4584 tools
-SKYNET-Steam-Emulator
-SKYNET-Steam-Emulator
Open Source Reverse Engineering

Client emulator to play steam games on LAN without Internet connection.

-Ultimate-Cybersecurity-Roadmap
-Ultimate-Cybersecurity-Roadmap
Free Web Application

Ultimate Cybersecurity Roadmap (2025 Edition) | Beginner to Advanced Guide | Learn Ethical Hacking, SOC Analysis, Threat Hunting, Incident R…

.github
.github
Open Source Reverse Engineering

Information on the WIP Custom Nintendo WiiU/3DS/2DS server and service replacements

.NET-Deobfuscator
.NET-Deobfuscator
Open Source Reverse Engineering

Lists of .NET Deobfuscator and Unpacker (Open Source)

.NET-Obfuscator
.NET-Obfuscator
Open Source Evasion Reverse Engineering

Lists of .NET Obfuscator (Free, Freemium, Paid and Open Source )

010editor
010editor
Free Reverse Engineering

Templates and scripts for 010 editor

0l1v3rr.github.io
0l1v3rr.github.io
Open Source Kali

Kali Linux terminal-like interactive portfolio website

100-redteam-projects
100-redteam-projects
Free Exploitation

Projects for security students

1earn
1earn
Free Exploitation

ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup

25000-syllabified-words-list
25000-syllabified-words-list
Free Password Attacks

A word list containing 25,000 of the most common English words, divided into syllables.

365
365
Free Exploitation Reconnaissance

BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploitatio…

365-Stealer
365-Stealer
Free Exploitation Social Engineering

365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.

365-Stealer
365-Stealer
Free Exploitation Social Engineering

365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.

3d-bin-container-packing
3d-bin-container-packing
Open Source Password Attacks

A variant of the Largest Area Fit First (LAFF) algorithm + brute force algorithm

3os.org
3os.org
Free

Collocation of technical documentation and guides for devops, developers, pentesters, systems administrators and other IT professionals webs…

403-Bypass
403-Bypass
Free Exploitation

Depending on the configuration made by the infrastructure analyst, there are some ways to get past the 403-forbidden error generally by conf…

404
404
Open Source Evasion

A new approach to fighting cross-session tracking: multi-layer online fingerprint obfuscation. Spoofs browser/OS (headers & JS), hardware, T…

53R3N17Y
53R3N17Y
Open Source Reconnaissance

Python based script for Information Gathering.

6502bench
6502bench
Open Source Reverse Engineering

A workbench for developing 6502 code.

69phisher
69phisher
Open Source Kali Social Engineering

🔱 [ Phishing Simulation Made Easy ] 🔱. Simple and beginner friendly automated phishing simulation page creator.

7-Zip-CVE-2025-0411-POC
7-Zip-CVE-2025-0411-POC
Free Exploitation

This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.

8821au-20210708
8821au-20210708
Free Kali Wireless

Linux Driver for USB WiFi Adapters that are based on the RTL8811AU and RTL8821AU Chipsets - v5.12.5.2

8821cu-20210916
8821cu-20210916
Free Kali Wireless

Linux Driver for USB WiFi Adapters that are based on the RTL8811CU, RTL8821CU, RTL8821CUH and RTL8731AU Chipsets - v5.12.0.4

A-Red-Teamer-diaries
A-Red-Teamer-diaries
Free Exploitation Post-Exploitation

RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.

A1CTF
A1CTF
Open Source

A CTF platform designed for A1natas.

Aaia
Aaia
Open Source

AWS Identity and Access Management Visualizer and Anomaly Finder

AAIdrive
AAIdrive
Open Source Reverse Engineering

Implementations of some Android Auto features as unofficial IDrive apps

aaWAF
aaWAF
Open Source Web Application

abcde
abcde
Open Source Reverse Engineering

ABCDE是一个使用Kotlin编写的OpenHarmony逆向工具包,目前已经实现的功能为解析方舟字节码文件中 的类信息、方法信息、字面量数组信息以及对方法进行反汇编,解析资源索引文件等功能。

AboutSecurity
AboutSecurity
Free Exploitation

Everything for pentest. | 渗透测试知识库,以 AI Agent 可执行的格式沉淀安全方法论。

Above
Above
Open Source Kali Reconnaissance

Network security sniffer for finding vulnerabilities in the network. Designed for pentesters and security engineers.

accesskey_tools
accesskey_tools
Free

阿里云aliyun/腾讯云tencentcloud/华为云huaweicloud/aws等各种云厂商的accesskey运维安全工具,accesskey利用工具,包括但不限于创建ecs、ecs查询和命令执行、oss查询和批量下载等各种功能,aws accesskey rce;re…

ACEshark
ACEshark
Open Source Exploitation

ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminating t…

AceTheGame
AceTheGame
Open Source Reverse Engineering

open source security auditing tools for games on android and linux. Containing memory scanner/editor, apk GUI, value freezer, android non ro…

Active-Directory-Exploitation-Cheat-Sheet
Active-Directory-Exploitation-Cheat-Sheet
Open Source Exploitation Post-Exploitation

A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.

Active-Directory-Exploitation-Cheat-Sheet
Active-Directory-Exploitation-Cheat-Sheet
Open Source Exploitation Post-Exploitation

A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.

ActiveDirectoryEnumeration
ActiveDirectoryEnumeration
Open Source Post-Exploitation Scanning & Enumeration

Enumerate AD through LDAP with a collection of helpfull scripts being bundled

ActiveReign
ActiveReign
Open Source Exploitation Scanning & Enumeration

A Network Enumeration and Attack Toolset for Windows Active Directory Environments.

AD-AssessmentKit
AD-AssessmentKit
Free Post-Exploitation

Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environments. …

AD-Attacks-by-Service
AD-Attacks-by-Service
Open Source Exploitation Scanning & Enumeration

Active Directory Penetration Testing for Red Teams

ad-lab-scripts
ad-lab-scripts
Free Social Engineering

A modular Active Directory lab builder for hands-on penetration testing and security research in isolated environments.

ad-privileged-audit
ad-privileged-audit
Free Forensics Post-Exploitation

Provides various Windows Server Active Directory (AD) security-focused reports.

Adalanche
Adalanche
Open Source Post-Exploitation Reconnaissance

Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?

ADB-Toolkit
ADB-Toolkit
Open Source Kali

ADB-Toolkit V2 for easy ADB tricks with many perks in all one. ENJOY!

adblock-lean
adblock-lean
Open Source Reconnaissance Social Engineering

Lean and powerful adblocking solution for OpenWrt

adbwebkit
adbwebkit
Open Source Kali Post-Exploitation

 ADB WEBKIT Access ADB On Browser With Awesome UI …

AddUser-SAMR
AddUser-SAMR
Free Exploitation

Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust

ADFT
ADFT
Open Source Forensics Post-Exploitation

Active Directory Forensic Toolkit : Detect & reconstruct AD attacks from Windows event logs (EVTX)

AdGuard-Home-List
AdGuard-Home-List
Open Source Social Engineering

Varied and carefully selected filter lists and consolidates for use in AdGuard Home.

adminexploit
adminexploit
Free Exploitation

This is the fastest way to get admin rights at work, school, etc., in just a few seconds.

AdminHack
AdminHack
Open Source Kali

today we will hack the admin panel of the site.

AdminPBuster
AdminPBuster
Open Source Reconnaissance

AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effectivel…

ADMMutate
ADMMutate
Open Source Evasion Exploitation

Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia.ed…

adsb-history
adsb-history
Open Source Reconnaissance

Collect and query ADS-B data to find aircraft and trends based on geographic region(s), altitude, bearing, aircraft type and more.

adscan
adscan
Free Exploitation Post-Exploitation

Free Active Directory pentesting tool and Linux CLI for AD enumeration, BloodHound, Kerberoasting, ADCS, DCSync, and attack paths.

ADTimeline
ADTimeline
Open Source Forensics Post-Exploitation

Timeline of Active Directory changes with replication metadata

Advanced-WAF-WAFinity
Advanced-WAF-WAFinity
Free Exploitation Web Application

An Advanced Web Application Firewall that protects against threats like SQL injection and XSS by filtering HTTP traffic. It combines signatu…

advanced-web-dev-quiz
advanced-web-dev-quiz
Free Web Application

🔥 Repo related to my FrontendMasters course. An Advanced Web Dev Quiz that covers a wide range of the things web devs get to deal with on a …

adversarial-robustness-toolbox
adversarial-robustness-toolbox
Open Source Evasion Exploitation

Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Bl…

adversarial-threat-modelling
adversarial-threat-modelling
Free Exploitation

Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop

adversary_emulation_library
adversary_emulation_library
Open Source Exploitation

An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.

AdvPhishing
AdvPhishing
Free Social Engineering

This is Advance Phishing Tool ! OTP PHISHING

advtools
advtools
Open Source Exploitation

Automated PowerHacker Suite: Your all-in-one solution for ethical hacking. Conduct comprehensive network mapping, vulnerability assessments,…

adwsdomaindump
adwsdomaindump
Open Source Post-Exploitation

Active Directory information dumper via ADWS for evasion purposes.

ael
ael
Open Source Exploitation

The ATT&CK Emulation Library includes a collection of adversary emulation plans used in published ATT&CK Evaluations.

AES-Encoder
AES-Encoder
Open Source Evasion Exploitation

PowerShell Obfuscator. A PowerShell script anti-virus evasion tool

afrog
afrog
Open Source Scanning & Enumeration Web Application

A Security Tool for Bug Bounty, Pentest and Red Teaming.

agartha
agartha
Free

A Burp Suite extension for identifying injection flaws (LFI, RCE, SQLi), authentication/authorization issues, and HTTP 403 access violations…

agebox
agebox
Open Source

Age based repository file encryption gitops tool

agent-audit
agent-audit
Open Source Reverse Engineering Scanning & Enumeration

Static security scanner for LLM agents — prompt injection, MCP config auditing, taint analysis. 49 rules mapped to OWASP Agentic Top 10 (202…

agent-python
agent-python
Open Source Password Attacks

Official python agent for using the distributed hashcracker Hashtopolis

agent-security-scanner-mcp
agent-security-scanner-mcp
Open Source Scanning & Enumeration Web Application

Security scanner MCP server for AI coding agents. Prompt injection firewall, package hallucination detection (4.3M+ packages), 1000+ vulnera…

Agent-Wiz
Agent-Wiz
Open Source

A CLI tool for threat modeling and visualizing AI agents built using popular frameworks like LangGraph, AutoGen, CrewAI, and more.

agentic-radar
agentic-radar
Open Source

A security scanner for your LLM agentic workflows

agentic-threat-hunting-framework
agentic-threat-hunting-framework
Open Source

ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.

AgentPoison
AgentPoison
Open Source Exploitation

[NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"

agentseal
agentseal
Free Exploitation Scanning & Enumeration

Security toolkit for AI agents. Scan your machine for dangerous skills and MCP configs, monitor for supply chain attacks, test prompt inject…

aggressor_scripts
aggressor_scripts
Free Exploitation

A collection of useful scripts for Cobalt Strike

agsutils
agsutils
Free Reverse Engineering

contains utils for AGS: game extractor, repacker, disassembler and assembler

ahbtr
ahbtr
Free Evasion

An “open-thoughts” research — Ad Hoc Broadcast, Trace, and Revoke.

ai_for_the_win
ai_for_the_win
Free Forensics

Build AI-powered security tools. 50+ hands-on labs covering ML, LLMs, RAG, threat detection, DFIR, and red teaming. Includes Colab notebooks…

ai_osint
ai_osint
Free Exploitation Reconnaissance

🤖 Curated AI OSINT resources — Google dorks, Shodan queries, GitHub dorks, and techniques to discover exposed LLM endpoints, leaked AI API k…

ai-code-decompile
ai-code-decompile
Free Evasion Reverse Engineering

🚀 AI-powered JavaScript Decompiler & Deobfuscator. 基于 AI 与 AST 的 JS 代码分析与混淆还原工具,把不可读的构建产物变成人能看懂的代码。

ai-goat
ai-goat
Open Source

Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.

AI-Infra-Guard
AI-Infra-Guard
Open Source Exploitation

A full-stack AI Red Teaming platform securing AI ecosystems via OpenClaw Security Scan, Agent Scan, Skills Scan, MCP scan, AI Infra scan and…

AI-Linux
AI-Linux
Free Kali

Top Things to do After Installing Kali Linux

AI-OPS
AI-OPS
Open Source

Penetration Testing AI Assistant based on open source LLMs.

AI-penetration-testing
AI-penetration-testing
Free

AI/ML/LLM Penetration Testing Toolkit by Mr-Infect — the #1 GitHub resource for AI security, red teaming, and adversarial ML techniques. Thi…

ai-reverse-engineering
ai-reverse-engineering
Free Reverse Engineering

AI-Assisted Reverse Engineering with Ghidra

AI-System-Prompts
AI-System-Prompts
Free

XBot - Advanced AI Cybersecurity Agent | Gemini system prompt for automated penetration testing and security assessments

ai-website-cloner-template
ai-website-cloner-template
Open Source Reverse Engineering

Clone any website with one command using AI coding agents

ai4eh
ai4eh
Open Source Reconnaissance

AI for Ethical Hacking - Workshop

AIDA
AIDA
Open Source

Turn any LLM into an autonomous pentester. You define the scope, the agent does the work, you review the findings.

aidsfuscator
aidsfuscator
Free Evasion

Aidsfuscator is a java bytecode obfuscator that aims to become the best, if not then one of the best, free obfuscators. Join the discord se…

AIHTTPAnalyzer
AIHTTPAnalyzer
Open Source Web Application

AIHTTPAnalyzer revolutionizes web application security testing by bringing artificial intelligence capabilities to Burp Suite. This innovati…

Aimbot-V3
Aimbot-V3
Free Exploitation

Universal ROBLOX Aimbot Module

AIO-Firebog-Blocklists
AIO-Firebog-Blocklists
Open Source Social Engineering

A collection of unified blocklists designed to provide complete filtering capabilities for different online threats. These blocklists are cu…

air-script
air-script
Open Source Kali Wireless

Air Script is a powerful Wi-Fi auditing tool with optional email alerts for captured handshakes.

Aircrack-ng
Aircrack-ng
Open Source Kali Password Attacks Wireless

Complete suite of tools for 802.11 WEP and WPA/WPA2 cracking. Includes monitoring (airodump-ng), attacking (aireplay-ng), testing (airmon-ng…

aircrack-ng
aircrack-ng
Open Source Kali Wireless

WiFi security auditing tools suite

airecon
airecon
Open Source Reconnaissance

AIRecon is an autonomous cybersecurity agent that combines a self-hosted Large Language Model (Ollama) with a Kali Linux Docker sandbox and …

airgeddon
airgeddon
Open Source Wireless

Multi-use bash script for Linux systems for auditing wireless networks. Automates various wireless attacks including handshake capture, evil…

airgeddon
airgeddon
Open Source Wireless

This is a multi-use bash script for Linux systems to audit wireless networks.

airgeddon-plugins
airgeddon-plugins
Open Source Wireless

Enhanced functions and new features for airgeddon!

airgorah
airgorah
Open Source Kali Wireless

A WiFi security auditing software mainly based on aircrack-ng tools suite

airt
airt
Free Exploitation

AIRT — A free, open-source AI Red Teaming course with 8 modules and hands-on Docker labs. Built with Perplexity Computer.

AIRTBench-Code
AIRTBench-Code
Open Source

Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models

AiScan-N
AiScan-N
Free Exploitation

AiScan-N 来了!这是一款基于人工智能驱动的Ai自动化网络安全(运维)工具,专注于网络安全评估、漏洞扫描、运维、应急响应、渗透测试自动化,Ai大模型工具集【CLI Agent】 ,Ai驱动的安全检测技术,提升安全测试(运维)效率,专为企业和个人用户打造,尤其适合初学者(小白…

aizawa
aizawa
Open Source Web Application

Aizawa is a command-line webshell designed to execute commands through HTTP header

AKILT
AKILT
Open Source Exploitation

A Windows Botnet written in Golang

aleph
aleph
Open Source Reconnaissance

Search and browse documents and data; find the people and companies you look for.

ALHacking
ALHacking
Free Kali Reconnaissance

Albanian Hacking Tool!! Tools to help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user disco…

Alhasawi-ICS-OT-Security-projetcs
Alhasawi-ICS-OT-Security-projetcs
Free Reconnaissance

This project is all about ICS Security. In an effort to contribute to the ICS community.

Alien
Alien
Free

A C#-based webshell management tool for penetration testing.

Aliens_eye
Aliens_eye
Open Source Reconnaissance

Hunt down 840+ social media accounts using AI

alipay-securityguard-analysis
alipay-securityguard-analysis
Open Source Exploitation Reverse Engineering

Complete reverse engineering of Alipay SecurityGuard SDK — 9 CVEs (MITRE #2005801), AVMP VM bypass, 396/408 (97%) unprotected JSBridge APIs

alive_reversing
alive_reversing
Free Reverse Engineering

Re-implementation of Oddworld: Abe's Exoddus and Oddworld: Abe's Oddysee

All-CEHv13-Module-wise-PDF-Reports
All-CEHv13-Module-wise-PDF-Reports
Free Forensics Reconnaissance

Practical labs, notes, and reports for CEH v13 modules — covering web hacking, network pentesting, malware analysis, social engineering, and…

All-In-One-CyberSecurity-Resources
All-In-One-CyberSecurity-Resources
Free Web Application

List of CyberSecurity Resources and some different Sub-Domains of CyberSecurity

AllHackingTools
AllHackingTools
Open Source Web Application

All-in-One Hacking Tools For Hackers! And more hacking tools! For termux.

AlliN
AlliN
Free

A comprehensive tool that assists penetration testing projects. It is a flexible, compact and efficient scan tool mainly used for lateral pe…

allsafe-android
allsafe-android
Open Source Reverse Engineering

Intentionally vulnerable Android application.

allthingsida
allthingsida
Free Reverse Engineering

Repository for the code snippets from the AllThingsIDA video channel

alokmenghrajani.github.com
alokmenghrajani.github.com
Free Web Application

I started this blog around 1996, hosting it on geocities.com at first. What started as a small collection of random posts about chess and co…

AlphaGolang
AlphaGolang
Open Source Forensics Reverse Engineering

IDApython Scripts for Analyzing Golang Binaries

Altify-Developing-Main
Altify-Developing-Main
Open Source Social Engineering

All of my hacking tools that are available for free to the public - 200+ hacking tools all opensource also 10,500 COMMITS!!!

Amass
Amass
Open Source Kali Reconnaissance

OWASP tool for in-depth DNS enumeration, network mapping, and attack surface discovery. Uses both passive and active techniques to find subd…

amass
amass
Free Kali Reconnaissance Scanning & Enumeration

In-depth attack surface mapping and asset discovery

amass-docker-compose
amass-docker-compose
Free Reconnaissance Web Application

OWASP Amass Docker Compose for setting up a full instance of the infrastructure

amazing-sandbox
amazing-sandbox
Open Source

Amazing Sandbox - run third-party tools and AI agents securely on your machine

amcache-evilhunter
amcache-evilhunter
Open Source Forensics

Parse and analyze a Windows Amcache.hve registry hive, VirusTotal integration.

amice
amice
Open Source Evasion

A Rust implementation of Obfuscator-LLVM (OLLVM) passes

AMIE
AMIE
Open Source Reverse Engineering

A Minimalist Instruction Extender for the ARM architecture and IDA Pro

Amnesiac
Amnesiac
Open Source Exploitation Post-Exploitation

Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Director…

amoco
amoco
Open Source Reverse Engineering

yet another tool for analysing binaries

AMSI Bypass Techniques
AMSI Bypass Techniques
Open Source Evasion

Collection of PowerShell AMSI (Antimalware Scan Interface) bypass techniques. Patches AMSI in-memory to prevent PowerShell scripts from bein…

AMSI-WRITE-RAID-BYPASS
AMSI-WRITE-RAID-BYPASS
Free Evasion Exploitation

"AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS

Analisi-Digital-Forense
Analisi-Digital-Forense
Free Forensics

Strumenti di Acquisizione e Analisi di copie Forensi

analogi_Glaza_Boga
analogi_Glaza_Boga
Free Reconnaissance

Альтернативы и аналоги бота Глаз Бога и похожие Телеграм боты для поиска и анализа информации.

analyzeMFT
analyzeMFT
Open Source Forensics

analyzeMFT.py is designed to fully parse the MFT file from an NTFS filesystem and present the results as accurately as possible in multiple …

AndKittyInjector
AndKittyInjector
Open Source Reverse Engineering

Inject a shared library into a process using ptrace

androguard
androguard
Open Source Reverse Engineering

Reverse engineering and pentesting for Android applications

android-cracker
android-cracker
Open Source Password Attacks

Crack Android PIN, passwords, patterns, gestures

Android-Disassembler
Android-Disassembler
Open Source Reverse Engineering

Disassemble ANY files including .so (NDK, JNI), Windows PE(EXE, DLL, SYS, etc), linux binaries, libraries, and any other files such as pict…

android-h1
android-h1
Free Web Application

移动安全漏洞挖掘专家SKILL,基于 HackerOne 真实报告的移动安全漏洞挖掘知识库,提供 Android 和 iOS 应用的漏洞挖掘手法、技术细节和代码模式分析。

android-penetration-testing-cheat-sheet
android-penetration-testing-cheat-sheet
Open Source Reverse Engineering Web Application

This is more of a checklist for myself. May contain useful tips and tricks. Still need to add a lot of things.

Android-Pentesting-Checklist
Android-Pentesting-Checklist
Free Reverse Engineering Web Application

Delve into a comprehensive checklist, your ultimate companion for Android app penetration testing. Identify vulnerabilities in network, data…

Android-Reports-and-Resources
Android-Reports-and-Resources
Free Web Application

A big list of Android Hackerone disclosed reports and other resources.

Android-Request-Inspector-WebView
Android-Request-Inspector-WebView
Open Source Reverse Engineering

Inspect and intercept full HTTP requests sent from Android WebViews

Android-Security-Exploits-YouTube-Curriculum
Android-Security-Exploits-YouTube-Curriculum
Free Exploitation Reconnaissance

🔓A Curated List Of Modern Android Exploitation Conference Talks.

android-ssl-pinning-bypass
android-ssl-pinning-bypass
Free Reverse Engineering

The script allows to bypass SSL pinning on Android >= 7 and makes APK file ready for HTTPS traffic inspection

android-unpinner
android-unpinner
Free Reverse Engineering

Remove Certificate Pinning from APKs

AndroidHack_BackDoor
AndroidHack_BackDoor
Free Kali Post-Exploitation

Android-BackDoor is a python and shell script that simplifies the process of adding a backdoor to any Android APK file. It also exploits the…

androidqf
androidqf
Free Forensics

androidqf (Android Quick Forensics) helps quickly gathering forensic evidence from Android devices, in order to identify potential traces of…

androidqf
androidqf
Free Forensics

androidqf (Android Quick Forensics) helps quickly gathering forensic evidence from Android devices, in order to identify potential traces of…

AndroidReverse101
AndroidReverse101
Open Source Reverse Engineering

📖 从 0 到 1,系统化学习 Android 逆向,让学习变得有趣、好玩、易上手!

AndRoPass
AndRoPass
Open Source

Tool to check the strength of Android root and emulator detection

AndroRAT
AndroRAT
Open Source Exploitation

A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side

AndroRAT
AndroRAT
Free Exploitation

AndroRAT | Remote Administrator Tool for Android OS Hacking

AndroSH
AndroSH
Open Source Kali

AndroSH No-Root Multi-Distro Linux on Android via Shizuku/ADB - Run Arch, Fedora, Alpine, Debian, Ubuntu, Kali, Void, Manjaro, OpenSUSE & Ch…

AndroTickler
AndroTickler
Open Source

Penetration testing and auditing toolkit for Android apps.

Andspoilt
Andspoilt
Open Source Kali Exploitation

Run interactive android exploits in linux.

AndUEDumper
AndUEDumper
Open Source Reverse Engineering

Android Unreal Engine Dumper Tool

Angr
Angr
Open Source Reverse Engineering

Python binary analysis framework supporting both static and dynamic symbolic execution (concolic execution). Used for automatic exploit gene…

angr-cli
angr-cli
Open Source Reverse Engineering

Repo for various angr ipython features to give it more of a cli feeling

AngryOxide
AngryOxide
Open Source Wireless

AngryOxide was developed as a way to learn Rust, netlink, kernel sockets, and WiFi exploitation all at once.

ankermake-m5-protocol
ankermake-m5-protocol
Open Source Reverse Engineering

Ankermake M5 protocol specifications and libraries *NOT AFFILIATED WITH ANKER*

Ankou
Ankou
Open Source Exploitation Post-Exploitation

A flexible, AI powered C2 framework built with operators in mind

AnonGT
AnonGT
Open Source Kali

Redirect All Traffic Through Tor Network For Kali Linux

anonymous-c2
anonymous-c2
Free Kali Post-Exploitation

This is a DDOS tool {denial-of-service} by sending commands to botnet members. Botnet members can be called zombies and the botnet itself ca…

ansible-role-hardening
ansible-role-hardening
Open Source

Ansible role to apply a security baseline. Systemd edition.

Anthropic-Cybersecurity-Skills
Anthropic-Cybersecurity-Skills
Open Source Exploitation Forensics

754 structured cybersecurity skills for AI agents · Mapped to 5 frameworks: MITRE ATT&CK, NIST CSF 2.0, MITRE ATLAS, D3FEND & NIST AI RMF · …

anti-crime-ecosystem-research
anti-crime-ecosystem-research
Free Exploitation

Independent research white paper by Jon “GainSec” Gaines examining the security posture of a connected public safety technology ecosystem.

Anti-Virus-Evading-Payloads
Anti-Virus-Evading-Payloads
Free Exploitation

During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target sy…

anti-xss
anti-xss
Open Source Web Application

㊙️ AntiXSS | Protection against Cross-site scripting (XSS) via PHP

Antibot-Detector
Antibot-Detector
Free Web Application

Real-time detection of anti-bot systems, CAPTCHAs & fingerprinting techniques. Identifies Cloudflare, Akamai, DataDome, reCAPTCHA, hCaptcha,…

AntiCrack-DotNet
AntiCrack-DotNet
Open Source Reverse Engineering

.NET Project containing plenty of advanced techniques to detect various types of malicious actions on your software, with syscall support.

AntiDarkSword
AntiDarkSword
Open Source Exploitation

A jailbreak tweak / dylib that hardens jailbroken devices against WebKit RCE and iMessage zero-click exploits like Coruna / DarkSword / BLAS…

AntiHunter
AntiHunter
Open Source Reconnaissance Wireless

AntiHunter Perimeter Defense Systems - DIGI Node Firmware

antisamy
antisamy
Open Source

a library for performing fast, configurable cleansing of HTML coming from untrusted sources

Anubis
Anubis
Open Source Kali Reconnaissance

Anubis is a subdomain enumeration and information gathering tool. Anubis collates data from a variety of sources, including HackerTarget, DN…

Anubis
Anubis
Open Source Evasion

[UNMAINTAINED] A Python script to obfuscate and protect your code through anti debuggers, junk code and custom encryption.

ANYDESK-BACKDOOR
ANYDESK-BACKDOOR
Free Kali

You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best wa…

anything-analyzer
anything-analyzer
Free Reverse Engineering

全能协议分析工具:浏览器抓包 + MITM 代理 + 指纹伪装 + AI 分析 + MCP Server 无缝对接 AI Agent/IDE | All-in-one protocol analysis toolkit — built-in browser capture,…

aparoid
aparoid
Free Forensics Reverse Engineering

Static and dynamic Android application security analysis

Apepe
Apepe
Open Source Exploitation

📲 Apepe is a project developed to help to capture informations from a Android app through his APK file. It can be used to extract the conten…

AperiSolve
AperiSolve
Open Source

apex
apex
Open Source

AI-powered offensive security testing using autonomous agents, directly in your terminal.

api-firewall
api-firewall
Open Source Web Application

Fast and light-weight API proxy firewall for request and response validation by OpenAPI specs.

API-Pentesting-Tools
API-Pentesting-Tools
Open Source Reconnaissance Web Application

API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).

API-s-for-OSINT
API-s-for-OSINT
Free Reconnaissance

List of API's for gathering information about phone numbers, addresses, domains etc

apiosintDS
apiosintDS
Open Source Forensics

On demand query API for https://github.com/davidonzo/Threat-Intel project.

apk-medit
apk-medit
Open Source

memory search and patch tool on debuggable apk without root & ndk

apk-mitm
apk-mitm
Open Source Reverse Engineering

🤖 A CLI application that automatically prepares Android APK files for HTTPS inspection

apk-utilities
apk-utilities
Free Reverse Engineering

🛠 Tools and scripts to manipulate Android APKs

apk.sh
apk.sh
Open Source Reverse Engineering

Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.

ApkCheckPack
ApkCheckPack
Free

apk加固特征检查工具,汇总收集已知特征和手动收集大家提交的app加固特征,全网最全开源加固特征,支持40+厂商的加固检测,欢迎大家提交无法识别的app

APKHunt
APKHunt
Open Source Reverse Engineering Web Application

APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is intend…

APKiD
APKiD
Free Evasion Forensics

Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android

apkinfector
apkinfector
Free Evasion

Advanced Android AV Evasion Tool Written In Python 3 that can Embed/Bind meterpreter APK to any Legitimate APK

apkInspector
apkInspector
Open Source Evasion Reverse Engineering

apkInspector is a tool designed to provide detailed insights into the zip structure of APK files, offering the capability to extract content…

APKLab
APKLab
Open Source Forensics Reverse Engineering

Android Reverse-Engineering Workbench for VS Code

apkleaks
apkleaks
Open Source Reverse Engineering

Scanning APK file for URIs, endpoints & secrets.

apkscan
apkscan
Free Reverse Engineering

Scan for secrets, endpoints, and other sensitive data after decompiling and deobfuscating Android files. (.apk, .xapk, .dex, .jar, .class, .…

apkstudio
apkstudio
Open Source Reverse Engineering

Open-source, cross platform Qt6 based IDE for reverse-engineering Android application packages. It features a friendly IDE-like layout inclu…

APKTool
APKTool
Open Source Kali Reverse Engineering

Tool for reverse engineering Android APK files. Decodes resources to their original form, rebuilds decoded resources back to APK. Supports s…

Apktool
Apktool
Open Source Kali Reverse Engineering

A tool for reverse engineering Android apk files

apktool-mcp-server
apktool-mcp-server
Open Source Reverse Engineering

A MCP Server for APK Tool (Part of Android Reverse Engineering MCP Suites)

apkurlgrep
apkurlgrep
Open Source

Extract endpoints from APK files

apollofish
apollofish
Free

在数字化浪潮下,钓鱼攻击已成为企业网络安全的主要威胁之一。仿冒网页、恶意邮件等钓鱼手段层出不穷,一旦员工不慎中招,可能导致企业核心数据泄露、系统瘫痪、财产损失等严重后果。在此背景下,阿波罗安全风险演练平台ApolloFish)应运而生,平台以“实战演练赋能安全意识提升”为核心目标…

appdbg
appdbg
Open Source Reverse Engineering

make it possible to run method of android-app with original Java Virtual Machine.

apple-knowledge
apple-knowledge
Open Source Exploitation Reverse Engineering

A collection of reverse engineered Apple things, as well as a machine-readable database of Apple hardware

ApplicationInspector
ApplicationInspector
Open Source Reverse Engineering

A source code analyzer built for surfacing features of interest and other characteristics to answer the question 'What's in the code?' quick…

AppSec-Payloads
AppSec-Payloads
Open Source

AppSec Payloads Arsenal for Pentration Tester and Bug Bounty Hunters

AppVerifier
AppVerifier
Open Source

AppVerifier is an app signing certificate hash viewer and verifier.\ It enables you to easily verify that your apps are genuine with others!

APT_REPORT
APT_REPORT
Free Exploitation

Interesting APT Report Collection And Some Special IOCs

APT-Hunter
APT-Hunter
Open Source Forensics

APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea…

APT-Sample
APT-Sample
Free Forensics

Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.

APT38-0day-Stealer
APT38-0day-Stealer
Free Exploitation Post-Exploitation

APT38 Tactic PoC for Stealing 0days from security researchers

APTRS
APTRS
Open Source

Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your securit…

aqua-helm
aqua-helm
Open Source

Helm Charts For Installing Aqua Security Components

Aquatone
Aquatone
Open Source Reconnaissance Web Application

Tool for visual inspection of websites across large numbers of hosts. Takes screenshots of web pages, performs basic HTTP probing, and gener…

aquatone
aquatone
Open Source Reconnaissance Web Application

Aquatone is a tool for visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTT…

araa-search
araa-search
Open Source Reconnaissance

A privacy-respecting, ad-free, self-hosted Google metasearch engine with strong security that offers full API support and utilizes Qwant for…

arch-security-tracker
arch-security-tracker
Open Source Exploitation

The Arch Linux Security Tracker is a lightweight flask based panel for tracking vulnerabilities in Arch Linux packages, displaying vulnerabi…

archerysec
archerysec
Open Source Scanning & Enumeration

ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.

Archive
Archive
Open Source Exploitation Post-Exploitation

Hacking Methodology, Cheatsheats, Conceptual-Breakdowns

ArchStrike
ArchStrike
Open Source

An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv…

arcjet-js
arcjet-js
Open Source

Arcjet JavaScript (JS) / TypeScript SDK. Stop bots and automated attacks from burning your AI budget, leaking data, or misusing tools with A…

Argo
Argo
Open Source

Argo is an automated general crawler for automatically obtaining website URLs . Argo 是一个自动化扫描器爬虫 用于自动化获取网站的URL 基于go-rod实现了静态和动态结合的方式来实现

Argos
Argos
Free Reconnaissance

This script will automatically set up an OSINT workstation starting from a Ubuntu OS.

Argus
Argus
Open Source Reconnaissance

The Ultimate Information Gathering Toolkit

Arjun
Arjun
Open Source Web Application

HTTP parameter discovery suite. Finds hidden HTTP parameters in web applications by checking 25,000+ parameter names. Supports GET, POST, JS…

Arjun
Arjun
Open Source Reconnaissance

HTTP parameter discovery suite.

arkdecompiler
arkdecompiler
Open Source Exploitation Reverse Engineering

HarmonyOS NEXT Decompiler(纯血鸿蒙反编译器)

ArkhamMirror
ArkhamMirror
Open Source Forensics Reconnaissance

Local-first AI-powered document intelligence platform for investigative journalism

ARL
ARL
Open Source

ARL官方仓库备份项目:ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。

ARL
ARL
Free Reconnaissance

ARL 资产侦察灯塔系统(可运行,添加指纹,提高并发,升级工具及系统,无限制修改版) | ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检…

ARL-docker
ARL-docker
Open Source

基于ARL v2.6.2版本源码,生成docker镜像进行快速部署,同时提供七千多条指纹

ARL-plus-docker
ARL-plus-docker
Free Reconnaissance

基于ARL-V2.6.2版本自研 ARL的安装这里就不多赘述了,可以看这里 https://github.com/ki9mu/ARL-plus-docker/blob/dev/ARL-README.md

arp-scan-rs
arp-scan-rs
Open Source

A minimalistic ARP scan tool written in Rust for fast local network scans

ARSCLib
ARSCLib
Open Source Reverse Engineering

Android binary resources read/write library

Arsenal
Arsenal
Free Reconnaissance Web Application

Arsenal is a Simple shell script (Bash) used to install tools and requirements for Bug Bounty

Arsenal
Arsenal
Open Source Exploitation

Red Team tools, infrastructure, and hardware weaponized

arsenal-ng
arsenal-ng
Open Source Exploitation

The classic launcher, evolved. Fast, Go-based command library equipped with 200+ cybersecurity cheat-sheets. Just install and start hacking.

Artemis
Artemis
Open Source Scanning & Enumeration

A modular vulnerability scanner with automatic report generation capabilities.

artemis
artemis
Open Source Forensics

A cross platform forensic parser written in Rust!

articles-translator
articles-translator
Open Source Web Application

:books:Translate the distinct technical blogs. Please star or watch. Welcome to join me.

articulos
articulos
Free Exploitation Social Engineering

Artículos relacionados a la Ciberseguridad y Hacking.

artifact-keeper
artifact-keeper
Open Source Scanning & Enumeration

Open-source universal artifact registry. Drop-in Artifactory/Nexus alternative with 40+ package formats, security scanning, WASM plugins, an…

artifactcollector
artifactcollector
Open Source Forensics

🧭 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system

as-ip-blocks
as-ip-blocks
Free Reconnaissance

Download IP block lists by ASN - network provider addresses, updated daily

as-metadata
as-metadata
Free Reconnaissance

Download autonomous system list organized by ASN

ashirt
ashirt
Open Source Exploitation

It records your screenshots and code, then lets you upload to ASHIRT

ashirt-server
ashirt-server
Open Source Exploitation

Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit

AskJOE
AskJOE
Open Source Forensics Reverse Engineering

AI-Powered Malware Analysis & Threat Intelligence for Ghidra Transform your static analysis workflow with cutting-edge AI capabilities, comp…

asm2hex
asm2hex
Open Source Reverse Engineering

ASM2HEX 是一款功能强大的汇编语言与十六进制机器码相互转换工具。它提供了一个直观的图形界面,让用户可以轻松地在汇编指令和对应的机器码之间进行转换。无论你是处理 ARM64、ARM 还是 Thumb 指令集,ASM2HEX 都能提供准确可靠的转换结果。ASM2HEX is a…

AsmArm64
AsmArm64
Open Source Reverse Engineering

The most powerful ARM 64 (v8, v9) Assembler / Disassembler for .NET

AsmResolver
AsmResolver
Open Source Forensics Reverse Engineering

A library for creating, reading and editing PE files and .NET modules.

asn
asn
Open Source Forensics Reconnaissance

ASN / RPKI validity / BGP stats / IPv4v6 / Prefix / URL / ASPath / Organization / IP reputation / IP geolocation / IP fingerprinting / Netwo…

asnmap
asnmap
Open Source Reconnaissance

Go CLI and Library for quickly mapping organization network ranges using ASN information.

AspGoat
AspGoat
Open Source Web Application

AspGoat is an intentionally vulnerable ASP.NET Core application for learning and practicing web application security.

assayo
assayo
Free Reconnaissance

Creates an HTML-report with analysis of commit statistics

assemblyline
assemblyline
Open Source Forensics

AssemblyLine 4: File triage and malware analysis

assemblyline-base
assemblyline-base
Open Source Forensics

Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)

AssetRipper
AssetRipper
Open Source Reverse Engineering

GUI Application to work with engine assets, asset bundles, and serialized files

assisted-log-enabler-for-aws
assisted-log-enabler-for-aws
Open Source Forensics

Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.

ASST
ASST
Open Source Scanning & Enumeration Web Application

OWASP ASST (Automated Software Security Toolkit) | A Novel Open Source Web Security Scanner.

Astra
Astra
Open Source Web Application

Automated Security Testing For REST API's

Astral-PE
Astral-PE
Open Source Evasion Forensics

Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)

async-rust-rat
async-rust-rat
Open Source Exploitation

[WIP] A Modern Rust Remote Administration Tool for Windows.

ataka
ataka
Open Source

1. Edit .env file to set: - DATA_STORE: Absolute path to a folder to store player exploit related files. - USERID: The user:group id tuple t…

athena
athena
Open Source

Athena OS is a Arch/Nix-based distro focused on Cybersecurity. Learn, practice and enjoy with any hacking tool!

athena-nix
athena-nix
Open Source

Athena OS Nix configuration files focused on Cybersecurity. Learn, practice and enjoy with any hacking tool!

atian-cod-tools
atian-cod-tools
Free Reverse Engineering

My set of tools. The code is more important than the features, so feel free to reuse it. 🙂

AtlasLdr
AtlasLdr
Open Source Exploitation

Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls

atlos
atlos
Open Source Reconnaissance

The collaborative workspace for visual verification

Atomic-Red-Team-C2
Atomic-Red-Team-C2
Free Exploitation Post-Exploitation

ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilitie…

atomicgen.io
atomicgen.io
Open Source Exploitation

A simple tool designed to create Atomic Red Team tests with ease.

ATSCAN
ATSCAN
Open Source Exploitation Web Application

Advanced dork Search & Mass Exploit Scanner

ATTACK-Tools
ATTACK-Tools
Free Exploitation

Utilities for working with the MITRE™ ATT&CK™ framework, including a relational data model and an adversary emulation planning tool.

AttackForge
AttackForge
Paid Reporting

Enterprise penetration testing management platform. Manages projects, schedules, findings, evidence, and generates branded reports. Includes…

attackmate
attackmate
Open Source Exploitation

AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.

AttackSurfaceAnalyzer
AttackSurfaceAnalyzer
Open Source

Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.

AttifyOS
AttifyOS
Free Exploitation

AttifyOS is a penetration testing distro for security professionals to assess the security of Internet of Things (IoT) devices. The latest v…

auditforge
auditforge
Open Source

AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.

audits
audits
Free Web Application

Audits performed by Solidified

augur
augur
Open Source Reverse Engineering

Reverse engineering assistant that extracts strings and related pseudocode from a binary file.

authfinder
authfinder
Open Source Exploitation Password Attacks

Execute commands across Windows and Linux systems using multiple RCE methods

authz0
authz0
Open Source

🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.

auto-cyberchef
auto-cyberchef
Open Source

Automatic encoding detection and decoding CLI tool for CTF and security analysis

Auto-doxxing-tool
Auto-doxxing-tool
Free Reconnaissance

this is an old joke

auto-pen-bench
auto-pen-bench
Open Source

This repo contains the codes of the penetration test benchmark for Generative Agents presented in the paper "AutoPenBench: Benchmarking Gene…

AutoAR
AutoAR
Free Scanning & Enumeration

AutoAR is an automated security reconnaissance tool, ASM and Discord bot for bug bounty hunters and penetration testers. It automates gather…

AutoAudit
AutoAudit
Open Source

AutoAudit—— the LLM for Cyber Security 网络安全大语言模型

automated-forensic-orchestrator-for-amazon-ec2
automated-forensic-orchestrator-for-amazon-ec2
Open Source Forensics

Automated Forensics Orchestrator for Amazon EC2 and EKS is a self-service AWS Guidance implementation that enterprise customers can deploy t…

automation-working-group
automation-working-group
Free Exploitation

The Automation Working Group seeks to leverage automation technologies to reduce the workload related to reporting and managing vulnerabilit…

autopentest
autopentest
Free

CLI enabling more autonomous black-box penetration tests using Large Language Models (LLMs)

AutoPentestX
AutoPentestX
Free

AutoPentestX – Automated Pentesting & Vulnerability Reporting Tool

AutoPiff
AutoPiff
Open Source Forensics Reverse Engineering

Semantic analysis engine for detecting vulnerability fixes in Windows kernel driver patches — 58 YAML rules, Ghidra decompilation, reachabil…

AutoProber
AutoProber
Free Reverse Engineering

Hardware hacker’s flying probe automation stack for agent-driven target discovery, microscope mapping, safety-monitored CNC motion, probe …

Autopsy
Autopsy
Open Source Forensics

Digital forensics platform and graphical interface to The Sleuth Kit. Features timeline analysis, keyword search, web artifact extraction, f…

autopsy
autopsy
Free Kali Forensics

Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law…

AutoPtT
AutoPtT
Free Exploitation Post-Exploitation

Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, Pyth…

AutoPWN-Suite
AutoPWN-Suite
Free Exploitation Scanning & Enumeration

AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.

AutoRedTeam-Orchestrator
AutoRedTeam-Orchestrator
Free Exploitation Post-Exploitation

Enterprise AI Red Team Platform | 企业级AI红队平台 | 132 MCP Tools | Pure Python Engines | SDK+CLI+MCP | Auto-Download sqlmap/nuclei/ffuf | Product…

AutorizePro
AutorizePro
Open Source

🧿 AutorizePro是一款强大越权检测 Burp 插件,通过增加 AI 辅助分析 && 进一步优化检测逻辑,大幅降低误报率,提升越权漏洞检出效率。 [ AutorizePro is a authorization enforcement detection exten…

autotimeliner
autotimeliner
Open Source Forensics

Automagically extract forensic timeline from volatile memory dump

av_detect
av_detect
Free Forensics

This program detects if any security software (AV, EDR, XDR, firewall, etc.) is running on the system. The program searches the list of runn…

avatar2
avatar2
Open Source Reverse Engineering

AVCDL
AVCDL
Free

This repository contains material related to A Versatile Cybersecurity Development Lifecycle (AVCDL)

AVEvasionCraftOnline
AVEvasionCraftOnline
Open Source Evasion Exploitation

An online AV evasion platform written in Springboot (Golang, Nim, C) supports embedded, local and remote loading of Shellocde methods.

AvillaForensics
AvillaForensics
Free Forensics

📱 Avilla Forensics: A Global Revolution in Mobile Forensics Avilla Forensics is much more than a simple data extraction tool – it represents…

avml
avml
Open Source Forensics

AVML - Acquire Volatile Memory for Linux

avred
avred
Open Source Evasion

Analyse your malware to surgically obfuscate it

AwaitFuscator
AwaitFuscator
Open Source Evasion

Transforms a .NET binary into a chain of meaningless-looking await expressions.

AWD-Guide
AWD-Guide
Open Source

这是一本能让你从零开始学习AWD并深入AWD的手册,我也会根据经验和需求逐步完善相关内容。如果你要参加AWD相关比赛,相信本项目能给你带来帮助~

awd-watchbird
awd-watchbird
Open Source

Watchbird A powerful PHP WAF for AWD …

Awesome
Awesome
Free Forensics Reverse Engineering

Awesome collection of resources 😎 Work in progress🔥

Awesome_CyberSec_Bible
Awesome_CyberSec_Bible
Free Forensics Social Engineering

Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Programmin…

Awesome_Free_Online_SOC_And_Pentest_Tools
Awesome_Free_Online_SOC_And_Pentest_Tools
Free Reconnaissance

A curated collection of free or freemium web-based penetration testing and vulnerability analysis tools. These tools assist security profess…

Awesome_Incident_Response
Awesome_Incident_Response
Free Forensics

Welcome to "Awesome Incident Response," the ultimate open-source repository designed to simplify and guide you through the intricate world …

awesome_osint_blockchain_analysis
awesome_osint_blockchain_analysis
Free Reconnaissance

A list of useful Crypto resources for OSINT investigations

awesome-ai-cybersecurity
awesome-ai-cybersecurity
Free

Welcome to the ultimate list of resources for AI in cybersecurity. This repository aims to provide an organized collection of high-quality r…

Awesome-AI-For-Security
Awesome-AI-For-Security
Free

A curated list of tools, papers, and datasets for applying AI to cybersecurity tasks. This list primarily focuses on modern AI technologies …

Awesome-AI-OSINT
Awesome-AI-OSINT
Free Reconnaissance

A list of articles, videos, and tools related to the use of AI for OSINT.

awesome-ai-reverse
awesome-ai-reverse
Free Reverse Engineering

ai reverse 一把梭

Awesome-Android-Reverse-Engineering
Awesome-Android-Reverse-Engineering
Open Source Forensics Reverse Engineering

A curated list of awesome Android Reverse Engineering training, resources, and tools.

Awesome-Asset-Discovery
Awesome-Asset-Discovery
Free Reconnaissance

List of Awesome Asset Discovery Resources

awesome-audit-algorithms
awesome-audit-algorithms
Free Reverse Engineering

A curated list of algorithms and papers for auditing black-box algorithms.

awesome-aws-security
awesome-aws-security
Open Source

Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS Se…

awesome-blackhat-arsenal
awesome-blackhat-arsenal
Free Forensics Reconnaissance

Curated collection of cybersecurity tools featured in Black Hat Arsenal events.

Awesome-Blackhat-Tools
Awesome-Blackhat-Tools
Free Forensics Reconnaissance

A curated list of tools officially presented at Black Hat events

awesome-bluetooth-security
awesome-bluetooth-security
Free Wireless

List of Bluetooth BR/EDR/LE security resources

Awesome-Bootkits-Rootkits-Development
Awesome-Bootkits-Rootkits-Development
Open Source Reverse Engineering

A curated compilation of extensive resources dedicated to bootkit and rootkit development.

Awesome-Browser-Extensions-for-OSINT
Awesome-Browser-Extensions-for-OSINT
Open Source Reconnaissance

A collection of awesome browser extension useful for OSINT along with their use case.

Awesome-Bug-Bounty
Awesome-Bug-Bounty
Free Web Application

This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer while h…

awesome-bugbounty-tools
awesome-bugbounty-tools
Free Web Application

A curated list of various bug bounty tools

awesome-censys-queries
awesome-censys-queries
Free Reconnaissance

A collection of fascinating and bizarre Censys Search Queries

awesome-cicd-attacks
awesome-cicd-attacks
Free

Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.

awesome-claude-skills-security
awesome-claude-skills-security
Free

Security testing toolkit for Claude Code: curated SecLists wordlists, injection payloads, and expert agents for authorized pentesting, CTFs,…

Awesome-CloudOps-Automation
Awesome-CloudOps-Automation
Open Source Forensics

Cloud-ops automation runbooks that are ready to use. Build your own automations using the hundreds of drag and drop actions included in the …

awesome-containerized-security
awesome-containerized-security
Free

A collection of tools to improve your containerized apps security posture

awesome-csirt
awesome-csirt
Open Source Exploitation Forensics

Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.

awesome-ctf
awesome-ctf
Free

A curated list of CTF frameworks, libraries, resources and softwares

awesome-ctf-cheatsheet
awesome-ctf-cheatsheet
Open Source

awesome-ctf-resources
awesome-ctf-resources
Open Source Exploitation

A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩

awesome-cyber
awesome-cyber
Free Exploitation Forensics

A curated list of tools useful within the field of cyber security, for both blue and red team operations.

awesome-cybersec
awesome-cybersec
Free Web Application

A collection of awesome platforms, blogs, documents, books, resources and cool stuff about security

Awesome-Cybersecurity-Handbooks
Awesome-Cybersecurity-Handbooks
Open Source

A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.

awesome-dotnet-security
awesome-dotnet-security
Free Reverse Engineering

Awesome .NET Security Resources

awesome-dutch-osint
awesome-dutch-osint
Free Reconnaissance

The best of Dutch OSINT Sources

awesome-edr-bypass
awesome-edr-bypass
Free Evasion Exploitation

Awesome EDR Bypass Resources For Ethical Hacking

awesome-ethical-hacking-resources
awesome-ethical-hacking-resources
Open Source Web Application

😎 🔗 Awesome list about all kinds of resources for learning Ethical Hacking and Penetration Testing.

awesome-event-ids
awesome-event-ids
Open Source Forensics

Collection of Event ID ressources useful for Digital Forensics and Incident Response

awesome-executable-packing
awesome-executable-packing
Free Forensics Reverse Engineering

A curated list of awesome resources related to executable packing

awesome-flipperzero-withModules
awesome-flipperzero-withModules
Free

A collection of awesome resources & modules for the Flipper Zero device. Best used with Rogue Master Flipper Zero Custom Firmware.

Awesome-FOFA
Awesome-FOFA
Free Reconnaissance

The FOFA Library collects usage tips, common scenarios, F&Q, and more for FOFA.

awesome-forensics
awesome-forensics
Free Forensics

⭐️ A curated list of awesome forensic analysis tools and resources

awesome-gdpr
awesome-gdpr
Free

Protection of natural persons with regard to the processing of personal data and on the free movement of such data.

awesome-golang-security
awesome-golang-security
Free Reverse Engineering

Awesome Golang Security resources 🕶🔐

awesome-hackathons
awesome-hackathons
Open Source

😎 Awesome lists about Hackathons around the globe! ✨🎉

awesome-hacker-search-engines
awesome-hacker-search-engines
Open Source Exploitation Reconnaissance

A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty …

Awesome-Hacking
Awesome-Hacking
Free Reverse Engineering Scanning & Enumeration

A collection of various awesome lists for hackers, pentesters and security researchers

awesome-hacking
awesome-hacking
Free Forensics

Awesome hacking is an awesome collection of hacking tools.

awesome-hacking-lists
awesome-hacking-lists
Free Web Application

A curated collection of top-tier penetration testing tools and productivity utilities across multiple domains. Join us to explore, contribut…

awesome-incident-response
awesome-incident-response
Open Source Forensics

A curated list of tools for incident response

Awesome-Info-Inferring-Binary
Awesome-Info-Inferring-Binary
Free Reverse Engineering

A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.

awesome-infosec
awesome-infosec
Free

A curated list of awesome infosec courses and training resources.

awesome-iot-security-resource
awesome-iot-security-resource
Free Exploitation

A filesystem cartography and correlation software focusing on visualization. * rbasefind

awesome-list
awesome-list
Free Exploitation Reverse Engineering

Cybersecurity oriented awesome list

awesome-lists
awesome-lists
Open Source Exploitation Forensics

Awesome Security lists for SOC/CERT/CTI

Awesome-LLM-Red-Teaming
Awesome-LLM-Red-Teaming
Open Source Reverse Engineering

A curated list of awesome LLM Red Teaming training, resources, and tools.

Awesome-LLM4Security
Awesome-LLM4Security
Open Source

This project aims to consolidate and share high-quality resources and tools across the cybersecurity domain.

awesome-llvm-security
awesome-llvm-security
Open Source Reverse Engineering

awesome llvm security [Welcome to PR]

awesome-malware-analysis
awesome-malware-analysis
Free Forensics Reverse Engineering

A curated list of awesome malware analysis tools and resources. Inspired by awesome-python and awesome-php.

awesome-malware-persistence
awesome-malware-persistence
Free Forensics Post-Exploitation

A curated list of awesome malware persistence tools and resources.

awesome-mcp-security
awesome-mcp-security
Free Exploitation

🔥🔒 Awesome MCP (Model Context Protocol) Security 🖥️

awesome-memory-forensics
awesome-memory-forensics
Free Forensics

A curated list of awesome Memory Forensics for DFIR

awesome-MLSecOps
awesome-MLSecOps
Open Source Exploitation

A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems.

awesome-nodejs-security
awesome-nodejs-security
Free Web Application

Awesome Node.js Security resources

awesome-ocap
awesome-ocap
Free Web Application

Awesome Object Capabilities and Capability Security

awesome-oneliner-bugbounty
awesome-oneliner-bugbounty
Open Source Reconnaissance Web Application

A collection of awesome one-liner scripts especially for bug bounty tips.

awesome-oscp
awesome-oscp
Free

A curated list of awesome OSCP resources

awesome-osint
awesome-osint
Free Reconnaissance

:scream: A curated list of amazingly awesome OSINT

awesome-osint-arsenal
awesome-osint-arsenal
Open Source Kali Reconnaissance

🔍 Curated OSINT & recon toolkit for Kali Linux — 100+ tools, one-command installer, covering SOCMINT, GEOINT, network recon, dark web, foren…

Awesome-OSINT-For-Everything
Awesome-OSINT-For-Everything
Open Source Exploitation Reconnaissance

OSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.

awesome-osint-mcp-servers
awesome-osint-mcp-servers
Open Source Reconnaissance

A curated list of OSINT MCP servers. Pull requests are welcomed!

awesome-password-cracking
awesome-password-cracking
Free Password Attacks

A curated list of awesome tools, research, papers and other projects related to password cracking and password security.

awesome-pentest-cheat-sheets
awesome-pentest-cheat-sheets
Free

Collection of cheat sheets useful for pentesting

awesome-pentest-checklist
awesome-pentest-checklist
Free

A comprehensive, step-by-step penetration testing checklist for ethical hackers. Covers pre-engagement, information gathering, analysis, exp…

awesome-privilege-escalation
awesome-privilege-escalation
Free Post-Exploitation

A curated list of awesome privilege escalation

awesome-projects
awesome-projects
Open Source

A curated list of amazingly projects

awesome-recon-tools
awesome-recon-tools
Free Exploitation Reconnaissance

A compiled list of tools for reconnaissance and footprinting

Awesome-Redteam
Awesome-Redteam
Free Exploitation Post-Exploitation

一个攻防知识库。A knowledge base for red teaming and offensive security.

Awesome-Reversing
Awesome-Reversing
Free Reverse Engineering

A curated list of awesome reverse engineering resources for various topics

awesome-rtc-hacking
awesome-rtc-hacking
Free Scanning & Enumeration Web Application

a list of awesome resources related to security and hacking of VoIP, WebRTC and VoLTE

awesome-search-queries
awesome-search-queries
Open Source Reconnaissance

Community curated list of search queries for various products across multiple search engines.

awesome-security-card-games
awesome-security-card-games
Free Forensics

A curated list of security card games.

awesome-security-hardening
awesome-security-hardening
Free

A collection of awesome security hardening guides, tools and other resources

awesome-shodan-queries
awesome-shodan-queries
Free Reconnaissance

🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩‍💻

awesome-soc
awesome-soc
Free Forensics

A curated knowledge base to build, run and mature a SOC (including CSIRT).

awesome-spicedb
awesome-spicedb
Open Source

An awesome list for the SpiceDB ecosystem 😎

Awesome-SRC-experience
Awesome-SRC-experience
Open Source Exploitation Web Application

awesome-sre
awesome-sre
Free Forensics

A curated list of Site Reliability and Production Engineering resources.

Awesome-Telegram-OSINT
Awesome-Telegram-OSINT
Free Reconnaissance

📚 A Curated List of Awesome Telegram OSINT Tools, Sites & Resources

awesome-testing-tools
awesome-testing-tools
Free

🚀 A curated list of awesome testing tools 🚀

awesome-threat-detection
awesome-threat-detection
Free Forensics

✨ A curated list of awesome threat detection and hunting resources 🕵️‍♂️

awesome-uefi-security
awesome-uefi-security
Free Exploitation

👓A collection of papers/tools/exploits for UEFI security.

awesome-vm-escape
awesome-vm-escape
Open Source Exploitation

share some useful archives about vm and qemu escape exploit.

awesome-vulnerable
awesome-vulnerable
Open Source

A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.

awesome-vulnerable-apps
awesome-vulnerable-apps
Free

Awesome Vulnerable Applications

awesome-wazuh
awesome-wazuh
Free

🛡️Awesome lists about all kinds of interesting topics of Wazuh XDR/SIEM

awesome-web-hacking
awesome-web-hacking
Open Source Exploitation Web Application

A list of web application security

awesome-web-security
awesome-web-security
Free

🐶 A curated list of Web Security materials and resources.

awesome-wordlists
awesome-wordlists
Free Password Attacks

A curated list of wordlists for bruteforcing and fuzzing

awesome-yara
awesome-yara
Free Forensics

A curated list of awesome YARA rules, tools, and people.

AwesomeXSS
AwesomeXSS
Open Source Web Application

This repository is a collection of Awesome XSS resources. Contributions are welcome and should be submitted via an issue.

aws-customer-playbook-framework
aws-customer-playbook-framework
Free Forensics

This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.

aws-pentesting-lab
aws-pentesting-lab
Open Source Kali

Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet

aws-rotate-key
aws-rotate-key
Open Source

Easily rotate your AWS access key. :key:

aws-sso-cli
aws-sso-cli
Open Source

A powerful tool for using AWS Identity Center for the CLI and web console.

awsome_kali_MCPServers
awsome_kali_MCPServers
Open Source Kali

awsome kali MCPServers is a set of MCP servers tailored for Kali Linux

AWUS036ACH-Automated-Driver-Install
AWUS036ACH-Automated-Driver-Install
Free Kali Wireless

Bash Script to automate install of AWUS036ACH Wireless Alfa drivers instead of manually running every command. Works on Kali Linux/Debian Sy…

axiom
axiom
Open Source Scanning & Enumeration Web Application

The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf…

axmlprinter
axmlprinter
Open Source Reverse Engineering

Library for parsing and printing compiled Android manifest files

azazel
azazel
Open Source Forensics

eBPF-powered silent observer for containerized runtimes, built for malware analysis sandboxes and Agentic AI monitoring.

azul
azul
Open Source Forensics

Azul is a malware repository for reverse engineers, incident responders and everyone in-between.

Azure-AD-Password-Checker
Azure-AD-Password-Checker
Free Exploitation Post-Exploitation

In an Azure AD environment, it's possible to determine whether a user has Multi-Factor Authentication (MFA) disabled without requiring any s…

AzureAttackKit
AzureAttackKit
Free Exploitation

Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information

B2R2
B2R2
Open Source Reverse Engineering

B2R2 is a collection of useful algorithms, functions, and tools for binary analysis.

B4Bomber
B4Bomber
Open Source

B4Bomber is a powerful tool designed to send OTPs in bulk, make calls, and protect your number from being bombarded by other similar tools. …

BabelStrike
BabelStrike
Free

The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written in …

babeltrace
babeltrace
Free

Babeltrace /ˈbæbəltreɪs/ is an open-source trace manipulation toolkit.

backup-gen
backup-gen
Free Password Attacks

Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup file …

bad-opsec
bad-opsec
Free Reconnaissance

Collection of links on bad opsec

badjpg
badjpg
Free Kali

This Python script allows you to hide a payload within a JPG image using steganography techniques. It uses the stegano library to encode and…

badPods
badPods
Open Source Exploitation

A collection of manifests that will create pods with elevated privileges.

Baileys
Baileys
Open Source Reverse Engineering

Socket-based TS/JavaScript API for WhatsApp Web

BAM
BAM
Free Reverse Engineering

The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber

bandit
bandit
Open Source

Bandit is a tool designed to find common security issues in Python code.

bane
bane
Open Source Exploitation

The "bane" Python library stands out as a robust toolkit catering to a wide spectrum of cybersecurity and networking tasks. Its versatile ra…

banjo
banjo
Open Source Reverse Engineering

Android Dex disassembler and Binary Ninja plugin

bap
bap
Open Source Reverse Engineering

The Carnegie Mellon University Binary Analysis Platform (CMU BAP) is a suite of utilities and libraries that enables analysis of binary prog…

barectf
barectf
Open Source

Generator of ANSI C tracers which output CTF data streams

bashacks
bashacks
Open Source Forensics

A set of functions to increase productivity while hacking with Bash

Bashark
Bashark
Open Source Post-Exploitation

Bash post exploitation toolkit

bashbunny-payloads
bashbunny-payloads
Free

The Official Bash Bunny Payload Repository

bat-security-toolkit
bat-security-toolkit
Free Reconnaissance

Automated Network Reconnaissance and OSINT framework. Streamlines IP tracking, geolocation, and digital footprint analysis in a modular Pyth…

batch_wifi_brute_forcer
batch_wifi_brute_forcer
Open Source Password Attacks Wireless

An active attack tool against Wi-Fi networks with internal CMD commands

BatchObfuscator
BatchObfuscator
Open Source Evasion

BatchObfuscator is a tool designed to assist software developers in making their Windows batch scripts difficult to modify and understand. B…

BatchToApp
BatchToApp
Open Source Evasion

Convert your .bat/.cmd scripts to .exe and protect (obfuscate) them with BatchToApp!

bazaar
bazaar
Open Source Forensics Reverse Engineering

NO LONGER MAINTAINED - Android security & privacy analysis for the masses. 2026 Update incoming WIP

BB-legal-FR
BB-legal-FR
Open Source Web Application

Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France

bbot
bbot
Open Source Reconnaissance

The recursive internet scanner for hackers. 🧡

bbot-vivagraphjs
bbot-vivagraphjs
Free Reconnaissance

Visualize BBOT scans in realtime with VivaGraphJS

BCHackTool
BCHackTool
Free Exploitation Reconnaissance

🔥 Professional Penetration Testing Framework v4.0 - Automated subdomain enumeration, vulnerability scanning with Nuclei, port scanning, and …

bddisasm
bddisasm
Open Source Evasion Reverse Engineering

bddisasm is a fast, lightweight, x86/x64 instruction decoder. The project also features a fast, basic, x86/x64 instruction emulator, design…

BeaconatorC2
BeaconatorC2
Open Source Evasion Post-Exploitation

BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catalog …

bearer
bearer
Free Exploitation Reverse Engineering

Code security scanning tool (SAST) to discover, filter and prioritize security and privacy risks.

beast
beast
Open Source

Jeopardy-style CTF challenge deployment and management tool.

BeEF
BeEF
Open Source Kali Exploitation Social Engineering

Browser Exploitation Framework. Hooks web browsers via JavaScript and provides extensive command modules for session hijacking, social engin…

BeeF-Over-Wan
BeeF-Over-Wan
Open Source Exploitation

Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script d…

BeReal
BeReal
Open Source Reverse Engineering

How does BeReal work (Under the hood)

Berserker
Berserker
Free Exploitation Scanning & Enumeration

A list of useful payloads for Web Application Security and Pentest/CTF

BerylEnigma
BerylEnigma
Open Source Exploitation

ffffffff0x team toolset for penetration testing, cryptography research, CTF and daily use. | ffffffff0x 团队工具集,用来进行渗透测试,密码学研究,CTF和日常使用。

best-wifi-jammer-2026
best-wifi-jammer-2026
Free Wireless

WiFi jammer for Windows 2026 from GitHub. Deauth attack tool with network scanner & monitor mode. Stand-alone app for security testing.

better-npm-audit
better-npm-audit
Open Source Exploitation

The goal of this project is to provide additional features on top of the existing npm audit options

BetterBackdoor
BetterBackdoor
Open Source

A backdoor with a multitude of features.

Bettercap
Bettercap
Open Source Kali Exploitation Wireless

Swiss army knife for network attacks and monitoring. Supports ARP spoofing, DNS spoofing, SSL stripping, WiFi attacks, Bluetooth LE, BLE sca…

bettercap
bettercap
Free Kali Exploitation Wireless

The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.

beyond-xss
beyond-xss
Free Web Application

Beyond XSS: Explore the Web Front-end Security Universe. A series about front-end security

bgiparser
bgiparser
Open Source Forensics

A parsing tool for backgrounditems.btm

bigger-than-bigger
bigger-than-bigger
Free

Expolit Lists. 相关集合💥💥💥 ;) 用友NC反序列化/ CTF/ Java Deserialization/Shiro Vulns/ CNVD or CVE Vulns/ Log4j2/ Hikvision-decrypter...✨✨✨

BiliBiliMApp
BiliBiliMApp
Open Source Reverse Engineering

一个通过 iOS 逆向分析实现的 无广告版哔哩哔哩 客户端,感谢使用,欢迎Star。

bin-graph
bin-graph
Open Source Reverse Engineering

#+title: Binary graph #+options: toc:nil #+startup: showeverything #+author: 8dcc

bin2ml
bin2ml
Open Source Reverse Engineering

A command line tool for extracting machine learning ready data from software binaries powered by Radare2

BinAbsInspector
BinAbsInspector
Open Source Reverse Engineering Scanning & Enumeration

BinAbsInspector: Vulnerability Scanner for Binaries

Binary Ninja
Binary Ninja
Paid Reverse Engineering

Commercial reverse engineering platform with an excellent intermediate language (BNIL), Python/C++ API, and collaborative analysis features.…

binary-tools
binary-tools
Open Source Forensics

Collection of Statically linked binaries for Linux. Suited for Forensics

BinaryAudit
BinaryAudit
Free Reverse Engineering

An open-source benchmark for evaluating AI agents' ability to find backdoors hidden in compiled binaries.

binaryninja-api
binaryninja-api
Open Source Reverse Engineering

Public API, examples, documentation and issues for Binary Ninja

BinaryObjectScanner
BinaryObjectScanner
Open Source Reconnaissance

C# protection, packer, and archive scanning library

binbloom
binbloom
Open Source Reverse Engineering

Raw binary firmware analysis software

bincat
bincat
Free Reverse Engineering

Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free de…

bindata
bindata
Open Source Reverse Engineering

BinData - Reading and Writing Binary Data in Ruby

binder-trace
binder-trace
Open Source Reverse Engineering

Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as "Wireshark for Binder".

bindiff
bindiff
Open Source Reverse Engineering

Quickly find differences and similarities in disassembled code

BinDiffHelper
BinDiffHelper
Free Reverse Engineering

Ghidra Extension to integrate BinDiff for function matching

binexport
binexport
Open Source Reverse Engineering

Export disassemblies into Protocol Buffers

binja-headless
binja-headless
Open Source Reverse Engineering

_Note_: A Snippet version can be copy/pasted from here

binlex
binlex
Open Source Forensics Reverse Engineering

A Binary Genetic Traits Lexer Framework

binocle
binocle
Open Source Reverse Engineering

a graphical tool to visualize binary data

binsider
binsider
Open Source Reverse Engineering

Analyze ELF binaries like a boss 😼🕵️‍♂️

binsync
binsync
Open Source Reverse Engineering

A reversing plugin for cross-decompiler collaboration, built on git.

Binwalk
Binwalk
Open Source Kali Forensics Reverse Engineering

Firmware analysis tool for searching, extracting, and analyzing binary images. Identifies embedded files and code (file signatures, magic by…

biodiff
biodiff
Open Source Reverse Engineering

Hex diff viewer using alignment algorithms from biology

birdcage
birdcage
Open Source

Cross-platform embeddable sandboxing

bitdefender-total-security-ultimate-protection
bitdefender-total-security-ultimate-protection
Free Scanning & Enumeration

Get Bitdefender Total Security Ultimate on GitHub: a complete, high-performance toolkit for seamless malware defense and professional protec…

BitMono
BitMono
Open Source Evasion Reverse Engineering

Obfuscator for .NET and Mono, with a customizable engine for building your own obfuscators.

bitp0wn
bitp0wn
Free Exploitation Password Attacks

Algorithms to re-compute a private key, to fake signatures and some other funny things with Bitcoin.

bits_parser
bits_parser
Open Source Forensics

Extract BITS jobs from QMGR queue and store them as CSV records

Black-Hat-Bash
Black-Hat-Bash
Open Source

The Black Hat Bash book repository

black-hat-cpp
black-hat-cpp
Free Exploitation

C++ Programming for Hackers

Black-Hat-GraphQL
Black-Hat-GraphQL
Free Web Application

The Black Hat GraphQL Book Repository

Black-Hat-Python
Black-Hat-Python
Open Source Kali

A collection of advanced Python scripts for cybersecurity, penetration testing, and ethical hacking.

black-hat-python3-code
black-hat-python3-code
Free

🏴‍☠️ tools (py3 version) of Black Hat Python book 🏴‍☠️

black-hat-rust
black-hat-rust
Open Source Exploitation Post-Exploitation

Applied offensive security with Rust - https://kerkour.com/black-hat-rust

Black-Tool
Black-Tool
Open Source Kali

Install the tools and start Attacking , black-tool v5.5.5 ! ⬛

black-widow
black-widow
Open Source Exploitation

GUI based offensive penetration testing tool (Open Source)

blackarch
blackarch
Open Source Exploitation

An ArchLinux based distribution for penetration testers and security researchers.

blackbird
blackbird
Free Reconnaissance

An OSINT tool to search for accounts by username and email in social networks.

blackdagger
blackdagger
Open Source

Blackdagger is a DAG-based automation tool specifically used in DevOps, DevSecOps, MLOps, MLSecOps, and Continuous Red Teaming (CART).

blackeye
blackeye
Open Source Social Engineering

BLACKEYE v2.0 | New Phishing tool with localtunnel (Discount)

blackeye
blackeye
Open Source Social Engineering

The ultimate phi8hi5g tool with 41 websites available!

BlackFriday-GPTs-Prompts
BlackFriday-GPTs-Prompts
Open Source Exploitation

List of free GPTs that doesn't require plus subscription

blackhat_python_book_code
blackhat_python_book_code
Open Source

Source code and exercises from the book "Black Hat Python" by Justin Seitz.

blackhat-python3
blackhat-python3
Free

Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 …

blacklists
blacklists
Open Source

Daily updated domains blacklist 🚫

BlackManPhishing
BlackManPhishing
Free Kali Social Engineering

1. google new login page 2. Netflix 3. Linkdin 4. Facebook New Login Page 5. Instagram 6. Apple ID 7. Spotify 8. Bitcoin 9. Paypal 10. Amazo…

BlackObfuscator
BlackObfuscator
Open Source Evasion

Black Obfuscator is an obfuscator for Android APK DexFile, it can help developer to protect source code by control flow flattening, and make…

BlackWidow
BlackWidow
Free Exploitation Reconnaissance

A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.

Blauhaunt
Blauhaunt
Open Source Forensics

A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you come f…

blaze-platform
blaze-platform
Free Reverse Engineering

A framework for program analysis with a focus on modeling programmer assumptions, context- and path-sensitive analyses, and type checking.

blazing_asm
blazing_asm
Open Source Reverse Engineering

Simple, fast and lightweight Header-Only C++ Assembler Library

BLEShark
BLEShark
Free Wireless

An ESP-32 based multi-tool for pentesting.

Blitzping
Blitzping
Open Source

A very high-speed, configurable, and portable packet-crafting utility optimized for embedded devices

blocklist-ipsets
blocklist-ipsets
Free Post-Exploitation

ipsets dynamically updated with firehol's update-ipsets.sh script

BloodHound
BloodHound
Open Source Kali Exploitation Reconnaissance

Uses graph theory to reveal hidden and often unintended relationships within Active Directory environments. Attackers use it to find attack …

BLT
BLT
Open Source Web Application

A community-driven OWASP Foundation project building open-source tools for vulnerability reporting, bug tracking, security automation & cont…

blue_hydra
blue_hydra
Free Wireless

BlueHydra is a Bluetooth device discovery service built on top of the bluez library. BlueHydra makes use of ubertooth where available and at…

bluebox
bluebox
Open Source Exploitation

A collection of exploits for different VoIP products.

bluebox
bluebox
Open Source Reverse Engineering

Index the world's undocumented APIs

bluefluff
bluefluff
Open Source Reverse Engineering

Reverse Engineering Furby Connect's Bluetooth Protocol and Update Format

bluemonday
bluemonday
Open Source Web Application

bluemonday: a fast golang HTML sanitizer (inspired by the OWASP Java HTML Sanitizer) to scrub user generated content of XSS

BLUESPAWN
BLUESPAWN
Open Source

An Active Defense and EDR software to empower Blue Teams

bluesploit
bluesploit
Free Exploitation Wireless

Another Bluetooth Exploit Framework

BlueStorm
BlueStorm
Open Source Kali

A tool which perform deauthentication attack on unpaired bluetooth devices.

BlueTeam
BlueTeam
Free Forensics

This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, log,…

BlueTeam-Tools
BlueTeam-Tools
Free Forensics

Tools and Techniques for Blue Team / Incident Response

BlueTeam.Lab
BlueTeam.Lab
Free Exploitation

Blue Team detection lab created with Terraform and Ansible in Azure.

BlueToolkit
BlueToolkit
Free Exploitation Wireless

BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooth-e…

bn
bn
Free Reverse Engineering

binary ninja cli for coding agents

BOAZ_beta
BOAZ_beta
Open Source Evasion

Multilayered AV/EDR Evasion Framework (no longer actively maintained)

Bobber
Bobber
Open Source Social Engineering

Bounces when a fish bites - Evilginx database monitoring with exfiltration automation

bof-launcher
bof-launcher
Free Exploitation Post-Exploitation

bof-launcher - a library for loading, executing and in-memory masking BOFs on Windows (x64, x86) and Linux (x64, x86, aarch64, arm). Ready t…

BOF-PE
BOF-PE
Open Source Exploitation

An example reference design for a proposed BOF PE

Bolt-Unblocker
Bolt-Unblocker
Open Source Exploitation

Bolt is one of the fastest and most feature-packed web proxies ever!

bomber
bomber
Open Source

Scans Software Bill of Materials (SBOMs) for security vulnerabilities

BomberCat
BomberCat
Open Source Wireless

BomberCat is the latest security tool that combines the most common card technologies: NFC technology (Near Field Communication) and magneti…

bomctl
bomctl
Open Source

boobsnail
boobsnail
Open Source Evasion Exploitation

BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.

book
book
Free Exploitation Reverse Engineering

This is a book about Rizin reverse engineering framework and it's originally based on the radare2 book

Bookmarklets
Bookmarklets
Free Reconnaissance

A small collection of bookmarklets that are useful for OSINT, including ones for e-mail addresses, Facebook, extracting links and WhatsMyNam…

boot-nethunter
boot-nethunter
Open Source Kali

It is an executable that boots Kali-Chroot (one Installed with Nethunter apk) in Termux.

bootcode_parser
bootcode_parser
Open Source Forensics

A boot record parser that identifies known good signatures for MBR, VBR and IPL.

bopscrk
bopscrk
Open Source Password Attacks

Generate smart and powerful wordlists

Bot-Bounty
Bot-Bounty
Free Web Application

Python Script for Telegram Bot is specially built for pentest & bug bounty. It's like a telegram shell.

