AboutsecurityA list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (-19.81%)
Awesome Internet ScanningA curated list of awesome Internet port and host scanners, plus related components and much more, with a focus on free and open source projects.
Stars: ✭ 130 (-37.2%)
Grab.jsfast TCP banner grabbing with node.js
Stars: ✭ 33 (-84.06%)
Security ScriptsA collection of security related Python and Bash shell scripts. Analyze hosts on generic security vulnerabilities. Wrapper around popular tools like nmap (portscanner), nikto (webscanner) and testssl.sh (SSL/TLS scanner)
Stars: ✭ 188 (-9.18%)
NsudoSeries of System Administration Tools
Stars: ✭ 945 (+356.52%)
Nwatch🔍 Tool for - Host Discovery, Port Scanning and Operating System Fingerprinting
Stars: ✭ 127 (-38.65%)
DracnmapDracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+315.94%)
AsnlookupLeverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-21.26%)
SpookflareLoader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
Stars: ✭ 836 (+303.86%)
Nmap Cheatsheet📓 Reference guide for scanning networks with Nmap.
Stars: ✭ 124 (-40.1%)
GoscanInteractive Network Scanner
Stars: ✭ 795 (+284.06%)
DiscoverCustom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Stars: ✭ 2,548 (+1130.92%)
SelksA Suricata based IDS/IPS distro
Stars: ✭ 707 (+241.55%)
EternalviewEternalView is an all in one basic information gathering and vulnerability assessment tool
Stars: ✭ 118 (-43%)
ServerscanServerScan一款使用Golang开发的高并发网络扫描、服务探测工具。
Stars: ✭ 674 (+225.6%)
Antimalware ResearchResearch on Anti-malware and other related security solutions
Stars: ✭ 163 (-21.26%)
SeccubusEasy automated vulnerability scanning, reporting and analysis
Stars: ✭ 615 (+197.1%)
SilverMass scan IPs for vulnerable services
Stars: ✭ 588 (+184.06%)
BriaridsAn All-In-One home intrusion detection system (IDS) solution for the Raspberry PI.
Stars: ✭ 187 (-9.66%)
NmapNmap - the Network Mapper. Github mirror of official SVN repository.
Stars: ✭ 5,792 (+2698.07%)
Awesome Terminal CommandsAn awesome resource listing and explaining various commonly used *nix commands
Stars: ✭ 109 (-47.34%)
PayloadsallthethingsA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+15798.07%)
AxiomThe dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!
Stars: ✭ 2,424 (+1071.01%)
HacktheworldAn Python Script For Generating Payloads that Bypasses All Antivirus so far .
Stars: ✭ 527 (+154.59%)
NfrA lightweight tool to score network traffic and flag anomalies
Stars: ✭ 104 (-49.76%)
BurpsuitehttpsmugglerA Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques
Stars: ✭ 529 (+155.56%)
Py Idstoolsidstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Stars: ✭ 205 (-0.97%)
Gtfobins.github.ioGTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+2813.04%)
Suricata UpdateThe tool for updating your Suricata rules.
Stars: ✭ 143 (-30.92%)
Hatclouddiscontinued
Stars: ✭ 418 (+101.93%)
Dynamite NsmDynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat detection
Stars: ✭ 92 (-55.56%)
Suricata RulesSuricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等
Stars: ✭ 397 (+91.79%)
IvreNetwork recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,331 (+1026.09%)
NmapIdiomatic nmap library for go developers
Stars: ✭ 391 (+88.89%)
HumanoidNode.js package to bypass CloudFlare's anti-bot JavaScript challenges
Stars: ✭ 88 (-57.49%)
Envizonnetwork visualization & vulnerability management/reporting
Stars: ✭ 382 (+84.54%)
PsbypassclmBypass for PowerShell Constrained Language Mode
Stars: ✭ 138 (-33.33%)
Rustscan🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+2420.77%)
AttUsing Asuswrt-Merlin to bypass AT&T's residential gateway
Stars: ✭ 79 (-61.84%)
K8toolsK8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Stars: ✭ 4,173 (+1915.94%)
Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (+70.53%)
UltimateapplockerbypasslistThe goal of this repository is to document the most common techniques to bypass AppLocker.
Stars: ✭ 1,186 (+472.95%)
PulledporkPulled Pork for Snort and Suricata rule management (from Google code)
Stars: ✭ 339 (+63.77%)
SilentbridgeSilentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.
Stars: ✭ 136 (-34.3%)
QnsmQNSM is network security monitoring framework based on DPDK.
Stars: ✭ 334 (+61.35%)
SandmapNmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (+470.05%)
Htrace.shMy simple Swiss Army knife for http/https troubleshooting and profiling.
Stars: ✭ 3,465 (+1573.91%)
SharesnifferNetwork share sniffer and auto-mounter for crawling remote file systems
Stars: ✭ 168 (-18.84%)
NaabuA fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests
Stars: ✭ 1,121 (+441.55%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+458.94%)
Cve 2020 16898CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule
Stars: ✭ 207 (+0%)
Mysql Unsha1Authenticate against a MySQL server without knowing the cleartext password
Stars: ✭ 191 (-7.73%)