Link LockPassword-protect URLs using AES in the browser; create hidden bookmarks without a browser extension
Stars: ✭ 418 (-49.94%)
hekateJava Library for Distributed Services
Stars: ✭ 17 (-97.96%)
SciFlowScientific workflow management
Stars: ✭ 49 (-94.13%)
EhtoolsWi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: ✭ 422 (-49.46%)
ShonyDanzaA customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (-89.7%)
Platypus🔨 A modern multiple reverse shell sessions manager wrote in go
Stars: ✭ 559 (-33.05%)
sub404A python tool to check subdomain takeover vulnerability
Stars: ✭ 205 (-75.45%)
OtsecaOpen source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
Stars: ✭ 416 (-50.18%)
Sn0intSemi-automatic OSINT framework and package manager
Stars: ✭ 814 (-2.51%)
EvaEngine.jsA micro service development engine for node.js
Stars: ✭ 31 (-96.29%)
invokableObjects are functions! Treat any Object or Class as a Proc (like Enumerable but for Procs).
Stars: ✭ 40 (-95.21%)
Antares分布式任务调度平台(Distributed Job Schedule Platform)
Stars: ✭ 558 (-33.17%)
mobiusMobius is an AI infra platform including realtime computing and training.
Stars: ✭ 22 (-97.37%)
PlutusAn automated bitcoin wallet collider that brute forces random wallet addresses
Stars: ✭ 404 (-51.62%)
wifi-deautherA fully automatic wifi deauther coded in Python
Stars: ✭ 25 (-97.01%)
Free StyleMake CSS easier and more maintainable by using JavaScript
Stars: ✭ 693 (-17.01%)
PowerProxyPowerShell SOCKS proxy with reverse proxy capabilities
Stars: ✭ 29 (-96.53%)
CoulerUnified Interface for Constructing and Managing Workflows on different workflow engines, such as Argo Workflows, Tekton Pipelines, and Apache Airflow.
Stars: ✭ 405 (-51.5%)
offensive-docker-vpsCreate a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.
Stars: ✭ 66 (-92.1%)
DawsAdvanced Web Shell
Stars: ✭ 551 (-34.01%)
SQLbitJust another script for automatize boolean-based blind SQL injections. (Demo)
Stars: ✭ 30 (-96.41%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (-51.74%)
Raven-StormRaven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.
Stars: ✭ 235 (-71.86%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (-7.19%)
CudaSHA256Simple tool to calculate sha256 on GPU using Cuda
Stars: ✭ 38 (-95.45%)
ArchstrikeAn Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (-51.98%)
EvilUSBQuick utility to craft executables for pentesting and managing reverse shells
Stars: ✭ 33 (-96.05%)
Handson MlA series of Jupyter notebooks that walk you through the fundamentals of Machine Learning and Deep Learning in python using Scikit-Learn and TensorFlow.
Stars: ✭ 23,798 (+2750.06%)
WiFi-ProjectPre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (-97.37%)
StegcrackerSteganography brute-force utility to uncover hidden data inside files
Stars: ✭ 396 (-52.57%)
envyUse envy to manage environment variables with your OS keychain
Stars: ✭ 23 (-97.25%)
AutordpwnThe Shadow Attack Framework
Stars: ✭ 688 (-17.6%)
Procedural-GenerationAn Overview of Procedural Generation Techniques and Applications
Stars: ✭ 23 (-97.25%)
Pentesterspecialdict渗透测试人员专用精简化字典 Dictionary for penetration testers happy hacker
Stars: ✭ 391 (-53.17%)
Bitcoin-StealerGenerate random bitcoin wallets, private keys (seeds) and then check if they match a wallet that contains some kind of balance, and then take it. Node.js
Stars: ✭ 61 (-92.69%)
BigbountyreconBigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (-35.21%)
SadlyDistributedDistributing your code(soul), in almost any language(state), among a cluster of idle browsers(voids)
Stars: ✭ 20 (-97.6%)
GoimagehashGo Perceptual image hashing package
Stars: ✭ 391 (-53.17%)
snmp0wn-md5Bash script to bruteforce snmpv3 authentication passwords using MD5 (usmHMACMD5AuthProtocol)
Stars: ✭ 27 (-96.77%)
GoscanInteractive Network Scanner
Stars: ✭ 795 (-4.79%)
CipherComputeThe free EAP version of the Cosmian Collaborative Confidential Computing platform. Try it!
Stars: ✭ 20 (-97.6%)
NebulaNebula is a powerful framwork for building highly concurrent, distributed, and resilient message-driven applications for C++.
Stars: ✭ 385 (-53.89%)
Deep-InsideCommand line tool that allows you to explore IoT devices by using Shodan API.
Stars: ✭ 22 (-97.37%)
SpecsContent-addressed, authenticated, immutable data structures
Stars: ✭ 539 (-35.45%)
xxhash-rustRust implementation of xxhash
Stars: ✭ 56 (-93.29%)
GadgetprobeProbe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.
Stars: ✭ 381 (-54.37%)
quick-recon.pyDo some quick reconnaissance on a domain-based web-application
Stars: ✭ 13 (-98.44%)
Lockdoor Framework🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (-18.92%)
AirgeddonThis is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (+358.68%)
Xxl ConfA lightweight distributed configuration management platform. (分布式配置管理平台XXL-CONF)
Stars: ✭ 619 (-25.87%)
Easylambdadistributed dataflows with functional list operations for data processing with C++14
Stars: ✭ 475 (-43.11%)
VajraVajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (-67.78%)
Awesome Federated Computing📚 👓 A collection of research papers, codes, tutorials and blogs on Federated Computing/Learning.
Stars: ✭ 314 (-62.4%)
Juice ShopOWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+650.9%)
WebanalyzePort of Wappalyzer (uncovers technologies used on websites) to automate mass scanning.
Stars: ✭ 311 (-62.75%)
Findom XssA fast DOM based XSS vulnerability scanner with simplicity.
Stars: ✭ 310 (-62.87%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (-12.81%)