OpenVAS-DockerA Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-48.39%)
monetaMoneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs
Stars: ✭ 384 (+1138.71%)
MalwareHashDBMalware hashes for open source projects.
Stars: ✭ 31 (+0%)
log4j-detectorLog4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!
Stars: ✭ 622 (+1906.45%)
YAFRAYAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-29.03%)
NetzDiscover internet-wide misconfigurations while drinking coffee
Stars: ✭ 159 (+412.9%)
Packer FuzzerPacker Fuzzer is a fast and efficient scanner for security detection of websites constructed by javascript module bundler such as Webpack.
Stars: ✭ 753 (+2329.03%)
JsshaA JavaScript/TypeScript implementation of the complete Secure Hash Standard (SHA) family (SHA-1, SHA-224/256/384/512, SHA3-224/256/384/512, SHAKE128/256, cSHAKE128/256, and KMAC128/256) with HMAC.
Stars: ✭ 2,089 (+6638.71%)
Signature BaseSignature base for my scanner tools
Stars: ✭ 1,212 (+3809.68%)
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (+1870.97%)
LokiLoki - Simple IOC and Incident Response Scanner
Stars: ✭ 2,217 (+7051.61%)
rdio-scanner-pi-setupA fully working police radio scanner on a Raspberry Pi with Trunk Recorder and Rdio Scanner
Stars: ✭ 24 (-22.58%)
cytroneCyTrONE: Integrated Cybersecurity Training Framework
Stars: ✭ 72 (+132.26%)
OwlyshieldOwlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+806.45%)
OSINTBookmarksOSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (+9.68%)
kube-knarkOpen Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster
Stars: ✭ 32 (+3.23%)
sx🖖 Fast, modern, easy-to-use network scanner
Stars: ✭ 1,267 (+3987.1%)
ioc-fangerFang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .
Stars: ✭ 47 (+51.61%)
aemscanAdobe Experience Manager Vulnerability Scanner
Stars: ✭ 161 (+419.35%)
Hack4Squad💀 A bash hacking and scanning framework.
Stars: ✭ 45 (+45.16%)
mpcSecure Multi-Party Computation (MPC) with Go. This project implements secure two-party computation with Garbled circuit protocol.
Stars: ✭ 41 (+32.26%)
pywhatcmsUnofficial WhatCMS API package
Stars: ✭ 42 (+35.48%)
DevSecOpsUltimate DevSecOps library
Stars: ✭ 4,450 (+14254.84%)
stashboxA lightweight, fast, and portable dependency injection framework for .NET-based solutions.
Stars: ✭ 120 (+287.1%)
github-watchmanMonitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (+93.55%)
cuc-wiki个人教学 Wiki
Stars: ✭ 83 (+167.74%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (+96.77%)
CleanSCANA simple, smart and efficient document scanner for Android
Stars: ✭ 151 (+387.1%)
DI-compilerA Custom Transformer for Typescript that enables compile-time Dependency Injection
Stars: ✭ 62 (+100%)
ForerunnerFast and extensible network scanning library featuring multithreading, ping probing, and scan fetchers.
Stars: ✭ 39 (+25.81%)
Judge-Jury-and-ExecutableA file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
Stars: ✭ 66 (+112.9%)
my-cybersecurity-notesThese are the notes i have been taking since i started learning about ethical hacking and cybersecurity
Stars: ✭ 13 (-58.06%)
BruteForceA simple brute forcer written in GO for SHA1, SHA256, SHA512, MD5 and bcrypt
Stars: ✭ 49 (+58.06%)
Recon-XAdvanced Reconnaissance tool to enumerate attacking surface of the target.
Stars: ✭ 27 (-12.9%)
DomainCATDomain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations
Stars: ✭ 34 (+9.68%)
extrude🕵️ Analyse binaries for missing security features, information disclosure and more...
Stars: ✭ 51 (+64.52%)
sectorSimple Injector; Dependency Injection
Stars: ✭ 12 (-61.29%)
ehtkEthical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Researchers etc. It contains almost all tools mentioned in CEH, OSCP, eCPPT and PNPT
Stars: ✭ 59 (+90.32%)
Malware-ZooHashes of infamous malware
Stars: ✭ 18 (-41.94%)
FSEC-VMBackend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-38.71%)
crypto.jsbase on crypto module
Stars: ✭ 13 (-58.06%)
LabtainersLabtainers: A Docker-based cyber lab framework
Stars: ✭ 226 (+629.03%)
findcdnfindCDN is a tool created to help accurately identify what CDN a domain is using.
Stars: ✭ 64 (+106.45%)
phisherpriceAll In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (+22.58%)
ZZYQRCodea scanner for QRCode barCode 最好用的ios二维码、条形码,扫描、生成框架,支持闪光灯,从相册获取,扫描音效等,高仿微信,微博
Stars: ✭ 124 (+300%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+854.84%)
PIP-Module-ScannerScans your Python project for all installed third party pip libraries that are used and generates a requirements.txt file based on it
Stars: ✭ 19 (-38.71%)
CloudFrontierMonitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (+229.03%)