{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"Ghost","owner":"EntySec","isFork":false,"description":"Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.","allTopics":["hack","backdoor","adb","exploit","hacking","android-device","rat","remote-shell","post-exploitation","android-debug-bridge","kali-linux","exploitation-framework","remote-access","android-rat","hacking-tools","android-hacking","android-hack","android-exploit","entysec","android"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":2,"starsCount":2569,"forksCount":910,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T11:06:46.816Z"}},{"type":"Public","name":"Pex","owner":"EntySec","isFork":false,"description":"Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming language.","allTopics":["python","toolkit","penetration-testing","shellcode","payload","windows-hacking","python-module","android-hacking","linux-hacking"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":38,"forksCount":6,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-26T16:41:41.736Z"}},{"type":"Public","name":"SeaShell","owner":"EntySec","isFork":false,"description":"SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.","allTopics":["ios","reverse-shell","exploit","jailbreak","post-exploitation","exploitation","remote-admin-tool","remote-access-tool","ipados","ios-exploit","ios-hacking","post-exploitation-toolkit","trollstore","ios-exploitation","ios-malware"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":3,"starsCount":325,"forksCount":40,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-26T15:34:10.840Z"}},{"type":"Public","name":"Pwny","owner":"EntySec","isFork":false,"description":"Pwny is an implementation of an advanced payload written in pure C and designed for portability and extensibility.","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":36,"forksCount":5,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-26T01:34:49.888Z"}},{"type":"Public","name":"Badges","owner":"EntySec","isFork":false,"description":"Badges is a Python3 library that is used for advanced and intuitive printing.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-24T21:02:53.857Z"}},{"type":"Public","name":"HatSploit","owner":"EntySec","isFork":false,"description":"Modular penetration testing platform that enables you to write, test, and execute exploit code.","allTopics":["android","python","windows","security","remote-control","exploit","exploits","infosec","post-exploitation","exploitation","exploitation-framework","payload","hacking-tool","privilege-escalation","exploit-database","windows-hacking","exploit-development","remote-access-tool","entysec"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":265,"forksCount":62,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-19T01:02:21.337Z"}},{"type":"Public","name":"ColorScript","owner":"EntySec","isFork":false,"description":"ColorScript is a scripting language for designing custom ASCII banners.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":1,"license":"MIT License","participation":[0,0,2,3,0,0,0,0,0,0,0,3,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,2,4,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-18T23:03:38.632Z"}},{"type":"Public","name":"EntySec-Website","owner":"EntySec","isFork":false,"description":"EntySec is a group of security professionals and software engineers involved in the development of security tools and services.","allTopics":[],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-25T15:46:27.350Z"}},{"type":"Public","name":"libpawn","owner":"EntySec","isFork":false,"description":"C library that is intended for providing methods for executing and injecting code.","allTopics":["loader","injector","dll-injection","rop","pe-loader","reflective-injection","elf-loader","c-programming","elf-parser","reflective-pe-loaders","macho-parser","elf-format","macho-loader"],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":1,"starsCount":12,"forksCount":3,"license":"MIT License","participation":[0,0,22,39,11,1,4,1,0,0,0,0,0,0,0,0,7,1,23,0,2,0,0,0,0,0,0,1,0,0,3,0,0,0,0,0,0,0,0,0,0,2,2,0,5,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-13T13:58:48.195Z"}},{"type":"Public","name":"HatSploit-Docs","owner":"EntySec","isFork":false,"description":"HatSploit Documentation","allTopics":[],"primaryLanguage":{"name":"Ruby","color":"#701516"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-19T22:56:36.597Z"}},{"type":"Public","name":".github","owner":"EntySec","isFork":false,"description":"EntySec is a group of security professionals and software engineers involved in the development of security tools and services.","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-16T17:59:16.326Z"}},{"type":"Public","name":"EntySec-Blog","owner":"EntySec","isFork":true,"description":"Latest EntySec security researches, news and tutorials.","allTopics":[],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":15733,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-10T22:43:36.015Z"}},{"type":"Public","name":"CamOver","owner":"EntySec","isFork":false,"description":" CamOver is a camera exploitation tool that allows to disclosure network camera admin password.","allTopics":["iot","camera","exploit","camera-control","iot-hacking","camera-hacking","entysec","webcam-hacking","camera-exploitation"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":416,"forksCount":90,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-08T22:54:01.985Z"}},{"type":"Public","name":"CamRaptor","owner":"EntySec","isFork":false,"description":"CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.","allTopics":["iot","camera","exploit","payload","kalilinux","camera-hacking","entysec"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":203,"forksCount":32,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-08T22:53:25.669Z"}},{"type":"Public","name":"HatAsm","owner":"EntySec","isFork":false,"description":"HatAsm is a powerful assembler and disassembler that provides support for all common architectures.","allTopics":["arm","compiler","mips","intel","shellcode","payload","assembly-x86","assembler-x86","assembly-x86-64","assembly-mips","assembly-arm","assembler-implementation","assembly","x86-64","assembler","x86"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":13,"forksCount":4,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-08T22:51:35.707Z"}},{"type":"Public","name":"HatVenom","owner":"EntySec","isFork":false,"description":"HatVenom is a powerful payload generation tool that provides support for all common platforms and architectures.","allTopics":["exploit","binary","malware","executable","exploits","shellcode","elf","binary-exploitation","macho","pe","payload","payloads","exe","architectures","shellcodes","shellcode-injection","entysec"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":128,"forksCount":29,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-08T22:50:30.649Z"}},{"type":"Public","name":"Pawn","owner":"EntySec","isFork":false,"description":"Pawn is a collection of Python techniques used for crafting, manipulating and injecting payloads.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":13,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-08T22:49:25.506Z"}},{"type":"Public","name":"Shreder","owner":"EntySec","isFork":false,"description":"Shreder is a powerful multi-threaded SSH protocol password brute-force tool.","allTopics":["ssh","hacking","bruteforce","brute-force-attacks","kalilinux","bruteforce-attacks","ssh-bruteforce","ssh-hacking","entysec"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":191,"forksCount":38,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-08T22:48:47.357Z"}},{"type":"Public","name":"RomBuster","owner":"EntySec","isFork":false,"description":"RomBuster is a router exploitation tool that allows to disclosure network router admin password.","allTopics":["iot","router","hack","exploit","information-extraction","exploits","passwords","payload","payloads","password-cracker","information-gathering","kalilinux","router-hacking","credentials-gathering","iot-hacking","entysec","hacking"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":441,"forksCount":72,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-08T22:47:20.730Z"}},{"type":"Public","name":"eterpay","owner":"EntySec","isFork":false,"description":"Crypto payment system that we deserve. Can be used for marketplaces and etc.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-12-27T02:06:17.131Z"}},{"type":"Public","name":"EntySec-Docs","owner":"EntySec","isFork":false,"description":"EntySec Documentation","allTopics":[],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-10-30T00:52:18.924Z"}},{"type":"Public","name":"Checkmate","owner":"EntySec","isFork":false,"description":"Powerful advanced web platform for C2 managing and automated penetration testing.","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":14,"forksCount":2,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-06-30T20:06:22.609Z"}},{"type":"Public","name":"HatSploit-Website","owner":"EntySec","isFork":false,"description":"Modular penetration testing platform that enables you to write, test, and execute exploit code.","allTopics":[],"primaryLanguage":{"name":"CSS","color":"#563d7c"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-06-21T16:38:00.219Z"}}],"repositoryCount":23,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}