vafVaf is a cross-platform very advanced and fast web fuzzer written in nim
Stars: ✭ 294 (-90.61%)
STEWSA Security Tool for Enumerating WebSockets
Stars: ✭ 154 (-95.08%)
rgpipelesspipe for ripgrep for common new filetypes using few dependencies
Stars: ✭ 21 (-99.33%)
AutoPentest-DRLAutoPentest-DRL: Automated Penetration Testing Using Deep Reinforcement Learning
Stars: ✭ 196 (-93.74%)
Black-ToolInstall the tools and start Attacking , black-tool v5.0 ! ⬛
Stars: ✭ 239 (-92.37%)
packer-kvmCreate VM templates with Packer for usage with Libvirt/KVM virtualization : CentOS 7, CentOS 8, CentOS 8 Stream, Alma Linux, Rocky Linux, Bionic (Ubuntu 1804), Focal (Ubuntu 2004), Debian 11 (stable), Kali Linux, Fedora 33 and Fedora 34.
Stars: ✭ 99 (-96.84%)
AndspoiltRun interactive android exploits in linux.
Stars: ✭ 101 (-96.78%)
Offensive-Security-CayuqueoScripts usados en mi formación de Offensive Security por medio de la suscripción Learn Unlimited
Stars: ✭ 14 (-99.55%)
Python-For-Ethical-HackingThis is a complete project series on implementing hacking tools available in Kali Linux into python.
Stars: ✭ 29 (-99.07%)
xecaPowerShell payload generator
Stars: ✭ 103 (-96.71%)
EventTranscriptParserPython based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)
Stars: ✭ 22 (-99.3%)
PackratLive system forensic collector
Stars: ✭ 16 (-99.49%)
knockConvert ACSM files to DRM-free EPUB files with one command on Linux
Stars: ✭ 263 (-91.6%)
lavaMicrosoft Azure Exploitation Framework
Stars: ✭ 46 (-98.53%)
Reverse-EngineeringA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+130.97%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (-97.32%)
Deep-InsideCommand line tool that allows you to explore IoT devices by using Shodan API.
Stars: ✭ 22 (-99.3%)
Red-Rabbit-V4The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate other peoples tools like the aircrack suite or the wifite framework, it rather has its own code and is raw source with over 270+ options. This framework might just be your everyday key to your workflow
Stars: ✭ 123 (-96.07%)
CCXDiggerThe CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
Stars: ✭ 45 (-98.56%)
TORhunterDesigned to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .onion
Stars: ✭ 47 (-98.5%)
URL-obfuscatorPython Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (-96.78%)
LibGenesisAn API workaround the library genesis platform to enable query search
Stars: ✭ 46 (-98.53%)
OpenVAS-DockerA Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-99.49%)
Terminhack👨💻 Impress your friends by pretending to be a real hacker
Stars: ✭ 73 (-97.67%)
Open PublisherUsing Jekyll to create outputs that can be used as Pandoc inputs. In short - input markdown, output mobi, epub, pdf, and print-ready pdf. With a focus on fiction.
Stars: ✭ 242 (-92.27%)
cyberopsCisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.
Stars: ✭ 18 (-99.43%)
KepubifyFast, standalone EPUB to KEPUB converter CLI app / library (and a few other utilities).
Stars: ✭ 225 (-92.82%)
AshokAshok is a OSINT Recon Tool , a.k.a 😍 Swiss Army knife .
Stars: ✭ 109 (-96.52%)
Awesome PiracyA curated list of awesome warez and piracy links
Stars: ✭ 13,911 (+344.16%)
metagoofilSearch Google and download specific file types
Stars: ✭ 174 (-94.44%)
Highlight UtilsMy tools for converting, importing, and processing Kindle, Instapaper, and Safari Books highlights
Stars: ✭ 143 (-95.43%)
Shirah ReaderRSVP speed reader, written in python.
Stars: ✭ 133 (-95.75%)
Vol3xpVolatility Explorer Suit
Stars: ✭ 31 (-99.01%)
CalibreThe official source code repository for the calibre ebook manager
Stars: ✭ 11,221 (+258.27%)
Jenkins Rce😈 Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!
Stars: ✭ 262 (-91.63%)
Libgen ScanScan a barcode; get a book! Easy-peasy.
Stars: ✭ 91 (-97.09%)
warfWARF is a Web Application Reconnaissance Framework that helps to gather information about the target.
Stars: ✭ 53 (-98.31%)
Fb2converterUnified converter of FB2 files into epub2, kepub, mobi and azw3 formats.
Stars: ✭ 83 (-97.35%)
Learning-Node.js-SecurityA Collection of articles, videos, blogs, talks and other materials on Node.js Security
Stars: ✭ 25 (-99.2%)
Webpub Manifest📜 A JSON based Web Publication Manifest format used at the core of the Readium project
Stars: ✭ 46 (-98.53%)
DFIR-O365RCPowerShell module for Office 365 and Azure log collection
Stars: ✭ 158 (-94.96%)
Save As EbookSave a web page/selection as an eBook (.epub format) - a Chrome/Firefox/Opera Web Extension
Stars: ✭ 959 (-69.38%)
vulnerabilitiesList of every possible vulnerabilities in computer security.
Stars: ✭ 14 (-99.55%)
CoogleA shot-for-shot remake of the Google Login Page.
Stars: ✭ 34 (-98.91%)
PayloadsPayload Arsenal for Pentration Tester and Bug Bounty Hunters
Stars: ✭ 421 (-86.56%)
ad-privileged-auditProvides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (-98.66%)
ir scriptsincident response scripts
Stars: ✭ 17 (-99.46%)
Imm2VirtualThis is a GUI (for Windows 64 bit) for a procedure to virtualize your EWF(E01), DD (raw), AFF disk image file without converting it, directly with VirtualBox, forensically proof.
Stars: ✭ 40 (-98.72%)
CripsIP Tools To quickly get information about IP Address's, Web Pages and DNS records.
Stars: ✭ 272 (-91.32%)
ingest-fileIngestors extract the contents of mixed unstructured documents into structured (followthemoney) data.
Stars: ✭ 40 (-98.72%)
QuineQuine Museum
Stars: ✭ 263 (-91.6%)