- abstract-syntax-tree
- acl
- active-directory
- aead
- aircrack
- analysis
- analytics
- android
- angular
- angularjs
- anonymity
- ansible
- anti-bot
- anti-spam
- api
- apparmor
- application-security
- arm
- arm64
- aspnet-core
- assembler
- assessment
- asynchronous
- audit
- auth
- authentication
- authorization
- automation
- awesome
- awesome-list
- aws
- bash
- benchmarking
- best-practices
- bettercap
- binary-analysis
- blockchain
- book
- bro
- browser
- brute-force
- bruteforce
- bug-bounty
- bugbounty
- build-tool
- c
- c-plus-plus
- c-sharp
- cache
- captcha
- cas
- cctv
- cdn
- cheatsheet
- checklist
- chrome
- cli
- cloud
- cloud-native
- communication
- compliance
- configuration
- container
- containers
- cracking
- cross-site-scripting
- crypto
- cryptography
- csrf
- ctf
- curve25519
- cyber-security
- cybersecurity
- debugger
- devops
- dfir
- dictionary-attack
- disassembler
- distributed
- django
- dns
- docker
- docker-image
- dotnet
- dynamic-analysis
- education
- elasticsearch
- electron
- elk
- elk-stack
- embedded
- emulation
- emulator
- encrypted
- encryption
- enumeration
- ethereum
- exfiltration
- exploit
- exploitation
- exploits
- federation
- file-integrity-management
- file-sharing
- firefox
- firewall
- flask
- forensics
- framework
- fuzzer
- fuzzing
- github
- go
- golang
- graylog
- guide
- hack
- hacking
- hacking-tool
- hacking-tools
- halite
- hardening
- hkdf
- hmac
- honeypot
- html
- http
- http2
- https
- identity
- identityserver4
- ids
- ikev2
- incident-response
- information-security
- infosec
- intelligence
- intrusion-detection
- ios
- iot
- ips
- ipsec
- java
- javascript
- jwt
- jwt-authentication
- kafka
- kali-linux
- kernel
- keychain
- kubernetes
- kvm
- l2tp
- lab
- lambda
- laravel
- ldap
- letsencrypt
- library
- libsodium
- libsodium-php
- lint
- linux
- list
- log-analysis
- loganalyzer
- logging
- login
- logs
- lua
- mac
- machine-learning
- macos
- macros
- malware
- malware-analysis
- malware-detection
- man-in-the-middle
- messenger
- microservices
- middleware
- mips
- mitm
- mobile
- mobile-app
- mobile-security
- monitor
- monitoring
- nacl
- netty
- network
- network-analysis
- network-discovery
- network-monitoring
- network-security
- network-visualization
- networking
- nginx
- nmap
- nmap-scripts
- nodejs
- nsm
- oauth
- oauth2
- obfuscator
- oci
- opencontainers
- openid
- openid-connect
- openpgp
- openssl
- osint
- ossec
- osx
- owasp
- packet-crafting
- parser
- password
- password-manager
- passwords
- paste
- pcap
- pci-dss
- penetration
- penetration-testing
- pentest
- pentest-tool
- pentest-tools
- pentesting
- performance
- permissions
- phishing
- php
- php-extension
- play-framework
- poc
- policy
- policy-monitoring
- powerpc
- powershell
- privacy
- program-analysis
- protection
- proxy
- pyparsing
- python
- python2
- python3
- rails
- rbac
- reconnaissance
- red-team
- redis
- reverse-engineering
- roles
- ruby
- ruby-cli
- ruby-on-rails
- rust
- saml
- scan
- scanner
- scanning
- scans
- scapy
- seccomp
- secure
- secure-by-default
- self-hosted
- serverless
- service-discovery
- siem
- signature
- smart-contracts
- sniffing
- software-composition-analysis
- solidity
- sparc
- spoofing
- spring
- spring-boot
- sql
- sql-injection
- ssh
- ssh-tunnel
- ssl
- ssllabs
- sslstrip
- static-analysis
- static-code-analysis
- subdomain
- swift
- symfony
- taint-analysis
- terraform
- testing
- threat-analysis
- threat-hunting
- threat-sharing
- threatintel
- tls
- tls13
- tor
- tor-network
- totp
- touch-id
- tox
- tracking
- tunnel
- tvos
- two-factor
- twofactorauth
- typescript
- update
- vba
- video
- virtual-machine
- virtualization
- vpn
- vpn-client
- vpn-server
- vulnerabilities
- vulnerability
- vulnerability-assessment
- vulnerability-databases
- vulnerability-detection
- vulnerability-management
- vulnerability-scanners
- vulnerability-scanning
- watchos
- web
- webapp
- website
- whitelist
- wifi
- wifi-security
- windows
- wireless
- wordpress
- x86
- x86-64
- xss
- yubikey
- pyt. A Static Analysis Tool for Detecting Security Vulnerabilities in Python Web Applications
- Solium. Linter to identify and fix style & security issues in Solidity
- bouncer. Eloquent roles and abilities.
- lock. A flexible, driver based Acl package for PHP 5.4+
- accesscontrol. Role and Attribute based Access Control for Node.js
- DeathStar. Automate getting Domain Admin using Empire (https://github.com/EmpireProject/Empire)
- GoFetch. GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.
- miscreant. Misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support
- SecurityDriven.Inferno. ✅ .NET crypto done right. Professionally audited.
- BoopSuite. A Suite of Tools written in Python for wireless auditing and security testing.
- airgeddon. This is a multi-use bash script for Linux systems to audit wireless networks.
- streamalert. StreamAlert is a serverless, realtime data analysis framework which empowers you to ingest, analyze, and alert on data from any environment, using datasources and alerting logic you define.
- timesketch. Collaborative forensic timeline analysis
- AIL-framework. AIL framework - Analysis Information Leak framework
- Seccubus. Easy automated vulnerability scanning, reporting and analysis
- rita. Real Intelligence Threat Analytics
- django-DefectDojo. DefectDojo is an open-source defect tracking application
- rita. Real Intelligence Threat Analytics
- Awesome-Hacking. A collection of various awesome lists for hackers, pentesters and security researchers
- android-security-awesome. A collection of android security related resources
- hawk. ✔️ Secure, simple key-value storage for Android
- drozer. The Leading Security Assessment Framework for Android.
- MifareClassicTool. An Android NFC-App for reading, writing, analysing, etc. MIFARE Classic RFID-Tags.
- objection. 📱 objection - runtime mobile exploration
- Android-Security-Reference. A W.I.P Android Security Ref
- uTox. µTox the lightest and fluffiest Tox client
- AspNetCoreSpa. Asp.Net Core 2 & Angular (5+) SPA with Angular CLI full featured application. Live demo:
- AspNet5IdentityServerAngularImplicitFlow. OpenID Connect Implicit Flow with Angular and ASP.NET Core 2.0 IdentityServer4
- zmNinja. High performance, cross platform ionic app for Home/Commerical Security Surveillance using ZoneMinder or other NVRs
- GlobaLeaks. GlobaLeaks - The Open-Source Whistleblowing Software
- OnionBrowser. An open-source, privacy-enhancing web browser for iOS, utilizing the Tor anonymity network
- i2pd. 🛡 I2P: End-to-End encrypted and anonymous Internet
- GlobaLeaks. GlobaLeaks - The Open-Source Whistleblowing Software
- fail2ban. Daemon to ban hosts that cause multiple authentication errors
- Captcha. PHP Captcha library
- Captcha. PHP Captcha library
- invisible_captcha. 🍯 Unobtrusive and flexible spam protection for Rails apps
- API-Security-Checklist. Checklist of the most important security countermeasures when designing, testing, and releasing your API
- cilium. HTTP, gRPC, and Kafka Aware Security and Networking for Containers with BPF and XDP
- docker-slim. DockerSlim (docker-slim): Optimize and secure your Docker containers (free and open source)
- bane. Custom & better AppArmor profile generator for Docker containers.
- contained.af. A stupid game for learning about containers, capabilities, and syscalls.
- amicontained. Container introspection tool. Find out what container runtime is being used as well as features available.
- awesome-appsec. A curated list of resources for learning about application security
- jackhammer. Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
- airship. Secure Content Management for the Modern Web - "The sky is only the beginning"
- capstone. Capstone disassembly/disassembler framework: Core (Arm, Arm64, M68K, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, Java, Ocaml, PowerShell)
- unicorn. Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)
- keystone. Keystone assembler framework: Core (Arm, Arm64, Hexagon, Mips, PowerPC, Sparc, SystemZ & X86) + bindings
- bap. Binary Analysis Platform
- keypatch. Multi-architecture assembler for IDA Pro. Powered by Keystone Engine.
- capstone. Capstone disassembly/disassembler framework: Core (Arm, Arm64, M68K, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, Java, Ocaml, PowerShell)
- unicorn. Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)
- keystone. Keystone assembler framework: Core (Arm, Arm64, Hexagon, Mips, PowerPC, Sparc, SystemZ & X86) + bindings
- keypatch. Multi-architecture assembler for IDA Pro. Powered by Keystone Engine.
- IdentityServer4. OpenID Connect and OAuth 2.0 Framework for ASP.NET Core
- AspNet5IdentityServerAngularImplicitFlow. OpenID Connect Implicit Flow with Angular and ASP.NET Core 2.0 IdentityServer4
- keystone. Keystone assembler framework: Core (Arm, Arm64, Hexagon, Mips, PowerPC, Sparc, SystemZ & X86) + bindings
- keypatch. Multi-architecture assembler for IDA Pro. Powered by Keystone Engine.
- prowler. AWS Security Best Practices Assessment, Auditing, Hardening and Forensics Readiness Tool. It follows guidelines of the CIS Amazon Web Services Foundations Benchmark (https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf). It performs extra checks as well.
- objection. 📱 objection - runtime mobile exploration
- nmap. Nmap - the Network Mapper. Github mirror of official SVN repository.
- slurp. Enumerate S3 buckets via certstream, domain, or keywords
- inspec. InSpec: Auditing and Testing Framework
- BoopSuite. A Suite of Tools written in Python for wireless auditing and security testing.
- bouncer. Eloquent roles and abilities.
- sentinel. A framework agnostic authentication & authorization system.
- fosite. Extensible security first OAuth 2.0 and OpenID Connect SDK for Go.
- twofactorauth. List of sites with two factor auth support which includes SMS, email, phone calls, hardware, and software.
- pac4j. Security engine for Java (authentication, authorization, multi frameworks): OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- sentinel. A framework agnostic authentication & authorization system.
- fosite. Extensible security first OAuth 2.0 and OpenID Connect SDK for Go.
- yosai. A Security Framework for Python applications featuring Authorization (rbac permissions and roles), Authentication (2fa totp), Session Management and an extensive Audit Trail
- Flask-HTTPAuth. Simple extension that provides Basic, Digest and Token HTTP authentication for Flask routes
- AspNet5IdentityServerAngularImplicitFlow. OpenID Connect Implicit Flow with Angular and ASP.NET Core 2.0 IdentityServer4
- play-pac4j. Security library for Play framework 2 in Java and Scala: OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- hydra. OAuth2 server with OpenID Connect - cloud native, security-first, open source API security for your infrastructure. Written in Go. SDKs for any language.
- bouncer. Eloquent roles and abilities.
- pac4j. Security engine for Java (authentication, authorization, multi frameworks): OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- sentinel. A framework agnostic authentication & authorization system.
- fosite. Extensible security first OAuth 2.0 and OpenID Connect SDK for Go.
- yosai. A Security Framework for Python applications featuring Authorization (rbac permissions and roles), Authentication (2fa totp), Session Management and an extensive Audit Trail
- AspNet5IdentityServerAngularImplicitFlow. OpenID Connect Implicit Flow with Angular and ASP.NET Core 2.0 IdentityServer4
- accesscontrol. Role and Attribute based Access Control for Node.js
- play-pac4j. Security library for Play framework 2 in Java and Scala: OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- AutoSploit. Automated Mass Exploiter
- guide. Kubernetes clusters for the hobbyist.
- owtf. Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient @owtfp http://owtf.org
- DumpsterFire. "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
- django-DefectDojo. DefectDojo is an open-source defect tracking application
- Awesome-Hacking. A collection of various awesome lists for hackers, pentesters and security researchers
- android-security-awesome. A collection of android security related resources
- awesome-ctf. A curated list of CTF frameworks, libraries, resources and softwares
- awesome-incident-response. A curated list of tools for incident response
- awesome-threat-intelligence. A curated list of Awesome Threat Intelligence resources
- awesome-infosec. A curated list of awesome infosec courses and training resources.