BotnetC2
BotnetC2
Free Post-Exploitation

THANKS YOU FOR CODE | credit NixWasHere/NixC2

BotPEASS
BotPEASS
Open Source Exploitation

Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack and/or Telegram.

botw
botw
Free Reverse Engineering

Decompilation of The Legend of Zelda: Breath of the Wild (Switch 1.5.0)

BounceBack
BounceBack
Open Source Exploitation Post-Exploitation

↕️🤫 Stealth redirector for your red team operation security

Bozar
Bozar
Open Source Evasion

Java bytecode obfuscator with GUI

brainstorm
brainstorm
Free Scanning & Enumeration

A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery

brakeman
brakeman
Free Reverse Engineering

A static analysis security vulnerability scanner for Ruby on Rails applications

brash
brash
Open Source Exploitation

Chromium Browser DoS Attack via document.title Exploitation

bread
bread
Open Source Reverse Engineering

🍞 BREAD: BIOS Reverse Engineering & Advanced Debugger

breaking-telegram
breaking-telegram
Open Source Exploitation

Simple PoC script that allows you to exploit telegram's "send with timer" feature by saving any media sent with this functionality.

Bridge
Bridge
Free

无回显漏洞测试辅助平台,平台使用Java编写,提供DNSLOG,HTTPLOG等功能,辅助渗透测试过程中无回显漏洞及SSRF等漏洞的验证和利用。

BRON
BRON
Open Source Exploitation

"Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyber …

Browser-Data-Grabber
Browser-Data-Grabber
Free Exploitation

Stealer for Windows 10/11 for Chrome, Edge, Firefox, Brave with Wallet, Discord, Telegram and many more functions. Passwords, cookies, autof…

browser-identity-attacks-matrix
browser-identity-attacks-matrix
Free Web Application

Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threats …

BrowserBruter
BrowserBruter
Free

BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python-ba…

BrowserSnatch
BrowserSnatch
Open Source Exploitation

BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testing.

brutas
brutas
Free Exploitation Password Attacks

Wordlists handcrafted (and automated) with ♥

brute-eagle
brute-eagle
Free Password Attacks

A multi-purpose tool to hack instagram with many options.

bruteforce-crc
bruteforce-crc
Open Source Password Attacks

These files are part of a CRC parameter brute-forcing tool. Please have a look at http://sitsec.net/blog/2012/02/10/brute-forcing-crc-parame…

bruteforce-database
bruteforce-database
Open Source Password Attacks

A collection of wordlists for security testing, penetration testing, and password analysis.

bruteforce-lists
bruteforce-lists
Open Source Password Attacks

Some files for bruteforcing certain things.

Brutegram
Brutegram
Open Source Kali Password Attacks

Instagram multi-bruteforce Platfrom

bruter
bruter
Open Source Password Attacks Reconnaissance

Bruter is an OSINT tooling, an experiment to build a reconnaissance simple app to have fun 🕵️‍♂️

brutespray
brutespray
Open Source Exploitation Password Attacks

Fast, multi-protocol credential brute-forcer. Parses Nmap, Nessus, and Nexpose output to automatically test default and custom credentials a…

BruteX
BruteX
Free Password Attacks

Automatically brute force all services running on a target.

brutus
brutus
Open Source Exploitation Password Attacks

Fast, zero-dependency credential testing tool in Go. Brute force SSH, MySQL, PostgreSQL, Redis, MongoDB, SMB, and 20+ protocols. Hydra alter…

brutus
brutus
Open Source Password Attacks

Modeling stellar photometry with "brute force" methods

BSCP
BSCP
Free Web Application

Cheatsheet, Notes, Payloads and Mayhem for Burp Suite Practitioner Exam (BSCP)

BTC-Wallet-Recover
BTC-Wallet-Recover
Free Password Attacks

This Python script is created to recover Bitcoin wallet addresses from mnemonic phrases and check their balances.

BTC32
BTC32
Open Source Password Attacks

32 BTC Puzzle | BTC BruteForce Contest

btl1-field-notes
btl1-field-notes
Open Source Forensics

Field reference for BTL1 and Tier 1 SOC work — grep-ready cheatsheets, SPL queries, Volatility workflows, live response commands

BTLE
BTLE
Open Source Wireless

Bluetooth Low Energy (BLE) packet sniffer and transmitter for both standard and non standard (raw bit) based on Software Defined Radio (SDR)…

BudsPro-Headtracking
BudsPro-Headtracking
Open Source Reverse Engineering Wireless

Stream head-tracking data from the Samsung Galaxy Buds Pro in real-time

bug_bounty_checklist
bug_bounty_checklist
Free

My Notes & Resources Of Bug Bounty Checklists

Bug_Bounty_Tools_and_Methodology
Bug_Bounty_Tools_and_Methodology
Open Source Reconnaissance Web Application

Bug Bounty Tools used on Twitch - Recon

Bug-Bounty
Bug-Bounty
Free Web Application

Bug Bounty ~ Awesomes | Books | Cheatsheets | Checklists | Tools | Wordlists | More

bug-bounty
bug-bounty
Free

My personal bug bounty toolkit.

Bug-Bounty-Beginner-Roadmap
Bug-Bounty-Beginner-Roadmap
Free Exploitation Reconnaissance

This repository is a curated resource for aspiring bug hunters, offering hands-on labs, tools, and structured guidance to support your learn…

bug-bounty-writeup
bug-bounty-writeup
Free Exploitation Web Application

This repo contains different variants of Bug Bounty & Security & Pentest & Tech related Articles

Bug-bounty-Writeups
Bug-bounty-Writeups
Free Scanning & Enumeration

Repository of Bug-Bounty Writeups

Bug-Hunting-Arsenal
Bug-Hunting-Arsenal
Free Reconnaissance

The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down here 👇…

BugBounty-Recon-Methodology
BugBounty-Recon-Methodology
Free

Identify the organization's global footprint, network boundaries, and historical data.

BugBountyScanner
BugBountyScanner
Open Source Reconnaissance

A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.

BugScanX
BugScanX
Open Source Reconnaissance

BugScanX All-in-One Tool for Finding SNI Bug Hosts …

building-c2-implants-in-cpp
building-c2-implants-in-cpp
Open Source Exploitation

The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).

Buildware-Tools
Buildware-Tools
Free Reconnaissance Scanning & Enumeration

Buildware-Tools is an all-in-one multitool for security research and automation.

Bulk Extractor
Bulk Extractor
Open Source Kali Forensics

Scans a disk image, file, or directory and extracts features such as email addresses, URLs, credit card numbers, phone numbers, and other fo…

bulwark
bulwark
Open Source Exploitation

An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.

bun-demincer
bun-demincer
Free Reverse Engineering

Decompiler, deminifier and deobfuscator for Bun-compiled standalone JavaScript binaries

bundler-audit
bundler-audit
Open Source

Patch-level verification for Bundler

bunkerweb
bunkerweb
Open Source Web Application

🛡️ Open-source and cloud-native Web Application Firewall (WAF)

BurnWP-Framework
BurnWP-Framework
Open Source Exploitation

BurnWP Advanced Exploiter System instead Scanner & Custom Plugin for Pentester

Burp Suite
Burp Suite
Freemium Kali Web Application

Leading platform for web application security testing. The Community Edition includes an intercepting proxy, repeater, intruder, and decoder…

Burp Suite Extensions (BApp Store)
Burp Suite Extensions (BApp Store)
Freemium Web Application

Marketplace of extensions for Burp Suite covering active/passive scanning, custom insertion points, logging, authentication testing, and int…

burp-ai-agent
burp-ai-agent
Open Source Web Application

Burp Suite extension that adds built-in MCP tooling, AI-assisted analysis, privacy controls, passive and active scanning and more

burp-awesome-tls
burp-awesome-tls
Open Source Web Application

Burp extension to evade TLS fingerprinting. Bypass WAF, spoof any browser.

burp-paramalyzer
burp-paramalyzer
Free

Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.

Burp-Suite-Certified-Practitioner-Exam-Study
Burp-Suite-Certified-Practitioner-Exam-Study
Free Exploitation Web Application

Burp Suite Certified Practitioner Exam Study

burp-vps-proxy
burp-vps-proxy
Open Source

This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.

burpa
burpa
Open Source

Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used to s…

BurpAPISecuritySuite
BurpAPISecuritySuite
Open Source Exploitation Scanning & Enumeration

Burp Suite extension for API security testing with 15 attack types, 108+ payloads, intelligent fuzzing, BOLA/IDOR detection, AI integration,…

BurpBounty
BurpBounty
Open Source Scanning & Enumeration Web Application

Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the activ…

burpgpt
burpgpt
Open Source

A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities and…

BurpSuite-Asset_Discover
BurpSuite-Asset_Discover
Open Source Reconnaissance

Burp Suite extension to discover assets from HTTP response.

BurpSuite-collections
BurpSuite-collections
Open Source

有关burpsuite的插件(非商店),文章以及使用技巧的收集(此项目不再提供burpsuite破解文件,如需要请在博客mrxn.net下载)---Collection of burpsuite plugins (non-stores), articles and tips fo…

Burpsuite-Plugins-Usage
Burpsuite-Plugins-Usage
Free

1. https://github.com/1N3/IntruderPayloads 2. https://github.com/xl7dev/BurpSuite 3. https://github.com/Mr-xn/BurpSuite-collections

BurpSuite-Xkeys
BurpSuite-Xkeys
Free Reconnaissance

A Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.

BurpsuitePro
BurpsuitePro
Free Kali Web Application

Latest BurpSuitePro is a script for installing and updating Burp Suite Professional on Linux and Windows, ensuring Java compatibility for sm…

Butterscotch
Butterscotch
Open Source Reverse Engineering

🥧 An open source re-implementation of GameMaker: Studio's runner (YoYo Runner), targeting Undertale v1.08 (Bytecode Version 16)

byob
byob
Open Source Post-Exploitation

An open-source post-exploitation framework for students, researchers and developers.

BYOSI
BYOSI
Open Source Evasion Exploitation

Evade EDR's the simple way, by not touching any of the API's they hook.

BYOVD
BYOVD
Open Source Exploitation

BYOVD research use cases featuring vulnerable driver discovery and reverse engineering methodology. (CVE-2025-52915, CVE-2025-1055,).

BYOVD-DriverKiller
BYOVD-DriverKiller
Free Evasion Reverse Engineering

⚠️ Avertissement : Ce projet est strictement éducatif et démonstratif. Il n’a pas vocation à être utilisé dans un contexte malveillant. L’ob…

Bypass-Protection0x00
Bypass-Protection0x00
Free Evasion Exploitation

EDR & AV Bypass Arsenal— a comprehensive collection of tools, patches, and techniques for evading modern EDR and antivirus defenses.

bypass-url-parser
bypass-url-parser
Open Source Exploitation

Tool that tests MANY url bypasses to reach a 40X protected page.

Bypass-WAF-SQLMAP
Bypass-WAF-SQLMAP
Free Exploitation

Bypass WAF SQL Injection SQLMAP

BypassAV
BypassAV
Free Exploitation

This map lists the essential techniques to bypass anti-virus and EDR

ByteCaster
ByteCaster
Free Evasion Exploitation

Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supported)!…

byvalver
byvalver
Free Exploitation Forensics

takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities

C-hacks
C-hacks
Open Source Exploitation Reconnaissance

All social Media hacking with information gathering

C2_RedTeam_CheatSheets
C2_RedTeam_CheatSheets
Free Post-Exploitation

Useful C2 techniques and cheat sheets learned from engagements

c2compiler
c2compiler
Open Source Post-Exploitation

This is the C2 compiler written in C2 itself.

C2TeamServer
C2TeamServer
Open Source Post-Exploitation

TeamServer and Client of Exploration Command and Control Framework

C3Mini-BlueJammer
C3Mini-BlueJammer
Free Wireless

The C3Mini-BlueJammer (MINI FORMFACTOR) (Bluetooth jammer, BLE jammer, WiFi jammer, RC jammer) disrupts 2.4GHz communications. It generates …

cache-commander
cache-commander
Open Source Exploitation Scanning & Enumeration

Cache Commander — a TUI and MCP server to explore, audit, and clean developer cache directories. Scan for CVEs, find outdated packages, recl…

caddy-defender
caddy-defender
Open Source Web Application

Caddy module to block or manipulate requests originating from AIs or cloud services trying to train on your websites

caddy-waf
caddy-waf
Open Source Web Application

Caddy WAF (Regex Rules, IP and DNS filtering, Rate Limiting, GeoIP, Tor, Anomaly Detection)

CAFED00D
CAFED00D
Open Source Reverse Engineering

Obfuscation resilent Java class reader/writer

cai
cai
Free

Cybersecurity AI (CAI), the framework for AI Security

Caido
Caido
Freemium Web Application

Modern web security auditing tool built as a Rust-based alternative to Burp Suite. Features a clean UI, workflow automation, HTTPQL query la…

caido
caido
Free

🚀 Caido releases, wiki and roadmap

caldera
caldera
Open Source Exploitation

Automated Adversary Emulation Platform

Cam-Dumper
Cam-Dumper
Free Kali

Cam-dumper is a written tool in the language of Python program for hacking CCTV cameras that can access cameras in 20 countries

cameradar
cameradar
Open Source

Cameradar hacks its way into RTSP videosurveillance cameras

CamOver
CamOver
Open Source Exploitation

CamOver is a camera exploitation tool that allows to disclosure network camera admin password.

CamPhish
CamPhish
Open Source Kali

Grab cam shots & GPS location from target's phone front camera or PC webcam just sending a link.

CamPhish
CamPhish
Free Social Engineering

Camera phishing screen (to take photos from the front and rear cameras)

CamRaptor
CamRaptor
Open Source Exploitation

CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.

CamSniff
CamSniff
Open Source Kali Scanning & Enumeration

Automated IP Camera & Network Video Stream Reconnaissance Toolkit

CAN_Reverse_Engineering
CAN_Reverse_Engineering
Open Source Reverse Engineering

Automated Payload Reverse Engineering Pipeline for the Controller Area Network (CAN) protocol

cansina
cansina
Open Source

Cansina is a Web Content Discovery Application.

cansleep
cansleep
Open Source Password Attacks

The program for scanning and testing city cameras (DVR, RTSP, Hikvision) is a tool developed exclusively for educational purposes to analyze…

capa
capa
Open Source Forensics Reverse Engineering

The FLARE team's open-source tool to identify capabilities in executable files.

CAPEv2
CAPEv2
Free Forensics Reverse Engineering

Malware Configuration And Payload Extraction

capital
capital
Open Source

A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Securi…

capNcook
capNcook
Open Source Reconnaissance

capNcook - a dark web exploration tool

capstone
capstone
Free Reverse Engineering

Capstone disassembly/disassembler framework for ARM, ARM64 (ARMv8), Alpha, BPF, Ethereum VM, HPPA, LoongArch, M68K, M680X, Mips, MOS65XX, PP…

capturetheflag
capturetheflag
Free

Capture the Flag game using the Minetest Voxel Engine

Carbon
Carbon
Open Source Evasion

[UNMAINTAINED] A Python script to obfuscate and protect your code by renaming classes, functions, variables and remove comments and docstrin…

cargo-auditable
cargo-auditable
Open Source

Make production Rust binaries auditable

cariddi
cariddi
Open Source Exploitation Reconnaissance

Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more

CarpaAlko
CarpaAlko
Open Source

Adversarial frameworks for Android and iOS sandbox evasion.

CASE
CASE
Open Source Forensics

Cyber-investigation Analysis Standard Expression (CASE) Ontology

CAT-Net
CAT-Net
Free Forensics

Official code for CAT-Net: Compression Artifact Tracing Network. Image manipulation detection and localization.

catalyst
catalyst
Open Source Forensics

⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident re…

CatSniffer
CatSniffer
Free

CatSniffer is an original multiprotocol and multiband board for sniffing, communicating, and attacking IoT (Internet of Things) devices usin…

cazador_unr
cazador_unr
Free Exploitation Reconnaissance

[scanner] [TcpListener] [FileMiner] [Subscrabber]…

cbrutekrag
cbrutekrag
Open Source Password Attacks Scanning & Enumeration

Penetration tests on SSH servers using brute force or dictionary attacks. Written in C.

cc.py
cc.py
Open Source Reconnaissance

Extracting URLs of a specific target based on the results of "commoncrawl.org"

ccupp
ccupp
Free Social Engineering

CCUPP 是一个基于社会工程学的弱口令密码字典生成工具,通过分析用户的个人信息(姓名、生日、电话、地址等),智能生成可能的弱口令密码字典。

cdcEngineDXHR
cdcEngineDXHR
Free Reverse Engineering

Decompilation of Deus Ex: Human Revolution

CDIR
CDIR
Open Source Forensics

CDIR (Cyber Defense Institute Incident Response) Collector - live collection tool based on oss tool/library

CDK
CDK
Open Source Exploitation Post-Exploitation

📦 Make security testing of K8s, Docker, and Containerd easier.

cdnlookup
cdnlookup
Open Source Reconnaissance

一个使用 Edns-Client-Subnet(ECS) 遍历智能CDN节点IP地址的工具

cdsctf
cdsctf
Open Source

The CdsCTF project is an innovative and high-performance CTF platform.

Ceccomp
Ceccomp
Open Source

A tool to resolve seccomp just like seccomp-tools, written in C

CEH_Notes
CEH_Notes
Open Source

Certified Ethical Hacker (CEH) v12 Notes

CEH-in-bullet-points
CEH-in-bullet-points
Free Reconnaissance Scanning & Enumeration

💻 Certified ethical hacker summary in bullet points

CEH-Notes
CEH-Notes
Free

This comprehensive repository contains detailed study notes, practical examples, and hands-on labs for Certified Ethical Hacker (CEH) v12 ce…

celerio-angular-quickstart
celerio-angular-quickstart
Open Source Reverse Engineering

Generate an Angular 5 CRUD application from an existing database schema (we provide a sample one)

Censys
Censys
Freemium Reconnaissance

Internet-wide scanning platform that indexes the full certificate and banner data for every publicly reachable IP address. Useful for attack…

censys-subdomain-finder
censys-subdomain-finder
Free Reconnaissance

⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.

cent
cent
Open Source

Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place

Cerberus
Cerberus
Open Source Reverse Engineering

A C++ tool to unstrip Rust/Go binaries (ELF and PE)

certainty
certainty
Free

Automated cacert.pem management for PHP projects

certificates
certificates
Open Source

🛡️ A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & …

Certified-Red-Team-Professional-CRTP---Notes
Certified-Red-Team-Professional-CRTP---Notes
Open Source Exploitation Post-Exploitation

Certified Red Team Professional (CRTP) - Notes

Certipy
Certipy
Open Source Exploitation Reconnaissance

Offensive tool for Active Directory Certificate Services (AD CS) enumeration and abuse. Finds and exploits ESC1-ESC13 misconfigurations in c…

certonid
certonid
Open Source

Certonid is a Serverless SSH Certificate Authority

CertoraProver
CertoraProver
Open Source

The Certora Prover is the state-of-the-art security tool for automated formal verification of smart contracts running on EVM-based chains, S…

certstream-server-go
certstream-server-go
Open Source Reconnaissance Social Engineering

This project aims to be a drop-in replacement for the certstream server by Calidog. This tool aggregates, parses, and streams certificate da…

cervantes
cervantes
Free Exploitation Scanning & Enumeration

Cervantes is an open-source, collaborative platform designed specifically for pentesters and red teams. It serves as a comprehensive managem…

CeWL
CeWL
Open Source Kali Password Attacks Reconnaissance

Custom Word List generator that spiders a target website to build a wordlist based on the site's content. Useful for targeted password attac…

cewler
cewler
Free Reconnaissance

CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.

chain-bench
chain-bench
Open Source

An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchmark…

chainreactor
chainreactor
Free Exploitation Post-Exploitation

ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. The …

chainsaw
chainsaw
Open Source Forensics

Rapidly Search and Hunt through Windows Forensic Artefacts

chalk
chalk
Open Source

Chalk allows you to follow code from development, through builds and into production.

ChameleonMiniLiveDebugger
ChameleonMiniLiveDebugger
Open Source Reconnaissance

Live logger and GUI tool for the Chameleon Mini developed for Android OS in Java.

changeme
changeme
Open Source

changeme picks up where commercial scanners leave off. It focuses on detecting default and backdoor credentials and not necessarily common c…

chanzi
chanzi
Free Reverse Engineering

"chanzi" is a simple and user-friendly JAVA SAST tool that utilizes taint analysis technology, includes built-in common vulnerability rules…

chatlog
chatlog
Free Exploitation

chat log tool, easily use your own chat data. 聊天记录工具,轻松使用自己的聊天数据

cheatengine-mcp-bridge
cheatengine-mcp-bridge
Open Source Reverse Engineering

Connect Cursor, Copilot & Claude AI directly to Cheat Engine via MCP. Automate reverse engineering, pointer scanning, and memory analysis us…

Cheatsheet-God
Cheatsheet-God
Free

Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet

cheatsheets
cheatsheets
Free Exploitation Post-Exploitation

Collection of knowledge about information security

cheatsheets
cheatsheets
Free Reconnaissance

High quality and text versions of cheat sheets from Cyber Detective Twitter

check
check
Open Source Reconnaissance

Development environment for Meedan Check, a collaborative media annotation platform

Checker-Scammer
Checker-Scammer
Open Source Reconnaissance

a tool that functions to detect scammers based on telephone number analysis from the total number of markers

checksystem
checksystem
Open Source

Checksystem for attack-defense CTF

cherrybomb
cherrybomb
Open Source Web Application

Stop half-done APIs! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by auditing your API specifications, validating …

chiasmodon
chiasmodon
Open Source Reconnaissance

Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality rev…

chip8
chip8
Open Source Reverse Engineering

A CHIP-8 interpreter, assembler and disassembler in C

chipsec
chipsec
Open Source

Platform Security Assessment Framework

Chisel
Chisel
Open Source Kali Exploitation Post-Exploitation

Fast TCP/UDP tunnel transported over HTTP and secured via SSH. Used for port forwarding and pivoting through restrictive firewalls. Single b…

Chista
Chista
Open Source Social Engineering

Chista | Open Threat Intelligence Framework

chkdomain
chkdomain
Open Source Reconnaissance Social Engineering

🔍 Discover if a domain is resolvable or blocked by secure DNS and Ad-blocking services, and experience the innovative idea of DaaS - DNS as …

chomper
chomper
Open Source Reverse Engineering

A lightweight emulation framework for emulating security algorithms in iOS executables and libraries.

chomtesh
chomtesh
Open Source Reconnaissance Scanning & Enumeration

CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based tool…

ChromeAlone
ChromeAlone
Open Source Exploitation

A tool to transform Chromium browsers into a C2 Implant

Chromium-based-XSS-Taint-Tracking
Chromium-based-XSS-Taint-Tracking
Open Source Exploitation Web Application

The Cyclops's binary code can be directly downloaded here; It's source code is not provided now.

chronos
chronos
Open Source Password Attacks Reconnaissance

Wayback Machine OSINT Framework

ChYing
ChYing
Free Scanning & Enumeration Web Application

承影,愿你在光影之间,找到属于自己的锋芒。开源的类 BurpSuite 应用 ChYing — may you find your own edge between light and shadow. An open-source, BurpSuite-like applicat…

cia
cia
Open Source Reconnaissance

Citizen Intelligence Agency. Open-source intelligence platform analyzing Swedish political activities using AI and data visualization. Track…

CIA-World-Factbooks-Archive-1990-2025
CIA-World-Factbooks-Archive-1990-2025
Free Reconnaissance

Complete structured archive of every CIA World Factbook edition from 1990-2025. 281 countries, 36 years, 1M+ parsed data fields in SQL Serve…

cicd-goat
cicd-goat
Open Source

A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.

Ciphey
Ciphey
Open Source

⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡

CIS-Ubuntu-20.04-Ansible
CIS-Ubuntu-20.04-Ansible
Open Source Web Application

Ansible Role to Automate CIS v1.1.0 Ubuntu Linux 18.04 LTS, 20.04 LTS Remediation

CL4R1T4S
CL4R1T4S
Open Source Exploitation

LEAKED SYSTEM PROMPTS FOR CHATGPT, GEMINI, GROK, CLAUDE, PERPLEXITY, CURSOR, DEVIN, REPLIT, AND MORE! - AI SYSTEMS TRANSPARENCY FOR ALL! 👐

clairvoyance
clairvoyance
Open Source Web Application

Obtain GraphQL API schema even if the introspection is disabled

CLAP
CLAP
Free Reverse Engineering

CLAP(Contrastive Language-Assembly Pre-training) learns transferable binary code representations with natural language supervision

class-obf
class-obf
Open Source Evasion

一个 CLASS 文件混淆工具,支持方法字段参数名引用分析和重命名混淆,支持字符串提取/AES加密运行时解密/整型异或混淆/垃圾代码花指令混淆/错误注解崩溃/特殊字符迷惑用户/反编译器对抗/方法和字段的隐藏等,配置简单,容易上手

ClatScope
ClatScope
Free Reconnaissance

ClatScope Info Tool – The best and most versatile OSINT utility for retrieving geolocation, DNS, WHOIS, phone, email, data breach informatio…

ClatsCracker
ClatsCracker
Open Source Exploitation

ClatsCracker is a versatile Executable & Python based password-cracking tool supporting 25 hash algorithms. It offers dictionary or brute-fo…

claude-bug-bounty
claude-bug-bounty
Open Source Reconnaissance Scanning & Enumeration

AI-powered bug bounty hunting from your terminal - recon, 20 vuln classes, autonomous hunting, and report generation. All inside Claude Co…

claude-code-backdoor
claude-code-backdoor
Free Post-Exploitation Social Engineering

Backdooring Claude Code via hooks in settings.json. Authorized use only!

claude-code-research
claude-code-research
Free Reverse Engineering

Independent research on Claude Code internals, Claude Agent SDK, and related tooling.

claude-code-teams-mcp
claude-code-teams-mcp
Open Source Reverse Engineering

use claude code's agent teams orchestraction with any harness

claude-cybersecurity
claude-cybersecurity
Open Source Scanning & Enumeration Web Application

AI-powered cybersecurity code review skill for Claude Code. 8 specialist agents, OWASP 2025, CWE Top 25, MITRE ATT&CK, 11 languages, zero co…

Claude-Red
Claude-Red
Free Exploitation

claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.md file…

claude-reviews-claude
claude-reviews-claude
Open Source Reverse Engineering

Claude reads its own source code — 17-chapter architectural deep-dive into Claude Code v2.1.88. EN/ZH bilingual.

claude-skills-journalism
claude-skills-journalism
Open Source Reconnaissance

Claude Code skills for journalism, media, and academia - verification, FOIA, data journalism, academic writing, and more

claude-source-leaked
claude-source-leaked
Free Reverse Engineering

Claude Code v2.1.88 source analysis: system prompts, 87 hidden feature flags, cost optimization, architecture diagrams, undercover mode, and…

clawdstrike
clawdstrike
Open Source

Runtime security enforcement and threat hunting engine for autonomous AI fleets. Build Swarm Detection & Response (SDR) platforms with Clawd…

Clawk
Clawk
Free Kali

TikTok User Info Scraper allows you to fetch detailed information about TikTok users by their username or user ID, without requiring logins …

cldf
cldf
Open Source Password Attacks

CLDF: Cross-Linguistic Data Formats - the specification

cli
cli
Open Source Web Application

🧰 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.

CLI-Anything-WEB
CLI-Anything-WEB
Open Source Reverse Engineering

Claude Code plugin that generates production-grade Python CLIs for any web app. 17 CLIs and counting.

Clippy
Clippy
Open Source

Copy links from the sharing menu with automatic removal of shorteners and trackers.

CloakQuest3r
CloakQuest3r
Open Source Exploitation Reconnaissance

Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy services…

cloud
cloud
Open Source Exploitation Reconnaissance

Monitoring the Cloud Landscape

cloud_enum
cloud_enum
Open Source Reconnaissance

Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.

cloud_ip_ranges
cloud_ip_ranges
Open Source Reconnaissance

Identify IP addresses owned by public cloud providers

cloud_osint
cloud_osint
Open Source Exploitation Reconnaissance

☁️ Curated Cloud OSINT resources — dorks, tools, and techniques for AWS, Azure, GCP, Oracle Cloud, and other major providers reconnaissance

Cloud-Security
Cloud-Security
Free

This Repo serves as a collection of shared security and penetration testing resources for the cloud.

CloudBrute
CloudBrute
Open Source Exploitation

A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean, Aliba…

cloudcheck
cloudcheck
Free Reconnaissance

Check whether an IP address or hostname belongs to popular cloud providers

Cloudflare-Cookie-Analysis
Cloudflare-Cookie-Analysis
Open Source Web Application

Analysis of Cloudflare anti-bot cookie flow (cf_bm / cf_clearance) from a defensive perspective.

cloudflare-origin-ip
cloudflare-origin-ip
Open Source

Try to find the origin IP of a webapp protected by Cloudflare.

cloudgazer
cloudgazer
Open Source Reconnaissance

Find Real IPs hidden behind Cloudflare with Criminal IP(criminalip.io), security OSINT Tool.

CloudIntel
CloudIntel
Open Source Exploitation Forensics

This repo contains IOC, malware and malware analysis associated with Public cloud

cloudrecon
cloudrecon
Free Reconnaissance

This script is used to search for cloud certificate entities such as Amazon, Azure, and others that have been extracted by the kaeferjaeger.…

CloudRip
CloudRip
Open Source Reconnaissance

A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.

cloudSec
cloudSec
Open Source

云安全利用工具-云平台AK/SK-WEB利用工具,添加AK/SK自动检测资源,无需手动执行,支持云服务器、存储桶、数据库操作

CloudSlash
CloudSlash
Free Forensics

Local-first AWS forensic engine. Finds waste via dependency graph analysis and enables safe remediation with Terraform state restoration.

Cloudtopolis
Cloudtopolis
Open Source Password Attacks

Zero Infrastructure Password Cracking

CloudX
CloudX
Free

👉 如果你觉得这个项目有用,顺手点个 Star 鼓励一下吧!Star 越多,更新越快~

ClrDebug
ClrDebug
Open Source Reverse Engineering

Managed wrappers around the .NET Unmanaged API

Cobalt-Strike-Ultimate-Arsenal
Cobalt-Strike-Ultimate-Arsenal
Free Evasion Post-Exploitation

Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and pen…

cobaltstrike-beacon-rust
cobaltstrike-beacon-rust
Free Exploitation

change C2_GET_URL, C2_POST_URL, USER_AGENT, BEACON_KEYS_PATH in generate_config.py

CobaltStrike-KunKun
CobaltStrike-KunKun
Free Post-Exploitation

坤坤CS 基于CobaltStrike cat 4.5二开项目 添加反沙箱、反测绘。集成常用后渗透插件,开箱即用

CoBRA
CoBRA
Open Source Evasion Reverse Engineering

Coefficient-Based Reconstruction of Arithmetic — a Mixed Boolean-Arithmetic (MBA) expression simplifier for deobfuscation

cochise
cochise
Open Source Post-Exploitation

Autonomous Assumed Breach Penetration-Testing Active Directory Networks

codasm
codasm
Open Source Evasion Exploitation

Payload encoding utility to effectively lower payload entropy.

code-abyss
code-abyss
Open Source Exploitation

为 Claude Code / Codex CLI 注入邪修人格、4种可切换输出风格与 56 篇攻防工程秘典

code-pathfinder
code-pathfinder
Open Source Reverse Engineering

Static Code Analysis for security teams with Inter file taint analysis. Built for finding vulnerabilities, advanced structural search, deriv…

code-phish
code-phish
Free Exploitation

将这个项目伪装为一个.git泄露,红队使用扫描器扫描到.git泄露大概率会忍不住诱惑下载,如果下载完使用JetBrains家的IDE打开则会直接RCE。

codegraph
codegraph
Open Source Reverse Engineering

Static Python dependency graph with interactive HTML visualization, massive object detection, and unlinked module analysis (no code executio…

CodeScan
CodeScan
Free Exploitation

一款轻量级匹配Sink点的代码审计扫描器,为了帮助红队过程中快速代码审计的小工具

Coercer
Coercer
Open Source Post-Exploitation Scanning & Enumeration

A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.

Coeus-OSINT-ToolBox
Coeus-OSINT-ToolBox
Open Source Forensics Reconnaissance

Coeus 🌐 is an OSINT ToolBox empowering users with tools for effective intelligence gathering from open sources. From social media monitoring…

coffeeldr
coffeeldr
Open Source Exploitation

A modern and lightweight COFF (Common Object File Format) loader for Windows written in Rust, designed to run COFF files on Windows. It supp…

ColdWer
ColdWer
Open Source Evasion Exploitation

Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass

Collect-MemoryDump
Collect-MemoryDump
Open Source Forensics

Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR

collection-document
collection-document
Free Exploitation Reconnaissance

Collection of quality safety articles. Awesome articles.

collisions
collisions
Free Exploitation

Hash collisions and exploitations

ColorLCDVape-RE
ColorLCDVape-RE
Free Reverse Engineering

Reverse-engineering of rechargeable disposable vapes that include a small color TFT LCD (Raz/Kraze/etc.)

COM-Hunter
COM-Hunter
Open Source Exploitation Post-Exploitation

Command-Mobile-Penetration-Testing-Cheatsheet
Command-Mobile-Penetration-Testing-Cheatsheet
Free Reverse Engineering

Mobile penetration testing android & iOS command cheatsheet

Commander
Commander
Open Source Exploitation Post-Exploitation

A command and control (C2) server

Commander
Commander
Open Source

Keeper Commander is a python-based CLI and SDK interface to the Keeper Security platform. Provides administrative controls, reporting, impor…

commando-vm
commando-vm
Open Source

Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandian…

Commix
Commix
Open Source Kali Web Application

Automated all-in-one OS command injection and exploitation tool. Detects and exploits command injection vulnerabilities in web applications …

commix
commix
Free Kali Exploitation Scanning & Enumeration

Automated All-in-One OS Command Injection Exploitation Tool

Common-CTF-Challenges
Common-CTF-Challenges
Free Forensics Reverse Engineering

Common CTF Challenges is a collection of tools and resources to help individuals improve their Capture the Flag (CTF) skills. Cover a wide r…

common-osint-model
common-osint-model
Open Source Reconnaissance

Converting data from services like Censys and Shodan to a common data model

community-images
community-images
Open Source Exploitation

:gem: RapidFort hardened secure images

communitytools
communitytools
Open Source

Open-source Claude Code skills, agents, and slash commands for AI-powered penetration testing, bug bounty hunting, and security research

concise-cheat-sheets
concise-cheat-sheets
Free

Cheat Sheets for programming languages and tools

Condor
Condor
Open Source Evasion

「🛡️」About Condor

conf-presentations
conf-presentations
Free Evasion Reverse Engineering

Quarkslab conference talks

Configuration_extractors
Configuration_extractors
Free Forensics Reverse Engineering

Configuration Extractors for Malware

confuse
confuse
Free Evasion

iOS混淆加固差异化翻新加密工具,模拟人工手动混淆,识别上下文 ,支持继承链、类型识别、方法多参等复杂高级混淆。source-to-source obfuscation of iOS projects,Xcode's refactor->rename. 告别插入毫无关联的垃圾代码…

confuse-9live
confuse-9live
Free Evasion

🔥🔥🔥 专业版iOS混淆工具,马甲工具包、ipa静态分析工具(相似度对比、敏感词检测),提供试用版本,100%过机器审核,解决 AppStore 4.3,2.3.1问题,支持语言 c、c++、objc、dart、swift 并支持各种资源改名,混淆、傻瓜化操作、一键出包,提供良好…

console
console
Free

Application secrets and configuration management for developers.

Containers
Containers
Open Source Exploitation

Containers Leveraging container technologies to build Red Team tools [](https://www.python.org/) [](https://go.dev/) [](https://www.docker.c…

ContainerSSH
ContainerSSH
Open Source

ContainerSSH: Launch containers on demand

content
content
Free

Security automation content in SCAP, Bash, Ansible, and other formats

Content-Bruteforcing-Wordlist
Content-Bruteforcing-Wordlist
Free Password Attacks Web Application

Wordlist for content(directory) bruteforce discovering with Burp or dirsearch

convoC2
convoC2
Open Source Post-Exploitation

C2 infrastructure over Microsoft Teams.

Cookie-Grabber-Creator
Cookie-Grabber-Creator
Free Web Application

[V5] This will help you setup a grabber with the following features: History, Passwords, Tokens, Cookies, Emails, IP Adresses, Roblox Login …

copacetic
copacetic
Open Source Exploitation

🧵 CLI tool for directly patching container images!

copilot-api
copilot-api
Open Source Reverse Engineering

Turn GitHub Copilot into OpenAI/Anthropic API compatible server. Usable with Claude Code!

core
core
Open Source Web Application

Open source compliance automation for SOC 2, GDPR, ISO27001, NIST 800-53, and more

corellium-android-unpacking
corellium-android-unpacking
Free Reverse Engineering

Android Unpacking Automation using Corellium Devices

corptrace
corptrace
Open Source Reconnaissance Scanning & Enumeration

Automate Scoping, OSINT and Recon assessments.

cors
cors
Open Source Web Application

perhaps the best CORS middleware library for Go

Corsy
Corsy
Open Source Web Application

Lightweight program to find all known misconfigurations in CORS (Cross-Origin Resource Sharing) implementations. Tests for null origin, pre-…

Cortex
Cortex
Open Source Forensics

Cortex: a Powerful Observable Analysis and Active Response Engine

Cortex-Analyzers
Cortex-Analyzers
Open Source Forensics

The following repository is used by TheHive Project to develop and store Cortex analyzers & responders.

Cosmic-IDE
Cosmic-IDE
Open Source Reverse Engineering

A next-gen Ide for JVM development on Android

counter-osint-guide-en
counter-osint-guide-en
Free Reconnaissance

Comprehensive Counter OSINT and privacy guide (initially for CIS countries)

counter-osint-guide-ru
counter-osint-guide-ru
Free Reconnaissance

Исчерпывающее руководство по приватности и контр-ОСИНТ для Рунета и всего СНГ 🇷🇺

Counter-Phishing-Tool
Counter-Phishing-Tool
Open Source Social Engineering

Offensive & proactive tool designed to disrupt phishing attacks by flooding fake phishing websites' login portals with a deluge of fake user…

counterfeit_DS18B20
counterfeit_DS18B20
Open Source Reverse Engineering

How to tell original from fake DS18B20 temperature sensors.

courlan
courlan
Open Source Reconnaissance

Clean, filter and sample URLs to optimize data collection – Python & command-line – Deduplication, spam, content and language filters

Covenant
Covenant
Open Source Exploitation Post-Exploitation

.NET-based C2 framework with a collaborative web interface. Uses .NET Grunts as implants, supports a rich task library, and integrates with …

Covenant
Covenant
Open Source Kali Exploitation Post-Exploitation

Covenant is a collaborative .NET C2 framework for red teamers.

covirt
covirt
Open Source Evasion Reverse Engineering

An x86-64 code virtualizer for VM based obfuscation

cp-ddd-framework
cp-ddd-framework
Open Source Reverse Engineering

轻量级DDD正向/逆向业务建模框架,支撑复杂业务系统的架构演化!

cpe-guesser
cpe-guesser
Open Source Exploitation

Tool to guess CPE name based on common software name

Cpp2IL
Cpp2IL
Open Source Reverse Engineering

Work-in-progress tool to reverse unity's IL2CPP toolchain.

Cr3dOv3r
Cr3dOv3r
Open Source

Know the dangers of credential reuse attacks.

cracke-dit
cracke-dit
Open Source Password Attacks Post-Exploitation

cracke-dit ("Cracked It") makes it easier to perform regular password audits against Active Directory environments.

CrackMapExec (CME / NetExec)
CrackMapExec (CME / NetExec)
Open Source Kali Exploitation Post-Exploitation

Swiss army knife for pentesting Windows/Active Directory environments. Tests credentials at scale, executes commands, dumps credentials, and…

CrackMapExtreme
CrackMapExtreme
Free

For all your network pentesting needs

CrackMe
CrackMe
Open Source Reverse Engineering

A simple Reverse Engineering challenge for starter in Reverse Engineering Attack to understand the basic concept of Reverse Engineering & Ho…

cradle
cradle
Open Source Forensics

CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taking,…

crawlergo
crawlergo
Open Source Scanning & Enumeration

A powerful browser crawler for web vulnerability scanners

crawley
crawley
Open Source

Crawls web pages and prints any link it can find.

crawlProject
crawlProject
Free Reverse Engineering

python爬虫项目合集,从基础到js逆向,包含基础篇、自动化篇、进阶篇以及验证码篇。案例涵盖各大网站(xhs douyin weibo ins boss job,jd...),你将会学到有关爬虫以及反爬虫、自动化和验证码的各方面知识

Creation-Kit-Platform-Extended
Creation-Kit-Platform-Extended
Open Source Reverse Engineering

A collection of modifications, enhancements, and reverse engineered resources for Creation Kit by Bethesda.

credential-digger
credential-digger
Open Source

A Github scanning tool that identifies hardcoded credentials while filtering the false positive data through machine learning models :lock:

CredMaster
CredMaster
Open Source Password Attacks

Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling

CredSniper
CredSniper
Open Source Social Engineering

Phishing framework written in Python using Flask and Jinja2 templates. Supports 2FA capture (TOTP/HOTP) and has pre-built modules for Gmail,…

crlfuzz
crlfuzz
Open Source Scanning & Enumeration

A fast tool to scan CRLF vulnerability written in Go

CRLJ
CRLJ
Open Source Exploitation Reconnaissance

The repository is a valuable resource for individuals looking to enhance their knowledge and skills in cybersecurity. It provides in-depth m…

Cronos-Crypter
Cronos-Crypter
Open Source Evasion

Cronos Crypter is an simple example of crypter created for educational purposes.

cross-channel_chinese-localization_project
cross-channel_chinese-localization_project
Open Source Reverse Engineering

[LEGACY] CROSS † CHANNEL 中文化 (汉化) 项目,源代码以及网站。(全翻译文本、全平台移植源码已公开!欢迎修改&学习!)CROSS † CHANNEL Chinese Localization Project, source codes and websi…

CrossLinked
CrossLinked
Open Source Reconnaissance Scanning & Enumeration

LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping

Crow-Eye
Crow-Eye
Open Source Forensics

crt.sh
crt.sh
Free Reconnaissance Web Application

Crtsh Subdomain Enumeration | This bash script makes it easy to quickly save and parse the output from https://crt.sh website.

crtsh
crtsh
Open Source Reconnaissance

A Python Script to Get Subdomain using https://crt.sh

Crucix
Crucix
Open Source Reconnaissance

Your personal intelligence agent. Watches the world from multiple data sources and pings you when something changes.

Crunch
Crunch
Open Source Kali Password Attacks

Wordlist generator that creates wordlists based on specified criteria including character sets, patterns, minimum and maximum length. Can ge…

cry-me
cry-me
Open Source

CRY.ME (CRYptographic MEssaging application)

crypt.fyi
crypt.fyi
Open Source

Ephemeral, zero-knowledge, end-to-end post-quantum encrypted sensitive data sharing

crypto-attacks
crypto-attacks
Open Source

Python implementations of cryptographic attacks and utilities.

Crypto-Scam-and-Crypto-Phishing-Threat-Intel-Feed
Crypto-Scam-and-Crypto-Phishing-Threat-Intel-Feed
Open Source Reconnaissance Social Engineering

A fresh feed of crypto phishing and crypto scam websites. Automatically updated daily/frequently.

cryptonote-easy-miner
cryptonote-easy-miner
Free Exploitation

This is a simple C# app that helps Windows users start mining without dealing with command-line operated binaries. It is bundled with the la…

crystal-vault
crystal-vault
Free Reconnaissance

Documenting Venezuela's surveillance infrastructure through their own open APIs. La Bóveda de Cristal - A vault made of glass.

CS-Aggressor-Kit
CS-Aggressor-Kit
Open Source Exploitation Post-Exploitation

Homemade Aggressor scripts kit for Cobalt Strike

cs2br-bof
cs2br-bof
Open Source Exploitation

Run Cobalt Strike BOFs in Brute Ratel C4!

CS7038-Malware-Analysis
CS7038-Malware-Analysis
Free Forensics

Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)

cscan
cscan
Open Source Scanning & Enumeration

Enterprise-grade Distributed Asset & Vulnerability Scanner. Features: Port Scanning, Subdomain Brute-force, Fingerprinting, and PoC Detectio…

csp-builder
csp-builder
Open Source Web Application

Build Content-Security-Policy headers from a JSON file (or build them programmatically)

csprecon
csprecon
Open Source Reconnaissance Web Application

Discover new target domains using Content Security Policy

CTF
CTF
Free Exploitation

CTF challenge (mostly pwn) files, scripts etc

ctf
ctf
Free

Ctf solutions from p4 team

ctf
ctf
Free

We’re glad you’re here. We need more people like you.

ctf
ctf
Free

My CTF journey since 2015. Stats, writeups, code snippets, notes, challenges.

CTF
CTF
Free

记录一下我的CTF生涯中的各种东西吧,第一年基本上就是纯摆烂了,也算是从第二年开始记录了。

CTF
CTF
Free

My CTF writeups

CTF_OnlineTools
CTF_OnlineTools
Open Source Reconnaissance

Repository to index useful online tools for CTF

ctf_proxy
ctf_proxy
Open Source

An Intrusion Prevention System for Attack-Defense CTFs

CTF_tools
CTF_tools
Free Forensics Reconnaissance

List of tools and commands that may be helpful in CTFs

ctf-blockchain
ctf-blockchain
Free

A summary and solutions for 200+ CTF blockchain challenges

ctf-challenges
ctf-challenges
Free

A collection of Capture The Flag (CTF) challenges created by Trail of Bits engineers for various security competitions and events.

CTF-Challenges
CTF-Challenges
Open Source

Security CTF Challenges =======================

CTF-Difficulty
CTF-Difficulty
Free

This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.

ctf-gameserver
ctf-gameserver
Open Source

FAUST Gameserver for attack-defense CTFs

CTF-Heaven
CTF-Heaven
Free

.'\ /. .'.-.-'.-.. ..._: .-. .-. :_... .' '-.(o ) (o ).-' . : _ _ _~(_)~_ _ _ : : /: ' .-=_ _=-. ;\ : : :|-.._ ' _..-|: : CTF-BR{Flag_in_com…

ctf-party
ctf-party
Open Source

:triangular_flag_on_post: A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.

ctf-primer
ctf-primer
Free

Textbook with chapters for each usual picoCTF challenge category.

ctf-skills
ctf-skills
Open Source

Agent skills for solving CTF challenges - web exploitation, binary pwn, crypto, reverse engineering, forensics, OSINT, and more

ctf-super-hub
ctf-super-hub
Free Forensics Reconnaissance

面向小白用户的 CTF / 逆向 Skills 整合包:自动分流、头脑风暴、教学模式、比赛模式、只提示模式

ctf-wiki
ctf-wiki
Free

Come and join us, we need you!

ctf-writeups
ctf-writeups
Free

Perfect Blue's CTF Writeups

ctf-writeups-search
ctf-writeups-search
Open Source

Search engine for CTF writeups with instant results.

ctfcli
ctfcli
Open Source

ctfcli is a tool to manage Capture The Flag events and challenges

CTFCrackTools
CTFCrackTools
Open Source

The next-generation CTF Swiss Army Knife powered by Rust & Tauri. Features a visual node-based workflow and local AI intelligence for extrem…

CTFd
CTFd
Open Source

CTFd is a Capture The Flag framework focusing on ease of use and customizability. It comes with everything you need to run a CTF and it's ea…

ctfd-parser
ctfd-parser
Free

A python script to dump all the challenges locally of a CTFd-based Capture the Flag.

CTFever
CTFever
Open Source

Fantastic toolkit for CTFers and everyone.

ctfhub
ctfhub
Free

CTFNote
CTFNote
Open Source

CTFNote is a collaborative tool aiming to help CTF teams to organise their work.

CTFPacker
CTFPacker
Open Source Evasion

Shellcode packer for CTFs and pentest / red team exams aiming for AV evasion!

CTFs
CTFs
Free Reverse Engineering

CTF Cheat Sheet + Writeups / Files for some of the Security CTFs that I've done

ctftools-all-in-one
ctftools-all-in-one
Open Source

市场上虽然存在大量的网络安全工具和软件,但它们大多针对某一特定领域或功能,缺乏一个统一的、集成的、易于使用的综合工具平台。这导致参赛者在CTF竞赛中需要频繁切换不同的工具,不仅降低了工作效率,还增加了操作失误的风险。由gitee转发 ↓

cti-blueprints
cti-blueprints
Open Source Forensics

CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports …

cti-expert
cti-expert
Free Forensics Reconnaissance

CTI Expert — Cyber Threat Intelligence & OSINT analysis skill for Claude Code. 67+ commands, 35 techniques, no API keys required.

CTR-ModSDK
CTR-ModSDK
Free Reverse Engineering

ModSDK - a modding toolkit to create mods for Crash Team Racing in C. This repository also houses an effort to fully decompile and reverse-e…

cupidcr4wl
cupidcr4wl
Free Reconnaissance

cupidcr4wl is an Open-Source Intelligence username and phone number search tool that crawls adult content platforms to see if a targeted acc…

cupp
cupp
Open Source Password Attacks

Common User Passwords Profiler (CUPP)

Custom-Search-Engines
Custom-Search-Engines
Free Reconnaissance

A selection of useful Custom Serch Engines for OSINT.

cut-cdn
cut-cdn
Open Source Reconnaissance Web Application

✂️ Removing CDN IPs from the list of IP addresses

Cute-RATs
Cute-RATs
Free Forensics Reverse Engineering

This is a collection of RATs for educational purposes

cutter
cutter
Open Source Reverse Engineering

Free and Open Source Reverse Engineering Platform powered by rizin

cve
cve
Open Source Exploitation

Gather and update all available and newest CVEs with their PoC.

CVE_Prioritizer
CVE_Prioritizer
Open Source Exploitation

Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time threat …

CVE-2021-3129
CVE-2021-3129
Open Source Exploitation

Laravel RCE Exploit PoC - CVE-2021-3129 (user-friendly with automatic log path detection)

CVE-2022-23808
CVE-2022-23808
Free Exploitation Web Application

A series of weaknesses has been discovered that could allow an attacker to inject malicious code in to aspects of the setup script, which ca…

CVE-2022-36446-Webmin-Software-Package-Updates-RCE
CVE-2022-36446-Webmin-Software-Package-Updates-RCE
Free Exploitation

A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.

CVE-2023-22515
CVE-2023-22515
Free Exploitation Post-Exploitation

CVE-2023-22515: Confluence Broken Access Control Exploit

CVE-2023-22960
CVE-2023-22960
Open Source Exploitation

This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) of m…

CVE-2023-25690-POC
CVE-2023-25690-POC
Free Exploitation

CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smu…

CVE-2023-27372
CVE-2023-27372
Free Exploitation Web Application

SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions ar…

CVE-2023-46747-RCE
CVE-2023-46747-RCE
Free Exploitation

exploit for f5-big-ip RCE cve-2023-46747

CVE-2024-21338
CVE-2024-21338
Free Exploitation

Windows AppLocker Driver (appid.sys) LPE

CVE-2024-21683-RCE
CVE-2024-21683-RCE
Free Exploitation

CVE-2024-21683 Confluence Post Auth RCE

CVE-2024-22120-RCE
CVE-2024-22120-RCE
Free Exploitation

Time Based SQL Injection in Zabbix Server Audit Log --> RCE

CVE-2024-27348
CVE-2024-27348
Free Exploitation

Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )

CVE-2024-32002
CVE-2024-32002
Free Exploitation

This repository contains a Proof of Concept (PoC) for CVE-2024-32002, a Remote Code Execution (RCE) vulnerability in Git submodules. The exp…

CVE-2024-32640-SQLI-MuraCMS
CVE-2024-32640-SQLI-MuraCMS
Free Exploitation

CVE-2024-32640 | Automated SQLi Exploitation PoC

CVE-2024-36401
CVE-2024-36401
Open Source Exploitation

Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions with multies ways to exploit

CVE-2024-38856_Scanner
CVE-2024-38856_Scanner
Free Exploitation

Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)

CVE-2024-4040-SSTI-LFI-PoC
CVE-2024-4040-SSTI-LFI-PoC
Free Exploitation Web Application

CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support

CVE-2024-46538
CVE-2024-46538
Free Exploitation

PfSense Stored XSS lead to Arbitrary Code Execution exploit

CVE-2024-49138-POC
CVE-2024-49138-POC
Free Exploitation

POC exploit for CVE-2024-49138

CVE-2024-5932
CVE-2024-5932
Free Exploitation

GiveWP PHP Object Injection exploit

CVE-2024-6387
CVE-2024-6387
Free Exploitation

PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit)

CVE-2024-6387_Check
CVE-2024-6387_Check
Open Source Exploitation

CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH

CVE-2024-9264
CVE-2024-9264
Free Exploitation

Exploit for Grafana arbitrary file-read and RCE (CVE-2024-9264)

CVE-2025-30208-EXP
CVE-2025-30208-EXP
Open Source Exploitation

Vite开发服务器任意文件读取漏洞(CVE-2025-30208),漏洞覆盖面大,利用简单且不受限制,漏洞危害巨大!

CVE-2025-32463
CVE-2025-32463
Free Exploitation

Local Privilege Escalation to Root via Sudo chroot in Linux

CVE-2025-32463_chwoot
CVE-2025-32463_chwoot
Open Source Exploitation Post-Exploitation

Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463

CVE-2025-49144_PoC
CVE-2025-49144_PoC
Open Source Kali

CVE-2025-49144 PoC for security researchers to test and try.

CVE-2025-49844
CVE-2025-49844
Open Source Exploitation

A powerful Redis exploitation tool that leverages CVE-2025-4984

CVE-2025-55182
CVE-2025-55182
Free Exploitation

Next.js React Server Components RCE exploit for CVE-2025-55182

CVE-2025-55182
CVE-2025-55182
Free Exploitation

Docker poc lab for CVE-2025-55182 / CVE-2025-66478 (React2Shell) detection and exploitation

CVE-2025-55182-poc
CVE-2025-55182-poc
Free

A complete proof-of-concept demonstrating CVE-2025-55182, a critical vulnerability in react-server-dom-webpack@19.0.0 that allows unauthenti…

CVE-2025-8088-Winrar-Tool
CVE-2025-8088-Winrar-Tool
Free Exploitation

Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088

CVE-2026-21858
CVE-2026-21858
Free Exploitation

n8n Ni8mare - Unauthenticated Arbitrary File Read to RCE Chain (CVSS 10.0)

cve-bin-tool
cve-bin-tool
Open Source Exploitation

The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 350 common, vulnerable…

CVE-Master
CVE-Master
Open Source Exploitation Web Application

收集本人自接触渗透测试用于漏洞验证的所有热门CVE、POC、CNVD攻击有效载荷+测试工具+FUZZ,一个仓库满足许多攻击测试场景,开箱即用.

cve-mcp-server
cve-mcp-server
Open Source Exploitation Reconnaissance

Production-grade MCP server giving Claude 27 security intelligence tools across 21 APIs — CVE lookup, EPSS scoring, CISA KEV, MITRE ATT&CK, …

cve-pocs
cve-pocs
Open Source Exploitation

This repository contains proof-of-concept (PoC) exploits and research for various CVEs and vulnerabilities, primarily for educational and se…

CVE-repository
CVE-repository
Free Exploitation

:beetle: Repository of CVE found by OCD people

cve-scores
cve-scores
Free Exploitation

EPSS & VEDAS Score Aggregator for CVEs

cve-search
cve-search
Open Source Exploitation

cve-search - a tool to perform local searches for known vulnerabilities

cve-search_mcp
cve-search_mcp
Open Source Exploitation

A Model Context Protocol (MCP) server for querying the CVE-Search API

cve.icu
cve.icu
Open Source Exploitation

CVE.ICU is an automated platform that provides comprehensive analysis and visualization of Common Vulnerabilities and Exposures (CVE) data. …

CVE2CAPEC
CVE2CAPEC
Open Source Exploitation

Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated dail…

cvehound
cvehound
Open Source Exploitation

Check linux sources dump for known CVEs.

cvelib
cvelib
Open Source Exploitation

A Python library and command line interface for CVE Services.

CVElk
CVElk
Open Source Exploitation

Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data

cvemapping
cvemapping
Free Exploitation Reconnaissance

This repo Gathers all available cve exploits from github.⚠️ Be careful Malware.

CVEScannerV2
CVEScannerV2
Open Source Exploitation Scanning & Enumeration

Nmap script that scans for probable vulnerabilities based on services discovered in open ports.

CVS
CVS
Free Scanning & Enumeration

CVS is a powerful comprehensive attack surface management platform. 森罗万象-强大的网络空间测绘、资产管理、漏洞扫描等全生命漏洞周期的综合攻击面管理平台,化繁为简,以一御百。

cwe_checker
cwe_checker
Open Source Reverse Engineering Scanning & Enumeration

cwe_checker finds vulnerable patterns in binary executables

cwe-tool
cwe-tool
Open Source Exploitation Web Application

A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.

cyber_threat_intelligence
cyber_threat_intelligence
Free Exploitation

Cyber Threat Intelligence Data, Indicators, and Analysis

Cyber-Claude
Cyber-Claude
Open Source Exploitation

An AI-powered cybersecurity agent inspired by Claude Agent SDK, designed exclusively for defensive security operations.

cyber-intelligence-toolkit
cyber-intelligence-toolkit
Free Forensics Reconnaissance

Curated manuals, playbooks, and checklists for OSINT, OPSEC, cyber security, and digital investigations

cyber-neo
cyber-neo
Open Source Scanning & Enumeration Web Application

Open-source cybersecurity analysis agent for Claude Code. Scans projects for vulnerabilities across all OWASP 2025 Top 10 and CWE Top 25 cat…

Cyber-Zero
Cyber-Zero
Free

Cyber-Zero: Training Cybersecurity Agents Without Runtime

cyberbro
cyberbro
Open Source Forensics Reconnaissance

A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.

cyberchef-recipes
cyberchef-recipes
Free Forensics

A list of cyber-chef recipes and curated links

cyberclopaedia
cyberclopaedia
Open Source Exploitation Reconnaissance

This is an aspiring project aimed at accumulating knowledge from the world of cybersecurity and presenting it in a cogent way, so it is acce…

CyberEdge
CyberEdge
Free Exploitation

这将自动: 1. 启动MySQL Docker容器 2. 初始化数据库schema 3. 启动后端API服务 (端口31337) 4. 启动前端开发服务器 (端口8080)

Cyberonix
Cyberonix
Open Source

Cyberonix is a complete resource hub for Cyber Security Community. Our aim is to make this tool an 1 stop solution for all the Hackers out t…

cyberowl
cyberowl
Open Source Exploitation

Aggregates security advisories from 10 international CERTs daily and provides an AI skill that cross-references alerts against your project'…

CyberPunkNetrunner
CyberPunkNetrunner
Open Source Kali

Cyberpunk 2077 Netrunner Hacking Tool (Easy to use and install). Don't use it on illegal and malicious activity. Inspired by the game CyberP…

CyberScan
CyberScan
Open Source Forensics Reconnaissance

CyberScan: Network's Forensics ToolKit

CyberSec-Books
CyberSec-Books
Free Forensics Reverse Engineering

Some useful books related to Cybersecurity, Linux and more.

CyberSecurity
CyberSecurity
Free

A collection of essential and foundational cybersecurity knowledge, thoughtfully organized for easy comprehension.

cybersecurity
cybersecurity
Open Source

Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, …

CyberSecurity_Conferences
CyberSecurity_Conferences
Open Source Forensics Reconnaissance

List of some cybersecurity conferences

cybersecurity_hack
cybersecurity_hack
Open Source Kali Exploitation

Social Media, Website, Crypto Hacking 🔥 Hacker, Cyber, Cybersecurity. Instagram, TikTok, YouTube, Telegram, Snapchat Hacking. Cryptocurrency…

cybersecurity-career-path
cybersecurity-career-path
Open Source Forensics

⚠️ Education and Certification are Optional

cybersecurity-career-roadmap
cybersecurity-career-roadmap
Open Source Exploitation

Complete career paths for SOC, Pentesting, Blue Team, Red Team & more

cybersecurity-dark-web
cybersecurity-dark-web
Open Source

A collection of awesome software, libraries, learning tutorials, documents, books & technical resources and cool stuff about dark web.

Cybersecurity-Mastery-Roadmap
Cybersecurity-Mastery-Roadmap
Free

A comprehensive, step-by-step guide to mastering cybersecurity from beginner to expert level with curated resources, tools, and career guida…

Cybersecurity-Notes
Cybersecurity-Notes
Open Source Forensics Post-Exploitation

Cybersecurity Notes For Intermediate and Advanced Hackers | CEH Exam Prep Also Included

cybersecurity-penetration-testing
cybersecurity-penetration-testing
Open Source

An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, b…

Cybersecurity-Projects
Cybersecurity-Projects
Open Source

Building 67 Projects ranging from beginner to advanced so anyone can — learn from, build upon, use as a reference, or even copy directly. Ga…

cybersecurity-roadmap
cybersecurity-roadmap
Open Source

Skills and career roadmap for various security roles like application security, cloud security, DevSecOps, security engineer, security resea…

cybersecurity-roadmap
cybersecurity-roadmap
Free

Схема карьерных треков в кибербезопасности

CyberSecurity-Tools
CyberSecurity-Tools
Open Source

This repository is aimed to contain all basic tools and resources for cybersecurity. In this repository you will get all material which you …

CyberSecurityRSS
CyberSecurityRSS
Free Exploitation

CyberSecurityRSS: A collection of cybersecurity rss to make you better!

CyberStrike
CyberStrike
Open Source Exploitation Web Application

AI-powered offensive security agent with 7,300+ actionable security skills. Autonomous pentesting powered by MITRE ATT&CK (2,000+ Atomic tes…

CyberStrikeAI
CyberStrikeAI
Open Source

CyberStrikeAI is an AI-native security testing platform built in Go. It integrates 100+ security tools, an intelligent orchestration engine,…

CyberThreatHunting
CyberThreatHunting
Open Source Forensics

A collection of resources for Threat Hunters

D0x-K1t-v2
D0x-K1t-v2
Open Source Reconnaissance

Active reconaissance, information gathering and OSINT built in a portable web application test.

d2s-format
d2s-format
Free Reverse Engineering

Diablo II Save File Format (.d2s format)

D3m0n1z3dShell
D3m0n1z3dShell
Open Source Exploitation Post-Exploitation

Demonized Shell is an Advanced Tool for persistence in linux.

D4N155
D4N155
Open Source Password Attacks Reconnaissance

OWASP D4N155 - Intelligent and dynamic wordlist using OSINT

d810-ng
d810-ng
Open Source Reverse Engineering

D810-ng (Next Generation) is an updated, tested, refactored, and optimized IDA Pro plugin used to deobfuscate code at decompilation time by …

daily-bugbounty-writeups
daily-bugbounty-writeups
Free Web Application

This repository contains Bug Bounty writeups

Dainsleif
Dainsleif
Open Source Reverse Engineering

:zap: an open source cheat for Counter-Strike: Global Offensive.

dalec
dalec
Open Source

📦 Produce secure packages and containers with declarative configurations

Dalfox
Dalfox
Open Source Web Application

Fast parameter analysis and XSS scanner. Features DOM-based XSS detection, built-in BAC (Blind XSS), custom payloads, headless Chrome suppor…

dalfox
dalfox
Open Source Exploitation Web Application

🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.

dalvikus
dalvikus
Open Source Reverse Engineering

Android reverse-engineering tool / smali editor

Damn-Vulnerable-GraphQL-Application
Damn-Vulnerable-GraphQL-Application
Open Source Exploitation Web Application

Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practising…

dark-fantasy-hack-tool
dark-fantasy-hack-tool
Free Scanning & Enumeration

DDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file s…

dark-kill
dark-kill
Free Exploitation

A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Callba…

Dark-Phish
Dark-Phish
Open Source Social Engineering

A Powerful Phishing Tool with 50+ phishing templates. For more about Dark-Phish tool please visit the website.

Dark-Souls-1-Overhaul
Dark-Souls-1-Overhaul
Free Reverse Engineering

https://drive.google.com/drive/folders/0BzSQv5PaltE-ci1LaDh5MDRId2M?resourcekey=0-9E8yBDVHw0gzKEuWYvCdEA&usp=sharing

darkdump
darkdump
Open Source Reconnaissance

Open Source Intelligence Interface for Deep Web Scraping

darkflare
darkflare
Free Post-Exploitation

DarkFlare Firewall Piercing (TCP over CDN)

DarkGPT-Lite
DarkGPT-Lite
Open Source Exploitation Reverse Engineering

DarkGPT Lite is a specialized CLI tool providing unrestricted conversations with AI for cybersecurity research purposes

DarkLnk
DarkLnk
Free Social Engineering

Build sneaky & malicious LNK files.

Darkweb-OSINT
Darkweb-OSINT
Free Evasion

4EverProxy Acces Onion sites directly from your browser without TOR. Ahmia search engine Darkweb search engine wich filter dangerous da…

Darkweb-search-engine
Darkweb-search-engine
Open Source Reconnaissance

Dark Web & Deep Web Search Engine. Data Crawler and indexer for Darkweb , OSINT Tools for the Dark Web

dart
dart
Open Source Exploitation

DART is a test documentation tool created by the Lockheed Martin Red Team to document and report on penetration tests, especially in isolate…

darter
darter
Open Source Reverse Engineering

:detective: Dart / Flutter VM snapshot analyzer

dastardly-github-action
dastardly-github-action
Free

Runs a scan using Dastardly by Burp Suite against a target site and creates a JUnit XML report for the scan on completion.

dataBrawl
dataBrawl
Free Evasion Exploitation

1. 本地/分离加载 2. ollvm混淆编译/gcc编译 3. IAT obfuscate 4. Anti-VM 5. Anti-Sandbox(API Hammering,自定义sleep) 6. Anti-Debug 7. 内存加密 8. add resource/sign

DataDefender
DataDefender
Open Source Evasion

Sensitive Data Management: Data Discovery and Anonymization toolkit

dawtool
dawtool
Free Reverse Engineering

Reverse-engineered parsers for Ableton Live & FL Studio project files.

DC3-MWCP
DC3-MWCP
Free Forensics

DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted fro…

dcfldd
dcfldd
Open Source Forensics

Enhanced version of dd for forensics and security

dddplus
dddplus
Open Source Reverse Engineering

🔥 A lightweight DDD(Domain Driven Design) Enhancement Framework for complex business architecture!轻量级DDD增强框架!

DDexec
DDexec
Open Source Evasion

A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.

ddisasm
ddisasm
Open Source Reverse Engineering

A fast and accurate disassembler

DDoS-Ripper
DDoS-Ripper
Open Source Exploitation Web Application

DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Interne…

DDOS-RootSec
DDOS-RootSec
Free Exploitation

Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, advan…

DDoSlayer
DDoSlayer
Open Source Kali

de4py
de4py
Free Evasion Reverse Engineering

The ultimate AI-powered toolkit for python reverse engineering

deadend-cli
deadend-cli
Open Source

Agentic pentest tooling. Currently achieving 81% (KIMI K2.5) on XBOW's benchmark in full black-box. Completely Self-hosted. Every model avai…

deadnet
deadnet
Open Source Kali

A dos (denial of service) attack for local networks using dead router attack (IPv6) and ARP attack (IPv4) simultaneously

DeadPotato
DeadPotato
Open Source Post-Exploitation

DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM…

DeautherX
DeautherX
Free Wireless

An open-source ESP8266_Deauther with customizable Evil Twin attack, and WiFi signal strength checker, with a user-friendly web interface and…

Debian-Hyprland
Debian-Hyprland
Open Source Kali

For automated installation of Hyprland on Debian 13 Trixie (Testing) and Debian SiD (Unstable)

debloat
debloat
Open Source Reverse Engineering

A GUI and CLI tool for removing bloat from executables

debugger
debugger
Free Reverse Engineering

This is the repository for Binary Ninja Debugger. The debugger is written in C++ and is shipped with BN as a plugin.

debugHunter
debugHunter
Open Source

Discover hidden debugging parameters and uncover web application secrets

DECAF
DECAF
Open Source Reverse Engineering

DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the Droi…

Decepticon
Decepticon
Open Source

Autonomous Hacking Agent for Red Team

DecipheringUAL
DecipheringUAL
Free Forensics

This repo aims to help you decipher the UAL from a Digital Forensics & Incident Response (DFIR) perspective. The UAL is the Microsoft 365 Un…

deck-of-many-prompts
deck-of-many-prompts
Free Exploitation

Manual Prompt Injection / Red Teaming Tool

decomp-toolkit
decomp-toolkit
Open Source Reverse Engineering

A GameCube & Wii decompilation toolkit

decomp.me
decomp.me
Open Source Reverse Engineering

Collaborative decompilation and reverse engineering website

decompose
decompose
Open Source Reverse Engineering

Reverse-engineering tool for docker environments

decyx
decyx
Open Source Reverse Engineering

Decyx: AI-powered Ghidra extension for enhanced reverse engineering and binary analysis.

DedSec
DedSec
Free Reconnaissance Social Engineering

Official DedSec Project GitHub Repository

DEDSEC_PTZ_EXPLOIT
DEDSEC_PTZ_EXPLOIT
Open Source Exploitation

This is a exploit with the capability to control ip camera movement even without a username and password.

DeepAudit
DeepAudit
Open Source Scanning & Enumeration

DeepAudit:人人拥有的 AI 黑客战队,让漏洞挖掘触手可及。国内首个开源的代码漏洞挖掘多智能体系统。小白一键部署运行,自主协作审计 + 自动化沙箱 PoC 验证。支持 Ollama 私有部署 ,一键生成报告。支持中转站。​让安全不再昂贵,让审计不再复杂。

deepce
deepce
Open Source Exploitation Post-Exploitation

Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)

deepfaceui
deepfaceui
Free Reconnaissance

DeepFace UI is a web application for facial recognition and analysis built with DeepFace. It offers an intuitive interface to upload images,…

DeepTraffic
DeepTraffic
Open Source Forensics

Deep Learning models for network traffic classification

DeepZero
DeepZero
Open Source Reverse Engineering

Find zero-days while you sleep. DeepZero is an automated vulnerability research framework that parses, decompiles, and analyzes thousands of…

DefaultCreds-cheat-sheet
DefaultCreds-cheat-sheet
Open Source Exploitation

One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️

DEFCON-31-Syscalls-Workshop
DEFCON-31-Syscalls-Workshop
Free Evasion Forensics

Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".

DEFCON-33
DEFCON-33
Free Exploitation Reverse Engineering

Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers

DefenderCheck
DefenderCheck
Open Source Evasion

Identifies the bytes that Microsoft Defender flags on.

DefenderYara
DefenderYara
Free Forensics

Extracted Yara rules from Windows Defender mpavbase and mpasbase

DefGen
DefGen
Open Source Kali

DefGen allows you to create your personalized HTML defacing webpage pre-integrated with CSS and JavaScript

defi-threat
defi-threat
Open Source Exploitation

a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations on decentralized finance

Deformed-Image-Restorer
Deformed-Image-Restorer
Open Source

CTFer的福音,Misc手的利器,自动爆破PNG图片宽高并一键修复离线脚本工具

Degate
Degate
Open Source Reverse Engineering

A modern and open-source cross-platform software for chips reverse engineering.

DeimosC2
DeimosC2
Open Source Exploitation Post-Exploitation

DeimosC2 is a Golang command and control framework for post-exploitation.

delsum
delsum
Open Source Reverse Engineering

A reverse engineer's checksum toolbox

deluder
deluder
Open Source Reverse Engineering

Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock and…

delvelin
delvelin
Free Exploitation

Delvelin is a Code Vulnerability Analyzer for Java and Kotlin that supports best practices in security and risk management.

dembrandt
dembrandt
Open Source Reverse Engineering

Extract any website’s design system into tokens in seconds: logo, colors, typography, borders & more. One command.

Deobfuscator
Deobfuscator
Open Source Reverse Engineering

Some deobfuscator for java lol

deobshell
deobshell
Open Source Forensics Reverse Engineering

Powershell script deobfuscation using AST in Python

deoptimizer
deoptimizer
Open Source Evasion

Evasion by machine code de-optimization.

dep-scan
dep-scan
Open Source Exploitation

OWASP dep-scan is a next-generation security and risk audit tool based on known vulnerabilities, advisories, and license limitations for pro…

destroylist
destroylist
Open Source Reconnaissance Social Engineering

Real-time phishing & scam domain blocklist — 130k+ curated threats, 888K+ community, free API, multiple formats

DestroyScammers
DestroyScammers
Open Source Forensics Reconnaissance

Scam intelligence, phishing attribution, drainer mapping. Legal OSINT only. Public data. Real cases. For researchers and victims.

Detect-It-Easy
Detect-It-Easy
Open Source Forensics Reverse Engineering

Program for determining types of files for Windows, Linux and MacOS.

detect-lkm-rootkit-cheatsheet
detect-lkm-rootkit-cheatsheet
Free Forensics

Cheat sheet to detect and remove linux kernel rootkit

dethrace
dethrace
Open Source Reverse Engineering

Reverse engineering the 1997 game "Carmageddon"

deutsch-lernen-goethe-a1-c2
deutsch-lernen-goethe-a1-c2
Free Post-Exploitation

Free Goethe-Zertifikat study materials for all CEFR levels (A1–C2) — vocabulary, grammar, reading, listening, speaking, writing, and mock ex…

DevBrute
DevBrute
Free Password Attacks

DevBrute is a versatile password brute forcing tool designed to tackle a wide range of Social Media accounts and Web Applications. With its …

devcontainer
devcontainer
Free

The Red Guild's devcontainer focused in web3 and security.

devguard
devguard
Free Exploitation Web Application

DevGuard Backend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate your Vul…

device-activity-tracker
device-activity-tracker
Free Exploitation

A phone number can reveal whether a device is active, in standby or offline (and more). This PoC demonstrates how delivery receipts + RTT ti…

DeviceCodePhishing
DeviceCodePhishing
Open Source Social Engineering

This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim ope…

Devil
Devil
Open Source Kali Exploitation

Devil is a tool that is basically made for facebook to Hack target accounts , BruteForce Attack , grab friendlist accounts , yahoo chacker ,…

DevilTwin-NodeMCU
DevilTwin-NodeMCU
Open Source Wireless

⚡ Perform Evil Twin Attack Using NodeMCU Board

Devious-WinRM
Devious-WinRM
Open Source

A Pentester's Powershell Client

devonthink-hacks
devonthink-hacks
Open Source Reconnaissance

Scripts and other things for working with DEVONthink, a personal information management system.

devops-tools
devops-tools
Free

Curated List of Best DevOps Tools

dewolf
dewolf
Open Source Reverse Engineering

A research decompiler implemented as a Binary Ninja plugin.

Dex-Editor-Android
Dex-Editor-Android
Open Source Reverse Engineering

A work in progress Android dalvik byte code(DEX) editor

dexcom-g7-apk-patcher
dexcom-g7-apk-patcher
Free Reverse Engineering

Dexcom G7 .apk patcher | ✅ AAPS Broadcasting ✅ Disable compatibility checks ✅ Enable Screenshots ✅ Decrease required android version

Dexplore
Dexplore
Open Source Reverse Engineering

A dex analyzer for finding obfuscated codes dynamically

Dexter
Dexter
Open Source Reverse Engineering

An advanced DEX editor for Android.

Dexterion
Dexterion
Open Source Exploitation

DFIR
DFIR
Free Forensics

This is a repository dedicated to the DFIR journey. Contains notes, reflections and links to tools.

