tmacbg's repositories
d0zer
Elf binary infector written in Golang
subzy
Subdomain takeover vulnerability checker
OSAS
One Stop Anomaly Shop: Anomaly detection using two-phase approach: (a) pre-labeling using statistics, Natural Language Processing and static rules; (b) anomaly scoring using supervised and unsupervised machine learning.
debian-cis
PCI-DSS compliant Debian 9/10 hardening
kiterunner
Contextual Content Discovery Tool
Git-Cve
Find Cve Exploits/POC from github
privilege-escalation-awesome-scripts-suite
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
phoneinfoga
Advanced information gathering & OSINT framework for phone numbers
malware_training_vol1
Materials for Windows Malware Analysis training (volume 1)
MindAPI
Organize your API security assessment by using MindAPI. It's free and open for community collaboration.
Grouper2
Find vulnerabilities in AD Group Policy
imagepayloadgen
Generate image payloads in JS to bypass filters
commonspeak2
Leverages publicly available datasets from Google BigQuery to generate content discovery and subdomain wordlists
gron
Make JSON greppable!
SecretScanner
Find secrets and passwords in container images and file systems
uddup
Urls de-duplication tool for better recon.
BashitRecon
A collection of famous recon public scripts, but in bash <3
telegram-bot-dumper
🔪 Dumper & ripper for Telegram bots by token
AllAboutBugBounty
All about bug websites (bypasses, payloads, and etc)
scilla
🏴☠️ Information Gathering tool 🏴☠️ DNS / Subdomains / Ports / Directories enumeration
Bughound
Static code analysis tool based on Elasticsearch
JSA
Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.
BigBountyRecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
leaky-paths
A collection of special paths linked to major web CVEs, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to scan passively for high-quality endpoints and quick-wins.
reconftw
Simple script for full recon
fuxploider
File upload vulnerability scanner and exploitation tool.
awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.