渗透测试工具篇

漏洞利用工具

https://github.com/SafeGroceryStore/MDUT

https://github.com/ktaranov/sqlserver-kit

https://github.com/blackarrowsec/mssqlproxy

https://github.com/yuyan-sec/RedisEXP

代审辅助

https://github.com/HXSecurity/DongTai

https://github.com/webraybtl/CodeQLpy

https://github.com/github/codeql

https://github.com/code-star/sbt-findsecbugs

https://github.com/Eugeny/tabby

https://github.com/ripsscanner/rips

https://github.com/nccgroup/VCG

https://github.com/PyCQA/bandit

https://github.com/zsdlove/Hades

漏洞利用

https://github.com/linshaoSec/SeeyonExploit-GUI

https://github.com/Summer177/seeyon_exp

https://github.com/xinyu2428/TDOA_RCE

https://github.com/dionach/CMSmap

https://github.com/attacker-codeninja/wprecon

https://github.com/wpscanteam/wpscan

https://github.com/n00py/WPForce

https://github.com/zangcc/Aazhen-RexHa

https://github.com/Lotus6/ThinkphpGUI

https://github.com/UzJu/Cloud-Bucket-Leak-Detection-Tools

https://github.com/lijiejie/swagger-exp

https://github.com/jayus0821/swagger-hack

https://github.com/wyzxxz/heapdump_tool

https://github.com/rtcatc/Packer-Fuzzer

https://github.com/0xHJK/dumpall

https://github.com/arthaud/git-dumper

https://github.com/obheda12/GitDorker

https://github.com/m4ll0k/SecretFinder.git

https://github.com/KathanP19/JSFScan.sh

https://github.com/Ice3man543/SubOver

靶场环境项目地址列表

https://vulfocus.cn/#/login

https://github.com/fofapro/vulfocus

https://hub.docker.com/u/vulfocus

https://github.com/vulhub/vulhub

https://github.com/VulnTotal-Team/IoT-vulhub

https://github.com/tangxiaofeng7/SecExample

https://github.com/cn-panda/logbackRceDemo

https://github.com/digininja/DVWA

https://github.com/shadforth/pentesterlab-bootcamp

https://pentesterlab.com/

https://github.com/ffffffff0x/f8x

https://github.com/MvsCode/frps-onekey

https://github.com/kitabisa/mubeng

https://github.com/akkuman/rotateproxy.git

云安全靶场:

github.com/HXSecurity/TerraformGoat/blob/main/README_CN.md

Web安全靶场:

