mdeous's Stars
trufflesecurity/trufflehog
Find, verify, and analyze leaked credentials
Gallopsled/pwntools
CTF framework and exploit development library
juice-shop/juice-shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
n1nj4sec/pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
drwetter/testssl.sh
Testing TLS/SSL encryption anywhere on any port
yeyintminthuhtut/Awesome-Red-Teaming
List of Awesome Red Teaming Resources
tanprathan/MobileApp-Pentest-Cheatsheet
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
Consensys/quorum
A permissioned implementation of Ethereum supporting data privacy
ac-pm/Inspeckage
Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)
DormyMo/SpiderKeeper
admin ui for scrapy/open source scrapinghub
ryanjay0/miles-deep
Deep Learning Porn Video Classifier/Editor with Caffe
Marten4n6/EvilOSX
An evil RAT (Remote Administration Tool) for macOS / OS X.
eth0izzle/bucket-stream
Find interesting Amazon S3 Buckets by watching certificate transparency logs.
dirkjanm/mitm6
pwning IPv4 via IPv6
x0rz/phishing_catcher
Phishing catcher using Certstream
TryCatchHCF/DumpsterFire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
WebBreacher/offensiveinterview
Interview questions to screen offensive (red team/pentest) candidates
vincentcox/StaCoAn
StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.
cyberark/ACLight
A script for advanced discovery of Privileged Accounts - includes Shadow Admins
p3nt4/Invoke-SocksProxy
Socks proxy, and reverse socks server using powershell.
pretalx/pretalx
Conference planning tool: CfP, scheduling, speaker management
Greenwolf/Spray
A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)
peewpw/Invoke-WCMDump
PowerShell Script to Dump Windows Credentials from the Credential Manager
scrapy-plugins/scrapy-djangoitem
Scrapy extension to write scraped items using Django models
DanMcInerney/pentest-machine
Automates some pentest jobs via nmap xml file
Section9Labs/Cartero
Cartero - Social Engineering Framework
snooze6/FiOS
small proof of concept gui for auditing iOS applications based on objection
gravity-postquantum/gravity-sphincs
Signature scheme submitted to NIST's Post-Quantum Cryptography Project
DanMcInerney/Obf-Cats
Obfuscated Invoke-Mimikatz script
sebastien/fake
Deterministic fake data generator for Python