Stars
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
an awesome list of honeypot resources
Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
lgandx / Responder
Forked from SpiderLabs/ResponderResponder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public expl…
A python application that detects and highlights the heart-rate of an individual (using only their own webcam) in real-time.
Awesome hacking is an awesome collection of hacking tools.
Operational information regarding the log4shell vulnerabilities in the Log4j logging library.
Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg
Binary analysis and management framework
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, tedious tasks slowing them down. #nsacyber
Salamandra is a tool to find spy microphones that use radio freq to transmit. It uses SDR.
Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)
Network Security Monitoring on Raspberry Pi type devices
Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.
Overlord - Red Teaming Infrastructure Automation
Collection of tools that reflect the network dimension into Bloodhound's data