BxssbXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.
Stars: ✭ 331 (-67.58%)
vapivAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.
Stars: ✭ 674 (-33.99%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+659.26%)
ViPERWeb App Pen Tester (Web Interface)
Stars: ✭ 19 (-98.14%)
oscp-omnibusA collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (-95.49%)
Scanners BoxA powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑
Stars: ✭ 5,590 (+447.5%)
requests-ip-rotatorA Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.
Stars: ✭ 323 (-68.36%)
Bruteforce ListsSome files for bruteforcing certain things.
Stars: ✭ 320 (-68.66%)
Intrigue CoreDiscover Your Attack Surface!
Stars: ✭ 1,013 (-0.78%)
vsauditVOIP Security Audit Framework
Stars: ✭ 104 (-89.81%)
KaboomA tool to automate penetration tests
Stars: ✭ 322 (-68.46%)
domhttpxdomhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time.
Stars: ✭ 59 (-94.22%)
nozakiHTTP fuzzer engine security oriented
Stars: ✭ 37 (-96.38%)
SubcertSubcert is an subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.
Stars: ✭ 58 (-94.32%)
PrivescA collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (-23.02%)
IMAPLoginTesterA simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by trying to login on IMAP servers.
Stars: ✭ 47 (-95.4%)
Findom XssA fast DOM based XSS vulnerability scanner with simplicity.
Stars: ✭ 310 (-69.64%)
kube-scanKubernetes Scanner
Stars: ✭ 32 (-96.87%)
Damn Vulnerable Graphql ApplicationDamn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
Stars: ✭ 567 (-44.47%)
BackToMeLittle tool made in python to create payloads for Linux, Windows and OSX with unique handler
Stars: ✭ 61 (-94.03%)
HackdroidAndroid Apps, Roms and Platforms for Pentesting
Stars: ✭ 310 (-69.64%)
NullinuxInternal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB.
Stars: ✭ 451 (-55.83%)
quick-recon.pyDo some quick reconnaissance on a domain-based web-application
Stars: ✭ 13 (-98.73%)
Androl4bA Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
Stars: ✭ 908 (-11.07%)
Bugbounty CheatsheetA list of interesting payloads, tips and tricks for bug bounty hunters.
Stars: ✭ 3,644 (+256.9%)
Passphrase WordlistPassphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (-45.54%)
CometaSuper fast, on-demand and on-the-fly, image processing.
Stars: ✭ 8 (-99.22%)
Lockdoor Framework🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (-33.69%)
JusttryharderJustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)
Stars: ✭ 450 (-55.93%)
ORtesterOpen Redirect scanner - (out of date)
Stars: ✭ 24 (-97.65%)
PassivehunterSubdomain discovery using the power of 'The Rapid7 Project Sonar datasets'
Stars: ✭ 83 (-91.87%)
WebkillerTool Information Gathering Write By Python.
Stars: ✭ 300 (-70.62%)
AmassIn-depth Attack Surface Mapping and Asset Discovery
Stars: ✭ 6,284 (+515.48%)
Offensive-Security-CayuqueoScripts usados en mi formación de Offensive Security por medio de la suscripción Learn Unlimited
Stars: ✭ 14 (-98.63%)
Go DorkThe fastest dork scanner written in Go.
Stars: ✭ 274 (-73.16%)
Virtual-HostModified Nuclei Templates Version to FUZZ Host Header
Stars: ✭ 38 (-96.28%)
NettackerAutomated Penetration Testing Framework
Stars: ✭ 982 (-3.82%)
AlfredA friendly Toolkit for Beginner CTF players
Stars: ✭ 39 (-96.18%)
Teamviewer permissions hook v1A proof of concept injectable C++ dll, that uses naked inline hooking and direct memory modification to change your TeamViewer permissions.
Stars: ✭ 297 (-70.91%)
FYIMy last 10 year's material collection on offensive & defensive security, GRC, risk management, technical security guidelines and much more.
Stars: ✭ 194 (-81%)
RedcloudAutomated Red Team Infrastructure deployement using Docker
Stars: ✭ 551 (-46.03%)
Dnscat2 PowershellA Powershell client for dnscat2, an encrypted DNS command and control tool.
Stars: ✭ 295 (-71.11%)
vulnerabilitiesList of every possible vulnerabilities in computer security.
Stars: ✭ 14 (-98.63%)
VanquishVanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Stars: ✭ 449 (-56.02%)
CoogleA shot-for-shot remake of the Google Login Page.
Stars: ✭ 34 (-96.67%)
gitls🖇 Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline
Stars: ✭ 39 (-96.18%)
BrutalPayload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (-33.59%)
KoanfLight weight, extensible configuration management library for Go. Built in support for JSON, TOML, YAML, env, command line, file, S3 etc. Alternative to viper.
Stars: ✭ 450 (-55.93%)
SecurityExplainedSecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to create informational content in multiple formats and share with the community to enable knowledge creation and learning.
Stars: ✭ 301 (-70.52%)
jsleaka Go code to detect leaks in JS files via regex patterns
Stars: ✭ 111 (-89.13%)
Php EnumSimple and fast implementation of enumerations with native PHP
Stars: ✭ 446 (-56.32%)
s3 exporterExports Prometheus metrics about S3 buckets and objects
Stars: ✭ 65 (-93.63%)
radioRedundant Array of Distributed Independent Objectstores in short RADIO performs synchronous mirroring, erasure coding across multiple object stores
Stars: ✭ 25 (-97.55%)
PasshuntPasshunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
Stars: ✭ 961 (-5.88%)