RoutersploitExploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+16343.33%)
GoaltdnsA permutation generation tool written in golang
Stars: ✭ 119 (+98.33%)
boxerBoxer: A fast directory bruteforce tool written in Python with concurrency.
Stars: ✭ 15 (-75%)
standards-maintenanceThis repository houses the interactions, consultations and work management to support the maintenance of baselined components of the Consumer Data Right API Standards and Information Security profile.
Stars: ✭ 32 (-46.67%)
pitchThe initial conversation slides and menu of scenarios
Stars: ✭ 37 (-38.33%)
PapayaNoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.
Stars: ✭ 22 (-63.33%)
polscanZero-setup SSH-based scanner with extensive visualizations for Debian server inventory, policy compliance and vulnerabilities
Stars: ✭ 57 (-5%)
AstraAstra is a tool to find URLs and secrets inside a webpage/files
Stars: ✭ 187 (+211.67%)
peer-id-generatorVanity public key generator for use with IPFS and IPNS
Stars: ✭ 27 (-55%)
doraFind exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Stars: ✭ 229 (+281.67%)
magicReconMagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+696.67%)
ComPPCompany Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.
Stars: ✭ 44 (-26.67%)
JiraffeOne stop place for exploiting Jira instances in your proximity
Stars: ✭ 157 (+161.67%)
bitforceA tools brute force BTC
Stars: ✭ 24 (-60%)
pentest-reportsCollection of penetration test reports and pentest report templates. Published by the the best security companies in the world.
Stars: ✭ 111 (+85%)
rawsec-cybersecurity-inventoryAn inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+155%)
dummyDLLUtility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.
Stars: ✭ 35 (-41.67%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+378.33%)
react-obfuscateAn intelligent React component to obfuscate any contact link!
Stars: ✭ 87 (+45%)
challengesSecurity challenges and CTFs created by the Penultimate team.
Stars: ✭ 13 (-78.33%)
FBM-134Hack Facebook Account Brute Force Method
Stars: ✭ 27 (-55%)
password-listPassword lists with top passwords to optimize bruteforce attacks
Stars: ✭ 174 (+190%)
AzureAD Autologon BruteBrute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-active-directory-password-brute-forcing-flaw-has-no-fix/
Stars: ✭ 90 (+50%)
flaskbombGZip HTTP Bombing in Python for everyone
Stars: ✭ 30 (-50%)
restincodeA memorial site for Hackers and Infosec people who have passed
Stars: ✭ 62 (+3.33%)
ronin-supportA support library for Ronin. Like activesupport, but for hacking!
Stars: ✭ 23 (-61.67%)
pwn-pulseExploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Stars: ✭ 126 (+110%)
adalancheActive Directory ACL Visualizer and Explorer - who's really Domain Admin?
Stars: ✭ 862 (+1336.67%)
wildpwnunix wildcard attacks
Stars: ✭ 119 (+98.33%)
goverviewgoverview - Get an overview of the list of URLs
Stars: ✭ 93 (+55%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+31.67%)
ArgosThis script will automatically set up an OSINT workstation starting from a Ubuntu OS.
Stars: ✭ 73 (+21.67%)
S3ScanScript to spider a website and find publicly open S3 buckets
Stars: ✭ 21 (-65%)
Python-KeyloggerPython Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||
Stars: ✭ 55 (-8.33%)
Blue-Team-NotesYou didn't think I'd go and leave the blue team out, right?
Stars: ✭ 899 (+1398.33%)
BrutegramInstagram multi-bruteforce Platfrom
Stars: ✭ 183 (+205%)
smbauditPerform various SMB-related attacks, particularly useful for testing large Active Directory environments.
Stars: ✭ 31 (-48.33%)
rustpadMulti-threaded Padding Oracle attacks against any service. Written in Rust.
Stars: ✭ 75 (+25%)
CrackerjackMultiprocessing brute-force script written in Python 3
Stars: ✭ 22 (-63.33%)
sgCheckupsgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.
Stars: ✭ 77 (+28.33%)
honeykuA Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).
Stars: ✭ 56 (-6.67%)
RedLoginRed Login: SSH Brute-force Tools
Stars: ✭ 99 (+65%)
psolving-paradigmsCommon problems of dynamic programming methods and techniques, including prerequisites, for competitive programmers.
Stars: ✭ 34 (-43.33%)
pdfbruterThis is an offline password cracking Tools which cracks any PDF which are password protected using an inbuilt wordlist Dictionary.!
Stars: ✭ 30 (-50%)
instabruteInstagram Brute Forcer
Stars: ✭ 135 (+125%)
InfoPhishInfoPath Phishing Repo Resource
Stars: ✭ 68 (+13.33%)
toolkitThe essential toolkit for reversing, malware analysis, and cracking
Stars: ✭ 176 (+193.33%)
TIWAPTotally Insecure Web Application Project (TIWAP)
Stars: ✭ 137 (+128.33%)
urlbusterPowerful mutable web directory fuzzer to bruteforce existing and/or hidden files or directories.
Stars: ✭ 144 (+140%)
EDRHuntScan installed EDRs and AVs on Windows
Stars: ✭ 406 (+576.67%)
termux-snippetsAn integrated tool and a collection of snippets which helps in the various aspects of the terminal.
Stars: ✭ 28 (-53.33%)
1earnffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+6091.67%)