BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploitatio…
Python based script for Information Gathering.
Network security sniffer for finding vulnerabilities in the network. Designed for pentesters and security engineers.
Provides various Windows Server Active Directory (AD) security-focused reports.
Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?
AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effectivel…
Collect and query ADS-B data to find aircraft and trends based on geographic region(s), altitude, bearing, aircraft type and more.
π€ Curated AI OSINT resources β Google dorks, Shodan queries, GitHub dorks, and techniques to discover exposed LLM endpoints, leaked AI API k…
AI for Ethical Hacking - Workshop
AIRecon is an autonomous cybersecurity agent that combines a self-hosted Large Language Model (Ollama) with a Kali Linux Docker sandbox and …
Search and browse documents and data; find the people and companies you look for.
Albanian Hacking Tool!! Tools to help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user disco…
This project is all about ICS Security. In an effort to contribute to the ICS community.
Hunt down 840+ social media accounts using AI
Practical labs, notes, and reports for CEH v13 modules β covering web hacking, network pentesting, malware analysis, social engineering, and…
OWASP tool for in-depth DNS enumeration, network mapping, and attack surface discovery. Uses both passive and active techniques to find subd…
OWASP Amass Docker Compose for setting up a full instance of the infrastructure
ΠΠ»ΡΡΠ΅ΡΠ½Π°ΡΠΈΠ²Ρ ΠΈ Π°Π½Π°Π»ΠΎΠ³ΠΈ Π±ΠΎΡΠ° ΠΠ»Π°Π· ΠΠΎΠ³Π° ΠΈ ΠΏΠΎΡ ΠΎΠΆΠΈΠ΅ Π’Π΅Π»Π΅Π³ΡΠ°ΠΌ Π±ΠΎΡΡ Π΄Π»Ρ ΠΏΠΎΠΈΡΠΊΠ° ΠΈ Π°Π½Π°Π»ΠΈΠ·Π° ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ.
πA Curated List Of Modern Android Exploitation Conference Talks.
754 structured cybersecurity skills for AI agents Β· Mapped to 5 frameworks: MITRE ATT&CK, NIST CSF 2.0, MITRE ATLAS, D3FEND & NIST AI RMF Β· …
AntiHunter Perimeter Defense Systems - DIGI Node Firmware
Anubis is a subdomain enumeration and information gathering tool. Anubis collates data from a variety of sources, including HackerTarget, DN…
API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).
List of API's for gathering information about phone numbers, addresses, domains etc