rgranja's Stars
malwareinfosec/EKFiddle
Your Swiss Army knife to analyze malicious web traffic based on the popular Fiddler web debugger.
brannondorsey/wifi-cracking
Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat
robcowart/elastiflow
Network flow analytics (Netflow, sFlow and IPFIX) with the Elastic Stack
Emanem/nettop
Utility to show network traffic (both TCP and UDP v4 and v6) split by process and remote host
Matty9191/dns-domain-expiration-checker
Send notifications when DNS domains are about to expire.
dirtbags/pcapdb
A Distributed, Search-Optimized Full Packet Capture System
shieldfy/API-Security-Checklist
Checklist of the most important security countermeasures when designing, testing, and releasing your API
genuinetools/binctr
Fully static, unprivileged, self-contained, containers as executable binaries.
evilsocket/xray
XRay is a tool for recon, mapping and OSINT gathering from public networks.
oracle/crashcart
CrashCart: sideload binaries into a running container
prettydiff/wisdom
Building better developers by specifying criteria of success
thomaspatzke/EQUEL
An Elasticsearch QUEry Language
cloudflare/cloudflare-blog
Cloudflare Blog code samples
evilsocket/dnssearch
A subdomain enumeration tool.
google/ssl_logger
Decrypts and logs a process's SSL traffic.
tdresser/performance-observer-tracing
Record a chrome://trace based on PerformanceObserver entries.
vulnersCom/getsploit
Command line utility for searching and downloading exploits
nccgroup/wssip
Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa.
chr4/sslsecure.vim
Highlight insecure SSL configuration in Vim (works for all OpenSSL/ LibreSSL cipher strings, independent of the filetype)
saulpw/visidata
A terminal spreadsheet multitool for discovering and arranging data
antonycourtney/tad
A desktop application for viewing and analyzing tabular data
mdipierro/nlib
The book "Annotated Algorithms in Python" and the nlib.py library
screetsec/Microsploit
Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer Overflow
cisagov/pshtt
Scan domains and return data based on HTTPS best practices
alphasoc/nfr
A lightweight tool to score network traffic and flag anomalies
talwrii/clixpath
Command-line tool to easily extract data from HTML or XML documents. Produces machine readable output.
RUB-NDS/PRET
Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.
OWASP/owasp-mastg
The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
mattdesl/promise-cookbook
:orange_book: a brief introduction to using Promises in JavaScript
jaebradley/getmethefuckthere
Get me the fucking fuck there