DnstwistDomain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Stars: ✭ 3,124 (+270.14%)
nestifDetect deeply nested if statements in Go source code
Stars: ✭ 30 (-96.45%)
GD-ThiefRed Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.
Stars: ✭ 28 (-96.68%)
ElliotA pentesting tool inspired by mr robot and derived by zphisher
Stars: ✭ 23 (-97.27%)
qradarUnofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.
Stars: ✭ 53 (-93.72%)
recommendations-for-engineersAll of my recommendations for aspiring engineers in a single place, coming from various areas of interest.
Stars: ✭ 81 (-90.4%)
LabtainersLabtainers: A Docker-based cyber lab framework
Stars: ✭ 226 (-73.22%)
ResourcesNo description or website provided.
Stars: ✭ 38 (-95.5%)
log4j-detectorLog4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!
Stars: ✭ 622 (-26.3%)
REW-sploitEmulate and Dissect MSF and *other* attacks
Stars: ✭ 115 (-86.37%)
AzureCLI-ExtractorA tool to extract and abuse access tokens from AzureCLI for bypassing 2FA/MFA.
Stars: ✭ 43 (-94.91%)
GnuradioGNU Radio – the Free and Open Software Radio Ecosystem
Stars: ✭ 3,297 (+290.64%)
bank mitigationsAnti keylogger, anti screen logger... Strategy to protect with hookings or improve your sandbox with spyware detection... - Demo
Stars: ✭ 17 (-97.99%)
SCANNER-INURLBRAdvanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.
Stars: ✭ 90 (-89.34%)
CalderaAutomated Adversary Emulation Platform
Stars: ✭ 3,126 (+270.38%)
AutottpAutomated Tactics Techniques & Procedures
Stars: ✭ 215 (-74.53%)
sherlock🔎 Find usernames across social networks
Stars: ✭ 52 (-93.84%)
HostintelA modular Python application to collect intelligence for malicious hosts.
Stars: ✭ 211 (-75%)
ApeXUsing Social Engineering To Obtain WiFi Passwords
Stars: ✭ 87 (-89.69%)
RichelieuList of the most common French passwords
Stars: ✭ 199 (-76.42%)
LockphishLockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.
Stars: ✭ 186 (-77.96%)
ligolo-ngAn advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (-50.47%)
CloudFrontierMonitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (-87.91%)
Whoishere.pyWIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.
Stars: ✭ 182 (-78.44%)
tutorialsAdditional Resources For Securing The Stack Tutorials
Stars: ✭ 36 (-95.73%)
adduser-dllSimple DLL that add a user to the local Administrators group
Stars: ✭ 48 (-94.31%)
Honeypots-on-BlockchainThis repo collects almost all the smart contract honeypots that you could find in the first three pages of Google search.
Stars: ✭ 95 (-88.74%)
attack to verisThe principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Stars: ✭ 56 (-93.36%)
OpenDKIMNo description or website provided.
Stars: ✭ 58 (-93.13%)
go-spyseThe official wrapper for spyse.com API, written in Go, aimed to help developers build their integrations with Spyse.
Stars: ✭ 25 (-97.04%)
conclaveQuery compiler for secure multi-party computation.
Stars: ✭ 86 (-89.81%)
MOSPA collaborative platform for creating, editing and sharing JSON objects.
Stars: ✭ 72 (-91.47%)
EventTranscriptParserPython based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)
Stars: ✭ 22 (-97.39%)
universalmutatorRegexp based tool for mutating generic source code across numerous languages
Stars: ✭ 105 (-87.56%)
SSI Extra MaterialsIn my computer security courses I make extensive usage of cheatsheets for various tools and extra materials to complement the student learning if they are willing to do so. I have decided to share them to enable others to take advantage of them
Stars: ✭ 42 (-95.02%)
SharpAn anti-ARP-spoofing application software that use active and passive scanning methods to detect and remove any ARP-spoofer from the network.
Stars: ✭ 150 (-82.23%)
Cyber-SecurityThis repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Stars: ✭ 42 (-95.02%)
nTimetoolsTimestomper and Timestamp checker with nanosecond accuracy for NTFS volumes
Stars: ✭ 25 (-97.04%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (-83.41%)
OpenctiAuthors
Stars: ✭ 2,165 (+156.52%)
Reverse-EngineeringA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+757.11%)
Personal Security Checklist🔒 A curated checklist of 300+ tips for protecting digital security and privacy in 2021
Stars: ✭ 2,388 (+182.94%)
KartonDistributed malware processing framework based on Python, Redis and MinIO.
Stars: ✭ 134 (-84.12%)
red-tldr-dbRed TL;DR Database is a set of text data that provides search for red-tldr. If you don’t know red-tldr yet, please read the documentation and try it out.
Stars: ✭ 33 (-96.09%)
Intel-OneCommand line tool for passive reconnaissance, able to gather and link public information to a target domain, company or individual. It can make intelligence gathering faster and more effective by drastically reducing manual user interaction. This is achieved through the engineering of a highly customisable single input to multiple output solutio…
Stars: ✭ 23 (-97.27%)
phomberPhomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (-93.01%)
firecrackerStop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (-48.1%)
Dark-PhishDark-Phish is a complete phishing tool. For more about Dark-Phish tool please visit the website.
Stars: ✭ 57 (-93.25%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (-89.45%)
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 424 (-49.76%)