This list of tools is meant to act as a staple resource for Small to Medium businesses. We understand the hardship of not being able to afford adequate security. We are firm believers that everyone deserves to be secure at a cost effective rate.
☆49May 15, 2020Updated 5 years ago
Alternatives and similar repositories for Open-Source-Security-List-
Users that are interested in Open-Source-Security-List- are comparing it to the libraries listed below
Sorting:
- Ruby Regular Expression Helper Gem☆17Oct 30, 2016Updated 9 years ago
- Python3 Ebowla... 3Bowla☆17Jan 7, 2020Updated 6 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Jun 21, 2021Updated 4 years ago
- Pwnage☆17Jul 1, 2025Updated 8 months ago
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Dec 20, 2019Updated 6 years ago
- ☆21Aug 26, 2021Updated 4 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Nov 28, 2019Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 6 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Script to change kali repository mirror☆21Jun 2, 2019Updated 6 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Dec 11, 2020Updated 5 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆29Jan 11, 2023Updated 3 years ago
- A multithreaded league of legends ping checker. Free download -☆13Jan 8, 2019Updated 7 years ago
- Wrapper for blocksec2go allowing easy hardware-based signing of Ethereum transactions☆12Feb 8, 2023Updated 3 years ago
- Cross platform system wide proxy server & TLS Interception library for Python☆23Aug 19, 2023Updated 2 years ago
- Suricata rule and intel index☆33Jan 13, 2026Updated last month
- JALSI - Just Another Lame Shellcode Injector☆30Aug 1, 2021Updated 4 years ago
- Repo for ME433 Advanced Mechatronics at Northwestern University in Spring 2021☆10Jun 9, 2021Updated 4 years ago
- Crane POAM Automation Tool (C-PAT™)☆15Updated this week
- ☆10Aug 4, 2020Updated 5 years ago
- Web based system for freight, warehousing, tracking and transport brokering☆11Sep 29, 2020Updated 5 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- MISP trainings, threat intel and information sharing training materials with source code☆424Dec 17, 2025Updated 2 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- Run Velociraptor on Security Onion☆40Jul 27, 2022Updated 3 years ago
- This is the course material for SENG207 Programming for Engineers.☆14Jan 19, 2023Updated 3 years ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- Port Knocking Sequence Discovery Scanner☆17Oct 19, 2016Updated 9 years ago
- Niagara Summit 2016 example code demonstrating the process of migrating a module from AX to N4.☆10May 13, 2016Updated 9 years ago
- ☆11Aug 11, 2024Updated last year