Red Teaming ToolkitThis repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Stars: ✭ 5,615 (+713.77%)
Gitlab WatchmanMonitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (-81.59%)
Slack WatchmanMonitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (-76.96%)
juumla🦁 Juumla is a python tool created to identify Joomla version, scan for vulnerabilities and search for config or backup files.
Stars: ✭ 107 (-84.49%)
github-watchmanMonitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (-91.3%)
InfosecHouseInfosec resource center for offensive and defensive security operations.
Stars: ✭ 61 (-91.16%)
Deimosc2DeimosC2 is a Golang command and control framework for post-exploitation.
Stars: ✭ 423 (-38.7%)
FameFAME Automates Malware Evaluation
Stars: ✭ 663 (-3.91%)
NishangNishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: ✭ 5,943 (+761.3%)
PockintA portable OSINT Swiss Army Knife for DFIR/OSINT professionals 🕵️ 🕵️ 🕵️
Stars: ✭ 196 (-71.59%)
dorothyDorothy is a tool to test security monitoring and detection for Okta environments
Stars: ✭ 85 (-87.68%)
evtx-hunterevtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.
Stars: ✭ 122 (-82.32%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+64.64%)
Litmus testDetecting ATT&CK techniques & tactics for Linux
Stars: ✭ 190 (-72.46%)
pwn-pulseExploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Stars: ✭ 126 (-81.74%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+12.32%)
Adversarial Robustness ToolboxAdversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Stars: ✭ 2,638 (+282.32%)
react-obfuscateAn intelligent React component to obfuscate any contact link!
Stars: ✭ 87 (-87.39%)
DcRatA simple remote tool in C#.
Stars: ✭ 709 (+2.75%)
inceptorTemplate-Driven AV/EDR Evasion Framework
Stars: ✭ 730 (+5.8%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+503.19%)
Learn365This repo is about @harshbothra_ 365 days of learning Tweet & Mindmap collection
Stars: ✭ 525 (-23.91%)
HacktheworldAn Python Script For Generating Payloads that Bypasses All Antivirus so far .
Stars: ✭ 527 (-23.62%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (-26.23%)
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (-11.45%)
WhonowA "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
Stars: ✭ 533 (-22.75%)
CortexCortex: a Powerful Observable Analysis and Active Response Engine
Stars: ✭ 676 (-2.03%)
Infosec getting startedA collection of resources/documentation/links/etc to help people learn about Infosec and break into the field.
Stars: ✭ 526 (-23.77%)
Assessment MindsetSecurity Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.
Stars: ✭ 608 (-11.88%)
Yakpro PoYAK Pro - Php Obfuscator
Stars: ✭ 678 (-1.74%)
AggressorscriptsAggressor scripts for use with Cobalt Strike 3.0+
Stars: ✭ 501 (-27.39%)
HowtheysreA curated collection of publicly available resources on how technology and tech-savvy organizations around the world practice Site Reliability Engineering (SRE)
Stars: ✭ 6,962 (+908.99%)
Search That Hash🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (-32.46%)
ObfuscapkAn automatic obfuscation tool for Android apps that works in a black-box fashion, supports advanced obfuscation features and has a modular architecture easily extensible with new techniques
Stars: ✭ 456 (-33.91%)
PlumhoundBloodhound for Blue and Purple Teams
Stars: ✭ 452 (-34.49%)
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+897.39%)
DvwaDamn Vulnerable Web Application (DVWA)
Stars: ✭ 5,727 (+730%)
PowerzurePowerShell framework to assess Azure security
Stars: ✭ 450 (-34.78%)
IosMost usable tools for iOS penetration testing
Stars: ✭ 563 (-18.41%)
Dradis CeDradis Framework: Colllaboration and reporting for IT Security teams
Stars: ✭ 443 (-35.8%)
HershellHershell is a simple TCP reverse shell written in Go.
Stars: ✭ 442 (-35.94%)
AutordpwnThe Shadow Attack Framework
Stars: ✭ 688 (-0.29%)
GorsairGorsair hacks its way into remote docker containers that expose their APIs
Stars: ✭ 678 (-1.74%)
Passphrase WordlistPassphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (-19.42%)
QuasarRemote Administration Tool for Windows
Stars: ✭ 4,897 (+609.71%)
FfufFast web fuzzer written in Go
Stars: ✭ 5,687 (+724.2%)
Platypus🔨 A modern multiple reverse shell sessions manager wrote in go
Stars: ✭ 559 (-18.99%)
Onioff🌰 An onion url inspector for inspecting deep web links.
Stars: ✭ 440 (-36.23%)
Cyberchef RecipesA list of cyber-chef recipes and curated links
Stars: ✭ 619 (-10.29%)
Dns Rebind ToolkitA front-end JavaScript toolkit for creating DNS rebinding attacks.
Stars: ✭ 435 (-36.96%)
Lazy importerlibrary for importing functions from dlls in a hidden, reverse engineer unfriendly way
Stars: ✭ 544 (-21.16%)