Skip to content
View templarByte's full-sized avatar

Block or report templarByte

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
32 stars written in Go
Clear filter

Find, verify, and analyze leaked credentials

Go 17,839 1,749 Updated Jan 21, 2025

Fast web fuzzer written in Go

Go 13,056 1,338 Updated Jun 30, 2024

A next-generation crawling and spidering framework.

Go 12,892 674 Updated Jan 20, 2025

In-depth attack surface mapping and asset discovery

Go 12,339 1,921 Updated Dec 21, 2024

Open-Source Phishing Toolkit

Go 12,036 2,311 Updated Sep 23, 2024

Connect your devices into a secure WireGuard®-based overlay network with SSO, MFA and granular access controls.

Go 11,886 554 Updated Jan 21, 2025

Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security, compliance, and misconfiguration scanning, saving Kubernet…

Go 10,379 844 Updated Jan 17, 2025

Adversary Emulation Framework

Go 8,798 1,178 Updated Jan 21, 2025

json incremental digger

Go 6,907 156 Updated Mar 25, 2024

⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock

Go 6,791 584 Updated Mar 12, 2024

Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...

Go 5,612 670 Updated Jul 12, 2024

A Workflow Engine for Offensive Security

Go 5,433 895 Updated May 27, 2024

Monitor linux processes without root permissions

Go 5,063 516 Updated Jan 17, 2023

Digging Deeper....

Go 3,064 500 Updated Jan 21, 2025

Hardentools simply reduces the attack surface on Microsoft Windows computers by disabling low-hanging fruit risky features.

Go 2,944 257 Updated Apr 1, 2024

Take a list of domains and probe for working HTTP and HTTPS servers

Go 2,925 517 Updated Jun 22, 2024

ScareCrow - Payload creation framework designed around EDR bypass.

Go 2,771 509 Updated Aug 18, 2023

☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud

Go 1,888 222 Updated Jan 14, 2025

An open-source project in Golang to asess different API Security tools and WAF for detection logic and bypasses

Go 1,603 221 Updated Oct 21, 2024

A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.

Go 1,569 118 Updated Jun 30, 2022

Constellation is the first Confidential Kubernetes. Constellation shields entire Kubernetes clusters from the (cloud) infrastructure using confidential computing.

Go 986 53 Updated Jan 21, 2025

Decrypt WhatsApp encrypted media files

Go 969 92 Updated Oct 2, 2020

Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place

Go 934 158 Updated Jan 17, 2025

Fast and configurable TLS grabber focused on TLS based data collection.

Go 875 82 Updated Jan 21, 2025

fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.

Go 765 77 Updated Aug 24, 2023

cast YouTube videos to your smart TV from command-line

Go 758 24 Updated Jan 28, 2024

Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environmen…

Go 744 129 Updated Aug 18, 2023

An Office365 User Attack Tool

Go 628 102 Updated Mar 19, 2024

Scan installed EDRs and AVs on Windows

Go 575 80 Updated Sep 14, 2023

Simple local scanner for vulnerable log4j instances

Go 374 75 Updated Aug 1, 2022
Next