PgenCommand-line passphrase generator
Stars: ✭ 68 (-68.37%)
Web ShellsSome of the best web shells that you might need!
Stars: ✭ 162 (-24.65%)
W5Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (+70.7%)
LynisLynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+4149.77%)
PatrowlmanagerPatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (+68.84%)
Privacy RespectingCurated List of Privacy Respecting Services and Software
Stars: ✭ 1,663 (+673.49%)
ThreatmapperIdentify vulnerabilities in running containers, images, hosts and repositories
Stars: ✭ 361 (+67.91%)
Fhe Toolkit LinuxIBM Fully Homomorphic Encryption Toolkit For Linux. This toolkit is a Linux based Docker container that demonstrates computing on encrypted data without decrypting it! The toolkit ships with two demos including a fully encrypted Machine Learning inference with a Neural Network and a Privacy-Preserving key-value search.
Stars: ✭ 1,123 (+422.33%)
TaipanWeb application vulnerability scanner
Stars: ✭ 359 (+66.98%)
LimitrrLight NodeJS rate limiting and response delaying using Redis - including Express middleware.
Stars: ✭ 203 (-5.58%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-71.16%)
KatanaA Python Tool For google Hacking
Stars: ✭ 355 (+65.12%)
NosqliNoSql Injection CLI tool, for finding vulnerable websites using MongoDB.
Stars: ✭ 120 (-44.19%)
WatchdogWatchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (+60.47%)
Audit scriptsScripts to gather system configuration information for offline/remote auditing
Stars: ✭ 55 (-74.42%)
Syzkallersyzkaller is an unsupervised coverage-guided kernel fuzzer
Stars: ✭ 3,841 (+1686.51%)
NebulousadNebulousAD automated credential auditing tool.
Stars: ✭ 158 (-26.51%)
Ssh Mitmssh mitm server for security audits supporting public key authentication, session hijacking and file manipulation
Stars: ✭ 335 (+55.81%)
Linux Secureboot KitTool for complete hardening of Linux boot chain with UEFI Secure Boot
Stars: ✭ 54 (-74.88%)
SipptsSet of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-46.05%)
Hackertarget🎯 HackerTarget ToolKit - Tools And Network Intelligence To Help Organizations With Attack Surface Discovery 🎯
Stars: ✭ 320 (+48.84%)
SpellbookMicro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-75.35%)
Attack monitorEndpoint detection & Malware analysis software
Stars: ✭ 186 (-13.49%)
ProwlerProwler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+2021.4%)
Ethereum ListsA repository for maintaining lists of things like malicious URLs, fake token addresses, and so forth. We love lists.
Stars: ✭ 300 (+39.53%)
SojoboA binary analysis framework
Stars: ✭ 116 (-46.05%)
H2csmugglerHTTP Request Smuggling over HTTP/2 Cleartext (h2c)
Stars: ✭ 292 (+35.81%)
PystatAdvanced Netstat Using Python For Windows
Stars: ✭ 44 (-79.53%)
HeraldingCredentials catching honeypot
Stars: ✭ 297 (+38.14%)
DnsbinThe request.bin of DNS request
Stars: ✭ 157 (-26.98%)
Cheatsheet GodPenetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+1537.67%)
ToxicAn ncurses-based Tox client (please make pull requests on the development fork: https://github.com/toktok/toxic)
Stars: ✭ 987 (+359.07%)
SusanooA REST API security testing framework.
Stars: ✭ 287 (+33.49%)
Dns DiscoveryDNS-Discovery is a multithreaded subdomain bruteforcer.
Stars: ✭ 114 (-46.98%)
Traitor⬆️ ☠️ Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket
Stars: ✭ 3,473 (+1515.35%)
DirhuntFind web directories without bruteforce
Stars: ✭ 983 (+357.21%)
CloudfruntA tool for identifying misconfigured CloudFront domains
Stars: ✭ 281 (+30.7%)
ReplicaGhidra Analysis Enhancer 🐉
Stars: ✭ 194 (-9.77%)
Kube Psp AdvisorHelp building an adaptive and fine-grained pod security policy
Stars: ✭ 280 (+30.23%)
Exein Openwrt PublicOpenwrt 18.06.5 featured with the Exein's security framework
Stars: ✭ 36 (-83.26%)
Certificates🛡️ A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH.
Stars: ✭ 3,693 (+1617.67%)
Bag Of HoldingAn application to assist in the organization and prioritization of software security activities.
Stars: ✭ 114 (-46.98%)
Recon My WayThis repository created for personal use and added tools from my latest blog post.
Stars: ✭ 271 (+26.05%)
MqueryYARA malware query accelerator (web frontend)
Stars: ✭ 264 (+22.79%)
NetpwnTool made to automate tasks of pentesting.
Stars: ✭ 152 (-29.3%)
Social AnalyzerAPI, CLI & Web App for analyzing & finding a person's profile across +1000 social media \ websites (Detections are updated regularly by automated systems)
Stars: ✭ 8,449 (+3829.77%)
Vulny Code Static AnalysisPython script to detect vulnerabilities inside PHP source code using static analysis, based on regex
Stars: ✭ 207 (-3.72%)
Zbn安全编排与自动化响应平台
Stars: ✭ 201 (-6.51%)
Fudgec2FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (-11.16%)
Tools TbhmTools of "The Bug Hunters Methodology V2 by @jhaddix"
Stars: ✭ 171 (-20.47%)
EncpipeThe dum^H^H^Hsimplest encryption tool in the world.
Stars: ✭ 135 (-37.21%)
PattonThe clever vulnerability dependency finder
Stars: ✭ 87 (-59.53%)
BlackmambaC2/post-exploitation framework
Stars: ✭ 544 (+153.02%)