Traitor⬆️ ☠️ Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket
Stars: ✭ 3,473 (+854.12%)
Recon My WayThis repository created for personal use and added tools from my latest blog post.
Stars: ✭ 271 (-25.55%)
Hackertarget🎯 HackerTarget ToolKit - Tools And Network Intelligence To Help Organizations With Attack Surface Discovery 🎯
Stars: ✭ 320 (-12.09%)
Cheatsheet GodPenetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+867.31%)
SpyGenTrojan 🐍 (keylogger, take screenshots, open your webcam) 🔓
Stars: ✭ 115 (-68.41%)
Ssh Mitmssh mitm server for security audits supporting public key authentication, session hijacking and file manipulation
Stars: ✭ 335 (-7.97%)
Kube Psp AdvisorHelp building an adaptive and fine-grained pod security policy
Stars: ✭ 280 (-23.08%)
ProwlerProwler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+1153.02%)
HeraldingCredentials catching honeypot
Stars: ✭ 297 (-18.41%)
box-appServerThe Staff-Manager App Server for Enterprise Token Safe BOX
Stars: ✭ 22 (-93.96%)
Syzkallersyzkaller is an unsupervised coverage-guided kernel fuzzer
Stars: ✭ 3,841 (+955.22%)
SusanooA REST API security testing framework.
Stars: ✭ 287 (-21.15%)
TaipanWeb application vulnerability scanner
Stars: ✭ 359 (-1.37%)
CloudfruntA tool for identifying misconfigured CloudFront domains
Stars: ✭ 281 (-22.8%)
Certificates🛡️ A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH.
Stars: ✭ 3,693 (+914.56%)
PatrowlmanagerPatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (-0.27%)
MqueryYARA malware query accelerator (web frontend)
Stars: ✭ 264 (-27.47%)
KraneKubernetes RBAC static Analysis & visualisation tool
Stars: ✭ 254 (-30.22%)
KatanaA Python Tool For google Hacking
Stars: ✭ 355 (-2.47%)
MicrosoftWontFixListA list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. This list covers only vulnerabilities that came up in July 2021 (and SpoolSample ;-))
Stars: ✭ 854 (+134.62%)
Ethereum ListsA repository for maintaining lists of things like malicious URLs, fake token addresses, and so forth. We love lists.
Stars: ✭ 300 (-17.58%)
BanditBandit is a tool designed to find common security issues in Python code.
Stars: ✭ 3,763 (+933.79%)
IsthislegitDashboard to collect, analyze, and respond to reported phishing emails.
Stars: ✭ 251 (-31.04%)
SuperSecure, Unified, Powerful and Extensible Rust Android Analyzer
Stars: ✭ 340 (-6.59%)
RmiscoutRMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities
Stars: ✭ 296 (-18.68%)
WssatWEB SERVICE SECURITY ASSESSMENT TOOL
Stars: ✭ 360 (-1.1%)
WsltoolsWeb Scan Lazy Tools - Python Package
Stars: ✭ 288 (-20.88%)
WhatwebNext generation web scanner
Stars: ✭ 3,503 (+862.36%)
SpicypassA light-weight password manager with a focus on simplicity and security
Stars: ✭ 367 (+0.82%)
OsmedeusFully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+831.59%)
Htrace.shMy simple Swiss Army knife for http/https troubleshooting and profiling.
Stars: ✭ 3,465 (+851.92%)
SecurecodeboxsecureCodeBox (SCB) - continuous secure delivery out of the box
Stars: ✭ 279 (-23.35%)
RtaRed team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.
Stars: ✭ 358 (-1.65%)
DgfraudA Deep Graph-based Toolbox for Fraud Detection
Stars: ✭ 281 (-22.8%)
ReconnoteWeb Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
Stars: ✭ 322 (-11.54%)
Recon PipelineAn automated target reconnaissance pipeline.
Stars: ✭ 278 (-23.63%)
AiodnsbrutePython 3.5+ DNS asynchronous brute force utility
Stars: ✭ 370 (+1.65%)
NerveNERVE Continuous Vulnerability Scanner
Stars: ✭ 267 (-26.65%)
ModlishkaModlishka. Reverse Proxy.
Stars: ✭ 3,634 (+898.35%)
Salt ScannerLinux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration
Stars: ✭ 261 (-28.3%)
CertaintyAutomated cacert.pem management for PHP projects
Stars: ✭ 255 (-29.95%)
RaptorWeb-based Source Code Vulnerability Scanner
Stars: ✭ 314 (-13.74%)
ElectriceyeContinuously monitor your AWS services for configurations that can lead to degradation of confidentiality, integrity or availability. All results will be sent to Security Hub for further aggregation and analysis.
Stars: ✭ 255 (-29.95%)
UnsignRemove code signatures from OSX Mach-O binaries (note: unsigned binaries cannot currently be re-codesign'ed. Patches welcome!)
Stars: ✭ 362 (-0.55%)
SoteriaPlugin to block compilation when unapproved dependencies are used or code styling does not comply.
Stars: ✭ 36 (-90.11%)
PolichombrCollaborative malware analysis framework
Stars: ✭ 307 (-15.66%)
OpenVAS-DockerA Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-95.6%)
Impost3r👻Impost3r -- A linux password thief
Stars: ✭ 355 (-2.47%)
DotdotslashSearch for Directory Traversal Vulnerabilities
Stars: ✭ 297 (-18.41%)
W5Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (+0.82%)
ThreatmapperIdentify vulnerabilities in running containers, images, hosts and repositories
Stars: ✭ 361 (-0.82%)
WatchdogWatchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (-5.22%)
H2csmugglerHTTP Request Smuggling over HTTP/2 Cleartext (h2c)
Stars: ✭ 292 (-19.78%)