Python HoneypotOWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (-9.6%)
honeykuA Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).
Stars: ✭ 56 (-68.36%)
VindicateToolLLMNR/NBNS/mDNS Spoofing Detection Toolkit
Stars: ✭ 40 (-77.4%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+1001.13%)
BluehivePowerShell based Active Directory Honey User Account Management with Universal Dashboards
Stars: ✭ 126 (-28.81%)
Amitt frameworkRepo replaced by cogsec-collaborative/AMITT
Stars: ✭ 152 (-14.12%)
Sweetie DataThis repo contains logstash of various honeypots
Stars: ✭ 163 (-7.91%)
Phish CollectPython script to hunt phishing kits
Stars: ✭ 113 (-36.16%)
MyriamA vulnerable iOS App with Security Challenges for the Security Researcher inside you.
Stars: ✭ 146 (-17.51%)
Ddos RootsecDDOS Archive by RootSec (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)
Stars: ✭ 108 (-38.98%)
SubtakeAutomatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.
Stars: ✭ 104 (-41.24%)
Jsonpjsonp is a Burp Extension which attempts to reveal JSONP functionality behind JSON endpoints. This could help reveal cross-site script inclusion vulnerabilities or aid in bypassing content security policies.
Stars: ✭ 131 (-25.99%)
UrlcrazyGenerate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (-15.25%)
Chatterinternet monitoring osint telegram bot for windows
Stars: ✭ 123 (-30.51%)
HacktheboxNotes Taken for HTB Machines & InfoSec Community.
Stars: ✭ 167 (-5.65%)
Awesome Cybersecurity Blueteam💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Stars: ✭ 2,091 (+1081.36%)
Umbrella androidOpen source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to dealing with a kidnap. Umbrella has best practice guides in over 40 topics in multiple languages. Used daily by people working in high risk countries - journalists, activists, diplomats, business travelers etc.
Stars: ✭ 171 (-3.39%)
Hacker ContainerContainer with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-40.68%)
WincmdfuWindows one line commands that make life easier, shortcuts and command line fu.
Stars: ✭ 145 (-18.08%)
WsmanagerWebshell Manager
Stars: ✭ 99 (-44.07%)
RoutersploitExploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+5474.01%)
BinsnitchDetect silent (unwanted) changes to files on your system
Stars: ✭ 144 (-18.64%)
GorshA Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
Stars: ✭ 97 (-45.2%)
Gf SecretsSecret and/ credential patterns used for gf.
Stars: ✭ 96 (-45.76%)
KarmaFind leaked emails with your passwords
Stars: ✭ 154 (-12.99%)
Oob ServerA Bind9 server for pentesters to use for Out-of-Band vulnerabilities
Stars: ✭ 125 (-29.38%)
PwnshopExploit Development, Reverse Engineering & Cryptography
Stars: ✭ 167 (-5.65%)
Gitlab WatchmanMonitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (-28.25%)
NetpwnTool made to automate tasks of pentesting.
Stars: ✭ 152 (-14.12%)
Spaces FinderA tool to hunt for publicly accessible DigitalOcean Spaces
Stars: ✭ 122 (-31.07%)
GoaltdnsA permutation generation tool written in golang
Stars: ✭ 119 (-32.77%)
GluttonGeneric Low Interaction Honeypot
Stars: ✭ 151 (-14.69%)
Mitmap📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+762.15%)
AsnlookupLeverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-7.91%)
VirtualsecconsAn ongoing list of virtual cybersecurity conferences.
Stars: ✭ 113 (-36.16%)
Proof Of ConceptsA little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
Stars: ✭ 148 (-16.38%)
NetsetOperational Security utility and automator.
Stars: ✭ 110 (-37.85%)
YarYar is a tool for plunderin' organizations, users and/or repositories.
Stars: ✭ 174 (-1.69%)
Backfuzzprotocol fuzzing toolkit
Stars: ✭ 106 (-40.11%)
HontelTelnet Honeypot
Stars: ✭ 145 (-18.08%)
Security TxtA proposed standard that allows websites to define security policies.
Stars: ✭ 1,393 (+687.01%)
ThreagileAgile Threat Modeling Toolkit
Stars: ✭ 162 (-8.47%)
M4ngl3m3Common password pattern generator using strings list
Stars: ✭ 103 (-41.81%)
Pyiris BackdoorPyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (-18.08%)
SmogcloudFind cloud assets that no one wants exposed 🔎 ☁️
Stars: ✭ 168 (-5.08%)
TannerHe who flays the hide
Stars: ✭ 140 (-20.9%)
S3scannerScan for open AWS S3 buckets and dump the contents
Stars: ✭ 1,319 (+645.2%)
Python RansomwarePython Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (-45.76%)
Breach.twA service that can track data breaches like "Have I Been Pwned", but it is specific for Taiwan.
Stars: ✭ 144 (-18.64%)
Slack WatchmanMonitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (-10.17%)
RpcheckuprpCheckup is an AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, and private resources.
Stars: ✭ 91 (-48.59%)
AutosetupAuto setup is a bash script compatible with Debian based distributions to install and setup necessary programs.
Stars: ✭ 140 (-20.9%)
StegcloakHide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
Stars: ✭ 2,379 (+1244.07%)
Securityadvisories🔐 Security advisories as a simple composer exclusion list, updated daily
Stars: ✭ 2,279 (+1187.57%)
Dymerge🔓 A dynamic dictionary merger for successful dictionary based attacks.
Stars: ✭ 167 (-5.65%)