HuntrVulnerability Database | huntr.dev
Stars: ✭ 136 (-95.46%)
CommunityThis repository holds the content submitted to https://cloud.google.com/community. Files added to the tutorials/ directory will appear at https://cloud.google.com/community/tutorials.
Stars: ✭ 1,306 (-56.41%)
XspearPowerfull XSS Scanning and Parameter analysis tool&gem
Stars: ✭ 583 (-80.54%)
VulscanAdvanced vulnerability scanning with Nmap NSE
Stars: ✭ 2,305 (-23.06%)
Uxss Db🔪Browser logic vulnerabilities ☠️
Stars: ✭ 565 (-81.14%)
Trackray溯光 (TrackRay) 3 beta⚡渗透测试框架(资产扫描|指纹识别|暴力破解|网页爬虫|端口扫描|漏洞扫描|代码审计|AWVS|NMAP|Metasploit|SQLMap)
Stars: ✭ 1,295 (-56.78%)
TutorialsCatBoost tutorials repository
Stars: ✭ 563 (-81.21%)
Norrisbota Slack bot that kicks asses (roundhouse-kicks to be accurate...)
Stars: ✭ 134 (-95.53%)
FavfreakMaking Favicon.ico based Recon Great again !
Stars: ✭ 564 (-81.17%)
AcamarA Python3 based single-file subdomain enumerator
Stars: ✭ 89 (-97.03%)
Blog🌈 原创&翻译 🌈
Stars: ✭ 562 (-81.24%)
Tutorials📖 Community driven web development tutorials
Stars: ✭ 189 (-93.69%)
RedcloudAutomated Red Team Infrastructure deployement using Docker
Stars: ✭ 551 (-81.61%)
ReconnessReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on schedule or events.
Stars: ✭ 131 (-95.63%)
SecdevlabsA laboratory for learning secure web and mobile development in a practical manner.
Stars: ✭ 547 (-81.74%)
Ble Security Attack Defence✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Stars: ✭ 88 (-97.06%)
OpcdeOPCDE Cybersecurity Conference Materials
Stars: ✭ 538 (-82.04%)
A2svAuto Scanning to SSL Vulnerability
Stars: ✭ 524 (-82.51%)
TutorsA simple way to show the user interface tutorials
Stars: ✭ 87 (-97.1%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (-83.01%)
Dictionary Of PentestingDictionary collection project such as Pentesing, Fuzzing, Bruteforce and BugBounty. 渗透测试、SRC漏洞挖掘、爆破、Fuzzing等字典收集项目。
Stars: ✭ 492 (-83.58%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-97.1%)
Vulscanvulscan 扫描系统:最新的poc&exp漏洞扫描,redis未授权、敏感文件、java反序列化、tomcat命令执行及各种未授权扫描等...
Stars: ✭ 486 (-83.78%)
A Journey Into Radare2A series of tutorials about radare2 framework from https://www.megabeets.net
Stars: ✭ 473 (-84.21%)
In Spectre MeltdownThis tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-97.13%)
PocProofs-of-concept
Stars: ✭ 467 (-84.41%)
AsnipASN target organization IP range attack surface mapping for reconnaissance, fast and lightweight
Stars: ✭ 126 (-95.79%)
Awesome Express A curated list of awesome express.js resources
Stars: ✭ 456 (-84.78%)
MinesweeperA Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-94.59%)
Docker Curriculum🐬 A comprehensive tutorial on getting started with Docker!
Stars: ✭ 4,523 (+50.97%)
Git CheatsGit Cheats - Interactive Cheatsheet For Git Commands
Stars: ✭ 124 (-95.86%)
MetabigorIntelligence tool but without API key
Stars: ✭ 424 (-85.85%)
YsoserialA proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
Stars: ✭ 4,808 (+60.48%)
Judo Heroes 2Universal Javascript sample application with React Router 4 and Express 5 (Enhanced version of https://github.com/lmammino/judo-heroes)
Stars: ✭ 182 (-93.93%)
VulkandemosSome simple vulkan examples.
Stars: ✭ 413 (-86.21%)
Webhackersweapons⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 1,205 (-59.78%)
Hardware And Firmware Security GuidanceGuidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
Stars: ✭ 408 (-86.38%)
0l4bsCross-site scripting labs for web application security enthusiasts
Stars: ✭ 119 (-96.03%)
Top25 ParameterFor basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙
Stars: ✭ 388 (-87.05%)
Cve 2018 20555Social Network Tabs Wordpress Plugin Vulnerability - CVE-2018-20555
Stars: ✭ 78 (-97.4%)
DnsgenGenerates combination of domain names from the provided input.
Stars: ✭ 389 (-87.02%)
Pharo WikiWiki related to the Pharo programming language and environment.
Stars: ✭ 161 (-94.63%)
Hottbox Tutorials📙 HOTTBOX: Higher Order Tensors ToolBOX. Tutorials
Stars: ✭ 29 (-99.03%)
Fuzz.txtPotentially dangerous files
Stars: ✭ 1,382 (-53.87%)
TakeoverA tool for testing subdomain takeover possibilities at a mass scale.
Stars: ✭ 28 (-99.07%)
GogitdumperDump exposed HTTP .git fast
Stars: ✭ 27 (-99.1%)
Proof Of ConceptsA little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
Stars: ✭ 148 (-95.06%)
Gold Miner🥇掘金翻译计划,可能是世界最大最好的英译中技术社区,最懂读者和译者的翻译平台:
Stars: ✭ 29,872 (+897.06%)