Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+3148.33%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (+15%)
flydnsRelated subdomains finder
Stars: ✭ 29 (-51.67%)
AutosetupAuto setup is a bash script compatible with Debian based distributions to install and setup necessary programs.
Stars: ✭ 140 (+133.33%)
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+1988.33%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+40%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+393.33%)
NosqlmapAutomated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+3113.33%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+14868.33%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+203.33%)
targetsA collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (+41.67%)
Pyiris BackdoorPyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (+141.67%)
Badkarmanetwork reconnaissance toolkit
Stars: ✭ 353 (+488.33%)
pyc2bytecodeA Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (+16.67%)
BigbountyreconBigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+801.67%)
Cvebase.comcvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (+46.67%)
FileintelA modular Python application to pull intelligence about malicious files
Stars: ✭ 97 (+61.67%)
KaliIntelligenceSuiteKali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standard penetration testing tools. The collected data is internally stored in a structured manner to allow the fast identification and visualisation of the collected information.
Stars: ✭ 58 (-3.33%)
toolkitThe essential toolkit for reversing, malware analysis, and cracking
Stars: ✭ 176 (+193.33%)
Chatterinternet monitoring osint telegram bot for windows
Stars: ✭ 123 (+105%)
ThecollectiveThe Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (+41.67%)
PrismaticaResponsive Command and Control System
Stars: ✭ 81 (+35%)
KartonDistributed malware processing framework based on Python, Redis and MinIO.
Stars: ✭ 134 (+123.33%)
Slack WatchmanMonitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (+165%)
Awesome Cybersecurity Blueteam💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Stars: ✭ 2,091 (+3385%)
VirtualsecconsAn ongoing list of virtual cybersecurity conferences.
Stars: ✭ 113 (+88.33%)
Fudgec2FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (+218.33%)
Visualize logsA Python library and command line tools to provide interactive log visualization.
Stars: ✭ 128 (+113.33%)
Gitlab WatchmanMonitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (+111.67%)
Black WidowGUI based offensive penetration testing tool (Open Source)
Stars: ✭ 124 (+106.67%)
Python HoneypotOWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (+166.67%)
LockphishLockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.
Stars: ✭ 186 (+210%)
tutorialsAdditional Resources For Securing The Stack Tutorials
Stars: ✭ 36 (-40%)
Mwdb CoreMalware repository component for samples & static configuration with REST API interface.
Stars: ✭ 125 (+108.33%)
BbreconPython library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (+181.67%)
netizenshipa commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (-45%)
Blackhat Python3Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 1,125 (+1775%)
From Junior To SeniorMy study plan for going from junior to senior software developer
Stars: ✭ 104 (+73.33%)
Reading MaterialList of some useful blogs, books, courses, papers etc. 📚
Stars: ✭ 116 (+93.33%)
ReplThe Learning Hub for UoL's Online CS Students
Stars: ✭ 367 (+511.67%)
fuzzmostall manner of wordlists
Stars: ✭ 23 (-61.67%)
phisherpriceAll In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-36.67%)
OwlyshieldOwlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+368.33%)
h1-searchTool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.
Stars: ✭ 58 (-3.33%)
SudomySudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 1,572 (+2520%)
Blue-Team-NotesYou didn't think I'd go and leave the blue team out, right?
Stars: ✭ 899 (+1398.33%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+1026.67%)
Malware-ZooHashes of infamous malware
Stars: ✭ 18 (-70%)
tugareconPentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+136.67%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (+1.67%)