TiaYour Advanced Twitter stalking tool
Stars: ✭ 98 (-63.57%)
Vps个人笔记汇总
Stars: ✭ 276 (+2.6%)
DotDarknet OSINT Transform
Stars: ✭ 93 (-65.43%)
EvilUSBQuick utility to craft executables for pentesting and managing reverse shells
Stars: ✭ 33 (-87.73%)
ivreNetwork recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,712 (+908.18%)
PervertgramA project for stalking people on Instagram.
Stars: ✭ 88 (-67.29%)
ARL-NPoC集漏洞验证和任务运行的一个框架
Stars: ✭ 73 (-72.86%)
BadmodCMS auto detect and exploit.
Stars: ✭ 296 (+10.04%)
goLazagneGo library for credentials recovery
Stars: ✭ 177 (-34.2%)
DumbDumain Bruteforcer - a fast and flexible domain bruteforcer
Stars: ✭ 54 (-79.93%)
GitmadMonitor, Alert, and Discover sensitive info and data leakage on Github.
Stars: ✭ 81 (-69.89%)
swiss-bugbounty-programsList of bug bounty and coordinated vulnerability disclosure programs of companies/organisations in Switzerland
Stars: ✭ 25 (-90.71%)
PoopakPOOPAK - TOR Hidden Service Crawler
Stars: ✭ 78 (-71%)
juumla🦁 Juumla is a python tool created to identify Joomla version, scan for vulnerabilities and search for config or backup files.
Stars: ✭ 107 (-60.22%)
SwiftscanA barcode and qr code scanner( 二维码/条形码扫描、生成,仿微信、支付宝)
Stars: ✭ 293 (+8.92%)
The EndorserAn OSINT tool that allows you to draw out relationships between people on LinkedIn via endorsements/skills.
Stars: ✭ 269 (+0%)
jsleaka Go code to detect leaks in JS files via regex patterns
Stars: ✭ 111 (-58.74%)
wifibangwifi attacks suite
Stars: ✭ 56 (-79.18%)
CloudscraperCloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.
Stars: ✭ 276 (+2.6%)
GitgrabergitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...
Stars: ✭ 1,164 (+332.71%)
Dfw1n OsintAustralian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Stars: ✭ 63 (-76.58%)
NSE-scriptsNSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473
Stars: ✭ 105 (-60.97%)
ceroScrape domain names from SSL certificates of arbitrary hosts
Stars: ✭ 316 (+17.47%)
LuciferA Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+12.27%)
STIANo description or website provided.
Stars: ✭ 18 (-93.31%)
Intrigue CoreDiscover Your Attack Surface!
Stars: ✭ 1,013 (+276.58%)
WiFi-ProjectPre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (-91.82%)
RFMapRFMap - Radio Frequency Mapper
Stars: ✭ 23 (-91.45%)
beholder web一款监控端口变化的系统——beholder_web端
Stars: ✭ 18 (-93.31%)
clairvoyanceObtain GraphQL API Schema even if the introspection is not enabled
Stars: ✭ 448 (+66.54%)
citrixmash scannerA fast multi threaded scanner for Citrix ADC (NetScaler) CVE-2019-19781 - Citrixmash / Shitrix
Stars: ✭ 36 (-86.62%)
aqua-helmHelm Charts For Installing Aqua Security Components
Stars: ✭ 68 (-74.72%)
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-91.45%)
ApulloA scanner for taking basic fingerprints
Stars: ✭ 22 (-91.82%)
Windows Post ExploitationWindows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (+10.04%)
metagoofilSearch Google and download specific file types
Stars: ✭ 174 (-35.32%)
RaptorWeb-based Source Code Vulnerability Scanner
Stars: ✭ 314 (+16.73%)
Ctf NotesEverything needed for doing CTFs
Stars: ✭ 304 (+13.01%)
Android ExploitsA collection of android Exploits and Hacks
Stars: ✭ 290 (+7.81%)
Soup☎️ Original open source call flooder using Twilio's API.
Stars: ✭ 267 (-0.74%)
sherlock🔎 Find usernames across social networks.
Stars: ✭ 47 (-82.53%)
Inventory KameraScans Genshin Impact characters, artifacts, and weapons from the game window into a JSON file.
Stars: ✭ 348 (+29.37%)
cf-checkCloudFlare Checker written in Go
Stars: ✭ 147 (-45.35%)
ParamspiderMining parameters from dark corners of Web Archives
Stars: ✭ 781 (+190.33%)
warfWARF is a Web Application Reconnaissance Framework that helps to gather information about the target.
Stars: ✭ 53 (-80.3%)
request smugglerHttp request smuggling vulnerability scanner
Stars: ✭ 203 (-24.54%)
occliUnofficial Command Line Interface for OpenCorporates
Stars: ✭ 18 (-93.31%)
ShadowCloneUnleash the power of cloud
Stars: ✭ 224 (-16.73%)
MegplusAutomated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]
Stars: ✭ 268 (-0.37%)
BrutusBotnet targeting Windows machines written entirely in Python & open source security project.
Stars: ✭ 37 (-86.25%)
pnscanPeter's Parallel Network Scanner
Stars: ✭ 117 (-56.51%)