Xunfeng巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Stars: ✭ 3,131 (+515.13%)
Dradis CeDradis Framework: Colllaboration and reporting for IT Security teams
Stars: ✭ 443 (-12.97%)
Pentest NotesCollection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
Stars: ✭ 89 (-82.51%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+42.44%)
ArchstrikeAn Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (-21.22%)
Zap CliA simple tool for interacting with OWASP ZAP from the commandline.
Stars: ✭ 166 (-67.39%)
Horn3tPowerful Visual Subdomain Enumeration at the Click of a Mouse
Stars: ✭ 120 (-76.42%)
CansinaWeb Content Discovery Tool
Stars: ✭ 709 (+39.29%)
HabuHacking Toolkit
Stars: ✭ 635 (+24.75%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-87.82%)
Sn0intSemi-automatic OSINT framework and package manager
Stars: ✭ 814 (+59.92%)
RspetRSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Stars: ✭ 251 (-50.69%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-64.24%)
Sqlite LabThis code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is for fun. Just enjoy it \m/
Stars: ✭ 140 (-72.5%)
Git ScannerA tool for bug hunting or pentesting for targeting websites that have open .git repositories available in public
Stars: ✭ 157 (-69.16%)
OtsecaOpen source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
Stars: ✭ 416 (-18.27%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-77.21%)
FaradayFaraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit.
Stars: ✭ 3,198 (+528.29%)
SecuritymanageframworkSecurity Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Stars: ✭ 378 (-25.74%)
NfcgateAn NFC research toolkit application for Android
Stars: ✭ 425 (-16.5%)
SwcarpentryA meta-repository to help navigate the many lessons and repos of the Software Carpentry Community
Stars: ✭ 454 (-10.81%)
CovertutilsA framework for Backdoor development!
Stars: ✭ 424 (-16.7%)
Dref DNS Rebinding Exploitation Framework
Stars: ✭ 423 (-16.9%)
Juice ShopOWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+1131.83%)
OctopusOpen source pre-operation C2 server based on python and powershell
Stars: ✭ 449 (-11.79%)
EhtoolsWi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: ✭ 422 (-17.09%)
Argon DashboardArgon - Dashboard for Bootstrap 4 by Creative Tim
Stars: ✭ 429 (-15.72%)
MetabigorIntelligence tool but without API key
Stars: ✭ 424 (-16.7%)
KlarIntegration of Clair and Docker Registry
Stars: ✭ 480 (-5.7%)
ArcfacedemoArcSoft Free SDK demo,support ArcFace2.1, ArcFace2.0, ArcFace1.2
Stars: ✭ 424 (-16.7%)
Uestc Course电子科技大学资源共享平台, This repository contains the course materials of University of Electronic Science and Technology of China.
Stars: ✭ 452 (-11.2%)
MxtractmXtract - Memory Extractor & Analyzer
Stars: ✭ 499 (-1.96%)
Ghost On Github PagesGhost on Github Pages. Build and deploy Ghost for free in a few minutes.
Stars: ✭ 421 (-17.29%)
NullinuxInternal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB.
Stars: ✭ 451 (-11.39%)
ReverseapkQuickly analyze and reverse engineer Android packages
Stars: ✭ 419 (-17.68%)
0xsp Mongoosea unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Stars: ✭ 419 (-17.68%)
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (-6.88%)
JusttryharderJustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)
Stars: ✭ 450 (-11.59%)
PwndocPentest Report Generator
Stars: ✭ 417 (-18.07%)
RedrunnerRed Runner, Awesome Platformer Game.
Stars: ✭ 414 (-18.66%)
CrackmapexecA swiss army knife for pentesting networks
Stars: ✭ 5,445 (+969.74%)
HellraiserVulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (-18.86%)
Css Animation 101Learn how to bring animation to your web projects
Stars: ✭ 4,236 (+732.22%)
InfectInfect Any Android Device With Virus From Link In Termux
Stars: ✭ 409 (-19.65%)
GobusterDirectory/File, DNS and VHost busting tool written in Go
Stars: ✭ 5,356 (+952.26%)
FfufFast web fuzzer written in Go
Stars: ✭ 5,687 (+1017.29%)
VvvebjsDrag and drop website builder javascript library.
Stars: ✭ 4,609 (+805.5%)
ApkurlgrepExtract endpoints from APK files
Stars: ✭ 405 (-20.43%)
LearninggoLearning Go Book in mmark
Stars: ✭ 438 (-13.95%)
PacketwhisperPacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (-20.43%)