Category
Showing 1751-1800 of 1,974 trending projects
A program designed to search for and eliminate silent cryptocurrency miners on a system.
A toolkit to attack Office365 using various security tools and techniques.
A PowerShell framework for attacking RDP sessions and lateral movement in Windows environments.
This is a security scanning tool for internal networks, not a vibe coder platform.
A Python library that helps developers bypass URL parsing restrictions and security checks.
Collection of vulnerable PHP code snippets for security research and bug bounty hunting.
AntiSpy is a free anti-virus and rootkits toolkit that can detect, analyze, and restore kernel modifications.
A Python library that decrypts and logs a process's SSL traffic for security analysis.
A repository providing examples and tools for conducting security assessments on Azure and AWS cloud environments.
IntelMQ is a security incident handling solution for IT security teams to collect and process security feeds.
A ready-to-go phishing platform built with JavaScript for malicious social engineering attacks.
A curated list of Immunefi bug bounty writeups, useful for security researchers and bug bounty hunters.
An OSINT tool for location tracking and social engineering attacks.
Secure chat software for your computer using cryptography to protect conversations.
A large collection of learning resources and labs for offensive security enthusiasts and professionals.
A security tool for developers to hunt endpoints, expose shadow APIs, and map attack surfaces.
A PowerShell-based utility for creating malicious Office macro documents.
This is a GitHub repository for a security vulnerability in Microsoft Teams that allows for remote code execution.
A self-hosted VPN deployment with DNS ad blocking for privacy protection.
A directory traversal fuzzer tool written in Perl for penetration testing and security research.
A static analyzer for PE executables, useful for malware analysis and security research.
A collection of handy bookmarks for penetration testing and security research.
A Python tool for sending phishing messages and attachments to Microsoft Teams users.
An open-source collection of incident response methodologies and frameworks for security professionals.
A Go-based port of Wappalyzer that automates mass scanning to uncover technologies used on websites.
CloudBrute is an awesome cloud enumeration tool written in Go that helps security researchers and penetration testers discover cloud security issues.
A tool for cloning and running the popular WiFi Pineapple security device on generic hardware.
A vulnerable server used for learning software exploitation, written in C.
WebMap-Nmap Web Dashboard and Reporting tool for cybersecurity professionals
A Python library for Active Directory reconnaissance tasks, useful for penetration testing.
This is a kernel exploit for the PS Vita on firmwares 3.65-3.68, allowing for jailbreaking and hacking capabilities.
A repository containing proof-of-concept projects, experiments, and security resources for developers.
A file-sharing tool that allows you to find the responsible person in case of a data leakage.
A Python PoC tool that packages payloads into various output containers to evade detection and demonstrate risks.
A cross-platform honeypot web server designed to punish and deter unruly HTTP bots and spammers.
A HTML5/CSS3 version of a security certification roadmap for developers.
A Python tool that generates randomized Cobalt Strike C2 malleable profiles for red teaming activities.
A collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+, a popular red team toolkit.
Collection of Python-based security exploits and research tools written by the Rhino Security Labs team.
A Burpsuite plugin for automating the bypass of authentication and WAF protections.
This GitHub repository contains a collection of anti-virus evasion techniques for developers.
Cryptomator for Android is an open-source file encryption tool for secure cloud storage access.
A PoC tool to coerce Windows hosts to authenticate to other machines via the MS-RPRN RPC interface.
An exploitation framework based on Python for Industrial Control System (ICS) and SCADA security research.
An advanced in-memory evasion technique for encrypting and decrypting shellcode contents.
PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)
A Python tool to access the front and back cameras of a target's phone by sending a phishing link.
This is a script for hacking Instagram accounts using a brute-force password cracking technique.
A transparent ransomware claim tracker for monitoring and analyzing ransomware activity on the dark web.
Get weekly updates on trending AI coding tools and projects.