CitadelCollection of pentesting scripts
Stars: ✭ 333 (+291.76%)
Awesome InfosecA curated list of awesome infosec courses and training resources.
Stars: ✭ 3,779 (+4345.88%)
Linuxprivcheckerlinuxprivchecker.py -- a Linux Privilege Escalation Check Script
Stars: ✭ 715 (+741.18%)
DnsliveryEasy files and payloads delivery over DNS
Stars: ✭ 332 (+290.59%)
Offensive DockerOffensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (+285.88%)
Log Requests To SqliteBURP extension to record every HTTP request send via BURP and create an audit trail log of an assessment.
Stars: ✭ 44 (-48.24%)
Awesome Web Security🐶 A curated list of Web Security materials and resources.
Stars: ✭ 6,623 (+7691.76%)
WatcherWatcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Stars: ✭ 324 (+281.18%)
Redteam ResearchCollection of PoC and offensive techniques used by the BlackArrow Red Team
Stars: ✭ 330 (+288.24%)
CansinaWeb Content Discovery Tool
Stars: ✭ 709 (+734.12%)
CybersecurityA curriculum for a high school cyber security course.
Stars: ✭ 329 (+287.06%)
PivotsuiteNetwork Pivoting Toolkit
Stars: ✭ 329 (+287.06%)
HoundsploitAn advanced graphical search engine for Exploit-DB
Stars: ✭ 81 (-4.71%)
GithacktoolsThe best Hacking and PenTesting tools installer on the world
Stars: ✭ 78 (-8.24%)
SmershSmersh is a pentest oriented collaborative tool used to track the progress of your company's missions.
Stars: ✭ 43 (-49.41%)
HtshellsSelf contained htaccess shells and attacks
Stars: ✭ 708 (+732.94%)
Langhost👻 A LAN dropbox chatbot controllable via Telegram
Stars: ✭ 324 (+281.18%)
ReconnoteWeb Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
Stars: ✭ 322 (+278.82%)
PsattackA portable console aimed at making pentesting with PowerShell a little easier.
Stars: ✭ 1,021 (+1101.18%)
SublertSublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (+722.35%)
GetaltnameExtract subdomains from SSL certificates in HTTPS sites.
Stars: ✭ 320 (+276.47%)
MemlabsEducational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+718.82%)
InjuredandroidA vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
Stars: ✭ 317 (+272.94%)
AirgeddonThis is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (+4405.88%)
VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+10304.71%)
Intrigue CoreDiscover Your Attack Surface!
Stars: ✭ 1,013 (+1091.76%)
H1stThe AI Application Platform We All Need. Human AND Machine Intelligence. Based on experience building AI solutions at Panasonic: robotics predictive maintenance, cold-chain energy optimization, Gigafactory battery mfg, avionics, automotive cybersecurity, and more.
Stars: ✭ 697 (+720%)
NmapguiAdvanced Graphical User Interface for NMap
Stars: ✭ 318 (+274.12%)
VajraVajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (+216.47%)
BashfuscatorA fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.
Stars: ✭ 690 (+711.76%)
OsintgramOsintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Stars: ✭ 312 (+267.06%)
AggressorscriptsCollection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources
Stars: ✭ 1,008 (+1085.88%)
WebanalyzePort of Wappalyzer (uncovers technologies used on websites) to automate mass scanning.
Stars: ✭ 311 (+265.88%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+6680%)
Findom XssA fast DOM based XSS vulnerability scanner with simplicity.
Stars: ✭ 310 (+264.71%)
ConptyshellConPtyShell - Fully Interactive Reverse Shell for Windows
Stars: ✭ 309 (+263.53%)
CerteagleWeaponizing Live CT logs for automated monitoring of assets
Stars: ✭ 78 (-8.24%)
Ir RescueA Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+265.88%)
KeyloggerA simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (+1084.71%)
BrutalPayload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (+697.65%)
HackdroidAndroid Apps, Roms and Platforms for Pentesting
Stars: ✭ 310 (+264.71%)
HettyHetty is an HTTP toolkit for security research.
Stars: ✭ 3,596 (+4130.59%)
DnsbruteDNS Sub-domain brute forcer, in Python + gevent
Stars: ✭ 40 (-52.94%)
MalsubA Python RESTful API framework for online malware analysis and threat intelligence services.
Stars: ✭ 308 (+262.35%)
FuzzdictsWeb Pentesting Fuzz 字典,一个就够了。
Stars: ✭ 4,013 (+4621.18%)
MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+4000%)
Sentinel AttackTools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Stars: ✭ 676 (+695.29%)
Ctf NotesEverything needed for doing CTFs
Stars: ✭ 304 (+257.65%)
Recommendations for engineersAll of my recommendations for aspiring engineers in a single place, coming from various areas of interest.
Stars: ✭ 39 (-54.12%)
Thc Ipv6IPv6 attack toolkit
Stars: ✭ 673 (+691.76%)
SwiftnessxA cross-platform note-taking & target-tracking app for penetration testers.
Stars: ✭ 673 (+691.76%)
BadintentIntercept, modify, repeat and attack Android's Binder transactions using Burp Suite
Stars: ✭ 303 (+256.47%)
FfmFreedom Fighting Mode: open source hacking harness
Stars: ✭ 302 (+255.29%)
WebkillerTool Information Gathering Write By Python.
Stars: ✭ 300 (+252.94%)