77 Components & Libraries
Sortby
A Burp Suite Automation Tool
Standalone script written in Python 3 for generating reverse shells easily without typing. It automates the boring stuff like URL encoding the command and setting up a listener. The script has 4 depe…
Oblivion Client Oblivion Server For configuration or usage of Oblivion please read the documentation. All the steps were careful explained with images and examples. 1 - If you want only to use the fr…
Extract two-factor authentication (2FA, TFA, OTP) secret keys from export QR codes of "Google Authenticator" app. The secret and otp values can be printed and exported to json or csv. The QR codes ca…
It's an intelligent framework that detects security anomalies in all layer 7 assets and reports the same. As companies continue to expand their footprint on INTERNET via various acquisitions and geog…
Basic script to detect vulnerabilities into a PHP source code, it is using Regular Expression to find sinkholes. Currently detecting : if you want to export each vulnerabilities type into a folder us…
This Python script generates interpreted code which creates the supplied ELF as a file in memory and executes it (without tmpfs). This makes it possible to execute binaries without leaving traces on …
The standard of versioning on this project is: This version structure can be stored and displayed in a few ways:
If you like the project, you can buy me beers :)
To install randcrack, simply: This cracker works as the following way. It obtains first 624 32 bit numbers from the generator and obtains the most likely state of Mersenne Twister matrix, which is th…
Credential Digger is a GitHub scanning tool that identifies hardcoded credentials (Passwords, API Keys, Secret Keys, Tokens, personal information, etc), filtering the false positive data through mach…
Please find below the instructions to access the tool's help function, along with a list of all available switches:
A linux vulnerability scanner based on Vulners Audit API and Salt Open, with Slack notifications and JIRA integration. Note: Salt Master and Minion versions should match. Salt-Scanner supports Salt v…
A collection of security related Python and Bash shell scripts, mainly revolving around testing hosts for security vulnerabilities. For the shell scripts no fancy programming framework is required, a…
Execution Trace Viewer is an application for viewing, editing and analyzing execution traces. It was originally made for reverse engineering obfuscated code, but it can be used to analyze any kind of…
Python script to decode common encoded PowerShell scripts. Hope you find it helpful! Even more hacked together by @JohnLaTwC, Nov 2016 v 0.6 With apologies to @Lee_Holmes for using Python instead of …
Jira-Lens 🔍 is a Python Based vulnerability Scanner for JIRA. Jira is a proprietary issue tracking product developed by Atlassian that allows bug tracking and agile project management. This tool Perf…
STIX-shifter is an open source python library allowing software to connect to products that house data repositories by using STIX Patterning, and return results as STIX Observations. This library tak…
More coming soon! Please do not file GitHub issues or post on our public forum for security vulnerabilities, as they are public!
The installation of this tool is easy and you can install this tool in just three steps. To install DevBrute, follow these steps: DevBrute supports various configurations through command-line options…
Keeper Commander is a command-line and SDK interface to Keeper® Password Manager. Commander can be used to access and control your Keeper vault, perform administrative functions (such as end-user onb…
A collection of public offensive and defensive security related scripts for InfoSec students. Only run these in a controlled and authorized manner! Whenever available, original copyright notices are …
The original repo seemed abandoned, but I would be happy to merge back the changes to upstream version! A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite …
Metadata, in the realm of cybersecurity, is more than just embedded information; it's a gateway to insightful perspectives, often unveiling crucial leads in OSINT and pentesting. Drawing inspiration …
Please read these files first before starting: The usage of this keylogger project for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all appli…
Subscribe to our newsletter