introspectorA schema and set of tools for using SQL to query cloud infrastructure.
Stars: ✭ 61 (+45.24%)
adalancheActive Directory ACL Visualizer and Explorer - who's really Domain Admin?
Stars: ✭ 862 (+1952.38%)
terraform-aws-iam-system-userTerraform Module to Provision a Basic IAM System User Suitable for CI/CD Systems (E.g. TravisCI, CircleCI)
Stars: ✭ 71 (+69.05%)
ronin-supportA support library for Ronin. Like activesupport, but for hacking!
Stars: ✭ 23 (-45.24%)
rawsec-cybersecurity-inventoryAn inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+264.29%)
1earnffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+8745.24%)
flaskbombGZip HTTP Bombing in Python for everyone
Stars: ✭ 30 (-28.57%)
nozzlrNozzlr is a bruteforce framework, trully modular and script-friendly
Stars: ✭ 60 (+42.86%)
casdoorAn Identity and Access Management (IAM) / Single-Sign-On (SSO) platform with web UI supporting OAuth 2.0, OIDC, SAML and CAS, QQ group: 645200447
Stars: ✭ 4,147 (+9773.81%)
pitchThe initial conversation slides and menu of scenarios
Stars: ✭ 37 (-11.9%)
S3ScanScript to spider a website and find publicly open S3 buckets
Stars: ✭ 21 (-50%)
alks-cliCLI for working with the ALKS service.
Stars: ✭ 40 (-4.76%)
iam-role-injectorAssumes an IAM role via awscli STS call, injecting temporary credentials into shell environment
Stars: ✭ 27 (-35.71%)
go-localstackGo Wrapper for using localstack
Stars: ✭ 56 (+33.33%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+583.33%)
urldedupePass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
Stars: ✭ 208 (+395.24%)
ec2-tags-env☁️ Import AWS EC2 tags as environment variables
Stars: ✭ 59 (+40.48%)
helm-openldapHelm chart of Openldap in High availability with multi-master replication and PhpLdapAdmin and Ltb-Passwd
Stars: ✭ 101 (+140.48%)
AstraAstra is a tool to find URLs and secrets inside a webpage/files
Stars: ✭ 187 (+345.24%)
JiraffeOne stop place for exploiting Jira instances in your proximity
Stars: ✭ 157 (+273.81%)
terraform-aws-frontendCollection of Terraform modules for frontend app deployment on AWS.
Stars: ✭ 31 (-26.19%)
TIWAPTotally Insecure Web Application Project (TIWAP)
Stars: ✭ 137 (+226.19%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (+42.86%)
polscanZero-setup SSH-based scanner with extensive visualizations for Debian server inventory, policy compliance and vulnerabilities
Stars: ✭ 57 (+35.71%)
goverviewgoverview - Get an overview of the list of URLs
Stars: ✭ 93 (+121.43%)
gtokenSecurely access AWS services from GKE cluster
Stars: ✭ 43 (+2.38%)
mod authnz jwtAn authentication module for Apache httpd using JSON Web Tokens
Stars: ✭ 74 (+76.19%)
challengesSecurity challenges and CTFs created by the Penultimate team.
Stars: ✭ 13 (-69.05%)
juumla🦁 Juumla is a python tool created to identify Joomla version, scan for vulnerabilities and search for config or backup files.
Stars: ✭ 107 (+154.76%)
doraFind exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Stars: ✭ 229 (+445.24%)
ArgosThis script will automatically set up an OSINT workstation starting from a Ubuntu OS.
Stars: ✭ 73 (+73.81%)
DDTTXDDTTX Tabletop Trainings
Stars: ✭ 22 (-47.62%)
EDRHuntScan installed EDRs and AVs on Windows
Stars: ✭ 406 (+866.67%)
ggtfobinsGet GTFOBins info about a given exploit from the command line
Stars: ✭ 27 (-35.71%)
Python-KeyloggerPython Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||
Stars: ✭ 55 (+30.95%)
pwn-pulseExploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Stars: ✭ 126 (+200%)
wildpwnunix wildcard attacks
Stars: ✭ 119 (+183.33%)
honeykuA Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).
Stars: ✭ 56 (+33.33%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+88.1%)
riamAWS IAM inspired policy engine in Rust
Stars: ✭ 19 (-54.76%)
pentest-reportsCollection of penetration test reports and pentest report templates. Published by the the best security companies in the world.
Stars: ✭ 111 (+164.29%)
policies-databaseDatabase of journal policies: TRANsparency in Scholarly Publishing for Open Scholarship Evolution
Stars: ✭ 21 (-50%)
nifiDeploy a secured, clustered, auto-scaling NiFi service in AWS.
Stars: ✭ 37 (-11.9%)
privx-on-awsPrivX - Just-in-time Access Management
Stars: ✭ 18 (-57.14%)
Blue-Team-NotesYou didn't think I'd go and leave the blue team out, right?
Stars: ✭ 899 (+2040.48%)
aws-leastprivilegeGenerates an IAM policy for the CloudFormation service role that adheres to least privilege.
Stars: ✭ 85 (+102.38%)
Transformer-ocrHandwritten text recognition using transformers.
Stars: ✭ 92 (+119.05%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-9.52%)
termux-snippetsAn integrated tool and a collection of snippets which helps in the various aspects of the terminal.
Stars: ✭ 28 (-33.33%)