Zap CliA simple tool for interacting with OWASP ZAP from the commandline.
Stars: ✭ 166 (+22.96%)
W5Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (+171.85%)
VhostscanA virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+468.15%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-54.07%)
YamsA collection of Ansible roles for automating infosec builds.
Stars: ✭ 98 (-27.41%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-14.07%)
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-28.15%)
CloudsploitCloud Security Posture Management (CSPM)
Stars: ✭ 1,338 (+891.11%)
PentaOpen source all-in-one CLI tool to semi-automate pentesting.
Stars: ✭ 130 (-3.7%)
ActionpacksPublic PowerShell script gallery for ScriptRunner.
Stars: ✭ 118 (-12.59%)
Github DorksFind leaked secrets via github search
Stars: ✭ 1,332 (+886.67%)
Ssh MitmSSH man-in-the-middle tool
Stars: ✭ 1,328 (+883.7%)
ErodirA fast web directory/file enumeration tool written in Rust
Stars: ✭ 94 (-30.37%)
BadpodsA collection of manifests that will create pods with elevated privileges.
Stars: ✭ 93 (-31.11%)
Nimscan🚀 Fast Port Scanner 🚀
Stars: ✭ 134 (-0.74%)
JwtxploiterA tool to test security of json web token
Stars: ✭ 130 (-3.7%)
Adfs2Multi Vagrant environment with Active Directory
Stars: ✭ 117 (-13.33%)
Aws Securitygroup GrapherThis ansible role gets information from an AWS VPC and generate a graphical representation of security groups
Stars: ✭ 93 (-31.11%)
Pentest GuidePenetration tests guide based on OWASP including test cases, resources and examples.
Stars: ✭ 1,316 (+874.81%)
Encrypt.toSend encrypted PGP messages with one click
Stars: ✭ 116 (-14.07%)
Flask UnsignCommand line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
Stars: ✭ 90 (-33.33%)
InstabruteInstagram password bruteforcer
Stars: ✭ 91 (-32.59%)
Django DefectdojoDefectDojo is an open-source application vulnerability correlation and security orchestration tool.
Stars: ✭ 1,926 (+1326.67%)
WynisAudit Windows Security with best Practice
Stars: ✭ 116 (-14.07%)
FrostUnit testing framework for test driven security of AWS, GCP, Heroku and more.
Stars: ✭ 91 (-32.59%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+7641.48%)
Scilla🏴☠️ Information Gathering tool 🏴☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-14.07%)
PowershellPowerShell functions and scripts (Azure, Active Directory, SCCM, SCSM, Exchange, O365, ...)
Stars: ✭ 1,302 (+864.44%)
RoadmapGitBook: OSCP RoadMap
Stars: ✭ 89 (-34.07%)
Dark Fantasy Hack ToolDDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file system of websites.. Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities.) Web Spider: For gathering web application hacking information. Email scraper: To get all emails related to a webpage IMDB Rating: Easy way to access the movie database. Both .exe(compressed as zip) and .py versions are available in files.
Stars: ✭ 131 (-2.96%)
Find Sec BugsThe SpotBugs plugin for security audits of Java web applications and Android applications. (Also work with Kotlin, Groovy and Scala projects)
Stars: ✭ 1,748 (+1194.81%)
PsadhealthA toolkit of AD specific health checks that you can run in your environment to ensure your Active Directory is running optimally.
Stars: ✭ 114 (-15.56%)
Eyes.shLet's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?"
Stars: ✭ 89 (-34.07%)
Awesome HackingAwesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+1234.81%)
Secure Ios App DevCollection of the most common vulnerabilities found in iOS applications
Stars: ✭ 1,288 (+854.07%)
C Jwt CrackerJWT brute force cracker written in C
Stars: ✭ 1,282 (+849.63%)
PidrilaPython Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (-7.41%)
TheoEthereum recon and exploitation tool.
Stars: ✭ 112 (-17.04%)
Btle SnifferPassively scan for Bluetooth Low Energy devices and attempt to fingerprint them
Stars: ✭ 87 (-35.56%)
In Spectre MeltdownThis tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-36.3%)
DockleContainer Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start
Stars: ✭ 1,713 (+1168.89%)
ThecollectiveThe Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-37.04%)
Rails Security Checklist🔑 Community-driven Rails Security Checklist (see our GitHub Issues for the newest checks that aren't yet in the README)
Stars: ✭ 1,265 (+837.04%)
TrigmapA wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (-2.22%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+8393.33%)
ElpscrkA Common User Passwords generator script that looks like the tool Eliot used it in Mr.Robot Series Episode 01 :D :v
Stars: ✭ 113 (-16.3%)
One Lin3rGives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+832.59%)
Gitjacker🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (+825.19%)
Wooyunwooyun public information backup
Stars: ✭ 112 (-17.04%)
Beef Over WanBrowser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-39.26%)
PakuriPenetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (-7.41%)
KccssKubernetes Common Configuration Scoring System
Stars: ✭ 111 (-17.78%)
Web exploit detectorThe Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
Stars: ✭ 81 (-40%)
Koa2 RatelimitRate-limiting middleware for Koa2 ES6. Use to limit repeated requests to APIs and/or endpoints such as password reset.
Stars: ✭ 81 (-40%)
Mitm Scripts🔄 A collection of mitmproxy inline scripts
Stars: ✭ 109 (-19.26%)
HoundsploitAn advanced graphical search engine for Exploit-DB
Stars: ✭ 81 (-40%)
DeathstarUses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive TTPs.
Stars: ✭ 1,221 (+804.44%)
Information SecurityA place where I can create, collect and share tooling, resources and knowledge about information security.
Stars: ✭ 135 (+0%)
Bonobo Git ServerBonobo Git Server for Windows is a web application you can install on your IIS and easily manage and connect to your git repositories. Go to homepage for release and more info.
Stars: ✭ 1,693 (+1154.07%)
Buffer overflowDon't let buffer overflows overflow your mind
Stars: ✭ 131 (-2.96%)