OneforallOneForAll是一款功能强大的子域收集工具
Stars: ✭ 4,202 (+3553.91%)
TheRoadOfSO学习安全运营的记录 | The knowledge base of security operation
Stars: ✭ 286 (+148.7%)
Azure SentinelCloud-native SIEM for intelligent security analytics for your entire enterprise.
Stars: ✭ 1,208 (+950.43%)
NmapguiAdvanced Graphical User Interface for NMap
Stars: ✭ 318 (+176.52%)
WhoEnumMass querying whois records
Stars: ✭ 24 (-79.13%)
SootyThe SOC Analysts all-in-one CLI tool to automate and speed up workflow.
Stars: ✭ 867 (+653.91%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-31.3%)
PulsarNetwork footprint scanner platform. Discover domains and run your custom checks periodically.
Stars: ✭ 314 (+173.04%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (-47.83%)
Ir RescueA Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+170.43%)
WalkoffA flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, tedious tasks slowing them down. #nsacyber
Stars: ✭ 855 (+643.48%)
HackvaultA container repository for my public web hacks!
Stars: ✭ 1,364 (+1086.09%)
ThecollectiveThe Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-26.09%)
BrokenlinkhijackerA Fast Broken Link Hijacker Tool written in Python
Stars: ✭ 45 (-60.87%)
Logkeys📝 ⌨️ A GNU/Linux keylogger that works!
Stars: ✭ 518 (+350.43%)
MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+2930.43%)
Awesome CybersecurityCurated list of awesome cybersecurity companies and solutions.
Stars: ✭ 77 (-33.04%)
mqttinfoAttempts to determine the configuration, behavior, and type of a remote MQTT broker
Stars: ✭ 17 (-85.22%)
tutorialsAdditional Resources For Securing The Stack Tutorials
Stars: ✭ 36 (-68.7%)
Adversary emulation libraryAn open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Stars: ✭ 295 (+156.52%)
hunter🐺 Command-line application and golang client library for hunter.io
Stars: ✭ 28 (-75.65%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+487.83%)
PywerviewA (partial) Python rewriting of PowerSploit's PowerView
Stars: ✭ 292 (+153.91%)
Probe spiderProbe_Spider is a Open Source Intelligence Tool made complete out of Python.
Stars: ✭ 20 (-82.61%)
ICUAn Extended, Modulair, Host Discovery Framework
Stars: ✭ 40 (-65.22%)
SubzySubdomain takeover vulnerability checker
Stars: ✭ 287 (+149.57%)
ADLESAutomated Deployment of Lab Environments System (ADLES)
Stars: ✭ 28 (-75.65%)
Ioc ExplorerExplore Indicators of Compromise Automatically
Stars: ✭ 73 (-36.52%)
OsmedeusFully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+2848.7%)
subdomainsEnumeratorA docker image which will enumerate, sort, unique and resolve the results of various subdomains enumeration tools.
Stars: ✭ 63 (-45.22%)
Riceteacatpandarepo with challenge material for riceteacatpanda (2020)
Stars: ✭ 18 (-84.35%)
XsscopeXSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.
Stars: ✭ 103 (-10.43%)
auroraMalware similarity platform with modularity in mind.
Stars: ✭ 70 (-39.13%)
Hack4Squad💀 A bash hacking and scanning framework.
Stars: ✭ 45 (-60.87%)
CloudscraperCloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.
Stars: ✭ 276 (+140%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-46.96%)
Attack NavigatorWeb app that provides basic navigation and annotation of ATT&CK matrices
Stars: ✭ 887 (+671.3%)
my-cybersecurity-notesThese are the notes i have been taking since i started learning about ethical hacking and cybersecurity
Stars: ✭ 13 (-88.7%)
ShufflednsshuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support.
Stars: ✭ 498 (+333.04%)
Malware-ZooHashes of infamous malware
Stars: ✭ 18 (-84.35%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-40%)
hackipyHacking, pen-testing, and cyber-security related tools built with Python.
Stars: ✭ 26 (-77.39%)
HaliveA fast http and https prober, to check which URLs are alive
Stars: ✭ 47 (-59.13%)
ReconpiReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.
Stars: ✭ 490 (+326.09%)
sherlock🔎 Find usernames across social networks
Stars: ✭ 52 (-54.78%)
CarCyber Analytics Repository
Stars: ✭ 490 (+326.09%)
cycat-serviceCyCAT.org API back-end server including crawlers
Stars: ✭ 25 (-78.26%)