Category
Showing 251-300 of 1,974 trending projects
An open-source OSINT tool to search for accounts across social networks by username and email.
An automated email OSINT tool for gathering information about email addresses and associated accounts.
A set of SQL injection labs to test different types of SQL injection vulnerabilities.
Bjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with an e-Paper display.
A tool for automated decompiling and security evaluation of WeChat mini-programs, supporting decryption, unpacking, and code modification.
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework.
A network stresser tool that uses Hatsune Miku as its theme, built with TypeScript.
A security knowledge framework maintained by the ffffffff0x team, covering web security, ICS security, forensics, and more.
Automated all-in-one OS command injection exploitation tool for security researchers and penetration testers.
A Python library for detecting homograph phishing attacks, typo squatting, and brand impersonation through domain name permutation.
Fluxion is an AI-powered tool for cybersecurity researchers and penetration testers, focused on evil-twin attacks and captive portal exploits.
A curated list of awesome infosec courses and training resources for security professionals.
A Python tool that helps identify and take over domains with dangling DNS records, useful for security researchers and bug bounty hunters.
A repository of custom payloads for the USB Rubber Ducky, a powerful pen-testing tool for keystroke injection attacks.
A curated list of bug bounty writeups, a valuable resource for security researchers and bug hunters.
A scalable fuzzing infrastructure to find vulnerabilities and improve software stability.
This repository contains emergency response notes from a security engineer's perspective.
A cloud-native SIEM for intelligent security analytics for the entire enterprise.
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang.
A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.
A comprehensive penetration testing reference bank for OSCP/PTP & PTX certification preparation.
Metasploitable3 is a vulnerable virtual machine for security research and testing purposes.
Snyk CLI scans and monitors projects for security vulnerabilities, helping developers secure their applications.
This repository appears to be related to security vulnerabilities in the Pinduoduo e-commerce app, rather than a developer tool or platform focused on AI-powered coding.
Open-source tool to enforce privacy and security best practices across Windows, macOS, and Linux
A cybersecurity tool that disrupts 2.4GHz communications for security testing and controlled disruption.
A free C++ cryptography library that provides a variety of cryptographic schemes and primitives.
High-quality Sysmon configuration template for advanced Windows security monitoring and threat hunting
A C# library to prevent malware from gaining admin privileges through UAC authorization.
A fast and safe Rust library for detecting memory vulnerabilities in software.
Official OWASP Top 10 document repository for web application security best practices.
A Python-based network penetration testing tool for security research and red teaming activities.
Modlishka is a reverse proxy tool for penetration testing and security research.
A powerful Ruby-based WinRM shell for hacking, penetration testing, and remote Windows management.
This Python library provides a dictionary for brute-force attacks, a common technique used in cybersecurity.
A Go-lang secure coding practices guide for developers building secure applications.
Open Source Cloud Native Application Protection Platform (CNAPP) for securing cloud-native applications
A Python tool to convert potentially dangerous documents to safe PDFs, protecting users from malware.
A collection of tips and techniques for bug bounty hunting and security research.
NullArray/AutoSploit is an automated mass exploiter tool for penetration testing and security research.
This is an Android app that detects and fights against IMSI-Catchers, StingRays, and silent SMS attacks.
Automatically install all Kali Linux tools for security and penetration testing.
A collection of study notes and resources for learning web hacking and security.
A toolkit for reverse engineering and malware analysis on Windows systems.
A curated collection of resources, tools, and shiny things for cybersecurity blue teams.
A cheat sheet for mobile app penetration testing covering Android, iOS, network analysis, and more.
An Android app to bypass internet censorship and deep packet inspection (DPI) technology.
A C# tool for legally evading network monitoring and conducting online research.
A fast, simple web crawler designed for quick discovery of endpoints and assets within a web application.
An open-source forum for discussing and circumventing internet censorship.
Get weekly updates on trending AI coding tools and projects.