ib83221920's Stars
google-marketing-solutions/feedgen
Optimise Shopping feeds with Generative AI
agencysavvy/pmax
MIATECHPARTNERS/PromptChains
Prompt chains maximize intelligence and results when using LLMs
fin3ss3g0d/evilgophish
evilginx3 + gophish
edoardottt/awesome-hacker-search-engines
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
GamehunterKaan/AutoPWN-Suite
AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.
ytisf/theZoo
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
Lissy93/twitter-sentiment-visualisation
🌍 Sentiment analysis over real-time social media data, rendering live charts to visualise trends
austinsonger/Incident-Playbook
GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
getspooky/yaldash
👻 It's never been easier to build and customize admin panels. Yah! yaldash is a beautifully designed administration panel for Laravel.
iojw/socialscan
Python library for accurately querying username and email usage on online platforms
gellin/bantam
A PHP backdoor management and generation tool/C2 featuring end to end encrypted payload streaming designed to bypass WAF, IDS, SIEM systems.
intelowlproject/IntelOwl
IntelOwl: manage your Threat Intelligence at scale
cr0hn/festin
FestIn - Open S3 Bucket Scanner
terjanq/Tiny-XSS-Payloads
A collection of tiny XSS Payloads that can be used in different contexts. https://tinyxss.terjanq.me
kevthehermit/PasteHunter
Scanning pastebin with yara rules
Viralmaniar/Powershell-RAT
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
EONRaider/blackhat-python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
mandatoryprogrammer/CursedChrome
Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victims.
Netflix/security_monkey
Security Monkey monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.
kgretzky/pwndrop
Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.
vincentcox/bypass-firewalls-by-DNS-history
Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.
BullsEye0/google_dork_list
Google Dorks | Google helps you to find Vulnerable Websites that Indexed in Google Search Results. Here is the latest collection of Google Dorks. A collection of 13.760 Dorks. Author: Jolanda de Koff
jakejarvis/awesome-shodan-queries
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
kpcyrd/sn0int
Semi-automatic OSINT framework and package manager
kgretzky/evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
owasp-amass/amass
In-depth attack surface mapping and asset discovery
vitalysim/totalrecon
TotalRecon installs all the recon tools you need
hyp3ri0n-ng/scylla
scylla.sh db dumps and more
projectdiscovery/subfinder
Fast passive subdomain enumeration tool.