Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for information security
information-security
x
1,007 search results found
Sifter
⭐
49
Sifter - All purpose penetration testing op-center
Hackthisai
⭐
48
Adversarial Machine Learning (AML) Capture the Flag (CTF)
Gerobug
⭐
48
The First Open Source Bug Bounty Platform
Ja3box
⭐
48
extract ja3(s) when sniffing or from a pcap.
Aquatone
⭐
48
A Tool for Domain Flyovers
Cybersecurity_conferences
⭐
48
List of some cybersecurity conferences
Cve 2023 29357
⭐
47
Microsoft SharePoint Server Elevation of Privilege Vulnerability
Autosploit
⭐
47
Autosploit = Automating Metasploit Modules.
Wifi Pineapple Cloner
⭐
47
Port WiFi Pineapple NANO/TETRA in generic hardware
Matrix
⭐
47
My Privacy DNS #Matrix lists for blacklisting
Advancedkeyhacks
⭐
47
API Key/Token Exploitation Made easy.
Threat Hostlist
⭐
46
Comprehensive domain blocklists for 🚨 threats (🕷malware, 🎣phishing, 🕵️spyware, 🤖botnets). Ideal for DNS-based filtering tools like Pi-Hole, AdGuard Home, Blocky.
Grids
⭐
46
My network monitoring solution and tools that go along with it.
Oscp Omnibus
⭐
46
A collection of resources I'm using while working toward the OSCP
Termux Snippets
⭐
46
An integrated tool and a collection of snippets which helps in the various aspects of the terminal.
H1 Search
⭐
45
Tool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.
Subcert
⭐
45
Subcert is an subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.
Bug Bounty Responses
⭐
45
A collection of response templates for invalid bug bounty reports.
Nyc Infosec
⭐
45
Mapping the NYC Infosec Community
Docker Security Checker
⭐
45
Dockerfile Security Checker using OPA Rego policies with Conftest
Umbrella_content
⭐
45
Content Used In Umbrella App
Gophish Notifier
⭐
45
Notification webhook for GoPhish
Wordlist.rb
⭐
45
A Ruby library and CLI for generating and working with wordlists.
Docker Collection
⭐
44
🐋 Docker Collection for Web Development, DevOps and InfoSec
Lyricpass
⭐
44
Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security research.
Ronin Code Sql
⭐
44
A Ruby DSL for crafting SQL Injections
Krampus
⭐
44
The original AWS security enforcer™
Gorsh
⭐
44
A Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
Wifi Pineapple Cloner Builds
⭐
43
Build repo from Universal Wifi pineapple hardware cloner
Pandorasbox
⭐
43
An intuitive and encrypted in-memory filesystem (VFS)
Tg Nearby
⭐
42
Using Telegram's "People Nearby" feature to pinpoint people (technically) around the globe
Mxcheck
⭐
41
mxcheck is an info and security scanner for e-mail servers.
Kenyatta Ransomware
⭐
41
This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Proxy😎 -- Functionality is based on Cryptolocker😈 ransomware. Be cool😉
Cyber Security
⭐
41
This repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Htkit
⭐
41
Information Gathering Simplified.
Holisticinfosec For Webdevelopers Fascicle0
⭐
40
📚 Overview 🔒 Tooling 🔒 Process 🔒 Physical 🔒 People 📚
Kaal_bhairav
⭐
40
-x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.
Sgcheckup
⭐
40
sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.
Infosec Jupyter Book
⭐
39
The Infosec Community Definitive Guide to Jupyter Notebooks
Training Materials
⭐
39
Pandora
⭐
39
Hack+
Vichiti
⭐
39
An OSINT focused tool made with Nodejs!
Wordlistgen
⭐
39
Quickly generate context-specific wordlists for content discovery from lists of URLs or paths
Volana
⭐
39
🌒 Shell command obfuscation to avoid detection systems
Pitch
⭐
38
The initial conversation slides and menu of scenarios
Phisherprice
⭐
38
All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Pentestingeverything
⭐
38
Web | Mobile | API | Thick Client | Source Code Review | Wireless | Network Pentesting etc...
Standards Maintenance
⭐
37
This repository houses the interactions, consultations and work management to support the maintenance of baselined components of the Consumer Data Right API Standards and Information Security profile.
Legal Bug Bounty
⭐
37
#legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.
Blindpie
⭐
37
Automatically exploit time-based blind SQL injection vulnerabilities.
Virus.xcheck
⭐
37
Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs for malware analysis.
Docs.tryhackme.com
⭐
37
TryHackMe documentation site source code
Crystalball
⭐
36
A Magical 🔮 Web Screenshot Project
Cyber Security Roadmap
⭐
36
O repositório Cyber Security Roadmap é uma iniciativa para ajudar a comunidade de segurança da informação a se orientar sobre o que estudar.
