ToolsWatch and Black Hat Arsenal selection of badges
☆58Nov 3, 2024Updated last year
Alternatives and similar repositories for badges
Users that are interested in badges are comparing it to the libraries listed below
Sorting:
- DPE - Default Password Enumeration☆37Jun 3, 2013Updated 12 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Oct 15, 2015Updated 10 years ago
- Python API for the CVSS v3☆58May 28, 2021Updated 4 years ago
- Chef repository for pentesting tools☆13Mar 4, 2017Updated 9 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Mar 21, 2023Updated 2 years ago
- Just a bunch of useful scripts for netsec/admin/others☆16Dec 9, 2025Updated 2 months ago
- ☆13Nov 8, 2017Updated 8 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 5 months ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Mar 5, 2021Updated 5 years ago
- Middleware for go modules proxy☆13Sep 15, 2019Updated 6 years ago
- Internet Radio based on the Beaglebone Black platform☆15Mar 4, 2016Updated 10 years ago
- A pure Ruby library for parsing the XML out of an AndroidManifest.xml stored in an APK package☆16Aug 5, 2016Updated 9 years ago
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Oct 18, 2021Updated 4 years ago
- Source for official CVE Program policy documents.☆18Jan 28, 2026Updated last month
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Reverser - A Quick Reverse Connection Deployment Script☆12Jun 22, 2012Updated 13 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- Subdomain Bruteforce - Bounty Quick Code☆31Sep 6, 2024Updated last year
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Go tool for building, distributing and publishing Go projects☆31Feb 27, 2026Updated last week
- The 'chef' command line tool included in Chef Workstation☆18Updated this week
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- A cookbook for managing the local security policy on a Windows system☆13Apr 13, 2021Updated 4 years ago
- ☆22Mar 16, 2020Updated 5 years ago
- Repository to track keywords & patterns lists used by crowdsec parsers and scenarios☆16Feb 27, 2026Updated last week
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- ☆13Sep 4, 2024Updated last year
- .Net library to create Maltego transformations.☆17Feb 11, 2025Updated last year