- awesome-web-security. 🐶 A curated list of Web Security materials and resources.
- awesome-pentest-cheat-sheets. Collection of the cheat sheets useful for pentesting
- awesome-iot-hacks. A Collection of Hacks in IoT Space so that we can address them (hopefully).
- awesome-threat-detection. A curated list of awesome threat detection and hunting resources
- android-security-awesome. A collection of android security related resources
- awesome-security. A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
- awesome-incident-response. A curated list of tools for incident response
- awesome-web-security. 🐶 A curated list of Web Security materials and resources.
- awesome-threat-detection. A curated list of awesome threat detection and hunting resources
- sops. Secrets management stinks, use some sops!
- confidant. Confidant: your secret keeper.
- streamalert. StreamAlert is a serverless, realtime data analysis framework which empowers you to ingest, analyze, and alert on data from any environment, using datasources and alerting logic you define.
- Scout2. Security auditing tool for AWS environments
- xiringuito. SSH-based "VPN for poors"
- binaryalert. BinaryAlert: Serverless, Real-time & Retroactive Malware Detection
- prowler. AWS Security Best Practices Assessment, Auditing, Hardening and Forensics Readiness Tool. It follows guidelines of the CIS Amazon Web Services Foundations Benchmark (https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf). It performs extra checks as well.
- scans. AWS security scanning checks
- AWS-VPN-Server-Setup. Setup your own private, secure, free* VPN on the Amazon AWS Cloud in 10 minutes. CloudFormation
- airgeddon. This is a multi-use bash script for Linux systems to audit wireless networks.
- security-cheatsheets. 🔒 A collection of cheatsheets for various infosec tools and topics.
- cleverhans. An adversarial example library for constructing attacks, building defenses, and benchmarking both
- processhacker. A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.
- kubernetes-security-best-practice. Kubernetes Security - Best Practice Guide
- sonarwhal. A linting tool for the web
- AspNetCoreSpa. Asp.Net Core 2 & Angular (5+) SPA with Angular CLI full featured application. Live demo:
- best-practices-badge. Core Infrastructure Initiative Best Practices Badge
- bettercap. DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap
- bettercap. The state of the art network attack and monitoring framework.
- airgeddon. This is a multi-use bash script for Linux systems to audit wireless networks.
- smart-contract-best-practices. A guide to smart contract security best practices
- manticore. Symbolic execution tool
- Solium. Linter to identify and fix style & security issues in Solidity
- heap-exploitation. This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structure.
- CTF-All-In-One. 一本 CTF 书
- bro. Bro is a powerful network analysis framework that is much different from the typical IDS you may know. Official mirror of git.bro.org/bro.git .
- ivre. Network recon framework.
- decentraleyes. Decentraleyes - Local emulation of Content Delivery Networks.
- javascript-obfuscator. A powerful obfuscator for JavaScript and Node.js
- badssl.com. 🔒 Memorable site for testing clients against bad SSL configs.
- OnionBrowser. An open-source, privacy-enhancing web browser for iOS, utilizing the Tor anonymity network
- scriptsafe. a browser extension to bring security and privacy to chrome, firefox, and opera
- KeychainCracker. macOS keychain cracking tool
- c-jwt-cracker. JWT brute force cracker written in C
- routersploit. The Router Exploitation Framework
- dirsearch. Web path scanner
- Awesome-Hacking. A collection of various awesome lists for hackers, pentesters and security researchers
- subjack. Hostile Subdomain Takeover tool written in Go featuring self-reliant subdomain discovery with amass integration, allowing for simultaneous checking for subdomain takeovers while enumerating DNS.
- StaCoAn. StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.
- subjack. Hostile Subdomain Takeover tool written in Go featuring self-reliant subdomain discovery with amass integration, allowing for simultaneous checking for subdomain takeovers while enumerating DNS.
- retire.js. scanner detecting the use of JavaScript libraries with known vulnerabilities
- DependencyCheck. OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
- processhacker. A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.
- honggfuzz. Security oriented fuzzer with powerful analysis options. Supports evolutionary, feedback-driven fuzzing based on code coverage (software- and hardware-based)
- toxic. An ncurses-based Tox client
- uTox. µTox the lightest and fluffiest Tox client
- sigmavpn. Light-weight, secure and modular VPN solution
- nmap. Nmap - the Network Mapper. Github mirror of official SVN repository.
- edb-debugger. edb is a cross platform x86/x86-64 debugger.
- i2pd. 🛡 I2P: End-to-End encrypted and anonymous Internet
- botan. Crypto and TLS for C++11
- QuasarRAT. Remote Administration Tool for Windows
- SecurityDriven.Inferno. ✅ .NET crypto done right. Professionally audited.
- spring-boot. spring-boot 项目实践总结
- edgedns. A high performance DNS cache designed for Content Delivery Networks
- captcha. Captcha for Laravel 5
- Captcha. PHP Captcha library
- rucaptcha. Captcha gem for Rails Application. No dependencies. No ImageMagick, No RMagick.
- invisible_captcha. 🍯 Unobtrusive and flexible spam protection for Rails apps
- pac4j. Security engine for Java (authentication, authorization, multi frameworks): OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- play-pac4j. Security library for Play framework 2 in Java and Scala: OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- cameradar. Cameradar hacks its way into RTSP videosurveillance cameras
- zmNinja. High performance, cross platform ionic app for Home/Commerical Security Surveillance using ZoneMinder or other NVRs
- sites-using-cloudflare. 💔 Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.
- decentraleyes. Decentraleyes - Local emulation of Content Delivery Networks.
- nginxconfig.io. nginx config generator
- edgedns. A high performance DNS cache designed for Content Delivery Networks
- awesome-pentest-cheat-sheets. Collection of the cheat sheets useful for pentesting
- filterbypass.
- zen-rails-security-checklist. Checklist of security precautions for Ruby on Rails applications.
- rails-security-checklist. 🔑 Community-driven Rails Security Checklist (see our GitHub Issues for the newest checks that aren't yet in the README)
- badssl.com. 🔒 Memorable site for testing clients against bad SSL configs.
- scriptsafe. a browser extension to bring security and privacy to chrome, firefox, and opera
- BoopSuite. A Suite of Tools written in Python for wireless auditing and security testing.
- bane. Custom & better AppArmor profile generator for Docker containers.
- hydra. OAuth2 server with OpenID Connect - cloud native, security-first, open source API security for your infrastructure. Written in Go. SDKs for any language.
- scans. AWS security scanning checks
- hydra. OAuth2 server with OpenID Connect - cloud native, security-first, open source API security for your infrastructure. Written in Go. SDKs for any language.
- pouch. Pouch is an open-source project created to promote the container technology movement.
- system-bus-radio. Transmits AM radio on computers without radio transmitting hardware.
- wire-ios. 📱 Wire for iOS (iPhone and iPad)
- i2pd. 🛡 I2P: End-to-End encrypted and anonymous Internet
- ossec-hids. OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
- inspec. InSpec: Auditing and Testing Framework
- prowler. AWS Security Best Practices Assessment, Auditing, Hardening and Forensics Readiness Tool. It follows guidelines of the CIS Amazon Web Services Foundations Benchmark (https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf). It performs extra checks as well.
- wazuh. Wazuh - Host and endpoint security
- scap-security-guide. Baseline compliance content in SCAP formats
- runtime. OCI (Open Containers Initiative) compatible runtime using Virtual Machines
- cc-oci-runtime. OCI (Open Containers Initiative) compatible runtime for Intel® Architecture
- labs. This is a collection of tutorials for learning how to use Docker with various tools. Contributions welcome.
- pouch. Pouch is an open-source project created to promote the container technology movement.
- Portus. Authorization service and frontend for Docker registry (v2)
- cilium. HTTP, gRPC, and Kafka Aware Security and Networking for Containers with BPF and XDP
- docker-slim. DockerSlim (docker-slim): Optimize and secure your Docker containers (free and open source)
- felix. Project Calico's per-host agent Felix, responsible for programming routes and security policy.
- subuser. Run programs on linux with selectively restricted permissions.
- bane. Custom & better AppArmor profile generator for Docker containers.
- runtime. OCI (Open Containers Initiative) compatible runtime using Virtual Machines
- cc-oci-runtime. OCI (Open Containers Initiative) compatible runtime for Intel® Architecture
- contained.af. A stupid game for learning about containers, capabilities, and syscalls.
- amicontained. Container introspection tool. Find out what container runtime is being used as well as features available.
- BoopSuite. A Suite of Tools written in Python for wireless auditing and security testing.
- KeychainCracker. macOS keychain cracking tool
- DOMPurify. DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:
- csp-builder. Build Content-Security-Policy headers from a JSON file (or build them programmatically)
- cryptomator. Multi-platform transparent client-side encryption of your files in the cloud
- piknik. Copy/paste anything over the network
- PrivateBin. A minimalist, open source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256 bits AES.
- botan. Crypto and TLS for C++11
- featherduster. An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
- ghostunnel. A simple SSL/TLS proxy with mutual authentication for securing non-TLS services
- CTF-All-In-One. 一本 CTF 书
- libsodium-php. PHP extension for libsodium
- libsodium-php. PHP extension for libsodium
- SecurityDriven.Inferno. ✅ .NET crypto done right. Professionally audited.
- cryptomator. Multi-platform transparent client-side encryption of your files in the cloud
- javascript-obfuscator. A powerful obfuscator for JavaScript and Node.js
- i2pd. 🛡 I2P: End-to-End encrypted and anonymous Internet
- cryptocat. Secure chat software for your computer.
- ring. Safe, fast, small crypto using Rust
- PrivateBin. A minimalist, open source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256 bits AES.
- botan. Crypto and TLS for C++11
- Cloakify. CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings; Evade DLP/MLS Devices; Defeat Data Whitelisting Controls; Social Engineering of Analysts; Evade AV Detection
- featherduster. An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
- themis. Human friendly crypto library for storage and messaging for mobile apps, servers and front-ends.
- wolfssl. wolfSSL (formerly CyaSSL) is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud. http://www.wolfssl.com
- libsodium-php. PHP extension for libsodium
- libsodium-php. PHP extension for libsodium
- miscreant. Misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support
- SecurityDriven.Inferno. ✅ .NET crypto done right. Professionally audited.
- awesome-ctf. A curated list of CTF frameworks, libraries, resources and softwares
- CTFd. CTFs as you need them
- ctf. Ctf solutions from p4 team
- CTF-All-In-One. 一本 CTF 书
- Free-Security-eBooks. Free Security and Hacking eBooks
- slurp. Enumerate S3 buckets via certstream, domain, or keywords
- vuls. Vulnerability scanner for Linux/FreeBSD, agentless, written in Go
- awesome-incident-response. A curated list of tools for incident response
- MISP. MISP (core software) - Open Source Threat Intelligence Platform (formely known as Malware Information Sharing Platform)
- dawnscanner. Dawn is a static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails frameworks.
- Passhunt. Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
- x64dbg. An open-source x64/x32 debugger for windows.
- processhacker. A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.
- edb-debugger. edb is a cross platform x86/x86-64 debugger.
- Detect-It-Easy. Detect it Easy
- faraday. Collaborative Penetration Test and Vulnerability Management Platform
- sops. Secrets management stinks, use some sops!
- inspec. InSpec: Auditing and Testing Framework
- bro. Bro is a powerful network analysis framework that is much different from the typical IDS you may know. Official mirror of git.bro.org/bro.git .
- awesome-incident-response. A curated list of tools for incident response
- timesketch. Collaborative forensic timeline analysis
- routersploit. The Router Exploitation Framework
- cameradar. Cameradar hacks its way into RTSP videosurveillance cameras
- x64dbg. An open-source x64/x32 debugger for windows.
- capstone. Capstone disassembly/disassembler framework: Core (Arm, Arm64, M68K, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, Java, Ocaml, PowerShell)
- panopticon. A libre cross-platform disassembler.
- bap. Binary Analysis Platform
- Detect-It-Easy. Detect it Easy
- meshbird. Distributed private networking
- Hive2Hive. Java library for secure, distributed, P2P-based file synchronization and sharing.
- hawkpost. Generate links that users can use to submit messages encrypted with your public key.
