himanshu4316's Stars
tomnomnom/assetfinder
Find domains and subdomains related to a given domain
cipher387/OSINT-Github-profiles
A list of Github users who distribute tools and tutorials on OSINT (as well as hacking, pentest, and forensics)
KathanP19/HowToHunt
Collection of methodology and test case for various web vulnerabilities.
RustScan/RustScan
🤖 The Modern Port Scanner 🤖
projectdiscovery/nuclei
Fast and customizable vulnerability scanner based on simple YAML based DSL.
ffuf/ffuf
Fast web fuzzer written in Go
jaeles-project/jaeles
The Swiss Army knife for automated Web Application Testing
1ndianl33t/Bug-Bounty-Roadmaps
Bug Bounty Roadmaps
sathishvj/awesome-gcp-certifications
Google Cloud Platform Certification resources.
shmilylty/OneForAll
OneForAll是一款功能强大的子域收集工具
veeral-patel/how-to-secure-anything
How to systematically secure anything: a repository about security engineering
maurosoria/dirsearch
Web path scanner
rndinfosecguy/Scavenger
Crawler (Bot) searching for credential leaks on paste sites.
s-rah/onionscan
OnionScan is a free and open source tool for investigating the Dark Web.
mandatoryprogrammer/xsshunter
The XSS Hunter service - a portable version of XSSHunter.com
tehsyntx/loffice
Lazy Office Analyzer
arkime/arkime
Arkime is an open source, large scale, full packet capturing, indexing, and database system.
ricklamers/gridstudio
Grid studio is a web-based application for data science with full integration of open source data science frameworks and languages.
ThreatResponse/margaritashotgun
Remote Memory Acquisition Tool
iSECPartners/Introspy-iOS
Security profiling for blackbox iOS
tylerha97/awesome-reversing
A curated list of awesome reversing resources
wavestone-cdt/abaddon
CrowdStrike/automactc
AutoMacTC: Automated Mac Forensic Triage Collector
khast3x/Redcloud
Automated Red Team Infrastructure deployement using Docker
guardicore/monkey
Infection Monkey - An open-source adversary emulation platform
Raikia/FiercePhish
FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.
Cyb3rWard0g/HELK
The Hunting ELK
s0md3v/Corsy
CORS Misconfiguration Scanner
travisfoley/dfirtriage
Digital forensic acquisition tool for Windows based incident response.
CorentinJ/Real-Time-Voice-Cloning
Clone a voice in 5 seconds to generate arbitrary speech in real-time