Lists (1)
Sort Name ascending (A-Z)
Stars
A collection of awesome penetration testing resources, tools and other shiny things
Find, verify, and analyze leaked credentials
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Impacket is a collection of Python classes for working with network protocols.
In-depth attack surface mapping and asset discovery
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
A script that you can run in the background!
Quickly discover exposed hosts on the internet using multiple search engines.
dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.
Maintained collection of OSINT related resources. (All Free & Actionable)
List of API's for gathering information about phone numbers, addresses, domains etc
Tools, tips, tricks, and more for exploring ICS Security.
A curated list of cybersecurity tools and resources.
🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast. Precise. Effective.
enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts
Automatic SSTI detection tool with interactive interface
Utility program to perform multiple operations for a given subnet/CIDR ranges.
Your target's phone's front and back cameras📸 can be accessed by sending a link🔗.
Open source platform for cyber security analysts with many features for threat intelligence and detection engineering.
A library for detecting known secrets across many web frameworks
E4GL30S1NT - Simple Information Gathering Tool
A curated list of Awesome Threat Intelligence Blogs
Try to find the origin IP of a webapp protected by Cloudflare.
Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego