WsltoolsWeb Scan Lazy Tools - Python Package
Stars: ✭ 288 (-30.43%)
Awesome Aws SecurityCurated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS Security
Stars: ✭ 100 (-75.85%)
PowershellarmouryA PowerShell armoury for penetration testers or other random security guys
Stars: ✭ 99 (-76.09%)
xssfinderToolset for detecting reflected xss in websites
Stars: ✭ 105 (-74.64%)
SquealerTelling tales on you for leaking secrets!
Stars: ✭ 97 (-76.57%)
WhatwebNext generation web scanner
Stars: ✭ 3,503 (+746.14%)
Keylogger🔐 Open Source Python Keylogger Collection
Stars: ✭ 97 (-76.57%)
flask-vulnPretty vulnerable flask app..
Stars: ✭ 23 (-94.44%)
AttacksurfaceanalyzerAttack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
Stars: ✭ 1,341 (+223.91%)
PacketwhisperPacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (-2.17%)
laravel-xss-filterFilter user input for XSS but don't touch other html
Stars: ✭ 38 (-90.82%)
OsmedeusFully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+719.08%)
Password LeakA library to check for compromised passwords
Stars: ✭ 92 (-77.78%)
Wordlist404Small but effective wordlist for brute-forcing and discovering hidden things.
Stars: ✭ 101 (-75.6%)
PattonThe clever vulnerability dependency finder
Stars: ✭ 87 (-78.99%)
KatanaA Python Tool For google Hacking
Stars: ✭ 355 (-14.25%)
Envkey AppSecure, human-friendly, cross-platform secrets and config.
Stars: ✭ 83 (-79.95%)
SecurecodeboxsecureCodeBox (SCB) - continuous secure delivery out of the box
Stars: ✭ 279 (-32.61%)
cve-2016-1764Extraction of iMessage Data via XSS
Stars: ✭ 52 (-87.44%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-80.92%)
Myscanmyscan 被动扫描
Stars: ✭ 373 (-9.9%)
prowlerProwler is an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. It contains hundreds of controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks.
Stars: ✭ 8,046 (+1843.48%)
DgfraudA Deep Graph-based Toolbox for Fraud Detection
Stars: ✭ 281 (-32.13%)
NotrulerThe opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.
Stars: ✭ 72 (-82.61%)
Android DisassemblerDisassemble ANY files including .so (NDK, JNI), Windows PE(EXE, DLL, SYS, etc), linux binaries, libraries, and any other files such as pictures, audios, etc(for fun)files on Android. Capstone-based disassembler application on android. 안드로이드 NDK 공유 라이브러리, Windows 바이너리, etc,... 리버싱 앱
Stars: ✭ 250 (-39.61%)
Gscan本程序旨在为安全应急响应人员对Linux主机排查时提供便利,实现主机侧Checklist的自动全面化检测,根据检测结果自动数据聚合,进行黑客攻击路径溯源。
Stars: ✭ 1,177 (+184.3%)
Impost3r👻Impost3r -- A linux password thief
Stars: ✭ 355 (-14.25%)
UrsadbTrigram database written in C++, suited for malware indexing
Stars: ✭ 72 (-82.61%)
Gg Shield ActionGitGuardian Shield GitHub Action - Find exposed credentials in your commits
Stars: ✭ 248 (-40.1%)
SerialkillerLook-Ahead Java Deserialization Library
Stars: ✭ 277 (-33.09%)
GitgrabergitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...
Stars: ✭ 1,164 (+181.16%)
FindwebshellfindWebshell是一款基于python开发的webshell检测工具。
Stars: ✭ 246 (-40.58%)
Intrigue IdentApplication and Service Fingerprinting
Stars: ✭ 70 (-83.09%)
ApplicationinspectorA source code analyzer built for surfacing features of interest and other characteristics to answer the question 'What's in the code?' quickly using static analysis with a json based rules engine. Ideal for scanning components before use or detecting feature level changes.
Stars: ✭ 3,873 (+835.51%)
AppmonDocumentation:
Stars: ✭ 1,157 (+179.47%)
OpensquatDetection of phishing domains and domain squatting. Supports permutations such as homograph attack, typosquatting and bitsquatting.
Stars: ✭ 149 (-64.01%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+174.4%)
CobraSource Code Security Audit (源代码安全审计)
Stars: ✭ 2,802 (+576.81%)
MetaforgeAn OSINT Metadata analyzing tool that filters through tags and creates reports
Stars: ✭ 63 (-84.78%)
Owasp Java EncoderThe OWASP Java Encoder is a Java 1.5+ simple-to-use drop-in high-performance encoder class with no dependencies and little baggage. This project will help Java web developers defend against Cross Site Scripting!
Stars: ✭ 343 (-17.15%)
HyugaHyuga 一个用来记录DNS查询和HTTP请求的监控工具。
Stars: ✭ 148 (-64.25%)
RaptorWeb-based Source Code Vulnerability Scanner
Stars: ✭ 314 (-24.15%)
diwaA Deliberately Insecure Web Application
Stars: ✭ 32 (-92.27%)
LibdiffuzzCustom memory allocator that helps discover reads from uninitialized memory
Stars: ✭ 147 (-64.49%)
DetexploitOSS Vulnerability Scanner for Windows Platform
Stars: ✭ 146 (-64.73%)
SIPTorchA "SIP Torture" (RFC 4475) testing suite.
Stars: ✭ 54 (-86.96%)
IntelowlIntel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Stars: ✭ 2,114 (+410.63%)
AnsibleplaybooksA collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools
Stars: ✭ 143 (-65.46%)