#other #awesome #awesome_list #bug_bounty #cybersecurity #forensics #hacking #incident_response #infosec #osint #penetration_testing #pentesting #reconnaissance #security #security_automation #security_tools
https://github.com/danieldurnea/FBI-tools
https://github.com/danieldurnea/FBI-tools
GitHub
GitHub - danieldurnea/FBI-tools: 🕵️ OSINT Tools for gathering information and actions forensics 🕵️
🕵️ OSINT Tools for gathering information and actions forensics 🕵️ - GitHub - danieldurnea/FBI-tools: 🕵️ OSINT Tools for gathering information and actions forensics 🕵️
❤1
#go #bounty #csv #devsecops #golang #graphviz #html #json #markdown #nmap #pentesting #port_scanner #port_scanning #scan #scanner #security #security_tools #sqlite #xml #xml_parsing
https://github.com/vdjagilev/nmap-formatter
https://github.com/vdjagilev/nmap-formatter
GitHub
GitHub - vdjagilev/nmap-formatter: A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot)…
A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's nmap converter. - vdjagilev/nmap-formatter
👍2👌1
#html #blueteam #cloud_native #cloud_security #cloudsecurity #container #container_security #devsecops #docker #hacking #infrastructure #k8s #kubernetes #kubernetes_goat #kubernetes_security #owasp #pentesting #redteam #security #vulnerable_app
https://github.com/madhuakula/kubernetes-goat
https://github.com/madhuakula/kubernetes-goat
GitHub
GitHub - madhuakula/kubernetes-goat: Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes…
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀 - madhuakula/kubernetes-goat
👍3
#go #dns #go #pentesting #tool #web
Gobuster is a powerful tool that helps you find hidden parts of websites and other online resources. It can brute-force (try many possibilities) to find:
- Hidden directories and files on websites.
- Subdomains of a domain.
- Virtual host names on web servers.
- Open Amazon S3 and Google Cloud buckets.
- Files on TFTP servers.
Using Gobuster, you can quickly identify potential vulnerabilities and hidden resources, making it a valuable tool for security testing and web exploration. It supports various modes, such as directory scanning, DNS subdomain enumeration, and more, each with customizable options to fit your needs. This makes it easier to discover and analyze different aspects of a website or server efficiently.
https://github.com/OJ/gobuster
Gobuster is a powerful tool that helps you find hidden parts of websites and other online resources. It can brute-force (try many possibilities) to find:
- Hidden directories and files on websites.
- Subdomains of a domain.
- Virtual host names on web servers.
- Open Amazon S3 and Google Cloud buckets.
- Files on TFTP servers.
Using Gobuster, you can quickly identify potential vulnerabilities and hidden resources, making it a valuable tool for security testing and web exploration. It supports various modes, such as directory scanning, DNS subdomain enumeration, and more, each with customizable options to fit your needs. This makes it easier to discover and analyze different aspects of a website or server efficiently.
https://github.com/OJ/gobuster
GitHub
GitHub - OJ/gobuster: Directory/File, DNS and VHost busting tool written in Go
Directory/File, DNS and VHost busting tool written in Go - OJ/gobuster
#other #android #awesome #bug_bounty #fuzzing #hacking #penetration_testing #pentesting_windows #reverse_engineering #security
This collection of resources is designed for hackers, pentesters, and security researchers. It includes a wide range of lists and repositories covering various aspects of security such as Android security, application security, bug bounty programs, exploit development, and more. These resources provide tools, tutorials, and references to help you improve your skills in cybersecurity. By using these resources, you can gain access to valuable information and tools that will enhance your knowledge and capabilities in the field of cybersecurity, making you better equipped to handle security assessments, incident responses, and other related tasks.
https://github.com/Hack-with-Github/Awesome-Hacking
This collection of resources is designed for hackers, pentesters, and security researchers. It includes a wide range of lists and repositories covering various aspects of security such as Android security, application security, bug bounty programs, exploit development, and more. These resources provide tools, tutorials, and references to help you improve your skills in cybersecurity. By using these resources, you can gain access to valuable information and tools that will enhance your knowledge and capabilities in the field of cybersecurity, making you better equipped to handle security assessments, incident responses, and other related tasks.
https://github.com/Hack-with-Github/Awesome-Hacking
GitHub
GitHub - Hack-with-Github/Awesome-Hacking: A collection of various awesome lists for hackers, pentesters and security researchers
A collection of various awesome lists for hackers, pentesters and security researchers - Hack-with-Github/Awesome-Hacking
#dockerfile #application_security #appsec #best_practices #bugbounty #guide #hacking #hacktoberfest #owasp #penetration_testing #pentesting #security
The OWASP Web Security Testing Guide (WSTG) is a comprehensive resource for testing the security of web applications and services. Created by security professionals and volunteers, it provides a framework of best practices used globally. The guide is constantly updated, with the current version being 5.0, and previous stable releases like 4.2 available. Users can benefit by learning detailed methods for securing web applications, contributing to the guide through feedback or translations, and connecting with the community via Slack, Twitter, or Google Groups. This helps ensure your web applications are secure and up-to-date with the latest security standards.
