Lists (1)
Sort Name ascending (A-Z)
Stars
Find, verify, and analyze leaked credentials
A library for detecting known secrets across many web frameworks
In-depth attack surface mapping and asset discovery
A curated list of cybersecurity tools and resources.
Utility program to perform multiple operations for a given subnet/CIDR ranges.
dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.
Impacket is a collection of Python classes for working with network protocols.
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).
Quickly discover exposed hosts on the internet using multiple search engines.
A curated list of Awesome Threat Intelligence Blogs
Automatic SSTI detection tool with interactive interface
Open source platform for cyber security analysts with many features for threat intelligence and detection engineering.
CLI tools for forensic investigation of Windows artifacts
A collection of awesome penetration testing resources, tools and other shiny things
🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast. Precise. Effective.
E4GL30S1NT - Simple Information Gathering Tool
List of API's for gathering information about phone numbers, addresses, domains etc
enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts
Tools, tips, tricks, and more for exploring ICS Security.
Jotnarss0n / writehat
Forked from blacklanternsecurity/writehatA pentest reporting tool written in Python. Free yourself from Microsoft Word.
Jupyter Univere is a search engine for all infosec jupyter notebooks
Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego
Your target's phone's front and back cameras📸 can be accessed by sending a link🔗.
Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.
Try to find the origin IP of a webapp protected by Cloudflare.