ThreatingestorExtract and aggregate threat intelligence.
Stars: ✭ 439 (+501.37%)
QuackQuack Toolkit is a set of tools to provide denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools.
Stars: ✭ 305 (+317.81%)
yafingeryet another web fingerprinter
Stars: ✭ 16 (-78.08%)
Dns Rebind ToolkitA front-end JavaScript toolkit for creating DNS rebinding attacks.
Stars: ✭ 435 (+495.89%)
Twint SearchExplore tweets gathered with Twint with faceted search
Stars: ✭ 42 (-42.47%)
GitgrabergitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...
Stars: ✭ 1,164 (+1494.52%)
Dfw1n OsintAustralian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Stars: ✭ 63 (-13.7%)
Openvas ScannerOpen Vulnerability Assessment Scanner - Scanner for Greenbone Vulnerability Management (GVM)
Stars: ✭ 1,056 (+1346.58%)
KnowledgegraphThis repository for Web Crawling, Information Extraction, and Knowledge Graph build up.
Stars: ✭ 28 (-61.64%)
RouterosRouterOS Security Research Tooling and Proof of Concepts
Stars: ✭ 603 (+726.03%)
AtscanAdvanced dork Search & Mass Exploit Scanner
Stars: ✭ 817 (+1019.18%)
ScanShineScanShine - quickly take shining scans of your documents by using only your android phone. This scanner app takes pictures of docs, trims, enhances, and let you share them to your friends. Everything packed in an optimistic sunshine theme.
Stars: ✭ 19 (-73.97%)
Sane Scan PdfSane command-line scan-to-pdf script on Linux with OCR and deskew support
Stars: ✭ 58 (-20.55%)
arcreactoropen-source intelligence gathering for SIEMs <3
Stars: ✭ 36 (-50.68%)
Osint collectionMaintained collection of OSINT related resources. (All Free & Actionable)
Stars: ✭ 809 (+1008.22%)
HulkHULK DoS tool ported to Go with some additional features.
Stars: ✭ 427 (+484.93%)
PassiveScannera passive scanner based on Mitmproxy and Arachni
Stars: ✭ 108 (+47.95%)
TaketvTakeTV permite descubrir dispositivos de red DLNA/UPnP y ayuda a reproducir archivos multimedia en los televisores inteligentes desde nuestra terminal en Linux.
Stars: ✭ 41 (-43.84%)
ObsidianSailboatNmap and NSE command line wrapper in the style of Metasploit
Stars: ✭ 36 (-50.68%)
LambdaguardAWS Serverless Security
Stars: ✭ 300 (+310.96%)
Python IocextractDefanged Indicator of Compromise (IOC) Extractor.
Stars: ✭ 300 (+310.96%)
jfreesaneJava API to talk to the SANE scanning daemon
Stars: ✭ 46 (-36.99%)
BrutesploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (+480.82%)
CatchmeCatchME - WiFi Fun Box "Having Fun with ESP8266"
Stars: ✭ 28 (-61.64%)
CharlatanoProves JVM cheats are viable on native games, and demonstrates the longevity against anti-cheat signature detection systems
Stars: ✭ 599 (+720.55%)
Gta ReversedReversed code of GTA:SA executable (gta_sa.exe) 1.0 US
Stars: ✭ 297 (+306.85%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-1.37%)
coreAn advanced and highly optimized Java library to build frameworks: it's useful for scanning class paths, generating classes at runtime, facilitating the use of reflection, scanning the filesystem, executing stringified source code and much more...
Stars: ✭ 100 (+36.99%)
WpsekuWPSeku - Wordpress Security Scanner
Stars: ✭ 791 (+983.56%)
EhtoolsWi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: ✭ 422 (+478.08%)
docusAndroid application for scanning and managing documents.
Stars: ✭ 39 (-46.58%)
MaltegoMaltego compilation of various assets, local transforms and helpful scripts
Stars: ✭ 80 (+9.59%)
Cloud enumMulti-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.
Stars: ✭ 420 (+475.34%)
OpenscanOpenScan is an open-source app that enables users to scan hard copies of documents or notes and convert it into a PDF file. No ads. No data collection. We respect your privacy.
Stars: ✭ 785 (+975.34%)
simple NERsimple rule based named entity recognition
Stars: ✭ 29 (-60.27%)
PassportscannerScan the MRZ code of a passport and extract the firstname, lastname, passport number, nationality, date of birth, expiration date and personal numer.
Stars: ✭ 417 (+471.23%)
hacking-resourcesHacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
Stars: ✭ 1,386 (+1798.63%)
VulmapVulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+1378.08%)
Portspider🕷 A lightning fast multithreaded network scanner framework with modules.
Stars: ✭ 300 (+310.96%)
asnapasnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the user to automate initial port and service scanning.
Stars: ✭ 28 (-61.64%)
ParamspiderMining parameters from dark corners of Web Archives
Stars: ✭ 781 (+969.86%)
ZipA portable, simple zip library written in C
Stars: ✭ 596 (+716.44%)
SonarsearchA MongoDB importer and API for Project Sonars DNS datasets
Stars: ✭ 297 (+306.85%)
AnyformatkitSimple text formatting in Swift
Stars: ✭ 296 (+305.48%)
TaikTool hack Dark FB tanpa lisensi
Stars: ✭ 21 (-71.23%)
Ios Debug Hacks🎯 Advanced debugging skills used in the iOS project development process, involves the dynamic debugging, static analysis and decompile of third-party libraries. iOS 项目开发过程中用到的高级调试技巧,涉及三方库动态调试、静态分析和反编译等领域
Stars: ✭ 595 (+715.07%)
BadmodCMS auto detect and exploit.
Stars: ✭ 296 (+305.48%)
Windows Post ExploitationWindows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (+305.48%)
SilverMass scan IPs for vulnerable services
Stars: ✭ 588 (+705.48%)
RmiscoutRMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities
Stars: ✭ 296 (+305.48%)