simplevulnerabilitymanager
Program to create vulnerability reports in seconds and run security scanners on Linux | Created by @ulises2k
Argentina, Buenos Aires
simplevulnerabilitymanager's Stars
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
gchq/CyberChef
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
NickeManarin/ScreenToGif
🎬 ScreenToGif allows you to record a selected area of your screen, edit and save it as a gif or video.
enaqx/awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
bettercap/bettercap
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
PHPOffice/PhpSpreadsheet
A pure PHP library for reading and writing spreadsheet files
PowerShellMafia/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
elementor/elementor
The most advanced frontend drag & drop page builder. Create high-end, pixel perfect websites at record speeds. Any theme, any page, any design.
derv82/wifite2
Rewrite of the popular wireless network auditor, "wifite"
lgandx/Responder
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
vulnersCom/nmap-vulners
NSE script based on Vulners.com API
sensepost/gowitness
🔍 gowitness - a golang, web screenshot utility using Chrome Headless
sagishahar/lpeworkshop
Windows / Linux Local Privilege Escalation Workshop
cobbr/SharpSploit
SharpSploit is a .NET post-exploitation library written in C#
D35m0nd142/LFISuite
Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner
den4uk/andriller
📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices.
davidtavarez/pwndb
Search for leaked credentials
s0md3v/Silver
Mass scan IPs for vulnerable services
sethsec/celerystalk
An asynchronous enumeration & vulnerability scanner. Run all the tools on all the hosts.
auth0/docs
Auth0 documentation
chrispetrou/FDsploit
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
securitystreak/security-scripts
A collection of public offensive and defensive security related scripts for InfoSec students.
h4rdy/Acunetix11-API-Documentation
Inofficial Acunetix11 API Documentation
IOActive/laf
This project intends to provide a series of tools to craft, parse, send, analyze and crack a set of LoRaWAN packets in order to audit or pentest the security of a LoraWAN infrastructure.
go2ismail/AdminLTE-ASP-NET-MVC
Asp.Net Example Version of Beautiful AdminLTE Template
roflsandwich/Chrome-Password-Dumper
davidtavarez/pinky
pinky - The PHP mini RAT (Remote Administration Tool)
ritazh/l2tpvpn-docker-pi
L2TP/IPsec VPN Server with Raspberry Pi and Docker
cyberisltd/NcatPortable
A compiled Win32 portable version of Ncat 5.59BETA1 against openssl-1.0.1d
mushinnomushin/ZeuS_2.0.8.9
ZeuS 2.0.8.9