GitgrabergitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...
Stars: ✭ 1,164 (+719.72%)
Privacy RespectingCurated List of Privacy Respecting Services and Software
Stars: ✭ 1,663 (+1071.13%)
CatnipCat-Nip Automated Basic Pentest Tool - Designed For Kali Linux
Stars: ✭ 108 (-23.94%)
Pocsuite3pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.
Stars: ✭ 2,213 (+1458.45%)
Horn3tPowerful Visual Subdomain Enumeration at the Click of a Mouse
Stars: ✭ 120 (-15.49%)
EmbedosEmbedOS - Embedded security testing virtual machine
Stars: ✭ 108 (-23.94%)
ArchivefuzzHunt down the secrets from the WebArchives for Fun and Profit
Stars: ✭ 108 (-23.94%)
NosqliNoSql Injection CLI tool, for finding vulnerable websites using MongoDB.
Stars: ✭ 120 (-15.49%)
Awesome HackingA collection of various awesome lists for hackers, pentesters and security researchers
Stars: ✭ 48,038 (+33729.58%)
JwtA JWT (JSON Web Token) Encoder & Decoder
Stars: ✭ 107 (-24.65%)
HuntrVulnerability Database | huntr.dev
Stars: ✭ 136 (-4.23%)
ReconnessReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on schedule or events.
Stars: ✭ 131 (-7.75%)
0l4bsCross-site scripting labs for web application security enthusiasts
Stars: ✭ 119 (-16.2%)
TimesheetSelf-hosted application to manage project reporting. Demo:
Stars: ✭ 107 (-24.65%)
GofingerprintGoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fingerprints.
Stars: ✭ 120 (-15.49%)
Backfuzzprotocol fuzzing toolkit
Stars: ✭ 106 (-25.35%)
PatrowldocsPatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 105 (-26.06%)
DynamicreportsJava reporting library for creating dynamic report designs at runtime
Stars: ✭ 129 (-9.15%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+1272.54%)
Hacker ContainerContainer with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-26.06%)
KarnSimplifying Seccomp enforcement in containerized or non-containerized apps
Stars: ✭ 104 (-26.76%)
GoaltdnsA permutation generation tool written in golang
Stars: ✭ 119 (-16.2%)
SubtakeAutomatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.
Stars: ✭ 104 (-26.76%)
M4ngl3m3Common password pattern generator using strings list
Stars: ✭ 103 (-27.46%)
Netsec Ps ScriptsCollection of PowerShell network security scripts for system administrators.
Stars: ✭ 139 (-2.11%)
ReconnoitreA security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+1184.51%)
JwtxploiterA tool to test security of json web token
Stars: ✭ 130 (-8.45%)
Cloud Discovery Cloud Discovery provides a point in time enumeration of all the cloud native platform services
Stars: ✭ 119 (-16.2%)
UddupUrls de-duplication tool for better recon.
Stars: ✭ 103 (-27.46%)
Collection DocumentCollection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+876.76%)
Nuclei TemplatesCommunity curated list of templates for the nuclei engine to find security vulnerabilities.
Stars: ✭ 1,354 (+853.52%)
Security ScriptsA collection of public offensive and defensive security related scripts for InfoSec students.
Stars: ✭ 101 (-28.87%)
GreconYour Google Recon is Now Automated
Stars: ✭ 119 (-16.2%)
KeyeKeye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-28.87%)
FugaciousOSSSM (awesome). Open source short-term secure messaging
Stars: ✭ 100 (-29.58%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-18.31%)
Awesome Aws SecurityCurated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS Security
Stars: ✭ 100 (-29.58%)
EncpipeThe dum^H^H^Hsimplest encryption tool in the world.
Stars: ✭ 135 (-4.93%)
JxlsJava library for creating Excel reports using Excel templates
Stars: ✭ 128 (-9.86%)
CorsmeCross Origin Resource Sharing MisConfiguration Scanner
Stars: ✭ 118 (-16.9%)
CrashreporterLightweight macOS Crash Reporter Setup
Stars: ✭ 100 (-29.58%)
PowershellarmouryA PowerShell armoury for penetration testers or other random security guys
Stars: ✭ 99 (-30.28%)
HackeronedbThe unofficial HackerOne disclosure Timeline
Stars: ✭ 117 (-17.61%)
WsmanagerWebshell Manager
Stars: ✭ 99 (-30.28%)
Njsscannjsscan is a semantic aware SAST tool that can find insecure code patterns in your Node.js applications.
Stars: ✭ 128 (-9.86%)
TerrascanDetect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
Stars: ✭ 2,687 (+1792.25%)
Ecommerce Website Security ChecklistList of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built into the Techinical Specific Document, or will be checked in the Security testing phases.
Stars: ✭ 98 (-30.99%)
SliverAdversary Simulation Framework
Stars: ✭ 1,348 (+849.3%)
SojoboA binary analysis framework
Stars: ✭ 116 (-18.31%)
SquealerTelling tales on you for leaking secrets!
Stars: ✭ 97 (-31.69%)
QuiverQuiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-1.41%)
Personal Security Checklist🔒 A curated checklist of 300+ tips for protecting digital security and privacy in 2021
Stars: ✭ 2,388 (+1581.69%)
ApisecuritybestpracticesResources to help you keep secrets (API keys, database credentials, certificates, ...) out of source code and remediate the issue in case of a leaked API key. Made available by GitGuardian.
Stars: ✭ 1,745 (+1128.87%)