Pwdb-PublicA collection of all the data i could extract from 1 billion leaked credentials from internet.
Stars: ✭ 2,529 (-25.86%)
CripsIP Tools To quickly get information about IP Address's, Web Pages and DNS records.
Stars: ✭ 272 (-92.03%)
dorothyDorothy is a tool to test security monitoring and detection for Okta environments
Stars: ✭ 85 (-97.51%)
H2csmugglerHTTP Request Smuggling over HTTP/2 Cleartext (h2c)
Stars: ✭ 292 (-91.44%)
pyc2bytecodeA Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (-97.95%)
ArachniWeb Application Security Scanner Framework
Stars: ✭ 2,942 (-13.75%)
Cyber-SecurityThis repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Stars: ✭ 42 (-98.77%)
Traitor⬆️ ☠️ Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket
Stars: ✭ 3,473 (+1.82%)
ctf-writeupsWriteups of CTF challenges
Stars: ✭ 19 (-99.44%)
targetsA collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (-97.51%)
LambdaguardAWS Serverless Security
Stars: ✭ 300 (-91.2%)
PastebinMarkdownXSSXSS in pastebin.com and reddit.com via unsanitized markdown output
Stars: ✭ 84 (-97.54%)
Soup☎️ Original open source call flooder using Twilio's API.
Stars: ✭ 267 (-92.17%)
angular-communitiesA list of all the Angular Communities around the world
Stars: ✭ 97 (-97.16%)
MegplusAutomated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]
Stars: ✭ 268 (-92.14%)
T1tl3A simple python script which can check HTTP status of branch of URLs/Subdomains and grab URLs/Subdomain title
Stars: ✭ 14 (-99.59%)
hibpwnedPython API wrapper for haveibeenpwned.com (API v3)
Stars: ✭ 21 (-99.38%)
osmedeus-workflowCommunity Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own
Stars: ✭ 26 (-99.24%)
VindicateToolLLMNR/NBNS/mDNS Spoofing Detection Toolkit
Stars: ✭ 40 (-98.83%)
Windows Post ExploitationWindows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (-91.32%)
Xunfeng巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Stars: ✭ 3,131 (-8.21%)
Jenkins Rce😈 Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!
Stars: ✭ 262 (-92.32%)
QuineQuine Museum
Stars: ✭ 263 (-92.29%)
conferencesCurated list of conferences and CFPs that interest me
Stars: ✭ 17 (-99.5%)
Ictf FrameworkThe iCTF Framework, presented by Shellphish!
Stars: ✭ 281 (-91.76%)
DeckerDeclarative penetration testing orchestration framework
Stars: ✭ 263 (-92.29%)
Damn-Vulnerable-BankDamn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android application security hacking skills.
Stars: ✭ 379 (-88.89%)
MercureMercure is a tool for security managers who want to train their colleague to phishing.
Stars: ✭ 262 (-92.32%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-97.8%)
reconmapVulnerability assessment and penetration testing automation and reporting platform for teams.
Stars: ✭ 242 (-92.91%)
QuackQuack Toolkit is a set of tools to provide denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools.
Stars: ✭ 305 (-91.06%)
WebkillerTool Information Gathering Write By Python.
Stars: ✭ 300 (-91.2%)
My TalksList of my talks and workshops: security engineering, applied cryptography, secure software development
Stars: ✭ 261 (-92.35%)
diwaA Deliberately Insecure Web Application
Stars: ✭ 32 (-99.06%)
gwdomainssub domain wild card filtering tool
Stars: ✭ 38 (-98.89%)
UptuxLinux privilege escalation checks (systemd, dbus, socket fun, etc)
Stars: ✭ 260 (-92.38%)
giggerGit folder digger, I'm sure it's worthwhile stuff.
Stars: ✭ 39 (-98.86%)
Dumpall一款信息泄漏利用工具,适用于.git/.svn源代码泄漏和.DS_Store泄漏
Stars: ✭ 250 (-92.67%)
pyetiPython bindings for Yeti's API
Stars: ✭ 15 (-99.56%)
oscp-omnibusA collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (-98.65%)
Lyncsmashlocate and attack Lync/Skype for Business
Stars: ✭ 258 (-92.44%)
SubcertSubcert is an subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.
Stars: ✭ 58 (-98.3%)
Cheatsheet GodPenetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+3.22%)
FaradayFaraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit.
Stars: ✭ 3,198 (-6.24%)
StalkphishStalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Stars: ✭ 256 (-92.49%)
PyConES-2019-dataPyConES 2019 conferences, attachments and related stuff
Stars: ✭ 18 (-99.47%)
massurlA simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau
Stars: ✭ 14 (-99.59%)
Droid Hunter(deprecated) Android application vulnerability analysis and Android pentest tool
Stars: ✭ 256 (-92.49%)