Gf SecretsSecret and/ credential patterns used for gf.
Stars: ✭ 96 (-52.24%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-9.45%)
DetexploitOSS Vulnerability Scanner for Windows Platform
Stars: ✭ 146 (-27.36%)
MobilehackersweaponsMobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 170 (-15.42%)
WincmdfuWindows one line commands that make life easier, shortcuts and command line fu.
Stars: ✭ 145 (-27.86%)
Pyiris BackdoorPyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (-27.86%)
BbreconPython library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-15.92%)
BinsnitchDetect silent (unwanted) changes to files on your system
Stars: ✭ 144 (-28.36%)
Breach.twA service that can track data breaches like "Have I Been Pwned", but it is specific for Taiwan.
Stars: ✭ 144 (-28.36%)
Bountystrike ShPoor (rich?) man's bug bounty pipeline
Stars: ✭ 168 (-16.42%)
BbrAn open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.
Stars: ✭ 142 (-29.35%)
3klconAutomation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files.
Stars: ✭ 189 (-5.97%)
MiniprintA medium interaction printer honeypot 🍯
Stars: ✭ 177 (-11.94%)
Dymerge🔓 A dynamic dictionary merger for successful dictionary based attacks.
Stars: ✭ 167 (-16.92%)
QuiverQuiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-30.35%)
NosqlmapAutomated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+859.2%)
PwnshopExploit Development, Reverse Engineering & Cryptography
Stars: ✭ 167 (-16.92%)
KurukshetraKurukshetra - A framework for teaching secure coding by means of interactive problem solving.
Stars: ✭ 131 (-34.83%)
StegcloakHide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
Stars: ✭ 2,379 (+1083.58%)
HacktheboxNotes Taken for HTB Machines & InfoSec Community.
Stars: ✭ 167 (-16.92%)
Jsonpjsonp is a Burp Extension which attempts to reveal JSONP functionality behind JSON endpoints. This could help reveal cross-site script inclusion vulnerabilities or aid in bypassing content security policies.
Stars: ✭ 131 (-34.83%)
ReconnessReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on schedule or events.
Stars: ✭ 131 (-34.83%)
Oob ServerA Bind9 server for pentesters to use for Out-of-Band vulnerabilities
Stars: ✭ 125 (-37.81%)
Cve Searchcve-search - a tool to perform local searches for known vulnerabilities
Stars: ✭ 1,765 (+778.11%)
Sbt Dependency CheckSBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). 🌈
Stars: ✭ 187 (-6.97%)
XrcrossXRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. This tool was built to test (XSS|SSRF|CORS|SSTI|IDOR|RCE|LFI|SQLI) vulnerabilities
Stars: ✭ 175 (-12.94%)
VulscanAdvanced vulnerability scanning with Nmap NSE
Stars: ✭ 2,305 (+1046.77%)
Awesome Mobile SecurityAn effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+813.93%)
AsnipASN target organization IP range attack surface mapping for reconnaissance, fast and lightweight
Stars: ✭ 126 (-37.31%)
Gitlab WatchmanMonitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (-36.82%)
SwiftnessA note-taking macOS app for penetration-testers.
Stars: ✭ 124 (-38.31%)
Jwt Hack🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)
Stars: ✭ 172 (-14.43%)
MinesweeperA Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-19.4%)
Chatterinternet monitoring osint telegram bot for windows
Stars: ✭ 123 (-38.81%)
PatrowlenginesPatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 162 (-19.4%)
Spaces FinderA tool to hunt for publicly accessible DigitalOcean Spaces
Stars: ✭ 122 (-39.3%)
0l4bsCross-site scripting labs for web application security enthusiasts
Stars: ✭ 119 (-40.8%)
KnaryA simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams & Pushover support
Stars: ✭ 187 (-6.97%)
ThreagileAgile Threat Modeling Toolkit
Stars: ✭ 162 (-19.4%)
GofingerprintGoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fingerprints.
Stars: ✭ 120 (-40.3%)
Python HoneypotOWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (-20.4%)
GoaltdnsA permutation generation tool written in golang
Stars: ✭ 119 (-40.8%)
GreconYour Google Recon is Now Automated
Stars: ✭ 119 (-40.8%)
Jira ScanCVE-2017-9506 - SSRF
Stars: ✭ 159 (-20.9%)
EternalviewEternalView is an all in one basic information gathering and vulnerability assessment tool
Stars: ✭ 118 (-41.29%)
CorsmeCross Origin Resource Sharing MisConfiguration Scanner
Stars: ✭ 118 (-41.29%)
Slack WatchmanMonitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (-20.9%)
HackeronedbThe unofficial HackerOne disclosure Timeline
Stars: ✭ 117 (-41.79%)
Awesome Cybersecurity Blueteam💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Stars: ✭ 2,091 (+940.3%)
SlicerA tool to automate the boring process of APK recon
Stars: ✭ 199 (-1%)
HowtohuntTutorials and Things to Do while Hunting Vulnerability.
Stars: ✭ 2,996 (+1390.55%)
WazuhWazuh - The Open Source Security Platform
Stars: ✭ 3,154 (+1469.15%)
YarYar is a tool for plunderin' organizations, users and/or repositories.
Stars: ✭ 174 (-13.43%)
LinkfinderA python script that finds endpoints in JavaScript files
Stars: ✭ 2,268 (+1028.36%)