YlvaCommand line password manager for Unix-like operating systems
Stars: ✭ 23 (-83.45%)
Nordvpn NetworkmanagerA CLI tool for automating the importing, securing and usage of NordVPN (and in the future, more) OpenVPN servers through NetworkManager.
Stars: ✭ 111 (-20.14%)
Hackertarget🎯 HackerTarget ToolKit - Tools And Network Intelligence To Help Organizations With Attack Surface Discovery 🎯
Stars: ✭ 320 (+130.22%)
SubdomainizerA tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.
Stars: ✭ 915 (+558.27%)
NmapguiAdvanced Graphical User Interface for NMap
Stars: ✭ 318 (+128.78%)
Envkey AppSecure, human-friendly, cross-platform secrets and config.
Stars: ✭ 83 (-40.29%)
RaptorWeb-based Source Code Vulnerability Scanner
Stars: ✭ 314 (+125.9%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+545.32%)
PolichombrCollaborative malware analysis framework
Stars: ✭ 307 (+120.86%)
Ebs Automatic Nvme MappingAutomatic mapping of EBS volumes via NVMe block devices to standard block device paths
Stars: ✭ 136 (-2.16%)
Ethereum ListsA repository for maintaining lists of things like malicious URLs, fake token addresses, and so forth. We love lists.
Stars: ✭ 300 (+115.83%)
H2csmugglerHTTP Request Smuggling over HTTP/2 Cleartext (h2c)
Stars: ✭ 292 (+110.07%)
HeraldingCredentials catching honeypot
Stars: ✭ 297 (+113.67%)
MarsnakeSystem Optimizer and Monitoring, Security Auditing, Vulnerability scanner for Linux, macOS, and UNIX-based systems
Stars: ✭ 16 (-88.49%)
Cheatsheet GodPenetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+2433.09%)
SyswallWork in progress firewall for Linux syscalls, written in Rust
Stars: ✭ 110 (-20.86%)
TorbotDark Web OSINT Tool
Stars: ✭ 821 (+490.65%)
SpoofcheckSimple script that checks a domain for email protections
Stars: ✭ 437 (+214.39%)
Traitor⬆️ ☠️ Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket
Stars: ✭ 3,473 (+2398.56%)
Sysmon ModularA repository of sysmon configuration modules
Stars: ✭ 1,229 (+784.17%)
CloudfruntA tool for identifying misconfigured CloudFront domains
Stars: ✭ 281 (+102.16%)
ThugPython low-interaction honeyclient
Stars: ✭ 818 (+488.49%)
Kube Psp AdvisorHelp building an adaptive and fine-grained pod security policy
Stars: ✭ 280 (+101.44%)
Burp ExporterExporter is a Burp Suite extension to copy a request to the clipboard as multiple programming languages functions.
Stars: ✭ 122 (-12.23%)
Certificates🛡️ A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH.
Stars: ✭ 3,693 (+2556.83%)
SprayingtoolkitScripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
Stars: ✭ 802 (+476.98%)
Recon PipelineAn automated target reconnaissance pipeline.
Stars: ✭ 278 (+100%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-43.17%)
Recon My WayThis repository created for personal use and added tools from my latest blog post.
Stars: ✭ 271 (+94.96%)
PompemFind exploit tool
Stars: ✭ 786 (+465.47%)
NerveNERVE Continuous Vulnerability Scanner
Stars: ✭ 267 (+92.09%)
DekstereconWeb Application recon automation
Stars: ✭ 109 (-21.58%)
Salt ScannerLinux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration
Stars: ✭ 261 (+87.77%)
Webhookwebhook is a lightweight incoming webhook server to run shell commands
Stars: ✭ 7,201 (+5080.58%)
CertaintyAutomated cacert.pem management for PHP projects
Stars: ✭ 255 (+83.45%)
Radio HackboxPoC tool to demonstrate vulnerabilities in wireless input devices
Stars: ✭ 74 (-46.76%)
ElectriceyeContinuously monitor your AWS services for configurations that can lead to degradation of confidentiality, integrity or availability. All results will be sent to Security Hub for further aggregation and analysis.
Stars: ✭ 255 (+83.45%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+457.55%)
SoteriaPlugin to block compilation when unapproved dependencies are used or code styling does not comply.
Stars: ✭ 36 (-74.1%)
O365sprayUsername enumeration and password spraying tool aimed at Microsoft O365.
Stars: ✭ 133 (-4.32%)
MicrosoftWontFixListA list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. This list covers only vulnerabilities that came up in July 2021 (and SpoolSample ;-))
Stars: ✭ 854 (+514.39%)
VhostscanA virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+451.8%)
box-appServerThe Staff-Manager App Server for Enterprise Token Safe BOX
Stars: ✭ 22 (-84.17%)
Nrf24 PlaysetSoftware tools for Nordic Semiconductor nRF24-based devices like wireless keyboards, mice, and presenters
Stars: ✭ 73 (-47.48%)
Sysadmin UtilTools for Linux/Unix sysadmins.
Stars: ✭ 761 (+447.48%)
EmbedosEmbedOS - Embedded security testing virtual machine
Stars: ✭ 108 (-22.3%)
NetboxInfrastructure resource modeling for network automation. Open source under Apache 2. Public demo: https://demo.netbox.dev
Stars: ✭ 9,310 (+6597.84%)
WitnessmeWeb Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to make life easier.
Stars: ✭ 436 (+213.67%)
Cookie crimesRead local Chrome cookies without root or decrypting
Stars: ✭ 434 (+212.23%)
Ioc ExplorerExplore Indicators of Compromise Automatically
Stars: ✭ 73 (-47.48%)
Personal Security Checklist🔒 A curated checklist of 300+ tips for protecting digital security and privacy in 2021
Stars: ✭ 2,388 (+1617.99%)
Clr MeterpreterThe full story of the CLR implementation of Meterpreter
Stars: ✭ 137 (-1.44%)
AdamsUNIX system administration in Common Lisp
Stars: ✭ 135 (-2.88%)
Njsscannjsscan is a semantic aware SAST tool that can find insecure code patterns in your Node.js applications.
Stars: ✭ 128 (-7.91%)
Dns DiscoveryDNS-Discovery is a multithreaded subdomain bruteforcer.
Stars: ✭ 114 (-17.99%)
VsauditVOIP Security Audit Framework
Stars: ✭ 97 (-30.22%)