whitehat-1's Stars
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
mingrammer/diagrams
:art: Diagram as Code for prototyping cloud system architectures
OWASP/owasp-mastg
The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
ggerganov/kbd-audio
🎤⌨️ Acoustic keyboard eavesdropping
ihebski/DefaultCreds-cheat-sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
jassics/security-study-plan
Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOps and so on...
MaximeBeasse/KeyDecoder
KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
Bo0oM/fuzz.txt
Potentially dangerous files
lefayjey/linWinPwn
linWinPwn is a bash script that streamlines the use of a number of Active Directory tools
ihebski/A-Red-Teamer-diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
IvanGlinkin/Fast-Google-Dorks-Scan
The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information about the specific web-site: common admin panels, the widespread file types and path traversal. The 100% automated.
xalgord/Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes
A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for identifying and exploiting vulnerabilities.
TakSec/google-dorks-bug-bounty
A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting
KULeuven-COSIC/Starlink-FI
vladko312/SSTImap
Automatic SSTI detection tool with interactive interface
SaadAhla/FilelessPELoader
Loading Remote AES Encrypted PE in memory , Decrypted it and run it
DarkNetEye/tor-links
Links to darknet markets, vendor stores and darknet services on the Tor Network. All links verified by us.
ANG13T/SatIntel
SatIntel is an OSINT tool for Satellites 🛰. Extract satellite telemetry, receive orbital predictions, and parse TLEs 🔭
rfidtool/ESP-RFID-Tool
A tool for logging data/testing devices with a Wiegand Interface. Can be used to create a portable RFID reader or installed directly into an existing installation. Provides access to a web based interface using WiFi in AP or Client mode. Will work with nearly all devices that contain a standard 5V Wiegand interface. Primary target group is 26-37bit HID Cards. Similar to the Tastic RFID Thief, Blekey, and ESPKey.
chompie1337/Windows_LPE_AFD_CVE-2023-21768
LPE exploit for CVE-2023-21768
morpheuslord/QuadraInspect
QuadraInspect is an Android framework that integrates AndroPass, APKUtil, and MobFS, providing a powerful tool for analyzing the security of Android applications.
ThreatLabz/ransomware_notes
An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz
az7rb/crt.sh
Crtsh Subdomain Enumeration | This bash script makes it easy to quickly save and parse the output from https://crt.sh website.
ANG13T/netspionage
Network Forensics CLI utility that performs Network Scanning, OSINT, and Attack Detection
PortSwigger/wordpress-scanner
Find known vulnerabilities in WordPress plugins and themes using Burp Suite proxy. WPScan like plugin for Burp.
MustafaBilgici/SucoshScanny
"Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performing code review in Web Application Developing or Source Code Analysis processes.
PythonAberdeen/user_group
GitHub repo for Aberdeen Python User Group meetings.
tmendonca28/DLNID
The code for my MSc. in Applied Cyber Security research project titled "Machine Learning for Network Intrusion Detection". Explored the use of RNN and MLP for network intrusion detection and classification. Used PyTorch.
thunder-katz/CWRU-cybersec-Final-Project
Documentation of the Final Project from the CWRU Cybersecurity course.
Brotherscodes/Cyber_Security_Intrusion_Prevention
Creating a machine learning model to detect factors that contribute to cyber attacks in an effort to limit the vulnerability of the average consumer.