Starred repositories
Hunt down social media accounts by username across social networks
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.
E-mails, subdomains and names Harvester - OSINT
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Dorks Eye Google Hacking Dork Scraping and Searching Script. Dorks Eye is a script I made in python 3. With this tool, you can easily find Google Dorks. Dork Eye collects potentially vulnerable web…
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), ar…
Unified repository for different Metasploit Framework payloads
Snoop — инструмент разведки на основе открытых данных (OSINT world)
Cameradar hacks its way into RTSP videosurveillance cameras
Information gathering framework for phone numbers
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandiant.com
A Modular Penetration Testing Framework
An open-source post-exploitation framework for students, researchers and developers.
Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3. To run Ghost Eye, it only needs a domain or ip. Ghost Eye …
Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that you enter. Author: Jolanda de Koff
Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses and much more ..! Author: Jolanda de Koff
Google Dorks | Google helps you to find Vulnerable Websites that Indexed in Google Search Results. Here is the latest collection of Google Dorks. A collection of 13.760 Dorks. Author: Jolanda de Koff
Open Source Vulnerability Management Platform
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems