TcpdogeBPF based TCP observability.
Stars: ✭ 119 (-50%)
EliotEliot: the logging system that tells you *why* it happened
Stars: ✭ 874 (+267.23%)
Bundler AuditPatch-level verification for Bundler
Stars: ✭ 2,393 (+905.46%)
Golang TlsSimple Golang HTTPS/TLS Examples
Stars: ✭ 857 (+260.08%)
Dd Trace RbDatadog Tracing Ruby Client
Stars: ✭ 118 (-50.42%)
Python ProgrammingPython Coding - Data Structure, Algorithm, Crypto, Web, Network, System
Stars: ✭ 9 (-96.22%)
BraveJava distributed tracing implementation compatible with Zipkin backend services.
Stars: ✭ 2,117 (+789.5%)
Dotenv sekretsSeamlessly encrypt/decrypt/edit your rails Dotenv files with the help of the Sekrets gem
Stars: ✭ 25 (-89.5%)
SojoboA binary analysis framework
Stars: ✭ 116 (-51.26%)
CspThe Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing confidence and trust among the national Computer Security Incident Response Teams (CSIRTs) of the Member States and for promoting swift and effective operational cooperation.
Stars: ✭ 23 (-90.34%)
Android Pin BruteforceUnlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for Android devices! (no root, no adb)
Stars: ✭ 217 (-8.82%)
Microservices ObservabilityThis project is a demonstration on how to instrument, monitor and trace applications using java frameworks and open-source tools like prometheus, grafana and jaeger.
Stars: ✭ 23 (-90.34%)
Scilla🏴☠️ Information Gathering tool 🏴☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-51.26%)
Rfw RsFramework for playing around with rendering libraries in Rust
Stars: ✭ 23 (-90.34%)
Rastrea2rCollecting & Hunting for IOCs with gusto and style
Stars: ✭ 169 (-28.99%)
Awesome HackingAwesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+657.14%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+276.89%)
Lttng ToolsThe lttng-tools project provides a session daemon (lttng-sessiond) that acts as a tracing registry, the "lttng" command line for tracing control, a lttng-ctl library for tracing control and a lttng-relayd for network streaming.
Stars: ✭ 202 (-15.13%)
DockleContainer Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start
Stars: ✭ 1,713 (+619.75%)
Deprecated Patrol Rules AwsA set of functions implemented using lambda-cfn to monitor an organization's AWS infrastructure for best practices, security and compliance.
Stars: ✭ 16 (-93.28%)
MsquicCross-platform, C implementation of the IETF QUIC protocol.
Stars: ✭ 2,501 (+950.84%)
BulwarkAn organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
Stars: ✭ 113 (-52.52%)
VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+3615.97%)
TorbotDark Web OSINT Tool
Stars: ✭ 821 (+244.96%)
Honggfuzz RsFuzz your Rust code with Google-developed Honggfuzz !
Stars: ✭ 222 (-6.72%)
ThugPython low-interaction honeyclient
Stars: ✭ 818 (+243.7%)
Outisoutis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) and platforms (like Powershell).
Stars: ✭ 111 (-53.36%)
SprayingtoolkitScripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
Stars: ✭ 802 (+236.97%)
Django GuidInject an ID into every log message from a Django request. ASGI compatible, integrates with Sentry, and works with Celery
Stars: ✭ 166 (-30.25%)
TraceeLinux Runtime Security and Forensics using eBPF
Stars: ✭ 788 (+231.09%)
Docbleach🚿 Sanitising your documents, one threat at a time. — Content Disarm & Reconstruction Software
Stars: ✭ 110 (-53.78%)
EsdEnumeration sub domains(枚举子域名)
Stars: ✭ 785 (+229.83%)
FdsploitFile Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (-16.39%)
ZsocketZero-copy sockets for Linux in Golang
Stars: ✭ 776 (+226.05%)
Fisy FuzzThis is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.
Stars: ✭ 110 (-53.78%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+221.01%)
AndroidlibraryAndroid library to reveal or obfuscate strings and assets at runtime
Stars: ✭ 162 (-31.93%)
InterlaceEasily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+219.33%)
DekstereconWeb Application recon automation
Stars: ✭ 109 (-54.2%)
Grauditgrep rough audit - source code auditing tool
Stars: ✭ 747 (+213.87%)
ZipkinZipkin is a distributed tracing system
Stars: ✭ 14,969 (+6189.5%)
Bypass Firewalls By Dns HistoryFirewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.
Stars: ✭ 739 (+210.5%)
CatnipCat-Nip Automated Basic Pentest Tool - Designed For Kali Linux
Stars: ✭ 108 (-54.62%)
BluespawnAn Active Defense and EDR software to empower Blue Teams
Stars: ✭ 737 (+209.66%)
Web ShellsSome of the best web shells that you might need!
Stars: ✭ 162 (-31.93%)
BrakemanA static analysis security vulnerability scanner for Ruby on Rails applications
Stars: ✭ 6,281 (+2539.08%)
ArchivefuzzHunt down the secrets from the WebArchives for Fun and Profit
Stars: ✭ 108 (-54.62%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (+205.88%)
ReplicaGhidra Analysis Enhancer 🐉
Stars: ✭ 194 (-18.49%)
Awesome Shodan Queries🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
Stars: ✭ 2,758 (+1058.82%)
NosqlmapAutomated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+710.08%)
LynisLynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+3739.08%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+377.31%)
O365sprayUsername enumeration and password spraying tool aimed at Microsoft O365.
Stars: ✭ 133 (-44.12%)
Blackhat Python3Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 1,125 (+372.69%)
Backfuzzprotocol fuzzing toolkit
Stars: ✭ 106 (-55.46%)
Grapefruit(WIP) Runtime Application Instruments for iOS. Previously Passionfruit
Stars: ✭ 235 (-1.26%)