https://github.com/OWASP/wstg
The OWASP Web Security Testing Guide (WSTG) is a comprehensive resource for testing the security of web applications and services. Created by security professionals and volunteers, it provides a framework of best practices used globally. The guide is constantly updated, with the current version being 5.0, and previous stable releases like 4.2 available. Users can benefit by learning detailed methods for securing web applications, contributing to the guide through feedback or translations, and connecting with the community via Slack, Twitter, or Google Groups. This helps ensure your web applications are secure and up-to-date with the latest security standards.
https://github.com/OWASP/wstg
GitHub
GitHub - OWASP/wstg: The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications…
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services. - OWASP/wstg
#python #bugbounty #command_injection #commix #detection #exploitation #open_source #pentesting #python #takeover #vulnerability_scanner
Commix is a free tool that helps find and fix security problems in computer systems. It checks for "command injection" vulnerabilities, which are weaknesses that attackers can use to control your system. Commix works on many platforms and uses Python, making it easy to run without needing special setup. This tool benefits users by helping them protect their systems from attacks and ensuring they stay secure. It's also open-source, so anyone can improve or add features to it[1][3].
https://github.com/commixproject/commix
Commix is a free tool that helps find and fix security problems in computer systems. It checks for "command injection" vulnerabilities, which are weaknesses that attackers can use to control your system. Commix works on many platforms and uses Python, making it easy to run without needing special setup. This tool benefits users by helping them protect their systems from attacks and ensuring they stay secure. It's also open-source, so anyone can improve or add features to it[1][3].
https://github.com/commixproject/commix
GitHub
GitHub - commixproject/commix: Automated All-in-One OS Command Injection Exploitation Tool.
Automated All-in-One OS Command Injection Exploitation Tool. - commixproject/commix
#python #active_directory #hacking #infosec #infosectools #networks #pentest #pentest_tool #pentest_tools #pentesting #python #python3 #red_team #security #security_tools #windows
NetExec is a powerful tool for network security testing. It helps users automate tasks like finding vulnerabilities, executing commands on remote machines, and gathering network information. This tool is especially useful for penetration testers and cybersecurity professionals. By using NetExec, users can efficiently assess and improve the security of large networks, making it easier to identify and fix weaknesses. It supports various network protocols and integrates well with other security tools, making it a valuable asset for those in the cybersecurity field.
https://github.com/Pennyw0rth/NetExec
NetExec is a powerful tool for network security testing. It helps users automate tasks like finding vulnerabilities, executing commands on remote machines, and gathering network information. This tool is especially useful for penetration testers and cybersecurity professionals. By using NetExec, users can efficiently assess and improve the security of large networks, making it easier to identify and fix weaknesses. It supports various network protocols and integrates well with other security tools, making it a valuable asset for those in the cybersecurity field.
https://github.com/Pennyw0rth/NetExec
GitHub
GitHub - Pennyw0rth/NetExec: The Network Execution Tool
The Network Execution Tool. Contribute to Pennyw0rth/NetExec development by creating an account on GitHub.
#python #cli #cti #cybersecurity #forensics #hacktoberfest #information_gathering #infosec #linux #osint #pentesting #python #python3 #reconnaissance #redteam #sherlock #tools
Sherlock is a powerful tool that helps you find social media accounts by username across over 400 networks. It's easy to use and works on many operating systems like macOS, Linux, and Windows. You can install it using methods like `pipx` or Docker, and then simply type the username you want to search for. Sherlock will show you where that username is used on different social media platforms. This tool is useful for gathering information quickly and can be run locally or even online through services like Apify. It saves time and effort in finding accounts across many platforms.
https://github.com/sherlock-project/sherlock
Sherlock is a powerful tool that helps you find social media accounts by username across over 400 networks. It's easy to use and works on many operating systems like macOS, Linux, and Windows. You can install it using methods like `pipx` or Docker, and then simply type the username you want to search for. Sherlock will show you where that username is used on different social media platforms. This tool is useful for gathering information quickly and can be run locally or even online through services like Apify. It saves time and effort in finding accounts across many platforms.
https://github.com/sherlock-project/sherlock
GitHub
GitHub - sherlock-project/sherlock: Hunt down social media accounts by username across social networks
Hunt down social media accounts by username across social networks - sherlock-project/sherlock
👍1
#typescript #ci #ci_cd #cicd #evaluation #evaluation_framework #llm #llm_eval #llm_evaluation #llm_evaluation_framework #llmops #pentesting #prompt_engineering #prompt_testing #prompts #rag #red_teaming #testing #vulnerability_scanners
Promptfoo is a tool that helps developers test and improve AI applications using Large Language Models (LLMs). It allows you to **test prompts and models** automatically, **secure your apps** by finding vulnerabilities, and **compare different models** side-by-side. You can use it on your computer or integrate it into your development workflow. This tool helps you make sure your AI apps work well and are secure before you release them. It saves time and ensures quality by using data instead of guessing.
