RecsechRecsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected, Subdomain takeovers, Reconnaissance On Github and much more you can see in Features in tools .
Stars: ✭ 173 (+321.95%)
Btle SnifferPassively scan for Bluetooth Low Energy devices and attempt to fingerprint them
Stars: ✭ 87 (+112.2%)
hikvision-recoverCommand-line tool for generating recovery codes for Hikvision IP Cameras
Stars: ✭ 40 (-2.44%)
H1domainsHackerOne "in scope" domains
Stars: ✭ 223 (+443.9%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (+51.22%)
exploitsSome of my public exploits
Stars: ✭ 50 (+21.95%)
resilient-python-apiPython Library for the IBM SOAR REST API, a Python SDK for developing Apps for IBM SOAR and more...
Stars: ✭ 29 (-29.27%)
VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+21470.73%)
cb-spiderCB-Spider provides a unified view and single interface for multi-cloud management.
Stars: ✭ 26 (-36.59%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (+1675.61%)
ascii-artASCII art images for Neofetch (and beyond)
Stars: ✭ 27 (-34.15%)
Cod Exploits☠️ Call of Duty - Vulnerabilities and proof-of-concepts
Stars: ✭ 178 (+334.15%)
openshift101OpenShift 101 on IBM Cloud tutorial: https://ibm.github.io/openshift101/
Stars: ✭ 27 (-34.15%)
hyperionThe SoftDevLabs (SDL) version of the Hercules 4.x Hyperion System/370, ESA/390, and z/Architecture Emulator
Stars: ✭ 149 (+263.41%)
Ssl CheckerPython script that collects SSL/TLS information from hosts
Stars: ✭ 94 (+129.27%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (+92.68%)
ILEditorIBM i development environment (IDE)
Stars: ✭ 83 (+102.44%)
Uber Cli🚗Uber, at your fingertips
Stars: ✭ 1,142 (+2685.37%)
NetworkAlarmA tool to monitor local network traffic for possible security vulnerabilities. Warns user against possible nmap scans, Nikto scans, credentials sent in-the-clear, and shellshock attacks. Currently supports live monitoring and network capture (pcap) scanning.
Stars: ✭ 17 (-58.54%)
OssaOpen-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (+1841.46%)
vilicusVilicus is an open source tool that orchestrates security scans of container images(docker/oci) and centralizes all results into a database for further analysis and metrics.
Stars: ✭ 82 (+100%)
akka-react-cloudantA Soccer Dashboard created by scraping EPL website using Akka backend and ReactJS frontend and IBM Cloudant for object storage. IBM Cloud Foundry is used to host both frontend and backend app.
Stars: ✭ 21 (-48.78%)
Spectre AttackExample of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
Stars: ✭ 690 (+1582.93%)
icp-ce-on-linux-containersMulti node IBM Cloud Private Community Edition 3.2.x w/ Kubernetes 1.13.5 in a Box. Terraform, Packer and BASH based Infrastructure as Code script sets up a multi node LXD cluster, installs ICP-CE and clis on a metal or VM Ubuntu 18.04 host.
Stars: ✭ 52 (+26.83%)
Insecureprogrammingmirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/
Stars: ✭ 229 (+458.54%)
mq-java-exporterExporter for IBM MQ metrics https://prometheus.io/
Stars: ✭ 19 (-53.66%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+343.9%)
coaxTools for connecting to real IBM 3270 type terminals
Stars: ✭ 29 (-29.27%)
Securityadvisories🔐 Security advisories as a simple composer exclusion list, updated daily
Stars: ✭ 2,279 (+5458.54%)
terraform-module-icp-deployThis Terraform module can be used to deploy IBM Cloud Private on any supported infrastructure vendor. Tested on Ubuntu 16.04 and RHEL 7 on SoftLayer, VMware, AWS and Azure.
Stars: ✭ 13 (-68.29%)
WebpocketExploit management framework
Stars: ✭ 142 (+246.34%)
Model-M-Type-CA modern yet simple Model M replacement controller
Stars: ✭ 67 (+63.41%)
oecIBM 3270 terminal controller - a replacement for the IBM 3174
Stars: ✭ 29 (-29.27%)
Crlf Injection ScannerCommand line tool for testing CRLF injection on a list of domains.
Stars: ✭ 91 (+121.95%)
Kunpengkunpeng是一个Golang编写的开源POC框架/库,以动态链接库的形式提供各种语言调用,通过此项目可快速开发漏洞检测类的系统。
Stars: ✭ 1,242 (+2929.27%)
predict-wildfire-intensityWARNING: This repository is no longer maintained ⚠️ This repository will not be updated.
Stars: ✭ 32 (-21.95%)
MeltdownLocal Exploit for Meltdown
Stars: ✭ 74 (+80.49%)
punch-q👊 A small utility to play with IBM MQ
Stars: ✭ 49 (+19.51%)
LynisLynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+22185.37%)
weblogic honeypotWebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.
Stars: ✭ 30 (-26.83%)
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (+53.66%)
moodlescanTool for scan vulnerabilities in Moodle platforms
Stars: ✭ 54 (+31.71%)
SafetySafety checks your installed dependencies for known security vulnerabilities
Stars: ✭ 982 (+2295.12%)
VulnogramVulnogram is a tool for creating and editing CVE information in CVE JSON format
Stars: ✭ 103 (+151.22%)
BrakemanA static analysis security vulnerability scanner for Ruby on Rails applications
Stars: ✭ 6,281 (+15219.51%)
BughoundStatic code analysis tool based on Elasticsearch
Stars: ✭ 124 (+202.44%)
nlc-email-phishingDetect email phishing with Watson Natural Language Classifier
Stars: ✭ 26 (-36.59%)
Quantum-Computing-ResourcesThis repository contains the best resources for learning practical quantum computing. This repository will be updated frequently.
Stars: ✭ 60 (+46.34%)
bWAPPbWAPP latest modified for PHP7
Stars: ✭ 30 (-26.83%)
Puma6FailCVE-2017-5693 Denial of service vulnerability in Puma 6 modems
Stars: ✭ 17 (-58.54%)
openshift-install-powerUPI Install helper to deploy OpenShift 4 on IBM Power Systems Virtual Server using Terraform IaC
Stars: ✭ 16 (-60.98%)