DorknetSelenium powered Python script to automate searching for vulnerable web apps.
Stars: ✭ 256 (-48.8%)
Lyncsmashlocate and attack Lync/Skype for Business
Stars: ✭ 258 (-48.4%)
RidrelayEnumerate usernames on a domain where you have no creds by using SMB Relay with low priv.
Stars: ✭ 359 (-28.2%)
Ctf xinetdA docker repository for deploying pwnable challenges in CTF
Stars: ✭ 257 (-48.6%)
Weasel PageantDeprecated: An ssh-agent compatible helper for interacting with Pageant from processes running on the Windows Subsystem for Linux.
Stars: ✭ 256 (-48.8%)
Pidense🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN Network Density etc.)
Stars: ✭ 358 (-28.4%)
CertaintyAutomated cacert.pem management for PHP projects
Stars: ✭ 255 (-49%)
KraneKubernetes RBAC static Analysis & visualisation tool
Stars: ✭ 254 (-49.2%)
EyeballerConvolutional neural network for analyzing pentest screenshots
Stars: ✭ 416 (-16.8%)
KatanaA Python Tool For google Hacking
Stars: ✭ 355 (-29%)
ElectriceyeContinuously monitor your AWS services for configurations that can lead to degradation of confidentiality, integrity or availability. All results will be sent to Security Hub for further aggregation and analysis.
Stars: ✭ 255 (-49%)
HOUDINIHundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
Stars: ✭ 791 (+58.2%)
CowrieCowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
Stars: ✭ 3,810 (+662%)
Cnp3Computer Networking : Principles, Protocols and Practice (first and second edition, third edition is being written on https://github.com/cnp3/ebook)
Stars: ✭ 471 (-5.8%)
gpu-monitorScript to remotely check GPU servers for free GPUs
Stars: ✭ 85 (-83%)
Xss Listener🕷️ XSS Listener is a penetration tool for easy to steal data with various XSS.
Stars: ✭ 414 (-17.2%)
GefGEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers ☢
Stars: ✭ 4,197 (+739.4%)
vmecsA simple VMess proxy implementation written in C.
Stars: ✭ 28 (-94.4%)
SpyGenTrojan 🐍 (keylogger, take screenshots, open your webcam) 🔓
Stars: ✭ 115 (-77%)
Tun2socksRedirect tun flow to socks 5 in golang, support tcp and udp.
Stars: ✭ 356 (-28.8%)
SoteriaPlugin to block compilation when unapproved dependencies are used or code styling does not comply.
Stars: ✭ 36 (-92.8%)
sshcopy自动化拷贝ssh密钥程序, 支持并发设置服务器免密
Stars: ✭ 24 (-95.2%)
SocksA SOCKS (SOCKS4, SOCKS4A and SOCKS5) Proxy Package for Go
Stars: ✭ 355 (-29%)
docker-osmedeusDocker image for Osmedeus, a fully automated offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 78 (-84.4%)
QuickScanPort scanning and domain utility.
Stars: ✭ 26 (-94.8%)
OpenVAS-DockerA Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-96.8%)
Ssh Permit A38Central management and deployment for SSH keys
Stars: ✭ 451 (-9.8%)
HellraiserVulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (-17.4%)
Pentest LabPentest Lab on OpenStack with Heat, Chef provisioning and Docker
Stars: ✭ 353 (-29.4%)
box-appServerThe Staff-Manager App Server for Enterprise Token Safe BOX
Stars: ✭ 22 (-95.6%)
Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (-29.4%)
omnittyOmnitty: Multiple-Machine SSH Multiplexer
Stars: ✭ 20 (-96%)
httpshellSSH like Shell via http protocol
Stars: ✭ 13 (-97.4%)
Bastillion Ec2A web-based SSH console to execute commands and manage multiple EC2 instances simultaneously running on Amazon Web Services (AWS).
Stars: ✭ 410 (-18%)
PwndbgExploit Development and Reverse Engineering with GDB Made Easy
Stars: ✭ 4,178 (+735.6%)
rtc-sshWebRTC wrapper for SSH connect
Stars: ✭ 95 (-81%)
PyFiSyncPython (+ rsync or rclone) based intelligent file sync with automatic backups and file move/delete tracking.
Stars: ✭ 88 (-82.4%)
anytunnel内网穿透,内网穿透代理服务器,商用内网穿透代理系统,内网穿透平台,内网穿透多用户会员系统。
Stars: ✭ 115 (-77%)
wani-writeupCTF solutions from Osaka University CTF team Wani Hackase
Stars: ✭ 20 (-96%)
SshA lightweight package to execute commands over an SSH connection
Stars: ✭ 468 (-6.4%)
Awesome Test AutomationA curated list of awesome test automation frameworks, tools, libraries, and software for different programming languages. Sponsored by http://sdclabs.com
Stars: ✭ 4,712 (+842.4%)
ApkurlgrepExtract endpoints from APK files
Stars: ✭ 405 (-19%)
HoneypotLow interaction honeypot that displays real time attacks
Stars: ✭ 348 (-30.4%)
ShonyDanzaA customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (-82.8%)
tomcter😹 Tomcter is a python tool developed to bruteforce Apache Tomcat manager login with Apache Tomcat default credentials.
Stars: ✭ 18 (-96.4%)
Vaultswiss army knife for hackers
Stars: ✭ 346 (-30.8%)
sub404A python tool to check subdomain takeover vulnerability
Stars: ✭ 205 (-59%)
JWTweakDetects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.
Stars: ✭ 85 (-83%)
UdpspeederA Tunnel which Improves your Network Quality on a High-latency Lossy Link by using Forward Error Correction, possible for All Traffics(TCP/UDP/ICMP)
Stars: ✭ 3,699 (+639.8%)
BadAssMacrosBadAssMacros - C# based automated Malicous Macro Generator.
Stars: ✭ 281 (-43.8%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (-19.4%)
WindtermA quicker and better cross-platform SSH/Sftp/Shell/Telnet/Serial client.
Stars: ✭ 345 (-31%)
ToughProxyToughProxy 是一个代理服务器, 目标是提供一个综合性的代理服务软件,支持 socks5,socks4, http, https代理协议, 针对 Socks5 提供完善的认证机制,以及提供流量控制策略,访问控制策略。
Stars: ✭ 44 (-91.2%)