silkyearth's starred repositories

roop

one-click face swap

Language:PythonLicense:GPL-3.0Stargazers:28123Issues:253Issues:0

AnimateAnyone

Animate Anyone: Consistent and Controllable Image-to-Video Synthesis for Character Animation

Language:CLicense:AGPL-3.0Stargazers:9537Issues:384Issues:756

osint_stuff_tool_collection

A collection of several hundred online tools for OSINT

vulscan

Advanced vulnerability scanning with Nmap NSE

Language:LuaLicense:NOASSERTIONStargazers:3444Issues:135Issues:0

CamPhish

Grab cam shots from target's phone front camera or PC webcam just sending a link.

Language:HTMLLicense:GPL-3.0Stargazers:3103Issues:187Issues:179

TinyCheck

TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs). In order to make it working, you need a computer with a Debian-like operating system and two Wi-Fi interfaces. The best choice is to use a Raspberry Pi (2+) a Wi-Fi dongle and a small touch screen. This tiny configuration (for less than $50) allows you to tap any Wi-Fi device, anywhere.

Language:PythonLicense:Apache-2.0Stargazers:3078Issues:81Issues:84

fuxploider

File upload vulnerability scanner and exploitation tool.

Language:PythonLicense:GPL-3.0Stargazers:3024Issues:68Issues:0

Striker

Striker is an offensive information and vulnerability scanner.

Language:PythonLicense:GPL-3.0Stargazers:2214Issues:118Issues:62

dnsReaper

dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!

Language:PythonLicense:AGPL-3.0Stargazers:1985Issues:23Issues:69

TeamsPhisher

Send phishing messages and attachments to Microsoft Teams users

Silver

Mass scan IPs for vulnerable services

Language:PythonLicense:GPL-3.0Stargazers:1023Issues:21Issues:20

MaxPhisher

A python phishing script for login phishing, image phishing video phishing and many more

Language:PythonLicense:MITStargazers:1022Issues:36Issues:114

Instagram-Hacker

This is an advanced script for Instagram bruteforce attacks. WARNING THIS IS A REAL TOOL!

Language:PythonLicense:MITStargazers:917Issues:88Issues:47

nuclei-wordfence-cve

The EXCLUSIVE Collection of 40,000+ Nuclei templates based on Wordfence intel. Daily updates for bulletproof WordPress security.

magicRecon

MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.

Language:ShellLicense:GPL-3.0Stargazers:820Issues:20Issues:7

WAFNinja

WAFNinja is a tool which contains two functions to attack Web Application Firewalls.

Killer

Killer tool is designed to bypass AV/EDR security tools using various evasive techniques.

SatIntel

SatIntel is an OSINT tool for Satellites 🛰. Extract satellite telemetry, receive orbital predictions, and parse TLEs 🔭

Language:GoLicense:NOASSERTIONStargazers:663Issues:15Issues:3

ssh-auditor

The best way to scan for weak ssh passwords on your network

Language:GoLicense:NOASSERTIONStargazers:603Issues:28Issues:9

badsecrets

A library for detecting known secrets across many web frameworks

Language:PythonLicense:GPL-3.0Stargazers:481Issues:8Issues:35

nerve

NERVE Continuous Vulnerability Scanner

Language:PythonLicense:MITStargazers:454Issues:29Issues:19

Subrake

🚀 A DNS automated scanner and tool 🖱️ (Zone Transfer, DNS Zone Takeover, Subdomain Takeover).

Language:CSSLicense:GPL-3.0Stargazers:288Issues:14Issues:6

ADenum

AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos.

Language:PythonLicense:GPL-3.0Stargazers:285Issues:7Issues:9

SSH-PuTTY-login-bruteforcer

Turn PuTTY into an SSH login bruteforcing tool.

Language:PowerShellLicense:GPL-3.0Stargazers:281Issues:9Issues:6

nord-stream

Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently supports Azure DevOps, GitHub and GitLab.

Language:PythonLicense:GPL-3.0Stargazers:243Issues:6Issues:3

MK01-OnlyRAT

OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once installed we will have remote administrative access to our target that we can connect to through Python console on our attacker pc. The onlyrat console has plenty of payloads we can then use on our target.

Language:PythonLicense:NOASSERTIONStargazers:130Issues:3Issues:9

fetchmeurls

A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectors (XSS, Nuclei, SQLi etc...)

Language:ShellLicense:GPL-3.0Stargazers:67Issues:3Issues:0

BruteDum

BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack

Language:PythonStargazers:44Issues:1Issues:0

Bash-Scripting

If you have to do it more than once, automate it!

License:MITStargazers:4Issues:2Issues:0