JaelesThe Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+90.59%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+79.22%)
Pentest ChainsawScrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product
Stars: ✭ 36 (-93.61%)
WhatwebNext generation web scanner
Stars: ✭ 3,503 (+522.2%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-79.4%)
CatnipCat-Nip Automated Basic Pentest Tool - Designed For Kali Linux
Stars: ✭ 108 (-80.82%)
H2csmugglerHTTP Request Smuggling over HTTP/2 Cleartext (h2c)
Stars: ✭ 292 (-48.13%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (-9.59%)
Backfuzzprotocol fuzzing toolkit
Stars: ✭ 106 (-81.17%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-67.67%)
Intrec PackIntelligence and Reconnaissance Package/Bundle installer.
Stars: ✭ 177 (-68.56%)
CheckmyhttpsWe propose a user-friendly add-on that allows you to check if your encrypted web traffic (SSL/TLS) towards secured Internet servers (HTTPS) is not intercepted (being listened to).
Stars: ✭ 35 (-93.78%)
OblivionData leak checker & OSINT Tool
Stars: ✭ 237 (-57.9%)
KubestrikerA Blazing fast Security Auditing tool for Kubernetes
Stars: ✭ 213 (-62.17%)
CameradarCameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+392.9%)
Objection📱 objection - runtime mobile exploration
Stars: ✭ 4,404 (+682.24%)
GetaltnameExtract subdomains from SSL certificates in HTTPS sites.
Stars: ✭ 320 (-43.16%)
AppwriteAppwrite is a secure end-to-end backend server for Web, Mobile, and Flutter developers that is packaged as a set of Docker containers for easy deployment 🚀
Stars: ✭ 14,592 (+2491.83%)
Werdlists⌨️ Wordlists, Dictionaries and Other Data Sets for Writing Software Security Test Cases
Stars: ✭ 216 (-61.63%)
Collection DocumentCollection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+146.36%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-85.97%)
Fhe Toolkit LinuxIBM Fully Homomorphic Encryption Toolkit For Linux. This toolkit is a Linux based Docker container that demonstrates computing on encrypted data without decrypting it! The toolkit ships with two demos including a fully encrypted Machine Learning inference with a Neural Network and a Privacy-Preserving key-value search.
Stars: ✭ 1,123 (+99.47%)
Iostracealternative strace for iOS device(64bit) on frida
Stars: ✭ 84 (-85.08%)
AppmonDocumentation:
Stars: ✭ 1,157 (+105.51%)
Golang TlsSimple Golang HTTPS/TLS Examples
Stars: ✭ 857 (+52.22%)
Race The WebTests for race conditions in web applications. Includes a RESTful API to integrate into a continuous integration pipeline.
Stars: ✭ 385 (-31.62%)
hacktheboxNotes Taken for HTB Machines & InfoSec Community.
Stars: ✭ 286 (-49.2%)
awesome-api-securityA collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.
Stars: ✭ 2,079 (+269.27%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-89.17%)
SecureenclavecryptoDemonstration library for using the Secure Enclave on iOS
Stars: ✭ 251 (-55.42%)
netizenshipa commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (-94.14%)
rejigTurn your VPS into an attack box
Stars: ✭ 33 (-94.14%)
PPNPentester's Promiscuous Notebook
Stars: ✭ 221 (-60.75%)
MSessionA simple and sophisticated session and authentication solution written in Swift
Stars: ✭ 26 (-95.38%)
juumla🦁 Juumla is a python tool created to identify Joomla version, scan for vulnerabilities and search for config or backup files.
Stars: ✭ 107 (-80.99%)
oscpMy notebook for OSCP Lab
Stars: ✭ 22 (-96.09%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-93.25%)
aquatoneA Tool for Domain Flyovers
Stars: ✭ 43 (-92.36%)
PentestingMisc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-95.74%)
InfosecHouseInfosec resource center for offensive and defensive security operations.
Stars: ✭ 61 (-89.17%)
Apple Runtime HeadersObjective-C runtime headers for Apple's iOS, macOS, tvOS and watchOS frameworks
Stars: ✭ 174 (-69.09%)
Traitor⬆️ ☠️ Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket
Stars: ✭ 3,473 (+516.87%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-32.15%)
GosintOSINT Swiss Army Knife
Stars: ✭ 401 (-28.77%)
CsvkeychainImport/export between Apple Keychain.app and plain CSV file.
Stars: ✭ 281 (-50.09%)
Csinva.github.ioSlides, paper notes, class notes, blog posts, and research on ML 📉, statistics 📊, and AI 🤖.
Stars: ✭ 342 (-39.25%)
Awesome InfosecA curated list of awesome infosec courses and training resources.
Stars: ✭ 3,779 (+571.23%)
W5Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (-34.81%)
DorknetSelenium powered Python script to automate searching for vulnerable web apps.
Stars: ✭ 256 (-54.53%)
Deimosc2DeimosC2 is a Golang command and control framework for post-exploitation.
Stars: ✭ 423 (-24.87%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+59.33%)
ChangemeA default credential scanner.
Stars: ✭ 928 (+64.83%)
Checkn1xLight (~50MB) images for jailbreaking iOS devices
Stars: ✭ 167 (-70.34%)
HOUDINIHundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
Stars: ✭ 791 (+40.5%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+639.25%)