A single repository for any security tools, scripts, documentation, etc. that I add
☆12Apr 25, 2017Updated 8 years ago
Alternatives and similar repositories for SecurityTools
Users that are interested in SecurityTools are comparing it to the libraries listed below
Sorting:
- Hacking files and scripts☆12Mar 21, 2018Updated 8 years ago
- Metasploitable3 CTF Write-up☆40Dec 12, 2017Updated 8 years ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆20Mar 10, 2017Updated 9 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- EdXposed is a Magisk & Riru module that provides original Xposed frameworks on Android devices.☆14Mar 11, 2019Updated 7 years ago
- Olger, authomated cybersecurity analyst , check infrastructures and deploy solutions☆14Feb 15, 2023Updated 3 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆19May 20, 2020Updated 5 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Jun 3, 2014Updated 11 years ago
- All the information provided on this site is for educational purposes only.☆18Feb 27, 2024Updated 2 years ago
- Academic project implementing basic first-hop LAN attacks such as DHCP starvation, ARP spoofing, DNS poisoning and more.☆18May 14, 2020Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago
- ☆27May 29, 2015Updated 10 years ago
- Multi source CVE/exploit parser.☆27Aug 30, 2017Updated 8 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆62Jul 8, 2017Updated 8 years ago
- A ton of helpful tools☆345Oct 8, 2021Updated 4 years ago
- In memory fuzzing for embedded devices☆19Jun 20, 2012Updated 13 years ago
- Customize Exploit Codes.☆18Dec 1, 2016Updated 9 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Nov 19, 2024Updated last year
- A Python listener to capture Snort event via the UNIX Socket output.☆15Mar 30, 2017Updated 8 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- DirBuster for Node.js☆20Mar 21, 2019Updated 7 years ago
- Just lists of lists of lists !☆17Oct 13, 2025Updated 5 months ago
- ☆18Oct 2, 2018Updated 7 years ago
- A quick POC on how to embed a meterpreter in Firefox via DLL hijacking☆17Jul 6, 2017Updated 8 years ago
- Find data about you or an individual from various online public records☆30May 26, 2017Updated 8 years ago
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- ☆12Feb 22, 2025Updated last year
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Sep 28, 2017Updated 8 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- 3D printed mini circular table saw.☆11Jul 19, 2014Updated 11 years ago
- Assembly code to use for Windows kernel shellcode to edit winlogon.exe ACL☆13Mar 6, 2017Updated 9 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- config files such as .vimrc, .bashrc, etc.☆16May 6, 2011Updated 14 years ago
- DNS2Proxy offensive proxy version for HSTS☆29Jan 1, 2018Updated 8 years ago
- Javascript library fuzzer. Tries to detect functions which may lead to XSS vulnerabilities if untrusted data is passed to said functions.☆16Oct 6, 2020Updated 5 years ago