HowtohuntTutorials and Things to Do while Hunting Vulnerability.
Stars: ✭ 2,996 (+1390.55%)
WazuhWazuh - The Open Source Security Platform
Stars: ✭ 3,154 (+1469.15%)
YarYar is a tool for plunderin' organizations, users and/or repositories.
Stars: ✭ 174 (-13.43%)
LinkfinderA python script that finds endpoints in JavaScript files
Stars: ✭ 2,268 (+1028.36%)
QuickxssAutomating XSS using Bash
Stars: ✭ 113 (-43.78%)
Pentest GuidePenetration tests guide based on OWASP including test cases, resources and examples.
Stars: ✭ 1,316 (+554.73%)
DetexploitOSS Vulnerability Scanner for Windows Platform
Stars: ✭ 146 (-27.36%)
Crlf Injection ScannerCommand line tool for testing CRLF injection on a list of domains.
Stars: ✭ 91 (-54.73%)
MobilehackersweaponsMobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 170 (-15.42%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-55.72%)
Pyiris BackdoorPyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (-27.86%)
Tidos FrameworkThe Offensive Manual Web Application Penetration Testing Framework.
Stars: ✭ 1,290 (+541.79%)
AcamarA Python3 based single-file subdomain enumerator
Stars: ✭ 89 (-55.72%)
Breach.twA service that can track data breaches like "Have I Been Pwned", but it is specific for Taiwan.
Stars: ✭ 144 (-28.36%)
Bountystrike ShPoor (rich?) man's bug bounty pipeline
Stars: ✭ 168 (-16.42%)
Sinkholes🐛 Malware Sinkhole List in various formats
Stars: ✭ 84 (-58.21%)
3klconAutomation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files.
Stars: ✭ 189 (-5.97%)
Pest🐞 Primitive Erlang Security Tool
Stars: ✭ 79 (-60.7%)
NosqlmapAutomated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+859.2%)
PwnshopExploit Development, Reverse Engineering & Cryptography
Stars: ✭ 167 (-16.92%)
Infosec BadgesBadges for your GitHub tool presented at InfoSec Conference
Stars: ✭ 74 (-63.18%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-65.67%)
StegcloakHide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
Stars: ✭ 2,379 (+1083.58%)
GitgrabergitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...
Stars: ✭ 1,164 (+479.1%)
ReconnessReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on schedule or events.
Stars: ✭ 131 (-34.83%)
Red Team Curation ListA list to discover work of red team tooling and methodology for penetration testing and security assessment
Stars: ✭ 68 (-66.17%)
LynisLynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+4445.77%)
Cve Searchcve-search - a tool to perform local searches for known vulnerabilities
Stars: ✭ 1,765 (+778.11%)
AsnipASN target organization IP range attack surface mapping for reconnaissance, fast and lightweight
Stars: ✭ 126 (-37.31%)
ZileExtract API keys from file or url using by magic of python and regex.
Stars: ✭ 61 (-69.65%)
Mitmap📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+659.2%)
SwiftnessA note-taking macOS app for penetration-testers.
Stars: ✭ 124 (-38.31%)
RescopeRescope is a tool geared towards pentesters and bugbounty researchers, that aims to make life easier when defining scopes for Burp Suite and OWASP ZAP.
Stars: ✭ 156 (-22.39%)
GxssA tool to check a bunch of URLs that contain reflecting params.
Stars: ✭ 115 (-42.79%)
Jwt Hack🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)
Stars: ✭ 172 (-14.43%)
Openvas ScannerOpen Vulnerability Assessment Scanner - Scanner for Greenbone Vulnerability Management (GVM)
Stars: ✭ 1,056 (+425.37%)
Chatterinternet monitoring osint telegram bot for windows
Stars: ✭ 123 (-38.81%)
HaliveA fast http and https prober, to check which URLs are alive
Stars: ✭ 47 (-76.62%)
PatrowlenginesPatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 162 (-19.4%)
Dns DiscoveryDNS-Discovery is a multithreaded subdomain bruteforcer.
Stars: ✭ 114 (-43.28%)
Pcwt Stars: ✭ 46 (-77.11%)
KnaryA simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams & Pushover support
Stars: ✭ 187 (-6.97%)
TuktukTool for catching and logging different types of requests.
Stars: ✭ 174 (-13.43%)
Di.we.hRepositório com conteúdo sobre web hacking em português
Stars: ✭ 156 (-22.39%)
ArissploitArissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (-43.28%)
AwsbucketdumpSecurity Tool to Look For Interesting Files in S3 Buckets
Stars: ✭ 1,021 (+407.96%)
Python HoneypotOWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (-20.4%)
Phish CollectPython script to hunt phishing kits
Stars: ✭ 113 (-43.78%)
Awesome Bugbounty WriteupsA curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
Stars: ✭ 2,429 (+1108.46%)
BulwarkAn organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
Stars: ✭ 113 (-43.78%)
VirtualsecconsAn ongoing list of virtual cybersecurity conferences.
Stars: ✭ 113 (-43.78%)
Awesome Shodan Queries🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
Stars: ✭ 2,758 (+1272.14%)
Securityadvisories🔐 Security advisories as a simple composer exclusion list, updated daily
Stars: ✭ 2,279 (+1033.83%)
KarmaFind leaked emails with your passwords
Stars: ✭ 154 (-23.38%)