Skip to content
View templarByte's full-sized avatar

Block or report templarByte

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
31 stars written in Go
Clear filter

Find, verify, and analyze leaked credentials

Go 18,337 1,787 Updated Mar 6, 2025

Fast web fuzzer written in Go

Go 13,525 1,363 Updated Jun 30, 2024

A next-generation crawling and spidering framework.

Go 13,128 690 Updated Mar 3, 2025

In-depth attack surface mapping and asset discovery

Go 12,562 1,942 Updated Mar 7, 2025

Connect your devices into a secure WireGuard®-based overlay network with SSO, MFA and granular access controls.

Go 12,365 588 Updated Mar 6, 2025

Open-Source Phishing Toolkit

Go 12,257 2,459 Updated Sep 23, 2024

Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security, compliance, and misconfiguration scanning, saving Kubernet…

Go 10,542 852 Updated Mar 4, 2025

Adversary Emulation Framework

Go 8,986 1,209 Updated Feb 25, 2025

json incremental digger

Go 6,930 156 Updated Feb 11, 2025

⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock

Go 6,820 645 Updated Mar 12, 2024

Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...

Go 5,629 675 Updated Jul 12, 2024

A Workflow Engine for Offensive Security

Go 5,496 901 Updated Feb 6, 2025

Monitor linux processes without root permissions

Go 5,232 527 Updated Jan 17, 2023

Digging Deeper....

Go 3,133 508 Updated Mar 6, 2025

Take a list of domains and probe for working HTTP and HTTPS servers

Go 2,959 519 Updated Jun 22, 2024

Hardentools simply reduces the attack surface on Microsoft Windows computers by disabling low-hanging fruit risky features.

Go 2,945 254 Updated Apr 1, 2024

ScareCrow - Payload creation framework designed around EDR bypass.

Go 2,791 512 Updated Aug 18, 2023

☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud

Go 1,930 228 Updated Mar 3, 2025

An open-source project in Golang to asess different API Security tools and WAF for detection logic and bypasses

Go 1,623 224 Updated Feb 12, 2025

A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.

Go 1,569 118 Updated Jun 30, 2022

Constellation is the first Confidential Kubernetes. Constellation shields entire Kubernetes clusters from the (cloud) infrastructure using confidential computing.

Go 1,004 53 Updated Mar 6, 2025

Decrypt WhatsApp encrypted media files

Go 972 93 Updated Oct 2, 2020

Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place

Go 957 157 Updated Jan 17, 2025

Fast and configurable TLS grabber focused on TLS based data collection.

Go 900 86 Updated Mar 3, 2025

fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.

Go 802 80 Updated Aug 24, 2023

cast YouTube videos to your smart TV from command-line

Go 763 23 Updated Jan 28, 2024

Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environmen…

Go 741 129 Updated Aug 18, 2023

An Office365 User Attack Tool

Go 630 102 Updated Mar 19, 2024

Scan installed EDRs and AVs on Windows

Go 577 80 Updated Sep 14, 2023

Simple local scanner for vulnerable log4j instances

Go 374 75 Updated Aug 1, 2022
Next