Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for shell information security
information-security
x
shell
x
13 search results found
Nishang
⭐
7,771
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Securityonion
⭐
2,589
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
Emba
⭐
2,229
EMBA - The firmware security analyzer
Hardening
⭐
1,252
Hardening Ubuntu. Systemd edition.
Chimera
⭐
1,192
Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Goofuzz
⭐
1,119
GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking).
Inventory
⭐
1,019
Asset inventory of over 800 public bug bounty programs.
Frogy
⭐
622
My subdomain enumeration script. It's unique in the way it is built upon.
Chashell
⭐
599
Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
Hershell
⭐
367
Hershell is a simple TCP reverse shell written in Go.
Qvm Create Windows Qube
⭐
312
Spin up new Windows qubes quickly, effortlessly and securely on Qubes OS
Credphish
⭐
262
CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.
Woobuntu
⭐
252
Arsenal
⭐
247
Arsenal is a Simple shell script (Bash) used to install tools and requirements for Bug Bounty
Magicrecon
⭐
240
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Armor
⭐
238
Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
Contact.sh
⭐
196
An OSINT tool to find contacts in order to report security vulnerabilities.
Gf Secrets
⭐
176
Secret and/or credential patterns used for gf.
Osmedeus Base
⭐
163
Build your own reconnaissance system with Osmedeus Next Generation
Autosetup
⭐
162
Auto setup is a bash script compatible with Debian based distributions to install and setup necessary programs.
Secretopt1c
⭐
156
SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accuracy!
Self Way
⭐
117
Built to learn ethical hacking on your own
Articles
⭐
116
Various articles I've written
Sharpshellpipe
⭐
102
This lightweight C# demo application showcases interactive remote shell access via named pipes and the SMB protocol.
Netset
⭐
102
Operational Security utility and automator.
Secfiles
⭐
94
My files for security assessments, bug bounty and other security related stuff
Oob Server
⭐
92
A Bind9 server for pentesters to use for Out-of-Band vulnerabilities
Argos
⭐
86
This script will automatically set up an OSINT workstation starting from a Ubuntu OS.
Malware Feed
⭐
82
Bringing you the best of the worst files on the Internet.
Talosplus
⭐
70
Talosplus is a fast and robust template based Intelligent automation framework primarily developed for Bug Bounty Automation
Chkdomain
⭐
57
🔍 Discover if a domain is resolvable or blocked by secure DNS and Ad-blocking services, and experience the innovative idea of DaaS - DNS as an Intelligence Service.
Auto.sh
⭐
55
This script is (Mainly) for Beginner's
Containers
⭐
53
Automated privilege escalation of the world's most popular Docker images.
Sifter
⭐
49
Sifter - All purpose penetration testing op-center
Wifi Pineapple Cloner
⭐
47
Port WiFi Pineapple NANO/TETRA in generic hardware
Matrix
⭐
47
My Privacy DNS #Matrix lists for blacklisting
Advancedkeyhacks
⭐
47
API Key/Token Exploitation Made easy.
Termux Snippets
⭐
46
An integrated tool and a collection of snippets which helps in the various aspects of the terminal.
Gorsh
⭐
44
A Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
Cyber Security
⭐
41
This repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Phisherprice
⭐
38
All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Ultimate_bughunter_tools
⭐
35
Ultimate Package Of 50 Bug Bounty Hunting Tools
Xssrocket
⭐
33
XSS Rocket is written by Black Hat Ethical Hacking with the help of #ChatGPT as experimentation, with a lot of hours spent modifying the code generated by ChatGPT, and is designed for Offensive Security and XSS (Cross-Site Scripting) attacks.
Scvault
⭐
33
Custom scripts for directory fuzzing, subdomain enumeration, and more.
Sckg
⭐
32
Security Control Knowledge Graph
Scopehunter
⭐
31
ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.
Twitter Seclists
⭐
28
Curated lists of InfoSec on Twitter. Main focus is Bug Bounty.
Grepthecurl
⭐
26
One liner regex match to search inside JS files, using curl and grep!
Android Scripts
⭐
25
Some simple scripts that I use during bug bounty hunting in Android Apps
Bootsy
⭐
25
Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (port and service spoofing) for network deception, this tool allows you to detect an attacker on the network quickly by weeding out general noisy alerts with only those that matter.
Siem From Scratch
⭐
25
SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab
Nefias
⭐
24
Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection
Tacos
⭐
23
🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)
Project Athena
⭐
22
This project aims to provide a comprehensive IT-Security curriculum for secondary colleges in engineering.
Ggtfobins
⭐
17
Get GTFOBins info about a given exploit from the command line
Vagrant Ids
⭐
16
An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Flaskbomb
⭐
16
GZip HTTP Bombing in Python for everyone
Thecollective
⭐
16
The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/TheCollective #infosec #redteaming #pentest
Championscurriculum
⭐
15
A training curriculum for teaching information security "champions" within small organisations and helping them conduct a basic assessment. (Work in progress)
Nucleimonst3r
⭐
15
Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs and exploits but also gather all the technology running behind them for further investigation for a potential target.
Nrd List Downloader
⭐
14
Shell Script to download NRD(Newly Registered Domain) list for free
Securitytxt Tools
⭐
13
Tools related to RFC 9116 (security.txt)
Illegal Auth Attempts
⭐
13
🔒 Lists of IPs making illegal auth attempts and users used doing so
Secr
⭐
12
Application security made easy
Kingster
⭐
12
Program to defend King.txt for TryHackMe's Koth
Shellcomm Php
⭐
11
Communicate with a remote shell easily
Arcane
⭐
11
Arcane is a simple script designed to backdoor iOS packages (iphone-arm) and create the necessary resources for APT repositories.
The Box
⭐
10
A tool box with 174 useful and common Linux tools for penetration testing and security audits.
Jamfprothreathunting
⭐
9
Scripts to aid intrusion and malware detection using the Jamf Agent and Jamf Server
Dnskron
⭐
8
Fast DNS history enumeration tool for network and OSINT investigations
Sheller
⭐
8
Reverse Shell Payload Generator, Python 3.x
Lazybox
⭐
8
The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary libraries, drivers, and tools.
Apkrev
⭐
7
android app reverse engineering pipeline
Pdfbrute
⭐
7
PDFBrute can take a wordlist as a input and use it to bruteforce a encrypted PDF file password. It used qpdf to achieve this.
Passive Subd
⭐
6
This is a Simple Bash Script for Automating gathering the Passive Subdomian Enumeration with various Tools.
Tendaspill
⭐
6
An exploitation tool to extract passwords using CVE-2015-5995.
Python3 Tools
⭐
6
Python3 Tools that may be useful to pen testers
Infosec
⭐
5
infosec stuff
Asio
⭐
5
All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.
Rshell
⭐
5
A reverse shell generator
Bee
⭐
5
Bee Recon Framework
Xss_finder
⭐
5
Cross-Site Scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter in the OWASP Top 10 project and it is a highly chased vulnerability in bug bounty programs. The xss finder gets a link from the user and scan the website for XSS vulnerability by injecting malicious scripts at the input place.
Related Searches
Shell Docker (20,660)
Shell Script (15,351)
Shell Bash (10,338)
Shell Command Line (6,542)
Shell Dotfiles (5,338)
Shell Git (4,715)
Shell Ansible (4,427)
Shell Server (3,563)
Shell Ssh (3,562)
Shell Docker Image (3,406)
1-13 of 13 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.