MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-37.3%)
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (+384.92%)
domfindA Python DNS crawler to find identical domain names under different TLDs.
Stars: ✭ 22 (-82.54%)
goblin一款适用于红蓝对抗中的仿真钓鱼系统
Stars: ✭ 844 (+569.84%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+436.51%)
Malicious-Urlv5A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (-72.22%)
phishEyephishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (-62.7%)
PhishapiComprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (+115.87%)
SootyThe SOC Analysts all-in-one CLI tool to automate and speed up workflow.
Stars: ✭ 867 (+588.1%)
Computer Science ResourcesA list of resources in different fields of Computer Science (multiple languages)
Stars: ✭ 1,316 (+944.44%)
Url ClassificationMachine learning to classify Malicious (Spam)/Benign URL's
Stars: ✭ 95 (-24.6%)
King Phisher TemplatesTemplates for the King Phisher open source phishing campaign toolkit.
Stars: ✭ 119 (-5.56%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+8194.44%)
Analyzer🔍 Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: ✭ 108 (-14.29%)
ThecollectiveThe Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-32.54%)
Awesome Malware💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-14.29%)
PrismaticaResponsive Command and Control System
Stars: ✭ 81 (-35.71%)
Black WidowGUI based offensive penetration testing tool (Open Source)
Stars: ✭ 124 (-1.59%)
Shodan DorksDorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (-6.35%)
XsscopeXSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.
Stars: ✭ 103 (-18.25%)
Awesome Wifi SecurityA collection of awesome resources related to 802.11 security, tools and other things
Stars: ✭ 79 (-37.3%)
CerteagleWeaponizing Live CT logs for automated monitoring of assets
Stars: ✭ 78 (-38.1%)
DeepseaDeepSea Phishing Gear
Stars: ✭ 96 (-23.81%)
VirtualsecconsAn ongoing list of virtual cybersecurity conferences.
Stars: ✭ 113 (-10.32%)
ZphisherAn automated phishing tool with 30+ templates.
Stars: ✭ 1,321 (+948.41%)
RatelRAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-3.97%)
Cvebase.comcvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (-30.16%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-29.37%)
Mwdb CoreMalware repository component for samples & static configuration with REST API interface.
Stars: ✭ 125 (-0.79%)
RvdRobot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (-30.95%)
Cyberdisc BotThe bot for the Cyber Discovery Community Discord Server!
Stars: ✭ 108 (-14.29%)
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+894.44%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+1446.83%)
WhalescanWhalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulnerable packages on the container
Stars: ✭ 81 (-35.71%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+8100.79%)
ContentSecurity automation content in SCAP, OSCAL, Bash, Ansible, and other formats
Stars: ✭ 1,219 (+867.46%)
Walkoff AppsWALKOFF-enabled applications. #nsacyber
Stars: ✭ 125 (-0.79%)
Azure SentinelCloud-native SIEM for intelligent security analytics for your entire enterprise.
Stars: ✭ 1,208 (+858.73%)
Grayfishlight weight phishing framework with 18+ pages.
Stars: ✭ 101 (-19.84%)
Awesome Cybersecurity Blueteam💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Stars: ✭ 2,091 (+1559.52%)
Awesome CybersecurityCurated list of awesome cybersecurity companies and solutions.
Stars: ✭ 77 (-38.89%)
Seed LabsSEED Labs developed in the last 20 years.
Stars: ✭ 102 (-19.05%)
RsfThe Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
Stars: ✭ 76 (-39.68%)
DomainfuzzDomain name permutation engine for detecting typo squatting, phishing and corporate espionage
Stars: ✭ 74 (-41.27%)
BluecommandDashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard
Stars: ✭ 99 (-21.43%)
Ioc ExplorerExplore Indicators of Compromise Automatically
Stars: ✭ 73 (-42.06%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-45.24%)
Chatterinternet monitoring osint telegram bot for windows
Stars: ✭ 123 (-2.38%)
Attack Control Framework MappingsSecurity control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
Stars: ✭ 115 (-8.73%)
Osint SanFramework для сбора данных из открытых источников. В Framework используется большое количество API, их необходимо зарегистрировать самому.
Stars: ✭ 99 (-21.43%)
PhisherTool designed for performing various social engineering attacks, for phishing.
Stars: ✭ 66 (-47.62%)
VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+6919.05%)
King PhisherPhishing Campaign Toolkit
Stars: ✭ 1,352 (+973.02%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+798.41%)
Blackhat Python3Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 1,125 (+792.86%)