Cvebase.comcvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (+363.16%)
Awesome Cybersecurity Blueteam💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Stars: ✭ 2,091 (+10905.26%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (+6005.26%)
netizenshipa commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (+73.68%)
targetsA collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (+347.37%)
Open-source-tools-for-CTIPublic Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (+378.95%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+368.42%)
BusterAn advanced tool for email reconnaissance
Stars: ✭ 387 (+1936.84%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (+263.16%)
Gitlab WatchmanMonitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (+568.42%)
Pyiris BackdoorPyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (+663.16%)
Computer Science ResourcesA list of resources in different fields of Computer Science (multiple languages)
Stars: ✭ 1,316 (+6826.32%)
RoutersploitExploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+51826.32%)
PatrowlmanagerPatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (+1810.53%)
Openvas ScannerOpen Vulnerability Assessment Scanner - Scanner for Greenbone Vulnerability Management (GVM)
Stars: ✭ 1,056 (+5457.89%)
ospdOSPd is a framework for vulnerability scanners which share the same communication protocol: OSP (Open Scanner Protocol)
Stars: ✭ 32 (+68.42%)
DetexploitOSS Vulnerability Scanner for Windows Platform
Stars: ✭ 146 (+668.42%)
GvmdGreenbone Vulnerability Manager
Stars: ✭ 140 (+636.84%)
SmershSmersh is a pentest oriented collaborative tool used to track the progress of your company's missions.
Stars: ✭ 43 (+126.32%)
Sbt Dependency CheckSBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). 🌈
Stars: ✭ 187 (+884.21%)
Python HoneypotOWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (+742.11%)
qvm-create-windows-qubeSpin up new Windows qubes quickly, effortlessly and securely on Qubes OS
Stars: ✭ 267 (+1305.26%)
CheckmyhttpsWe propose a user-friendly add-on that allows you to check if your encrypted web traffic (SSL/TLS) towards secured Internet servers (HTTPS) is not intercepted (being listened to).
Stars: ✭ 35 (+84.21%)
Chatterinternet monitoring osint telegram bot for windows
Stars: ✭ 123 (+547.37%)
Slack WatchmanMonitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (+736.84%)
DiodbOpen-source vulnerability disclosure and bug bounty program database.
Stars: ✭ 654 (+3342.11%)
conclaveQuery compiler for secure multi-party computation.
Stars: ✭ 86 (+352.63%)
Easy hackHack the World using Termux
Stars: ✭ 549 (+2789.47%)
HackersHackers is an elegant iOS app for reading Hacker News written in Swift.
Stars: ✭ 513 (+2600%)
SSI Extra MaterialsIn my computer security courses I make extensive usage of cheatsheets for various tools and extra materials to complement the student learning if they are willing to do so. I have decided to share them to enable others to take advantage of them
Stars: ✭ 42 (+121.05%)
ArchstrikeAn Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (+2010.53%)
vim-workshopMy thorough introduction to Vim
Stars: ✭ 30 (+57.89%)
hacktoberfestFork and Create a Pull Request
Stars: ✭ 13 (-31.58%)
cuc-wiki个人教学 Wiki
Stars: ✭ 83 (+336.84%)
wordlistsAggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.
Stars: ✭ 94 (+394.74%)
Intel-OneCommand line tool for passive reconnaissance, able to gather and link public information to a target domain, company or individual. It can make intelligence gathering faster and more effective by drastically reducing manual user interaction. This is achieved through the engineering of a highly customisable single input to multiple output solutio…
Stars: ✭ 23 (+21.05%)
Portfolio-TemplateA portfolio website template for Geeks,Programmers and hackers.
Stars: ✭ 159 (+736.84%)
zazu🚀 A fully extensible and open source launcher for hackers, creators and dabblers.
Stars: ✭ 2,078 (+10836.84%)
DevSecOpsUltimate DevSecOps library
Stars: ✭ 4,450 (+23321.05%)
redis-registryService registry and discovery for Node.js on top of Redis
Stars: ✭ 26 (+36.84%)
Netdisco🔎 Python library to scan local network for services and devices.
Stars: ✭ 240 (+1163.16%)
SonobuoySonobuoy is a diagnostic tool that makes it easier to understand the state of a Kubernetes cluster by running a set of Kubernetes conformance tests and other plugins in an accessible and non-destructive manner.
Stars: ✭ 2,442 (+12752.63%)
PLtools整理一些内网常用渗透小工具
Stars: ✭ 227 (+1094.74%)
FilebusterAn extremely fast and flexible web fuzzer
Stars: ✭ 176 (+826.32%)
CyberQueensCyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨💻
Stars: ✭ 30 (+57.89%)
Marathon ConsulIntegrates Marathon apps with Consul service discovery.
Stars: ✭ 174 (+815.79%)
evtx-hunterevtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.
Stars: ✭ 122 (+542.11%)
Stm32f4 uvc cameraSTM32F4-Discovery USB Device UVC Camera examples
Stars: ✭ 173 (+810.53%)
Resilient.jsFault tolerant and reactive HTTP client for node.js and browsers
Stars: ✭ 172 (+805.26%)
SegSwap(CVPRW 2022) Learning Co-segmentation by Segment Swapping for Retrieval and Discovery
Stars: ✭ 46 (+142.11%)
Zabbix HaproxyHAProxy Zabbix Discovery and Template
Stars: ✭ 169 (+789.47%)