DFIR-Detection-Engineering
DFIR-Detection-Engineering
Open Source Forensics

Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-forens…

DFIR-O365RC
DFIR-O365RC
Open Source Forensics

PowerShell module for Office 365 and Azure log collection

dfir-orc
dfir-orc
Open Source Forensics

Forensics artefact collection tool for systems running Microsoft Windows

DFIR4vSphere
DFIR4vSphere
Open Source Forensics

Powershell module for VMWare vSphere forensics

DFIRPowerShellScripts
DFIRPowerShellScripts
Open Source Forensics

Various PowerShells scripts I've made (or others have made) to automate some of the boring stuff in my everyday DFIR journey!

dfirtrack
dfirtrack
Free Forensics

DFIRTrack - The Incident Response Tracking Application

DFW1N-OSINT
DFW1N-OSINT
Open Source Forensics Reconnaissance

Australian Open Source Intelligence Gathering Resources, Austra…

dheater
dheater
Open Source

D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by e…

dhv
dhv
Open Source Reverse Engineering

DHV is a terminal-based tool for diving into Python code, giving easy visual access to bytecode disassembly and the abstract syntax tree. If…

Diablo
Diablo
Open Source Exploitation Scanning & Enumeration

Diablo ~ Hacking / Pentesting & Reporting

Diamorphine
Diamorphine
Free Exploitation

LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)

DiaSymbolView
DiaSymbolView
Open Source Reverse Engineering

You can download the binaries from the releases page. To build the tool yourself, follow instructions in Compiling.md

diccionarios
diccionarios
Open Source Password Attacks Scanning & Enumeration

Diccionarios de: usuarios, passwords, XSS, ficheros, carpetas, dorks, etc .. ( hackingyseguridad.com )

dictpress
dictpress
Open Source Password Attacks

A stand-alone web server application for building and publishing full fledged dictionary websites and APIs for any language.

DIE-engine
DIE-engine
Open Source Reverse Engineering

GUI & console sources for Detect It Easy(DiE): https://github.com/horsicq/Detect-It-Easy/

die-python
die-python
Open Source Forensics

Native Python3 bindings for @horsicq's Detect-It-Easy

Digital-Footprint-OSINT-Tool
Digital-Footprint-OSINT-Tool
Open Source Reconnaissance

A powerful Open Source Intelligence (OSINT) tool for analyzing digital footprints across multiple platforms. This tool helps researchers and…

digital-forensics-lab
digital-forensics-lab
Free Forensics

Free hands-on digital forensics labs for students and faculty

Digital-Forensics-Tools
Digital-Forensics-Tools
Open Source Kali Forensics Reconnaissance

A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in disk f…

digler
digler
Open Source Forensics

Digler is a tool for forensic disk analysis and file recovery. It's designed to help you unearth lost or deleted data from various disk imag…

dinvk
dinvk
Open Source Exploitation

Dynamically invoke arbitrary code in Rust

diodb
diodb
Free Web Application

Open-source vulnerability disclosure and bug bounty program database

dioterms
dioterms
Free Web Application

Open-source vulnerability disclosure policy templates.

dirplayer-rs
dirplayer-rs
Open Source Reverse Engineering

A web-compatible Shockwave Player emulator written in Rust

dirsearch
dirsearch
Free Exploitation Password Attacks

Disasmo
Disasmo
Open Source Reverse Engineering

VS2022 Add-in. Click on any method or class to see what .NET Core's JIT generates for them (ASM).

disassemble
disassemble
Open Source Reverse Engineering

A disassembler for JITed functions in Racket.

Discord-and-Telegram-OSINT-references
Discord-and-Telegram-OSINT-references
Free Reconnaissance

Small repo for Telegram and Discord OSINT and research

discord-link-phishing
discord-link-phishing
Free Social Engineering

Imitate discord's old login page! I AM NOT RESPONSIBLE FOR ANY CONSEQUENCES. FOR SECURITY TESTING PURPOSES ONLY

Discord-Twitch-Bot
Discord-Twitch-Bot
Free Exploitation

・Change prefix to whatever you want in config

DiscordOps-Monitor
DiscordOps-Monitor
Free Forensics

Host Guardian --- A lightweight system monitor bot for Discord that alerts on high CPU, shows top processes, and lets you safely terminate t…

DiscordRAT
DiscordRAT
Free Exploitation

Discord Remote Administration Tool fully written in Python3

discover
discover
Open Source Kali Exploitation Reconnaissance

Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creati…

distributed-jwt-cracker
distributed-jwt-cracker
Open Source Password Attacks Web Application

An experimental distributed JWT token cracker built using Node.js and ZeroMQ

DistroForensics
DistroForensics
Free Kali Forensics

Elenco di Distro LINUX - WINDOWS - MacOS

dittobytes
dittobytes
Open Source Evasion Exploitation

Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.

DivideAndScan
DivideAndScan
Open Source Scanning & Enumeration

Divide full port scan results and use it for targeted Nmap runs

DiztinGUIsh
DiztinGUIsh
Open Source Reverse Engineering

A Super NES ROM Disassembler and tracelog capture/analysis tool with a focus on collaborative workflow UX. Exports .asm files ready to be co…

dji-firmware-tools
dji-firmware-tools
Open Source Reverse Engineering

Tools for handling firmwares of DJI products, with focus on quadcopters.

DLest
DLest
Open Source Forensics

Microsoft Windows DLL Export Browser (Enumerate Exports, COM Methods and Properties) with Advanced Search Features.

dll-proxy-generator
dll-proxy-generator
Open Source Reverse Engineering

Creates a proxy dll which sits between the game and original dll

DLLHijackHunter
DLLHijackHunter
Open Source Exploitation Post-Exploitation

Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.

DllShimmer
DllShimmer
Free Exploitation Post-Exploitation

Weaponize DLL hijacking easily. Backdoor any function in any DLL.

DMG-CPU-Inside
DMG-CPU-Inside
Free Reverse Engineering

Reverse-engineered schematics for DMG-CPU-B

DNN-decompiler
DNN-decompiler
Free Reverse Engineering

BTD - Bin To DNN: A DNN Executables Decompiler

dns-blocklists
dns-blocklists
Open Source Reconnaissance Social Engineering

DNS-Blocklists: For a better internet - keep the internet clean!

DNS-collector
DNS-collector
Open Source Forensics Reconnaissance

Grab your DNS logs, detect anomalies, and finally understand what's happening on your network. The missing piece between DNS servers and you…

dns-servers
dns-servers
Open Source Reconnaissance Social Engineering

HaGeZi DNS: Free, Non-Commercial EU Public DNS Servers

DNS-Tunnel-Keylogger
DNS-Tunnel-Keylogger
Open Source Post-Exploitation Reconnaissance

Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.

dnsanity
dnsanity
Open Source Reconnaissance

High-performance DNS validator using template-based verification

dnsdumpster
dnsdumpster
Open Source Reconnaissance

A tool to perform DNS reconnaissance on target networks. Among the DNS information got from include subdomains, mx records, web application …

dnsgen
dnsgen
Open Source Reconnaissance

DNSGen is a powerful and flexible DNS name permutation tool designed for security researchers and penetration testers. It generates intellig…

DNSlivery
DNSlivery
Open Source Reconnaissance

Easy files and payloads delivery over DNS

dnsmonster
dnsmonster
Open Source Forensics Reconnaissance

Passive DNS Capture and Monitoring Toolkit

DNSrecon
DNSrecon
Open Source Kali Reconnaissance

DNS enumeration script supporting zone transfers, reverse lookups, SRV record enumeration, top-level domain expansion, and brute-force subdo…

dnstwist
dnstwist
Open Source Reconnaissance Scanning & Enumeration

Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation

dnstwister
dnstwister
Free Reconnaissance Social Engineering

Domain name permutation as a service

DNSWatch
DNSWatch
Open Source Kali Reconnaissance

DNSWatch - DNS Traffic Sniffer and Analyzer

dnsx
dnsx
Open Source Reconnaissance Scanning & Enumeration

Fast and multi-purpose DNS toolkit from ProjectDiscovery. Resolves domains, performs wildcard filtering, brute-forces subdomains, and extrac…

dnxfirewall
dnxfirewall
Open Source

DNXFIREWALL® and DAD'S NEXT-GEN FIREWALL™, a C/CPython hybrid next generation firewall built on top of Linux and bound to kernel/ netfilter …

DocEx
DocEx
Open Source Exploitation

APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files

docker_pwn_env
docker_pwn_env
Open Source

基于Ubuntu构建并用于快速调试pwn题的镜像,开箱即用,告别搭建环境的苦恼!

docker-ghidra
docker-ghidra
Open Source Reverse Engineering

Ghidra Client/Server Docker Image

docker-hashcat
docker-hashcat
Open Source Password Attacks

Latest hashcat docker for CUDA, OpenCL, and POCL. Deployed on Vast.ai

docker-osmedeus
docker-osmedeus
Open Source

Docker image for Osmedeus, a fully automated offensive security tool for reconnaissance and vulnerability scanning

docker-packing-box
docker-packing-box
Open Source Forensics Reverse Engineering

Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detectio…

docker-ssllabs-scan
docker-ssllabs-scan
Free

Qualys sslabs-scan utility in a tiny docker image

dockle
dockle
Open Source Exploitation

Container Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start

DocuFinderJS
DocuFinderJS
Open Source Reconnaissance

An external attack surface monitoring (EASM) tool to find externally accessible documents.

DogeRat
DogeRat
Free Social Engineering

A multifunctional Telegram based Android RAT without port forwarding.

Dojo-101
Dojo-101
Open Source Forensics Web Application

Offline Cybersecurity Knowledge Base

DojoLoader
DojoLoader
Open Source Evasion

Generic PE loader for fast prototyping evasion techniques

domain_generation_algorithms
domain_generation_algorithms
Open Source Reverse Engineering

Some results of my DGA reversing efforts

domain-digger
domain-digger
Open Source Reconnaissance

Full Toolkit for Next-Level Domain Analysis

domain-locker
domain-locker
Open Source Web Application

🌐 The all-in-one tool, for keeping track of your domain name portfolio. Got domain names? Get Domain Locker!

Domain-Response
Domain-Response
Open Source Reconnaissance Social Engineering

Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to automate…

domainthreat
domainthreat
Open Source Reconnaissance Social Engineering

Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping

DOMClobbering
DOMClobbering
Open Source Web Application

DOM Clobbering Wiki, Browser Testing, and Payload Generation

domhttpx
domhttpx
Open Source

domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with…

domloggerpp
domloggerpp
Open Source

A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.

DOMPurify
DOMPurify
Free Web Application

DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers …

domscan
domscan
Free Web Application

Simple tool to scan a website for (DOM-based) XSS vulnerabilities and Open Redirects.

Donut
Donut
Open Source Evasion Exploitation

Generates position-independent shellcode from .NET assemblies, PE files, scripts (VBScript, JScript), and XSL that runs in memory. Used to e…

DorkAgent
DorkAgent
Open Source Reconnaissance

🤖 LLM-powered agent for automated Google Dorking in bug hunting & pentesting.

DorkEye
DorkEye
Free Exploitation Reconnaissance

Automated Google Dorking Tool. Generates and runs advanced search queries for exposed files. It also tests SQLi, Analyzes and extracts metad…

DorkHub
DorkHub
Open Source Exploitation Reconnaissance

DorkHub is the security researcher's companion. It’s a comprehensive repository of Google dorks collected in one place, specifically designe…

DorkingDB
DorkingDB
Open Source Reconnaissance

Collection of dorking-related resources. Dorks lists, Cheatsheets, Articles, Databases. Google, Yahoo, Yandex, Bing, Baidu, DuckDuckGo, Brav…

dorks_hunter
dorks_hunter
Free Reconnaissance

Simple Google Dorks search tool

Dorks-collections-list
Dorks-collections-list
Free Reconnaissance

List of Github repositories and articles with list of dorks for different search engines

DOS-debug
DOS-debug
Free Reverse Engineering

Debug and DebugX (short: Debug/X) are extended versions of MS DEBUG

dotdotslash
dotdotslash
Free

Search for Directory Traversal Vulnerabilities

dotenv
dotenv
Open Source

Loads environment variables from .env for nodejs projects.

dotenvx
dotenvx
Open Source

a secure dotenv–from the creator of `dotenv`

DotKill-Unpacker
DotKill-Unpacker
Open Source Reverse Engineering

This program can remove Anti De4Dot, Junk Types, Math Protection, Anti Decompiler, Control Flow protections from a .NET assembly.

DoubleTeam
DoubleTeam
Free Post-Exploitation

Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports

doxcord
doxcord
Free Reconnaissance

osint tool for dumping links containing trackers from each user on one or all discords

DPAPISnoop
DPAPISnoop
Open Source Exploitation

A C# tool to output crackable DPAPI hashes from user MasterKeys

dpt-shell
dpt-shell
Open Source

An android Dex protection shell implementation

dpulse
dpulse
Open Source Reconnaissance

DPULSE - Tool for complex approach to domain OSINT

DraculaOS
DraculaOS
Free Kali Reconnaissance

Dracula OS is a Linux operating system meticulously designed for OSINT (Open Source Intelligence) and Cyber ​​Intelligence missions.

Dradis Framework
Dradis Framework
Freemium Kali Reporting

Collaboration and reporting platform for security assessments. Centralizes findings, enables team collaboration, imports results from Nmap, …

dradis-ce
dradis-ce
Open Source

Dradis Framework: Collaboration and reporting for IT Security teams

Dragodis
Dragodis
Free Forensics Reverse Engineering

Dragodis is a Python framework which allows for the creation of universal disassembler scripts.

drakvuf
drakvuf
Free Forensics

DRAKVUF Black-box Binary Analysis

drakvuf-sandbox
drakvuf-sandbox
Free Forensics Reverse Engineering

DRAKVUF Sandbox - automated hypervisor-level malware analysis system

DreamWalkers
DreamWalkers
Free Exploitation

Reflective shellcode loaderwith advanced call stack spoofing and .NET support.

DriveFS-Sleuth
DriveFS-Sleuth
Free Forensics

DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based on r…

DriverBuddyReloaded
DriverBuddyReloaded
Open Source Reverse Engineering

Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks

droidground
droidground
Open Source

A flexible playground for Android CTF challenges.

dronesploit
dronesploit
Open Source

Drone pentesting framework console

Droopescan
Droopescan
Open Source Web Application

Plugin-based scanner that aids security researchers in identifying issues with Drupal, SilverStripe, and WordPress sites. Detects plugins, t…

drozer
drozer
Free

The Leading Security Assessment Framework for Android.

drozer-agent
drozer-agent
Open Source

The Android Agent for the Drozer Security Assessment Framework.

DSInternals
DSInternals
Open Source Post-Exploitation Reconnaissance

Directory Services Internals (DSInternals) PowerShell Module and Framework

dtk-template
dtk-template
Free Reverse Engineering

Project template for decomp-toolkit

ducky-virus
ducky-virus
Open Source Kali Exploitation

Android shell virus that will reset, brick and corrupt the Android device with a link, also contains Antivirus and now supports Android 10+

DuckyScriptPayloads
DuckyScriptPayloads
Free

A collection of Ducky scripts to be used in a Hak5 Rubber Ducky or Flipper Zero

Duolingo-Hacks
Duolingo-Hacks
Open Source Exploitation

Duolingo Hacks One of the best Duolingo hacks. Discord Support Server: https://discord.gg/abqMVbDanB…

Duolingo-Unlimited-Hearts
Duolingo-Unlimited-Hearts
Open Source Exploitation

Grants Duolingo Max and other paid features for free + more

DuplexSpyCS
DuplexSpyCS
Open Source

An open-source, C#-based remote administration tool (RAT), enabling complete control of a remote Windows machine, designed for legitimate re…

duplicut
duplicut
Open Source Password Attacks

Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)

DVBLab
DVBLab
Free

This course uses a deliberately vulnerable banking application to demonstrate common security vulnerabilities, their impact, and how to fix …

DVWA
DVWA
Open Source Exploitation

Damn Vulnerable Web Application (DVWA)

Dwarf
Dwarf
Open Source Reverse Engineering

Full featured multi arch/os debugger built on top of PyQt5 and frida

dwpa
dwpa
Open Source Password Attacks Wireless

To install dwpa on your server, please refer to INSTALL.md

dynamorio
dynamorio
Free Reverse Engineering

Dynamic Instrumentation Tool Platform

dyninst
dyninst
Open Source Reverse Engineering

DyninstAPI: Tools for binary instrumentation, analysis, and modification.

dystopia-c2
dystopia-c2
Open Source Post-Exploitation

Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s

dz6
dz6
Open Source Forensics Reverse Engineering

Fast Vim-inspired TUI hex editor

E4GL30S1NT
E4GL30S1NT
Open Source Reconnaissance

E4GL30S1NT - Simple Information Gathering Tool

e9patch
e9patch
Open Source Reverse Engineering

A powerful static binary rewriting tool

EACBypass-CR3ReadyDrv
EACBypass-CR3ReadyDrv
Free Exploitation

This is my EAC Bypass (Setup) Driver that offers an undetected communication and callback handler/hooking system through IOCTL.

EagleVM
EagleVM
Open Source Evasion Reverse Engineering

Native code virtualizer for x64 binaries

EasY_HaCk
EasY_HaCk
Open Source Exploitation Scanning & Enumeration

1. Hack the World using Termux this tool is developed by sabri.zaki for penetration testing using 2. metasploit-framework 3. sqlmap 4. nmap …

easyg
easyg
Free

Here I gather all the resources about hacking that I find interesting

eBPF-for-Ghidra
eBPF-for-Ghidra
Open Source Reverse Engineering

The extension implements eBPF architecture support for Ghidra and allows for disassembly and decompilation of eBPF programs.

ecdsa-keyrec
ecdsa-keyrec
Open Source

ECDSA nonce-reuse attack to recover a private key.

echoCTF.RED
echoCTF.RED
Open Source

A platform to develop, run and administer CTF competitions. This is the online echoCTF.RED platform source code

EchoPhish
EchoPhish
Open Source Social Engineering

EchoPhish is a phishing tool created specifically for Instagram, designed to bypass two-factor authentication (2FA).

EchoStrike
EchoStrike
Open Source Exploitation

Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operations.

eCPPTv2-PTP-Notes
eCPPTv2-PTP-Notes
Open Source

INE/eLearnSecurity Certified Professional Penetration Tester (eCPPT) / PTP v2 and v3 Notes

eCPPTv3-Notes
eCPPTv3-Notes
Open Source Exploitation Post-Exploitation

INE/eLearnSecurity Certified Professional Penetration Tester (eCPPT) / PTP v2 and v3 Notes

edb-debugger
edb-debugger
Open Source Reverse Engineering

edb is a cross-platform AArch32/x86/x86-64 debugger.

eDBG
eDBG
Open Source Reverse Engineering

eBPF-based lightweight debugger for Android with MCP support

edge
edge
Free

Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.

EDR-GhostLocker
EDR-GhostLocker
Open Source Evasion Forensics

AppLocker-Based EDR Neutralization

EDRHunt
EDRHunt
Open Source

Scan installed EDRs and AVs on Windows

efiSeek
efiSeek
Open Source Reverse Engineering

Ghidra analyzer for UEFI firmware.

efiXplorer
efiXplorer
Open Source Reverse Engineering

IDA plugin and loader for UEFI firmware analysis and reverse engineering automation

Egyscan
Egyscan
Open Source Exploitation Web Application

Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify your web applications against malici…

eJPT-notes
eJPT-notes
Free Scanning & Enumeration

Notes I took while preparing for eJPT certification by INE Security (passed 19/20, fka eLearn Security)

ejpt-roadmap
ejpt-roadmap
Free Exploitation

This repository contains a roadmap for preparing for the EJPTv2 exam.

ElectricEye
ElectricEye
Open Source

ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring suppo…

elegant-bouncer
elegant-bouncer
Free Forensics

ELEGANTBOUNCER is a detection tool for file-based mobile exploits.

elevation-of-privilege
elevation-of-privilege
Open Source Web Application

An online multiplayer version of the threat modeling card games: Elevation of Privilege (EoP), OWASP Cornucopia, OWASP Cumulus, and Elevatio…

elf
elf
Open Source Reverse Engineering

:gem: Go library to parse Executable and Linkable Format (ELF) files.

eloizer
eloizer
Open Source

Static analyzer tool for Solana

elpscrk
elpscrk
Open Source Password Attacks

An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S01E0…

email-concealer
email-concealer
Open Source Evasion

Conceal e-mail addresses in a string by replacing their domain

Email-Username-OSINT
Email-Username-OSINT
Free Reconnaissance

Some great resources to gather OSINT on Email Addresses & Usernames. Alternatively check the exposure of your Email & Username.

Email-Vulnerability-Checker
Email-Vulnerability-Checker
Open Source Web Application

Find Email Spoofing Vulnerablity of domains

email2phonenumber
email2phonenumber
Open Source Reconnaissance

A OSINT tool to obtain a target's phone number just by having his email address

EmailAnalyzer
EmailAnalyzer
Open Source Forensics

With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can generat…

emba
emba
Open Source Reverse Engineering Scanning & Enumeration

EMBA - The firmware security analyzer

embark
embark
Open Source

EMBArk - The firmware security scanning environment

Embedded-Hacking
Embedded-Hacking
Open Source Reverse Engineering

A FREE comprehensive step-by-step embedded hacking course covering Embedded Software Development to Reverse Engineering.

EmberHeart_OnePlus11
EmberHeart_OnePlus11
Free

OnePlus 11 EmberHeart kernel with Nethunter, KernelSU-Next and SuSFS

emilpro
emilpro
Open Source Reverse Engineering

Graphical disassembler for multiple architectures for easy navigation

Emora-Project
Emora-Project
Free Reconnaissance

Emora is an OSINT tool like sherlock but with a GUI, which search for accounts by username across social networks

emp3r0r
emp3r0r
Open Source Exploitation Post-Exploitation

Self‑healing Gossip Mesh C2 with Assisted Peer Discovery, Modular Post‑Exploitation, and OPSEC‑Focused Transport

empirectf
empirectf
Free Exploitation Reverse Engineering

EmpireCTF – write-ups, capture the flag, cybersecurity

emploleaks
emploleaks
Free Exploitation Reconnaissance

An OSINT tool that helps detect members of a company with leaked credentials

emudbg
emudbg
Free Reverse Engineering

A fast Windows emulator + debugger for reverse engineering. Runs any executable in debug mode, disassembles with Zydis, emulates instruction…

emuit
emuit
Open Source Forensics Reverse Engineering

Easy-to-use IDA plugin for code emulation

emulator
emulator
Free Reverse Engineering

A simple emulator for Windows designed for reverse engineering, testing binary files, and execution logging.

emulator-Intel-4004
emulator-Intel-4004
Open Source Reverse Engineering

Simple emulator of the Intel 4004 chip.

EnableWindowsLogSettings
EnableWindowsLogSettings
Open Source Forensics

Documentation and scripts to properly enable Windows event logs.

encpipe
encpipe
Free

The dum^H^H^Hsimplest encryption tool in the world.

encrypt-storage
encrypt-storage
Open Source

EncryptStorage provide a little more security in frontend

EndPointer
EndPointer
Open Source Reconnaissance

This is the open sourced code for the extension, EndPointer

Eneio64-Driver-Exploits
Eneio64-Driver-Exploits
Free Exploitation

A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W

EnhancedBurpGPT
EnhancedBurpGPT
Open Source Exploitation Scanning & Enumeration

Enhanced BurpGPT 是一个强大的 Burp Suite 插件。通过分析指定的 HTTP 请求和响应,帮助安全测试人员更快速地发现潜在的安全漏洞。

EnigmaCracker
EnigmaCracker
Open Source Password Attacks

EnigmaCracker is a tool for brute forcing crypto wallets

ENScan_GO
ENScan_GO
Open Source Exploitation

一款基于各大企业信息API的工具,解决在遇到的各种针对国内企业信息收集难题。一键收集控股公司ICP备案、APP、小程序、微信公众号等信息聚合导出。支持MCP接入

Ensemble
Ensemble
Open Source Exploitation Web Application

A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting to s…

EntityFramework-Reverse-POCO-Code-First-Generator
EntityFramework-Reverse-POCO-Code-First-Generator
Free Reverse Engineering

EntityFramework Reverse POCO Code First Generator - Beautifully generated code that is fully customisable. This generator creates code as if…

EntraTokenAid
EntraTokenAid
Open Source

A pure PowerShell solution for Entra OAuth authentication, enabling easy retrieval of access and refresh tokens

entropy
entropy
Open Source Forensics

CLI program to calculate the entropy of files

enum4linux
enum4linux
Open Source Kali Scanning & Enumeration

Linux alternative to enum.exe for enumerating data from Windows and Samba systems. Extracts usernames, shares, workgroup info, password poli…

enum4linux-ng
enum4linux-ng
Open Source Kali Scanning & Enumeration

Next-generation rewrite of enum4linux with YAML/JSON output, improved reliability, and additional checks for modern Windows environments.

enum4linux-ng
enum4linux-ng
Open Source Scanning & Enumeration

A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for securit…

enumdb
enumdb
Open Source Password Attacks Post-Exploitation

Relational database brute force and post exploitation tool for MySQL and MSSQL

epagneul
epagneul
Free Forensics

Graph Visualization for windows event logs

EPI
EPI
Free Exploitation

Threadless Process Injection through entry point hijacking

epic
epic
Free Evasion Exploitation

PIC shellcode (C/C++) development toolkit designed for malware developers.

epicgames-freegames-node
epicgames-freegames-node
Open Source Reverse Engineering

Automatically login and find available free games the Epic Games Store. Sends you a prepopulated checkout link so you can complete the check…

eraser
eraser
Open Source Scanning & Enumeration

🧹 Cleaning up images from Kubernetes nodes

ERC.Xdbg
ERC.Xdbg
Open Source Exploitation

An Xdbg Plugin of the ERC Library.

Erebus
Erebus
Open Source Exploitation

Erebus is an Initial Access wrapper for the Mythic Command & Control Server. It converts existing Mythic shellcode into payloads specificall…

Eruditus
Eruditus
Open Source

Erupe
Erupe
Open Source Reverse Engineering

Open-source Monster Hunter Frontier Online server emulator in Go

eslint-plugin-no-secrets
eslint-plugin-no-secrets
Open Source

An eslint plugin to find strings that might be secrets/credentials

ESP-HACK
ESP-HACK
Open Source Wireless

Open Source ESP32 Project for Pentesting.

ESP32-Deauther
ESP32-Deauther
Open Source

A project for the ESP32 that allows you to deauthenticate stations connected to WiFi networks

ESP32-DIV
ESP32-DIV
Open Source Wireless

ESP32DIV is a multi-purpose wireless testing toolkit powered by an ESP32

ESP32-reversing
ESP32-reversing
Open Source Reverse Engineering

A curated list of ESP32 related reversing resources

ESP32-Sour-Apple
ESP32-Sour-Apple
Open Source Exploitation Wireless

Crashes iOS 17 Devices using really any device

ESP32WifiPhisher
ESP32WifiPhisher
Free Wireless

WifiPhisher implementation on ESP32

esxi-testing-toolkit
esxi-testing-toolkit
Open Source

🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.

ethereum-lists
ethereum-lists
Open Source Social Engineering

A repository for maintaining lists of things like malicious URLs, fake token addresses, and so forth. We love lists.

Ethereum-Wallet-Cracker
Ethereum-Wallet-Cracker
Open Source Password Attacks Scanning & Enumeration

A fun script to steal Ether from wallets suffering from insufficient entropy during key generation.

ethereum-wallet-generator
ethereum-wallet-generator
Free Password Attacks

Blazing fast multiple Ethereum and Crypto vanity wallet generator💰 Generate a ten thousand beautiful crypto wallets in a sec ⚡️🎨 Awesome eth…

EtherGhost
EtherGhost
Open Source Post-Exploitation

新一代Webshell管理器,兼容蚁剑与冰蝎的PHP webshell

Ethical_Hacking_and_Penetration_Testing
Ethical_Hacking_and_Penetration_Testing
Open Source Exploitation

This repository is all about tips on ethical hacking and penetration testing!

Ethical-Hacking-Projects-for-beginners
Ethical-Hacking-Projects-for-beginners
Free

Hands-on ethical hacking projects for beginners, covering network scanning, web app testing, password cracking, honeypots, Wi-Fi auditing, p…

Ethical-Hacking-Roadmap
Ethical-Hacking-Roadmap
Open Source

A comprehensive guide for anyone looking to learn penetration testing and ethical hacking — from beginner to advanced. You'll find a structu…

Ethical-Hacking-Roadmap
Ethical-Hacking-Roadmap
Free Kali

this repo contains complete road map For become a Ethical Hacker For completely for free. Share this repo with your Friends.

ethical-hacking-tools-python
ethical-hacking-tools-python
Open Source Reconnaissance

Python programs & tools built in the Ethical Hacking with Python EBook

EVA
EVA
Free Post-Exploitation

EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, contextu…

Evanesco
Evanesco
Open Source

Hide any window from screen capture on Windows.

Evil-BW16-WebUI
Evil-BW16-WebUI
Open Source

Evil-BW16-WebUI is a dual-band (2.4GHz/5GHz) WiFi deauthentication tool for BW16 and ESP32 boards, featuring real-time monitoring, a web-bas…

Evil-WinRM
Evil-WinRM
Open Source Kali Exploitation Post-Exploitation

Full-featured WinRM shell for hacking and penetration testing. Supports pass-the-hash, file upload/download, in-memory script loading, and P…

evil-winrm
evil-winrm
Open Source Kali Post-Exploitation

The ultimate WinRM shell for hacking/pentesting

evil-winrm-py
evil-winrm-py
Open Source Post-Exploitation

Execute commands interactively on remote Windows machines using the WinRM protocol (just faster)

evilbot
evilbot
Free Exploitation

, stake.us, primedice bot by me with ❤

Evilginx2
Evilginx2
Open Source Social Engineering Web Application

Standalone man-in-the-middle attack framework that bypasses 2FA by proxying authentication sessions and capturing session cookies. Uses phis…

evilginx2-TTPs
evilginx2-TTPs
Open Source Social Engineering

Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and not…

Evilginx3-Phishlets
Evilginx3-Phishlets
Free Kali Social Engineering

This repository provides penetration testers and red teams with an extensive collection of dynamic phishing templates designed specifically …

evillimiter
evillimiter
Open Source

Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access

EvilnoVNC
EvilnoVNC
Open Source Social Engineering

evilscan
evilscan
Open Source Scanning & Enumeration

Features -------- individual IP or IP range scan individual port, ports list, or ports range banner grabbing (not fully implemented, works w…

eviltree
eviltree
Open Source Post-Exploitation

A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highlight…

evilwaf
evilwaf
Free Exploitation

evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).

evm
evm
Open Source Reverse Engineering

A Symbolic Ethereum Virtual Machine (EVM) bytecode interpreter, parser and decompiler, along with several other utils for programmatically e…

EVTX-to-MITRE-Attack
EVTX-to-MITRE-Attack
Free Exploitation

Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.

evtx2es
evtx2es
Open Source Forensics

A fast library for parsing and importing Windows Event Logs into Elasticsearch.

eWPTv2-Notes
eWPTv2-Notes
Open Source Exploitation Web Application

INE/eLearnSecurity Web Application Penetration Tester (eWPTv2) Notes

exaPhisher
exaPhisher
Free Social Engineering

🐟 Social Media Phishing Suite written in python & php

exchange-penetration-testing
exchange-penetration-testing
Free Exploitation

The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)

Exe-Spy
Exe-Spy
Open Source Forensics

ExeSpy is a cross-platform PE viewer for EXE and DLL files

Exegol
Exegol
Free

Fully featured and community-driven hacking environment

Exela-V2.0
Exela-V2.0
Open Source Exploitation

Exif
Exif
Open Source Reconnaissance

ExifTool is a powerful command-line tool that can be used to extract and edit metadata in a wide range of media files, including images, aud…

exifLooter
exifLooter
Open Source Exploitation Reconnaissance

ExifLooter finds geolocation on all image urls and directories also integrates with OpenStreetMap

ExifTool
ExifTool
Open Source Kali Forensics Reconnaissance

Platform-independent Perl library and command-line tool for reading, writing, and editing metadata in a wide variety of files including phot…

exiftool-web
exiftool-web
Free Reconnaissance

exiftool (OSINT image metadata utility) in the browser (via WebAssembly!)

exploit
exploit
Open Source Post-Exploitation Reconnaissance

This is An Offensive Hacking Tool which can be used by hackers and for penetration testing purposes. Hack Responsibly!!!!!!!

exploit-CVE-2021-22204
exploit-CVE-2021-22204
Free Exploitation

Exploit for CVE-2021-22204 (ExifTool) - Arbitrary Code Execution

exploit-pattern
exploit-pattern
Free Exploitation

generate and search pattern string for exploit development

exploit-writing-for-oswe
exploit-writing-for-oswe
Free Exploitation Web Application

Tips on how to write exploit scripts (faster!)

ExploitAddr
ExploitAddr
Open Source Exploitation

Find website ips addresses and website ip behind cloudflare.

exploitation-grimoire
exploitation-grimoire
Open Source Exploitation Reverse Engineering

Knowledge Base of Exploitation Techniques

ExploitDB / SearchSploit
ExploitDB / SearchSploit
Open Source Kali Exploitation

Archive of public exploits and vulnerable software maintained by Offensive Security. SearchSploit provides offline command-line search of th…

exploitnotes
exploitnotes
Free Exploitation

exposelab
exposelab
Open Source Exploitation Post-Exploitation

This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.

exposor
exposor
Open Source Exploitation Reconnaissance

Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.

exrop
exrop
Open Source Exploitation Reverse Engineering

Automatic ROP chain generator for x86-64 binaries, powered by Triton symbolic execution.

ext-remover
ext-remover
Open Source Exploitation

A curated list of exploits for ChromeOS

ExternalAttacker-MCP
ExternalAttacker-MCP
Free Web Application

A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.

extract_otp_secrets
extract_otp_secrets
Open Source

Extract one time password (OTP) secrets from QR codes exported by two-factor authentication (2FA) apps such as "Google Authenticator". The e…

ExtractBitlockerKeys
ExtractBitlockerKeys
Open Source Post-Exploitation

A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.

eye_of_web
eye_of_web
Open Source Reconnaissance

State of the art OSINT tool. | A powerful open-source alternative to other face search engines.

eyeballer
eyeballer
Open Source

Convolutional neural network for analyzing pentest screenshots

EyeSpy
EyeSpy
Open Source Exploitation Reconnaissance

EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.

EyeWitness
EyeWitness
Open Source Kali Reconnaissance Web Application

Takes screenshots of web pages, RDP, and VNC services. Reports on default credentials and interesting headers. Useful for rapidly assessing …

ezXSS
ezXSS
Open Source Exploitation Web Application

ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.

f8x
f8x
Open Source

红/蓝队环境自动化部署工具 | Red/Blue team environment automation deployment tool

fa
fa
Open Source Reverse Engineering

Automation tool for locating symbols & structs in binary (primary IDA focused)

fabric
fabric
Open Source

An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as-Co…

fabric8-analytics-vscode-extension
fabric8-analytics-vscode-extension
Open Source Exploitation

Red Hat Dependency Analytics extension

Facad1ng
Facad1ng
Open Source Social Engineering

Open-source URL masking & analysis tool for security research, phishing awareness, and defensive testing. Demonstrates adversary techniques …

facebook_hack
facebook_hack
Open Source Kali

This Is A Danger Tool Use Your Brane And Run This Script (NO SYSTEM IS SAFE ) DEVELOPER = AKASHBLACKHAT) facebook brutforce attack toolFACEB…

facebook_login_page
facebook_login_page
Free Social Engineering

FACEBOOK FAKE LOGIN PAGE

Facebook-BugBounty-Writeups
Facebook-BugBounty-Writeups
Free Web Application

Collection of Facebook Bug Bounty Writeups

Facemash
Facemash
Free Password Attacks

Facemash: A Python-forged, AI-driven beast that obliterates Facebook accounts with ruthless brute force. Crafted for cybersecurity research,…

faction
faction
Open Source

Pen Test Report Generation and Assessment Collaboration

fadec
fadec
Open Source Reverse Engineering

A fast and lightweight decoder for x86 and x86-64 and encoder for x86-64.

fail2ban
fail2ban
Free

Daemon to ban hosts that cause multiple authentication errors

FakeHTTP
FakeHTTP
Open Source Evasion

Obfuscate all your TCP connections into HTTP protocol.

falcon
falcon
Open Source Reverse Engineering

Binary Analysis Framework in Rust

fallout2-re
fallout2-re
Free Reverse Engineering

In this repository you'll find reverse engineered source code for Fallout 2.

fallparams
fallparams
Open Source Password Attacks Web Application

Find All Parameters - Tool to crawl pages, find potential parameters and generate a custom target parameter wordlist

fame
fame
Open Source Forensics

FAME Automates Malware Evaluation

fame_modules
fame_modules
Open Source Forensics

This repository is automatically added to all FAME installations.

Faraday
Faraday
Freemium Kali Reporting

Integrated multi-user pentest environment for collaborative penetration testing. Aggregates tool output in real-time, manages vulnerabilitie…

faraday
faraday
Open Source Kali Exploitation Scanning & Enumeration

Open Source Vulnerability Management Platform

farhan_wifihack
farhan_wifihack
Open Source Wireless

Hack wifi using termux (rooted).

FastCVE
FastCVE
Open Source Exploitation Scanning & Enumeration

FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.

fastfinder
fastfinder
Free Forensics

Incident Response - Fast suspicious file finder

fatcat
fatcat
Open Source Forensics

FAT filesystems explore, extract, repair, and forensic tool

faultycat
faultycat
Free

Faulty Cat is a low-cost Electromagnetic Fault Injection (EMFI) tool, designed specifically for self-study and hobbiest research.

fav-up
fav-up
Open Source Reconnaissance

IP lookup by favicon using Shodan

favicorn
favicorn
Open Source Exploitation Post-Exploitation

All-sources tool to search websites by favicons

favihunter
favihunter
Open Source Reconnaissance

Discover and monitor internet assets using favicon hashes across search engines.

favirecon
favirecon
Open Source Reconnaissance Web Application

Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.

FB-BRUTE
FB-BRUTE
Open Source Password Attacks

About Bruteforce attack on Facebook account using python script

fback
fback
Open Source Password Attacks Web Application

Fback is a tool that helps you create target-specific wordlists using a .json pattern.

