Stars
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Web-based Traffic and Security Network Traffic Monitoring
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
"rsync for cloud storage" - Google Drive, S3, Dropbox, Backblaze B2, One Drive, Swift, Hubic, Wasabi, Google Cloud Storage, Azure Blob, Azure Files, Yandex Files
Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites. Contact us via contact@wpscan.com
A framework for secure and scalable network traffic analysis - https://netcap.io
lgandx / Responder
Forked from SpiderLabs/ResponderResponder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…
Responsive NetFlow visualizer built on top of nfdump tools.
Investigate malicious Windows logon by visualizing and analyzing Windows event log
This project aims to provide a central repository for many useful Tsunami Security Scanner plugins.
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
🍯 T-Pot - The All In One Multi Honeypot Platform 🐝
Six Degrees of Domain Admin
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues invo…
Infection Monkey - An open-source adversary emulation platform
Virtual Machine for Adversary Emulation and Threat Hunting
Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victims.