Hacker ContainerContainer with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-46.43%)
Awesome SreA curated list of Site Reliability and Production Engineering resources.
Stars: ✭ 7,687 (+3821.94%)
ThreathuntingA Splunk app mapped to MITRE ATT&CK to guide your threat hunts
Stars: ✭ 738 (+276.53%)
SubtakeAutomatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.
Stars: ✭ 104 (-46.94%)
AttacksurfacemapperAttackSurfaceMapper is a tool that aims to automate the reconnaissance process.
Stars: ✭ 702 (+258.16%)
MiniprintA medium interaction printer honeypot 🍯
Stars: ✭ 177 (-9.69%)
Venmo DataVenmo trasaction dataset for data analysis/visualization/anything
Stars: ✭ 164 (-16.33%)
Netstalking OsintКоллекция материалов по OSINT для нетсталкинга
Stars: ✭ 127 (-35.2%)
Yara EndpointYara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.
Stars: ✭ 75 (-61.73%)
HasswpPortable version of Home Assistant for Windows (no need to install)
Stars: ✭ 101 (-48.47%)
DomainedMulti Tool Subdomain Enumeration
Stars: ✭ 688 (+251.02%)
Messenger For DesktopThis is not an official Facebook product, and is not affiliated with, or sponsored or endorsed by, Facebook.
Stars: ✭ 2,180 (+1012.24%)
HarpoonCLI tool for open source and threat intelligence
Stars: ✭ 679 (+246.43%)
RoutersploitExploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+4933.67%)
GorsairGorsair hacks its way into remote docker containers that expose their APIs
Stars: ✭ 678 (+245.92%)
WincmdfuWindows one line commands that make life easier, shortcuts and command line fu.
Stars: ✭ 145 (-26.02%)
Umbrella androidOpen source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to dealing with a kidnap. Umbrella has best practice guides in over 40 topics in multiple languages. Used daily by people working in high risk countries - journalists, activists, diplomats, business travelers etc.
Stars: ✭ 171 (-12.76%)
SubjackSubdomain Takeover tool written in Go
Stars: ✭ 1,194 (+509.18%)
Oob ServerA Bind9 server for pentesters to use for Out-of-Band vulnerabilities
Stars: ✭ 125 (-36.22%)
Infosec BadgesBadges for your GitHub tool presented at InfoSec Conference
Stars: ✭ 74 (-62.24%)
TiaYour Advanced Twitter stalking tool
Stars: ✭ 98 (-50%)
BinsnitchDetect silent (unwanted) changes to files on your system
Stars: ✭ 144 (-26.53%)
Aura BotnetA super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Bash, and Powershell.
Stars: ✭ 95 (-51.53%)
Fast Ide🕺Fast Integrated Development Environment 😻
Stars: ✭ 181 (-7.65%)
Avian[INACTIVE] Avian is a lightweight virtual machine and class library designed to provide a useful subset of Java's features, suitable for building self-contained applications.
Stars: ✭ 1,188 (+506.12%)
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (+211.73%)
ZenroomSmall, secure and portable virtual machine for crypto language processing
Stars: ✭ 96 (-51.02%)
Burpsuite XkeysA Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.
Stars: ✭ 144 (-26.53%)
Git HoundReconnaissance tool for GitHub code search. Finds exposed API keys using pattern matching, commit history searching, and a unique result scoring system.
Stars: ✭ 602 (+207.14%)
Gf SecretsSecret and/ credential patterns used for gf.
Stars: ✭ 96 (-51.02%)
Misp TaxonomiesTaxonomies used in MISP taxonomy system and can be used by other information sharing tool.
Stars: ✭ 168 (-14.29%)
HindsightWeb browser forensics for Google Chrome/Chromium
Stars: ✭ 589 (+200.51%)
Holeheholehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.
Stars: ✭ 568 (+189.8%)
Objfw[Official Mirror] A portable framework for the Objective-C language.
Stars: ✭ 161 (-17.86%)
AsnipASN target organization IP range attack surface mapping for reconnaissance, fast and lightweight
Stars: ✭ 126 (-35.71%)
Ioc ExplorerExplore Indicators of Compromise Automatically
Stars: ✭ 73 (-62.76%)
DvwaDamn Vulnerable Web Application (DVWA)
Stars: ✭ 5,727 (+2821.94%)
Netbsd Curseslibcurses and dependencies taken from netbsd and brought into a portable shape (at least to musl or glibc)
Stars: ✭ 93 (-52.55%)
FavfreakMaking Favicon.ico based Recon Great again !
Stars: ✭ 564 (+187.76%)
WhidsOpen Source EDR for Windows
Stars: ✭ 188 (-4.08%)
Passphrase WordlistPassphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (+183.67%)
DogeDarknet Osint Graph Explorer
Stars: ✭ 93 (-52.55%)
TheharvesterE-mails, subdomains and names Harvester - OSINT
Stars: ✭ 6,175 (+3050.51%)
ExodusPainless relocation of Linux binaries–and all of their dependencies–without containers.
Stars: ✭ 2,560 (+1206.12%)
DiffyDiffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR) teams quickly identify suspicious hosts on which to focus their response.
Stars: ✭ 555 (+183.16%)
Fav UpIP lookup by favicon using Shodan
Stars: ✭ 550 (+180.61%)
BbreconPython library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-13.78%)
DeadtrapAn OSINT tool to gather information about the real owner of a phone number
Stars: ✭ 73 (-62.76%)
Gitlab WatchmanMonitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (-35.2%)
BucketlistAmazon S3 bucket spelunking!
Stars: ✭ 72 (-63.27%)
PurifyAll-in-one tool for managing vulnerability reports from AppSec pipelines
Stars: ✭ 72 (-63.27%)
GitemA Github organization reconnaissance tool.
Stars: ✭ 190 (-3.06%)
NetzDiscover internet-wide misconfigurations while drinking coffee
Stars: ✭ 159 (-18.88%)
PatrowlenginesPatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 162 (-17.35%)