fbhackver2.7
fbhackver2.7
Open Source Kali

~~~ >> This tool is made from the python language which means more efficiency and accurate .. ~~~

FBI_Watchdog
FBI_Watchdog
Open Source Reconnaissance

FBI Watchdog is a multi-layered domain monitoring tool that detects law enforcement seizures, DNS changes, HTTP fingerprint shifts, WHOIS re…

FBI-tools
FBI-tools
Free Forensics Reconnaissance

🕵️ OSINT Tools for gathering information and actions forensics 🕵️

FCaptcha
FCaptcha
Open Source Web Application

Detect bots, vision AI agents, and headless browsers through 40+ behavioral signals and SHA-256 proof of work. Self-hosted, privacy-first, a…

fencer
fencer
Open Source Exploitation Web Application

Automated API security testing

Fenjing
Fenjing
Open Source

专为CTF设计的Jinja2 SSTI全自动绕WAF脚本 | A Jinja2 SSTI cracker for bypassing WAF, designed for CTF

fernflower
fernflower
Open Source Reverse Engineering

Decompiler from Java bytecode to Java, used in IntelliJ IDEA.

Feroxbuster
Feroxbuster
Open Source Kali Scanning & Enumeration Web Application

Fast, recursive content discovery tool written in Rust. Performs automatic recursive scanning and handles redirects, filters, and parallel s…

fetchmeurls
fetchmeurls
Open Source Reconnaissance

A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectors…

FF8_demaster
FF8_demaster
Open Source Reverse Engineering

Unofficial Final Fantasy VIII Remastered core mod based on import-dependency DLL that updates the gamecode and fixes issues left by develope…

ffuf
ffuf
Open Source Kali Scanning & Enumeration Web Application

Fast web fuzzer written in Go. Supports directory discovery, parameter fuzzing, virtual host discovery, POST data fuzzing, and custom header…

ffuf
ffuf
Open Source Kali Scanning & Enumeration

_or_ - If you are on macOS with homebrew, ffuf can be installed with: brew install ffuf _or_ - If you have recent go compiler installed: go …

ffufPostprocessing
ffufPostprocessing
Free Exploitation

Golang tool which helps dropping the irrelevant entries from your ffuf result file.

fhex
fhex
Open Source Reverse Engineering

A Full-Featured HexEditor compatible with Linux/Windows/MacOS

Fierce
Fierce
Open Source Kali Reconnaissance

DNS reconnaissance tool for locating non-contiguous IP space and hostnames against specified domains. Performs zone transfers, brute-force, …

fierce
fierce
Open Source Reconnaissance

A DNS reconnaissance tool for locating non-contiguous IP space.

fileless-elf-exec
fileless-elf-exec
Open Source Exploitation

Execute ELF files without dropping them on disk

FileTrove
FileTrove
Open Source Forensics

FileTrove indexes files and creates metadata from them.

FileTypeChecker
FileTypeChecker
Open Source

Secure file type validation for .NET applications using magic number detection

fim
fim
Open Source

FIM is an Open Source Host-based file integrity monitoring tool that performs file system analysis, file integrity checking, real time alert…

FinalRecon
FinalRecon
Open Source Reconnaissance

finch
finch
Open Source

Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act on…

find-gh-poc
find-gh-poc
Open Source Exploitation

Find-gh-poc …

findcdn
findcdn
Free Reconnaissance Scanning & Enumeration

findCDN is a tool created to help accurately identify what CDN a domain is using.

FinderOuter
FinderOuter
Open Source Password Attacks

Easy to use bitcoin recovery tool to fix damaged private key, mini-private key, address, BIP38 encrypted key, mnemonic (seed phrase), BIP-32…

FindEverything
FindEverything
Open Source

当对内网束手无策的时候,入口机器上面说不定藏着突破口,翻找本地的文件和建立的网络连接就是手法

findme
findme
Open Source Reconnaissance

FindME is a CLI tool for searching social media and online profiles linked to a username. It’s ideal for reconnaissance, digital footprint v…

findmytakeover
findmytakeover
Open Source Reconnaissance

find dangling domains in a multi cloud environment

Findomain
Findomain
Open Source Reconnaissance

The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, subdo…

fingerprint
fingerprint
Open Source Forensics

Monitoring Registry and File Changes in Windows

Fingerprinter
Fingerprinter
Free

CMS/LMS/Library etc Versions Fingerprinter

fingers
fingers
Free

ALLINONE framework and technology detect lib

Firecrack
Firecrack
Free

:fire: Firecrack pentest tools: Facebook hacking random attack, deface, admin finder, bing dorking:

firefly
firefly
Free Scanning & Enumeration Web Application

Black box fuzzer for web applications

FireFly
FireFly
Open Source Kali Reconnaissance

1. Go To https://numverify.com. And get your API key from there. 🔑 2. Add your API key to the config.json file. 🔧 3. Install Libraries: pip …

firegex
firegex
Open Source

Firegex, a firewall for Attack-Defense CTFs

firewall-java
firewall-java
Free Exploitation

Zen protects your Java app against attacks with one line of code. Get peace of mind— at runtime.

firewall-node
firewall-node
Free Exploitation

Zen protects your Node app against attacks with one line of code. Get peace of mind— at runtime.

firmware-analysis-toolkit
firmware-analysis-toolkit
Open Source Reverse Engineering Scanning & Enumeration

Toolkit to emulate firmware and analyse it for security vulnerabilities

FISSURE
FISSURE
Open Source Reverse Engineering Wireless

The RF and reverse engineering framework for everyone. Follow and ★ to show your support!

fit
fit
Open Source Forensics

FIT is a modular suite of Python applications for digital forensic acquisition of online contents such as web pages, emails, social media, a…

fjta
fjta
Open Source Forensics

FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), generat…

flare-fakenet-ng
flare-fakenet-ng
Open Source Forensics

FakeNet-NG - Next Generation Dynamic Network Analysis Tool

flare-floss
flare-floss
Open Source Forensics

FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.

flare-learning-hub
flare-learning-hub
Open Source Forensics Reverse Engineering

Free educational content on reverse engineering and malware analysis from the FLARE team

Flare-On-Challenges
Flare-On-Challenges
Free Forensics Reverse Engineering

This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.

flare-vm
flare-vm
Open Source Forensics Reverse Engineering

A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering enviro…

FlashFuzz
FlashFuzz
Open Source Reconnaissance

Quickly fuzz URLs and scan for secrets directly in your browser tabs

flashingestor
flashingestor
Open Source Exploitation Post-Exploitation

A TUI for Active Directory collection.

Flask-Unsign
Flask-Unsign
Open Source

Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.

flawz
flawz
Open Source Exploitation

A Terminal UI for browsing security vulnerabilities (CVEs)

fleex
fleex
Open Source Web Application

Fleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.

Flipper Zero
Flipper Zero
Open Source Reconnaissance Wireless

Portable multi-tool for hardware hacking. Supports Sub-GHz radio, 125kHz RFID, NFC, Infrared, iButton, Bluetooth, GPIO, and USB. Runs open-s…

flipper-addons
flipper-addons
Free

Flipper addons by Electronic Cats

flipper-zero-backpacks
flipper-zero-backpacks
Free Wireless

Backpack-style addon boards for the Flipper Zero!

Flipper-Zero-Scripts
Flipper-Zero-Scripts
Free Reconnaissance

Collection of Flipper Zero scripts dumps and tools

FlipperZero_Stuff
FlipperZero_Stuff
Free Wireless

My collection of IR, Sub-Ghz, remotes, links and other misc files related to the Flipper Zero device

flipperzero-evil-portal
flipperzero-evil-portal
Open Source Wireless

Evil portal app for the flipper zero + WiFi dev board, Works on OFW, better on RM!

FlipperZero-GooglePortal
FlipperZero-GooglePortal
Open Source Social Engineering

A 1:1 realistic Google captive portal for Phishing on a Flipper-Zero (EvilPortal)🐬👾.

FLOCK
FLOCK
Free Reconnaissance

Surveillance camera network map - 336K+ cameras worldwide with inter-agency data sharing visualization

FlowAnalyzer
FlowAnalyzer
Open Source Exploitation

FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).

flowintel
flowintel
Open Source Forensics

An open source platform to support analysts to organise their case and tasks

FlowSage
FlowSage
Free Forensics

一款专为 CTF 竞赛设计的智能流量分析工具,支持多协议解析与自动化 Flag 提取,助力快速解题。

flowsint
flowsint
Open Source Reconnaissance

A modern platform for visual, flexible, and extensible graph-based investigations. For cybersecurity analysts and investigators.

fluffy-barnacle
fluffy-barnacle
Open Source Exploitation

Disposable, ephemeral network infrastructure powered by GitHub Codespaces.

FluxER
FluxER
Open Source Kali Social Engineering Wireless

FluxER - The bash script which installs and runs the Fluxion tool inside Termux. The wireless security auditing tool used to perform WPA/WPA…

fluxion
fluxion
Free Exploitation Scanning & Enumeration

Unified Vulnerability Intelligence Platform

fluxion
fluxion
Open Source Kali Social Engineering Wireless

Fluxion is a remake of linset by vk496 with enhanced functionality.

fofa_viewer
fofa_viewer
Open Source Exploitation

A simple FOFA client written in JavaFX. Made by WgpSec, Maintained by f1ashine.

fofaEX
fofaEX
Open Source Exploitation

FOFA EX 是一款基于fofa api(也可导入鹰图、夸克文件)实现的红队综合利用工具,可基于模板把工具作为插件进行集成,自动化进行资产探测,目前提供的插件功能如下:探活、 nuclei 模板扫描、IP反查域名、域名反查 ICP 备案、dismap 指纹扫描

FofaMap
FofaMap
Open Source Exploitation Scanning & Enumeration

FofaMap v2.0 是一款基于 Python3 开发的全网首个 AI 驱动红队资产测绘智能体。在延续原有 FOFA 数据采集、存活检测、统计聚合、图标 Hash 及批量查询等核心功能的基础上,2.0 版本原生支持 MCP 协议,可无缝接入 Cursor、Claude 等 A…

forbidden
forbidden
Open Source Password Attacks Scanning & Enumeration

Bypass 4xx HTTP response status codes and more. The tool is based on Python Requests, PycURL, and HTTP Client.

ForceAdmin
ForceAdmin
Open Source Exploitation Post-Exploitation

Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠

Foremost
Foremost
Open Source Kali Forensics

Console program to recover files based on their headers, footers, and internal data structures. Useful for recovering deleted images, PDFs, …

ForensicMiner
ForensicMiner
Open Source Forensics

A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.

Forensics-Wiki
Forensics-Wiki
Free Forensics

Forensics-Wiki是一个关于电子数据取证的维基百科,网址:https://www.forensics-wiki.com/ 。旨在为国内的取证从业者提供高质量的学习平台。

ForensicsTools
ForensicsTools
Free Forensics

A list of free and open forensics analysis tools and other resources

forensictools
forensictools
Open Source Forensics Reverse Engineering

forensix
forensix
Open Source Forensics

Google Chrome forensic tool to process, analyze and visualize browsing artifacts

Fortigate
Fortigate
Open Source Exploitation

Extract Useful info from SSL VPN Directory Traversal Vulnerability (FG-IR-18-384)

Fortnite-Offsets
Fortnite-Offsets
Open Source Reverse Engineering

The latest Fortnite Offsets, always updated. Current Patch: v39.30

foxguard
foxguard
Open Source Reverse Engineering Scanning & Enumeration

A security scanner as fast as a linter, written in Rust. Live in the terminal? It also comes with a TUI triage for secrets, post-quantum aud…

FoxyRecon
FoxyRecon
Open Source Reconnaissance

A Firefox add-on for OSINT investigations

fracker
fracker
Free

Fracker is a suite of tools that allows to easily trace and analyze PHP function calls, its goal is to assist the researcher during manual s…

fraim
fraim
Open Source

A flexible framework for security teams to build and deploy AI-powered workflows that complement their existing security operations.

Free-Auto-GPT
Free-Auto-GPT
Open Source Reverse Engineering

Free Auto GPT with NO paids API is a repository that offers a simple version of Auto GPT, an autonomous AI agent capable of performing tasks…

free-one-api
free-one-api
Open Source Reverse Engineering

LLM 逆向工程接口管理 | 通过标准 OpenAI API 访问 ChatGPT / gpt4free / Bard / Claude / HuggingChat / 通义千问 等 AI 的破解版 || ChatGPT reverse engineering API manag…

Free-RASP-Community
Free-RASP-Community
Open Source Reverse Engineering

SDK providing threat detection & security monitoring for mobile devices. Works with Flutter, React Native, Android and iOS. Shield your app …

freebind.js
freebind.js
Open Source Evasion

IPv6 rate limiting evasion library that allows you to bind sockets to random IP addresses from specified prefixes

Freeway
Freeway
Open Source Wireless

WiFi Penetration Testing & Auditing Tool

Frida
Frida
Open Source Kali Reverse Engineering

Dynamic instrumentation toolkit for developers, reverse engineers, and security researchers. Injects JavaScript or Python into native apps (…

frida_setup
frida_setup
Free Reconnaissance Reverse Engineering

One-click installer for Frida and Burp certs for SSL Pinning bypass

frida-analykit
frida-analykit
Open Source Reverse Engineering

Frida 工具包 - 主要面向安卓端逆向,解决frida环境版本管理和对Agent端常用底层工具方法封装,支持MCP。(目前主要由AI开发维护代码)

frida-flutterproxy
frida-flutterproxy
Open Source Reverse Engineering

A Frida script for intercepting traffic on Android, iOS Flutter applications (arm64, x86_64) Tested on a few flutter apps (e.g., Google Ads,…

frida-intercept-encrypted-api
frida-intercept-encrypted-api
Open Source Reverse Engineering

A tool to help you intercept encrypted APIs in iOS or Android apps

frida-ios-hook
frida-ios-hook
Open Source Reverse Engineering

A tool that helps you easy trace classes, functions, and modify the return values of methods on iOS platform

Frida-Labs
Frida-Labs
Open Source Reverse Engineering

The repo contains a series of challenges for learning Frida for Android Exploitation.

Frida-Script-Runner
Frida-Script-Runner
Open Source Reverse Engineering

Web-based Frida framework and toolkit for Android & iOS penetration testing, mobile security, and dynamic analysis, featuring AI-assisted Fr…

frida-scripts
frida-scripts
Open Source Reverse Engineering

A collection of my Frida instrumentation scripts to reverse engineer mobile apps and more.

frida-snippets
frida-snippets
Free Reverse Engineering

Sublime snippets { "scope": "source.js", "completions": [ {"trigger": "fridainterceptor", "contents": "Interceptor.attach(\n ptr,\n {\n on…

frida-ue4dump
frida-ue4dump
Open Source Reverse Engineering

UE4 dump frida script for UE >= 4.23 64bit Heavily based on UE4Dumper Tested on the games listed below. It might not work correctly with oth…

fridare
fridare
Open Source Reverse Engineering

强大的 Frida 重打包工具,用于 iOS 和 Android。轻松修改 Frida 特征,增强隐蔽性,绕过检测。简化逆向工程和安全测试。Powerful Frida repackaging tool for iOS and Android. Easily modify Fri…

frieren
frieren
Free Exploitation Wireless

Frieren is a micro-framework designed for use in routers and Single Board Computers (SBCs). This framework is built to be lightweight, effic…

fripack
fripack
Free Reverse Engineering

Package your Frida script into an executable.

friTap
friTap
Open Source Forensics Reverse Engineering

Simplifying SSL/TLS traffic analysis for researchers by making SSL decryption effortless.

frizbee
frizbee
Open Source

Throw a tag at it and it comes back with a checksum.

FrogPost
FrogPost
Free Web Application

FrogPost: postMessage Security Testing Tool

fscan
fscan
Open Source Scanning & Enumeration

一款内网综合扫描工具,方便一键自动化、全方位漏扫扫描。(An intranet comprehensive scanning tool, enabling one-click automated, all-round vulnerability scanning)

fsociety
fsociety
Open Source Reconnaissance

A Modular Penetration Testing Framework

fsociety
fsociety
Open Source

fsociety is a penetration toolkit inspired from MR. ROBOT

fsociety
fsociety
Open Source Exploitation Post-Exploitation

fsociety Hacking Tools Pack – A Penetration Testing Framework

FTPlnk_phishing
FTPlnk_phishing
Free Social Engineering

FTP lnk调用pythonw程序,用于攻防钓鱼场景下免杀运行捆绑木马文件

ftw
ftw
Open Source Web Application

Framework for Testing WAFs (FTW!)

fubar
fubar
Open Source

Formidable Unix Binary Arsenal & Repository. TUI built for offline payload generation, retrieval, and exfiltration.

Fuck-Windows-Security
Fuck-Windows-Security
Open Source Post-Exploitation

A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualizati…

fucking-Awesome-Hacking
fucking-Awesome-Hacking
Free Reverse Engineering Scanning & Enumeration

A collection of various awesome lists for hackers, pentesters and security researchers. With repository stars⭐ and forks🍴

fucking-awesome-incident-response
fucking-awesome-incident-response
Open Source Forensics

A curated list of tools for incident response. With repository stars⭐ and forks🍴

fugue-core
fugue-core
Open Source Reverse Engineering

A binary analysis framework written in Rust.

Fuji
Fuji
Open Source Forensics

macOS forensic acquisition made simple

fujihack
fujihack
Open Source Reverse Engineering

Reverse engineering Fujifilm cameras

fundamentos-engenharia-reversa
fundamentos-engenharia-reversa
Free Forensics Reverse Engineering

Livro: Engenharia Reversa - Fundamentos e Prática

fusee-nano
fusee-nano
Open Source Exploitation

A minimalist re-implementation of the Fusée Gelée exploit, designed to run on embedded Linux devices. (Zero dependencies)

fuxploider
fuxploider
Open Source Exploitation Scanning & Enumeration

File upload vulnerability scanner and exploitation tool.

fuzz
fuzz
Free Exploitation Scanning & Enumeration

Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT

fuzz4bounty
fuzz4bounty
Free Password Attacks

1337 Wordlists for Bug Bounty Hunting

fuzzlists
fuzzlists
Free

A collection of useful lists for Penetration Testing & Bug Bounty - Content Discovery, Payloads, Variables, Sandbox Escaping, etc

fuzzshell
fuzzshell
Free

https://www.bilibili.com/video/BV1xVy5YiEim/

fwhunt-scan
fwhunt-scan
Open Source Reverse Engineering

Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules

galah
galah
Open Source

Galah: An LLM-powered web honeypot.

Galaxy-Bugbounty-Checklist
Galaxy-Bugbounty-Checklist
Free Exploitation

Tips and Tutorials for Bug Bounty and also Penetration Tests.

GalaxyBudsClient
GalaxyBudsClient
Open Source Reverse Engineering Wireless

Unofficial Galaxy Buds Manager for Windows, macOS, Linux, and Android

gallia
gallia
Open Source

Extendable Pentesting Framework

game-and-watch-patch
game-and-watch-patch
Open Source Reverse Engineering

CFW for the Nintendo Game and Watch

game-hacking
game-hacking
Free Reverse Engineering

Tutorials, tools, and more as related to reverse engineering video games.

game-of-thrones-hacking-ctf
game-of-thrones-hacking-ctf
Free

Game of Thrones hacking CTF (Capture the flag)

game-patches
game-patches
Free Reverse Engineering

Game patches for the Xenia emulator

gamehacking-cheatsheet
gamehacking-cheatsheet
Open Source Exploitation Reverse Engineering

Comprehensive Game Hacking Cheat Sheet for security researchers, reverse engineers, and CTF participants. Covers memory analysis, anti-cheat…

GameTracking
GameTracking
Free Reverse Engineering

🛢 Dumping things, so you don't have to

GameTracking-CS2
GameTracking-CS2
Free Reverse Engineering

📥 Game Tracker: Counter-Strike 2

GameTracking-Dota2
GameTracking-Dota2
Free Reverse Engineering

📥 Game Tracker: Dota 2

gapcast
gapcast
Open Source Wireless

📡 802.11 broadcast analyzer & injector

garble
garble
Open Source Evasion

go install mvdan.cc/garble@latest # or @master

GARbro
GARbro
Open Source Reverse Engineering

Visual Novels resource browser

garlic
garlic
Open Source Reverse Engineering

The world's fastest apk (android)/java open source decompiler

GarudRecon
GarudRecon
Open Source Exploitation Reconnaissance

GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & more…

GateSentinel
GateSentinel
Free Exploitation Post-Exploitation

GateSentinel 是一个现代化的 C2 (Command and Control) 框架,专为安全研究和渗透测试设计。该项目采用 Go 语言开发服务端,C 语言开发客户端,提供了强大的远程控制和管理功能。

gato-x
gato-x
Open Source Exploitation

GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.

GC2-sheet
GC2-sheet
Open Source Post-Exploitation

GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft S…

GDA-android-reversing-Tool
GDA-android-reversing-Tool
Open Source Forensics Reverse Engineering

the fastest and most powerful android decompiler(native tool working without Java VM) for the APK, DEX, ODEX, OAT, JAR, AAR, and CLASS file.…

GDB with pwndbg
GDB with pwndbg
Open Source Kali Exploitation Reverse Engineering

GDB (GNU Debugger) enhanced with pwndbg plugin for exploit development and reverse engineering. Adds heap visualization, stack inspection, R…

GDorks
GDorks
Open Source Exploitation Reconnaissance

Google Dork List - Uncover the Hidden Gems of the Internet ( There are at least 320+ categories ) + Web App

Gecko
Gecko
Open Source Post-Exploitation

Gecko Backdoor is a most powerful web php backdoor.

gee
gee
Open Source

🏵 Gee is tool of stdin to each files and stdout. It is similar to the tee command, but there are more functions for convenience. In addition…

gef
gef
Open Source Exploitation Forensics

GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux

gef-extras
gef-extras
Open Source Exploitation Reverse Engineering

Extra goodies for GEF to (try to) make GDB suck even less

gemelli
gemelli
Open Source

Gemelli is a tool box for running Robust Aitchison PCA (RPCA), Joint Robust Aitchison PCA (Joint-RPCA), TEMPoral TEnsor Decomposition (TEMPT…

Gemini-API
Gemini-API
Open Source Reverse Engineering

✨ Reverse-engineered Python API for Google Gemini web app

genai-attacks
genai-attacks
Free Exploitation

A knowledge source about TTPs used to target GenAI-based systems, copilots and agents

GenP
GenP
Free Reverse Engineering

This repository preserves source materials and related documentation about GenP. For archival and research purposes only.

Genzai
Genzai
Open Source Exploitation

The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.

GeoIntel
GeoIntel
Open Source Reconnaissance

GeoIntel using Google's Gemini API to uncover the location where photos were taken through AI-powered geo-location analysis.

GEOINTInvestigation
GEOINTInvestigation
Free Reconnaissance

Intelligence tramite - Immagini - Video - Strumenti - Mappe

GeoServerExploit
GeoServerExploit
Free Exploitation

GeoServer(CVE-2024-36401/CVE-2024-36404)漏洞利用工具

geowifi
geowifi
Free Reconnaissance Wireless

Search WiFi geolocation data by BSSID and SSID on different public databases.

GeoWordlists
GeoWordlists
Free Password Attacks

GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.

GEP
GEP
Open Source Reverse Engineering

GEP (GDB Enhanced Prompt) - a GDB plug-in to enhance your GDB with fzf history search, fzf tab auto-completion, fish-like autosuggestions, a…

Gepetto
Gepetto
Open Source Reverse Engineering

IDA plugin which queries language models to speed up reverse-engineering

gerobug
gerobug
Open Source Web Application

The First Open Source Bug Bounty Platform

getaltname
getaltname
Open Source Reconnaissance

Extract subdomains from SSL certificates in HTTPS sites.

getJS
getJS
Open Source Reconnaissance

A tool to fastly get all javascript sources/files

ggshield-action
ggshield-action
Open Source

GitGuardian Shield GitHub Action - Find exposed credentials in your commits

GH_AntiDebug_Bypass_Practice_Tool
GH_AntiDebug_Bypass_Practice_Tool
Free Reverse Engineering

Guided Hacking's official tool to practice bypassing anti-debug techniques.

GH-Offset-Dumper
GH-Offset-Dumper
Free Reverse Engineering

Scan signatures and netvars. Dumps header files, cheat tables and ReClass files.

GH05T-INSTA
GH05T-INSTA
Free Password Attacks

Insta BruteForce { GH05T-INSTA 7.01 } Fork it...

Ghidra
Ghidra
Open Source Kali Reverse Engineering

NSA-developed software reverse engineering suite. Features a disassembler, decompiler, scripting (Java/Python), graphing, and collaborative …

ghidra
ghidra
Open Source Kali Reverse Engineering

Ghidra is a software reverse engineering (SRE) framework

Ghidra_GolangAnalyzerExtension
Ghidra_GolangAnalyzerExtension
Free Reverse Engineering

The GolangAnalyzerExtension facilitates the analysis of Golang binaries using Ghidra. It supports go1.6 through go1.26.

ghidra-delinker-extension
ghidra-delinker-extension
Open Source Reverse Engineering

Ghidra extension for exporting relocatable object files

ghidra-emotionengine-reloaded
ghidra-emotionengine-reloaded
Open Source Reverse Engineering

An extension for Ghidra that adds support for the PlayStation 2.

ghidra-firmware-utils
ghidra-firmware-utils
Free Reverse Engineering

Ghidra utilities for analyzing PC firmware

ghidra-scripts
ghidra-scripts
Open Source Reverse Engineering

A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.

Ghidra-Switch-Loader
Ghidra-Switch-Loader
Open Source Reverse Engineering

Nintendo Switch loader for Ghidra

Ghidra-Themes
Ghidra-Themes
Free Reverse Engineering

A collection of over 200 Ghidra themes to make long hours of reverse-engineering even more enjoyable!

ghidra-xbe
ghidra-xbe
Free Reverse Engineering

Xbox Executable Format (XBE) Loader Extension for Ghidra SRE framework

GhidraBoy
GhidraBoy
Open Source Reverse Engineering

Sharp SM83 / Game Boy extension for Ghidra

GhidraEmu
GhidraEmu
Open Source Reverse Engineering

GhidraGPT
GhidraGPT
Open Source Reverse Engineering

Integrate LLM models directly into Ghidra for automated code refactoring and analysis.

ghidralib
ghidralib
Open Source Reverse Engineering

A Pythonic Ghidra standard library

GhidrAssist
GhidrAssist
Open Source Reverse Engineering

An LLM extension for Ghidra to enable AI assistance in RE.

GhidrAssistMCP
GhidrAssistMCP
Open Source Reverse Engineering

A powerful Ghidra extension that provides an MCP (Model Context Protocol) server, enabling AI assistants and other tools to interact with Gh…

ghidrecomp
ghidrecomp
Open Source Reverse Engineering

Python Command-Line Ghidra Decompiler

GhidrOllama
GhidrOllama
Free Reverse Engineering

A Ghidra script that enables the analysis of selected functions and instructions using Large Language Models (LLMs). It aims to make reverse…

GhidRust
GhidRust
Open Source Reverse Engineering

GhidRust: Rust decompiler plugin for Ghidra

ghorg
ghorg
Open Source

Quickly clone or backup an entire org/users repositories into one directory - Supports GitHub, GitLab, Bitbucket, and more 🐇🥚

Ghost
Ghost
Open Source Kali Exploitation Post-Exploitation

Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.

ghost
ghost
Open Source Forensics Reverse Engineering

Detects process injection and memory manipulation used by malware. Finds RWX regions, shellcode patterns, API hooks, thread hijacking, and p…

ghost_eye
ghost_eye
Open Source Reconnaissance Scanning & Enumeration

Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3. T…

GHOST-osint-crm
GHOST-osint-crm
Free Reconnaissance

GHOST - Global Human Operations & Surveillance Tracking: Open-source investigation management platform for tracking people, connections, an…

gHoStGD
gHoStGD
Free Reconnaissance

Useful tool to track location or mobile number.

GhostRecon
GhostRecon
Open Source Reconnaissance

Popular OSINT framework for online investigations.

ghostrings
ghostrings
Open Source Reverse Engineering

Ghidra scripts for recovering string definitions in Go binaries

ghostscan
ghostscan
Open Source

A modern, Rust-powered Linux scanner that unmasks hidden rootkits, stealthy eBPF tricks, and ghost processes in one fast sweep (50+ scanners…

GhostStrike
GhostStrike
Open Source Exploitation

Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.

Ghostwriter
Ghostwriter
Open Source Reporting

Django-based engagement management and reporting platform. Tracks infrastructure, manages findings, stores evidence, and generates professio…

Ghostwriter
Ghostwriter
Open Source Exploitation

The SpecterOps project management and reporting engine

GHunt
GHunt
Free Reconnaissance

🕵️‍♂️ Offensive Google framework.

gibson
gibson
Open Source Exploitation Reconnaissance

Network monitoring tool that maps process-to-network connections, identifies cloud providers, and detects beaconing activity. Zero-flag agen…

gigahorse-toolchain
gigahorse-toolchain
Free Reverse Engineering

A binary lifter and analysis framework for Ethereum smart contracts

git-alerts
git-alerts
Open Source

Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files

git-hound
git-hound
Open Source Reconnaissance Scanning & Enumeration

Fast GitHub recon tool. Scans for leaked secrets across all of GitHub, not just known repos and orgs. Support for GitHub dorks.

GitFive
GitFive
Open Source Reconnaissance

GitFive is an OSINT tool to investigate GitHub profiles.

gitGraber
gitGraber
Open Source Exploitation Reconnaissance

gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Gith…

GitHacker
GitHacker
Free Web Application

🕷️ A `.git` folder exploiting tool that is able to restore the entire Git repository, including stash, common branches and common tags.

github-vps
github-vps
Open Source Kali

You can get a lifetime of FREE VPS using GitHub Codespaces with Kali Linux Docker image installed on github workspace terminal. (beginner, f…

gitjacker
gitjacker
Free Exploitation

🔪 :octocat: Leak git repositories from misconfigured websites

gitlab-subdomains
gitlab-subdomains
Open Source

gitlab-subdomains

gitlab-watchman
gitlab-watchman
Open Source Exploitation

Finding exposed secrets and personal data in GitLab

GitLeaks
GitLeaks
Open Source Reconnaissance

SAST tool for detecting hardcoded secrets like passwords, API keys, and tokens in git repositories. Scans commits, branches, and git history…

gitleaks
gitleaks
Open Source

Gitleaks can be installed using Homebrew, Docker, or Go. Gitleaks is also available in binary form for many popular platforms and OS types o…

gitleaks-action
gitleaks-action
Free Reverse Engineering

Protect your secrets using Gitleaks-Action

gitrecon
gitrecon
Free Reconnaissance

This tool uses the GitHub API to scan repositories owned by a user for email addresses and associated names. It provides options to scan spe…

GitSint
GitSint
Open Source Reconnaissance

🕵️ OSINT Tool (github tracker)

GitTools
GitTools
Open Source Reconnaissance Web Application

Tools to download and reconstruct exposed .git repositories from web servers. Includes Gitdumper (download), Extractor (extract commits), an…

gitxray
gitxray
Open Source Reconnaissance

A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.

glazboga
glazboga
Free Reconnaissance

Это моя версия бота Глаз Бога. Работает прекрасно и выдает много информации.

glibc-all-in-one
glibc-all-in-one
Open Source

🎁A convenient glibc binary and debug file downloader and source code auto builder

glit
glit
Free Reconnaissance

Retrieve all mails of users related to a git repository, a git user or a git organization

globalcve
globalcve
Free Exploitation

Centralized platform for aggregating and visualizing global CVE data — including feeds from NVD, MITRE, CNNVD, JVN, CERT-FR, and more. Built…

globalthreatmap
globalthreatmap
Free Reconnaissance

Global threat map. Learn wars, conflicts, military bases and history of nations.

gloriousctl
gloriousctl
Free Reverse Engineering

A utility to adjust the settings of Model O/D mice on Linux/BSD

glua-steal
glua-steal
Open Source Reverse Engineering

Retrieves client-sided Lua files from Garry's Mod game servers

gmail-hack.py
gmail-hack.py
Open Source Kali

Gmail id brut force attack Gmail id hack tools (use : kali linux and trmoux)

GmailBruterV2
GmailBruterV2
Open Source Password Attacks

Simple tool written in python3 to perform limited brute-force attacks on gmail accounts.

gmailc2
gmailc2
Open Source Evasion

A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions

GMSGadget
GMSGadget
Open Source Web Application

This repository is a collection of JavaScript gadgets that can be used to bypass XSS mitigations such as Content Security Policy (CSP) and H…

gnirts
gnirts
Open Source Evasion

Obfuscate string literals in JavaScript code.

go-binsize-treemap
go-binsize-treemap
Open Source Reverse Engineering

✨ Sponsored by NDX AI Shopping Assistant

Go-Hacking
Go-Hacking
Open Source Reverse Engineering Web Application

A FREE comprehensive online Go hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of revers…

go-recon
go-recon
Open Source Reconnaissance

go-recon External recon toolkit …

go-sarif
go-sarif
Free Reverse Engineering

Go library for SARIF - Static Analysis Results Interchange Format

go-whatsapp
go-whatsapp
Open Source Reverse Engineering

Package rhymen/go-whatsapp implements the WhatsApp Web API to provide a clean interface for developers. Big thanks to all contributors of th…

go6502
go6502
Open Source Reverse Engineering

6502 CPU emulator, assembler, disassembler, debugger and host written in go

goauld
goauld
Open Source Reverse Engineering

Dynamic injection tool for Linux/Android

goblin
goblin
Open Source Reverse Engineering

An impish, cross-platform binary parsing crate, written in Rust

Gobuster
Gobuster
Open Source Kali Scanning & Enumeration Web Application

Directory/file and DNS busting tool written in Go. Extremely fast. Modes include directory brute-force, DNS subdomain enumeration, virtual h…

gobuster
gobuster
Open Source Kali Reconnaissance

Directory/File, DNS and VHost busting tool written in Go

GobypassAV-shellcode
GobypassAV-shellcode
Free Evasion Exploitation

shellcode免杀加载器,使用go实现,免杀bypass火绒、360、核晶、def等主流杀软

GobyVuls
GobyVuls
Free Exploitation

Vulnerabilities of Goby supported with exploitation.

god-eye
god-eye
Free Exploitation Reconnaissance

AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs

GoDhijacking
GoDhijacking
Free Exploitation

Red team tool designed for quickly identifying hijackable programs, evading antivirus software, and EDR (Endpoint Detection and Response) sy…

Godot-Secure
Godot-Secure
Open Source

Godot Secure is a Simple Python Script That modify the Godot Source Code Automatically, to integrate Camellia-256 / AES-256 encryption with …

goexec
goexec
Open Source Post-Exploitation

Windows remote execution multitool

goffloader
goffloader
Open Source Exploitation

A Go implementation of Cobalt Strike style BOF/COFF loaders.

gogo
gogo
Open Source Exploitation Reconnaissance

面向红队的, 高性能高度自由可拓展的自动化扫描引擎 | A highly controllable and extensionable automated scanning engine for red teams

goHackTools
goHackTools
Open Source Forensics

I used examples from the books & materials

GoldenDMSA
GoldenDMSA
Free Post-Exploitation

This tool exploits Golden DMSA attack against delegated Managed Service Accounts.

GoLinkFinder
GoLinkFinder
Open Source

A fast and minimal JS endpoint extractor

goMalleable
goMalleable
Open Source Exploitation Post-Exploitation

🔎🪲 Malleable C2 profiles parser and assembler written in golang

gonids
gonids
Open Source

gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that yo…

GonnaCry
GonnaCry
Open Source Forensics

Original Repository of the GonnaCry Ransomware.

goodboy-framework
goodboy-framework
Open Source Evasion Exploitation

15-stage Windows malware development & analysis course in Rust. Red team builds it, blue team detects it. All 15 binaries achieved 0/76 on V…

GoodHound
GoodHound
Free Exploitation Post-Exploitation

Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.

GooFuzz
GooFuzz
Open Source Exploitation Reconnaissance

GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leav…

google_photos_mobile_client
google_photos_mobile_client
Open Source Reverse Engineering

Google Photos client based on reverse engineered mobile API.

google-ctf
google-ctf
Open Source

This repository lists most of the challenges used in the Google CTF since 2017, as well as most of the infrastructure that can be used to ru…

google-dorking
google-dorking
Free Reconnaissance

Dorking: how to find what Google easily showing you (plus Shodan, Yandex, Tor, and more... )

Google-Dorks-Simplified
Google-Dorks-Simplified
Free Reconnaissance

Best Resource for learning Google Dorks

Google-Hack-Search
Google-Hack-Search
Free Exploitation

Custom Google search engine dedicated to IT security & hacking stuff. Over 240 high-quality sources.

google-hacking-assistant
google-hacking-assistant
Free Reconnaissance Web Application

🔍 Chrome扩展,为安全研究和渗透测试提供Google/百度/Bing高级搜索语法快捷执行。一键Dorking、批量提取URL、智能过滤黑名单,大幅提升信息收集效率。 🔍 Chrome extension for security research and penetrat…

GoogleDorker
GoogleDorker
Open Source Reconnaissance

GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.

GooglePhish
GooglePhish
Free Social Engineering

Google account phishing tool written in python using django

goop
goop
Open Source Web Application

Yet another tool to dump a git repository from a website, focused on as-complete-as-possible dumps and handling weird edge-cases.

Gophish
Gophish
Open Source Social Engineering

Open-source phishing framework designed for business security awareness campaigns. Features a rich web UI, email templates, landing page tem…

gophish
gophish
Free Social Engineering

Installation of Gophish is dead-simple - just download and extract the zip containing the release for your system, and run the binary. Gophi…

gophish-notifier
gophish-notifier
Open Source Exploitation

Notification webhook for GoPhish

GoPhish-Templates
GoPhish-Templates
Free Exploitation Social Engineering

GoPhish Templates that I have retired and/or templates I've recreated.

gorilla
gorilla
Open Source Password Attacks

tool for generating wordlists or extending an existing one using mutations.

gorsh
gorsh
Free Exploitation Post-Exploitation

A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface

gosearch
gosearch
Open Source Exploitation Reconnaissance

🔍 Search anyone's digital footprint across 300+ websites

gosec
gosec
Open Source Reverse Engineering

Inspects source code for security problems by scanning the Go AST and SSA code representation.

goshs
goshs
Open Source Kali

Feature-rich single-binary file server for red teamers and developers. HTTP/S · WebDAV · SFTP · SMB · NTLM hash capture · DNS/SMTP callback…

GoSQLX
GoSQLX
Open Source Exploitation

High-performance SQL parser, formatter, linter & security scanner for Go - 1.5M+ ops/sec, multi-dialect, zero-copy, race-free

gotestwaf
gotestwaf
Open Source Web Application

An open-source project in Golang to asess different API Security tools and WAF for detection logic and bypasses

GoToDnSpy
GoToDnSpy
Open Source Reverse Engineering

GoTo dnSpy for Visual Studio 2022

gotohp
gotohp
Open Source Reverse Engineering

Unofficial Google Photos Desktop GUI Client

gotor
gotor
Open Source Reconnaissance

This program provides efficient web scraping services for Tor and non-Tor sites. The program has both a CLI and REST API.

goverview
goverview
Open Source Reconnaissance

goverview - Get an overview of the list of URLs

goWAPT
goWAPT
Open Source Exploitation Password Attacks

Go Web Application Penetration Test

GpgFrontend
GpgFrontend
Open Source

A modern "Enigma" built on GnuPG brings easy and trustworthy to your privacy life.

gpoParser
gpoParser
Free Exploitation Post-Exploitation

gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory enviro…

GPT_Vuln-analyzer
GPT_Vuln-analyzer
Open Source Reconnaissance Scanning & Enumeration

Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerability r…

gpt4free
gpt4free
Open Source Reverse Engineering

The official gpt4free repository | various collection of powerful language models | opus 4.6 gpt 5.3 kimi 2.5 deepseek v3.2 gemini 3

Grabbers-Deobfuscator
Grabbers-Deobfuscator
Free Evasion Forensics

Decompiler and deobfuscator that offers support to track discord webhooks inside: blank stealer, luna grabber, thiefcat, Creal and all unobf…

grafanaExp
grafanaExp
Free Exploitation

A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins / extract secret_key / d…

grapefruit
grapefruit
Open Source

Open-source mobile security testing suite for iOS and Android. Previously Passionfruit

GraphPreConsentExplorer
GraphPreConsentExplorer
Open Source

A comprehensive list of usable Entra ID first-party clients with pre-consented Microsoft Graph scopes, in a simple YAML-file explorable with…

Graphpython
Graphpython
Free Exploitation

Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit

GraphQL Voyager / InQL
GraphQL Voyager / InQL
Open Source Web Application

InQL is a Burp Suite and standalone GraphQL security scanner. Analyzes introspection queries, generates operations, detects batch query atta…

graphql-armor
graphql-armor
Open Source Web Application

🛡️ The missing GraphQL security security layer for Apollo GraphQL and Yoga / Envelop servers 🛡️

graphql-cop
graphql-cop
Open Source Exploitation Web Application

Security Auditor Utility for GraphQL APIs

GraphQLer
GraphQLer
Open Source Scanning & Enumeration Web Application

🔍A cutting edge context aware GraphQL API fuzzing tool!

graphw00f
graphw00f
Open Source Reconnaissance Scanning & Enumeration

graphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology is…

graudit
graudit
Open Source

grep rough audit - source code auditing tool

Grawler
Grawler
Open Source Reconnaissance

Grawler is a tool written in PHP which comes with a web interface that automates the task of using google dorks, scrapes the results, and st…

grease
grease
Open Source Reverse Engineering

CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution

greed
greed
Open Source Reverse Engineering

A symbolic execution engine for EVM smart contract binaries.

greenmask
greenmask
Open Source Evasion

Database anonymization, synthetic data generation and logical dump

GReverse
GReverse
Open Source Reconnaissance

A reverse search tool for OSINT (Open Source Intelligence) gathering & facial recognition via Google Custom Search & Google Vision API's.

Grok-Api
Grok-Api
Free Reverse Engineering

A free Grok API wrapper that allows you to use Grok without API access or Account.

Grunt
Grunt
Open Source Reverse Engineering

JVM bytecode obfuscator framework

Gsec
Gsec
Free Reconnaissance

Web Security Scanner &amp; Exploitation. Based on custom vulnerability scanners &amp; Nuclei …

GSpots
GSpots
Free Reverse Engineering

GSpots automatically finds GWorld, GNames, and GObjects in Unreal Engine Games.

gsvsoc_cirt-playbook-battle-cards
gsvsoc_cirt-playbook-battle-cards
Open Source Forensics

Cyber Incident Response Team Playbook Battle Cards

GTFOBins
GTFOBins
Open Source Post-Exploitation

Curated list of Unix binaries that can be used to bypass local security restrictions. Shows how to abuse sudo, SUID, capabilities, and file …

gtfobins-cli
gtfobins-cli
Open Source Exploitation Post-Exploitation

Search for Unix binaries that can be exploited to bypass system security restrictions.

GTFOBins.github.io
GTFOBins.github.io
Open Source Exploitation Post-Exploitation

GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.

GTFONow
GTFONow
Open Source Exploitation Post-Exploitation

Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.

gtirb
gtirb
Free Reverse Engineering

Intermediate Representation for Binary analysis and transformation

gtirb-pprinter
gtirb-pprinter
Open Source Reverse Engineering

Pretty printer from GTIRB to assembly code

gulp
gulp
Free Forensics

g(ULP) core backend and plugins

GView
GView
Open Source Forensics Reverse Engineering

GView is a cross-platform framework for reverse-engineering. Users can leverage the diverse range of available visualization options to effe…

gvision
gvision
Free Reconnaissance

GVision is a reverse image search app that use Google Cloud Vision API to detect landmarks and web entities from images, helping you gather …

Gx64Sync
Gx64Sync
Free Reverse Engineering

A set of plugins for Ghidra and x64Dbg synchronization. A faster, more flexible ret-sync.

gxpc
gxpc
Open Source Reverse Engineering

Sniff XPC communication using Frida and Go

GZCTF
GZCTF
Open Source

The GZ::CTF project, an open source CTF platform.

H.I.V.E
H.I.V.E
Free Reconnaissance

H.I.V.E is an automated OSINT (Open Source Intelligence) multi-tool that enables efficient data gathering from various sources through the u…

h1-brain
h1-brain
Open Source Web Application

MCP server that connects AI assistants to HackerOne for bug bounty hunting

h1domains
h1domains
Free

HackerOne "in scope" domains

h4cker
h4cker
Open Source Exploitation

This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, dig…

H4X-Tools
H4X-Tools
Open Source Reconnaissance Scanning & Enumeration

A modular, terminal-based toolkit for OSINT, reconnaissance, and scraping - built in Python, runs on Linux and Windows.

habu
habu
Open Source

Habu Hacking Toolkit ====================

Hack-cctv
Hack-cctv
Free Kali

This is a tool for randomly hacking CCTV cameras in various countries that is available in the tools list {2026}

hack-tools
hack-tools
Free Exploitation

&nbsp; &nbsp; ######################################################################## …

hackable
hackable
Free Exploitation Web Application

A python flask app that is purposefully vulnerable to SQL injection and XSS attacks. To be used for demonstrating attacks

HackBot
HackBot
Free

AI-powered cybersecurity chatbot designed to provide helpful and accurate answers to your cybersecurity-related queries and also do code ana…

hackEmbedded
hackEmbedded
Open Source Exploitation

This tool is used for encrypt backdoor,shellcode,socks5 proxy generation,Information retrieval and POC arrangement for various architecture …

Hacker-Hook
Hacker-Hook
Open Source Kali Social Engineering

Advance phishing tool with custom URL tunneling hosted by LocalTunnel, Ngrok, Cloudflare

Hacker-Roadmap
Hacker-Roadmap
Free Exploitation

A detailed plan to achieve proficiency in hacking and penetration testing, with pathways including obtaining a degree in cybersecurity or ea…

hacker101
hacker101
Free Exploitation Web Application

Source code for Hacker101.com - a free online web and mobile security class.

hackergame-challenge-docker
hackergame-challenge-docker
Open Source

nc 类题目的 Docker 容器资源限制、动态 flag、网页终端

hackergame2021-writeups
hackergame2021-writeups
Free

欢迎各位选手以 Pull Request 的形式提交自己的 write-up(players 目录下以自己的昵称创建新文件夹,并在本文件的「来自选手」部分增加一行)。

HackerMind
HackerMind
Free

各种安全相关思维导图整理收集。渗透步骤,web安全,CTF,业务安全,人工智能,区块链安全,数据安全,安全开发,无线安全,社会工程学,二进制安全,移动安全,红蓝对抗,运维安全,风控安全,linux安全

hackerone-bug-bounty-reports
hackerone-bug-bounty-reports
Free Web Application

Complete collection of bug bounty reports from Hackerone.

hackerone-reports
hackerone-reports
Free Exploitation Web Application

Top disclosed reports from HackerOne

hackerpro
hackerpro
Open Source Reconnaissance

All in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog

HackerToolkit
HackerToolkit
Free

HackerToolkit offers a curated selection of tools designed to enhance your hacking capabilities. This repository not only organizes these to…

Hackerwasi
Hackerwasi
Open Source Kali Reconnaissance

Hackerwasii is an information collection tool (OSINT) which aims to carry out research on a French, Swiss, Luxembourgish or Belgian person. …

HackGpt
HackGpt
Free

HackGPT Enterprise is a production-ready, cloud-native AI-powered penetration testing platform designed for enterprise security teams. It co…

hackify
hackify
Open Source Password Attacks

A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.

Hacking
Hacking
Free Password Attacks

Ha3Mrx Pentesting and Security Hacking

Hacking-Bug-Bounty-Books
Hacking-Bug-Bounty-Books
Free Kali Web Application

Collection of Combination of 👨🏻‍💻Ethical Hacking, 🐧Linux, Cyber security, 💰Bug Bounty, Penetration testing, Networking and more IT Related B…

Hacking-Cheatsheets
Hacking-Cheatsheets
Free Exploitation

A comprehensive collection of penetration testing cheatsheets, guides, and tools.

hacking-methodologyNotes
hacking-methodologyNotes
Free Reverse Engineering Scanning & Enumeration

Notes, research, and methodologies for becoming a better hacker. Knowledge should be free.

Hacking-Repos
Hacking-Repos
Open Source Exploitation

A collection of awesome GitHub repositories for hackers, pentesters & security researchers. ADDING MORE REPOs SOON.

Hacking-Resources
Hacking-Resources
Free Kali Exploitation

This repository contains some resources for ethical hackers penetration tester 😊 This may contain some files, tools, books, and links that n…

hacking-resources
hacking-resources
Free Exploitation Reconnaissance

Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security pr…

Hacking-Rust
Hacking-Rust
Open Source Reverse Engineering

A FREE comprehensive online Rust hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of rev…

Hacking-Security-Ebooks
Hacking-Security-Ebooks
Free Kali

Top 100 Hacking & Security E-Books (Free Download)

Hacking-Social_Media-Accounts
Hacking-Social_Media-Accounts
Free Reconnaissance Social Engineering

🪝Hacking Social Media Accounts by using Phishing Mails (GoPhish) 🐬

Hacking-Tools
Hacking-Tools
Open Source Kali Exploitation Forensics

A curated list of penetration testing and ethical hacking tools, organized by category. This compilation includes tools from Kali Linux and …

Hacking-Tools
Hacking-Tools
Free Scanning & Enumeration

This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in pyt…

Hacking-Windows
Hacking-Windows
Open Source Reverse Engineering

A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x6…

HackingAllTheThings
HackingAllTheThings
Free Exploitation

My documentation and tools for learn ethical hacking.

hackingBuddyGPT
hackingBuddyGPT
Open Source

Helping Ethical Hackers use LLMs in 50 Lines of Code or less..

HacKingPro
HacKingPro
Free

HacKingPro - Hack Like A Pro !

hackingthe.cloud
hackingthe.cloud
Free

An encyclopedia for offensive and defensive security knowledge in cloud native technologies.

hackingtool
hackingtool
Open Source

ALL IN ONE Hacking Tool For Hackers

hackingtoolkit
hackingtoolkit
Open Source Exploitation

ALL IN ONE Hacking Tool For Hackers, Penetration Tester and Cybersecurity. New Version Beginner to Advanced Tool. This Tool is made for educ…

hackliner
hackliner
Open Source Exploitation Web Application

HackLiners: CyberSec/BugHunting OneLiners

HackMaster-Pi
HackMaster-Pi
Open Source

An open source IoT Hacker Tool by using Raspberry Pi Zero 2 W

Hacknetics
Hacknetics
Free

Contained is all my reference material for my OSCP / Red Teaming. Designed to be a one stop shop for code, guides, command syntax, and high…

HackSynth
HackSynth
Open Source

LLM Agent and Evaluation Framework for Autonomous Penetration Testing

HackSysExtremeVulnerableDriver
HackSysExtremeVulnerableDriver
Open Source Exploitation

HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux

hackthebox
hackthebox
Open Source Forensics Reverse Engineering

My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.

HackTheBox-Reporting
HackTheBox-Reporting
Free

Hack The Box CPTS, CWES, CDSA, CWEE, CAPE, CJCA Exam and Lab Reporting / Note-Taking Tool

HackTheBox-scripts
HackTheBox-scripts
Free

Useful scripts to exploit Hack The Box retired machines/challenges

HackTheVote
HackTheVote
Free Reverse Engineering

Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs

HackTools
HackTools
Free Exploitation Web Application

The all-in-one browser extension for offensive security professionals 🛠

hacktricks
hacktricks
Free

Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news…

hadrian
hadrian
Open Source Web Application

API security testing framework for REST, GraphQL, and gRPC that validates authorization logic using role-based testing and YAML-driven templ…

haiti
haiti
Open Source

:key: Hash type identifier (CLI & lib)

hakrawler
hakrawler
Open Source Reconnaissance

Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application

hal
hal
Open Source Reverse Engineering

HAL \[/hel/\] is a comprehensive netlist reverse engineering and manipulation framework.

Halberd
Halberd
Open Source Exploitation

Halberd : Multi-Cloud Agentic Attack Tool

HaleHound-CYD
HaleHound-CYD
Free Wireless

ESP32-DIV HaleHound Edition for Cheap Yellow Display - Multi-protocol offensive security toolkit

Hamburglar
Hamburglar
Open Source Reconnaissance

Hamburglar -- collect useful information from urls, directories, and files

handbook
handbook
Open Source Kali Exploitation Web Application

A living document for penetration testing and offensive security.

HandleHawk
HandleHawk
Open Source Reconnaissance

Cross-platform username reconnaissance tool built for OSINT investigators, cyber threat analysts, red teamers, and CTF enthusiasts.

HarborGuard
HarborGuard
Open Source Exploitation Scanning & Enumeration

Modern image vulnerability scanning & patching platform with multi-tool integration.

harden.yml
harden.yml
Open Source

Ansible playbook for Linux hardening

hardening
hardening
Open Source

Hardening Ubuntu. Systemd edition.

Hardware-and-Firmware-Security-Guidance
Hardware-and-Firmware-Security-Guidance
Free Exploitation

Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, …

harpoon
harpoon
Open Source

🔍 Function-level tracing tool for Seccomp profiling, with eBPF

harpoon
harpoon
Open Source Reconnaissance

CLI tool for open source and threat intelligence

haruspex
haruspex
Open Source Reverse Engineering

Vulnerability research assistant that extracts pseudocode from the IDA Hex-Rays decompiler.

Harvest
Harvest
Free Password Attacks

hash-cracker
hash-cracker
Open Source Password Attacks

Script to perform some hashcracking logic automagically

Hashcat
Hashcat
Open Source Kali Password Attacks

World's fastest password recovery utility supporting 300+ hash types. Uses GPU acceleration and advanced attack modes including dictionary, …

hashcat
hashcat
Free Kali Password Attacks

World's fastest and most advanced password recovery utility

hashcat-rule
hashcat-rule
Free Password Attacks

Rule for hashcat or john. Aiming to crack how people generate their password

hashcat-rules-collection
hashcat-rules-collection
Free Password Attacks

Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.

hashcat-wpa-server
hashcat-wpa-server
Open Source Password Attacks Wireless

Yet another WPA/WPA2 hashes cracker web server. Powered by HashCat. The backend is written in Python Flask.

hashcathelper
hashcathelper
Open Source Password Attacks Post-Exploitation

Run hashcathelper -h for help. The program is structured in subcommands. See hashcathelper -h for more information.

hashCrack
hashCrack
Open Source Password Attacks Wireless

Interactive Python CLI that wraps Hashcat with guided menus for wordlist, rule-based, brute-force, and hybrid attacks. Supporting 300+ hash …

Hashid
Hashid
Open Source Kali Password Attacks

Identifies different types of hashes used to encrypt data. Supports over 220 hash types and provides the corresponding Hashcat mode ID for d…

hashpass
hashpass
Free

A simple password manager with a twist.

hashtray
hashtray
Open Source Reconnaissance

hashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate an e…

hashview
hashview
Open Source Password Attacks

A web front-end for password cracking and analytics

hast-util-sanitize
hast-util-sanitize
Open Source Web Application

utility to sanitize hast nodes

HatSploit
HatSploit
Open Source Exploitation Post-Exploitation

Modular penetration testing platform that enables you to write, test, and execute exploit code.

Havoc C2
Havoc C2
Open Source Exploitation Post-Exploitation

Modern C2 framework designed for red teams. Features a sleek GUI, Demon agent with evasion techniques, team server for collaboration, and ex…

Hawkeye
Hawkeye
Free Forensics

Windows应急响应工具---Hawkeye(鹰眼)。集Windows日志分析,进程扫描,主机信息于一体的综合应急响应分析工具

hayabusa
hayabusa
Open Source Forensics

Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.

haylxon
haylxon
Open Source Reconnaissance

⚡ Blazing-fast tool to grab screenshots of your domain list right from terminal.

Hcxdumptool
Hcxdumptool
Open Source Kali Wireless

Small tool to capture packets from WLAN devices. Captures PMKID and EAPOL handshakes directly without requiring deauthentication. Outputs ca…

hcxdumptool
hcxdumptool
Open Source Kali Forensics Password Attacks

Small tool to capture packets from wlan devices.

hcxtools
hcxtools
Open Source Forensics Password Attacks

A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.

HealthyIG
HealthyIG
Open Source Reverse Engineering

Instagram without all the toxic features like reels, home page, explore page. You can still view your friend's reels, stories, view profiles…

hebrew_wordlists
hebrew_wordlists
Free Password Attacks

אין מילון מלבד Hspell ונדב הראל ודן קניגסברג הם נביאי האמת

heimdall-rs
heimdall-rs
Open Source Reverse Engineering

Heimdall is an advanced EVM smart contract toolkit specializing in bytecode analysis and extracting information from unverified contracts.

Helios
Helios
Free Exploitation Web Application

Use python helios.py --help for a full list of options and usage instructions.

Hello-CTF
Hello-CTF
Open Source

【Hello CTF】题目配套,免费开源的CTF入门教程,针对0基础新手编写,同时兼顾信息差的填补,对各阶段的CTFer都友好的开源教程,致力于CTF和网络安全的开源生态!

Hello-CTFtime
Hello-CTFtime
Open Source

本项目为 Hello-CTF 的关联项目,这是一个基于 Issue模板 + GitHub Action 实现的自动化赛事信息更新。

Hells-Hollow
Hells-Hollow
Free Exploitation

Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls

heralding
heralding
Open Source

Heralding |travis badge| |version badge| |codacy badge| =======================================================

heretek
heretek
Open Source Reverse Engineering

GDB TUI Dashboard for the understanding of vast knowledge

hermes-dec
hermes-dec
Open Source Reverse Engineering

A reverse engineering tool for decompiling and disassembling the React Native Hermes bytecode

hermit
hermit
Open Source Exploitation Post-Exploitation

A command and control framework.

hetty
hetty
Open Source

An HTTP toolkit for security research.

HEVD-BufferOverflowNonPagedPoolNx-Win10-22H2
HEVD-BufferOverflowNonPagedPoolNx-Win10-22H2
Free Exploitation

HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion

HexCtrl
HexCtrl
Free Reverse Engineering

Fully-featured GUI Hex Control.

hexd
hexd
Open Source Reverse Engineering

🔍 Colourful, human-friendly hexdump tool

hexerator
hexerator
Open Source Reverse Engineering

Versatile GUI hex editor focused on binary file exploration and aiding pattern recognition

hexflow
hexflow
Free

Automated Penetration Testing Mind Map with Artificial Intelligence

Hexi
Hexi
Open Source Reverse Engineering

Header-only, lightweight C++ library for binary streaming & serialization. Network data handling made easy peasy!

hexora
hexora
Open Source

Static analysis of malicious Python code

HexPatch
HexPatch
Open Source Reverse Engineering

HexPatch: a binary patcher and editor written in Rust with terminal user interface (TUI).

hexstrike-ai
hexstrike-ai
Open Source Kali

HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity tools…

hextor
hextor
Free Reverse Engineering

Hextor - Hexadecimal editor and binary data analyzing toolkit

HexWalk
HexWalk
Open Source Reverse Engineering

Hex Viewer/Editor/Analyzer compatible with Linux/Windows/MacOS

hfinder
hfinder
Open Source Reconnaissance

Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE

hfuzz
hfuzz
Free Password Attacks Scanning & Enumeration

Wordlist for web fuzzing, made from a variety of reliable sources including: result from my pentests, git.rip, ChatGPT, Lex, nuclei template…

hidden_bee_tools
hidden_bee_tools
Free Forensics

Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware

hijagger
hijagger
Open Source

Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration

hindsight
hindsight
Open Source Forensics

Browser forensics tool for Google Chrome (and other Chromium-based browsers)

Hippie-OSINT-Toolkit
Hippie-OSINT-Toolkit
Open Source Reconnaissance

A web based OSINT ressource and tool

hl2sdk
hl2sdk
Free Reverse Engineering

Half-Life 2 SDK Mirrors

hlbc
hlbc
Open Source Reverse Engineering

Hashlink bytecode disassembler, analyzer, decompiler and assembler.

hoaxshell
hoaxshell
Open Source

A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.

hobbits
hobbits
Open Source Reverse Engineering

A multi-platform GUI for bit-based analysis, processing, and visualization

holehe
holehe
Open Source Reconnaissance

holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the fo…

holehe-maltego
holehe-maltego
Open Source Reconnaissance

👋 Hi there! For any professional inquiries or collaborations, please reach out to me at: megadose@protonmail.com

hollows_hunter
hollows_hunter
Open Source Forensics

Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in…

holmesgpt
holmesgpt
Open Source Forensics

SRE Agent - CNCF Sandbox Project

HolyGrail
HolyGrail
Open Source Exploitation

BYOVD hunter to help prioritize windows drivers worth manual analysis

honeydet
honeydet
Free Exploitation

Signature based honeypot detector tool written in Golang

honeyhttpd
honeyhttpd
Open Source Forensics

HoneyHTTPD is a Python-based web server honeypot/service imitation builder. Great for honeypots or faking HTTP services.

honeypots
honeypots
Open Source Forensics

30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql…

honeyscanner
honeyscanner
Open Source Exploitation Scanning & Enumeration

Honeyscanner: A vulnerability analyzer for honeypots

honggfuzz-rs
honggfuzz-rs
Open Source Scanning & Enumeration

Fuzz your Rust code with Google-developed Honggfuzz !

Hooka
Hooka
Open Source Exploitation

Shellcode loader generator with multiples features

HookCase
HookCase
Free Reverse Engineering

Tool for reverse engineering macOS/OS X

hookish
hookish
Open Source Web Application

Hooks in to interesting functions and helps reverse the web app faster.

HopLa
HopLa
Open Source Web Application

HopLa Burp Suite Extender plugin - Brings AI capabilities, autocompletion support, and a set of useful payloads to Burp Suite

horus
horus
Open Source Forensics Reconnaissance

An OSINT / digital forensics tool built in Python

hostagram
hostagram
Free Reconnaissance

hostagram osint tool Instagram | hostagram

hostbase
hostbase
Open Source Wireless

A Python and ruby script to automate rogue AP process

HostOnion
HostOnion
Open Source Kali

Host A Hidden Service on TOR with an Onion Address !

houdini
houdini
Open Source

Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.

hound
hound
Open Source Kali

Hound is a simple and light tool for information gathering and capture exact GPS coordinates

houndsploit
houndsploit
Open Source Exploitation

An advanced graphical search engine for Exploit-DB

how-to-exploit-a-double-free
how-to-exploit-a-double-free
Free Exploitation

How to exploit a double free vulnerability in 2021. Use After Free for Dummies

how2keap
how2keap
Open Source

A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).

howtheysre
howtheysre
Free Forensics

A curated collection of publicly available resources on how technology and tech-savvy organizations around the world practice Site Reliabili…

HRP-Nnepnep-auto-pwn
HRP-Nnepnep-auto-pwn
Open Source Reverse Engineering

基于pwntools+angr的简单CTF AMD64 PWN AUTO FUZZ

hrtng
hrtng
Open Source Forensics Reverse Engineering

IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformations

htb-writeups
htb-writeups
Open Source Exploitation Post-Exploitation

The most comprehensive Hack The Box writeup collection - 500+ machines, 400+ challenges, interactive knowledge graph, skill trees, attack pa…

htmldate
htmldate
Open Source Forensics

Fast and robust date extraction from web pages, with Python or on the command-line

HtmlSanitizer
HtmlSanitizer
Open Source Web Application

Cleans HTML to avoid XSS attacks

htrace.sh
htrace.sh
Open Source Scanning & Enumeration

My simple Swiss Army knife for http/https troubleshooting and profiling.

HTTPUploadExfil
HTTPUploadExfil
Open Source

A simple HTTP server for delivering and exfiltrating files/data during, for example, CTFs.

httpworker
httpworker
Free Exploitation Post-Exploitation

A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For education…

httpx
httpx
Open Source Kali Reconnaissance Scanning & Enumeration

Fast and multi-purpose HTTP toolkit from ProjectDiscovery. Probes hosts for live web services, extracts title, status code, content length, …

httpx
httpx
Open Source Reconnaissance

httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.

huami-token
huami-token
Open Source Reverse Engineering

Script to obtain watch or band bluetooth token from Huami servers. Mirrored from https://codeberg.org/argrento/huami-token

hudhook
hudhook
Open Source Reverse Engineering

A videogame overlay framework written in Rust, supporting DirectX and OpenGL

Huge-Collection-of-CheatSheet
Huge-Collection-of-CheatSheet
Free

:goberserk: :goberserk: :goberserk: Share of my Huge Collection of Cheatsheet (Coding, Cheat, Pinouts, Command Lists, Etc.) :goberserk: :go…

huginn-net
huginn-net
Open Source

Multi-protocol passive fingerprinting library: TCP/HTTP (p0f-style) + TLS (JA4-style) analysis in Rust

humble
humble
Open Source Kali Web Application

A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.

hunting-rules
hunting-rules
Open Source Post-Exploitation

Suricata rules for network anomaly detection

huntkit
huntkit
Open Source

Docker - Ubuntu with a bunch of PenTesting tools and wordlists

HuntTheBug
HuntTheBug
Open Source Kali Reconnaissance Web Application

Advanced reconnaissance framework for bug bounty hunters - Automate subdomain enumeration, vulnerability scanning, and security reconnaissan…

huskyCI
huskyCI
Open Source Reverse Engineering

Performing security tests inside your CI

HXP-Ducky
HXP-Ducky
Open Source Kali

Most Powerfull 😈Crash any android device with virus from any link using termux or kali linux

Hydra
Hydra
Open Source Kali Password Attacks

Fast and flexible online password brute-forcing tool supporting 50+ protocols including FTP, SSH, Telnet, HTTP, SMB, LDAP, MySQL, RDP, IMAP,…

HydraDragonAntivirus
HydraDragonAntivirus
Open Source Forensics

Dynamic and static analysis with Real Time Malware Analysis with Antivirus for Windows, including open-source XDR (3 EDR projects), ClamAV, …

hydrafw
hydrafw
Open Source Reverse Engineering

HydraBus HydraFW official firmware for open source multi-tool for anyone interested in learning/developping/debugging/hacking/Penetration Te…

Hydroxide
Hydroxide
Free

Lua runtime introspection and network capturing tool for games on the Roblox engine.

hyper-reV
hyper-reV
Open Source Reverse Engineering

memory introspection and reverse engineering hypervisor powered by leveraging Hyper-V

HyperDbg
HyperDbg
Open Source Forensics Reverse Engineering

State-of-the-art native debugging tools

hyperpwn
hyperpwn
Open Source Exploitation Reverse Engineering

A hyper plugin to provide a flexible GDB GUI frontend with the help of GEF, pwndbg or peda

hypervisor-crack-audit
hypervisor-crack-audit
Free Reverse Engineering

Security analysis of the hypervisor drm method used to bypass denuvo. Reverse engineering of the driver loaders and boot components using Gh…

hypnus
hypnus
Open Source Evasion Exploitation

Library for execution obfuscation, designed to protect memory regions during inactivity or sleep cycles. It leverages thread pool timers, wa…

I-Espresso
I-Espresso
Free Social Engineering

I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrates …

i-Haklab
i-Haklab
Open Source

i-Haklab is a hacking laboratory for Termux that contains open source tools for pentesting, scan/find vulnerabilities, explotation and post-…

ians
ians
Open Source Password Attacks

Swiss army knife of hacking written in Golang, capable of performing various kinds of attacks 🐉

IAT-Tracer
IAT-Tracer
Free Forensics Reverse Engineering

An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (.ta…

ice9-bluetooth-sniffer
ice9-bluetooth-sniffer
Open Source Wireless

Wireshark-compatible all-channel BLE sniffer for bladeRF, with wideband Bluetooth sniffing for HackRF and USRP

iced
iced
Open Source Reverse Engineering

Blazing fast and correct x86/x64 disassembler, assembler, decoder, encoder for Rust, .NET, Java, Python, Lua

icpr2020dfdc
icpr2020dfdc
Open Source Forensics

Video Face Manipulation Detection Through Ensemble of CNNs

icpscan
icpscan
Open Source

用于快速查询IP、域名资产备案信息及权重的工具。欢迎关注微信公众号加群反馈问题~

IDA Pro
IDA Pro
Paid Reverse Engineering

The industry-standard disassembler and decompiler (with Hex-Rays decompiler). Supports the widest range of processor architectures and binar…

IDA_ClassInformer_PlugIn
IDA_ClassInformer_PlugIn
Free Reverse Engineering

Long overdue for an update. In particular for major IDA Pro version 9 (now 9.2). Has been for a while since , most certainly with version 9,…

ida_missinglink
ida_missinglink
Open Source Reverse Engineering

IDA Plugin that fills in missing indirect CALL & JMP target information

IDA_Ollvm-unflattener
IDA_Ollvm-unflattener
Open Source Evasion Reverse Engineering

Control Flow Flattening Deobfuscator for Obfuscator-LLVM as a plugin for IDA Pro.

IDA_Plugin_AntiDebugSeeker
IDA_Plugin_AntiDebugSeeker
Open Source Forensics Reverse Engineering

Automatically identify and extract potential anti-debugging techniques used by malware.

IDA-For-Delphi
IDA-For-Delphi
Open Source Reverse Engineering

IDA Python Script to Get All function names from Event Constructor (VCL)

ida-headless-mcp
ida-headless-mcp
Open Source Reverse Engineering

Headless IDA Pro binary analysis via Model Context Protocol

ida-minsc
ida-minsc
Open Source Reverse Engineering

A plugin based on IDAPython for a functional DWIM interface. Current development against most recent IDA is in the "persistence-refactor" br…

ida-plugins
ida-plugins
Open Source Reverse Engineering

An interactive list of plugins for hex-rays' IDA Pro

ida-pro-mcp
ida-pro-mcp
Open Source Reverse Engineering

AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.

IDA-Pro-SigMaker
IDA-Pro-SigMaker
Free Reverse Engineering

Signature maker plugin for IDA 9.x and 8.x

ida-sigmaker
ida-sigmaker
Open Source Reverse Engineering

sigmaker is a zero-dependency IDA Pro 9.0+ cross-platform signature maker plugin with optional SIMD (e.g. AVX2/NEON/SSE2) speedups that work…

IDA-Skill
IDA-Skill
Open Source Forensics Reverse Engineering

使用skill让 AI Agent 像安全分析师一样分析恶意样本 | AI Agent skill for automated malware analysis using IDA Pro

ida-theme-explorer
ida-theme-explorer
Open Source Forensics Reverse Engineering

Install and browse 100+ community themes for IDA Pro (Dracula, Monokai, Solarized and more)

IDA-VTableExplorer
IDA-VTableExplorer
Open Source Reverse Engineering

Automatic vtable detection, inheritance analysis, and function override tracking for reverse engineering compiled C++ binaries. Supports IDA…

IdaClu
IdaClu
Open Source Reverse Engineering

IdaClu is a version agnostic IDA Pro plugin for grouping similar functions. Pick an existing grouping algorithm or create your own.

idacode
idacode
Free Reverse Engineering

An integration for IDA and VS Code which connects both to easily execute and debug IDAPython scripts.

idaxex
idaxex
Open Source Reverse Engineering

Xbox/Xbox360 loader plugin for IDA 9, and xex1tool, supporting most known Xbox executable file formats (XEX/XBE)

IDOR-Forge
IDOR-Forge
Open Source Exploitation Web Application

IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.

ids-inf
ids-inf
Open Source Reconnaissance

ids-inf is a information gathering tool and with extra use full options like number unban and ban and it has phone number information gather…

IFPSTools.NET
IFPSTools.NET
Free Reverse Engineering

Tools for creating, modifying, assembling and disassembling RemObjects PascalScript files.

IG-Detective
IG-Detective
Open Source Reconnaissance

OSINT tool researched and designed to hunt down IG handles

ig-followersbotzz
ig-followersbotzz
Open Source Reconnaissance

insta-follow-botz . Instagram hacks bot with instagram report ,followers , information gathering , instagram hacking

IgFreak
IgFreak
Free

https://www.shadowhackr.com/2022/10/igfreak-instagram-hacking.html

ignorant
ignorant
Open Source Reconnaissance

ignorant allows you to check if a phone number is used on different sites like snapchat, instagram.

iKy
iKy
Open Source Reconnaissance

OSINT Project. Collect information from a mail. Gather. Profile. Timeline.

Il2CppDumper
Il2CppDumper
Open Source Reverse Engineering

Run Il2CppDumper.exe and choose the il2cpp executable file and global-metadata.dat file, then enter the information as prompted

Il2CppMemoryDumper
Il2CppMemoryDumper
Free Reverse Engineering

Dump Il2Cpp unprotected executable ELF and metadata from process memory

IllusiveFog
IllusiveFog
Open Source Post-Exploitation

Windows Administrator level Implant.

imessage_reader
imessage_reader
Open Source Forensics

This is a forensic tool written in Python 3. Use this tool to fetch the content (phone numbers, email addresses, messages and the account) f…

imessage-exporter
imessage-exporter
Open Source Reverse Engineering

Export iMessage data + run iMessage Diagnostics

ImHex
ImHex
Open Source Forensics Reverse Engineering

🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.

iMonitor
iMonitor
Open Source Forensics Reverse Engineering

iMonitor (Endpoint Behavior Analysis System) is a endpoint behavior monitoring and analysis software based on iMonitorSDK.

Impacket
Impacket
Open Source Kali Exploitation Post-Exploitation

Collection of Python classes for working with network protocols. Includes tools for SMB, MSRPC, LDAP, Kerberos, and more. Used for Pass-the-…

Impacket-secretsdump
Impacket-secretsdump
Open Source Kali Password Attacks Post-Exploitation

Dumps secrets remotely using a variety of techniques including DCSync (without running code on DC), VSS, and SAM dump. Part of the Impacket …

Impost3r
Impost3r
Open Source Exploitation

👻Impost3r -- A linux password thief

Impulse
Impulse
Open Source Kali

:bomb: Impulse Denial-of-service ToolKit

inb
inb
Free Reconnaissance

Automate the world of LinkedIn!

Incident-Playbook
Incident-Playbook
Open Source Forensics

GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]

incident-response-docs
incident-response-docs
Open Source Forensics

PagerDuty's Incident Response Documentation.

incident-response-plan-template
incident-response-plan-template
Free Forensics

A concise, directive, specific, flexible, and free incident response plan template

Incident-Response-Powershell
Incident-Response-Powershell
Open Source Forensics

PowerShell Digital Forensics & Incident Response Scripts.

Incident-Response-Projects-for-Beginners
Incident-Response-Projects-for-Beginners
Free Forensics

Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS attack …

incidental
incidental
Open Source Forensics

An opensource incident management platform integrating with Slack.

incidentbot
incidentbot
Open Source Forensics

The Open Source Incident Management Framework

incursore
incursore
Open Source Reconnaissance Scanning & Enumeration

Incursore came from nmapAutomator to be your personal raider while you enumerate a target.

indian-wordlist
indian-wordlist
Open Source Password Attacks

Commonly used passwords in Indian demography

indicator-intelligence
indicator-intelligence
Open Source

Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.

IndicatorOfCanary
IndicatorOfCanary
Open Source Exploitation

The Indicator of Canary is a collection of PoCs from research on identifying canaries in various file formats. It focuses on identifying kno…

ine-notes
ine-notes
Free

INE Training Notes

infect
infect
Open Source Kali

Infect Any Android Device With Virus From Link In Termux

inferno
inferno
Free Reverse Engineering

[MIRROR] unofficial implementation of Dante protocol (Audio over IP)

Infiltra-Firmware
Infiltra-Firmware
Open Source

Infiltra Firmware is an open-source firmware for wireless security testing, network analysis, and hardware hacking. FLASH IT BELOW USING OUR…

infinite-monitor
infinite-monitor
Open Source Reconnaissance

An AI-powered dashboard builder. Describe the widget you want in plain English and an AI agent writes, builds, and deploys it in real time.

infisical
infisical
Free

Infisical is the open-source platform for secrets, certificates, and privileged access management.

InfoHound
InfoHound
Open Source Reconnaissance

InfoHound is an OSINT to extract a large amount of data given a web domain name.

Information-Security-Tasks
Information-Security-Tasks
Free Exploitation Forensics

This repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily c…

Infosec_Reference
Infosec_Reference
Open Source Exploitation Forensics

An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.

infosec-events
infosec-events
Free Exploitation

List of past and future infosec related events.

Infosec-Notes
Infosec-Notes
Free Exploitation

Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.

InfosecHouse
InfosecHouse
Free Forensics

Tools & Resources for Cyber Security Operations

InfraGuard
InfraGuard
Open Source Exploitation

InfraGuard is a Command & Control Redirection Proxy and Manager which protects your Red Team Infrastructure against threat attribution

ingero
ingero
Open Source Forensics

eBPF-based GPU causal observability agent

inject
inject
Open Source

Packet crafting, injection and sniffing tool

InjectionIII
InjectionIII
Open Source Reverse Engineering

Re-write of Injection for Xcode in (mostly) Swift

injectopi
injectopi
Open Source Exploitation Reverse Engineering

A set of tutorials about code injection for Windows.

Injectra
Injectra
Free Forensics

Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types like…

inline_syscall
inline_syscall
Open Source Evasion Reverse Engineering

Inline syscalls made easy for windows on clang

InlineWhispers3
InlineWhispers3
Open Source Exploitation

Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion

innerwarden
innerwarden
Open Source Forensics

Autonomous EDR for Linux. Install, forget, protected. Kernel-level eBPF detection, AI triage, autonomous response. Apache-2.0. The autonomou…

inql
inql
Open Source Web Application

InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable sc…

insecure-kubernetes-deployments
insecure-kubernetes-deployments
Free

A full insecure kubernetes application for testing security tools

INSTA
INSTA
Free Password Attacks

Its Bruteforce Tool For Instagram

Insta-login
Insta-login
Free Social Engineering

Instagram login page clone which send your victim's credentials through email, using html css & php

instabrute.github.io
instabrute.github.io
Open Source

best script for hacking instagram

InstaCracker-CLI
InstaCracker-CLI
Open Source Password Attacks

Instagram password cracker - CLI

instagram_monitor
instagram_monitor
Open Source Reconnaissance

Track Instagram users' activities, profile changes and capture content with beautiful dashboards and instant notifications

Instagram-and-Facebook-login-page
Instagram-and-Facebook-login-page
Free Social Engineering

Instagram and Facebook login page using HTML and CSS

InstagramPrivSniffer
InstagramPrivSniffer
Open Source Reconnaissance

First ever tool to view "Instagram private posts" anonymously

instahack
instahack
Open Source Kali

instahack is a bash & python based script which is officially made to test password strength of Instagram account from termux and kali with…

INSTAHACK
INSTAHACK
Open Source Reconnaissance

A python based tool for hacking instagram accounts

INSTAHACK
INSTAHACK
Free Password Attacks

Auto password Generator & Multi Bruteforce Instagram

instaloader
instaloader
Open Source Reconnaissance

Download pictures (or videos) along with their captions and other metadata from Instagram.

InstaMassUnliker
InstaMassUnliker
Open Source Reconnaissance

A powerful Instagram bulk unlike tool to mass unlike Instagram reels and posts all at once for managing your digital footprint.

InstaReport
InstaReport
Free Kali

InstaReport v4.3.1 — Premium social media auto-report, ban & unban tool. One-click mass reporting for Instagram, Twitter/X, Threads & Snapch…

instatracker
instatracker
Open Source Exploitation Reconnaissance

📸 an Instagram tracking script that logs any changes to an Instagram account (followers, following, posts, and bio) written in Python.

IntelHub
IntelHub
Open Source Reconnaissance

A modern and intuitive Chrome extension that brings your favorite OSINT tools, metadata analyzers, and Google Dorking assistants right into …

intellyweave
intellyweave
Open Source Reconnaissance

AI-powered platform for OSINT intelligence analysis. Features archive discovery with hypothesis-driven investigation, GLiNER entity extracti…

intelmq
intelmq
Open Source Forensics Social Engineering

IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.

IntelOwl
IntelOwl
Open Source Forensics Reconnaissance

IntelOwl: manage your Threat Intelligence at scale

IntelTrace
IntelTrace
Free Kali

Interactsh
Interactsh
Open Source Scanning & Enumeration Web Application

Out-of-band interaction gathering server. Generates unique collaboration URLs for detecting blind vulnerabilities like SSRF, XXE, SSTI, blin…

Intercept
Intercept
Open Source

A deep technical dive into how MITM attacks actually work in Ethernet, IPv4, and IPv6 networks from ARP and DHCP to IPv6 RA, DNS, and FHRP s…

intercept
intercept
Free Reverse Engineering

INTERCEPT / Policy as Code Auditing

Interceptor
Interceptor
Open Source Kali

An Ip-Grabber Tool With a Custom Redirect Link

InterceptSuite
InterceptSuite
Open Source

MITM proxy for TCP/TLS/DTLS/UDP traffic, with STARTTLS, IoT, Thick Client and more.

Interlace
Interlace
Open Source Scanning & Enumeration

Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.

InternalAllTheThings
InternalAllTheThings
Free Exploitation

Active Directory and Internal Pentest Cheatsheets

Internet-OSINT
Internet-OSINT
Free Reconnaissance

Cast your OSINT net further a field and see what else you can discover on the Internet.

inthewilddb
inthewilddb
Open Source Exploitation

Hourly updated database of exploit and exploitation reports

INtrack
INtrack
Free Exploitation Reconnaissance

A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.

inventory
inventory
Open Source Exploitation Reconnaissance

Asset inventory of over 800 public bug bounty programs.

investigations
investigations
Free Forensics

Indicators of Compromise from Amnesty International's cyber investigations

Investigo
Investigo
Open Source Reconnaissance

🔎 Find usernames and download their data across social media.

InviZzzible
InviZzzible
Open Source Evasion

InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date de…

Invoke-ADEnum
Invoke-ADEnum
Open Source Post-Exploitation

Active Directory Auditing and Enumeration

Invoke-PassTheCert
Invoke-PassTheCert
Free

Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel

Invoke-PowerChrome
Invoke-PowerChrome
Free

Decrypt Chromium based browser passwords with PowerShell.

Invoke-RDPThief
Invoke-RDPThief
Free Post-Exploitation

Inject RDPThief into memory with PowerShell.

Invoke-SMBRemoting
Invoke-SMBRemoting
Open Source Post-Exploitation

Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement

ioc-finder
ioc-finder
Open Source Forensics

Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security related i…

iocextract
iocextract
Open Source Reconnaissance

Defanged Indicator of Compromise (IOC) Extractor.

IoCreateDriver
IoCreateDriver
Free Reverse Engineering

IoCreateDriver Implementation, it can be useful if you're trying to bypass anticheats

IOK
IOK
Free Social Engineering

IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics

ios_forensics_suite
ios_forensics_suite
Free Forensics

A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.

iOS_UEDumper
iOS_UEDumper
Open Source Reverse Engineering

MobileSubstrate tweak to dump iOS unreal engine games

ios-penetration-testing-cheat-sheet
ios-penetration-testing-cheat-sheet
Open Source Reverse Engineering Web Application

This is more of a checklist for myself. May contain useful tips and tricks. Still need to add a lot of things.

IP-Biter
IP-Biter
Open Source Reconnaissance

IP-Biter: The Hacker-friendly E-Mail (but not only) Tracking Framework

IP-Obfuscator
IP-Obfuscator
Open Source Evasion

Hide an IP address in scripts using hex/decimal/octal conversions

IP-Tracer
IP-Tracer
Open Source Reconnaissance

Track any ip address with IP-Tracer. IP-Tracer is developed for Linux and Termux. you can retrieve any ip address information using IP-Trace…

IPA
IPA
Open Source Forensics

GUI analyzer for deep-diving into PDF files. Detect malicious payloads, understand object relationships, and extract key information for thr…

