WatchdogWatchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (+255.67%)
SpicypassA light-weight password manager with a focus on simplicity and security
Stars: ✭ 367 (+278.35%)
Gophergameserver🏆 Feature packed, easy-to-use game server API for Go back-ends and Javascript clients. Tutorials and examples included!
Stars: ✭ 61 (-37.11%)
UnsignRemove code signatures from OSX Mach-O binaries (note: unsigned binaries cannot currently be re-codesign'ed. Patches welcome!)
Stars: ✭ 362 (+273.2%)
ScriptsScripts I use during pentest engagements.
Stars: ✭ 834 (+759.79%)
Vulnerable AdCreate a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
Stars: ✭ 360 (+271.13%)
Sysmon ModularA repository of sysmon configuration modules
Stars: ✭ 1,229 (+1167.01%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+7891.75%)
BrutedetGeneralized proof of concept tool which can be used for drop-in bruteforce protection when needed.
Stars: ✭ 5 (-94.85%)
RtaRed team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.
Stars: ✭ 358 (+269.07%)
FuxiPenetration Testing Platform
Stars: ✭ 1,103 (+1037.11%)
Hunter(l)user hunter using WinAPI calls only
Stars: ✭ 359 (+270.1%)
TlsfuzzerSSL and TLS protocol test suite and fuzzer
Stars: ✭ 335 (+245.36%)
Sn0intSemi-automatic OSINT framework and package manager
Stars: ✭ 814 (+739.18%)
VulmapVulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+1012.37%)
Htrace.shMy simple Swiss Army knife for http/https troubleshooting and profiling.
Stars: ✭ 3,465 (+3472.16%)
QtoxqTox is a chat, voice, video, and file transfer IM client using the encrypted peer-to-peer Tox protocol.
Stars: ✭ 3,843 (+3861.86%)
LyricpassPassword wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security research.
Stars: ✭ 58 (-40.21%)
Awesome OscpA curated list of awesome OSCP resources
Stars: ✭ 804 (+728.87%)
Syzkallersyzkaller is an unsupervised coverage-guided kernel fuzzer
Stars: ✭ 3,841 (+3859.79%)
Pest🐞 Primitive Erlang Security Tool
Stars: ✭ 79 (-18.56%)
JitsiJitsi is an audio/video and chat communicator that supports protocols such as SIP, XMPP/Jabber, IRC and many other useful features.
Stars: ✭ 3,531 (+3540.21%)
StegextractDetect hidden files and text in images
Stars: ✭ 79 (-18.56%)
Giggle📞 Giggle Jingle library for XMPP, implementation of XEP-0166.
Stars: ✭ 55 (-43.3%)
Awesome InfosecA curated list of awesome infosec courses and training resources.
Stars: ✭ 3,779 (+3795.88%)
PompemFind exploit tool
Stars: ✭ 786 (+710.31%)
Secure Ios App DevCollection of the most common vulnerabilities found in iOS applications
Stars: ✭ 1,288 (+1227.84%)
EsdEnumeration sub domains(枚举子域名)
Stars: ✭ 785 (+709.28%)
ReconnoteWeb Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
Stars: ✭ 322 (+231.96%)
Gb28181.solutionLinux/Win/Docker/kubernetes/Chart/Kustomize/GB28181/SIP/RTP/SDP/WebRTC/作为上下级域/平台级联互联
Stars: ✭ 323 (+232.99%)
KaboomA tool to automate penetration tests
Stars: ✭ 322 (+231.96%)
Webapp ChecklistTechnical details that a programmer of a web application should consider before making the site public.
Stars: ✭ 320 (+229.9%)
Hackertarget🎯 HackerTarget ToolKit - Tools And Network Intelligence To Help Organizations With Attack Surface Discovery 🎯
Stars: ✭ 320 (+229.9%)
ModlishkaModlishka. Reverse Proxy.
Stars: ✭ 3,634 (+3646.39%)
OsintgramOsintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Stars: ✭ 312 (+221.65%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-18.56%)
SkaSimple Karma Attack
Stars: ✭ 55 (-43.3%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+698.97%)
ConptyshellConPtyShell - Fully Interactive Reverse Shell for Windows
Stars: ✭ 309 (+218.56%)
Monster UiThe JavaScript framework to leverages the power of Kazoo
Stars: ✭ 54 (-44.33%)
HackdroidAndroid Apps, Roms and Platforms for Pentesting
Stars: ✭ 310 (+219.59%)
CsetCybersecurity Evaluation Tool
Stars: ✭ 304 (+213.4%)
PolichombrCollaborative malware analysis framework
Stars: ✭ 307 (+216.49%)
ErodirA fast web directory/file enumeration tool written in Rust
Stars: ✭ 94 (-3.09%)
Ctf NotesEverything needed for doing CTFs
Stars: ✭ 304 (+213.4%)
Wahayan easy-to-use, secure and decentralized conference call application (this repository is a mirror of an internal work repository)
Stars: ✭ 79 (-18.56%)
JaelesThe Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+1006.19%)
ScapyScapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Stars: ✭ 6,932 (+7046.39%)
Ethereum ListsA repository for maintaining lists of things like malicious URLs, fake token addresses, and so forth. We love lists.
Stars: ✭ 300 (+209.28%)
WebkillerTool Information Gathering Write By Python.
Stars: ✭ 300 (+209.28%)
SonarsearchA MongoDB importer and API for Project Sonars DNS datasets
Stars: ✭ 297 (+206.19%)
Linux Secureboot KitTool for complete hardening of Linux boot chain with UEFI Secure Boot
Stars: ✭ 54 (-44.33%)
DotdotslashSearch for Directory Traversal Vulnerabilities
Stars: ✭ 297 (+206.19%)
H2csmugglerHTTP Request Smuggling over HTTP/2 Cleartext (h2c)
Stars: ✭ 292 (+201.03%)