BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploitation, Reporting, Darkweb, Deepweb, Research
☆56Jan 5, 2026Updated last month
Alternatives and similar repositories for 365
Users that are interested in 365 are comparing it to the libraries listed below
Sorting:
- Pentesting notes☆19Jan 31, 2026Updated last month
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- a simple chat server for the esp8266.☆10May 19, 2021Updated 4 years ago
- ☆13Oct 1, 2020Updated 5 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- Recon scripts for bug hunting☆10Nov 19, 2021Updated 4 years ago
- Query GraphSense clusters, details and attribution tag-packs directly in Maltego. By an initial idea of our Swiss Federal Police colleag…☆36Dec 28, 2024Updated last year
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 7 years ago
- Extract data from a .git directory.☆15Mar 28, 2023Updated 2 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- BurpSuite Extension for performing scan via CLI.☆14Dec 5, 2017Updated 8 years ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 6 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Scanning Result of MetaScan's AI GPTScan Engine for 13 DefiHacks Projects under 10 Logic Vuln Types☆13Aug 8, 2023Updated 2 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Jul 27, 2024Updated last year
- Python script to launch burp scans automatically☆32Jul 18, 2021Updated 4 years ago
- Some VxWorks fuzzing examples using Cisco-Kitty and WDBDbg framework☆19Mar 13, 2016Updated 9 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- A MITRE ATT&CK Lookup Tool☆46Apr 25, 2024Updated last year
- Network based protocol fuzzer☆74Feb 17, 2022Updated 4 years ago
- ☆16Jul 25, 2018Updated 7 years ago
- This repository was created to put into practice the knowledge acquired in hacking courses at Escola de Hackers with master and mentor Ma…☆19Jul 8, 2024Updated last year
- Cool One Liners at one place to make your recon and bug bounty skills better !☆15Oct 3, 2020Updated 5 years ago
- LLM powered agents for scanning vulnerabilities on any website - Llama 3 8B, Groq, Selenium, CrewAI, Exa AI☆29Aug 8, 2024Updated last year
- A List Containing (Almost) All The Custom Android OS☆22Sep 2, 2020Updated 5 years ago
- This extension provides a way to discover NoSQL injection vulnerabilities.☆25Sep 7, 2025Updated 5 months ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Nov 21, 2021Updated 4 years ago
- ☆66May 13, 2022Updated 3 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Nov 27, 2023Updated 2 years ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆49Apr 25, 2022Updated 3 years ago
- A minimal keylogger that accurately tracks keyboard strokes made in Python☆24Feb 23, 2021Updated 5 years ago
- Python program on raspberry pi to communicate on power, using KQ330☆26Sep 15, 2020Updated 5 years ago
- Compilation of JavaScript XSS oneliners payloads that rocks your nuts!☆24Jul 14, 2017Updated 8 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Dec 23, 2024Updated last year
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago