Dnxfirewalldnxfirewall (dad's next-gen firewall), a pure Python next generation firewall built on top of Linux kernel/netfilter.
Stars: ✭ 174 (-92.69%)
Simon Speck Cexample C language implementation of SIMON and SPECK lightweight block ciphers.
Stars: ✭ 9 (-99.62%)
Tf EncryptedA Framework for Encrypted Machine Learning in TensorFlow
Stars: ✭ 832 (-65.03%)
MyassetsCustom filters and other resources to use with uBlock Origin and uMatrix.
Stars: ✭ 12 (-99.5%)
RecsechRecsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected, Subdomain takeovers, Reconnaissance On Github and much more you can see in Features in tools .
Stars: ✭ 173 (-92.73%)
Badusb botnet👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-98.65%)
DatasafeDatasafe - flexible and secure data storage and document sharing using cryptographic message syntax for data encryption
Stars: ✭ 32 (-98.65%)
CheckmyhttpsWe propose a user-friendly add-on that allows you to check if your encrypted web traffic (SSL/TLS) towards secured Internet servers (HTTPS) is not intercepted (being listened to).
Stars: ✭ 35 (-98.53%)
Sephia FiveA secure and PGP enabled webmail module for Phosphorus Five
Stars: ✭ 21 (-99.12%)
Swift KeyloggerKeylogger for mac written in Swift using HID
Stars: ✭ 995 (-58.18%)
ToxicAn ncurses-based Tox client (please make pull requests on the development fork: https://github.com/toktok/toxic)
Stars: ✭ 987 (-58.51%)
TorbotDark Web OSINT Tool
Stars: ✭ 821 (-65.49%)
ShellshockhunterIt's a simple tool for test vulnerability shellshock
Stars: ✭ 52 (-97.81%)
Project TauroA Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-97.81%)
SpellbookMicro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-97.77%)
RaccoonA high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (-2.82%)
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-97.86%)
MetaforgeAn OSINT Metadata analyzing tool that filters through tags and creates reports
Stars: ✭ 63 (-97.35%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+277.51%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (-52.42%)
Pathwar☠️ The Pathwar Project ☠️
Stars: ✭ 58 (-97.56%)
Fhe Toolkit LinuxIBM Fully Homomorphic Encryption Toolkit For Linux. This toolkit is a Linux based Docker container that demonstrates computing on encrypted data without decrypting it! The toolkit ships with two demos including a fully encrypted Machine Learning inference with a Neural Network and a Privacy-Preserving key-value search.
Stars: ✭ 1,123 (-52.8%)
MagicpadMagicPad is an encryption suite for beginners. It is designed to be run standalone via the browser or executable (Electron).
Stars: ✭ 174 (-92.69%)
Chaos🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Stars: ✭ 1,168 (-50.9%)
CryptoswiftCryptoSwift is a growing collection of standard and secure cryptographic algorithms implemented in Swift
Stars: ✭ 8,846 (+271.84%)
VeracruzMain repository for the Veracruz privacy-preserving compute project.
Stars: ✭ 71 (-97.02%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-96.97%)
XshockXSHOCK Shellshock Exploit
Stars: ✭ 65 (-97.27%)
PurifyAll-in-one tool for managing vulnerability reports from AppSec pipelines
Stars: ✭ 72 (-96.97%)
SandmapNmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (-50.4%)
Beef Over WanBrowser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-96.55%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-96.68%)
One Lin3rGives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (-47.08%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+225.85%)
Cfw2ofw HelperProviding aid in converting video games.
Stars: ✭ 44 (-98.15%)
Instabruteforcehacking-tool termux-tools termux noob-friendly instagram-bot bruteforce-password-cracker wordlist-technique
Stars: ✭ 86 (-96.39%)
Apac ConferencesA community contributed consolidated list of InfoSec meetups in the Asia Pacific region.
Stars: ✭ 90 (-96.22%)
0fcAnonymous web chat server, built on top of Themis/WebThemis
Stars: ✭ 98 (-95.88%)
GorshA Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
Stars: ✭ 97 (-95.92%)
WsmanagerWebshell Manager
Stars: ✭ 99 (-95.84%)
T14m4tAutomated brute-forcing attack tool.
Stars: ✭ 160 (-93.27%)
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-95.92%)
JavascriptA repository for All algorithms implemented in Javascript (for educational purposes only)
Stars: ✭ 16,117 (+577.47%)
LibraryCollection of papers in the field of distributed systems, game theory, cryptography, cryptoeconomics, zero knowledge
Stars: ✭ 100 (-95.8%)
M4ngl3m3Common password pattern generator using strings list
Stars: ✭ 103 (-95.67%)
SteganographerSteganograpy in Python | Hide files or data in Image Files
Stars: ✭ 104 (-95.63%)
DesudesutalkSteganography for imageboards
Stars: ✭ 100 (-95.8%)
Backfuzzprotocol fuzzing toolkit
Stars: ✭ 106 (-95.54%)
VirtualsecconsAn ongoing list of virtual cybersecurity conferences.
Stars: ✭ 113 (-95.25%)
GreconYour Google Recon is Now Automated
Stars: ✭ 119 (-95%)
Zeebsploitweb scanner - exploitation - information gathering
Stars: ✭ 159 (-93.32%)
Mitmap📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (-35.86%)
GoaltdnsA permutation generation tool written in golang
Stars: ✭ 119 (-95%)
Umbrella androidOpen source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to dealing with a kidnap. Umbrella has best practice guides in over 40 topics in multiple languages. Used daily by people working in high risk countries - journalists, activists, diplomats, business travelers etc.
Stars: ✭ 171 (-92.81%)
I2pd🛡 I2P: End-to-End encrypted and anonymous Internet
Stars: ✭ 1,796 (-24.51%)
Privacy RespectingCurated List of Privacy Respecting Services and Software
Stars: ✭ 1,663 (-30.1%)