Category
Showing 1451-1500 of 1,975 trending projects
A Python tool for black-box regex fuzzing to bypass validations and discover normalizations in web apps.
This is a Python project that analyzes a backdoor vulnerability in the Linksys WAG200G router.
A collection of Windows exploits and hacking tools for security research and penetration testing.
A set of tools for creating and injecting malicious image payloads for web attacks.
Open source metadata repository for security events, useful for security researchers and analysts.
A tool for generating undetectable webshells, which can be useful for security testing and penetration tasks.
This project allows you to create up to a thousand WiFi access points with custom SSIDs, useful for security testing.
A collection of open-source web security scanners for developers to assess web application vulnerabilities.
AI-powered penetration testing CLI using Gemini & LangChain for automated security workflows
Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation
This repository appears to be a security research project related to 802.11 wireless network vulnerabilities, not a developer tool for vibe coders.
This repository provides a tool for generating various types of webshells that are difficult to detect.
A Python-based reconnaissance framework for researching and investigating Telegram.
A collection of Windows 11 security hardening and configuration recommendations.
Weak password scanner for various services like FTP, SSH, SQL databases, and more.
A community-curated list of public bug bounty and responsible disclosure programs for security researchers.
Captfencoder is an open-source suite of network security tools, including crypto, hashing, and security utilities.
This Windows Local Privilege Escalation Cookbook provides PowerShell scripts and techniques for privilege escalation on Windows systems.
This is a Linux kernel CVE exploit analysis tool with a debugger environment, not focused on AI coding tools.
This book provides a comprehensive guide to understanding and exploiting the internals of the glibc heap for security researchers.
A toolkit for auditing and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities in web applications.
A security tool to help identify potentially vulnerable web services affected by the log4j vulnerabilities.
A security solution for Kubernetes and container environments, providing runtime protection and threat detection.
A mirror of a privacy-focused software recommendations repository focused on security and privacy.
PoC for the Zerologon vulnerability, which allows an attacker to completely compromise a Windows domain controller.
This repository provides resources and learning materials for software security research and education.
This is an automated wireless hacking tool written in Python, not a developer discovery platform focused on vibe coders.
A fast and efficient dork scanner written in Go for bug bounty and security research.
A Python script for batch scanning with the Acunetix AWVS scanner, supporting various vulnerability checks.
Trojan Source is a research project that exposes invisible vulnerabilities in source code.
A GUI framework for the Nuclei vulnerability PoC scanner, allowing quick PoC searches and one-click Nuclei runs.
GPU-based Onion Hash generator for developers working with cryptography and anonymity tools.
An advanced Python tool for email reconnaissance and cybersecurity research.
Forseti Security is a tool for managing security and compliance on the Google Cloud Platform.
Curated list of awesome security resources for security operations, threat hunting, and incident response
DRAKVUF Sandbox is an automated hypervisor-level malware analysis system for reverse-engineering and security research.
A secure, fast, and enterprise-level honeypot management system with support for multiple protocols.
A curated collection of periodic cyber security newsletters covering the latest news, research, and best practices.
A set of tools to tunnel TCP communication over HTTP, bypassing network restrictions in firewalled environments.
A Python script that generates a dictionary for fuzzing file uploads to detect vulnerabilities.
A passive sniffing tool for capturing and visualizing WiFi location data disclosed by iOS devices.
A Python-based tool for automating favicon-based reconnaissance during bug bounty and penetration testing.
This is a shell script for attacking wireless connections using Kali Linux tools.
An automation tool that enumerates subdomains and scans for web vulnerabilities.
Pillager is an information gathering tool for post-exploitation purposes.
A Go-based utility for penetration testing and network security, featuring DHCP, DNS, and other network spoofing capabilities.
A Rust plugin for sudo that requires another human to approve and monitor privileged sudo sessions for compliance.
This is a Docker-based environment for reproducing and testing IoT firmware vulnerabilities.
A curated list of vulnerable apps and systems for penetration testing practice.
A C# tool for discovering and exploiting SQL injection vulnerabilities across various databases.
Get weekly updates on trending AI coding tools and projects.