Lists (3)
Sort Name ascending (A-Z)
Starred repositories
Python tool for converting files and office documents to Markdown.
🌐 Make websites accessible for AI agents. Automate tasks online with ease.
Hunt down social media accounts by username across social networks
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
SWE-agent takes a GitHub issue and tries to automatically fix it, using your LM of choice. It can also be employed for offensive cybersecurity or competitive coding challenges. [NeurIPS 2024]
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, following, Tweets and more while evading most API limitations.
E-mails, subdomains and names Harvester - OSINT
Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud environment.
Incredibly fast crawler designed for OSINT.
Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
People tracker on the Internet: OSINT analysis and research tool by Jose Pino
📚 A curated list of papers for Software Engineers
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
Awesome hacking is an awesome collection of hacking tools.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
💤 Kick devices off your network by performing an ARP Spoof attack.
PoC to record audio from a Bluetooth device
A reconnaissance framework for researching and investigating Telegram.
Your target's phone's front and back cameras📸 can be accessed by sending a link🔗.
The most powerful stealer written in Python 3 and packed with a lot of features.
HomePwn - Swiss Army Knife for Pentesting of IoT Devices