-
-
meg Public
Forked from tomnomnom/megFetch many paths for many hosts - without killing the hosts
-
nuclei Public
Forked from projectdiscovery/nucleiNuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use.
-
sparta Public
Forked from SECFORCE/spartaNetwork Infrastructure Penetration Testing Tool
-
PRET Public
Forked from RUB-NDS/PRETPrinter Exploitation Toolkit - The tool that made dumpster diving obsolete.
-
CVE-2020-2034-POC Public
Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal
-
Sublist3r Public
Forked from aboul3la/Sublist3rFast subdomains enumeration tool for penetration testers
-
RustScan Public
Forked from bee-san/RustScanFaster Nmap Scanning with Rust
-
jok3r Public
Forked from koutto/jok3rJok3r v3 BETA 2 - Network and Web Pentest Automation Framework
-
twint Public
Forked from twintproject/twintAn advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, following, Tweets and more while evading most API limitations.
-
tsunami-security-scanner Public
Forked from google/tsunami-security-scannerTsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
-
evilginx2 Public
Forked from kgretzky/evilginx2Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
-
tangalanga Public
Forked from elcuervo/tangalangaTangalanga: the Zoom conference scanner hacking tool
-
Phishing-API Public
Forked from curtbraz/PhishAPIComprehensive Web Based Phishing Suite of Tools for Rapid Deployment and Real-Time Alerting!
-
shotlooter Public
Forked from utkusen/shotlootera recon tool that finds sensitive data inside the screenshots uploaded to prnt.sc
-
pymeta Public
Forked from m8sec/pymetaPymeta will search the web for files on a domain to download and extract metadata. This technique can be used to identify: domains, usernames, software/version numbers and naming conventions.
-
TIDoS-Framework Public
Forked from 0xInfection/TIDoS-FrameworkThe Offensive Manual Web Application Penetration Testing Framework.
-
FALCONSTRIKE Public
Forked from Wannabe99/FALCONSTRIKEA stealthy, targeted Windows Loader for delivering second-stage payloads(shellcode) to the host machine undetected
-
intelmq Public
Forked from certtools/intelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
-
privilege-escalation-awesome-scripts-suite Public
Forked from peass-ng/PEASS-ngPEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
-
awesome-shodan-queries Public
Forked from jakejarvis/awesome-shodan-queriesπ A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ π©βπ»
-
hindsight Public
Forked from obsidianforensics/hindsightInternet history forensics for Google Chrome/Chromium
-
commit-stream Public
Forked from bbhunter/commit-stream#OSINT tool for finding Github repositories by extracting commit logs in real time from the Github event API
-
default-http-login-hunter Public
Forked from InfosecMatter/default-http-login-hunterLogin hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset
-
SharpChromium Public
Forked from djhohnstein/SharpChromium.NET 4.0 CLR Project to retrieve Chromium data, such as cookies, history and saved logins.
-
panther Public
Forked from gane5hvarma/pantherDetect threats with log data and improve cloud security posture
-
Application-Security-Engineer-Interview-Questions Public
Forked from security-prince/Application-Security-Engineer-Interview-QuestionsSome of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exhaustive list but i felt these questions were important to beβ¦
4 UpdatedMar 28, 2020 -
ppdump-public Public
Forked from bharadwajyas/ppdump-publicProtected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDump() Shellcode
-
TamperETW Public
Forked from outflanknl/TamperETWPoC to demonstrate how CLR ETW events can be tampered.
-
Bombers Public
Forked from bhattsameer/BombersSMS/Email/Whatsapp bombers Collection π£π£π£ π₯