Stars
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
Automatic SQL injection and database takeover tool
Exploitation Framework for Embedded Devices
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/
The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.
GRR Rapid Response: remote live forensics for incident response
Continuously jam all wifi clients/routers
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public expl…
Personalized, user-focused recommendations for employee information security.
The Intelligent Honey Net Project attempts to create actionable information from honeypots