Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for information security
information-security
x
1,007 search results found
Malware Exhibit
⭐
857
🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
Passphrase Wordlist
⭐
849
Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Nmap
⭐
839
Idiomatic nmap library for go developers
Gorsair
⭐
829
Gorsair gives root access on remote docker containers that expose their APIs
Xxe Injection Payload List
⭐
825
🎯 XML External Entity (XXE) Injection Payload List
Fame
⭐
820
FAME Automates Malware Evaluation
Open Source Security Guide
⭐
795
Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.
Powershell For Hackers
⭐
792
This repository is a collection of powershell functions every hacker should know
Metta
⭐
782
An information security preparedness tool to do adversarial simulation.
Powerzure
⭐
771
PowerShell framework to assess Azure security
Aboutsecurity
⭐
762
Everything for pentest. | 用于渗透测试的 payload 和 bypass 字典.
Cloudbrute
⭐
750
Awesome cloud enumerator
Aptrs
⭐
750
Automated Penetration Testing Reporting System
Poc
⭐
727
Advisories, proof of concept files and exploits that have been made public by @pedrib.
Awesome Security Gists
⭐
721
A collection of various GitHub gists for hackers, pentesters and security researchers
Domained
⭐
721
Multi Tool Subdomain Enumeration
Wiretap
⭐
719
Wiretap is a transparent, VPN-like proxy server that tunnels traffic via WireGuard and requires no special privileges to run.
Iky
⭐
719
OSINT Project. Collect information from a mail. Gather. Profile. Timeline.
Sitedorks
⭐
719
Search Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term (dork) with a default set of websites, bug bounty programs or custom collection.
Dumpsterfire
⭐
709
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Can I Take Over Dns
⭐
692
"Can I take over DNS?" — a list of DNS providers and how to claim (sub)domains via missing hosted zones
Gourdscanv2
⭐
683
被动式漏洞扫描系统
Go Dork
⭐
677
The fastest dork scanner written in Go.
Sandman
⭐
670
Sandman is a NTP based backdoor for red team engagements in hardened networks.
Esfileexploreropenportvuln
⭐
668
ES File Explorer Open Port Vulnerability - CVE-2019-6447
Assessment Mindset
⭐
664
Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.
Lookyloo
⭐
662
Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.
Magento Malware Scanner
⭐
661
Scanner, signatures and the largest collection of Magento malware
Active Directory Exploitation Cheat Sheet
⭐
659
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Scant3r
⭐
657
ScanT3r - Module based Bug Bounty Automation Tool
Autopwn Suite
⭐
636
AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.
Datasurgeon
⭐
630
Quickly Extracts IP's, Email Addresses, Hashes, Files, Credit Cards, Social Secuirty Numbers and a lot More From Text
Zeuscloud
⭐
628
Open Source Cloud Security
Wordlists
⭐
622
Infosec Wordlists and more.
Frogy
⭐
622
My subdomain enumeration script. It's unique in the way it is built upon.
Dradis Ce
⭐
608
Dradis Framework: Colllaboration and reporting for IT Security teams
Ronin
⭐
600
Ronin is a Free and Open Source Ruby Toolkit for Security Research and Development. Ronin also allows for the rapid development and distribution of code, exploits, payloads, etc, via 3rd party git repositories.
Damn Vulnerable Bank
⭐
600
Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android application security hacking skills.
Chashell
⭐
599
Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
Gitprey
⭐
597
Searching sensitive files and contents in GitHub associated to company name or other key words
Opcde
⭐
594
OPCDE Cybersecurity Conference Materials
Infoooze
⭐
590
A OSINT tool which helps you to quickly find information effectively. All you need is to input and it will take take care of rest.
Stalkphish
⭐
581
StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Apkhunt
⭐
580
APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is intended primarily for mobile app developers and security testers, it can be used by anyone to identify and address potential security vulnerabilities in their code.
Opensquat
⭐
576
The openSquat project is an open-source solution for detecting phishing domains and domain squatting. It searches for newly registered domains that impersonate legitimate domains on a daily basis.
Race The Web
⭐
569
Tests for race conditions in web applications. Includes a RESTful API to integrate into a continuous integration pipeline.
Gosint
⭐
567
OSINT Swiss Army Knife
Natlas
⭐
565
Scaling Network Scanning. Changes prior to 1.0 may cause difficult to avoid backwards incompatibilities. You've been warned.
List Infosec Encyclopedia
⭐
556
A list of information security related awesome lists and other resources.
Sstimap
⭐
546
Automatic SSTI detection tool with interactive interface
Confused
⭐
543
Tool to check for dependency confusion vulnerabilities in multiple package management systems
Opencanary_web
⭐
539
The web management platform of honeypot
Sqlidetector
⭐
538
Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests with 14 payloads and checking for 152 regex patterns for different databases.
Resolvers
⭐
536
The most exhaustive list of reliable DNS resolvers.
Haiti
⭐
532
🔑 Hash type identifier (CLI & lib)
Osquery Configuration
⭐
527
A repository for using osquery for incident detection and response
Awesome Cloud Security
⭐
527
A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.
Threagile
⭐
524
Agile Threat Modeling Toolkit
Application Security
⭐
519
Resources for Application Security including Web, API, Android, iOS and Thick Client
Identywaf
⭐
518
Blind WAF identification tool
Kubestriker
⭐
500
A Blazing fast Security Auditing tool for Kubernetes
Goop
⭐
494
Yet another tool to dump a git repository from a website, focused on as-complete-as-possible dumps and handling weird edge-cases.
Cronos
⭐
481
PoC for a new sleep obfuscation technique leveraging waitable timers to evade memory scanners.
Defi Threat
⭐
479
a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations on decentralized finance
Edrhunt
⭐
475
Scan installed EDRs and AVs on Windows
Practicalcybersecurityresources
⭐
471
This repository contains a curated list of resources I suggest on LinkedIn and Twitter.📝🌝
Infosec Engineering
⭐
464
A reading list for infosec engineers
Getting Into Infosec And Cybersecurity
⭐
462
A shorter, less intimidating list of infosec resources helpful for anyone trying to learn.
Ansible Role Hardening
⭐
462
Ansible role to apply a security baseline. Systemd edition.
Ote
⭐
462
OSINT Template Engine
Komo
⭐
456
🚀Komo, a comprehensive asset collection and vulnerability scanning tool. Komo 一个综合资产收集和漏洞扫描工具,集成了20余款工具,通过多种方式对子域进行获取,收集域名邮箱,进行存
Onioff
⭐
452
🌰 An onion url inspector for inspecting deep web links.
Webmap
⭐
451
WebMap-Nmap Web Dashboard and Reporting
Bugbountyguide
⭐
448
Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.
Ail Framework
⭐
440
AIL framework - Analysis Information Leak framework
Bug Bounty Methodology
⭐
438
These are my checklists which I use during my hunting.
Winappdbg
⭐
435
WinAppDbg Debugger
Icp Checker
⭐
434
ICP备案查询,可查询企业或域名的ICP备案信息,自动完成滑动验证,保存结果到Excel表格,适用于
Basecrack
⭐
422
Decode All Bases - Base Scheme Decoder
Infosec
⭐
422
Учебное пособие по защите информации кафедры радиотехники и систем управления МФТИ
Incident Response Plan Template
⭐
422
A concise, directive, specific, flexible, and free incident response plan template
Open Source Tools For Cti
⭐
422
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Securitymanageframwork
⭐
421
Security Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Bxss
⭐
420
bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.
H2csmuggler
⭐
408
HTTP Request Smuggling over HTTP/2 Cleartext (h2c)
Ctf Writeups Public
⭐
405
Writeups for infosec Capture the Flag events by team Galaxians
Python Honeypot
⭐
404
OWASP Honeypot, Automated Deception Framework.
Python Ransomware
⭐
403
Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Spoofy
⭐
394
Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.
Webdevelopersecuritychecklist
⭐
390
A checklist of important security issues you should consider when creating a web application.
Ircapabilities
⭐
388
Incident Response Hierarchy of Needs
Rekono
⭐
385
Pentesting automation platform that combines hacking tools to complete assessments
Offensive Osint Tools
⭐
373
OffSec OSINT Pentest/RedTeam Tools
Gorilla
⭐
371
tool for generating wordlists or extending an existing one using mutations.
Companies Hiring Security Remote
⭐
369
This repo is meant to be a list of companies that hire security people full remote.
Reconmap
⭐
368
Vulnerability assessment and penetration testing automation and reporting platform for teams.
Phishapi
⭐
367
Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Hershell
⭐
367
Hershell is a simple TCP reverse shell written in Go.
Red_team_attack_lab
⭐
360
Red Team Attack Lab for TTP testing & research
Petitpotato
⭐
358
Local privilege escalation via PetitPotam (Abusing impersonate privileges).
Related Searches
Python Information Security (342)
Penetration Testing Information Security (281)
101-200 of 1,007 search results
< Previous
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.