n3k00n3's Stars
infosecn1nja/Red-Teaming-Toolkit
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
HavocFramework/Havoc
The Havoc Framework.
dwisiswant0/apkleaks
Scanning APK file for URIs, endpoints & secrets.
streaak/keyhacks
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
DefectDojo/django-DefectDojo
DevSecOps, ASPM, Vulnerability Management. All on one platform.
kurogai/100-redteam-projects
Projects for security students
lutfumertceylan/top25-parameter
For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙
chvancooten/maldev-for-dummies
A workshop about Malware Development
DERE-ad2001/Frida-Labs
The repo contains a series of challenges for learning Frida for Android Exploitation.
K3YOMI/Wall-of-Flippers
A simple and easy way to find Flipper Zero Devices and Bluetooth Low Energy Based Attacks
PwnDexter/SharpEDRChecker
Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories, installed services and each service binaries metadata, installed drivers and each drivers metadata, all for the presence of known defensive products such as AV's, EDR's and logging tools.
devsecops/bootcamp
A open contribute bootcamp to develop DevSecOps skills...
HynekPetrak/javascript-malware-collection
Collection of almost 40.000 javascript malware samples
santoru/shcheck
A basic tool to check security headers of a website
m0bilesecurity/Frida-Mobile-Scripts
Collection of useful FRIDA Mobile Scripts
brinhosa/apidetector
APIDetector: Efficiently scan for exposed Swagger endpoints across web domains and subdomains. Supports HTTP/HTTPS, multi-threading, and flexible input/output options. Ideal for API security testing.
Moopinger/smugglefuzz
A rapid HTTP downgrade smuggling scanner written in Go.
PwnDexter/Invoke-EDRChecker
Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories, installed services, the registry and running drivers for the presence of known defensive products such as AV's, EDR's and logging tools.
OWASP/D4N155
OWASP D4N155 - Intelligent and dynamic wordlist using OSINT
dolevf/Black-Hat-Bash
The Black Hat Bash book repository
JohnWoodman/remoteInjector
Inject remote template link into word document for remote template injection
m14r41/PentestingEverything
Penetration Testing For - Web | Mobile | API | Thick Client | Source Code Review | DevSecOps | Wireless | Network Pentesting, etc...
gwen001/keyhacks.sh
Automation of tokens/api keys testing.
boobooHQ/private_templates
Private Nuclei Templates
DragonJAR/Security-Wordlist
A wordlist repository with human-curated and reviewed content.
fguisso/ga-recon
Recon(Amass, Naabu, Nuclei) workflow with Github Actions
oxahax/Brazilian-Malwares
Uma pequena coleção de malwares produzidos para atacar em território nacional
hakaioffsec/Reconnaissance-like-a-cyber-scout
Enumeration is an essential phase in the hacking process. It involves gathering information about a specific target, such as networks, systems, applications, or devices, to identify potential vulnerabilities that can be exploited. This phase is crucial for understanding the attack surface and discovering weaknesses in the systems.
ChOkO08/presentations
Some presentations i've made so far.
greenmind-sec/Brazilian-Malwares
Uma pequena coleção de malwares produzidos para atacar em território nacional