git-davi's Stars
NationalSecurityAgency/ghidra
Ghidra is a software reverse engineering (SRE) framework
bayandin/awesome-awesomeness
A curated list of awesome awesomeness
vulhub/vulhub
Pre-Built Vulnerable Environments Based on Docker-Compose
projectdiscovery/subfinder
Fast passive subdomain enumeration tool.
malwaredllc/byob
An open-source post-exploitation framework for students, researchers and developers.
Porchetta-Industries/CrackMapExec
A swiss army knife for pentesting networks
derv82/wifite2
Rewrite of the popular wireless network auditor, "wifite"
aircrack-ng/aircrack-ng
WiFi security auditing tools suite
EdOverflow/can-i-take-over-xyz
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
andresriancho/w3af
w3af: web application attack and audit framework, the open source web vulnerability scanner.
hakluke/hakrawler
Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application
ping/instagram_private_api
A Python library to access Instagram's private API.
flashmob/go-guerrilla
Mini SMTP server written in golang
jaeles-project/gospider
Gospider - Fast web spider written in Go
clarketm/proxy-list
A list of free, public, forward proxy servers. UPDATED DAILY!
sbousseaden/EVTX-ATTACK-SAMPLES
Windows Events Attack Samples
Cybereason/Logout4Shell
Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell
nsonaniya2010/SubDomainizer
A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.
m4ll0k/BBTz
BBT - Bug Bounty Tools (examples💡)
mschwager/fierce
A DNS reconnaissance tool for locating non-contiguous IP space.
cisagov/Sparrow
Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 environment.
simsong/bulk_extractor
This is the development tree. Production downloads are at:
schweikert/fping
High performance ping tool
SusmithKrishnan/torghost
TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected via tor, thus preventing DNSLeak. The scripts also disables unsafe packets exiting the system. Some packets like ping request can compromise your identity.
cube0x0/SharpMapExec
certego/PcapMonkey
PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.
C-REMO/Obscure-IP-Obfuscator
Simple script you can use to convert and obscure any IP address of any host.
grigorescu/binpac_quickstart
C-REMO/Deobscure-IP-Deobfuscator
IP deobfuscator can be used to convert obfuscated ip back ti it's original dotted value from integer, octal or hexadecimal value (or even combination of those)
lorenzoferrante/BrillaBoy
GameBoy emulator written in C++