07a3b0225ae"></a>Payload管理</h3><a id="user-content-payload管理" class="anchor" aria-label="Permalink: Payload管理" href="#payload管理"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-d08b7bd562a4bf18275c63ffe7d8fc91"></a>勒索软件</h3><a id="user-content-勒索软件" class="anchor" aria-label="Permalink: 勒索软件" href="#勒索软件"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>391</strong>星][1y] [Go] <a href="https://github.com/mauri870/ransomware">mauri870/ransomware</a> A POC Windows crypto-ransomware (Academic)</li> <li>[<strong>331</strong>星][t] [Batchfile] <a href="https://github.com/mitchellkrogza/ultimate.hosts.blacklist">mitchellkrogza/ultimate.hosts.blacklist</a> The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware.</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-82f546c7277db7919986ecf47f3c9495"></a>键盘记录器&amp;&amp;Keylogger</h3><a id="user-content-键盘记录器keylogger" class="anchor" aria-label="Permalink: 键盘记录器&amp;&amp;Keylogger" href="#键盘记录器keylogger"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>710</strong>星][8m] [Py] <a href="https://github.com/giacomolaw/keylogger">giacomolaw/keylogger</a> A simple keylogger for Windows, Linux and Mac</li> <li>[<strong>462</strong>星][1y] [Py] <a href="https://github.com/mehulj94/Radium">mehulj94/radium</a> Python keylogger with multiple features.</li> <li>[<strong>364</strong>星][12m] [Py] <a href="https://github.com/ajinabraham/xenotix-python-keylogger">ajinabraham/xenotix-python-keylogger</a> Xenotix Python Keylogger for Windows.</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-8f99087478f596139922cd1ad9ec961b"></a>Meterpreter</h3><a id="user-content-meterpreter" class="anchor" aria-label="Permalink: Meterpreter" href="#meterpreter"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>244</strong>星][1m] [Py] <a href="https://github.com/mez0cc/ms17-010-python">mez0cc/ms17-010-python</a> MS17-010: Python and Meterpreter</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-63e0393e375e008af46651a3515072d8"></a>Payload投递</h3><a id="user-content-payload投递" class="anchor" aria-label="Permalink: Payload投递" href="#payload投递"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>263</strong>星][4m] [Py] <a href="https://github.com/no0be/dnslivery">no0be/dnslivery</a> Easy files and payloads delivery over DNS</li> </ul> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-0b644b2d8119abf6643755ef455fcf2c"></a>文章</h2><a id="user-content-文章-22" class="anchor" aria-label="Permalink: 文章" href="#文章-22"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-27962a7633b86d43cae2dd2d4c32f1b6"></a>新添加</h3><a id="user-content-新添加-2" class="anchor" aria-label="Permalink: 新添加" href="#新添加-2"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-a9494547a9359c60f09aea89f96a2c83"></a>后渗透</h1><a id="user-content-后渗透" class="anchor" aria-label="Permalink: 后渗透" href="#后渗透"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-3ed50213c2818f1455eff4e30372c542"></a>工具</h2><a id="user-content-工具-23" class="anchor" aria-label="Permalink: 工具" href="#工具-23"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-12abc279c69d1fcf10692b9cb89bcdf7"></a>未分类-post-exp</h3><a id="user-content-未分类-post-exp" class="anchor" aria-label="Permalink: 未分类-post-exp" href="#未分类-post-exp"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>7035</strong>星][t] [C] <a href="https://github.com/hashcat/hashcat">hashcat/hashcat</a> 世界上最快最先进的密码恢复工具 <ul dir="auto"> <li>重复区段: <a href="#86dc226ae8a71db10e4136f4b82ccd06">密码-&gt;工具-&gt;密码</a> |</li> </ul> </li> <li>[<strong>3369</strong>星][8d] [C] <a href="https://github.com/screetsec/thefatrat">screetsec/thefatrat</a> Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw… <ul dir="auto"> <li>重复区段: <a href="#ad92f6b801a18934f1971e2512f5ae4f">Payload-&gt;工具-&gt;Payload生成</a> |</li> </ul> </li> <li>[<strong>2479</strong>星][1m] [Shell] <a href="https://github.com/rebootuser/linenum">rebootuser/linenum</a> Scripted Local Linux Enumeration &amp; Privilege Escalation Checks</li> <li>[<strong>2171</strong>星][1m] [Py] <a href="https://github.com/commixproject/commix">commixproject/commix</a> Automated All-in-One OS command injection and exploitation tool.</li> <li>[<strong>1243</strong>星][10m] [C] <a href="https://github.com/a0rtega/pafish">a0rtega/pafish</a> Pafish is a demonstration tool that employs several techniques to detect sandboxes and analysis environments in the same way as malware families do.