Lists (1)
Sort Name ascending (A-Z)
Stars
A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them billions of unique source addresses!
Keylogger is 100% invisible keylogger not only for users, but also undetectable by antivirus software. keylogger Monitors all keystokes, Mouse clicks. It has a seperate process which continues capt…
The RethinkDNS resolver that deploys to Cloudflare Workers, Deno Deploy, Fastly, and Fly.io
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
Network Forensics CLI utility that performs Network Scanning, OSINT, and Attack Detection
A compact and portable WiFi reconnaissance suite based on the ESP8266
These are all of notes from David Bombal's CCNA Start course
An app that utilizes the flipper zero to scan for BT devices vulnerable to the BlueBorne exploit, allowing for complete control of the device.
Low-cost LS/FS/HS USB sniffer with Wireshark interface
Scripts I use during pentest engagements.
Scripts I use during pentest engagements.
Trace Labs OSINT Linux Distribution based on Kali.
This is a repo containing several osint sources
Here we discuss how one can investigate crypto hacks and security incidents, and collect all the possible tools and manuals! PRs are welcome! If any tool is missing - please open PR!
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
The most unusual OSINT guide you've ever seen. The repository is intended for bored professionals only. PRs are welcome!
A curated list of hacking environments where you can train your cyber skills legally and safely
📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices.
A list of resources for those interested in getting started in bug bounties
Containerized version of my fork of Nahamsec's Lazyrecon.
The labs for my Udemy course (https://www.udemy.com/course/intro-to-bug-bounty-by-nahamsec)
A set of guidelines and best practices for an awesome engineering team
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
A Django-based domain name registrar that interfaces with an EPP registry
Automation to assess the state of your M365 tenant against CISA's baselines
RedEye is a visual analytic tool supporting Red & Blue Team operations