tutorialsAdditional Resources For Securing The Stack Tutorials
Stars: ✭ 36 (+9.09%)
SSI Extra MaterialsIn my computer security courses I make extensive usage of cheatsheets for various tools and extra materials to complement the student learning if they are willing to do so. I have decided to share them to enable others to take advantage of them
Stars: ✭ 42 (+27.27%)
PayloadsGit All the Payloads! A collection of web attack payloads.
Stars: ✭ 2,862 (+8572.73%)
CloudFrontierMonitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (+209.09%)
GDPatrolA Lambda-powered Security Orchestration framework for AWS GuardDuty
Stars: ✭ 50 (+51.52%)
Whoishere.pyWIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.
Stars: ✭ 182 (+451.52%)
GnuradioGNU Radio – the Free and Open Software Radio Ecosystem
Stars: ✭ 3,297 (+9890.91%)
Slack WatchmanMonitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (+381.82%)
CalderaAutomated Adversary Emulation Platform
Stars: ✭ 3,126 (+9372.73%)
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 154 (+366.67%)
Fudgec2FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (+478.79%)
Awesome-CyberSec-ResourcesAn awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (+727.27%)
JwtcatA CPU-based JSON Web Token (JWT) cracker and - to some extent - scanner.
Stars: ✭ 181 (+448.48%)
phishEyephishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (+42.42%)
OblivionData leak checker & OSINT Tool
Stars: ✭ 237 (+618.18%)
Python HoneypotOWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (+384.85%)
SharpAn anti-ARP-spoofing application software that use active and passive scanning methods to detect and remove any ARP-spoofer from the network.
Stars: ✭ 150 (+354.55%)
AutottpAutomated Tactics Techniques & Procedures
Stars: ✭ 215 (+551.52%)
OpenctiAuthors
Stars: ✭ 2,165 (+6460.61%)
Intel-OneCommand line tool for passive reconnaissance, able to gather and link public information to a target domain, company or individual. It can make intelligence gathering faster and more effective by drastically reducing manual user interaction. This is achieved through the engineering of a highly customisable single input to multiple output solutio…
Stars: ✭ 23 (-30.3%)
HostintelA modular Python application to collect intelligence for malicious hosts.
Stars: ✭ 211 (+539.39%)
Personal Security Checklist🔒 A curated checklist of 300+ tips for protecting digital security and privacy in 2021
Stars: ✭ 2,388 (+7136.36%)
Satelliteeasy-to-use payload hosting
Stars: ✭ 193 (+484.85%)
NetzDiscover internet-wide misconfigurations while drinking coffee
Stars: ✭ 159 (+381.82%)
Hack ToolsThe all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+8233.33%)
NtlmreconEnumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (+663.64%)
CypherothAutomated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.
Stars: ✭ 179 (+442.42%)
ehtkEthical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Researchers etc. It contains almost all tools mentioned in CEH, OSCP, eCPPT and PNPT
Stars: ✭ 59 (+78.79%)
MagicpadMagicPad is an encryption suite for beginners. It is designed to be run standalone via the browser or executable (Electron).
Stars: ✭ 174 (+427.27%)
KartonDistributed malware processing framework based on Python, Redis and MinIO.
Stars: ✭ 134 (+306.06%)
BbreconPython library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (+412.12%)
conclaveQuery compiler for secure multi-party computation.
Stars: ✭ 86 (+160.61%)
CyberprobeCapturing, analysing and responding to cyber attacks
Stars: ✭ 162 (+390.91%)
vulndb-data-mirrorA simple Java command-line utility to mirror the entire contents of VulnDB.
Stars: ✭ 36 (+9.09%)
RichelieuList of the most common French passwords
Stars: ✭ 199 (+503.03%)
Powershell Red TeamCollection of PowerShell functions a Red Teamer may use to collect data from a machine
Stars: ✭ 155 (+369.7%)
OsweepDon't Just Search OSINT. Sweep It.
Stars: ✭ 225 (+581.82%)
HackercampEnine boyuna siber güvenlik
Stars: ✭ 149 (+351.52%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+324.24%)
Pyiris BackdoorPyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (+339.39%)
Oscp Cheat SheetThis is my OSCP cheat sheet made by combining a lot of different resources online with a little bit of tweaking. I used this cheat sheet during my exam (Fri, 13 Sep 2019) and during the labs. I can proudly say it helped me pass so I hope it can help you as well ! Good Luck and Try Harder
Stars: ✭ 216 (+554.55%)
Misp DashboardA dashboard for a real-time overview of threat intelligence from MISP instances
Stars: ✭ 142 (+330.3%)
LabtainersLabtainers: A Docker-based cyber lab framework
Stars: ✭ 226 (+584.85%)
Information SecurityA place where I can create, collect and share tooling, resources and knowledge about information security.
Stars: ✭ 135 (+309.09%)
PicoctfThe platform used to run picoCTF. A great framework to host any CTF.
Stars: ✭ 203 (+515.15%)
JiffJavaScript library for building web-based applications that employ secure multi-party computation (MPC).
Stars: ✭ 131 (+296.97%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+169.7%)
Visualize logsA Python library and command line tools to provide interactive log visualization.
Stars: ✭ 128 (+287.88%)
BetterbackdoorA backdoor with a multitude of features.
Stars: ✭ 195 (+490.91%)
DevSecOpsUltimate DevSecOps library
Stars: ✭ 4,450 (+13384.85%)
phisherpriceAll In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (+15.15%)