Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security tools
security-tools
x
1,760 search results found
Shovel
⭐
188
Docker容器逃逸工具(Docker Escape Tools)
Minesweeper
⭐
188
A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Mercator
⭐
188
Mapping the information system / Cartographie du système d'information
Owasp Fstm
⭐
188
The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers, consultants, and Information Security professionals with conducting firmware security assessments.
Shellclear
⭐
185
Secure shell history commands by finding sensitive data
Pypowershellxray
⭐
184
Python script to decode common encoded PowerShell scripts
Qrexfil
⭐
184
This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visually allowing exfiltration of data in air gapped systems
Gotator
⭐
183
Gotator is a tool to generate DNS wordlists through permutations.
Inthewilddb
⭐
183
Hourly updated database of exploit and exploitation reports
Depthcharge
⭐
182
A U-Boot hacking toolkit for security researchers and tinkerers
Reveng_rtkit
⭐
181
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
Offsec Tools
⭐
181
Compiled tools for internal assessments
Awesome Security Tool List
⭐
181
This is a list of security tools that I have used or recommend. Welcome any contributions!
Epagneul
⭐
180
Graph Visualization for windows event logs
Kcare Uchecker
⭐
180
A simple tool to detect outdated shared libraries
Commander
⭐
179
Keeper Commander is a python-based CLI and SDK interface to the Keeper Security platform. Provides administrative controls, reporting, import/export and vault management.
Jiraffe
⭐
178
One stop place for exploiting Jira instances in your proximity
Pillager
⭐
178
Pillage filesystems for sensitive information with Go 🔍
Console
⭐
178
End-to-End encrypted application secrets and configuration management for developers.
Lucifer
⭐
177
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Argo
⭐
177
Argo is an automated general crawler for automatically obtaining website URLs . Argo 是一个自动化扫描器爬虫 用于自动化获取网站的URL 基于go-rod实现了静态和动态结合的方式来实现
Burpa
⭐
177
Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used to setup Dynamic Application Security Testing (DAST).
Flask Unsign
⭐
176
Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
Hexdnsechot
⭐
175
命令执行不回显但DNS协议出网的命令回显场景解决方案(修改为使用ceye接收请求,添加自定义DNS服
Rastrea2r
⭐
173
Collecting & Hunting for IOCs with gusto and style
Nosqli
⭐
173
NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.
Dastardly Github Action
⭐
173
Runs a scan using Dastardly by Burp Suite against a target site and creates a JUnit XML report for the scan on completion.
Pyscan
⭐
172
python dependency vulnerability scanner, written in Rust.
Tools Tbhm
⭐
171
Tools of "The Bug Hunters Methodology V2 by @jhaddix"
Octopuswaf
⭐
170
OctopusWAF is a WAF( Web application firewall) with high performance, made in C language and use libevent.
Antisamy
⭐
169
a library for performing fast, configurable cleansing of HTML coming from untrusted sources
Iamzero
⭐
168
Identity & Access Management simplified and secure.
Dheater
⭐
168
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)
Encpipe
⭐
167
The dum^H^H^Hsimplest encryption tool in the world.
Spidex
⭐
165
Continuous reconnaissance scanner. Find and analyze internet-connected devices in minutes.
Nmap Formatter
⭐
165
A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot) or sqlite. Simply put it's nmap converter.
Metadetective
⭐
164
🕵️ Unleash Metadata Intelligence with MetaDetective. Your Assistant Beyond Metagoofil.
Intrec Pack
⭐
164
Intelligence and Reconnaissance Package/Bundle installer.
Bulwark
⭐
163
An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
Dnsbin
⭐
163
The request.bin of DNS request
Ipa Medit
⭐
163
Memory modification tool for re-signed ipa supports iOS apps running on iPhone and Apple Silicon Mac without jailbreaking.
Icp Domains
⭐
163
输入一个域名,输出ICP备案所有关联域名
Fileless Elf Exec
⭐
162
Execute ELF files without dropping them on disk
Wpgarlic
⭐
162
A proof-of-concept WordPress plugin fuzzer
Offsectools_www
⭐
162
A vast collection of security tools and resources curated by the community.
Netpwn
⭐
161
Tool made to automate tasks of pentesting.
Birdcage
⭐
161
Cross-platform embeddable sandboxing
Libdiffuzz
⭐
161
Custom memory allocator that helps discover reads from uninitialized memory
Recsech
⭐
161
Recsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected, Subdomain takeovers, Reconnaissance On Github and much more you can see in Features in tools .
Agebox
⭐
159
Age based repository file encryption gitops tool
Ubuntu20 Cis
⭐
159
Ansible role for Ubuntu 2004 CIS Baseline
Metaradar
⭐
157
The app for BLE ether monitoring tracks your environment, finds some devices, makes relations between devices around you, and tracks devices' movements.
