ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (+360.76%)
CsetCybersecurity Evaluation Tool
Stars: ✭ 304 (+92.41%)
BurpdeveltrainingMaterial for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"
Stars: ✭ 302 (+91.14%)
Zeek Plugin EnipZeek network security monitor plugin that enables parsing of the Ethernet/IP and Common Industrial Protocol standards
Stars: ✭ 27 (-82.91%)
DotdotslashSearch for Directory Traversal Vulnerabilities
Stars: ✭ 297 (+87.97%)
SwiftnessA note-taking macOS app for penetration-testers.
Stars: ✭ 124 (-21.52%)
BanditBandit is a tool designed to find common security issues in Python code.
Stars: ✭ 3,763 (+2281.65%)
PantherDetect threats with log data and improve cloud security posture
Stars: ✭ 885 (+460.13%)
RmiscoutRMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities
Stars: ✭ 296 (+87.34%)
SliverAdversary Simulation Framework
Stars: ✭ 1,348 (+753.16%)
SojoboA binary analysis framework
Stars: ✭ 116 (-26.58%)
Dependency TrackDependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
Stars: ✭ 718 (+354.43%)
WhatwebNext generation web scanner
Stars: ✭ 3,503 (+2117.09%)
Git ScannerA tool for bug hunting or pentesting for targeting websites that have open .git repositories available in public
Stars: ✭ 157 (-0.63%)
OsmedeusFully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+2046.2%)
SootyThe SOC Analysts all-in-one CLI tool to automate and speed up workflow.
Stars: ✭ 867 (+448.73%)
Kube Psp AdvisorHelp building an adaptive and fine-grained pod security policy
Stars: ✭ 280 (+77.22%)
TrivyScanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues
Stars: ✭ 9,673 (+6022.15%)
Fail2banDaemon to ban hosts that cause multiple authentication errors
Stars: ✭ 6,677 (+4125.95%)
PbscanFaster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.
Stars: ✭ 122 (-22.78%)
Recon PipelineAn automated target reconnaissance pipeline.
Stars: ✭ 278 (+75.95%)
ChangemeA default credential scanner.
Stars: ✭ 928 (+487.34%)
DependencycheckOWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
Stars: ✭ 3,571 (+2160.13%)
GorshA Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
Stars: ✭ 97 (-38.61%)
YlvaCommand line password manager for Unix-like operating systems
Stars: ✭ 23 (-85.44%)
Pentesting CookbookA set of recipes useful in pentesting and red teaming scenarios
Stars: ✭ 82 (-48.1%)
Netsec Ps ScriptsCollection of PowerShell network security scripts for system administrators.
Stars: ✭ 139 (-12.03%)
CansinaWeb Content Discovery Tool
Stars: ✭ 709 (+348.73%)
CertaintyAutomated cacert.pem management for PHP projects
Stars: ✭ 255 (+61.39%)
DetexploitOSS Vulnerability Scanner for Windows Platform
Stars: ✭ 146 (-7.59%)
Edr Testing ScriptTest the accuracy of Endpoint Detection and Response (EDR) software with simple script which executes various ATT&CK/LOLBAS/Invoke-CradleCrafter/Invoke-DOSfuscation payloads
Stars: ✭ 136 (-13.92%)
WynisAudit Windows Security with best Practice
Stars: ✭ 116 (-26.58%)
Web exploit detectorThe Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
Stars: ✭ 81 (-48.73%)
Gg ShieldDetect secret in source code, scan your repo for leaks. Find secrets with GitGuardian and prevent leaked credentials. GitGuardian is an automated secrets detection & remediation service.
Stars: ✭ 708 (+348.1%)
MicrosoftWontFixListA list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. This list covers only vulnerabilities that came up in July 2021 (and SpoolSample ;-))
Stars: ✭ 854 (+440.51%)
SecretscannerFind secrets and passwords in container images and file systems
Stars: ✭ 895 (+466.46%)
box-appServerThe Staff-Manager App Server for Enterprise Token Safe BOX
Stars: ✭ 22 (-86.08%)
CloudsploitCloud Security Posture Management (CSPM)
Stars: ✭ 1,338 (+746.84%)
Deprecated Patrol Rules AwsA set of functions implemented using lambda-cfn to monitor an organization's AWS infrastructure for best practices, security and compliance.
Stars: ✭ 16 (-89.87%)
HyugaHyuga 一个用来记录DNS查询和HTTP请求的监控工具。
Stars: ✭ 148 (-6.33%)
KInspectorKInspector is an application for analyzing health, performance and security of your Kentico solution.
Stars: ✭ 54 (-65.82%)
Vivalasvenus@viva_las_venus -- This project is to learn, teach and awareness about privacy and security in the digital life, to build a better, more open and more inclusive world together!
Stars: ✭ 16 (-89.87%)
AmdhAndroid Mobile Device Hardening
Stars: ✭ 95 (-39.87%)
Sysmon ModularA repository of sysmon configuration modules
Stars: ✭ 1,229 (+677.85%)
StacoanStaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.
Stars: ✭ 707 (+347.47%)
Scilla🏴☠️ Information Gathering tool 🏴☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-26.58%)
R0akr0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems
Stars: ✭ 698 (+341.77%)
WhalerProgram to reverse Docker images into Dockerfiles
Stars: ✭ 670 (+324.05%)
Pest🐞 Primitive Erlang Security Tool
Stars: ✭ 79 (-50%)
Sentinel AttackTools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Stars: ✭ 676 (+327.85%)
Dns DiscoveryDNS-Discovery is a multithreaded subdomain bruteforcer.
Stars: ✭ 114 (-27.85%)