</li> <li>[<strong>1225</strong>星][1y] [C#] <a href="https://github.com/cn33liz/p0wnedshell">cn33liz/p0wnedshell</a> PowerShell Runspace Post Exploitation Toolkit</li> <li>[<strong>1116</strong>星][9m] [Py] <a href="https://github.com/0x00-0x00/shellpop">0x00-0x00/shellpop</a> 在渗透中生产简易的/复杂的反向/绑定Shell</li> <li>[<strong>1062</strong>星][2m] [Boo] <a href="https://github.com/byt3bl33d3r/silenttrinity">byt3bl33d3r/silenttrinity</a> An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR</li> <li>[<strong>1024</strong>星][4m] [Py] <a href="https://github.com/byt3bl33d3r/deathstar">byt3bl33d3r/deathstar</a> 在Active Directory环境中使用Empire自动获取域管理员权限</li> <li>[<strong>765</strong>星][5m] [Py] <a href="https://github.com/lgandx/pcredz">lgandx/pcredz</a> This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.</li> <li>[<strong>743</strong>星][5m] [PS] <a href="https://github.com/hausec/adape-script">hausec/adape-script</a> Active Directory Assessment and Privilege Escalation Script</li> <li>[<strong>697</strong>星][2m] [C#] <a href="https://github.com/cobbr/sharpsploit">cobbr/sharpsploit</a> SharpSploit is a .NET post-exploitation library written in C#</li> <li>[<strong>422</strong>星][16d] [Shell] <a href="https://github.com/thesecondsun/bashark">thesecondsun/bashark</a> Bash post exploitation toolkit</li> <li>[<strong>344</strong>星][5m] [Py] <a href="https://github.com/adrianvollmer/powerhub">adrianvollmer/powerhub</a> A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting</li> <li>[<strong>282</strong>星][1y] [JS] <a href="https://github.com/chrisallenlane/novahot">chrisallenlane/novahot</a> Webshell框架,实现了基于Json的API,可与任何语言编写的后门(默认支持PHP/Ruby/Python)进行通信。</li> <li>[<strong>233</strong>星][2d] [Go] <a href="https://github.com/brompwnie/botb">brompwnie/botb</a> A container analysis and exploitation tool for pentesters and engineers.</li> <li>[<strong>204</strong>星][2m] [Py] <a href="https://github.com/elevenpaths/ibombshell">elevenpaths/ibombshell</a> Tool to deploy a post-exploitation prompt at any time</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-4c2095e7e192ac56f6ae17c8fc045c51"></a>提权&amp;&amp;PrivilegeEscalation</h3><a id="user-content-提权privilegeescalation" class="anchor" aria-label="Permalink: 提权&amp;&amp;PrivilegeEscalation" href="#提权privilegeescalation"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>3699</strong>星][5m] [C] <a href="https://github.com/secwiki/windows-kernel-exploits">secwiki/windows-kernel-exploits</a> windows-kernel-exploits Windows平台提权漏洞集合</li> <li>[<strong>1283</strong>星][3m] [Py] <a href="https://github.com/alessandroz/beroot">alessandroz/beroot</a> Privilege Escalation Project - Windows / Linux / Mac</li> <li>[<strong>638</strong>星][11m] [C++] <a href="https://github.com/ohpe/juicy-potato">ohpe/juicy-potato</a> A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.</li> <li>[<strong>547</strong>星][5m] <a href="https://github.com/rhinosecuritylabs/aws-iam-privilege-escalation">rhinosecuritylabs/aws-iam-privilege-escalation</a> A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.</li> <li>[<strong>496</strong>星][8m] [Py] <a href="https://github.com/initstring/dirty_sock">initstring/dirty_sock</a> Linux privilege escalation exploit via snapd (CVE-2019-7304)</li> <li>[<strong>492</strong>星][2m] [C#] <a href="https://github.com/rasta-mouse/watson">rasta-mouse/watson</a> Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities</li> <li>[<strong>485</strong>星][8m] [C] <a href="https://github.com/nongiach/sudo_inject">nongiach/sudo_inject</a> [Linux] Two Privilege Escalation techniques abusing sudo token</li> <li>[<strong>392</strong>星][4m] [PS] <a href="https://github.com/cyberark/ACLight">cyberark/aclight</a> A script for advanced discovery of Privileged Accounts - includes Shadow Admins</li> <li>[<strong>371</strong>星][3m] [PS] <a href="https://github.com/gdedrouas/exchange-ad-privesc">gdedrouas/exchange-ad-privesc</a> Exchange privilege escalations to Active Directory</li> <li>[<strong>340</strong>星][2m] [Shell] <a href="https://github.com/nullarray/roothelper">nullarray/roothelper</a> 辅助在被攻克系统上的提权过程:自动枚举、下载、解压并执行提权脚本</li> <li>[<strong>308</strong>星][5m] [Batchfile] <a href="https://github.com/frizb/windows-privilege-escalation">frizb/windows-privilege-escalation</a> Windows Privilege Escalation Techniques and Scripts</li> <li>[<strong>269</strong>星][4m] [PHP] <a href="https://github.com/lawrenceamer/0xsp-mongoose">lawrenceamer/0xsp-mongoose</a> Privilege Escalation Enumeration Toolkit (64/32 ) , fast , intelligent enumeration with Web API integration . Mastering Your Own Finding</li> <li>[<strong>223</strong>星][3m] [Py] <a