https://github.com/promptfoo/promptfoo
Promptfoo is a tool that helps developers test and improve AI applications using Large Language Models (LLMs). It allows you to **test prompts and models** automatically, **secure your apps** by finding vulnerabilities, and **compare different models** side-by-side. You can use it on your computer or integrate it into your development workflow. This tool helps you make sure your AI apps work well and are secure before you release them. It saves time and ensures quality by using data instead of guessing.
https://github.com/promptfoo/promptfoo
GitHub
GitHub - promptfoo/promptfoo: Test your prompts, agents, and RAGs. AI Red teaming, pentesting, and vulnerability scanning for LLMs.…
Test your prompts, agents, and RAGs. AI Red teaming, pentesting, and vulnerability scanning for LLMs. Compare performance of GPT, Claude, Gemini, Llama, and more. Simple declarative configs with co...
#python #cybersecurity #osint #pentesting #python
Blackbird is a powerful tool for finding usernames and emails across over 600 platforms. It uses AI to create profiles of users, helping you understand them better with less effort. The tool is free and easy to use, with features like smart filters and exports to PDF or CSV. You can search by username or email and get detailed results quickly. This helps users gather information efficiently and safely, without sharing sensitive data. It's useful for investigations and research, making it easier to find and analyze online profiles.
https://github.com/p1ngul1n0/blackbird
Blackbird is a powerful tool for finding usernames and emails across over 600 platforms. It uses AI to create profiles of users, helping you understand them better with less effort. The tool is free and easy to use, with features like smart filters and exports to PDF or CSV. You can search by username or email and get detailed results quickly. This helps users gather information efficiently and safely, without sharing sensitive data. It's useful for investigations and research, making it easier to find and analyze online profiles.
https://github.com/p1ngul1n0/blackbird
GitHub
GitHub - p1ngul1n0/blackbird: An OSINT tool to search for accounts by username and email in social networks.
An OSINT tool to search for accounts by username and email in social networks. - p1ngul1n0/blackbird
#python #artificial_intelligence #cybersecurity #generative_ai #llm #pentesting
Cybersecurity AI (CAI) is an open-source, lightweight framework that helps you build AI agents to find and fix security vulnerabilities efficiently. It supports many AI models and tools, works on multiple operating systems, and allows human control during tasks. CAI automates complex security testing steps like scanning, exploiting, and validating bugs, making bug bounty hunting easier and faster. It also logs detailed traces for better analysis and supports teamwork among AI agents. Using CAI can boost your cybersecurity skills, save time, and improve your ability to protect systems from attacks by combining AI power with your expertise.
https://github.com/aliasrobotics/cai
Cybersecurity AI (CAI) is an open-source, lightweight framework that helps you build AI agents to find and fix security vulnerabilities efficiently. It supports many AI models and tools, works on multiple operating systems, and allows human control during tasks. CAI automates complex security testing steps like scanning, exploiting, and validating bugs, making bug bounty hunting easier and faster. It also logs detailed traces for better analysis and supports teamwork among AI agents. Using CAI can boost your cybersecurity skills, save time, and improve your ability to protect systems from attacks by combining AI power with your expertise.
https://github.com/aliasrobotics/cai
GitHub
GitHub - aliasrobotics/cai: Cybersecurity AI (CAI), the framework for AI Security
Cybersecurity AI (CAI), the framework for AI Security - aliasrobotics/cai
❤1
#python #cybersecurity #fyp #hacking #hacking_tool #indonesia #information #information_gathering #ip_geolocation #linux #osint #osint_python #osint_tool #pentesting #phone_number #python #python_hacking #termux #termux_hacks #termux_tool
GhostTrack is a simple tool you can install on Linux or Termux to track locations, phone numbers, or social media usernames using open-source intelligence (OSINT). It offers menus for IP tracking (which can be combined with another tool called Seeker), phone number tracking, and username tracking on social media. This helps you gather information about a target’s location or identity easily. The benefit is that you can quickly find useful data for security, investigation, or personal knowledge without needing advanced skills, all through a straightforward Python-based program created by HunxByts.
https://github.com/HunxByts/GhostTrack
GhostTrack is a simple tool you can install on Linux or Termux to track locations, phone numbers, or social media usernames using open-source intelligence (OSINT). It offers menus for IP tracking (which can be combined with another tool called Seeker), phone number tracking, and username tracking on social media. This helps you gather information about a target’s location or identity easily. The benefit is that you can quickly find useful data for security, investigation, or personal knowledge without needing advanced skills, all through a straightforward Python-based program created by HunxByts.
https://github.com/HunxByts/GhostTrack
GitHub
GitHub - HunxByts/GhostTrack: Useful tool to track location or mobile number
Useful tool to track location or mobile number. Contribute to HunxByts/GhostTrack development by creating an account on GitHub.