pwn-pulseExploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Stars: ✭ 126 (-3.82%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+119.08%)
TIWAPTotally Insecure Web Application Project (TIWAP)
Stars: ✭ 137 (+4.58%)
VirtualsecconsAn ongoing list of virtual cybersecurity conferences.
Stars: ✭ 113 (-13.74%)
cuc-ns网络安全课本
Stars: ✭ 42 (-67.94%)
oscp-omnibusA collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (-64.89%)
anubisCaptive wifi hotspot bypass tool for Linux
Stars: ✭ 46 (-64.89%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-42.75%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-39.69%)
PotironPotiron - Normalize, Index and Visualize Network Capture
Stars: ✭ 66 (-49.62%)
aquatoneA Tool for Domain Flyovers
Stars: ✭ 43 (-67.18%)
dorothyDorothy is a tool to test security monitoring and detection for Okta environments
Stars: ✭ 85 (-35.11%)
WebspoiltThis script will you help to find the information about the website and to help in penetrating testing
Stars: ✭ 34 (-74.05%)
pyc2bytecodeA Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (-46.56%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-53.44%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-63.36%)
PhishapiComprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (+107.63%)
Cyber-SecurityThis repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Stars: ✭ 42 (-67.94%)
Red Team Curation ListA list to discover work of red team tooling and methodology for penetration testing and security assessment
Stars: ✭ 68 (-48.09%)
NmapguiAdvanced Graphical User Interface for NMap
Stars: ✭ 318 (+142.75%)
NovahotA webshell framework for penetration testers.
Stars: ✭ 284 (+116.79%)
PrismaticaResponsive Command and Control System
Stars: ✭ 81 (-38.17%)
ColorsList of 256 color codes for Xterm including an example of the color, Xterm Name, Xterm Number, HEX, RGB and HSL code.
Stars: ✭ 73 (-44.27%)
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+856.49%)
S3ScanScript to spider a website and find publicly open S3 buckets
Stars: ✭ 21 (-83.97%)
Search That Hash🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+255.73%)
ChimeraChimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (+253.44%)
Easy hackHack the World using Termux
Stars: ✭ 549 (+319.08%)
Sn1perAttack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+3638.17%)
NfstreamNFStream: a Flexible Network Data Analysis Framework.
Stars: ✭ 622 (+374.81%)
Dradis CeDradis Framework: Colllaboration and reporting for IT Security teams
Stars: ✭ 443 (+238.17%)
DirsearchWeb path scanner
Stars: ✭ 7,246 (+5431.3%)
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+5153.44%)
VuldashVulnerability Dashboard
Stars: ✭ 16 (-87.79%)
HabuHacking Toolkit
Stars: ✭ 635 (+384.73%)
PasshuntPasshunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
Stars: ✭ 961 (+633.59%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+7877.86%)
Owasp MasvsThe Mobile Application Security Verification Standard (MASVS) is a standard for mobile app security.
Stars: ✭ 1,030 (+686.26%)
PwndocPentest Report Generator
Stars: ✭ 417 (+218.32%)
Fwdsh3llForward shell generation framework
Stars: ✭ 62 (-52.67%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-52.67%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-47.33%)
ContentSecurity automation content in SCAP, OSCAL, Bash, Ansible, and other formats
Stars: ✭ 1,219 (+830.53%)
RsfThe Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
Stars: ✭ 76 (-41.98%)
ThecollectiveThe Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-35.11%)
LyricpassPassword wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security research.
Stars: ✭ 58 (-55.73%)
DaggyDaggy - Data Aggregation Utility. Open source, free, cross-platform, server-less, useful utility for remote or local data aggregation and streaming
Stars: ✭ 91 (-30.53%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (-54.2%)
pentest-reportsCollection of penetration test reports and pentest report templates. Published by the the best security companies in the world.
Stars: ✭ 111 (-15.27%)
My Cheat SheetsA place to keep all my cheat sheets for the complete development of ASIC/FPGA hardware or a software app/service.
Stars: ✭ 94 (-28.24%)
SlowlorisAsynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-61.07%)
RoadmapGitBook: OSCP RoadMap
Stars: ✭ 89 (-32.06%)