hafenschiffer's Stars
trimstray/the-book-of-secret-knowledge
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
robertdavidgraham/masscan
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
fortra/impacket
Impacket is a collection of Python classes for working with network protocols.
OJ/gobuster
Directory/File, DNS and VHost busting tool written in Go
infosecn1nja/Red-Teaming-Toolkit
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
xo/usql
Universal command-line interface for SQL databases
NVIDIA/vid2vid
Pytorch implementation of our method for high-resolution (e.g. 2048x1024) photorealistic video-to-video translation.
derv82/wifite2
Rewrite of the popular wireless network auditor, "wifite"
google/google-ctf
Google CTF
LandGrey/pydictor
A powerful and useful hacker dictionary builder for a brute-force attack
x0rz/tweets_analyzer
Tweets metadata scraper & activity analyzer
D4Vinci/Cr3dOv3r
Know the dangers of credential reuse attacks.
nccgroup/Scout2
Security auditing tool for AWS environments
citronneur/rdpy
Remote Desktop Protocol in Twisted Python
RenwaX23/XSS-Payloads
List of XSS Vectors/Payloads
SecurityFTW/cs-suite
Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.
TryCatchHCF/DumpsterFire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Billy-Ellis/Exploit-Challenges
A collection of vulnerable ARM binaries for practicing exploit development
x1mdev/ReconPi
ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.
Rhynorater/CVE-2018-15473-Exploit
Exploit written in Python for CVE-2018-15473 with threading and export formats
s0md3v/JShell
JShell - Get a JavaScript shell with XSS.
jordanpotti/CloudScraper
CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.
byt3bl33d3r/Red-Baron
Automate creating resilient, disposable, secure and agile infrastructure for Red Teams
sdnewhop/sdwannewhope
SD-WAN security and insecurity
mgeeky/Exploit-Development-Tools
A bunch of my exploit development helper tools, collected in one place.
dafthack/PassphraseGen
A script for generating custom passphrase lists to be used for password cracking with hashcat rules
sensepost/punch-q
👊 A small utility to play with IBM MQ
rofl0r/MacGeiger
MacGeiger - a tool to track down the location of WIFI APs with sound (Geigercounter-like)
ll3N1GmAll/ATAT
Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.