Here are
873 public repositories
matching this topic...
Exploitation Framework for Embedded Devices
-
Updated
Mar 24, 2021
-
Python
-
Updated
May 19, 2021
-
Python
SpiderFoot automates OSINT so you can focus on analysis.
-
Updated
May 11, 2021
-
Python
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
-
Updated
Nov 2, 2020
-
PowerShell
Damn Vulnerable Web Application (DVWA)
A collection of open source and commercial tools that aid in red team operations.
A curated list of awesome infosec courses and training resources.
Hetty is an HTTP toolkit for security research.
A list of interesting payloads, tips and tricks for bug bounty hunters.
A collected list of awesome security talks
Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins ⬆️ ☠️
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
-
Updated
Mar 16, 2021
-
Python
Collaborative Penetration Test and Vulnerability Management Platform
-
Updated
May 18, 2021
-
Python
A collection of all the data i could extract from 1 billion leaked credentials from internet.
🔍 A collection of interesting, funny, and depressing search queries to plug into
https://shodan.io/ 👩💻
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
-
Updated
May 11, 2021
-
JavaScript
🔐 Security advisories as a simple composer exclusion list, updated daily
A python script that finds endpoints in JavaScript files
-
Updated
Jan 5, 2021
-
Python
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
-
Updated
May 7, 2021
-
Jupyter Notebook
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
📡 A python program to create a fake AP and sniff data.
-
Updated
Nov 3, 2019
-
Python
A proposed standard that allows websites to define security policies.
-
Updated
Apr 15, 2021
-
HTML
Scan for open S3 buckets and dump the contents
-
Updated
Apr 24, 2021
-
Python
Awesome Node.js Security resources
-
Updated
May 9, 2021
-
JavaScript
VirusTotal Wanna Be - Now with 100% more Hipster
This challenge is Inon Shkedy's 31 days API Security Tips.
Improve this page
Add a description, image, and links to the
infosec
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
infosec
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.
Can we have a feature where a normal brute force is running based on HTTP response like 403/401 do a recursive brute force on that endpoint?