- django-DefectDojo. DefectDojo is an open-source defect tracking application
- sites-using-cloudflare. 💔 Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.
- amass. In-depth subdomain enumeration written in Go
- awesome-checker-services. ✅ List of links to the various checkers out there on the web for sites, domains, security etc.
- rita. Real Intelligence Threat Analytics
- edgedns. A high performance DNS cache designed for Content Delivery Networks
- teleport. Modern SSH server for clusters and teams.
- labs. This is a collection of tutorials for learning how to use Docker with various tools. Contributions welcome.
- hydra. OAuth2 server with OpenID Connect - cloud native, security-first, open source API security for your infrastructure. Written in Go. SDKs for any language.
- Portus. Authorization service and frontend for Docker registry (v2)
- cilium. HTTP, gRPC, and Kafka Aware Security and Networking for Containers with BPF and XDP
- docker-ipsec-vpn-server. Docker image to run an IPsec VPN server, with IPsec/L2TP and Cisco IPsec
- docker-slim. DockerSlim (docker-slim): Optimize and secure your Docker containers (free and open source)
- cameradar. Cameradar hacks its way into RTSP videosurveillance cameras
- dockerscan. Docker security analysis & hacking tools
- felix. Project Calico's per-host agent Felix, responsible for programming routes and security policy.
- subuser. Run programs on linux with selectively restricted permissions.
- airgeddon. This is a multi-use bash script for Linux systems to audit wireless networks.
- bane. Custom & better AppArmor profile generator for Docker containers.
- runtime. OCI (Open Containers Initiative) compatible runtime using Virtual Machines
- cc-oci-runtime. OCI (Open Containers Initiative) compatible runtime for Intel® Architecture
- contained.af. A stupid game for learning about containers, capabilities, and syscalls.
- wolfssl. wolfSSL (formerly CyaSSL) is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud. http://www.wolfssl.com
- dagda. a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities
- amicontained. Container introspection tool. Find out what container runtime is being used as well as features available.
- docker-ipsec-vpn-server. Docker image to run an IPsec VPN server, with IPsec/L2TP and Cisco IPsec
- cameradar. Cameradar hacks its way into RTSP videosurveillance cameras
- labs. This is a collection of tutorials for learning how to use Docker with various tools. Contributions welcome.
- IdentityServer4. OpenID Connect and OAuth 2.0 Framework for ASP.NET Core
- SecurityDriven.Inferno. ✅ .NET crypto done right. Professionally audited.
- bap. Binary Analysis Platform
- jackhammer. Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
- search-guard. Search Guard is an Open Source Elasticsearch plugin that offers encryption, authentication, and authorisation.
- MozDef. MozDef: The Mozilla Defense Platform
- elasticsearch-readonlyrest-plugin. Free Elasticsearch and Kibana security plugin: super-easy Kibana multi-tenancy, Encryption, Authentication, Authorization, Auditing
- sigma. Generic Signature Format for SIEM Systems
- wazuh. Wazuh - Host and endpoint security
- keeweb. Free cross-platform password manager compatible with KeePass
- buttercup-desktop. 🔑 Javascript Password Vault - Multi-Platform Desktop Application
- search-guard. Search Guard is an Open Source Elasticsearch plugin that offers encryption, authentication, and authorisation.
- MozDef. MozDef: The Mozilla Defense Platform
- search-guard. Search Guard is an Open Source Elasticsearch plugin that offers encryption, authentication, and authorisation.
- MozDef. MozDef: The Mozilla Defense Platform
- hawkpost. Generate links that users can use to submit messages encrypted with your public key.
- FiercePhish. FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.
- routersploit. The Router Exploitation Framework
- wolfssl. wolfSSL (formerly CyaSSL) is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud. http://www.wolfssl.com
- manticore. Symbolic execution tool
- ViperMonkey. A VBA parser and emulation engine to analyze malicious macros.
- unicorn. Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)
- bap. Binary Analysis Platform
- PrivateBin. A minimalist, open source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256 bits AES.
- uTox. µTox the lightest and fluffiest Tox client
- algo. Set up a personal IPSEC VPN in the cloud
- hawk. ✔️ Secure, simple key-value storage for Android
- wire-ios. 📱 Wire for iOS (iPhone and iPad)
- buttercup-desktop. 🔑 Javascript Password Vault - Multi-Platform Desktop Application
- featherduster. An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
- SwiftyRSA. RSA public/private key encryption in Swift
- AWS-VPN-Server-Setup. Setup your own private, secure, free* VPN on the Amazon AWS Cloud in 10 minutes. CloudFormation
- jose-jwt. Ultimate Javascript Object Signing and Encryption (JOSE) and JSON Web Token (JWT) Implementation for .NET and .NET Core
- SecurityDriven.Inferno. ✅ .NET crypto done right. Professionally audited.
- jasypt-spring-boot. Jasypt integration for Spring boot
- amass. In-depth subdomain enumeration written in Go
- Reconnoitre. A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
- slurp. Enumerate S3 buckets via certstream, domain, or keywords
- kernelpop. kernel privilege escalation enumeration and exploitation framework
- subjack. Hostile Subdomain Takeover tool written in Go featuring self-reliant subdomain discovery with amass integration, allowing for simultaneous checking for subdomain takeovers while enumerating DNS.
- zeppelin-solidity. OpenZeppelin, a framework to build secure smart contracts on Ethereum
- smart-contract-best-practices. A guide to smart contract security best practices
- manticore. Symbolic execution tool
- Solium. Linter to identify and fix style & security issues in Solidity
- system-bus-radio. Transmits AM radio on computers without radio transmitting hardware.
- Cloakify. CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings; Evade DLP/MLS Devices; Defeat Data Whitelisting Controls; Social Engineering of Analysts; Evade AV Detection
- AutoSploit. Automated Mass Exploiter
- linux-kernel-exploitation. A bunch of links related to Linux kernel exploitation
- labs. Vulnerability Labs for security analysis
- vulscan. Advanced vulnerability scanning with Nmap NSE
- featherduster. An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
- Am-I-affected-by-Meltdown. Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.
- htshells. Self contained htaccess shells and attacks
- CTF-All-In-One. 一本 CTF 书
- AutoSploit. Automated Mass Exploiter
- featherduster. An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
- routersploit. The Router Exploitation Framework
- xunfeng. 巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
- exploits. Miscellaneous exploit code
- featherduster. An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
- wordpress-exploit-framework. A Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.
- kernelpop. kernel privilege escalation enumeration and exploitation framework
- hydra. OAuth2 server with OpenID Connect - cloud native, security-first, open source API security for your infrastructure. Written in Go. SDKs for any language.
- jose-jwt. Ultimate Javascript Object Signing and Encryption (JOSE) and JSON Web Token (JWT) Implementation for .NET and .NET Core
- ossec-hids. OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
- wazuh. Wazuh - Host and endpoint security
- onionshare. Securely and anonymously share a file of any size
- Hive2Hive. Java library for secure, distributed, P2P-based file synchronization and sharing.
- user.js. user.js -- Firefox configuration hardening
- ghacks-user.js. An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting
- scriptsafe. a browser extension to bring security and privacy to chrome, firefox, and opera
- teleport. Modern SSH server for clusters and teams.
- opensnitch. OpenSnitch is a GNU/Linux port of the Little Snitch application firewall.
- CTFd. CTFs as you need them
- pyt. A Static Analysis Tool for Detecting Security Vulnerabilities in Python Web Applications
- Flask-HTTPAuth. Simple extension that provides Basic, Digest and Token HTTP authentication for Flask routes
- Free-Security-eBooks. Free Security and Hacking eBooks
- timesketch. Collaborative forensic timeline analysis
- bap. Binary Analysis Platform
- oletools. oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
- capstone. Capstone disassembly/disassembler framework: Core (Arm, Arm64, M68K, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, Java, Ocaml, PowerShell)
- unicorn. Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)
- owtf. Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient @owtfp http://owtf.org
- keystone. Keystone assembler framework: Core (Arm, Arm64, Hexagon, Mips, PowerPC, Sparc, SystemZ & X86) + bindings
- objection. 📱 objection - runtime mobile exploration
- honeytrap. Advanced Honeypot framework.
- Awesome-Hacking. A collection of various awesome lists for hackers, pentesters and security researchers
- oss-fuzz. OSS-Fuzz - continuous fuzzing of open source software
- syzkaller. syzkaller is an unsupervised, coverage-guided kernel fuzzer
- dirsearch. Web path scanner
- honggfuzz. Security oriented fuzzer with powerful analysis options. Supports evolutionary, feedback-driven fuzzing based on code coverage (software- and hardware-based)
- teleport. Modern SSH server for clusters and teams.
- vuls. Vulnerability scanner for Linux/FreeBSD, agentless, written in Go
- gitleaks. Searches full repo history for secrets and keys 🔑
- bettercap. The state of the art network attack and monitoring framework.
- docker-slim. DockerSlim (docker-slim): Optimize and secure your Docker containers (free and open source)
- secure. HTTP middleware for Go that facilitates some quick security wins.
- bluemonday. bluemonday: a fast golang HTML sanitizer (inspired by the OWASP Java HTML Sanitizer) to scrub user generated content of XSS
- nosurf. CSRF protection middleware for Go.
- sshesame. A fake SSH server that lets everyone in and logs their activity
- memguard. Easy and secure handling of sensitive memory, in pure Go.
- amass. In-depth subdomain enumeration written in Go
- felix. Project Calico's per-host agent Felix, responsible for programming routes and security policy.
- ghostunnel. A simple SSL/TLS proxy with mutual authentication for securing non-TLS services
- subjack. Hostile Subdomain Takeover tool written in Go featuring self-reliant subdomain discovery with amass integration, allowing for simultaneous checking for subdomain takeovers while enumerating DNS.
- vuls. Vulnerability scanner for Linux/FreeBSD, agentless, written in Go
- gitleaks. Searches full repo history for secrets and keys 🔑
- gophish. Open-Source Phishing Toolkit
- bettercap. The state of the art network attack and monitoring framework.
- docker-slim. DockerSlim (docker-slim): Optimize and secure your Docker containers (free and open source)
- cameradar. Cameradar hacks its way into RTSP videosurveillance cameras
- fosite. Extensible security first OAuth 2.0 and OpenID Connect SDK for Go.
- secure. HTTP middleware for Go that facilitates some quick security wins.
- sshesame. A fake SSH server that lets everyone in and logs their activity
- gas. Go AST Scanner
- memguard. Easy and secure handling of sensitive memory, in pure Go.
- felix. Project Calico's per-host agent Felix, responsible for programming routes and security policy.
- slurp. Enumerate S3 buckets via certstream, domain, or keywords
- nacl. Pure Go implementation of the NaCL set of API's
- subjack. Hostile Subdomain Takeover tool written in Go featuring self-reliant subdomain discovery with amass integration, allowing for simultaneous checking for subdomain takeovers while enumerating DNS.
- graylog2-server. Free and open source log management
- nzyme. Nzyme collects 802.11 management frames directly from the air and sends them to a Graylog (Open Source log management) setup for WiFi IDS, monitoring, and incident response. It only needs a JVM and a WiFi adapter that supports monitor mode.
- guide. Kubernetes clusters for the hobbyist.
- kubernetes-security-best-practice. Kubernetes Security - Best Practice Guide
- cameradar. Cameradar hacks its way into RTSP videosurveillance cameras
- awesome-iot-hacks. A Collection of Hacks in IoT Space so that we can address them (hopefully).
- Awesome-Hacking. A collection of various awesome lists for hackers, pentesters and security researchers
- hacker101. Hacker101
- urh. Universal Radio Hacker: investigate wireless protocols like a boss
- awesome-sec-talks. A collected list of awesome security talks
- DVWA. Damn Vulnerable Web Application (DVWA)
- bettercap. The state of the art network attack and monitoring framework.
- nishang. Nishang - PowerShell for penetration testing and offensive security.
- Free-Security-eBooks. Free Security and Hacking eBooks
- dirsearch. Web path scanner
- pentest-wiki. PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.
- exploits. Miscellaneous exploit code
- dockerscan. Docker security analysis & hacking tools
- FiercePhish. FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.
- Cloakify. CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings; Evade DLP/MLS Devices; Defeat Data Whitelisting Controls; Social Engineering of Analysts; Evade AV Detection
- airgeddon. This is a multi-use bash script for Linux systems to audit wireless networks.
- KeychainCracker. macOS keychain cracking tool
- Reconnoitre. A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
- DumpsterFire. "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
- CTF-All-In-One. 一本 CTF 书
- wpscan. WPScan is a black box WordPress vulnerability scanner
- trape. People tracker on the Internet: Learn to track the world, to avoid being traced.
- BoopSuite. A Suite of Tools written in Python for wireless auditing and security testing.
- Cloakify. CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings; Evade DLP/MLS Devices; Defeat Data Whitelisting Controls; Social Engineering of Analysts; Evade AV Detection
- Reconnoitre. A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
- DumpsterFire. "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
- Cloakify. CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings; Evade DLP/MLS Devices; Defeat Data Whitelisting Controls; Social Engineering of Analysts; Evade AV Detection
- DumpsterFire. "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
- libsodium-php. PHP extension for libsodium
- libsodium-php. PHP extension for libsodium
- hardentools. Hardentools is a utility that disables a number of risky Windows features.
- prowler. AWS Security Best Practices Assessment, Auditing, Hardening and Forensics Readiness Tool. It follows guidelines of the CIS Amazon Web Services Foundations Benchmark (https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf). It performs extra checks as well.
- awesome-windows-domain-hardening. A curated list of awesome Security Hardening techniques for Windows.
- ring. Safe, fast, small crypto using Rust
- SecurityDriven.Inferno. ✅ .NET crypto done right. Professionally audited.
- itsdangerous. Various helpers to pass trusted data to untrusted environments
- ring. Safe, fast, small crypto using Rust
- SecurityDriven.Inferno. ✅ .NET crypto done right. Professionally audited.
- cowrie. Cowrie SSH/Telnet Honeypot
- sshesame. A fake SSH server that lets everyone in and logs their activity
- conpot. ICS/SCADA honeypot
- invisible_captcha. 🍯 Unobtrusive and flexible spam protection for Rails apps
- honeytrap. Advanced Honeypot framework.
- DOMPurify. DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:
- bluemonday. bluemonday: a fast golang HTML sanitizer (inspired by the OWASP Java HTML Sanitizer) to scrub user generated content of XSS
- mitmproxy. An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
- cilium. HTTP, gRPC, and Kafka Aware Security and Networking for Containers with BPF and XDP
- sozu. Sōzu HTTP reverse proxy, configurable at runtime, fast and safe, built in Rust. It will be awesome when it will be ready. Not So Secret Project! Ping us on gitter to know more
- protools. 历经开发周期两年,并且应用过千万级别项目的工具箱
- csp-builder. Build Content-Security-Policy headers from a JSON file (or build them programmatically)
- mitmproxy. An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
- nginxconfig.io. nginx config generator
- sites-using-cloudflare. 💔 Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.
- badssl.com. 🔒 Memorable site for testing clients against bad SSL configs.
- nginxconfig.io. nginx config generator
- GlobaLeaks. GlobaLeaks - The Open-Source Whistleblowing Software
- wolfssl. wolfSSL (formerly CyaSSL) is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud. http://www.wolfssl.com
- hydra. OAuth2 server with OpenID Connect - cloud native, security-first, open source API security for your infrastructure. Written in Go. SDKs for any language.
- IdentityServer4. OpenID Connect and OAuth 2.0 Framework for ASP.NET Core
- AspNet5IdentityServerAngularImplicitFlow. OpenID Connect Implicit Flow with Angular and ASP.NET Core 2.0 IdentityServer4
- IdentityServer4. OpenID Connect and OAuth 2.0 Framework for ASP.NET Core
- AspNet5IdentityServerAngularImplicitFlow. OpenID Connect Implicit Flow with Angular and ASP.NET Core 2.0 IdentityServer4
- fail2ban. Daemon to ban hosts that cause multiple authentication errors
- suricata. Suricata git repository maintained by the OISF
- sigma. Generic Signature Format for SIEM Systems
- wazuh. Wazuh - Host and endpoint security
- SELKS. A Suricata based IDS/IPS distro
- algo. Set up a personal IPSEC VPN in the cloud
- setup-ipsec-vpn. Scripts to build your own IPsec VPN server, with IPsec/L2TP and Cisco IPsec on Ubuntu, Debian and CentOS
- awesome-incident-response. A curated list of tools for incident response
- wazuh. Wazuh - Host and endpoint security
- MISP. MISP (core software) - Open Source Threat Intelligence Platform (formely known as Malware Information Sharing Platform)
- AIL-framework. AIL framework - Analysis Information Leak framework
- routersploit. The Router Exploitation Framework
- awesome-sec-talks. A collected list of awesome security talks
- DVWA. Damn Vulnerable Web Application (DVWA)
- nishang. Nishang - PowerShell for penetration testing and offensive security.
- faraday. Collaborative Penetration Test and Vulnerability Management Platform
- awesome-infosec. A curated list of awesome infosec courses and training resources.
- xunfeng. 巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
- security-txt. A proposed standard that allows websites to define security policies.
- amass. In-depth subdomain enumeration written in Go
- bugbounty-cheatsheet. A list of interesting payloads, tips and tricks for bug bounty hunters.
- Cloakify. CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings; Evade DLP/MLS Devices; Defeat Data Whitelisting Controls; Social Engineering of Analysts; Evade AV Detection
- changeme. A default credential scanner.
- metta. An information security preparedness tool to do adversarial simulation.
- DumpsterFire. "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
- GourdScanV2. 被动式漏洞扫描系统
- nzyme. Nzyme collects 802.11 management frames directly from the air and sends them to a Graylog (Open Source log management) setup for WiFi IDS, monitoring, and incident response. It only needs a JVM and a WiFi adapter that supports monitor mode.
- subjack. Hostile Subdomain Takeover tool written in Go featuring self-reliant subdomain discovery with amass integration, allowing for simultaneous checking for subdomain takeovers while enumerating DNS.
- MISP. MISP (core software) - Open Source Threat Intelligence Platform (formely known as Malware Information Sharing Platform)
- xray. XRay is a tool for recon, mapping and OSINT gathering from public networks.
- osquery. SQL powered operating system instrumentation, monitoring, and analytics.
- fail2ban. Daemon to ban hosts that cause multiple authentication errors
- maltrail. Malicious traffic detection system
- ossec-hids. OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
- awesome-threat-detection. A curated list of awesome threat detection and hunting resources
- wazuh. Wazuh - Host and endpoint security
- Valet. Valet lets you securely store data in the iOS, tvOS, or macOS Keychain without knowing a thing about how the Keychain works. It’s easy. We promise.
- wire-ios. 📱 Wire for iOS (iPhone and iPad)
- OnionBrowser. An open-source, privacy-enhancing web browser for iOS, utilizing the Tor anonymity network
- secure-ios-app-dev. Collection of the most common vulnerabilities found in iOS applications
- needle. The iOS Security Testing Framework
- objection. 📱 objection - runtime mobile exploration
- SwiftyRSA. RSA public/private key encryption in Swift
- EllipticCurveKeyPair. Sign, verify, encrypt and decrypt using the Secure Enclave
- urh. Universal Radio Hacker: investigate wireless protocols like a boss
- awesome-iot-hacks. A Collection of Hacks in IoT Space so that we can address them (hopefully).
- zmNinja. High performance, cross platform ionic app for Home/Commerical Security Surveillance using ZoneMinder or other NVRs
- fail2ban. Daemon to ban hosts that cause multiple authentication errors
- suricata. Suricata git repository maintained by the OISF
- SELKS. A Suricata based IDS/IPS distro
- algo. Set up a personal IPSEC VPN in the cloud
- setup-ipsec-vpn. Scripts to build your own IPsec VPN server, with IPsec/L2TP and Cisco IPsec on Ubuntu, Debian and CentOS
- docker-ipsec-vpn-server. Docker image to run an IPsec VPN server, with IPsec/L2TP and Cisco IPsec
- AWS-VPN-Server-Setup. Setup your own private, secure, free* VPN on the Amazon AWS Cloud in 10 minutes. CloudFormation
- labs. This is a collection of tutorials for learning how to use Docker with various tools. Contributions welcome.
- spring-security. Spring Security
- cryptomator. Multi-platform transparent client-side encryption of your files in the cloud
- drozer. The Leading Security Assessment Framework for Android.
- pac4j. Security engine for Java (authentication, authorization, multi frameworks): OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- elasticsearch-readonlyrest-plugin. Free Elasticsearch and Kibana security plugin: super-easy Kibana multi-tenancy, Encryption, Authentication, Authorization, Auditing
- find-sec-bugs. The FindBugs plugin for security audits of Java web applications and Android applications. (Also work with Groovy and Scala projects)
- Note. 常规Java工具,算法,加密,数据库,面试题,源代码分析,解决方案
- jasypt-spring-boot. Jasypt integration for Spring boot
- play-pac4j. Security library for Play framework 2 in Java and Scala: OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- keeweb. Free cross-platform password manager compatible with KeePass
- helmet. Help secure Express apps with various HTTP headers
- DOMPurify. DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:
- retire.js. scanner detecting the use of JavaScript libraries with known vulnerabilities
- javascript-obfuscator. A powerful obfuscator for JavaScript and Node.js
- express-gateway. A microservices API Gateway built on top of ExpressJS
- vm2. Advanced vm/sandbox for Node.js
- zmNinja. High performance, cross platform ionic app for Home/Commerical Security Surveillance using ZoneMinder or other NVRs
- Detect-It-Easy. Detect it Easy
- scriptsafe. a browser extension to bring security and privacy to chrome, firefox, and opera
- NodeJsScan. NodeJsScan is a static security code scanner for Node.js applications.
- API-Security-Checklist. Checklist of the most important security countermeasures when designing, testing, and releasing your API
- pac4j. Security engine for Java (authentication, authorization, multi frameworks): OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- jose-jwt. Ultimate Javascript Object Signing and Encryption (JOSE) and JSON Web Token (JWT) Implementation for .NET and .NET Core
- play-pac4j. Security library for Play framework 2 in Java and Scala: OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- c-jwt-cracker. JWT brute force cracker written in C
- jose-jwt. Ultimate Javascript Object Signing and Encryption (JOSE) and JSON Web Token (JWT) Implementation for .NET and .NET Core
- graylog2-server. Free and open source log management
- cilium. HTTP, gRPC, and Kafka Aware Security and Networking for Containers with BPF and XDP
- Free-Security-eBooks. Free Security and Hacking eBooks
- WhatWeb. Next generation web scanner
- owtf. Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient @owtfp http://owtf.org
- Reconnoitre. A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
- cilium. HTTP, gRPC, and Kafka Aware Security and Networking for Containers with BPF and XDP
- syzkaller. syzkaller is an unsupervised, coverage-guided kernel fuzzer
- kernelpop. kernel privilege escalation enumeration and exploitation framework
- KeychainAccess. Simple Swift wrapper for Keychain that works on iOS, watchOS, tvOS and macOS.
- Valet. Valet lets you securely store data in the iOS, tvOS, or macOS Keychain without knowing a thing about how the Keychain works. It’s easy. We promise.
- UICKeyChainStore. UICKeyChainStore is a simple wrapper for Keychain on iOS, watchOS, tvOS and macOS. Makes using Keychain APIs as easy as NSUserDefaults.
- envchain. Environment variables meet macOS Keychain and gnome-keyring <3
- KeychainCracker. macOS keychain cracking tool
- EllipticCurveKeyPair. Sign, verify, encrypt and decrypt using the Secure Enclave
- guide. Kubernetes clusters for the hobbyist.
- cilium. HTTP, gRPC, and Kafka Aware Security and Networking for Containers with BPF and XDP
- kubernetes-security-best-practice. Kubernetes Security - Best Practice Guide
- felix. Project Calico's per-host agent Felix, responsible for programming routes and security policy.
- kubernetes-network-policy-recipes. Tutorials and Recipes for Kubernetes Network Policies feature
- runtime. OCI (Open Containers Initiative) compatible runtime using Virtual Machines
- cc-oci-runtime. OCI (Open Containers Initiative) compatible runtime for Intel® Architecture
- setup-ipsec-vpn. Scripts to build your own IPsec VPN server, with IPsec/L2TP and Cisco IPsec on Ubuntu, Debian and CentOS
- docker-ipsec-vpn-server. Docker image to run an IPsec VPN server, with IPsec/L2TP and Cisco IPsec
- AWS-VPN-Server-Setup. Setup your own private, secure, free* VPN on the Amazon AWS Cloud in 10 minutes. CloudFormation
- labs. This is a collection of tutorials for learning how to use Docker with various tools. Contributions welcome.
