S3scannerScan for open AWS S3 buckets and dump the contents
Stars: ✭ 1,319 (-41.84%)
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (-44.75%)
Mitmap📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (-32.72%)
GorshA Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
Stars: ✭ 97 (-95.72%)
Red Team Curation ListA list to discover work of red team tooling and methodology for penetration testing and security assessment
Stars: ✭ 68 (-97%)
Spaces FinderA tool to hunt for publicly accessible DigitalOcean Spaces
Stars: ✭ 122 (-94.62%)
Breach.twA service that can track data breaches like "Have I Been Pwned", but it is specific for Taiwan.
Stars: ✭ 144 (-93.65%)
Infosec BadgesBadges for your GitHub tool presented at InfoSec Conference
Stars: ✭ 74 (-96.74%)
NetsetOperational Security utility and automator.
Stars: ✭ 110 (-95.15%)
RoutersploitExploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+335.01%)
Gitlab WatchmanMonitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (-94.4%)
Gf SecretsSecret and/ credential patterns used for gf.
Stars: ✭ 96 (-95.77%)
Pyiris BackdoorPyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (-93.61%)
Cvebase.comcvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (-96.12%)
GoaltdnsA permutation generation tool written in golang
Stars: ✭ 119 (-94.75%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (-44.09%)
Cve 2018 20555Social Network Tabs Wordpress Plugin Vulnerability - CVE-2018-20555
Stars: ✭ 78 (-96.56%)
VirtualsecconsAn ongoing list of virtual cybersecurity conferences.
Stars: ✭ 113 (-95.02%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-96.96%)
KurukshetraKurukshetra - A framework for teaching secure coding by means of interactive problem solving.
Stars: ✭ 131 (-94.22%)
MetaforgeAn OSINT Metadata analyzing tool that filters through tags and creates reports
Stars: ✭ 63 (-97.22%)
Hacker ContainerContainer with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-95.37%)
M4ngl3m3Common password pattern generator using strings list
Stars: ✭ 103 (-95.46%)
LyricpassPassword wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security research.
Stars: ✭ 58 (-97.44%)
Oob ServerA Bind9 server for pentesters to use for Out-of-Band vulnerabilities
Stars: ✭ 125 (-94.49%)
WsmanagerWebshell Manager
Stars: ✭ 99 (-95.63%)
WincmdfuWindows one line commands that make life easier, shortcuts and command line fu.
Stars: ✭ 145 (-93.61%)
Python RansomwarePython Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (-95.77%)
Chatterinternet monitoring osint telegram bot for windows
Stars: ✭ 123 (-94.58%)
Amitt frameworkRepo replaced by cogsec-collaborative/AMITT
Stars: ✭ 152 (-93.3%)
RpcheckuprpCheckup is an AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, and private resources.
Stars: ✭ 91 (-95.99%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (-14.07%)
Apac ConferencesA community contributed consolidated list of InfoSec meetups in the Asia Pacific region.
Stars: ✭ 90 (-96.03%)
BinsnitchDetect silent (unwanted) changes to files on your system
Stars: ✭ 144 (-93.65%)
RoadmapGitBook: OSCP RoadMap
Stars: ✭ 89 (-96.08%)
Awesome Cybersecurity Blueteam💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Stars: ✭ 2,091 (-7.8%)
Sinkholes🐛 Malware Sinkhole List in various formats
Stars: ✭ 84 (-96.3%)
UrlcrazyGenerate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (-93.39%)
PrismaticaResponsive Command and Control System
Stars: ✭ 81 (-96.43%)
Phish CollectPython script to hunt phishing kits
Stars: ✭ 113 (-95.02%)
SubjackSubdomain Takeover tool written in Go
Stars: ✭ 1,194 (-47.35%)
AutosetupAuto setup is a bash script compatible with Debian based distributions to install and setup necessary programs.
Stars: ✭ 140 (-93.83%)
PurifyAll-in-one tool for managing vulnerability reports from AppSec pipelines
Stars: ✭ 72 (-96.83%)
Mongoaudit🔥 A powerful MongoDB auditing and pentesting tool 🔥
Stars: ✭ 1,174 (-48.24%)
Proof Of ConceptsA little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
Stars: ✭ 148 (-93.47%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (-49.91%)
Backfuzzprotocol fuzzing toolkit
Stars: ✭ 106 (-95.33%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-97.27%)
Security TxtA proposed standard that allows websites to define security policies.
Stars: ✭ 1,393 (-38.58%)
KarmaFind leaked emails with your passwords
Stars: ✭ 154 (-93.21%)
NetpwnTool made to automate tasks of pentesting.
Stars: ✭ 152 (-93.3%)
MyriamA vulnerable iOS App with Security Challenges for the Security Researcher inside you.
Stars: ✭ 146 (-93.56%)
Jsonpjsonp is a Burp Extension which attempts to reveal JSONP functionality behind JSON endpoints. This could help reveal cross-site script inclusion vulnerabilities or aid in bypassing content security policies.
Stars: ✭ 131 (-94.22%)
SubtakeAutomatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.
Stars: ✭ 104 (-95.41%)