href="https://github.com/initstring/uptux">initstring/uptux</a> Linux privilege escalation checks (systemd, dbus, socket fun, etc)</li> <li>[<strong>222</strong>星][4d] [C#] <a href="https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite">carlospolop/privilege-escalation-awesome-scripts-suite</a> PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)</li> <li>[<strong>222</strong>星][4d] [C#] <a href="https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite">carlospolop/privilege-escalation-awesome-scripts-suite</a> PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-caab36bba7fa8bb931a9133e37d397f6"></a>Windows</h3><a id="user-content-windows" class="anchor" aria-label="Permalink: Windows" href="#windows"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h4 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-7ed8ee71c4a733d5e5e5d239f0e8b9e0"></a>未分类-Windows</h4><a id="user-content-未分类-windows" class="anchor" aria-label="Permalink: 未分类-Windows" href="#未分类-windows"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>8785</strong>星][28d] [C] <a href="https://github.com/gentilkiwi/mimikatz">gentilkiwi/mimikatz</a> A little tool to play with Windows security</li> <li>[<strong>2153</strong>星][2m] [Py] <a href="https://github.com/trustedsec/unicorn">trustedsec/unicorn</a> 通过PowerShell降级攻击, 直接将Shellcode注入到内存</li> <li>[<strong>2045</strong>星][13d] [C++] <a href="https://github.com/darthton/blackbone">darthton/blackbone</a> Windows memory hacking library</li> <li>[<strong>999</strong>星][11m] [Batchfile] <a href="https://github.com/sagishahar-zz/lpeworkshop">sagishahar-zz/lpeworkshop</a> Windows / Linux Local Privilege Escalation Workshop</li> <li>[<strong>931</strong>星][6d] [C#] <a href="https://github.com/googleprojectzero/sandbox-attacksurface-analysis-tools">googleprojectzero/sandbox-attacksurface-analysis-tools</a> 沙箱攻击面(Attack Surface)分析工具,用于测试 Windows 上沙箱的各种属性</li> <li>[<strong>700</strong>星][8m] [C] <a href="https://github.com/hfiref0x/tdl">hfiref0x/tdl</a> Driver loader for bypassing Windows x64 Driver Signature Enforcement</li> <li>[<strong>694</strong>星][5m] [C#] <a href="https://github.com/outflanknl/evilclippy">outflanknl/evilclippy</a> A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.</li> <li>[<strong>611</strong>星][9m] [C#] <a href="https://github.com/0xbadjuju/tokenvator">0xbadjuju/tokenvator</a> A tool to elevate privilege with Windows Tokens</li> <li>[<strong>519</strong>星][12m] [PS] <a href="https://github.com/a-min3/winspect">a-min3/winspect</a> Powershell-based Windows Security Auditing Toolbox</li> <li>[<strong>416</strong>星][1m] [C++] <a href="https://github.com/hoshimin/kernel-bridge">hoshimin/kernel-bridge</a> Windows kernel hacking framework, driver template, hypervisor and API written on C++</li> <li>[<strong>391</strong>星][2m] [Java] <a href="https://github.com/tiagorlampert/saint">tiagorlampert/saint</a> a Spyware Generator for Windows systems written in Java</li> <li>[<strong>349</strong>星][2m] [Shell] <a href="https://github.com/orlikoski/Skadi">orlikoski/skadi</a> collection, processing and advanced analysis of forensic artifacts and images.</li> <li>[<strong>341</strong>星][1y] [C++] <a href="https://github.com/QAX-A-Team/EventCleaner">qax-a-team/eventcleaner</a> A tool mainly to erase specified records from Windows event logs, with additional functionalities.</li> <li>[<strong>340</strong>星][19d] [C] <a href="https://github.com/mattiwatti/efiguard">mattiwatti/efiguard</a> Disable PatchGuard and DSE at boot time</li> <li>[<strong>302</strong>星][2d] [Py] <a href="https://github.com/skylined/bugid">skylined/bugid</a> Detect, analyze and uniquely identify crashes in Windows applications</li> <li>[<strong>298</strong>星][1y] [PS] <a href="https://github.com/onelogicalmyth/zeroday-powershell">onelogicalmyth/zeroday-powershell</a> A PowerShell example of the Windows zero day priv esc</li> <li>[<strong>290</strong>星][7m] [Py] <a href="https://github.com/ropnop/windapsearch">ropnop/windapsearch</a> Python script to enumerate users, groups and computers from a Windows domain through LDAP queries</li> <li>[<strong>288</strong>星][11m] <a href="https://github.com/maaaaz/impacket-examples-windows">maaaaz/impacket-examples-windows</a> The great impacket example scripts compiled for Windows</li> <li>[<strong>213</strong>星][4m] [PHP] <a href="https://github.com/rizer0/log-killer">rizer0/log-killer</a> Clear all your logs in [linux/windows] servers</li> <li>[<strong>212</strong>星][1m] [C++] <a href="https://github.com/can1357/byepg">can1357/byepg</a> Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI</li> <li>[<strong>211</strong>星][1y] [C++] <a href="https://github.com/tandasat/pgresarch">tandasat/pgresarch</a> PatchGuard Research</li> <li>[<strong>206</strong>星][20d] [Py] <a href="https://github.com/mzfr/rsh">mzfr/rsh</a> generate reverse shell from CLI for linux and Windows.