Lists (15)
Sort Name ascending (A-Z)
Stars
- All languages
- Assembly
- Batchfile
- C
- C#
- C++
- CMake
- CSS
- Dockerfile
- Go
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- MATLAB
- MDX
- Makefile
- Markdown
- OpenSCAD
- PHP
- Perl
- PowerShell
- Python
- Ruby
- Rust
- Scala
- Scheme
- Shell
- Smarty
- Svelte
- Swift
- SystemVerilog
- TeX
- TypeScript
- Verilog
- Vim Script
- YARA
- Zig
OpenGFW is a flexible, easy-to-use, open source implementation of GFW (Great Firewall of China) on Linux
🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.
🔍 gowitness - a golang, web screenshot utility using Chrome Headless
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Swiss-army tool for scraping and extracting data from online assets, made for hackers
Automating situational awareness for cloud penetration tests.
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.
Run any Linux process in a secure, unprivileged sandbox using Landlock. Think firejail, but lightweight, user-friendly, and baked into the kernel.
A utility to safely generate malicious network traffic patterns and evaluate controls.
Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.
Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets!
SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applications by taking a session token and checking access across …
Ransomware simulator written in Golang
PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.
Abuse trust-boundaries to bypass firewalls and network controls
A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such as Zoom.
A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active Directory
Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)
Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.