Role core🔐A Rails engine providing essential industry of Role-based access control.
Stars: ✭ 262 (+129.82%)
Ngx PermissionsPermission and roles based access control for your angular(angular 2,4,5,6,7,9+) applications(AOT, lazy modules compatible
Stars: ✭ 749 (+557.02%)
tomcter😹 Tomcter is a python tool developed to bruteforce Apache Tomcat manager login with Apache Tomcat default credentials.
Stars: ✭ 18 (-84.21%)
RbiamA unified IAM+Kubernetes RBAC access control exploration tool
Stars: ✭ 59 (-48.25%)
offensive-docker-vpsCreate a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.
Stars: ✭ 66 (-42.11%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (+538.6%)
crawleetWeb Recon & Exploitation Tool.
Stars: ✭ 48 (-57.89%)
WinpwnAutomation for internal Windows Penetrationtest / AD-Security
Stars: ✭ 1,303 (+1042.98%)
ORtesterOpen Redirect scanner - (out of date)
Stars: ✭ 24 (-78.95%)
ServerscanServerScan一款使用Golang开发的高并发网络扫描、服务探测工具。
Stars: ✭ 674 (+491.23%)
Anviz.NET library to access and control Anviz devices.
Stars: ✭ 21 (-81.58%)
VulmapVulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+846.49%)
authcheckAnalysis for access-control vulnerabilities in Java Spring Security applications.
Stars: ✭ 14 (-87.72%)
Sig Security🔐CNCF Special Interest Group on Security -- secure access, policy control, privacy, auditing, explainability and more!
Stars: ✭ 662 (+480.7%)
laravel-surveillance-uiProvides a Graphical UI for Laravel Surveillance package and integrates within your existing application.
Stars: ✭ 20 (-82.46%)
Dnsubdnsub一款好用的子域名扫描工具
Stars: ✭ 106 (-7.02%)
LiteOTPMulti OTP Spam Amp/Paralell threads
Stars: ✭ 50 (-56.14%)
HabuHacking Toolkit
Stars: ✭ 635 (+457.02%)
react-abacAttribute Based Access Control for React
Stars: ✭ 54 (-52.63%)
Nmap Nse InfoBrowse and search through nmap's NSE scripts.
Stars: ✭ 54 (-52.63%)
Casbin4DAn authorization library that supports access control models like ACL, RBAC, ABAC in Delphi
Stars: ✭ 25 (-78.07%)
MsdatMSDAT: Microsoft SQL Database Attacking Tool
Stars: ✭ 621 (+444.74%)
rbac core(Moved to https://github.com/rails-engine/role_core) A Rails engine providing essential industry of Role-based access control
Stars: ✭ 15 (-86.84%)
Eyes.shLet's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?"
Stars: ✭ 89 (-21.93%)
yii2-dbDatabase extensions for Yii 2.0 Framework 📦
Stars: ✭ 19 (-83.33%)
Nest Access ControlRole and Attribute based Access Control for Nestjs 🔐
Stars: ✭ 562 (+392.98%)
uberscanSecurity program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.
Stars: ✭ 31 (-72.81%)
BlackmambaC2/post-exploitation framework
Stars: ✭ 544 (+377.19%)
behindflareThis tool was created as a Proof of Concept to reveal the threats related to web service misconfiguration using CloudFlare as reverse proxy and WAF
Stars: ✭ 14 (-87.72%)
Mitm Scripts🔄 A collection of mitmproxy inline scripts
Stars: ✭ 109 (-4.39%)
awesome-pentest-toolsList of Security Archives Tools and software, generally for facilitate security & penetration research. Opening it up to everyone will facilitate a knowledge transfer. Hopefully the initial set will grow and expand.
Stars: ✭ 34 (-70.18%)
Casbin.netAn authorization library that supports access control models like ACL, RBAC, ABAC in .NET (C#)
Stars: ✭ 535 (+369.3%)
speedle-plusSpeedle+ is an open source project for access management. It is based on Speedle open source project and maintained by previous Speedle maintainers.
Stars: ✭ 45 (-60.53%)
PrivesccheckPrivilege Escalation Enumeration Script for Windows
Stars: ✭ 1,032 (+805.26%)
casbin-exAn authorization library that supports access control models like ACL, RBAC, ABAC in Elixir
Stars: ✭ 37 (-67.54%)
FreeipaMirror of FreeIPA, an integrated security information management solution
Stars: ✭ 520 (+356.14%)
transportc2PoC Command and Control Server. Interact with clients through a private web interface, add new users for team sharing and more.
Stars: ✭ 22 (-80.7%)
ARL-NPoC集漏洞验证和任务运行的一个框架
Stars: ✭ 73 (-35.96%)
YasuoA ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (+353.51%)
DumbDumain Bruteforcer - a fast and flexible domain bruteforcer
Stars: ✭ 54 (-52.63%)
PowerladonLadon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Stars: ✭ 39 (-65.79%)
hermes-coreSecurity framework for building multi-user end-to-end encrypted data storage and sharing/processing with zero leakage risks from storage and transport infrastructure.
Stars: ✭ 72 (-36.84%)
Stowaway👻Stowaway -- Multi-hop Proxy Tool for pentesters
Stars: ✭ 500 (+338.6%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-66.67%)
ArlARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
Stars: ✭ 1,357 (+1090.35%)
privx-on-awsPrivX - Just-in-time Access Management
Stars: ✭ 18 (-84.21%)
Role AclRole based access control using actions, attributes and sync and async conditions
Stars: ✭ 502 (+340.35%)
1earnffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+3158.77%)
Authr🔑 a flexible and expressive approach to access-control
Stars: ✭ 33 (-71.05%)
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+315.79%)
Node CasbinAn authorization library that supports access control models like ACL, RBAC, ABAC in Node.js and Browser
Stars: ✭ 1,757 (+1441.23%)
Casbin CppAn authorization library that supports access control models like ACL, RBAC, ABAC in C/C++
Stars: ✭ 113 (-0.88%)
VaktAttribute-based access control (ABAC) SDK for Python
Stars: ✭ 92 (-19.3%)
FuxiPenetration Testing Platform
Stars: ✭ 1,103 (+867.54%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+570.18%)
SubscraperSubdomain enumeration through various techniques
Stars: ✭ 265 (+132.46%)