ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-95.01%)
WatchdogWatchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (-72.22%)
Gopoc用cel-go重现了长亭xray的poc检测功能的轮子
Stars: ✭ 124 (-90.02%)
Pocorgtfoa "Proof of Concept or GTFO" mirror with extra article index, direct links and clean PDFs.
Stars: ✭ 560 (-54.91%)
PocProofs-of-concept
Stars: ✭ 467 (-62.4%)
ThreatmapperIdentify vulnerabilities in running containers, images, hosts and repositories
Stars: ✭ 361 (-70.93%)
SutekhAn example rootkit that gives a userland process root permissions
Stars: ✭ 62 (-95.01%)
Machine Learning NotebooksAssorted exercises and proof-of-concepts to understand and study machine learning and statistical learning theory
Stars: ✭ 33 (-97.34%)
HabuHacking Toolkit
Stars: ✭ 635 (-48.87%)
DeltaPROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK
Stars: ✭ 55 (-95.57%)
FuzzapiFuzzapi is a tool used for REST API pentesting and uses API_Fuzzer gem
Stars: ✭ 521 (-58.05%)
MeltdownThis repository contains several applications, demonstrating the Meltdown bug.
Stars: ✭ 3,931 (+216.51%)
SafetySafety checks your installed dependencies for known security vulnerabilities
Stars: ✭ 982 (-20.93%)
Nrf24 PlaysetSoftware tools for Nordic Semiconductor nRF24-based devices like wireless keyboards, mice, and presenters
Stars: ✭ 73 (-94.12%)
Commit WatcherFind interesting and potentially hazardous commits in git projects
Stars: ✭ 345 (-72.22%)
Nodejs VirusA Node.js Proof of Concept Virus
Stars: ✭ 58 (-95.33%)
Hackertarget🎯 HackerTarget ToolKit - Tools And Network Intelligence To Help Organizations With Attack Surface Discovery 🎯
Stars: ✭ 320 (-74.24%)
CaringcaribouA friendly car security exploration tool for the CAN bus
Stars: ✭ 298 (-76.01%)
SethPerform a MitM attack and extract clear text credentials from RDP connections
Stars: ✭ 1,084 (-12.72%)
HerpaderpingProcess Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (-50.56%)
Uber Cli🚗Uber, at your fingertips
Stars: ✭ 1,142 (-8.05%)
SpikesWhere ideas & concepts are born & incubated
Stars: ✭ 540 (-56.52%)
TraceSupply chain transparency platform proof-of-concept based on the Ethereum blockchain ✍️
Stars: ✭ 52 (-95.81%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (-59.02%)
MeltdownLocal Exploit for Meltdown
Stars: ✭ 74 (-94.04%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (-66.75%)
PyupA tool to update your project's dependencies on GitHub. Runs on pyup.io, comes with a command line interface.
Stars: ✭ 379 (-69.48%)
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-94.93%)
TaipanWeb application vulnerability scanner
Stars: ✭ 359 (-71.1%)
Aproxandroid proxy setting tool
Stars: ✭ 34 (-97.26%)
BrandisBrandis: End-to-end encryption for everyone
Stars: ✭ 77 (-93.8%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (-41.38%)
RopiumROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together
Stars: ✭ 288 (-76.81%)
PasshuntPasshunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
Stars: ✭ 961 (-22.62%)
Syzkallersyzkaller is an unsupervised coverage-guided kernel fuzzer
Stars: ✭ 3,841 (+209.26%)
TlsfuzzerSSL and TLS protocol test suite and fuzzer
Stars: ✭ 335 (-73.03%)
OssaOpen-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (-35.91%)
VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+612.08%)
InjuredandroidA vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
Stars: ✭ 317 (-74.48%)
BrakemanA static analysis security vulnerability scanner for Ruby on Rails applications
Stars: ✭ 6,281 (+405.72%)
Cheatsheet GodPenetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+183.49%)
Go Restful🚀 A real world production-grade RESTful Web Services proof-of-concept project.
Stars: ✭ 58 (-95.33%)
SubzySubdomain takeover vulnerability checker
Stars: ✭ 287 (-76.89%)
Spectre AttackExample of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
Stars: ✭ 690 (-44.44%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-93.64%)
Radio HackboxPoC tool to demonstrate vulnerabilities in wireless input devices
Stars: ✭ 74 (-94.04%)
LynisLynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+635.67%)
Bootstrap DarkThe Definitive Guide to Dark Mode and Bootstrap 4 - A proof of concept
Stars: ✭ 54 (-95.65%)