- Cyberspace
Lists (31)
Sort Name ascending (A-Z)
AD Tools 🏛️
Android Security 📱
AWS Security ☁️
Tools for improve AWS environments securityC2 🟥
Cloudflare WAF ☁️
Tools for audit and test Cloudflare WAFCode Analysis 👨🏻💻
Tools for analyzing codeCryptography-Encoding-Crackin🔐
Digital Forensic 🟦
Tools for performing digital forensicEmail Header Analyzer 📧
Tools for analyze emailsEvasion Tools 🟥
Tools for automated obfuscationFlipper Zero 🐬
Honeypots 🟦
ICS/SCADA Security 🔒
Tools for ICS/SCADAIncident Response 🟦
Tools for performing Incident ResponseInformation Gathering 🟥
Tools for enumerating target and gain information about targetsIoT PT 🟥
Tools for performing Internet of Things Penetration TestingM365 / Azure Security ☁️
Malware Analysis 🟦
Tools for performing Malware Analysis and SandboxesNetwork PT 🟥
Tools for performing network pentesting and packet craftingOSINT 🕵🏻
Tools for perfoming Open Source IntelligencePhishing 📦
Tools for performing phishingReports 📝
Tools for automated reportsSoftware Security
Steganography 🪄
Tools for performing steganographyWAF 🟦
Web Application PT 🟥
Tools for performing Web Application PTWiFi PT 🟥
Tools for performing WiFi Penetation TestingWindows Events Log 🟦
Tools for analyzing and parsing Windows Events LogWindows PT 🟥
Wordlists 📝
Tools for creating personalized wordlists and for mangling themYara 🟦
Tools for Yara rulesStars
Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
Android Reverse-Engineering Workbench for VS Code
Prowler is the Open Cloud Security for AWS, Azure, GCP, Kubernetes, M365 and more. As agent-less, it helps for continuous monitoring, security assessments & audits, incident response, compliance, h…
OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Find, verify, and analyze leaked credentials
Automation to assess the state of your M365 tenant against CISA's baselines
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
Dradis Framework: Collaboration and reporting for IT Security teams
Hunt down social media accounts by username across social networks
The recursive internet scanner for hackers. 🧡
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
This is a multi-use bash script for Linux systems to audit wireless networks.
In-depth attack surface mapping and asset discovery
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Manages, configures, extracts and monitors Microsoft 365 tenant configurations
😎 Awesome lists about all kinds of interesting topics
Directory/File, DNS and VHost busting tool written in Go
Flipper Zero Unleashed Firmware
Scapy: the Python-based interactive packet manipulation program & library.
A vulnerability scanner for container images and filesystems
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
Web vulnerability scanner written in Python3
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.