vsauditVOIP Security Audit Framework
Stars: ✭ 104 (-72.49%)
CsetCybersecurity Evaluation Tool
Stars: ✭ 304 (-19.58%)
klustair(Deprecated) Submit all images in your Kubernetes cluster to Anchore for a vulnerability check and check your configuration with kubeaudit
Stars: ✭ 15 (-96.03%)
BugbountyguideBug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.
Stars: ✭ 338 (-10.58%)
SubcertSubcert is an subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.
Stars: ✭ 58 (-84.66%)
Bugbounty CheatsheetA list of interesting payloads, tips and tricks for bug bounty hunters.
Stars: ✭ 3,644 (+864.02%)
mondoo🕵️♀️ Mondoo Cloud-Native Security & Vulnerability Risk Management
Stars: ✭ 60 (-84.13%)
RaasnetOpen-Source Ransomware As A Service for Linux, MacOS and Windows
Stars: ✭ 371 (-1.85%)
omrmarkengineThis project is designed to allow easy creation of OMR (Optical Mark Recognition) templates and provides a bulk scanner which can be used for processing large amounts of images from a tray fed scanner.
Stars: ✭ 49 (-87.04%)
awesome-rails-securityA curated list of security resources for a Ruby on Rails application
Stars: ✭ 36 (-90.48%)
aws-enumeratorThe AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testing. The tool is intended to speed up the process of Cloud review in case the security researcher compromised AWS Account Credentials.
Stars: ✭ 94 (-75.13%)
exploitCollection of different exploits
Stars: ✭ 153 (-59.52%)
wifi-deautherA fully automatic wifi deauther coded in Python
Stars: ✭ 25 (-93.39%)
massurlA simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau
Stars: ✭ 14 (-96.3%)
TlsfuzzerSSL and TLS protocol test suite and fuzzer
Stars: ✭ 335 (-11.38%)
PowerProxyPowerShell SOCKS proxy with reverse proxy capabilities
Stars: ✭ 29 (-92.33%)
security-reviewsA community collection of security reviews of open source software components.
Stars: ✭ 67 (-82.28%)
aa-policy-validatorValidate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation
Stars: ✭ 42 (-88.89%)
gcp-firewall-enforcerA toolbox to enforce firewall rules across multiple GCP projects.
Stars: ✭ 77 (-79.63%)
exploitsExploits developed by me.
Stars: ✭ 35 (-90.74%)
ggtfobinsGet GTFOBins info about a given exploit from the command line
Stars: ✭ 27 (-92.86%)
BadintentIntercept, modify, repeat and attack Android's Binder transactions using Burp Suite
Stars: ✭ 303 (-19.84%)
offensive-docker-vpsCreate a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.
Stars: ✭ 66 (-82.54%)
OSCESome exploits, which I’ve created during my OSCE preparation.
Stars: ✭ 74 (-80.42%)
ElliotA pentesting tool inspired by mr robot and derived by zphisher
Stars: ✭ 23 (-93.92%)
WebmapWebMap-Nmap Web Dashboard and Reporting
Stars: ✭ 357 (-5.56%)
TtpsTactics, Techniques, and Procedures
Stars: ✭ 335 (-11.38%)
BootstompBootStomp: a bootloader vulnerability finder
Stars: ✭ 303 (-19.84%)
remote-code-execution-sampleDemonstrate how usage of the Java Security Manager can prevent Remote Code Execution (RCE) exploits.
Stars: ✭ 18 (-95.24%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-89.95%)
SQLbitJust another script for automatize boolean-based blind SQL injections. (Demo)
Stars: ✭ 30 (-92.06%)
DDTTXDDTTX Tabletop Trainings
Stars: ✭ 22 (-94.18%)
browser-exploitationA collection of curated resources and CVEs I use for research.
Stars: ✭ 71 (-81.22%)
Gray hat csharp codeThis repository contains full code examples from the book Gray Hat C#
Stars: ✭ 301 (-20.37%)
Threat-Intel-Slack-BotInteractive Threat Intelligence Bot that leverages serverless framework, AWS/GCP, and Slack
Stars: ✭ 26 (-93.12%)
nozzlrNozzlr is a bruteforce framework, trully modular and script-friendly
Stars: ✭ 60 (-84.13%)
Raven-StormRaven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.
Stars: ✭ 235 (-37.83%)
WSD-pythonWeb Services for Devices (WSD) tools and utilities for cross platform support
Stars: ✭ 22 (-94.18%)
termux-snippetsAn integrated tool and a collection of snippets which helps in the various aspects of the terminal.
Stars: ✭ 28 (-92.59%)
Portspider🕷 A lightning fast multithreaded network scanner framework with modules.
Stars: ✭ 300 (-20.63%)
KInspectorKInspector is an application for analyzing health, performance and security of your Kentico solution.
Stars: ✭ 54 (-85.71%)
humbleA humble, and fast, security-oriented HTTP headers analyzer
Stars: ✭ 17 (-95.5%)
stock scan1Working Demo of Barcode/QR code scanner using VueJs+Quasaar+Cordova
Stars: ✭ 42 (-88.89%)
EvilUSBQuick utility to craft executables for pentesting and managing reverse shells
Stars: ✭ 33 (-91.27%)
CVE-2020-5902exploit code for F5-Big-IP (CVE-2020-5902)
Stars: ✭ 37 (-90.21%)
CcatCloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Stars: ✭ 300 (-20.63%)
ospdOSPd is a framework for vulnerability scanners which share the same communication protocol: OSP (Open Scanner Protocol)
Stars: ✭ 32 (-91.53%)
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-88.1%)
magento-corediffQuickly find modifications in Magento 1 or Magento 2 core code
Stars: ✭ 23 (-93.92%)