Trending Projects

Discover the fastest growing open source projects

Showing 1901-1950 of 1,974 trending projects

#1901
3ndG4me/AutoBlue-MS17-010

This is a semi-automated, no-bs version of the public exploit code for MS17-010 vulnerability.

-1
-0.1%
1.3K
total stars
#1902
TideSec/Mars

Mars is a comprehensive security tool for asset discovery, subdomain enumeration, port scanning, and more.

-1
-0.1%
1.3K
total stars
#1903
ckane/CS7038-Malware-Analysis

This is a course repository for a University of Cincinnati Malware Analysis class, not a developer discovery platform.

-1
-0.1%
1.3K
total stars
#1904
LittleBear4/OA-EXPTOOL

A comprehensive tool for scanning and exploiting various OA vulnerabilities in bulk.

-1
-0.1%
1.3K
total stars
#1905
4ra1n/super-xray

This is a GUI launcher for the XRAY web vulnerability scanning tool, focusing on web security.

-1
-0.1%
1.3K
total stars
#1906
fkie-cad/cwe_checker

cwe_checker finds vulnerable patterns in binary executables, helping developers identify and fix security issues.

-1
-0.1%
1.3K
total stars
#1907
projectdiscovery/nuclei-burp-plugin

A Nuclei plugin for Burp Suite, a popular web application security testing tool.

-1
-0.1%
1.3K
total stars
#1908
F6JO/RouteVulScan

A Burpsuite plugin for recursively detecting vulnerable paths in web applications.

-1
-0.1%
1.3K
total stars
#1909
wafinfo/DecryptTools

DecryptTools is a comprehensive tool for decryption tasks, likely useful for security researchers and developers.

-1
-0.1%
1.3K
total stars
#1910
blacklanternsecurity/TREVORspray

A modular password spraying tool with threading, proxy support, and more for security researchers.

-1
-0.1%
1.3K
total stars
#1911
xaitax/SploitScan

SploitScan is a sophisticated cybersecurity utility for vulnerabilities and exploit analysis.

-1
-0.1%
1.3K
total stars
#1912
cseroad/Exp-Tools

An utility tool that integrates high-risk vulnerability exploits for security researchers and penetration testers.

-1
-0.1%
1.3K
total stars
#1913
ly4k/PwnKit

Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation

-1
-0.1%
1.3K
total stars
#1914
bit4woo/Fiora

A GUI framework for the Nuclei vulnerability PoC scanner, allowing quick PoC searches and one-click Nuclei runs.

-1
-0.1%
1.3K
total stars
#1915
seccome/Ehoney

A secure, fast, and enterprise-level honeypot management system with support for multiple protocols.

-1
-0.1%
1.3K
total stars
#1916
devanshbatham/FavFreak

A Python-based tool for automating favicon-based reconnaissance during bug bounty and penetration testing.

-1
-0.1%
1.3K
total stars
#1917
qwqdanchun/Pillager

Pillager is an information gathering tool for post-exploitation purposes.

-1
-0.1%
1.3K
total stars
#1918
shack2/SuperSQLInjectionV1

A C# tool for discovering and exploiting SQL injection vulnerabilities across various databases.

-1
-0.1%
1.3K
total stars
#1919
Dyneteq/reconya

A network reconnaissance and asset discovery tool written in Go for security professionals.

-1
-0.1%
1.3K
total stars
#1920
lintstar/LSTAR

LSTAR is a comprehensive post-exploitation plugin for CobaltStrike, a popular penetration testing framework.

-1
-0.1%
1.3K
total stars
#1921
knavesec/CredMaster

A refactored and improved password spraying tool that uses FireProx APIs to stay anonymous and beat throttling.

-1
-0.1%
1.3K
total stars
#1922
HotBoy-java/PotatoTool

This is a comprehensive network security tool for professionals and enthusiasts, featuring decryption, analysis, scanning, and traceability.

-1
-0.1%
1.2K
total stars
#1923
UzJu/Cloud-Bucket-Leak-Detection-Tools

A set of tools for detecting and preventing cloud storage data leaks across major cloud providers.

-1
-0.1%
1.2K
total stars
#1924
wh1t3p1g/ysomap

A Java deserialization exploit framework for penetration testing and security research.

-1
-0.1%
1.2K
total stars
#1925
pmiaowu/BurpFastJsonScan

A passive Burp Suite plugin for detecting FastJson vulnerabilities.

