UptuxLinux privilege escalation checks (systemd, dbus, socket fun, etc)
Stars: ✭ 260 (-68.06%)
ApkurlgrepExtract endpoints from APK files
Stars: ✭ 405 (-50.25%)
Lyncsmashlocate and attack Lync/Skype for Business
Stars: ✭ 258 (-68.3%)
HellraiserVulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (-49.26%)
EsdEnumeration sub domains(枚举子域名)
Stars: ✭ 785 (-3.56%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (-6.14%)
PacketwhisperPacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (-50.25%)
StalkphishStalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Stars: ✭ 256 (-68.55%)
KraneKubernetes RBAC static Analysis & visualisation tool
Stars: ✭ 254 (-68.8%)
ElectriceyeContinuously monitor your AWS services for configurations that can lead to degradation of confidentiality, integrity or availability. All results will be sent to Security Hub for further aggregation and analysis.
Stars: ✭ 255 (-68.67%)
ThreatpinchlookupDocumentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
Stars: ✭ 257 (-68.43%)
Platypus🔨 A modern multiple reverse shell sessions manager wrote in go
Stars: ✭ 559 (-31.33%)
Awesome OscpA curated list of awesome OSCP resources
Stars: ✭ 804 (-1.23%)
HOUDINIHundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
Stars: ✭ 791 (-2.83%)
UnChainA tool to find redirection chains in multiple URLs
Stars: ✭ 77 (-90.54%)
docker-osmedeusDocker image for Osmedeus, a fully automated offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 78 (-90.42%)
GosintOSINT Swiss Army Knife
Stars: ✭ 401 (-50.74%)
ipranges🔨 List all IP ranges from: Google (Cloud & GoogleBot), Bing (Bingbot), Amazon (AWS), Microsoft (Azure), Oracle (Cloud) and DigitalOcean with daily updates.
Stars: ✭ 38 (-95.33%)
PriestExtract server and IP address information from Browser SSRF
Stars: ✭ 13 (-98.4%)
AutordpwnThe Shadow Attack Framework
Stars: ✭ 688 (-15.48%)
Qqwry.dat自动更新的纯真ip库,每天自动更新
Stars: ✭ 559 (-31.33%)
Open-source-tools-for-CTIPublic Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-88.82%)
Smart-Contract-Security-AuditsCertified Smart Contract Audits (Ethereum, Hyperledger, xDAI, Huobi ECO Chain, Binance Smart Chain, Fantom, EOS, Tezos) by Chainsulting
Stars: ✭ 325 (-60.07%)
Advisory DbSecurity advisory database for Rust crates published through crates.io
Stars: ✭ 396 (-51.35%)
Jsprimea javascript static security analysis tool
Stars: ✭ 556 (-31.7%)
LocationDetect a users location by their IP Address.
Stars: ✭ 397 (-51.23%)
wappylyzerImplementation of Wappalyzer in Python
Stars: ✭ 42 (-94.84%)
BelatiThe Traditional Swiss Army Knife for OSINT
Stars: ✭ 397 (-51.23%)
JWTweakDetects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.
Stars: ✭ 85 (-89.56%)
VhostscanA virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (-5.77%)
Live App AndroidBuild live location sharing in your Android app
Stars: ✭ 681 (-16.34%)
Top25 ParameterFor basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙
Stars: ✭ 388 (-52.33%)
django-security-checkHelps you continuously monitor and fix common security vulnerabilities in your Django application.
Stars: ✭ 69 (-91.52%)
StegcrackerSteganography brute-force utility to uncover hidden data inside files
Stars: ✭ 396 (-51.35%)
youtube-metadataA quick way to gather all the metadata about a video, playlist, or channel from the YouTube API.
Stars: ✭ 58 (-92.87%)
aws-enumeratorThe AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testing. The tool is intended to speed up the process of Cloud review in case the security researcher compromised AWS Account Credentials.
Stars: ✭ 94 (-88.45%)
DawsAdvanced Web Shell
Stars: ✭ 551 (-32.31%)
DnsgenGenerates combination of domain names from the provided input.
Stars: ✭ 389 (-52.21%)
wifi-deautherA fully automatic wifi deauther coded in Python
Stars: ✭ 25 (-96.93%)
Git-ScrapersCollect OSINT from git repositories
Stars: ✭ 15 (-98.16%)
ApplicationinspectorA source code analyzer built for surfacing features of interest and other characteristics to answer the question 'What's in the code?' quickly using static analysis with a json based rules engine. Ideal for scanning components before use or detecting feature level changes.
Stars: ✭ 3,873 (+375.8%)
PowerProxyPowerShell SOCKS proxy with reverse proxy capabilities
Stars: ✭ 29 (-96.44%)
HarpoonCLI tool for open source and threat intelligence
Stars: ✭ 679 (-16.58%)
Fav UpIP lookup by favicon using Shodan
Stars: ✭ 550 (-32.43%)
NmapIdiomatic nmap library for go developers
Stars: ✭ 391 (-51.97%)
grep for osintGREP FOR OSINT is a set of very simple shell scripts that will help you quickly analyze a text or a folder with files for data useful for investigation (phone numbers, bank card numbers, URLs, emails and nicknames).
Stars: ✭ 21 (-97.42%)
gcp-firewall-enforcerA toolbox to enforce firewall rules across multiple GCP projects.
Stars: ✭ 77 (-90.54%)
offensive-docker-vpsCreate a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.
Stars: ✭ 66 (-91.89%)
ElliotA pentesting tool inspired by mr robot and derived by zphisher
Stars: ✭ 23 (-97.17%)
Open Semantic SearchOpen Source research tool to search, browse, analyze and explore large document collections by Semantic Search Engine and Open Source Text Mining & Text Analytics platform (Integrates ETL for document processing, OCR for images & PDF, named entity recognition for persons, organizations & locations, metadata management by thesaurus & ontologies, search user interface & search apps for fulltext search, faceted search & knowledge graph)
Stars: ✭ 386 (-52.58%)
SQLbitJust another script for automatize boolean-based blind SQL injections. (Demo)
Stars: ✭ 30 (-96.31%)