MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+113.51%)
hacktheboxNotes Taken for HTB Machines & InfoSec Community.
Stars: ✭ 286 (+672.97%)
cpu-load-side-channelSide-channel file transfer between independent VMs or processes executed on the same physical host.
Stars: ✭ 45 (+21.62%)
palinka c2Just another useless C2 occupying space in some HDD somewhere.
Stars: ✭ 14 (-62.16%)
standards-maintenanceThis repository houses the interactions, consultations and work management to support the maintenance of baselined components of the Consumer Data Right API Standards and Information Security profile.
Stars: ✭ 32 (-13.51%)
fuzzmostall manner of wordlists
Stars: ✭ 23 (-37.84%)
qvm-create-windows-qubeSpin up new Windows qubes quickly, effortlessly and securely on Qubes OS
Stars: ✭ 267 (+621.62%)
CredsleakerCredsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in turn leak it via an HTTP request.
Stars: ✭ 247 (+567.57%)
FSEC-VMBackend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-48.65%)
toolkitThe essential toolkit for reversing, malware analysis, and cracking
Stars: ✭ 176 (+375.68%)
h1-searchTool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.
Stars: ✭ 58 (+56.76%)
dummyDLLUtility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.
Stars: ✭ 35 (-5.41%)
phisherpriceAll In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (+2.7%)
tutorialsAdditional Resources For Securing The Stack Tutorials
Stars: ✭ 36 (-2.7%)
crimson-sprayA lockout aware password sprayer
Stars: ✭ 11 (-70.27%)
pentest-reportsCollection of penetration test reports and pentest report templates. Published by the the best security companies in the world.
Stars: ✭ 111 (+200%)
introspectorA schema and set of tools for using SQL to query cloud infrastructure.
Stars: ✭ 61 (+64.86%)
react-obfuscateAn intelligent React component to obfuscate any contact link!
Stars: ✭ 87 (+135.14%)
KubestrikerA Blazing fast Security Auditing tool for Kubernetes
Stars: ✭ 213 (+475.68%)
DcRatA simple remote tool in C#.
Stars: ✭ 709 (+1816.22%)
AutosqliAn automatic SQL Injection tool which takes advantage of ~DorkNet~ Googler, Ddgr, WhatWaf and sqlmap.
Stars: ✭ 222 (+500%)
RoninRonin is a Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of code, Exploits or Payloads, Scanners, etc, via Repositories.
Stars: ✭ 220 (+494.59%)
github-watchmanMonitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (+62.16%)
InfoPhishInfoPath Phishing Repo Resource
Stars: ✭ 68 (+83.78%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+700%)
Blue-Team-NotesYou didn't think I'd go and leave the blue team out, right?
Stars: ✭ 899 (+2329.73%)
restincodeA memorial site for Hackers and Infosec people who have passed
Stars: ✭ 62 (+67.57%)
sx🖖 Fast, modern, easy-to-use network scanner
Stars: ✭ 1,267 (+3324.32%)
S3ScanScript to spider a website and find publicly open S3 buckets
Stars: ✭ 21 (-43.24%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (+64.86%)
Can I Take Over Xyz"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
Stars: ✭ 2,808 (+7489.19%)
netizenshipa commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (-10.81%)
Leakfa.comA simple way to know if you are on the list of major security breaches like "HIBP", but it is specific for Iran.
Stars: ✭ 106 (+186.49%)
awesome-api-securityA collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.
Stars: ✭ 2,079 (+5518.92%)
rejigTurn your VPS into an attack box
Stars: ✭ 33 (-10.81%)
evtx-hunterevtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.
Stars: ✭ 122 (+229.73%)
JiraffeOne stop place for exploiting Jira instances in your proximity
Stars: ✭ 157 (+324.32%)
NativePayload CBTNativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)
Stars: ✭ 109 (+194.59%)
flydnsRelated subdomains finder
Stars: ✭ 29 (-21.62%)
IsthislegitDashboard to collect, analyze, and respond to reported phishing emails.
Stars: ✭ 251 (+578.38%)
rustpadMulti-threaded Padding Oracle attacks against any service. Written in Rust.
Stars: ✭ 75 (+102.7%)
KeydecoderKeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
Stars: ✭ 236 (+537.84%)
PyParser-CVEMulti source CVE/exploit parser.
Stars: ✭ 25 (-32.43%)
CameradarCameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+7400%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (+62.16%)
Sec Admin分布式资产安全扫描核心管理系统(弱口令扫描,漏洞扫描)
Stars: ✭ 222 (+500%)
TIGMINTTIGMINT: OSINT (Open Source Intelligence) GUI software framework
Stars: ✭ 195 (+427.03%)
Contact.shAn OSINT tool to find contacts in order to report security vulnerabilities.
Stars: ✭ 216 (+483.78%)
sgCheckupsgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.
Stars: ✭ 77 (+108.11%)
wildpwnunix wildcard attacks
Stars: ✭ 119 (+221.62%)
OSINTBookmarksOSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (-8.11%)
Pwdb PublicA collection of all the data i could extract from 1 billion leaked credentials from internet.
Stars: ✭ 2,497 (+6648.65%)
polscanZero-setup SSH-based scanner with extensive visualizations for Debian server inventory, policy compliance and vulnerabilities
Stars: ✭ 57 (+54.05%)
magicReconMagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+1191.89%)