A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
☆29Jan 22, 2016Updated 10 years ago
Alternatives and similar repositories for awesome-security
Users that are interested in awesome-security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [BASH] Wardriving tool. Collect all the Wi-Fi wireless networks in a log file (csv format) skipping duplicate.☆18Jun 4, 2011Updated 14 years ago
- Gathering All Nuclei Fuzzing Templates in a Single Repo.☆11Apr 23, 2024Updated 2 years ago
- ZAP add-on containing the web-backdoors and attack files from FuzzDB☆20May 1, 2026Updated 3 weeks ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- A repository full of malware samples.☆14Nov 29, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 3 years ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…☆13Feb 18, 2024Updated 2 years ago
- 🔍LeakScanner - Inspired by Gitleaks☆14Aug 23, 2024Updated last year
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- Fluxion is the future of MITM WPA attacks Fluxion is a security auditing and social-engineering research tool. It is a remake of linset …☆10May 12, 2018Updated 8 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Aug 29, 2020Updated 5 years ago
- A list of web application security☆26Oct 28, 2015Updated 10 years ago
- ☆15Aug 25, 2023Updated 2 years ago
- Attack surface discovery and AI-assisted triage for security researchers. Endpoint & parameter mapping with actionable testing hints.☆43Jan 12, 2026Updated 4 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Bug Bounty Tools☆34Jul 2, 2020Updated 5 years ago
- Your favourite chest/terminal bursting buddy!☆18Nov 27, 2021Updated 4 years ago
- Pentesting Mobile apps and resources www.sniferl4bs.com☆40Jul 10, 2021Updated 4 years ago
- CLI tool for filtering URLs/IPs with automatically-updated Bug Bounty program scope rules.☆36Dec 31, 2025Updated 4 months ago
- Burp-Addons : Some of Burp Addons I use ( Mindak ak fahem )☆11Sep 1, 2022Updated 3 years ago
- Google Hack Database dork automatic tool.☆27Dec 11, 2017Updated 8 years ago
- List of Red Team Repositories☆17Feb 26, 2019Updated 7 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- ☆34Oct 1, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆57Dec 6, 2016Updated 9 years ago
- REST API and Admin UI of SnyPy☆11May 14, 2026Updated last week
- Bug Bounty Recon wordlist Generator☆21Jul 17, 2020Updated 5 years ago
- ☆62Feb 23, 2026Updated 3 months ago
- Zip brute is a python script that cracks zip that are password protected using a wordlist dictionary.☆23Jun 14, 2021Updated 4 years ago
- The TCP Scanner☆26Oct 4, 2022Updated 3 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- ☆34May 1, 2022Updated 4 years ago
- You can create a virus for a Laptop or phone with this command bell☆10Mar 3, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆12Jan 7, 2020Updated 6 years ago
- Listen to the weather using Sonic Pi and data from Mathematica☆11Dec 6, 2018Updated 7 years ago
- Mirror of original source code plus builds for all platforms.☆20Aug 15, 2019Updated 6 years ago
- A Golang module to resolve multiple DNS requests concurrently while respecting a rate limit on the resolvers.☆11May 26, 2021Updated 4 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆11Jan 27, 2017Updated 9 years ago
- ☆15Nov 29, 2022Updated 3 years ago
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆17Mar 17, 2024Updated 2 years ago