CloudbruteAwesome cloud enumerator
Stars: ✭ 268 (+712.12%)
aquatoneA Tool for Domain Flyovers
Stars: ✭ 43 (+30.3%)
AsnlookupLeverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (+393.94%)
tugareconPentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+330.3%)
offensive-docker-vpsCreate a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.
Stars: ✭ 66 (+100%)
RedcloudAutomated Red Team Infrastructure deployement using Docker
Stars: ✭ 551 (+1569.7%)
Rfd CheckerRFD Checker - security CLI tool to test Reflected File Download issues
Stars: ✭ 56 (+69.7%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+5806.06%)
PentestingMisc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-27.27%)
flydnsRelated subdomains finder
Stars: ✭ 29 (-12.12%)
Bug Bounty ResponsesA collection of response templates for invalid bug bounty reports.
Stars: ✭ 46 (+39.39%)
VuldashVulnerability Dashboard
Stars: ✭ 16 (-51.52%)
JaelesThe Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+3151.52%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (+87.88%)
S3scannerScan for open AWS S3 buckets and dump the contents
Stars: ✭ 1,319 (+3896.97%)
fleexFleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.
Stars: ✭ 181 (+448.48%)
AutosetupAuto setup is a bash script compatible with Debian based distributions to install and setup necessary programs.
Stars: ✭ 140 (+324.24%)
Proof Of ConceptsA little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
Stars: ✭ 148 (+348.48%)
PyParser-CVEMulti source CVE/exploit parser.
Stars: ✭ 25 (-24.24%)
SudomySudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 1,572 (+4663.64%)
Gf SecretsSecret and/ credential patterns used for gf.
Stars: ✭ 96 (+190.91%)
BasecrackDecode All Bases - Base Scheme Decoder
Stars: ✭ 196 (+493.94%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+451.52%)
Qsfuzzqsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.
Stars: ✭ 201 (+509.09%)
Legal Bug Bounty#legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.
Stars: ✭ 42 (+27.27%)
SnoopSnoop — инструмент разведки на основе открытых данных (OSINT world)
Stars: ✭ 886 (+2584.85%)
SubjackSubdomain Takeover tool written in Go
Stars: ✭ 1,194 (+3518.18%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+3342.42%)
LiDeploy🚀 A DigitalOcean Reseller written with Ruby On Rails
Stars: ✭ 20 (-39.39%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+2248.48%)
3klconAutomation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files.
Stars: ✭ 189 (+472.73%)
VpsA handy bash script to setup crypto masternodes in no time. Initially developed for $PIVX. Now many more ;-)
Stars: ✭ 220 (+566.67%)
Hacker ContainerContainer with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (+218.18%)
WsmanagerWebshell Manager
Stars: ✭ 99 (+200%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (+84.85%)
ChashellChashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
Stars: ✭ 742 (+2148.48%)
Firewalltutor自建梯子教程, 翻墙教程, 科学上网, google https://github.com/firewallTutor/firewallTutor
Stars: ✭ 83 (+151.52%)
scalrAutoscaling for Clouds
Stars: ✭ 17 (-48.48%)
h1-searchTool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.
Stars: ✭ 58 (+75.76%)
vpsA laravel 5 package to easily create and maintain vps on digital ocean
Stars: ✭ 59 (+78.79%)
Contact.shAn OSINT tool to find contacts in order to report security vulnerabilities.
Stars: ✭ 216 (+554.55%)
minectlminectl 🗺 is a cli for creating Minecraft server on different cloud provider.
Stars: ✭ 85 (+157.58%)
warpWARP one-click script. Add an IPv4, IPv6 or dual-stack CloudFlare WARP network interface and Socks5 proxy for VPS. 一键脚本
Stars: ✭ 950 (+2778.79%)
LexiconManipulate DNS records on various DNS providers in a standardized way.
Stars: ✭ 1,028 (+3015.15%)
sx🖖 Fast, modern, easy-to-use network scanner
Stars: ✭ 1,267 (+3739.39%)
ProcsdManage your application processes in production hassle-free like Heroku CLI with Procfile and Systemd
Stars: ✭ 181 (+448.48%)
awesome-api-securityA collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.
Stars: ✭ 2,079 (+6200%)
DomainedMulti Tool Subdomain Enumeration
Stars: ✭ 688 (+1984.85%)
Awesome Security GistsA collection of various GitHub gists for hackers, pentesters and security researchers
Stars: ✭ 701 (+2024.24%)
Can I Take Over Xyz"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
Stars: ✭ 2,808 (+8409.09%)