All Projects → Subzy → Similar Projects or Alternatives

657 Open source projects that are alternatives of or similar to Subzy

awesome-list-of-secrets-in-environment-variables
🦄🔒 Awesome list of secrets in environment variables 🖥️
Stars: ✭ 538 (+87.46%)
Mutual labels:  cybersecurity, bugbounty
Bigbountyrecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+88.5%)
Mutual labels:  cybersecurity, bugbounty
Defaultcreds Cheat Sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+579.09%)
Mutual labels:  cybersecurity, bugbounty
SuperLibrary
Information Security Library
Stars: ✭ 60 (-79.09%)
Mutual labels:  cybersecurity, bugbounty
Zile
Extract API keys from file or url using by magic of python and regex.
Stars: ✭ 61 (-78.75%)
Mutual labels:  cybersecurity, bugbounty
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-36.59%)
Command Injection Payload List
🎯 Command Injection Payload List
Stars: ✭ 658 (+129.27%)
CVE-2021-44228-PoC-log4j-bypass-words
🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
Stars: ✭ 760 (+164.81%)
Mutual labels:  cybersecurity, bugbounty
Watchdog
Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (+20.21%)
Xxe Injection Payload List
🎯 XML External Entity (XXE) Injection Payload List
Stars: ✭ 304 (+5.92%)
Mutual labels:  cybersecurity, bugbounty
Bbrecon
Python library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-41.11%)
Mutual labels:  cybersecurity, bugbounty
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (-70.73%)
Mutual labels:  cybersecurity, bugbounty
py-scripts-other
A collection of some of my scripts
Stars: ✭ 79 (-72.47%)
Mutual labels:  cybersecurity, bugbounty
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-78.4%)
Pentesting
Misc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-91.64%)
Crlf Injection Scanner
Command line tool for testing CRLF injection on a list of domains.
Stars: ✭ 91 (-68.29%)
Vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+2981.53%)
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-84.32%)
Mutual labels:  cybersecurity, bugbounty
targets
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (-70.38%)
Mutual labels:  cybersecurity, bugbounty
ORtester
Open Redirect scanner - (out of date)
Stars: ✭ 24 (-91.64%)
Mutual labels:  bugbounty
sub404
A python tool to check subdomain takeover vulnerability
Stars: ✭ 205 (-28.57%)
Mutual labels:  bugbounty
gitls
🖇 Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline
Stars: ✭ 39 (-86.41%)
Mutual labels:  bugbounty
jsleak
a Go code to detect leaks in JS files via regex patterns
Stars: ✭ 111 (-61.32%)
Mutual labels:  bugbounty
Php Security Check List
PHP Security Check List [ EN ] 🌋 ☣️
Stars: ✭ 262 (-8.71%)
Mutual labels:  bugbounty
Writeups
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-78.75%)
Mutual labels:  cybersecurity
domfind
A Python DNS crawler to find identical domain names under different TLDs.
Stars: ✭ 22 (-92.33%)
Mutual labels:  cybersecurity
CTF-Writeups
Repository of my CTF writeups
Stars: ✭ 25 (-91.29%)
Mutual labels:  cybersecurity
Open-source-tools-for-CTI
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-68.29%)
Mutual labels:  cybersecurity
Sherlock
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-87.46%)
Mutual labels:  cybersecurity
Cloudbrute
Awesome cloud enumerator
Stars: ✭ 268 (-6.62%)
Mutual labels:  bugbounty
SecurityExplained
SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to create informational content in multiple formats and share with the community to enable knowledge creation and learning.
Stars: ✭ 301 (+4.88%)
Mutual labels:  bugbounty
JWTweak
Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.
Stars: ✭ 85 (-70.38%)
Mutual labels:  bugbounty
ImpulsiveDLLHijack
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
Stars: ✭ 258 (-10.1%)
Mutual labels:  cybersecurity
Cloudscraper
CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.
Stars: ✭ 276 (-3.83%)
Mutual labels:  bugbounty
FakeUSB
Make your own BadUSB device!
