CalderaAutomated Adversary Emulation Platform
Stars: ✭ 3,126 (+3412.36%)
Chain ReactorChain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.
Stars: ✭ 206 (+131.46%)
sicakSIde-Channel Analysis toolKit: embedded security evaluation tools
Stars: ✭ 17 (-80.9%)
PasshuntPasshunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
Stars: ✭ 961 (+979.78%)
apkutila useful utility for android app security testing
Stars: ✭ 52 (-41.57%)
CaringcaribouA friendly car security exploration tool for the CAN bus
Stars: ✭ 298 (+234.83%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-30.34%)
penetration testing🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.
Stars: ✭ 57 (-35.96%)
ElementalElemental - An ATT&CK Threat Library
Stars: ✭ 241 (+170.79%)
HabuHacking Toolkit
Stars: ✭ 635 (+613.48%)
Litmus testDetecting ATT&CK techniques & tactics for Linux
Stars: ✭ 190 (+113.48%)
Hackertarget🎯 HackerTarget ToolKit - Tools And Network Intelligence To Help Organizations With Attack Surface Discovery 🎯
Stars: ✭ 320 (+259.55%)
LafThis project intends to provide a series of tools to craft, parse, send, analyze and crack a set of LoRaWAN packets in order to audit or pentest the security of a LoraWAN infrastructure.
Stars: ✭ 119 (+33.71%)
NerveNERVE Continuous Vulnerability Scanner
Stars: ✭ 267 (+200%)
mobsf-ciAll that is required to run MobSF in the ci
Stars: ✭ 37 (-58.43%)
LauschgeraetGets in the way of your victim's traffic and out of yours
Stars: ✭ 25 (-71.91%)
Atc ReactA knowledge base of actionable Incident Response techniques
Stars: ✭ 226 (+153.93%)
LibdiffuzzCustom memory allocator that helps discover reads from uninitialized memory
Stars: ✭ 147 (+65.17%)
Invoke ApexA PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
Stars: ✭ 162 (+82.02%)
TaipanWeb application vulnerability scanner
Stars: ✭ 359 (+303.37%)
Attack Control Framework MappingsSecurity control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
Stars: ✭ 115 (+29.21%)
Gopoc用cel-go重现了长亭xray的poc检测功能的轮子
Stars: ✭ 124 (+39.33%)
InjuredandroidA vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
Stars: ✭ 317 (+256.18%)
Honggfuzz RsFuzz your Rust code with Google-developed Honggfuzz !
Stars: ✭ 222 (+149.44%)
SecurecodeboxsecureCodeBox (SCB) - continuous secure delivery out of the box
Stars: ✭ 279 (+213.48%)
Kunpengkunpeng是一个Golang编写的开源POC框架/库,以动态链接库的形式提供各种语言调用,通过此项目可快速开发漏洞检测类的系统。
Stars: ✭ 1,242 (+1295.51%)
opensnitchOpenSnitch is a GNU/Linux application firewall
Stars: ✭ 398 (+347.19%)
DeltaPROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK
Stars: ✭ 55 (-38.2%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-59.55%)
Oscp Cheat SheetThis is my OSCP cheat sheet made by combining a lot of different resources online with a little bit of tweaking. I used this cheat sheet during my exam (Fri, 13 Sep 2019) and during the labs. I can proudly say it helped me pass so I hope it can help you as well ! Good Luck and Try Harder
Stars: ✭ 216 (+142.7%)
WireBugWireBug is a toolset for Voice-over-IP penetration testing
Stars: ✭ 142 (+59.55%)
Aproxandroid proxy setting tool
Stars: ✭ 34 (-61.8%)
Links-QAСборная солянка полезных ссылок для QA/тестировщика. Ссылки будут постоянно пополняться.
Stars: ✭ 42 (-52.81%)
ipa-meditMemory modification tool for re-signed ipa supports iOS apps running on iPhone and Apple Silicon Mac without jailbreaking.
Stars: ✭ 141 (+58.43%)
safelog4jSafelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning or upgrading
Stars: ✭ 38 (-57.3%)
Apk Meditmemory search and patch tool on debuggable apk without root & ndk
Stars: ✭ 189 (+112.36%)
MalwlessTest Blue Team detections without running any attack.
Stars: ✭ 215 (+141.57%)
proteccLinux kernel module to fight against police terror
Stars: ✭ 25 (-71.91%)
Pcap AttackPCAP Samples for Different Post Exploitation Techniques
Stars: ✭ 175 (+96.63%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+471.91%)
Web MethodologyMethodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki
Stars: ✭ 142 (+59.55%)
security-stack-mappingsThis project empowers defenders with independent data on which native security controls of leading technology platforms are most useful in defending against the adversary TTPs they care about.
Stars: ✭ 305 (+242.7%)
WatchdogWatchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (+287.64%)
Misp MaltegoSet of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Stars: ✭ 112 (+25.84%)