giggerGit folder digger, I'm sure it's worthwhile stuff.
Stars: ✭ 39 (-89.08%)
LegionAutomatic Enumeration Tool based in Open Source tools
Stars: ✭ 280 (-21.57%)
ad-privileged-auditProvides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (-88.24%)
rejigTurn your VPS into an attack box
Stars: ✭ 33 (-90.76%)
cvehoundCheck linux sources dump for known CVEs.
Stars: ✭ 74 (-79.27%)
championscurriculumA training curriculum for teaching information security "champions" within small organisations and helping them conduct a basic assessment. (Work in progress)
Stars: ✭ 18 (-94.96%)
honeykuA Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).
Stars: ✭ 56 (-84.31%)
RdpCacheStitcherRdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (-50.7%)
cwe-sdk-javascriptA Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC
Stars: ✭ 18 (-94.96%)
introspectorA schema and set of tools for using SQL to query cloud infrastructure.
Stars: ✭ 61 (-82.91%)
WinappdbgWinAppDbg Debugger
Stars: ✭ 338 (-5.32%)
Reconky-Automated Bash ScriptReconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (-53.22%)
DcRatA simple remote tool in C#.
Stars: ✭ 709 (+98.6%)
nseNmap NSE scripts
Stars: ✭ 23 (-93.56%)
TIGMINTTIGMINT: OSINT (Open Source Intelligence) GUI software framework
Stars: ✭ 195 (-45.38%)
oscp-omnibusA collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (-87.11%)
DomainCATDomain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations
Stars: ✭ 34 (-90.48%)
BootstompBootStomp: a bootloader vulnerability finder
Stars: ✭ 303 (-15.13%)
Red-Team-EssentialsThis repo will contain some basic pentest/RT commands.
Stars: ✭ 22 (-93.84%)
adv-dnn-ens-malwareadversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants
Stars: ✭ 33 (-90.76%)
OctopusOctopus - Network Scan/Infos & Web Scan
Stars: ✭ 25 (-93%)
Hack4Squad💀 A bash hacking and scanning framework.
Stars: ✭ 45 (-87.39%)
nvdcveNVD/CVE as JSON files
Stars: ✭ 79 (-77.87%)
ImpulsiveDLLHijackC# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
Stars: ✭ 258 (-27.73%)
OSINTBookmarksOSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (-90.48%)
Malware-ZooHashes of infamous malware
Stars: ✭ 18 (-94.96%)
HettyHetty is an HTTP toolkit for security research.
Stars: ✭ 3,596 (+907.28%)
vulnerablecodeA free and open vulnerabilities database and the packages they impact. And the tools to aggregate and correlate these vulnerabilities. Sponsored by NLnet https://nlnet.nl/project/vulnerabilitydatabase/ for https://www.aboutcode.org/ Chat at https://gitter.im/aboutcode-org/vulnerablecode Docs at https://vulnerablecode.readthedocs.org/
Stars: ✭ 269 (-24.65%)
cytroneCyTrONE: Integrated Cybersecurity Training Framework
Stars: ✭ 72 (-79.83%)
APAC-MeetupsA community contributed consolidated list of InfoSec meetups in the Asia Pacific region.
Stars: ✭ 52 (-85.43%)
SubcertSubcert is an subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.
Stars: ✭ 58 (-83.75%)
ArmorLibEasily scan files for threats to security and privacy. A Rust library and command line tool. WIP.
Stars: ✭ 20 (-94.4%)
attckr⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (-93.84%)
recommendations-for-engineersAll of my recommendations for aspiring engineers in a single place, coming from various areas of interest.
Stars: ✭ 81 (-77.31%)
CyberQueensCyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨💻
Stars: ✭ 30 (-91.6%)
lunasecLunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requests and Builds. Protect yourself in 30 seconds with the LunaTrace GitHub App: https://github.com/marketplace/lunatrace-by-lunasec/
Stars: ✭ 1,261 (+253.22%)
log4j2-rce-exploitlog4j2 remote code execution or IP leakage exploit (with examples)
Stars: ✭ 62 (-82.63%)
OwlyshieldOwlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (-21.29%)
Awesome InfosecA curated list of awesome infosec courses and training resources.
Stars: ✭ 3,779 (+958.54%)
sx🖖 Fast, modern, easy-to-use network scanner
Stars: ✭ 1,267 (+254.9%)
pyiocutilsA collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).
Stars: ✭ 18 (-94.96%)
hacktheboxNotes Taken for HTB Machines & InfoSec Community.
Stars: ✭ 286 (-19.89%)
Pwdb-PublicA collection of all the data i could extract from 1 billion leaked credentials from internet.
Stars: ✭ 2,529 (+608.4%)
ExploitsA personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in conjunction with these exploits.
Stars: ✭ 75 (-78.99%)
Recon-XAdvanced Reconnaissance tool to enumerate attacking surface of the target.
Stars: ✭ 27 (-92.44%)
CripsIP Tools To quickly get information about IP Address's, Web Pages and DNS records.
Stars: ✭ 272 (-23.81%)
EagleMultithreaded Plugin based vulnerability scanner for mass detection of web-based applications vulnerabilities
Stars: ✭ 85 (-76.19%)
go-spyseThe official wrapper for spyse.com API, written in Go, aimed to help developers build their integrations with Spyse.
Stars: ✭ 25 (-93%)
TIWAPTotally Insecure Web Application Project (TIWAP)
Stars: ✭ 137 (-61.62%)
fame modulesCommunity modules for FAME
Stars: ✭ 55 (-84.59%)
massnmapScans an internal network using massscan and nmap
Stars: ✭ 18 (-94.96%)
CcatCloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Stars: ✭ 300 (-15.97%)