Stars: ✭ 14 (-95.12%)
Mutual labels:  cybersecurity
YAPS
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-87.8%)
Mutual labels:  bugbounty
Resources
No description or website provided.
Stars: ✭ 38 (-86.76%)
Mutual labels:  bugbounty
RecoverPy
🙈 Interactively find and recover deleted or 👉 overwritten 👈 files from your terminal
Stars: ✭ 189 (-34.15%)
Mutual labels:  cybersecurity
Project Black
Pentest/BugBounty progress control with scanning modules
Stars: ✭ 257 (-10.45%)
Mutual labels:  bugbounty
ReversePowerShell
Functions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-83.28%)
Mutual labels:  cybersecurity
idsa
This is the main repository of International Data Spaces Association on GitHub, where you can find general overview and required information on IDS Open Source Landscape.
Stars: ✭ 22 (-92.33%)
Mutual labels:  cybersecurity
CyberICS.github.io
News and publication on cybersecurity in industry
Stars: ✭ 29 (-89.9%)
Mutual labels:  cybersecurity
reFlutter
Flutter Reverse Engineering Framework
Stars: ✭ 698 (+143.21%)
Mutual labels:  bugbounty
awesome-security-feed
A semi-curated list of Security Feeds
Stars: ✭ 64 (-77.7%)
Mutual labels:  cybersecurity
Webspoilt
This script will you help to find the information about the website and to help in penetrating testing
Stars: ✭ 34 (-88.15%)
Mutual labels:  cybersecurity
Lazyrecon
An automated approach to performing recon for bug bounty hunting and penetration testing.
Stars: ✭ 282 (-1.74%)
Mutual labels:  bugbounty
Phishapi
Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (-5.23%)
Mutual labels:  cybersecurity
Soteria
Plugin to block compilation when unapproved dependencies are used or code styling does not comply.
Stars: ✭ 36 (-87.46%)
Mutual labels:  security-vulnerability
wifi-deauther
A fully automatic wifi deauther coded in Python
Stars: ✭ 25 (-91.29%)
Mutual labels:  cybersecurity
security-guidance
Security guidance from the MOJ Digital & Technology Cybersecurity team
Stars: ✭ 14 (-95.12%)
Mutual labels:  cybersecurity
rstthreats
Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
Stars: ✭ 17 (-94.08%)
Mutual labels:  cybersecurity
PandorasBox
Security tool to quickly audit Public Box files and folders.
Stars: ✭ 56 (-80.49%)
Mutual labels:  bugbounty
CTF-Write-UP
澳門網絡安全暨奪旗競賽協會(Macau Cyber Security and Capture The Flag Association)MOCSCTF/MOCTF
Stars: ✭ 27 (-90.59%)
Mutual labels:  cybersecurity
aquatone
A Tool for Domain Flyovers
Stars: ✭ 43 (-85.02%)
Mutual labels:  bugbounty
OpenVAS-Docker
A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-94.43%)
Mutual labels:  cybersecurity
swiss-bugbounty-programs
List of bug bounty and coordinated vulnerability disclosure programs of companies/organisations in Switzerland
Stars: ✭ 25 (-91.29%)
Mutual labels:  bugbounty
goblin
一款适用于红蓝对抗中的仿真钓鱼系统
Stars: ✭ 844 (+194.08%)
Mutual labels:  cybersecurity
ekolabs
EKOLABS esta dedicada para investigadores independientes y para la comunidad del Software Libre. Vamos a proveer de stands completos con monitor, alimentacion de energia y acceso a internet por cable, y vos vas a traer tu maquina para mostrar tu trabajo y responder preguntas de los participantes de Ekoparty Security Conference
Stars: ✭ 47 (-83.62%)
Mutual labels:  security-vulnerability
aeacus
🔐 Vulnerability remediation scoring system
Stars: ✭ 52 (-81.88%)
Mutual labels:  cybersecurity
AndroidSecNotes
An actively maintained, Self curated notes related to android application security for security professionals, bugbounty hunters, pentesters, reverse engineer, and redteamers.
Stars: ✭ 140 (-51.22%)
Mutual labels:  bugbounty
1-60 of 657 similar projects