Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for offensive security
offensive-security
x
250 search results found
Codeargos
⭐
10
A python module for red teams to support the continuous recon of JavaScript files and HTML script blocks in an active web application.
C2 Cloud
⭐
10
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
Install Kali Termux
⭐
10
custom kali installation in termux
Hack_hard
⭐
10
A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard
Pydorker
⭐
10
Python tool for Dorking
Sqli Detector In Python
⭐
10
python based sqli detector tool
Jwt Bf
⭐
10
Brute force a JWT token. Script uses multithreading.
Intro To Offensive Security For Web Devs
⭐
9
Wordlist Extender
⭐
9
Extend wordlist by appending digits and special characters to each word.
Goblyn
⭐
9
Goblyn is a Python tool focused to enumeration and capture of website files metadata.
0x01facility
⭐
9
smadi-playbook
Khata
⭐
9
WebHook for Red Team
Reait
⭐
8
RevEng.AI Toolkit and Python API
Offensive Onos
⭐
8
My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)
Slacksploit
⭐
8
A forensic analysis framework for enumerating slack artifacts residing in the Operating system.
Osce
⭐
7
My notebook for OSCE Lab
Ssti Flask Hacking Playground
⭐
7
App with Server Side Template Injection (SSTI) vulnerability - in Flask. For web penetration testing / ethical hacking. Possible RCE :)
File Shredder
⭐
7
PowerShell script for shredding files.
Ogre
⭐
7
The Ultimate Protocol Bruteforcer
Masapt
⭐
7
Multi-Agent System for Automated Penetration Testing (MASAPT)
S4ch.github.io
⭐
7
Another random blog about security
Penetration Testing
⭐
7
Offensive penetration testing. Perform multiple attack types against web applications, vulnerable programs and OSes in predefined and safe test environment
Oswe Awae Pre Preperation Plan And Notes
⭐
7
My OSWE Pre-preperation (i.e. before acutally buying the course) phase plan and notes!
Pwnbox
⭐
6
Script to build your own pwnbox with hacking tools and small scripts used in CTFs and Bug Bounty.
Amounts
⭐
6
Generate a wordlist to fuzz amounts or any other numerical values.
Kali_nethunter_kenzo
⭐
6
Kali NetHunter for Xiaomi Redmi Note 3 Pro
Nmap2cherry
⭐
6
A hacky XSLT to convert nmap scan results into CherryTree format
Buffer Overflow
⭐
6
These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation
Crto
⭐
6
Our repo for crushing through RTO course & labs.
Oscp
⭐
6
OSCP ( Offensive Security Certified Professional )
Wanderer
⭐
6
An open-source process injection enumeration tool written in C#
Xdebug Exploit
⭐
6
An automated xdebug 2.5.5 vulnerability exploit
Dnsrecon Chunked
⭐
6
Brute force subdomains in multiple smaller iterations. Based on DNSRecon.
Justbatchthem
⭐
6
This is a batch script that automates the post exploitation phase when you gain a shell and you have obtained administrative rights, whether it's from your beacon or shell.
Moria
⭐
6
Python library for interacting with in-memory C structures using data mined from binary DWARF debug info.
Nullbrain
⭐
5
Attempt to create knowledge base
Pt Gui
⭐
5
Project PT-GUI for Deakin Capstone Hardhat Enterprises
Overwhelm
⭐
5
Overwhelm's Vanquish is a Kali Linux based Enumeration Orchestrator built in Python running inside a docker container. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases. The results of each phase are fed into the next phase to identify vulnerabilities that could be leveraged for a remote shell
Sycp
⭐
5
Anotações realizadas durante a certificação SYCP
Vulnserver Exploits
⭐
5
Vulnserver exploits created preparing for the Offensive Security's OSCE exam
Fconnch
⭐
5
FConnch is a fast bulk subdomain availability checker
Pacs Recon Flashcards
⭐
5
Physical Access Control Systems (PACS) Reconnaissance Flashcards
Fsociety
⭐
5
fsociety is a penetration toolkit inspired from MR. ROBOT
Pt_phone_home
⭐
5
Staged Payloads from Kali Linux - Part 1,2 of 3
Fishshell
⭐
5
FIshShell is a multi-session handler and Windows & Linux backdoor payload generator. It allows users\targets to connect to the server (other machines running the multi-handler) after which the server admin/attacker can join sessions and also get a non-interactive reverse shell.
Exploit Database Papers
⭐
5
exploit-database-papers
Zero To Oscp
⭐
5
A quick guide to help total beginners find a path to becoming a penetration tester.
Websocket Bf
⭐
5
Brute force a REST API query through WebSocket. Based on cURL.
Terraform Aws Ebs Snapshot Publicly Exposed
⭐
5
Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volume from the copied EBS snapshot. After that, the module attaches and mounts the EBS volume to an EC2 instance. Finally, attacker can ssh into an EC2 instance and inspect a mounted volume "/usr/src/hack".
Nagooglesearch
⭐
5
Not another Google searching tool.
201-250 of 250 search results
< Previous
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.