- awesome-infosec. A curated list of awesome infosec courses and training resources.
- streamalert. StreamAlert is a serverless, realtime data analysis framework which empowers you to ingest, analyze, and alert on data from any environment, using datasources and alerting logic you define.
- binaryalert. BinaryAlert: Serverless, Real-time & Retroactive Malware Detection
- bouncer. Eloquent roles and abilities.
- sentinel. A framework agnostic authentication & authorization system.
- captcha. Captcha for Laravel 5
- nginxconfig.io. nginx config generator
- laravel-url-signer. Create and validate signed URLs with a limited lifetime
- pac4j. Security engine for Java (authentication, authorization, multi frameworks): OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- play-pac4j. Security library for Play framework 2 in Java and Scala: OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- nginxconfig.io. nginx config generator
- GlobaLeaks. GlobaLeaks - The Open-Source Whistleblowing Software
- sslyze. Fast and powerful SSL/TLS server scanning library.
- fosite. Extensible security first OAuth 2.0 and OpenID Connect SDK for Go.
- sigmavpn. Light-weight, secure and modular VPN solution
- airship. Secure Content Management for the Modern Web - "The sky is only the beginning"
- libsodium-php. PHP extension for libsodium
- libsodium-php. PHP extension for libsodium
- libsodium-php. PHP extension for libsodium
- libsodium-php. PHP extension for libsodium
- sonarwhal. A linting tool for the web
- Solium. Linter to identify and fix style & security issues in Solidity
- vuls. Vulnerability scanner for Linux/FreeBSD, agentless, written in Go
- fail2ban. Daemon to ban hosts that cause multiple authentication errors
- opensnitch. OpenSnitch is a GNU/Linux port of the Little Snitch application firewall.
- nmap. Nmap - the Network Mapper. Github mirror of official SVN repository.
- syzkaller. syzkaller is an unsupervised, coverage-guided kernel fuzzer
- linux-kernel-exploitation. A bunch of links related to Linux kernel exploitation
- nsjail. A light-weight process isolation tool, making use of Linux namespaces and seccomp-bpf syscall filters (with help of the kafel bpf language)
- edb-debugger. edb is a cross platform x86/x86-64 debugger.
- airgeddon. This is a multi-use bash script for Linux systems to audit wireless networks.
- Note. 常规Java工具,算法,加密,数据库,面试题,源代码分析,解决方案
- bane. Custom & better AppArmor profile generator for Docker containers.
- uTox. µTox the lightest and fluffiest Tox client
- contained.af. A stupid game for learning about containers, capabilities, and syscalls.
- Detect-It-Easy. Detect it Easy
- bleachbit. BleachBit system cleaner for Windows and Linux
- amicontained. Container introspection tool. Find out what container runtime is being used as well as features available.
- SELKS. A Suricata based IDS/IPS distro
- android-security-awesome. A collection of android security related resources
- awesome-incident-response. A curated list of tools for incident response
- awesome-web-security. 🐶 A curated list of Web Security materials and resources.
- awesome-checker-services. ✅ List of links to the various checkers out there on the web for sites, domains, security etc.
- graylog2-server. Free and open source log management
- wazuh. Wazuh - Host and endpoint security
- ossec-hids. OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
- wazuh. Wazuh - Host and endpoint security
- graylog2-server. Free and open source log management
- sigma. Generic Signature Format for SIEM Systems
- buttercup-desktop. 🔑 Javascript Password Vault - Multi-Platform Desktop Application
- play-pac4j. Security library for Play framework 2 in Java and Scala: OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- spring-boot. spring-boot 项目实践总结
- rita. Real Intelligence Threat Analytics
- nmap. Nmap - the Network Mapper. Github mirror of official SVN repository.
- vulscan. Advanced vulnerability scanning with Nmap NSE
- security-growler. 📡 A Mac menubar app that notifies you whenever SSH, VNC, sudo, or other auth events occur.
- SecurityDriven.Inferno. ✅ .NET crypto done right. Professionally audited.
- cs-video-courses. List of Computer Science courses with video lectures.
- nmap. Nmap - the Network Mapper. Github mirror of official SVN repository.
- cleverhans. An adversarial example library for constructing attacks, building defenses, and benchmarking both
- macOS-Security-and-Privacy-Guide. A practical guide to securing macOS.
- fail2ban. Daemon to ban hosts that cause multiple authentication errors
- Valet. Valet lets you securely store data in the iOS, tvOS, or macOS Keychain without knowing a thing about how the Keychain works. It’s easy. We promise.
- KeychainCracker. macOS keychain cracking tool
- osx-and-ios-security-awesome. OSX and iOS related security tools
- EllipticCurveKeyPair. Sign, verify, encrypt and decrypt using the Secure Enclave
- oletools. oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
- ViperMonkey. A VBA parser and emulation engine to analyze malicious macros.
- wifiphisher. The Rogue Access Point Framework
- maltrail. Malicious traffic detection system
- MISP. MISP (core software) - Open Source Threat Intelligence Platform (formely known as Malware Information Sharing Platform)
- oletools. oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
- ViperMonkey. A VBA parser and emulation engine to analyze malicious macros.
- binaryalert. BinaryAlert: Serverless, Real-time & Retroactive Malware Detection
- dagda. a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities
- mitmproxy. An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
- bettercap. DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap
- bettercap. The state of the art network attack and monitoring framework.
- cilium. HTTP, gRPC, and Kafka Aware Security and Networking for Containers with BPF and XDP
- express-gateway. A microservices API Gateway built on top of ExpressJS
- helmet. Help secure Express apps with various HTTP headers
- secure. HTTP middleware for Go that facilitates some quick security wins.
- nosurf. CSRF protection middleware for Go.
- capstone. Capstone disassembly/disassembler framework: Core (Arm, Arm64, M68K, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, Java, Ocaml, PowerShell)
- unicorn. Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)
- keystone. Keystone assembler framework: Core (Arm, Arm64, Hexagon, Mips, PowerPC, Sparc, SystemZ & X86) + bindings
- bap. Binary Analysis Platform
- keypatch. Multi-architecture assembler for IDA Pro. Powered by Keystone Engine.
- bettercap. DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap
- bettercap. The state of the art network attack and monitoring framework.
- badssl.com. 🔒 Memorable site for testing clients against bad SSL configs.
- Seth. Perform a MitM attack and extract clear text credentials from RDP connections
- wire-ios. 📱 Wire for iOS (iPhone and iPad)
- drozer. The Leading Security Assessment Framework for Android.
- OnionBrowser. An open-source, privacy-enhancing web browser for iOS, utilizing the Tor anonymity network
- needle. The iOS Security Testing Framework
- objection. 📱 objection - runtime mobile exploration
- wire-ios. 📱 Wire for iOS (iPhone and iPad)
- zmNinja. High performance, cross platform ionic app for Home/Commerical Security Surveillance using ZoneMinder or other NVRs
- jackhammer. Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
- StaCoAn. StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.
- snyk. CLI and build-time tool to find & fix known vulnerabilities in open-source dependencies
- trape. People tracker on the Internet: Learn to track the world, to avoid being traced.
- osquery. SQL powered operating system instrumentation, monitoring, and analytics.
- bettercap. The state of the art network attack and monitoring framework.
- cilium. HTTP, gRPC, and Kafka Aware Security and Networking for Containers with BPF and XDP
- processhacker. A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.
- sigma. Generic Signature Format for SIEM Systems
- wazuh. Wazuh - Host and endpoint security
- SELKS. A Suricata based IDS/IPS distro
- sigmavpn. Light-weight, secure and modular VPN solution
- nacl. Pure Go implementation of the NaCL set of API's
- elasticsearch-readonlyrest-plugin. Free Elasticsearch and Kibana security plugin: super-easy Kibana multi-tenancy, Encryption, Authentication, Authorization, Auditing
- protools. 历经开发周期两年,并且应用过千万级别项目的工具箱
- setup-ipsec-vpn. Scripts to build your own IPsec VPN server, with IPsec/L2TP and Cisco IPsec on Ubuntu, Debian and CentOS
- scapy. Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
- meshbird. Distributed private networking
- docker-ipsec-vpn-server. Docker image to run an IPsec VPN server, with IPsec/L2TP and Cisco IPsec
- ivre. Network recon framework.
- xray. XRay is a tool for recon, mapping and OSINT gathering from public networks.
- xiringuito. SSH-based "VPN for poors"
- metta. An information security preparedness tool to do adversarial simulation.
- SELKS. A Suricata based IDS/IPS distro
- scapy. Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
- ivre. Network recon framework.
- scapy. Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
- nmap. Nmap - the Network Mapper. Github mirror of official SVN repository.
- ivre. Network recon framework.
- maltrail. Malicious traffic detection system
- bro. Bro is a powerful network analysis framework that is much different from the typical IDS you may know. Official mirror of git.bro.org/bro.git .
- ivre. Network recon framework.
- suricata. Suricata git repository maintained by the OISF
- scapy. Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
- ivre. Network recon framework.
- jackhammer. Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
- scapy. Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
- ivre. Network recon framework.
- opensnitch. OpenSnitch is a GNU/Linux port of the Little Snitch application firewall.
- cilium. HTTP, gRPC, and Kafka Aware Security and Networking for Containers with BPF and XDP
- felix. Project Calico's per-host agent Felix, responsible for programming routes and security policy.
- metta. An information security preparedness tool to do adversarial simulation.
- kubernetes-network-policy-recipes. Tutorials and Recipes for Kubernetes Network Policies feature
- badssl.com. 🔒 Memorable site for testing clients against bad SSL configs.
- nginxconfig.io. nginx config generator
- nmap. Nmap - the Network Mapper. Github mirror of official SVN repository.
- ivre. Network recon framework.
- vulscan. Advanced vulnerability scanning with Nmap NSE
- Reconnoitre. A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
- Seccubus. Easy automated vulnerability scanning, reporting and analysis
- javascript-obfuscator. A powerful obfuscator for JavaScript and Node.js
- notes. Some public notes
- accesscontrol. Role and Attribute based Access Control for Node.js
- protect. Proactively protect your Node.js web services
- NodeJsScan. NodeJsScan is a static security code scanner for Node.js applications.
- bro. Bro is a powerful network analysis framework that is much different from the typical IDS you may know. Official mirror of git.bro.org/bro.git .
- suricata. Suricata git repository maintained by the OISF
- pac4j. Security engine for Java (authentication, authorization, multi frameworks): OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- fosite. Extensible security first OAuth 2.0 and OpenID Connect SDK for Go.
- play-pac4j. Security library for Play framework 2 in Java and Scala: OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- API-Security-Checklist. Checklist of the most important security countermeasures when designing, testing, and releasing your API
- hydra. OAuth2 server with OpenID Connect - cloud native, security-first, open source API security for your infrastructure. Written in Go. SDKs for any language.
- IdentityServer4. OpenID Connect and OAuth 2.0 Framework for ASP.NET Core
- fosite. Extensible security first OAuth 2.0 and OpenID Connect SDK for Go.
- express-gateway. A microservices API Gateway built on top of ExpressJS
- jose-jwt. Ultimate Javascript Object Signing and Encryption (JOSE) and JSON Web Token (JWT) Implementation for .NET and .NET Core
- AspNet5IdentityServerAngularImplicitFlow. OpenID Connect Implicit Flow with Angular and ASP.NET Core 2.0 IdentityServer4
- javascript-obfuscator. A powerful obfuscator for JavaScript and Node.js
- Hikari. LLVM Obfuscator
- pouch. Pouch is an open-source project created to promote the container technology movement.
- runtime. OCI (Open Containers Initiative) compatible runtime using Virtual Machines
- cc-oci-runtime. OCI (Open Containers Initiative) compatible runtime for Intel® Architecture
- bane. Custom & better AppArmor profile generator for Docker containers.
- contained.af. A stupid game for learning about containers, capabilities, and syscalls.
- amicontained. Container introspection tool. Find out what container runtime is being used as well as features available.
- jose-jwt. Ultimate Javascript Object Signing and Encryption (JOSE) and JSON Web Token (JWT) Implementation for .NET and .NET Core
- AspNet5IdentityServerAngularImplicitFlow. OpenID Connect Implicit Flow with Angular and ASP.NET Core 2.0 IdentityServer4
- hydra. OAuth2 server with OpenID Connect - cloud native, security-first, open source API security for your infrastructure. Written in Go. SDKs for any language.
- IdentityServer4. OpenID Connect and OAuth 2.0 Framework for ASP.NET Core
- pac4j. Security engine for Java (authentication, authorization, multi frameworks): OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- fosite. Extensible security first OAuth 2.0 and OpenID Connect SDK for Go.
- play-pac4j. Security library for Play framework 2 in Java and Scala: OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- hawkpost. Generate links that users can use to submit messages encrypted with your public key.
- GlobaLeaks. GlobaLeaks - The Open-Source Whistleblowing Software
- i2pd. 🛡 I2P: End-to-End encrypted and anonymous Internet
- wolfssl. wolfSSL (formerly CyaSSL) is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud. http://www.wolfssl.com
- gitrob. Reconnaissance tool for GitHub organizations
- aquatone. A Tool for Domain Flyovers
- xray. XRay is a tool for recon, mapping and OSINT gathering from public networks.
- amass. In-depth subdomain enumeration written in Go
- trape. People tracker on the Internet: Learn to track the world, to avoid being traced.
- intrigue-core. Discover your attack surface!
- subjack. Hostile Subdomain Takeover tool written in Go featuring self-reliant subdomain discovery with amass integration, allowing for simultaneous checking for subdomain takeovers while enumerating DNS.
- ossec-hids. OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
- wazuh. Wazuh - Host and endpoint security
- macOS-Security-and-Privacy-Guide. A practical guide to securing macOS.
- nmap. Nmap - the Network Mapper. Github mirror of official SVN repository.
- uTox. µTox the lightest and fluffiest Tox client
- osx-and-ios-security-awesome. OSX and iOS related security tools
- awesome-appsec. A curated list of resources for learning about application security
- bluemonday. bluemonday: a fast golang HTML sanitizer (inspired by the OWASP Java HTML Sanitizer) to scrub user generated content of XSS
- owtf. Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient @owtfp http://owtf.org
- find-sec-bugs. The FindBugs plugin for security audits of Java web applications and Android applications. (Also work with Groovy and Scala projects)
- django-DefectDojo. DefectDojo is an open-source defect tracking application
- scapy. Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
- scapy. Network packet and pcap file crafting/sniffing/manipulation/visualization security tool (based on scapy) with python3 compatibility
- oletools. oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
- ViperMonkey. A VBA parser and emulation engine to analyze malicious macros.
- keeweb. Free cross-platform password manager compatible with KeePass
- KeychainCracker. macOS keychain cracking tool
- Passhunt. Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
- keeweb. Free cross-platform password manager compatible with KeePass
- buttercup-desktop. 🔑 Javascript Password Vault - Multi-Platform Desktop Application
- passbolt_api. Passbolt backend, a JSON API written with Cakephp
- mooltipass. Github repository dedicated to the mooltipass project
- sites-using-cloudflare. 💔 Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.
- mooltipass. Github repository dedicated to the mooltipass project
- piknik. Copy/paste anything over the network
- PrivateBin. A minimalist, open source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256 bits AES.
- scapy. Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
- bro. Bro is a powerful network analysis framework that is much different from the typical IDS you may know. Official mirror of git.bro.org/bro.git .
- scapy. Network packet and pcap file crafting/sniffing/manipulation/visualization security tool (based on scapy) with python3 compatibility
- ossec-hids. OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
- wazuh. Wazuh - Host and endpoint security
- scap-security-guide. Baseline compliance content in SCAP formats
- awesome-ctf. A curated list of CTF frameworks, libraries, resources and softwares
- evilgrade.
- Awesome-Hacking. A collection of various awesome lists for hackers, pentesters and security researchers
- nishang. Nishang - PowerShell for penetration testing and offensive security.
- faraday. Collaborative Penetration Test and Vulnerability Management Platform
- awesome-infosec. A curated list of awesome infosec courses and training resources.
- Free-Security-eBooks. Free Security and Hacking eBooks
- WhatWeb. Next generation web scanner
- awesome-web-security. 🐶 A curated list of Web Security materials and resources.
- awesome-pentest-cheat-sheets. Collection of the cheat sheets useful for pentesting
- vulscan. Advanced vulnerability scanning with Nmap NSE
- Passhunt. Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
- Reconnoitre. A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
- htshells. Self contained htaccess shells and attacks
- jackhammer. Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
- changeme. A default credential scanner.
- intrigue-core. Discover your attack surface!
- awesome-infosec. A curated list of awesome infosec courses and training resources.
- dirsearch. Web path scanner
- pentest-wiki. PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.
- awesome-pentest-cheat-sheets. Collection of the cheat sheets useful for pentesting
- owtf. Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient @owtfp http://owtf.org
- amass. In-depth subdomain enumeration written in Go
- evilgrade.
- Cloakify. CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings; Evade DLP/MLS Devices; Defeat Data Whitelisting Controls; Social Engineering of Analysts; Evade AV Detection
- objection. 📱 objection - runtime mobile exploration
- filterbypass.
- DumpsterFire. "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
- Cloakify. CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings; Evade DLP/MLS Devices; Defeat Data Whitelisting Controls; Social Engineering of Analysts; Evade AV Detection
- Passhunt. Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
- DumpsterFire. "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
- Cloakify. CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings; Evade DLP/MLS Devices; Defeat Data Whitelisting Controls; Social Engineering of Analysts; Evade AV Detection
- DumpsterFire. "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
- faraday. Collaborative Penetration Test and Vulnerability Management Platform
- xunfeng. 巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
- drozer. The Leading Security Assessment Framework for Android.
- needle. The iOS Security Testing Framework
- Cloakify. CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings; Evade DLP/MLS Devices; Defeat Data Whitelisting Controls; Social Engineering of Analysts; Evade AV Detection
- DeathStar. Automate getting Domain Admin using Empire (https://github.com/EmpireProject/Empire)
- airgeddon. This is a multi-use bash script for Linux systems to audit wireless networks.
- DumpsterFire. "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
- GourdScanV2. 被动式漏洞扫描系统
- subjack. Hostile Subdomain Takeover tool written in Go featuring self-reliant subdomain discovery with amass integration, allowing for simultaneous checking for subdomain takeovers while enumerating DNS.
- sonarwhal. A linting tool for the web
- processhacker. A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.
- sozu. Sōzu HTTP reverse proxy, configurable at runtime, fast and safe, built in Rust. It will be awesome when it will be ready. Not So Secret Project! Ping us on gitter to know more
- bouncer. Eloquent roles and abilities.
- sentinel. A framework agnostic authentication & authorization system.
- lock. A flexible, driver based Acl package for PHP 5.4+
- accesscontrol. Role and Attribute based Access Control for Node.js
- wifiphisher. The Rogue Access Point Framework
- gophish. Open-Source Phishing Toolkit
- FiercePhish. FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.
- king-phisher. Phishing Campaign Toolkit
- DVWA. Damn Vulnerable Web Application (DVWA)
- bouncer. Eloquent roles and abilities.
- iniscan. A php.ini scanner for best security practices
- sentinel. A framework agnostic authentication & authorization system.
- captcha. Captcha for Laravel 5
- lock. A flexible, driver based Acl package for PHP 5.4+
- security-checker. PHP frontend for security.sensiolabs.org
- exploits. Miscellaneous exploit code
- PrivateBin. A minimalist, open source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256 bits AES.
- Captcha. PHP Captcha library
- pcc. PHP Secure Configuration Checker
- security. The Security component provides a complete security system for your web application.
- laravel-url-signer. Create and validate signed URLs with a limited lifetime
- security-bundle. The security system is one of the most powerful parts of Symfony and can largely be controlled via its configuration.
- csp-builder. Build Content-Security-Policy headers from a JSON file (or build them programmatically)
- airship. Secure Content Management for the Modern Web - "The sky is only the beginning"
- libsodium-php. PHP extension for libsodium
- libsodium-php. PHP extension for libsodium
- latte. ☕ Latte: the intuitive and fast template engine for those who want the most secure PHP sites.
- libsodium-php. PHP extension for libsodium
- libsodium-php. PHP extension for libsodium
- pac4j. Security engine for Java (authentication, authorization, multi frameworks): OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- play-pac4j. Security library for Play framework 2 in Java and Scala: OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- exploits. Miscellaneous exploit code
- Am-I-affected-by-Meltdown. Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.
- security-txt. A proposed standard that allows websites to define security policies.
- felix. Project Calico's per-host agent Felix, responsible for programming routes and security policy.
- ossec-hids. OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
- wazuh. Wazuh - Host and endpoint security
- capstone. Capstone disassembly/disassembler framework: Core (Arm, Arm64, M68K, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, Java, Ocaml, PowerShell)
- keystone. Keystone assembler framework: Core (Arm, Arm64, Hexagon, Mips, PowerPC, Sparc, SystemZ & X86) + bindings
- bap. Binary Analysis Platform
- keypatch. Multi-architecture assembler for IDA Pro. Powered by Keystone Engine.
- nishang. Nishang - PowerShell for penetration testing and offensive security.
- PowerShdll. Run PowerShell with rundll32. Bypass software restrictions.
- GoFetch. GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.
- macOS-Security-and-Privacy-Guide. A practical guide to securing macOS.
- wire-ios. 📱 Wire for iOS (iPhone and iPad)
- meshbird. Distributed private networking
- cryptomator. Multi-platform transparent client-side encryption of your files in the cloud
- decentraleyes. Decentraleyes - Local emulation of Content Delivery Networks.
- user.js. user.js -- Firefox configuration hardening
- OnionBrowser. An open-source, privacy-enhancing web browser for iOS, utilizing the Tor anonymity network
- privacy-respecting. 🔐 Curated List of Privacy Respecting Services and Software
- i2pd. 🛡 I2P: End-to-End encrypted and anonymous Internet
- toxic. An ncurses-based Tox client
- Cloakify. CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings; Evade DLP/MLS Devices; Defeat Data Whitelisting Controls; Social Engineering of Analysts; Evade AV Detection
- ghacks-user.js. An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting
- scriptsafe. a browser extension to bring security and privacy to chrome, firefox, and opera
- bleachbit. BleachBit system cleaner for Windows and Linux
- pyt. A Static Analysis Tool for Detecting Security Vulnerabilities in Python Web Applications
- manticore. Symbolic execution tool
- bap. Binary Analysis Platform
- javascript-obfuscator. A powerful obfuscator for JavaScript and Node.js
- scriptsafe. a browser extension to bring security and privacy to chrome, firefox, and opera
- mitmproxy. An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
- bettercap. DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap
- bettercap. The state of the art network attack and monitoring framework.
- sozu. Sōzu HTTP reverse proxy, configurable at runtime, fast and safe, built in Rust. It will be awesome when it will be ready. Not So Secret Project! Ping us on gitter to know more
- ghostunnel. A simple SSL/TLS proxy with mutual authentication for securing non-TLS services
- oletools. oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
- ViperMonkey. A VBA parser and emulation engine to analyze malicious macros.
- mitmproxy. An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
- wifiphisher. The Rogue Access Point Framework
- routersploit. The Router Exploitation Framework
- fail2ban. Daemon to ban hosts that cause multiple authentication errors
- AutoSploit. Automated Mass Exploiter
- maltrail. Malicious traffic detection system
- onionshare. Securely and anonymously share a file of any size
- scapy. Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
- sslyze. Fast and powerful SSL/TLS server scanning library.
- MozDef. MozDef: The Mozilla Defense Platform
- itsdangerous. Various helpers to pass trusted data to untrusted environments
- dirsearch. Web path scanner
- badssl.com. 🔒 Memorable site for testing clients against bad SSL configs.
- ivre. Network recon framework.
- pyt. A Static Analysis Tool for Detecting Security Vulnerabilities in Python Web Applications
- manticore. Symbolic execution tool
- exploits. Miscellaneous exploit code
- owtf. Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient @owtfp http://owtf.org
- security-growler. 📡 A Mac menubar app that notifies you whenever SSH, VNC, sudo, or other auth events occur.
- hawkpost. Generate links that users can use to submit messages encrypted with your public key.
- tuf. A framework for securing software update systems
- needle. The iOS Security Testing Framework
- subuser. Run programs on linux with selectively restricted permissions.
- king-phisher. Phishing Campaign Toolkit
- BoopSuite. A Suite of Tools written in Python for wireless auditing and security testing.
