This project exists as a free (and transparent) alternative to paid services that show you what technologies are running on a given website.
☆57May 1, 2022Updated 3 years ago
Alternatives and similar repositories for TechStack
Users that are interested in TechStack are comparing it to the libraries listed below
Sorting:
- A repo for collecting and organizing security tools of various types. As new ones come out, they get added to the list.☆103May 1, 2022Updated 3 years ago
- Official Black Hat Arsenal Security Tools Repository☆160May 1, 2022Updated 3 years ago
- Does a dictionary lookup on common, valuable hostnames for a given domain.☆26May 1, 2022Updated 3 years ago
- This tool will harvest valid DNS subdomains from a given domain.☆76May 1, 2022Updated 3 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆48May 1, 2022Updated 3 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57May 1, 2022Updated 3 years ago
- A repository for personal tracking.☆17May 1, 2022Updated 3 years ago
- ☆34May 1, 2022Updated 3 years ago
- Quick script to gather stats on incoming credentials and IPs for a honey listener.☆110Apr 30, 2022Updated 3 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Apr 20, 2023Updated 2 years ago
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆16May 1, 2022Updated 3 years ago
- Free tools for mobile testing.☆38May 1, 2022Updated 3 years ago
- A simple script for translating IP addresses to GeoLocations☆51May 1, 2022Updated 3 years ago
- An iptables firewall configuration template.☆80May 1, 2022Updated 3 years ago
- A Ruby script that takes in IPs and returns Country, State, and City☆43May 1, 2022Updated 3 years ago
- My various configuration files for zsh, vim, tmux, etc.☆25May 1, 2022Updated 3 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- BugOutBag☆68Apr 30, 2022Updated 3 years ago
- ☆12Jan 7, 2020Updated 6 years ago
- Get a number of your tweets from the Twitter API.☆13May 1, 2022Updated 3 years ago
- A lightweight packet capture application☆12Oct 16, 2014Updated 11 years ago
- ☆16Feb 19, 2024Updated 2 years ago
- A list of the books that I am reading, with priorities.☆35May 1, 2022Updated 3 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- A quick and dirty PCAP parser that helps you identify who your applications are sending sensitive data to without encryption.☆119Jan 31, 2024Updated 2 years ago
- A library-based attempt to increase our chances for achieving AI Alignment with an emergent AGI.☆20Apr 4, 2023Updated 2 years ago
- Modern problems require modern solutions☆32Nov 22, 2022Updated 3 years ago
- The website for the Threshold.☆22Feb 9, 2024Updated 2 years ago
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- Python Script to Parse Phone # and E-mails from Websites☆10Mar 23, 2022Updated 3 years ago
- How to Convert Bitcoin-PUBKEY HEX Public Keys to Base58 Bitcoin Address and Check Balance for BTC Coins☆11Aug 26, 2022Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Aug 22, 2021Updated 4 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆10Oct 29, 2019Updated 6 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- Complete MCP server for n8n workflow management in Cursor☆17Mar 9, 2025Updated last year
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Dec 7, 2022Updated 3 years ago
- Recon(Amass, Naabu, Nuclei) workflow with Github Actions☆17Nov 12, 2024Updated last year
- Silent Whisper inference for privacy and performance. Configured for GPU Spot Instances.☆11Sep 28, 2023Updated 2 years ago
- The Offensive (Web, etc) Testing Framework (aka owtf) is an OWASP+PTES-focused try to unite great tools and facilitate pen testing☆21Jan 6, 2012Updated 14 years ago