DronesploitDrone pentesting framework console
Stars: ✭ 473 (+775.93%)
Security4DelphiEnables and use of the concept of security in your Delphi applications
Stars: ✭ 39 (-27.78%)
CspThe Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing confidence and trust among the national Computer Security Incident Response Teams (CSIRTs) of the Member States and for promoting swift and effective operational cooperation.
Stars: ✭ 23 (-57.41%)
DeephackPoC code from DEF CON 25 presentation
Stars: ✭ 222 (+311.11%)
Race The WebTests for race conditions in web applications. Includes a RESTful API to integrate into a continuous integration pipeline.
Stars: ✭ 385 (+612.96%)
Iot PtA Virtual environment for Pentesting IoT Devices
Stars: ✭ 218 (+303.7%)
xssmapIntelligent XSS detection tool that uses human techniques for looking for reflected cross-site scripting (XSS) vulnerabilities
Stars: ✭ 107 (+98.15%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+607.41%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+1335.19%)
GobyAttack surface mapping
Stars: ✭ 446 (+725.93%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-33.33%)
Vulny Code Static AnalysisPython script to detect vulnerabilities inside PHP source code using static analysis, based on regex
Stars: ✭ 207 (+283.33%)
GadgetprobeProbe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.
Stars: ✭ 381 (+605.56%)
Bundler AuditPatch-level verification for Bundler
Stars: ✭ 2,393 (+4331.48%)
PyupA tool to update your project's dependencies on GitHub. Runs on pyup.io, comes with a command line interface.
Stars: ✭ 379 (+601.85%)
ContainersshContainerSSH: Launch containers on demand
Stars: ✭ 195 (+261.11%)
KauditAlcide Kubernetes Audit Log Analyzer - Alcide kAudit
Stars: ✭ 23 (-57.41%)
Awesome BbhtA bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (+251.85%)
Sentinel AttackTools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Stars: ✭ 676 (+1151.85%)
Fudgec2FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (+253.7%)
Rustscan🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+9562.96%)
Social AnalyzerAPI, CLI & Web App for analyzing & finding a person's profile across +1000 social media \ websites (Detections are updated regularly by automated systems)
Stars: ✭ 8,449 (+15546.3%)
AISecurityCameraA simple Security Camera example which detects motion and perform face recognition
Stars: ✭ 27 (-50%)
KnaryA simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams & Pushover support
Stars: ✭ 187 (+246.3%)
Awesome Shodan Queries🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
Stars: ✭ 2,758 (+5007.41%)
UsbguardUSBGuard is a software framework for implementing USB device authorization policies (what kind of USB devices are authorized) as well as method of use policies (how a USB device may interact with the system)
Stars: ✭ 668 (+1137.04%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+237.04%)
AutosploitAutomated Mass Exploiter
Stars: ✭ 4,500 (+8233.33%)
mistCreate complex tools execution Workflows for working together
Stars: ✭ 21 (-61.11%)
DufflebagSearch exposed EBS volumes for secrets
Stars: ✭ 177 (+227.78%)
StegcloakHide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
Stars: ✭ 2,379 (+4305.56%)
Go SafewebSecure-by-default HTTP servers in Go.
Stars: ✭ 366 (+577.78%)
Fact coreFirmware Analysis and Comparison Tool
Stars: ✭ 663 (+1127.78%)
Tools TbhmTools of "The Bug Hunters Methodology V2 by @jhaddix"
Stars: ✭ 171 (+216.67%)
UnsignRemove code signatures from OSX Mach-O binaries (note: unsigned binaries cannot currently be re-codesign'ed. Patches welcome!)
Stars: ✭ 362 (+570.37%)
ZigdiggityA ZigBee hacking toolkit by Bishop Fox
Stars: ✭ 169 (+212.96%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+1768.52%)
DirsearchA Go implementation of dirsearch.
Stars: ✭ 164 (+203.7%)
WssatWEB SERVICE SECURITY ASSESSMENT TOOL
Stars: ✭ 360 (+566.67%)
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+12644.44%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+1314.81%)
Sn1perAttack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+8968.52%)
ExeinExein core for Linux based firmware
Stars: ✭ 158 (+192.59%)
SecretscannerFind secrets and passwords in container images and file systems
Stars: ✭ 895 (+1557.41%)
reconmapVulnerability assessment and penetration testing automation and reporting platform for teams.
Stars: ✭ 242 (+348.15%)
TracyA tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.
Stars: ✭ 464 (+759.26%)
SIPTorchA "SIP Torture" (RFC 4475) testing suite.
Stars: ✭ 54 (+0%)
docker-wallarm-node⚡️ Docker official image for Wallarm Node. API security platform agent.
Stars: ✭ 18 (-66.67%)
VhostscanA virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+1320.37%)
TurbiniaAutomation and Scaling of Digital Forensics Tools
Stars: ✭ 461 (+753.7%)