Security

Security tools, research, and privacy

Showing 941-960 of 2,929 projects

google/osv.dev

A Python-based open-source vulnerability database and triage service for security professionals.

2.5K
Active
Python
Security Research
Security Tools
Python
#security#vulnerability-management#vulnerability-database

monoxgas/sRDI

Reflective DLL Injection to convert DLLs into position-independent shellcode

2.5K
Archived
PowerShell
Security Research
#shellcode#dll-injection#security-research

FiloSottile/Heartbleed

A Go-based tool for checking if a website is vulnerable to the Heartbleed OpenSSL bug (CVE-2014-0160).

2.5K
Archived
Go
Security Research
#security#vulnerability-checking#openssl

CVEProject/cvelistV5

CVE cache of the official CVE List in CVE JSON 5 format, providing developers with a comprehensive vulnerability database.

2.5K
Active
Security Research
API Clients & Testing
#vulnerability#cve#security

sekey/sekey

A Rust library that uses Touch ID / Secure Enclave for secure SSH authentication.

2.5K
Archived
Rust
Authentication
CLI Tools
#authentication#ssh#secure-enclave

evilsocket/bettercap

A security and network analysis tool for penetration testing and man-in-the-middle attacks.

2.5K
Archived
Security Research
CLI Tools
#security#network-analysis#mitm

Impact-I/reFlutter

A reverse engineering framework for Flutter, focused on security research and bug bounty programs.

2.5K
Active
Python
Security Research
Flutter
#reverse-engineering#mobile-security#ssl-pinning

obheda12/GitDorker

A Python tool to scrape GitHub for sensitive information using a large repository of dorks.

2.5K
Archived
Python
API Clients & Testing
CLI Tools
Python
#github#security#scraping

thewhiteh4t/nexfil

An open-source OSINT tool for finding profiles by username across various social media platforms.

2.5K
Archived
Python
Cybersecurity
CLI Tools
Python
#open-source-intelligence#osint#cybersecurity

coffeehb/Some-PoC-oR-ExP

This repository contains a collection of vulnerability proof-of-concepts and exploits for security research purposes.

2.5K
Experimental
Python
Security Research
#security-research#vulnerability-poc#penetration-testing

vuvuzela/vuvuzela

A private messaging system that hides metadata, built with Go, focused on privacy and research.

2.5K
Archived
Go
Privacy Tools
Realtime
#privacy#cryptography#messaging

cujanovic/SSRF-Testing

SSRF (Server Side Request Forgery) testing resources for security professionals.

2.5K
Archived
Python
Penetration Testing
#pentest#ssrf#server-side-request-forgery

weggli-rs/weggli

weggli is a fast and robust semantic search tool for C and C++ codebases to help security researchers identify interesting functionality.

2.5K
Archived
Rust
CLI Tools
Security Research
#code-search#security#reverse-engineering

infosec-au/altdns

A Python library that generates and resolves permutations of subdomains, useful for security researchers.

2.5K
Archived
Python
Security Research
CLI Tools
#security#subdomain-enumeration#penetration-testing

Cloud-Architekt/AzureAD-Attack-Defense

A collection of attack scenarios and mitigations for Microsoft Entra ID (Azure Active Directory).

2.5K
Stable
PowerShell
Security Research
Authentication
#azure-active-directory#authentication#security-research

pycrypto/pycrypto

The Python Cryptography Toolkit provides a set of cryptographic primitives and utilities for developers.

2.5K
Archived
Python
Security Research
#cryptography#security#python

cisagov/ScubaGear

Automation tool to assess M365 tenant security against CISA baselines for cybersecurity compliance.

2.5K
Active
PowerShell
Security Automation
Authentication
PowerShell
#assessment-tool#cisa#cybersecurity

pwnlandia/mhn

A Python-based honeypot framework for setting up and managing modern honeypot sensors.

2.5K
Archived
Python
Security Research
CLI Tools
Python
#honeypot#security#monitoring

zhaoweih/Shadowsocks-Tutorial

Easy-to-follow tutorials for beginners on using Shadowsocks to bypass internet restrictions.

2.5K
Stable
Shell
Privacy Tools
#shadowsocks#vpn#internet-access

s0lst1c3/eaphammer

This is a tool for conducting targeted evil twin attacks against WPA2-Enterprise networks and performing indirect wireless pivots using hostile portal attacks.

2.5K
Archived
C
Penetration Testing
#penetration-testing#wireless-attacks#evil-twin
1...4749...147

Stay in the loop

Get weekly updates on trending AI coding tools and projects.