PatrowlmanagerPatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (+706.67%)
CloudfruntA tool for identifying misconfigured CloudFront domains
Stars: ✭ 281 (+524.44%)
DhcpwnAll your IPs are belong to us.
Stars: ✭ 642 (+1326.67%)
Top25 ParameterFor basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙
Stars: ✭ 388 (+762.22%)
ShonyDanzaA customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (+91.11%)
Paper collectionAcademic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
Stars: ✭ 710 (+1477.78%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+1893.33%)
Mr.sipSIP-Based Audit and Attack Tool
Stars: ✭ 266 (+491.11%)
Impulse💣 Impulse Denial-of-service ToolKit
Stars: ✭ 538 (+1095.56%)
HellraiserVulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (+817.78%)
mitre-visualizer🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
Stars: ✭ 49 (+8.89%)
Grauditgrep rough audit - source code auditing tool
Stars: ✭ 747 (+1560%)
Physics CommandPhysics platform is a tool for hardware systems (e.g: raspberryPi 3B ). It retrieves data passing through the network and sends it to a control panel. It works the same way as a botnet by receiving remote commands. (you can imagine that as a black box)
Stars: ✭ 23 (-48.89%)
NucleiFast and customizable vulnerability scanner based on simple YAML based DSL.
Stars: ✭ 6,307 (+13915.56%)
AutordpwnThe Shadow Attack Framework
Stars: ✭ 688 (+1428.89%)
DifuzeFuzzer for Linux Kernel Drivers
Stars: ✭ 285 (+533.33%)
Curl CollisionsAn implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
Stars: ✭ 20 (-55.56%)
DependencycheckOWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
Stars: ✭ 3,571 (+7835.56%)
SeccubusEasy automated vulnerability scanning, reporting and analysis
Stars: ✭ 615 (+1266.67%)
AMEVulDetectorSmart Contract Vulnerability Detection From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion (IJCAI-21 Accepted)
Stars: ✭ 23 (-48.89%)
MarsnakeSystem Optimizer and Monitoring, Security Auditing, Vulnerability scanner for Linux, macOS, and UNIX-based systems
Stars: ✭ 16 (-64.44%)
iyovWeb proxy for http(s) for developers to analyze data between client and servers based on workerman, especailly for app developers.
Stars: ✭ 27 (-40%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+817.78%)
Rapidscan🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+1622.22%)
DeauthdetectorDetect deauthentication frames using an ESP8266
Stars: ✭ 406 (+802.22%)
Wi PwnESP8266 Deauther with a material design WebUI 📶
Stars: ✭ 839 (+1764.44%)
Duckhunt🎯 Prevent RubberDucky (or other keystroke injection) attacks
Stars: ✭ 386 (+757.78%)
Dependency TrackDependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
Stars: ✭ 718 (+1495.56%)
SecuritymanageframworkSecurity Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Stars: ✭ 378 (+740%)
SafetySafety checks your installed dependencies for known security vulnerabilities
Stars: ✭ 982 (+2082.22%)
Ssrf vulnerable labThis Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Stars: ✭ 361 (+702.22%)
EmagnetAutomated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password together from recent uploads from https://pastebin.com. Bruteforce support for spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts
Stars: ✭ 688 (+1428.89%)
ApiVulners Python API wrapper
Stars: ✭ 313 (+595.56%)
WhourTool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.
Stars: ✭ 18 (-60%)
BootstompBootStomp: a bootloader vulnerability finder
Stars: ✭ 303 (+573.33%)
EvilurlGenerate unicode evil domains for IDN Homograph Attack and detect them.
Stars: ✭ 654 (+1353.33%)
Xunfeng巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Stars: ✭ 3,131 (+6857.78%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+2142.22%)
FluxionFluxion is a remake of linset by vk496 with enhanced functionality.
Stars: ✭ 3,275 (+7177.78%)
SingularityA DNS rebinding attack framework.
Stars: ✭ 621 (+1280%)
ArachniWeb Application Security Scanner Framework
Stars: ✭ 2,942 (+6437.78%)
NerveNERVE Continuous Vulnerability Scanner
Stars: ✭ 267 (+493.33%)
Esp8266 beaconspamCreates up to a thousand WiFi access points with custom SSIDs.
Stars: ✭ 575 (+1177.78%)
T3[EMNLP 2020] "T3: Tree-Autoencoder Constrained Adversarial Text Generation for Targeted Attack" by Boxin Wang, Hengzhi Pei, Boyuan Pan, Qian Chen, Shuohang Wang, Bo Li
Stars: ✭ 25 (-44.44%)
Wazuh ChefWazuh - Chef cookbooks
Stars: ✭ 9 (-80%)
rpl-attacksRPL attacks framework for simulating WSN with a malicious mote based on Contiki
Stars: ✭ 56 (+24.44%)
Buy pig plan电话攻击(电话轰炸、可代替短信轰炸)、留言攻击工具 | 已删库
Stars: ✭ 506 (+1024.44%)
NSE-scriptsNSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473
Stars: ✭ 105 (+133.33%)
VfeedThe Correlated CVE Vulnerability And Threat Intelligence Database API
Stars: ✭ 826 (+1735.56%)
ChimeraChimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (+928.89%)
BurpbountyBurp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the active and passive scanner by means of personalized rules through a very intuitive graphical interface.
Stars: ✭ 1,026 (+2180%)
Arpspoof arpspoof for macOS - intercept packets on a switched LAN
Stars: ✭ 40 (-11.11%)
TrivyScanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues
Stars: ✭ 9,673 (+21395.56%)
CtiCyber Threat Intelligence Repository expressed in STIX 2.0
Stars: ✭ 822 (+1726.67%)
BitcrackerBitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Stars: ✭ 463 (+928.89%)