- featherduster. An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
- DeathStar. Automate getting Domain Admin using Empire (https://github.com/EmpireProject/Empire)
- oletools. oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
- BrainDamage. Remote administration tool which uses Telegram as a C&C server
- yosai. A Security Framework for Python applications featuring Authorization (rbac permissions and roles), Authentication (2fa totp), Session Management and an extensive Audit Trail
- Flask-HTTPAuth. Simple extension that provides Basic, Digest and Token HTTP authentication for Flask routes
- changeme. A default credential scanner.
- metta. An information security preparedness tool to do adversarial simulation.
- conpot. ICS/SCADA honeypot
- django-DefectDojo. DefectDojo is an open-source defect tracking application
- GlobaLeaks. GlobaLeaks - The Open-Source Whistleblowing Software
- exitmap. A fast and modular scanner for Tor exit relays.
- bleachbit. BleachBit system cleaner for Windows and Linux
- ViperMonkey. A VBA parser and emulation engine to analyze malicious macros.
- scapy. Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
- BoopSuite. A Suite of Tools written in Python for wireless auditing and security testing.
- scapy. Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
- pyt. A Static Analysis Tool for Detecting Security Vulnerabilities in Python Web Applications
- hawkpost. Generate links that users can use to submit messages encrypted with your public key.
- scapy. Network packet and pcap file crafting/sniffing/manipulation/visualization security tool (based on scapy) with python3 compatibility
- brakeman. A static analysis security vulnerability scanner for Ruby on Rails applications
- Portus. Authorization service and frontend for Docker registry (v2)
- zen-rails-security-checklist. Checklist of security precautions for Ruby on Rails applications.
- rails-security-checklist. 🔑 Community-driven Rails Security Checklist (see our GitHub Issues for the newest checks that aren't yet in the README)
- best-practices-badge. Core Infrastructure Initiative Best Practices Badge
- dawnscanner. Dawn is a static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails frameworks.
- railsgoat. A vulnerable version of Rails that follows the OWASP Top 10
- invisible_captcha. 🍯 Unobtrusive and flexible spam protection for Rails apps
- yosai. A Security Framework for Python applications featuring Authorization (rbac permissions and roles), Authentication (2fa totp), Session Management and an extensive Audit Trail
- accesscontrol. Role and Attribute based Access Control for Node.js
- amass. In-depth subdomain enumeration written in Go
- intrigue-core. Discover your attack surface!
- nishang. Nishang - PowerShell for penetration testing and offensive security.
- Cloakify. CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings; Evade DLP/MLS Devices; Defeat Data Whitelisting Controls; Social Engineering of Analysts; Evade AV Detection
- DumpsterFire. "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
- spring-boot. spring-boot 项目实践总结
- metta. An information security preparedness tool to do adversarial simulation.
- x64dbg. An open-source x64/x32 debugger for windows.
- Awesome-Hacking. A collection of various awesome lists for hackers, pentesters and security researchers
- capstone. Capstone disassembly/disassembler framework: Core (Arm, Arm64, M68K, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, Java, Ocaml, PowerShell)
- unicorn. Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)
- panopticon. A libre cross-platform disassembler.
- edb-debugger. edb is a cross platform x86/x86-64 debugger.
- keystone. Keystone assembler framework: Core (Arm, Arm64, Hexagon, Mips, PowerPC, Sparc, SystemZ & X86) + bindings
- bap. Binary Analysis Platform
- keypatch. Multi-architecture assembler for IDA Pro. Powered by Keystone Engine.
- CTF-All-In-One. 一本 CTF 书
- Detect-It-Easy. Detect it Easy
- bouncer. Eloquent roles and abilities.
- sentinel. A framework agnostic authentication & authorization system.
- accesscontrol. Role and Attribute based Access Control for Node.js
- brakeman. A static analysis security vulnerability scanner for Ruby on Rails applications
- Portus. Authorization service and frontend for Docker registry (v2)
- zen-rails-security-checklist. Checklist of security precautions for Ruby on Rails applications.
- WhatWeb. Next generation web scanner
- dawnscanner. Dawn is a static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails frameworks.
- railsgoat. A vulnerable version of Rails that follows the OWASP Top 10
- zen-rails-security-checklist. Checklist of security precautions for Ruby on Rails applications.
- rails-security-checklist. 🔑 Community-driven Rails Security Checklist (see our GitHub Issues for the newest checks that aren't yet in the README)
- railsgoat. A vulnerable version of Rails that follows the OWASP Top 10
- panopticon. A libre cross-platform disassembler.
- ring. Safe, fast, small crypto using Rust
- sozu. Sōzu HTTP reverse proxy, configurable at runtime, fast and safe, built in Rust. It will be awesome when it will be ready. Not So Secret Project! Ping us on gitter to know more
- edgedns. A high performance DNS cache designed for Content Delivery Networks
- pac4j. Security engine for Java (authentication, authorization, multi frameworks): OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- play-pac4j. Security library for Play framework 2 in Java and Scala: OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- dockerscan. Docker security analysis & hacking tools
- slurp. Enumerate S3 buckets via certstream, domain, or keywords
- routersploit. The Router Exploitation Framework
- retire.js. scanner detecting the use of JavaScript libraries with known vulnerabilities
- xunfeng. 巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
- iniscan. A php.ini scanner for best security practices
- WhatWeb. Next generation web scanner
- Reconnoitre. A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
- slurp. Enumerate S3 buckets via certstream, domain, or keywords
- SQLiScanner. Automatic SQL injection with Charles and sqlmap api
- GourdScanV2. 被动式漏洞扫描系统
- exitmap. A fast and modular scanner for Tor exit relays.
- processhacker. A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.
- Reconnoitre. A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
- rita. Real Intelligence Threat Analytics
- scapy. Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
- scapy. Network packet and pcap file crafting/sniffing/manipulation/visualization security tool (based on scapy) with python3 compatibility
- docker-slim. DockerSlim (docker-slim): Optimize and secure your Docker containers (free and open source)
- contained.af. A stupid game for learning about containers, capabilities, and syscalls.
- cryptocat. Secure chat software for your computer.
- uTox. µTox the lightest and fluffiest Tox client
- airship. Secure Content Management for the Modern Web - "The sky is only the beginning"
- csp-builder. Build Content-Security-Policy headers from a JSON file (or build them programmatically)
- airship. Secure Content Management for the Modern Web - "The sky is only the beginning"
- privacy-respecting. 🔐 Curated List of Privacy Respecting Services and Software
- PrivateBin. A minimalist, open source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256 bits AES.
- streamalert. StreamAlert is a serverless, realtime data analysis framework which empowers you to ingest, analyze, and alert on data from any environment, using datasources and alerting logic you define.
- binaryalert. BinaryAlert: Serverless, Real-time & Retroactive Malware Detection
- nmap. Nmap - the Network Mapper. Github mirror of official SVN repository.
- express-gateway. A microservices API Gateway built on top of ExpressJS
- graylog2-server. Free and open source log management
- MozDef. MozDef: The Mozilla Defense Platform
- sigma. Generic Signature Format for SIEM Systems
- nzyme. Nzyme collects 802.11 management frames directly from the air and sends them to a Graylog (Open Source log management) setup for WiFi IDS, monitoring, and incident response. It only needs a JVM and a WiFi adapter that supports monitor mode.
- jose-jwt. Ultimate Javascript Object Signing and Encryption (JOSE) and JSON Web Token (JWT) Implementation for .NET and .NET Core
- Detect-It-Easy. Detect it Easy
- smart-contract-best-practices. A guide to smart contract security best practices
- Solium. Linter to identify and fix style & security issues in Solidity
- BoopSuite. A Suite of Tools written in Python for wireless auditing and security testing.
- airgeddon. This is a multi-use bash script for Linux systems to audit wireless networks.
- retire.js. scanner detecting the use of JavaScript libraries with known vulnerabilities
- DependencyCheck. OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
- zeppelin-solidity. OpenZeppelin, a framework to build secure smart contracts on Ethereum
- smart-contract-best-practices. A guide to smart contract security best practices
- Solium. Linter to identify and fix style & security issues in Solidity
- capstone. Capstone disassembly/disassembler framework: Core (Arm, Arm64, M68K, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, Java, Ocaml, PowerShell)
- unicorn. Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)
- keystone. Keystone assembler framework: Core (Arm, Arm64, Hexagon, Mips, PowerPC, Sparc, SystemZ & X86) + bindings
- keypatch. Multi-architecture assembler for IDA Pro. Powered by Keystone Engine.
- bettercap. DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap
- bettercap. The state of the art network attack and monitoring framework.
- spring-security. Spring Security
- spring-boot. spring-boot 项目实践总结
- jasypt-spring-boot. Jasypt integration for Spring boot
- spring-boot. spring-boot 项目实践总结
- jasypt-spring-boot. Jasypt integration for Spring boot
- osquery. SQL powered operating system instrumentation, monitoring, and analytics.
- play-pac4j. Security library for Play framework 2 in Java and Scala: OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
- hacker101. Hacker101
- DVWA. Damn Vulnerable Web Application (DVWA)
- protect. Proactively protect your Node.js web services
- teleport. Modern SSH server for clusters and teams.
- YubiKey-Guide. Guide to using YubiKey as a SmartCard for GPG and SSH
- cowrie. Cowrie SSH/Telnet Honeypot
- sshesame. A fake SSH server that lets everyone in and logs their activity
- xiringuito. SSH-based "VPN for poors"
- algo. Set up a personal IPSEC VPN in the cloud
- AWS-VPN-Server-Setup. Setup your own private, secure, free* VPN on the Amazon AWS Cloud in 10 minutes. CloudFormation
- mitmproxy. An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
- sites-using-cloudflare. 💔 Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.
- sslyze. Fast and powerful SSL/TLS server scanning library.
- badssl.com. 🔒 Memorable site for testing clients against bad SSL configs.
- nginxconfig.io. nginx config generator
- ghostunnel. A simple SSL/TLS proxy with mutual authentication for securing non-TLS services
- wolfssl. wolfSSL (formerly CyaSSL) is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud. http://www.wolfssl.com
- sslyze. Fast and powerful SSL/TLS server scanning library.
- Seccubus. Easy automated vulnerability scanning, reporting and analysis
- bettercap. DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap
- airgeddon. This is a multi-use bash script for Linux systems to audit wireless networks.
- brakeman. A static analysis security vulnerability scanner for Ruby on Rails applications
- panopticon. A libre cross-platform disassembler.
- pyt. A Static Analysis Tool for Detecting Security Vulnerabilities in Python Web Applications
- bap. Binary Analysis Platform
- sobelow. Security-focused static analysis for the Phoenix Framework
- Solium. Linter to identify and fix style & security issues in Solidity
- dagda. a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities
- NodeJsScan. NodeJsScan is a static security code scanner for Node.js applications.
- pyt. A Static Analysis Tool for Detecting Security Vulnerabilities in Python Web Applications
- jackhammer. Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
- StaCoAn. StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.
- amass. In-depth subdomain enumeration written in Go
- subjack. Hostile Subdomain Takeover tool written in Go featuring self-reliant subdomain discovery with amass integration, allowing for simultaneous checking for subdomain takeovers while enumerating DNS.
- nginxconfig.io. nginx config generator
- security. The Security component provides a complete security system for your web application.
- security-bundle. The security system is one of the most powerful parts of Symfony and can largely be controlled via its configuration.
- pyt. A Static Analysis Tool for Detecting Security Vulnerabilities in Python Web Applications
- manticore. Symbolic execution tool
- find-sec-bugs. The FindBugs plugin for security audits of Java web applications and Android applications. (Also work with Groovy and Scala projects)
- bap. Binary Analysis Platform
- guide. Kubernetes clusters for the hobbyist.
- streamalert. StreamAlert is a serverless, realtime data analysis framework which empowers you to ingest, analyze, and alert on data from any environment, using datasources and alerting logic you define.
- binaryalert. BinaryAlert: Serverless, Real-time & Retroactive Malware Detection
- syzkaller. syzkaller is an unsupervised, coverage-guided kernel fuzzer
- badssl.com. 🔒 Memorable site for testing clients against bad SSL configs.
