NtlmreconEnumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (-88.36%)
Python IocextractDefanged Indicator of Compromise (IOC) Extractor.
Stars: ✭ 300 (-86.14%)
go-spyseThe official wrapper for spyse.com API, written in Go, aimed to help developers build their integrations with Spyse.
Stars: ✭ 25 (-98.85%)
Awesome-CyberSec-ResourcesAn awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (-87.39%)
StalkphishStalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Stars: ✭ 256 (-88.18%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+166.19%)
Ioc ExplorerExplore Indicators of Compromise Automatically
Stars: ✭ 73 (-96.63%)
MitakaA browser extension for OSINT search
Stars: ✭ 483 (-77.69%)
WatcherWatcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Stars: ✭ 324 (-85.03%)
BigbountyreconBigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (-75.01%)
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (-71.78%)
Probe spiderProbe_Spider is a Open Source Intelligence Tool made complete out of Python.
Stars: ✭ 20 (-99.08%)
Whoishere.pyWIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.
Stars: ✭ 182 (-91.59%)
Sn0intSemi-automatic OSINT framework and package manager
Stars: ✭ 814 (-62.4%)
XrayXRay is a tool for recon, mapping and OSINT gathering from public networks.
Stars: ✭ 1,666 (-23.05%)
BesafeBeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (-99.03%)
Misp ModulesModules for expansion services, import and export in MISP
Stars: ✭ 198 (-90.85%)
NetzDiscover internet-wide misconfigurations while drinking coffee
Stars: ✭ 159 (-92.66%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-97.18%)
HarpoonCLI tool for open source and threat intelligence
Stars: ✭ 679 (-68.64%)
Urlhuntera recon tool that allows searching on URLs that are exposed via shortener services
Stars: ✭ 934 (-56.86%)
Misp DashboardA dashboard for a real-time overview of threat intelligence from MISP instances
Stars: ✭ 142 (-93.44%)
RatelRAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-94.41%)
BluecommandDashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard
Stars: ✭ 99 (-95.43%)
DovehawkDovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings
Stars: ✭ 97 (-95.52%)
H8mailEmail OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (-0.09%)
Youtube Comment SuiteDownload YouTube comments from numerous videos, playlists, and channels for archiving, general search, and showing activity.
Stars: ✭ 120 (-94.46%)
TiaYour Advanced Twitter stalking tool
Stars: ✭ 98 (-95.47%)
GrawlerGrawler is a tool written in PHP which comes with a web interface that automates the task of using google dorks, scrapes the results, and stores them in a file.
Stars: ✭ 98 (-95.47%)
Bucket StreamFind interesting Amazon S3 Buckets by watching certificate transparency logs.
Stars: ✭ 1,577 (-27.16%)
FileintelA modular Python application to pull intelligence about malicious files
Stars: ✭ 97 (-95.52%)
Aura BotnetA super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Bash, and Powershell.
Stars: ✭ 95 (-95.61%)
MthcAll-in-one bundle of MISP, TheHive and Cortex
Stars: ✭ 134 (-93.81%)
Visualize logsA Python library and command line tools to provide interactive log visualization.
Stars: ✭ 128 (-94.09%)
SarenkaOSINT tool - gets data from services like shodan, censys etc. in one app
Stars: ✭ 120 (-94.46%)
Neural ApiCAI NEURAL API - Pascal based neural network API optimized for AVX, AVX2 and AVX512 instruction sets plus OpenCL capable devices including AMD, Intel and NVIDIA.
Stars: ✭ 94 (-95.66%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (-9.98%)
DotDarknet OSINT Transform
Stars: ✭ 93 (-95.7%)
DogeDarknet Osint Graph Explorer
Stars: ✭ 93 (-95.7%)
OpenubaA robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by Data Scientists & Security Analysts from the Cyber Security Industry. [PRE-ALPHA]
Stars: ✭ 127 (-94.13%)
Shodan DorksDorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (-94.55%)
Computer Science ResourcesA list of resources in different fields of Computer Science (multiple languages)
Stars: ✭ 1,316 (-39.21%)
Cvebase.comcvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (-95.94%)
SputnikOpen Source Intelligence Browser Extension
Stars: ✭ 119 (-94.5%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+382.73%)
Personal Security Checklist🔒 A curated checklist of 300+ tips for protecting digital security and privacy in 2021
Stars: ✭ 2,388 (+10.3%)
IntelspyPerform automated network reconnaissance scans
Stars: ✭ 134 (-93.81%)
Awesome Cybersecurity Blueteam💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Stars: ✭ 2,091 (-3.42%)
Ghunt🕵️♂️ Investigate Google emails and documents.
Stars: ✭ 10,489 (+384.48%)
Attack Control Framework MappingsSecurity control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
Stars: ✭ 115 (-94.69%)
Tidos FrameworkThe Offensive Manual Web Application Penetration Testing Framework.
Stars: ✭ 1,290 (-40.42%)
RvdRobot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (-95.98%)
Netstalking OsintКоллекция материалов по OSINT для нетсталкинга
Stars: ✭ 127 (-94.13%)
GitmonitorOne way to continuously monitor sensitive information that could be exposed on Github
Stars: ✭ 115 (-94.69%)
PervertgramA project for stalking people on Instagram.
Stars: ✭ 88 (-95.94%)