WordlistsInfosec Wordlists
Stars: ✭ 271 (-38.83%)
Damn-Vulnerable-BankDamn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android application security hacking skills.
Stars: ✭ 379 (-14.45%)
Fwanalyzera tool to analyze filesystem images for security
Stars: ✭ 382 (-13.77%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-91.42%)
FirestrThe Grass Computing Platform
Stars: ✭ 329 (-25.73%)
STEWSA Security Tool for Enumerating WebSockets
Stars: ✭ 154 (-65.24%)
BugbountyguideBug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.
Stars: ✭ 338 (-23.7%)
giggerGit folder digger, I'm sure it's worthwhile stuff.
Stars: ✭ 39 (-91.2%)
DDTTXDDTTX Tabletop Trainings
Stars: ✭ 22 (-95.03%)
reverse-sshStatically-linked ssh server with reverse shell functionality for CTFs and such
Stars: ✭ 548 (+23.7%)
Reconky-Automated Bash ScriptReconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (-62.3%)
TtpsTactics, Techniques, and Procedures
Stars: ✭ 335 (-24.38%)
Red-Team-EssentialsThis repo will contain some basic pentest/RT commands.
Stars: ✭ 22 (-95.03%)
MegplusAutomated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]
Stars: ✭ 268 (-39.5%)
SqlmapAutomatic SQL injection and database takeover tool
Stars: ✭ 21,907 (+4845.15%)
cerb-releaseFor over 20 years, teams of all sizes have used Cerb to manage their email workloads. Whether you're a solo founder replying to a few support messages per day, or a team with hundreds of members replying to thousands of messages per hour, you can serve your audience faster with Cerb's time-tested tools. Development at: https://github.com/jstande…
Stars: ✭ 37 (-91.65%)
SubscraperSubdomain enumeration through various techniques
Stars: ✭ 265 (-40.18%)
NatlasScaling Network Scanning. Changes prior to 1.0 may cause difficult to avoid backwards incompatibilities. You've been warned.
Stars: ✭ 333 (-24.83%)
PoweropsPowerShell Runspace Portable Post Exploitation Tool aimed at making Penetration Testing with PowerShell "easier"
Stars: ✭ 412 (-7%)
Open-source-tools-for-CTIPublic Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-79.46%)
Langhost👻 A LAN dropbox chatbot controllable via Telegram
Stars: ✭ 324 (-26.86%)
Smart-Contract-Security-AuditsCertified Smart Contract Audits (Ethereum, Hyperledger, xDAI, Huobi ECO Chain, Binance Smart Chain, Fantom, EOS, Tezos) by Chainsulting
Stars: ✭ 325 (-26.64%)
domhttpxdomhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time.
Stars: ✭ 59 (-86.68%)
SubcertSubcert is an subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.
Stars: ✭ 58 (-86.91%)
Salt ScannerLinux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration
Stars: ✭ 261 (-41.08%)
awesome-rails-securityA curated list of security resources for a Ruby on Rails application
Stars: ✭ 36 (-91.87%)
CitadelCollection of pentesting scripts
Stars: ✭ 333 (-24.83%)
BackToMeLittle tool made in python to create payloads for Linux, Windows and OSX with unique handler
Stars: ✭ 61 (-86.23%)
UptuxLinux privilege escalation checks (systemd, dbus, socket fun, etc)
Stars: ✭ 260 (-41.31%)
Pwdlyser-CLIPython-based CLI Password Analyser (Reporting Tool)
Stars: ✭ 29 (-93.45%)
Lyncsmashlocate and attack Lync/Skype for Business
Stars: ✭ 258 (-41.76%)
security-reviewsA community collection of security reviews of open source software components.
Stars: ✭ 67 (-84.88%)
BxssbXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.
Stars: ✭ 331 (-25.28%)
aa-policy-validatorValidate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation
Stars: ✭ 42 (-90.52%)
LumenA private Lumina server for IDA Pro
Stars: ✭ 257 (-41.99%)
ReconnoteWeb Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
Stars: ✭ 322 (-27.31%)
sub404A python tool to check subdomain takeover vulnerability
Stars: ✭ 205 (-53.72%)
juumla🦁 Juumla is a python tool created to identify Joomla version, scan for vulnerabilities and search for config or backup files.
Stars: ✭ 107 (-75.85%)
ElectriceyeContinuously monitor your AWS services for configurations that can lead to degradation of confidentiality, integrity or availability. All results will be sent to Security Hub for further aggregation and analysis.
Stars: ✭ 255 (-42.44%)
Offensive DockerOffensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-25.96%)
estimator-elixirElixir side-project: Collaboratively estimate Jira stories (for remote teams)
Stars: ✭ 44 (-90.07%)
docker-osmedeusDocker image for Osmedeus, a fully automated offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 78 (-82.39%)
JWTweakDetects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.
Stars: ✭ 85 (-80.81%)
code-gov-apiAPI powering the code.gov source code harvester
Stars: ✭ 50 (-88.71%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-86.23%)
FireelffireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (-1.81%)
Dref DNS Rebinding Exploitation Framework
Stars: ✭ 423 (-4.51%)