ipa-dict
ipa-dict
Open Source Password Attacks

Monolingual wordlists with pronunciation information in IPA

ipa-medit
ipa-medit
Open Source

Memory modification tool for re-signed ipa supports iOS apps running on iPhone and Apple Silicon Mac without jailbreaking.

IPAnalyzer
IPAnalyzer
Open Source Kali Reconnaissance

IPAnalyzer is an IP Address Tracker OSINT ethical hacking tool built for Linux distributions, designed to gather detailed information about …

IPAPatch
IPAPatch
Open Source Reverse Engineering

Patch iOS Apps, The Easy Way, Without Jailbreak.

IPASN-History
IPASN-History
Open Source

IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date

ipatool
ipatool
Open Source Reverse Engineering

Command-line tool that allows searching and downloading app packages (known as ipa files) from the iOS App Store

IPED
IPED
Free Forensics

IPED Digital Forensic Tool. It is an open source software that can be used to process and analyze digital evidence, often seized at crime sc…

IPGhost
IPGhost
Open Source

IPGhost is a strong tool for ethical hackers. This tool automatically changes your IP address , making it hard for anyone to track your onl…

iphone_backup_decrypt
iphone_backup_decrypt
Free Forensics

Decrypt an encrypted local iOS backup on Windows or MacOS

IPicker
IPicker
Open Source Kali

A simple IP locator tool

ipod-gadget
ipod-gadget
Open Source Reverse Engineering

iPod usb gadget for audio playback. Client app: https://github.com/oandrew/ipod

ipranges
ipranges
Free Reconnaissance Web Application

🔨 List all IP ranges from: Google (Cloud & GoogleBot), Bing (Bingbot), Amazon (AWS), Microsoft, Oracle (Cloud), GitHub, Facebook (Meta), Ope…

IPRotate_Burp_Extension
IPRotate_Burp_Extension
Free

Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.

ipsourcebypass
ipsourcebypass
Free

This Python script can be used to bypass IP source restrictions using HTTP headers.

Iran-clash-rules
Iran-clash-rules
Open Source Social Engineering

Enhanced Clash and Clash.Meta routing rules with Iranian domains ruleset and a focus on security and adblocking.

Iran-sing-box-rules
Iran-sing-box-rules
Open Source Social Engineering

Enhanced sing-box and sing-box-clients routing rules with built-in Iranian domains and a focus on security and adblocking.

Iran-v2ray-rules
Iran-v2ray-rules
Open Source Social Engineering

Enhanced v2ray/xray and v2ray/xray-clients routing rules with built-in Iranian domains and a focus on security and adblocking.

iris-web
iris-web
Open Source Forensics

Collaborative Incident Response platform

ISC2-CC-Cybersecurity-Study-Material
ISC2-CC-Cybersecurity-Study-Material
Free Forensics

My learning, tutorials on Cybersecurity

isect
isect
Open Source Password Attacks

Segments intersection detection library

Islamic-Republic-Influence-Networks
Islamic-Republic-Influence-Networks
Free Reconnaissance

📊 OSINT dataset of 10,700+ Twitter/X accounts linked to Islamic Republic influence networks. Metadata-only for CIB research & network analys…

isoalloc
isoalloc
Open Source Exploitation

A general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good pe…

isomorphic-dompurify
isomorphic-dompurify
Open Source Web Application

Use DOMPurify on server and client in the same way

it-depends
it-depends
Open Source Scanning & Enumeration

A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositories.

ITIL-4-Foundation-IT-Service-Management-Practice-Tests-Exams-Questions-Answers
ITIL-4-Foundation-IT-Service-Management-Practice-Tests-Exams-Questions-Answers
Free Forensics

⛳️ PASS: ITIL 4 Foundation (IT Service Management) by learning based on our Questions & Answers (Q&A) Practice Tests Exams.

ivre
ivre
Open Source Reconnaissance Scanning & Enumeration

Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your …

IYPS
IYPS
Open Source

A password strength app that evaluates and rates your password's robustness, estimates crack time, and provides helpful warnings and suggest…

JADX
JADX
Open Source Kali Reverse Engineering

Dex to Java decompiler. Produces Java source code from Android APK/DEX/AAR/AAB files. Features a GUI with search, deobfuscation, and resourc…

jadx-ai-mcp
jadx-ai-mcp
Open Source Reverse Engineering

Plugin for JADX to integrate MCP server

jadx-mcp-server
jadx-mcp-server
Open Source Reverse Engineering

⚡ Fully automated MCP server built to communicate with JADX-AI-MCP Plugin to analyze Android APKs using LLMs like Claude — uncover vulnerabi…

jaeles
jaeles
Open Source

The Swiss Army knife for automated Web Application Testing

jail
jail
Open Source

An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.

jak-project
jak-project
Open Source Reverse Engineering

Reviving the language that brought us the Jak & Daxter Series

Jammy
Jammy
Free Scanning & Enumeration

janusec
janusec
Free Exploitation Web Application

JANUSEC Application Gateway provides secure access, including reverse proxy, K8S Ingress Controller, Automatic ACME Certificate, WAF, 5-Seco…

JAR
JAR
Open Source Kali

jargonaut
jargonaut
Open Source Evasion Reverse Engineering

Python 3.9 obfuscator built on LibCST with a library of fun obfuscation techniques, including polynomial MBAs, runtime bytecode patching, et…

Jarida
Jarida
Free Reverse Engineering

Jarida (Jadx + Frida) is a Jadx GUI plugin that lets you trace and optionally patch Java method return values at runtime using Frida, direct…

JarPlant
JarPlant
Open Source Exploitation

Spike JAR files with malicious implants.

Java-Android-Magisk-Burp-Objection-Root-Emulator-Easy
Java-Android-Magisk-Burp-Objection-Root-Emulator-Easy
Open Source

Java Android Magisk Burp Objection Root Emulator Easy (JAMBOREE)

java-chains
java-chains
Free Exploitation

Java Vulnerability Exploitation Platform

java-disassembler
java-disassembler
Open Source Reverse Engineering

The Java Disassembler (JDA) is a GUI reverse engineering tool that can turn this:

java-reverse-tcp
java-reverse-tcp
Open Source Web Application

JAR, Java, and JSP shells that work on Linux OS, macOS, and Windows OS.

javascript-deobfuscator
javascript-deobfuscator
Open Source Reverse Engineering

General purpose JavaScript deobfuscator

javascript-deobfuscator
javascript-deobfuscator
Free Reverse Engineering

A deobfuscator for JavaScript codes generated by Obfuscator.io

javascript-obfuscator
javascript-obfuscator
Open Source Evasion

A powerful obfuscator for JavaScript and Node.js

JavaSecurity
JavaSecurity
Open Source Web Application

Java web and command line applications demonstrating various security topics

JDBG
JDBG
Open Source Reverse Engineering

Java Dynamic Reverse Engineering and Debugging Tool

JDumpSpider
JDumpSpider
Open Source

HeapDump敏感信息提取工具

jetisteam
jetisteam
Open Source Reverse Engineering

(another?) UNOFFICIAL Steam mobile client project

JGeckoU
JGeckoU
Free Reverse Engineering

Wii U RAM TCP Debugger Client/Cheat Code Manager

jielie
jielie
Free Reverse Engineering

JieLi Technology ('杰理' aka "Jerry", "π" // "jelly", 光) is a company that was based in year 2010 in the ZhuHai city of Guangdong province, Ch…

jiff
jiff
Open Source Web Application

JavaScript library for building web-based applications that employ secure multi-party computation (MPC).

Jira-Lens
Jira-Lens
Open Source

Fast and customizable vulnerability scanner For JIRA written in Python

jiraffe
jiraffe
Open Source

One stop place for Jira security reconnaissance and exploitation in your proximity

JitDecrypter
JitDecrypter
Open Source Evasion Reverse Engineering

A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code secti…

JNDI-Injection-Exploit-Plus
JNDI-Injection-Exploit-Plus
Open Source Exploitation

80+ Gadgets(30 More than ysoserial). JNDI-Injection-Exploit-Plus is a tool for generating workable JNDI links and provide background service…

John the Ripper
John the Ripper
Open Source Kali Password Attacks

Fast password cracker available for many operating systems. Auto-detects hash types, supports dictionary and incremental attacks, and includ…

joincap
joincap
Open Source Forensics

Merge multiple pcap files together, gracefully.

JoJoLoader
JoJoLoader
Free Exploitation

助力红队成员一键生成免杀木马,使用rust实现 | Help Redteam members generate Evasive Anti-virus software Trojan

jok3r
jok3r
Free Web Application

Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework

jomon
jomon
Open Source Forensics

A network forensics and passive sniffer tool

Joomscan
Joomscan
Open Source Kali Web Application

OWASP Joomla vulnerability scanner. Detects Joomla version, components, modules, and templates with known vulnerabilities. Checks for common…

joomscan
joomscan
Open Source Exploitation Web Application

OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/

JoySafeter
JoySafeter
Open Source

🚀 JoySafeter: An enterprise AI Agent Platform—Not just chatting. building、running、testing, and tracing autonomous Agent Teams with visual or…

jpsxdec
jpsxdec
Free Reverse Engineering

jPSXdec: cross-platform PlayStation 1 audio and video converter

jQuery-with-XSS
jQuery-with-XSS
Free Web Application

jQuery with XSS, Testing and Secure Version

js-confuser
js-confuser
Open Source Evasion

JS-Confuser is a JavaScript obfuscation tool to make your programs *impossible* to read.

js-cookie-monitor-debugger-hook
js-cookie-monitor-debugger-hook
Open Source Exploitation Reverse Engineering

js cookie逆向利器:js cookie变动监控可视化工具 & js cookie hook打条件断点

js-x-ray
js-x-ray
Open Source

JavaScript & Node.js open-source SAST scanner. A static analyser for detecting most common malicious patterns 🔬.

JScrewIt
JScrewIt
Open Source Evasion

Write any JavaScript with six characters: ! ( ) + [ ]

jsdec
jsdec
Free Reverse Engineering

Simple decompiler for Rizin. It's capable of generating readable pseudo code even on handmade assembly.

jsdeob-workbench
jsdeob-workbench
Free Reverse Engineering

Reverse engineer obfuscated JavaScript visually. Chain transforms, inspect AST changes, write reusable deobfuscation plugins.

jshookmcp
jshookmcp
Open Source Reverse Engineering

js hook toolkit that all you need

JShunter
JShunter
Open Source

jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying sensi…

jsql-injection
jsql-injection
Open Source Kali Exploitation

jSQL Injection is a Java application for automatic SQL database injection.

JSRecon-Buddy
JSRecon-Buddy
Open Source Reconnaissance

A simple browser extension to quickly find interesting security-related information on a webpage.

jsscm
jsscm
Open Source Exploitation Web Application

JSSCM detects expired domains for Stored XSS exploitation during browsing.

jsubfinder
jsubfinder
Open Source

jsubfinder searches webpages for javascript & analyzes them for hidden subdomains and secrets (wip).

Judge-Jury-and-Executable
Judge-Jury-and-Executable
Open Source Forensics

A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite…

juice-shop
juice-shop
Open Source Web Application

OWASP Juice Shop: Probably the most modern and sophisticated insecure web application

juice-shop-ctf
juice-shop-ctf
Open Source Web Application

Tool to export Juice Shop challenges and hints in data format compatible with CTFd, RootTheBox or FBCTF

Juice-Shop-Write-up
Juice-Shop-Write-up
Free Web Application

Non-official write up for the Juice-Shop CTF

julius
julius
Open Source Reconnaissance

Simple LLM service identification - translate IP:Port to Ollama, vLLM, LiteLLM, or 60+ other AI services in seconds

jupyter-collection
jupyter-collection
Open Source Forensics

Collection of Jupyter Notebooks by @fr0gger_

JustEvadeBro
JustEvadeBro
Free Evasion

JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.

justniffer
justniffer
Open Source

Justniffer Just A Network TCP Packet Sniffer. Justniffer is a network protocol analyzer that captures network traffic and produces logs in …

JustTryHarder
JustTryHarder
Free

JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)

juumla
juumla
Open Source Exploitation

🦁 Python project to identify and scan for vulnerabilities related to the Joomla CMS project. It scans for common misconfigurations and publi…

JWT_Tool
JWT_Tool
Open Source Web Application

Toolkit for testing, tampering, and forging JSON Web Tokens. Tests common JWT vulnerabilities including algorithm confusion (alg:none, RS256…

jwt-cracker
jwt-cracker
Open Source Password Attacks Web Application

Simple HS256, HS384 & HS512 JWT token brute force cracker.

jwt-pwn
jwt-pwn
Open Source Web Application

Security Testing Scripts for JWT

jwtcat
jwtcat
Open Source Web Application

A CPU-based JSON Web Token (JWT) cracker and - to some extent - scanner.

JWTweak
JWTweak
Free Web Application

Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.

JYso
JYso
Open Source Web Application

JYso

K-OTP-X
K-OTP-X
Free Social Engineering

Advance OTP Bypass Tool. Termux Supported.

k8spider
k8spider
Open Source Exploitation Reconnaissance

Powerful+Fast+Low Privilege Kubernetes discovery tools

K8tools
K8tools
Open Source Exploitation Password Attacks

K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Ex…

KAD
KAD
Free Social Engineering

Filtry do uBlocka Origin i AdGuarda, chroniące przed różnymi zagrożeniami w polskiej sieci, takimi jak wirusy, fałszywe sklepy i subskrypcje…

KADhosts
KADhosts
Free Social Engineering

Wersja hosts, PiHole, dnsmasq, domenowa (Forti Guard) filtrów KAD

kaiju
kaiju
Free Reverse Engineering

CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- plea…

kaitai_struct
kaitai_struct
Free Reverse Engineering

Kaitai Struct: declarative language to generate binary data parsers in C++ / C# / Go / Java / JavaScript / Lua / Nim / Perl / PHP / Python /…

kaldi-active-grammar
kaldi-active-grammar
Open Source Post-Exploitation

Python Kaldi speech recognition with grammars that can be set active/inactive dynamically at decode-time

kali-ios
kali-ios
Open Source Kali

Kali-ios brings the power and versatility of Kali Linux right at your fingertips. It allows users to access Kali in text mode through a term…

Kali-Linux
Kali-Linux
Open Source Kali Exploitation Forensics

A guide to using Kali Linux tools for web penetration testing, ethical hacking, forensics, and bug bounty. Covers setup, key tools, methodol…

Kali-Linux-Ebooks
Kali-Linux-Ebooks
Free Exploitation

Top 20 Kali Linux Related E-books (Free Download)

Kali-Linux-for-Android
Kali-Linux-for-Android
Free Kali

Transform your Android device into a cybersecurity playground with Kali Magic! 🚀

kali-linux-pitail-setup
kali-linux-pitail-setup
Free Kali

Raspberry Pi Zero 2 W Kali Linux (Pi-Tail) installation and setup

Kali-Linux-Termux
Kali-Linux-Termux
Free Kali

Run Kali Linux Nethunter Rootless with GUI in Termux

kali-linux-tools-interface
kali-linux-tools-interface
Open Source Kali

Graphical Web interface developed to facilitate the use of security information tools.

kali-pinephone
kali-pinephone
Free Kali

Kali Linux Phosh for PinePhone/Pro and other QCOM Mainlined Devices

kali-theme
kali-theme
Open Source Kali

Kali Linux Theme Installer , Zsh Shell , Pure Look

Kali-xRDP
Kali-xRDP
Free Kali

Kali Linux for WSL1 or WSL2 and desktop sessions over RDP.

KaliGPT
KaliGPT
Free Kali

KaliGPT: an Agentic AI (built with Gemini, ChatGPT, Ollama, OpenRouter Models) fine tuned for ethical hackers & students in offensive securi…

KaliIntelligenceSuite
KaliIntelligenceSuite
Open Source Kali Reconnaissance

Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standard…

kaliLinuxNethunter-termux
kaliLinuxNethunter-termux
Open Source Kali

Install Kali Linux Nethunter in termux - orginal by @Hax4us

KaliNethunter-Rootless
KaliNethunter-Rootless
Open Source Kali

NetHunter Rootless Edition. Maximum flexibility with no commitment. Install Kali NetHunter on any stock, unrooted Android device without vo…

kalipwm
kalipwm
Open Source Kali

Despliega un entorno de hacking profesional para Kali Linux ejecutando solo un script.

kanha
kanha
Open Source Reconnaissance

🦚 A web-app pentesting suite written in rust .

Kanvas
Kanvas
Open Source Forensics

A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.

Karkinos
Karkinos
Free

Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Cracking H…

karma_v2
karma_v2
Free Reconnaissance

⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)

kartlanpwn
kartlanpwn
Free Exploitation

Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's "KartLANPwn" buffer overflow vulnerability

karton
karton
Open Source Forensics

Distributed malware processing framework based on Python, Redis and S3.

katam
katam
Free Reverse Engineering

WIP Decompilation of Kirby & The Amazing Mirror (USA)

kavach
kavach
Open Source

Tactical AI Workspace Monitor & EDR

kc7
kc7
Open Source Forensics

A cybersecurity game in Azure Data Explorer

kcare-uchecker
kcare-uchecker
Open Source

A simple tool to detect outdated shared libraries

kcwarden
kcwarden
Open Source Exploitation

Automatically audit your Keycloak configuration for security issues

KEIP
KEIP
Open Source Forensics

Kernel-Enforced Install-Time Policies (KEIP): An eBPF/LSM based security tool that detects and blocks malicious network activity during pip …

keklick
keklick
Open Source Reconnaissance

Keklick - C2 Hunting, Reporting and Visualization Tool

kepler
kepler
Free Exploitation

NIST-based CVE lookup store and API powered by Rust.

Kerbrute
Kerbrute
Open Source Kali Password Attacks Reconnaissance

Kerberos brute-forcing tool for performing user enumeration and password spraying against Active Directory. Does not trigger account lockout…

Keres
Keres
Open Source Exploitation

Persistent Powershell backdoor tool {😈}

kernagent
kernagent
Open Source Forensics Reverse Engineering

Headless AI agent for deterministic reverse engineering.

kernel-exploits
kernel-exploits
Free Exploitation Post-Exploitation

My proof-of-concept exploits for the Linux kernel

keskivonfer
keskivonfer
Free Reconnaissance

Keskivonfer is a tool that allows you to extract information from a vinted account

kestrel-lang
kestrel-lang
Open Source

Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.

Ketmanto-Cybersecurity-Portfolio
Ketmanto-Cybersecurity-Portfolio
Open Source Forensics

I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilities, …

keychain
keychain
Open Source

A manager for ssh-agent and gpg-agent

keycroc-payloads
keycroc-payloads
Free

The Official Key Croc Payload Repository

keyFinder
keyFinder
Open Source Reconnaissance Web Application

Passive API key and secret discovery browser extension for Chrome and Firefox. 80+ detection patterns, zero config.

keyleak-detector
keyleak-detector
Open Source

KeyLeak Detector – Scan websites for exposed API keys and secrets

Keylogger
Keylogger
Open Source

A simple keylogger for Windows, Linux and Mac

keylogger
keylogger
Open Source

:closed_lock_with_key: Open Source Python Keylogger Collection

Keylogger
Keylogger
Free Exploitation

Keylogger is 100% invisible keylogger not only for users, but also undetectable by antivirus software. keylogger Monitors all keystokes, Mou…

keypatch
keypatch
Open Source Reverse Engineering

Multi-architecture assembler for IDA Pro. Powered by Keystone Engine.

keystone
keystone
Open Source Reverse Engineering

Keystone assembler framework: Core (Arm, Arm64, Hexagon, Mips, PowerPC, Sparc, SystemZ & X86) + bindings

kics
kics
Open Source

Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure…

killshot
killshot
Free Exploitation Reconnaissance

A Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner

kimi
kimi
Open Source Reconnaissance Scanning & Enumeration

Attack Surface Discovery tool built on a microservice approach, utilizing multi-threading for fast, internet-scale asset indexing

King Phisher
King Phisher
Open Source Social Engineering

Phishing campaign toolkit with client-server architecture. Features rich email templates with Jinja2, credential tracking, geo-location mapp…

king-phisher
king-phisher
Open Source Social Engineering

For instructions on how to install, please see the INSTALL.md file. After installing, for instructions on how to get started please see the …

Kismet
Kismet
Open Source Kali Reconnaissance Wireless

Wireless network detector, sniffer, wardriver, and WIDS (Wireless Intrusion Detection System). Supports Wi-Fi, Bluetooth, Zigbee, and other …

KitHack
KitHack
Open Source Reconnaissance Social Engineering

Hacking tools pack & backdoors generator.

kitsec-core
kitsec-core
Open Source Exploitation Reconnaissance

Kitsune
Kitsune
Open Source Post-Exploitation

KittyLoader
KittyLoader
Free Evasion Exploitation

KittyLoader is a highly evasive loader written in C / Assembly

KittyMemory
KittyMemory
Open Source Reverse Engineering

This library aims for runtime code patching for both Android and iOS

KittyMemoryEx
KittyMemoryEx
Open Source Reverse Engineering

Dedicated library for runtime code patching, injection and some useful memory utilities. works for both Android and Linux

kizagan
kizagan
Open Source Post-Exploitation

KIZAGAN is a RAT,c2 command&control tool.It allows you to build executables and control infected machines.

knary
knary
Open Source

A simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams/Lark/Telegram & Pushover support

knockpy
knockpy
Open Source Reconnaissance

✅ Fast & Async • 🔐 Recon + Brute • 🔧 Easy to Extend

knoxsser
knoxsser
Open Source Web Application

A powerful bash script for massive XSS scanning leveraging Brute Logic's KNOXSS API

kong
kong
Open Source Reverse Engineering

The world's first agentic reverse engineer.

Kong-API-Manager
Kong-API-Manager
Free

Kong API Manager with Prometheus And Graylog

kong-loader
kong-loader
Open Source Evasion Exploitation

Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible in m…

kontext-cli
kontext-cli
Open Source

Open-source CLI for AI coding agents. Give your coding agents access to services without exposing keys.

kosty
kosty
Open Source Post-Exploitation

Scan 30+ AWS services. Find cost waste. Detect security gaps. Map your attack surface. One command.

KotOR.js
KotOR.js
Open Source Reverse Engineering

A remake of the Odyssey Game Engine that powered KotOR I & II written in JavaScript

KoviD
KoviD
Free Exploitation

Rootkits are typically closed-source threats that operate in shadows, making them difficult to understand and defend against. KoviD exists t…

KQL
KQL
Free Forensics

Threat Hunting query in Microsoft 365 Defender, XDR. Provide out-of-the-box KQL hunting queries - App, Email, Identity and Endpoint.

Kraken
Kraken
Free Password Attacks

All-in-One Toolkit for BruteForce Attacks

krane
krane
Open Source Reverse Engineering

Kubernetes RBAC static analysis & visualisation tool

KryptonC2
KryptonC2
Free Post-Exploitation

Krypton C2 is a simple botnet source. Credits Source Code: NixWasHere

KslDump
KslDump
Open Source Exploitation

KslDump — Why bring your own knife when Defender already left one in the kitchen?

ktool
ktool
Open Source Reverse Engineering

pip install k2l | Mach-O + Obj-C analysis TUI / CLI kit and library. Zero compiled deps, runs anywhere with a python interpreter.

KubeAPI-Inspector
KubeAPI-Inspector
Free

A tool specifically designed for Kubernetes environments aims to efficiently and automatically discover hidden vulnerable APIs within cluste…

KubeHound
KubeHound
Open Source Exploitation

Tool for building Kubernetes attack paths

kubernetes-goat
kubernetes-goat
Open Source Exploitation Web Application

Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on play…

kubeshark
kubeshark
Open Source Forensics

eBPF-powered network observability for Kubernetes. Indexes L4/L7 traffic with full K8s context, decrypts TLS without keys. Queryable by AI a…

Kuiper
Kuiper
Free Forensics

Digital Forensics Investigation Platform

kunge-cybersecurity-learning
kunge-cybersecurity-learning
Free Exploitation

此仓库不在更新,请移步:https://github.com/xsecself/pentester-skills

Kyber
Kyber
Open Source Reverse Engineering

A unified game launcher for STAR WARS Battlefront II (EA) that adds community-hosted multiplayer with full mod support, a server browser, pr…

kylebot
kylebot
Open Source Post-Exploitation

Kylebot | This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !

L0p4-Toolkit
L0p4-Toolkit
Open Source Kali Exploitation Reconnaissance

L0p4 Toolkit is a powerful hacking toolset designed for hacker's. It includes advanced tools for web hacking (SQLi, XSS), network scanning, …

L0p4Map
L0p4Map
Open Source Kali Scanning & Enumeration

Professional network monitoring & visualization tool. L0P4Map combines high-speed ARP discovery with full nmap integration and a real-time i…

lactf-archive
lactf-archive
Open Source

An archive of past challenges from LA CTF hosted by ACM Cyber at UCLA and Psi Beta Rho.

Ladon
Ladon
Open Source Exploitation Password Attacks

Ladon大型内网渗透扫描器,PowerShell、Cobalt Strike插件、内存加载、无文件扫描。含端口扫描、服务识别、网络资产探测、密码审计、高危漏洞检测、漏洞利用、密码读取以及一键GetShell,支持批量A段/B段/C段以及跨网段扫描,支持URL、主机、域名列表扫描…

LADX-Disassembly
LADX-Disassembly
Free Reverse Engineering

Disassembly of Legend of Zelda: Links Awakening DX

lamda
lamda
Open Source Reverse Engineering

The most powerful Android RPA agent framework, next generation mobile automation.

lamp-cloud
lamp-cloud
Open Source Web Application

[灯灯]微服务中后台快速开发平台,支持jdk21、jdk17、jdk8,专注于多租户、开放平台解决方案,亦可作为普通项目(非SaaS架构)的基础开发框架使用,目前已实现插拔式数据库隔离、SCHEMA隔离、字段隔离 等租户隔离方案。

lancelot
lancelot
Open Source Forensics Reverse Engineering

intel x86(-64) code analysis library that reconstructs control flow

landrun
landrun
Open Source

Run any Linux process in a secure, unprivileged sandbox using Landlock. Think firejail, but lightweight, user-friendly, and baked into the k…

Laravel-RCE-Exploitation-Toolkit
Laravel-RCE-Exploitation-Toolkit
Free Exploitation

Laravel RCE Exploitation Toolkit

Laravel-Scrubber
Laravel-Scrubber
Open Source

A Laravel package to scrub sensitive information that breaks operational security policies from being leaked on accident or not by developer…

laravel-xss-protection
laravel-xss-protection
Open Source Web Application

Laravel XSS Protection Middleware

Laser_tape_reverse_engineering
Laser_tape_reverse_engineering
Open Source Reverse Engineering

Alternative firmware for a cheap X-40 laser tape measure

LAST
LAST
Open Source

Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini

last_layer
last_layer
Open Source

Ultra-fast, low latency LLM prompt injection/jailbreak detection ⛓️

latte
latte
Free Web Application

☕ Latte: the safest & truly intuitive templates for PHP. Engine for those who want the most secure PHP sites.

Lawliet
Lawliet
Open Source Reconnaissance

🕵️ Track down social media profiles using a specific username across multiple social network platforms

Lazy-Hunter
Lazy-Hunter
Open Source Reconnaissance

LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs

lazytrivy
lazytrivy
Open Source

Vulnerability scanning just got lazier

LazyXss
LazyXss
Free Web Application

Automation tool to testing and confirm the xss vulnerability.

ldap2json
ldap2json
Free Post-Exploitation

The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.

ldapconsole
ldapconsole
Open Source Post-Exploitation

The ldapconsole script allows you to perform custom LDAP requests to a Windows domain.

LDAPWordlistHarvester
LDAPWordlistHarvester
Free Password Attacks

A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.

leaker
leaker
Open Source Reconnaissance

Passive leak enumeration tool.

Leakfa.com
Leakfa.com
Open Source Reconnaissance

A simple way to check if your data has been compromised in major security breaches affecting Iran — similar to "Have I Been Pwned" but focus…

leaks
leaks
Free Reconnaissance Reverse Engineering

Compromised SSH servers and scraped mirror sites leaked scripts intended for malicious use.

LeakScope
LeakScope
Open Source Reconnaissance

An all-in-one Shodan & ZoomEye supported tool to search, browse, preview and dump data leakage across 20+ services. Pulls real exposure stra…

leaky-paths
leaky-paths
Free Exploitation Password Attacks

A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..etc.…

learn-likecc
learn-likecc
Free Reverse Engineering

Claude Code 源码逆向恢复项目 | Source Map 逆向 · 架构分析 · 可运行版本 | 1900+ 文件 · 51万行代码 · 12章节课程

Learn-Web-Hacking
Learn-Web-Hacking
Free Web Application

Study Notes For Web Hacking / Web安全学习笔记

learning-malware-analysis
learning-malware-analysis
Free Forensics Reverse Engineering

This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be co…

learning-reverse-engineering
learning-reverse-engineering
Free Reverse Engineering

This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.

LearnJavaMemshellFromZero
LearnJavaMemshellFromZero
Free Exploitation

【三万字原创】完全零基础从0到1掌握Java内存马,公众号:追梦信安

Legendary_Crypto
Legendary_Crypto
Free Reconnaissance

A resource full of Crypto/OSINT tools, techniques and training courses for CTI, AML, and forensic investigations.

Legendary_OSINT
Legendary_OSINT
Free Reconnaissance

A list of OSINT tools & resources for (fraud-)investigators, CTI-analysts, KYC, AML and more.

lenspect
lenspect
Open Source Forensics

A lightweight security threat scanner intended to make malware detection more accessible and efficient.

leveldb-cli
leveldb-cli
Open Source Forensics

A command-line interface for LevelDB

LevelDBDumper
LevelDBDumper
Open Source Forensics

Dumps all of the Key/Value pairs from a LevelDB database

lfi
lfi
Open Source Reverse Engineering

Top-level repository for LFI: Practical, Efficient, and Secure Software-based Sandboxing

LFImap
LFImap
Open Source Exploitation Web Application

Local File Inclusion discovery and exploitation tool

LFITester
LFITester
Open Source Exploitation Scanning & Enumeration

LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.

libc-database
libc-database
Open Source

Build a database of libc offsets to simplify exploitation

Libc-GOT-Hijacking
Libc-GOT-Hijacking
Free Exploitation

Binary Exploitation Skill. Gain RCE from arbitrary write.

libdebug
libdebug
Free Forensics Reverse Engineering

A Python library to debug binary executables, your own way.

Libellux-Up-and-Running
Libellux-Up-and-Running
Open Source Scanning & Enumeration

Install open-source software from source to focus on Zero Trust Network principles, enhancing security for existing applications, and deploy…

libil2cpp
libil2cpp
Free Reverse Engineering

Collection of source code for Unity IL2CPP

libinjection-go
libinjection-go
Open Source Exploitation Web Application

libinjection is a Golang port of the libinjection(https://github.com/client9/libinjection)

libmem
libmem
Open Source Reverse Engineering

Advanced Game Hacking Library for C, Modern C++, Rust and Python (Windows/Linux/FreeBSD) (Process/Memory Hacking) (Hooking/Detouring) (Cross…

libpe
libpe
Open Source Reverse Engineering

Library for parsing internal structures of PE32/PE32+ binary files.

librepods
librepods
Open Source Reverse Engineering

AirPods liberated from Apple's ecosystem.

librw
librw
Open Source Reverse Engineering

A re-implementation of the RenderWare Graphics engine

LIEF
LIEF
Open Source Forensics Reverse Engineering

LIEF - Library to Instrument Executable Formats (C++, Python, Rust)

lighthouse
lighthouse
Open Source Reverse Engineering

A Coverage Explorer for Reverse Engineers

ligolo-iwa
ligolo-iwa
Open Source Post-Exploitation

A Ligolo-ng JavaScript agent working inside Chrome & Chromium-based browsers by leveraging Isolated Web Applications.

ligolo-mp
ligolo-mp
Open Source Exploitation Post-Exploitation

Please visit the Wiki for up-to-date information

Ligolo-ng
Ligolo-ng
Open Source Exploitation Post-Exploitation

Advanced tunneling/pivoting tool that creates a VPN-like tunnel from the agent to the operator without SOCKS proxies. Enables direct routing…

ligolo-ng
ligolo-ng
Open Source Kali Exploitation Post-Exploitation

An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.

like-dbg
like-dbg
Open Source Exploitation Reverse Engineering

Fully dockerized Linux kernel debugging environment

limoncello
limoncello
Open Source Evasion Reverse Engineering

Yet another LLVM-based obfuscator

LinEnum
LinEnum
Open Source Post-Exploitation

Scripted local Linux enumeration and privilege escalation checks. Collects system information, user data, SUID/SGID binaries, sudo configura…

LinkdTime
LinkdTime
Open Source Reconnaissance

A Linkedin Activity date Finder

LinkedInDumper
LinkedInDumper
Free Reconnaissance

Python 3 script to dump/scrape/extract company employees from LinkedIn API

linkook
linkook
Open Source Reconnaissance

🔍 An OSINT tool for discovering linked social accounts and associated emails across multiple platforms using a single username.

Linux_Dersleri
Linux_Dersleri
Open Source Kali

Kali Linux Üzerinden İşlenen Linux Komut Satırı Dersleri Dokümantasyon Kaynağı

linux-chenxing.org
linux-chenxing.org
Open Source Reverse Engineering

Information for MStar/SigmaStar SoC

linux-dersleri.github.io
linux-dersleri.github.io
Free Kali

Linux Dokümantasyonu Web Platformu

linux-exploit-suggester
linux-exploit-suggester
Open Source Exploitation

Linux privilege escalation auditing tool

linux-for-OSINT-21-day
linux-for-OSINT-21-day
Open Source Reconnaissance

In this repository you will find sample commands and test files for each day of the course "Linux for OSINT. A 21-day course for beginners".

linux-kernel-exploitation
linux-kernel-exploitation
Free Exploitation Post-Exploitation

A collection of links related to Linux kernel security and exploitation

Linux-Kodachi
Linux-Kodachi
Free

Linux Kodachi is a Debian-based security OS by Warith Al Maawali, built for uncompromising privacy, anonymity, and reliability. It pairs har…

linux-syscalls
linux-syscalls
Open Source

🌐🐧 Browsable Linux kernel syscall tables built with Systrack (https://github.com/mebeim/systrack)

LinuxCatScale
LinuxCatScale
Open Source Forensics

Incident Response collection and processing scripts with automated reporting scripts

LinuxDroid
LinuxDroid
Open Source Kali

The most powerful security toolkit for Android: without rooting your device. Run security tools like Nmap, Metasploit, and Wireshark on your…

LinuxFlaw
LinuxFlaw
Open Source Exploitation

The vm images in this repo are lost, we recommend our new project: https://github.com/hust-open-atom-club/S2VulnHub

linWinPwn
linWinPwn
Open Source Exploitation Post-Exploitation

linWinPwn is a bash script that streamlines the use of a number of Active Directory tools

linx
linx
Open Source Reconnaissance

Reveals invisible links within JavaScript files

lisa.py
lisa.py
Open Source Reverse Engineering

LLDB MCP Integration + other helpful commands

lit-bb-hack-tools
lit-bb-hack-tools
Open Source Web Application

Little Bug Bounty & Hacking Tools⚔️

litefuzz
litefuzz
Open Source Exploitation Scanning & Enumeration

A multi-platform fuzzer for poking at userland binaries, network clients and servers

LitterBox
LitterBox
Open Source Exploitation Forensics

A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integra…

Live-Forensicator
Live-Forensicator
Free Forensics

Cross-platform incident response and live forensics toolkit with built-in detection, structured analysis, and report generation — designed f…

LiveCloudKd
LiveCloudKd
Open Source Forensics

Hyper-V Research is trendy now

LiveOverflowMod
LiveOverflowMod
Open Source Exploitation

A Minecraft hacked-client for the LiveOverflow Server. Contains various hacks for the challenges on the server, and some utilities.

llamator
llamator
Free Exploitation Web Application

Red Teaming python-framework for testing chatbots and GenAI systems.

llef
llef
Open Source Reverse Engineering

LLEF is a plugin for LLDB to make it more useful for RE and VR

llm_osint
llm_osint
Open Source Reconnaissance

LLM OSINT is a proof-of-concept method of using LLMs to gather information from the internet and then perform a task with this information.

llm-guard
llm-guard
Open Source

The Security Toolkit for LLM Interactions

LLM4Decompile
LLM4Decompile
Open Source Reverse Engineering

Reverse Engineering: Decompiling Binary Code with Large Language Models

LLVM
LLVM
Free Evasion

移植 OLLVM 到 LLVM 18,C&C++代码混淆(Porting OLLVM to LLVM 18: C & C++ Code Obfuscation)

llvm-jutsu
llvm-jutsu
Open Source Evasion Reverse Engineering

Anti-LLM obfuscation via finger counting

llvm-msvc
llvm-msvc
Open Source Evasion

LLVM fork with explicit compatibility with MSVC 2022 features.

LME
LME
Free

Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-time…

Lo4f-Malware
Lo4f-Malware
Free Exploitation

Lo4f is a sophistochated RAT (Remote Access Trojan), written entirely in python.

local_rcc
local_rcc
Open Source Reverse Engineering

🏠 Selfhosted game servers for the latest versions of Roblox.

Lockdoor-Framework
Lockdoor-Framework
Open Source Exploitation

🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources

LockKnife
LockKnife
Open Source Forensics

LockKnife: The Ultimate Android Security Research Tool. A unified TUI workspace and headless CLI for deep Android security research, built f…

LogBoost
LogBoost
Open Source Forensics Reconnaissance

Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indicat…

logdissect
logdissect
Open Source Forensics

CLI utility and Python module for analyzing log files and other data.

loki
loki
Open Source Reconnaissance

Command Line Sock Puppet Creator for Investigators.

Loki-RS
Loki-RS
Open Source Forensics

🐍 High-performance, multi-threaded YARA & IOC scanner

LOLBAS
LOLBAS
Open Source Evasion Post-Exploitation

Living Off The Land Binaries And Scripts — documents Windows native binaries that can be abused for execution, download, bypass, and persist…

LOLBAS
LOLBAS
Open Source Exploitation

Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)

lolc2.github.io
lolc2.github.io
Free Exploitation Post-Exploitation

lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection

lolfsaas.github.io
lolfsaas.github.io
Open Source Exploitation

Living of the Land of Free SaaS

longtongue
longtongue
Open Source Password Attacks Social Engineering

Generate customized Password/Passphrase wordlist based on target information

lonkero
lonkero
Free Web Application

Lonkero - Wraps around your attack surface. Professional-grade scanner for real penetration testing. Fast. Modular. Rust.

LOOBins
LOOBins
Open Source Exploitation

Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" macOS…

lookup.tools
lookup.tools
Open Source Reconnaissance

🔎 The cyber swiss army knife of lookup tools. Research information on domains, IPs, email addresses, and more!

lookyloo
lookyloo
Free Web Application

Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.

lorsrf
lorsrf
Open Source Scanning & Enumeration Web Application

Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load :artificial_satellite: :crab:

loseprivacy-app
loseprivacy-app
Free Social Engineering

公众保护个人隐私的战斗已经基本宣告失败。即使拥有话语权的精英们一直宣称隐私保护非常重要,但在强大的资本、政府面前,个人隐私不值一提。既然无法赢得隐私保护的战斗,那么公众应有权知道哪些隐私数据被泄露了、被谁泄露了,让公众可以自己选择方案保护自己。

Lost-NDS-TV
Lost-NDS-TV
Open Source Exploitation

The Lost Nintendo DS Television Output, brought back to life

lotus
lotus
Open Source

:zap: Fast Web Security Scanner written in Rust based on Lua Scripts :waning_gibbous_moon: :crab:

LovelyERes
LovelyERes
Open Source

LovelyMem
LovelyMem
Open Source Forensics

基于Memprocfs和Volatility的可视化内存取证工具

LQZ
LQZ
Free Exploitation Forensics

灵取证是一款功能强大且专业的安卓设备数据取证工具,专门为执法部门、司法机构和安全调查人员设计开发。本工具采用先进的取证技术,确保数据提取过程的完整性和准确性。本工具的开发和使用严格遵循相关法律法规框架,确保所有数据提取操作都在合法授权范围内进行。通过专业的数据处理流程,为执法调查…

Lsploit
Lsploit
Free Exploitation

Lsploit is a comprehensive asset collection and vulnerability scanning tool. Lsploit是一款便携式综合资产分析及漏扫框架,拥有高性能,功能丰富,结合最新漏洞通告,嵌入ai,可自行组装exp,poc…

LuaN1aoAgent
LuaN1aoAgent
Open Source

LuaN1aoAgent is a cognitive-driven AI hacker. It is a fully autonomous AI penetration testing agent powered by DeepSeek V3.2. Using dual-gra…

Lucille
Lucille
Free Reconnaissance Scanning & Enumeration

Information Gatherer & Webapps Exploiter

luject
luject
Open Source Reverse Engineering

🍹A static injector of dynamic library for application (android, iphoneos, macOS, windows, linux)

lumen
lumen
Open Source Reverse Engineering

A private Lumina server for IDA Pro

LummaC2-Stealer
LummaC2-Stealer
Free Forensics Post-Exploitation

LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis

lunasec
lunasec
Free Scanning & Enumeration Web Application

LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requests…

LunaTranslator
LunaTranslator
Open Source Reverse Engineering

视觉小说翻译器 / Visual Novel Translator

lyncsmash
lyncsmash
Free Password Attacks

locate and attack Lync/Skype for Business

lynis
lynis
Open Source

Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system…

lzr
lzr
Open Source Scanning & Enumeration

LZR quickly detects and fingerprints unexpected services running on unexpected ports.

M365-Assess
M365-Assess
Open Source

274 Automated checks across 14 compliance frameworks, interactive HTML report, no data leaves your machine.

M5PORKCHOP
M5PORKCHOP
Open Source

ON NO! Someone put an RPG in a packet sniffer

MAAD-AF
MAAD-AF
Open Source Exploitation

MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).

mac_apt
mac_apt
Open Source Forensics

macOS (& ios) Artifact Parsing Tool

macaron
macaron
Free Forensics

Macaron is an extensible supply-chain security analysis framework from Oracle Labs that supports a wide range of build systems and CI/CD ser…

MacForensics
MacForensics
Free Forensics

Scripts to process macOS forensic artifacts

mach
mach
Open Source Reconnaissance

Mach is a fast, reliable, and extensible web fuzzing tool built for security researchers, bug bounty hunters, and penetration testers. Desig…

Machine_Learning_CTF_Challenges
Machine_Learning_CTF_Challenges
Free

CTF challenges designed and implemented in machine learning applications

machofile
machofile
Open Source Forensics

machofile is a module to parse Mach-O binary files

MachOKit
MachOKit
Open Source Reverse Engineering

🔬 A Swift library for parsing mach-o files to obtain various information.

MacOS-DuckyScripts
MacOS-DuckyScripts
Free

Presenting a wide range of more than 100 powerful BadUSB scripts exclusively designed for Mac OS & the Flipper Zero device. As the sole cura…

macos-scripts
macos-scripts
Open Source

Various scripts for macOS tasks

macos-UnifiedLogs
macos-UnifiedLogs
Open Source Forensics

A cross platform parser for Apple UnifiedLogs!

macosac
macosac
Open Source Forensics

Forensic Artifact Collection Tool for macOS

macphish
macphish
Open Source Social Engineering

Office for Mac Macro Payload Generator

MafiaToolkit
MafiaToolkit
Open Source Reverse Engineering

Open source toolkit for Mafia games. (Mafia II, Mafia III, Mafia DE)

magicRecon
magicRecon
Open Source Exploitation Reconnaissance

MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, …

magicspoofing
magicspoofing
Free Reconnaissance

Magicspoofing it's a python script that checks & test SPF/DMARC DNS records an tries to spoof a domain with a open relay mail system.

MagicTree
MagicTree
Free Kali Reporting

Penetration tester productivity tool designed to allow easy data consolidation and report generation. Stores test results in a tree structur…

magisk-frida
magisk-frida
Free Exploitation Reverse Engineering

🔐 Run frida-server on boot with Magisk, always up-to-date

MagiskHluda
MagiskHluda
Free Reverse Engineering

Run a more undetectable frida server on boot using magisk 🔐✅

magnet
magnet
Free Exploitation

Purple-team telemetry & simulation toolkit.

magpie
magpie
Open Source

A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat lan…

maigret
maigret
Open Source Exploitation Reconnaissance

🕵️‍♂️ Collect a dossier on a person by username from 3000+ sites

maigret
maigret
Open Source Reconnaissance

A simple username osint tool built in rust

maigret-tg-bot
maigret-tg-bot
Open Source Reconnaissance

Simple telegram bot to run your own Maigret search with a couple of clicks!

mailcat
mailcat
Open Source Reconnaissance

Find existing email addresses by nickname using API/SMTP checking methods without user notification. Please, don't hesitate to improve cat's…

mailgoose
mailgoose
Open Source

A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.

makephish
makephish
Free Social Engineering

Automatically clone websites and patch them with PHP to create phishing pages

mal_unpack
mal_unpack
Open Source Forensics

Dynamic unpacker based on PE-sieve

malcontent
malcontent
Open Source Forensics Reverse Engineering

#supply #chain #attack #detection

Malcrow
Malcrow
Open Source Forensics

A Malware Scarecrow for Windows 10/11 with a user-friendly touch.

maldetect
maldetect
Open Source Forensics

Debian packaging of Linux Malware Detect (https://github.com/rfxn/linux-malware-detect)

maldev
maldev
Open Source Kali Evasion Exploitation

Golang library for malware development

maldump
maldump
Open Source Forensics

Maldump makes it easy to extract quarantined files of multiple AVs from a live system or a mounted disk image.

malefic
malefic
Free Post-Exploitation

IoM implant, C2 Framework and Infrastructure

malhunt
malhunt
Open Source Forensics

Malhunt is an automated malware hunting tool that analyzes memory dumps using Volatility3, applying YARA rules, code injection scanning, and…

malice-network
malice-network
Open Source Post-Exploitation

Next Generation C2 Framework, IoM-server/client

malicious-code-ruleset
malicious-code-ruleset
Open Source Evasion

Focused malicious code detection ruleset, with a high protection-to-noise ratio

malicious-domains
malicious-domains
Open Source Social Engineering

Aggregation of lists of malicious domains (phishing) that can be integrated into FortiGate firewalls and other products.

malicious-pdf
malicious-pdf
Open Source Exploitation

💀 Generate malicious PDF test files for testing phone-home callbacks, SSRF, XSS, NTLM credential theft, and data exfiltration in PDF viewers…

malicious-rMQR-Codes
malicious-rMQR-Codes
Open Source Exploitation Web Application

Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more

malleable-signatures
malleable-signatures
Free Exploitation

This repository implements a simplified PoC that demonstrates how signature malleability attacks using compact signatures can be executed.

MalQR.github.io
MalQR.github.io
Open Source Exploitation Scanning & Enumeration

MalQR is a collection of malicious QR Codes and Barcodes you can use to test the security of your scanners.

malsub
malsub
Free Forensics

A Python RESTful API framework for online malware analysis and threat intelligence services.

Maltego
Maltego
Freemium Kali Reconnaissance

Interactive data mining tool that renders graphical link charts of relationships between domains, people, companies, IPs, and social media a…

maltego-telegram
maltego-telegram
Open Source Reconnaissance

🔎 OSINT Maltego Transforms for investigating Telegram channels, groups, and users, including deanonymization via stickers, forwarded message…

malware_analysis
malware_analysis
Free Forensics Reverse Engineering

This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.

malware_analysis
malware_analysis
Free Forensics

Various snippets created during malware analysis

malware_training_vol1
malware_training_vol1
Free Forensics

Materials for Windows Malware Analysis training (volume 1)

Malware-Analysis-Projects-for-Beginners
Malware-Analysis-Projects-for-Beginners
Free Forensics

Hands-on projects on Static and Dynamic malware analysis with real-world tools.

malware-analysis-writeups
malware-analysis-writeups
Free Forensics Reverse Engineering

Some of my Malware Analysis writeups

malware-apk
malware-apk
Open Source Reverse Engineering Web Application

As a bug hunter, are your bug bounty reports getting rejected because you don't use a "malicious" Proof of Concept (PoC) app to exploit the …

Malware-Bible
Malware-Bible
Free Forensics Reverse Engineering

Free educational courses in reverse engineering, malware analysis, and programming

Malware-Detection-using-Machine-learning
Malware-Detection-using-Machine-learning
Open Source Forensics

Anomaly based Malware Detection using Machine Learning (PE and URL)

malware-notes
malware-notes
Free Forensics

Notes and IoCs of fresh malware

malware-persistence
malware-persistence
Free Forensics Post-Exploitation

Collection of malware persistence and hunting information. Be a persistent persistence hunter!

malware-research
malware-research
Open Source Forensics

Code written as part of our various malware investigations

Malware-Samples
Malware-Samples
Open Source Forensics

This repository contains 130 malware and ransomware samples for research and analysis purposes.

malware-study
malware-study
Free Forensics

My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to anyone…

malware-writeups
malware-writeups
Free Forensics

Personal research and publication on malware families

Malware2.0Database
Malware2.0Database
Free Forensics

My new malware database, the old one is now archived and all my new malwares will be uploaded here instead. As always, this is made for educ…

malwaredb-rs
malwaredb-rs
Open Source Forensics

MalwareDB: bookkeeping for malware, goodware, and unknown files with relationship discovery

MalwareDNA
MalwareDNA
Free Forensics

This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can help y…

MalwareHashDB
MalwareHashDB
Open Source Forensics

Malware hashes for open source projects.

malwaremustdie
malwaremustdie
Free Forensics

repository of tools & resources of the MMD team

malwarescanner
malwarescanner
Open Source Web Application

Simple Malware Scanner written in python

MalwLess
MalwLess
Open Source Exploitation

Test Blue Team detections without running any attack.

malwoverview
malwoverview
Open Source Exploitation Forensics

Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malp…

malzoo
malzoo
Open Source Forensics

Mass static malware analysis tool

mambo
mambo
Open Source Reverse Engineering

A low-overhead dynamic binary instrumentation and modification tool for ARM (both AArch32 and AArch64 support) and RISC-V (RV64GC).

manticore
manticore
Open Source Reverse Engineering

This project is no longer internally developed and maintained. However, we are happy to review and accept small, well-written pull requests …

mantis
mantis
Open Source Reconnaissance

Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.

ManTraNet-pytorch
ManTraNet-pytorch
Free Forensics

Implementation of the famous Image Manipulation\Forgery Detector "ManTraNet" in Pytorch

mapAccountHijack
mapAccountHijack
Free Exploitation Wireless

mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetooth C…

maple-ir
maple-ir
Open Source Reverse Engineering

Industrial IR-based static analysis framework for Java bytecode

mapperplus
mapperplus
Free Reconnaissance

MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.

maps_scanner
maps_scanner
Free Forensics

MAPS cloud scanner and response parser for Microsoft Defender research.

marple
marple
Open Source Reconnaissance

📖 Collect links to profiles by username through search engines and analyze with various plugins

masked
masked
Open Source Evasion

Mask sensitive data: replace blacklisted elements with redacted values

maskphish
maskphish
Open Source Kali Social Engineering

Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phis…

maskromtool
maskromtool
Free Reverse Engineering

A CAD tool for extracting bits from Mask ROM photographs.

Masscan
Masscan
Open Source Kali Reconnaissance Scanning & Enumeration

The fastest Internet port scanner. Can scan the entire IPv4 address space in under 6 minutes. Produces output compatible with Nmap.

massdns
massdns
Open Source Reconnaissance

A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)

Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes
Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes
Free Web Application

A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for ident…

MassVulScan
MassVulScan
Open Source Scanning & Enumeration

A fast network scanning tool to detect open ports and security vulnerabilities (Compatible with Debian & Red Hat OS)

master-numbers
master-numbers
Open Source

This tool is with 552 fake numbers from diffrent Country and Receive SMS Online / Temporary Phone Number You can receive SMS online with th…

MasterParser
MasterParser
Open Source Forensics

MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs

mastg
mastg
Free Reverse Engineering

The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineerin…

Masto
Masto
Free Reconnaissance

Masto is an OSINT tool written in python to gather intelligence on Mastodon users and instances.

masvs
masvs
Free Web Application

The OWASP MASVS (Mobile Application Security Verification Standard) is the industry standard for mobile app security.

matano
matano
Open Source

Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS

matkap
matkap
Open Source Reconnaissance

Matkap - hunt down malicious Telegram bots

matrix
matrix
Free

My Privacy DNS #Matrix lists for blacklisting

Maverick
Maverick
Free Evasion Exploitation

Adaptix C2 agent using Crystal Palace PIC linker and PICO module system

max-cube-protocol
max-cube-protocol
Open Source Reverse Engineering

A attempt to write down the protocol of the eQ3 / ELV MAX! Cube

MaxPhisher
MaxPhisher
Open Source Social Engineering

A phishing tool for over +30 sites

Mazesec-writeups
Mazesec-writeups
Free Exploitation

Mazesec团队自制靶机题解仓库,专注于分享HackMyVM平台的自制靶机PDF题解,涵盖渗透测试实战与安全研究,供学习交流使用。

MazeSolver
MazeSolver
Free Reverse Engineering

GUI Maze Solver for ASCII Maze in CTF

MBPTL
MBPTL
Open Source

Best hands-on lab for learning the fundamentals of cybersecurity and penetration testing workflows also packaged as Docker containers for fa…

MCAntiMalware
MCAntiMalware
Open Source Forensics

MCAntiMalware MCAntiMalware is an Anti-Malware program which detects over 1000 malicious plugins and runs 24/7 for constant protection…

mcp_zoomeye
mcp_zoomeye
Free Reconnaissance

A Model Context Protocol server that provides network asset information based on query conditions. This server allows LLMs to obtain network…

MCP-Kali-Server
MCP-Kali-Server
Open Source Kali

MCP configuration to connect AI agent to a Linux machine.

mcp-maigret
mcp-maigret
Open Source Reconnaissance

MCP server for maigret, a powerful OSINT tool that collects user account information from various public sources.

mcp-reticle
mcp-reticle
Open Source Reverse Engineering

Reticle intercepts, visualizes, and profiles JSON-RPC traffic between your LLM and MCP servers in real-time, with zero latency overhead. Sto…

mcp-security-hub
mcp-security-hub
Open Source Reconnaissance Reverse Engineering

A growing collection of MCP servers bringing offensive security tools to AI assistants. Nmap, Ghidra, Nuclei, SQLMap, Hashcat and more.

mcp-server-idapro
mcp-server-idapro
Open Source Reverse Engineering

A Model Context Protocol (MCP) server that enables AI assistants to interact with IDA Pro for reverse engineering and binary analysis tasks.

mcp-shark
mcp-shark
Free Forensics

Wireshark-like forensic analysis for Model Context Protocol communications Capture, inspect, and investigate all HTTP requests and response…

mcp-shodan
mcp-shodan
Open Source Exploitation Reconnaissance

MCP server for Shodan — search internet-connected devices, IP reconnaissance, DNS lookups, and CVE/CPE vulnerability intelligence. Works wit…

mcp-virustotal
mcp-virustotal
Open Source Forensics

MCP server for VirusTotal API — analyze URLs, files, IPs, and domains with comprehensive security reports, relationship analysis, and pagina…

md5-hashtray
md5-hashtray
Free Reconnaissance

Optimize security workflows with the MD5 HashTray on GitHub. Advanced features for professional hash generation and checksum automation.

MDE-DFIR-Resources
MDE-DFIR-Resources
Open Source Forensics

A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as KAP…

mdn-http-observatory
mdn-http-observatory
Open Source

Backend for HTTP Observatory on MDN

media-search-engine
media-search-engine
Free Reconnaissance

Search geolocations for (social) media posts in databases like Bellingcat, Cen4InfoRes etc.

mediator
mediator
Open Source Exploitation Forensics

An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.

medium-writeups
medium-writeups
Free Reconnaissance Web Application

This repository updates latest Bug Bounty medium writeups every 10 minutes, https://readmedium.com/Medium_URL, https://archive.ph/Medium_URL…

Medusa
Medusa
Open Source Kali Password Attacks

Speedy, massively parallel, modular login brute-forcer. Supports AFP, CVS, FTP, HTTP, IMAP, MS-SQL, MySQL, NCP, NNTP, PcAnywhere, POP3, REXE…

medusa
medusa
Open Source Reverse Engineering

Mobile Edge-Dynamic Unified Security Analysis

medusa
medusa
Open Source Reverse Engineering Scanning & Enumeration

AI-first security scanner with 76 analyzers, 9,600+ detection rules, and repo poisoning detection for AI/ML, LLM agents, and MCP servers. Sc…

medusa
medusa
Free Reverse Engineering

An open source interactive disassembler

Meerkat
Meerkat
Open Source Forensics Reconnaissance

A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.

mem
mem
Open Source Reverse Engineering

A collection of C++11 headers useful for reverse engineering

MemProcFS-Analyzer
MemProcFS-Analyzer
Open Source Forensics

MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR

mentalist
mentalist
Open Source Password Attacks

Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can output t…

meow
meow
Free Forensics

Cybersecurity research results. Simple C/C++ and Python implementations

mercator
mercator
Open Source Exploitation

Mapping the information system / Cartographie du système d'information

Mercurial-Grabber
Mercurial-Grabber
Free Exploitation

Grab Discord tokens, Chrome passwords and cookies, and more

mergen
mergen
Open Source

Mergen is an open-source, native macOS application for auditing and checking the security of your MacOS.

merklemap-cli
merklemap-cli
Open Source Reconnaissance

Discover and enumerate all subdomains associated with a website, including those not publicly advertised. Use this tool to conduct thorough …

merlin
merlin
Open Source Post-Exploitation

Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.

MESH
MESH
Open Source Forensics

MESH enables remote wireless debugging for Android, providing mobile forensics & network monitoring over an encrypted, censorship-resistant …

mesh-networking
mesh-networking
Open Source Reconnaissance

:globe_with_meridians: LEGO blocks for networking, a Python library to help create and test flexible network topologies across real and simu…

Meta-Owned-IT-Assets
Meta-Owned-IT-Assets
Free Reconnaissance Web Application

Curated list of Meta (formerly Facebook) owned IT assets

metabigor
metabigor
Open Source Reconnaissance Web Application

OSINT tools and more but without API key

MetaDetective
MetaDetective
Open Source Reconnaissance

Unleash Metadata Intelligence with MetaDetective. Your Assistant Beyond Metagoofil.

metaforce
metaforce
Free Reverse Engineering

A native reimplementation of the Metroid Prime engine

Metagoofil
Metagoofil
Open Source Kali Reconnaissance

Information gathering tool that downloads and extracts metadata from public documents (PDF, Word, Excel, PowerPoint) found via Google dork s…

metagoofil
metagoofil
Free Reconnaissance

Search Google and download specific file types

MetaHookSv
MetaHookSv
Open Source Reverse Engineering

MetaHook (https://github.com/nagist/metahook) porting for SvEngine (GoldSrc engine modified by Sven-Coop), as a client-side modding framewor…

MetaOSINT.github.io
MetaOSINT.github.io
Open Source Reconnaissance

A tool to quickly identify relevant, publicly-available open source intelligence ("OSINT") tools and resources, saving valuable time during …

MetaRadar
MetaRadar
Open Source Wireless

A tool for BLE environment monitoring. Find and track Bluetooth devices around, and get notified when the target device is detected.

metarget
metarget
Open Source Post-Exploitation

Metarget is a framework providing automatic constructions of vulnerable infrastructures.

Metasploit Framework
Metasploit Framework
Open Source Kali Exploitation Post-Exploitation

The world's most widely used penetration testing framework. Provides hundreds of exploit modules, payloads, encoders, and post-exploitation …

metasploit-ai
metasploit-ai
Free Kali Exploitation

Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and mach…

Metasploit-termux
Metasploit-termux
Open Source Exploitation

Install Latest Metrasploit In Termux (2026). Features automatic Ruby 3.4+ Nokogiri/Gumbo patches, PostgreSQL auto-fix, and silent installati…

Meterpreter
Meterpreter
Open Source Kali Post-Exploitation

Metasploit's advanced, dynamically extensible payload. Runs entirely in memory, supports migration, keylogging, screenshot capture, pivoting…

MFTECmd
MFTECmd
Open Source Forensics

Parses $MFT from NTFS file systems

mgbdis
mgbdis
Open Source Reverse Engineering

Game Boy ROM disassembler with RGBDS compatible output

MGKeys
MGKeys
Open Source Evasion

MobileGestalt Keys (De)obfuscation.

MHServerEmu
MHServerEmu
Open Source Reverse Engineering

Server emulator for Marvel Heroes

miasm
miasm
Open Source Reverse Engineering

Reverse engineering framework in Python

Microllect
Microllect
Open Source Password Attacks

an introduction to the Bitcoin (BTC) network and how addresses are made , and Automated Attacking

Microsoft-Analyzer-Suite
Microsoft-Analyzer-Suite
Open Source Forensics

A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID

Microsoft-eventlog-mindmap
Microsoft-eventlog-mindmap
Open Source Forensics Post-Exploitation

Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...

Microsoft-Sentinel-SecOps
Microsoft-Sentinel-SecOps
Open Source Forensics

Microsoft Sentinel SOC Operations

mihari
mihari
Open Source Reconnaissance

A query aggregator for OSINT based threat hunting

MikrotikAPI-BF
MikrotikAPI-BF
Open Source Exploitation Password Attacks

RouterOS Attack & Exploitation Framework — 40 CVE/EDB exploits, MAC-Server L2, credential decoder, NPK analyzer, 300-thread BF, Nmap NSE aut…

Millennium
Millennium
Open Source Reverse Engineering

An open-source low-code modding framework to create, manage and use themes/plugins for the desktop Steam Client without any low-level intern…

mimicry
mimicry
Free Forensics Password Attacks

Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.

Mimikatz
Mimikatz
Open Source Kali Password Attacks Post-Exploitation

Post-exploitation tool to extract plaintexts passwords, hashes, PIN codes, and Kerberos tickets from memory. Also performs Pass-the-Hash, Pa…

mimipenguin
mimipenguin
Free Post-Exploitation

A tool to dump the login password from the current linux user

minijail
minijail
Open Source

sandboxing and containment tool used in ChromeOS and Android

minipwner
minipwner
Open Source

A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".

misc
misc
Free

1. vrwatson1 - Visual Recognition with IBM Watson - Image Classification (here). 2. vrwatson2 - Visual Recognition with IBM Watson - Text Re…

misconfig-mapper
misconfig-mapper
Open Source Web Application

Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or b…

MISP
MISP
Open Source Forensics

MISP (core software) - Open Source Threat Intelligence and Sharing Platform

misp-modules
misp-modules
Open Source Reconnaissance

Modules for expansion services, enrichment, import and export in MISP and other tools.

misp-taxonomies
misp-taxonomies
Free Forensics

Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.

misp-training
misp-training
Free Reconnaissance

MISP trainings, threat intel and information sharing training materials with source code

missing-cve-nuclei-templates
missing-cve-nuclei-templates
Open Source Exploitation Web Application

Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration tests a…

mitaka
mitaka
Open Source Reconnaissance

A browser extension for OSINT search

miteru
miteru
Open Source Social Engineering

A phishing kit collector for scavengers

mitmproxy2swagger
mitmproxy2swagger
Free Reverse Engineering

Automagically reverse-engineer REST APIs via capturing traffic

MixMessage
MixMessage
Open Source

在安卓任何聊天软件(例如QQ或微信)中使用加密聊天,基于无障碍服务

mkctf
mkctf
Open Source

A CTF framework to create, build, deploy and monitor challenges

mlattacks
mlattacks
Free Exploitation

Machine Learning Attack Series

MobaXtermDecryptor
MobaXtermDecryptor
Open Source Exploitation

A simple MobaXterm password extraction tool.

Mobile-Security-Framework-MobSF
Mobile-Security-Framework-MobSF
Open Source Forensics Reverse Engineering

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and sec…

mobileAudit
mobileAudit
Open Source Forensics

Django application that performs SAST and Malware Analysis for Android APKs

MobileSecurity
MobileSecurity
Free Reverse Engineering

Conteúdo em português sobre segurança em Dispositivos Móveis.

MockSSH
MockSSH
Free Exploitation

Mock an SSH server and define all commands it supports (Python, Twisted)

Modern-Red-Team-Infrastructure
Modern-Red-Team-Infrastructure
Free Evasion Exploitation

A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.

Modlishka
Modlishka
Open Source Social Engineering

Flexible and powerful reverse HTTP proxy for phishing. Captures credentials and bypasses 2FA by acting as a transparent proxy between the vi…

Modlishka
Modlishka
Free

Modlishka is an open-source penetration testing tool that acts as a man-in-the-middle proxy. It introduced a new technical approach to handl…

modreveal
modreveal
Open Source

Utility to find hidden Linux kernel modules

ModTracer
ModTracer
Open Source Forensics

ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.

monitor-new-subdomain
monitor-new-subdomain
Free Reconnaissance

Subdomain Monitor A production-ready subdomain monitoring system with both API and CLI interfaces.

Monitorizer
Monitorizer
Free Reconnaissance

Monitoring framework to detect and report newly found subdomains on a specific target using various scanning tools

monkey
monkey
Open Source

Infection Monkey - An open-source adversary emulation platform

monkey365
monkey365
Open Source

Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft Entr…

Morefixes
Morefixes
Free Exploitation

MoreFixes: A Large-Scale Dataset of CVE Fix Commits Mined through Enhanced Repository Discovery

Morgan
Morgan
Open Source Exploitation

Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulnerabi…

Moriarty-Project
Moriarty-Project
Open Source Reconnaissance

This tool gives information about the phone number that you entered.

moukthar
moukthar
Open Source Post-Exploitation

Android remote administration tool

Moxy
Moxy
Open Source

Moxy is an open-source DAST tool designed for modern web application security testing. It provides an easy-to-use interface with agentic cap…

MQA_identifier
MQA_identifier
Open Source Reverse Engineering

Master Quality Authenticated codec reverse engineering, Tool to identify MQA encoding and Master's Sample Rate

mqtt-pwn
mqtt-pwn
Open Source Exploitation Reconnaissance

MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.

mquery
mquery
Open Source

YARA malware query accelerator (web frontend)

mquire
mquire
Open Source Forensics

Zero-dependency Linux memory forensics PoC — leverages kernel-embedded BTF and kallsyms for type-aware memory analysis without external debu…

Mr.Holmes
Mr.Holmes
Open Source Kali Reconnaissance

MrHandler
MrHandler
Open Source Forensics

Linux Incident Response Reporting

ms-exchange-version-nse
ms-exchange-version-nse
Open Source Exploitation Scanning & Enumeration

Nmap script to detect a Microsoft Exchange instance version with OWA enabled.

MS-RPC-Fuzzer
MS-RPC-Fuzzer
Open Source Exploitation

Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By foll…

MSc-CyberSecurity-Sapienza
MSc-CyberSecurity-Sapienza
Open Source

Master of Science in Cybersecurity, Sapienza University of Rome.

MsfMania
MsfMania
Open Source Evasion Post-Exploitation

MsfMania Payload Execution Logs …

msfvenom
msfvenom
Open Source Kali Evasion Exploitation

Metasploit standalone payload generator and encoder. Creates payloads for all platforms with customizable encoders, iterations, and formats …

MSiMBA
MSiMBA
Open Source Evasion

Deobfuscation of Semi-Linear Mixed Boolean-Arithmetic Expressions

MSRC-Microsoft-Security-Updates-API
MSRC-Microsoft-Security-Updates-API
Open Source

Repo with getting started projects for the Microsoft Security Updates API (msrc.microsoft.com/update-guide)

mSS-GUI
mSS-GUI
Free

基于mitmproxy的安全工具,支持请求自动加解密、webpack优化、流量关键字查询。

MSSprinkler
MSSprinkler
Open Source Exploitation

MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It employ…

MSSQLand
MSSQLand
Open Source Exploitation

Interract with Microsoft SQL Server (MS SQL | MSSQL) servers and their linked instances in restricted environments, without the need for com…

mtasa-blue
mtasa-blue
Open Source Reverse Engineering

Multi Theft Auto is a game engine that turns Grand Theft Auto: San Andreas into networked multiplayer.

MTKPI
MTKPI
Open Source Exploitation

🧰 Multi Tool Kubernetes Pentest Image

muddle
muddle
Open Source Evasion

Hide and safeguard emails from bots. Obfuscate emails in PHP and Laravel.

muddy-waters
muddy-waters
Open Source Evasion

A literal string obfuscation library for rust projects

Multiline-Ultimate-Assembler
Multiline-Ultimate-Assembler
Open Source Reverse Engineering

A multiline (and ultimate) assembler (and disassembler) plugin for x64dbg and OllyDbg. A perfect tool for modifying and extending a compiled…

mutillidae
mutillidae
Open Source Web Application

OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security training. This is an…

mviewer
mviewer
Free Reverse Engineering

Rust-native MView viewer, converter, and glTF exporter for Marmoset .mview scenes

mvt
mvt
Free Forensics

MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.

mwdb-core
mwdb-core
Free Forensics

Malware repository component for samples & static configuration with REST API interface.

mwemu
mwemu
Open Source Evasion Exploitation

It's a hardware emulator + OS process simulator implemented in pure rust.

mxcheck
mxcheck
Open Source Kali Reconnaissance

mxcheck is an info and security scanner for e-mail servers.

MXS
MXS
Free Web Application

A powerful asynchronous XSS scanner supporting up to 1,500 concurrent requests.

my-arsenal-of-aws-security-tools
my-arsenal-of-aws-security-tools
Open Source Forensics

List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.

MY-CRTP-Notes
MY-CRTP-Notes
Open Source Exploitation Post-Exploitation

This repository contains my preparation notes for CRTP and Red Teaming, focused on Active Directory attacks and defenses.

My-CTF-Challenges
My-CTF-Challenges
Free

Challenges I created for CTF competitions.

my-ctf-challenges
my-ctf-challenges
Free

A repository for CTF challenges I created. Have fun playing CTFs :sunglasses:

My-CyberSecurity-Store
My-CyberSecurity-Store
Free Web Application

This repository contains a comprehensive collection of learning resources and notes that I've gathered on various topics, including cybersec…

My-Methodologies
My-Methodologies
Free Reconnaissance Web Application

Tools and methods that I personally use for Recon and Exploitations

MyIP
MyIP
Open Source Reconnaissance

The best IP Toolbox. Easy to check what's your IPs, IP geolocation, check for DNS leaks, examine WebRTC connections, speed test, ping test, …

MyJWT
MyJWT
Open Source Web Application

A cli for cracking, testing vulnerabilities on Json Web Token(JWT)

myph
myph
Open Source Evasion

shellcode loader for your evasion needs

Mythic-OSEP-CheatSheet
Mythic-OSEP-CheatSheet
Open Source Post-Exploitation

This repo contains my full cheatsheet and code I used to pass the OSEP using Mythic C2. I've try to keep everything simple and direct and I'…

myvpn-desktop
myvpn-desktop
Open Source

VPN server configuration software. Protocols: L2TP, PPTP, OpenVPN, WireGuard, Socks5, ShadowSocks (v2ray). | Providers: DigitalOcean, Linode…

n6
n6
Open Source

Automated handling of data feeds for security teams

n8n-CVE-2025-68613-exploit
n8n-CVE-2025-68613-exploit
Free Exploitation

CVE-2025-68613: n8n RCE vulnerability exploit and documentation

n8n-CyberSecurity-Workflows
n8n-CyberSecurity-Workflows
Open Source Exploitation

Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.

nac_bypass
nac_bypass
Open Source Exploitation

Script collection to bypass Network Access Control (NAC, 802.1x)

NacosExploit
NacosExploit
Free Exploitation

NacosExploit 一款 Nacos 综合漏洞利用工具 …

nacs
nacs
Free Exploitation

事件驱动的渗透测试扫描器 Event-driven pentest scanner

name-seeker
name-seeker
Open Source Reconnaissance

NameSeeker 是一款强大的跨平台桌面应用,可以在数百个网站上搜索用户名和邮箱,帮助你快速发现你的数字足迹。NameSeeker is a powerful cross-platform desktop application that searches hundreds …

Name-That-Hash
Name-That-Hash
Open Source

🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes with a …

NameSpi
NameSpi
Free Reconnaissance

An OSINT employee/username enumeration tool

nampa
nampa
Open Source Reverse Engineering

Nampa - FLIRT for (binary) ninjas

narsil-mcp
narsil-mcp
Open Source

Rust MCP server for comprehensive code intelligence - 90 tools, 32 languages, security scanning, call graphs, and more

Narthex
Narthex
Open Source Password Attacks

Modular personalized dictionary generator.

NativeDump
NativeDump
Free

Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)

NativePayloads
NativePayloads
Free Evasion Exploitation

All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming

natlas
natlas
Open Source Reconnaissance Scanning & Enumeration

Attack Surface Management since before Attack Surface Management was a thing

Nauz-File-Detector
Nauz-File-Detector
Open Source Forensics Reverse Engineering

Linker/Compiler/Tool detector for Windows, Linux and MacOS.

nbdefense
nbdefense
Open Source

Secure Jupyter Notebooks and Experimentation Environment

Ncat
Ncat
Open Source Kali Post-Exploitation Scanning & Enumeration

Feature-packed reimplementation of Netcat from the Nmap project. Adds SSL/TLS support, connection brokering, and scripting capabilities.

Nday-Exploit-Plan
Nday-Exploit-Plan
Open Source Exploitation

https://github.com/OracleNep/Nday-Exploit-Plan/assets/41804496/16a5cdd2-cc2c-4808-95ac-1f0cab09b35f

NDSFactory
NDSFactory
Open Source Reverse Engineering

Unpack & Repack Nintendo DS Roms (.nds)

Nebula
Nebula
Free Post-Exploitation Reconnaissance

Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still wo…

NEBULA
NEBULA
Open Source Exploitation

Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques

nebula
nebula
Open Source

AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.

NebulaC2
NebulaC2
Free Post-Exploitation

NebulaFD
NebulaFD
Free Reverse Engineering

A work in progress, reimagined decompiler for Clickteam Fusion.

NelmioSecurityBundle
NelmioSecurityBundle
Open Source Web Application

Adds extra security-related features in your Symfony application

NemesisTools
NemesisTools
Free Web Application

NemesisTools PowerFull Hacking Tools

neo
neo
Open Source

Exploit distribution system for A&D competitions

Neo-AI
Neo-AI
Open Source Kali

Neo AI integrates into the Linux terminal, capable of executing system commands and providing helpful information.

Neo4LDAP
Neo4LDAP
Open Source Exploitation Post-Exploitation

Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analysis …

nerva
nerva
Open Source Reconnaissance Scanning & Enumeration

Fast service fingerprinting CLI for 170+ protocols (TCP/UDP/SCTP) - built by Praetorian

Nessus
Nessus
Freemium Scanning & Enumeration

Industry-leading vulnerability scanner with 170,000+ plugins. Identifies vulnerabilities, misconfigurations, default passwords, and complian…

nessus
nessus
Open Source Kali Scanning & Enumeration

Work and creds goes to elliot-bia. Twitter: Elliot58616851

nessus-file-analyzer
nessus-file-analyzer
Open Source

GUI tool which enables you to parse nessus scan files from Tenable Nessus and Tenable Security Center, and exports results to a spreadsheet …

NetAlertX
NetAlertX
Open Source Wireless

Centralized network visibility and continuous asset discovery. Monitor devices, detect change, and stay aware across distributed networks.

netbyte
netbyte
Open Source

Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provides …

Netcat (nc)
Netcat (nc)
Open Source Kali Post-Exploitation Scanning & Enumeration

The "Swiss army knife" of networking. Reads and writes data across network connections using TCP/UDP. Used for port scanning, banner grabbin…

NetDeflect
NetDeflect
Free

Easy to use DDoS mitigation with real-time traffic analysis, automatic attack pattern detection, IP blocking via iptables/blackhole routing,…

netdis
netdis
Free Forensics Reverse Engineering

Netdis is an open-source binary analysis tool powered by Ghidra. Upload files for disassembly, decompilation, control flow graphs and more, …

netease-cloud-music
netease-cloud-music
Open Source Reverse Engineering

🔐 点击展开登录方式详情

NetExec
NetExec
Open Source Exploitation Post-Exploitation

🚩 This is the open source repository of NetExec maintained by a community of passionate people

Netexec (nxc)
Netexec (nxc)
Open Source Kali Exploitation Post-Exploitation

The maintained fork and successor to CrackMapExec. Network service exploitation Swiss army knife for Active Directory pentesting. Supports S…

NETHERCAP
NETHERCAP
Free Wireless

A Wi-Fi penetration testing tool for ESP8266, ESP-32, and BW16

netlas-cookbook
netlas-cookbook
Free Reconnaissance

The goal of this guide is very simple - to teach anyone interested in cyber security, regardless of their knowledge level, how to make the m…

netlas-dorks
netlas-dorks
Free Reconnaissance

A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to searc…

NETReactorSlayer
NETReactorSlayer
Open Source Reverse Engineering

An open source (GPLv3) deobfuscator and unpacker for Eziriz .NET Reactor

NetSecurity
NetSecurity
Free Exploitation Web Application

网络安全训练营全部资料,包括 Web 安全、网络安全、信息安全、系统防护、攻防渗透、云安全

NetShark
NetShark
Open Source Scanning & Enumeration

All-in-one CLI security scanner: port scanning, web security, subdomain enumeration, network monitoring. Multi-threaded, cross-platform.

netspionage
netspionage
Free Forensics Reconnaissance

Network Forensics CLI utility that performs Network Scanning, OSINT, and Attack Detection

netstalking-catalogue
netstalking-catalogue
Free Reconnaissance

Каталог нетсталкерских ресурсов, команд, инструментов, источников контента.

Nettacker
Nettacker
Open Source Exploitation Reconnaissance

Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management

NetworkMiner
NetworkMiner
Freemium Forensics

Network forensics analysis tool (NFAT) that captures packets and parses them to reconstruct transmitted files, certificates, images, and cre…

neural-network-hacking
neural-network-hacking
Open Source Scanning & Enumeration

Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security

NeuroSploit
NeuroSploit
Free

NeuroSploit is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive security …

neutron
neutron
Open Source Kali Scanning & Enumeration

AI Powered Terminal Based Ethical Hacking Assistant

newserv
newserv
Open Source Reverse Engineering

Phantasy Star Online game server, proxy, and reverse-engineering tools

next-css-obfuscator
next-css-obfuscator
Open Source Evasion

A package deeply inspired by PostCSS-Obfuscator but for Next.js.

Next.js-RSC-RCE-Scanner-CVE-2025-66478
Next.js-RSC-RCE-Scanner-CVE-2025-66478
Free Exploitation

A command-line scanner for batch detection of Next.js application versions and determining if they are affected by CVE-2025-66478 vulnerabil…

NextSploit
NextSploit
Free Scanning & Enumeration

NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js

NFCman
NFCman
Open Source

A Universal Android NFC research and analysis toolkit. Made for Android security researchers and developers. Clone, analyze, and test contac…

nfdx64dbg
nfdx64dbg
Open Source Reverse Engineering

Plugin for x64dbg Linker/Compiler/Tool detector.

nfr
nfr
Free Forensics

A lightweight tool to score network traffic and flag anomalies

nfs-security-tooling
nfs-security-tooling
Open Source

Detect common NFS server misconfigurations

nfsmw
nfsmw
Free Reverse Engineering

WIP 1:1 Decompilation of multiple versions of NFS:MW

Nginx-Lua-Anti-DDoS
Nginx-Lua-Anti-DDoS
Open Source Exploitation

A Anti-DDoS script to protect Nginx web servers using Lua with a HTML Javascript based authentication puzzle inspired by Cloudflare I am und…

NGL-Phish
NGL-Phish
Free Social Engineering

Phishing tool for Instagram, cloaked as the NGL - Anonymous question links app 😈🔗

ngPost
ngPost
Open Source Evasion

Command Line (or minimalist GUI) usenet poster for binaries developped in C++/QT designed to be as fast as possible and offer all the main f…

Nidhogg
Nidhogg
Open Source Exploitation

Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.

Nigerian-dignity
Nigerian-dignity
Free Social Engineering

A showcase of Nigeria's most innovative and disruptive digital entrepreneurs. This repo catalogs the robust infrastructure hosting next-gene…

Nightingale
Nightingale
Open Source Reconnaissance Web Application

Nightingale Docker for Pentesters is a comprehensive Dockerized environment tailored for penetration testing and vulnerability assessment. I…

niimblue
niimblue
Open Source Reverse Engineering

🖨 NIIMBOT custom web client/app. Design and print labels with NIIMBOT printers directly from your PC or mobile web browser!

niimbluelib
niimbluelib
Open Source Reverse Engineering

🖨 A library for the communication with NIIMBOT printers via web browser

Nikto
Nikto
Open Source Kali Scanning & Enumeration Web Application

Open-source web server scanner that checks for over 6,700 potentially dangerous files, outdated server software, version-specific problems, …

Nimbo-C2
Nimbo-C2
Open Source Exploitation Post-Exploitation

Nimbo-C2 is yet another (simple and lightweight) C2 framework

nimfilt
nimfilt
Open Source Forensics Reverse Engineering

A collection of modules and scripts to help with analyzing Nim binaries

Nimperiments
Nimperiments
Free

Various one-off pentesting projects written in Nim. Updates happen on a whim.

NinjaDroid
NinjaDroid
Open Source Reverse Engineering

Ninja Reverse Engineering on Android APK packages

ninjasworkout
ninjasworkout
Free

Vulnerable NodeJS Web Application

nipejs
nipejs
Open Source Web Application

Simplify your life with leak detection in JavaScript. NipeJS streamlines the use of regex, making it effortless to uncover potential leaks.

Nishang
Nishang
Open Source Kali Exploitation Post-Exploitation

Framework and collection of PowerShell scripts and payloads for offensive security and post-exploitation. Includes reverse shells, privilege…

nishang
nishang
Free Kali Exploitation

Nishang - Offensive PowerShell for red team, penetration testing and offensive security.

NIST-to-Tech
NIST-to-Tech
Open Source Exploitation

An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)

Nitro-Ransomware
Nitro-Ransomware
Free Exploitation

Discord nitro gift subscription ransomware

NIVOS
NIVOS
Free Password Attacks Wireless

NIVOS is a hacking tool that allows you to scan deeply , crack wifi, see people on your network. It applies to all linux operating systems. …

nix-security-box
nix-security-box
Open Source

Tool set for Information security professionals and all others

njsscan
njsscan
Open Source Reverse Engineering

njsscan is a semantic aware SAST tool that can find insecure code patterns in your Node.js applications.

Nmap
Nmap
Open Source Kali Reconnaissance Scanning & Enumeration

The industry-standard network scanner. Discovers hosts, open ports, services, OS versions, and runs scriptable vulnerability checks via the …

nmap
nmap
Open Source Kali Scanning & Enumeration

Idiomatic nmap library for go developers

nmap_tutorial
nmap_tutorial
Free Reconnaissance Scanning & Enumeration

Some collected notes about nmap

nmap-formatter
nmap-formatter
Open Source Scanning & Enumeration

A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's nmap…

