AllaboutbugbountyAll about bug bounty (bypasses, payloads, and etc)
Stars: ✭ 758 (+1704.76%)
Red Teaming ToolkitThis repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Stars: ✭ 5,615 (+13269.05%)
ChashellChashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
Stars: ✭ 742 (+1666.67%)
Infosec getting startedA collection of resources/documentation/links/etc to help people learn about Infosec and break into the field.
Stars: ✭ 526 (+1152.38%)
Dictionary Of PentestingDictionary collection project such as Pentesing, Fuzzing, Bruteforce and BugBounty. 渗透测试、SRC漏洞挖掘、爆破、Fuzzing等字典收集项目。
Stars: ✭ 492 (+1071.43%)
Tiny Xss PayloadsA collection of tiny XSS Payloads that can be used in different contexts. https://tinyxss.terjanq.me
Stars: ✭ 975 (+2221.43%)
MettaAn information security preparedness tool to do adversarial simulation.
Stars: ✭ 867 (+1964.29%)
Bypass Firewalls By Dns HistoryFirewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.
Stars: ✭ 739 (+1659.52%)
Search That Hash🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+1009.52%)
PlumhoundBloodhound for Blue and Purple Teams
Stars: ✭ 452 (+976.19%)
PowerzurePowerShell framework to assess Azure security
Stars: ✭ 450 (+971.43%)
SudomySudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 859 (+1945.24%)
Dradis CeDradis Framework: Colllaboration and reporting for IT Security teams
Stars: ✭ 443 (+954.76%)
HershellHershell is a simple TCP reverse shell written in Go.
Stars: ✭ 442 (+952.38%)
StacoanStaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.
Stars: ✭ 707 (+1583.33%)
FfufFast web fuzzer written in Go
Stars: ✭ 5,687 (+13440.48%)
Onioff🌰 An onion url inspector for inspecting deep web links.
Stars: ✭ 440 (+947.62%)
MalcomMalcom - Malware Communications Analyzer
Stars: ✭ 988 (+2252.38%)
Badusb botnet👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-23.81%)
Urlhuntera recon tool that allows searching on URLs that are exposed via shortener services
Stars: ✭ 934 (+2123.81%)
Awesome Security GistsA collection of various GitHub gists for hackers, pentesters and security researchers
Stars: ✭ 701 (+1569.05%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+916.67%)
BashfuscatorA fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.
Stars: ✭ 690 (+1542.86%)
Deimosc2DeimosC2 is a Golang command and control framework for post-exploitation.
Stars: ✭ 423 (+907.14%)
StinkyphishMonitor Certificate Transparency Logs For Phishing Domains
Stars: ✭ 25 (-40.48%)
PwndocPentest Report Generator
Stars: ✭ 417 (+892.86%)
ApkurlgrepExtract endpoints from APK files
Stars: ✭ 405 (+864.29%)
GosintOSINT Swiss Army Knife
Stars: ✭ 401 (+854.76%)
GorsairGorsair hacks its way into remote docker containers that expose their APIs
Stars: ✭ 678 (+1514.29%)
Top25 ParameterFor basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙
Stars: ✭ 388 (+823.81%)
Siem From ScratchSIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab
Stars: ✭ 31 (-26.19%)
ChangemeA default credential scanner.
Stars: ✭ 928 (+2109.52%)
DnsgenGenerates combination of domain names from the provided input.
Stars: ✭ 389 (+826.19%)
NmapIdiomatic nmap library for go developers
Stars: ✭ 391 (+830.95%)
BusterAn advanced tool for email reconnaissance
Stars: ✭ 387 (+821.43%)
FameFAME Automates Malware Evaluation
Stars: ✭ 663 (+1478.57%)
Race The WebTests for race conditions in web applications. Includes a RESTful API to integrate into a continuous integration pipeline.
Stars: ✭ 385 (+816.67%)
Cs7038 Malware AnalysisCourse Repository for University of Cincinnati Malware Analysis Class (CS[567]038)
Stars: ✭ 378 (+800%)
SubdomainizerA tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.
Stars: ✭ 915 (+2078.57%)
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+16285.71%)
SecuritymanageframworkSecurity Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Stars: ✭ 378 (+800%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+9809.52%)
WebmapWebMap-Nmap Web Dashboard and Reporting
Stars: ✭ 357 (+750%)
ReconftwreconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+2219.05%)
Pentest ChainsawScrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product
Stars: ✭ 36 (-14.29%)
TakeoverA tool for testing subdomain takeover possibilities at a mass scale.
Stars: ✭ 28 (-33.33%)
MooscanA scanner for Moodle LMS
Stars: ✭ 22 (-47.62%)
Security whitepapersCollection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQLi
Stars: ✭ 644 (+1433.33%)
WatchdogWatchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (+721.43%)
VulnerabilitydbSnyk's public vulnerability database
Stars: ✭ 345 (+721.43%)
WinappdbgWinAppDbg Debugger
Stars: ✭ 338 (+704.76%)
VuldashVulnerability Dashboard
Stars: ✭ 16 (-61.9%)
NzymeNzyme collects 802.11 management frames directly from the air and sends them to a Graylog (Open Source log management) setup for WiFi IDS, monitoring, and incident response. It only needs a JVM and a WiFi adapter that supports monitor mode.
Stars: ✭ 507 (+1107.14%)
NatlasScaling Network Scanning. Changes prior to 1.0 may cause difficult to avoid backwards incompatibilities. You've been warned.
Stars: ✭ 333 (+692.86%)