Category
Showing 851-900 of 1,975 trending projects
A subdomain takeover vulnerability checker tool written in Go for bug bounty hunting and security research.
A security scanner that helps identify issues with Drupal, Silverstripe and other CMSs.
This repository appears to be a security research project related to 802.11 wireless network vulnerabilities, not a developer tool for vibe coders.
A modular, open-source vulnerability scanner with automatic report generation capabilities.
PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)
This GitHub repository appears to be a collection of leaked QQ user data, not a developer tool.
This is a Python-based penetration testing framework for discovering vulnerabilities.
Python reference implementation of The Update Framework (TUF), a library for securing software update systems
An open-source software supply chain security solution for detecting dependencies, vulnerabilities, and license compliance.
Security tools and apps for Android, focused on hacking, penetration testing, and cybersecurity.
A powerful OSINT analysis and research tool for tracking people on the internet.
An automatic SSRF fuzzer and exploitation tool for penetration testing and security research.
PingCastle is a reporting tool that helps secure Active Directory by identifying and remediating security vulnerabilities.
ADB-Toolkit V2 is a collection of ADB scripts and tools for Android hacking and pentesting
A PowerShell script that checks and hardens the Windows configuration for better security.
A collection of Beacon Object Files (BOFs) for situational awareness tasks on compromised systems.
A Python-based web vulnerability scanner for developers to identify and mitigate security risks.
An open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system management.
Picocrypt is a small, secure encryption tool written in Go that can be used for file encryption and privacy.
A minimal and effective Wi-Fi, BLE, and 2.4 GHz band jammer written in C.
A curated collection of periodic cyber security newsletters covering the latest news, research, and best practices.
A password cracking tool for Windows that can bypass authentication without privileges
A collection of cheat sheets for penetration testing and security research.
A C# data collector for the BloodHound tool, which is used for Active Directory reconnaissance.
This is a C library for offensive operations, not a developer discovery platform for vibe coders.
A powerful network reconnaissance framework that allows you to build your own self-hosted alternatives to Shodan, ZoomEye and more.
A collection of Burpsuite plugins, articles, and usage tips for web security testing and penetration testing.
A comprehensive collection of tools for ethical hacking and penetration testing.
A Python library for spoofing Apple BLE proximity pairing messages, likely used for security research.
An offline Wi-Fi Protected Setup brute-force utility for security researchers and penetration testers.
A collection of automated and manual wordlists for content discovery and bruteforcing.
A tool to check which keychain items are available to an attacker once an iOS device has been jailbroken.
A tool to spoof TLS/JA3 fingerprints in Go and JavaScript for bypassing security measures.
A decentralized VPN written in Go that provides secure, privacy-preserving internet access.
A wireless penetration testing tool for cracking WPA/WPA2 handshakes and PMKID keys.
A curated list of awesome infosec courses and training resources for security professionals.
A high-level C2 framework for managing reverse TCP & HoaxShell-based shells with enhanced features
A Wi-Fi penetration testing framework for security researchers and ethical hackers.
A Go-based toolkit for building phishing campaigns and C2 infrastructure.
A curated list of awesome cybersecurity resources, tools, and learning materials.
A Suricata-based network detection and response (NDR) distribution for security monitoring and threat hunting.
An iOS security testing framework for penetration testing and vulnerability assessment of mobile apps.
Run frida-server on boot with Magisk, always up-to-date for Android exploitation and reverse-engineering.
SploitScan is a sophisticated cybersecurity utility for vulnerabilities and exploit analysis.
This is a stealth AirTag clone that bypasses Apple's tracking protection features, likely for nefarious purposes.
A PHP shell that bypasses disabled functions to achieve command execution.
This repository provides tools and configurations for accessing censorship-circumvention services like Shadowsocks, Clash, and Trojan.
This repository covers code execution and AV evasion methods for macros in Office documents.
Original C implementation of the Hell's Gate VX technique, a security research project.
This repository contains a tutorial for setting up a phishing toolkit on Kali Linux or Termux.
Get weekly updates on trending AI coding tools and projects.