Flask UnsignCommand line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
Stars: ✭ 90 (-43.04%)
Sn0intSemi-automatic OSINT framework and package manager
Stars: ✭ 814 (+415.19%)
Personal Security Checklist🔒 A curated checklist of 300+ tips for protecting digital security and privacy in 2021
Stars: ✭ 2,388 (+1411.39%)
Cfn nagLinting tool for CloudFormation templates
Stars: ✭ 808 (+411.39%)
Password LeakA library to check for compromised passwords
Stars: ✭ 92 (-41.77%)
SprayingtoolkitScripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
Stars: ✭ 802 (+407.59%)
FrostUnit testing framework for test driven security of AWS, GCP, Heroku and more.
Stars: ✭ 91 (-42.41%)
PompemFind exploit tool
Stars: ✭ 786 (+397.47%)
Security ListPenetrum LLC opensource security tool list.
Stars: ✭ 619 (+291.77%)
TheoEthereum recon and exploitation tool.
Stars: ✭ 112 (-29.11%)
Cloud Discovery Cloud Discovery provides a point in time enumeration of all the cloud native platform services
Stars: ✭ 119 (-24.68%)
EsdEnumeration sub domains(枚举子域名)
Stars: ✭ 785 (+396.84%)
Dsinternals Directory Services Internals (DSInternals) PowerShell Module and Framework
Stars: ✭ 776 (+391.14%)
HashviewA web front-end for password cracking and analytics
Stars: ✭ 601 (+280.38%)
EncpipeThe dum^H^H^Hsimplest encryption tool in the world.
Stars: ✭ 135 (-14.56%)
Viewfinderjs📷 ViewFinder - NodeJS product to make the browser into a web app. WTF RBI. CBII. Remote browser isolation, embeddable browserview, secure chrome saas. Licenses, managed, self-hosted. Like S2, WebGap, Bromium, Authentic8, Menlo Security and Broadcom, but open source with free live demos available now! Also, integrated RBI/CDR with CDR from https://github.com/dosyago/p2%2e
Stars: ✭ 1,175 (+643.67%)
Rapidscan🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+390.51%)
Snopfsnopf USB password token
Stars: ✭ 113 (-28.48%)
WebhashcatHashcat web interface
Stars: ✭ 151 (-4.43%)
Secure Ios App DevCollection of the most common vulnerabilities found in iOS applications
Stars: ✭ 1,288 (+715.19%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+390.51%)
Cli🧰 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.
Stars: ✭ 2,151 (+1261.39%)
Btle SnifferPassively scan for Bluetooth Low Energy devices and attempt to fingerprint them
Stars: ✭ 87 (-44.94%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+383.54%)
Jsprimea javascript static security analysis tool
Stars: ✭ 556 (+251.9%)
CyphonOpen source incident management and response platform.
Stars: ✭ 543 (+243.67%)
IntelowlIntel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Stars: ✭ 2,114 (+1237.97%)
SkyarkSkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS
Stars: ✭ 526 (+232.91%)
Outisoutis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) and platforms (like Powershell).
Stars: ✭ 111 (-29.75%)
MxtractmXtract - Memory Extractor & Analyzer
Stars: ✭ 499 (+215.82%)
Vulscanvulscan 扫描系统:最新的poc&exp漏洞扫描,redis未授权、敏感文件、java反序列化、tomcat命令执行及各种未授权扫描等...
Stars: ✭ 486 (+207.59%)
KccssKubernetes Common Configuration Scoring System
Stars: ✭ 111 (-29.75%)
DronesploitDrone pentesting framework console
Stars: ✭ 473 (+199.37%)
AppmonDocumentation:
Stars: ✭ 1,157 (+632.28%)
AutosploitAutomated Mass Exploiter
Stars: ✭ 4,500 (+2748.1%)
DiscordcryptEnd-To-End File & Message Encryption For Discord
Stars: ✭ 150 (-5.06%)
TracyA tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.
Stars: ✭ 464 (+193.67%)
Cloud Security AuditA command line security audit tool for Amazon Web Services
Stars: ✭ 68 (-56.96%)
SyswallWork in progress firewall for Linux syscalls, written in Rust
Stars: ✭ 110 (-30.38%)
Dradis CeDradis Framework: Colllaboration and reporting for IT Security teams
Stars: ✭ 443 (+180.38%)
InterlaceEasily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+381.01%)
ThreatingestorExtract and aggregate threat intelligence.
Stars: ✭ 439 (+177.85%)
Nimscan🚀 Fast Port Scanner 🚀
Stars: ✭ 134 (-15.19%)
WitnessmeWeb Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to make life easier.
Stars: ✭ 436 (+175.95%)
Centos7 CisAnsible CentOS 7 - CIS Benchmark Hardening Script
Stars: ✭ 64 (-59.49%)
DekstereconWeb Application recon automation
Stars: ✭ 109 (-31.01%)
PattonThe clever vulnerability dependency finder
Stars: ✭ 87 (-44.94%)
ScapyScapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Stars: ✭ 6,932 (+4287.34%)
Encrypt.toSend encrypted PGP messages with one click
Stars: ✭ 116 (-26.58%)
Bypass Firewalls By Dns HistoryFirewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.
Stars: ✭ 739 (+367.72%)
Rails Security Checklist🔑 Community-driven Rails Security Checklist (see our GitHub Issues for the newest checks that aren't yet in the README)
Stars: ✭ 1,265 (+700.63%)
BluespawnAn Active Defense and EDR software to empower Blue Teams
Stars: ✭ 737 (+366.46%)
Clr MeterpreterThe full story of the CLR implementation of Meterpreter
Stars: ✭ 137 (-13.29%)
TerrascanDetect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
Stars: ✭ 2,687 (+1600.63%)