jn-dk's Stars
corkami/docs
documentations, slides decks...
corkami/collisions
Hash collisions and exploitations
angea/pocorgtfo
a "Proof of Concept or GTFO" mirror with an extensive index with also whole issues or individual articles as clean PDFs.
corkami/pics
File formats dissections and more...
The-Login/DNS-Analysis-Server
Tools to assess DNS security.
mbrg/power-pwn
An offensive security toolset for Microsoft 365 focused on Microsoft Copilot, Copilot Studio and Power Platform
trickest/cve
Gather and update all available and newest CVEs with their PoC.
c6fc/npk
A mostly-serverless distributed hash cracking platform
zer0yu/Awesome-CobaltStrike
List of Awesome CobaltStrike Resources
fairyglade/ly
display manager with console UI
RESETHACKER-COMMUNITY/Pentesting-Bugbounty
Bringing infosec community, group and leaders together that solve community challenges, problems, create cultural and provide value to Infosec community.
yamsu/vibreoffice
Vim Mode for LibreOffice/OpenOffice With Calc and Writer Support
TROUBLE-1/Vajra
Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an intuitive web-based user interface built with the Python Flask module for a better user experience. The primary focus of this tool is to have different attacking techniques all at one place with web UI interfaces.
nomi-sec/PoC-in-GitHub
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
daffainfo/Oneliner-Bugbounty
A collection oneliner scripts for bug bounty
synacktiv/ica2tcp
A SOCKS proxy for Citrix.
sec-it/pass-station
CLI & library to search for default credentials among thousands of Products / Vendors
ihebski/DefaultCreds-cheat-sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
shadawck/awesome-anti-forensic
Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in general that makes changes to a system for the purposes of hiding information.
Whitespots-OU/DevSecOps-Pipelines
Application Security pipelines
telekom-security/tpotce
🍯 T-Pot - The All In One Multi Honeypot Platform 🐝
Security-Onion-Solutions/securityonion
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, and case management. It also includes other tools such as osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
Ciphey/Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
enaqx/awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
redcanaryco/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
cipher387/API-s-for-OSINT
List of API's for gathering information about phone numbers, addresses, domains etc
f0ng/captcha-killer-modified
captcha-killer的修改版,支持关键词识别base64编码的图片,添加免费ocr库,用于验证码爆破,适配新版Burpsuite
projectdiscovery/uncover
Quickly discover exposed hosts on the internet using multiple search engines.
six2dez/reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Its-Vichy/Dunocoin-Exploit
Custom miner that Spoof packets to be considered an IoT device and earn more coins.