Category
Showing 301-350 of 1,975 trending projects
An open-source OSINT tool to search for accounts across social networks by username and email.
An open-source ESP32-powered tool to scan, jam, spoof, and master BLE, Wi-Fi, and 2.4GHz networks.
This is a multi-use bash script for Linux systems to audit wireless networks.
A Python-based malware analysis and unpacking tool for security researchers and analysts.
A guide for setting up NextDNS, a privacy-focused DNS over HTTPS (DoH) proxy with advanced capabilities.
Comprehensive collection of the latest CVEs and their PoCs for security research and penetration testing.
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
A curated list of Awesome Red Teaming resources for security professionals and penetration testers.
Zeek is a powerful network analysis framework for security monitoring and incident response.
Psiphon is an open-source tool for circumventing internet censorship, built in Go.
A curated list of awesome forensic analysis tools and resources for digital forensics and incident response (DFIR).
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework.
This is a C-based tool for bypassing Windows User Account Control (UAC) security features.
A Python tool for enumerating and abusing Active Directory Certificate Services (ADCS).
A Go-lang secure coding practices guide for developers building secure applications.
An open-source Chromium-based browser that provides fingerprinting protection and privacy features for web scraping and anti-detection use cases.
A fast, reliable, and simple port scanner written in Go, ideal for bug bounties and penetration testing.
A collection of tools and techniques for the Blue Team, focused on incident response and cybersecurity.
A curated list of resources for understanding and bypassing Web Application Firewalls (WAFs) from a security standpoint.
Single-file PHP shell for penetration testing and system exploration.
This is a wiki for Capture the Flag (CTF) challenges, covering various topics like crypto, web, reverse engineering, and more.
A community guide to using YubiKey for secure GnuPG and SSH access, protecting secrets with hardware crypto.
A collection of top Termux hacking tools for Android devices, focused on security and penetration testing.
A C++ tool that can terminate all EDR/XDR/AVs processes, potentially used for security research.
A curated list of tools for incident response and digital forensics investigations.
An all-in-one browser extension for offensive security professionals with a collection of hacking tools.
A large repository of cybersecurity-related links, but not focused on AI coding tools or platforms.
SharPyShell is a tiny and obfuscated ASP.NET webshell for C# web applications.
A collection of public penetration test reports for security research and learning.
A handbook for securing your cryptocurrency against the 'dark forest' of blockchain threats.
A C# port of Mimikatz's sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands for security research.
A fast subdomain enumeration tool for penetration testers and security researchers.
proxychains is a tool that forces any TCP connection to follow through a proxy, supporting SOCKS4, SOCKS5 and HTTP(S) proxies.
This is a GitHub repository for a security vulnerability in Microsoft Teams that allows for remote code execution.
AdGuard browser extension to block ads, trackers, and protect user privacy across Chrome and Firefox.
A curated list of bug bounty writeups, a valuable resource for security researchers and bug hunters.
An automated reconnaissance framework for web applications focused on highly configurable streamlined recon process.
Secure your SSH keys using the Secure Enclave on your Mac, protecting them from unauthorized access.
This repository is a comprehensive list of web application security resources, tools, and techniques.
An encyclopedia for offensive and defensive security knowledge in cloud native technologies.
A database of vulnerable Ruby Gems, helping Ruby developers stay secure.
An exploitation framework for embedded devices, focused on penetration testing and security research.
A collection of nightly builds of common C# offensive tools, built and released in a CI/CD fashion.
This is an open-source OSINT (Open-Source Intelligence) tool that gathers information about phone numbers, emails, subdomains, and more.
Tookie is an advanced OSINT tool that helps find social media accounts based on user inputs.
The Bug Hunters Methodology is a comprehensive guide for penetration testing and security research.
An HTTP/HTTPS proxy tool written in Go for security research and penetration testing.
This repository appears to be an educational resource on cloud security, not a developer discovery platform focused on vibe coders.
The Browser Exploitation Framework Project is a penetration testing tool for web applications.
An Android app for online privacy and security, featuring tools like Tor, I2P, and DNSCrypt.
Get weekly updates on trending AI coding tools and projects.