Nordvpn NetworkmanagerA CLI tool for automating the importing, securing and usage of NordVPN (and in the future, more) OpenVPN servers through NetworkManager.
Stars: ✭ 111 (+825%)
SyswallWork in progress firewall for Linux syscalls, written in Rust
Stars: ✭ 110 (+816.67%)
Traitor⬆️ ☠️ Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket
Stars: ✭ 3,473 (+28841.67%)
DekstereconWeb Application recon automation
Stars: ✭ 109 (+808.33%)
WhalerProgram to reverse Docker images into Dockerfiles
Stars: ✭ 670 (+5483.33%)
EmbedosEmbedOS - Embedded security testing virtual machine
Stars: ✭ 108 (+800%)
Wire Ios📱 Wire for iOS (iPhone and iPad)
Stars: ✭ 3,079 (+25558.33%)
JwtA JWT (JSON Web Token) Encoder & Decoder
Stars: ✭ 107 (+791.67%)
Vulscanvulscan 扫描系统:最新的poc&exp漏洞扫描,redis未授权、敏感文件、java反序列化、tomcat命令执行及各种未授权扫描等...
Stars: ✭ 486 (+3950%)
PatrowldocsPatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 105 (+775%)
Workbase ServerSlack alternative, email integrated, build with Meteor
Stars: ✭ 284 (+2266.67%)
KarnSimplifying Seccomp enforcement in containerized or non-containerized apps
Stars: ✭ 104 (+766.67%)
LfFully Decentralized Fully Replicated Key/Value Store
Stars: ✭ 809 (+6641.67%)
Security ScriptsA collection of public offensive and defensive security related scripts for InfoSec students.
Stars: ✭ 101 (+741.67%)
Awesome Aws SecurityCurated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS Security
Stars: ✭ 100 (+733.33%)
PowershellarmouryA PowerShell armoury for penetration testers or other random security guys
Stars: ✭ 99 (+725%)
User.jsFirefox privacy, security and anti-tracking: a comprehensive user.js template for configuration and hardening
Stars: ✭ 4,404 (+36600%)
RegtweaksRegistry Tweaks for Windows.
Stars: ✭ 675 (+5525%)
SquealerTelling tales on you for leaking secrets!
Stars: ✭ 97 (+708.33%)
SecurecodeboxsecureCodeBox (SCB) - continuous secure delivery out of the box
Stars: ✭ 279 (+2225%)
Keylogger🔐 Open Source Python Keylogger Collection
Stars: ✭ 97 (+708.33%)
Browser🌍 Take back your privacy with Dot Browser, the privacy-conscious web browser that protects you from being tracked and monitored online.
Stars: ✭ 475 (+3858.33%)
AttacksurfaceanalyzerAttack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
Stars: ✭ 1,341 (+11075%)
DgfraudA Deep Graph-based Toolbox for Fraud Detection
Stars: ✭ 281 (+2241.67%)
Golang TlsSimple Golang HTTPS/TLS Examples
Stars: ✭ 857 (+7041.67%)
Aws Securitygroup GrapherThis ansible role gets information from an AWS VPC and generate a graphical representation of security groups
Stars: ✭ 93 (+675%)
Recon PipelineAn automated target reconnaissance pipeline.
Stars: ✭ 278 (+2216.67%)
Password LeakA library to check for compromised passwords
Stars: ✭ 92 (+666.67%)
DronesploitDrone pentesting framework console
Stars: ✭ 473 (+3841.67%)
PattonThe clever vulnerability dependency finder
Stars: ✭ 87 (+625%)
Personal Kanban📌 Personal Kanban Board is an agile project management tool that helps you visualise your work, limit your work-in-progress (WIP) and to craft & optimise your work flow to get the maximum output. To achieve this, it makes use of columns and cards. Personal Kanban offers visual clue, columns, WIP limits, start point and end point to set you up for success.
Stars: ✭ 268 (+2133.33%)
Envkey AppSecure, human-friendly, cross-platform secrets and config.
Stars: ✭ 83 (+591.67%)
ShredditRemove your comment history on Reddit as deleting an account does not do so.
Stars: ✭ 669 (+5475%)
FpndPython package for freepn network daemon
Stars: ✭ 271 (+2158.33%)
Sysmon ModularA repository of sysmon configuration modules
Stars: ✭ 1,229 (+10141.67%)
AutosploitAutomated Mass Exploiter
Stars: ✭ 4,500 (+37400%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (+558.33%)
NerveNERVE Continuous Vulnerability Scanner
Stars: ✭ 267 (+2125%)
Syzkallersyzkaller is an unsupervised coverage-guided kernel fuzzer
Stars: ✭ 3,841 (+31908.33%)
ZbangzBang is a risk assessment tool that detects potential privileged account threats
Stars: ✭ 224 (+1766.67%)
OssaOpen-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (+6533.33%)
MqueryYARA malware query accelerator (web frontend)
Stars: ✭ 264 (+2100%)
NotrulerThe opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.
Stars: ✭ 72 (+500%)
BertyBerty is a secure peer-to-peer messaging app that works with or without internet access, cellular data or trust in the network
Stars: ✭ 5,101 (+42408.33%)
H1domainsHackerOne "in scope" domains
Stars: ✭ 223 (+1758.33%)
Salt ScannerLinux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration
Stars: ✭ 261 (+2075%)
Py FakenamePython wrapper for making fake identities with fakena.me
Stars: ✭ 11 (-8.33%)
WhoamiWhoami is a Linux privacy tool developed to keep you anonymous at the highest level.
Stars: ✭ 858 (+7050%)
TrivyScanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues
Stars: ✭ 9,673 (+80508.33%)
TorbotDark Web OSINT Tool
Stars: ✭ 821 (+6741.67%)
InqlInQL - A Burp Extension for GraphQL Security Testing
Stars: ✭ 715 (+5858.33%)
Tor2webTor2web is an HTTP proxy software that enables access to Tor Hidden Services by mean of common web browsers
Stars: ✭ 531 (+4325%)