wwwtf.berlinwwwtf, a ~week of events organized for and by the web community
Stars: ✭ 46 (-91.24%)
nerdbugFull Nuclei automation script with logic explanation.
Stars: ✭ 153 (-70.86%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+692.76%)
iosCoThings's iOS application. CoThings is a realtime counter for shared things.
Stars: ✭ 13 (-97.52%)
pH4Social📣 Social Networking Software built with Laravel PHP framework and Bootstrap.
Stars: ✭ 27 (-94.86%)
SubzySubdomain takeover vulnerability checker
Stars: ✭ 287 (-45.33%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (-45.33%)
Contribute To This ProjectThis project is waiting for your contribution. If you have never contributed code on GitHub before, this is the project to get you started.
Stars: ✭ 501 (-4.57%)
OpenCircleOpen-source Circle of 6 with improved security and privacy features. PLEASE NOTE: For the new Circulo app please visit: https://gitlab.com/circuloapp/circulo-android
Stars: ✭ 26 (-95.05%)
utopia-crmUtopía is an open source platform for community based newsrooms to manage their subscriptions
Stars: ✭ 15 (-97.14%)
AndroidSecNotesAn actively maintained, Self curated notes related to android application security for security professionals, bugbounty hunters, pentesters, reverse engineer, and redteamers.
Stars: ✭ 140 (-73.33%)
workshopctlA tool to run workshops with
Stars: ✭ 38 (-92.76%)
Traitor⬆️ ☠️ Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket
Stars: ✭ 3,473 (+561.52%)
dorothyDorothy is a tool to test security monitoring and detection for Okta environments
Stars: ✭ 85 (-83.81%)
meetupsbrisjs.org
Stars: ✭ 89 (-83.05%)
Damn-Vulnerable-BankDamn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android application security hacking skills.
Stars: ✭ 379 (-27.81%)
SQLi-Query-TamperingSQLi Query Tampering extends and adds custom Payload Generator/Processor in Burp Suite's Intruder. This extension gives you the flexibility of manual testing with many powerful evasion techniques.
Stars: ✭ 123 (-76.57%)
bogotaBogotá, Colombia 🍺
Stars: ✭ 22 (-95.81%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (-84%)
Telegram ListList of telegram groups, channels & bots // Список интересных групп, каналов и ботов телеграма // Список чатов для программистов
Stars: ✭ 3,362 (+540.38%)
gf-patternsCollection grep patterns for Tom Hudson a.k.a Tomnomnom tools namely gf
Stars: ✭ 27 (-94.86%)
linkedinscraperLinkedinScraper is an another information gathering tool written in python. You can scrape employees of companies on Linkedin.com and then create these employee names, titles and emails.
Stars: ✭ 22 (-95.81%)
communityCommunity documentation for the Tekton project
Stars: ✭ 266 (-49.33%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (-18.67%)
guidesHow we do things at OK GROW!
Stars: ✭ 16 (-96.95%)
authz0🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.
Stars: ✭ 248 (-52.76%)
Sub-DrillA very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Stars: ✭ 70 (-86.67%)
LazyreconAn automated approach to performing recon for bug bounty hunting and penetration testing.
Stars: ✭ 282 (-46.29%)
Cyber-SecurityThis repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Stars: ✭ 42 (-92%)
shaniaScan secrets from Continuous Integration Build Logs
Stars: ✭ 54 (-89.71%)
CommunitiesLibrary of community detection algorithms and visualization tools
Stars: ✭ 348 (-33.71%)
superhighway84USENET-inspired, uncensorable, decentralized internet discussion system running on IPFS & OrbitDB
Stars: ✭ 437 (-16.76%)
CiderA new cross-platform Apple Music experience based on Electron and Vue.js written from scratch with performance in mind. 🚀
Stars: ✭ 3,146 (+499.24%)
ctf-writeupsWriteups of CTF challenges
Stars: ✭ 19 (-96.38%)
Bruteforce ListsSome files for bruteforcing certain things.
Stars: ✭ 320 (-39.05%)
heloworld.xyzA collection of hello world snippets in multiple programming languages.
Stars: ✭ 17 (-96.76%)
focusCommunity system build using GoFrame.
Stars: ✭ 103 (-80.38%)
RuqqusAn open-source platform for online communities
Stars: ✭ 460 (-12.38%)
MachineLearningEstablished in 2018, our team aims to bring together machine learning enthusiasts to explore the fundamentals and trends of machine learning. Check out the team presentation below!
Stars: ✭ 20 (-96.19%)
Community-GovernanceThe IOTA community creates a governance structure for the community treasury.
Stars: ✭ 36 (-93.14%)
Recon PipelineAn automated target reconnaissance pipeline.
Stars: ✭ 278 (-47.05%)
community基于spring boot与mybatis搭建的社区
Stars: ✭ 18 (-96.57%)
championscurriculumA training curriculum for teaching information security "champions" within small organisations and helping them conduct a basic assessment. (Work in progress)
Stars: ✭ 18 (-96.57%)
SobreInformações gerais sobre o Centro de Treinamento
Stars: ✭ 345 (-34.29%)
SubWalkerSimultaneously execute various subdomain enumeration tools and aggregate results.
Stars: ✭ 26 (-95.05%)
PandorasBoxSecurity tool to quickly audit Public Box files and folders.
Stars: ✭ 56 (-89.33%)
webapp-wordlistsThis repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version contains a wordlist of all the files directories for this version.
Stars: ✭ 306 (-41.71%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-85.71%)
PowerzurePowerShell framework to assess Azure security
Stars: ✭ 450 (-14.29%)
NmapIdiomatic nmap library for go developers
Stars: ✭ 391 (-25.52%)
remote-code-execution-sampleDemonstrate how usage of the Java Security Manager can prevent Remote Code Execution (RCE) exploits.
Stars: ✭ 18 (-96.57%)
reconmapVulnerability assessment and penetration testing automation and reporting platform for teams.
Stars: ✭ 242 (-53.9%)
orcaBuild modern community apps with React and Node.
Stars: ✭ 1,087 (+107.05%)