zook5098's Stars
kgretzky/evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
gophish/gophish
Open-Source Phishing Toolkit
laramies/theHarvester
E-mails, subdomains and names Harvester - OSINT
htr-tech/zphisher
An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !
mvt-project/mvt
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
aboul3la/Sublist3r
Fast subdomains enumeration tool for penetration testers
vanhauser-thc/thc-hydra
hydra
blacklanternsecurity/bbot
The recursive internet scanner for hackers. š§”
ayoubfaouzi/al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
GhostPack/Seatbelt
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
its-a-feature/Mythic
A collaborative, multi-platform, red teaming framework
google/timesketch
Collaborative forensic timeline analysis
AlessandroZ/BeRoot
Privilege Escalation Project - Windows / Linux / Mac
nil0x42/phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
SnaffCon/Snaffler
a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )
SpecterOps/BloodHound
Six Degrees of Domain Admin
SharadKumar97/OSINT-SPY
Performs OSINT scan on email/domain/ip_address/organization using OSINT-SPY. It can be used by Data Miners, Infosec Researchers, Penetration Testers and cyber crime investigator in order to find deep information about their target. If you want to ask something please feel free to reach out to me at robotcoder@protonmail.com
blacklanternsecurity/MANSPIDER
Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!
KasperskyLab/hrtng
IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformations
wagga40/Zircolite
A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs
jamf/aftermath
Aftermath is a free macOS IR framework
dwillowtree/diana
Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )
kgretzky/gophish
Open-Source Phishing Toolkit
weslambert/velociraptor-docker
Docker image for Velocidex Velociraptor
weslambert/velocistack
devops-ia/helm-opencti
Helm chart for Open Cyber Threat Intelligence Platform
a-mess-tech/autoaudit
Welcome to Autoaudit, a log tampering detection tool.
StrangeBeeCorp/docker
Various Docker Compose profiles to set up TheHive and Cortex for different use cases
V1D1AN/ZVELK
csirtgadgets/alphahunt-sdk-py
AI can't replace HUMINT. We Scale You.