SquealerTelling tales on you for leaking secrets!
Stars: ✭ 97 (-44.25%)
ScelightThe source code of the Scelight project with all its modules.
Stars: ✭ 97 (-44.25%)
Kube Secret SyncerA Kubernetes operator to sync secrets from AWS Secrets Manager
Stars: ✭ 154 (-11.49%)
Userrecon PyUsername recognition on various websites.
Stars: ✭ 131 (-24.71%)
GorshA Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
Stars: ✭ 97 (-44.25%)
OntopreplicaA real-time always-on-top “replica” of a window of your choice (on Windows).
Stars: ✭ 1,336 (+667.82%)
Orangetool📚 Control Functions For Single-Board Computers
Stars: ✭ 82 (-52.87%)
GenesisTemplating, scaffolding and generation tool
Stars: ✭ 122 (-29.89%)
Digital Privacy一个关于数字隐私搜集、保护、清理集一体的方案,外加开源信息收集(OSINT)对抗
Stars: ✭ 1,231 (+607.47%)
Goldleaf🍂 Multipurpose homebrew tool for Nintendo Switch
Stars: ✭ 2,026 (+1064.37%)
GitmadMonitor, Alert, and Discover sensitive info and data leakage on Github.
Stars: ✭ 81 (-53.45%)
Youtube Comment SuiteDownload YouTube comments from numerous videos, playlists, and channels for archiving, general search, and showing activity.
Stars: ✭ 120 (-31.03%)
ProjectbuilderA tool for easy automating and customizing build process for Unity.
Stars: ✭ 80 (-54.02%)
Python HoneypotOWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (-8.05%)
Create Mui Themeonline tool for creating material-ui themes
Stars: ✭ 80 (-54.02%)
Secret BridgeMonitors Github for leaked secrets
Stars: ✭ 130 (-25.29%)
Visual CenterProposed tool to better align logos in the center of a container.
Stars: ✭ 1,338 (+668.97%)
Drepdynamic regular expression print
Stars: ✭ 80 (-54.02%)
Proof Of ConceptsA little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
Stars: ✭ 148 (-14.94%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-54.6%)
Zhihusayhi[Unmaintained] Say Hi to your new followers in Zhihu.
Stars: ✭ 119 (-31.61%)
ZpyiThe power of python in your Zsh - Unobtrusive and easy python scripting in shell
Stars: ✭ 78 (-55.17%)
Dymerge🔓 A dynamic dictionary merger for successful dictionary based attacks.
Stars: ✭ 167 (-4.02%)
PoopakPOOPAK - TOR Hidden Service Crawler
Stars: ✭ 78 (-55.17%)
GoaltdnsA permutation generation tool written in golang
Stars: ✭ 119 (-31.61%)
TechnowloggerTechNowLogger is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info
Stars: ✭ 172 (-1.15%)
Python RansomwarePython Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (-44.83%)
Jsonpjsonp is a Burp Extension which attempts to reveal JSONP functionality behind JSON endpoints. This could help reveal cross-site script inclusion vulnerabilities or aid in bypassing content security policies.
Stars: ✭ 131 (-24.71%)
Dart Code MetricsSoftware analytics tool that helps developers analyse and improve software quality.
Stars: ✭ 96 (-44.83%)
Leaky RepoBenchmarking repo for secrets scanning
Stars: ✭ 149 (-14.37%)
Code Checker✅ A simple tool to check source code against a set of Nette coding standards.
Stars: ✭ 76 (-56.32%)
Kalkkalk is a powerful command line calculator app for developers.
Stars: ✭ 118 (-32.18%)
CranaA CLI tool to create React + Node apps with just one command
Stars: ✭ 160 (-8.05%)
DeployerA deployment tool written in PHP with support for popular frameworks out of the box
Stars: ✭ 8,928 (+5031.03%)
TrinoTrino: Master your translations with command line!
Stars: ✭ 118 (-32.18%)
Flutter device previewApproximate how your app looks and performs on another device.
Stars: ✭ 1,191 (+584.48%)
MyriamA vulnerable iOS App with Security Challenges for the Security Researcher inside you.
Stars: ✭ 146 (-16.09%)
CreakPoison, reset, spoof, redirect MITM script
Stars: ✭ 116 (-33.33%)
PurifyAll-in-one tool for managing vulnerability reports from AppSec pipelines
Stars: ✭ 72 (-58.62%)
Mongoaudit🔥 A powerful MongoDB auditing and pentesting tool 🔥
Stars: ✭ 1,174 (+574.71%)
Mitmap📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+777.01%)
GitgrabergitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...
Stars: ✭ 1,164 (+568.97%)
WincmdfuWindows one line commands that make life easier, shortcuts and command line fu.
Stars: ✭ 145 (-16.67%)
AndesPython toolbox / library for power system transient dynamics simulation with symbolic modeling and numerical analysis 🔥
Stars: ✭ 68 (-60.92%)
Slack Sql🎉 Bring SQL console to Slack
Stars: ✭ 115 (-33.91%)
ShhhShare sensitive info without leaving a trace in your chat logs or email accounts.
Stars: ✭ 159 (-8.62%)
Red Team Curation ListA list to discover work of red team tooling and methodology for penetration testing and security assessment
Stars: ✭ 68 (-60.92%)
GitmonitorOne way to continuously monitor sensitive information that could be exposed on Github
Stars: ✭ 115 (-33.91%)
DocnadoRapid documentation tool that will blow you away...
Stars: ✭ 67 (-61.49%)
BinsnitchDetect silent (unwanted) changes to files on your system
Stars: ✭ 144 (-17.24%)
Gf SecretsSecret and/ credential patterns used for gf.
Stars: ✭ 96 (-44.83%)
TapeA Simple Traffic Generator for Hyperledger Fabric
Stars: ✭ 131 (-24.71%)
Go MygenQuickly generate CURD and documentation for operating MYSQL.etc
Stars: ✭ 94 (-45.98%)
Tlosint LiveTrace Labs OSINT Linux Distribution based on Kali.
Stars: ✭ 151 (-13.22%)
H8mailEmail OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (+1143.1%)
Matrix Commandersimple but convenient CLI-based Matrix client app for sending and receiving
Stars: ✭ 90 (-48.28%)