CardpwnOSINT Tool to find Breached Credit Cards Information
Stars: ✭ 187 (-15.77%)
Ansible RelayorAn Ansible Role for Tor Relay Operators
Stars: ✭ 165 (-25.68%)
Dockerfilesome personally made dockerfile
Stars: ✭ 2,021 (+810.36%)
NetzDiscover internet-wide misconfigurations while drinking coffee
Stars: ✭ 159 (-28.38%)
AsnlookupLeverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-26.58%)
Venmo DataVenmo trasaction dataset for data analysis/visualization/anything
Stars: ✭ 164 (-26.13%)
Tor Socks Proxy🐳 Tiny Docker(🤏 10MB) image as 🧅 Tor SOCKS5 proxy 🛡
Stars: ✭ 218 (-1.8%)
PdlistA passive subdomain finder
Stars: ✭ 204 (-8.11%)
N8nFree and open fair-code licensed node based Workflow Automation Tool. Easily automate tasks across different services.
Stars: ✭ 19,252 (+8572.07%)
ThreagileAgile Threat Modeling Toolkit
Stars: ✭ 162 (-27.03%)
Python HoneypotOWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (-27.93%)
Slack WatchmanMonitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (-28.38%)
Hacker101Source code for Hacker101.com - a free online web and mobile security class.
Stars: ✭ 12,246 (+5416.22%)
Commit Stream#OSINT tool for finding Github repositories by extracting commit logs in real time from the Github event API
Stars: ✭ 204 (-8.11%)
Osint Tools👀 Some of my favorite OSINT tools.
Stars: ✭ 155 (-30.18%)
LinkfinderA python script that finds endpoints in JavaScript files
Stars: ✭ 2,268 (+921.62%)
BlisqyVersion 0.2 - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB).
Stars: ✭ 179 (-19.37%)
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 154 (-30.63%)
RoninRonin is a Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of code, Exploits or Payloads, Scanners, etc, via Repositories.
Stars: ✭ 220 (-0.9%)
Secret AgentThe web browser that's built for scraping.
Stars: ✭ 151 (-31.98%)
PwnbackBurp Extender plugin that generates a sitemap of a website using Wayback Machine
Stars: ✭ 203 (-8.56%)
Misp TrainingMISP trainings, threat intel and information sharing training materials with source code
Stars: ✭ 185 (-16.67%)
UpriboxUsable Privacy Box
Stars: ✭ 153 (-31.08%)
Awesome Shodan Queries🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
Stars: ✭ 2,758 (+1142.34%)
So Sql InjectionsSQL injection vulnerabilities in Stack Overflow PHP questions
Stars: ✭ 154 (-30.63%)
Sherlock JsFind usernames across over 170 social networks - Fast & flexible remake of sdushantha/sherlock
Stars: ✭ 153 (-31.08%)
Adamant ImADAMANT Decentralized Messenger. Progressive Web Application (PWA)
Stars: ✭ 202 (-9.01%)
WafpassAnalysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.
Stars: ✭ 184 (-17.12%)
Tlosint LiveTrace Labs OSINT Linux Distribution based on Kali.
Stars: ✭ 151 (-31.98%)
Awesome TorA list of awesome Tor related projects, articles, papers, etc
Stars: ✭ 182 (-18.02%)
NetpwnTool made to automate tasks of pentesting.
Stars: ✭ 152 (-31.53%)
Amitt frameworkRepo replaced by cogsec-collaborative/AMITT
Stars: ✭ 152 (-31.53%)
TxtorconTwisted-based asynchronous Tor control protocol implementation. Includes unit-tests, examples, state-tracking code and configuration abstraction.
Stars: ✭ 215 (-3.15%)
Secure DesktopAnti-keylogger/anti-rat application for Windows
Stars: ✭ 201 (-9.46%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-18.02%)
AutosintTool to automate common OSINT tasks
Stars: ✭ 150 (-32.43%)
TorsharpUse Tor for your C# HTTP clients. Tor + Privoxy = ❤️
Stars: ✭ 180 (-18.92%)
InstahackBest Tool For instagram bruteforce hacking Tool By EvilDevil
Stars: ✭ 139 (-37.39%)
OpensquatDetection of phishing domains and domain squatting. Supports permutations such as homograph attack, typosquatting and bitsquatting.
Stars: ✭ 149 (-32.88%)
HawkeyeHawkeye filesystem analysis tool
Stars: ✭ 202 (-9.01%)
Docker WafAn NGINX and ModSecurity based Web Application Firewall for Docker
Stars: ✭ 181 (-18.47%)
PhpvulnAudit tool to find common vulnerabilities in PHP source code
Stars: ✭ 146 (-34.23%)
Proof Of ConceptsA little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
Stars: ✭ 148 (-33.33%)
Twitter IntelligenceTwitter Intelligence OSINT project performs tracking and analysis of the Twitter
Stars: ✭ 179 (-19.37%)
MyriamA vulnerable iOS App with Security Challenges for the Security Researcher inside you.
Stars: ✭ 146 (-34.23%)
IntelowlIntel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Stars: ✭ 2,114 (+852.25%)
CrosslinkedLinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping
Stars: ✭ 223 (+0.45%)
Git Vuln FinderFinding potential software vulnerabilities from git commit messages
Stars: ✭ 221 (-0.45%)
Inject Some SqlHave fun injecting SQL into a Ruby on Rails application!
Stars: ✭ 211 (-4.95%)
Qsfuzzqsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.
Stars: ✭ 201 (-9.46%)
Iposint⚠️WARNING: This project now become part of https://github.com/j3ssie/Metabigor project
Stars: ✭ 178 (-19.82%)
WincmdfuWindows one line commands that make life easier, shortcuts and command line fu.
Stars: ✭ 145 (-34.68%)
Pyiris BackdoorPyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (-34.68%)
DiscoverCustom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Stars: ✭ 2,548 (+1047.75%)
Intrec PackIntelligence and Reconnaissance Package/Bundle installer.
Stars: ✭ 177 (-20.27%)
BinsnitchDetect silent (unwanted) changes to files on your system
Stars: ✭ 144 (-35.14%)