VanquishVanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Stars: ✭ 449 (+362.89%)
Vxscanpython3写的综合扫描工具,主要用来存活验证,敏感文件探测(目录扫描/js泄露接口/html注释泄露),WAF/CDN识别,端口扫描,指纹/服务识别,操作系统识别,POC扫描,SQL注入,绕过CDN,查询旁站等功能,主要用来甲方自测或乙方授权测试,请勿用来搞破坏。
Stars: ✭ 1,244 (+1182.47%)
Gophergameserver🏆 Feature packed, easy-to-use game server API for Go back-ends and Javascript clients. Tutorials and examples included!
Stars: ✭ 61 (-37.11%)
Vivalasvenus@viva_las_venus -- This project is to learn, teach and awareness about privacy and security in the digital life, to build a better, more open and more inclusive world together!
Stars: ✭ 16 (-83.51%)
SalusSecurity scanner coordinator
Stars: ✭ 441 (+354.64%)
AppmonDocumentation:
Stars: ✭ 1,157 (+1092.78%)
SpoofcheckSimple script that checks a domain for email protections
Stars: ✭ 437 (+350.52%)
ScriptsScripts I use during pentest engagements.
Stars: ✭ 834 (+759.79%)
Sysmon ModularA repository of sysmon configuration modules
Stars: ✭ 1,229 (+1167.01%)
TorbotDark Web OSINT Tool
Stars: ✭ 821 (+746.39%)
Ios Chat开源的即时通讯(野火IM)系统
Stars: ✭ 867 (+793.81%)
React Native CallkeepiOS CallKit framework and Android ConnectionService for React Native
Stars: ✭ 430 (+343.3%)
EvilscanNodeJS Simple Network Scanner
Stars: ✭ 428 (+341.24%)
BurpaBurp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Application Security Testing (DAST).
Stars: ✭ 427 (+340.21%)
SteadyAnalyses your Java and Python applications for open-source dependencies with known vulnerabilities, using both static analysis and testing to determine code context and usage for greater accuracy. https://eclipse.github.io/steady/
Stars: ✭ 423 (+336.08%)
BrutedetGeneralized proof of concept tool which can be used for drop-in bruteforce protection when needed.
Stars: ✭ 5 (-94.85%)
Baresip Studiobaresip library based SIP client for Android
Stars: ✭ 97 (+0%)
Ssh MitmSSH man-in-the-middle tool
Stars: ✭ 1,328 (+1269.07%)
FuxiPenetration Testing Platform
Stars: ✭ 1,103 (+1037.11%)
ThugPython low-interaction honeyclient
Stars: ✭ 818 (+743.3%)
ContentSecurity automation content in SCAP, OSCAL, Bash, Ansible, and other formats
Stars: ✭ 1,219 (+1156.7%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+10674.23%)
PacketwhisperPacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (+317.53%)
ReconcatA small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any year or complete list of all years possible. Made Specially for penetration testing purpose.
Stars: ✭ 66 (-31.96%)
Sn0intSemi-automatic OSINT framework and package manager
Stars: ✭ 814 (+739.18%)
AdhritAndroid Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.
Stars: ✭ 399 (+311.34%)
Pentesting CookbookA set of recipes useful in pentesting and red teaming scenarios
Stars: ✭ 82 (-15.46%)
HuskyciPerforming security tests inside your CI
Stars: ✭ 398 (+310.31%)
CspThe Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing confidence and trust among the national Computer Security Incident Response Teams (CSIRTs) of the Member States and for promoting swift and effective operational cooperation.
Stars: ✭ 23 (-76.29%)
GhostwriterThe SpecterOps project management and reporting engine
Stars: ✭ 394 (+306.19%)
ApplicationinspectorA source code analyzer built for surfacing features of interest and other characteristics to answer the question 'What's in the code?' quickly using static analysis with a json based rules engine. Ideal for scanning components before use or detecting feature level changes.
Stars: ✭ 3,873 (+3892.78%)
KauditAlcide Kubernetes Audit Log Analyzer - Alcide kAudit
Stars: ✭ 23 (-76.29%)
LyricpassPassword wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security research.
Stars: ✭ 58 (-40.21%)
SprayingtoolkitScripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
Stars: ✭ 802 (+726.8%)
BusterAn advanced tool for email reconnaissance
Stars: ✭ 387 (+298.97%)
Fhe Toolkit LinuxIBM Fully Homomorphic Encryption Toolkit For Linux. This toolkit is a Linux based Docker container that demonstrates computing on encrypted data without decrypting it! The toolkit ships with two demos including a fully encrypted Machine Learning inference with a Neural Network and a Privacy-Preserving key-value search.
Stars: ✭ 1,123 (+1057.73%)
Awesome OscpA curated list of awesome OSCP resources
Stars: ✭ 804 (+728.87%)
Pest🐞 Primitive Erlang Security Tool
Stars: ✭ 79 (-18.56%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+7891.75%)
PyupA tool to update your project's dependencies on GitHub. Runs on pyup.io, comes with a command line interface.
Stars: ✭ 379 (+290.72%)
Web exploit detectorThe Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
Stars: ✭ 81 (-16.49%)
VulmapVulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+1012.37%)
Secure Ios App DevCollection of the most common vulnerabilities found in iOS applications
Stars: ✭ 1,288 (+1227.84%)
StegextractDetect hidden files and text in images
Stars: ✭ 79 (-18.56%)
Giggle📞 Giggle Jingle library for XMPP, implementation of XEP-0166.
Stars: ✭ 55 (-43.3%)
PompemFind exploit tool
Stars: ✭ 786 (+710.31%)
EsdEnumeration sub domains(枚举子域名)
Stars: ✭ 785 (+709.28%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-18.56%)