Awesome HackingAwesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+7734.78%)
MetaforgeAn OSINT Metadata analyzing tool that filters through tags and creates reports
Stars: ✭ 63 (+173.91%)
Rebel FrameworkAdvanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (+695.65%)
PypowershellxrayPython script to decode common encoded PowerShell scripts
Stars: ✭ 192 (+734.78%)
ProwlerProwler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+19730.43%)
Fail2banDaemon to ban hosts that cause multiple authentication errors
Stars: ✭ 6,677 (+28930.43%)
EsdEnumeration sub domains(枚举子域名)
Stars: ✭ 785 (+3313.04%)
HardeningHardening Ubuntu. Systemd edition.
Stars: ✭ 705 (+2965.22%)
WhalerProgram to reverse Docker images into Dockerfiles
Stars: ✭ 670 (+2813.04%)
FabioConsul Load-Balancing made simple
Stars: ✭ 6,834 (+29613.04%)
VhostscanA virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+3234.78%)
Red BaronAutomate creating resilient, disposable, secure and agile infrastructure for Red Teams.
Stars: ✭ 662 (+2778.26%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (+3065.22%)
OssaOpen-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (+3360.87%)
Gg ShieldDetect secret in source code, scan your repo for leaks. Find secrets with GitGuardian and prevent leaked credentials. GitGuardian is an automated secrets detection & remediation service.
Stars: ✭ 708 (+2978.26%)
Vivalasvenus@viva_las_venus -- This project is to learn, teach and awareness about privacy and security in the digital life, to build a better, more open and more inclusive world together!
Stars: ✭ 16 (-30.43%)
MemlabsEducational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+2926.09%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+3269.57%)
SwiftnessxA cross-platform note-taking & target-tracking app for penetration testers.
Stars: ✭ 673 (+2826.09%)
SecretscannerFind secrets and passwords in container images and file systems
Stars: ✭ 895 (+3791.3%)
Jok3rJok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (+2704.35%)
ScapyScapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Stars: ✭ 6,932 (+30039.13%)
HabuHacking Toolkit
Stars: ✭ 635 (+2660.87%)
Security ListPenetrum LLC opensource security tool list.
Stars: ✭ 619 (+2591.3%)
BrutedetGeneralized proof of concept tool which can be used for drop-in bruteforce protection when needed.
Stars: ✭ 5 (-78.26%)
Grauditgrep rough audit - source code auditing tool
Stars: ✭ 747 (+3147.83%)
Articles Translator📚Translate the distinct technical blogs. Please star or watch. Welcome to join me.
Stars: ✭ 606 (+2534.78%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+3052.17%)
SprayingtoolkitScripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
Stars: ✭ 802 (+3386.96%)
InqlInQL - A Burp Extension for GraphQL Security Testing
Stars: ✭ 715 (+3008.7%)
MarsnakeSystem Optimizer and Monitoring, Security Auditing, Vulnerability scanner for Linux, macOS, and UNIX-based systems
Stars: ✭ 16 (-30.43%)
PompemFind exploit tool
Stars: ✭ 786 (+3317.39%)
StacoanStaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.
Stars: ✭ 707 (+2973.91%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+3800%)
R0akr0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems
Stars: ✭ 698 (+2934.78%)
Rapidscan🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+3269.57%)
Vault2envSmall utility to transfer fields of a key in Vault into the environment
Stars: ✭ 6 (-73.91%)
Sentinel AttackTools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Stars: ✭ 676 (+2839.13%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+3221.74%)
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+29821.74%)
InterlaceEasily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+3204.35%)
Vault GuidesExample usage of HashiCorp Vault secrets management
Stars: ✭ 636 (+2665.22%)
TorbotDark Web OSINT Tool
Stars: ✭ 821 (+3469.57%)
Vault OperatorRun and manage Vault on Kubernetes simply and securely
Stars: ✭ 750 (+3160.87%)
Embaemba - An analyzer for Linux-based firmware of embedded devices.
Stars: ✭ 607 (+2539.13%)
Git HoundReconnaissance tool for GitHub code search. Finds exposed API keys using pattern matching, commit history searching, and a unique result scoring system.
Stars: ✭ 602 (+2517.39%)
Bypass Firewalls By Dns HistoryFirewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.
Stars: ✭ 739 (+3113.04%)
HashviewA web front-end for password cracking and analytics
Stars: ✭ 601 (+2513.04%)
Terraform Aws Secure BaselineTerraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations and AWS Foundational Security Best Practices.
Stars: ✭ 596 (+2491.3%)
ThugPython low-interaction honeyclient
Stars: ✭ 818 (+3456.52%)
BluespawnAn Active Defense and EDR software to empower Blue Teams
Stars: ✭ 737 (+3104.35%)
KonfigComposable, observable and performant config handling for Go for the distributed processing era
Stars: ✭ 597 (+2495.65%)
HindsightWeb browser forensics for Google Chrome/Chromium
Stars: ✭ 589 (+2460.87%)