br4nches's Stars
AlexGalhardo/Software-Engineering
Learning Software Engineering :turtle:
epi052/feroxbuster
A fast, simple, recursive content discovery tool written in Rust.
peass-ng/PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
rebootuser/LinEnum
Scripted Local Linux Enumeration & Privilege Escalation Checks
massgravel/Microsoft-Activation-Scripts
A Windows and Office activator using HWID / Ohook / KMS38 / Online KMS activation methods, with a focus on open-source code and fewer antivirus detections.
vasanthk/how-web-works
What happens behind the scenes when we type www.google.com in a browser?
laramies/theHarvester
E-mails, subdomains and names Harvester - OSINT
gmh5225/awesome-game-security
awesome game security [Welcome to PR]
edoardottt/awesome-hacker-search-engines
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
es0j/ExecASLR-ekoparty
mthbernardes/GTRS
GTRS - Google Translator Reverse Shell
SpiderLabs/scavenger
scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders as well as "interesting" files containing sensitive information.
stong/infosec-resources
A list of helpful cybersecurity / infosec resources
kgretzky/evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
juliocesarfort/public-pentesting-reports
A list of public penetration test reports published by several consulting firms and academic security groups.
horsicq/Detect-It-Easy
Program for determining types of files for Windows, Linux and MacOS.
projectdiscovery/katana
A next-generation crawling and spidering framework.
l4rm4nd/LinkedInDumper
Python 3 script to dump/scrape/extract company employees from LinkedIn API
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
bytecode77/r77-rootkit
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
dwisiswant0/apkleaks
Scanning APK file for URIs, endpoints & secrets.
carloslack/KoviD
Linux kernel rootkit
boitatech/cyber-security-roadmap
O repositório Cyber Security Roadmap é uma iniciativa para ajudar a comunidade de segurança da informação a se orientar sobre o que estudar.
aress31/burpgpt
A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities and enables running traffic-based analysis of any type.
iamj0ker/bypass-403
A simple script just made for self use for bypassing 403
Moham3dRiahi/Th3inspector
Th3Inspector 🕵️ Best Tool For Information Gathering 🔎
OISF/suricata
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
projectdiscovery/nuclei
Fast and customizable vulnerability scanner based on simple YAML based DSL.
google/oss-fuzz
OSS-Fuzz - continuous fuzzing for open source software.
mitmproxy/mitmproxy
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.