BulwarkAn organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
Stars: ✭ 113 (-24.16%)
Pentesting CookbookA set of recipes useful in pentesting and red teaming scenarios
Stars: ✭ 82 (-44.97%)
AttacksurfaceanalyzerAttack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
Stars: ✭ 1,341 (+800%)
SputnikOpen Source Intelligence Browser Extension
Stars: ✭ 119 (-20.13%)
Nimscan🚀 Fast Port Scanner 🚀
Stars: ✭ 134 (-10.07%)
DeepseaDeepSea Phishing Gear
Stars: ✭ 96 (-35.57%)
Threathunting SplSplunk code (SPL) useful for serious threat hunters.
Stars: ✭ 117 (-21.48%)
AmdhAndroid Mobile Device Hardening
Stars: ✭ 95 (-36.24%)
ConsolemeA Central Control Plane for AWS Permissions and Access
Stars: ✭ 2,631 (+1665.77%)
DotDarknet OSINT Transform
Stars: ✭ 93 (-37.58%)
SojoboA binary analysis framework
Stars: ✭ 116 (-22.15%)
Aws Securitygroup GrapherThis ansible role gets information from an AWS VPC and generate a graphical representation of security groups
Stars: ✭ 93 (-37.58%)
Blackphish🔱 [ Phishing Made Easy ] 🔱 (In Beta)
Stars: ✭ 133 (-10.74%)
Password LeakA library to check for compromised passwords
Stars: ✭ 92 (-38.26%)
Breach.twA service that can track data breaches like "Have I Been Pwned", but it is specific for Taiwan.
Stars: ✭ 144 (-3.36%)
Tidos FrameworkThe Offensive Manual Web Application Penetration Testing Framework.
Stars: ✭ 1,290 (+765.77%)
Dns DiscoveryDNS-Discovery is a multithreaded subdomain bruteforcer.
Stars: ✭ 114 (-23.49%)
PervertgramA project for stalking people on Instagram.
Stars: ✭ 88 (-40.94%)
GsilGitHub Sensitive Information Leakage(GitHub敏感信息泄露监控)
Stars: ✭ 1,764 (+1083.89%)
PastepwnPython framework to scrape Pastebin pastes and analyze them
Stars: ✭ 87 (-41.61%)
Bag Of HoldingAn application to assist in the organization and prioritization of software security activities.
Stars: ✭ 114 (-23.49%)
Netsec Ps ScriptsCollection of PowerShell network security scripts for system administrators.
Stars: ✭ 139 (-6.71%)
Phish CollectPython script to hunt phishing kits
Stars: ✭ 113 (-24.16%)
Envkey AppSecure, human-friendly, cross-platform secrets and config.
Stars: ✭ 83 (-44.3%)
Userrecon PyUsername recognition on various websites.
Stars: ✭ 131 (-12.08%)
Snopfsnopf USB password token
Stars: ✭ 113 (-24.16%)
HyugaHyuga 一个用来记录DNS查询和HTTP请求的监控工具。
Stars: ✭ 148 (-0.67%)
JwtxploiterA tool to test security of json web token
Stars: ✭ 130 (-12.75%)
Digital Privacy一个关于数字隐私搜集、保护、清理集一体的方案,外加开源信息收集(OSINT)对抗
Stars: ✭ 1,231 (+726.17%)
Misp MaltegoSet of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Stars: ✭ 112 (-24.83%)
GitmadMonitor, Alert, and Discover sensitive info and data leakage on Github.
Stars: ✭ 81 (-45.64%)
Outisoutis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) and platforms (like Powershell).
Stars: ✭ 111 (-25.5%)
ContentSecurity automation content in SCAP, OSCAL, Bash, Ansible, and other formats
Stars: ✭ 1,219 (+718.12%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-46.98%)
Personal Security Checklist🔒 A curated checklist of 300+ tips for protecting digital security and privacy in 2021
Stars: ✭ 2,388 (+1502.68%)
Njsscannjsscan is a semantic aware SAST tool that can find insecure code patterns in your Node.js applications.
Stars: ✭ 128 (-14.09%)
Nordvpn NetworkmanagerA CLI tool for automating the importing, securing and usage of NordVPN (and in the future, more) OpenVPN servers through NetworkManager.
Stars: ✭ 111 (-25.5%)
PoopakPOOPAK - TOR Hidden Service Crawler
Stars: ✭ 78 (-47.65%)
CerteagleWeaponizing Live CT logs for automated monitoring of assets
Stars: ✭ 78 (-47.65%)
CertstreammonitorMonitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come online.
Stars: ✭ 111 (-25.5%)
Radio HackboxPoC tool to demonstrate vulnerabilities in wireless input devices
Stars: ✭ 74 (-50.34%)
DomainfuzzDomain name permutation engine for detecting typo squatting, phishing and corporate espionage
Stars: ✭ 74 (-50.34%)
Netstalking OsintКоллекция материалов по OSINT для нетсталкинга
Stars: ✭ 127 (-14.77%)
GiggityWraps github api for openly available information about an organization, user, or repo
Stars: ✭ 111 (-25.5%)
Nrf24 PlaysetSoftware tools for Nordic Semiconductor nRF24-based devices like wireless keyboards, mice, and presenters
Stars: ✭ 73 (-51.01%)
Docbleach🚿 Sanitising your documents, one threat at a time. — Content Disarm & Reconstruction Software
Stars: ✭ 110 (-26.17%)
Cli🧰 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.
Stars: ✭ 2,151 (+1343.62%)
Awesome Mobile SecurityAn effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+1132.89%)
SyswallWork in progress firewall for Linux syscalls, written in Rust
Stars: ✭ 110 (-26.17%)
DeadtrapAn OSINT tool to gather information about the real owner of a phone number
Stars: ✭ 73 (-51.01%)
BucketlistAmazon S3 bucket spelunking!
Stars: ✭ 72 (-51.68%)
Fisy FuzzThis is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.
Stars: ✭ 110 (-26.17%)
NotrulerThe opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.
Stars: ✭ 72 (-51.68%)