SuboverA Powerful Subdomain Takeover Tool
Stars: ✭ 607 (-25.43%)
JxnetJxnet is a Java library for capturing and sending custom network packet buffers with no copies. Jxnet wraps a native packet capture library (libpcap/winpcap/npcap) via JNI (Java Native Interface).
Stars: ✭ 26 (-96.81%)
CansinaWeb Content Discovery Tool
Stars: ✭ 709 (-12.9%)
docker-wallarm-node⚡️ Docker official image for Wallarm Node. API security platform agent.
Stars: ✭ 18 (-97.79%)
sherlock🔎 Find usernames across social networks
Stars: ✭ 52 (-93.61%)
nuubiNuubi Tools (Information-ghatering|Scanner|Recon.)
Stars: ✭ 76 (-90.66%)
easyreconTool to automate recon
Stars: ✭ 37 (-95.45%)
dorkscoutDorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets
Stars: ✭ 189 (-76.78%)
webreconAutomated Web Recon Shell Scripts
Stars: ✭ 48 (-94.1%)
kcare-ucheckerA simple tool to detect outdated shared libraries
Stars: ✭ 174 (-78.62%)
ArgosThis script will automatically set up an OSINT workstation starting from a Ubuntu OS.
Stars: ✭ 73 (-91.03%)
frida setupOne-click installer for Frida and Burp certs for SSL Pinning bypass
Stars: ✭ 47 (-94.23%)
bing-ip2hostsbingip2hosts is a Bing.com web scraper that discovers websites by IP address
Stars: ✭ 99 (-87.84%)
DaProfilerDaProfiler allows you to create a profile on your target based in France only. The particularity of this program is its ability to find the e-mail addresses your target.
Stars: ✭ 58 (-92.87%)
AmassIn-depth Attack Surface Mapping and Asset Discovery
Stars: ✭ 6,284 (+671.99%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-95.58%)
targetsA collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (-89.56%)
xssmapIntelligent XSS detection tool that uses human techniques for looking for reflected cross-site scripting (XSS) vulnerabilities
Stars: ✭ 107 (-86.86%)
ShonyDanzaA customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (-89.43%)
Sherlock🔎 Hunt down social media accounts by username across social networks
Stars: ✭ 28,569 (+3409.71%)
humbleA humble, and fast, security-oriented HTTP headers analyzer
Stars: ✭ 17 (-97.91%)
DirsearchWeb path scanner
Stars: ✭ 7,246 (+790.17%)
sub404A python tool to check subdomain takeover vulnerability
Stars: ✭ 205 (-74.82%)
Dumpall一款信息泄漏利用工具,适用于.git/.svn源代码泄漏和.DS_Store泄漏
Stars: ✭ 250 (-69.29%)
DorknetSelenium powered Python script to automate searching for vulnerable web apps.
Stars: ✭ 256 (-68.55%)
Investigo🔎 Find usernames and download their data across social media.
Stars: ✭ 168 (-79.36%)
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-94.47%)
MegplusAutomated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]
Stars: ✭ 268 (-67.08%)
QuickScanPort scanning and domain utility.
Stars: ✭ 26 (-96.81%)
Salt ScannerLinux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration
Stars: ✭ 261 (-67.94%)
GasmaskInformation gathering tool - OSINT
Stars: ✭ 518 (-36.36%)
YasuoA ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (-36.49%)
LazyreconAn automated approach to performing recon for bug bounty hunting and penetration testing.
Stars: ✭ 282 (-65.36%)
OsmedeusFully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+316.58%)
Xunfeng巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Stars: ✭ 3,131 (+284.64%)
WhatwebNext generation web scanner
Stars: ✭ 3,503 (+330.34%)
WsltoolsWeb Scan Lazy Tools - Python Package
Stars: ✭ 288 (-64.62%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (-37.47%)
FaradayFaraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit.
Stars: ✭ 3,198 (+292.87%)
PulsarNetwork footprint scanner platform. Discover domains and run your custom checks periodically.
Stars: ✭ 314 (-61.43%)
InjuredandroidA vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
Stars: ✭ 317 (-61.06%)
Linkedin2usernameOSINT Tool: Generate username lists for companies on LinkedIn
Stars: ✭ 504 (-38.08%)
Offensive DockerOffensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-59.71%)
ReconnoteWeb Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
Stars: ✭ 322 (-60.44%)
NatlasScaling Network Scanning. Changes prior to 1.0 may cause difficult to avoid backwards incompatibilities. You've been warned.
Stars: ✭ 333 (-59.09%)
OneforallOneForAll是一款功能强大的子域收集工具
Stars: ✭ 4,202 (+416.22%)
Black Hat RustApplied offensive security with Rust - Early access - https://academy.kerkour.com/black-hat-rust?coupon=GITHUB
Stars: ✭ 331 (-59.34%)
SuperSecure, Unified, Powerful and Extensible Rust Android Analyzer
Stars: ✭ 340 (-58.23%)
Vaultswiss army knife for hackers
Stars: ✭ 346 (-57.49%)
Docker Onion NmapScan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.
Stars: ✭ 345 (-57.62%)
Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (-56.63%)
Recon PipelineAn automated target reconnaissance pipeline.
Stars: ✭ 278 (-65.85%)
OssaOpen-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (-2.21%)
ZenFind emails of Github users
Stars: ✭ 343 (-57.86%)
SubfinderSubfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing.
Stars: ✭ 4,509 (+453.93%)