PentestkitUseful tools and scripts during Penetration Testing engagements
Stars: ✭ 463 (+175.6%)
ReconcatA small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any year or complete list of all years possible. Made Specially for penetration testing purpose.
Stars: ✭ 66 (-60.71%)
FundamentalanalysisFully-fledged Fundamental Analysis package capable of collecting 20 years of Company Profiles, Financial Statements, Ratios and Stock Data of 13.000+ companies.
Stars: ✭ 449 (+167.26%)
NosqlmapAutomated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+1047.62%)
VanquishVanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Stars: ✭ 449 (+167.26%)
Kube ScoreKubernetes object analysis with recommendations for improved reliability and security
Stars: ✭ 1,128 (+571.43%)
Dradis CeDradis Framework: Colllaboration and reporting for IT Security teams
Stars: ✭ 443 (+163.69%)
Scilla🏴☠️ Information Gathering tool 🏴☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-30.95%)
PhpmndPHP Magic Number Detector
Stars: ✭ 431 (+156.55%)
Splunk AppsPalo Alto Networks App for Splunk leverages the data visibility provided by Palo Alto Networks next-generation firewalls and endpoint security with Splunk's extensive investigation and visualization capabilities to deliver an advanced security reporting and analysis tool.
Stars: ✭ 63 (-62.5%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+154.17%)
HydrafwHydraFW official firmware for HydraBus/HydraNFC for researcher, hackers, students, embedded software developers or anyone interested in debugging/hacking/developing/penetration testing
Stars: ✭ 165 (-1.79%)
0xsp Mongoosea unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Stars: ✭ 419 (+149.4%)
Awesome HackingAwesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+972.62%)
Elm AnalyseA tool that allows you to analyse your Elm code, identify deficiencies and apply best practices.
Stars: ✭ 418 (+148.81%)
Aws Config To ElasticsearchGenerates an AWS Config Snapshot and ingests it into ElasticSearch for further analysis using Kibana
Stars: ✭ 62 (-63.1%)
ToratToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Stars: ✭ 415 (+147.02%)
Awesome VulnerableA curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.
Stars: ✭ 133 (-20.83%)
PoweropsPowerShell Runspace Portable Post Exploitation Tool aimed at making Penetration Testing with PowerShell "easier"
Stars: ✭ 412 (+145.24%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-63.1%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (+139.88%)
Linux Smart EnumerationLinux enumeration tool for pentesting and CTFs with verbosity levels
Stars: ✭ 1,956 (+1064.29%)
Go RuleguardDefine and run pattern-based custom linting rules.
Stars: ✭ 402 (+139.29%)
AdhritAndroid Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.
Stars: ✭ 399 (+137.5%)
PhpvulnAudit tool to find common vulnerabilities in PHP source code
Stars: ✭ 146 (-13.1%)
GhostwriterThe SpecterOps project management and reporting engine
Stars: ✭ 394 (+134.52%)
FuxiPenetration Testing Platform
Stars: ✭ 1,103 (+556.55%)
NmapIdiomatic nmap library for go developers
Stars: ✭ 391 (+132.74%)
Wooyunwooyun public information backup
Stars: ✭ 112 (-33.33%)
Pandas JsPandas in JavaScript for data analysis and visualization
Stars: ✭ 389 (+131.55%)
Python Nse Option Chain AnalyzerThe NSE has a website which displays the option chain in near real-time. This program retrieves this data from the NSE site and then generates useful analysis of the Option Chain for the specified Index or Stock. It also continuously refreshes the Option Chain and visually displays the trend in various indicators useful for Technical Analysis
Stars: ✭ 58 (-65.48%)
Cerberus一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能
Stars: ✭ 389 (+131.55%)
Awesome Single CellCommunity-curated list of software packages and data resources for single-cell, including RNA-seq, ATAC-seq, etc.
Stars: ✭ 1,937 (+1052.98%)
Aosp这是一个连载的博文系列,我将持续为大家提供尽可能透彻的Android源码分析
Stars: ✭ 693 (+312.5%)
Mitm Scripts🔄 A collection of mitmproxy inline scripts
Stars: ✭ 109 (-35.12%)
K8toolsK8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Stars: ✭ 4,173 (+2383.93%)
SkaSimple Karma Attack
Stars: ✭ 55 (-67.26%)
BadpotatoWindows 权限提升 BadPotato
Stars: ✭ 361 (+114.88%)
AlgorithmictradingThis repository contains three ways to obtain arbitrage which are Dual Listing, Options and Statistical Arbitrage. These are projects in collaboration with Optiver and have been peer-reviewed by staff members of Optiver.
Stars: ✭ 157 (-6.55%)
Hunter(l)user hunter using WinAPI calls only
Stars: ✭ 359 (+113.69%)
Sudo killerA tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+538.69%)
DetektStatic code analysis for Kotlin
Stars: ✭ 4,169 (+2381.55%)
Awesome HackingA collection of various awesome lists for hackers, pentesters and security researchers
Stars: ✭ 48,038 (+28494.05%)
ExakatThe Exakat Engine : smart static analysis for PHP
Stars: ✭ 346 (+105.95%)
JhtalibTechnical Analysis Library Time-Series
Stars: ✭ 131 (-22.02%)
DpsmateA wow 1.12.1 combat analyzation tool
Stars: ✭ 85 (-49.4%)
Lockdoor Framework🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+302.98%)
BrutalPayload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (+303.57%)
SnsAnalysis pipelines for sequencing data
Stars: ✭ 43 (-74.4%)
Gitinspector📊 The statistical analysis tool for git repositories
Stars: ✭ 2,058 (+1125%)
MinesweeperA Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-3.57%)
PortiaPortia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
Stars: ✭ 154 (-8.33%)
QuiverQuiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-16.67%)