Trending Projects

Discover the fastest growing open source projects

Showing 601-650 of 1,975 trending projects

#601
cipher387/Dorks-collections-list

A collection of Github repositories and articles with lists of dorks for different search engines.

0
0.0%
2.5K
total stars
#602
xgit01/sgkrank

This repository appears to contain resources related to social engineering and hacking tools, not a developer platform.

0
0.0%
2.5K
total stars
#603
gloxec/CrossC2

This repository generates a CobaltStrike cross-platform payload for red team activities.

0
0.0%
2.5K
total stars
#604
Hacking-the-Cloud/hackingthe.cloud

An encyclopedia for offensive and defensive security knowledge in cloud native technologies.

0
0.0%
2.5K
total stars
#605
googleprojectzero/winafl

A fork of AFL for fuzzing Windows binaries, focused on security research and finding vulnerabilities.

0
0.0%
2.5K
total stars
#606
OnionBrowser/OnionBrowser

An open-source, privacy-enhancing web browser for iOS, utilizing the Tor anonymity network.

0
0.0%
2.5K
total stars
#607
dirkjanm/ROADtools

A collection of tools for offensive and defensive security on the Azure AD/Microsoft Entra platform.

0
0.0%
2.5K
total stars
#608
brendan-rius/c-jwt-cracker

A C-based JWT brute force cracker for security testing and research.

0
0.0%
2.5K
total stars
#609
rockbruno/swiftshield

A Swift obfuscator that protects iOS apps against reverse engineering attacks.

0
0.0%
2.5K
total stars
#610
Nickyie/Cybersecurity-Resources

A comprehensive library of cybersecurity resources for developers and security professionals.

0
0.0%
2.5K
total stars
#611
r0eXpeR/redteam_vul

A collection of common system vulnerabilities encountered in red team operations.

0
0.0%
2.5K
total stars
#612
MatsuriDayo/Matsuri

Matsuri is an Android app and toolchain for bypassing internet censorship using Shadowsocks and V2Ray.

0
0.0%
2.5K
total stars
#613
sbousseaden/EVTX-ATTACK-SAMPLES

A curated collection of Windows Event Log samples for security research and threat hunting.

0
0.0%
2.5K
total stars
#614
open-keychain/open-keychain

OpenKeychain is an open-source OpenPGP implementation for secure communication on Android.

0
0.0%
2.5K
total stars
#615
m0rtem/CloudFail

A Python tool that can discover hidden IP addresses behind Cloudflare using misconfigured DNS and old database records.

0
0.0%
2.5K
total stars
#616
activecm/rita-legacy

A framework for detecting command and control communication through network traffic analysis.

0
0.0%
2.5K
total stars
#617
joaomatosf/jexboss

JexBoss is a tool to verify and exploit Java deserialization vulnerabilities in JBoss and other Java applications.

0
0.0%
2.5K
total stars
#618
chrisk44/Hijacker

This is an Android GUI application that provides tools for wireless network cracking and monitoring, not a developer platform for vibe coders.

0
0.0%
2.5K
total stars
#619
HACKERALERT/Picocrypt

Picocrypt is a small, secure encryption tool for developers focused on privacy and security.

0
0.0%
2.5K
total stars
#620
Barre/privaxy

Privaxy is a next-generation ad and tracker blocker that blocks ads and trackers by MITMing HTTP(s) traffic.

0
0.0%
2.5K
total stars
#621
jedisct1/piknik

A secure clipboard sharing tool that allows copying and pasting anything over the network.

0
0.0%
2.5K
total stars
#622
elastic/detection-rules

An open-source library for creating security detection rules and threat hunting content.

0
0.0%
2.5K
total stars
#623
rsmusllp/king-phisher

A Python toolkit for conducting phishing campaigns and security testing, not suitable for vibe coders.

0
0.0%
2.5K
total stars
#624
r4j0x00/exploits

This repository appears to contain C-based exploit code and is not related to a developer discovery platform focused on vibe coders.

0
0.0%
2.5K
total stars
#625
google/osv.dev

A Python-based open-source vulnerability database and triage service for security professionals.

