UrlextractorInformation gathering & website reconnaissance | https://phishstats.info/
Stars: ✭ 341 (+136.81%)
CirtkitTools for the Computer Incident Response Team 💻
Stars: ✭ 117 (-18.75%)
PhpmusselPHP-based anti-virus anti-trojan anti-malware solution.
Stars: ✭ 337 (+134.03%)
AngststealerAngst is the first python malware to have its own plugin system allowing for quick and easy account takeover. Along with its ability for easy plugin integration it has incredibly low detections.
Stars: ✭ 44 (-69.44%)
Ctf Writeups PublicWriteups for infosec Capture the Flag events by team Galaxians
Stars: ✭ 331 (+129.86%)
GorshA Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
Stars: ✭ 97 (-32.64%)
BxssbXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.
Stars: ✭ 331 (+129.86%)
Legal Bug Bounty#legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.
Stars: ✭ 42 (-70.83%)
Hosts🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
Stars: ✭ 19,363 (+13346.53%)
IdenlibidenLib - Library Function Identification [This project is not maintained anymore]
Stars: ✭ 322 (+123.61%)
ApkidAndroid Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
Stars: ✭ 999 (+593.75%)
Android unpackerA (hopefully) generic unpacker for packed Android apps.
Stars: ✭ 320 (+122.22%)
DemosDemos of various injection techniques found in malware
Stars: ✭ 582 (+304.17%)
FidlA sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
Stars: ✭ 319 (+121.53%)
Analyzer🔍 Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: ✭ 108 (-25%)
Mobile Security Framework MobsfMobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
Stars: ✭ 10,212 (+6991.67%)
UboatHTTP Botnet Project
Stars: ✭ 573 (+297.92%)
Awesome Cybersecurity Blueteam💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Stars: ✭ 2,091 (+1352.08%)
MalheurA Tool for Automatic Analysis of Malware Behavior
Stars: ✭ 313 (+117.36%)
Pentest ChainsawScrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product
Stars: ✭ 36 (-75%)
Ir RescueA Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+115.97%)
Badusb botnet👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-77.78%)
PolichombrCollaborative malware analysis framework
Stars: ✭ 307 (+113.19%)
Visualize logsA Python library and command line tools to provide interactive log visualization.
Stars: ✭ 128 (-11.11%)
MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+2320.14%)
Malware IocIndicators of Compromises (IOC) of our various investigations
Stars: ✭ 955 (+563.19%)
ThefatratThefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+4027.78%)
SubjackSubdomain Takeover tool written in Go
Stars: ✭ 1,194 (+729.17%)
DvwaDamn Vulnerable Web Application (DVWA)
Stars: ✭ 5,727 (+3877.08%)
Go DorkThe fastest dork scanner written in Go.
Stars: ✭ 274 (+90.28%)
Ghostshell Malware indetectable, with AV bypass techniques, anti-disassembly, etc.
Stars: ✭ 293 (+103.47%)
ArchivistA ctypes powered python keylogger.
Stars: ✭ 92 (-36.11%)
PenetPortable Executable (PE) library written in .Net
Stars: ✭ 288 (+100%)
BesafeBeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (-85.42%)
The Big List Of Hacked Malware Web SitesThis repository contains a list of all web sites I come across that are either hacked with or purposefully hosting malware, ransomware, viruses or trojans.
Stars: ✭ 125 (-13.19%)
Awesome Malware💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-25%)
Infosec BadgesBadges for your GitHub tool presented at InfoSec Conference
Stars: ✭ 74 (-48.61%)
IosMost usable tools for iOS penetration testing
Stars: ✭ 563 (+290.97%)
Adamantium Thief🔑 Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks, autofill. Version > 80 is supported.
Stars: ✭ 283 (+96.53%)
SnoopSnoop — инструмент разведки на основе открытых данных (OSINT world)
Stars: ✭ 886 (+515.28%)
DrltraceDrltrace is a library calls tracer for Windows and Linux applications.
Stars: ✭ 282 (+95.83%)
Awesome HackingAwesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+1151.39%)
Passphrase WordlistPassphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (+286.11%)
UrsadbTrigram database written in C++, suited for malware indexing
Stars: ✭ 72 (-50%)
NishangNishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: ✭ 5,943 (+4027.08%)
Gscript framework to rapidly implement custom droppers for all three major operating systems
Stars: ✭ 547 (+279.86%)
Information Security TasksThis repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (-25%)
PurifyAll-in-one tool for managing vulnerability reports from AppSec pipelines
Stars: ✭ 72 (-50%)
Lazy importerlibrary for importing functions from dlls in a hidden, reverse engineer unfriendly way
Stars: ✭ 544 (+277.78%)
Name That Hash🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 3000+ other hashes ☄ Comes with a neat web app 🔥
Stars: ✭ 540 (+275%)
Red Teaming ToolkitThis repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Stars: ✭ 5,615 (+3799.31%)