HabuHacking Toolkit
Stars: ✭ 635 (+703.8%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+440.51%)
SoteriaPlugin to block compilation when unapproved dependencies are used or code styling does not comply.
Stars: ✭ 36 (-54.43%)
GobyAttack surface mapping
Stars: ✭ 446 (+464.56%)
Rustscan🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+6505.06%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+130.38%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+422.78%)
HellraiserVulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (+422.78%)
H1domainsHackerOne "in scope" domains
Stars: ✭ 223 (+182.28%)
Cheatsheet GodPenetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+4356.96%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+867.09%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-21.52%)
TaipanWeb application vulnerability scanner
Stars: ✭ 359 (+354.43%)
RecsechRecsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected, Subdomain takeovers, Reconnaissance On Github and much more you can see in Features in tools .
Stars: ✭ 173 (+118.99%)
W5Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (+364.56%)
Zbn安全编排与自动化响应平台
Stars: ✭ 201 (+154.43%)
PigA Linux packet crafting tool.
Stars: ✭ 384 (+386.08%)
VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+11094.94%)
Search That Hash🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+489.87%)
Ioc ExplorerExplore Indicators of Compromise Automatically
Stars: ✭ 73 (-7.59%)
DronesploitDrone pentesting framework console
Stars: ✭ 473 (+498.73%)
YasuoA ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (+554.43%)
Name That Hash🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 3000+ other hashes ☄ Comes with a neat web app 🔥
Stars: ✭ 540 (+583.54%)
MonkeyInfection Monkey - An automated pentest tool
Stars: ✭ 5,572 (+6953.16%)
GosecGolang security checker
Stars: ✭ 5,694 (+7107.59%)
Jok3rJok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (+716.46%)
AtlasQuick SQLMap Tamper Suggester
Stars: ✭ 679 (+759.49%)
Appinfoscanner一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
Stars: ✭ 424 (+436.71%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+544.3%)
HackerproAll in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog
Stars: ✭ 474 (+500%)
Saint👁 (s)AINT is a Spyware Generator for Windows systems written in Java. [Discontinued]
Stars: ✭ 522 (+560.76%)
BurpaBurp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Application Security Testing (DAST).
Stars: ✭ 427 (+440.51%)
XspearPowerfull XSS Scanning and Parameter analysis tool&gem
Stars: ✭ 583 (+637.97%)
ThefatratThefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+7424.05%)
IosMost usable tools for iOS penetration testing
Stars: ✭ 563 (+612.66%)
BrakemanA static analysis security vulnerability scanner for Ruby on Rails applications
Stars: ✭ 6,281 (+7850.63%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+817.72%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (+821.52%)
UrsadbTrigram database written in C++, suited for malware indexing
Stars: ✭ 72 (-8.86%)
Anti Ddos🔒 Anti DDOS | Bash Script Project 🔒
Stars: ✭ 561 (+610.13%)
HardeningHardening Ubuntu. Systemd edition.
Stars: ✭ 705 (+792.41%)
ScapyScapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Stars: ✭ 6,932 (+8674.68%)
InterlaceEasily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+862.03%)
OssaOpen-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (+907.59%)
Bmonbandwidth monitor and rate estimator
Stars: ✭ 787 (+896.2%)
TorbotDark Web OSINT Tool
Stars: ✭ 821 (+939.24%)
PurifyAll-in-one tool for managing vulnerability reports from AppSec pipelines
Stars: ✭ 72 (-8.86%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+881.01%)
NexerContent based network multiplexer or redirector made with love and Go
Stars: ✭ 7 (-91.14%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+1035.44%)
DracnmapDracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+989.87%)
PulseNetwork Inspector for Apple Platforms
Stars: ✭ 841 (+964.56%)
Sst ElementsSST Architectural Simulation Components and Libraries
Stars: ✭ 36 (-54.43%)
ShellshockhunterIt's a simple tool for test vulnerability shellshock
Stars: ✭ 52 (-34.18%)
SubdomainizerA tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.
Stars: ✭ 915 (+1058.23%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+1177.22%)
SpellbookMicro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-32.91%)