Sinkholes🐛 Malware Sinkhole List in various formats
Stars: ✭ 84 (-74.77%)
Batch-AntivirusBatch Antivirus, a powerful antivirus suite written in batch with real-time protection and heuristical scanning.
Stars: ✭ 26 (-92.19%)
PrismaticaResponsive Command and Control System
Stars: ✭ 81 (-75.68%)
altprobecollector for XDR and security posture service
Stars: ✭ 62 (-81.38%)
SubjackSubdomain Takeover tool written in Go
Stars: ✭ 1,194 (+258.56%)
ivreNetwork recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,712 (+714.41%)
PurifyAll-in-one tool for managing vulnerability reports from AppSec pipelines
Stars: ✭ 72 (-78.38%)
Open-source-tools-for-CTIPublic Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-72.67%)
Mongoaudit🔥 A powerful MongoDB auditing and pentesting tool 🔥
Stars: ✭ 1,174 (+252.55%)
flaskbombGZip HTTP Bombing in Python for everyone
Stars: ✭ 30 (-90.99%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+241.14%)
T1tl3A simple python script which can check HTTP status of branch of URLs/Subdomains and grab URLs/Subdomain title
Stars: ✭ 14 (-95.8%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-81.38%)
urldedupePass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
Stars: ✭ 208 (-37.54%)
Htrace.shMy simple Swiss Army knife for http/https troubleshooting and profiling.
Stars: ✭ 3,465 (+940.54%)
JaelesThe Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+222.22%)
YetiYour Everyday Threat Intelligence
Stars: ✭ 1,037 (+211.41%)
InfoPhishInfoPath Phishing Repo Resource
Stars: ✭ 68 (-79.58%)
ronin-supportA support library for Ronin. Like activesupport, but for hacking!
Stars: ✭ 23 (-93.09%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-77.48%)
xmapXMap is a fast network scanner designed for performing Internet-wide IPv6 & IPv4 network research scanning.
Stars: ✭ 190 (-42.94%)
Legal Bug Bounty#legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.
Stars: ✭ 42 (-87.39%)
nmappyNmapPy - Python implementation of Nmap
Stars: ✭ 27 (-91.89%)
MalcomMalcom - Malware Communications Analyzer
Stars: ✭ 988 (+196.7%)
pwn-pulseExploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Stars: ✭ 126 (-62.16%)
CheckmyhttpsWe propose a user-friendly add-on that allows you to check if your encrypted web traffic (SSL/TLS) towards secured Internet servers (HTTPS) is not intercepted (being listened to).
Stars: ✭ 35 (-89.49%)
VindicateToolLLMNR/NBNS/mDNS Spoofing Detection Toolkit
Stars: ✭ 40 (-87.99%)
Siem From ScratchSIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab
Stars: ✭ 31 (-90.69%)
NetworkAlarmA tool to monitor local network traffic for possible security vulnerabilities. Warns user against possible nmap scans, Nikto scans, credentials sent in-the-clear, and shellshock attacks. Currently supports live monitoring and network capture (pcap) scanning.
Stars: ✭ 17 (-94.89%)
SnoopSnoop — инструмент разведки на основе открытых данных (OSINT world)
Stars: ✭ 886 (+166.07%)
MettaAn information security preparedness tool to do adversarial simulation.
Stars: ✭ 867 (+160.36%)
JiraffeOne stop place for exploiting Jira instances in your proximity
Stars: ✭ 157 (-52.85%)
ChangemeA default credential scanner.
Stars: ✭ 928 (+178.68%)
toolkitThe essential toolkit for reversing, malware analysis, and cracking
Stars: ✭ 176 (-47.15%)
VuldashVulnerability Dashboard
Stars: ✭ 16 (-95.2%)
S3ScanScript to spider a website and find publicly open S3 buckets
Stars: ✭ 21 (-93.69%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+132.73%)
remote-code-execution-sampleDemonstrate how usage of the Java Security Manager can prevent Remote Code Execution (RCE) exploits.
Stars: ✭ 18 (-94.59%)
PerspecScriptable desktop app to correct the perspective of images
Stars: ✭ 523 (+57.06%)
BashfuscatorA fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.
Stars: ✭ 690 (+107.21%)
QR AttendanceThis project is an attendance system which provides attendance on scanning QR code. The attendance is stored in Excel sheet named with the date of attendance taken. In this folder a file named Generate.py is used to generate the QR code for given input file. Attend.py file is for scanning the QR code
Stars: ✭ 17 (-94.89%)
reconmapVulnerability assessment and penetration testing automation and reporting platform for teams.
Stars: ✭ 242 (-27.33%)
nmap-formatterA tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot). Simply put it's nmap converter.
Stars: ✭ 129 (-61.26%)
ConfusedTool to check for dependency confusion vulnerabilities in multiple package management systems
Stars: ✭ 314 (-5.71%)
NETNOOBA simple program written in bash that contains basic Linux network tools, information gathering tools and scanning tools.
Stars: ✭ 105 (-68.47%)
RedTeam toolkitRed Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.
Stars: ✭ 301 (-9.61%)
restincodeA memorial site for Hackers and Infosec people who have passed
Stars: ✭ 62 (-81.38%)
diwaA Deliberately Insecure Web Application
Stars: ✭ 32 (-90.39%)
porteyeDetect alive host and open port .
Stars: ✭ 17 (-94.89%)
N-WEBWEB PENETRATION TESTING TOOL 💥
Stars: ✭ 56 (-83.18%)
Xunfeng巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Stars: ✭ 3,131 (+840.24%)
crawleetWeb Recon & Exploitation Tool.
Stars: ✭ 48 (-85.59%)
gwdomainssub domain wild card filtering tool
Stars: ✭ 38 (-88.59%)
mqttinfoAttempts to determine the configuration, behavior, and type of a remote MQTT broker
Stars: ✭ 17 (-94.89%)
netizenshipa commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (-90.09%)