Category
Showing 1751-1800 of 1,974 trending projects
DumpsterDiver is a Python tool to search for secrets in various file types.
A modular, customizable tool for building security incident scenarios and artifacts for Blue/Red Team operations.
A utility to find AES keys in running processes, useful for security research and testing.
This repository provides information on how to find leaked credentials, which can be useful for security research.
This is a burp plugin for automatically recognizing and solving CAPTCHA challenges.
A Python CLI tool for multi-cloud and multi-SaaS asset management, security posture monitoring, and attack surface reduction.
This is a curated list of Burp Suite resources, including 400+ open source plugins and 400+ posts/videos.
A sensitive information protection toolkit written in Go for secure data handling.
MagicRecon is a shell script that automates the recon and data collection process to find common vulnerabilities.
A Python library and CLI tool equivalent to the CyberChef tool for data format conversion and processing.
A Python script for detecting Windows systems infected with the DOUBLEPULSAR malware implant.
This repository contains tools for web shell malware evasion and encrypted traffic transmission.
EZ is a cross-platform vulnerability scanner that combines information gathering, port scanning, service brute-forcing, URL crawling, and fingerprinting.
An open-source Android app that tests for recent device vulnerabilities to improve Android security.
Sublert is a security and reconnaissance tool that leverages certificate transparency to monitor new subdomains and SSL/TLS certificates.
This is a C++ rootkit designed to provide stealth and evasion capabilities to malicious software.
A C# Command & Control framework for security research and penetration testing
This repository contains the source code for the book 'Violent Python' focused on cybersecurity and ethical hacking tools.
ToRat is a remote administration tool written in Go that uses Tor as a transport mechanism and RPC for communication.
A Python tool for penetration testers to audit domain passwords.
A Python-based tool for finding exploit code from various exploit databases.
A comprehensive web security dictionary for security researchers and penetration testers.
A collection of Python scripts used during penetration testing engagements.
Execute untrusted code with custom permissions in a secure sandboxed environment.
Obfuscate specific Windows APIs with different APIs for malware research and security applications.
A C++ tool for loading and executing remote AES encrypted PE files in memory, commonly used for malware analysis and penetration testing.
Python low-interaction honeyclient for security research and incident response
An SSL-enabled credential harvester and Word document template URL injector for security research.
A framework for constructing self-spreading binaries, a type of malware, written in Go.
Hackazon is a modern vulnerable web app for security research and training purposes.
A Python tool to search popular search engines for security research and reconnaissance.
A secure, native-level encryption library for Android that uses the ChaCha20-Poly1305 algorithm and the libsodium library.
A utility to examine and validate certificates in a variety of formats, useful for developers working with security and cryptography.
CACTUSTORCH is a library for generating payloads for adversary simulations, not a developer discovery platform.
This GitHub repository does not provide enough information to classify it as a developer discovery platform for vibe coders.
A Go-based shellcode encryptor and obfuscator tool for penetration testing and red team activities.
An HTTP/HTTPS proxy tool written in Go for security research and penetration testing.
A Python library for patching binaries via a man-in-the-middle (MITM) attack using BackdoorFactory and mitmProxy.
A shell script that can extract sensitive information from Android apps for security auditing.
A course on intermediate-level Linux exploitation, focusing on Python-based techniques.
A fast asset fingerprinting tool that queries data from popular security platforms like Fofa, ZoomEye, and Shodan.
A security tool for evading memory scanners used in Cobalt Strike UDRL attacks.
A blazing-fast security auditing tool for Kubernetes that helps DevOps and security teams secure their cloud-native infrastructure.
Legion is an automatic enumeration tool based on open-source tools for security professionals and pentesters.
This is a workshop focused on local privilege escalation techniques on Windows and Linux systems, not a developer tool for AI-powered coding.
This project is a security vulnerability research repository focused on a Linux privilege escalation exploit.
A simple remote control tool in C# for red team and security research purposes.
Tink is an open-source cryptography library that provides secure, easy-to-use APIs across multiple languages.
A comprehensive security guide for developers, covering best practices and common vulnerabilities.
A Python framework and library for CTF (Capture the Flag) competitions and exploit development.
Get weekly updates on trending AI coding tools and projects.