NmiCallbackBlocker
NmiCallbackBlocker
Free Exploitation

Kernel Level NMI Callback Blocker

nndefaccts
nndefaccts
Open Source Scanning & Enumeration

nnposter's alternate fingerprint dataset for Nmap script http-default-accounts

nocom-explanation
nocom-explanation
Free Exploitation

block game military grade radar

nodepass
nodepass
Open Source Exploitation Post-Exploitation

A secure, efficient TCP/UDP tunneling solution that delivers fast, reliable access across network restrictions using pre-established TCP/QUI…

noir
noir
Open Source Web Application

Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.

nomore403
nomore403
Open Source Reconnaissance

🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast. Pr…

NoMoreCookies
NoMoreCookies
Open Source

Browser Protector against various stealers, written in C# & C/C++.

non-typical-OSINT-guide
non-typical-OSINT-guide
Free Reconnaissance

The most unusual OSINT guide you've ever seen. The repository is intended for bored professionals only. PRs are welcome!

NoobCTF
NoobCTF
Free

记录个人做题/学习时的笔记和一些writeup,leetcode解法记录。随着时间的推移,这个仓库的目标逐渐成为收集各个CTF的writeup。目标是一直更新,直到我不打CTF的那一天(希望这天别来)

Nope-Proxy
Nope-Proxy
Free

TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.

noscript
noscript
Open Source Web Application

The popular NoScript Security Suite browser extension.

noseyparker-explorer
noseyparker-explorer
Open Source

Interactive results explorer and annotation tool for Nosey Parker

NoSQLMap
NoSQLMap
Open Source Exploitation Web Application

Automated NoSQL injection and database exploitation tool. Targets MongoDB, CouchDB, Redis, and Cassandra for injection attacks and retrieves…

NoSQLMap
NoSQLMap
Open Source Exploitation Scanning & Enumeration

Automated NoSQL database enumeration and web application exploitation tool.

nosystemd.org
nosystemd.org
Open Source Reconnaissance

Website for arguments against systemd and further resources

NotLoBi
NotLoBi
Free Reconnaissance

NovaLdr
NovaLdr
Open Source Exploitation

Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)

novops
novops
Open Source

Cross-platform secret & config manager for development and CI environments

nox-framework
nox-framework
Free Exploitation Reconnaissance

High-performance OSINT/CTI framework for automated identity pivoting and risk analysis across 120+ sources.

nPassword
nPassword
Open Source Exploitation Post-Exploitation

A Windows AD Password Manager for ATTACKER(Redteamer/Pentester).

npq
npq
Open Source

safely install npm packages by auditing them pre-install stage

nrd-list-downloader
nrd-list-downloader
Open Source Reconnaissance Social Engineering

Shell Script to download NRD(Newly Registered Domain) list for free

NThread
NThread
Open Source Exploitation Reverse Engineering

Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hooks.

ntlm_theft
ntlm_theft
Open Source Exploitation

Creates malicious files (LNK, SCF, PDF, DOCX, etc.) that force a Windows system to authenticate to an attacker's server when the file is acc…

NTLMPasswordChanger
NTLMPasswordChanger
Free Exploitation

PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.

NTLMRecon
NTLMRecon
Open Source Exploitation Reconnaissance

Enumerate information from NTLM authentication enabled web endpoints 🔎

NTLMRecon
NTLMRecon
Open Source Exploitation Reconnaissance

A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.

ntoseye
ntoseye
Open Source Reverse Engineering

Windows kernel debugger for Linux hosts running Windows under KVM/QEMU

NTRGhidra
NTRGhidra
Open Source Exploitation Reverse Engineering

A Nintendo DS binary loader for Ghidra

Nuclei
Nuclei
Open Source Kali Scanning & Enumeration Web Application

Fast, template-based vulnerability scanner. Thousands of community-maintained YAML templates cover CVEs, misconfigurations, exposed panels, …

nuclei
nuclei
Open Source Kali Scanning & Enumeration

Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling…

nuclei_poc
nuclei_poc
Open Source Exploitation

Nuclei POC,每2小时更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现。已有41w+POC,其中3.5w+高质…

Nuclei-Community-Templates
Nuclei-Community-Templates
Free

A collaborative hub for Nuclei templates. Contribute, share, and explore powerful vulnerability detection tools!

nuclei-MonaCodeScanner
nuclei-MonaCodeScanner
Open Source Web Application

Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 issues…

nuclei-wordfence-cve
nuclei-wordfence-cve
Open Source Exploitation Web Application

70k+ WordPress Nuclei templates, updated daily from Wordfence intel—filter by severity/tags/CVE and scan in one line. 🚀🔒

Nucleimonst3r
Nucleimonst3r
Open Source Exploitation

Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs and…

nuitka-helper
nuitka-helper
Open Source Forensics Reverse Engineering

Symbol Recovery Tool for Nuitka Binaries

Nuked-MD
Nuked-MD
Open Source Reverse Engineering

Cycle accurate Mega Drive emulator

Nuked-MD-FPGA
Nuked-MD-FPGA
Open Source Reverse Engineering

Mega Drive/Genesis core written in Verilog

nullinux
nullinux
Open Source Reconnaissance Scanning & Enumeration

Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users…

Nullpoint-Stealer
Nullpoint-Stealer
Free Exploitation

Nullpoint Stealer Designed To Steal Everything, And Send To Nullpoint Panel.

NullRAT
NullRAT
Free Exploitation

[POC] Sample Remote Access Trojan with many features

nullsec-linux
nullsec-linux
Open Source

🐧 Security-focused Linux distribution with 140+ tools, custom kernel 6.17.13, AI assistant | 5 editions | Cloud, AI/ML, Automotive, Hardware…

nullsec-logreaper
nullsec-logreaper
Open Source Forensics

🪓 High-Speed Log Analysis & Forensics Tool - Part of NullSec Toolkit

numasec
numasec
Open Source Exploitation Scanning & Enumeration

AI agent for penetration testing. Like Claude Code, but for security. Open source, MCP-native, works with any LLM.

nuxt-security
nuxt-security
Open Source Web Application

🛡 Automatically configure your app to follow OWASP security patterns and principles by using HTTP Headers and Middleware

nvdcve
nvdcve
Free Exploitation

__Important__: this repository is now partially redundant with the CVEProject/cvelist project that allows to explore the CVE®/NVD modificati…

nvdlib
nvdlib
Open Source Exploitation

A simple wrapper for the National Vulnerability CVE/CPE API

nyuctf_agents
nyuctf_agents
Open Source

The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench

Nyxelf
Nyxelf
Open Source Forensics Reverse Engineering

Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and dy…

nyxgeek-rules
nyxgeek-rules
Free Password Attacks

Custom password cracking rules for Hashcat and John the Ripper

NyxInvoke
NyxInvoke
Open Source Evasion Exploitation

NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-build …

nyxstone
nyxstone
Open Source Reverse Engineering

Nyxstone: assembly / disassembly library based on LLVM, implemented in C++ with Rust and Python bindings, maintained by emproof.com

nyxstrike
nyxstrike
Free Kali Web Application

AI Powered penetration testing Platform for offensive security research

o365spray
o365spray
Open Source Scanning & Enumeration

Username enumeration and password spraying tool aimed at Microsoft O365.

oauth-labs
oauth-labs
Open Source

oauth-labs: an intentionally vulnerable set of OAuth 2.0 labs for security training and learning

obfus.h
obfus.h
Open Source Evasion

Macro-header for compile-time C obfuscation (tcc, win x86/x64)

obfuscar
obfuscar
Open Source Evasion

Open source obfuscation tool for .NET assemblies

Obfuscate
Obfuscate
Free Evasion

Guaranteed compile-time string literal obfuscation header-only library for C++14

obfuscator
obfuscator
Open Source Evasion Reverse Engineering

PE (and elf now!) bin2bin obfuscator

obfuscator
obfuscator
Open Source Evasion

If you are interested in stronger obfuscation methods, feel free to take a look at my new project masxinlingvonta that further obfuscates ja…

obfuscator-io-deobfuscator
obfuscator-io-deobfuscator
Open Source Reverse Engineering

A deobfuscator for scripts obfuscated by Obfuscator.io

obfuscxx
obfuscxx
Open Source Evasion

Header-only compile-time variables obfuscation library for C++20 and later. Compiler Support: MSVC (+WDM), Clang, GCC. Architecture Support:…

obfusheader.h
obfusheader.h
Open Source Evasion

Obfusheader.h is a portable header file for C++14 compile-time obfuscation.

Obfusk8
Obfusk8
Open Source Evasion Reverse Engineering

Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries

ObfuXtreme
ObfuXtreme
Open Source Evasion

ObfuXtreme is an advanced Python obfuscation tool for security research, reverse engineering education, and analysis of how obfuscation impa…

obfuz
obfuz
Open Source Evasion

Obfuz:功能强大的开源 Unity 代码混淆插件。深度集成 Unity 工作流,配置简单,支持 HybridCLR、xLua 等热更新方案。A powerful open-source code obfuscation plugin for Unity. Deeply int…

objdiff
objdiff
Open Source Reverse Engineering

A local diffing tool for decompilation projects

obliteration
obliteration
Open Source Reverse Engineering

Experimental free and open-source PlayStation 4 kernel

observer_cli
observer_cli
Open Source Reconnaissance

Visualize Erlang/Elixir Nodes On The Command Line

obsidian-osint-templates
obsidian-osint-templates
Free Reconnaissance

These templates are suggestions of how the Obsidian notetaking tool can be used during an OSINT investigation. The example data in those fil…

ocean_ctf
ocean_ctf
Open Source Exploitation

CTF平台 支持docker 动态部署题目、分数统计、作弊检测,静态题目,漏洞复现,ctf platform,

octoscan
octoscan
Open Source Exploitation

Octoscan is a static vulnerability scanner for GitHub action workflows.

odat
odat
Free Post-Exploitation

ODAT: Oracle Database Attacking Tool

Odinova
Odinova
Open Source Forensics Reconnaissance

Odinova Digital Tiger is an advanced application designed for Open-Source Intelligence (OSINT), equipped with versatile tools and a user-fri…

odoomap
odoomap
Open Source Exploitation Password Attacks

A penetration testing tool for odoo applications.

Offensive-Enumeration
Offensive-Enumeration
Free

Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient command…

Offensive-OSINT-Tools
Offensive-OSINT-Tools
Free Exploitation Reconnaissance

OffSec OSINT Pentest/RedTeam Tools

Offensive-Payloads
Offensive-Payloads
Free

List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.

Offensive-Pentesting-Scripts
Offensive-Pentesting-Scripts
Free Reconnaissance

Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work more …

Offensive-Pentesting-Web
Offensive-Pentesting-Web
Free Exploitation Reconnaissance

A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed as…

Offensive-Resources
Offensive-Resources
Free Exploitation Web Application

A Huge Learning Resources with Labs For Offensive Security Players

OffensiveReverseShellCheatSheet
OffensiveReverseShellCheatSheet
Open Source Exploitation

Collection of reverse shells for red team operations.

offensivesecurity-python
offensivesecurity-python
Free

Offensive Security Python. Collection of python scripts that I created/pirated/curated to help me understand CyberSecurity. I find it helpfu…

Office-phish-templates
Office-phish-templates
Free Exploitation Social Engineering

Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from target u…

Offsec-Practice-Labs
Offsec-Practice-Labs
Free

Offsec Practice Labs is a curated training arsenal for hands-on prep across eCPPTv3, OSCP, and CPTS.

OffSec-Reporting
OffSec-Reporting
Free

Offensive Security OSCP+, OSEP, OSWP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA, OSIR, OSTH Exam and Lab Reporting / Note-Taking Tool

offsec-tools
offsec-tools
Free

Compiled tools for internal assessments

offsectools_www
offsectools_www
Free

A vast collection of security tools and resources curated by the community.

ofrak
ofrak
Free Reverse Engineering

OFRAK: unpack, modify, and repack binaries.

oFx
oFx
Open Source Exploitation

oFx是一个开源的、开箱即用的漏洞批量验证框架。无需任何编程基础,只需一条命令即可快速验证、扫描漏洞

ogi
ogi
Open Source Reconnaissance

Open Source Link Analysis & OSINT Framework

ohshint.gitbook.io
ohshint.gitbook.io
Free Reconnaissance

So what is this all about? Yep, its an OSINT blog and a collection of OSINT resources and tools. Suggestions for new OSINT resources is alwa…

oisd
oisd
Open Source Reconnaissance Social Engineering

oisd blocklist

OK-VPS
OK-VPS
Free Reconnaissance Scanning & Enumeration

Bug Bounty Vps Setup Tools Installer …

okhi
okhi
Open Source

Open Keylogger Hardware Implant - USB & PS2 Keyboards

old-driver-passwords
old-driver-passwords
Free Password Attacks

oletools
oletools
Free Forensics

oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware anal…

ollvm-rust
ollvm-rust
Free Evasion

out-of-tree llvm obfuscation pass plugin (dynamically loadable by rustc). || rust toolchain with obfuscation llvm pass.

ollvm-unflattener
ollvm-unflattener
Open Source Evasion Reverse Engineering

Obfuscator-llvm Control Flow Flattening Deobfuscator

Ominis-OSINT
Ominis-OSINT
Open Source Forensics Reconnaissance

This Python application is an OSINT (Open Source Intelligence) tool called "Ominis OSINT - Web Hunter." It performs online information gathe…

omni
omni
Open Source Evasion Reverse Engineering

A modern zero-allocation C++23 library for working with low-level Windows within user-space. Iteration over loaded modules via PEB, EAT iter…

omnibus
omnibus
Open Source Reconnaissance

The OSINT Omnibus (beta release)

OmniProx
OmniProx
Open Source Exploitation

IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare

omnisci3nt
omnisci3nt
Open Source Reconnaissance Scanning & Enumeration

Omnisci3nt is an open-source web reconnaissance and intelligence tool for extracting deep technical insights from domains, including subdoma…

On-Chain-Investigations-Tools-List
On-Chain-Investigations-Tools-List
Free Reconnaissance

Here we discuss how one can investigate crypto hacks and security incidents, and collect all the possible tools and manuals! PRs are welcome…

one_gadget
one_gadget
Open Source Exploitation

The best tool for finding one gadget RCE in libc.so.6

One-Lin3r
One-Lin3r
Open Source Kali Exploitation

Gives you one-liners that aids in penetration testing operations, privilege escalation and more

One-Liner-OSINT
One-Liner-OSINT
Open Source Reconnaissance Web Application

One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.

One-Liners
One-Liners
Free Reconnaissance Scanning & Enumeration

A collection of one-liners for bug bounty hunting.

onecli
onecli
Open Source

Open-source credential vault, give your AI agents access to services without exposing keys.

OneDorkForAll
OneDorkForAll
Free Exploitation Reconnaissance

An insane list of all dorks taken from everywhere from various different sources.

onedrive_user_enum
onedrive_user_enum
Open Source Reconnaissance Scanning & Enumeration

onedrive user enumeration - pentest tool to enumerate valid o365 users

OneForAll
OneForAll
Open Source Reconnaissance

👊OneForAll是一款功能强大的子域收集工具 📝English Document

oneiromancer
oneiromancer
Open Source Reverse Engineering

Reverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.

OneLinerBounty
OneLinerBounty
Open Source Reconnaissance Scanning & Enumeration

OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their skil…

OneListForAll
OneListForAll
Free Password Attacks Scanning & Enumeration

Wordlists for web fuzzing: curated micro, categorized short/long, and combined final lists.

OneShot-Extended
OneShot-Extended
Open Source Wireless

OneShot-Extended (WPS penetration testing utility) is a fork of the tool with extra features

OneShot-Termux
OneShot-Termux
Free Wireless

Run WPS PIN attacks (Pixie Dust and bruteforce) on your Termux

oneuptime
oneuptime
Open Source Forensics

Complete open-source monitoring and observability platform.

onion-lookup
onion-lookup
Open Source Reconnaissance

Software back-end and services for checking the existence of Tor hidden services and retrieving their associated metadata. onion-lookup reli…

OnionC2
OnionC2
Free Exploitation Post-Exploitation

C2 writen in Rust & Go powered by Tor network.

OnionClaw
OnionClaw
Free Reconnaissance

Provide AI agents with full Tor network access and dark web data through a zero-config OpenClaw skill or standalone tool.

OnionSearch
OnionSearch
Open Source Reconnaissance

OnionSearch is a script that scrapes urls on different .onion search engines.

online-hacking
online-hacking
Open Source

Welcome to the Complete Ethical Hacking Course repository. This comprehensive course covers a wide range of topics related to ethical hackin…

online-hackings
online-hackings
Open Source

WhatsApp Hacking Learn about methods for ethical hacking of WhatsApp accounts. Facebook Hacking Explore techniques for ethical hacking of F…

onlypwner-challenges
onlypwner-challenges
Free

Challenges for the ONLYPWNER CTF Platform

OnlyShell
OnlyShell
Open Source Exploitation Post-Exploitation

A powerful Go-based multi-shell handler for managing multiple reverse shell connections simultaneously with features like shell type detecti…

onvifscan
onvifscan
Open Source

IoT pentesting tools for ONVIF-enabled devices

open-asm
open-asm
Open Source Reconnaissance

Open-source platform for cybersecurity Attack Surface Management (OASM).

open-atlas
open-atlas
Open Source Reconnaissance

The only OSINT tool you'll ever need (with database support!)

Open-Redirect-Payloads
Open-Redirect-Payloads
Free

open-semantic-search
open-semantic-search
Open Source Reconnaissance

Open Source research tool to search, browse, analyze and explore large document collections by Semantic Search Engine and Open Source Text M…

open-source-aviation
open-source-aviation
Free Reconnaissance

A list of open-source aviation projects and data

Open-Source-Information-Leakage
Open-Source-Information-Leakage
Open Source Reconnaissance

开源项目信息泄露笔记【内容会持续更新】,博客地址:https://blog.zgsec.cn/archives/205.html,欢迎各位师傅点个Star支持和补充完善~🥰

Open-Source-Security-Guide
Open-Source-Security-Guide
Free Kali Forensics

Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and…

Open-Source-Threat-Intel-Feeds
Open-Source-Threat-Intel-Feeds
Open Source Post-Exploitation Social Engineering

This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple ty…

Open-source-tools-for-CTI
Open-source-tools-for-CTI
Free Reconnaissance

Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers

OpenAlpha
OpenAlpha
Open Source Reverse Engineering

A Swift package for retrieving images from Sony digital cameras

openappsec
openappsec
Open Source Web Application

open-appsec is a machine learning security engine that preemptively and automatically prevents threats against Web Application & APIs. This …

openaptx
openaptx
Open Source Reverse Engineering

Reverse-engineered apt-X audio codec

OpenAWE
OpenAWE
Open Source Reverse Engineering

A reimplementation of Remedy Entertainments Alan Wake Engine, in later iterations known as the Northlight Engine

openblack
openblack
Open Source Reverse Engineering

openblack is an open-source game engine that supports playing Black & White (2001).

OpenBukloit
OpenBukloit
Open Source

Minecraft plugin backdoor injector

openclaw-detect
openclaw-detect
Open Source

Detection scripts for MDM deployment to identify OpenClaw installations on managed devices.

opencti
opencti
Free Reconnaissance

Open Cyber Threat Intelligence Platform

opencve
opencve
Free Exploitation

Vulnerability Intelligence Platform

opendbc
opendbc
Open Source Reverse Engineering

OpenDoor
OpenDoor
Open Source Reconnaissance Web Application

OWASP WEB Directory Scanner [](https://twitter.com/intent/tweet?text=Wow:&url=https://github.com/stanislav-web/OpenDoor) ===================…

OpenEctasy
OpenEctasy
Open Source

Minecraft Server (Bukkit, Spigot, Paper) backdoor, using ow2 asm

openftp4
openftp4
Open Source Web Application

A list of all FTP servers in IPv4 that allow anonymous logins.

OpenFusion
OpenFusion
Open Source Reverse Engineering

Open source server for the FusionFall client

OpenGD
OpenGD
Open Source Reverse Engineering

Open source implementation of Geometry Dash powered by a fork of cocos2dx 4.0.

openhaystack
openhaystack
Open Source Reverse Engineering Wireless

Build your own 'AirTags' 🏷 today! Framework for tracking personal Bluetooth devices via Apple's massive Find My network.

OpenKh
OpenKh
Open Source Reverse Engineering

Kingdom Hearts libraries, tools, game engine and documentation

OpenPods
OpenPods
Open Source Reverse Engineering

The Free and Open Source app for monitoring your AirPods on Android

opensquat
opensquat
Open Source Reconnaissance Social Engineering

The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonating …

opensuse
opensuse
Free Kali

How to install different desktops via Wsl and Windows 11 - Linux - KDE - Gnome - Xfce - X410 - WSL2 - GWSL - Budgie - Windows Subsystem for …

opentaal-wordlist
opentaal-wordlist
Free Password Attacks

🇳🇱🇧🇪🇸🇷 Dutch word list by OpenTaal

OpenTendo
OpenTendo
Free Reverse Engineering

An Open-Source HardWare (OSHW) recreation of the original 1985 front-loading NES Motherboard

OpenTS2
OpenTS2
Open Source Reverse Engineering

Open source re-implementation of The Sims 2 in Unity

OpenVAS / Greenbone
OpenVAS / Greenbone
Open Source Kali Scanning & Enumeration

Open-source vulnerability assessment framework. Full-featured scanner with a web interface, regularly updated Network Vulnerability Tests (N…

openvpn-shapeshifter
openvpn-shapeshifter
Open Source Evasion

This script will automatically guide you to install and configure your OpenVPN server with Shapeshifter Dispatcher (obfuscation) which will …

openwrt-useful-tools
openwrt-useful-tools
Free Kali Wireless

A repo containing different tools compiled specifically for the Hak5 WiFi Pineapple MK6 and MK7.

operative-framework
operative-framework
Free Forensics Reconnaissance

operative framework is a rust investigation OSINT framework, you can interact with multiple targets, execute multiple modules, create links …

OPSEC-OSINT-Tools
OPSEC-OSINT-Tools
Free Reconnaissance

A list and guide of OSINT/OPSEC and some tools that I've made and or use.

optik
optik
Free Scanning & Enumeration

Optik is a set of symbolic execution tools that assist smart-contract fuzzers

orbital-ctf
orbital-ctf
Open Source

Orbital - A Custom CTF Platform

orgs-data
orgs-data
Free Reconnaissance Web Application

Mapping from bug bounty and vulnerability disclosure programs to respective GitHub organizations

OriON
OriON
Free Reconnaissance

OriON is a virtual machine in Spanish that incorporates several tools for Open Source Intelligence (OSINT) on people.

OS-Downloads
OS-Downloads
Free Kali

Links Of Windows/Linux/OFFICE ISOs Files using official Links.

OSCP
OSCP
Free

oscp
oscp
Free

Bootstraps, cheat-sheets, and guides for the OSCP exam.

OSCP-Pentesting-Cheatsheet
OSCP-Pentesting-Cheatsheet
Open Source

A general purpose cheat sheet for pentesting and OSCP certification

OSCP-Resources
OSCP-Resources
Open Source

A comprehensive collection of resources, tools, tips, and guides for preparing and succeeding in the OSCP (Offensive Security Certified Prof…

OSCP-Tricks
OSCP-Tricks
Free

OSCP Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines

osctrl
osctrl
Open Source Forensics

Fast and efficient osquery management

osdfir-infrastructure
osdfir-infrastructure
Open Source Forensics

Helm charts for running open source digital forensic tools in Kubernetes

OSINT
OSINT
Open Source Reconnaissance

Companion repo for A Complete Guide to Mastering OSINT (2025). Includes free templates ($5,000 value), latest 2025 OSINT tools, and resource…

OSINT_i_probiv_po_telefonu
OSINT_i_probiv_po_telefonu
Free Reconnaissance

Инструменты для пробива Телефона и поиска информации по номеру Телефона.

OSINT_i_probiv_Telegram
OSINT_i_probiv_Telegram
Free Reconnaissance

Инструменты для пробива Телеграм и поиска информации в Telegram.

osint_stuff_tool_collection
osint_stuff_tool_collection
Free Reconnaissance

A collection of several hundred online tools for OSINT

osint-ai-guide
osint-ai-guide
Free Reconnaissance

Comprehensive guide to AI applications in OSINT workflows and intelligence analysis

OSINT-Assistant
OSINT-Assistant
Open Source Reconnaissance

Open Source framework for anyone to work with Perplexity Sonar

OSINT-BIBLE
OSINT-BIBLE
Open Source Forensics Reconnaissance

A comprehensive 2026 guide to Open-Source Intelligence (OSINT): tools, methodologies, ethics, and techniques for responsible research and in…

osint-bookmark
osint-bookmark
Free Reconnaissance

A curated list of OSINT tools for company research, internet scanning, DNS, and Whois lookups, organized for easy access. Ideal for analysts…

osint-brazuca
osint-brazuca
Open Source Reconnaissance

Repositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.

osint-brazuca-regex
osint-brazuca-regex
Open Source Reconnaissance

Repositório criado com intuito de reunir expressões regulares dentro do contexto Brasil

OSINT-Browser-Extensions
OSINT-Browser-Extensions
Free Evasion Reconnaissance

Browser Chrome extensions, to help with OSINT, OPSEC, Privacy & Obfuscation.

OSINT-Cheat-sheet
OSINT-Cheat-sheet
Free Exploitation Reconnaissance

OSINT cheat sheet, list OSINT tools, wiki, dataset, article, book , red team OSINT for hackers and OSINT tips and OSINT branch. This reposit…

osint-cli-tool-skeleton
osint-cli-tool-skeleton
Open Source Reconnaissance

Template for new OSINT command-line tools

OSINT-Communities-Practitioners
OSINT-Communities-Practitioners
Free Reconnaissance

Search this list of OSINT Practitioners and learn about OSINT, it includes numerous, blogs and tutorials.

OSINT-CSE
OSINT-CSE
Free Reconnaissance

Custom Search Engines for OSINT

osint-d2
osint-d2
Open Source Forensics Reconnaissance

Beyond enumeration: Automated identity triangulation and cognitive profiling for modern OSINT investigations. 🕵️‍♂️🧠

Osint-fb
Osint-fb
Open Source Kali Reconnaissance

Osint-fb is a tool for searching for information gathering on Facebook with various available methods.

OSINT-for-countries-V2.0
OSINT-for-countries-V2.0
Free Reconnaissance

OSINT resources and tools by country, structured for fact-checkers and digital profilers

OSINT-FORENSICS-MOBILE
OSINT-FORENSICS-MOBILE
Free Forensics Reconnaissance

🇮🇹- Qualsiasi strumento inserito, può essere usato sia per fini professionali che per fini didattici. Ai fini professionali si consiglia l'u…

OSINT-Framework
OSINT-Framework
Open Source Reconnaissance

OSINT framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources. So…

OSINT-IA
OSINT-IA
Free Reconnaissance

Below is a list of useful tools for various activities.

OSINT-Kit
OSINT-Kit
Open Source Reconnaissance

Osint-kit is a curated collection of tools for OSINT investigations, from auditing and screen recording to aggregation. Build your ultimate …

OSINT-Map
OSINT-Map
Open Source Reconnaissance

osint-namecheckers-list
osint-namecheckers-list
Open Source Reconnaissance

A list of tools to search accounts by username

osint-notes
osint-notes
Free Reconnaissance

Another Comprehensive Collection of OSINT Tools and Notes

OSINT-SAN
OSINT-SAN
Free Reconnaissance

OSINT-SAN Framework дает возможность быстро находить информацию и деанонимизировать пользователей сети интернет.

OSINT-Tools
OSINT-Tools
Free Kali Reconnaissance

The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers a w…

OSINT-Tools
OSINT-Tools
Free Reconnaissance

:eyes: Some of my favorite OSINT tools.

osint-tools-cli
osint-tools-cli
Free Reconnaissance

This is a cli version of the cheat sheet for easy access. It can be navigated without using commands.

osint-tools-mcp-server
osint-tools-mcp-server
Open Source Reconnaissance

MCP server exposing multiple OSINT tools for AI assistants like Claude

OSINT-Tools-Russia
OSINT-Tools-Russia
Free Reconnaissance

A list of OSINT tools that may be useful to you when conducting investigations related to Russian Federation

OSINT-with-LLM
OSINT-with-LLM
Free Reconnaissance

It’s an OSINT reconnaissance poc powered by Local LLMs (Ollama). You can feed it an email, domain, or IP, and it automatically performs mult…

osint-X
osint-X
Open Source Kali Reconnaissance

osint-X is a tool for searching phone number information and for tracking phone numbers,perhaps only a few countries whose location can be t…

OSINT360-GPT
OSINT360-GPT
Free Exploitation Forensics

OSINT GPT ⌁ Cyber Intelligence – Advanced AI assistant for OSINT, DFIR, ethical hacking, red teaming, privacy & compliance. 🚀

OSINTAnonymous
OSINTAnonymous
Free Reconnaissance

Creazione d'identità Fake - Impostazione Privacy Profili Social - Creazione Ambiente di Lavoro

OSINTBox-data
OSINTBox-data
Open Source Reconnaissance

Community-driven repository of OSINT tools and resources.

osintbuddy
osintbuddy
Free Reconnaissance

Entity graphs, OSINT data mining, and plugins. Connect unstructured and public data for transformative insights. This is the community plugi…

Osintgram
Osintgram
Open Source Reconnaissance

Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname

osintgram
osintgram
Free Kali

This is a tool for searching or osint on Instagram to find target information

OSINTInvestigation
OSINTInvestigation
Free Reconnaissance

OSINTinvestigation - Tecniche OSINT - Strumenti - DeepWeb - Archivio

OsintNum
OsintNum
Open Source Reconnaissance

Tool to make OSINT to phone numbers with the help of APILayer, using its api together with Number Verification API. 🕵🏽‍♂️

osintquiz
osintquiz
Free Reconnaissance

In the subdirectories of this repository you will find password-protected archives with different OSINT and geolocation quiz tasks. Follow t…

OSINTSurveillance
OSINTSurveillance
Free Reconnaissance Wireless

Strumenti utili per la ricerca di WebCam e Wifi di pubblico accesso - Useful tools for searching for public access webcams and Wi-Fi network…

OsintTube
OsintTube
Free Reconnaissance

🔍 An Easy-to-Use YouTube OSINT Tool

Osiris
Osiris
Open Source Reverse Engineering

Cross-platform game hack for Counter-Strike 2 with Panorama-based GUI.

Osmedeus
Osmedeus
Open Source Reconnaissance Scanning & Enumeration

Workflow engine for offensive security reconnaissance. Orchestrates multiple tools (amass, subfinder, nuclei, etc.) in automated pipelines f…

osmedeus
osmedeus
Open Source Reconnaissance

A Modern Orchestration Engine for Security

osmedeus-base
osmedeus-base
Open Source Reconnaissance

Build your own reconnaissance system with Osmedeus Next Generation

osmedeus-workflow
osmedeus-workflow
Free Reconnaissance

Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own

Osprey
Osprey
Open Source Social Engineering

Browser extension that protects you from malicious websites.

osquery-configuration
osquery-configuration
Free Forensics

A repository for using osquery for incident detection and response

OSRipper
OSRipper
Open Source Evasion

AV evading cross platform Backdoor and Crypter Framework with a integrated lightweight webUI

OSTE-Meta-Scan
OSTE-Meta-Scan
Open Source Exploitation

The OSTE meta scanner is a comprehensive web vulnerability scanner that combines multiple DAST scanners, including Nikto Scanner, ZAP, Nucle…

osv-scanner
osv-scanner
Open Source Scanning & Enumeration

Vulnerability scanner written in Go which uses the data provided by https://osv.dev

osv.dev
osv.dev
Open Source Exploitation

Open source vulnerability DB and triage service.

otseca
otseca
Open Source Reconnaissance

Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.

otwartezrodla
otwartezrodla
Open Source Reconnaissance

Polskie rozszerzenie OSINT framework - Polish extension of OSINT framework

overlord
overlord
Open Source Exploitation

Overlord - Red Teaming Infrastructure Automation

OWASP Favicon Database
OWASP Favicon Database
Open Source Reconnaissance

Uses favicon hashes to identify services and technologies on web servers. By comparing favicon hashes with known databases, it can fingerpri…

OWASP ZAP
OWASP ZAP
Open Source Kali Scanning & Enumeration Web Application

OWASP's Zed Attack Proxy — one of the world's most popular free web application security scanners. Features active/passive scanning, spideri…

owasp-fstm
owasp-fstm
Free Reverse Engineering

The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers, co…

owasp-istg
owasp-istg
Free

The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility to a…

owasp-java-encoder
owasp-java-encoder
Open Source Web Application

The OWASP Java Encoder is a Java 1.5+ simple-to-use drop-in high-performance encoder class with no dependencies and little baggage. This pro…

owasp-social-osint-agent
owasp-social-osint-agent
Open Source Reconnaissance

AI-powered OSINT framework for multi-platform social media intelligence gathering using OpenAI-compatible APIs. Features vision analysis, ne…

OWASP-Testing-Guide-Checklist
OWASP-Testing-Guide-Checklist
Free Web Application

OWASP based Web Application Security Testing Checklist

Owl-sint
Owl-sint
Open Source Reconnaissance

The OwlSint tool is a tool for searching phone number information and for tracking phone numbers,perhaps only a few countries whose location…

OwlTrack
OwlTrack
Open Source Reconnaissance

OwlTrack OSINT Tools | This tracking tool can provide information about the phone number you enter. Not only that, this tool is able to scan…

Owlyshield
Owlyshield
Free Forensics Post-Exploitation

Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact).

owtf
owtf
Open Source Kali Web Application

Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.org …

oxo
oxo
Open Source

OXO is a security scanning orchestrator for the modern age.

p0wny-shell
p0wny-shell
Free

p0wny@shell:~# is a very basic, single-file, PHP shell. It can be used to quickly execute commands on a server when pentesting a PHP applica…

packemon
packemon
Open Source Forensics Scanning & Enumeration

Packet monster (っ‘-’)╮=͟͟͞͞◒ ヽ( '-'ヽ) TUI tool for sending packets of arbitrary input and monitoring packets on any network interfaces (de…

packer-kvm
packer-kvm
Open Source Kali

Create VM templates with Packer for usage with Libvirt/KVM virtualization : AlmaLinux 9, AlmaLinux 10, Centos 9, Rocky 9, Rocky 10, Fedora 4…

packetsquirrel-payloads
packetsquirrel-payloads
Free

The Official Packet Squirrel Payload Repository

packetveil
packetveil
Free Evasion

eBPF WireGuard Traffic Obfuscator (QUIC, SIP, SYSLOG, RANDOM)

packj
packj
Open Source Exploitation Forensics

Packj stops :zap: Solarwinds-, ESLint-, and PyTorch-like attacks by flagging malicious/vulnerable open-source dependencies ("weak links") in…

pacu
pacu
Open Source

The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.

padre
padre
Open Source Exploitation

Blazing fast, advanced Padding Oracle exploit

pagodo
pagodo
Open Source Reconnaissance

pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching

paid-the-beak
paid-the-beak
Free Exploitation

Wii U sdboot1 / devkit dual/sdio boot1 coldboot exploit.

PAL3patch
PAL3patch
Free Reverse Engineering

《仙剑奇侠传三》《仙剑奇侠传三外传·问情篇》分辨率补丁 | 源代码 《仙剑三》分辨率补丁主要功能: 提高游戏分辨率(完美修正界面错位问题) 修正游戏切屏崩溃问题 解决大量游戏 BUG(例如行动条卡住、龙葵攻击卡住、武器拖影不消失等) 添加截屏功能(按 F8 键可截屏,图片存储在 …

panda
panda
Free Reverse Engineering

Platform for Architecture-Neutral Dynamic Analysis

PandaLoader
PandaLoader
Open Source Evasion Exploitation

A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal builder.

pandora
pandora
Open Source Exploitation

A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.

PandwaRF
PandwaRF
Free Password Attacks

PandwaRF: RF analysis tool with a sub-1 GHz wireless transceiver controlled by a smartphone or

paniclock
paniclock
Open Source

Instantly disable Touch ID and lock your Mac with one click or keyboard shortcut.

PANO
PANO
Free Reconnaissance

🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden connecti…

Pantheon
Pantheon
Free Reconnaissance

IoT Camera Reconnaissance and Live Viewer

paper_collection
paper_collection
Free Exploitation Scanning & Enumeration

Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read

papermario
papermario
Free Reverse Engineering

Decompilation of Paper Mario (Nintendo 64)

ParamSpider
ParamSpider
Open Source Reconnaissance Scanning & Enumeration

Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing

ParanoidsPal-PrivacyLock
ParanoidsPal-PrivacyLock
Open Source

Keep your personal data truly personal

parappa2
parappa2
Free Reverse Engineering

PaRappa the Rapper 2 (2001, PS2) decompilation

parlance
parlance
Free Reconnaissance

A minimum-dependency ECMAScript client library and CLI tool for Parler – a "free speech" social network that accepts real money to buy "infl…

paroleitaliane
paroleitaliane
Open Source Password Attacks

In questo repository potrete trovare alcuni file contenenti liste di parole italiane (alcuni di provenienza ignota, recuperati da un vecchio…

party-pooper
party-pooper
Open Source Exploitation Wireless

A bluetooth control script for all your Bluetooth devices DoS needs.

passdb-frontend
passdb-frontend
Free Exploitation Reconnaissance

Pivoting Frontend for Pre-Seeded Password Databases

PassDetective
PassDetective
Open Source Kali Exploitation

PassDetective is a command-line tool that scans shell command history to detect mistakenly written passwords, API keys, and secrets. Using r…

passive_web_scanner
passive_web_scanner
Open Source Web Application

Passive web vulnerability scanner for ethical diagnostics

PassLLM
PassLLM
Open Source Exploitation Password Attacks

World's most accurate password guessing AI tool. A PyTorch implementation of PassLLM (USENIX 2025) that leverages PII and LoRA fine-tuning t…

passphrase-wordlist
passphrase-wordlist
Open Source Password Attacks

Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords

PassTester
PassTester
Open Source Post-Exploitation

Identify the accounts most vulnerable to dictionary attacks

password-leak
password-leak
Open Source

A library to check for compromised passwords

password-list
password-list
Open Source Password Attacks

Password lists with top passwords to optimize bruteforce attacks

Password-Monitor
Password-Monitor
Open Source

Ensure your password safety by scanning in data breaches.

PasswordPusher
PasswordPusher
Open Source

🔐 Securely share sensitive information with automatic expiration & deletion after a set number of views or duration. Track who, what and …

pastego
pastego
Open Source Reconnaissance

Scrape/Parse Pastebin using GO and expression grammar (PEG)

PasteJacker
PasteJacker
Free Exploitation Web Application

Hacking systems with the automation of PasteJacking attacks.

pasticciotto
pasticciotto
Open Source Evasion

Polymorphic VM and PoliCTF '17 reversing challenge.

pastoralist
pastoralist
Free

A CLI for automatically shepherding package.json overrides 👩🏽‍🌾

patator
patator
Open Source Password Attacks

Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.

PatchBoot
PatchBoot
Free Reverse Engineering

Guide for patching AMI Aptio V UEFI firmware to circumvent Secure Boot checks

patching
patching
Open Source Reverse Engineering

An Interactive Binary Patching Plugin for IDA Pro

pathbuster
pathbuster
Open Source Web Application

A path-normalization pentesting tool.

PatrowlEngines
PatrowlEngines
Open Source Forensics

PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform

PatrowlHears
PatrowlHears
Open Source Exploitation

PatrowlHears - Vulnerability Intelligence Center / Exploits

PatrowlHearsData
PatrowlHearsData
Open Source Exploitation

Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds

PatrowlManager
PatrowlManager
Open Source Forensics

PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform

Paybag
Paybag
Open Source Kali Exploitation

Simple and easy Metasploit payload generator for Linux & Termux

Payloader
Payloader
Free Exploitation Web Application

渗透测试Payload速查平台 | Pentest Payload Quick Reference | XSS/SQLi/SSRF/RCE | React+TypeScript

PayloadsAllThePDFs
PayloadsAllThePDFs
Open Source Web Application

PayloadsAllTheThings
PayloadsAllTheThings
Open Source Exploitation Post-Exploitation

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

payout-targets-data
payout-targets-data
Open Source Reconnaissance

Provides public bug bounty programs in-scope data that offer rewards and monitors public bug bounty programs assets.

pbtk
pbtk
Open Source Reverse Engineering Scanning & Enumeration

A toolset for reverse engineering and fuzzing Protobuf-based apps

pcap-hunter
pcap-hunter
Open Source

PCAP Hunter is an AI threat hunting workbench. It uses Zeek and Tshark to analyze PCAPs, enriched by OSINT. Features include a world map, JA…

PcapXray
PcapXray
Open Source Forensics

:snowflake: PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification…

PDBRipper
PDBRipper
Open Source Reverse Engineering

PDBRipper is a utility for extract an information from PDB-files.

pdfalyzer
pdfalyzer
Open Source Forensics

Analyze PDFs with colors (and YARA)

pdfrip
pdfrip
Open Source Password Attacks

A multi-threaded PDF password cracking utility equipped with commonly encountered password format builders and dictionary attacks.

pe
pe
Open Source Forensics Reverse Engineering

A :zap: lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis …

pe-bear
pe-bear
Open Source Forensics

Portable Executable reversing tool with a friendly GUI

PE-LiteScan
PE-LiteScan
Open Source Forensics Reverse Engineering

A simple crossplatform heuristic PE-analyzer

pe-sieve
pe-sieve
Open Source Forensics

Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory…

pe-union
pe-union
Open Source Evasion

Crypter, binder & downloader with native & .NET stub, evasive by design, user friendly UI

PEASS-ng (WinPEAS / LinPEAS)
PEASS-ng (WinPEAS / LinPEAS)
Open Source Kali Post-Exploitation

Privilege Escalation Awesome Scripts Suite. Automatically enumerates Windows (WinPEAS) and Linux/Mac (LinPEAS) systems for privilege escalat…

pecli
pecli
Open Source Forensics Reverse Engineering

Tool to analyze PE files in python 3. Current features : Show information about the file (import, exports, resources) Search for interesting…

peekaboo
peekaboo
Free Evasion

It bridges my research with a functional tool. I want to provide a safe, open-source framework for hackers to test evasion and for defenders…

peid
peid
Open Source Forensics Reverse Engineering

Python implementation of the Packed Executable iDentifier (PEiD)

penelope
penelope
Open Source

PeNet
PeNet
Open Source Forensics

Portable Executable (PE) library written in .Net

Penetration_Testing_POC
Penetration_Testing_POC
Open Source Exploitation Web Application

渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss csrf-webshell cobub…

penetration-testing-cheat-sheet
penetration-testing-cheat-sheet
Open Source Exploitation Reconnaissance

This is more of a checklist for myself. May contain useful tips and tricks.

Penetration-Testing-Cheat-Sheet
Penetration-Testing-Cheat-Sheet
Open Source Password Attacks Post-Exploitation

An in-depth guide to help people who are new to penetration testing or red teaming and are looking to gain an overview of the penetration te…

penetration-testing-roadmap
penetration-testing-roadmap
Free Web Application

Complete Roadmap for Penetration Testing

Penetration-Testing-Study-Notes
Penetration-Testing-Study-Notes
Free

Penetration Testing notes, resources and scripts

pentagi
pentagi
Open Source Web Application

Fully autonomous AI Agents system capable of performing complex penetration testing tasks

pentbox
pentbox
Free

PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.

pentest
pentest
Open Source Exploitation Web Application

Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.

pentest_lab
pentest_lab
Open Source Web Application

Local penetration testing lab using docker-compose.

pentest-ai
pentest-ai
Open Source Exploitation Reconnaissance

The most autonomous pentesting AI on the market. MCP server + Python agents with 150+ security tools, exploit chaining, and PoC validation.

pentest-ai-agents
pentest-ai-agents
Open Source Kali Exploitation Web Application

Turn Claude Code into your offensive security research assistant. Specialized AI subagents for authorized penetration testing plan engagemen…

Pentest-Bookmarkz
Pentest-Bookmarkz
Free Kali Exploitation Reconnaissance

A collection of useful links for Pentesters

pentest-copilot
pentest-copilot
Open Source

Pentest Copilot is an AI-powered browser based ethical hacking assistant tool designed to streamline pentesting workflows.

Pentest-Everything
Pentest-Everything
Free Post-Exploitation

A collection of CTF write-ups, pentesting topics, guides and notes. Notes compiled from multiple sources and my own lab research. Topics als…

pentest-mcp
pentest-mcp
Open Source Exploitation Password Attacks

NOT for educational purposes: An MCP server for professional penetration testers including STDIO/HTTP/SSE support, nmap, go/dirbuster, nikto…

Pentest-Notes
Pentest-Notes
Free

Collection of Pentest Notes and Cheatsheets

pentest-pivoting
pentest-pivoting
Free Post-Exploitation

A compact guide to network pivoting for penetration testings / CTF challenges.

pentest-reports
pentest-reports
Free Exploitation

Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.

Pentest-Resources-Cheat-Sheets
Pentest-Resources-Cheat-Sheets
Free Exploitation Post-Exploitation

This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-ups, …

Pentest-Service-Enumeration
Pentest-Service-Enumeration
Open Source Post-Exploitation

Suggests programs to run against services found during the enumeration phase of a Pentest

pentest-skills
pentest-skills
Open Source

💬 🚀 告别繁琐命令行,用自然语言驱动专业级渗透测试。 ⚡ 让安全测试从未如此简单、高效。Forget complex command lines. 🛡️ Professional penetration testing, powered by natural language.

Pentest-Swarm-AI
Pentest-Swarm-AI
Open Source Web Application

Autonomous penetration testing using a swarm of AI agents. Orchestrates recon, classification, exploitation, and reporting specialists with …

Pentest-Windows
Pentest-Windows
Free

⚔️Windows11 Penetration Suite Toolkit 🔰 The First Windows Penetration Testing Environment on Mac M Chips

pentestagent
pentestagent
Open Source

PentestAgent is an AI agent framework for black-box security testing, supporting bug bounty, red-team, and penetration testing workflows.

PentestGPT
PentestGPT
Open Source

Automated Penetration Testing Agentic Framework Powered by Large Language Models

Pentesting-and-Hacking-Scripts
Pentesting-and-Hacking-Scripts
Free

🚀 A curated collection of Pentesting and Hacking Scripts for Script Kiddie to Advanced Pentesters. 👨‍💻

pentesting-dockerfiles
pentesting-dockerfiles
Free Exploitation

Pentesting/Bugbounty Dockerfiles.

pentesting-framework
pentesting-framework
Open Source Password Attacks Scanning & Enumeration

Pentesting Framework is a bundle of penetration testing tools, Includes - security, pentesting, hacking and many more.

Pentesting-Mind-Map
Pentesting-Mind-Map
Open Source

Web Hacking and Red Teaming MindMap

PenTestKit
PenTestKit
Open Source Kali

Tools, scripts and tips useful during Penetration Testing engagements.

pentestkit
pentestkit
Open Source Web Application

OWASP PTK - application security browser extension.

PentestTools
PentestTools
Free Exploitation

Awesome Pentest Tools Collection

pentext
pentext
Open Source

PenText system: Easily create beautiful looking penetration test quotes, reports, and documents in many formats (PDF, text, JSON, Markdown, …

pentmenu
pentmenu
Open Source Exploitation Reconnaissance

A bash script for recon and DOS attacks

People-Search-OSINT
People-Search-OSINT
Free Reconnaissance

Search tools to help you find people, focused towards UK resources.

Pepper
Pepper
Open Source Reverse Engineering

PE32 (x86) and PE32+ (x64) binaries analysis tool, resources viewer/extractor.

perfect-dll-proxy
perfect-dll-proxy
Open Source Reverse Engineering

Perfect DLL Proxying using forwards with absolute paths.

perfect-shuffle-cryptography
perfect-shuffle-cryptography
Open Source Evasion

This project demonstrates a minimalist, fully deterministic file encryption scheme built from perfect shuffle permutations

periodic-table-offensive-security
periodic-table-offensive-security
Open Source Exploitation Post-Exploitation

A visual reference of 118 essential red team tools, frameworks & standards, organized like a periodic table. Includes a printable PDF versio…

perseus
perseus
Open Source Reverse Engineering Scanning & Enumeration

AI-powered security assessment SKILLS for your codebase. Multi-language (JS, Go, Python, Rust, Java, PHP, Ruby, C#). Works with Claude Code,…

PersistenceSniper
PersistenceSniper
Free Forensics Post-Exploitation

Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows ma…

personal-security-checklist
personal-security-checklist
Free

🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2026

PetitPotam
PetitPotam
Open Source Exploitation

PoC tool to coerce Windows hosts to authenticate to an attacker-controlled machine using MS-EFSRPC (EFS). Used in NTLM relay attacks against…

petools
petools
Open Source Reverse Engineering

PE Tools - Portable executable (PE) manipulation toolkit

Pgen
Pgen
Open Source

Command-line passphrase generator

Phantom-Evasion-Loader
Phantom-Evasion-Loader
Open Source Evasion

Phantom-Evasion-Loader is a standalone, pure x64 Assembly injection engine engineered to minimize the detection surface of modern EDR/XDR so…

phantom-frida
phantom-frida
Open Source Reverse Engineering

Build anti-detection Frida server from source. ~90 patches covering 16 detection vectors, weekly auto-builds with random names.

pharos
pharos
Free Reverse Engineering

Automated static analysis tools for binary programs

phatcrack
phatcrack
Open Source Password Attacks

Modern web-based distributed hashcracking solution, built on hashcat

PhishAPI
PhishAPI
Free Social Engineering

Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!

Phishbait
Phishbait
Open Source Kali Social Engineering

100% working Phishing Tool (38 websites)

phishing
phishing
Open Source Social Engineering

A curated list of known less-than-honest operators on Polkadot and Substrate networks. Includes a simple JS utility function to check any ho…

Phishing
Phishing
Free Social Engineering

钓鱼不仅是一种户外运动,更是一种有效的网络安全攻击技术。本项目用于记录网络钓鱼攻击的相关内容,包括优秀的钓鱼技术工具技巧或优秀的钓鱼实战项目案例等。钓鱼攻击源于技术,又高于技术。钓鱼攻击源于欺骗,有高于欺骗。深入研究并积极实践社工技术,在很多实战项目中往往可以产生意想不到的结果!…

phishing_catcher
phishing_catcher
Open Source Reconnaissance Social Engineering

Phishing catcher using Certstream

phishing_kits
phishing_kits
Free Reconnaissance Social Engineering

Exposing phishing kits seen from phishunt.io

phishing_pot
phishing_pot
Free Social Engineering

A collection of phishing samples for researchers and detection developers.

phishing-detection
phishing-detection
Open Source Social Engineering

Fast, explainable phishing detection for URLs — real-time scoring, clear verdicts, full transparency.

Phishing-Email-Analysis
Phishing-Email-Analysis
Free Social Engineering

Useful resources about phishing email analysis

phishing-templates
phishing-templates
Free Social Engineering

Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!

Phishing.Database
Phishing.Database
Open Source Social Engineering

Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domain…

phishingclub
phishingclub
Free Social Engineering

Simulation and red team Phishing Framework

PhishingKit-Yara-Rules
PhishingKit-Yara-Rules
Open Source Social Engineering

Repository of Yara rules dedicated to Phishing Kits Zip files

PhishingKit-Yara-Search
PhishingKit-Yara-Search
Open Source Social Engineering

Yara scan Phishing Kit's Zip archive(s)

PhishingSecLists
PhishingSecLists
Free Password Attacks Scanning & Enumeration

To be used with tools like GoBuster & DirBuster but these lists are specifically tailored and designed for scanning phishing < landing pages…

PhishMailer
PhishMailer
Open Source Social Engineering

Generate Professional Phishing Emails Fast And Easy

phishstats-api-network
phishstats-api-network
Open Source Forensics Reconnaissance

Visualize networks of phishing by querying the phishstats.info API

Phobos
Phobos
Open Source Reverse Engineering

Ares-compatible C&C Red Alert 2: Yuri's Revenge engine extension

phoneinfoga
phoneinfoga
Open Source Reconnaissance

Information gathering framework for phone numbers

phoneintel
phoneintel
Open Source Reconnaissance

PhoneIntel is an OSINT tool for retrieving detailed information about phone numbers.

PhoneSploit
PhoneSploit
Open Source Exploitation

A tool for remote ADB exploitation in Python3 for all Machines.

PhoneSploit-Pro
PhoneSploit-Pro
Open Source Exploitation

An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.

Photon
Photon
Open Source Reconnaissance Web Application

Fast web crawler designed for OSINT. Extracts URLs, emails, social media accounts, Amazon S3 buckets, Bitcoin wallets, and files from a targ…

Photon
Photon
Open Source Reconnaissance

Incredibly fast crawler designed for OSINT.

PHP-Antimalware-Scanner
PHP-Antimalware-Scanner
Open Source Exploitation Scanning & Enumeration

AMWScan (PHP Antimalware Scanner) is a free tool to scan php files and analyze your project to find any malicious code inside it.

php-reverse-shell
php-reverse-shell
Open Source

PHP shells that work on Linux OS, macOS, and Windows OS.

php-spx
php-spx
Open Source Reverse Engineering

A simple & straight-to-the-point PHP profiling extension with its built-in web UI

PHPSerialize-labs
PHPSerialize-labs
Open Source

【Hello-CTF labs】PHPSerialize-labs是一个使用php语言编写的,用于学习CTF中PHP反序列化的入门靶场。旨在帮助大家对PHP的序列化和反序列化有一个全面的了解。

phpsploit
phpsploit
Open Source Exploitation Post-Exploitation

Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor

phuzz
phuzz
Free Scanning & Enumeration

Modular & Open-Source Coverage-Guided Web Application Fuzzer for PHP

Physical-Pentesting-Tools
Physical-Pentesting-Tools
Free Kali

Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effecti…

Picarta-API
Picarta-API
Open Source Reconnaissance

Picarta AI Image Geolocalization API.

PichichiH0ll0wer
PichichiH0ll0wer
Open Source Evasion Exploitation

Pico-WIFI-Duck
Pico-WIFI-Duck
Free Wireless

Pico WiFi Duck is a project that enables the emulation of a USB Rubber Ducky over Wi-Fi using the Raspberry Pi Pico W. This functionality al…

picoCTF-2024-Writeup
picoCTF-2024-Writeup
Free Forensics Reverse Engineering

picoCTF 2024 Writeup (Capture the Flag Competition) with the solutions for the challenges.

pihole_blocklists
pihole_blocklists
Free Social Engineering

Pi-hole and AdguardHome Block lists updated every 24Hrs, we aim for less than 0.01% false positive rate, block malware, C&C infrastructure,…

pikachu-volleyball
pikachu-volleyball
Free Reverse Engineering

Pikachu Volleyball reimplemented in JavaScript by reverse engineering the original game

pikachu-volleyball-p2p-online
pikachu-volleyball-p2p-online
Free Reverse Engineering

Pikachu Volleyball peer-to-peer online via WebRTC data channels

pikmin
pikmin
Free Reverse Engineering

A decompilation of Pikmin brought to you by fans of the series.

pikmin2
pikmin2
Free Reverse Engineering

A decompilation of Pikmin 2 (USA) brought to you by fans of the series.

Pillager
Pillager
Open Source Evasion Exploitation

Pillager is a tool for exporting and decrypting useful data from target computer.

pillager
pillager
Open Source

Pillage filesystems for sensitive information with Go 🔍

pimage
pimage
Open Source Forensics

This is a python package for detecting copy-move attack on a digital image.

Pinakastra
Pinakastra
Free Reconnaissance Web Application

AI-powered pentesting framework with automated recon and exploitation. Multi-source subdomain discovery, active vuln testing (XSS/SQLi/SSRF/…

PINCE
PINCE
Free Reverse Engineering

Reverse engineering tool for linux games

pinecone
pinecone
Open Source Exploitation Wireless

PingRAT
PingRAT
Open Source Evasion Exploitation

PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.

Pinkerton
Pinkerton
Open Source Exploitation

🕵️ Python project to crawl for JavaScript files and search for secrets like API keys, authorization tokens, hardcoded credentials, etc.

Pip-Intel
Pip-Intel
Open Source Reconnaissance

PIP-INTEL is an OSINT (Open Source Intelligence) tool designed using various open-source tools and pip packages.

pipelock
pipelock
Open Source Web Application

Open-source AI agent firewall for MCP security: agent egress control, DLP, SSRF, and prompt injection defense.

PipeViewer
PipeViewer
Open Source Exploitation

A tool that shows detailed information about named pipes in Windows

pivot-rs
pivot-rs
Open Source Exploitation Post-Exploitation

A lightweight port-forwarding and socks proxy tool written in Rust 🦀

pixiewps
pixiewps
Free Wireless

An offline Wi-Fi Protected Setup brute-force utility

pkappa2
pkappa2
Open Source Forensics

Network traffic analysis tool for Attack & Defense CTF's

pkg-unpacker
pkg-unpacker
Open Source Reverse Engineering

Keep in mind that this tool doesn't give you the full source code if the application was compiled into V8 bytecode. See How it works.

pktbatch-c
pktbatch-c
Open Source

An application that utilizes fast AF_XDP Linux sockets to generate and send network packets. Used for penetration testing including Denial o…

Plants-vs.-Zombies-Online-Battle
Plants-vs.-Zombies-Online-Battle
Open Source Reverse Engineering

🧟 Plants vs. Zombies multiplayer battle, developed via reverse engineering, inline hook and dynamic-link library injection. Two online playe…

plaso
plaso
Open Source Forensics

Plaso (Plaso Langar Að Safna Öllu), or super timeline all the things, is a Python-based engine used by several tools for automatic creation …

Plaso (log2timeline)
Plaso (log2timeline)
Open Source Kali Forensics

Timeline creation and analysis tool. Extracts timestamps from hundreds of artifact types across Windows, Linux, and macOS to create a super-…

playCTF
playCTF
Open Source

An Open Source CTF hosting platform

playdate-reverse-engineering
playdate-reverse-engineering
Free Reverse Engineering

Panic Playdate reverse-engineering notes/tools - covers file formats, server API and USB commands

plecost
plecost
Free Exploitation Web Application

Plecost - Professional WordPress Security Scanner

PlexTrac
PlexTrac
Paid Reporting

Cloud-based pentest management and reporting platform. Features report automation, finding templates, client portal, analytics, and integrat…

plugin-ghidra
plugin-ghidra
Open Source Reverse Engineering

Released as open source by RevEng.ai - https://reveng.ai

plugin-ida
plugin-ida
Open Source Reverse Engineering

Released as open source by RevEng.ai - https://reveng.ai

PlumHound
PlumHound
Open Source Exploitation Post-Exploitation

Bloodhound Reporting for Blue and Purple Teams

Plutus
Plutus
Free Password Attacks

An automated bitcoin wallet brute-forcer

pmd-red
pmd-red
Free Reverse Engineering

Decompilation of Pokémon Mystery Dungeon: Red Rescue Team

pnwgen
pnwgen
Free Password Attacks

A very flexible phone number wordlist generator

PoC
PoC
Free Exploitation

Proofs-of-concept

PoC
PoC
Free Exploitation

A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated …

PoC-in-GitHub
PoC-in-GitHub
Free Exploitation

📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.

Poc-Monitor
Poc-Monitor
Open Source Exploitation

Poc-Monitor_v1.0.1
Poc-Monitor_v1.0.1
Open Source Exploitation

1. 状态 failing 为短期内没有更新 2. 可从 new.json 文件获取最近一次新增的CVE项目信息 3. 可从 update.json 文件获取最近一次更新的CVE项目信息 4. 可从年限目录内README.md获取当年完整信息 5. 可从dateLog目录获取当天…

PoC-Research-Papers
PoC-Research-Papers
Free Exploitation

Research papers on Proot-of-Concepts

PoCEntraDeviceComplianceBypass
PoCEntraDeviceComplianceBypass
Free

Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy

PocOrExp_in_Github
PocOrExp_in_Github
Open Source Exploitation

Automatically Collect POC or EXP from GitHub by CVE ID.

pocsuite3
pocsuite3
Free

pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.

pokecrystal
pokecrystal
Free Reverse Engineering

Disassembly of Pokémon Crystal

pokediamond
pokediamond
Free Reverse Engineering

Decompilation of Pokémon Diamond/Pearl

pokeemerald
pokeemerald
Free Reverse Engineering

Decompilation of Pokémon Emerald

pokefirered
pokefirered
Free Reverse Engineering

Decompilation of Pokémon FireRed/LeafGreen

pokegold
pokegold
Free Reverse Engineering

Disassembly of Pokémon Gold/Silver

pokegold-spaceworld
pokegold-spaceworld
Free Reverse Engineering

Disassembly of the Pokémon Gold and Silver 1997 Space World demo

pokeheartgold
pokeheartgold
Free Reverse Engineering

Decompilation of Pokemon HeartGold/SoulSilver

pokepinball
pokepinball
Free Reverse Engineering

Disassembly of Pokémon Pinball

pokepinballrs
pokepinballrs
Free Reverse Engineering

Decompilation of Pokémon Pinball: Ruby & Sapphire

pokeplatinum
pokeplatinum
Free Reverse Engineering

Decompilation of Pokémon Platinum

pokered
pokered
Free Reverse Engineering

Disassembly of Pokémon Red/Blue

pokeruby
pokeruby
Free Reverse Engineering

Decompilation of Pokémon Ruby/Sapphire

pokestadium
pokestadium
Free Reverse Engineering

Disassembly and decompilation of Pokémon Stadium

poketcg
poketcg
Free Reverse Engineering

This will output a file named "poketcg.gbc".

pokeyellow
pokeyellow
Free Reverse Engineering

You can find us on Discord (pret, #pokered).

PolarDNS
PolarDNS
Open Source

PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.

Politician
Politician
Open Source Wireless

Modern WiFi auditing library for ESP32 using advanced 802.11 techniques. Captures WPA/WPA2/WPA3 handshakes via PMKID extraction and CSA inj…

PolyEngine
PolyEngine
Free Evasion Exploitation

PolyEngine is an evasive PE packer designed for CTF challenges and low-level Windows security education. It focuses on bypassing EDR and AV …

poopak
poopak
Free Reconnaissance

POOPAK - TOR Hidden Service Crawler

poro
poro
Free

Scan publicly accessible assets on your AWS cloud environment

portscan-protection
portscan-protection
Open Source

This script helps to avoid portscanning on Linux systems.

PoshC2
PoshC2
Open Source Exploitation Post-Exploitation

A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.

postleaks
postleaks
Open Source Reconnaissance

Search for sensitive data in Postman public library.

postmaniac
postmaniac
Open Source Reconnaissance

Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces

postmortem-docs
postmortem-docs
Open Source Forensics

PagerDuty's Public Postmortem Documentation

pounce-keys
pounce-keys
Open Source Exploitation

PounceKey's is a Accessibility Service keylogger for Android 5 to 15! full launcher stealth. choose between receiving logs via IP, Gmail, or…

power-pwn
power-pwn
Open Source Exploitation

An offensive/defense security toolset for discovery, recon and ethical assessment of AI Agents

PowerDodder
PowerDodder
Open Source Exploitation Post-Exploitation

Traditional persistence methods (e.g., Registry Run keys, scheduled tasks) are often monitored or flagged by EDRs and blue teams. PowerDodde…

PowerHub
PowerHub
Open Source Post-Exploitation

A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting

PowerJoker
PowerJoker
Open Source Evasion

PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Each E…

PowerLadon
PowerLadon
Free Exploitation

Ladon hacking Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL…

PowerShell
PowerShell
Free Exploitation

🧰 Various PowerShell scripts for security, sysadmins, blue and red teams👫🏼

PowerShell_HttpServer
PowerShell_HttpServer
Free

Simple PowerShell HTTP Server (no dependencies, single file, PowerShell 5.1/7)

PowerShell-for-Hackers
PowerShell-for-Hackers
Free

This repository is a collection of powershell functions every hacker should know

PowerShell-Obfuscation-Bible
PowerShell-Obfuscation-Bible
Open Source Evasion Exploitation

A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled …

Powershell-Scripts-for-Hackers-and-Pentesters
Powershell-Scripts-for-Hackers-and-Pentesters
Open Source Exploitation

An List of my Powershell scripts, commands and Blogs for windows Red Teaming.

Powershellisfun
Powershellisfun
Open Source Post-Exploitation

Repository with the scripts that I have used in my blogs on https://powershellisfun.com. If you like these, please sponsor this project usin…

PowerSploit
PowerSploit
Open Source Kali Post-Exploitation

Collection of PowerShell modules for post-exploitation. Includes PowerView for AD recon, PowerUp for privilege escalation, Invoke-Mimikatz, …

ppfuzz
ppfuzz
Open Source

A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀

pphack
pphack
Open Source Exploitation Web Application

The Most Advanced Client-Side Prototype Pollution Scanner

PracticalCyberSecurityResources
PracticalCyberSecurityResources
Free

This repository contains a curated list of resources I suggest on LinkedIn and Twitter.📝🌝

PRE-list
PRE-list
Free Reverse Engineering

List of (automatic) protocol reverse engineering tools for network protocols

Preferred-Network-List-Sniffer
Preferred-Network-List-Sniffer
Open Source Kali Exploitation Wireless

A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.

prestascansecurity
prestascansecurity
Open Source Exploitation

PrestaScan Security is a PrestaShop module allowing you to scan your PrestaShop website to identify malware and known vulnerabilities in Pre…

pretender
pretender
Open Source Reconnaissance

Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.

PRevent
PRevent
Open Source Evasion Reverse Engineering

Prevent merging of malicious code in pull requests

prime
prime
Free Reverse Engineering

A matching decompilation of Metroid Prime

privacy-respecting
privacy-respecting
Free

Curated List of Privacy Respecting Services and Software

privacy-revanced-patches
privacy-revanced-patches
Open Source Reverse Engineering

Privacy Patches for ReVanced to disable ads, trackers and analytics, always open Gboard in incognito mode, and much more!

privacy.sexy
privacy.sexy
Open Source

Open-source tool to enforce privacy & security best-practices on Windows, macOS and Linux, because privacy is sexy

privatecollaborator
privatecollaborator
Open Source Web Application

A script for installing private Burp Collaborator with free Let's Encrypt SSL-certificate

PrivescCheck
PrivescCheck
Open Source Post-Exploitation

Privilege Escalation Enumeration Script for Windows

Privilege-Escalation
Privilege-Escalation
Free Post-Exploitation

This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.

probequest
probequest
Open Source Wireless

Toolkit for Playing with Wi-Fi Probe Requests

probiv_i_OSINT_instrumenti
probiv_i_OSINT_instrumenti
Free Reconnaissance

Набор инструментов и Телеграм боты для пробива, OSINT и поиск информации, а также анализа данных.

Probiv_telegram
Probiv_telegram
Free Reconnaissance

Набор Telegram-ботов и OSINT-инструментов для пробива по номеру телефона, проверки автомобиля по VIN и госномеру, поиска по фотографии, пров…

Process-Hollowing
Process-Hollowing
Open Source Exploitation

Red Team Operation's Defense Evasion Technique.

profilehound
profilehound
Open Source Exploitation Post-Exploitation

ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets by …

progpilot
progpilot
Open Source

A static analysis tool for security

programming-challenges
programming-challenges
Free

Algorithmic, Data Structures, Frontend and Pentest - Programming challenges and competitions to improve knowledge.

proguard-maven-plugin
proguard-maven-plugin
Open Source Evasion

ProGuard Maven plugin that supports modularised ProGuard packages

project-codeguard
project-codeguard
Free

Project CodeGuard is an open-source, model-agnostic security framework that embeds secure-by-default practices into AI coding agent workflow…

Project-Deep-Focus
Project-Deep-Focus
Open Source Exploitation Reconnaissance

Your personal 'Mini Shodan'. A high-performance network reconnaissance engine designed for massive scale asset discovery. Specializes in ide…

Project-Eyes-On
Project-Eyes-On
Open Source

Project Eyes On is a high-speed, multi-threaded surveillance tool by Y0oshi (@rde0) for locating open IP cameras worldwide. Unifies Google D…

project-foxhound
project-foxhound
Open Source Web Application

A web browser with dynamic data-flow tracking enabled in the Javascript engine and DOM, based on Mozilla Firefox (https://github.com/mozilla…

Project-Pwnag0dchi
Project-Pwnag0dchi
Free Wireless

A dope AF repo of all customized plugins & configurations I use as seen on my socials / YouTube. Helpful guides and troubleshooting too.

prokzee
prokzee
Free Web Application

A cross-platform desktop application for HTTP/HTTPS traffic interception and analysis, built with Go. Features modern UI, traffic manipulati…

Prometheus
Prometheus
Free Evasion

Lua Obfuscator written in pure Lua

promptfoo
promptfoo
Open Source

Test your prompts, agents, and RAGs. Red teaming/pentesting/vulnerability scanning for AI. Compare performance of GPT, Claude, Gemini, Llama…

ProtectMyTooling
ProtectMyTooling
Open Source Evasion

Wrapper for multiple packers, protectors, obfuscators, and artifact-modifying tools. Automates multi-stage tooling protection pipelines to m…

prowler
prowler
Open Source Forensics

Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud environm…

Proxmark3
Proxmark3
Open Source Reconnaissance

Swiss army knife for RFID security research. Reads, writes, emulates, sniffs, and brute-forces RFID/NFC tags including HID, EM4100, Mifare C…

proxmox_toolbox
proxmox_toolbox
Open Source

A toolbox to get the firsts configurations of Proxmox VE / BS done in no time

proXXy
proXXy
Open Source

A super simple asynchronous multithreaded proxy scraper; scraping & checking ~500k HTTP, HTTPS, SOCKS4, & SOCKS5 proxies.

ProxyCat
ProxyCat
Open Source

一款部署于云端或本地的隧道代理池中间件,可将静态代理IP灵活运用成隧道IP,提供固定请求地址,一次部署终身使用

Proxychains
Proxychains
Open Source Kali Post-Exploitation

Forces any TCP connection made by a given application through proxy servers like SOCKS4, SOCKS5, or HTTP. Essential for pivoting through com…

prtstrike
prtstrike
Open Source Post-Exploitation

PRTSTRIKE 是一个轻便、小巧、快捷的轻量化 C&C 框架,由 Go 编写,最快可 1 分钟部署完成。 | 指标 | 数值 | |------|------| | C2 Server 编译大小 | ~30 MB | | Implant 编译大小 (Windows x64) …

ps-fuzz
ps-fuzz
Open Source Scanning & Enumeration

Make your GenAI Apps Safe & Secure :rocket: Test & harden your system prompt

PS2Recomp
PS2Recomp
Open Source Reverse Engineering

Playstation 2 Static Recompiler & Runtime Tool to make native PC ports

psa-nac-firmware-reverse-engineering
psa-nac-firmware-reverse-engineering
Open Source Reverse Engineering

Continental OVIP firmware reverse engineering for PSA/Stellantis cars (Peugeot, Citroen, DS, Opel)

PSAsyncShell
PSAsyncShell
Open Source Evasion

PowerShell Asynchronous TCP Reverse Shell

psc
psc
Free

E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward

PSFuzz
PSFuzz
Open Source

Proviesec Fuzz Scanner - dir/path web scanner

PsMapExec
PsMapExec
Open Source Post-Exploitation

Dominate Active Directory with PowerShell.

pspy
pspy
Open Source Scanning & Enumeration

Monitor linux processes without root permissions

PSRansom
PSRansom
Open Source Post-Exploitation

PowerShell Ransomware Simulator with C2 Server

psudohash
psudohash
Open Source Password Attacks

Generates millions of keyword-based password mutations in seconds.

pswd
pswd
Open Source

🔑 Simple secure password generator.

ptcpdump
ptcpdump
Open Source Forensics

Process-aware, eBPF-based tcpdump

ptrguard
ptrguard
Free Exploitation

A pointer encryption library intended for Red Team implant design in Rust.

pub
pub
Open Source Exploitation

Vulnerability Notes, PoC Exploits and Write-Ups for security issues disclosed by tintinweb

public-bugbounty-programs
public-bugbounty-programs
Open Source Reconnaissance

Community curated list of public bug bounty and responsible disclosure programs.

public-skills-builder
public-skills-builder
Free Scanning & Enumeration Web Application

Generate Claude Code bug bounty skills from public HackerOne reports and GitHub writeups — 18 vuln classes, no private reports needed

pumpbin
pumpbin
Open Source Evasion Exploitation

🎃 PumpBin is an Implant Generation Platform.

puncia
puncia
Open Source Exploitation Reconnaissance

Panthera(P.)uncia - Official CLI utility for Osprey Vision, Subdomain Center & Exploit Observer.

puredns
puredns
Open Source Reconnaissance

Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entrie…

purple-team-exercise-framework
purple-team-exercise-framework
Open Source Exploitation

Purple Team Exercise Framework

Purple-Team-Resources
Purple-Team-Resources
Free Exploitation

A curated list of tools and resources that I use daily as a Purple-Team operator.

Purpleteam
Purpleteam
Free Exploitation

Purpleteam scripts simulation & Detection - trigger events for SOC detections

pwdsafety
pwdsafety
Open Source

🔒command line tool checking password safety🔒

PWF
PWF
Free Forensics

Practical Windows Forensics Training

pwn
pwn
Open Source Reconnaissance Reverse Engineering

PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.

pwn_jenkins
pwn_jenkins
Free Exploitation

Notes about attacking Jenkins servers

pwn--
pwn--
Open Source Exploitation

pwn++ is a Windows & Linux library oriented for exploit dev but mostly used to play with modern C++ features

pwn-env-init
pwn-env-init
Free

怎么说呢,因为一些原因今天把这个仓库临时删了,再重建,但是我忽略了一点,这个项目的star是153,fork是49,就这样没了,哈哈

pwnagotchi
pwnagotchi
Free Wireless

(⌐■_■) - Raspberry Pi instrumenting Bettercap for Wi-Fi pwning.

pwncat
pwncat
Open Source Post-Exploitation Scanning & Enumeration

Fancy reverse and bind shell handler

pwncli
pwncli
Open Source

一开始写这个工具是因为在学习pwn的过程中,经常反复的去注释和取消注释gdb.attach(xxx)这样的语句,下不同断点的时候要不断地修改脚本,本地调通打远程的时候也要改脚本。

pwndbg
pwndbg
Open Source Kali Forensics Reverse Engineering

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

pwndoc
pwndoc
Open Source

PwnDoc is a pentest reporting application making it simple and easy to write your findings and generate a customizable Docx report. The main…

pwndoc-ng
pwndoc-ng
Open Source

pwndra
pwndra
Open Source Exploitation Reverse Engineering

A collection of pwn/CTF related utilities for Ghidra

pwnedOrNot
pwnedOrNot
Open Source Reconnaissance

OSINT Tool for Finding Passwords of Compromised Email Addresses

pwnflow
pwnflow
Open Source Exploitation

A visual methodology tracking platform tailored for offensive security assessments

pwnhub
pwnhub
Free

Hand‑curated offensive security toolkit, scripts, and writeups for ethical hackers, pentesters, and IT pros eager to level up.

pwninit
pwninit
Open Source Exploitation

pwninit - automate starting binary exploit challenges

PwNixOS
PwNixOS
Open Source Exploitation

PwNixOS - A Productivity Focused and Hacking-Oriented NixOS Flake

pwnpasi
pwnpasi
Open Source Exploitation

This tool is an automated PWN exploitation framework designed for CTF competitions and binary vulnerability exploitation. It integrates vari…

pwnshop
pwnshop
Free Evasion Exploitation

Exploit Development, Reverse Engineering & Cryptography

pwntainer
pwntainer
Free

Docker container with all required CTF tools.

pwntools
pwntools
Open Source Kali Exploitation Reverse Engineering

CTF framework and exploit development library for Python. Simplifies binary exploitation with process/socket interaction, shellcode generati…

pwntools
pwntools
Free Kali Evasion Exploitation

CTF framework and exploit development library

py-gitguardian
py-gitguardian
Open Source

Python API client library for the GitGuardian API

PyADRecon
PyADRecon
Open Source Post-Exploitation Reconnaissance

Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a sing…

PyADRecon-ADWS
PyADRecon-ADWS
Open Source Post-Exploitation Reconnaissance

An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD doma…

pyarmor
pyarmor
Free Evasion

A tool used to obfuscate python scripts, bind obfuscated scripts to fixed machine or expire obfuscated scripts.

PyArmor-Unpacker
PyArmor-Unpacker
Open Source Reverse Engineering

There are 3 different methods for unpacking PyArmor, in the methods folder in this repository you will find all the files needed for each me…

pycdc
pycdc
Open Source Reverse Engineering

C++ python bytecode disassembler and decompiler

pyconcrete
pyconcrete
Open Source Evasion

Protect your python script, encrypt it as .pye and decrypt when import it

pycrack
pycrack
Open Source Password Attacks

Advanced Password Cracking Tool with support for Bruteforce Attacks, Dictionary Attacks, Random Attacks. This tool is capable of cracking fi…

PyCript
PyCript
Open Source Web Application

Burp Suite extension to decrypt/encrypt any encrypted traffic (AES/RSA/Encodings and more) with custom code in any language

pycrypt
pycrypt
Open Source Evasion

Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products

pyda
pyda
Free Reverse Engineering

Write dynamic binary analysis tools in Python

pydictor
pydictor
Open Source Password Attacks

A powerful and useful hacker dictionary builder for a brute-force attack

pydork
pydork
Open Source Reconnaissance

Scraping and listing text and image searches on Google, Bing, DuckDuckGo, Baidu, Yahoo japan.

PyExfil
PyExfil
Open Source Post-Exploitation Reconnaissance

A Python Package for Data Exfiltration

pyFindUncommonShares
pyFindUncommonShares
Open Source Post-Exploitation

FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE accesses…

pyFUD
pyFUD
Open Source Evasion Exploitation

CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)

pygod
pygod
Open Source

A Python Library for Graph Outlier Detection (Anomaly Detection)

pyhidra
pyhidra
Free Forensics Reverse Engineering

Pyhidra is a Python library that provides direct access to the Ghidra API within a native CPython interpreter using jpype.

pyhtools
pyhtools
Open Source Web Application

A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer…

pyidbutil
pyidbutil
Open Source Reverse Engineering

A python library for reading IDA pro databases.

PyInstaCrack
PyInstaCrack
Free

PyInstaCrack: Ultimate Instagram hacking suite. Python-driven, AI-enhanced, brute-force chaos. Stealth ops, ethical only. Slice through defe…

pyinstxtractor
pyinstxtractor
Open Source Reverse Engineering

PyInstaller Extractor is a Python script to extract the contents of a PyInstaller generated executable file.

pyinstxtractor-ng
pyinstxtractor-ng
Open Source Reverse Engineering

PyInstaller Extractor Next Generation

PyIris
PyIris
Open Source Post-Exploitation

PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.

pylabview
pylabview
Open Source Reverse Engineering

Python reader of LabVIEW RSRC files (VI, CTL, LLB). File format description on the Wiki.

pyLDAPWordlistHarvester
pyLDAPWordlistHarvester
Open Source Password Attacks Post-Exploitation

A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.

pylingual
pylingual
Open Source Reverse Engineering

Python decompiler for modern Python versions.

pylnk
pylnk
Open Source Forensics

Python library for reading and writing Windows shortcut files (.lnk). Python 3 only.

pymodhook
pymodhook
Open Source Reverse Engineering

A library for recording arbitrary calls to Python modules, primarily intended for Python reverse engineering and analysis.

pync
pync
Open Source

arbitrary TCP and UDP connections and listens (Netcat for Python).

pyOneNote
pyOneNote
Open Source Forensics

A python library to parse OneNote (.one) files

pypass-sab
pypass-sab
Open Source Reverse Engineering

Reset the 100-day remaining limit for StartAllBack by bypassing it.

PyPCAPKit
PyPCAPKit
Open Source Forensics

Python-based Comprehensive Network Packet Analysis Library

pypush
pypush
Free Reverse Engineering

Python APNs and iMessage client

PyrsistenceSniper
PyrsistenceSniper
Open Source Forensics

We took PersistenceSniper, merged it with Python, and misspelled it on purpose. Meet PyrsistenceSniper.

pyscan
pyscan
Open Source Exploitation

python dependency vulnerability scanner, written in Rust.

pysentry
pysentry
Open Source

🐍 Scan your Python dependencies for known security vulnerabilities with Rust-powered scanner

PySpector
PySpector
Open Source

PySpector is a static analysis security testing (SAST) Framework engineered for modern Python development workflows. It leverages a powerful…

PyStegosploit
PyStegosploit
Open Source Exploitation

PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282

python-bruteForce
python-bruteForce
Free Password Attacks

Brute Force Attack Tools Using Python

Python-Code-Obfuscator
Python-Code-Obfuscator
Open Source Evasion

Transform regular Python code into a human-averse, yet still-functional equivalent.

python-codext
python-codext
Open Source

Python codecs extension featuring CLI tools for encoding/decoding anything

python-ctf-cheatsheet
python-ctf-cheatsheet
Free

Cheatsheet useful for solving Python-related challenges during CTFs.

python-evtx
python-evtx
Open Source Forensics

Pure Python parser for Windows Event Log files (.evtx)

python-icap-yara
python-icap-yara
Open Source Forensics

An ICAP Server with yara scanner for URL and content.

python-OSINT-notebook
python-OSINT-notebook
Open Source Forensics Reconnaissance

a rough written "guide" compiled from years of ADHD brain notes - enjoy

Python-random-module-cracker
Python-random-module-cracker
Open Source

Predict python's random module generated values.

Python-RAT
Python-RAT
Open Source

Remote Administration tool for Windows Systems written in pure Python

Python-Security-Tool-Database
Python-Security-Tool-Database
Open Source Reconnaissance

Solid Python toolkit for those in the security industry. Some by me, most by smarter people.

python-tinyscript
python-tinyscript
Open Source

Devkit for quickly building CLI tools with Python

python-xdis
python-xdis
Open Source Reverse Engineering

Python cross-version bytecode library and disassembler

python3-nmap
python3-nmap
Open Source Reconnaissance Scanning & Enumeration

A python 3 library which helps in using nmap port scanner. This is done by converting each nmap command into a callable python3 method or f…

PythonMemoryModule
PythonMemoryModule
Open Source Evasion Exploitation

pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory

pyvfeed
pyvfeed
Free Exploitation

Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions

pywerview
pywerview
Open Source Post-Exploitation Reconnaissance

A (partial) Python rewriting of PowerSploit's PowerView

QBDI
QBDI
Free Reverse Engineering

A Dynamic Binary Instrumentation framework based on LLVM.

qbindiff
qbindiff
Open Source Reverse Engineering

Quarkslab Bindiffer but not only !

qiling
qiling
Open Source Reverse Engineering

A True Instrumentable Binary Emulation Framework

qos
qos
Open Source

QuorumOS is a computation layer for running applications inside Trusted Execution Environments (TEEs)

QP-Gallery-Releases
QP-Gallery-Releases
Free Reverse Engineering

A modern, lightweight QuickPic Gallery with a fast, offline-first experience.

qq-win-db-key
qq-win-db-key
Free Reverse Engineering

尽管已经经过实验验证可用,本仓库中给出的指引可能有破坏聊天记录或导致封号的风险,强烈建议在自行审查代码、评估风险后使用。

QtRE
QtRE
Open Source Reverse Engineering

A Ghidra headless analyzer tailored for Qt binary analysis

QtREAnalyzer
QtREAnalyzer
Free Reverse Engineering

QtREAnalyzer, a Ghidra extension to reverse-engineer Qt binaries.

Qu1cksc0pe
Qu1cksc0pe
Open Source Forensics Reverse Engineering

All-in-One malware analysis tool.

QueryOrientedProgramming
QueryOrientedProgramming
Free Exploitation

Query Oriented Programming (QOP) gadgets for SQLite-based exploitation

QuickXSS
QuickXSS
Open Source Web Application

Automating XSS using Bash

quiet-riot
quiet-riot
Open Source Scanning & Enumeration

Unauthenticated enumeration of AWS, Azure, and GCP Principals

QuillAudit_smart_contract_audit_Reports
QuillAudit_smart_contract_audit_Reports
Free Exploitation

QuillAudits — Smart Contract Audits for DeFi, RWA, DEXs, Tokens, DeAI & DApps

quokka
quokka
Open Source Reverse Engineering

Quokka: A Fast and Accurate Binary Exporter

r2flutch
r2flutch
Open Source Reverse Engineering

Tool to decrypt iOS apps using r2frida

R2SAE
R2SAE
Free Exploitation

React2Shell Auto Exploit: A CLI tool to exploit prototype pollution vulnerabilities (RCE) in React Server Actions

R3d-Buck3T
