AutoenumAutomatic Service Enumeration Script
Stars: ✭ 134 (-18.29%)
DetexploitOSS Vulnerability Scanner for Windows Platform
Stars: ✭ 146 (-10.98%)
Node Rate Limiter FlexibleNode.js rate limit requests by key with atomic increments in single process or distributed environment.
Stars: ✭ 1,950 (+1089.02%)
AmdhAndroid Mobile Device Hardening
Stars: ✭ 95 (-42.07%)
FugaciousOSSSM (awesome). Open source short-term secure messaging
Stars: ✭ 100 (-39.02%)
Nimscan🚀 Fast Port Scanner 🚀
Stars: ✭ 134 (-18.29%)
RoutersploitExploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+5915.85%)
Instagram HackerThis is an advanced script for Instagram bruteforce attacks. WARNING THIS IS A REAL TOOL!
Stars: ✭ 156 (-4.88%)
PowershellarmouryA PowerShell armoury for penetration testers or other random security guys
Stars: ✭ 99 (-39.63%)
Red hawkAll in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers
Stars: ✭ 1,898 (+1057.32%)
IntelowlIntel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Stars: ✭ 2,114 (+1189.02%)
BrutesharkNetwork Analysis Tool
Stars: ✭ 1,335 (+714.02%)
Pocsuite3pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.
Stars: ✭ 2,213 (+1249.39%)
ErodirA fast web directory/file enumeration tool written in Rust
Stars: ✭ 94 (-42.68%)
GorshA Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
Stars: ✭ 97 (-40.85%)
Njsscannjsscan is a semantic aware SAST tool that can find insecure code patterns in your Node.js applications.
Stars: ✭ 128 (-21.95%)
Zeebsploitweb scanner - exploitation - information gathering
Stars: ✭ 159 (-3.05%)
DagonAdvanced Hash Manipulation
Stars: ✭ 155 (-5.49%)
Pwk Oscp Preparation RoadmapRoadmap for preparing for OSCP, anyone is free to use this, and also feedback and contributions are welcome
Stars: ✭ 142 (-13.41%)
PbscanFaster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.
Stars: ✭ 122 (-25.61%)
Password LeakA library to check for compromised passwords
Stars: ✭ 92 (-43.9%)
DictmakerA stand-alone web server app for rapidly building and publishing full fledged dictionary websites and APIs for any language.
Stars: ✭ 97 (-40.85%)
Awesome Mobile SecurityAn effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+1020.12%)
CloudsploitCloud Security Posture Management (CSPM)
Stars: ✭ 1,338 (+715.85%)
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 154 (-6.1%)
Github DorksFind leaked secrets via github search
Stars: ✭ 1,332 (+712.2%)
SwiftnessA note-taking macOS app for penetration-testers.
Stars: ✭ 124 (-24.39%)
BughunterTools for Bug Hunting
Stars: ✭ 95 (-42.07%)
GitmailsAn information gathering tool to collect git commit emails in version control host services
Stars: ✭ 142 (-13.41%)
AndroidlibraryAndroid library to reveal or obfuscate strings and assets at runtime
Stars: ✭ 162 (-1.22%)
InstabruteInstagram password bruteforcer
Stars: ✭ 91 (-44.51%)
Burp ExporterExporter is a Burp Suite extension to copy a request to the clipboard as multiple programming languages functions.
Stars: ✭ 122 (-25.61%)
FrostUnit testing framework for test driven security of AWS, GCP, Heroku and more.
Stars: ✭ 91 (-44.51%)
GohacktoolsHacker tools on Go (Golang)
Stars: ✭ 1,303 (+694.51%)
WebpocketExploit management framework
Stars: ✭ 142 (-13.41%)
CmseekCMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs
Stars: ✭ 1,296 (+690.24%)
Adidas Multi Session(Python) Program to simulate multiple sessions on adidas queue pages.
Stars: ✭ 90 (-45.12%)
Tidos FrameworkThe Offensive Manual Web Application Penetration Testing Framework.
Stars: ✭ 1,290 (+686.59%)
Powershell Red TeamCollection of PowerShell functions a Red Teamer may use to collect data from a machine
Stars: ✭ 155 (-5.49%)
BbrAn open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.
Stars: ✭ 142 (-13.41%)
Privacy RespectingCurated List of Privacy Respecting Services and Software
Stars: ✭ 1,663 (+914.02%)
Eyes.shLet's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?"
Stars: ✭ 89 (-45.73%)
Secure Ios App DevCollection of the most common vulnerabilities found in iOS applications
Stars: ✭ 1,288 (+685.37%)
Laravel EnumSimple, extensible and powerful enumeration implementation for Laravel.
Stars: ✭ 1,278 (+679.27%)
Btle SnifferPassively scan for Bluetooth Low Energy devices and attempt to fingerprint them
Stars: ✭ 87 (-46.95%)
Gcp AuditA tool for auditing security properties of GCP projects.
Stars: ✭ 140 (-14.63%)
NosqliNoSql Injection CLI tool, for finding vulnerable websites using MongoDB.
Stars: ✭ 120 (-26.83%)
PattonThe clever vulnerability dependency finder
Stars: ✭ 87 (-46.95%)
Faitagram(Doesn't work anymore)
Stars: ✭ 117 (-28.66%)
Rails Security Checklist🔑 Community-driven Rails Security Checklist (see our GitHub Issues for the newest checks that aren't yet in the README)
Stars: ✭ 1,265 (+671.34%)
HardentheworldHarden the world is a community driven project to develop hardening guidelines and checklists for common software and devices.
Stars: ✭ 158 (-3.66%)
NetpwnTool made to automate tasks of pentesting.
Stars: ✭ 152 (-7.32%)