ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+2604%)
goblin一款适用于红蓝对抗中的仿真钓鱼系统
Stars: ✭ 844 (+3276%)
urlRecon📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (+24%)
Eduponics-MiniMicroPython MQTT & code example for Eduponics mini ESP32 learning kit
Stars: ✭ 41 (+64%)
ADLESAutomated Deployment of Lab Environments System (ADLES)
Stars: ✭ 28 (+12%)
quick-recon.pyDo some quick reconnaissance on a domain-based web-application
Stars: ✭ 13 (-48%)
Linux-Active-Directory-join-scriptActive directory Join script for Ubuntu, Debian, CentOS, Linux Mint, Fedora, Kali, Elementary OS and Raspbian with built in failchcheck and debugmode for Ubuntu. "The most advanced and updated AD join script on GITHUB for Linux"
Stars: ✭ 97 (+288%)
qvm-create-windows-qubeSpin up new Windows qubes quickly, effortlessly and securely on Qubes OS
Stars: ✭ 267 (+968%)
ubuntuInstall ubuntu in Termux Without Rooted Device
Stars: ✭ 77 (+208%)
RdpCacheStitcherRdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+604%)
SentryPeerA distributed peer to peer list of bad actor IP addresses and phone numbers collected via a SIP Honeypot.
Stars: ✭ 108 (+332%)
bx-dockerTutorial on how to build Docker Images for the IAR Build Tools on Linux hosts. The IAR Build Tools on Linux are available for Arm, RISC-V and Renesas (RH850, RL78 and RX).
Stars: ✭ 28 (+12%)
wifi-selectTool for selecting wifi networks in ArchLinux console
Stars: ✭ 29 (+16%)
log4j-detectorLog4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!
Stars: ✭ 622 (+2388%)
ioc-scannerSearch a filesystem for indicators of compromise (IoC).
Stars: ✭ 31 (+24%)
wifiexplorer-sensor[DEPRECATED] Enables remote scanning in WiFi Explorer Pro
Stars: ✭ 37 (+48%)
anon-hotspotOn demand Debian Linux (Tor) Hotspot setup tool
Stars: ✭ 34 (+36%)
python-libmaasOfficial python client library for MAAS
Stars: ✭ 45 (+80%)
aeacus🔐 Vulnerability remediation scoring system
Stars: ✭ 52 (+108%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (+44%)
SafeObjectIOS崩溃异常的处理,防止数组越界,字典空值处理
Stars: ✭ 84 (+236%)
FSEC-VMBackend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-24%)
my-qt-crasher😽🖥💥 Example MacOS, Windows, and Linux Qt application integrated with Crashpad.
Stars: ✭ 29 (+16%)
dorothyDorothy is a tool to test security monitoring and detection for Okta environments
Stars: ✭ 85 (+240%)
Mis-Comandos-Linux📋 Lista descrita de mis 💯 comandos favoritos ⭐ en GNU/Linux 💻
Stars: ✭ 28 (+12%)
ubuntu-2004🔵 Curso GRÁTIS de GNU/Linux Ubuntu Server 20.04.x LTS - DevOps utilizando Shell Script
Stars: ✭ 70 (+180%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (+144%)
sike-javaSIKE for Java is a software library that implements experimental supersingular isogeny cryptographic schemes that aim to provide protection against attackers running a large-scale quantum computer.
Stars: ✭ 28 (+12%)
intellij-idea-ultimateUnofficial .deb packages of IntelliJ IDEA Ultimate Edition. This is a mirror of https://gitlab.com/mmk2410/intellij-idea-ultimate
Stars: ✭ 16 (-36%)
my-cybersecurity-notesThese are the notes i have been taking since i started learning about ethical hacking and cybersecurity
Stars: ✭ 13 (-48%)
libwifiAn 802.11 Frame Generation and Parsing Library in C
Stars: ✭ 27 (+8%)
vulnerabilitiesList of every possible vulnerabilities in computer security.
Stars: ✭ 14 (-44%)
ProxySwitcherEasily enable / disable WiFi proxy on a jailbroken iOS device
Stars: ✭ 55 (+120%)
DSMRloggerWSNew firmware for the DSMRlogger heavily using WebSockets and Javascript
Stars: ✭ 29 (+16%)
packer-ubuntuNo description or website provided.
Stars: ✭ 29 (+16%)
cytroneCyTrONE: Integrated Cybersecurity Training Framework
Stars: ✭ 72 (+188%)
torboxContainer-based Tor access point (Anonymizing Middlebox).
Stars: ✭ 52 (+108%)
nekrosNekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive KEY
Stars: ✭ 84 (+236%)
ElliotA pentesting tool inspired by mr robot and derived by zphisher
Stars: ✭ 23 (-8%)
GRFICSv2Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)
Stars: ✭ 119 (+376%)
pwk scriptsAutomation scripts in preparation for PWK/OSCP labs
Stars: ✭ 16 (-36%)
cloud-desktopsCloud-based Virtual Desktops on Google Cloud Platform
Stars: ✭ 14 (-44%)
wifi-sploitWi-Fi sploit is a password cracker for an admin page of a Wi-Fi Router.
Stars: ✭ 29 (+16%)
pycamerespMotion detection with image notification for Esp32CAM and Esp32 flasher with GUI based on esptool.py.
Stars: ✭ 40 (+60%)
low-power-wifiExperiments in low-power-wifi on esp8266, esp32, and ...
Stars: ✭ 35 (+40%)
homeweather esp8266weather station, arduino esp8266, st7920, mh-z19, BME-280
Stars: ✭ 29 (+16%)
docker-baseJust enough to get process supervision and startup mechanisms
Stars: ✭ 25 (+0%)
pyiocutilsA collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).
Stars: ✭ 18 (-28%)
pyc2bytecodeA Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (+180%)
PoW-ShieldProject dedicated to fight Layer 7 DDoS with proof of work, featuring an additional WAF. Completed with full set of features and containerized for rapid and lightweight deployment.
Stars: ✭ 99 (+296%)