R3d-Buck3T
Free Exploitation

Penetration Testing, Vulnerability Assessment and Red Team Learning

r4ven
r4ven
Open Source Reconnaissance Social Engineering

Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information.

rabbitizer
rabbitizer
Open Source Reverse Engineering

In order to keep it simple and fast the following features will not be added:

Raccoon
Raccoon
Open Source Reconnaissance Scanning & Enumeration

A high performance offensive security tool for reconnaissance and vulnerability scanning

Rad-Team-tools
Rad-Team-tools
Free Exploitation

2025年开始了,我要重构此项目,在之前的项目中,该方案给我带来了几千块的收益,虽然是自动化,但是想法还是过于幼稚,希望今年重构一个更高效的自动化。 2025 年 8 月 17 日 项目早就构建完成,并运行了一段时间了,但是,漏洞的收获甚微,不比几年前,通过自动化就能得出一大堆高…

radar
radar
Open Source Reconnaissance

RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services use…

Radare2
Radare2
Open Source Kali Reverse Engineering

Portable reversing framework that includes a hex editor, disassembler, debugger, scripting engine (r2pipe), and graphing. Supports many arch…

radare2
radare2
Free Kali Forensics Reverse Engineering

UNIX-like reverse engineering framework and command-line toolset

radare2-book
radare2-book
Free Reverse Engineering

This book is an updated version maintained by the community of the original radare1 book written by pancake.

radon
radon
Open Source Evasion

[Abandoned] Scuffed java bytecode obfuscator

rag-security-scanner
rag-security-scanner
Open Source Exploitation Scanning & Enumeration

RAG/LLM Security Scanner identifies critical vulnerabilities in AI-powered applications, including chatbots, virtual assistants, and knowled…

rair
rair
Open Source Exploitation Forensics

Rair is a work in progress rewrite of radare2 in rust with these goals: - Native speed. - Extremely flexible and modern analysis. - Simpler …

RamiGPT
RamiGPT
Open Source Post-Exploitation Scanning & Enumeration

Autonomous Privilege Escalation using AI

Ransom0
Ransom0
Open Source

Ransom0 is a open source ransomware made with Python, designed to find and encrypt user data.

Ransomware
Ransomware
Open Source Kali

Ransomwares Collection. Don't Run Them on Your Device.

Ransomware-Database
Ransomware-Database
Free Forensics

For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.

Ransomware-Samples
Ransomware-Samples
Open Source Forensics

Small collection of Ransomware organized by family.

Ransomware-Tool-Matrix
Ransomware-Tool-Matrix
Free Reconnaissance

A resource containing all the tools each ransomware gangs uses

RansomwareSim
RansomwareSim
Open Source

RansomwareSim is a simulated ransomware

rascal
rascal
Free Reverse Engineering

The implementation of the Rascal meta-programming language (including interpreter, type checker, parser generator, compiler and JVM based ru…

raspap-webgui
raspap-webgui
Open Source Kali Wireless

The easiest, full-featured wireless router setup for Debian-based devices. Period.

rast
rast
Open Source Post-Exploitation

A cross platform C2 server written in Rust!

Raster-Terminator
Raster-Terminator
Open Source

在我们日常的CTF比赛中,有时候会碰到光栅图的相关隐写(对,我就碰到了),感谢 @Phantom Engage 和 @daiowjfoaejoi 两位师傅的解惑

Ravage
Ravage
Open Source Exploitation Post-Exploitation

Ravage Framework - Powershell weaponized for offensive security professionals.

raven
raven
Open Source

rawsec-cybersecurity-inventory
rawsec-cybersecurity-inventory
Open Source

An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.

rccextended
rccextended
Free Reverse Engineering

Qt Resource Compiler and Decompiler (RccExtended)

RDWAtool
RDWAtool
Open Source Post-Exploitation Reconnaissance

A python script to extract information from a Microsoft Remote Desktop Web Access (RDWA) application

re-architect
re-architect
Open Source Forensics Reverse Engineering

Advanced reverse engineering platform combining traditional static analysis with AI-powered insights. Supports multiple decompilers (Ghidra,…

re-docs
re-docs
Open Source Reverse Engineering

reverse engineering docs.

RE-MA-Roadmap
RE-MA-Roadmap
Free Evasion Forensics

Reverse Engineering and Malware Analysis Roadmap

re-plants-vs-zombies
re-plants-vs-zombies
Free Reverse Engineering

A project to rebuild all functionality via reverse engineering from the GOTY version of Plants VS Zombies (and expand upon it)

RE-Thing
RE-Thing
Free Forensics Reverse Engineering

Reverse Engineering Tools (deobf, decompiler etc..)

react-obfuscate
react-obfuscate
Open Source Evasion

An intelligent React component to obfuscate any contact link!

react2shell-ultimate
react2shell-ultimate
Open Source Scanning & Enumeration Web Application

React2Shell Ultimate - The most comprehensive CVE-2025-66478 Scanner for Next.js RSC RCE vulnerability. Multi-mode detection, WAF bypass, lo…

readpe
readpe
Open Source Forensics Reverse Engineering

Open source, full-featured, multiplatform command line toolkit to work with and analyze PE (Portable Executables) binaries.

realm
realm
Open Source Exploitation Post-Exploitation

Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.

RealTime-PhoneNumberLocation
RealTime-PhoneNumberLocation
Free

A Realtime Phone Number Location Tracker

Reaper
Reaper
Open Source Exploitation

「💀」Proof of concept on BYOVD attack

rearm
rearm
Open Source Exploitation

ReARM - Release Governance Platform for the Agentic Era

rebuilderd
rebuilderd
Open Source

Independent verification of binary packages - Reproducible Builds

ReC98
ReC98
Free Reverse Engineering

The Touhou PC-98 Restoration Project

Recaf
Recaf
Open Source Reverse Engineering

The modern Java bytecode editor

recollapse
recollapse
Open Source Scanning & Enumeration

REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications

Recon-ng
Recon-ng
Open Source Kali Reconnaissance

A full-featured web reconnaissance framework with a module system similar to Metasploit. Automates OSINT collection from dozens of data sour…

Reconator
Reconator
Open Source Reconnaissance Scanning & Enumeration

Automated Recon for Pentesting & Bug Bounty

reconftw
reconftw
Open Source Reconnaissance Web Application

reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding o…

reconic
reconic
Open Source Reconnaissance Web Application

A Powerful Network Reconnaissance Tool for Security Professionals

reconmap
reconmap
Open Source Exploitation Web Application

Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, from …

reconness
reconness
Open Source Exploitation Reconnaissance

ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on sched…

RecoverPy
RecoverPy
Open Source Forensics

Interactively find and recover deleted or :point_right: overwritten :point_left: files from your terminal

RecuperaBit
RecuperaBit
Open Source Forensics

A tool for forensic file system reconstruction.

RED_HAWK
RED_HAWK
Open Source Reconnaissance Web Application

All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers

red-book
red-book
Free

The Red-book: The Art of Offensive CyberSecurity

Red-Portals
Red-Portals
Open Source

An educational repository focused on Evil Portals: rogue captive portals designed to mimic legitimate login systems.

red-run
red-run
Open Source Exploitation

Offensive security toolkit for Claude Code

Red-Team-Infrastructure-Wiki
Red-Team-Infrastructure-Wiki
Open Source Exploitation

Wiki to collect Red Team infrastructure hardening resources

Red-Team-Playbooks
Red-Team-Playbooks
Open Source Exploitation

This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.

Red-Team-Rising
Red-Team-Rising
Free Exploitation Forensics

Notes for red teamers - from cloud to Active Directory to many things in between.

Red-Team-Rust
Red-Team-Rust
Open Source Exploitation

A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals

Red-Team-Tools
Red-Team-Tools
Free Exploitation Post-Exploitation

Repo containing cracked red teaming tools.

Red-Teaming-Toolkit
Red-Teaming-Toolkit
Open Source Exploitation

This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.

redamon
redamon
Open Source Exploitation Reconnaissance

An AI-powered agentic red team framework that automates offensive security operations, from reconnaissance to exploitation to post-exploitat…

redasm
redasm
Open Source Reverse Engineering

A free and open source disassembler designed for both hobbyists and professional reverse engineers. Built on a solid, extensible core with a…

redc
redc
Open Source Exploitation

Next-generation IaC tools | 下一代基础设施管理工具

redcanary-response-utils
redcanary-response-utils
Open Source

Tools to automate and/or expedite response.

Redeye
Redeye
Open Source Exploitation

Redeye is a tool intended to help you manage your data during a pentest operation

RedFlag
RedFlag
Open Source

RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and ad…

RedNixOS
RedNixOS
Open Source Exploitation

NixOS-based 'distro' for cybersecurity enthusiasts

redpill
redpill
Free Exploitation Post-Exploitation

Assist reverse tcp shells in post-exploration tasks

REDRIVER2
REDRIVER2
Open Source Reverse Engineering

Driver 2 Playstation game reverse engineering effort

RedTeam
RedTeam
Free Exploitation

This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows/Li…

RedTeam_toolkit
RedTeam_toolkit
Open Source Scanning & Enumeration

Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.

RedTeam-Arsenal
RedTeam-Arsenal
Free Exploitation

Red Team Arsenal - a comprehensive collection of tools, scripts, and techniques for conducting red team operations and adversary simulations…

RedTeam-Physical-Tools
RedTeam-Physical-Tools
Open Source Exploitation

Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry…

redteam-research
redteam-research
Free Exploitation

Collection of PoC and offensive techniques used by the BlackArrow Red Team

redteam-techniques
redteam-techniques
Open Source Evasion Exploitation

Collection of red team techniques.

RedTeam-Tools
RedTeam-Tools
Free Exploitation Scanning & Enumeration

Tools and Techniques for Red Team / Penetration Testing

RedTeamGrimoire
RedTeamGrimoire
Open Source Exploitation

🔥📜 Forbidden collection of Red Team sorcery 📜🔥

RedTeaming-Tactics-and-Techniques
RedTeaming-Tactics-and-Techniques
Free Exploitation

Red Teaming Tactics and Techniques

RedTeamTools
RedTeamTools
Open Source Exploitation Post-Exploitation

记录自己编写、修改的部分工具

RedTiger-Tools
RedTiger-Tools
Open Source Reconnaissance

A safe, optimized, and high-performance version of RedTiger-Tools, fully legal and designed exclusively for educational purposes.

reentrancy-attacks
reentrancy-attacks
Open Source Exploitation

A chronological and (hopefully) complete list of reentrancy attacks to date.

REFAT-XD
REFAT-XD
Free Kali

=REFAT-XD ONE OF THE BEST REPOSITORY FOR FACEBOOK ID CRACKING 🔥🧬=

refinery
refinery
Free Forensics

The Binary Refinery&trade; is a collection of Python scripts that implement transformations of binary data such as compression and encryptio…

Refloow-Geo-Forensics
Refloow-Geo-Forensics
Open Source Forensics Reconnaissance

❤️ Free batch image geolocation and digital forensics tool. Automatically extract .jpg EXIF data, visualize GPS coordinates on maps, and rec…

reFlutter
reFlutter
Open Source Reverse Engineering

Flutter Reverse Engineering Framework

regenerator2000
regenerator2000
Open Source Reverse Engineering

An interactive disassembler for the CPU 6502, focused mostly on Commodore 8-bit computers. Features a TUI with modern features like x-ref, u…

regenny
regenny
Open Source Reverse Engineering

A reverse engineering tool to interactively reconstruct structures and generate header files

regreSSHion
regreSSHion
Free Exploitation

CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.

regrippy
regrippy
Open Source Forensics

A modern Python-3-based alternative to RegRipper

ReHTTP
ReHTTP
Open Source Kali Exploitation Post-Exploitation

Simple Powershell Http shell With WEB UI

reko
reko
Open Source Reverse Engineering

rekono
rekono
Open Source Reconnaissance Web Application

Pentesting automation platform that combines hacking tools to complete assessments

relion
relion
Open Source

Image-processing software for cryo-electron microscopy

rellic
rellic
Open Source Reverse Engineering

Rellic produces goto-free C output from LLVM bitcode

Reloaded-II
Reloaded-II
Open Source Reverse Engineering

Universal .NET Core Powered Modding Framework for any Native Game X86, X64.

Reloaded.Hooks
Reloaded.Hooks
Open Source Reverse Engineering

Advanced native function hooks for x86, x64. Welcome to the next level!

remote-method-guesser
remote-method-guesser
Open Source

Java RMI Vulnerability Scanner

RemoteAdminTool
RemoteAdminTool
Open Source Post-Exploitation

A CLI Remote Administration Tool for administrating a network over a TCP connection. Extremely simple and modular containing over 30 command…

RemoteMouse-3.008-Exploit
RemoteMouse-3.008-Exploit
Free Exploitation

This exploit allows to connect to the remote RemoteMouse 3.008 service to virtually press arbitrary keys and execute code on the machine.

RemoveBooksDRM
RemoveBooksDRM
Open Source Reverse Engineering

Currently supports DRM removal of EPUB assets. However, iBooks assets will be supported in a future release.

rengine
rengine
Open Source Reconnaissance Scanning & Enumeration

reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engi…

rengine-ng
rengine-ng
Open Source

reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…

REPENTOGON
REPENTOGON
Open Source Reverse Engineering

Script extender for The Binding of Isaac: Repentance

repo-forensics
repo-forensics
Free Forensics

Automated Security scanner for GitHub repos, Agent Skills, Plugins, and MCP servers. 18 scanners. Zero dependencies. Keeps you and your agen…

RepoAudit
RepoAudit
Free

An autonomous LLM-agent for large-scale, repository-level code auditing

repomind
repomind
Open Source Scanning & Enumeration

An open-source, AI-powered application using Agentic CAG to chat with any public GitHub repository or developer profile, offering deep code …

requests-ip-rotator
requests-ip-rotator
Open Source Web Application

A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.

research
research
Free Web Application

Bug Bounty writeups, Vulnerability Research, Tutorials, Tips&Tricks

RESim
RESim
Free Reverse Engineering Scanning & Enumeration

Reverse engineering software using a full system simulator

resolve
resolve
Open Source Password Attacks Reconnaissance

DNS resolver pools written in Go

resolvers
resolvers
Open Source Exploitation Password Attacks

The most exhaustive list of reliable DNS resolvers.

resource_dasm
resource_dasm
Open Source Reverse Engineering

Classic Mac OS resource fork and application disassembler, with reverse-engineering tools for specific applications

resources
resources
Open Source Web Application

Tools, data, and contact lists relevant to The disclose.io Project.

Resources-for-Beginner-Bug-Bounty-Hunters
Resources-for-Beginner-Bug-Bounty-Hunters
Free Web Application

A list of resources for those interested in getting started in bug bounties

Responder
Responder
Open Source Kali Exploitation

LLMNR, NBT-NS, and mDNS poisoner that captures NTLMv1/v2 hashes. Also runs rogue SMB, HTTP, FTP, and other servers to capture credentials on…

Responder (NBT-NS Poisoner)
Responder (NBT-NS Poisoner)
Open Source Kali Exploitation

Rogue authentication server and LLMNR/NBT-NS/mDNS poisoner for Windows networks. Captures NTLM challenge-response hashes for offline crackin…

Responder-Parser
Responder-Parser
Open Source Exploitation

Most Responder's configuration power in your hand.

respondnow
respondnow
Open Source Forensics

Open Source Incident Management tool for the cloud native ecosystem

resym
resym
Open Source Reverse Engineering

Cross-platform tool that allows browsing and extracting C and C++ type declarations from PDB files.

ret-sync
ret-sync
Open Source Reverse Engineering

ret-sync is a set of plugins that helps to synchronize a debugging session (WinDbg/GDB/LLDB/OllyDbg2/x64dbg) with IDA/Ghidra/Binary Ninja di…

RetDec
RetDec
Open Source Reverse Engineering

Retargetable machine-code decompiler based on LLVM. Developed by Avast. Decompiles x86, ARM, MIPS, PIC32, and PowerPC binaries to C with met…

Retire.js
Retire.js
Open Source Scanning & Enumeration Web Application

Detects the use of JavaScript libraries with known vulnerabilities. Available as a CLI tool, browser extension, Grunt plugin, and Burp Suite…

retoolkit
retoolkit
Open Source Forensics Reverse Engineering

This is a collection of tools you may like if you are interested in reverse engineering and/or malware analysis on x86 and x64 Windows syste…

RETracker
RETracker
Free Reverse Engineering

Reverse Engineering Framework for the Polyend Tracker

RetrievIR
RetrievIR
Open Source Forensics

PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.

retrowrite
retrowrite
Free Reverse Engineering

RetroWrite -- Retrofitting compiler passes through binary rewriting

revanced-patcher
revanced-patcher
Open Source Reverse Engineering

💉 ReVanced Patcher used to patch Android applications

revanced-patches-template
revanced-patches-template
Open Source Reverse Engineering

👋🧩Template repository for ReVanced Patches

Reveil
Reveil
Open Source

Bringing back the most advanced system and security analysis tool.

revela
revela
Free

Decompiler for Move smart contracts

reveng_rtkit
reveng_rtkit
Open Source Exploitation

Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass …

revenge-bundle-next
revenge-bundle-next
Open Source Reverse Engineering

👊 Discord, your way. Revenge is a client modification for Discord Android. 🧪 Experimental. Use at your own risk!

revengi-app
revengi-app
Open Source Reverse Engineering

Your all-in-one toolkit for reverse engineering: Smali Grammar, DexRepair, Flutter Analysis and much more...

ReVens
ReVens
Open Source Forensics Reverse Engineering

Windows-based AI-powered Reverse Engineering Toolkit "AIO", Built for Security (Malware analysis, Pentesting) & Educational purposes.

reverse_ssh
reverse_ssh
Open Source

(Art credit to https://www.instagram.com/smart.hedgehog.art/)

reverse-api-engineer
reverse-api-engineer
Open Source Reverse Engineering

Claude engineer that captures traffic, writes documentation and automatically generates API clients. Reverse engineer APIs!

Reverse-Engineering
Reverse-Engineering
Open Source Reverse Engineering

A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.

reverse-engineering-assistant
reverse-engineering-assistant
Open Source Reverse Engineering

MCP server for reverse engineering tasks in Ghidra 👩‍💻

Reverse-Engineering-Bluetooth-Protocols
Reverse-Engineering-Bluetooth-Protocols
Open Source Reverse Engineering Wireless

Intercepting Bluetooth device communication and simulating packet responses of an iPhone from a Raspberry Pi 3

reverse-linear-sync-engine
reverse-linear-sync-engine
Free Reverse Engineering

A reverse engineering of Linear's sync engine. Endorsed by Linear CTO.

reverse-shell
reverse-shell
Open Source Exploitation

reverse-shell-generator
reverse-shell-generator
Open Source

Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)

reversing-unofficial-APIs
reversing-unofficial-APIs
Free Reconnaissance

Resources for reverse engineering “unofficial APIs”.

reversingBits
reversingBits
Open Source Forensics Reverse Engineering

A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serves a…

reversinglabs-yara-rules
reversinglabs-yara-rules
Open Source Reverse Engineering

Welcome to the official ReversingLabs YARA rules repository! The repository will be updated continuously, as we develop rules for new threat…

revshellgen
revshellgen
Open Source

Reverse shell generator written in Python 3.

rezible
rezible
Open Source Forensics

Mission Control for Your Operations

RF-Swift
RF-Swift
Open Source Wireless

🚀 A powerful multi-platform RF toolbox that deploys specialized radio, hardware, and other security tools in seconds on Linux, Windows, and …

RFID-Gooseneck
RFID-Gooseneck
Free Exploitation

Full Build Guide for making your own RFID Gooseneck Long Range Reader!

rhabdomancer
rhabdomancer
Open Source Reverse Engineering

Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.

RIDE
RIDE
Free Forensics

Windows tool for low-level access to any floppy disks, and comfortable high-level access to some legacy filesystems (ZX Spectrum, MS-DOS, et…

rifiuti2
rifiuti2
Open Source Forensics

Rifiuti2 is a for analyzing Windows Recycle Bin INFO2 file. Analysis of Windows Recycle Bin is usually carried out during Windows computer f…

RigelEngine
RigelEngine
Open Source Reverse Engineering

A modern re-implementation of the classic DOS game Duke Nukem II

RingReaper
RingReaper
Open Source Evasion Post-Exploitation

Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.

riscy-business
riscy-business
Open Source Evasion

This folder contains the VM host (rv64i interpreter).

rita
rita
Open Source Forensics Post-Exploitation

Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.

RITM
RITM
Open Source Post-Exploitation

This is a Python implementation of the man-in-the-middle attack described by Charlie Clark (@exploitph) in his post, New Attack Paths? AS Re…

RivalSearchMCP
RivalSearchMCP
Open Source Reconnaissance

Deterministic research MCP server on FastMCP 3 — 5-engine web search, 9-platform social search, 6 academic DBs, news aggregation, entity pro…

rizin
rizin
Open Source Exploitation Reverse Engineering

UNIX-like reverse engineering framework and command-line toolset.

RMS-Runtime-Mobile-Security
RMS-Runtime-Mobile-Security
Open Source Reverse Engineering

Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime

road-to-hacking
road-to-hacking
Free Kali Exploitation Post-Exploitation

¿Quieres empezar en el mundo hacking? En esta revista te enseño a instalar Kali Linux desde cero y a manipular herramientas esenciales en el…

robin
robin
Open Source Reconnaissance

AI-Powered Dark Web OSINT Tool

Robinhood
Robinhood
Open Source Reverse Engineering

Robinhood API Docs — CLI reference browser for Robinhood Trade unofficial private REST API documentation with endpoint exploration, authenti…

Roblox-Injector
Roblox-Injector
Free Exploitation

A simple lua injector made specifically for roblox. (Windows Only)

robofinder
robofinder
Open Source Reconnaissance

Robofinder retrieves historical #robots.txt files from #Archive.org, allowing you to collect old directories and paths for any domain which …

robot_hacking_manual
robot_hacking_manual
Open Source Forensics

Robot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.

Rocabella
Rocabella
Open Source Exploitation

rogue
rogue
Open Source Wireless

An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team …

rogue
rogue
Open Source

Automated web vulnerability scanning with LLM agents

RomBuster
RomBuster
Open Source Exploitation Reconnaissance

RomBuster is a router exploitation tool that allows to disclosure network router admin password.

rome-webshell
rome-webshell
Open Source

A powerful and delightful PHP WebShell

ronin
ronin
Open Source

Ronin is a Free and Open Source Ruby Toolkit for Security Research and Development. Ronin also allows for the rapid development and distribu…

ronin-exploits
ronin-exploits
Open Source Exploitation

A Ruby micro-framework for writing and running exploits

ronin-vulns
ronin-vulns
Open Source Exploitation Web Application

Tests URLs for Local File Inclusion (LFI), Remote File Inclusion (RFI), SQL injection (SQLi), and Cross Site Scripting (XSS), Server Side …

roobetScraper
roobetScraper
Free Exploitation

Scraped and performed analytics on Roobet's Crash casino game

RootKits-List-Download
RootKits-List-Download
Open Source Exploitation

This is the list of all rootkits found so far on github and other sites.

RootMyTV.github.io
RootMyTV.github.io
Open Source Exploitation

RootMyTV is a user-friendly exploit for rooting/jailbreaking LG webOS smart TVs.

RootTheBox
RootTheBox
Open Source

A Game of Hackers (CTF Scoreboard & Game Manager)

ropfuscator
ropfuscator
Free Evasion

ROPfuscator is a fine-grained code obfuscation framework for C/C++ programs using ROP (return-oriented programming).

ROPgadget
ROPgadget
Free Exploitation Reverse Engineering

This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on…

Ropper
Ropper
Open Source Exploitation

Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/…

ropr
ropr
Free Exploitation

A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative (currently x86 only)

RPCMon
RPCMon
Open Source Exploitation

RPC Monitor tool based on Event Tracing for Windows

rpl-attacks
rpl-attacks
Open Source

RPL attacks framework for simulating WSN with a malicious mote based on Contiki

RSAcrack
RSAcrack
Open Source Password Attacks

Obtain the passphrase of a private key (id_rsa), this tool uses the ssh-keygen binary to perform a brute force attack until a successful col…

RsaCracker
RsaCracker
Open Source

Powerful RSA cracker for CTFs. Supports RSA, X509, OPENSSH, PKCS#12, PKCS#7, and CSR in PEM and DER formats.

rsbkb
rsbkb
Open Source

CLI tools: encoders/decoders, CTF and reverse engineering helpers.

rshijack
rshijack
Open Source

TCP connection hijacker, Rust rewrite of shijack

rspirv
rspirv
Open Source Reverse Engineering

Rust implementation of SPIR-V module processing functionalities

RTCV
RTCV
Open Source Reverse Engineering

Real-Time Corruptor, Vanguard, CorruptCore, NetCore2 https://redscientist.com/rtc

RTDllHijack
RTDllHijack
Free Exploitation

dll劫持、dll hijack、Bypass Antivirus、Red Team

RTEdbg
RTEdbg
Open Source Reverse Engineering

A fast and flexible data logging/tracing toolkit for software testing, debugging, and visualization. Features minimally intrusive C/C++ code…

RTL8720dn-Deauther
RTL8720dn-Deauther
Open Source

My ESP32-Deauther ported to the RTL8720dn, allowing users to deauthenticate on 5GHz now!

RTL8720dn-WiFi-Packet-Injection
RTL8720dn-WiFi-Packet-Injection
Open Source Reverse Engineering

Send raw 802.11 WiFi frames using an RTL8720dn

rtl88x2bu
rtl88x2bu
Open Source Kali

Realtek RTL88x2BU v5.13.1 (2021-07-02) Wireless Lan Driver for Linux

RTLC2
RTLC2
Free Exploitation Post-Exploitation

Advanced Command and Control Framework for Authorized Red Team Operations

Rubeus
Rubeus
Open Source Exploitation Post-Exploitation

C# toolset for raw Kerberos interaction and abuse. Performs Kerberoasting, AS-REP Roasting, Pass-the-Ticket, Golden/Silver Ticket attacks, t…

rubikphish
rubikphish
Open Source Social Engineering

It is an automated phishing tool that includes more than 30 phishing templates.

rudy
rudy
Open Source Exploitation

RUDY is an acronym used to describe a Denial of Service (DoS) tool used by hackers to perform slow-rate a.k.a. “Low and slow” attacks.

ruler
ruler
Free

A tool to abuse Exchange services

rules
rules
Free Exploitation Password Attacks

Lastest Hashcat rules for password cracking

RunAs-Stealer
RunAs-Stealer
Open Source Exploitation Forensics

RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging

RunAsTrustedInstaller
RunAsTrustedInstaller
Open Source

Run a program as TrustedInstaller (SYSTEM)

rust_tips_and_tricks
rust_tips_and_tricks
Free Exploitation

This repo is just a collection of Rust tips and tricks useful to interact with the Windows API and develop offensive security tools for that…

Rust-Hells-Gate
Rust-Hells-Gate
Free Evasion Exploitation

Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust

rust-malware-gallery
rust-malware-gallery
Free Forensics

A collection of malware families and malware samples which use the Rust programming language.

rustbof
rustbof
Open Source Exploitation

A Rust template for writing Beacon Object Files (BOFs)

rustchain-bounties
rustchain-bounties
Free Web Application

Earn RTC crypto by contributing to the RustChain ecosystem. Bounties from 1-150 RTC. Star, code, write tutorials, find bugs.

rustclr
rustclr
Open Source Exploitation

Host CLR and run .NET binaries using Rust

RustHound
RustHound
Open Source Exploitation Post-Exploitation

Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀

Rustic64
Rustic64
Open Source Exploitation

64-bit, position-independent implant template for Windows in Rust.

Rustic64Shell
Rustic64Shell
Open Source Exploitation

A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.

rustinel
rustinel
Open Source Forensics

Cross-platform EDR in Rust for Windows ETW and Linux eBPF, with Sigma, YARA, and IOC detection.

RustiveDump
RustiveDump
Open Source Exploitation

LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and remo…

RustPacker
RustPacker
Open Source

Template-based shellcode packer written in Rust, with indirect syscall support. Made with

RustPotato
RustPotato
Open Source Exploitation Post-Exploitation

A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTAPI …

RustRedOps
RustRedOps
Open Source Exploitation

RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust

RustScan
RustScan
Open Source Scanning & Enumeration

➡️ [Discord][discord] | [Installation Guide][toc-install] | [Usage Guide][usage-guide] ⬅️

RustSoliloquy
RustSoliloquy
Open Source Exploitation

A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and ind…

RustVEHSyscalls
RustVEHSyscalls
Free Exploitation

A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.

Rusty-Playground
Rusty-Playground
Open Source Exploitation

Some Rust program I wrote while learning Malware Development

RuView
RuView
Open Source Wireless

π RuView: WiFi DensePose turns commodity WiFi signals into real-time human pose estimation, vital sign monitoring, and presence detection — …

Ryujin
Ryujin
Open Source Forensics Reverse Engineering

Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool

rz-ghidra
rz-ghidra
Open Source Reverse Engineering

Deep ghidra decompiler and sleigh disassembler integration for rizin

s1c0n
s1c0n
Open Source Reconnaissance

simple recon tool to help you for searching vulnerability on web server

s2e
s2e
Free Reverse Engineering

S2E: A platform for multi-path program analysis with selective symbolic execution.

S3BucketList
S3BucketList
Open Source

Chrome and Firefox extension that lists Amazon S3 Buckets while browsing

s3dns
s3dns
Open Source Reconnaissance Scanning & Enumeration

Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern

s3enum
s3enum
Open Source Reconnaissance

Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.

S4DFarm
S4DFarm
Free

Attack & Defense CTF Farm based on DestructiveFarm

sa2
sa2
Free Reverse Engineering

A decompilation and port of Sonic Advance 1 & 2 - GameBoy Advance game's written in C

SaaS-ZeroTraffic
SaaS-ZeroTraffic
Free Wireless

SaaS Zero - Network Traffic Monitor Professional network traffic monitoring and security analysis platform

safe-marked
safe-marked
Open Source Web Application

Markdown to HTML using marked and DOMPurify. Safe by default.

SafeLine
SafeLine
Open Source Exploitation Web Application

SafeLine is a self-hosted WAF(Web Application Firewall) / reverse proxy to protect your web apps from attacks and exploits.

SAMDump
SAMDump
Free Exploitation

Extract the SAM and SYSTEM hives using the Volume Shadow Copy (VSS) API. With exfiltration and XOR obfuscation options. Implemented in C#, C…

SamsungPractice
SamsungPractice
Free Password Attacks

Problems for Samsung Research Institute, India - 3 hours Online Test.

sandblaster
sandblaster
Free Reverse Engineering

SandBlaster is a tool for reversing (decompiling) binary Apple sandbox profiles. Apple sandbox profiles are written in SBPL (Sandbox Profile…

sandfly-entropyscan
sandfly-entropyscan
Free Forensics

Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives out…

sandfly-setup
sandfly-setup
Free Forensics

Sandfly Security Agentless Compromise and Intrusion Detection System For Linux

sandmap
sandmap
Open Source Kali Reconnaissance Scanning & Enumeration

Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.

sandworm-audit
sandworm-audit
Open Source Exploitation

Security & License Compliance For Your App's Dependencies 🪱

sanitizer-polyfill
sanitizer-polyfill
Open Source Web Application

rewrite constructor arguments, call DOMPurify, profit

Sara
Sara
Open Source Forensics

MikroTik RouterOS Security Inspector

Sark
Sark
Open Source Reverse Engineering

IDA Plugins & IDAPython Scripting Library.

satnow-scraper
satnow-scraper
Free Reconnaissance

OSINT web scraper for SatNow to extract details about satellite components and subsystem specs for in-depth reconnaissance 🛸

saucerframe
saucerframe
Free Exploitation

saucerframe是一个基于python3的开源批量POC检测框架,默认使用协程异步请求,支持多线程并发,支持多种指定目标方式,可用于批量POC检测,也可根据需要扩展功能。欢迎star和pr

savvy-cli
savvy-cli
Open Source Forensics

Automatically capture and surface your team's tribal knowledge

sbomqs
sbomqs
Open Source

sbomqs: The Comprehensive SBOM Quality & Compliance Tool

SBSCAN
SBSCAN
Open Source Exploitation

🎭 SBSCAN是一款专注于spring框架的渗透测试工具,可以对指定站点进行springboot未授权扫描/敏感信息扫描以及进行spring框架漏洞扫描与验证的综合利用工具。 [SBSCAN is a penetration testing tool focused …

SC2k-docs
SC2k-docs
Free Reverse Engineering

Documentation related to the implementation of Maxis' game, SimCity 2000.

Scam-Blocklist
Scam-Blocklist
Open Source Reconnaissance Social Engineering

Blocklist for newly created scam, phishing, and other malicious domains automatically retrieved daily using Google Search API, automated det…

scam-links
scam-links
Free Social Engineering

A database of over 24000 scam links used for Discord, Steam and more.

ScamIntelLogs
ScamIntelLogs
Free Reconnaissance Social Engineering

Open-source intelligence archive of crypto scam operations — internal chats, admin panels, victim records, and infrastructure data for resea…

scan4all
scan4all
Open Source Password Attacks Reconnaissance

Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Po…

ScanCannon
ScanCannon
Free Exploitation Reconnaissance

A script for credentials-based attack surface enumeration and general reconnaissance of massive networks

scancode.io
scancode.io
Open Source Reverse Engineering

ScanCode.io is a server to script and automate software composition analysis with pipelines. This project is sponsored by the European Commi…

scanme
scanme
Open Source Forensics Reconnaissance

A Golang package for scanning private and public IPs for open TCP ports 👁️

Scanner-and-Patcher
Scanner-and-Patcher
Open Source Exploitation Scanning & Enumeration

A Web Vulnerability Scanner and Patcher

Scanners-Box
Scanners-Box
Free Forensics Reverse Engineering

A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑

ScanPro
ScanPro
Free Exploitation Reconnaissance

ScanPro - NMap Scanning Scripts ~ Network Mapper

scant3r
scant3r
Open Source Web Application

ScanT3r - Module based Bug Bounty Automation Tool ( use Lotus instead github.com/bugBlocker/lotus )

SCANter
SCANter
Open Source Exploitation Web Application

Websites Vulnerability Scanner

scapy
scapy
Open Source Forensics

Scapy: the Python-based interactive packet manipulation program & library.

ScareCrow
ScareCrow
Open Source Evasion

Payload creation framework focused on EDR bypass. Creates loaders using a variety of techniques including side-loading, binary padding, expi…

scary-strings
scary-strings
Open Source Password Attacks Reverse Engineering

If these strings are in your code, you might have a problem!

SchemaCrawler
SchemaCrawler
Free Reverse Engineering

Free database schema discovery and comprehension tool

schemaspy
schemaspy
Open Source Reverse Engineering

Database documentation built easy

scilla
scilla
Open Source Reconnaissance Scanning & Enumeration

Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration

sclauncher
sclauncher
Open Source Evasion Forensics

A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files fro…

scoop-retools
scoop-retools
Free Reverse Engineering

Scoop bucket for reverse engineering tools

scoop-security
scoop-security
Free

Scoop bucket for Penetration Testing and Cybersecurity related tools. 用于渗透测试和网络安全相关工具下载、安装和自动更新的Scoop软件仓库。

scope
scope
Free Reconnaissance Web Application

An automated GitHub Actions-based crawler that fetches and updates public scopes from popular bug bounty platforms (like Hackerone/Bugcrowd/…

ScopeHunter
ScopeHunter
Open Source Kali

ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.

ScopeSentry
ScopeSentry
Free Reconnaissance Web Application

ScopeSentry-Cyberspace mapping, subdomain enumeration, port scanning, sensitive information discovery, vulnerability scanning, distributed n…

scot
scot
Free Forensics

Sandia Cyber Omni Tracker (SCOT)

scout
scout
Free Scanning & Enumeration

🔭 Lightweight URL fuzzer and spider: Discover a web server's undisclosed files, directories and VHOSTs

Scoutflo-SRE-Playbooks
Scoutflo-SRE-Playbooks
Open Source Forensics

🚀 SRE incident response playbooks for AWS & Kubernetes. Step-by-step troubleshooting guides to help on-call engineers resolve infrastructure…

scrape-youtube-channel-videos-url
scrape-youtube-channel-videos-url
Open Source Reconnaissance

This Python script is used to scrape all the video links from a youtube channel.

ScreenConnect-AuthBypass-RCE
ScreenConnect-AuthBypass-RCE
Free Exploitation

ScreenConnect AuthBypass(cve-2024-1709) --> RCE!!!

Script
Script
Open Source Exploitation

A VSCode Workspace based hacking environment utils. Starting your Note-Driven Hacking experience.

Scripting
Scripting
Open Source Exploitation Forensics

PS / Bash / Python / Other scripts For FUN!

scripts
scripts
Open Source Reverse Engineering

A collection of scripts for Agent. Feel free to submit a pull request to add your script.

Scrummage
Scrummage
Open Source Reconnaissance Web Application

A Holistic OSINT and Threat Hunting Platform

sd-goo
sd-goo
Open Source Reconnaissance

Enumerate Subdomains Through Google Dorks (Bypassed Page Filter)

sdlc_golang
sdlc_golang
Free Scanning & Enumeration

sdlc 是一个基于 Go 语言构建的安全漏洞示范平台,旨在促进 DevSecOps 和安全开发生命周期 (SDLC) 实践。它通过模拟常见漏洞来增强开发人员的安全意识,除了可以用于devsecops以外,还可以用于安全行业从事者学习漏洞知识或者渗透知识,代码审计,提供了一个实践…

sdlc_python
sdlc_python
Free

sdlc_python 是一个基于python语言构建的devsecops平台,旨在促进 DevSecOps 和安全开发生命周期 (SDLC) 实践。它通过模拟常见漏洞来增强开发人员的安全意识(对应sdlc中对开发人员的安全培训),并且使用了大模型进行代码安全审计(对应sdlc中…

sead
sead
Free Reverse Engineering

Decompilation of sead: the standard C++ library for first-party Nintendo games

seal-911
seal-911
Free Forensics

SEAL 911 is a project designed to give users, developers, and security researchers an accessible way to connect with a small group of highly…

search_vulns
search_vulns
Open Source Exploitation

A modular tool to search for known vulnerabilities, exploits and more across various data sources

Search-Engines
Search-Engines
Free Reconnaissance

A list of Search Engines that will be useful for different aspect of your work, OSINT, Privacy & OPSEC.

search-libc
search-libc
Open Source Exploitation

Web wrapper of niklasb/libc-database

Search-That-Hash
Search-That-Hash
Open Source Password Attacks

🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡

SearchMyName
SearchMyName
Open Source Reconnaissance

Welcome to SearchMyName! This tool allows you to enumerate usernames across many websites! OSINT Tool!

SearchPhone
SearchPhone
Open Source Reconnaissance

𝐒𝐞𝐚𝐫𝐜𝐡 𝐏𝐡𝐨𝐧𝐞 is a tool for looking up linked phone number information, which uses the Phone Number Analyzer API from the RAPIDAPI website, d…

SeaShell
SeaShell
Open Source Exploitation Post-Exploitation

SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive in…

Sec-88
Sec-88
Free

Cyber Security Notes, Methodology, Resources and Tips

secator
secator
Free Exploitation Reconnaissance

secator - the pentester's swiss knife

SecAutoBan
SecAutoBan
Open Source Web Application

恶意IP全自动封禁平台。支持收集如下安全设备告警:长亭WAF社区版(SafeLine)、微步蜜罐HFish、奇安信天眼、奇安信椒图、绿盟WAF、天融信WAF、科来网络安全分析审计系统、深信服态势感知、启明星辰全网安全态势感知系统。支持如下设备联动封禁:RouterOS、OPNse…

Secbuild
Secbuild
Open Source Exploitation Reconnaissance

An automation tool to install the most popular tools for bug bounty or pentesting.

secbutler
secbutler
Open Source

The perfect butler for pentesters, bug-bounty hunters and security researchers

seccomp-tools
seccomp-tools
Open Source

Provide powerful tools for seccomp analysis

secfiles
secfiles
Open Source Exploitation Password Attacks

My useful files for penetration tests, security assessments, bug bounty and other security related stuff

secimport
secimport
Open Source

Library-Level eBPF Sandbox for Python (Linux & macOS): syscall-level control per module.

SecNN-Wiki
SecNN-Wiki
Free Exploitation

Wiki漏洞库管理系统&网络安全知识库-渗透测试常见漏洞知识库文档-该网站收集了Web应用层漏洞、中间件安全缺陷、系统配置不当、移动端(Android)安全问题、权限提升、RCE、网络设备及IOT安全。

SecObserve
SecObserve
Free

SecObserve is an open source vulnerability and license management system for software development teams and cloud environments. It supports …

second-order
second-order
Open Source Password Attacks Reconnaissance

Second-order subdomain takeover scanner

SecOpsAgentKit
SecOpsAgentKit
Free

Security operations toolkit for AI coding agents. Give Claude Code 25+ skills to catch vulnerabilities, scan containers, detect secrets, and…

SecReport
SecReport
Open Source Exploitation Web Application

ChatGPT加持的,多人在线协同信息安全报告编写平台。目前支持的报告类型:渗透测试报告,APP隐私合规报告。

SecretOpt1c
SecretOpt1c
Open Source Reconnaissance

SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accurac…

SecretPixel
SecretPixel
Open Source

SecretPixel is a cutting-edge steganography tool designed to securely conceal sensitive information within images. It stands out in the real…

SecretScanner
SecretScanner
Open Source

:unlock: :unlock: Find secrets and passwords in container images and file systems :unlock: :unlock:

Secrover
Secrover
Open Source Scanning & Enumeration

Open-source security reports — no paywalls, just actionable insights.

sectemplates
sectemplates
Free Forensics Web Application

Open source templates you can use to bootstrap your security programs

SecToolKit
SecToolKit
Open Source

Cybersecurity tool repository / Wiki 收录常用 / 前沿 的CTF和渗透工具以及其 官方/使用 文档,致力于让每个工具都能发挥作用ww,不管你是萌新还是领域从业者希望你都能在这里找到适合你的工具或者获得一定的启发。

sectracker
sectracker
Free Reconnaissance Web Application

A Modern Bug Bounty and Security Research Management Platform

secuditor-lite
secuditor-lite
Free Forensics

Free diagnostic security tool for Windows endpoints, featuring network utilities and device OPSEC analysis, all in one

secure
secure
Open Source Web Application

Modern Python library for HTTP security headers with safe defaults, configurable presets, and first-class ASGI/WSGI middleware (FastAPI, Dja…

secure-repo
secure-repo
Open Source

Orchestrate GitHub Actions Security

secureCodeBox
secureCodeBox
Free Web Application

secureCodeBox (SCB) - continuous secure delivery out of the box

SecureFolderFS
SecureFolderFS
Open Source

Powerful, secure, modern way to keep your files protected.

security-advisories
security-advisories
Free Exploitation

👮 Security advisories of Nextcloud

Security-Assessments-projects-for-Beginners
Security-Assessments-projects-for-Beginners
Free Web Application

Hands-on projects for beginners to learn and practice essential cybersecurity skills through security assessments.

Security-Books
Security-Books
Free Web Application

🛡️ The Ultimate Cybersecurity Library | 160+ curated books, guides & resources covering Ethical Hacking, Penetration Testing, Bug Bounty, Re…

security-checker-action
security-checker-action
Open Source Exploitation

PHP Security Checker ====================

security-scripts
security-scripts
Open Source Scanning & Enumeration

A collection of security related Python and Bash shell scripts. Analyze hosts on generic security vulnerabilities. Wrapper around popular to…

security-study-plan
security-study-plan
Free Web Application

Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOps a…

security-tools
security-tools
Open Source Reverse Engineering Web Application

My collection of various security tools created mostly in Python and Bash. For CTFs and Bug Bounty.

SecurityArchitecture
SecurityArchitecture
Free

Repository for the Open Security Reference Architecture

securityonion
securityonion
Free

Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own inter…

SecurityResearcher-Note
SecurityResearcher-Note
Free Exploitation Forensics

Cover various security approaches to attack techniques and also provides new discoveries about security breaches.

SecurityTools
SecurityTools
Free Exploitation

搜集大量网络安全行业开源项目,旨在提供安全测试工具,提升渗透测试效率。 项目收集的思路: 一个是以攻击/漏洞视角出发的开源项目,经网络安全爱好者实践总结出的经验。 一个是从渗透测试流程出发,沿着信息收集到内网渗透的思路,总结出漏洞扫描、漏洞利用、后/域渗透等。 这个收集是一个长期…

secutils
secutils
Open Source

Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers

seeker
seeker
Open Source Reconnaissance

Accurately Locate Smartphones using Social Engineering

seekr
seekr
Open Source Reconnaissance Social Engineering

A multi-purpose OSINT toolkit with a neat web-interface.

sega-vr-disasm
sega-vr-disasm
Free Reverse Engineering

Complete static recompilation of Virtua Racing for the Sega 32X (optimization in progress)

sekurak-academy-python-hacking
sekurak-academy-python-hacking
Open Source

This repository is prepared especially for the participants of the Polish training course "Can you hack everything with Python?". It offers …

Selenium-Driverless
Selenium-Driverless
Free Reverse Engineering

a stealthy browser automation framework

Self-Cleaning-PICO-Loader
Self-Cleaning-PICO-Loader
Open Source Evasion

Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload exe…

Self-Way
Self-Way
Free Kali

Built to learn ethical hacking on your own

SEMA
SEMA
Open Source Forensics Reverse Engineering

SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create represen…

seninja
seninja
Open Source Reverse Engineering

symbolic execution plugin for binary ninja

Sentient-Enclaves-Framework
Sentient-Enclaves-Framework
Open Source

Sentient Enclaves Framework for Confidential AI & Crypto Apps

sentinel-attack
sentinel-attack
Open Source

Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK

sentinel-reverse
sentinel-reverse
Open Source Forensics Reverse Engineering

AI-Powered Autonomous Binary Reverse Engineering CLI — the native reverse engine from Innora-Sentinel. Local LLM inference (MLX), MPS GPU ac…

SentryPeer
SentryPeer
Free

Protect your SIP Servers from bad actors at https://sentrypeer.org

SeqBox
SeqBox
Open Source Forensics

A single file container/archive that can be reconstructed even after total loss of file system structures

Serpico
Serpico
Open Source Reporting

Penetration testing report generation tool built in Ruby. Stores findings and reusable recommendations, generates Word DOCX reports, and sup…

server
server
Open Source Password Attacks

Hashtopolis - distributed password cracking with Hashcat

setup_hack_env
setup_hack_env
Open Source Kali

This is a versatile collection of scripts designed for OSINT, ethical hacking, and web application security testing. With a focus on automat…

Severed-Chains
Severed-Chains
Free Reverse Engineering

Legend of Dragoon decompiled, reverse engineered, and ported to PC/Mac/Linux/Steam Deck

sexettintool
sexettintool
Open Source Reconnaissance Social Engineering

İçerisinde 100'den fazla modül ve özelliği barındıran çok amaçlı bir siber güvenlik aracı.

Sfoffo-Pentesting-Notes
Sfoffo-Pentesting-Notes
Free

All knowledge I gained from CTFs, real life penetration testing and learning by myself.

SFP
SFP
Open Source Reverse Engineering

This utility is designed to allow you to apply skins to the modern Steam client

sh00t
sh00t
Open Source

Security Testing is not as simple as right click > Scan. It's messy, a tough game. What if you had missed to test just that one thing and ha…

sh4d0wup
sh4d0wup
Open Source Exploitation

Signing-key abuse and update exploitation framework

Shadowbroker
Shadowbroker
Open Source Reconnaissance

Open-source intelligence for the global theater. Track everything from the corporate/private jets of the wealthy, and spy satellites, to sei…

ShadowClone
ShadowClone
Open Source Reconnaissance

ShadowClone allows you to distribute your long running tasks dynamically across thousands of serverless functions and gives you the results …

ShadowPhish
ShadowPhish
Free Exploitation Social Engineering

ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing, an…

Shai-Hulud-2.0-Detector
Shai-Hulud-2.0-Detector
Open Source Scanning & Enumeration

Detect npm packages compromised in the Shai-Hulud 2.0 supply chain attack (Nov 2025). Scans for 790+ malicious packages, suspicious scripts,…

shannon
shannon
Open Source

Shannon Lite is an autonomous, white-box AI pentester for web applications and APIs. It analyzes your source code, identifies attack vectors…

ShannonBaseband
ShannonBaseband
Open Source Exploitation Reverse Engineering

Scripts, plugins, and information for working with Samsung's Shannon baseband.

sharem
sharem
Open Source Evasion Reverse Engineering

SHAREM is a shellcode analysis framework, capable of emulating more than 45,000 WinAPIs and virutally all Windows syscalls. It also contains…

sharkjack-payloads
sharkjack-payloads
Free

The Official Hak5 Shark Jack Payload Repository

SharpCovertTube
SharpCovertTube
Free Exploitation Post-Exploitation

Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube

SharpGmailC2
SharpGmailC2
Open Source Exploitation Post-Exploitation

Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol

SharpHound
SharpHound
Open Source Post-Exploitation Reconnaissance

C# ingestor for BloodHound. Collects Active Directory data including group memberships, ACLs, trust relationships, sessions, and local admin…

SharpPXE
SharpPXE
Open Source Exploitation

A C# tool for extracting information from SCCM PXE boot media.

SharpShellPipe
SharpShellPipe
Open Source Exploitation

This lightweight C# demo application showcases interactive remote shell access via named pipes and the SMB protocol.

Shellcode-IDE
Shellcode-IDE
Open Source Evasion Reverse Engineering

Shellcode IDE — makes developing and analyzing shellcode much more convenient.

Shellcode-Loader
Shellcode-Loader
Free Evasion

Open repository for learning dynamic shellcode loading (sample in many programming languages)

shells
shells
Open Source

Script for generating revshells

Shellter
Shellter
Freemium Kali Evasion

Dynamic shellcode injection tool designed to inject shellcode into native Windows applications (PE files). Randomly modifies the PE file's e…

sherlock
sherlock
Open Source Exploitation Forensics

Hunt down social media accounts by username across social networks

Sherlock
Sherlock
Open Source Exploitation Web Application

This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublis…

sherlock-rs
sherlock-rs
Open Source Exploitation Forensics

Hunt down social media accounts by username across social networks

SherlockElf
SherlockElf
Open Source Reverse Engineering

SherlockElf is a powerful tool designed for both static and dynamic analysis of Android ELF binaries and dynamic iOS Macho-O binaries (exper…

SherlockLinux
SherlockLinux
Open Source Reconnaissance

Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12

sherlockproject.xyz
sherlockproject.xyz
Free Reconnaissance

Sherlock Project's homepage

shhgit
shhgit
Open Source Reconnaissance

Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.

ship-safe
ship-safe
Open Source Reverse Engineering Web Application

CLI security scanner built for the agentic era. Detects CI/CD misconfigs, agent permission risks, MCP tool injection, hardcoded secrets, and…

shiva
shiva
Free Reverse Engineering

A custom ELF linker/loader for installing ET_REL binary patches at runtime

Shodan
Shodan
Freemium Reconnaissance

Search engine for internet-connected devices. Finds exposed servers, webcams, ICS/SCADA systems, databases, and more. Offers a CLI and REST …

shodan
shodan
Open Source Reconnaissance

Yet another one Golang implementation of Shodan REST API client. This library is inspired by amazing Nikita Safonov's go-shodan library, but…

shodan-dorks
shodan-dorks
Open Source Reconnaissance

This GitHub repository provides a range of search queries, known as "dorks," for Shodan, a powerful tool used to search for Internet-connect…

shodan-dorks
shodan-dorks
Open Source Reconnaissance

An auto-updating list of shodan dorks with info on the amount of results they return!

shomon
shomon
Open Source Forensics Reconnaissance

Shodan Monitoring integration for TheHive.

ShonyDanza
ShonyDanza
Open Source Exploitation Reconnaissance

A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.

shortscan
shortscan
Open Source Exploitation

An IIS short filename enumeration tool

shotlooter
shotlooter
Open Source Reconnaissance

a recon tool that finds sensitive data inside the screenshots uploaded to prnt.sc

shotstars
shotstars
Open Source Reconnaissance

An advanced tool for checking GitHub repositories, with star statistics, including fake star analysis and data visualization.

shovel
shovel
Free

Web interface to explore Suricata EVE outputs

shuffledns
shuffledns
Open Source Reconnaissance

MassDNS wrapper written in go to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard filtering an…

sicat
sicat
Open Source Exploitation Reconnaissance

SICAT - The useful vulnerability and exploit finder …

SickoMenu
SickoMenu
Open Source Reverse Engineering

A powerful utility for Among Us designed to enrich your game experience with custom features!

sidr
sidr
Free Forensics

Search Index Database Reporter

SIEM
SIEM
Open Source Forensics Reconnaissance

SIEM Tactics, Techiques, and Procedures

sif
sif
Open Source

the blazing-fast pentesting suite.

sift-saltstack
sift-saltstack
Open Source Forensics

Salt States for Configuring the SIFT Workstation

sightline
sightline
Open Source Reconnaissance

An OSINT search engine for mapping real-world infrastructure from OpenStreetMap data

SIGIT
SIGIT
Free Kali Reconnaissance

SIGIT - Simple Information Gathering Toolkit

sigkit
sigkit
Open Source Reverse Engineering

Function signature matching and signature generation plugin for Binary Ninja

SigmAIQ
SigmAIQ
Open Source

A pySigma wrapper and langchain toolkit for automatic rule creation/translation

sigmakerex
sigmakerex
Open Source Reverse Engineering

Enhanced IDA Pro signature generator plugin.

sigmatch
sigmatch
Open Source Reverse Engineering

✨ Modern C++ 20 signature match / search library

sigmund
sigmund
Open Source Reconnaissance

A tool for collecting function selectors quickly and decoding signatures from EVM bytecode.

Signex
Signex
Open Source Reconnaissance

Personal intelligence agent powered by Claude Code. Describe what to watch, it collects, analyzes, and learns — with extensible sensors and …

SILENTCHAIN
SILENTCHAIN
Free Scanning & Enumeration Web Application

AI-powered vulnerability scanner extension for Burp Suite with multi-provider support (Ollama, OpenAI, Claude, Gemini)

SiliconRE
SiliconRE
Open Source Reverse Engineering

Traces, schematics, and general infos about custom chips reverse-engineered from silicon

SimpleCrypter
SimpleCrypter
Open Source Evasion

A simple cryptor for .NET/Native files with Injection and obfuscation

simpleIAST
simpleIAST
Open Source

基于污点追踪的灰盒漏洞扫描工具,实时识别并展示 Java Web 应用中的常见安全漏洞。

simplemma
simplemma
Open Source Password Attacks

Simple multilingual lemmatizer for Python, especially useful for speed and efficiency

Simplifier
Simplifier
Open Source Evasion

Efficient general mixed boolean-arithmetic (MBA) simplifier

SingleFile
SingleFile
Open Source Reconnaissance

Web Extension for saving a faithful copy of a complete web page in a single HTML file

SingleFile-MV3
SingleFile-MV3
Open Source Reconnaissance

SingleFile version compatible with Manifest V3

SingleFileExtractor
SingleFileExtractor
Open Source Forensics Reverse Engineering

A tool for extracting contents (assemblies, configuration, etc.) from a single-file application to a directory, suitable for purposes like m…

Sinister
Sinister
Open Source Kali Post-Exploitation

Sinister is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info

sippts
sippts
Open Source

Set of tools to audit SIP based VoIP Systems

sipvicious
sipvicious
Free

SIPVicious OSS is a VoIP security testing toolset. It helps security teams, QA and developers test SIP-based VoIP systems and applications. …

Site-Scanner
Site-Scanner
Open Source

Site-Scanner - Web application vulnerability assessment tool.

sitedorks
sitedorks
Open Source Reconnaissance

Search Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term (dork) with a default set of websites, bug bounty programs or custom col…

SITF
SITF
Free

A comprehensive framework for analyzing and defending against attacks targeting Software Development Life Cycle Infrastructure.

Skater-.NET-Obfuscator
Skater-.NET-Obfuscator
Free Evasion

Skater .NET Obfuscator is an obfuscation tool for .NET code protection. It implements all known software protection techniques and obfuscati…

SketchCrapp
SketchCrapp
Free Reverse Engineering

SketchCrapp - Crack your Sketch.app in seconds :) Supports MacOS Big Sur. With respect from 1337 leet xnu crackers original founders: @elija…

skidfuscator-java-obfuscator
skidfuscator-java-obfuscator
Open Source Evasion Reverse Engineering

Public production-ready obfuscator using the MapleIR framework designed by cts

SkidSuite
SkidSuite
Free Evasion Reverse Engineering

A collection of java reverse engineering tools and informational links

skoolkit
skoolkit
Open Source Reverse Engineering

A suite of tools for creating disassemblies of ZX Spectrum games.

SkyArk
SkyArk
Open Source

SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS

SkyFall-Pack
SkyFall-Pack
Open Source Exploitation Post-Exploitation

Your Skyfall Infrastructure Pack

SkyRoads-Codex
SkyRoads-Codex
Free Reverse Engineering

Reverse engineering a DOS game with no source code using Codex 5.4

Slack
Slack
Open Source

slack-watchman
slack-watchman
Open Source Exploitation

Slack enumeration and exposed secrets detection tool

SlackPirate
SlackPirate
Open Source Exploitation

Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace

slash
slash
Open Source Reconnaissance

Slash is Automated Osint Tool that allows you to OSINT people by their username.

sleigh
sleigh
Open Source Reverse Engineering

Unofficial CMake build for Ghidra's C++ SLEIGH code

Sleuth Kit
Sleuth Kit
Open Source Kali Forensics

Collection of command-line tools and C library for analyzing disk images. Supports NTFS, FAT, Ext2/3/4, HFS+, and more. Foundation for Autop…

sleuthkit
sleuthkit
Free Forensics

The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file syst…

slicer
slicer
Open Source Evasion Reverse Engineering

A modern Java reverse engineering tool for the web.

Sliver
Sliver
Open Source Exploitation Post-Exploitation

Open-source C2 framework from BishopFox. Supports mTLS, WireGuard, HTTP/S, and DNS C2 channels. Features implant generation, pivoting, BOF s…

sliver
sliver
Open Source Kali Exploitation Post-Exploitation

Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform secu…

slopShell
slopShell
Open Source Evasion

the only php webshell you need.

slowloris
slowloris
Open Source

Low bandwidth DoS tool. Slowloris rewrite in Python.

SlowLoris
SlowLoris
Open Source Exploitation

Asynchronous Python implementation of SlowLoris DoS attack

slsa-github-generator
slsa-github-generator
Open Source

Language-agnostic SLSA provenance generation for Github Actions

sly1
sly1
Free Reverse Engineering

Decompilation of Sly Cooper and the Thievius Raccoonus for PS2

SM-A217F_forensics
SM-A217F_forensics
Free Forensics

Samsung modem commands over USB serial connection and secret dialer codes extracted from system packages

sm64tools
sm64tools
Open Source Reverse Engineering

Collection of tools for Super Mario 64 ROM hacking

Smart-Contract-Auditor-Tools-and-Techniques
Smart-Contract-Auditor-Tools-and-Techniques
Free

This repo contains a comprehensive list of smart contract auditor tools and techniques that can be utilized by both smart contract auditors …

SMBMap
SMBMap
Open Source Kali Scanning & Enumeration

Allows users to enumerate SMB shares across a domain, list share permissions, check drive access, and execute remote commands via authentica…

smda
smda
Open Source Reverse Engineering

SMDA is a minimalist recursive disassembler library that is optimized for accurate Control Flow Graph (CFG) recovery from memory dumps.

smokedmeat
smokedmeat
Open Source Exploitation

A CI/CD Red Team Framework for demonstrating Build Pipeline security risks.

smram_parse
smram_parse
Open Source Forensics

System Management RAM analysis tool

sms-sender
sms-sender
Open Source Kali

This script in python allows to send messages anonymously

smtp-tunnel-proxy
smtp-tunnel-proxy
Open Source Evasion

A high-speed covert tunnel that disguises TCP traffic as SMTP email communication to bypass Deep Packet Inspection (DPI) firewalls.

smtp-user-enum
smtp-user-enum
Open Source Scanning & Enumeration

SMTP user enumeration via VRFY, EXPN and RCPT with clever timeout, retry and reconnect functionality.

smugglefuzz
smugglefuzz
Open Source

A rapid HTTP downgrade smuggling scanner written in Go.

SmuggleShield
SmuggleShield
Open Source Exploitation

Protection against HTML smuggling attacks.

sn0int
sn0int
Open Source Reconnaissance Web Application

Semi-automatic OSINT framework and package manager

Sn1per
Sn1per
Free

Attack Surface Management Platform

SnafflerParser
SnafflerParser
Free

Parses Snaffler output file and generate beautified outputs.

Snake_Apple
Snake_Apple
Open Source Exploitation Reverse Engineering

Articles and tools related to research in the Apple environment (mainly macOS).

snapcrack
snapcrack
Free Password Attacks

API-Based Snapchat Brute-Force Tool [POC]

snapmap-archiver
snapmap-archiver
Open Source Reconnaissance

Download all Snap Map content from a specific location.

SNEK_Blue-War-Hammer
SNEK_Blue-War-Hammer
Free Exploitation Post-Exploitation

Blue Hammer by Nightmare-Eclipse Vulnerability Documentation & Reimplementation.

Sni5Gect-5GNR-sniffing-and-exploitation
Sni5Gect-5GNR-sniffing-and-exploitation
Open Source Exploitation

A 5G Sniffer and Downlink Injector Framework on steroids... And yes, Wireshark supported!!!

SniperPhish
SniperPhish
Open Source Social Engineering

SniperPhish - The Web-Email Spear Phishing Toolkit

snoop
snoop
Free Exploitation Reconnaissance

Snoop — инструмент разведки на основе открытых данных (OSINT world)

snoop
snoop
Open Source Reverse Engineering

A modern syscall tracer built on eBPF. Think strace, but with a real TUI, smart filters, TLS decryption, and output that's actually readable…

SNOWCTF
SNOWCTF
Open Source

CTF平台 | CTF竞赛 | CTF | CTF Platform | SCTF 是一个基于 Django 构建的开源 CTF(Capture The Flag)竞赛平台,支持二次元竞赛模板

snyk-maven-plugin
snyk-maven-plugin
Free

Test and monitor your projects for vulnerabilities with Maven. This plugin is officially maintained by Snyk.

soar-php
soar-php
Open Source Exploitation

SQL optimizer and rewriter(assisted SQL tuning). - SQL 优化器和重写器(辅助 SQL 调优)。

SOC-Analyst-Notes
SOC-Analyst-Notes
Open Source Forensics

Comprehensive SOC Analyst notes covering incident response, threat hunting, SOC workflows, and cybersecurity concepts—perfect for exam prep …

soc-ressources
soc-ressources
Open Source

Repository for SOC analysts, queries to investigate, advanced hunting, sites for analysis, malware samples, courses to improve skills, IOC a…

social-analyzer
social-analyzer
Open Source Reconnaissance

API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites

Social-Engineer Toolkit (SET)
Social-Engineer Toolkit (SET)
Open Source Kali Social Engineering

Open-source penetration testing framework designed for social engineering attacks. Features phishing attacks, credential harvesting, spear-p…

Social-Engineering-Tools
Social-Engineering-Tools
Open Source Reconnaissance Social Engineering

A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tools h…

Social-Media-OSINT
Social-Media-OSINT
Free Reconnaissance

Social Media OSINT collection containing - tools, techniques & tradecraft.

Social-Media-OSINT-Tools-Collection
Social-Media-OSINT-Tools-Collection
Open Source Reconnaissance

A collection of most useful osint tools for SOCINT.

SocialBox-Termux
SocialBox-Termux
Open Source Kali Password Attacks

SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By samsesh for termux …

SocialFish
SocialFish
Open Source Social Engineering

Phishing Tool & Information Collector

sociallinks-api
sociallinks-api
Free Reconnaissance

Social Links API: description, examples, trial access

socialosint
socialosint
Free Reconnaissance

A rust osint tool for getting emails, from a target, published in social networks like Instagram, Linkedin and Twitter for finding the possi…

SocialPhish
SocialPhish
Open Source Social Engineering

Advanced phishing tool | Automated Self-Hosting | SSH tunneling | 32+ Templates | Remastered version of xHak9x. (The only one you will find…

socialscan
socialscan
Open Source Reconnaissance

Python library for accurately querying username and email usage on online platforms

socid-extractor
socid-extractor
Open Source Reconnaissance

⛏️ Extract accounts info from personal pages on various sites for OSINT purpose

SOCMIntelligence
SOCMIntelligence
Free Reconnaissance

Identificazione profili, relazioni, organizzazioni e tracciare reti

sofa
sofa
Open Source Exploitation

SOFA | A MacAdmin's Simple Organized Feed for Apple Software Updates

sogen
sogen
Open Source Reverse Engineering

Solana-Auditors-Bootcamp
Solana-Auditors-Bootcamp
Free

Learn to audit Solana programs and help secure the ecosystem. Take your security practices to the next level and get certified by Ackee Bloc…

solved-hacking-problem
solved-hacking-problem
Free

:heavy_check_mark: My solutions for CTF & wargame challenges

Sooty
Sooty
Open Source Reconnaissance Social Engineering

The SOC Analysts all-in-one CLI tool to automate and speed up workflow.

sopa
sopa
Open Source Exploitation Post-Exploitation

A practical client for ADWS in Golang.

soSaver
soSaver
Open Source Evasion Forensics

A Frida-based utility for dynamically extracting native (.so) libraries from Android applications.

Sovereign_Watch
Sovereign_Watch
Open Source Reconnaissance

Distributed Multi-INT Fusion Center designed for decentralized situational awareness.

spamassassin-rules
spamassassin-rules
Open Source Social Engineering

Custom SpamAssassin rules I and others have made and contributed with - To mitigate spam mails and phishing mails now also with cool Phishta…

speakeasy
speakeasy
Open Source Forensics

Windows kernel and user mode emulation.

SpecialK
SpecialK
Open Source Reverse Engineering

Lovingly referred to as the Swiss Army Knife of PC gaming, Special K does a bit of everything.

SpeedPhish Framework (SPF)
SpeedPhish Framework (SPF)
Open Source Reconnaissance Social Engineering

Tool designed to allow quick and effective phishing exercises. Automates target gathering, email generation, website cloning, and credential…

Spell-Whisperer
Spell-Whisperer
Open Source Exploitation

Spell whisperer is a prompt injection challenges platform based on Grok API.

spellbook
spellbook
Free Exploitation

Framework for rapid development of offensive security tools

Spice86
Spice86
Open Source Reverse Engineering

Reverse engineer and rewrite real mode DOS programs!

spicedb
spicedb
Open Source

Open Source, Google Zanzibar-inspired database for scalably storing and querying fine-grained authorization data

spicedb-operator
spicedb-operator
Open Source

Kubernetes controller for managing instances of SpiceDB

SpicyPass
SpicyPass
Open Source

A light-weight password manager with a focus on simplicity and security

SpiderBOX
SpiderBOX
Open Source Reverse Engineering

SpiderFoot
SpiderFoot
Open Source Kali Reconnaissance

Automated OSINT tool that queries 200+ data sources to gather intelligence on IP addresses, domain names, email addresses, and usernames. In…

spiderfoot
spiderfoot
Open Source Reconnaissance

SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.

SpiderSuite
SpiderSuite
Free Reconnaissance

SpiderSuite releases, wiki and roadmap

spirit
spirit
Free Password Attacks

Spirit - Network Pentest Tools

spk
spk
Open Source Reconnaissance Scanning & Enumeration

spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.

sploitcraft
sploitcraft
Free Exploitation

🏴‍☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷

Splunk4DFIR
Splunk4DFIR
Open Source Forensics

Harness the power of Splunk for your investigations

Spoofy
Spoofy
Free Exploitation Social Engineering

Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.

spotify_monitor
spotify_monitor
Open Source Reconnaissance

Track Spotify friends' music activity in real time with auto-playback, skipped tracks detection and instant notifications

spotify_profile_monitor
spotify_profile_monitor
Open Source Reconnaissance

Track Spotify profile, follower and playlist changes in real time

spotlight_parser
spotlight_parser
Open Source Forensics

Read and extract data from macOS spotlight databases

Spray
Spray
Open Source Password Attacks

Password spraying tool for Active Directory environments. Designed to avoid account lockouts by spraying a single password across many accou…

spray
spray
Open Source Exploitation

最好用最智能最可控的目录Fuzz工具 | The most powerful, user-friendly, intelligent, and precise HTTP Fuzzer.

SpringBoot-Scan
SpringBoot-Scan
Open Source Exploitation

针对SpringBoot的开源渗透框架,以及Spring相关高危漏洞利用工具

sputnik
sputnik
Free Reconnaissance

Open Source Intelligence Browser Extension

SpyAI
SpyAI
Open Source Exploitation

Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's usi…

spyder-osint
spyder-osint
Open Source Forensics Reconnaissance

Spyder OSINT GUI — Graphical open-source intelligence research tool for phone number lookup, IP geolocation, social media reconnaissance, em…

spydithreatintel
spydithreatintel
Open Source Post-Exploitation Reconnaissance

Spydi ThreatIntel Feed is built on open-source threat intelligence, community-maintained blocklists, and public security research.

spyre
spyre
Open Source Forensics

_Spyre_ is a simple host-based IOC scanner built around the YARA pattern matching engine and other scan modules. The main goal of this proje…

SQL-101
SQL-101
Open Source Exploitation

Get started with SQL database programming. This beginner's guide provides step-by-step tutorials, practical examples, exercises, and resourc…

SQL-Injection-Payloads
SQL-Injection-Payloads
Free Exploitation Reconnaissance

This repository is a comprehensive collection of SQL Injection Payloads designed for educational, research, and testing purposes. It include…

sql-ultimate-course
sql-ultimate-course
Open Source Exploitation

The most comprehensive SQL guide from a real-world expert! Learn everything from basics to advanced queries, optimizations, and real-world S…

sqli-hunter
sqli-hunter
Free Exploitation Scanning & Enumeration

SQLi-Hunter is a simple HTTP / HTTPS proxy server and a SQLMAP API wrapper that makes digging SQLi easy.

SQLiDetector
SQLiDetector
Free Web Application

Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests with…

sqlifinder
sqlifinder
Free Exploitation Web Application

SQL Injection Vulnerability Scanner made with Python

SQLMap
SQLMap
Open Source Kali Exploitation Web Application

Automatic SQL injection and database takeover tool. Supports detection and exploitation of all major SQL injection types across MySQL, MSSQL…

sqlmap
sqlmap
Free Kali Exploitation Scanning & Enumeration

Automatic SQL injection and database takeover tool

sqlmap-gui
sqlmap-gui
Open Source

基于官版本 SQLMAP 进行人工汉化,并提供GUI界面及多个自动化脚本

sqlmap-skynet
sqlmap-skynet
Open Source Kali Exploitation

SQLMap with Autonomous AI, phased workflows, RAG memory, and MCP Agent Tools

sqlmap-wiki-zhcn
sqlmap-wiki-zhcn
Free Exploitation

GitBook 页面: [sqlmap.highlight.ink][host]

sqlmc
sqlmc
Open Source

Official Kali Linux tool to check all urls of a domain for SQL injections :)

SQLMutant
SQLMutant
Open Source Exploitation Reconnaissance

SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. It f…

SquatSquasher
SquatSquasher
Free Reconnaissance

Discovering Typo Squatting on your domains!

squealer
squealer
Open Source Reverse Engineering

Telling tales on you for leaking secrets!

SSH-KaliLinux
SSH-KaliLinux
Free Kali

A free SSH KaliLinux server (Segfault) without limited time,You can use this for test any tool or using kali linux tools or anything else.

ssh-mitm
ssh-mitm
Open Source

SSH-MITM - ssh audits made simple

sshame
sshame
Open Source Password Attacks

brute force SSH public-key authentication

sshimpanzee
sshimpanzee
Open Source Exploitation Post-Exploitation

SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)

SSI_Extra_Materials
SSI_Extra_Materials
Open Source

In my computer security courses I make extensive usage of cheatsheets for various tools and extra materials to complement the student learni…

sskit
sskit
Free

安全运维工具箱是一款面向安全运维场景的集成化利器,融合了资产管理、资产测绘、漏洞检测、配置核查、弱口令检测、批量化运维、漏洞跟踪、报告生成以及日志审计等核心功能模块。

SSL-AES-Reverse-Shell
SSL-AES-Reverse-Shell
Free

C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, while…

ssrf-exploit
ssrf-exploit
Open Source Kali Exploitation Web Application

an exploit of Server-side request forgery (SSRF)

SSRF-Testing
SSRF-Testing
Free Web Application

SSRF (Server Side Request Forgery) testing resources

SSRFmap
SSRFmap
Open Source Web Application

Automatic SSRF (Server-Side Request Forgery) fuzzer and exploitation tool. Tests for SSRF vulnerabilities and exploits them to reach interna…

SSRFmap
SSRFmap
Open Source Exploitation Web Application

Automatic SSRF fuzzer and exploitation tool

SSRFPwned
SSRFPwned
Open Source Exploitation Web Application

Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSRF

SSTImap
SSTImap
Open Source

Automatic SSTI detection tool with interactive interface

stalker
stalker
Open Source Web Application

Red Kite, the Extensible Attack Surface Management tool.

StalkPhish-OSS
StalkPhish-OSS
Open Source Reconnaissance Social Engineering

StalkPhish-OSS - The Phishing kits stalker, harvesting phishing kits for investigations.

Stardox
Stardox
Open Source Reconnaissance

Github stargazers information gathering tool

starflight-reverse
starflight-reverse
Free Reverse Engineering

Reverse engineered game Starflight (1986)

Starkiller
Starkiller
Open Source Post-Exploitation

Starkiller is a Frontend for PowerShell Empire.

static-files
static-files
Open Source Social Engineering

A collection of static files maintained by the Sublime team, primarily used for phishing defense.

Static-Reverse-Engineering-SRE
Static-Reverse-Engineering-SRE
Free Forensics Reverse Engineering

SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool

SteaLinG
SteaLinG
Free

The SteaLinG is an open-source penetration testing framework designed for social engineering

steam-osint
steam-osint
Free Reconnaissance

This tool will help you find a mutual friend

SteamAppInfo
SteamAppInfo
Open Source Reverse Engineering

Parser for appinfo.vdf and packageinfo.vdf files used by the Steam client

SteamKit
SteamKit
Open Source Reverse Engineering

SteamKit2 is a .NET library designed to interoperate with Valve's Steam network. It aims to provide a simple, yet extensible, interface to p…

SteamTracking
SteamTracking
Free Reverse Engineering

🕵 Tracking things, so you don't have to

Steganography
Steganography
Open Source

Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB ext…

stegbrute
stegbrute
Open Source Password Attacks

Fast Steganography bruteforce tool written in Rust useful for CTF's

stegcloak
stegcloak
Free

Hide secrets with invisible characters in plain text securely using passwords 🧙🏻‍♂️⭐

StegoForge
StegoForge
Open Source Forensics

The ultimate steganography and digital forensics toolkit. Hide and extract data across images, audio, video, documents, and network packets,…

StegOnline
StegOnline
Free

A web-based, accessible and open-source port of StegSolve.

SteppingStones
SteppingStones
Open Source Exploitation Post-Exploitation

A hub for Red Team activity to aid in record keeping, situational awareness and reporting. Stepping Stones provides a web based UI for the t…

stix-shifter
stix-shifter
Free

This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return results …

Storm-Breaker
Storm-Breaker
Free Social Engineering

Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}

Stowaway
Stowaway
Open Source Exploitation

👻Stowaway -- Multi-hop Proxy Tool for pentesters

strangerstrings
strangerstrings
Free Forensics Reverse Engineering

A little tool to filter the stranger strings from a binary so you can analyze the good ones

streamingphish
streamingphish
Open Source Social Engineering

Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.

STRIDE
STRIDE
Open Source Reverse Engineering

simple type recognition in decompiled executables

stringcare-android
stringcare-android
Open Source Evasion Reverse Engineering

Android library to reveal or obfuscate strings and assets at runtime

StringReloads
StringReloads
Free Reverse Engineering

A tool to inject strings into a game using low level code

stringsext
stringsext
Free Forensics

Find multi-byte-encoded strings in binary data (Gitlab mirror).

stringsifter
stringsifter
Open Source Forensics Reverse Engineering

A machine learning tool that ranks strings based on their relevance for malware analysis.

strix
strix
Open Source

Open-source AI hackers to find and fix your app’s vulnerabilities.

stuff
stuff
Open Source Exploitation Reverse Engineering

Unsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest

stunner
stunner
Free Exploitation

Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers.

Stuxnet-Rootkit
Stuxnet-Rootkit
Free Forensics Reverse Engineering

Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis

SUASS
SUASS
Open Source Exploitation

one-stop resource for all things offensive security.

Sub-Drill
Sub-Drill
Free Reconnaissance Web Application

A very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.

subby
subby
Open Source Reconnaissance

An uber fast and simple subdomain enumeration tool using DNS and web requests with support for detecting wildcard DNS records.

SubDomainizer
SubDomainizer
Open Source Reconnaissance Web Application

A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.

subdomainsEnumerator
subdomainsEnumerator
Open Source Reconnaissance

A docker image which will enumerate, sort, unique and resolve the results of various subdomains enumeration tools.

Subdominator
Subdominator
Open Source Reconnaissance Web Application

The Internets #1 Subdomain Takeover Tool

Subdominator
Subdominator
Open Source Reconnaissance

SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty

SubDomz
SubDomz
Open Source Reconnaissance

An Automated Subdomain Enumeration Tool

subfalcon
subfalcon
Free Reconnaissance

subfalcon is a subdomain enumeration tool that allows you to discover and monitor subdomains for a given list of domains or a single domain.…

Subfinder
Subfinder
Open Source Kali Reconnaissance

Fast passive subdomain enumeration tool from ProjectDiscovery. Uses passive online sources including certificate transparency logs, DNS data…

subfinder
subfinder
Open Source Kali Reconnaissance

Fast passive subdomain enumeration tool.

SubgroupX
SubgroupX
Free

正规子群.AI Agent | SubgroupX: A high-performance AI Agent for offensive security, Coding, CTF operations, and active defense protocols. Archite…

Subhunter
Subhunter
Open Source Web Application

A fast subdomain takeover tool

subjack
subjack
Open Source Reconnaissance Web Application

DNS Takeover tool written in Go

sublime-platform
sublime-platform
Open Source Social Engineering

A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control,…

sublime-rules
sublime-rules
Open Source Social Engineering

Sublime rules for email attack detection, prevention, and threat hunting.

Subrake
Subrake
Open Source Reconnaissance

🚀 A DNS automated scanner and tool 🖱️ (Zone Transfer, DNS Zone Takeover, Subdomain Takeover).

subscraper
subscraper
Open Source Reconnaissance Scanning & Enumeration

Subdomain and target enumeration tool built for offensive security testing

subsnipe
subsnipe
Open Source

SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.

subVerison_GTAV_Hack
subVerison_GTAV_Hack
Open Source Exploitation

武器

SUDO_KILLER
SUDO_KILLER
Open Source Exploitation Post-Exploitation

A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific m…

Sudomy
Sudomy
Open Source Kali Reconnaissance Scanning & Enumeration

Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunti…

suForce
suForce
Open Source Password Attacks

Obtain a user's system password, this tool uses the su binary to perform a brute force attack until a successful collision occurs.

SUID3NUM
SUID3NUM
Open Source Exploitation Post-Exploitation

A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binari…

Sunder
Sunder
Open Source Exploitation

Windows rootkit designed to work with BYOVD exploits

super
super
Open Source Wireless

📡 SPR: Open Source, secure, user friendly and fast wifi routers for your home. One wifi password per device. Ad Blocking & Privacy Blocklist…

SuperLibrary
SuperLibrary
Free Kali Forensics Reverse Engineering

A massive, curated collection of information security books, study guides, cheat sheets, and resources. This library is intended for educati…

superman
superman
Open Source Exploitation

🤖 Kill The Protected Process 🤖

Supernova
Supernova
Open Source Evasion Exploitation

Real fucking shellcode encryptor & obfuscator tool

sussyfinder
sussyfinder
Open Source Forensics

Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface

suzaku
suzaku
Open Source Forensics

Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.

svg_phishing_tools
svg_phishing_tools
Open Source Forensics Social Engineering

SVG Analysis and generation tools for commonly seen SVG attachment phishing

swarmer
swarmer
Open Source Exploitation Post-Exploitation

A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN

swift_reversing
swift_reversing
Free Reverse Engineering

My ongoing primer on reversing Swift

swift-confidential
swift-confidential
Open Source Evasion

Swift literals obfuscator to defend against static reverse engineering.

swiss-bugbounty-programs
swiss-bugbounty-programs
Free Web Application

List of bug bounty and coordinated vulnerability disclosure programs of companies/organisations in Switzerland

switchsearch
switchsearch
Free Reconnaissance

Minimalistic intuitive search engine switcher

SwizGuard
SwizGuard
Open Source Evasion

A self-hosted "Stealth VPN" implementation, forked from xray-core and WireGuard. It makes your traffic look like normal TLS traffic but litt…

SydneyQt
SydneyQt
Free Reverse Engineering

A cross-platform desktop client for the jailbroken New Bing AI Copilot (Sydney ver.) built with Go and Wails (previously based on Python and…

sylva
sylva
Open Source Reconnaissance

Simplify the link between social and real identities

symbiote
symbiote
Open Source Kali Social Engineering

Your target's phone's front and back cameras📸 can be accessed by sending a link🔗.

SymbolicAccess
SymbolicAccess
Open Source Reverse Engineering

Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB

SymLM
SymLM
Open Source Reverse Engineering

Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedding…

Synergy-httpx
Synergy-httpx
Open Source Exploitation

A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving conten…

SysCaller
SysCaller
Open Source Evasion Exploitation

SysCaller: SDK for WindowsAPI via syscalls. Dynamic Resolution, Obfuscation, Multi-Language Bindings, & more!

syser
syser
Free Reverse Engineering

syser debugger x32/x64 ring3 with source level debugging/watch view/struct view

sysmon-modular
sysmon-modular
Open Source

A repository of sysmon configuration modules

sysreptor
sysreptor
Free

A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automate y…

system-programming-roadmap
system-programming-roadmap
Free Reverse Engineering

A roadmap to teach myself compiler dev, malware reverse engineering, exploitation and kernel dev fundamentals

system3
system3
Open Source Post-Exploitation

system3, Samsung's worst nightmare for a 3rd time!

systrack
systrack