- inspec. InSpec: Auditing and Testing Framework
- manticore. Symbolic execution tool
- cowrie. Cowrie SSH/Telnet Honeypot
- MISP. MISP (core software) - Open Source Threat Intelligence Platform (formely known as Malware Information Sharing Platform)
- MISP. MISP (core software) - Open Source Threat Intelligence Platform (formely known as Malware Information Sharing Platform)
- awesome-threat-detection. A curated list of awesome threat detection and hunting resources
- cowrie. Cowrie SSH/Telnet Honeypot
- MISP. MISP (core software) - Open Source Threat Intelligence Platform (formely known as Malware Information Sharing Platform)
- cowrie. Cowrie SSH/Telnet Honeypot
- MISP. MISP (core software) - Open Source Threat Intelligence Platform (formely known as Malware Information Sharing Platform)
- mitmproxy. An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
- bettercap. DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap
- sslyze. Fast and powerful SSL/TLS server scanning library.
- badssl.com. 🔒 Memorable site for testing clients against bad SSL configs.
- botan. Crypto and TLS for C++11
- ghostunnel. A simple SSL/TLS proxy with mutual authentication for securing non-TLS services
- wolfssl. wolfSSL (formerly CyaSSL) is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud. http://www.wolfssl.com
- istlsfastyet.com. Is TLS fast yet? Yes, yes it is.
- sslyze. Fast and powerful SSL/TLS server scanning library.
- wolfssl. wolfSSL (formerly CyaSSL) is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud. http://www.wolfssl.com
- onionshare. Securely and anonymously share a file of any size
- OnionBrowser. An open-source, privacy-enhancing web browser for iOS, utilizing the Tor anonymity network
- GlobaLeaks. GlobaLeaks - The Open-Source Whistleblowing Software
- exitmap. A fast and modular scanner for Tor exit relays.
- OnionBrowser. An open-source, privacy-enhancing web browser for iOS, utilizing the Tor anonymity network
- exitmap. A fast and modular scanner for Tor exit relays.
- yosai. A Security Framework for Python applications featuring Authorization (rbac permissions and roles), Authentication (2fa totp), Session Management and an extensive Audit Trail
- SecurityDriven.Inferno. ✅ .NET crypto done right. Professionally audited.
- KeychainAccess. Simple Swift wrapper for Keychain that works on iOS, watchOS, tvOS and macOS.
- Valet. Valet lets you securely store data in the iOS, tvOS, or macOS Keychain without knowing a thing about how the Keychain works. It’s easy. We promise.
- UICKeyChainStore. UICKeyChainStore is a simple wrapper for Keychain on iOS, watchOS, tvOS and macOS. Makes using Keychain APIs as easy as NSUserDefaults.
- trape. People tracker on the Internet: Learn to track the world, to avoid being traced.
- scriptsafe. a browser extension to bring security and privacy to chrome, firefox, and opera
- sigmavpn. Light-weight, secure and modular VPN solution
- ghostunnel. A simple SSL/TLS proxy with mutual authentication for securing non-TLS services
- Valet. Valet lets you securely store data in the iOS, tvOS, or macOS Keychain without knowing a thing about how the Keychain works. It’s easy. We promise.
- SwiftyRSA. RSA public/private key encryption in Swift
- teleport. Modern SSH server for clusters and teams.
- twofactorauth. List of sites with two factor auth support which includes SMS, email, phone calls, hardware, and software.
- yosai. A Security Framework for Python applications featuring Authorization (rbac permissions and roles), Authentication (2fa totp), Session Management and an extensive Audit Trail
- twofactorauth. List of sites with two factor auth support which includes SMS, email, phone calls, hardware, and software.
- yosai. A Security Framework for Python applications featuring Authorization (rbac permissions and roles), Authentication (2fa totp), Session Management and an extensive Audit Trail
- javascript-obfuscator. A powerful obfuscator for JavaScript and Node.js
- AspNetCoreSpa. Asp.Net Core 2 & Angular (5+) SPA with Angular CLI full featured application. Live demo:
- oletools. oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
- ViperMonkey. A VBA parser and emulation engine to analyze malicious macros.
- wire-ios. 📱 Wire for iOS (iPhone and iPad)
- uTox. µTox the lightest and fluffiest Tox client
- zmNinja. High performance, cross platform ionic app for Home/Commerical Security Surveillance using ZoneMinder or other NVRs
- runtime. OCI (Open Containers Initiative) compatible runtime using Virtual Machines
- cc-oci-runtime. OCI (Open Containers Initiative) compatible runtime for Intel® Architecture
- runtime. OCI (Open Containers Initiative) compatible runtime using Virtual Machines
- cc-oci-runtime. OCI (Open Containers Initiative) compatible runtime for Intel® Architecture
- algo. Set up a personal IPSEC VPN in the cloud
- setup-ipsec-vpn. Scripts to build your own IPsec VPN server, with IPsec/L2TP and Cisco IPsec on Ubuntu, Debian and CentOS
- openvpn. OpenVPN is an open source VPN daemon
- meshbird. Distributed private networking
- docker-ipsec-vpn-server. Docker image to run an IPsec VPN server, with IPsec/L2TP and Cisco IPsec
- i2pd. 🛡 I2P: End-to-End encrypted and anonymous Internet
- xiringuito. SSH-based "VPN for poors"
- sigmavpn. Light-weight, secure and modular VPN solution
- AWS-VPN-Server-Setup. Setup your own private, secure, free* VPN on the Amazon AWS Cloud in 10 minutes. CloudFormation
- algo. Set up a personal IPSEC VPN in the cloud
- AWS-VPN-Server-Setup. Setup your own private, secure, free* VPN on the Amazon AWS Cloud in 10 minutes. CloudFormation
- algo. Set up a personal IPSEC VPN in the cloud
- setup-ipsec-vpn. Scripts to build your own IPsec VPN server, with IPsec/L2TP and Cisco IPsec on Ubuntu, Debian and CentOS
- docker-ipsec-vpn-server. Docker image to run an IPsec VPN server, with IPsec/L2TP and Cisco IPsec
- AWS-VPN-Server-Setup. Setup your own private, secure, free* VPN on the Amazon AWS Cloud in 10 minutes. CloudFormation
- brakeman. A static analysis security vulnerability scanner for Ruby on Rails applications
- retire.js. scanner detecting the use of JavaScript libraries with known vulnerabilities
- snyk. CLI and build-time tool to find & fix known vulnerabilities in open-source dependencies
- dawnscanner. Dawn is a static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails frameworks.
- railsgoat. A vulnerable version of Rails that follows the OWASP Top 10
- kernelpop. kernel privilege escalation enumeration and exploitation framework
- dagda. a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities
- faraday. Collaborative Penetration Test and Vulnerability Management Platform
- labs. Vulnerability Labs for security analysis
- vulscan. Advanced vulnerability scanning with Nmap NSE
- vuls. Vulnerability scanner for Linux/FreeBSD, agentless, written in Go
- xunfeng. 巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
- secure-ios-app-dev. Collection of the most common vulnerabilities found in iOS applications
- vulscan. Advanced vulnerability scanning with Nmap NSE
- jackhammer. Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
- vulscan. Advanced vulnerability scanning with Nmap NSE
- django-DefectDojo. DefectDojo is an open-source defect tracking application
- vuls. Vulnerability scanner for Linux/FreeBSD, agentless, written in Go
- xunfeng. 巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
- DependencyCheck. OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
- vulscan. Advanced vulnerability scanning with Nmap NSE
- wazuh. Wazuh - Host and endpoint security
- Seccubus. Easy automated vulnerability scanning, reporting and analysis
- vuls. Vulnerability scanner for Linux/FreeBSD, agentless, written in Go
- faraday. Collaborative Penetration Test and Vulnerability Management Platform
- jackhammer. Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
- django-DefectDojo. DefectDojo is an open-source defect tracking application
- Seccubus. Easy automated vulnerability scanning, reporting and analysis
- vuls. Vulnerability scanner for Linux/FreeBSD, agentless, written in Go
- faraday. Collaborative Penetration Test and Vulnerability Management Platform
- xunfeng. 巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
- vulscan. Advanced vulnerability scanning with Nmap NSE
- jackhammer. Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
- intrigue-core. Discover your attack surface!
- vulscan. Advanced vulnerability scanning with Nmap NSE
- jackhammer. Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
- Valet. Valet lets you securely store data in the iOS, tvOS, or macOS Keychain without knowing a thing about how the Keychain works. It’s easy. We promise.
- SwiftyRSA. RSA public/private key encryption in Swift
- WhatWeb. Next generation web scanner
- awesome-web-security. 🐶 A curated list of Web Security materials and resources.
- CTF-All-In-One. 一本 CTF 书
- jasypt-spring-boot. Jasypt integration for Spring boot
- hawkpost. Generate links that users can use to submit messages encrypted with your public key.
- jasypt-spring-boot. Jasypt integration for Spring boot
- awesome-checker-services. ✅ List of links to the various checkers out there on the web for sites, domains, security etc.
- jasypt-spring-boot. Jasypt integration for Spring boot
- bluemonday. bluemonday: a fast golang HTML sanitizer (inspired by the OWASP Java HTML Sanitizer) to scrub user generated content of XSS
- scriptsafe. a browser extension to bring security and privacy to chrome, firefox, and opera
- wifiphisher. The Rogue Access Point Framework
- bettercap. The state of the art network attack and monitoring framework.
- BoopSuite. A Suite of Tools written in Python for wireless auditing and security testing.
- nzyme. Nzyme collects 802.11 management frames directly from the air and sends them to a Graylog (Open Source log management) setup for WiFi IDS, monitoring, and incident response. It only needs a JVM and a WiFi adapter that supports monitor mode.
- bettercap. The state of the art network attack and monitoring framework.
- BoopSuite. A Suite of Tools written in Python for wireless auditing and security testing.
- x64dbg. An open-source x64/x32 debugger for windows.
- labs. This is a collection of tutorials for learning how to use Docker with various tools. Contributions welcome.
- nmap. Nmap - the Network Mapper. Github mirror of official SVN repository.
- QuasarRAT. Remote Administration Tool for Windows
- processhacker. A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.
- hardentools. Hardentools is a utility that disables a number of risky Windows features.
- exploits. Miscellaneous exploit code
- awesome-windows-domain-hardening. A curated list of awesome Security Hardening techniques for Windows.
- uTox. µTox the lightest and fluffiest Tox client
- bleachbit. BleachBit system cleaner for Windows and Linux
- urh. Universal Radio Hacker: investigate wireless protocols like a boss
- bettercap. The state of the art network attack and monitoring framework.
- BoopSuite. A Suite of Tools written in Python for wireless auditing and security testing.
- airgeddon. This is a multi-use bash script for Linux systems to audit wireless networks.
- wpscan. WPScan is a black box WordPress vulnerability scanner
- wordpress-exploit-framework. A Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.
- nginxconfig.io. nginx config generator
- x64dbg. An open-source x64/x32 debugger for windows.
- capstone. Capstone disassembly/disassembler framework: Core (Arm, Arm64, M68K, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, Java, Ocaml, PowerShell)
- unicorn. Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)
- edb-debugger. edb is a cross platform x86/x86-64 debugger.
- keystone. Keystone assembler framework: Core (Arm, Arm64, Hexagon, Mips, PowerPC, Sparc, SystemZ & X86) + bindings
- bap. Binary Analysis Platform
- keypatch. Multi-architecture assembler for IDA Pro. Powered by Keystone Engine.
- x64dbg. An open-source x64/x32 debugger for windows.
- capstone. Capstone disassembly/disassembler framework: Core (Arm, Arm64, M68K, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, Java, Ocaml, PowerShell)
- unicorn. Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)
- edb-debugger. edb is a cross platform x86/x86-64 debugger.
- keystone. Keystone assembler framework: Core (Arm, Arm64, Hexagon, Mips, PowerPC, Sparc, SystemZ & X86) + bindings
- keypatch. Multi-architecture assembler for IDA Pro. Powered by Keystone Engine.
- hacker101. Hacker101
- DOMPurify. DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:
- Web-Security-Learning. Web-Security-Learning
- bluemonday. bluemonday: a fast golang HTML sanitizer (inspired by the OWASP Java HTML Sanitizer) to scrub user generated content of XSS
- filterbypass.
- csp-builder. Build Content-Security-Policy headers from a JSON file (or build them programmatically)
- latte. ☕ Latte: the intuitive and fast template engine for those who want the most secure PHP sites.
- protect. Proactively protect your Node.js web services
- teleport. Modern SSH server for clusters and teams.
- YubiKey-Guide. Guide to using YubiKey as a SmartCard for GPG and SSH