Some useful tools and scripts
☆47Feb 11, 2023Updated 3 years ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43May 18, 2017Updated 8 years ago
- ☆25Oct 14, 2017Updated 8 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆11Jan 27, 2017Updated 9 years ago
- All Security Engineering Resources☆15Feb 2, 2018Updated 8 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- Created on 10th August 2017. Purpose of this Project is to note down every useful object I gained during the time I spent working on OSCP…☆19Feb 26, 2018Updated 8 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- 一款基于subDomainsBrute子域名爆破工具结果的处理脚本☆10Jul 28, 2017Updated 8 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- Fast subdomains enumeration tool for penetration testers☆30Feb 6, 2023Updated 3 years ago
- Miscellaneous analysis tools☆25Mar 3, 2015Updated 11 years ago
- Christian Buchner's & Christian H.'s CUDA miner project☆12Jul 22, 2014Updated 11 years ago
- Common Wordlists☆57Aug 26, 2016Updated 9 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Mar 5, 2021Updated 5 years ago
- Hacking challenges☆31Oct 3, 2017Updated 8 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- PowerShell module for the exploitation and testing☆16Jul 5, 2015Updated 10 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- shARP_2.0 is an updated version for shARP with more options for better performance.☆12Oct 12, 2017Updated 8 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool☆32Aug 4, 2014Updated 11 years ago
- Encrypt, decrypt, and break caesar's cipher.☆10Jun 18, 2021Updated 4 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆14Oct 29, 2019Updated 6 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- The frontend for Aurora Admin Panel☆14Apr 21, 2022Updated 3 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆16Jun 27, 2022Updated 3 years ago
- Decrypt all saved Chrome passwords☆43Dec 17, 2013Updated 12 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Jul 23, 2015Updated 10 years ago
- A collection of Nagios plugins that we package.☆41Mar 22, 2016Updated 9 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 9 years ago
- pwnig all the (web)things☆21Nov 21, 2020Updated 5 years ago
- Academic project implementing basic first-hop LAN attacks such as DHCP starvation, ARP spoofing, DNS poisoning and more.☆18May 14, 2020Updated 5 years ago
- A set of tools, procedures, and playbooks for performing bug bounties☆17Dec 2, 2018Updated 7 years ago