Pinned Repositories
beef
The Browser Exploitation Framework Project
hyperfox
A security tool for proxying and recording HTTP and HTTPs traffic.
jok3r
Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Kvasir
Kvasir: Penetration Test Data Management
mandingo
Automatically exported from code.google.com/p/mandingo
Maryam
Maryam: Open-source Intelligence(OSINT) Framework
PhEmail
PhEmail is a python open source phishing email tool that automates the process of sending phishing emails as part of a social engineering test
Sitadel
Web Application Security Scanner
Smart-Contract-Security-Audits
Certified Smart Contract Audits (Ethereum, Hyperledger, xDAI, Huobi ECO Chain, Binance Smart Chain, Fantom, EOS, Tezos) by Chainsulting
snort3
Snort++
securityigi's Repositories
securityigi/jok3r
Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
securityigi/Sitadel
Web Application Security Scanner
securityigi/Telegram-Member-Adder
Telegram Member Adding Package
securityigi/aleph
Malware Analysis
securityigi/avain
A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
securityigi/commix-testbed
A collection of web pages, vulnerable to command injection flaws.
securityigi/datasploit
An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the raw data, and give data in multiple formats.
securityigi/Helios
A Python based Web Application security scanner
securityigi/luna
luna webscanner
securityigi/mmcs-news-scraper
News relay from mmcs website to a telegram channel
securityigi/Naveen-webscr
Naveen webscr -- web application security scanner
securityigi/nikto
Nikto web server scanner
securityigi/Noob-Pentesting-Framework
Complete Automated Pentesting Framework for Beginners
securityigi/ossec-wui
OSSEC Web User Interface - Unmaintained!!
securityigi/Pentest-Tools-Framework
Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
securityigi/prologWebScanner
SWI-Prolog code to test the security of your web application
securityigi/ReconCobra---Complete-Automated-Pentest-Framework-For-Information-Gathering
ReconCobra Reconcobra is Foot printing software for Ultimate Information Gathering Kali, Parrot OS, Black Arch, Termux, Android Led TV Interface Software have 82 Options with full automation with powerful information gathering capability Brief Introduction ReconCobra is useful in Banks, Private Organisations and Ethical hacker personnel for legal auditing. It serves as a defense method to find as much as information possible for gaining unauthorised access and intrusion. With the emergence of more advanced technology, cybercriminals have also found more ways to get into the system of many organizations. ReconCobra software can audit, firewall behaviour, if it is leaking backend machines/server and replying pings, it can find internal and external networks where many software’s like erp, mail firewalls are installed, exposing servers so it do Footprinting, Scanning & Enumeration as much as possible of target, to discover and collect most possible informations like username, web technologies, files, endpoint, api and much more.
securityigi/reconspider
🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
securityigi/riskscanner
RiskScanner 是开源的多云安全合规扫描平台,基于 Cloud Custodian 和 Nuclei 引擎,实现对主流公(私)有云资源的安全合规扫描和漏洞扫描。
securityigi/Taipan
Web application vulnerability scanner
securityigi/Telegram-channel-member-adder-and-scraper
Telegram Channel Member Adder || Telegram Channel Member Scraper || Telegram Group Member Scraper
securityigi/telegram-channel-scraper
Scrape messages from Telegram in a NodeJS cli program
securityigi/telegram-scraper
Java Telegram Channel Scrapper
securityigi/Telegram-Scraper-1
import sys import csv import traceback import time import random import json from telethon.sync import TelegramClient #Client Module to Login from telethon.tl.functions.messages import GetDialogsRequest from telethon.tl.types import InputPeerEmpty, InputPeerChannel, InputPeerUser, InputPeerChat from telethon.errors.rpcerrorlist import PeerFloodError, UserPrivacyRestrictedError, UserAlreadyParticipantError from telethon.tl.functions.channels import InviteToChannelRequest from telethon.tl.functions.messages import AddChatUserRequest credential_file = "credentials.json" #Relative Path of File which consists Telegram Credentials(api_id, api_hash, phone) start_index = 0 continue_script = False if len(sys.argv) == 5: g_index_scrapper = sys.argv[1] g_index_adder = sys.argv[2] mode = sys.argv[3] start_index = sys.argv[4] continue_script = True #Login & Verification Code try: credentials = json.load(open(credential_file, 'r')) except: print("credentials.json File not present in the directory") exit() try: client = TelegramClient(credentials['phone'], credentials['api_id'], credentials['api_hash']) client.connect() except: print("Could not create Telegram Client, Please check your Credentials in credentials.json file") exit() if not client.is_user_authorized(): client.send_code_request(credentials['phone']) client.sign_in(credentials['phone'], input('Enter veryfication code: ')) #Chat parameters chats = [] last_date = None chunk_size = 200 # No of latest chats to load groups = [] try: result = client(GetDialogsRequest( offset_date=last_date, offset_id=0, offset_peer=InputPeerEmpty(), limit=chunk_size, hash=0 )) chats.extend(result.chats) except: print("Unable to gather chats from server. Please Check Chat parameters.") exit() for chat in chats: try: groups.append(chat) except: continue if len(groups) == 0: print("No Groups or Channels found.") exit() print('Available Groups and Channels:') i=1 for g in groups: print(str(i) + '- ' + g.title) i+=1 #User Inputs if not continue_script: g_index_scrapper = input("Enter the index of Group/Channel to SCRAPE users from: ") target_group_scrapper = groups[int(g_index_scrapper)-1] g_index_adder = input("Enter the index of Group/Channel to ADD users to: ") target_group_adder = groups[int(g_index_adder)-1] mode = int(input("Enter 1 to add by username or 2 to add by ID: ")) if(mode not in [1,2]): sys.exit("Invalid Mode Selected. Please Try Again.") #Fetching participants from server all_participants = [] print('Fetching Members...') try: all_participants = client.get_participants(target_group_scrapper, aggressive=True) except: print("Unable to fetch participants of", target_group_scrapper) exit() if len(all_participants) == 0: print("No user found in", target_group_scrapper + '.', "Please check the group.") exit() try: target_group_entity_adder = InputPeerChannel(target_group_adder.id, target_group_adder.access_hash) isChannel = True except: target_group_entity_adder = InputPeerChat(target_group_adder.id) isChannel = False n = 0 user_added_count = 0 for i in range(start_index,len(all_participants)): user = all_participants[i] n += 1 if n % 50 == 0: time.sleep(900) try: print("Adding {}".format(user.id)) if mode == 1: try: if user.username != None: user_to_add = client.get_input_entity(user.username) except: continue elif mode == 2: user_to_add = InputPeerUser(user.id, user.access_hash) if isChannel: client(InviteToChannelRequest(target_group_entity_adder, [user_to_add])) else: client(AddChatUserRequest(target_group_adder.id, user_to_add,fwd_limit=50)) user_added_count += 1 wait_time = random.randrange(60, 180) print("Waiting for",wait_time, "Seconds...") time.sleep(wait_time) except PeerFloodError: print("Getting Flood Error from telegram. Script is stopping now. Please try again after some time.") print("Run the following command after few hours to contiune where you left off:") print("python3 scrapper_and_adder.py", g_index_scrapper, g_index_adder, mode, i) sys.exit() except UserPrivacyRestrictedError: print("The user's privacy settings do not allow you to do this. Skipping.") except UserAlreadyParticipantError: continue except: traceback.print_exc() print("Unexpected Error") continue
securityigi/TheKatanaFramework
katana is a framework written in python for making penetration testing, based on a simple and comprehensive structure for anyone to use, modify and share, the goal is to unify tools serve for professional when making a penetration test or simply as a routine tool, The current version is not completely stable, it's recommended to update every time t
securityigi/Tishna
Complete Automated pentest framework for Servers and Web Application Security
securityigi/wascan
WAScan ((W)eb (A)pplication (Scan)ner) is a Open Source web application security scanner. It is designed to find various vulnerabilities using "black-box" method, that means it won't study the source code of web applications but will work like a fuzzer, scanning the pages of the deployed web application, extracting links and forms and attacking the
securityigi/WebApp-Scanner
The Web Application Vulnerability Scanner is for Dynamic Application Security Testing which is in Black-Box testing. It has 3 main feature: Crawling, Attacking and Reporting.
securityigi/XssScant3r
Web application Security Scanner
securityigi/YAWSS
Yet Another Web Security Scanner | A Web Application Security Scanner Written in Python.