0
0.0%
2.5K
total stars
#626
monoxgas/sRDI

Reflective DLL Injection to convert DLLs into position-independent shellcode

0
0.0%
2.5K
total stars
#627
FiloSottile/Heartbleed

A Go-based tool for checking if a website is vulnerable to the Heartbleed OpenSSL bug (CVE-2014-0160).

0
0.0%
2.5K
total stars
#628
CVEProject/cvelistV5

CVE cache of the official CVE List in CVE JSON 5 format, providing developers with a comprehensive vulnerability database.

0
0.0%
2.5K
total stars
#629
evilsocket/bettercap

A security and network analysis tool for penetration testing and man-in-the-middle attacks.

0
0.0%
2.5K
total stars
#630
Impact-I/reFlutter

A reverse engineering framework for Flutter, focused on security research and bug bounty programs.

0
0.0%
2.5K
total stars
#631
coffeehb/Some-PoC-oR-ExP

This repository contains a collection of vulnerability proof-of-concepts and exploits for security research purposes.

0
0.0%
2.5K
total stars
#632
thewhiteh4t/nexfil

An open-source OSINT tool for finding profiles by username across various social media platforms.

0
0.0%
2.5K
total stars
#633
vuvuzela/vuvuzela

A private messaging system that hides metadata, built with Go, focused on privacy and research.

0
0.0%
2.5K
total stars
#634
cujanovic/SSRF-Testing

SSRF (Server Side Request Forgery) testing resources for security professionals.

0
0.0%
2.5K
total stars
#635
Cloud-Architekt/AzureAD-Attack-Defense

A collection of attack scenarios and mitigations for Microsoft Entra ID (Azure Active Directory).

0
0.0%
2.5K
total stars
#636
infosec-au/altdns

A Python library that generates and resolves permutations of subdomains, useful for security researchers.

0
0.0%
2.5K
total stars
#637
pycrypto/pycrypto

The Python Cryptography Toolkit provides a set of cryptographic primitives and utilities for developers.

0
0.0%
2.5K
total stars
#638
cisagov/ScubaGear

Automation tool to assess M365 tenant security against CISA baselines for cybersecurity compliance.

0
0.0%
2.5K
total stars
#639
pwnlandia/mhn

A Python-based honeypot framework for setting up and managing modern honeypot sensors.

0
0.0%
2.5K
total stars
#640
zhaoweih/Shadowsocks-Tutorial

Easy-to-follow tutorials for beginners on using Shadowsocks to bypass internet restrictions.

0
0.0%
2.5K
total stars
#641
s0lst1c3/eaphammer

This is a tool for conducting targeted evil twin attacks against WPA2-Enterprise networks and performing indirect wireless pivots using hostile portal attacks.

0
0.0%
2.5K
total stars
#642
Ignitetechnologies/BurpSuite-For-Pentester

This is a cheatsheet for Burp Suite, a popular security testing tool used by bug bounty hunters and penetration testers.

0
0.0%
2.5K
total stars
#643
crytic/building-secure-contracts

Guidelines and training material to write secure smart contracts on the Ethereum blockchain.

0
0.0%
2.5K
total stars
#644
splunk/attack_range

A tool for creating vulnerable environments to simulate attacks and collect data into Splunk for security research and detection.

0
0.0%
2.5K
total stars
#645
conorpp/u2f-zero

A hardware U2F security token optimized for physical security, affordability, and style.

0
0.0%
2.5K
total stars
#646
arthaud/git-dumper

A tool to dump a git repository from a website, useful for security researchers and developers.

0
0.0%
2.4K
total stars
#647
TH3xACE/SUDO_KILLER

A tool to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems.

0
0.0%
2.4K
total stars
#648
nil0x42/phpsploit

A full-featured C2 framework for silently persisting on webservers with a single-line PHP backdoor.

0
0.0%
2.4K
total stars
#649
ankit0183/Wifi-Hacking

A Python-based cybersecurity tool for hacking wireless connections using built-in Kali Linux tools.

0
0.0%
2.4K
total stars
#650
Gedsh/InviZible

An Android app for online privacy and security, featuring tools like Tor, I2P, and DNSCrypt.

0
0.0%
2.4K
total stars
1...1214...40

Stay in the loop

Get weekly updates on trending AI coding tools and projects.