ReconnoteWeb Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
Stars: ✭ 322 (-24.59%)
shellsumA defense tool - detect web shells in local directories via md5sum
Stars: ✭ 30 (-92.97%)
sqlinjection-training-appA simple PHP application to learn SQL Injection detection and exploitation techniques.
Stars: ✭ 56 (-86.89%)
Upme PlusSmart Automation inside your browser for free. Start earning and double your followers
Stars: ✭ 318 (-25.53%)
Learning-Node.js-SecurityA Collection of articles, videos, blogs, talks and other materials on Node.js Security
Stars: ✭ 25 (-94.15%)
Marionette🧸 Swift library which provides a high-level API to control a WKWebView
Stars: ✭ 374 (-12.41%)
cyber-gymDeliberately vulnerable scripts for Web Security training
Stars: ✭ 19 (-95.55%)
Ios Project Env SetupSetup your iOS project environment with a Shellscript, Makefile or Rakefile
Stars: ✭ 320 (-25.06%)
ObsidianSailboatNmap and NSE command line wrapper in the style of Metasploit
Stars: ✭ 36 (-91.57%)
MoblyE2E test framework for tests with complex environment requirements.
Stars: ✭ 424 (-0.7%)
diwaA Deliberately Insecure Web Application
Stars: ✭ 32 (-92.51%)
ColossusSelf-hosted email marketing solution
Stars: ✭ 319 (-25.29%)
OffensivedlrToolbox containing research notes & PoC code for weaponizing .NET's DLR
Stars: ✭ 364 (-14.75%)
SolhintSolhint is an open source project created by https://protofire.io. Its goal is to provide a linting utility for Solidity code.
Stars: ✭ 363 (-14.99%)
Araraarara is a TeX automation tool based on rules and directives. It gives you a way to enhance your TeX experience. This is a mirror repository.
Stars: ✭ 305 (-28.57%)
burp-flowExtension providing view with filtering capabilities for both complete and incomplete requests from all burp tools.
Stars: ✭ 45 (-89.46%)
ContaineropsDevOps Orchestration Platform
Stars: ✭ 317 (-25.76%)
requests-ip-rotatorA Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.
Stars: ✭ 323 (-24.36%)
ConstoleScan for and exploit Consul agents
Stars: ✭ 37 (-91.33%)
AdaptReactJS for your infrastructure. Create and deploy full-stack apps to any infrastructure using the power of React.
Stars: ✭ 317 (-25.76%)
GurpBurp Commander written in Go
Stars: ✭ 56 (-86.89%)
Cwe checkercwe_checker finds vulnerable patterns in binary executables
Stars: ✭ 372 (-12.88%)
yandi-scannerNetwork Security Vulnerability Scanner
Stars: ✭ 110 (-74.24%)
PoshbotPowershell-based bot framework
Stars: ✭ 410 (-3.98%)
Mac Dev PlaybookMac setup and configuration via Ansible.
Stars: ✭ 4,202 (+884.07%)
VudashPowerful, Flexible, Open Source dashboards for anything
Stars: ✭ 363 (-14.99%)
MorphNixOS deployment tool
Stars: ✭ 303 (-29.04%)
Devops Python Tools80+ DevOps & Data CLI Tools - AWS, GCP, GCF Python Cloud Function, Log Anonymizer, Spark, Hadoop, HBase, Hive, Impala, Linux, Docker, Spark Data Converters & Validators (Avro/Parquet/JSON/CSV/INI/XML/YAML), Travis CI, AWS CloudFormation, Elasticsearch, Solr etc.
Stars: ✭ 406 (-4.92%)
humbleA humble, and fast, security-oriented HTTP headers analyzer
Stars: ✭ 17 (-96.02%)
Burp-AppSecFlowThe extension of Burp Suite for Conviso Platform aims to serve as an integration between them, making the life of an analyst easier, because he can now send vulnerabilities directly from Burp to the platform.
Stars: ✭ 36 (-91.57%)
AiodnsbrutePython 3.5+ DNS asynchronous brute force utility
Stars: ✭ 370 (-13.35%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (-80.33%)
HomepointEspressif ESP32 Based Smarthome screen for MQTT
Stars: ✭ 391 (-8.43%)
shaniaScan secrets from Continuous Integration Build Logs
Stars: ✭ 54 (-87.35%)
CtftoolsPersonal CTF Toolkit
Stars: ✭ 312 (-26.93%)
netscanA fast TCP port scanner
Stars: ✭ 63 (-85.25%)
HealthchecksA cron monitoring tool written in Python & Django
Stars: ✭ 4,297 (+906.32%)
pyFireEyePython API bindings for FireEye Products
Stars: ✭ 12 (-97.19%)
My LinksKnowledge seeks no man
Stars: ✭ 311 (-27.17%)
Docker InstallHow to install flow.ci from docker
Stars: ✭ 421 (-1.41%)
Pharos ClusterPharos - The Kubernetes Distribution
Stars: ✭ 302 (-29.27%)
jawfishTool for breaking into web applications.
Stars: ✭ 84 (-80.33%)
TaskA task runner / simpler Make alternative written in Go
Stars: ✭ 4,282 (+902.81%)
HygieiaCapitalOne DevOps Dashboard
Stars: ✭ 3,682 (+762.3%)
Gray hat csharp codeThis repository contains full code examples from the book Gray Hat C#
Stars: ✭ 301 (-29.51%)
TaskbarxCenter Windows taskbar icons with a variety of animations and options.
Stars: ✭ 6,137 (+1337.24%)
Comic DlComic-dl is a command line tool to download manga and comics from various comic and manga sites. Supported sites : readcomiconline.to, mangafox.me, comic naver and many more.
Stars: ✭ 365 (-14.52%)
MixewayHubMixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayHub project contain one click docker-compose file which configure and run images from docker hub.
Stars: ✭ 80 (-81.26%)
PoseidonPoseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a number of machine learning techniques. The machine learning algorithms classify and predict the type of device.
Stars: ✭ 310 (-27.4%)
JxJenkins X provides automated CI+CD for Kubernetes with Preview Environments on Pull Requests using Cloud Native pipelines from Tekton
Stars: ✭ 4,041 (+846.37%)
Kubernetes Workshop⚙️ A Gentle introduction to Kubernetes with more than just the basics. 🌟 Give it a star if you like it.
Stars: ✭ 3,122 (+631.15%)
Hint💡 A hinting engine for the web
Stars: ✭ 3,280 (+668.15%)
Ethereum ListsA repository for maintaining lists of things like malicious URLs, fake token addresses, and so forth. We love lists.
Stars: ✭ 300 (-29.74%)
Tads BoilerplateTerraform + Ansible + Docker Swarm boilerplate = DevOps on 🔥🔥🔥 | Infrastructure as Code
Stars: ✭ 424 (-0.7%)
BrutesploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (-0.7%)
ShmigDatabase migration tool written in BASH.
Stars: ✭ 408 (-4.45%)
Cerberus一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能
Stars: ✭ 389 (-8.9%)