- Cyberspace
Lists (31)
Sort Name ascending (A-Z)
AD Tools 🏛️
Android Security 📱
AWS Security ☁️
Tools for improve AWS environments securityC2 🟥
Cloudflare WAF ☁️
Tools for audit and test Cloudflare WAFCode Analysis 👨🏻💻
Tools for analyzing codeCryptography-Encoding-Crackin🔐
Digital Forensic 🟦
Tools for performing digital forensicEmail Header Analyzer 📧
Tools for analyze emailsEvasion Tools 🟥
Tools for automated obfuscationFlipper Zero 🐬
Honeypots 🟦
ICS/SCADA Security 🔒
Tools for ICS/SCADAIncident Response 🟦
Tools for performing Incident ResponseInformation Gathering 🟥
Tools for enumerating target and gain information about targetsIoT PT 🟥
Tools for performing Internet of Things Penetration TestingM365 / Azure Security ☁️
Malware Analysis 🟦
Tools for performing Malware Analysis and SandboxesNetwork PT 🟥
Tools for performing network pentesting and packet craftingOSINT 🕵🏻
Tools for perfoming Open Source IntelligencePhishing 📦
Tools for performing phishingReports 📝
Tools for automated reportsSoftware Security
Steganography 🪄
Tools for performing steganographyWAF 🟦
Web Application PT 🟥
Tools for performing Web Application PTWiFi PT 🟥
Tools for performing WiFi Penetation TestingWindows Events Log 🟦
Tools for analyzing and parsing Windows Events LogWindows PT 🟥
Wordlists 📝
Tools for creating personalized wordlists and for mangling themYara 🟦
Tools for Yara rulesStars
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Find, verify, and analyze leaked credentials
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Information gathering framework for phone numbers
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
In-depth attack surface mapping and asset discovery
Directory/File, DNS and VHost busting tool written in Go
A vulnerability scanner for container images and filesystems
Reconnaissance tool for GitHub organizations
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application
Fetch all the URLs that the Wayback Machine knows about for a domain
ScareCrow - Payload creation framework designed around EDR bypass.
Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.
shellz is a small utility to manage your ssh, telnet, kubernetes, winrm, web or any custom shell in a single place.
teler-waf is a Go HTTP middleware that protects local web services from OWASP Top 10 threats, known vulnerabilities, malicious actors, botnets, unwanted crawlers, and brute force attacks.
CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.
An uber fast and simple subdomain enumeration tool using DNS and web requests with support for detecting wildcard DNS records.