BurpsuitehttpsmugglerA Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques
Stars: ✭ 529 (+569.62%)
sub404A python tool to check subdomain takeover vulnerability
Stars: ✭ 205 (+159.49%)
Lockdoor Framework🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+756.96%)
Langhost👻 A LAN dropbox chatbot controllable via Telegram
Stars: ✭ 324 (+310.13%)
JWTweakDetects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.
Stars: ✭ 85 (+7.59%)
YasuoA ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (+554.43%)
Idutf8libIdiot's UTF-8 Library
Stars: ✭ 12 (-84.81%)
IkigaJSONA high performance JSON library in Swift
Stars: ✭ 316 (+300%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+544.3%)
Burp-Suite|| Activate Burp Suite Pro with Loader and Key-Generator ||
Stars: ✭ 94 (+18.99%)
PowerProxyPowerShell SOCKS proxy with reverse proxy capabilities
Stars: ✭ 29 (-63.29%)
Linkedin2usernameOSINT Tool: Generate username lists for companies on LinkedIn
Stars: ✭ 504 (+537.97%)
ElliotA pentesting tool inspired by mr robot and derived by zphisher
Stars: ✭ 23 (-70.89%)
SudomySudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 859 (+987.34%)
rocksmithconvertSimple standalone OSX app to convert Rocksmith 2014 .psarc (CDLC) files between PC and MAC.
Stars: ✭ 45 (-43.04%)
Stowaway👻Stowaway -- Multi-hop Proxy Tool for pentesters
Stars: ✭ 500 (+532.91%)
auth analyzerBurp Extension for testing authorization issues. Automated request repeating and parameter value extraction on the fly.
Stars: ✭ 77 (-2.53%)
SpellbookMicro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-32.91%)
schifraC++ Reed Solomon Error Correcting Library https://www.schifra.com
Stars: ✭ 28 (-64.56%)
MxtractmXtract - Memory Extractor & Analyzer
Stars: ✭ 499 (+531.65%)
schemawax🧬 Tiny typed data decoder—get to the DNA of your data
Stars: ✭ 45 (-43.04%)
WiFi-ProjectPre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (-72.15%)
Dictionary Of PentestingDictionary collection project such as Pentesing, Fuzzing, Bruteforce and BugBounty. 渗透测试、SRC漏洞挖掘、爆破、Fuzzing等字典收集项目。
Stars: ✭ 492 (+522.78%)
morse-proLibrary for manipulating Morse code text and sound. Understands prosigns and Farnsworth speed. Can create WAV files and analyse input from the microphone or audio files.
Stars: ✭ 85 (+7.59%)
ReconcatA small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any year or complete list of all years possible. Made Specially for penetration testing purpose.
Stars: ✭ 66 (-16.46%)
CVE-2020-0688-ScannerQuick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.
Stars: ✭ 38 (-51.9%)
Iprotate burp extensionExtension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.
Stars: ✭ 484 (+512.66%)
CommoncrawlparserSimple multi threaded tool to extract domain related data from commoncrawl.org
Stars: ✭ 25 (-68.35%)
Deep-InsideCommand line tool that allows you to explore IoT devices by using Shodan API.
Stars: ✭ 22 (-72.15%)
Juice ShopOWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+7836.71%)
quick-recon.pyDo some quick reconnaissance on a domain-based web-application
Stars: ✭ 13 (-83.54%)
Pentest⛔️ offsec batteries included
Stars: ✭ 1,063 (+1245.57%)
PyQt-Sqlite-Project-CURDPyqt SQLite Project Have Features like Login, Add, Delete, Search, Update, Show the Students. In this, I show all the CURD operations of the Program. All Project is well represented and with interactive Toolbar & Menu bar. The database is included in the repository.
Stars: ✭ 41 (-48.1%)
Gr SatellitesGNU Radio decoders for several Amateur satellites
Stars: ✭ 472 (+497.47%)
vulnerabilitiesList of every possible vulnerabilities in computer security.
Stars: ✭ 14 (-82.28%)
Pyqt5Códigos sobre PyQt5
Stars: ✭ 23 (-70.89%)
SecurityExplainedSecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to create informational content in multiple formats and share with the community to enable knowledge creation and learning.
Stars: ✭ 301 (+281.01%)
AlfalfaPurely functional video codec, used for ExCamera and Salsify
Stars: ✭ 1,164 (+1373.42%)
admbrowserA Web browser for kiosks and digital signage, based on Python, PyQt, and Blink
Stars: ✭ 25 (-68.35%)
Sn1perAttack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+6098.73%)
QtExamplesTranslations of the official Qt examples into PyQt5 (also PySide2) and more.
Stars: ✭ 39 (-50.63%)
DwarfFull featured multi arch/os debugger built on top of PyQt5 and frida
Stars: ✭ 916 (+1059.49%)
BrutusBotnet targeting Windows machines written entirely in Python & open source security project.
Stars: ✭ 37 (-53.16%)
PentestkitUseful tools and scripts during Penetration Testing engagements
Stars: ✭ 463 (+486.08%)
SimpleKeyloggerSimple Keylogger with smtp to send emails on your account using python works on linux and Windows
Stars: ✭ 32 (-59.49%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+11268.35%)
ReconnoteWeb Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
Stars: ✭ 322 (+307.59%)
GorsairGorsair hacks its way into remote docker containers that expose their APIs
Stars: ✭ 678 (+758.23%)
PasetoPlatform-Agnostic Security Tokens implementation in GO (Golang)
Stars: ✭ 461 (+483.54%)
Ldap searchPython3 script to perform LDAP queries and enumerate users, groups, and computers from Windows Domains. Ldap_Search can also perform brute force/password spraying to identify valid accounts via LDAP.
Stars: ✭ 78 (-1.27%)
RsfThe Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
Stars: ✭ 76 (-3.8%)