docusAndroid application for scanning and managing documents.
Stars: ✭ 39 (-17.02%)
Ssl CheckerPython script that collects SSL/TLS information from hosts
Stars: ✭ 94 (+100%)
RecsechRecsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected, Subdomain takeovers, Reconnaissance On Github and much more you can see in Features in tools .
Stars: ✭ 173 (+268.09%)
Btle SnifferPassively scan for Bluetooth Low Energy devices and attempt to fingerprint them
Stars: ✭ 87 (+85.11%)
packagerLaravel Package Skeleton Generator - https://youtu.be/kQRQWzDEbGk
Stars: ✭ 20 (-57.45%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (+68.09%)
PerspecScriptable desktop app to correct the perspective of images
Stars: ✭ 523 (+1012.77%)
VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+18717.02%)
Uber Cli🚗Uber, at your fingertips
Stars: ✭ 1,142 (+2329.79%)
NETNOOBA simple program written in bash that contains basic Linux network tools, information gathering tools and scanning tools.
Stars: ✭ 105 (+123.4%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (+31.91%)
RockYou2021.txtRockYou2021.txt is a MASSIVE WORDLIST compiled of various other wordlists. RockYou2021.txt DOES NOT CONTAIN USER:PASS logins!
Stars: ✭ 288 (+512.77%)
OssaOpen-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (+1593.62%)
xmapXMap is a fast network scanner designed for performing Internet-wide IPv6 & IPv4 network research scanning.
Stars: ✭ 190 (+304.26%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (+1448.94%)
SqliscannerAutomatic SQL injection with Charles and sqlmap api
Stars: ✭ 674 (+1334.04%)
hikvision-recoverCommand-line tool for generating recovery codes for Hikvision IP Cameras
Stars: ✭ 40 (-14.89%)
HerpaderpingProcess Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+1206.38%)
diwaA Deliberately Insecure Web Application
Stars: ✭ 32 (-31.91%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+778.72%)
deskewDeskew is a command line tool for deskewing scanned text documents. It uses Hough transform to detect "text lines" in the image. As an output, you get an image rotated so that the lines are horizontal.
Stars: ✭ 127 (+170.21%)
ThreatmapperIdentify vulnerabilities in running containers, images, hosts and repositories
Stars: ✭ 361 (+668.09%)
OpenLibreNFCAn app to modify and read memory in the Libre blood glucose monitor.
Stars: ✭ 45 (-4.26%)
WatchdogWatchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (+634.04%)
weblogic honeypotWebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.
Stars: ✭ 30 (-36.17%)
Syzkallersyzkaller is an unsupervised coverage-guided kernel fuzzer
Stars: ✭ 3,841 (+8072.34%)
PentestingMisc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-48.94%)
Cheatsheet GodPenetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+7391.49%)
JS HTML WidgetsEasily create widget objects of arbitrary complexity
Stars: ✭ 16 (-65.96%)
SubzySubdomain takeover vulnerability checker
Stars: ✭ 287 (+510.64%)
Node Wifi📶 NodeJS tool to manage wifi (connections, scans)
Stars: ✭ 250 (+431.91%)
WiFiPSWiFi Based Indoor Positioning System, A MVP android Application
Stars: ✭ 105 (+123.4%)
Opencv📷 Computer-Vision Demos
Stars: ✭ 244 (+419.15%)
iSecureOSAn iOS Security assessment app for jailbroken iOS Devices.
Stars: ✭ 111 (+136.17%)
PhoniaPhonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any international phone numbers with a very good accuracy.
Stars: ✭ 221 (+370.21%)
scantailor-universalScanTailor Universal - a fork based on Enhanced+Featured+Master versions of ST
Stars: ✭ 135 (+187.23%)
PlatypusLarge-scale server monitoring application written in Golang
Stars: ✭ 190 (+304.26%)
OctopusOctopus - Network Scan/Infos & Web Scan
Stars: ✭ 25 (-46.81%)
AnteaterAnteater - CI/CD Gate Check Framework
Stars: ✭ 174 (+270.21%)
BughoundStatic code analysis tool based on Elasticsearch
Stars: ✭ 124 (+163.83%)
TangoThis repository is providing source codes of Tango projects I created.
Stars: ✭ 156 (+231.91%)
secureCodeBox-v2This Repository contains the stable beta preview of the next major secureCodeBox (SCB) release v2.0.0.
Stars: ✭ 23 (-51.06%)
Scap WorkbenchSCAP Scanner And Tailoring Graphical User Interface
Stars: ✭ 145 (+208.51%)
ggshieldFind and fix 360+ types of hardcoded secrets and 70+ types of infrastructure-as-code misconfigurations.
Stars: ✭ 1,272 (+2606.38%)
UnimapScan only once by IP address and reduce scan times with Nmap for large amounts of data.
Stars: ✭ 141 (+200%)
bWAPPbWAPP latest modified for PHP7
Stars: ✭ 30 (-36.17%)
ArcherysecCentralize Vulnerability Assessment and Management for DevSecOps Team
Stars: ✭ 1,802 (+3734.04%)
H1domainsHackerOne "in scope" domains
Stars: ✭ 223 (+374.47%)
ScrutorAssembly scanning and decoration extensions for Microsoft.Extensions.DependencyInjection
Stars: ✭ 1,915 (+3974.47%)
bentoBento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.
Stars: ✭ 74 (+57.45%)
Cod Exploits☠️ Call of Duty - Vulnerabilities and proof-of-concepts
Stars: ✭ 178 (+278.72%)
wifiexplorer-sensor[DEPRECATED] Enables remote scanning in WiFi Explorer Pro
Stars: ✭ 37 (-21.28%)
PowerexploitPost-Exploitation 😎 module for Penetration Tester and Hackers.
Stars: ✭ 26 (-44.68%)
coreAn advanced and highly optimized Java library to build frameworks: it's useful for scanning class paths, generating classes at runtime, facilitating the use of reflection, scanning the filesystem, executing stringified source code and much more...
Stars: ✭ 100 (+112.77%)
knxmapKNXnet/IP scanning and auditing tool for KNX home automation installations.
Stars: ✭ 97 (+106.38%)
WebpocketExploit management framework
Stars: ✭ 142 (+202.13%)