Category
Showing 1651-1700 of 1,975 trending projects
This repository is a security tool for detecting and analyzing IMSI-catchers, which are mobile network surveillance devices.
A Python library for patching PE, ELF, and Mach-O binaries with shellcode, primarily for security research and penetration testing.
This is a deprecated WiFi hacking tool that can be used for man-in-the-middle attacks and network sniffing.
A repository with interview preparation material for penetration testing and security roles.
An open-source USB Rubber Ducky project that can be used for pen-testing and security research.
A remote administration tool for iOS/macOS/Linux that provides advanced exploitation and security capabilities.
An open-source Java-based network intrusion detection and response system for visibility and security.
A Python tool to search for leaked credentials in the PWNDB database.
Conscrypt is a Java Security Provider that implements parts of the Java Cryptography Extension and Java Secure Socket Extension.
A DNS enumeration tool that can be used for network reconnaissance and security testing.
An open-source Go library that uncovers unexpected SSH server exposures and vulnerabilities.
HostHunter is an open-source OSINT tool for discovering hostnames and IP addresses during security assessments and penetration testing.
An antivirus evasion project written in C#, focused on bypassing antivirus detection.
Collection of PoC and offensive techniques used by the BlackArrow Red Team
An open-source collection of incident response methodologies and frameworks for security professionals.
This C# tool generates executable files that can bypass antivirus detection for malicious purposes.
A comprehensive guide to Secure Shell (SSH) tunneling, port redirection, and network traffic manipulation for security professionals.
A Python tool for mapping and tracking WiFi networks and devices without being connected to them.
A security-focused firmware for FIDO2 and U2F hardware security keys, written in C.
A simple FOFA client written in JavaFX for security researchers and red teams.
Open source platform to enhance security and observability of cloud native applications and infrastructure
Software to identify different types of hashes, useful for security researchers and pentesters.
An API security project presenting unique attack and defense methods in the API security field.
Strongbox is a secure password manager for iOS and macOS, featuring encryption, password generation, and KeePass support.
A collection of hacking tools and resources in C# for developers interested in cybersecurity.
An active defense and EDR software to empower blue teams and detect security threats on Windows systems.
LSTAR is a comprehensive post-exploitation plugin for CobaltStrike, a popular penetration testing framework.
A collection of security-focused writeups and resources for web application security researchers and developers.
This is a Python script for monitoring and crawling the Chinese Darknet, not a developer discovery platform.
PoC for a local privilege escalation vulnerability in the pkexec command of the polkit library (CVE-2021-4034)
A Python library that provides various UAC bypass, elevation, and persistence methods for Windows.
ESLint plugin that provides security-related linting rules for Node.js projects
A Python tool that helps discover subdomains, secrets, and external JavaScript files for security testing and bug bounty hunting.
A Python-based tool to bypass the Great Firewall of China's TLS SNI detection.
An open-source penetration testing tool for scanning and exploiting internal networks in Windows, Linux, and Mac environments.
This GitHub repository is a collection of Java security resources and summaries, focused on security auditing.
This is a GUI launcher for the XRAY web vulnerability scanning tool, focusing on web security.
Suricata IDS rules to detect red team and malicious behavior like CobaltStrike, MSF, Empire, etc.
A repository containing proof-of-concept projects, experiments, and security resources for developers.
This is a workshop focused on local privilege escalation techniques on Windows and Linux systems, not a developer tool for AI-powered coding.
A toolkit of hacking tools and gadgets for security researchers and penetration testers.
A tool to build a database of libc offsets to simplify exploitation for CTF challenges and security research.
This is a collection of high-risk vulnerability exploitation tools, likely not intended for vibe coders.
Librefox is a Firefox-based browser with privacy enhancements for security-conscious users.
An open-source SSH man-in-the-middle tool for penetration testing and security research.
An extensible, multi-threaded internal network penetration testing tool with various plugins for information gathering, vulnerability scanning, and more.
An utility tool that integrates high-risk vulnerability exploits for security researchers and penetration testers.
PoC for the Zerologon vulnerability, which allows an attacker to completely compromise a Windows domain controller.
This is a comprehensive network security tool for professionals and enthusiasts, featuring decryption, analysis, scanning, and traceability.
A C++ tool for bypassing security products by obscuring the intentions of a process.
Get weekly updates on trending AI coding tools and projects.