-1
-0.1%
1.2K
total stars
#1926
f4rih/websploit

Websploit is a high-level MITM (Man-in-the-Middle) framework written in Python for network penetration testing.

-1
-0.1%
1.2K
total stars
#1927
Jack-Liang/kalitools

A collection of Kali Linux tools for information gathering, penetration testing, and wireless security.

-1
-0.1%
1.2K
total stars
#1928
lem0nSec/ShellGhost

A memory-based evasion technique to make shellcode invisible from process start to end.

-1
-0.1%
1.2K
total stars
#1929
EddieIvan01/iox

A tool for port forwarding and intranet proxy, useful for penetration testing and network troubleshooting.

-1
-0.1%
1.2K
total stars
#1930
AbirHasan2005/ShellPhish

A modded version of the Shellphish tool with colorized text, animations, and extra features for Termux.

-1
-0.1%
1.2K
total stars
#1931
vasanthk/web-security-basics

A library providing comprehensive web security concepts and best practices for developers.

-1
-0.1%
1.2K
total stars
#1932
Lucifer1993/SatanSword

A comprehensive penetration testing framework for security researchers and red teams.

-1
-0.1%
1.2K
total stars
#1933
Lucifer1993/TPscan

A Python tool for automatic detection of ThinkPHP vulnerabilities.

-1
-0.1%
1.2K
total stars
#1934
dionach/CMSmap

An open-source CMS scanner that automates detection of security flaws in popular CMS platforms.

-1
-0.1%
1.2K
total stars
#1935
ChrisTheCoolHut/Zeratool

An automatic exploit generation tool for finding and capturing flags in CTF challenges.

-1
-0.1%
1.1K
total stars
#1936
threatexpress/red-team-scripts

A collection of Red Team focused tools, scripts, and notes for cybersecurity professionals.

-1
-0.1%
1.1K
total stars
#1937
blackarrowsec/redteam-research

Collection of PoC and offensive techniques used by the BlackArrow Red Team

-1
-0.1%
1.1K
total stars
#1938
sayan011/Immunefi-bug-bounty-writeups-list

A curated list of Immunefi bug bounty writeups, useful for security researchers and bug bounty hunters.

-1
-0.1%
1.1K
total stars
#1939
utkusen/wholeaked

A file-sharing tool that allows you to find the responsible person in case of a data leakage.

-1
-0.1%
1.1K
total stars
#1940
mgeeky/ShellcodeFluctuation

An advanced in-memory evasion technique for encrypting and decrypting shellcode contents.

-1
-0.1%
1.1K
total stars
#1941
moloch--/RootTheBox

A Python-based CTF scoreboard and game manager for developers interested in security and penetration testing.

-1
-0.1%
1.1K
total stars
#1942
payatu/diva-android

DIVA Android is a deliberately insecure and vulnerable Android app for security testing and education.

-1
-0.1%
1.1K
total stars
#1943
DasSecurity-HatLab/AoiAWD

AoiAWD is a portable, low-privilege EDR system designed for cybersecurity competitions.

-1
-0.1%
1.1K
total stars
#1944
KathanP19/JSFScan.sh

Automated JavaScript recon tool for bug bounty hunters and security researchers.

-1
-0.1%
1.1K
total stars
#1945
D00Movenok/BounceBack

This Go-based stealth redirector helps red team operations by providing OPSEC for C2 infrastructure.

-1
-0.1%
1.1K
total stars
#1946
WyAtu/Perun

Perun is a network asset vulnerability scanner/framework for pentesters, red teams, and security professionals.

-1
-0.1%
1.1K
total stars
#1947
AlephNullSK/dnsgen

A flexible DNS name permutation tool for security researchers and penetration testers.

-1
-0.1%
1.1K
total stars
#1948
a1phaboy/FastjsonScan

A tool to scan and identify Fastjson vulnerabilities, including version, dependencies, and autoType status.

-1
-0.1%
1.0K
total stars
#1949
Netflix-Skunkworks/sleepy-puppy

Sleepy Puppy is a security-focused XSS payload management framework for developers.

-1
-0.1%
1.0K
total stars
#1950
ekkoo-z/Z-Godzilla_ekp

A webshell management tool for Godzilla that helps bypass traffic detection devices.

-1
-0.1%
1.0K
total stars
1...3840

Stay in the loop

Get weekly updates on trending AI coding tools and projects.