Droid Hunter(deprecated) Android application vulnerability analysis and Android pentest tool
Stars: ✭ 256 (-75.53%)
TaikTool hack Dark FB tanpa lisensi
Stars: ✭ 21 (-97.99%)
DarthsidiousBuilding an Active Directory domain and hacking it
Stars: ✭ 479 (-54.21%)
censysPython code to query the Censys public scan database.
Stars: ✭ 133 (-87.28%)
HiddenWindows driver with usermode interface which can hide objects of file-system and registry, protect processes and etc
Stars: ✭ 768 (-26.58%)
roadmapPublic roadmap for npm
Stars: ✭ 215 (-79.45%)
HackerproAll in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog
Stars: ✭ 474 (-54.68%)
scanSCAN: Learning Abstract Hierarchical Compositional Visual Concepts
Stars: ✭ 54 (-94.84%)
available-versionsReturns a promise with new versions higher than given for a npm module
Stars: ✭ 18 (-98.28%)
KrakenP2P Docker registry capable of distributing TBs of data in seconds
Stars: ✭ 4,849 (+363.58%)
dashboardInteractive UI for analyzing Jina logs, designing Flows and viewing Hub images
Stars: ✭ 105 (-89.96%)
VhostscanA virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (-26.67%)
chartsThis repository is home to the original helm charts for products throughout the open data platform ecosystem.
Stars: ✭ 39 (-96.27%)
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (-54.68%)
BroxyAn HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (-12.81%)
VajraVajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (-74.28%)
nnrm🔧 New nrm (NPM registry manager). Use smaller dependencies.
Stars: ✭ 55 (-94.74%)
Search That Hash🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (-55.45%)
unit-converterConvert standard units from one to another with this easy to use, lightweight package
Stars: ✭ 104 (-90.06%)
Jsql InjectionjSQL Injection is a Java application for automatic SQL database injection.
Stars: ✭ 891 (-14.82%)
DvwaDamn Vulnerable Web Application (DVWA)
Stars: ✭ 5,727 (+447.51%)
OsintgramOsintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Stars: ✭ 312 (-70.17%)
barcode scan2[reborned barcode_scan] A flutter plugin for reading 2D barcodes and QR codes.
Stars: ✭ 43 (-95.89%)
PentestkitUseful tools and scripts during Penetration Testing engagements
Stars: ✭ 463 (-55.74%)
dockerXExamples of amazing Docker/Docker-Compose/Docker Swarm technologies
Stars: ✭ 17 (-98.37%)
PowerladonLadon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Stars: ✭ 39 (-96.27%)
singularityhub.github.ioContainer tools for scientific computing! Docs at https://singularityhub.github.io/singularityhub-docs
Stars: ✭ 68 (-93.5%)
insprInspr is an agnostic application mesh for simpler, faster, and securer development of distributed applications (dApps).
Stars: ✭ 49 (-95.32%)
Hacking Tools RepositoryA list of security/hacking tools that have been collected from the internet. Suggestions are welcomed.
Stars: ✭ 448 (-57.17%)
registryJoomla Framework Registry Package
Stars: ✭ 16 (-98.47%)
DcaDocker Certified Associate Exam Preparation Guide
Stars: ✭ 883 (-15.58%)
DesktopAppLinkCreates hyperlinks to call desktop applications from
Stars: ✭ 15 (-98.57%)
Dns Rebind ToolkitA front-end JavaScript toolkit for creating DNS rebinding attacks.
Stars: ✭ 435 (-58.41%)
existing-ldap-docker-registryThis is a docker application to run Docker Registry behind an Ngnix in order to obtain an authentication method using a company Active Directory.
Stars: ✭ 29 (-97.23%)
qucliManage repositories in Quay.io
Stars: ✭ 29 (-97.23%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (-59.18%)
imagoEnsure kubernetes pods run on latest images builds from the docker registry
Stars: ✭ 83 (-92.07%)
TaketvTakeTV permite descubrir dispositivos de red DLNA/UPnP y ayuda a reproducir archivos multimedia en los televisores inteligentes desde nuestra terminal en Linux.
Stars: ✭ 41 (-96.08%)
HulkHULK DoS tool ported to Go with some additional features.
Stars: ✭ 427 (-59.18%)
schema-registry📙 json & avro http schema registry backed by Kafka
Stars: ✭ 23 (-97.8%)
DistributionThe toolkit to pack, ship, store, and deliver container content
Stars: ✭ 6,445 (+516.16%)
metalnetesCreate and manage multiple Kubernetes clusters using KVM on a bare metal Fedora 29 server. Includes helm + rook-ceph + nginx ingress + the stock analysis engine (jupyter + redis cluster + minio + automated cron jobs for data collection) - works on Kubernetes version v1.16.0 - 1.16.3 was not working
Stars: ✭ 37 (-96.46%)
BrutesploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (-59.46%)
DNSSuffixA set of PowerShell tools for managing the computer's primary DNS suffix.
Stars: ✭ 19 (-98.18%)
Cve 2017 0199 FixQuick and dirty fix to OLE2 executing code via .hta
Stars: ✭ 14 (-98.66%)
Image SyncerDocker image synchronization tool for Docker Registry V2 based services
Stars: ✭ 313 (-70.08%)
FavfreakMaking Favicon.ico based Recon Great again !
Stars: ✭ 564 (-46.08%)
Ghost👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (-70.17%)
Github nuggestsforpython3.0Modification of Github_Nuggests based on @az0ne,Thanks! This script full support for Python3.0
Stars: ✭ 45 (-95.7%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (-3.54%)
ReconftwreconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (-6.88%)