ZigdiggityA ZigBee hacking toolkit by Bishop Fox
Stars: ✭ 169 (-57.75%)
TrivyScanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues
Stars: ✭ 9,673 (+2318.25%)
ReconnoteWeb Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
Stars: ✭ 322 (-19.5%)
ChangemeA default credential scanner.
Stars: ✭ 928 (+132%)
DirsearchA Go implementation of dirsearch.
Stars: ✭ 164 (-59%)
YlvaCommand line password manager for Unix-like operating systems
Stars: ✭ 23 (-94.25%)
freebindIPv4 and IPv6 address rate limiting evasion tool
Stars: ✭ 88 (-78%)
SubdomainizerA tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.
Stars: ✭ 915 (+128.75%)
MinesweeperA Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-59.5%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+124.25%)
Xeexe TopantivirusevasionUndetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (-3.25%)
PatrowlenginesPatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 162 (-59.5%)
MarsnakeSystem Optimizer and Monitoring, Security Auditing, Vulnerability scanner for Linux, macOS, and UNIX-based systems
Stars: ✭ 16 (-96%)
FragscapyFragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multiple successive tests to determine which options can be used to evade firewalls and IDS.
Stars: ✭ 52 (-87%)
TorbotDark Web OSINT Tool
Stars: ✭ 821 (+105.25%)
ExeinExein core for Linux based firmware
Stars: ✭ 158 (-60.5%)
ThugPython low-interaction honeyclient
Stars: ✭ 818 (+104.5%)
ModlishkaModlishka. Reverse Proxy.
Stars: ✭ 3,634 (+808.5%)
SprayingtoolkitScripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
Stars: ✭ 802 (+100.5%)
RescopeRescope is a tool geared towards pentesters and bugbounty researchers, that aims to make life easier when defining scopes for Burp Suite and OWASP ZAP.
Stars: ✭ 156 (-61%)
PompemFind exploit tool
Stars: ✭ 786 (+96.5%)
ScareCrow-CobaltStrikeCobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)
Stars: ✭ 387 (-3.25%)
Rapidscan🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+93.75%)
WebhashcatHashcat web interface
Stars: ✭ 151 (-62.25%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+91%)
SpicypassA light-weight password manager with a focus on simplicity and security
Stars: ✭ 367 (-8.25%)
InterlaceEasily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+90%)
DiscordcryptEnd-To-End File & Message Encryption For Discord
Stars: ✭ 150 (-62.5%)
Grauditgrep rough audit - source code auditing tool
Stars: ✭ 747 (+86.75%)
EvaderPacker (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)
Stars: ✭ 86 (-78.5%)
BluespawnAn Active Defense and EDR software to empower Blue Teams
Stars: ✭ 737 (+84.25%)
BrakemanA static analysis security vulnerability scanner for Ruby on Rails applications
Stars: ✭ 6,281 (+1470.25%)
RaptorWeb-based Source Code Vulnerability Scanner
Stars: ✭ 314 (-21.5%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (+82%)
LibdiffuzzCustom memory allocator that helps discover reads from uninitialized memory
Stars: ✭ 147 (-63.25%)
Fail2banDaemon to ban hosts that cause multiple authentication errors
Stars: ✭ 6,677 (+1569.25%)
DNSWhotransmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV
Stars: ✭ 47 (-88.25%)
Gg ShieldDetect secret in source code, scan your repo for leaks. Find secrets with GitGuardian and prevent leaked credentials. GitGuardian is an automated secrets detection & remediation service.
Stars: ✭ 708 (+77%)
IntelowlIntel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Stars: ✭ 2,114 (+428.5%)
HardeningHardening Ubuntu. Systemd edition.
Stars: ✭ 705 (+76.25%)
GadgetprobeProbe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.
Stars: ✭ 381 (-4.75%)
WebpocketExploit management framework
Stars: ✭ 142 (-64.5%)
Sentinel AttackTools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Stars: ✭ 676 (+69%)
angr-antievasionFinal project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).
Stars: ✭ 35 (-91.25%)
ConsolemeA Central Control Plane for AWS Permissions and Access
Stars: ✭ 2,631 (+557.75%)
Jok3rJok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (+61.25%)
Awesome Windows Red Team A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams
Stars: ✭ 308 (-23%)
Personal Security Checklist🔒 A curated checklist of 300+ tips for protecting digital security and privacy in 2021
Stars: ✭ 2,388 (+497%)
AdhritAndroid Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.
Stars: ✭ 399 (-0.25%)
ApplicationinspectorA source code analyzer built for surfacing features of interest and other characteristics to answer the question 'What's in the code?' quickly using static analysis with a json based rules engine. Ideal for scanning components before use or detecting feature level changes.
Stars: ✭ 3,873 (+868.25%)
Envizonnetwork visualization & vulnerability management/reporting
Stars: ✭ 382 (-4.5%)
Rustscan🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+1204.5%)
WatchdogWatchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (-13.75%)
Recon PipelineAn automated target reconnaissance pipeline.
Stars: ✭ 278 (-30.5%)
PwnbackBurp Extender plugin that generates a sitemap of a website using Wayback Machine
Stars: ✭ 203 (-49.25%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-80.25%)