SmogcloudFind cloud assets that no one wants exposed 🔎 ☁️
Stars: ✭ 168 (+1100%)
PhishapiComprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (+1842.86%)
Start-Menu-ManagerApp to add websites/software/files/folders/scripts to the Windows 10 Start Menu and Taskbar, and priority shortcuts to Windows 10 Search.
Stars: ✭ 126 (+800%)
Application Security Engineer Interview QuestionsSome of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exhaustive list but i felt these questions were important to be asked and some were challenging to answer
Stars: ✭ 267 (+1807.14%)
PwnshopExploit Development, Reverse Engineering & Cryptography
Stars: ✭ 167 (+1092.86%)
CloudbruteAwesome cloud enumerator
Stars: ✭ 268 (+1814.29%)
github-watchmanMonitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (+328.57%)
StalkphishStalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Stars: ✭ 256 (+1728.57%)
AsnlookupLeverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (+1064.29%)
RenginereNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+24464.29%)
Android-LDoSNo description or website provided.
Stars: ✭ 15 (+7.14%)
Open-source-tools-for-CTIPublic Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (+550%)
Python HoneypotOWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (+1042.86%)
remote-code-execution-sampleDemonstrate how usage of the Java Security Manager can prevent Remote Code Execution (RCE) exploits.
Stars: ✭ 18 (+28.57%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+2014.29%)
moonwalkCover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+3785.71%)
LinkfinderA python script that finds endpoints in JavaScript files
Stars: ✭ 2,268 (+16100%)
APAC-MeetupsA community contributed consolidated list of InfoSec meetups in the Asia Pacific region.
Stars: ✭ 52 (+271.43%)
urldedupePass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
Stars: ✭ 208 (+1385.71%)
Pwdb-PublicA collection of all the data i could extract from 1 billion leaked credentials from internet.
Stars: ✭ 2,529 (+17964.29%)
UrlcrazyGenerate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (+971.43%)
dorothyDorothy is a tool to test security monitoring and detection for Okta environments
Stars: ✭ 85 (+507.14%)
h1-searchTool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.
Stars: ✭ 58 (+314.29%)
pyc2bytecodeA Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (+400%)
Amitt frameworkRepo replaced by cogsec-collaborative/AMITT
Stars: ✭ 152 (+985.71%)
Cyber-SecurityThis repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Stars: ✭ 42 (+200%)
Python-KeyloggerPython Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||
Stars: ✭ 55 (+292.86%)
ctf-writeupsWriteups of CTF challenges
Stars: ✭ 19 (+35.71%)
Proof Of ConceptsA little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
Stars: ✭ 148 (+957.14%)
targetsA collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (+507.14%)
hacktheboxNotes Taken for HTB Machines & InfoSec Community.
Stars: ✭ 286 (+1942.86%)
T1tl3A simple python script which can check HTTP status of branch of URLs/Subdomains and grab URLs/Subdomain title
Stars: ✭ 14 (+0%)
WincmdfuWindows one line commands that make life easier, shortcuts and command line fu.
Stars: ✭ 145 (+935.71%)
osmedeus-workflowCommunity Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own
Stars: ✭ 26 (+85.71%)
ronin-supportA support library for Ronin. Like activesupport, but for hacking!
Stars: ✭ 23 (+64.29%)
BinsnitchDetect silent (unwanted) changes to files on your system
Stars: ✭ 144 (+928.57%)
phisherpriceAll In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (+171.43%)
AutosetupAuto setup is a bash script compatible with Debian based distributions to install and setup necessary programs.
Stars: ✭ 140 (+900%)
reconmapVulnerability assessment and penetration testing automation and reporting platform for teams.
Stars: ✭ 242 (+1628.57%)
DDTTXDDTTX Tabletop Trainings
Stars: ✭ 22 (+57.14%)
gwdomainssub domain wild card filtering tool
Stars: ✭ 38 (+171.43%)
fuzzmostall manner of wordlists
Stars: ✭ 23 (+64.29%)
oscp-omnibusA collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (+228.57%)
Oob ServerA Bind9 server for pentesters to use for Out-of-Band vulnerabilities
Stars: ✭ 125 (+792.86%)
SubcertSubcert is an subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.
Stars: ✭ 58 (+314.29%)
pwn-pulseExploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Stars: ✭ 126 (+800%)
Chatterinternet monitoring osint telegram bot for windows
Stars: ✭ 123 (+778.57%)
aa-policy-validatorValidate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation
Stars: ✭ 42 (+200%)
juumla🦁 Juumla is a python tool created to identify Joomla version, scan for vulnerabilities and search for config or backup files.
Stars: ✭ 107 (+664.29%)
DeadDNSDNS hijacking via dead records automation tool
Stars: ✭ 44 (+214.29%)
ArgosThis script will automatically set up an OSINT workstation starting from a Ubuntu OS.
Stars: ✭ 73 (+421.43%)
VPS-Bug-Bounty-ToolsScript that automates the installation of the main tools used for web application penetration testing and Bug Bounty.
Stars: ✭ 44 (+214.29%)
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+49057.14%)