PwnshopExploit Development, Reverse Engineering & Cryptography
Stars: ✭ 167 (-2.34%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+412.28%)
Tombthe Crypto Undertaker
Stars: ✭ 859 (+402.34%)
ApkurlgrepExtract endpoints from APK files
Stars: ✭ 405 (+136.84%)
CryfsCryptographic filesystem for the cloud
Stars: ✭ 1,560 (+812.28%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+197.66%)
MaskbookThe portal to the new, open internet. ([I:b])
Stars: ✭ 691 (+304.09%)
AcraDatabase security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
Stars: ✭ 726 (+324.56%)
Crypto EsA cryptography algorithms library
Stars: ✭ 65 (-61.99%)
Python RansomwarePython Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (-43.86%)
Dymerge🔓 A dynamic dictionary merger for successful dictionary based attacks.
Stars: ✭ 167 (-2.34%)
Go JoseAn implementation of JOSE standards (JWE, JWS, JWT) in Go
Stars: ✭ 1,849 (+981.29%)
S2n Tlss2n : an implementation of the TLS/SSL protocols
Stars: ✭ 4,029 (+2256.14%)
DvwaDamn Vulnerable Web Application (DVWA)
Stars: ✭ 5,727 (+3249.12%)
Rando.jsThe world's easiest, most powerful random function.
Stars: ✭ 659 (+285.38%)
Virgil Crypto PhpVirgil PHP Crypto Library is a high-level cryptographic library that allows you to perform all necessary operations for secure storing and transferring data and everything required to become HIPAA and GDPR compliant.
Stars: ✭ 22 (-87.13%)
Red Teaming ToolkitThis repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Stars: ✭ 5,615 (+3183.63%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-63.74%)
Fhe Toolkit LinuxIBM Fully Homomorphic Encryption Toolkit For Linux. This toolkit is a Linux based Docker container that demonstrates computing on encrypted data without decrypting it! The toolkit ships with two demos including a fully encrypted Machine Learning inference with a Neural Network and a Privacy-Preserving key-value search.
Stars: ✭ 1,123 (+556.73%)
Apac ConferencesA community contributed consolidated list of InfoSec meetups in the Asia Pacific region.
Stars: ✭ 90 (-47.37%)
Mongoaudit🔥 A powerful MongoDB auditing and pentesting tool 🔥
Stars: ✭ 1,174 (+586.55%)
Noise.NET Standard 1.3 implementation of the Noise Protocol Framework (revision 33 of the spec)
Stars: ✭ 124 (-27.49%)
Demo Twilio Backend NodejsA sample backend that demonstrates how to generate a Virgil JWT and Twilio token used for authentication with the Virgil and Twilio services
Stars: ✭ 128 (-25.15%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+2333.92%)
UrlcrazyGenerate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (-12.28%)
ConstellationPeer-to-peer encrypted message exchange
Stars: ✭ 365 (+113.45%)
NmapIdiomatic nmap library for go developers
Stars: ✭ 391 (+128.65%)
Ctf Writeups PublicWriteups for infosec Capture the Flag events by team Galaxians
Stars: ✭ 331 (+93.57%)
Search That Hash🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+172.51%)
CovertutilsA framework for Backdoor development!
Stars: ✭ 424 (+147.95%)
SecurefsFilesystem in userspace (FUSE) with transparent authenticated encryption
Stars: ✭ 518 (+202.92%)
Awesome Sec TalksA collected list of awesome security talks
Stars: ✭ 3,411 (+1894.74%)
Passphrase WordlistPassphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (+225.15%)
NishangNishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: ✭ 5,943 (+3375.44%)
DirsearchWeb path scanner
Stars: ✭ 7,246 (+4137.43%)
Name That Hash🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 3000+ other hashes ☄ Comes with a neat web app 🔥
Stars: ✭ 540 (+215.79%)
Osint collectionMaintained collection of OSINT related resources. (All Free & Actionable)
Stars: ✭ 809 (+373.1%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+353.22%)
JaelesThe Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+527.49%)
Node Argon2Node.js bindings for Argon2 hashing algorithm
Stars: ✭ 1,008 (+489.47%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+564.33%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+641.52%)
ZboxZero-details, privacy-focused in-app file system.
Stars: ✭ 1,185 (+592.98%)
Hacker ContainerContainer with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-38.6%)
Badusb botnet👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-81.29%)
GoaltdnsA permutation generation tool written in golang
Stars: ✭ 119 (-30.41%)
CryptogotchasA collection of common (interesting) cryptographic mistakes.
Stars: ✭ 118 (-30.99%)
Padding Oracle Attacker🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.
Stars: ✭ 136 (-20.47%)
Mitmap📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+792.4%)
PhishapiComprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (+59.06%)
Hat.shencrypt and decrypt files in your browser. Fast, Secure client-side File Encryption and Decryption using the web crypto api
Stars: ✭ 886 (+418.13%)
VirtualsecconsAn ongoing list of virtual cybersecurity conferences.
Stars: ✭ 113 (-33.92%)
AsnlookupLeverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-4.68%)