Lists (2)
Sort Name ascending (A-Z)
Stars
A feature-rich command-line audio/video downloader
Command-line program to download videos from YouTube.com and other video sites
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Free and Open source Web Builder Framework. Next generation tool for building templates without coding
A community-driven Emacs distribution - The best editor is neither Emacs nor Vim, it's Emacs *and* Vim!
UNIX-like reverse engineering framework and command-line toolset
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Free and Open Source Reverse Engineering Platform powered by rizin
Collection of malware source code for a variety of platforms in an array of different programming languages.
Daemon to ban hosts that cause multiple authentication errors
A next-generation crawling and spidering framework.
E-mails, subdomains and names Harvester - OSINT
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Impacket is a collection of Python classes for working with network protocols.
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Fast passive subdomain enumeration tool.
CTF framework and exploit development library
dnscrypt-proxy 2 - A flexible DNS proxy, with support for encrypted DNS protocols.
Nmap - the Network Mapper. Github mirror of official SVN repository.
Fast subdomains enumeration tool for penetration testers
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.