dvwa:sourceforge.net/projects/dvwa.mirror/

bwapp:sourceforge.net/projects/bwapp/files/bee-box/

portswiger:portswigger.net/web-security/dashboard

vulhub:github.com/vulhub/vulhub

vulnhub:www.vulnhub.com

htb:www.hackthebox.com

漏洞扫描/序列化

https://github.com/hahwul/dalfox

https://github.com/Raghavd3v/CRLFsuite

https://github.com/chenjj/CORScanner

https://github.com/klsfct/getshell

https://github.com/Mr-xn/Penetration_Testing_POC

https://github.com/vladko312/SSTImap

https://github.com/ksharinarayanan/SSRFire

https://github.com/mzfr/liffy

https://github.com/frohoff/ysoserial

https://github.com/k8gege/LadonGo

序列化

https://github.com/welk1n/JNDI-Injection-Exploit

https://github.com/WhiteHSBG/JNDIExploit

https://github.com/wyzxxz/jndi_tool

https://github.com/exp1orer/JNDI-Inject-Exploit

密码/隧道项目地址链接

密码

https://github.com/gentilkiwi/mimikatz

https://github.com/AlessandroZ/LaZagne

https://github.com/dzxs/Xdecrypt

https://github.com/hayasec/360SafeBrowsergetpass

https://github.com/attackercan/teamviewer-dumper

https://github.com/Jamesits/proxifier-profiles

https://github.com/fatedier/frp.git

隧道

https://github.com/fatedier/frp

https://github.com/ehang-io/nps

https://github.com/LeonardoNve/dns2proxy

https://github.com/qiuzi/dns2socks

https://github.com/rootkiter/Termite

https://github.com/bdamele/icmpsh

https://github.com/inconshreveable/ngrok

https://github.com/FunnyWolf/pystinger

https://github.com/snail007/goproxy

https://github.com/testxxxzzz/geacon_pro

https://github.com/darkr4y/geacon

https://github.com/t3l3machus/Villain

https://github.com/akkuman/rotateproxy

免杀项目地址列表

https://github.com/WangYihang/Platypus

https://github.com/sveinbjornt/Platypus

https://github.com/t3l3machus/Villain

https://github.com/BeichenDream/Godzilla

https://github.com/rebeyond/Behinder

https://github.com/AntSwordProject/antSword

https://github.com/AntSwordProject/AntSword-Loader

https://github.com/tennc/webshell

https://github.com/Chora10/Cknife

https://github.com/0x00007c00/JundeadShell

https://github.com/rebeyond/memShell

https://github.com/hosch3n/msmap

https://githhttps://github.com/1y0n/AV_Evasion_Tool

https://github.com/optiv/ScareCrowub.com/t3l3machus/hoaxshell

https://github.com/TryGOTry/CobaltStrike_Cat_4.5

https://github.com/TryGOTry/DogCs4.4

https://github.com/midisec/BypassAnti-Virus

https://github.com/PSPDFKit-labs/bypass

https://github.com/Uncodin/bypass

https://github.com/TideSec/BypassAntiVirus

https://github.com/alphaSeclab/anti-av

https://github.com/lengjibo/FourEye

https://github.com/1y0n/AV_Evasion_Tool

https://github.com/optiv/ScareCrow

https://github.com/CMEPW/BypassAV

https://github.com/mgeeky/ShellcodeFluctuation

https://github.com/Hzllaga/JsLoader

https://github.com/tokyoneon/Chimera

https://github.com/LandGrey/webshell-detect-bypass

https://github.com/AabyssZG/WebShell-Bypass-Guide

https://github.com/Tylous/Limelighter

https://github.com/TheWover/CertStealer

https://github.com/CCob/SharpBlock

内网项目

内网收集

https://github.com/shadow1ng/fscan

https://github.com/dwagon/Hostinfo

https://github.com/shmilylty/netspy

https://github.com/c1y2m3/ATAttack

域渗透

https://github.com/0x727/UserRegEnum_0x727

https://github.com/mscandev/mscan

https://github.com/BloodHoundAD/BloodHound

横向

https://github.com/shadow1ng/fscan

https://github.com/k8gege/Ladon

https://github.com/lcvvvv/kscan

https://github.com/QAX-A-Team/sharpwmi

https://github.com/pandasec888/taowu-cobalt-strike

https://github.com/d3ckx1/OLa

https://github.com/hzphreak/VMInjector

https://github.com/rootclay/WMIHACKER

权限维持

https://github.com/360-Linton-Lab/Telemetry

https://github.com/AV1080p/Schtasks-Backdoor

https://github.com/0x727/SchTask_0x727

https://github.com/Ivan1ee/NetDLLSpy

https://github.com/yanghaoi/CobaltStrike_CNA

提权

https://github.com/SecWiki/windows-kernel-exploits

https://github.com/xkaneiki/CVE-2023-0386

https://github.com/aleenzz/MSSQL_SQL_BYPASS_WIKI

https://github.com/Ascotbe/Kernelhub

https://github.com/lyshark/Windows-exploits

https://github.com/SecWiki/macos-kernel-exploits

https://github.com/klsfct/getshell

应急响应项目

https://github.com/microsoft/WindowsProtocolTestSuites

https://github.com/hahwul/WebHackersWeapons

https://github.com/MountCloud/FireKylin

https://github.com/grayddq/GScan

https://github.com/evilsocket/uroboros

https://github.com/wgpsec/whohk

https://github.com/vxunderground/MalwareSourceCode

https://github.com/mtkirby/rootkitrecon

木马查杀

http://webshell.cdxy.me/

http://tools.bugscaner.com/killwebshell/

http://www.shelldetector.com/

https://github.com/chaitin/cloudwalker

https://n.shellpub.com/

windows版:

http://dl.shellpub.com/hm-ui/latest/HmSetup.zip?version=1.8.2

linux-amd64版:

http://dl.shellpub.com/hm/latest/hm-linux-amd64.tgz?version=1.8.2

linux-386版:

