rsmReverse shell manager using tmux and ncat
Stars: ✭ 29 (-48.21%)
jsleaka Go code to detect leaks in JS files via regex patterns
Stars: ✭ 111 (+98.21%)
webapp-wordlistsThis repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version contains a wordlist of all the files directories for this version.
Stars: ✭ 306 (+446.43%)
PastebinMarkdownXSSXSS in pastebin.com and reddit.com via unsanitized markdown output
Stars: ✭ 84 (+50%)
ViPERWeb App Pen Tester (Web Interface)
Stars: ✭ 19 (-66.07%)
recceDomain availbility checker
Stars: ✭ 30 (-46.43%)
OffensiveCloudDistributionLeverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.
Stars: ✭ 86 (+53.57%)
reverse-sshStatically-linked ssh server with reverse shell functionality for CTFs and such
Stars: ✭ 548 (+878.57%)
domhttpxdomhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time.
Stars: ✭ 59 (+5.36%)
nuubiNuubi Tools (Information-ghatering|Scanner|Recon.)
Stars: ✭ 76 (+35.71%)
ldap2jsonThe ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.
Stars: ✭ 56 (+0%)
WebspoiltThis script will you help to find the information about the website and to help in penetrating testing
Stars: ✭ 34 (-39.29%)
vsauditVOIP Security Audit Framework
Stars: ✭ 104 (+85.71%)
HolyTipsA Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.
Stars: ✭ 1,210 (+2060.71%)
BugHunterIDPara pencari bug / celah kemanan bisa bergabung.
Stars: ✭ 72 (+28.57%)
linklink is a command and control framework written in rust
Stars: ✭ 345 (+516.07%)
osmedeus-workflowCommunity Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own
Stars: ✭ 26 (-53.57%)
nozakiHTTP fuzzer engine security oriented
Stars: ✭ 37 (-33.93%)
cdkgoatCdkGoat is Bridgecrew's "Vulnerable by Design" AWS CDK repository. CdkGoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.
Stars: ✭ 27 (-51.79%)
ldapconsoleThe ldapconsole script allows you to perform custom LDAP requests to a Windows domain.
Stars: ✭ 25 (-55.36%)
PinaakA vulnerability fuzzing tool written in bash, it contains the most commonly used tools to perform vulnerability scan
Stars: ✭ 69 (+23.21%)
SubcertSubcert is an subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.
Stars: ✭ 58 (+3.57%)
Learning-Node.js-SecurityA Collection of articles, videos, blogs, talks and other materials on Node.js Security
Stars: ✭ 25 (-55.36%)
IMAPLoginTesterA simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by trying to login on IMAP servers.
Stars: ✭ 47 (-16.07%)
kube-scanKubernetes Scanner
Stars: ✭ 32 (-42.86%)
ksubdomainSubdomain enumeration tool, asynchronous dns packets, use pcap to scan 1600,000 subdomains in 1 second
Stars: ✭ 320 (+471.43%)
cf-checkCloudFlare Checker written in Go
Stars: ✭ 147 (+162.5%)
ORtesterOpen Redirect scanner - (out of date)
Stars: ✭ 24 (-57.14%)
LiteOTPMulti OTP Spam Amp/Paralell threads
Stars: ✭ 50 (-10.71%)
NarthexModular personalized dictionary generator.
Stars: ✭ 156 (+178.57%)
BackToMeLittle tool made in python to create payloads for Linux, Windows and OSX with unique handler
Stars: ✭ 61 (+8.93%)
Pwdlyser-CLIPython-based CLI Password Analyser (Reporting Tool)
Stars: ✭ 29 (-48.21%)
anubisCaptive wifi hotspot bypass tool for Linux
Stars: ✭ 46 (-17.86%)
AndroidSecNotesAn actively maintained, Self curated notes related to android application security for security professionals, bugbounty hunters, pentesters, reverse engineer, and redteamers.
Stars: ✭ 140 (+150%)
hack-pet🐰 Managing command snippets for hackers/bug bounty hunters. with pet.
Stars: ✭ 77 (+37.5%)
argusArgus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (+55.36%)
ggtfobinsGet GTFOBins info about a given exploit from the command line
Stars: ✭ 27 (-51.79%)
teatimeAn RPC attack framework for Blockchain nodes.
Stars: ✭ 88 (+57.14%)
vulnerabilitiesList of every possible vulnerabilities in computer security.
Stars: ✭ 14 (-75%)
PentestingMisc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-57.14%)
auto-recon-ngAutomated script to run all modules for a specified list of domains, netblocks or company name
Stars: ✭ 17 (-69.64%)
PassivehunterSubdomain discovery using the power of 'The Rapid7 Project Sonar datasets'
Stars: ✭ 83 (+48.21%)
DeadDNSDNS hijacking via dead records automation tool
Stars: ✭ 44 (-21.43%)
STEWSA Security Tool for Enumerating WebSockets
Stars: ✭ 154 (+175%)
authz0🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.
Stars: ✭ 248 (+342.86%)
iamzeroIdentity & Access Management simplified and secure.
Stars: ✭ 192 (+242.86%)
AutoPentest-DRLAutoPentest-DRL: Automated Penetration Testing Using Deep Reinforcement Learning
Stars: ✭ 196 (+250%)
Offensive-Security-CayuqueoScripts usados en mi formación de Offensive Security por medio de la suscripción Learn Unlimited
Stars: ✭ 14 (-75%)
CommandGenInterfaceSimple vueJS based command generator which I developed in order to learn vueJS a little bit more.
Stars: ✭ 17 (-69.64%)
Virtual-HostModified Nuclei Templates Version to FUZZ Host Header
Stars: ✭ 38 (-32.14%)