</li> <li>[<strong>203</strong>星][5d] [Py] <a href="https://github.com/ropnop/impacket_static_binaries">ropnop/impacket_static_binaries</a> Standalone binaries for Linux/Windows of Impacket's examples</li> <li>[<strong>201</strong>星][10m] [HTML] <a href="https://github.com/mxmssh/drltrace">mxmssh/drltrace</a> Drltrace is a library calls tracer for Windows and Linux applications.</li> </ul> <div class="markdown-heading" dir="auto"><h4 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-58f3044f11a31d0371daa91486d3694e"></a>UAC</h4><a id="user-content-uac" class="anchor" aria-label="Permalink: UAC" href="#uac"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>2355</strong>星][3d] [C] <a href="https://github.com/hfiref0x/uacme">hfiref0x/uacme</a> Defeating Windows User Account Control</li> </ul> <div class="markdown-heading" dir="auto"><h4 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-b84c84a853416b37582c3b7f13eabb51"></a>AppLocker</h4><a id="user-content-applocker" class="anchor" aria-label="Permalink: AppLocker" href="#applocker"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h4 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-e3c4c83dfed529ceee65040e565003c4"></a>ActiveDirectory</h4><a id="user-content-activedirectory" class="anchor" aria-label="Permalink: ActiveDirectory" href="#activedirectory"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>3652</strong>星][19d] [PS] <a href="https://github.com/BloodHoundAD/BloodHound">bloodhoundad/bloodhound</a> a single page Javascript web application, uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment.</li> <li>[<strong>2009</strong>星][3m] <a href="https://github.com/infosecn1nja/ad-attack-defense">infosecn1nja/ad-attack-defense</a> Attack and defend active directory using modern post exploitation adversary tradecraft activity</li> <li>[<strong>338</strong>星][9m] [Py] <a href="https://github.com/dirkjanm/ldapdomaindump">dirkjanm/ldapdomaindump</a> Active Directory information dumper via LDAP</li> <li>[<strong>242</strong>星][1y] [Go] <a href="https://github.com/netspi/goddi">netspi/goddi</a> goddi (go dump domain info) dumps Active Directory domain information</li> </ul> <div class="markdown-heading" dir="auto"><h4 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-25697cca32bd8c9492b8e2c8a3a93bfe"></a>域渗透</h4><a id="user-content-域渗透" class="anchor" aria-label="Permalink: 域渗透" href="#域渗透"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h4 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-a5c1d88a8e35b6c6223a6d64dbfb5358"></a>WET</h4><a id="user-content-wet" class="anchor" aria-label="Permalink: WET" href="#wet"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-2dd40db455d3c6f1f53f8a9c25bbe63e"></a>驻留&amp;&amp;Persistence</h3><a id="user-content-驻留persistence" class="anchor" aria-label="Permalink: 驻留&amp;&amp;Persistence" href="#驻留persistence"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <ul dir="auto"> <li>[<strong>306</strong>星][3m] [C#] <a href="https://github.com/fireeye/sharpersist">fireeye/sharpersist</a> Windows persistence toolkit</li> </ul> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-4fc56d3dd1977b882ba14a9fd820f8e2"></a>Linux&amp;&amp;Xnix</h3><a id="user-content-linuxxnix" class="anchor" aria-label="Permalink: Linux&amp;&amp;Xnix" href="#linuxxnix"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <hr> <div class="markdown-heading" dir="auto"><h2 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-c86567da7d4004149912383575be3b45"></a>文章</h2><a id="user-content-文章-23" class="anchor" aria-label="Permalink: 文章" href="#文章-23"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h3 tabindex="-1" class="heading-element" dir="auto"><a id="user-content-fdf10af493284be94033d1350f1e9b5c"></a>新添加</h3><a id="user-content-新添加-3" class="anchor" aria-label="Permalink: 新添加" href="#新添加-3"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <div class="markdown-heading" dir="auto"><h1 tabindex="-1" class="heading-element" dir="auto">贡献</h1><a id="user-content-贡献" class="anchor" aria-label="Permalink: 贡献" href="#贡献"><svg class="octicon octicon-link" viewBox="0 0 16 