http://dl.shellpub.com/hm/latest/hm-linux-386.tgz?version=1.8.2

https://edr.sangfor.com.cn/api/download/WebShellKillerForLinux.tar.gz

http://www.d99net.net/

中间件工具项目

https://github.com/LittleBear4/OA-EXPTOOL

https://github.com/ExpLangcn/HVVExploitApply

https://github.com/SummerSec/SpringExploit

https://github.com/wyzxxz/shiro_rce_tool

https://github.com/SummerSec/ShiroAttack2

https://github.com/Maskhe/FastjsonScan

https://github.com/a1phaboy/FastjsonScan

https://github.com/MagicZer0/fastjson-rce-exploit

https://github.com/mrknow001/fastjson_rec_exploit

https://github.com/sp4zcmd/WeblogicExploit-GUI

https://github.com/0xn0ne/weblogicScanner

https://github.com/sv3nbeast/weblogic-framework

https://github.com/YYHYlh/Apache-Dubbo-CVE-2023-23638-exp

https://github.com/lp008/dubbo-exp

https://github.com/Accenture/jenkins-attack-framework

https://github.com/0x48piraj/jiraffe

https://github.com/xfiftyone/STS2G

https://github.com/HatBoy/Struts2-Scan

https://github.com/inbug-team/Log4j_RCE_Tool

https://github.com/fullhunt/log4j-scan

https://github.com/f0ng/log4j2burpscanner

https://github.com/jbaines-r7/through_the_wire

https://github.com/BeichenDream/CVE-2022-26134-Godzilla-MEMSHELL

https://github.com/Tas9er/YApiRCE.git

https://github.com/Schira4396/VcenterKiller

https://github.com/0x727/SpringBootExploit

字典/钓鱼/社工/爆破项目

https://github.com/Taonn/EmailAll

https://github.com/Josue87/EmailFinder

https://github.com/rm1984/IMAPLoginTester

https://github.com/gophish/gophish

https://github.com/gyxuehu/EwoMail

社工

https://github.com/D4Vinci/Cr3dOv3r

https://github.com/soxoj/maigret

https://github.com/n0tr00t/Sreg

https://github.com/famavott/osint-scraper

https://github.com/Ridter/Mailget

https://github.com/Mebus/cupp

字典

https://github.com/danielmiessler/SecLists

https://github.com/duyet/bruteforce-database

https://github.com/drtychai/wordlists

https://github.com/lutfumertceylan/top25-parameter

https://github.com/r35tart/RW_Password

https://github.com/ignis-sec/Pwdb-Public.git

爆破

https://github.com/i11us0ry/goon

自动化/资产项目地址

https://github.com/0x727/ShuiZe_0x727

https://github.com/yaklang/yakit

https://github.com/b0bac/ApolloScanner

https://github.com/lcvvvv/kscan

https://github.com/broken5/bscan

https://github.com/78778443/QingScan

https://github.com/ciscocsirt/GOSINT

https://github.com/P1-Team/AlliN

https://github.com/hanc00l/nemo_go

https://github.com/CTF-MissFeng/bayonet

https://github.com/r3curs1v3-pr0xy/vajra

https://github.com/six2dez/reconftw

https://github.com/yogeshojha/rengine

https://github.com/lz520520/railgun

https://github.com/Bywalks/DarkAngel

资产发现

https://hunter.qianxin.com/

https://ti.360.cn/

https://www.shodan.io/

https://en.fofa.info/

https://www.zoomeye.org/

https://github.com/knownsec/Kunyu

https://quake.360.net/quake/#/index

https://www.exploit-db.com/google-hacking-database

https://search.censys.io/

https://www.dnsdb.io/zh-cn/

https://github.com/six2dez/reconftw

https://github.com/TophantTechnology/ARL

https://github.com/wgpsec/ENScan

https://github.com/wgpsec/ENScan_GO

https://github.com/SiJiDo/IEyes

https://github.com/fengyuanchen/jquery-viewer

https://github.com/Kento-Sec/AsamF

https://github.com/reduxjs/redux-thunk

https://github.com/lc/gau

https://github.com/tomnomnom/waybackurls

https://github.com/TebbaaX/GRecon

https://github.com/awake1t/linglong

https://github.com/Laravel-Lang/lang

子域名/目录/指纹

子域名

https://github.com/knownsec/ksubdomain

