SamplesSteeltoe samples and reference application collection
Stars: ✭ 586 (-13.06%)
WebmapWebMap-Nmap Web Dashboard and Reporting
Stars: ✭ 357 (-47.03%)
RegistratorService registry bridge for Docker with pluggable adapters
Stars: ✭ 4,558 (+576.26%)
LegionAutomatic Enumeration Tool based in Open Source tools
Stars: ✭ 280 (-58.46%)
JackhammerJackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
Stars: ✭ 633 (-6.08%)
Docker Onion NmapScan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.
Stars: ✭ 345 (-48.81%)
Kube Scankube-scan: Octarine k8s cluster risk assessment tool
Stars: ✭ 566 (-16.02%)
NatlasScaling Network Scanning. Changes prior to 1.0 may cause difficult to avoid backwards incompatibilities. You've been warned.
Stars: ✭ 333 (-50.59%)
Dora RpcDoraRPC is an RPC For the PHP MicroService by The Swoole
Stars: ✭ 475 (-29.53%)
PivotsuiteNetwork Pivoting Toolkit
Stars: ✭ 329 (-51.19%)
Nacosan easy-to-use dynamic service discovery, configuration and service management platform for building cloud native applications.
Stars: ✭ 20,691 (+2969.88%)
DirbleFast directory scanning and scraping tool
Stars: ✭ 468 (-30.56%)
OneforallOneForAll是一款功能强大的子域收集工具
Stars: ✭ 4,202 (+523.44%)
Censys Subdomain Finder⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.
Stars: ✭ 402 (-40.36%)
CyberscanCyberScan: Network's Forensics ToolKit
Stars: ✭ 280 (-58.46%)
Ansible Consul📡 Ansible role for Hashicorp Consul clusters
Stars: ✭ 320 (-52.52%)
NullinuxInternal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB.
Stars: ✭ 451 (-33.09%)
GetaltnameExtract subdomains from SSL certificates in HTTPS sites.
Stars: ✭ 320 (-52.52%)
LinkerdOld repo for Linkerd 1.x. See the linkerd2 repo for Linkerd 2.x.
Stars: ✭ 5,382 (+698.52%)
VajraVajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (-60.09%)
Marathon LbMarathon-lb is a service discovery & load balancing tool for DC/OS
Stars: ✭ 449 (-33.38%)
Golb🐙 Yet another load balancer
Stars: ✭ 315 (-53.26%)
ZeroconfmDNS / DNS-SD Service Discovery in pure Go (also known as Bonjour)
Stars: ✭ 438 (-35.01%)
Hint💡 A hinting engine for the web
Stars: ✭ 3,280 (+386.65%)
WpscanWPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites.
Stars: ✭ 6,244 (+826.41%)
CaringcaribouA friendly car security exploration tool for the CAN bus
Stars: ✭ 298 (-55.79%)
BurpaBurp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Application Security Testing (DAST).
Stars: ✭ 427 (-36.65%)
BanditBandit is a tool designed to find common security issues in Python code.
Stars: ✭ 3,763 (+458.31%)
ConsulConsul is a distributed, highly available, and data center aware solution to connect and configure applications across dynamic, distributed infrastructure.
Stars: ✭ 23,723 (+3419.73%)
JunoJuno 译名朱诺。这个名字来源于古罗马神话中的众神之母。它是斗鱼的微服务管理系统, 如同众神之母一样守护着所有微服务的系统。
Stars: ✭ 285 (-57.72%)
Beehive🐝 BeeHive is a solution for iOS Application module programs, it absorbed the Spring Framework API service concept to avoid coupling between modules.
Stars: ✭ 4,117 (+510.83%)
SusanooA REST API security testing framework.
Stars: ✭ 287 (-57.42%)
SeccubusEasy automated vulnerability scanning, reporting and analysis
Stars: ✭ 615 (-8.75%)
PacketwhisperPacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (-39.91%)
FaradayFaraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit.
Stars: ✭ 3,198 (+374.48%)
BlackmambaC2/post-exploitation framework
Stars: ✭ 544 (-19.29%)
Top25 ParameterFor basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙
Stars: ✭ 388 (-42.43%)
HackbrowserdataDecrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。
Stars: ✭ 3,864 (+473.29%)
PerfusionExploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)
Stars: ✭ 272 (-59.64%)
CripsIP Tools To quickly get information about IP Address's, Web Pages and DNS records.
Stars: ✭ 272 (-59.64%)
RpcxBest microservices framework in Go, like alibaba Dubbo, but with more features, Scale easily. Try it. Test it. If you feel it's better, use it! 𝐉𝐚𝐯𝐚有𝐝𝐮𝐛𝐛𝐨, 𝐆𝐨𝐥𝐚𝐧𝐠有𝐫𝐩𝐜𝐱!
Stars: ✭ 6,516 (+866.77%)
PrintspooferAbusing Impersonation Privileges on Windows 10 and Server 2019
Stars: ✭ 613 (-9.05%)
BigbountyreconBigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (-19.73%)
Microservices Recipes A Free Gitbook“If you are working in an organization that places lots of restrictions on how developers can do their work, then microservices may not be for you.” ― Sam Newman
Stars: ✭ 393 (-41.69%)
CloudbruteAwesome cloud enumerator
Stars: ✭ 268 (-60.24%)
SubscraperSubdomain enumeration through various techniques
Stars: ✭ 265 (-60.68%)
ApplicationinspectorA source code analyzer built for surfacing features of interest and other characteristics to answer the question 'What's in the code?' quickly using static analysis with a json based rules engine. Ideal for scanning components before use or detecting feature level changes.
Stars: ✭ 3,873 (+474.63%)
Esp Rfid ToolA tool for logging data/testing devices with a Wiegand Interface. Can be used to create a portable RFID reader or installed directly into an existing installation. Provides access to a web based interface using WiFi in AP or Client mode. Will work with nearly all devices that contain a standard 5V Wiegand interface. Primary target group is 26-37bit HID Cards. Similar to the Tastic RFID Thief, Blekey, and ESPKey.
Stars: ✭ 262 (-61.13%)
NmapIdiomatic nmap library for go developers
Stars: ✭ 391 (-41.99%)
Salt ScannerLinux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration
Stars: ✭ 261 (-61.28%)
OverlordOverlord - Red Teaming Infrastructure Automation
Stars: ✭ 258 (-61.72%)
KraneKubernetes RBAC static Analysis & visualisation tool
Stars: ✭ 254 (-62.31%)
SteeltoeSteeltoe .NET Core Components: CircuitBreaker, Configuration, Connectors, Discovery, Logging, Management, and Security
Stars: ✭ 612 (-9.2%)