16" version="1.1" width="16" height="16" aria-hidden="true"><path d="m7.775 3.275 1.25-1.25a3.5 3.5 0 1 1 4.95 4.95l-2.5 2.5a3.5 3.5 0 0 1-4.95 0 .751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018 1.998 1.998 0 0 0 2.83 0l2.5-2.5a2.002 2.002 0 0 0-2.83-2.83l-1.25 1.25a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042Zm-4.69 9.64a1.998 1.998 0 0 0 2.83 0l1.25-1.25a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042l-1.25 1.25a3.5 3.5 0 1 1-4.95-4.95l2.5-2.5a3.5 3.5 0 0 1 4.95 0 .751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018 1.998 1.998 0 0 0-2.83 0l-2.5 2.5a1.998 1.998 0 0 0 0 2.83Z"></path></svg></a></div> <p dir="auto">内容为系统自动导出, 有任何问题请提issue</p> </article></div></div></div></div></div> <!-- --> <!-- --> <script type="application/json" id="__PRIMER_DATA_:R0:__">{"resolvedServerColorMode":"day"}</script></div> </react-partial> <input type="hidden" data-csrf="true" value="Z0nEPKFh+GwjRL/c11+Gc3aASEOVOqK/UjXAF8nTDxrmoTdzcOPjheXdf9/a4PbEdCsz6d3kFruEUIVtznFfrQ==" /> </div> <div data-view-component="true" class="Layout-sidebar"> <div class="BorderGrid about-margin" data-pjax> <div class="BorderGrid-row"> <div class="BorderGrid-cell"> <div class="hide-sm hide-md"> <h2 class="mb-3 h4">About</h2> <p class="f4 my-3"> (!!! Github shows less than 4000 lines, and more than 5000 lines is missing. Please download Readme.md and open it in markdown viewer to review the FULL version)[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, … </p> <h3 class="sr-only">Resources</h3> <div class="mt-2"> <a class="Link--muted" data-analytics-event="{&quot;category&quot;:&quot;Repository Overview&quot;,&quot;action&quot;:&quot;click&quot;,&quot;label&quot;:&quot;location:sidebar;file:readme&quot;}" href="#readme-ov-file"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-book mr-2"> <path d="M0 1.75A.75.75 0 0 1 .75 1h4.253c1.227 0 2.317.59 3 1.501A3.743 3.743 0 0 1 11.006 1h4.245a.75.75 0 0 1 .75.75v10.5a.75.75 0 0 1-.75.75h-4.507a2.25 2.25 0 0 0-1.591.659l-.622.621a.75.75 0 0 1-1.06 0l-.622-.621A2.25 2.25 0 0 0 5.258 13H.75a.75.75 0 0 1-.75-.75Zm7.251 10.324.004-5.073-.002-2.253A2.25 2.25 0 0 0 5.003 2.5H1.5v9h3.757a3.75 3.75 0 0 1 1.994.574ZM8.755 4.75l-.004 7.322a3.752 3.752 0 0 1 1.992-.572H14.5v-9h-3.495a2.25 2.25 0 0 0-2.25 2.25Z"></path> </svg> Readme </a> </div> <include-fragment src="/fengjixuchui/awesome-cyber-security/hovercards/citation/sidebar_partial?tree_name=master"> </include-fragment> <div class="mt-2"> <a href="/fengjixuchui/awesome-cyber-security/activity" data-view-component="true" class="Link Link--muted"><svg text="gray" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-pulse mr-2"> <path d="M6 2c.306 0 .582.187.696.471L10 10.731l1.304-3.26A.751.751 0 0 1 12 7h3.25a.75.75 0 0 1 0 1.5h-2.742l-1.812 4.528a.751.751 0 0 1-1.392 0L6 4.77 4.696 8.03A.75.75 0 0 1 4 8.5H.75a.75.75 0 0 1 0-1.5h2.742l1.812-4.529A.751.751 0 0 1 6 2Z"></path> </svg> <span class="color-fg-muted">Activity</span></a> </div> <h3 class="sr-only">Stars</h3> <div class="mt-2"> <a href="/fengjixuchui/awesome-cyber-security/stargazers" data-view-component="true" class="Link Link--muted"><svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-star mr-2"> <path d="M8 .25a.75.75 0 0 1 .673.418l1.882 3.815 4.21.612a.75.75 0 0 1 .416 1.279l-3.046 2.97.719 4.192a.751.751 0 0 1-1.088.791L8 12.347l-3.766 1.98a.75.75 0 0 1-1.088-.79l.72-4.194L.818 6.374a.75.75 0 0 1 .416-1.28l4.21-.611L7.327.668A.75.75 0 0 1 8 .25Zm0 2.445L6.615 5.5a.75.75 0 0 1-.564.41l-3.097.45 2.24 2.184a.75.75 0 0 1 .216.664l-.528 3.084 2.769-1.456a.75.75 0 0 1 .698 0l2.77 1.456-.53-3.084a.75.75 0 0 1 .216-.664l2.24-2.183-3.096-.45a.75.75 0 0 1-.564-.41L8 2.694Z"></path> </svg> <strong>6</strong> stars</a> </div> <h3 class="sr-only">Watchers</h3> <div class="mt-2"> <a href="/fengjixuchui/awesome-cyber-security/watchers" data-view-component="true" class="Link Link--muted"><svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-eye mr-2"> <path d="M8 2c1.981 0 3.671.992 4.933 2.078 1.27 1.091 2.187 2.345 2.637 3.023a1.62 1.62 0 0 1 0 1.798c-.45.678-1.367 1.932-2.637 3.023C11.67 13.008 9.981 14 8 14c-1.981 0-3.671-.992-4.933-2.078C1.797 10.83.88 9.576.43 8.898a1.62 1.62 0 0 1 0-1.798c.45-.677 1.367-1.931 2.637-3.022C4.33 2.992 6.019 2 8 2ZM1.679 7.932a.12.12 0 0 0 0 .136c.411.622 1.241 1.75 2.366 2.717C5.176 11.758 6.527 12.5 8 12.5c1.473 0 2.825-.742 3.955-1.715 1.124-.967 1.954-2.096 2.366-2.717a.12.12 0 0 0 0-.136c-.412-.621-1.242-1.75-2.366-2.717C10.824 4.242 9.473 3.5 8 3.5c-1.473 