Open Source Reverse Engineering

📡🐧 Linux kernel syscall implementation tracker

syswarden
syswarden
Open Source

🐧 SysWarden is an ultra-lightweight Host-based Security Orchestrator for Linux.

syzkaller
syzkaller
Open Source Scanning & Enumeration

syzkaller is an unsupervised coverage-guided kernel fuzzer

tabby
tabby
Open Source

A CAT called tabby ( Code Analysis Tool )

tactical-exploitation
tactical-exploitation
Open Source Password Attacks Post-Exploitation

Modern tactical exploitation toolkit.

tailpipe
tailpipe
Open Source Forensics

select * from logs; Tailpipe is an open source SIEM for instant log insights, powered by DuckDB. Analyze millions of events in seconds, righ…

Taint-Rev-Trace
Taint-Rev-Trace
Open Source Reverse Engineering

支持MCP调用的ARM Trace污点追踪与条件搜索工具,集成可视化UI、ARM64污点追踪分析与大文件Trace搜索。

takenaka
takenaka
Open Source Evasion

A Kotlin library for reconciling multiple obfuscation mapping files from multiple versions of Minecraft: JE.

TangGo
TangGo
Free Exploitation Scanning & Enumeration

TangGo测试平台是无糖信息技术有限公司集多年渗透测试实战经验设计和开发的国产化综合性测试平台,为软件测试、网络安全从业人员提供强大且易用的测试工具及多人协同的工作环境,主要用于Web站点的功能测试、安全测试和安全评估。

Tangled
Tangled
Open Source Exploitation Social Engineering

Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.

TangledWinExec
TangledWinExec
Open Source Exploitation Reverse Engineering

PoCs and tools for investigation of Windows process execution techniques

tanto
tanto
Open Source Reverse Engineering

Tantō slices functions into more consumable chunks

tap-ducky
tap-ducky
Open Source Exploitation

Turns any rooted phone into the legendary USB Rubber Ducky. Android USB HID Keystroke Injector

taranis-ai
taranis-ai
Free Reconnaissance

Taranis AI is an advanced Open-Source Intelligence (OSINT) tool, leveraging Artificial Intelligence to revolutionize information gathering a…

tardis
tardis
Open Source

Collection of past CTFs to play and practice locally.

tartufo
tartufo
Open Source

Searches through git repositories for high entropy strings and secrets, digging deep into commit history

taser
taser
Open Source

Python resource library for creating security related tooling

tcpflow
tcpflow
Open Source Forensics

TCP/IP packet demultiplexer. Download from:

tcpproxy
tcpproxy
Open Source Reverse Engineering

Intercepting TCP proxy to modify raw TCP streams using modules on incoming or outgoing traffic

TeamsEnum
TeamsEnum
Open Source Exploitation Reconnaissance

User Enumeration of Microsoft Teams users via API

TelecordC2
TelecordC2
Open Source Post-Exploitation

Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷

Telegram-OSINT
Telegram-OSINT
Free Reconnaissance

In-depth repository of Telegram OSINT resources covering, tools, techniques & tradecraft.

telegram-tracker
telegram-tracker
Free Reconnaissance

The package connects to Telegram's API to generate JSON files containing data for channels, including information and posts. It allows you t…

TelegramDB
TelegramDB
Free Reconnaissance

TelegramDB is a service that allows you to search for channels, groups and their members.

TelegramOSINT
TelegramOSINT
Open Source Reconnaissance

A curated collection of tools, bots, and resources for Open Source Intelligence (OSINT) investigations on Telegram. Includes chat analysis m…

TelegramRAT
TelegramRAT
Open Source Evasion

Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions

telemt
telemt
Free Evasion

MTProxy for Telegram on Rust + Tokio

Telephone-OSINT
Telephone-OSINT
Free Reconnaissance

You will find helpful telephone number OSINT tools on this page. Telephone OSINT can be tricky as there are not that many open databases. …

teler-waf
teler-waf
Open Source

teler-waf is a Go HTTP middleware that protects local web services from OWASP Top 10 threats, known vulnerabilities, malicious actors, botne…

Telespot
Telespot
Open Source Reconnaissance

🔭TeleSpot OSINT lookup from Telephone number using DDGR + BING + GOOGLE + DEHASHED and uses pattern recognition correlations. NOW with Teles…

Telespotter
Telespotter
Open Source Reconnaissance

🦀 A version of Telespot in RUST - a tool that searches telephone numbers across Google, Bing, DuckDuckGo, and Dehashed for phone numbers and…

temodar-agent
temodar-agent
Open Source Reconnaissance Web Application

Temodar Agent is an AI-powered WordPress plugin and theme security analysis platform built for security researchers, product security teams,…

tempesta
tempesta
Open Source Web Application

Web application acceleration, advanced DDoS protection and web security

templates
templates
Free

为了方便打包, 大部分情况下, 会将这些配置文件转为json后压缩, 生成为templates.go文件, 进行加载.

tenda-reverse
tenda-reverse
Free Reverse Engineering

Reverse engineering, getting root access to Tenda MW6 wifi mesh router

tensor-trust
tensor-trust
Open Source

A prompt injection game to collect data for robust ML research

tensorflow-rce
tensorflow-rce
Open Source Exploitation

RCE PoC for Tensorflow using a malicious Lambda layer

tenzir
tenzir
Open Source Forensics

Tenzir is the data pipeline engine for security teams.

TerminatorZ
TerminatorZ
Open Source Exploitation

TerminatorZ is a highly sophisticated and efficient Offensive CVE Exploitation Framework that scans for top potential vulnerabilities with k…

termux-nethunter
termux-nethunter
Open Source Kali

Install Kali NetHunter Rootless on Android.

Termux-Os
Termux-Os
Open Source Kali

All in One Termux Os..!! (New)

termux-snippets
termux-snippets
Open Source

An integrated tool and a collection of snippets which helps in the various aspects of the terminal.

TermuxHub
TermuxHub
Open Source

Android app that indexes Termux tools from metadata.

terra
terra
Open Source Reconnaissance

OSINT Tool on Twitter and Instagram.

terracognita
terracognita
Open Source Reverse Engineering

Reads from existing public and private cloud providers (reverse Terraform) and generates your infrastructure as code on Terraform configurat…

terraform-aws-secure-baseline
terraform-aws-secure-baseline
Open Source

Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations and AWS Foun…

TgUserDetails
TgUserDetails
Open Source Reconnaissance

Fetch detailed Telegram user and chat info using this Python script with Telethon. Download profile pictures and more!

th06
th06
Free Reverse Engineering

Decompilation of 東方紅魔郷 ~ the Embodiment of Scarlet Devil (1.02h)

Th3inspector
Th3inspector
Open Source Reconnaissance Scanning & Enumeration

Th3Inspector 🕵️ Best Tool For Information Gathering 🔎

THC-Archive
THC-Archive
Free Exploitation

All releases of the security research group (a.k.a. hackers) The Hacker's Choice

thc-ipv6
thc-ipv6
Open Source

THC-IPV6-ATTACK-TOOLKIT (c) 2005-2022 vh@thc.org https://github.com/vanhauser-thc/thc-ipv6

THE_HIVE
THE_HIVE
Free Exploitation Reverse Engineering

My public notes about offensive security

The-Awesome-And-Dangerous-collection
The-Awesome-And-Dangerous-collection
Free Evasion Forensics

A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. None o…

The-Black-Tiger
The-Black-Tiger
Open Source Reconnaissance

The Black Tiger is all in one OSINT Tool, which has the best methods to collect Information about something or someone just by few mouse cli…

the-endorser
the-endorser
Open Source Reconnaissance

An OSINT tool that allows you to draw out relationships between people on LinkedIn via endorsements/skills.

the-nuclei-templates
the-nuclei-templates
Open Source Exploitation Scanning & Enumeration

Nuclei templates written by geeknik. Claude is my co-pilot. 🤖

TheBigBrother
TheBigBrother
Open Source Exploitation Reconnaissance

The Big Brother V4.0 is a weaponized OSINT platform featuring username enumeration (473+ platforms), quad-vector visual intelligence, Sky Ra…

TheCodexRebirth
TheCodexRebirth
Open Source Evasion Reverse Engineering

Taint Analysis Engine and Trace Exploration : Overcome Obfuscation

thecrowler
thecrowler
Open Source Reconnaissance

A Content Discovery and Development Platform. Empowering Cybersecurity, AI, Marketing, and Finance professionals and researchers to discover…

TheCyberHub
TheCyberHub
Free

Welcome to TheCyberHUB, a community-driven platform for hackers, cybersecurity enthusiasts, and IT professionals. Our platform provides a va…

thedevilseye
thedevilseye
Free Reconnaissance

An osint tool that uses Ahmia.fi to get hidden services and descriptions that match with the users query.

theHarvester
theHarvester
Open Source Kali Reconnaissance

Gathers emails, subdomains, hosts, employee names, open ports, and virtual hosts from public sources including Google, Bing, LinkedIn, Shoda…

theHarvester
theHarvester
Free Kali Exploitation Reconnaissance

E-mails, subdomains and names Harvester - OSINT

TheHive4py
TheHive4py
Open Source Forensics

thehive4py the de facto Python API client of TheHive …

themida-unmutate
themida-unmutate
Open Source Evasion

Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.

ThePhish
ThePhish
Open Source Forensics Social Engineering

ThePhish: an automated phishing email analysis tool

ThePwnPal
ThePwnPal
Open Source Kali

Creating a pocket-sized network pentesting device, offering standalone power, an LCD touch display, and flexibility to conduct on-the-go hac…

TheScrapper
TheScrapper
Open Source Reconnaissance

Scrape emails, phone numbers and social media accounts from a website.

TheTick
TheTick
Open Source Exploitation

The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.

TheTimeMachine
TheTimeMachine
Open Source Reconnaissance Scanning & Enumeration

Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not

theZoo
theZoo
Free Forensics

A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open an…

thorium
thorium
Free Forensics

A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.

thread_namecalling
thread_namecalling
Free Exploitation

Process Injection using Thread Name

Threat-Actor-Usernames-Scrape
Threat-Actor-Usernames-Scrape
Free Reconnaissance

A collection of intel and usernames scraped from various cybercrime sources & forums. DarkForums, HackForums, Patched, Cracked, BreachForums…

threat-hostlist
threat-hostlist
Free Reconnaissance Social Engineering

Comprehensive domain blocklists for 🚨 threats (🕷malware, 🎣phishing, 🕵️spyware, 🤖botnets). Ideal for DNS-based filtering tools like Pi-Hole, …

Threat-Hunting
Threat-Hunting
Open Source Evasion

Jupyter notebooks for threat hunting

Threat-Intel
Threat-Intel
Open Source Reconnaissance

Threat-Intel repository. API: https://github.com/davidonzo/apiosintDS

threat-intel-hub
threat-intel-hub
Open Source

🔥 一个集成多源威胁情报的聚合平台,为安全研究人员和运维团队提供实时威胁情报查询和播报服务;集成阿里云WAF主动拦截威胁IP,钓鱼邮件实时监测,集成AI等多项常用安全类工具🔧

Threat-Surface
Threat-Surface
Open Source Reconnaissance

Threat-Surface helps with daily tracking of exposed servers, open ports, and infrastructure used by threat actors.

ThreatFox-IOC-IPs
ThreatFox-IOC-IPs
Open Source Post-Exploitation Reconnaissance

Machine-readable .txt IP blocklist from ThreatFox by Abuse.ch, updated every hour.

ThreatHunting-Keywords
ThreatHunting-Keywords
Free Exploitation Forensics

Awesome list of keywords and artifacts for Threat Hunting sessions

ThreatHunting-Keywords-yara-rules
ThreatHunting-Keywords-yara-rules
Free Forensics

yara detection rules for hunting with the threathunting-keywords project

ThreatIntel-Reports
ThreatIntel-Reports
Free Forensics

Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports

ThreatIntelligence
ThreatIntelligence
Free Exploitation Post-Exploitation

This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity professionals…

ThreatMapper
ThreatMapper
Open Source

Open Source Cloud Native Application Protection Platform (CNAPP)

ThreatTracer
ThreatTracer
Open Source Exploitation

ThreatTracer - A tool to identify CVE by name & version and more by @FR13ND0x7F

thug
thug
Open Source Evasion

Python low-interaction honeyclient

ThunderSearch
ThunderSearch
Open Source Reconnaissance

macOS上的小而美【Fofa、Shodan、Hunter、Zoomeye、Quake网络空间搜索引擎】闪电搜索器;GUI图形化(Mac/Windows)渗透测试信息搜集工具;资产搜集引擎;hw红队工具hvv

TIA
TIA
Open Source Reconnaissance

Your Advanced Twitter stalking tool

TibaneC2
TibaneC2
Open Source Exploitation Post-Exploitation

A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).

tidy
tidy
Open Source Password Attacks

A command-line tool for combining and cleaning large word list files.

tik-spyder
tik-spyder
Free Reconnaissance

A Python command-line tool designed to collect TikTok data using SerpAPI for Google search results and Apify for TikTok data extraction.

TikNib
TikNib
Open Source Reverse Engineering

Binary Code Similarity Analysis (BCSA) Tool

TikTok-Mass-Reporter
TikTok-Mass-Reporter
Open Source

This Is A Simple Undetected Tool That Can Mass Report Tiktok Accounts & Videos Aggressively

TikTok-OSINT
TikTok-OSINT
Open Source Reconnaissance

TikTok Social Media Open Source Intellegence Tool

tiktok-reverse-engineering
tiktok-reverse-engineering
Free Reverse Engineering

Reverse engineering TikTok's JavaScript VM - 77 opcodes mapped, string deobfuscation, bytecode disassembly, and crypto function identificati…

TikTok-User-Info-Scraper
TikTok-User-Info-Scraper
Open Source Reconnaissance

TikTok User Info Scraper allows you to fetch detailed information about TikTok users by their username or user ID, without requiring logins …

TiltedEvolution
TiltedEvolution
Free Reverse Engineering

timesketch
timesketch
Open Source Forensics

Collaborative forensic timeline analysis

tiny_tracer
tiny_tracer
Open Source Forensics Reverse Engineering

A Pin Tool for tracing API calls etc

tiny-dec
tiny-dec
Open Source Reverse Engineering

A tiny educational decompiler that helps people understand how decompilation works.

Tiny-XSS-Payloads
Tiny-XSS-Payloads
Free Web Application

A collection of tiny XSS Payloads that can be used in different contexts. https://tinyxss.terjanq.me

Tinyriser
Tinyriser
Free Reverse Engineering

Cooler/cuter riser for Lenovo 8th/9th gen Tiny5 PCs

TinySecrets
TinySecrets
Free Reverse Engineering

Technical information about small 1L Lenovo, Dell, HP and Acer PCs

TireFire
TireFire
Free Scanning & Enumeration

Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortable G…

tirreno
tirreno
Open Source

tirreno is an open-source security framework. Event tracking, threat detection, and risk scoring for any application.

Titanium
Titanium
Open Source Kali Social Engineering

### THIS TOOL DOESN'T PROMOTE ANT TYPE OF ILLEGAL ACTIVITY ITS MADE ONLY FOR EDUCATIONAL PURPOSE AND TESTING.I DO NOT TAKE ANY RESPONSABILIT…

titus
titus
Open Source Exploitation

High-performance secrets scanner. CLI, Go library, Burp Suite extension, and Chrome extension. 487 detection rules with live credential vali…

TLDSweep
TLDSweep
Open Source Reconnaissance

TLDSweep is a domain intelligence OSINT tool that sweeps 800+ TLDs to find registered variants of a domain, flag newly registered lookalikes…

TokenUniverse
TokenUniverse
Open Source

An advanced tool for working with access tokens and Windows security policy.

Tomcat-webshell-application
Tomcat-webshell-application
Free Exploitation

A webshell application and interactive shell for pentesting Apache Tomcat servers.

tookie-osint
tookie-osint
Open Source Reconnaissance

Tookie is a advanced OSINT information gathering tool that finds social media accounts based on inputs.

Tool-VATINT
Tool-VATINT
Free Reconnaissance

Strumenti VATINT - Intelligence sui veicoli e sui trasporti

Tool-X
Tool-X
Open Source Kali

Tool-X works on any of the following operating systems: • Android (Using the Termux App) • Linux (Debian Based Systems) • Unix

toolbox-pentest-web
toolbox-pentest-web
Open Source

Docker toolbox for pentest of web based application.

ToolHunt
ToolHunt
Open Source

This is a local search engine to search for cybersecurity tools. It has 3000+ tools in it's database.

toolkit
toolkit
Free Forensics Reverse Engineering

The essential toolkit for reversing, malware analysis, and cracking

Tools
Tools
Open Source Reverse Engineering

Set of tools to manage and modify files from many various games.

ToolsFx
ToolsFx
Open Source

跨平台密码学工具箱。包含编解码,编码转换,加解密, 哈希,MAC,签名,大数运算,压缩,二维码功能,CTF等功能。

ToothPaste
ToothPaste
Open Source

Secure Wireless Data-Transfer over BLE and USB for Passwords, Pentesting and Media Control.

TOP
TOP
Free Exploitation

TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things

top-1m-domains
top-1m-domains
Free Reconnaissance

🌐 List of free and downloadable top 1M domain list (alexa alternatives) 📊

top-open-subtitles-sentences
top-open-subtitles-sentences
Free Password Attacks

Most common sentences and words for all languages in the OpenSubtitles2018 corpus with Python code

top25-parameter
top25-parameter
Free

For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙

TorBot
TorBot
Free Reconnaissance

████████╗ ██████╗ ██████╗ ██████╗ ██████╗ ████████╗ ╚══██╔══╝██╔═══██╗██╔══██╗ ██╔══██╗██╔═████╗╚══██╔══╝ ██║ ██║ ██║██████╔╝ ██████╔╝██║██╔…

TorCrawl.py
TorCrawl.py
Open Source Reconnaissance

Crawl and extract (regular or onion) webpages through TOR network

toriptables3
toriptables3
Free Kali Reconnaissance

Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor network.

toutatis
toutatis
Open Source Reconnaissance

Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails, phone numbers and more

Touti-Cracker
Touti-Cracker
Free

Touti Cracker is a cross-platform ethical hacking toolkit for educational purposes, featuring password cracking, WiFi auditing, and reverse …

toxnet
toxnet
Free Forensics Post-Exploitation

Decentralised P2P botnet using toxcore.

toxssin
toxssin
Open Source Exploitation Web Application

An XSS exploitation command-line interface and payload generator.

ToyBattlesHQ
ToyBattlesHQ
Open Source Reverse Engineering

ToyBattlesHQ serves as the central public repository for the server used by ToyBattles - the first (ever!) open-source server emulator for M…

Tp0tOJ
Tp0tOJ
Open Source

A CTF online judge platform developed by Tp0t.

TRACE-Forensic-Toolkit
TRACE-Forensic-Toolkit
Open Source Forensics

Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.

traceeshark
traceeshark
Open Source Forensics

Deep Linux runtime visibility meets Wireshark

TraceEye
TraceEye
Free Reconnaissance

TraceEye Multitool Join our discord : discord.gg/traceeye TraceEye is centered around discord and osint This project is free Please Support …

TRADFRI-Hacking
TRADFRI-Hacking
Free Reverse Engineering

Hacking IKEA TRÅDFRI products, such as light bulbs, window blinds and other accessories.

trape
trape
Free Reconnaissance Social Engineering

People tracker on the Internet: OSINT analysis and research tool by Jose Pino

Trawler
Trawler
Open Source Forensics Post-Exploitation

PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.

TraxOsint
TraxOsint
Open Source Reconnaissance

Osint tool for track ip adress

TrickDump
TrickDump
Free Post-Exploitation

Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!

Tricks-Pentest-Android-and-iOS-Applications
Tricks-Pentest-Android-and-iOS-Applications
Free Exploitation

Some Useful Tricks for Pentest Android and iOS Apps

Tricks-Web-Pentest
Tricks-Web-Pentest
Free Exploitation

Web Application Penetration Testing

Trinity
Trinity
Open Source Evasion Reverse Engineering

Software reverse engineering tool for Java

triskel
triskel
Open Source Reverse Engineering

A graphing library for Control Flow Graphs

Triton
Triton
Open Source Reverse Engineering

Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software veri…

Trivy
Trivy
Open Source Scanning & Enumeration

Comprehensive vulnerability and misconfiguration scanner for containers, Kubernetes, code repositories, and cloud infrastructure. Supports D…

trivy
trivy
Open Source Exploitation

Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more

trivy-operator
trivy-operator
Open Source

Kubernetes-native security toolkit

trivy-operator-dashboard
trivy-operator-dashboard
Open Source

Trivy Operator Dashboard: A comprehensive tool for Trivy Operator. Offers various dashboards and interactive pages where you can browse and …

TRLAU-menu-hook
TRLAU-menu-hook
Open Source Reverse Engineering

Reverse engineering, menu and patches for Tomb Raider Anniversary, Legend and Underworld.

troll-a
troll-a
Open Source

TroveKit
TroveKit
Open Source

An open-source, lightweight, fully offline, cross-platform toolbox.

truffleHog
truffleHog
Open Source Reconnaissance

Searches git repositories, S3 buckets, filesystems, and more for high-entropy strings and patterns that indicate secrets such as API keys an…

trufflehog
trufflehog
Open Source Reverse Engineering Scanning & Enumeration

Find, verify, and analyze leaked credentials

trufflehog-explorer
trufflehog-explorer
Free Reconnaissance

TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.

trump-code
trump-code
Open Source Password Attacks

🔐 AI decoding Trump's posts × stock market | AI 解碼川普推文 × 美股 | AIでトランプ投稿×株式市場を解読 — 31.5M models, 61.3% hit rate, open source

trusted-types
trusted-types
Free Web Application

A browser API to prevent DOM-Based Cross Site Scripting in modern web applications.

TRX
TRX
Open Source Reverse Engineering

Open source re-implementation of Tomb Raider I and Tomb Raider II, along with additional enhancements and bugfixes

TryHackMe
TryHackMe
Open Source Exploitation Reconnaissance

Master cybersecurity skills with this TryHackMe free path, includes a collection of my write-ups, solutions and progress tracking.

tryhackme-ctf
tryhackme-ctf
Open Source Exploitation

TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.

TryHackMe-Roadmap
TryHackMe-Roadmap
Free Forensics Post-Exploitation

a list of 350+ Free TryHackMe rooms to start learning cybersecurity with THM

TryHackMe-Roadmap
TryHackMe-Roadmap
Free Forensics Post-Exploitation

Hello, aspiring hackers! 🕵️‍♂️ Here’s a list of 500+ Free TryHackMe rooms to kickstart your cybersecurity journey. These rooms are absolutel…

TryHackMe-Walkthroughs
TryHackMe-Walkthroughs
Open Source

TryHackMe walkthroughs and CTF writeups created for self-practice and to help others understand web exploitation, privilege escalation, and …

TryHackMeRoadmap
TryHackMeRoadmap
Free Forensics Post-Exploitation

A list of 350+ free TryHackMe rooms💻 to kick off your cybersecurity learning, organized by topics for easy exploration and practical skill-b…

TS-OSINT
TS-OSINT
Free Reconnaissance Scanning & Enumeration

أداة (استخبارات المصادر المفتوحة-OSINT (Open-Source Intelligence

TSUKUYOMI
TSUKUYOMI
Free Reconnaissance

TSUKUYOMI is an advanced modular intelligence framework designed for the democratization of Intelligence Analysis via systematic analysis, p…

ttddbg
ttddbg
Open Source Reverse Engineering

Time Travel Debugging IDA plugin

TTPassGen
TTPassGen
Open Source Password Attacks

密码生成 flexible and scriptable password dictionary generator which can support brute-force、combination、complex rule mode etc...

TTPs
TTPs
Open Source Exploitation

Red Team Tactics, Techniques, and Procedures

tugarecon
tugarecon
Open Source Kali Reconnaissance

TugaRecon is an advanced subdomain reconnaissance and intelligence framework built for security researchers, penetration testers and OSINT p…

tulip
tulip
Open Source

Network analysis tool for Attack Defence CTF

turbinia
turbinia
Open Source Forensics

Automation and Scaling of Digital Forensics Tools

turbo-attack
turbo-attack
Open Source Exploitation

A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numbers…

turbo-scanner
turbo-scanner
Open Source Forensics Scanning & Enumeration

A port scanner and service detection tool that uses 1000 goroutines at once to scan any hosts IP or FQDN with the sole purpose of testing yo…

TW-Security-and-CTF-Resource
TW-Security-and-CTF-Resource
Open Source

twa
twa
Open Source Web Application

A tiny web auditor with strong opinions.

TweetFeed
TweetFeed
Free Reconnaissance Social Engineering

TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, I…

twistrs
twistrs
Open Source

A domain name permutation and enumeration library powered by Rust.

Twitch-Farmer
Twitch-Farmer
Free Exploitation

A bot that helps you to get more followers on Twitch

tx2hax
tx2hax
Free Exploitation

This is a mirror of https://codeberg.org/katze/tx2hax

typedb-cti
typedb-cti
Free Reconnaissance

Open Source Threat Intelligence Platform

Typhon
Typhon
Open Source

pyjail (python jail) 绕过 一把梭 CTF 工具

uac
uac
Open Source Forensics

UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It aut…

ubidump
ubidump
Open Source Reverse Engineering

Tool for viewing and extracting files from an UBIFS image

udbg
udbg
Free Exploitation Reverse Engineering

Cross-platform library for binary debugging and memory hacking written in Rust

udbserver
udbserver
Open Source Reverse Engineering

Unicorn Emulator Debug Server - Written in Rust, with bindings for C, Go, Java and Python

uddup
uddup
Open Source Reconnaissance

Urls de-duplication tool for better recon.

udon
udon
Open Source Reconnaissance

A simple tool that helps to find assets/domains based on the Google Analytics ID.

udpih
udpih
Open Source Exploitation

Exploit for the Wii U's USB Host Stack

uforall
uforall
Open Source Reconnaissance

uforall is a fast url crawler this tool crawl all URLs number of different sources, alienvault,WayBackMachine,urlscan,commoncrawl

Ultimate-RAT-Collection
Ultimate-RAT-Collection
Free Forensics

For educational purposes only, exhaustive samples of 500+ classic/modern trojan builders including screenshots.

Ultimate-Termux-Linux-Installer
Ultimate-Termux-Linux-Installer
Free

Ultimate-Termux-Linux-Installer

UltimateCMSWordlists
UltimateCMSWordlists
Open Source Password Attacks Scanning & Enumeration

📚 An ultimate collection wordlists of the best-known CMS

umium
umium
Open Source Evasion Reverse Engineering

Library containing Anti-RE and Anti-Debug methods.

UMLGraph
UMLGraph
Open Source Reverse Engineering

Declarative specification and drawing of UML diagrams

unauthorized
unauthorized
Free Exploitation

项目包含1 、FTP 未授权访问(21) 2 、LDAP 未授权访问(389) 3 、Rsync 未授权访问(873) 4 、ZooKeeper 未授权访问(2181) 5 、Docker 未授权访问(2375) 6 、Docker Registry未授权(5000) 7 、Ki…

unauthorized_com
unauthorized_com
Free Exploitation

未授权检测的命令行版V1.0,支持批量检测,导出结果,项目参考sqlmap使用随机user-agent。本项目有两个版本,一个是带有GUI界面的,一个是命令行版本,未授权检测目前不包括默认密码检测

unbrowse
unbrowse
Open Source Reverse Engineering

Unbrowse — api native browser skill/cli for any agent. Auto-discovers APIs from browser traffic, generates skills on the fly to call APIs di…

UnChain
UnChain
Free Reconnaissance

A tool to find redirection chains in multiple URLs

uncover
uncover
Open Source Reconnaissance

Quickly discover exposed hosts on the internet using multiple search engines.

UnderlayCopy
UnderlayCopy
Free Exploitation

PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk reads

underTheHoodOfExecutables
underTheHoodOfExecutables
Open Source Reverse Engineering

A guide that explains how programs transform from source code to executables. Deep dive into ELF format, linking processes, and binary optim…

unflutter
unflutter
Open Source Reverse Engineering

Static analyzer for Flutter/Dart AOT snapshots

unicis-platform-ce
unicis-platform-ce
Open Source

A modern, all-in-one Governance, Risk & Compliance (GRC) solution designed for privacy, security, and compliance teams. As an open-source al…

Unicorn
Unicorn
Open Source Evasion Exploitation

Simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Works with Metasploit payloads and custom she…

unicorn
unicorn
Open Source Reverse Engineering

Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, S390x, TriCore, X86)

Unicorn-Trace
Unicorn-Trace
Open Source Reverse Engineering

基于 Unicorn 引擎的轻量级 ARM64 动态追踪模拟工具。支持 IDA Pro、生成 Tenet 日志、本地代码模拟、内存转储、寄存器状态追踪和指令级日志记录。

UnifiedLogReader
UnifiedLogReader
Open Source Forensics

A parser for Unified logging tracev3 files

unifying
unifying
Open Source Reverse Engineering Wireless

FOSS re-implementation of the Logitech Unifying protocol

unipacker
unipacker
Open Source Reverse Engineering

Automatic and platform-independent unpacker for Windows binaries based on emulation

UniTools-Termux
UniTools-Termux
Free

Instalador hacking para termux

unix-privesc-check
unix-privesc-check
Open Source Kali Post-Exploitation

Shell script to check for simple privilege escalation vectors on Unix systems. Checks file permissions, sudo rights, SUID binaries, cron job…

unmeta
unmeta
Open Source Evasion

An Android Gradle plugin to remove all Kotlin Metadata annotations from the build output.

unmeta
unmeta
Open Source Evasion

remove all Kotlin Metadata and DebugMetadata annotations from .class files

UnofficialCrusaderPatch2
UnofficialCrusaderPatch2
Open Source Reverse Engineering

Unofficial balancing patch installer for Stronghold Crusader 1

UnpackThemida
UnpackThemida
Open Source Reverse Engineering

Dynamic Themida unpacker and import fixer for Themida/WinLicense 2.x and 3.x.

Unreal-Library
Unreal-Library
Open Source Reverse Engineering

Decompiler for Unreal package files (.upk, .u, .uasset; etc), with support for Unreal Engine 1, 2, and 3

Unseen
Unseen
Free Reconnaissance

To perform OSINT on an instagram profile

unve1ler
unve1ler
Open Source Social Engineering

A social engineering tool designed to seamlessly locate profiles using usernames while offering convenient reverse image search functionalit…

uofw
uofw
Free Reverse Engineering

The unofficial Official FirmWare, a complete latest PSP firmware reverse engineering project

upgopher
upgopher
Open Source Exploitation

This is a simple Go web server that allows users to upload files and view a list of the uploaded files. The server can be run locally or dep…

URL-obfuscator
URL-obfuscator
Open Source Evasion Social Engineering

Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation…

url-shorteners
url-shorteners
Free Reconnaissance Social Engineering

A comprehensive, high-quality URL shorteners domain list for whitelist/allowlist or blacklist/blocklist purposes, utilized by NextDNS, Contr…

url-status-checker
url-status-checker
Open Source Web Application

Status Checker is a Python tool for swiftly checking the status of URLs. It categorizes responses by HTTP status codes, offering clear insig…

url-tracker
url-tracker
Free Reconnaissance

Change monitoring app that checks the content of web pages in different periods.

urlcrazy
urlcrazy
Free Kali Exploitation Reconnaissance

Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.

urlfinder
urlfinder
Open Source Reconnaissance

A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.

urlhunter
urlhunter
Open Source Reconnaissance

a recon tool that allows searching on URLs that are exposed via shortener services

ursadb
ursadb
Open Source

Trigram database written in C++, suited for malware indexing

urx
urx
Open Source Reconnaissance

Extracts URLs from OSINT Archives for Security Insights

USB-Mouse-Pcap-Visualizer
USB-Mouse-Pcap-Visualizer
Free

USB mouse traffic packet forensic tool, mainly used to draw mouse movements and dragging trajectories

USB-WiFi
USB-WiFi
Free Kali Wireless

USB WiFi Adapter Information for Linux

usbrubberducky-payloads
usbrubberducky-payloads
Free

The Official USB Rubber Ducky Payload Repository

USBvalve
USBvalve
Open Source Forensics

Expose USB activity on the fly

Uscrapper
Uscrapper
Open Source Reconnaissance

Uscrapper Vanta: Dive deeper into the web with this powerful open-source tool. Extract valuable insights with ease and efficiency, from both…

Useful-Youtube-Channels
Useful-Youtube-Channels
Free Reverse Engineering

Useful Youtube Channels for Electronics and Mechanical

user-scanner
user-scanner
Open Source Reconnaissance Scanning & Enumeration

🕵️‍♂️ (2-in-1) Email & Username OSINT suite. Analyzes 195+ scan vectors (95+ email / 100+ username) for security research, investigations, a…

username-anarchy
username-anarchy
Open Source Kali Exploitation Reconnaissance

Username tools for penetration testing

username-generation-guide
username-generation-guide
Open Source Reconnaissance

A definitive guide to generating usernames for OSINT purposes

uspector-net
uspector-net
Open Source Scanning & Enumeration

Network scanner, LAN discovery & port audit tool for IPv4 networks

USSR
USSR
Open Source Reverse Engineering

Easily remove Unity splash screen & watermark.

utls
utls
Open Source Evasion

Fork of the Go standard TLS library, providing low-level access to the ClientHello for mimicry purposes.

UTMStack
UTMStack
Open Source Forensics

Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.

uusec-waf
uusec-waf
Open Source Exploitation Web Application

Industry-leading free, high-performance, AI and semantic technology Web Application Firewall and API Security Gateway (WAAP) - UUSEC WAF.

uwd
uwd
Open Source Exploitation

Rust library for call stack spoofing on Windows, allowing you to execute arbitrary functions with a forged call stack that evades analysis, …

v3-periphery
v3-periphery
Open Source Web Application

🦄 🦄 🦄 Peripheral smart contracts for interacting with Uniswap v3

VAC-Bypass
VAC-Bypass
Free Exploitation Reverse Engineering

(NO LONGER WORKS)

Valthrun
Valthrun
Free Exploitation

Valthrunner's Script 🚀 - The script for Valthrun.

VAmPI
VAmPI
Open Source

Vulnerable REST API with OWASP top 10 vulnerabilities for security testing

VARIOUS
VARIOUS
Open Source Exploitation Social Engineering

All-in-One Toolkit: Choose your favourite Warning: 🔒Encrypted script. Password required…

VcenterKit
VcenterKit
Open Source Exploitation

Vcenter综合渗透利用工具包 | Vcenter Comprehensive Penetration and Exploitation Toolkit

vdexExtractor
vdexExtractor
Open Source Reverse Engineering

Tool to decompile & extract Android Dex bytecode from Vdex files

VectorSmuggle
VectorSmuggle
Open Source Exploitation

Testing platform for covert data exfiltration techniques where sensitive documents are embedded into vector representations and tunneled out…

Vehicle-Security-Toolkit
Vehicle-Security-Toolkit
Open Source Exploitation Reverse Engineering

在 Ubuntu20.04(Python3.8及以上)完整安装可能需要几个小时。如果担心破坏本地环境,可以使用虚拟机,具体请看 dev。

Veil Framework
Veil Framework
Open Source Kali Evasion Exploitation

Tool designed to generate Metasploit payloads that bypass common antivirus solutions. Supports multiple programming languages for payload ge…

VeilTransfer
VeilTransfer
Open Source Exploitation

VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data exf…

velociraptor
velociraptor
Free Forensics

Velociraptor is a tool for collecting host based state information using The Velociraptor Query Language (VQL) queries.

Venera
Venera
Open Source Exploitation

A modular exploitation framework extensible with Lua

Venom
Venom
Open Source

A ring0 Loadable Kernel Module (Linux) for latest kernels 6.x

venom-instagram-bruteforce
venom-instagram-bruteforce
Open Source Kali Password Attacks

Instagram bruteforce attack tool with 10,000,000 passwords, custom password attack and string attack. Fast cooldown helps to bypass instagra…

Venoma
Venoma
Free Post-Exploitation

Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution

venus
venus
Open Source Post-Exploitation

A Visual Studio Code Extension agent for Mythic C2

veo
veo
Free

1、无效页面的过滤不精准,类似状态码200,实际内容返回404的这种情况,以及泛页面情况的出现,如何准确过滤掉是个问题。

VerifyVision-Pro
VerifyVision-Pro
Open Source Forensics

VerifyVision-Pro是一个全面的图像伪造篡改检测解决方案,利用深度学习(deep learning)和计算机视觉技术(cv)精确识别各类图像篡改,包括deepfake、AI生成内容、拼接操作和复制-移动篡改。基于PyTorch实现,集成了从数据处理、模型训练到部署的完…

vermilion
vermilion
Free Exploitation

Linux post exploitation tool for info gathering and exfiltration 🐧📡💀

vespasian
vespasian
Open Source Web Application

API discovery tool that maps attack surfaces from captured traffic and generates specs for REST, GraphQL, SOAP, and WebSocket APIs

vheap
vheap
Open Source Exploitation

Extendable Visualization & Exploitation tool for glibc heap

VHostScan
VHostScan
Open Source Web Application

A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, alias…

vibe-coding-penetration-tester
vibe-coding-penetration-tester
Open Source

Vibe Coding? Cool story. But your vibe might be "security breach waiting to happen." Introducing VibePenTester, the AI pen-tester who rolls …

vibe-security
vibe-security
Open Source Web Application

A comprehensive security checklist for vibe coders

vice
vice
Open Source

VICE is a security auditing CLI tool that finds vulnerabilities in your web applications.

ViDi
ViDi
Open Source Reverse Engineering

ViDi Visual Disassembler (experimental)

vietnamese-password-dicts
vietnamese-password-dicts
Free Password Attacks Wireless

Compiling a list of Vietnamese WiFi passwords for use with aircrack-ng

viewgen
viewgen
Open Source

Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys

viewstate
viewstate
Open Source Web Application

ASP.NET View State Decoder ==========================

Villain
Villain
Free Exploitation Post-Exploitation

Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality wi…

vimp
vimp
Open Source Exploitation

Aggregate vulnerability scans from multiple container image scanners to identify discrepancies and get comprehensive exposure analysis.

violent-python3
violent-python3
Free

Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 sta…

Viper
Viper
Free Exploitation Post-Exploitation

Adversary simulation and Red teaming platform with AI

viper
viper
Open Source Exploitation

🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Google…

ViperMonkey
ViperMonkey
Free Forensics

A VBA parser and emulation engine to analyze malicious macros.

Viridae
Viridae
Open Source Kali Forensics

Virus - Trojans - Worms - Malwares

virus.xcheck
virus.xcheck
Open Source Forensics

Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs fo…

virustotal-python
virustotal-python
Open Source Forensics

A Python library to interact with the public VirusTotal v3 and v2 APIs.

virustotal-vm-blacklist
virustotal-vm-blacklist
Open Source Evasion

yep full list of virustotal machines, OG REPO

virustream
virustream
Open Source Reconnaissance

A script to track malware IOCs with OSINT on Twitter.

vm_str.hpp
vm_str.hpp
Open Source Evasion Exploitation

vm_str.hpp is a header only string obfuscator.

VM-Packages
VM-Packages
Open Source Forensics Reverse Engineering

Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.

VMkatz
VMkatz
Open Source Post-Exploitation

Extract Windows credentials directly from VM memory snapshots and virtual disks

vmlinux-to-elf
vmlinux-to-elf
Open Source Reverse Engineering

A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)

vmon
vmon
Open Source Reverse Engineering

Tiny RISC-V machine code monitor written in RISC-V assembly.

vol3-linux-profiles
vol3-linux-profiles
Free Forensics

The goal of this project is to build and provide all possible Volatility3 profiles for the main Linux distributions in x86_64 version only.

Volatility 3
Volatility 3
Open Source Kali Forensics

Framework for extracting digital artifacts from volatile memory (RAM) dumps. Supports Windows, Linux, and macOS memory images. Extracts proc…

Volatility Workbench
Volatility Workbench
Free Forensics

Free GUI front-end for Volatility 3 memory forensics framework on Windows. Simplifies memory analysis workflow with dropdown plugin selectio…

volatility3
volatility3
Free Forensics

Volatility is the world's most widely used framework for extracting digital artifacts from volatile memory (RAM) samples. The extraction tec…

VolatilityPro
VolatilityPro
Free Forensics

一款用于自动化处理内存取证的Python脚本,并提供GUI界面

VOODOO
VOODOO
Open Source Exploitation

VOODOO is a Man in the browser attack framework for macOS. It comes with built-in keylogging, and scripting capabilities. VOODOO is highly e…

voyage
voyage
Open Source Reconnaissance

Voyage is a stateful subdomain enumeration tool that combines passive and active techniques, user-specific databases, and fine-grained contr…

VPNStatus
VPNStatus
Open Source Reverse Engineering

VPNStatus, a replacement for macOS builtin VPN Status

vps-audit
vps-audit
Open Source

lightweight, dependency-free bash script for security, performance auditing and infrastructure monitoring of Linux servers.

vryxen
vryxen
Open Source Exploitation

Next-Gen Stealer written in Go. Stealing from Chromium-Based & Firefox-Based Browsers, Crypto Wallets and more, from every user on every dis…

VscanPlus
VscanPlus
Open Source Exploitation Scanning & Enumeration

[VscanPlus内外网漏洞扫描工具]已更新HW热门漏洞检测POC。基于veo师傅的漏扫工具vscan二次开发的版本,端口扫描、指纹检测、目录fuzz、漏洞扫描功能工具,批量快速检测网站安全隐患。An open-source, cross-platform website v…

vscode-frida
vscode-frida
Open Source Reverse Engineering

Unofficial frida extension for VSCode

vscode-security-notes
vscode-security-notes
Free

Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝

vst2sdk
vst2sdk
Open Source Reverse Engineering

A clean room reverse engineering project for the VST 2.x interface.

VTIL-BinaryNinja
VTIL-BinaryNinja
Free Reverse Engineering

Binary Ninja plugin for loading VTIL routines and lifting VTIL instructions to LLIL for analysis.

vue-dompurify-html
vue-dompurify-html
Open Source Web Application

Safe replacement for the v-html directive

vulcat
vulcat
Open Source Exploitation

vulcat可用于扫描Web端常见的CVE、CNVD等编号的漏洞,发现漏洞时会返回Payload信息。部分漏洞还支持命令行交互模式,可以持续利用漏洞

vulhunt
vulhunt
Open Source Reverse Engineering

Vulnerability detection framework by Binarly's REsearch team

vuln-bank
vuln-bank
Open Source

A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure code r…

vulnapi
vulnapi
Open Source Web Application

API Security Vulnerability Scanner designed to help you secure your APIs.

vulnerability-db
vulnerability-db
Open Source Exploitation

Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers.

vulnerability-lookup
vulnerability-lookup
Open Source Exploitation

Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamline…

vulnerability-operator
vulnerability-operator
Open Source Exploitation

Scans SBOMs for vulnerabilities with Grype

Vulnerability-Wiki
Vulnerability-Wiki
Free Exploitation

一个基于 docsify 快速部署 Awesome-POC 漏洞文档的项目。Deploying the Awesome-POC repository via docsify.

vulnerable-drivers
vulnerable-drivers
Free Evasion Exploitation

vulnerable drivers for windows machines.

vulnerable-mcp-servers-lab
vulnerable-mcp-servers-lab
Open Source

A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.

Vulnerable-Web-Application
Vulnerable-Web-Application
Open Source Exploitation Web Application

OWASP Vulnerable Web Application Project https://github.com/hummingbirdscyber

vulnerablecode
vulnerablecode
Open Source Exploitation

A free and open vulnerabilities database and the packages they impact. And the tools to aggregate and correlate these vulnerabilities. Spons…

vulnix
vulnix
Open Source Exploitation

Vulnerability (CVE) scanner for Nix/NixOS [maintainer=@henrirosten]

Vulnogram
Vulnogram
Free Exploitation

Vulnogram is the tool for reserving, managing, and publishing CVEs. Get started at vulnogram.org or deploy Docker edition for full enterpris…

VulnPlanet
VulnPlanet
Open Source Exploitation Web Application

Vulnerable code snippets with fixes for Web2, Web3, API, iOS, Android and Infrastructure-as-Code (IaC)

vulnrepo
vulnrepo
Open Source Web Application

VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE,CVE,MITRE ATT&CK,PCI DSS, impo…

Vulny-Code-Static-Analysis
Vulny-Code-Static-Analysis
Free Reverse Engineering

Python script to detect vulnerabilities inside PHP source code using static analysis, based on regex

vulristics
vulristics
Open Source Exploitation

Extensible framework for analyzing publicly available information about vulnerabilities

vuls
vuls
Open Source Scanning & Enumeration

Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices

vulscan
vulscan
Free Exploitation Scanning & Enumeration

Advanced vulnerability scanning with Nmap NSE

vwradio
vwradio
Open Source Reverse Engineering

Reverse engineering Volkswagen car radios

vxlang-page
vxlang-page
Free Reverse Engineering

protector & obfuscator & code virtualizer

VySecator
VySecator
Free Evasion

VySecator Is a Python Script Obfuscation Tool, Which can be used to Obfuscate your hand written Malwares and your Hand Written Scripts!

w1tn3ss
w1tn3ss
Free Reverse Engineering

binary instrumentation, analysis, and patching framework

w3a_SOC
w3a_SOC
Free

元豚科技 - 基于日志安全分析做切入,做最好用的「云原生安全运维工作台」

w5
w5
Open Source

Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效

WA_CRASHER
WA_CRASHER
Open Source Kali

WhatsApp Crash With one Message

wacat
wacat
Open Source Scanning & Enumeration

wacat - Challenge Your Web App with Cat Chaos and AI-Driven Testing!

WADComs.github.io
WADComs.github.io
Open Source Exploitation Post-Exploitation

WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used again…

waf-bypass
waf-bypass
Open Source Web Application

Check your WAF before an attacker does

waiting_thread_hijacking
waiting_thread_hijacking
Free Exploitation

Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread

wakaru
wakaru
Open Source Reverse Engineering

🔪📦 Javascript decompiler for modern frontend

WALK_WebAssembly_Lure_Krafter
WALK_WebAssembly_Lure_Krafter
Open Source

A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims at …

wallpapers-for-kali
wallpapers-for-kali
Open Source Kali

Recolored Kali Linux wallpapers

WannaCry2.0
WannaCry2.0
Open Source Exploitation

🌐 Global Infection Map

WannaTool
WannaTool
Open Source Kali

ward
ward
Open Source Exploitation Reverse Engineering

Security scanner built for Laravel, detects misconfigurations, vulnerabilities, and exposed secrets with a beautiful TUI.

warden
warden
Open Source Exploitation

A Laravel package that proactively monitors your dependencies for security vulnerabilities by running automated composer audits and sending …

warlusts
warlusts
Free Password Attacks Reconnaissance

If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've ear…

Watcher
Watcher
Open Source Forensics Reconnaissance

Watcher - Open Source AI-powered Cyber Threat Intelligence & Hunting Platform. Developed with Django & React JS.

watchman
watchman
Open Source

AML/CTF/KYC/OFAC Search of global watchlist and sanctions

watchtower
watchtower
Open Source Exploitation

Watchtower is a simple AI-powered penetration testing automation CLI tool that leverages LLMs and LangGraph to orchestrate agentic workflows…

watchtower
watchtower
Open Source

AIShield Watchtower: Dive Deep into AI's Secrets! 🔍 Open-source tool by AIShield for AI model insights & vulnerability scans. Secure your AI…

waterbear
waterbear
Open Source Reverse Engineering

Assembler/Disassembler for the Dreamcast VMU

watermarkktp
watermarkktp
Free

Watermark KTP is a free and secure web-based tool that allows you to add a watermark to your scanned KTP (Indonesian ID card).

wayback-machine-downloader
wayback-machine-downloader
Free Reconnaissance

Wayback Machine Downloader for webmasters, OSINT researchers, and SEO specialists

WayBackupFinder
WayBackupFinder
Open Source

A passive way to find backups/ sensitive information.

wazuh
wazuh
Free Forensics

Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.

wazuh-ansible
wazuh-ansible
Free Forensics

These playbooks install and configure Wazuh agent, manager and indexer and dashboard.

wazuh-api
wazuh-api
Open Source Forensics

Wazuh API is an open source RESTful API to interact with Wazuh from your own application or with a simple web browser or tools like cURL.

wazuh-dashboard-plugins
wazuh-dashboard-plugins
Open Source Forensics

wazuh-docker
wazuh-docker
Free Forensics

The wazuh/wazuh-docker repository provides resources to deploy the Wazuh cybersecurity platform using Docker containers. This setup enables …

wazuh-documentation
wazuh-documentation
Free Forensics

Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response…

wazuh-packages
wazuh-packages
Open Source Forensics

Wazuh - Tools for packages creation

wazuh-puppet
wazuh-puppet
Open Source Forensics

This module installs and configure Wazuh agent and manager.

wazuh-ruleset
wazuh-ruleset
Free Forensics

This repository is in read-only mode and no longer used. Now, all the Wazuh ruleset related content is located at wazuh/ruleset.

wcdatool
wcdatool
Free Reverse Engineering

Watcom Disassembly Tool (wcdatool) - Tool to aid disassembling DOS applications created with the Watcom Toolchain

wconsole_extractor
wconsole_extractor
Open Source

WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a py…

wcreddump
wcreddump
Free

Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with a …

weakpass
weakpass
Open Source

Weakpass collection of tools for bruteforce and hashcracking

Web_Hacking
Web_Hacking
Free Exploitation Reconnaissance

Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.

Web-Cache-Vulnerability-Scanner
Web-Cache-Vulnerability-Scanner
Open Source

Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackma…

web-check
web-check
Open Source Reconnaissance

🕵️‍♂️ All-in-one OSINT tool for analysing any website

web-check-api
web-check-api
Free Reconnaissance

🩻 Web Check API - Xray Vision for any Website

Web-CTF-Cheatsheet
Web-CTF-Cheatsheet
Free

(效果同 )

web-fuzz-wordlists
web-fuzz-wordlists
Open Source Exploitation Web Application

Common Web Managers Fuzz Wordlists

Web-Fuzzing-Box
Web-Fuzzing-Box
Free Scanning & Enumeration

Web Fuzzing Box - Web 模糊测试字典与一些Payloads

web-security-fundamentals
web-security-fundamentals
Open Source Web Application

Mike North's Web Security Course

web-wordlist-generator
web-wordlist-generator
Open Source Exploitation

WEB-Wordlist-Generator creates related wordlists after scanning your web applications.

web2shell
web2shell
Open Source

Automate converting webshells into reverse shells.

web3-bug-bounty-hunting-ai-skills
web3-bug-bounty-hunting-ai-skills
Open Source Web Application

18 Claude Code skill files for smart contract security — built from 2,749 Immunefi reports, 681 DeFiHack reproductions, and real hunt experi…

webanalyze
webanalyze
Open Source Scanning & Enumeration

Port of Wappalyzer (uncovers technologies used on websites) to automate mass scanning.

webapp-wordlists
webapp-wordlists
Free Web Application

This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version contains …

WebcamBOF
WebcamBOF
Open Source Exploitation Post-Exploitation

Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options

webcopilot
webcopilot
Open Source Reconnaissance Scanning & Enumeration

An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vul…

webcrack
webcrack
Open Source Reverse Engineering

Deobfuscate obfuscator.io, unminify and unpack bundled javascript

webdork
webdork
Open Source Reconnaissance Web Application

A Python tool to automate some dorking stuff to find information disclosures.

WebExtractor
WebExtractor
Open Source Reconnaissance

WebExtractor is a powerful OSINT and ethical hacking tool developed in Python. It is used to extract email addresses, phone numbers, and lin…

WEBFANG
WEBFANG
Free Reconnaissance

WEBFANG, is my first CLI, a modular OSINT & Reconnaissance toolkit curated for Ethical Hackers and Red-Teamers. Sink fangs into web targets …

WebHashcat
WebHashcat
Open Source Password Attacks

WebHashcat is a very simple but efficient web interface for hashcat password cracking tool. It hash the following features: Distributed crac…

WebMap
WebMap
Open Source Exploitation Scanning & Enumeration

WebMap-Nmap Web Dashboard and Reporting

webpalm
webpalm
Open Source Exploitation Reconnaissance

WebPlotDigitizer
WebPlotDigitizer
Open Source Reverse Engineering

Computer vision assisted tool to extract numerical data from plot images.

WebSafeCompiler
WebSafeCompiler
Open Source Evasion

A powerfull websites compiler/obfuscator for optimization or intellectual property protection purposes.

WebSecurity-Academy-with-Python
WebSecurity-Academy-with-Python
Open Source Exploitation Web Application

Scripts for solving WebSecurity Academy labs of PortSwigger using Python

Webshell-bypass
Webshell-bypass
Free Web Application

A collection of advanced PHP and ASPX web shells designed to bypass security measures.

webshell-decryptor
webshell-decryptor
Free

通过获取到的webshell流量、url、key来还原攻击者使用webshell所做的操作。

WebSift
WebSift
Open Source Kali Reconnaissance

WebSift is an OSINT ethical hacking tool designed to scrape and extract emails, phone numbers, and social media links or other URLs from web…

Website-OSINT
Website-OSINT
Free Reconnaissance

You will find a wealth of resources to help with your Website investigations.

websploit
websploit
Open Source

This is a learning created by Omar Santos (@santosomar) for different Cybersecurity training sessions. It includes many intentionally vulner…

WeChat-Channels-Video-File-Decryption
WeChat-Channels-Video-File-Decryption
Open Source Reverse Engineering

一个可在线运行的微信视频号加密视频解密工具和 API 服务,基于逆向工程分析实现。本项目使用微信官方的 WebAssembly (WASM) 模块来生成 Isaac64 PRNG 密钥流,并通过 XOR 运算完成视频解密。

WEF
WEF
Open Source Kali Wireless

werdlists
werdlists
Open Source Reverse Engineering

:keyboard: Wordlists, Dictionaries and Other Data Sets for Writing Software Security Test Cases

wesng
wesng
Open Source Exploitation

Windows Exploit Suggester - Next Generation

Wfuzz
Wfuzz
Open Source Kali Scanning & Enumeration Web Application

Web application fuzzer that replaces any reference to the FUZZ keyword with a payload value. Supports multiple encoders, filters, iterators,…

wg-manager
wg-manager
Open Source Evasion

A easy to use WireGuard dashboard and management tool

wg-obfuscator
wg-obfuscator
Open Source Evasion

WireGuard Obfuscator - simple obfuscator for WireGuard. Useful if your ISP/government blocks WireGuard traffic.

wg-orchestrator
wg-orchestrator
Open Source

Complete WireGuard VPN management made easy. Zero-touch deployment with beautiful TUI & Web UI. One script = full VPN appliance.

Whaler
Whaler
Open Source Reverse Engineering

Program to reverse Docker images into Dockerfiles

WhatBreach
WhatBreach
Free Reconnaissance

OSINT tool to find breached emails, databases, pastes, and relevant information

whatfiles
whatfiles
Open Source Forensics

Log what files are accessed by any Linux process

whatsapp-osint
whatsapp-osint
Open Source Reconnaissance

WhatsApp spy - logs online/offline events from ANYONE in the world

WhatsAppHacking
WhatsAppHacking
Free

A Script to Crash WhatsApp With Just a Single Text And Inject a Payload In App Format to Hack and Extract All WhatsApp Media Files.

WhatsAppPatcher
WhatsAppPatcher
Free Reverse Engineering

A patcher that decompiles WhatsApp APK, patches the smali, recompiles and signs it.

whatslookup
whatslookup
Open Source Reconnaissance

Herramienta de OSINT para WhatsApp que permite obtener fotos de perfil, verificar cuentas Business, consultar estado e información de usuari…

WhatsMyName
WhatsMyName
Free Reconnaissance

This repository has the JSON file required to perform user enumeration on various websites.

WhatsMyName-Python
WhatsMyName-Python
Open Source Reconnaissance

As a regular contributor to Project WhatsMyName, this is a script I made for myself to check sites are working

WhatsOSINT
WhatsOSINT
Open Source Reconnaissance

View data of a WhatsApp number, including its status, photo, etc. 🕵🏽‍♂️

WhatWeb
WhatWeb
Open Source Kali Reconnaissance Web Application

Web scanner that identifies web technologies including CMS, blogging platforms, analytics packages, JavaScript libraries, server frameworks,…

WhatWeb
WhatWeb
Open Source Kali Reconnaissance Web Application

Developed by Andrew Horton urbanadventurer and Brendan Coles bcoles

whispers
whispers
Open Source

Identify hardcoded secrets in static structured text (version 2)

whispr
whispr
Open Source

A multi-vault secret injection tool for safely injecting secrets into app environment

white-deface
white-deface
Open Source Web Application

This is a simple python tool to automatically deface webdav vulnerable websites.

WhiteHat
WhiteHat
Free

A collection of AI-powered tools for phishing detection, adversarial machine learning, and cybersecurity research. Includes Streamlit/Flask …

Whoamifuck
Whoamifuck
Free Exploitation

用于Linux应急响应,快速排查异常用户登录情况和入侵信息排查,准确定位溯源时间线,高效辅助还原攻击链。

Whomrx-gpt
Whomrx-gpt
Free Kali

This is a Whomrx GPT which is related to the worm GPT and the natural enemy of the chat GPT {UPDATE 2025}

whos-on-my-network
whos-on-my-network
Free Wireless

Keep an eye on who and when something is connected to your network

WhoYouCalling
WhoYouCalling
Free Forensics Reverse Engineering

Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.

Wi-Fi-Jammer
Wi-Fi-Jammer
Free Wireless

Wi-Fi-Jammer Using Python Script As BlackHat

Wi-Phi
Wi-Phi
Open Source Reconnaissance Social Engineering

An IoT Integrated Fully Automatic WIreless PHIshing System / Advanced Wifi Pineapple

wicker-gui
wicker-gui
Free Wireless

automate wifi hacking with wicker

wifi-attack-tool
wifi-attack-tool
Free Kali Scanning & Enumeration

Wi-Fi Attack Automation Tool for Kali Linux and Termux automates Wi-Fi attacks like Deauthentication, Evil Twin, and WPA Handshake Capture. …

wifi-bf
wifi-bf
Open Source Wireless

A (completely native) python3 wifi brute-force attack using the 100k most common passwords (2021)

Wifi-Cracker
Wifi-Cracker
Open Source Password Attacks Wireless

Wifi-crackerX
Wifi-crackerX
Open Source Kali Wireless

Wifi-crackerX is a tool for hacking a WPS/WPA/WPA2 Networks

wifi-cracking
wifi-cracking
Open Source Password Attacks Wireless

Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat

wifi-deauth
wifi-deauth
Open Source Kali Wireless

A deauth attack that disconnects all devices from the target wifi network (2.4Ghz & 5Ghz), WPA3 also supported (PMF not tested)

WIFI-HACKING
WIFI-HACKING
Open Source Wireless

⚡Cyber Security Tool For Hacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2/TKIP/IES) hack…

wifi-hacking.py
wifi-hacking.py
Open Source Wireless

Cyber Security Tool For Hacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2/TKIP/IES) hacki…

WiFi-Mangoapple-Resources
WiFi-Mangoapple-Resources
Free Wireless

Helpful resources regarding the cheap DIY Wi-Fi Pineapple, AKA Wi-Fi Mangoapple to help with supported chipsets, configurations, errors, etc…

wifi-passview
wifi-passview
Open Source Social Engineering Wireless

An open source batch script based WiFi Passview for Windows!

WiFi-password-stealer
WiFi-password-stealer
Open Source

Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).

wifi-penetration-testing-cheat-sheet
wifi-penetration-testing-cheat-sheet
Open Source Web Application Wireless

This is more of a checklist for myself. May contain useful tips and tricks.

wifi-pineapple-cloner
wifi-pineapple-cloner
Free Exploitation Wireless

Port WiFi Pineapple NANO/TETRA in generic hardware

WiFiChallengeLab-docker
WiFiChallengeLab-docker
Open Source Wireless

Virtualized Wi-Fi pentesting laboratory without the need for physical Wi-Fi cards, using mac80211_hwsim. Docker version of WiFiChallenge Lab…

WifiForge
WifiForge
Open Source Kali Password Attacks Wireless

WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities.

WifiHack
WifiHack
Open Source Wireless

wifiphisher
wifiphisher
Open Source Social Engineering Wireless

The Rogue Access Point Framework

WifiPwnedd
WifiPwnedd
Open Source

Tool for Wifi Network Attacks

Wifite
Wifite
Open Source Kali Wireless

Automated wireless attack tool that attacks multiple WEP/WPA/WPA2/WPS encrypted networks in sequence. Runs airodump-ng, aireplay-ng, and air…

wifite2
wifite2
Open Source Wireless

Rewrite of the popular wireless network auditor, "wifite"

wifite2-requirements
wifite2-requirements
Free Wireless

This bash script will install wifite2 and its other tools Pyrit, bully, wireshark, hcxtools, hcxdumptool, macchanger

wii-ipl
wii-ipl
Free Reverse Engineering

Wii Menu Decompilation brought to you by fans.

wiki
wiki
Free Reverse Engineering

Various info regarding the hard-/software of the Xbox One gaming console family.

Willie-C2
Willie-C2
Free Evasion Post-Exploitation

A Golang implant that uses Discord as a C2 team server

WIN-FOR
WIN-FOR
Open Source Forensics

Windows Forensics Environment Builder

Win7Blue
Win7Blue
Open Source Exploitation

Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits

winappdbg
winappdbg
Free Forensics Scanning & Enumeration

What is WinAppDbg? ================== The WinAppDbg python module allows developers to quickly code instrumentation scripts in Python under …

windiff
windiff
Open Source Reverse Engineering

Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the OS.

windows-coerced-authentication-methods
windows-coerced-authentication-methods
Free Post-Exploitation

A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) with v…

windows-forensic-artifacts
windows-forensic-artifacts
Open Source Forensics

Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!

Windows-Local-Privilege-Escalation-Cookbook
Windows-Local-Privilege-Escalation-Cookbook
Open Source Post-Exploitation

Windows Local Privilege Escalation Cookbook

Windows-PE-Packer
Windows-PE-Packer
Open Source Reverse Engineering

🗜️ A packer for Windows x86 executable files written in C and Intel x86 Assembly. The new file after packing can obstruct reverse engineerin…

Windows-Post-Exploitation
Windows-Post-Exploitation
Free Post-Exploitation

Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contribution…

windows-sandbox-init
windows-sandbox-init
Open Source Forensics

Rapidly initialize Windows Sandbox for malware analysis and reverse engineering

WindowSpy
WindowSpy
Open Source Exploitation Post-Exploitation

WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.

WindsurfAPI
WindsurfAPI
Open Source Reverse Engineering

Windsurf-to-OpenAI compatible API proxy

WingHexExplorer2
WingHexExplorer2
Open Source Reverse Engineering

一个自由强大跨平台的十六进制编辑器 / A free, powerful, cross-platform hex editor

WinPwn
WinPwn
Open Source Exploitation Post-Exploitation

Automation for internal Windows Penetrationtest / AD-Security

winpwn
winpwn
Free

windows debug and exploit toolset for both user and kernel mode

wipedicks
wipedicks
Free Forensics

Wipe files and drives securely with random ASCII dicks

wipwn
wipwn
Open Source Wireless

Hack wifi using termux (rooted).

wireless-carplay-dongle-reverse-engineering
wireless-carplay-dongle-reverse-engineering
Open Source Reverse Engineering

CPlay2Air / Carlinkit Wireless Apple CarPlay Dongle reverse engineering

Wireshark
Wireshark
Open Source Kali Forensics Scanning & Enumeration

World's foremost network protocol analyzer. Captures and interactively browses traffic on a computer network. Supports hundreds of protocols…

witness
witness
Open Source

Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact proven…

WitnessMe
WitnessMe
Open Source Reconnaissance

Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to mak…

wmiexec2
wmiexec2
Free Exploitation

wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures fro…

wordfence-cli
wordfence-cli
Open Source Scanning & Enumeration

Wordfence malware and vulnerability scanner command line utility.

WordList
WordList
Free Password Attacks Reconnaissance

Custom wordlist, updated regularly

wordlist
wordlist
Open Source Password Attacks

All cyclone wordlists are frequency sorted by probability.

wordlist-br
wordlist-br
Open Source Password Attacks

Wordlist para auditoria de senhas, construída com foco em usuários Brasileiros.

wordlist-generator
wordlist-generator
Free Password Attacks

This tool helps to create a unique wordlist which can crack more than 50% of passwords using brute-force attack, so on social media sites s…

Wordlist-Hub
Wordlist-Hub
Open Source Password Attacks

Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utilized by…

wordlists
wordlists
Open Source Password Attacks Reconnaissance

Real-world infosec wordlists, updated regularly

wordlists
wordlists
Open Source Password Attacks

A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.

wordlists
wordlists
Open Source Password Attacks

Various wordlists FR & EN - Cracking French passwords

wordlists
wordlists
Free Reconnaissance Scanning & Enumeration

Infosec Wordlists and more.

wordlists
wordlists
Free Reconnaissance

📜 Yet another collection of wordlists

Wordlists
Wordlists
Free Password Attacks Scanning & Enumeration

[Custom || Automated] Curation & Collection of BugBounty Wordlists

wordlists-de
wordlists-de
Free Password Attacks

Wordlists in German for Diceware, BIP39 and Monero.

WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956
WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956
Free Exploitation Web Application

WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a Wo…

wordpress-malware
wordpress-malware
Free Exploitation Web Application

Collection of malware files found on hacked WordPress sites

Wordpress-XMLRPC-Brute-Force-Exploit
Wordpress-XMLRPC-Brute-Force-Exploit
Free Exploitation Web Application

Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield

Workflow-Bug-Bounty
Workflow-Bug-Bounty
Open Source Web Application

You can Support me by register or use digitalocean

worldmonitor
worldmonitor
Free Reconnaissance

Real-time global intelligence dashboard. AI-powered news aggregation, geopolitical monitoring, and infrastructure tracking in a unified situ…

worm-ai
worm-ai
Free Exploitation

Worm-AI uses a reverse-engineered Grok API wrapper originally developed here:

Worm-GPT-LLM-2026
Worm-GPT-LLM-2026
Open Source Scanning & Enumeration

High-performance C++ execution engine for LLM red-teaming and prompt engineering. Deploy dynamic jailbreak payloads, bypass alignment guardr…

WPAxFuzz
WPAxFuzz
Open Source Exploitation Scanning & Enumeration

A full-featured open-source Wi-Fi fuzzer

WPeChatGPT
WPeChatGPT
Free Reverse Engineering

A plugin for IDA that can help to analyze binary file, it can be based on commonly used AI big models such as OpenAI and DeepSeek.

wpgarlic
wpgarlic
Open Source Scanning & Enumeration Web Application

A proof-of-concept WordPress plugin fuzzer

wpprobe
wpprobe
Open Source Exploitation Reconnaissance

A fast WordPress plugin enumeration tool

WPScan
WPScan
Freemium Kali Web Application

WordPress security scanner. Enumerates WordPress installations for vulnerable plugins, themes, and configurations. Checks usernames, timthum…

write-up
write-up
Free

CTF write-ups written by me. Mostly crypto and blockchain!

write-ups
write-ups
Free Exploitation

Dans une tentative un peu vaine d'organiser le chaos, de donner une forme toute temporaire à tout ça, voici un index... (-----

writeup
writeup
Free

writeup-miner
writeup-miner
Open Source Web Application

This is a useful Python script for extracting bug bounty or any other write-ups from every RSS.

Writeups
Writeups
Free Exploitation Post-Exploitation

This repository contains writeups for various CTFs I've participated in (Including Hack The Box).

writeups
writeups
Free Reconnaissance

Official Writeups for DIVER OSINT CTF

writeups
writeups
Free

CTF writeups from The Flat Network Society

writeups
writeups
Free Reverse Engineering

Wiki-like CTF write-ups repository by ByteBandits

Writeups-and-Walkthroughs
Writeups-and-Walkthroughs
Free

wrongsecrets
wrongsecrets
Open Source Web Application

Vulnerable app with examples showing how to not use secrets

wscan
wscan
Free Exploitation Scanning & Enumeration

Wscan is a web security scanner that focuses on web security, dedicated to making web security accessible to everyone.

wstg
wstg
Free Web Application

The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.

WTF-CTF
WTF-CTF
Open Source

Collect CTFs related to evm, and provide solutions, using Foundry. 收集 EVM 类的 CTF 挑战,并提供解决方案。

www-project-csrfguard
www-project-csrfguard
Open Source Web Application

The aim of this project is to protect Java applications against CSRF attacks with the use of Synchronizer Tokens

www-project-threat-dragon
www-project-threat-dragon
Open Source Web Application

OWASP Foundation Threat Dragon Project Web Repository

wwwtree
wwwtree
Open Source Exploitation

A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesystem …

wxapkg
wxapkg
Free Reverse Engineering

跨平台微信小程序反编译 GUI 工具,.wxapkg 文件扫描 + 解密 + 解包工具

X-hacking
X-hacking
Open Source

Turn your android into a dangerous hacking machine

X-hackz
X-hackz
Free Kali

This is a tool that has social media & camera hacking & WhatsApp virus & SMS bombing functions and much more

X-Marshal
X-Marshal
Free Reconnaissance

社区版: - 每个用户节点限制为3个 - 模块列表: 域名采集,指纹识别,资产分析 - 队列管理 - 定时任务 - 资产提醒

X-osint
X-osint
Open Source Reconnaissance

This is an Open source intelligent framework ie an osint tool which gathers valid information about a phone number, user's email address, pe…

X-Recon
X-Recon
Free Web Application

A utility for detecting webpage inputs and conducting XSS scans.

X-snifer
X-snifer
Free Kali Reconnaissance Scanning & Enumeration

X-snifer is a versatile tool designed for scanning and gathering information from a website and simplifying various website analysis and net…

X-trojan
X-trojan
Free Kali

This is a tool for sending a Trojan virus to the victim's cellphone using the victim's telephone number on the victim's cellphone

X-ZIGZAG
X-ZIGZAG
Open Source Exploitation

X-ZIGZAG is a lightweight RAT engineered for stealth, operating exclusively in RAM.

x64dbg
x64dbg
Open Source Reverse Engineering

Open-source x64/x32 debugger for Windows. Actively maintained with a plugin ecosystem, scriptable, and designed to replace OllyDbg. Excellen…

x64dbg
x64dbg
Free Forensics Reverse Engineering

An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.

x8
x8
Open Source Reconnaissance

Hidden parameters discovery suite

x86-64-playground
x86-64-playground
Open Source Reverse Engineering

An online assembly editor, emulator and debugger for the x86-64 architecture

xalgorix
xalgorix
Open Source Web Application

Xalgorix - The Most Powerful Open-Source AI Pentesting Agent

xAnalyzer
xAnalyzer
Open Source Reverse Engineering

XAPKDetector
XAPKDetector
Open Source Forensics Reverse Engineering

APK/DEX detector for Windows, Linux and MacOS.

XArchiver
XArchiver
Free Password Attacks

XArchiver 是一款基于大数据的压缩包密码破解软件,它并不穷举所有可能性,而仅遍历那些网上经常出现的解压密码,在大幅提升破解效率的同时成功率也远高于传统的暴力破解方式。

xclibc
xclibc
Free

A tool to change the libc environment of running files(一个在CTF比赛中用于切换题目运行libc环境的工具)

Xcode.app-strings
Xcode.app-strings
Open Source Reverse Engineering

All the strings from Xcode's binaries

xcrawl3r
xcrawl3r
Open Source Reconnaissance Web Application

A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embedded…

xDeauther
xDeauther
Open Source Kali Wireless

Easy tools for deauthentication attack wifi

XELFViewer
XELFViewer
Open Source Reverse Engineering

ELF file viewer/editor for Windows, Linux and MacOS.

XENA
XENA
Free Exploitation Post-Exploitation

XENA is an innovative C2 made fully in Go. With hacking automation features.

Xeno
Xeno
Open Source

A Python-based tool for scanning, auditing, and performing penetration tests on Wi-Fi networks and connected devices.

xenon
xenon
Open Source Reverse Engineering

Xbox 360 Low Level Emulator written for the purpose of researching on the Xenon Game Console hardware internals.

XenSpawn
XenSpawn
Open Source Kali Exploitation

Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)

xepor
xepor
Open Source Reverse Engineering

Xepor, a web routing framework for reverse engineers and security researchers, brings the best of mitmproxy & Flask

xhunter
xhunter
Free Exploitation

Android Penetration Tool [ RAT for Android ]

Xiaomi_Yi_autoexec
Xiaomi_Yi_autoexec
Free Reverse Engineering

Compilation of autoexec scripts and mods for Xiaomi Yi camera after reverse engineering of firmware.

XiebroC2
XiebroC2
Free Post-Exploitation

渗透测试C2、支持Lua插件扩展、域前置/CDN上线、自定义profile、前置sRDI、文件管理、进程管理、内存加载、截图、反向代理、分组管理

xingrin
xingrin
Open Source Reconnaissance Web Application

Open-source attack surface management and authorized security automation platform for asset discovery, service probing, scan orchestration, …

xint
xint
Open Source Reconnaissance

X Intelligence CLI — search, monitor, analyze, and engage on X/Twitter. TypeScript + Bun. AI agent skill. Using xAPI & xAI api keys

xkinfoscan
xkinfoscan
Open Source Exploitation

xkInfoScan 是一款集成化的网络信息收集与安全扫描工具,支持 IP / 域名 / URL /信息追踪多维度目标探测,涵盖目录扫描、CMS 识别、漏洞检测、信息泄露挖掘、CDN 检测等核心功能,适用于渗透测试前期信息收集、网络资产测绘及安全风险评估场景。

xleapp
xleapp
Open Source Forensics

xLEAPP - Merging of iLEAPP/RLEAPP/vLEAPP, ALEAPP, cLEAPP

xless
xless
Free Web Application

xless …

XLMMacroDeobfuscator
XLMMacroDeobfuscator
Open Source Forensics

Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)

XLR8_BOMBER
XLR8_BOMBER
Open Source Kali

A Superfast SMS & Call bomber for Linux And Termux !

XMachOViewer
XMachOViewer
Open Source Reverse Engineering

XMachOViewer is a Mach-O viewer for Windows, Linux and MacOS

xmir-patcher
xmir-patcher
Free Exploitation

Firmware patcher for Xiaomi routers

xmlrpc-bruteforcer
xmlrpc-bruteforcer
Open Source Web Application

Multi-threaded XMLRPC brute forcer using amplification attacks targeting WordPress installations prior to version 4.4.

XMT
XMT
Open Source Exploitation

eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features

Xmtool
Xmtool
Open Source Web Application

.NetCore常用工具库(常用正则表达式、日期时间常用方法、XML快速遍历、动态扩展对象、图片验证码生成、阿里/腾讯短信发送、发送邮件、Json配置文件解析、加密解密、OSS文件上传等,持续继承中...)

XOpcodeCalc
XOpcodeCalc
Open Source Reverse Engineering

Opcode calculator / ASM calculator

xoreos
xoreos
Open Source Reverse Engineering

A reimplementation of BioWare's Aurora engine (and derivatives). Pre-pre-alpha :P

XPEViewer
XPEViewer
Open Source Reverse Engineering

PE file viewer/editor for Windows, Linux and MacOS.

Xploitra
Xploitra
Free Evasion

Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advanced o…

XposedOrNot-API
XposedOrNot-API
Open Source Reconnaissance

XposedOrNot: Open-source API for real-time alerts on domain data breaches. Protects your online identity with user-friendly monitoring and i…

xPOURY4-recon
xPOURY4-recon
Open Source Forensics Reconnaissance

Elite Cyber Intelligence & Digital Forensics Platform - Next-gen OSINT framework for cybersecurity professionals and ethical hackers🔥 with w…

XprobePlugin
XprobePlugin
Open Source Reverse Engineering

Live Memory Browser for Apps & Xcode

xray
xray
Free Exploitation Scanning & Enumeration

一款长亭自研的完善的安全评估工具,支持常见 web 安全问题扫描和自定义 poc | 使用之前务必先阅读文档

xrefer
xrefer
Open Source Forensics Reverse Engineering

xrop
xrop
Free Exploitation

Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC

xss_scanner
xss_scanner
Open Source Web Application

Herramienta avanzada de escaneo XSS (Cross-Site Scripting) para auditorías de seguridad web, con capacidades de evasión de WAF y generación …

XSS-Exploitation-Tool
XSS-Exploitation-Tool
Open Source Web Application

XSS Exploitation Tool (XET) is a penetration testing tool designed to exploit Cross-Site Scripting vulnerabilities.

xss-listener
xss-listener
Open Source Web Application

🕷️ XSS Listener is a penetration tool for easy to steal data with various XSS.

xss-payload-list
xss-payload-list
Free Web Application

This project aims to provide a comprehensive resource for understanding and testing Cross-Site Scripting (XSS) vulnerabilities, one of the O…

xss-payload-list
xss-payload-list
Free Web Application

:star: Star us on GitHub — it motivates a lot! :star:

XSS-Payloads
XSS-Payloads
Open Source Web Application

This repository holds all the list of advanced XSS payloads that can be used in penetration testing. These payloads can be loaded into XSS s…

xss-receiver
xss-receiver
Open Source Web Application

修改 docker-compose.yml 里面的 environment 成想要的配置

xsser
xsser
Free Web Application

Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.

xssFuzz
xssFuzz
Open Source Web Application

🚀 XSSFUZZ - A tool for detecting XSS vulnerabilities in web applications.

XSSNow
XSSNow
Free Web Application

Find XSS payloads that actually work by filtering them based on real-world constraints instead of blind payload spraying.

xssrecon
xssrecon
Free Exploitation Reconnaissance

XSSRecon automates the process of testing URL parameters for reflection of a test payload rix4uni and further checks how special characters …

XSSRocket
XSSRocket
Open Source Web Application

XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.

XSStrike
XSStrike
Open Source Web Application

Advanced XSS detection and exploitation suite. Features a crawler, fuzzer, a context-aware analysis engine, and a payload generator that cra…

XSStrike
XSStrike
Open Source Kali Web Application

XSStrike …

xsubfind3r
xsubfind3r
Open Source Reconnaissance Web Application

A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information from…

xt_wgobfs
xt_wgobfs
Open Source Evasion

Iptables WireGuard obfuscation extension. Windows/Mac/BSDs see the fully compatible cross-platform CLI rs-wgobfs.

Xteam
Xteam
Free Kali Reconnaissance

Xteam All in one Instagram,Android,phishing osint and wifi hacking tool available

Xtrack
Xtrack
Free Kali Reconnaissance

Xtrack is a tracking tool that can be used to track IP addresses, telephone numbers and usernames.

xurlfind3r
xurlfind3r
Open Source Reconnaissance Web Application

A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a var…

xvdtool
xvdtool
Open Source Reverse Engineering

A command-line tool for manipulating Xbox One XVD & XVC files.

xxh
xxh
Open Source

🚀 Bring your favorite shell wherever you go through the ssh. Xonsh shell, fish, zsh, osquery and so on.

xzre
xzre
Open Source Forensics Reverse Engineering

XZ backdoor reverse engineering

Yagi
Yagi
Open Source Reverse Engineering

Yet Another Ghidra Integration for IDA

yakit
yakit
Open Source Exploitation

Cyber Security ALL-IN-ONE Platform

yaklang
yaklang
Open Source

A programming language exclusively designed for cybersecurity

yakpro-po
yakpro-po
Free Evasion

Free, Open Source, Published under the MIT License.

YANSOllvm
YANSOllvm
Open Source Evasion

Yet Another Not So Obfuscated LLVM

yapi-rce-webshell
yapi-rce-webshell
Free Exploitation

Yapi mock script RCE another version. Webshell way. 另一种 Webshell 方式的 Yapi 命令执行的方法 相比于其他的利用方式 更加微操和可控 影响更小

yaralyzer
yaralyzer
Open Source Forensics Reverse Engineering

Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.

yarGen
yarGen
Free Forensics

yarGen is a generator for YARA rules

yark
yark
Open Source Reconnaissance

OSINT for YouTube made simple.

YaSeeker
YaSeeker
Open Source Reconnaissance

yesitsme
yesitsme
Free Reconnaissance

Simple OSINT script to find Instagram profiles by name and e-mail/phone

Yggdrasil
Yggdrasil
Open Source Kali

Automation script to download missing tools and configurate kali linux for various cybersecurity categories

yGuard
yGuard
Open Source Evasion

The open-source Java obfuscation tool working with Ant and Gradle by yWorks - the diagramming experts

Yolo
Yolo
Open Source Reverse Engineering

😈Scripts or demo projects on iOS development or reverse engineering

yookiterm-slides
yookiterm-slides
Free Exploitation

Exploitation and Mitigation Slides

youtube-comment-suite
youtube-comment-suite
Open Source Reconnaissance

Download YouTube comments from numerous videos, playlists, and channels for archiving, general search, and showing activity.

youtube-geofind
youtube-geofind
Open Source Reconnaissance

Web-tool to search YouTube for geographically tagged videos by channel, topic, and location. Videos are viewable in a map and exportabled to…

youtube-metadata
youtube-metadata
Open Source Reconnaissance

A quick way to gather all the metadata about a video, playlist, or channel from the YouTube API.

YouTube-Video-OSINT
YouTube-Video-OSINT
Free Reconnaissance

Mainly YouTube, tools, techniques & tradecraft OSINT resources.

YoutubeDownloader
YoutubeDownloader
Open Source Reverse Engineering

Downloads videos and playlists from YouTube

YoutubeExplode
YoutubeExplode
Open Source Reverse Engineering

Abstraction layer over YouTube's internal API

ysoserial
ysoserial
Open Source Exploitation

A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.

YuanZhao
YuanZhao
Free Forensics

「渊照」是一款功能强大的专业暗链扫描工具,专注于检测网站、HTML文件或目录中的隐蔽链接、隐藏元素和恶意代码。该工具能够智能识别扫描目标类型(本地文件/目录、内网URL、公网URL),并自动调整扫描策略以获得最佳效果,是安全人员进行网站安全审计和应急响应的理想工具。

z0scan
z0scan
Open Source Exploitation Reconnaissance

A lightweight active and passive scanner that combines the advantages of local and distributed models, supports dynamic external plugin impo…

ZAPiXDESK
ZAPiXDESK
Open Source Forensics

WhatsApp Desktop Live Forensics - Decryption&Extraction Technique

zasm
zasm
Open Source Reverse Engineering

x86-64 Assembler based on Zydis

zed
zed
Open Source

Official command-line tool for managing SpiceDB

Zeek-Intelligence-Feeds
Zeek-Intelligence-Feeds
Open Source Social Engineering

Zeek-Formatted Threat Intelligence Feeds

Zehef
Zehef
Open Source Reconnaissance

Zehef is an osint tool to track emails

zekry-grabber
zekry-grabber
Free Exploitation

grabber token, malware, trojan

Zen-Ai-Pentest
Zen-Ai-Pentest
Open Source Scanning & Enumeration

🛡⚔️AI-Powered Penetration Testing Framework with automated vulnerability scanning, multi-agent system, and compliance reporting🛡⚔️

Zero-attacker
Zero-attacker
Open Source Password Attacks Scanning & Enumeration

Zero-attacker is an multipurpose hacking tool with over 15+ multifunction tools

zerobox
zerobox
Open Source

Lightweight, cross-platform process sandboxing powered by OpenAI Codex's runtime. Sandbox any command with file, network, and credential con…

ZeroCrumb
ZeroCrumb
Open Source Exploitation

Dumping App Bound Protected Credentials & Cookies Without Privileges.

ZeroCrumb
ZeroCrumb
Open Source Exploitation

Dumping App Bound Protected Credentials & Cookies Without Privileges.

ZeroPulse
ZeroPulse
Open Source Kali Exploitation Post-Exploitation

🔒 Modern C2 Platform with Cloudflare Tunnel Integration | WinRM & SSH Remote Management | Real-time Terminal & Remote Desktop | Built with F…

ZeroTrace
ZeroTrace
Open Source

ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making it v…

zeuris
zeuris
Open Source Kali

Zeuris is bash based script with 10+ pages which can be used in Termux No root.

Zeus-Grabber
Zeus-Grabber
Open Source Exploitation Reconnaissance

Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H

ZFJObsLib
ZFJObsLib
Free Evasion

【iOS代码混淆】ZFJObsLib主要是通过Python写的混淆工具,具体功能有方法混淆、属性混淆、类名混淆、添加垃圾代码、自动创建垃圾类、删除注释、修改资源文件Hash值、加密字符串、翻新资源名、模拟人工混淆、混淆文件名、混淆文件目录、混淆词库、混淆日志、映射列表、敏感词过滤…

zio
zio
Free

unified io lib for pwning development written in python

zip-password-finder
zip-password-finder
Open Source Password Attacks

Find the password of protected ZIP files.

ZipCracker
ZipCracker
Free Password Attacks

ZipCracker是Hx0战队出品的一款功能强大的Zip密码破解工具。它集成了字典攻击、掩码攻击、短明文 CRC32 枚举恢复、已知明文攻击等多种破解模式,并能自动修复伪加密文件。凭借其高性能与多功能的特点,ZipCracker已成为CTF比赛中的一把利器。(ZipCracke…

Zircolite
Zircolite
Free Forensics

A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs

zizmor
zizmor
Open Source Reverse Engineering

Static analysis for GitHub Actions

zkBank
zkBank
Free

zkBank is the most secure banking system in the world, powered by ZK, gnark, and GKR!

zombie
zombie
Free Exploitation Password Attacks

最强大的密码爆破/喷洒工具 | The most powerful bruteforcer / sprayer Artifact

ZoneInternetGamesServer
ZoneInternetGamesServer
Open Source Reverse Engineering

Bringing back the functionality of the Internet Games, included in Windows 7 and XP/ME.

zphisher
zphisher
Open Source Social Engineering

An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any misus…

ZXHookUtil
ZXHookUtil
Open Source Reverse Engineering

【iOS安全】高效Tweak工具函数集,基于theos、monkeyDev。(含方法调用链追踪、递归获取任意层级view、拦截并修改全局请求、清除keyChain数据、block还原、打印类的属性和方法、数据转换、数据存储、添加轮询、网络请求、加密解密等各种协助逆向分析函数)-仅…

zydis
zydis
Open Source Reverse Engineering

Fast and lightweight x86/x86-64 disassembler and code generation library

zydis-rs
zydis-rs
Open Source Reverse Engineering

Zygisk-Il2CppDumper
Zygisk-Il2CppDumper
Open Source Reverse Engineering

Using Zygisk to dump il2cpp data at runtime

Zypheron-CLI
Zypheron-CLI
Free Kali Exploitation

ZYPHERON CLI Powerful command-line interface for automated security testing. Integrate ZYPHERON into your DevSecOps pipeline. Get CLI

ZYRA
ZYRA
Open Source Evasion Exploitation

ZYRA: Your Runtime Armor. ZYRA is an Zig-written obfuscator/packer for executable binaries.