Violent Python3Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 603 (+148.15%)
CaptfencoderCaptfEncoder是一款跨平台网络安全工具套件,提供网络安全相关编码转换、古典密码、密码学、特殊编码等工具,并聚合各类在线工具。
Stars: ✭ 473 (+94.65%)
BlackwormBlack Worm Offical Repo
Stars: ✭ 80 (-67.08%)
Anubis🔓Subdomain enumeration and information gathering tool
Stars: ✭ 722 (+197.12%)
WhatwebNext generation web scanner
Stars: ✭ 3,503 (+1341.56%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+4200.82%)
Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (+45.27%)
Blackhat Python3Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 1,125 (+362.96%)
ScapyScapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Stars: ✭ 6,932 (+2752.67%)
pycommunityidA Python implementation of the Community ID flow hashing standard
Stars: ✭ 18 (-92.59%)
TunnelUse Ngrok In Termux With Advanced Options
Stars: ✭ 133 (-45.27%)
JackhammerJackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
Stars: ✭ 633 (+160.49%)
Zazu🚀 A fully extensible and open source launcher for hackers, creators and dabblers.
Stars: ✭ 2,060 (+747.74%)
AmassIn-depth Attack Surface Mapping and Asset Discovery
Stars: ✭ 6,284 (+2486.01%)
SnapBash Script For Backing Up All Files In Termux With Easy step
Stars: ✭ 90 (-62.96%)
YasuoA ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (+112.76%)
MercuryMercury: network metadata capture and analysis
Stars: ✭ 203 (-16.46%)
Appinfoscanner一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
Stars: ✭ 424 (+74.49%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (+377.37%)
QnsmQNSM is network security monitoring framework based on DPDK.
Stars: ✭ 334 (+37.45%)
Zxrequestblock基于NSURLProtocol一句话实现iOS应用底层所有网络请求拦截(含网页ajax请求拦截【不支持WKWebView】)、一句话实现防抓包(使Thor,Charles,Burp等代理抓包方式全部失效,且即使开启了代理,也不影响App内部的正常请求)。包含http-dns解决方法,有效防止DNS劫持。用于分析http,https请求等
Stars: ✭ 160 (-34.16%)
FpndPython package for freepn network daemon
Stars: ✭ 271 (+11.52%)
Zeek-Network-Security-MonitorA Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-84.36%)
Netsec Ps ScriptsCollection of PowerShell network security scripts for system administrators.
Stars: ✭ 139 (-42.8%)
Bypass Firewalls By Dns HistoryFirewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.
Stars: ✭ 739 (+204.12%)
IvreNetwork recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,331 (+859.26%)
DiodbOpen-source vulnerability disclosure and bug bounty program database.
Stars: ✭ 654 (+169.14%)
Osint SanFramework для сбора данных из открытых источников. В Framework используется большое количество API, их необходимо зарегистрировать самому.
Stars: ✭ 99 (-59.26%)
NfstreamNFStream: a Flexible Network Data Analysis Framework.
Stars: ✭ 622 (+155.97%)
BatfishBatfish is a network configuration analysis tool that can find bugs and guarantee the correctness of (planned or current) network configurations. It enables network engineers to rapidly and safely evolve their network, without fear of outages or security breaches.
Stars: ✭ 592 (+143.62%)
GohacktoolsHacker tools on Go (Golang)
Stars: ✭ 1,303 (+436.21%)
Easy hackHack the World using Termux
Stars: ✭ 549 (+125.93%)
Awesome Computer HistoryAn Awesome List of computer history videos, documentaries and related folklore
Stars: ✭ 2,149 (+784.36%)
HackersHackers is an elegant iOS app for reading Hacker News written in Swift.
Stars: ✭ 513 (+111.11%)
RubyfuRubyfu, where Ruby goes evil!
Stars: ✭ 228 (-6.17%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+75.72%)
ArchstrikeAn Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (+65.02%)
3proxy3proxy - tiny free proxy server
Stars: ✭ 2,263 (+831.28%)
WatchdogWatchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (+41.98%)
Train Ai With Django Swagger JwtTrain AI (Keras + Tensorflow) to defend apps with Django REST Framework + Celery + Swagger + JWT - deploys to Kubernetes and OpenShift Container Platform
Stars: ✭ 66 (-72.84%)
Changelog.comChangelog is news and podcast for developers. This is our open source platform.
Stars: ✭ 2,354 (+868.72%)
CyberscanCyberScan: Network's Forensics ToolKit
Stars: ✭ 280 (+15.23%)
Project TauroA Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-78.6%)
Hack-UtilsScript to facilitate different functions and checks
Stars: ✭ 27 (-88.89%)
NetpwnTool made to automate tasks of pentesting.
Stars: ✭ 152 (-37.45%)
PskrackerAn all-in-one WPA/WPS toolkit
Stars: ✭ 232 (-4.53%)
ZbangzBang is a risk assessment tool that detects potential privileged account threats
Stars: ✭ 224 (-7.82%)
HackercouchHospitality for Hackers
Stars: ✭ 185 (-23.87%)
M WizInstall Metasploit And Repair Metasploit In Termux With Easy Steps
Stars: ✭ 148 (-39.09%)