PoweropsPowerShell Runspace Portable Post Exploitation Tool aimed at making Penetration Testing with PowerShell "easier"
Stars: ✭ 412 (-57.13%)
PompemFind exploit tool
Stars: ✭ 786 (-18.21%)
MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+262.64%)
ItroublveTSCOfficial Source of ItroublveTSC, totally open source. No virus or anything. Feel free to have a look :)
Stars: ✭ 82 (-91.47%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (-58.06%)
ImpulsiveDLLHijackC# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
Stars: ✭ 258 (-73.15%)
Digispark ScriptsUSB Rubber Ducky type scripts written for the DigiSpark.
Stars: ✭ 629 (-34.55%)
domfindA Python DNS crawler to find identical domain names under different TLDs.
Stars: ✭ 22 (-97.71%)
Censys Subdomain Finder⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.
Stars: ✭ 402 (-58.17%)
JohnJohn the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
Stars: ✭ 5,656 (+488.55%)
Ctf NotesEverything needed for doing CTFs
Stars: ✭ 304 (-68.37%)
Pwdb-PublicA collection of all the data i could extract from 1 billion leaked credentials from internet.
Stars: ✭ 2,529 (+163.16%)
StegcrackerSteganography brute-force utility to uncover hidden data inside files
Stars: ✭ 396 (-58.79%)
idsaThis is the main repository of International Data Spaces Association on GitHub, where you can find general overview and required information on IDS Open Source Landscape.
Stars: ✭ 22 (-97.71%)
NfstreamNFStream: a Flexible Network Data Analysis Framework.
Stars: ✭ 622 (-35.28%)
Slackor A Golang implant that uses Slack as a command and control server
Stars: ✭ 392 (-59.21%)
Dsinternals Directory Services Internals (DSInternals) PowerShell Module and Framework
Stars: ✭ 776 (-19.25%)
security-guidanceSecurity guidance from the MOJ Digital & Technology Cybersecurity team
Stars: ✭ 14 (-98.54%)
Cerberus一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能
Stars: ✭ 389 (-59.52%)
Penetration Testing ToolsA collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (-36.11%)
PassganA Deep Learning Approach for Password Guessing (https://arxiv.org/abs/1709.00440)
Stars: ✭ 704 (-26.74%)
aquatoneA Tool for Domain Flyovers
Stars: ✭ 43 (-95.53%)
secrets.cljA library designed to generate cryptographically strong random numbers.
Stars: ✭ 64 (-93.34%)
CockyGrabberC# library for the collection of browser information such as cookies, logins, and more
Stars: ✭ 46 (-95.21%)
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (-36.42%)
AwesomeMoroccanHackersAn Awesome List of Moroccan Cyber Security Researchers, Pentesters, Bug Hunters.
Stars: ✭ 69 (-92.82%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (-19.35%)
Vulnhub Ctf WriteupsThis cheasheet is aimed at the CTF Players and Beginners to help them sort Vulnhub Labs. This list contains all the writeups available on hackingarticles.
Stars: ✭ 368 (-61.71%)
password-dartA set of high-level APIs over PointyCastle and CryptoUtils to hash and verify passwords securely.
Stars: ✭ 40 (-95.84%)
Readline SyncSynchronous Readline for interactively running to have a conversation with the user via a console(TTY).
Stars: ✭ 601 (-37.46%)
phomberPhomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (-93.86%)
FlareAn analytical framework for network traffic and behavioral analytics
Stars: ✭ 363 (-62.23%)
targetsA collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (-91.16%)
Probable WordlistsVersion 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!
Stars: ✭ 7,312 (+660.87%)
K8toolsK8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Stars: ✭ 4,173 (+334.24%)
CcatCloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Stars: ✭ 300 (-68.78%)
DotdotpwnDotDotPwn - The Directory Traversal Fuzzer
Stars: ✭ 601 (-37.46%)
Kali-Linux-Tools-InterfaceGraphical Web interface developed to facilitate the use of security information tools.
Stars: ✭ 169 (-82.41%)
Vulnerable AdCreate a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
Stars: ✭ 360 (-62.54%)
trjExecute any command in other's computer using a trojan horse coded and compiled in C. Just for educational purpose.
Stars: ✭ 21 (-97.81%)
HouseA runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
Stars: ✭ 910 (-5.31%)
Riceteacatpandarepo with challenge material for riceteacatpanda (2020)
Stars: ✭ 18 (-98.13%)
Self Service PasswordWeb interface to change and reset password in an LDAP directory
Stars: ✭ 699 (-27.26%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (-47.03%)
CaringcaribouA friendly car security exploration tool for the CAN bus
Stars: ✭ 298 (-68.99%)
SonarsearchA MongoDB importer and API for Project Sonars DNS datasets
Stars: ✭ 297 (-69.09%)
Cheetaha very fast brute force webshell password tool
Stars: ✭ 509 (-47.03%)
DotdotslashSearch for Directory Traversal Vulnerabilities
Stars: ✭ 297 (-69.09%)