A curated list of Chinese websites and personal blogs about ethical hacking and pentesting
☆112Oct 8, 2020Updated 5 years ago
Alternatives and similar repositories for awesome-chinese-infosec-websites
Users that are interested in awesome-chinese-infosec-websites are comparing it to the libraries listed below
Sorting:
- Automatic detection of hashing algorithms☆20Jun 18, 2016Updated 9 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- MAC Address Org Auto-Detection☆33May 25, 2017Updated 8 years ago
- Web&Browser Security☆43Sep 27, 2022Updated 3 years ago
- 针对PHP网马的正则查杀☆13Jan 10, 2018Updated 8 years ago
- Feigong,针对各种情况自由变化的mysql注入脚本,In view of the different things freely change the mysql injection script☆107Jan 24, 2017Updated 9 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- ☆71Nov 29, 2016Updated 9 years ago
- system scanner☆222Apr 6, 2022Updated 3 years ago
- ☆80Oct 10, 2014Updated 11 years ago
- 基于Linux c开发的插件式扫描器(Python/lua)☆35Feb 27, 2016Updated 10 years ago
- A collection of penetration testing related sites☆289Sep 30, 2020Updated 5 years ago
- Github for the scripts utilised during Penetration test☆237Jun 12, 2017Updated 8 years ago
- 从扫描器 结果分离出的一些大公司泛解析ip列表☆60Jun 8, 2017Updated 8 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- a new crawler based on python with more function including Network fingerprint search☆504Aug 14, 2018Updated 7 years ago
- Assembly code to use for Windows kernel shellcode to edit winlogon.exe ACL☆13Mar 6, 2017Updated 9 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆332Apr 19, 2017Updated 8 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- Code, commands, and chatter about Threat Hunting.☆35Jan 5, 2020Updated 6 years ago
- A collection of various GitHub gists for hackers, pentesters and security researchers☆961Nov 4, 2017Updated 8 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆2,100May 27, 2022Updated 3 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- Your interpreter isn’t safe anymore — The PHP module backdoor☆221Mar 25, 2019Updated 6 years ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,044Nov 24, 2019Updated 6 years ago
- A simple tool to decloak/expose the bucket name behind a domain.☆22Updated this week
- rebuild ollydbg☆20Feb 15, 2017Updated 9 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Jan 5, 2017Updated 9 years ago
- SecMobi Wiki is a collection of mobile security resources.☆629Feb 2, 2017Updated 9 years ago
- ☆174Sep 6, 2020Updated 5 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43May 18, 2017Updated 8 years ago
- A Python Framework For NoSQL Scanning and Exploitation☆602Dec 6, 2024Updated last year
- A public list of URLs generally useful to webapp testers and pentesters☆112Jun 5, 2017Updated 8 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆138Dec 22, 2017Updated 8 years ago
- F-Scrack is a single file bruteforcer supports multi-protocol☆310Sep 5, 2017Updated 8 years ago