Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password ๐ก๏ธ
Stars: โญ 1,949 (+3148.33%)
Mutual labels: cybersecurity, infosec, bugbounty, offensive-security
Xxe Injection Payload List๐ฏ XML External Entity (XXE) Injection Payload List
Stars: โญ 304 (+406.67%)
Mutual labels: cybersecurity, infosec, bugbounty
pyc2bytecodeA Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: โญ 70 (+16.67%)
Mutual labels: cybersecurity, infosec, malware-analysis
flydnsRelated subdomains finder
Stars: โญ 29 (-51.67%)
Mutual labels: infosec, bugbounty, network-security
Malware-Sample-SourcesMalware Sample Sources
Stars: โญ 214 (+256.67%)
Mutual labels: cybersecurity, infosec, malware-analysis
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: โญ 84 (+40%)
Mutual labels: cybersecurity, bugbounty, kali-linux
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: โญ 296 (+393.33%)
Mutual labels: cybersecurity, infosec, kali-linux
NosqlmapAutomated NoSQL database enumeration and web application exploitation tool.
Stars: โญ 1,928 (+3113.33%)
Mutual labels: bugbounty, offensive-security, web-application-security
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Stars: โญ 1,253 (+1988.33%)
Mutual labels: cybersecurity, infosec, malware-analysis
Analyst ArsenalA toolkit for Security Researchers
Stars: โญ 112 (+86.67%)
Mutual labels: cybersecurity, infosec, malware-analysis
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: โญ 182 (+203.33%)
Mutual labels: infosec, bugbounty, offensive-security
py-scripts-otherA collection of some of my scripts
Stars: โญ 79 (+31.67%)
Mutual labels: cybersecurity, infosec, bugbounty
AutosetupAuto setup is a bash script compatible with Debian based distributions to install and setup necessary programs.
Stars: โญ 140 (+133.33%)
Mutual labels: infosec, bugbounty, kali-linux
targetsA collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: โญ 85 (+41.67%)
Mutual labels: cybersecurity, infosec, bugbounty
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: โญ 8,981 (+14868.33%)
Mutual labels: malware-analysis, bugbounty, kali-linux
BigbountyreconBigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: โญ 541 (+801.67%)
Mutual labels: cybersecurity, bugbounty, offensive-security
Badkarmanetwork reconnaissance toolkit
Stars: โญ 353 (+488.33%)
Mutual labels: kali-linux, offensive-security, network-security
Malware FeedBringing you the best of the worst files on the Internet.
Stars: โญ 69 (+15%)
Mutual labels: cybersecurity, infosec, malware-analysis
Pyiris BackdoorPyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: โญ 145 (+141.67%)
Mutual labels: cybersecurity, infosec, kali-linux
conti-pentester-guide-leakLeaked pentesting manuals given to Conti ransomware crooks
Stars: โญ 772 (+1186.67%)
Mutual labels: cybersecurity, infosec, offensive-security