0-2.825.742-3.955 1.715-1.124.967-1.954 2.096-2.366 2.717ZM8 10a2 2 0 1 1-.001-3.999A2 2 0 0 1 8 10Z"></path> </svg> <strong>0</strong> watching</a> </div> <h3 class="sr-only">Forks</h3> <div class="mt-2"> <a href="/fengjixuchui/awesome-cyber-security/forks" data-view-component="true" class="Link Link--muted"><svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo-forked mr-2"> <path d="M5 5.372v.878c0 .414.336.75.75.75h4.5a.75.75 0 0 0 .75-.75v-.878a2.25 2.25 0 1 1 1.5 0v.878a2.25 2.25 0 0 1-2.25 2.25h-1.5v2.128a2.251 2.251 0 1 1-1.5 0V8.5h-1.5A2.25 2.25 0 0 1 3.5 6.25v-.878a2.25 2.25 0 1 1 1.5 0ZM5 3.25a.75.75 0 1 0-1.5 0 .75.75 0 0 0 1.5 0Zm6.75.75a.75.75 0 1 0 0-1.5.75.75 0 0 0 0 1.5Zm-3 8.75a.75.75 0 1 0-1.5 0 .75.75 0 0 0 1.5 0Z"></path> </svg> <strong>199</strong> forks</a> </div> <div class="mt-2"> <a class="Link--muted" href="/contact/report-content?content_url=https%3A%2F%2Fgithub.com%2Ffengjixuchui%2Fawesome-cyber-security&amp;report=fengjixuchui+%28user%29"> Report repository </a> </div> </div> </div> </div> <div class="BorderGrid-row"> <div class="BorderGrid-cell"> <h2 class="h4 mb-3" data-pjax="#repo-content-pjax-container" data-turbo-frame="repo-content-turbo-frame"> <a href="/fengjixuchui/awesome-cyber-security/releases" data-view-component="true" class="Link--primary no-underline Link">Releases</a></h2> <div class="text-small color-fg-muted">No releases published</div> </div> </div> <div class="BorderGrid-row"> <div class="BorderGrid-cell"> <h2 class="h4 mb-3"> <a href="/users/fengjixuchui/packages?repo_name=awesome-cyber-security" data-view-component="true" class="Link--primary no-underline Link d-flex flex-items-center">Packages <span title="0" hidden="hidden" data-view-component="true" class="Counter ml-1">0</span></a></h2> <div class="text-small color-fg-muted" > No packages published <br> </div> </div> </div> <div class="BorderGrid-row" hidden> <div class="BorderGrid-cell"> <include-fragment src="/fengjixuchui/awesome-cyber-security/used_by_list" accept="text/fragment+html"> </include-fragment> </div> </div> <div class="BorderGrid-row"> <div class="BorderGrid-cell"> <h2 class="h4 mb-3"> <a href="/fengjixuchui/awesome-cyber-security/graphs/contributors" data-view-component="true" class="Link--primary no-underline Link d-flex flex-items-center">Contributors <span title="2" data-view-component="true" class="Counter ml-1">2</span></a></h2> <ul class="list-style-none "> <li class="mb-2 d-flex" > <a href="https://github.com/humblepride" class="mr-2" data-hovercard-type="user" data-hovercard-url="/users/humblepride/hovercard" data-octo-click="hovercard-link-click" data-octo-dimensions="link_type:self" > <img src="https://avatars.githubusercontent.com/u/16147497?s=64&amp;v=4" alt="@humblepride" size="32" height="32" width="32" data-view-component="true" class="avatar circle" /> </a> <span data-view-component="true" class="flex-self-center min-width-0 css-truncate css-truncate-overflow width-fit flex-auto"> <a href="https://github.com/humblepride" class="Link--primary no-underline flex-self-center"> <strong>humblepride</strong> <span class="color-fg-muted">cbr</span> </a> </span> </li> <li class="mb-2 d-flex" > <a href="https://github.com/fengjixuchui" class="mr-2" data-hovercard-type="user" data-hovercard-url="/users/fengjixuchui/hovercard" data-octo-click="hovercard-link-click" data-octo-dimensions="link_type:self" > <img src="https://avatars.githubusercontent.com/u/2487206?s=64&amp;v=4" alt="@fengjixuchui" size="32" height="32" width="32" data-view-component="true" class="avatar circle" /> </a> <span data-view-component="true" class="flex-self-center min-width-0 css-truncate css-truncate-overflow width-fit flex-auto"> <a href="https://github.com/fengjixuchui" class="Link--primary no-underline flex-self-center"> <strong>fengjixuchui</strong> </a> </span> </li> </ul> </div> </div> </div> </div> </div></div> </div> </div> </turbo-frame> </main> </div> </div> <footer class="footer pt-8 pb-6 f6 color-fg-muted p-responsive" role="contentinfo" > <h2 class='sr-only'>Footer</h2> <div class="d-flex flex-justify-center flex-items-center flex-column-reverse flex-lg-row flex-wrap flex-lg-nowrap"> <div class="d-flex flex-items-center flex-shrink-0 mx-2"> <a aria-label="Homepage" title="GitHub" class="footer-octicon mr-2" href="https://github.com"> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-mark-github"> <path d="M12 1C5.9225 1 1 5.9225 1 12C1 16.8675 4.14875 20.9787 8.52125 22.4362C9.07125 22.5325 9.2775 22.2025 9.2775 21.9137C9.2775 