UrlcrazyGenerate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (+32.74%)
InfoPhishInfoPath Phishing Repo Resource
Stars: ✭ 68 (-39.82%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-30.09%)
PhishapiComprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (+140.71%)
IsthislegitDashboard to collect, analyze, and respond to reported phishing emails.
Stars: ✭ 251 (+122.12%)
StalkphishStalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Stars: ✭ 256 (+126.55%)
StinkyphishMonitor Certificate Transparency Logs For Phishing Domains
Stars: ✭ 25 (-77.88%)
DomainfuzzDomain name permutation engine for detecting typo squatting, phishing and corporate espionage
Stars: ✭ 74 (-34.51%)
Url ClassificationMachine learning to classify Malicious (Spam)/Benign URL's
Stars: ✭ 95 (-15.93%)
Mongoaudit🔥 A powerful MongoDB auditing and pentesting tool 🔥
Stars: ✭ 1,174 (+938.94%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+901.77%)
Cve 2018 20555Social Network Tabs Wordpress Plugin Vulnerability - CVE-2018-20555
Stars: ✭ 78 (-30.97%)
Python RansomwarePython Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (-15.04%)
PurifyAll-in-one tool for managing vulnerability reports from AppSec pipelines
Stars: ✭ 72 (-36.28%)
SubtakeAutomatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.
Stars: ✭ 104 (-7.96%)
Red Team Curation ListA list to discover work of red team tooling and methodology for penetration testing and security assessment
Stars: ✭ 68 (-39.82%)
ZphisherAn automated phishing tool with 30+ templates.
Stars: ✭ 1,321 (+1069.03%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+9044.25%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-45.13%)
Grayfishlight weight phishing framework with 18+ pages.
Stars: ✭ 101 (-10.62%)
RpcheckuprpCheckup is an AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, and private resources.
Stars: ✭ 91 (-19.47%)
LyricpassPassword wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security research.
Stars: ✭ 58 (-48.67%)
JaelesThe Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+849.56%)
Apac ConferencesA community contributed consolidated list of InfoSec meetups in the Asia Pacific region.
Stars: ✭ 90 (-20.35%)
Pythempentest framework
Stars: ✭ 1,060 (+838.05%)
DeepseaDeepSea Phishing Gear
Stars: ✭ 96 (-15.04%)
SubjackSubdomain Takeover tool written in Go
Stars: ✭ 1,194 (+956.64%)
Security TxtA proposed standard that allows websites to define security policies.
Stars: ✭ 1,393 (+1132.74%)
Infosec BadgesBadges for your GitHub tool presented at InfoSec Conference
Stars: ✭ 74 (-34.51%)
Gf SecretsSecret and/ credential patterns used for gf.
Stars: ✭ 96 (-15.04%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-38.94%)
Analyzer🔍 Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: ✭ 108 (-4.42%)
PhisherTool designed for performing various social engineering attacks, for phishing.
Stars: ✭ 66 (-41.59%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+905.31%)
M4ngl3m3Common password pattern generator using strings list
Stars: ✭ 103 (-8.85%)
MetaforgeAn OSINT Metadata analyzing tool that filters through tags and creates reports
Stars: ✭ 63 (-44.25%)
S3scannerScan for open AWS S3 buckets and dump the contents
Stars: ✭ 1,319 (+1067.26%)
Rfd CheckerRFD Checker - security CLI tool to test Reflected File Download issues
Stars: ✭ 56 (-50.44%)
Cvebase.comcvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (-22.12%)
FleetA flexible control server for osquery fleets
Stars: ✭ 1,068 (+845.13%)
RoutersploitExploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+8630.97%)
YetiYour Everyday Threat Intelligence
Stars: ✭ 1,037 (+817.7%)
Backfuzzprotocol fuzzing toolkit
Stars: ✭ 106 (-6.19%)
ShellphishPhishing Tool for 18 social media: Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers, Gitlab, Pinterest
Stars: ✭ 1,037 (+817.7%)
WsmanagerWebshell Manager
Stars: ✭ 99 (-12.39%)
RoadmapGitBook: OSCP RoadMap
Stars: ✭ 89 (-21.24%)
Bug Bounty ResponsesA collection of response templates for invalid bug bounty reports.
Stars: ✭ 46 (-59.29%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+1022.12%)
Legal Bug Bounty#legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.
Stars: ✭ 42 (-62.83%)
King PhisherPhishing Campaign Toolkit
Stars: ✭ 1,352 (+1096.46%)
Sinkholes🐛 Malware Sinkhole List in various formats
Stars: ✭ 84 (-25.66%)
MalcomMalcom - Malware Communications Analyzer
Stars: ✭ 988 (+774.34%)