All In One Cybersecurity Resources
⭐
36
List of CyberSecurity Resources and some different Sub-Sets of CyberSecurity
Wsuspicious
⭐
36
WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations
Aa Policy Validator
⭐
35
Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation
Ultimate_bughunter_tools
⭐
35
Ultimate Package Of 50 Bug Bounty Hunting Tools
Umay
⭐
35
IoT Malware Similarity Analysis Platform
Vprioritizer
⭐
34
vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization, for teams to make more informed decision about what (vulnerability/ties) they should remediate (or can afford not to) and on which (asset/s)
Reddrop
⭐
34
RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.
Archer
⭐
34
Distributed network and vulnerability scanner
Encrypt Delete Test
⭐
34
Really can protect from ransomware encryption?
Tld_scanner
⭐
33
Scan all possible TLD's for a given domain name
Xssrocket
⭐
33
XSS Rocket is written by Black Hat Ethical Hacking with the help of #ChatGPT as experimentation, with a lot of hours spent modifying the code generated by ChatGPT, and is designed for Offensive Security and XSS (Cross-Site Scripting) attacks.
Awesome Ctf Challenge Design
⭐
33
🕶 Design fun and insightful CTF challenges
Guidelines
⭐
33
GUIDELINES for 30 Days of Code
Scvault
⭐
33
Custom scripts for directory fuzzing, subdomain enumeration, and more.
Hackbar
⭐
33
HackBar Quantum is a sidebar that assists you with web application security testing, it's aim is to help make those tedious tasks a little bit easier. This add-on is a predecessor to the original HackBar that is not compatible with Firefox Quantum.
Orwell Rat And Botnet
⭐
33
Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.
Ctf Writeups
⭐
32
Detailed writeups of how I solved infosec Capture The Flag (CTF) challenges
Urldedupe
⭐
32
Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
Research
⭐
32
❄️ Research project for SubFinder core API V2
Membi
⭐
32
All the members of bugbounty and infosec. If you don't know who to follow, see!
Mildew
⭐
32
Dotmil subdomain discovery tool that scrapes domains from official DoD website directories and certificate transparency logs
Sckg
⭐
32
Security Control Knowledge Graph
Evidencewiki
⭐
31
All of my threat intel recommendations for aspiring Information Security Analyst. This section contains information about evidence at analyst's disposal IP, domain, email, hash, files.
Scopehunter
⭐
31
ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.
Backbag Lab Vm
⭐
30
Small enough to carry on your back (Backpack) 🎒💻
Rejig
⭐
30
Turn your VPS into an attack box
Hashlookup Server
⭐
30
Fast lookup server for NSRL and other hash database used in digital forensic
Journey_to_osce
⭐
30
A curated collection of resources that may be beneficial for anyone pursuing the OSCE.
Hibpwned
⭐
30
Python API wrapper for haveibeenpwned.com (API v3)
Pentest Chainsaw
⭐
30
Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product
Xffenum
⭐
30
X-Forwarded-For [403 forbidden] enumeration
Goblob
⭐
30
A fast enumeration tool for publicly exposed Azure Storage blobs.
Ceh_notes
⭐
30
Certified Ethical Hacker (CEH) v12 Notes
About
⭐
30
A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!
Ru Osint Infosec Map
⭐
29
Graph of OSINT and InfoSec resources in Russian language
Cos432 Lecture Notes
⭐
29
Student-created lectures notes for COS 432: Information Security
Telegram_bbbot
⭐
29
Telegram Bug Bounty Bot
Cpu Load Side Channel
⭐
29
Side-channel file transfer between independent VM executed on the same physical host
Python Security Tool Database
⭐
29
Solid Python toolkit for those in the security industry. Some by me, most by smarter people.
Twitter Seclists
⭐
28
Curated lists of InfoSec on Twitter. Main focus is Bug Bounty.
Intro To Security For Developers
⭐
28
An introduction to security for developers.
Exif Gps Tracer
⭐
28
A python script which allows you to parse GeoLocation data from your Image files stored in a dataset.It also produces output in CSV file and also in HTML Google Maps
42ai_resources
⭐
28
A selection of resources to learn Python programming, Artificial Intelligence and Machine Learning 🤖
Gigger
⭐
27
Git folder digger, I'm sure it's worthwhile stuff.
Bloodhound Notebook
⭐
27
BloodHound Cypher Queries Ported to a Jupyter Notebook
Shady Hook
⭐
27
Proof of Concept - Hooking API calls of a Ransomware
Related Searches
Python Information Security (342)
Penetration Testing Information Security (281)
501-600 of 1,007 search results
< Previous
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.