Skf FlaskSecurity Knowledge Framework (SKF) Python Flask / Angular project
Stars: ✭ 573 (+262.66%)
prowlerProwler is an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. It contains hundreds of controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks.
Stars: ✭ 8,046 (+4992.41%)
LynisLynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+5682.91%)
ProwlerProwler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+2786.71%)
nim-contraLightweight Self-Documenting Design by Contract Programming and Security Hardened mode.
Stars: ✭ 46 (-70.89%)
MinesweeperA Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (+2.53%)
ad-privileged-auditProvides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (-73.42%)
ArachniWeb Application Security Scanner Framework
Stars: ✭ 2,942 (+1762.03%)
Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (+123.42%)
ArchstrikeAn Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (+153.8%)
JshielderHardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS Benchmark
Stars: ✭ 483 (+205.7%)
Rails Security Checklist🔑 Community-driven Rails Security Checklist (see our GitHub Issues for the newest checks that aren't yet in the README)
Stars: ✭ 1,265 (+700.63%)
nerfballWant to see how something like Internet Chemotherapy works without bricking your own vms? This is a jail to reduce the python runtime from doing bad things on the host when running untrusted code. Nerf what you do not need 👾 + 🐛 ⚽ 🏈 🐳
Stars: ✭ 19 (-87.97%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+15.19%)
ElectriceyeContinuously monitor your AWS services for configurations that can lead to degradation of confidentiality, integrity or availability. All results will be sent to Security Hub for further aggregation and analysis.
Stars: ✭ 255 (+61.39%)
W5Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (+132.28%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+358.86%)
HardeningHardening Ubuntu. Systemd edition.
Stars: ✭ 705 (+346.2%)
ReconnoitreA security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+1054.43%)
StrongholdEasily configure macOS security settings from the terminal.
Stars: ✭ 813 (+414.56%)
Pythempentest framework
Stars: ✭ 1,060 (+570.89%)
Audit scriptsScripts to gather system configuration information for offline/remote auditing
Stars: ✭ 55 (-65.19%)
VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+5497.47%)
ContentSecurity automation content in SCAP, OSCAL, Bash, Ansible, and other formats
Stars: ✭ 1,219 (+671.52%)
Btle SnifferPassively scan for Bluetooth Low Energy devices and attempt to fingerprint them
Stars: ✭ 87 (-44.94%)
RspetRSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Stars: ✭ 251 (+58.86%)
assimilation-officialThis is the official main repository for the Assimilation project
Stars: ✭ 47 (-70.25%)
NosqlmapAutomated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+1120.25%)
CIS-Ubuntu-20.04-AnsibleAnsible Role to Automate CIS v1.1.0 Ubuntu Linux 18.04 LTS, 20.04 LTS Remediation
Stars: ✭ 150 (-5.06%)
awesome-rails-securityA curated list of security resources for a Ruby on Rails application
Stars: ✭ 36 (-77.22%)
TaipanWeb application vulnerability scanner
Stars: ✭ 359 (+127.22%)
Technical WhitepapersCollection of IT whitepapers, presentations, pdfs; hacking, web app security, db, reverse engineering and more; EN/PL.
Stars: ✭ 359 (+127.22%)
HellraiserVulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (+161.39%)
MarsnakeSystem Optimizer and Monitoring, Security Auditing, Vulnerability scanner for Linux, macOS, and UNIX-based systems
Stars: ✭ 16 (-89.87%)
Jok3rJok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (+308.23%)
HabuHacking Toolkit
Stars: ✭ 635 (+301.9%)
VhostscanA virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+385.44%)
Terraform Aws Secure BaselineTerraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations and AWS Foundational Security Best Practices.
Stars: ✭ 596 (+277.22%)
Golang TlsSimple Golang HTTPS/TLS Examples
Stars: ✭ 857 (+442.41%)
SnuffleupagusSecurity module for php7 and php8 - Killing bugclasses and virtual-patching the rest!
Stars: ✭ 509 (+222.15%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-60.76%)
Github DorksFind leaked secrets via github search
Stars: ✭ 1,332 (+743.04%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-26.58%)
Oxidtools200 TOOLS BY 0XID4FF0X FOR TERMUX
Stars: ✭ 143 (-9.49%)
Posta🐙 Cross-document messaging security research tool powered by https://enso.security
Stars: ✭ 143 (-9.49%)
KubetopA top(1)-like tool for Kubernetes.
Stars: ✭ 142 (-10.13%)
Di.we.hRepositório com conteúdo sobre web hacking em português
Stars: ✭ 156 (-1.27%)
DnsfookupDNS rebinding toolkit
Stars: ✭ 150 (-5.06%)
Dailyhack🐱💻 Tiny Tiny Hacks we use in our daily life.
Stars: ✭ 142 (-10.13%)
ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-10.13%)
AdbsploitA python based tool for exploiting and managing Android devices via ADB
Stars: ✭ 147 (-6.96%)