Category
Showing 201-250 of 1,974 trending projects
A security tool to detect publicly disclosed vulnerabilities in application dependencies.
This is a C-based tool for bypassing Windows User Account Control (UAC) security features.
A curated list of resources for understanding and bypassing Web Application Firewalls (WAFs) from a security standpoint.
Comprehensive collection of security tools for penetration testing, vulnerability assessment, and incident response.
Automated reconnaissance tool for security researchers and bug bounty hunters.
A collection of penetration testing POCs, exploits, scripts, and tools for security research and testing.
A curated collection of Shodan search queries for security professionals and researchers.
A static analysis security vulnerability scanner for Ruby on Rails applications
Easily identify emails, IP addresses, and more from text or PCAP files with this cybersecurity-focused Python library.
Automatic Linux privilege escalation tool that exploits common vulnerabilities and misconfigurations.
Yakit is an all-in-one cybersecurity platform for security researchers and penetration testers.
Collection of methodology and test cases for various web vulnerabilities for bug bounty hunters.
This is a suite of WiFi security auditing tools, not a developer discovery platform for vibe coders.
Browser fingerprinting library that uses favicons to track users across the web.
An open-source adversary emulation platform for security professionals to assess system vulnerabilities.
Securely and anonymously share files, host websites, and chat using the Tor network.
A library that helps detect various malware analysis techniques used in the wild.
A curated list of resources for learning about application security, including security experts, OWASP, and more.
RSA attack tool to retrieve private keys from weak public keys and/or decipher data
This repository is a comprehensive list of web application security resources, tools, and techniques.
A curated list of cryptography resources and links for developers interested in security and encryption.
A handbook for securing your cryptocurrency against the 'dark forest' of blockchain threats.
A repository for badUSB payloads for the Flipper Zero security device, allowing plug-and-play functionality.
A comprehensive resource for bug bounty hunters, covering payloads, bypasses, and other security techniques.
An all-in-one browser extension for offensive security professionals with a collection of hacking tools.
Collection of Cyber Threat Intelligence sources from the deep and dark web for security researchers and analysts.
A cheat sheet for common Windows Active Directory enumeration and attack methods
This is a collection of security-related mind maps, not a developer discovery platform for vibe coders.
A tool that exploits locked/password protected computers over USB, drops a persistent backdoor, and siphons cookies.
A library that provides workarounds for Google SafetyNet attestation, useful for Android developers.
Next generation web scanner for security research and penetration testing
A cheatsheet of default credentials to help blue/red teamers identify devices with default passwords
A comprehensive cheatsheet for bug bounty hunters, covering various payloads, tips, and tricks.
A collection of resources for learning about Linux kernel security and exploitation.
Open-source Android debloater tool that improves privacy, security, and battery life without root access.
Suricata is a powerful network security monitoring engine for intrusion detection and prevention.
A compilation of resources from the Practical Ethical Hacking Udemy course, focused on Python-based security tools.
An open-source, stateless password manager that prioritizes privacy and self-hosting.
A Python tool for scanning Android APK files for URIs, endpoints, and secrets.
Reverse engineering and pentesting tool for analyzing Android applications
An open-source security scanner tool for penetration testing and vulnerability detection with a focus on automation and extensibility.
GmSSL is a cryptographic toolbox supporting Chinese national cryptography standards including SM2, SM3, SM4, SM9 and SSL/TLS protocols.
This repository contains course materials for learning modern binary exploitation techniques.
Monitor Linux processes without root permissions using this Go-based security tool.
A network intruder and presence detector that scans for devices connected to your network and alerts you to new and unknown devices.
Open-source tool to identify capabilities in executable files for malware analysis and reverse engineering.
A curated list of various bug bounty tools for web security researchers and bug hunters.
A fast, reliable, and simple port scanner written in Go, ideal for bug bounties and penetration testing.
A command-line tool to generate common user passwords from various data sources.
A curated list of fuzzing resources for learning fuzzing and initial phases of exploit development.
Get weekly updates on trending AI coding tools and projects.