Android DisassemblerDisassemble ANY files including .so (NDK, JNI), Windows PE(EXE, DLL, SYS, etc), linux binaries, libraries, and any other files such as pictures, audios, etc(for fun)files on Android. Capstone-based disassembler application on android. 안드로이드 NDK 공유 라이브러리, Windows 바이너리, etc,... 리버싱 앱
Stars: ✭ 250 (-32.8%)
JennyJNI glue code generator
Stars: ✭ 53 (-85.75%)
H2csmugglerHTTP Request Smuggling over HTTP/2 Cleartext (h2c)
Stars: ✭ 292 (-21.51%)
Ssh Mitmssh mitm server for security audits supporting public key authentication, session hijacking and file manipulation
Stars: ✭ 335 (-9.95%)
WhatwebNext generation web scanner
Stars: ✭ 3,503 (+841.67%)
JackdawJava Annotation Processor which allows to simplify development
Stars: ✭ 306 (-17.74%)
JavacppThe missing bridge between Java and native C++
Stars: ✭ 3,703 (+895.43%)
Cheatsheet GodPenetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+846.51%)
SecurecodeboxsecureCodeBox (SCB) - continuous secure delivery out of the box
Stars: ✭ 279 (-25%)
ReconnoteWeb Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
Stars: ✭ 322 (-13.44%)
Recon PipelineAn automated target reconnaissance pipeline.
Stars: ✭ 278 (-25.27%)
ProwlerProwler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+1126.08%)
React Native Mmkv⚡️ An extremely fast key/value storage library for React Native. ~30x faster than AsyncStorage!
Stars: ✭ 316 (-15.05%)
Ethereum ListsA repository for maintaining lists of things like malicious URLs, fake token addresses, and so forth. We love lists.
Stars: ✭ 300 (-19.35%)
TaipanWeb application vulnerability scanner
Stars: ✭ 359 (-3.49%)
HeraldingCredentials catching honeypot
Stars: ✭ 297 (-20.16%)
Androidp7zipAn Android compress and extract library support popular compression format such as rar, zip, tar, lzma. based on p7zip.
Stars: ✭ 289 (-22.31%)
PatrowlmanagerPatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (-2.42%)
OsmedeusFully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+811.56%)
DgfraudA Deep Graph-based Toolbox for Fraud Detection
Stars: ✭ 281 (-24.46%)
KatanaA Python Tool For google Hacking
Stars: ✭ 355 (-4.57%)
Jnioor基于C++模板函数与Fluent API设计的JNI反射库,极大的简化JNI反射调用,提高JNI开发效率与稳定性
Stars: ✭ 278 (-25.27%)
ModlishkaModlishka. Reverse Proxy.
Stars: ✭ 3,634 (+876.88%)
ImmutablesAnnotation processor to create immutable objects and builders. Feels like Guava's immutable collections but for regular value objects. JSON, Jackson, Gson, JAX-RS integrations included
Stars: ✭ 3,031 (+714.78%)
Jni.hppA modern, type-safe, header-only, C++14 wrapper for JNI
Stars: ✭ 313 (-15.86%)
WatchdogWatchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (-7.26%)
PolichombrCollaborative malware analysis framework
Stars: ✭ 307 (-17.47%)
WssatWEB SERVICE SECURITY ASSESSMENT TOOL
Stars: ✭ 360 (-3.23%)
Vscode Todo Highlighta vscode extension to highlighting todos, fixmes, and any annotations...
Stars: ✭ 305 (-18.01%)
SuperSecure, Unified, Powerful and Extensible Rust Android Analyzer
Stars: ✭ 340 (-8.6%)
DotdotslashSearch for Directory Traversal Vulnerabilities
Stars: ✭ 297 (-20.16%)
Parceler📦 Android Parcelables made easy through code generation.
Stars: ✭ 3,589 (+864.78%)
BanditBandit is a tool designed to find common security issues in Python code.
Stars: ✭ 3,763 (+911.56%)
Syzkallersyzkaller is an unsupervised coverage-guided kernel fuzzer
Stars: ✭ 3,841 (+932.53%)
RmiscoutRMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities
Stars: ✭ 296 (-20.43%)
RtaRed team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.
Stars: ✭ 358 (-3.76%)
WsltoolsWeb Scan Lazy Tools - Python Package
Stars: ✭ 288 (-22.58%)
Preferenceroom🚚 Android processing library for managing SharedPreferences persistence efficiently and structurally.
Stars: ✭ 341 (-8.33%)
SusanooA REST API security testing framework.
Stars: ✭ 287 (-22.85%)
W5Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (-1.34%)
Traitor⬆️ ☠️ Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket
Stars: ✭ 3,473 (+833.6%)
Htrace.shMy simple Swiss Army knife for http/https troubleshooting and profiling.
Stars: ✭ 3,465 (+831.45%)
CloudfruntA tool for identifying misconfigured CloudFront domains
Stars: ✭ 281 (-24.46%)
Kube Psp AdvisorHelp building an adaptive and fine-grained pod security policy
Stars: ✭ 280 (-24.73%)
PojobuilderA Java Code Generator for Pojo Builders
Stars: ✭ 326 (-12.37%)
Certificates🛡️ A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH.
Stars: ✭ 3,693 (+892.74%)
UnsignRemove code signatures from OSX Mach-O binaries (note: unsigned binaries cannot currently be re-codesign'ed. Patches welcome!)
Stars: ✭ 362 (-2.69%)
BladeAndroid library for boilerplate destruction
Stars: ✭ 278 (-25.27%)
Hackertarget🎯 HackerTarget ToolKit - Tools And Network Intelligence To Help Organizations With Attack Surface Discovery 🎯
Stars: ✭ 320 (-13.98%)
Recon My WayThis repository created for personal use and added tools from my latest blog post.
Stars: ✭ 271 (-27.15%)
Impost3r👻Impost3r -- A linux password thief
Stars: ✭ 355 (-4.57%)
XlowpolyLowpoly picture, Sandpainting for Android implemented by JNI, delaunay triangulation algorithm
Stars: ✭ 271 (-27.15%)
AiodnsbrutePython 3.5+ DNS asynchronous brute force utility
Stars: ✭ 370 (-0.54%)
SpicypassA light-weight password manager with a focus on simplicity and security
Stars: ✭ 367 (-1.34%)
ThreatmapperIdentify vulnerabilities in running containers, images, hosts and repositories
Stars: ✭ 361 (-2.96%)