TerrascanDetect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
Stars: ✭ 2,687 (+1966.92%)
Burp ExporterExporter is a Burp Suite extension to copy a request to the clipboard as multiple programming languages functions.
Stars: ✭ 122 (-6.15%)
Hs JoseHaskell JOSE and JWT library
Stars: ✭ 100 (-23.08%)
Branca JsAuthenticated encrypted API Tokens for JavaScript.
Stars: ✭ 69 (-46.92%)
Slideswon't maintain
Stars: ✭ 79 (-39.23%)
VuldashVulnerability Dashboard
Stars: ✭ 16 (-87.69%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-39.23%)
GtfoblookupOffline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io) and LOLBAS (https://github.com/LOLBAS-Project/LOLBAS)
Stars: ✭ 123 (-5.38%)
Nac bypassScript collection to bypass Network Access Control (NAC, 802.1x)
Stars: ✭ 79 (-39.23%)
TorbotDark Web OSINT Tool
Stars: ✭ 821 (+531.54%)
ThugPython low-interaction honeyclient
Stars: ✭ 818 (+529.23%)
HackvaultA container repository for my public web hacks!
Stars: ✭ 1,364 (+949.23%)
Spring React BoilerplateBoilerplate application to demonstrate how to wire up Spring, JWT Authentication, React, Redux and Websockets
Stars: ✭ 70 (-46.15%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (+792.31%)
Bag Of HoldingAn application to assist in the organization and prioritization of software security activities.
Stars: ✭ 114 (-12.31%)
BarongBarong auth server
Stars: ✭ 100 (-23.08%)
AppmonDocumentation:
Stars: ✭ 1,157 (+790%)
Express JwtAn example API for creating/verifying json web tokens
Stars: ✭ 105 (-19.23%)
PgenCommand-line passphrase generator
Stars: ✭ 68 (-47.69%)
SilenttrinityAn asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Stars: ✭ 1,767 (+1259.23%)
PurplecloudAn Infrastructure as Code (IaC) deployment of a small Active Directory pentest lab in the cloud. The deployment simulates a semi-realistic corporate enterprise Active Directory with a DC and endpoints. Purple team goals include blue team detection capabilities and R&D for detection engineering new approaches.
Stars: ✭ 122 (-6.15%)
ExploHuman and machine readable web vulnerability testing format
Stars: ✭ 114 (-12.31%)
Awesome Aws SecurityCurated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS Security
Stars: ✭ 100 (-23.08%)
Njsscannjsscan is a semantic aware SAST tool that can find insecure code patterns in your Node.js applications.
Stars: ✭ 128 (-1.54%)
SpartySparty - MS Sharepoint and Frontpage Auditing Tool [Unofficial]
Stars: ✭ 75 (-42.31%)
PrivescA collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+504.62%)
KarnSimplifying Seccomp enforcement in containerized or non-containerized apps
Stars: ✭ 104 (-20%)
Hasura Backend Plus🔑Auth and 📦Storage for Hasura. The quickest way to get Auth and Storage working for your next app based on Hasura.
Stars: ✭ 776 (+496.92%)
FbctfPlatform to host Capture the Flag competitions
Stars: ✭ 6,407 (+4828.46%)
Radio HackboxPoC tool to demonstrate vulnerabilities in wireless input devices
Stars: ✭ 74 (-43.08%)
PowershellarmouryA PowerShell armoury for penetration testers or other random security guys
Stars: ✭ 99 (-23.85%)
CtfCTF Field Guide
Stars: ✭ 1,145 (+780.77%)
ShurikenCross-Site Scripting (XSS) command line tool for testing lists of XSS payloads on web apps.
Stars: ✭ 114 (-12.31%)
Django Auth0 VueA Django REST Framework + Vue.js CRUD Demo Secured Using Auth0
Stars: ✭ 99 (-23.85%)
VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+6703.08%)
AuthexAuthex is an opinionated JWT authentication and authorization library for Elixir.
Stars: ✭ 73 (-43.85%)
ScapyScapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Stars: ✭ 6,932 (+5232.31%)
CtfCtf solutions from p4 team
Stars: ✭ 1,395 (+973.08%)
LynisLynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+6928.46%)
Train Ai With Django Swagger JwtTrain AI (Keras + Tensorflow) to defend apps with Django REST Framework + Celery + Swagger + JWT - deploys to Kubernetes and OpenShift Container Platform
Stars: ✭ 66 (-49.23%)
Mitmap📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+1073.85%)
EspkeyWiegand data logger, replay device and micro door-controller
Stars: ✭ 114 (-12.31%)
KratosknifeKratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
Stars: ✭ 97 (-25.38%)
AppReusable framework for micro services & command line tools
Stars: ✭ 66 (-49.23%)
Rhme 2017Riscure Hack Me embedded hardware CTF 2017-2018.
Stars: ✭ 65 (-50%)
Eshop SoaEShop基于Dubbo实现SOA服务化拆分,并基于RocketMQ解决了分布式事务(新版SpringBootSOASkeleton)
Stars: ✭ 65 (-50%)
Burp Send ToAdds a customizable "Send to..."-context-menu to your BurpSuite.
Stars: ✭ 114 (-12.31%)
YamsA collection of Ansible roles for automating infosec builds.
Stars: ✭ 98 (-24.62%)
XshockXSHOCK Shellshock Exploit
Stars: ✭ 65 (-50%)