21.6525 9.26375 20.7862 9.26375 19.865C6.5 20.3737 5.785 19.1912 5.565 18.5725C5.44125 18.2562 4.905 17.28 4.4375 17.0187C4.0525 16.8125 3.5025 16.3037 4.42375 16.29C5.29 16.2762 5.90875 17.0875 6.115 17.4175C7.105 19.0812 8.68625 18.6137 9.31875 18.325C9.415 17.61 9.70375 17.1287 10.02 16.8537C7.5725 16.5787 5.015 15.63 5.015 11.4225C5.015 10.2262 5.44125 9.23625 6.1425 8.46625C6.0325 8.19125 5.6475 7.06375 6.2525 5.55125C6.2525 5.55125 7.17375 5.2625 9.2775 6.67875C10.1575 6.43125 11.0925 6.3075 12.0275 6.3075C12.9625 6.3075 13.8975 6.43125 14.7775 6.67875C16.8813 5.24875 17.8025 5.55125 17.8025 5.55125C18.4075 7.06375 18.0225 8.19125 17.9125 8.46625C18.6138 9.23625 19.04 10.2125 19.04 11.4225C19.04 15.6437 16.4688 16.5787 14.0213 16.8537C14.42 17.1975 14.7638 17.8575 14.7638 18.8887C14.7638 20.36 14.75 21.5425 14.75 21.9137C14.75 22.2025 14.9563 22.5462 15.5063 22.4362C19.8513 20.9787 23 16.8537 23 12C23 5.9225 18.0775 1 12 1Z"></path> </svg> </a> <span> &copy; 2025 GitHub,&nbsp;Inc. </span> </div> <nav aria-label="Footer"> <h3 class="sr-only" id="sr-footer-heading">Footer navigation</h3> <ul class="list-style-none d-flex flex-justify-center flex-wrap mb-2 mb-lg-0" aria-labelledby="sr-footer-heading"> <li class="mx-2"> <a data-analytics-event="{&quot;category&quot;:&quot;Footer&quot;,&quot;action&quot;:&quot;go to Terms&quot;,&quot;label&quot;:&quot;text:terms&quot;}" href="https://docs.github.com/site-policy/github-terms/github-terms-of-service" data-view-component="true" class="Link--secondary Link">Terms</a> </li> <li class="mx-2"> <a data-analytics-event="{&quot;category&quot;:&quot;Footer&quot;,&quot;action&quot;:&quot;go to privacy&quot;,&quot;label&quot;:&quot;text:privacy&quot;}" href="https://docs.github.com/site-policy/privacy-policies/github-privacy-statement" data-view-component="true" class="Link--secondary Link">Privacy</a> </li> <li class="mx-2"> <a data-analytics-event="{&quot;category&quot;:&quot;Footer&quot;,&quot;action&quot;:&quot;go to security&quot;,&quot;label&quot;:&quot;text:security&quot;}" href="https://github.com/security" data-view-component="true" class="Link--secondary Link">Security</a> </li> <li class="mx-2"> <a data-analytics-event="{&quot;category&quot;:&quot;Footer&quot;,&quot;action&quot;:&quot;go to status&quot;,&quot;label&quot;:&quot;text:status&quot;}" href="https://www.githubstatus.com/" data-view-component="true" class="Link--secondary Link">Status</a> </li> <li class="mx-2"> <a data-analytics-event="{&quot;category&quot;:&quot;Footer&quot;,&quot;action&quot;:&quot;go to docs&quot;,&quot;label&quot;:&quot;text:docs&quot;}" href="https://docs.github.com/" data-view-component="true" class="Link--secondary Link">Docs</a> </li> <li class="mx-2"> <a data-analytics-event="{&quot;category&quot;:&quot;Footer&quot;,&quot;action&quot;:&quot;go to contact&quot;,&quot;label&quot;:&quot;text:contact&quot;}" href="https://support.github.com?tags=dotcom-footer" data-view-component="true" class="Link--secondary Link">Contact</a> </li> <li class="mx-2" > <cookie-consent-link> <button type="button" class="Link--secondary underline-on-hover border-0 p-0 color-bg-transparent" data-action="click:cookie-consent-link#showConsentManagement" data-analytics-event="{&quot;location&quot;:&quot;footer&quot;,&quot;action&quot;:&quot;cookies&quot;,&quot;context&quot;:&quot;subfooter&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;cookies_link_subfooter_footer&quot;}" > Manage cookies </button> </cookie-consent-link> </li> <li class="mx-2"> <cookie-consent-link> <button type="button" class="Link--secondary underline-on-hover border-0 p-0 color-bg-transparent" data-action="click:cookie-consent-link#showConsentManagement" data-analytics-event="{&quot;location&quot;:&quot;footer&quot;,&quot;action&quot;:&quot;dont_share_info&quot;,&quot;context&quot;:&quot;subfooter&quot;,&quot;tag&quot;:&quot;link&quot;,&quot;label&quot;:&quot;dont_share_info_link_subfooter_footer&quot;}" > Do not share my personal information </button> </cookie-consent-link> </li> </ul> </nav> </div> </footer> <ghcc-consent id="ghcc" class="position-fixed bottom-0 left-0" style="z-index: 999999" data-initial-cookie-consent-allowed="" data-cookie-consent-required="false"></ghcc-consent> <div id="ajax-error-message" class="ajax-error-message flash flash-error" hidden> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-alert"> <path d="M6.457 1.047c.659-1.234 2.427-1.234 3.086 0l6.082 11.378A1.75 1.75 0 0 1 14.082 15H1.918a1.75 1.75 0 0 1-1.543-2.575Zm1.763.707a.25.25 