There are 184 repositories under infosec topic.
Exploitation Framework for Embedded Devices
Web path scanner
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Damn Vulnerable Web Application (DVWA)
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
:arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with minimal configuration and with the help of reNgine's correlation, it just makes recon effortless.
A list of interesting payloads, tips and tricks for bug bounty hunters.
A curated list of awesome infosec courses and training resources.
A collected list of awesome security talks
Collaborative Penetration Test and Vulnerability Management Platform
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
Gather and update all available and newest CVEs with their PoC.
Cameradar hacks its way into RTSP videosurveillance cameras
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
A collection of all the data i could extract from 1 billion leaked credentials from internet.
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
:closed_lock_with_key: Security advisories as a simple composer exclusion list, updated daily
A collection of awesome security hardening guides, tools and other resources
Awesome Node.js Security resources
Applied offensive security with Rust - https://kerkour.com/black-hat-rust
This challenge is Inon Shkedy's 31 days API Security Tips.
A proposed standard that allows websites to define security policies.
The Swiss Army knife for automated Web Application Testing
📡 A python program to create a fake AP and sniff data.