graphw00fgraphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology is behind a given GraphQL endpoint.
Stars: ✭ 260 (+46.89%)
XposedOrNotXposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of such compromised passwords is detrimental to individual account security.
Stars: ✭ 120 (-32.2%)
PassHUDA HUD-style interface for pass on macOS
Stars: ✭ 31 (-82.49%)
default-http-login-hunterLogin hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.
Stars: ✭ 285 (+61.02%)
c2A simple, extensible C&C beaconing system.
Stars: ✭ 93 (-47.46%)
noodlog🍜 Parametrized JSON logging library in Golang which lets you obfuscate sensitive data and marshal any kind of content.
Stars: ✭ 42 (-76.27%)
rustcatRustcat(rcat) - The modern Port listener and Reverse shell
Stars: ✭ 505 (+185.31%)
pass2csvExport pass(1), "the standard unix password manager", to CSV.
Stars: ✭ 70 (-60.45%)
slabsudolikeaboss replacement - 1Password utility to interact with iTerm2 and type in your passwords for you.
Stars: ✭ 26 (-85.31%)
filter-var-sqliBypassing FILTER_SANITIZE_EMAIL & FILTER_VALIDATE_EMAIL filters in filter_var for SQL Injection ( xD )
Stars: ✭ 29 (-83.62%)
WPA2-FritzBox-Pswd-Wordlist-GeneratorThis Script will produce all of the WPA2 Passwords used by various Router companies aswell as Fritzbox. All of these Passwords will be 16 Numbers in length. So it could get a bit large.
Stars: ✭ 22 (-87.57%)
cdCloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities like SQL Injection, Cross-site scripting and other exploitable vulnerabilities.
Stars: ✭ 33 (-81.36%)
PeekABooPeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses PowerShell remoting to perform this task. Note: Remote desktop is disabled by default on all Windows operating systems.
Stars: ✭ 120 (-32.2%)
enigmatic-mouseThe enigmatic mouse will keep your passwords safe - password manager on Android in Kotlin.
Stars: ✭ 14 (-92.09%)
h1-searchTool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.
Stars: ✭ 58 (-67.23%)
turaku-clientWeb / Electron client application for Turaku
Stars: ✭ 27 (-84.75%)
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-87.01%)
passman-flutterA simple, cross-platform password manager created with Flutter.
Stars: ✭ 19 (-89.27%)
WiCrackFiPython Script to help/automate the WiFi hacking exercises.
Stars: ✭ 61 (-65.54%)
credcheckCredentials Checking Framework
Stars: ✭ 50 (-71.75%)
Passky-DesktopDesktop application for Passky (password manager)
Stars: ✭ 47 (-73.45%)
password-keeperA simple and secure Password Management System made completely in Python.
Stars: ✭ 26 (-85.31%)
KeePassHaxA tool to extract a KeePass master password from memory
Stars: ✭ 57 (-67.8%)
crtfinderFast tool to extract all subdomains from crt.sh website. Output will be up to sub.sub.sub.subdomain.com with standard and advanced search techniques
Stars: ✭ 96 (-45.76%)
Keepwords📱🔐 Need an iOS password managing app with no pods? We got you covered!
Stars: ✭ 17 (-90.4%)
Bitwarden Self HostAutomatically setup and host a Vaultwarden (unoffical Bitwarden) instance on a Raspberry Pi or other Linux Server
Stars: ✭ 87 (-50.85%)
phisherpriceAll In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-78.53%)
kubectl-passmankubectl plugin that provides the missing link/glue between common password managers and kubectl
Stars: ✭ 69 (-61.02%)
urldedupePass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
Stars: ✭ 208 (+17.51%)
boxerBoxer: A fast directory bruteforce tool written in Python with concurrency.
Stars: ✭ 15 (-91.53%)
KaliIntelligenceSuiteKali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standard penetration testing tools. The collected data is internally stored in a structured manner to allow the fast identification and visualisation of the collected information.
Stars: ✭ 58 (-67.23%)
lavaMicrosoft Azure Exploitation Framework
Stars: ✭ 46 (-74.01%)
remote-adb-scanpure python remote adb scanner + nmap scan module
Stars: ✭ 19 (-89.27%)
S3ScanScript to spider a website and find publicly open S3 buckets
Stars: ✭ 21 (-88.14%)
ADMMutateClassic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia.edu/sites/default/files/ccs07poly.pdf :) If I ever port this to 64 or implement a few other suggestions (sorry I lost ppc code version contributed) it will be orders of magnitude more difficult to spot, so I h…
Stars: ✭ 69 (-61.02%)
SSI Extra MaterialsIn my computer security courses I make extensive usage of cheatsheets for various tools and extra materials to complement the student learning if they are willing to do so. I have decided to share them to enable others to take advantage of them
Stars: ✭ 42 (-76.27%)
toolsTools used for Penetration testing / Red Teaming
Stars: ✭ 63 (-64.41%)
ESPAsync WiFiManager LiteLibrary using AsyncWebServer to configure MultiWiFi/Credentials at runtime for ESP32 (including ESP32-S2 and ESP32-C3) and ESP8266 boards. You can also specify DHCP HostName, static AP and STA IP. Use much less memory compared to full-fledge WiFiManager. Config Portal will be auto-adjusted to match the number of dynamic custom parameters. Option…
Stars: ✭ 48 (-72.88%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (-20.9%)
gacpassa password management software using GacUI.
Stars: ✭ 22 (-87.57%)
ligolo-ngAn advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (+136.16%)
Intel-OneCommand line tool for passive reconnaissance, able to gather and link public information to a target domain, company or individual. It can make intelligence gathering faster and more effective by drastically reducing manual user interaction. This is achieved through the engineering of a highly customisable single input to multiple output solutio…
Stars: ✭ 23 (-87.01%)
PLtools整理一些内网常用渗透小工具
Stars: ✭ 227 (+28.25%)
LAZYPARIAHA tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (-31.64%)
Awesome-CyberSec-ResourcesAn awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (+54.24%)
PykeepassPython library to interact with keepass databases (supports KDBX3 and KDBX4)
Stars: ✭ 231 (+30.51%)
BURN[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Stars: ✭ 13 (-92.66%)
pyhtoolsA Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester credential harvester, keylogger, download&execute, ransomware, data harvestors, etc.
Stars: ✭ 166 (-6.21%)
Passbolt apiPassbolt CE Backend, a JSON API written with Cakephp
Stars: ✭ 2,760 (+1459.32%)
GoPhish-TemplatesGoPhish Templates that I have retired and/or templates I've recreated.
Stars: ✭ 76 (-57.06%)