0 0 0-.44 0L1.698 13.132a.25.25 0 0 0 .22.368h12.164a.25.25 0 0 0 .22-.368Zm.53 3.996v2.5a.75.75 0 0 1-1.5 0v-2.5a.75.75 0 0 1 1.5 0ZM9 11a1 1 0 1 1-2 0 1 1 0 0 1 2 0Z"></path> </svg> <button type="button" class="flash-close js-ajax-error-dismiss" aria-label="Dismiss error"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path d="M3.72 3.72a.75.75 0 0 1 1.06 0L8 6.94l3.22-3.22a.749.749 0 0 1 1.275.326.749.749 0 0 1-.215.734L9.06 8l3.22 3.22a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L8 9.06l-3.22 3.22a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042L6.94 8 3.72 4.78a.75.75 0 0 1 0-1.06Z"></path> </svg> </button> You can’t perform that action at this time. </div> <template id="site-details-dialog"> <details class="details-reset details-overlay details-overlay-dark lh-default color-fg-default hx_rsm" open> <summary role="button" aria-label="Close dialog"></summary> <details-dialog class="Box Box--overlay d-flex flex-column anim-fade-in fast hx_rsm-dialog hx_rsm-modal"> <button class="Box-btn-octicon m-0 btn-octicon position-absolute right-0 top-0" type="button" aria-label="Close dialog" data-close-dialog> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path d="M3.72 3.72a.75.75 0 0 1 1.06 0L8 6.94l3.22-3.22a.749.749 0 0 1 1.275.326.749.749 0 0 1-.215.734L9.06 8l3.22 3.22a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L8 9.06l-3.22 3.22a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042L6.94 8 3.72 4.78a.75.75 0 0 1 0-1.06Z"></path> </svg> </button> <div class="octocat-spinner my-6 js-details-dialog-spinner"></div> </details-dialog> </details> </template> <div class="Popover js-hovercard-content position-absolute" style="display: none; outline: none;"> <div class="Popover-message Popover-message--bottom-left Popover-message--large Box color-shadow-large" style="width:360px;"> </div> </div> <template id="snippet-clipboard-copy-button"> <div class="zeroclipboard-container position-absolute right-0 top-0"> <clipboard-copy aria-label="Copy" class="ClipboardButton btn js-clipboard-copy m-2 p-0" data-copy-feedback="Copied!" data-tooltip-direction="w"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-copy js-clipboard-copy-icon m-2"> <path d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 0 1 0 1.5h-1.5a.25.25 0 0 0-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 0 0 .25-.25v-1.5a.75.75 0 0 1 1.5 0v1.5A1.75 1.75 0 0 1 9.25 16h-7.5A1.75 1.75 0 0 1 0 14.25Z"></path><path d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0 1 14.25 11h-7.5A1.75 1.75 0 0 1 5 9.25Zm1.75-.25a.25.25 0 0 0-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 0 0 .25-.25v-7.5a.25.25 0 0 0-.25-.25Z"></path> </svg> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-check js-clipboard-check-icon color-fg-success d-none m-2"> <path d="M13.78 4.22a.75.75 0 0 1 0 1.06l-7.25 7.25a.75.75 0 0 1-1.06 0L2.22 9.28a.751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018L6 10.94l6.72-6.72a.75.75 0 0 1 1.06 0Z"></path> </svg> </clipboard-copy> </div> </template> <template id="snippet-clipboard-copy-button-unpositioned"> <div class="zeroclipboard-container"> <clipboard-copy aria-label="Copy" class="ClipboardButton btn btn-invisible js-clipboard-copy m-2 p-0 d-flex flex-justify-center flex-items-center" data-copy-feedback="Copied!" data-tooltip-direction="w"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-copy js-clipboard-copy-icon"> <path d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 0 1 0 1.5h-1.5a.25.25 0 0 0-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 0 0 .25-.25v-1.5a.75.75 0 0 1 1.5 0v1.5A1.75 1.75 0 0 1 9.25 16h-7.5A1.75 1.75 0 0 1 0 14.25Z"></path><path d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0 1 14.25 11h-7.5A1.75 1.75 0 0 1 5 9.25Zm1.75-.25a.25.25 0 0 0-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 0 0 .25-.25v-7.5a.25.25 0 0 0-.25-.25Z"></path> </svg> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-check js-clipboard-check-icon color-fg-success d-none"> <path d="M13.78 4.22a.75.75 0 0 1 0 1.06l-7.25 7.25a.75.75 0 0 1-1.06 0L2.22 9.28a.751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018L6 10.94l6.72-6.72a.75.75 0 0 1 1.06 0Z"></path> </svg> </clipboard-copy> </div> </template> </div> <div id="js-global-screen-reader-notice" class="sr-only mt-n1" aria-live="polite" aria-atomic="true" ></div> <div id="js-global-screen-reader-notice-assertive" class="sr-only mt-n1" aria-live="assertive" aria-atomic="true"></div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10