Here are
958 public repositories
matching this topic...
Exploitation Framework for Embedded Devices
-
Updated
Aug 27, 2021
-
Python
-
Updated
Sep 4, 2021
-
Python
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
-
Updated
Sep 5, 2021
-
Python
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
-
Updated
Jul 24, 2021
-
PowerShell
Damn Vulnerable Web Application (DVWA)
A collection of open source and commercial tools that aid in red team operations.
A curated list of awesome infosec courses and training resources.
A list of interesting payloads, tips and tricks for bug bounty hunters.
Hetty is an HTTP toolkit for security research.
⬆️ ☠️ Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket
A collected list of awesome security talks
Collaborative Penetration Test and Vulnerability Management Platform
-
Updated
Sep 3, 2021
-
Python
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
-
Updated
Mar 16, 2021
-
Python
🔍 A collection of interesting, funny, and depressing search queries to plug into
https://shodan.io/ 👩💻
A collection of all the data i could extract from 1 billion leaked credentials from internet.
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
-
Updated
Aug 13, 2021
-
JavaScript
🔐 Security advisories as a simple composer exclusion list, updated daily
A python script that finds endpoints in JavaScript files
-
Updated
Jan 5, 2021
-
Python
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
-
Updated
Sep 2, 2021
-
Jupyter Notebook
Awesome Node.js Security resources
-
Updated
Aug 11, 2021
-
JavaScript
📡 A python program to create a fake AP and sniff data.
-
Updated
Nov 3, 2019
-
Python
Scan for open S3 buckets and dump the contents
-
Updated
Apr 24, 2021
-
Python
A proposed standard that allows websites to define security policies.
-
Updated
Jul 11, 2021
-
HTML
This challenge is Inon Shkedy's 31 days API Security Tips.
Subdomain Takeover tool written in Go
Improve this page
Add a description, image, and links to the
infosec
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
infosec
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.
Can we have a feature where a normal brute force is running based on HTTP response like 403/401 do a recursive brute force on that endpoint?