Web Shells
⭐
157
Some of the best web shells that you might need!
Assemblyline
⭐
157
AssemblyLine 4: File triage and malware analysis
Security Skills Career Roadmap
⭐
156
Skills and career roadmap for various security roles like appsec, cloud security, devsecops, security engineer, security researchers, pentesting, api security, network security, mobile security and so on.with helpful resources, guidelines
Log4jscanwin
⭐
154
Log4j Vulnerability Scanner for Windows
Securefolderfs
⭐
154
Powerful, secure, modern way to keep your files protected.
Secimport
⭐
153
eBPF Python runtime sandbox with seccomp (Blocks RCE).
Nebulousad
⭐
152
NebulousAD automated credential auditing tool.
Crithit
⭐
152
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Gonids
⭐
151
gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that you can join on Google Groups: https://groups.google.com/forum/#!topic/gonids/
Keylogger
⭐
149
🔐 Open Source Python Keylogger Collection
Favirecon
⭐
149
Use favicon.ico to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.
Execution Trace Viewer
⭐
148
Tool for viewing and analyzing execution traces
Vmass
⭐
148
vMass Bot 🪝 Vulnerability Scanner & Auto Exploiter Tool Written in Perl.
Ansibleplaybooks
⭐
148
A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools
Awesome Gdpr
⭐
148
Protection of natural persons with regard to the processing of personal data and on the free movement of such data.
Magpie
⭐
147
A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat landscape such as cloud ransomware and supply chain attacks.
Nix Security Box
⭐
147
Tool set for Information security professionals and all others
Scanner And Patcher
⭐
145
A Web Vulnerability Scanner and Patcher
Huntercatnfc
⭐
145
The Hunter Cat NFC is the latest security tool for contactless (Near Field Communication) used in access control, identification and bank cards. Specially created to identify NFC readers and sniffing tools, with this tool you can audit, read or emulate cards of different types.
Nomorecookies
⭐
145
Browser Protector against various stealers, written in C# & C/C++.
Gotanda
⭐
144
Gotanda is browser Web Extension for OSINT.
Tugarecon
⭐
144
Pentest: Subdomains enumeration tool for penetration testers.
Bug Bounty Writeups
⭐
143
Repository of Bug-Bounty Writeups
Sentrypeer
⭐
142
Protect your SIP Servers from bad actors at https://sentrypeer.org
Github Endpoints
⭐
141
Find endpoints on GitHub.
Skanuvaty
⭐
140
Dangerously fast DNS/network/port scanner
Burp Exporter
⭐
140
Exporter is a Burp Suite extension to copy a request to a file or the clipboard as multiple programming languages functions.
Nerve
⭐
140
NERVE Continuous Vulnerability Scanner
Squealer
⭐
140
Telling tales on you for leaking secrets!
Detexploit
⭐
139
OSS Vulnerability Scanner for Windows Platform
Passfault
⭐
139
OWASP Passfault evaluates passwords and enforces password policy in a completely different way.
Vulnogram
⭐
138
Vulnogram is a tool for creating and editing CVE information in CVE JSON format
Galah
⭐
138
Galah: an LLM-powered web honeypot using the OpenAI API.
Logesp
⭐
137
Open Source SIEM (Security Information and Event Management system).
Go Dnscollector
⭐
136
Ingesting, pipelining, and enhancing your DNS logs with usage indicators, security analysis, and additional metadata.
Awesome Oss Devsec
⭐
135
An awesome list of OSS developer-first security tools
Netlas Dorks
⭐
134
A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to search for IoT elements, protocols, communication tools, remote access, and more. Over time, the list will grow.
Horn3t
⭐
133
Powerful Visual Subdomain Enumeration at the Click of a Mouse
Modreveal
⭐
133
Utility to find hidden Linux kernel modules
Faction
⭐
133
Pen Test Report Generation and Assessment Collaboration
Docbleach
⭐
133
🚿 Sanitising your documents, one threat at a time. — Content Disarm & Reconstruction Software
Fisy Fuzz
⭐
133
This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.
Vigil Llm
⭐
132
⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs
Poro
⭐
132
Scan publicly accessible assets on your AWS cloud environment
Webpocket
⭐
131
Exploit management framework
Pgen
⭐
131
Command-line passphrase generator
Ossf Cve Benchmark
⭐
131
The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebases using a variety of static analysis security testing (SAST) tools and generate reports to evaluate those tools.
Keycroc Payloads
⭐
131
The Official Key Croc Payload Repository
Related Searches
Python Security Tools (592)
501-600 of 1,760 search results
< Previous
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.