All Projects → SuperLibrary → Similar Projects or Alternatives

1514 Open source projects that are alternatives of or similar to SuperLibrary

Defaultcreds Cheat Sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+3148.33%)
Malware-Sample-Sources
Malware Sample Sources
Stars: ✭ 214 (+256.67%)
Analyst Arsenal
A toolkit for Security Researchers
Stars: ✭ 112 (+86.67%)
Malware Feed
Bringing you the best of the worst files on the Internet.
Stars: ✭ 69 (+15%)
flydns
Related subdomains finder
Stars: ✭ 29 (-51.67%)
Mutual labels:  infosec, bugbounty, network-security
Autosetup
Auto setup is a bash script compatible with Debian based distributions to install and setup necessary programs.
Stars: ✭ 140 (+133.33%)
Mutual labels:  infosec, bugbounty, kali-linux
Malice
VirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+1988.33%)
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+40%)
Mutual labels:  cybersecurity, bugbounty, kali-linux
conti-pentester-guide-leak
Leaked pentesting manuals given to Conti ransomware crooks
Stars: ✭ 772 (+1186.67%)
py-scripts-other
A collection of some of my scripts
Stars: ✭ 79 (+31.67%)
Mutual labels:  cybersecurity, infosec, bugbounty
PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+393.33%)
Mutual labels:  cybersecurity, infosec, kali-linux
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+3113.33%)
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+14868.33%)
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+203.33%)
Mutual labels:  infosec, bugbounty, offensive-security
targets
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (+41.67%)
Mutual labels:  cybersecurity, infosec, bugbounty
Pyiris Backdoor
PyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (+141.67%)
Mutual labels:  cybersecurity, infosec, kali-linux
Xxe Injection Payload List
🎯 XML External Entity (XXE) Injection Payload List
Stars: ✭ 304 (+406.67%)
Mutual labels:  cybersecurity, infosec, bugbounty
Badkarma
network reconnaissance toolkit
Stars: ✭ 353 (+488.33%)
pyc2bytecode
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (+16.67%)
Bigbountyrecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+801.67%)
Awesome Nodejs Security
Awesome Node.js Security resources
Stars: ✭ 1,294 (+2056.67%)
Mutual labels:  cybersecurity, infosec
Cvebase.com
cvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (+46.67%)
Mutual labels:  cybersecurity, infosec
Fileintel
A modular Python application to pull intelligence about malicious files
Stars: ✭ 97 (+61.67%)
Mutual labels:  cybersecurity, malware-analysis
KaliIntelligenceSuite
Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standard penetration testing tools. The collected data is internally stored in a structured manner to allow the fast identification and visualisation of the collected information.
Stars: ✭ 58 (-3.33%)
Mutual labels:  bugbounty, kali-linux
toolkit
The essential toolkit for reversing, malware analysis, and cracking
Stars: ✭ 176 (+193.33%)
Mutual labels:  infosec, malware-analysis
Chatter
internet monitoring osint telegram bot for windows
Stars: ✭ 123 (+105%)
Mutual labels:  cybersecurity, infosec
Thecollective
The Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (+41.67%)
Wireshark Cheatsheet
Wireshark Cheat Sheet
Stars: ✭ 131 (+118.33%)
Mutual labels:  cybersecurity, infosec
Prismatica
Responsive Command and Control System
Stars: ✭ 81 (+35%)
Mutual labels:  cybersecurity, infosec
Karton
Distributed malware processing framework based on Python, Redis and MinIO.
Stars: ✭ 134 (+123.33%)
Mutual labels:  cybersecurity, malware-analysis
Slack Watchman
Monitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (+165%)
Mutual labels:  cybersecurity, infosec
Awesome Cybersecurity Blueteam
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Stars: ✭ 2,091 (+3385%)
Mutual labels:  cybersecurity, infosec
Virtualseccons
An ongoing list of virtual cybersecurity conferences.
Stars: ✭ 113 (+88.33%)
Mutual labels:  cybersecurity, infosec
Fudgec2
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (+218.33%)
Visualize logs
A Python library and command line tools to provide interactive log visualization.
Stars: ✭ 128 (+113.33%)
Mutual labels:  cybersecurity, malware-analysis
Gitlab Watchman
Monitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (+111.67%)
Mutual labels:  cybersecurity, infosec
Black Widow
GUI based offensive penetration testing tool (Open Source)
Stars: ✭ 124 (+106.67%)
Python Honeypot
OWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (+166.67%)
Mutual labels:  cybersecurity, infosec
Lockphish
Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.
Stars: ✭ 186 (+210%)
Mutual labels:  cybersecurity, kali-linux
tutorials
Additional Resources For Securing The Stack Tutorials
Stars: ✭ 36 (-40%)
Mutual labels:  cybersecurity, infosec
Mwdb Core
Malware repository component for samples & static configuration with REST API interface.
Stars: ✭ 125 (+108.33%)
Mutual labels:  cybersecurity, malware-analysis
Docker Security Images
🔐 Docker Container for Penetration Testing & Security
Stars: ✭ 172 (+186.67%)
Mutual labels:  cybersecurity, infosec
Bbrecon
Python library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (+181.67%)
Mutual labels:  cybersecurity, bugbounty
netizenship
a commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (-45%)
Mutual labels:  cybersecurity, infosec
Blackhat Python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 1,125 (+1775%)
Mutual labels:  cybersecurity, network-security
From Junior To Senior
My study plan for going from junior to senior software developer
Stars: ✭ 104 (+73.33%)
Mutual labels:  books, courses
Holisticinfosec For Webdevelopers Fascicle0
📚 Overview 🔒 Tooling 🔒 Process 🔒 Physical 🔒 People 📚
Stars: ✭ 37 (-38.33%)
Mutual labels:  books, infosec
Reading Material
List of some useful blogs, books, courses, papers etc. 📚
Stars: ✭ 116 (+93.33%)
Mutual labels:  books, courses
Repl
The Learning Hub for UoL's Online CS Students
Stars: ✭ 367 (+511.67%)
Mutual labels:  books, courses
fuzzmost
all manner of wordlists
Stars: ✭ 23 (-61.67%)
Mutual labels:  infosec, bugbounty
phisherprice
All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-36.67%)
Mutual labels:  cybersecurity, infosec
Owlyshield
Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+368.33%)
Mutual labels:  cybersecurity, malware-analysis
h1-search
Tool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.
Stars: ✭ 58 (-3.33%)
Mutual labels:  infosec, bugbounty
Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 1,572 (+2520%)
Mutual labels:  bugbounty, kali-linux
Hacking Security Ebooks
Top 100 Hacking & Security E-Books (Free Download)
Stars: ✭ 3,232 (+5286.67%)
Mutual labels:  books, kali-linux
Blue-Team-Notes
You didn't think I'd go and leave the blue team out, right?
Stars: ✭ 899 (+1398.33%)
Mutual labels:  cybersecurity, infosec
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+1026.67%)
Mutual labels:  cybersecurity, digital-forensics
Malware-Zoo
Hashes of infamous malware
Stars: ✭ 18 (-70%)
Mutual labels:  cybersecurity, malware-analysis
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+136.67%)
Mutual labels:  infosec, bugbounty
NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (+1.67%)
Mutual labels:  cybersecurity, infosec
1-60 of 1514 similar projects