MettaAn information security preparedness tool to do adversarial simulation.
Stars: ✭ 867 (+290.54%)
Information Security TasksThis repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (-51.35%)
Sqlivmassive SQL injection vulnerability scanner
Stars: ✭ 840 (+278.38%)
BlisqyVersion 0.2 - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB).
Stars: ✭ 179 (-19.37%)
Detor🙊 A simple REST API to identify requests made from TOR network.
Stars: ✭ 26 (-88.29%)
SocialpwnedSocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and Twitter to find possible credentials leaks in PwnDB.
Stars: ✭ 104 (-53.15%)
CommoncrawlparserSimple multi threaded tool to extract domain related data from commoncrawl.org
Stars: ✭ 25 (-88.74%)
Secret AgentThe web browser that's built for scraping.
Stars: ✭ 151 (-31.98%)
ChangemeA default credential scanner.
Stars: ✭ 928 (+318.02%)
Backfuzzprotocol fuzzing toolkit
Stars: ✭ 106 (-52.25%)
RoninRonin is a Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of code, Exploits or Payloads, Scanners, etc, via Repositories.
Stars: ✭ 220 (-0.9%)
PwnedornotOSINT Tool for Finding Passwords of Compromised Email Addresses
Stars: ✭ 888 (+300%)
D4n155OWASP D4N155 - Intelligent and dynamic wordlist using OSINT
Stars: ✭ 105 (-52.7%)
VuldashVulnerability Dashboard
Stars: ✭ 16 (-92.79%)
So Sql InjectionsSQL injection vulnerabilities in Stack Overflow PHP questions
Stars: ✭ 154 (-30.63%)
Hacker ContainerContainer with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-52.7%)
Infosec BadgesBadges for your GitHub tool presented at InfoSec Conference
Stars: ✭ 74 (-66.67%)
MeshA secure, anonymous, peer-to-peer, instant messenger!
Stars: ✭ 74 (-66.67%)
Haproxy WiWeb interface for managing Haproxy, Nginx and Keepalived servers
Stars: ✭ 823 (+270.72%)
SubtakeAutomatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.
Stars: ✭ 104 (-53.15%)
Sherlock JsFind usernames across over 170 social networks - Fast & flexible remake of sdushantha/sherlock
Stars: ✭ 153 (-31.08%)
ParamspiderMining parameters from dark corners of Web Archives
Stars: ✭ 781 (+251.8%)
M4ngl3m3Common password pattern generator using strings list
Stars: ✭ 103 (-53.6%)
Adamant ImADAMANT Decentralized Messenger. Progressive Web Application (PWA)
Stars: ✭ 202 (-9.01%)
TrapePeople tracker on the Internet: OSINT analysis and research tool by Jose Pino
Stars: ✭ 6,753 (+2941.89%)
Collection DocumentCollection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+524.77%)
Torchat MacmacOS native TorChat client
Stars: ✭ 73 (-67.12%)
RaccoonA high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+941.44%)
Userrecon PyUsername recognition on various websites.
Stars: ✭ 131 (-40.99%)
HiddenvmHiddenVM — Use any desktop OS without leaving a trace.
Stars: ✭ 1,183 (+432.88%)
ShadowShadow is a unique discrete-event network simulator that runs real applications like Tor, and distributed systems of thousands of nodes on a single machine. Shadow combines the accuracy of emulation with the efficiency and control of simulation, achieving the best of both approaches.
Stars: ✭ 769 (+246.4%)
Ssh keyscannerssh public host key scanner using shodan
Stars: ✭ 102 (-54.05%)
ChashellChashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
Stars: ✭ 742 (+234.23%)
Awesome TorA list of awesome Tor related projects, articles, papers, etc
Stars: ✭ 182 (-18.02%)
DotnetpadThe Waf DotNetPad is a simple and fast code editor that makes fun to program with C# or Visual Basic.
Stars: ✭ 101 (-54.5%)
Slimmable networksSlimmable Networks, AutoSlim, and Beyond, ICLR 2019, and ICCV 2019
Stars: ✭ 708 (+218.92%)
Amitt frameworkRepo replaced by cogsec-collaborative/AMITT
Stars: ✭ 152 (-31.53%)
AttacksurfacemapperAttackSurfaceMapper is a tool that aims to automate the reconnaissance process.
Stars: ✭ 702 (+216.22%)
WsmanagerWebshell Manager
Stars: ✭ 99 (-55.41%)
BashfuscatorA fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.
Stars: ✭ 690 (+210.81%)
TxtorconTwisted-based asynchronous Tor control protocol implementation. Includes unit-tests, examples, state-tracking code and configuration abstraction.
Stars: ✭ 215 (-3.15%)
HarpoonCLI tool for open source and threat intelligence
Stars: ✭ 679 (+205.86%)
Awesome Cloud SecurityCurated list of awesome cloud security blogs, podcasts, standards, projects, and examples.
Stars: ✭ 98 (-55.86%)
DirsearchWeb path scanner
Stars: ✭ 7,246 (+3163.96%)
InstahackBest Tool For instagram bruteforce hacking Tool By EvilDevil
Stars: ✭ 139 (-37.39%)
GrawlerGrawler is a tool written in PHP which comes with a web interface that automates the task of using google dorks, scrapes the results, and stores them in a file.
Stars: ✭ 98 (-55.86%)
DeadtrapAn OSINT tool to gather information about the real owner of a phone number
Stars: ✭ 73 (-67.12%)
Jsonpjsonp is a Burp Extension which attempts to reveal JSONP functionality behind JSON endpoints. This could help reveal cross-site script inclusion vulnerabilities or aid in bypassing content security policies.
Stars: ✭ 131 (-40.99%)
Ffck🦊 & 🧅 hardening
Stars: ✭ 72 (-67.57%)
BucketlistAmazon S3 bucket spelunking!
Stars: ✭ 72 (-67.57%)
Pwdb PublicA collection of all the data i could extract from 1 billion leaked credentials from internet.
Stars: ✭ 2,497 (+1024.77%)
MosintAn automated e-mail OSINT tool
Stars: ✭ 184 (-17.12%)
H8mailEmail OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (+874.32%)
PurifyAll-in-one tool for managing vulnerability reports from AppSec pipelines
Stars: ✭ 72 (-67.57%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-68.92%)