https://github.com/boy-hack/ksubdomain

https://github.com/shmilylty/OneForAll

https://github.com/CTF-MissFeng/bayonet

https://github.com/projectdiscovery/subfinder

https://github.com/LangziFun/LangSrcCurise

https://github.com/aboul3la/Sublist3r

https://github.com/projectdiscovery/subfinder

https://github.com/yunxu1/dnsub

目录

https://github.com/maurosoria/dirsearch

https://github.com/epi052/feroxbuster

https://github.com/H4ckForJob/dirmap

https://github.com/deibit/cansina

https://github.com/H4ckForJob/dirmap

https://github.com/ReddyyZ/urlbrute

https://github.com/ReddyyZ/URLBrute-Py

https://github.com/foryujian/yjdirscan

https://github.com/hunyaio/yuhScan

https://github.com/pingc0y/URLFinder

https://github.com/jaeles-project/gospider

https://github.com/projectdiscovery/katana

https://github.com/devploit/dontgo403

指纹

https://github.com/EdgeSecurityTeam/EHole

https://github.com/ShiHuang-ESec/EHole

https://github.com/wappalyzer/wappalyzer

https://github.com/b1ackc4t/14Finger

urbanadventurer/WhatWeb 城市冒险家/WhatWeb

https://github.com/fingerprintjs/fingerprintjs

https://github.com/EASY233/Finger

https://github.com/s7ckTeam/Glass

https://github.com/TideSec/TideFinger

APP/小程序/端口扫描

https://github.com/ezshine/wxapkg-convertor

https://github.com/kelvinBen/AppInfoScanner

https://github.com/sulab999/AppMessenger

https://github.com/dwisiswant0/apkleaks

https://github.com/Anof-cyber/apkleaks

端口

https://github.com/projectdiscovery/naabu

https://github.com/4dogs-cn/TXPortMap

https://github.com/Adminisme/ServerScan

https://github.com/lcvvvv/gonmap

  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 1
    评论
完整版:https://download.csdn.net/download/qq_27595745/89522468 【课程大纲】 1-1 什么是java 1-2 认识java语言 1-3 java平台的体系结构 1-4 java SE环境安装和配置 2-1 java程序简介 2-2 计算机中的程序 2-3 java程序 2-4 java类库组织结构和文档 2-5 java虚拟机简介 2-6 java的垃圾回收器 2-7 java上机练习 3-1 java语言基础入门 3-2 数据的分类 3-3 标识符、关键字和常量 3-4 运算符 3-5 表达式 3-6 顺序结构和选择结构 3-7 循环语句 3-8 跳转语句 3-9 MyEclipse工具介绍 3-10 java基础知识章节练习 4-1 一维数组 4-2 数组应用 4-3 多维数组 4-4 排序算法 4-5 增强for循环 4-6 数组和排序算法章节练习 5-0 抽象和封装 5-1 面向过程的设计思想 5-2 面向对象的设计思想 5-3 抽象 5-4 封装 5-5 属性 5-6 方法的定义 5-7 this关键字 5-8 javaBean 5-9 包 package 5-10 抽象和封装章节练习 6-0 继承和多态 6-1 继承 6-2 object类 6-3 多态 6-4 访问修饰符 6-5 static修饰符 6-6 final修饰符 6-7 abstract修饰符 6-8 接口 6-9 继承和多态 章节练习 7-1 面向对象的分析与设计简介 7-2 对象模型建立 7-3 类之间的关系 7-4 软件的可维护与复用设计原则 7-5 面向对象的设计与分析 章节练习 8-1 内部类与包装器 8-2 对象包装器 8-3 装箱和拆箱 8-4 练习题 9-1 常用类介绍 9-2 StringBuffer和String Builder类 9-3 Rintime类的使用 9-4 日期类简介 9-5 java程序国际化的实现 9-6 Random类和Math类 9-7 枚举 9-8 练习题 10-1 java异常处理 10-2 认识异常 10-3 使用try和catch捕获异常 10-4 使用throw和throws引发异常 10-5 finally关键字 10-6 getMessage和printStackTrace方法 10-7 异常分类 10-8 自定义异常类 10-9 练习题 11-1 Java集合框架和泛型机制 11-2 Collection接口 11-3 Set接口实现类 11-4 List接口实现类 11-5 Map接口 11-6 Collections类 11-7 泛型概述 11-8 练习题 12-1 多线程 12-2 线程的生命周期 12-3 线程的调度和优先级 12-4 线程的同步 12-5 集合类的同步问题 12-6 用Timer类调度任务 12-7 练习题 13-1 Java IO 13-2 Java IO原理 13-3 流类的结构 13-4 文件流 13-5 缓冲流 13-6 转换流 13-7 数据流 13-8 打印流 13-9 对象流 13-10 随机存取文件流 13-11 zip文件流 13-12 练习题 14-1 图形用户界面设计 14-2 事件处理机制 14-3 AWT常用组件 14-4 swing简介 14-5 可视化开发swing组件 14-6 声音的播放和处理 14-7 2D图形的绘制 14-8 练习题 15-1 反射 15-2 使用Java反射机制 15-3 反射与动态代理 15-4 练习题 16-1 Java标注 16-2 JDK内置的基本标注类型 16-3 自定义标注类型 16-4 对标注进行标注 16-5 利用反射获取标注信息 16-6 练习题 17-1 顶目实战1-单机版五子棋游戏 17-2 总体设计 17-3 代码实现 17-4 程序的运行与发布 17-5 手动生成可执行JAR文件 17-6 练习题 18-1 Java数据库编程 18-2 JDBC类和接口 18-3 JDBC操作SQL 18-4 JDBC基本示例 18-5 JDBC应用示例 18-6 练习题 19-1 。。。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值